text
stringlengths 2.85k
2.55M
| label
class label 11
classes |
---|---|
Interactive Robot Transition Repair With SMT
Jarrett Holtz, Arjun Guha, Joydeep Biswas
arXiv:1802.01706v1 [cs.RO] 5 Feb 2018
University of Massachusetts Amherst
Abstract
Complex robot behaviors are often structured as
state machines, where states encapsulate actions
and a transition function switches between states.
Since transitions depend on physical parameters,
when the environment changes, a roboticist has to
painstakingly readjust the parameters to work in
the new environment. We present interactive SMTbased Robot Transition Repair (SRTR): instead of
manually adjusting parameters, we ask the roboticist to identify a few instances where the robot is
in a wrong state and what the right state should be.
A lightweight automated analysis of the transition
function’s source code then 1) identifies adjustable
parameters, 2) converts the transition function into
a system of logical constraints, and 3) formulates
the constraints and user-supplied corrections as a
MaxSMT problem that yields new parameter values. Our evaluation shows that SRTR is effective
on real robots and in simulation. We show that
SRTR finds new parameters 1) quickly, 2) with
only a few corrections, and 3) that the parameters
generalize to new scenarios. We also show that a
simple state machine corrected by SRTR can outperform a more complex, expert-tuned state machine in the real world.
1
Introduction
Complex robot control software is typically structured as a
state machine, where each state encapsulates a feedback controller. Even if each state is correct, the transitions between
states depend on parameters that are hard to get right, even
for experienced roboticists. It is very common for parameter
values to work in simulation but fail in the real world, to work
in one physical environment but fail in another, or to work on
one robot but fail on another. For example, Figure 1 shows
the trajectory of a robotic soccer player as it tries to kick a
moving ball. A very small change to its parameter values determines whether or not it succeeds.
Even a simple robot may have a large parameter space,
which makes exhaustive-search impractical. Moreover, robot
performance is usually non-convex with respect to parameter
Start
Go To
Intercept
Catch
Kick
End
(a) Attacker state machine
(b) Execution traces
Figure 1: A robot soccer attacker a) state machine, with b) successful
(blue) and unsuccessful (red) traces to Intercept a ball (orange) and
Kick at the goal. The green box isolates the error: the successful
trace transitions to Kick, the unsuccessful trace remains in Intercept.
values, which makes general optimization techniques susceptible to local minima. For some cases, there exist calibration
procedures to adjust parameters automatically (e.g., [Holtz
and Biswas, 2017]), but these are not general procedures.
Therefore, roboticists usually resort to adjusting parameters
manually—a tedious task that can result in poor performance.
We have the following key insights: a roboticist debugging
a robot can frequently identify when something goes wrong,
and what it should have done instead. When the robot control
software is structured as a state machine, this corresponds to
identifying when the robot is in the wrong state and what the
correct state should be. This is a partial specification of expected behavior: the roboticist does not need to enumerate a
complete sequence of states, the parameters to adjust, how to
adjust them, or even identify all errors.
We present SMT-based Robot Transition Repair (SRTR),
an approach to adjusting the parameters of robot state machines that leverages program repair techniques that have
gained traction in programming languages and software engineering research. Specifically, we define the grammar of
a repairable robot transition function as a subset of generalpurpose imperative programming languages. During execution, we log execution traces of the transition function. After
execution, the roboticist examines the execution traces and
corrects a handful of transitions. SRTR then converts the
set of corrections and the transition function into a logical
formula for a MaxSMT solver. A solution to this MaxSMT
problem minimizes changes to the parameters, while maxi-
mizing the number of satisfied corrections.
Our experimental results demonstrate that SRTR 1) is
more computationally tractable than exhaustive parameter
search; 2) is scalable; 3) generalizes to unseen situations; and
4) when applied to simple robot soccer attacker, can outperform a more complicated, expert-tuned attacker that won the
lower bracket finals at anonymized competition.
2
Related Work
Finite state machines (FSMs) can specify robot behavior and
enable robust autonomy. RoboChart [Miyazawa et al., 2017]
uses FSMs to verify liveness, timeliness, and other properties of robots. The HAMQ-INT algorithm [Bai and Russell,
2017] uses reinforcement learning to discover internal transitions and adapt to unexpected scenarios. SRTR also leverages FSMs, but focuses on correcting transition errors that
occur when the robot is deployed in a new environment.
Robot behavior can also be repaired by dynamic synthesis of new control structures, such as automatic synthesis of
new FSMs [Wong et al., 2014], or synthesis of code from a
context-free motion grammar with parameters derived from
human-inspired control [Dantam et al., 2013]. When automated synthesis is intractable, a user-generated specification
in a domain-specific language can be used to synthesize a
plan [Nedunuri et al., 2014]. SRTR assumes that the FSM
does not need new states or transitions, but that failures are
due to incorrect triggering of the transition function arising
from incorrect environment-dependent parameter values.
Robot behaviors rely on environment-dependent parameters for robust and accurate execution. If a precise model of
the dependency between parameters and behaviors is available, it may be possible to design a calibration procedure that
executes a specific sequence of actions and to recover correct
parameter values [Yang et al., 2014; Holtz and Biswas, 2017].
If a calibration procedure cannot be designed, but the effect
of parameters is well-understood, it may be possible to optimize for the parameters using a functional model [Cano et
al., 2016]. SRTR addresses the problem of repair even when
the dependence of the behaviors on parameters is not explicitly modeled. It automatically discovers such dependencies
by analysis of the source code of the transition function.
Human input can help overcome the limitations of autonomous algorithms [Kamar, 2016; Redacted, 2018]. Learning from demonstration (LfD) [Argall et al., 2009] and inverse reinforcement learning (IRL) [Abbeel and Ng, 2011]
allow robots to learn new behaviors from human demonstrations. LfD can also overcome model errors by correcting
portions of the state space [Meriçli et al., 2012]. These approaches require demonstrations in the full high-dimensional
state space of the robot, which can be tedious for users to
provide. When human demonstration does not specify why
an action was applied to a state, it can be hard to generalize
to a new situation. SRTR generalizes to new scenarios since
it infers dependencies from the source code of the transition
function. Furthermore, it requires only a partial specification
of correct behavior.
Domain-specific languages (DSLs) allow users to specify high-level behavior using abstractions such as Instruction
Graphs [Mericli et al., 2014]. Unlike DSLs that provide a
complete specification of robot behavior, SRTR only requires
sparse corrections that partially-specify expected behavior.
Automated program repair is an active area of research in
software engineering and programming languages. For example, DirectFix [Mechtaev et al., 2015] formulates program
repair as a MaxSMT problem and deems a program repaired
when all tests pass. Physical robots don’t have deterministic test cases and even user-provided corrections can be contradictory. SRTR uses MaxSMT to minimize changes and
maximize the number of satisfied corrections. There are several other domains that are not amenable to unit-testing. For
example, Tortoise [Weiss et al., 2017] allows the user to fix
system configuration errors using the Unix shell and propagates fixes to a system configuration specification. Whereas
Tortoise requires the user to completely fix the system, SRTR
only requires a partial specification.
Programming by example can synthesize programs from a
small number of examples; the approach has been very effective in domains such as synthesizing string transformations
on spreadsheet data [Gulwani, 2011]. RobustFill [Devlin et
al., 2017] generalizes the approach to also support noisy data.
Program templates can also be used to to synthesize task and
motion plans that satisfy user plan outlines [Nedunuri et al.,
2014]. Unlike these approaches, SRTR does not synthesis
new program structure and focuses on adjusting parameters.
For generalizability, SRTR minimizes the magnitude of adjustments and uses MaxSMT to discard noisy corrections.
3
Background
We use a real-world example to motivation SRTR: a robot
soccer attacker (also called a striker). The attacker must
1) go to the ball if the ball is stopped, 2) intercept the ball
if it is moving away from the attacker, 3) catch the ball if
it is moving toward the attacker, and 4) kick the ball at the
goal once the attacker has control of the ball. Each of these
sub-behaviors is a distinct, self-contained feedback controller
(e.g., ball interception [Biswas et al., 2014] or omnidirectional time optimal control [Kalmár-Nagy et al., 2004]). At
each time-step, the attacker 1) switches to a new controller
if necessary and 2) invokes the current controller to produce
new outputs. We represent the attacker as a robot state machine (RSM), where each state represents a controller. Figure 1a shows the structure of the attacker RSM.
In this paper, we assume that the output of each feedback
controller is nominally correct—while there might be minor
performance degradation of each controller when environmental factors change, we assume that they are convergent,
and hence will eventually result in the correct result. However, environmental factors also affect the transition function,
which transfers execution from one controller to another. For
example, the friction coefficient between the ball and the carpet, and the robot’s motor efficiency affect when the attacker
transitions from Intercept to Kick; and the mass of the ball affects when the attacker transitions from Kick to Done. These
factors vary from one environment to another. Since transition functions do not have any self-correcting mechanisms,
robots are prone to behaving incorrectly when their parame-
ters are incorrect for the given environment.
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
inputs ballLoc : Vector2D , ballVel : Vector2D ,
robotLoc : Vector2D , robotVel : Vector2D ,
robotAng : Float , robotAngVel : Float ,
targetAng : Float ;
variables kickTime : Float ;
parameters kickedThresh , timeoutThresh , aimErrorThresh ,
angleVelThresh , distanceThresh , relativeYThresh ,
relativeVelThresh , alignThresh , offsetThresh ,
catchVelThresh , ivThresh ;
if (s == "START ") {
s = "GOTO"
} else if (s == "KICK ") {
robotHeading = [cos( robotAng ), sin( robotAng )];
if (|| ballVel · robotHeading || > kickedThresh ) {
s = "END"
} else if ( kickTime > timeoutThresh ) {
s = "START"
} else {
s = "KICK" }
} else {
ballToRobot = ballLoc - robotLoc ;
aimError = AngleMod ( targetAng - robotAng );
ballVelTarget = Rotate (ballVel , targetAng );
robotVelTarget = Rotate (robotVel , targetAng );
ballToRobotVel = robotVelTarget - ballVelTarget ;
robotYAxis = [-sin( robotAng }, cos( robotAng )];
ballToRobotY = robotYAxis · ballToRobot ;
ballIntercept = ballLoc +
,→ || ballVel || * UnitVector ( ballToRobot );
interceptOffset = || ballIntercept - robotLoc ||;
interceptVel = ballVel *
,→ ballVel · UnitVector ( ballToRobot );
if ( aimError < aimErrorThresh &&
robotAngVel < angleVelThresh &&
|| ballToRobot || < distanceThresh &&
[0, 1] · ballToRobotVel < relativeYThresh &&
|| ballToRobotVel || < relativeVelThresh &&
|| ballToRobotY || < alignThresh ) {
s = "KICK"
} else if ( interceptOffset < offsetThresh &&
|| ballVel || > catchVelThresh &&
|| interceptVel || / || ballVel || > ivThresh ) {
s = "CATCH"
} else if (|| ballVel || > catchVelThresh ) {
s = " INTERCEPT "
} else {
s = "GOTO" } }
Figure 2: Transition function of an attacker.
3.1
Robot State Machines
A robot state machine (RSM) is a discrete-time Mealy
machine that is extended with continuous inputs, outputs,
and program variables. Formally, an RSM is a 9-tuple
hS, S0 , SF , V, V0 , Y, U, T, Gi, where S is the finite set of
states, S0 ∈ S is the start state, SF ∈ S is the end state,
V ∈ Rm is the set of program variables values, V0 ∈ Rm
are the initial values of the program variables, Y ∈ Rn are
the continuous inputs, U ∈ Rl are the continuous actuation
outputs, T : S × Y × V → S is the transition function, and
G : S × Y × V → U × V is the emission function. At
each time step t, the RSM first uses the transition function to
select a state and then the emission function to run the controller associated with that state. The transition function can
only update the current state, whereas the emission function
can update program variables and produce outputs.
Figure 2 shows the transition function for the attacker, written in C-style pseudocode. The function depends on the inputs and variables (declared on lines 1–5) and uses them to
Unary Operators
op 1 ::= - | sin | cos | · · ·
Expressions
e ::= k
| s
| xv
| xy
| xp
| op 1 (e)
| e1 op 2 e2
Constants
State
Variables
Inputs
Parameters
Transition Functions
T ::= { m1 ; · · · ; mn }
Binary Operators
op 2 ::= + | - | * | > | · · ·
Statements
m ::= s := e
| xv := e
| if (e) m1 else m2
| { e1 ; · · · ; en }
Parameter Maps
n
P ::= hx1p 7→ k1 · · · xn
p 7→ k i
Traces
R ::= [τ1 · · · τn ]
Corrections
ct ::= s : s ∈ S
Trace Elements
m
n
i=1
j=1
τt ::= {in = h ∀ xiy 7→ ki i, vars = h ∀ xjv 7→ k0j i, state = st 7→ ks00 }
Figure 3: Syntax of transition functions, traces, and corrections.
perform geometric calculations. The function has 11 different
parameters (lines 6–9) that determine when certain transitions
occur. The figure does not specify the parameters’ values, but
they are global constants. Finally, the transition function uses
a few helpers that we elide: UnitVector scales a vector by
its L2-norm, AngleMod bounds an angle to the range [−π, π),
and Rotate rotates a vector by an angle.
3.2
Transition Errors
Figure 1b shows two traces of the attacker. In the blue trace,
the attacker intercepts the moving ball and kicks it at the goal.
But, in the red trace, the attacker fails to kick: it remains stuck
in the Intercept state and never transitions to Kick. Over the
course of several trials (e.g., a robot soccer game), we may
find that the attacker only occasionally fails to kick. When
this occurs, it is usually the case that the high-level structure
of the transition function is correct, but that the values of the
parameters need to be adjusted. Unfortunately, since there are
11 real-valued parameters, the search space is large.
To efficiently search for new parameter values, we need to
reason about the structure of the transition function. To do so,
the next section describes how we systematically convert it
to a formula in propositional logic, extended with arithmetic
operators. This formula encodes the structure of the transition
function along with constraints from the user corrections, and
allows an SMT solver to efficiently find new parameters.
4
Interactive Robot Transition Repair
The SRTR algorithm (lines 32–36 of Figure 4) has four inputs: 1) the transition function, 2) a map from parameters
to their values, 3) an execution trace, and 4) a set of userprovided corrections. The result of SRTR is a corrected parameter map that maximizes the number of corrections satisfied and minimizes the changes to the input parameter map.
(The tradeoff between these objectives is a hyperparameter.)
SRTR has three major steps. 1) It parses the transition
function code and converts it to an abstract syntax tree for repair (Section 4.1). 2) It uses a lightweight program analysis
to identify parameters that cannot be repaired, and for each
user-provided correction, it partially evaluates the transition
function for the inputs and variable values at the time of correction, yielding residual transition functions (Section 4.2).
1
1
n
e
n
1 def Peval(T ,x 7→ k · · · x 7→ k ):
2
3
4
5
6 def Rep(T):
7 // Produces the parameters of T that do not need to be partially evaluated.
8
9 def Unrep(T):
10 // Produces the parameters of T that must be partially evaluated.
11
12 def Residual(T ,τt ,P ):
13
l
m
i=1
j=1
m
{in = h ∀ xiy 7→ ki i, vars = h ∀ xjv 7→ k0j i, state = st 7→ ks00 } := τt
0
l
Peval(T , ∀ xiy
i=1
i
, ∀ xiv
j=1
0i
, st 7→ ks00 )
14
T :=
15
0
{x1p , · · · , xn
p } = Unrep(T )
0
0
T := Peval(T ,x1 7→ P (x1 ), · · · , xn 7→ P (xn ))
return T 0
16
7→ k
7→ k
17
18
19 def CorrectOne(T ,τt ,P ,ct ):
20
21
22
T 0 := Residual(T ,τt )
{x1p , · · · , xm
p } := Rep(T )
1
0m
m
return ∃δ 1 , · · · , δ m : ct = T 0 (s1 , x01
p + δ , · · · , xp + δ )
23
1
n
24 def CorrectAll(T , P , R, {ct , · · · , ct }):
25
26
27
28
29
30
31
{x1p , · · · , xm
p } = Rep(T )
Φ = true
for i ∈ [1 · · · n]:
∃δ 1 , · · · , δ m : φi = CorrectOne(T ,R[t],P ,cit )
Φ = Φ ∧ (wi = H Y (wi = 0 ∧ φi ))
return ∃δ 1 , · · · , δ m , w1 , · · · , wn : Φ
1
n
32 def SRTR(T , P , R,{ct , · · · , ct }):
1
n
33 assert(CorrectAll(T ,P ,R,{ct , · · · , ct }))
34
35
36
cos(θy ) < xp
cos(xp )
θp + π
sin(θp + π)
// 1) Substitute xi with ki in T . 2) Simplify all operations and conditionals
// with immediate arguments until simplification is no longer possible.
return T 0 // partially evaluated T
j
minimize(Σi=1 wi + Σm
j=1 kδ k)
1
m
{xp , · · · , xp } = Rep(T )
m
m
return [x1p 7→ P (x1p ) + δ 1 , · · · , xm
p 7→ P (xp ) + δ ]
Figure 4: The core SRTR algorithm.
3) Finally, it uses the residual transition functions to formulate an optimization problem for an off-the-shelf MaxSMT
solver [Bjørner et al., 2015]. The solution to this problem is
an adjustment to the parameter values (Section 4.3).
4.1
The Language Of Transition Functions
To abstract away language-specific details of our repair procedure, we first parse the source code and convert it into an
idealized imperative language that only has features essential
for writing transition functions (Figure 3). The language has
a special identifier s that refers to the current state and other
identifiers have a subscript to indicate whether they are inputs
(xy ), parameters (xp ), or ordinary variables (xv ). The transition function can read any identifier, but it can only write to
variables and the state. Figure 3 has a list of operators that
often appear in transition functions, such as arithmetic and
trigonometric functions, but the list is not exhaustive. Finally, a transition function (T ) is a block of statements and
a parameter map (P ) assigns values to the parameters in T .
An execution trace is a sequence of trace elements (τt ). A
trace element records the values of sensor inputs, ordinary
variables, and the state at the start of time-step t. In contrast,
a user-provided correction (ct ) specifies the expected state at
the end of time-step t. To repair parameters, SRTR estab-
τ.vars
τ.in
e0
P
θy = 0
1 < xp
−1
θp + π
0
xp 7→ π
xp 7→ π
xp 7→ π
xp 7→ π
Table 1: Examples of residuals and repairable parameters.
lishes constraints that relate the observed initial state, the expected output state, and the other identifiers.
4.2
Residual Transition Functions
SRTR needs to translate the transition function into a logical
formula for the SMT solver. However, solvers do not have decision procedures for non-linear arithmetic and trigonometry,
both of which commonly occur in transition functions.
Partial Evaluation [Jones et al., 1993] is a technique that
specializes programs to work on specific inputs. For example,
if we partially evaluate the program cos(x) + y for x 7→ 0,
we get the program 1 + y. In general, partial evaluation first
substitutes identifiers with concrete values and then simplifies
the program as much as possible. SRTR uses a canonical
partial evaluator for transition functions, which we call Peval
( Figure 4, line 1). The arguments of Peval are a transition
function and a mapping from identifiers to constants.
The Residual function specializes a transition function for
a particular trace element. We call its result a residual transition function. Residual first partially evaluates the transition
function with respect to all the sensor inputs and variable values recorded in the trace element (line 14). This step eliminates most functions that the solver cannot represent, thus the
only identifiers that remain are the parameters and the state.
For example, the first row of Table 1 shows an expression
that uses a trigonometric function. If this expression occurs
in the transition function, its residual after partial evaluation
is a simple inequality that cannot be further simplified.
However, it is possible for the transition function to use a
parameter in a context that the solver cannot represent. For
example, the second row of Table 1 applies a trigonometric
function to a parameter and the first step of Residual simply
yields the original expression. (i.e., Peval(cos(xp )) = cos(xp )).
To address this, Residual calculates the set of parameters that
cannot be repaired (line 15) and partially evaluates once again
with respect to their values in the parameter map (line 16).
Therefore, the final result in this example is −1.
The Residual function uses a pair of auxiliary functions
Rep and Unrep to calculate the set of parameters that can, and
cannot be repaired. These functions perform a lightweight
analysis by mutual recursion over the transition function.
Mutual recursion is necessary because a parameter may not
be repairable even if its immediate context is repairable. For
example, the third row of Table 1 shows an expression with
a repairable parameter thus its residual is θp + π. However,
the fourth row embeds the same expression in a context that
makes it unrepairable, thus the residual is partially evaluated
using the parameter map, yielding 0.
4.3
Transition Repair as a MaxSMT Problem
This section presents how SRTR formulates a MaxSMT
problem in three steps. 1) It translates each correction into
an independent formula. A solution to this formula (if one
exists) corresponds to parameter adjustments that satisfy the
correction. 2) It combines the formulas from the previous
step into a single formula with independent weights for each
sub-formula. A solution to this formula corresponds to parameter adjustments that satisfy a subset of the sub-formulas.
Any sub-formulas that could not be satisfied have a positive
weight. 3) Finally, we formulate a MaxSMT problem that
minimizes the magnitude of adjustments and the weight of
violated sub-formulas.
The CorrectOne function transforms a single correction
into a formula. This function 1) calculates the residual transition function (Figure 4, line 20), 2) gets the repairable parameters (line 21), and 3) produces a formula (line 22) with
a variable δ i that corresponds to an adjustment to the ith repairable parameter. This formula constrains the residual transition function’s output state to be equal to the correction.
Therefore, if the correction differs from the post-state of the
transition function at run-time, the solution to the formula
will have a non-zero adjustment for at least one of the repairable parameters. (i.e., δ i 6= 0 for some i.)
The CorrectAll function supports multiple corrections and
uses CorrectOne as a subroutine. The function iteratively
builds a conjunctive formula Φ, where each clause has a distinct weight wi and two mutually exclusive cases: Either 1)
wi = 0 thus the clause has no cost and the adjustments to the
parameters satisfy the ith correction (line 29) or 2) wi = H
and the ith correction is violated. Thus H ∈ R+ is a hyperparameter that induces a tradeoff between satisfying more
corrections vs. minimizing the magnitude of the adjustments:
large values of H allow more corrections to be satisfied, and
small values of H minimize the magnitude of the adjustments. The final formula has m real-valued variables δ i for
adjustments to the corresponding m repairable parameters xip ,
and n discrete variables wj that represent the cost of violating
formula φj corresponding to correction cjt .
Finally, the SRTR function uses CorrectAll as a subroutine
and invokes the MaxSMT solver. This function 1) adds the
assertion returned by CorrectAll to the solver, 2) directs the
solver to minimize the sum of weights and the sum of the
magnitude of parameter changes (line 34), and 3) returns a
map from repairable parameter names to their new values.
5
Evaluation
We evaluate SRTR in four ways. 1) We compare SRTR to
an exhaustive search; 2) We show how the number of corrections affect RSM performance and that SRTR requires only a
small number of corrections to perform well; 3) Using three
RSMs, we show that SRTR does not over-fit and performs
well in new scenarios; and 4) We use SRTR to improve the
performance of a real-world robot.
We present three RSMs in this section and measure their
success rates as follows. The attacker (Figure 1a), which is
our running example, fills the main offensive role in robot
soccer. Its success rate is the fraction of the test scenarios
where it successfully kicks the ball into the goal. The deflector (Figure 5a) plays a supporting role in robot soccer, performing one-touch passing [Bruce et al., 2008]. Its success
Start
Setup
Wait
Kick
End
(a) Deflector RSM
S1 Left
S1 Forward
End
Start
S2 Left
S2 Forward
S1 Right
S2 Right
(b) Docker RSM
Figure 5: RSMs used for experiments
Method
Success Rate (%) CPU Time
Initial Parameters
44
—
Exhaustive Search
89 1,300 hr
SRTR
89
10 ms
Table 2: Success rate and CPU time compared to exhaustive search.
rate is the fraction of the test scenarios where it successfully
deflects the ball. The docker (Figure 5b) drives a differential drive robot to line up and dock with a charging station.
Its success rate is the fraction of the test scenarios where it
successfully docks with the charging station.
5.1
Comparison To Exhaustive Search
Using the attacker, we compare SRTR to an exhaustive
search to show that 1) SRTR is dramatically faster and 2)
the adjustments found by SRTR are as good as those found
by exhaustive search. To limit the cost of exhaustive search,
the experiment only repairs the six parameters that affect transitions into the Kick state; we bound the search space by the
physical limits of the parameters; and we discretize the resulting hypercube in parameter space. We evaluate each parameter set using 13 simulated positions and manually specify if
the position should transition to the Kick state.
We evaluate the initial parameter values, the SRTRadjusted parameters, and the parameters found by exhaustive search on 20,000 randomly generated scenarios. Table 2
reports the success rate and running time of each approach.
SRTR and exhaustive search achieve a comparable success
rate. However, SRTR completes in 10 ms whereas exhaustive search takes 1,300 CPU hours (using 100 cores).
5.2
Scalability
Using the attacker, we now show how the number of corrections affects SRTR solver time and success rate. Starting with
the same set of initial parameters used in Section 5.1, we first
create a training dataset by simulating the attacker in 40 randomly generated scenarios. For each scenario, we provide
one correction, thus we have a training set of 40 corrections.
Each trial applies SRTR to a subset of these corrections and
evaluates the success rate using 150 random test scenarios.
We repeat this procedure for each N ∈ [1, 40] with 50 randomly chosen subsets of the training set (i.e., 300,000 total
trials). Figure 6a shows how the number of corrections affects the success rate. It is possible for a single informative
correction to dramatically increase the success rate, or for a
particularly under-informative correction to have little effect.
Therefore we also report the mean success rate and show the
99% confidence interval in gray. Success rate increases with
the number of corrections, and with 23 corrections, the attacker reaches a peak success rate of 87%. Figure 6b shows
0.04
RSM
Solver Time (s)
Success Rate (%)
70
60
0.03
Attacker
Deflector
Docker
0.02
SRTR
Corrections
12
2
5
3
9
3
Params
80
Success Rates (%)
Baseline Expert SRTR
57,600
42
44
89
16,776
1
65
80
5,000
0
0
100
Tests
Table 3: Success rates for baseline, expert, and SRTR parameters.
0.01
50
0.00
0
10
20
30
Number of Corrections
(a) Success Rate
40
0
10
20
30
40
Number of Corrections
(b) Solver Time
Figure 6: Scaling of SRTR with number of corrections. We report
the mean as a line, the 99% confidence interval in grey, inliers in
blue, and outliers in red. Darker points represent more occurrences.
that the solver time increases linearly with the number of corrections, and remains less than 0.04s with 40 corrections.
5.3
Generalizability
Since SRTR uses a handful of user-provided corrections to
adjust parameters, there is a risk that it may overfit and underperform in new scenarios. We use three RSMs to show
that 1) SRTR-adjusted parameters generalize to new scenarios and that 2) SRTR outperforms a domain-expert who has
30 minutes to manually adjust parameters.
Table 3 summarizes the results of this experiment. We evaluate the success rate of the Attacker, Deflector, and Docker
RSMs on a test dataset with several thousand test scenarios
each. The baseline parameters that we use for these RSMs
have a low success rate. We give a domain expert complete
access to the RSM code (i.e., the transition and emission functions), and subsequently our simulator for 30 mins. In that
time, the expert is able to dramatically increase the success
rate of the Deflector, but has minimal impact on the success
rate of the Attacker and the Docker. Finally, we apply SRTR
using a handful of corrections and the baseline parameters.
The SRTR-adjusted parameters perform significantly better
than the baseline and domain-expert parameters.
The heat maps in Figure 7 illustrates how parameters found
by the domain-expert, nd by SRTR generalize to novel scenarios with the Attacker. In both heat maps, the goal is the
green bar and the initial position of the Attacker is at the origin. Each coordinate corresponds to an initial position of the
ball and for each position we set the ball’s initial velocity to
12 uniformly distributed angles. With the expert-adjusted parameters, the Attacker performs well when the ball starts in its
immediate vicinity, but performs poorly otherwise. However,
with SRTR-adjusted parameters, the Attacker is able to catch
or intercept the ball from most positions on the field. For this
result, we required only two corrections and the cross-marks
in the figure show the initial position of the ball for both corrections. Therefore, although SRTR only adjusted parameters to account for these two corrections, the result generalized to many other positions on the field.
5.4
Case Study: SRTR In The Real World
To evaluate SRTR in the real world, we follow the same procedure that experts use (summarized in Table 4): we develop
the Attacker in a simulator, we adjust parameters until it performs well in simulation, and then we find that it performs
(a) Expert-adjusted parameters. (b) SRTR-adjusted parameters.
Figure 7: Attacker success rate with respect to different initial ball
positions. The corrections are marked with a cross.
poorly in the real world. To evaluate the success rate of the
attacker in the real world, we start the ball from 18 positions on the field and repeat each position five times with the
same velocity (i.e., 90 trials). The parameters from simulation have a 25% success rate. Using the execution logs of
this experiment, we apply SRTR with three corrections. The
adjusted parameters increase the success rate to 73%. In practice, an expert would iteratively adjust parameters, so we apply SRTR again with 2 more corrections, which increases the
success rate to 86%. Finally, our group has an attacker that we
tested and optimized extensively for anonymized competition,
where it was part of a team that won the lower bracket. This
Competition Attacker has additional states to handle special
casesthat do not occur in our tests. On our tests, the Competition Attacker’s success rate is 76%. Therefore, with two iterations of SRTR, the simpler Attacker actually outperforms
the Competition Attacker in typical, real-world scenarios.
6
Conclusion
This paper presents SMT-based Robot Transition Repair
(SRTR), which is a semi-automatic white-box approach for
adjusting the transition parameters of Robot State Machines.
We demonstrate that SRTR: 1) increases success rate for multiple behaviors; 2) finds new parameters quickly using a small
number of annotations; 3) produces solutions which generalize well to novel situations; and 4) improves performance in
a real world robot soccer application.
Trial
Competition Attacker
Parameters from Simulation
Real World SRTR Tuning 1
Real World SRTR Tuning 2
Success Rate (%)
75
24
73
85
Table 4: Attacker success rates on a real robot.
References
[Abbeel and Ng, 2011] Pieter Abbeel and Andrew Y Ng. Inverse reinforcement learning. In Encyclopedia of machine
learning, pages 554–558. Springer, 2011.
[Argall et al., 2009] Brenna D. Argall, Sonia Chernova,
Manuela Veloso, and Brett Browning. A Survey of Robot
Learning From Demonstration. Robotics and Autonomous
Systems, pages 469 – 483, 2009.
[Bai and Russell, 2017] Aijun Bai and Stuart Russell. Efficient Reinforcement Learning with Hierarchies of Machines by Leveraging Internal Transitions. In IEEE International Conference on Robotics and Automation, 2017.
[Biswas et al., 2014] Biswas, Mendoza, Zhu, Choi, Klee,
and Veloso. Opponent-driven planning and execution for
pass, attack, and defense in a multi-robot soccer team.
In International Conference on Autonomous Agents and
Multi-Agent Systems, pages 493–500, 2014.
[Bjørner et al., 2015] Nikolaj Bjørner, Anh-Dung Phan, and
Lars Fleckenstein. νZ-an optimizing SMT solver. In International Conference on Tools and Algorithms for the
Construction and Analysis of Systems, pages 194–199.
Springer, 2015.
[Bruce et al., 2008] James Bruce, Stefan Zickler, Mike Licitra, and Manuela Veloso. CMDragons: Dynamic Passing and Strategy on a Champion Robot Soccer Team. In
IEEE International Conference on Robotics and Automation, pages 4074–4079, 2008.
[Cano et al., 2016] José Cano, Alejandro Bordallo, Vijay
Nagarajan, Subramanian Ramamoorthy, and Sethu Vijayakumar. Automatic configuration of ros applications
for near-optimal performance. In IEEE/RSJ International
Conference on Intelligent Robots and Systems, pages
2217–2223, 2016.
[Dantam et al., 2013] Neil Dantam, Ayonga Hereid, Aaron
Ames, and Mike Stilman. Correct Software Synthesis for
Stable Speed-Controlled Robotic Walking. In Robotics:
Science and Systems, 2013.
[Devlin et al., 2017] Jacob Devlin, Jonathan Uesato, Surya
Bhupatiraju, Rishabh Singh, Abdelrahman Mohammad,
and Pushmeet Kohli. RobustFill: Neural program learning under noisy I/O. In ICML, 2017.
[Gulwani, 2011] Sumit Gulwani. Automating string processing in spreadsheets using input-output examples. In ACM
SIGPLAN Notices, pages 317–330. ACM, 2011.
[Holtz and Biswas, 2017] Jarrett Holtz and Joydeep Biswas.
Automatic Extrinsic Calibration of Depth Sensors with
Ambiguous Environments and Restricted Motion. In
IEEE/RSJ International Conference on Intelligent Robots
and Systems, pages 2235–2240, 2017.
[Jones et al., 1993] Neil D. Jones, Carsten K. Gomad, and
Peter Sestoft. Partial Evaluation and Automatic Program
Generation. Prentice-Hall, Inc., 1993.
[Kalmár-Nagy et al., 2004] Tamás Kalmár-Nagy, Raffaello
D’Andrea, and Pritam Ganguly. Near-Optimal Dynamic
Trajectory Generation and Control of an Omnidirectional
Vehicle. Robotics and Autonomous Systems, pages 47–64,
2004.
[Kamar, 2016] Ece Kamar. Directions in Hybrid Intelligence: Complementing AI Systems with Human Intelligence. In IEEE International Conference on Robotics and
Automation, 2016.
[Mechtaev et al., 2015] Sergey Mechtaev, Jooyong Yi, and
Abhik Roychoudhury. DirectFix: Looking for Simple Program Repairs. In IEEE/ACM International Conference on
Software Engineering, pages 448–458, 2015.
[Meriçli et al., 2012] Çetin Meriçli, Manuela Veloso, and
H Levent Akın. Multi-resolution corrective demonstration
for efficient task execution and refinement. International
Journal of Social Robotics, pages 423–435, 2012.
[Mericli et al., 2014] Cetin Mericli, Steven D. Klee, Jack Paparian, and Manuela Veloso. An Interactive Approach for
Situated Task Specification Through Verbal Instructions.
In Autonomous Agents and Multi-agent Systems, pages
1069–1076, 2014.
[Miyazawa et al., 2017] Alvaro Miyazawa, Pedro Ribeiro,
Wei Li, Ana Cavalcanti, and Jon Timmis. Automatic property checking of robotic applications. In IEEE/RSJ International Conference on Intelligent Robots and Systems,
pages 3869–3876, 2017.
[Nedunuri et al., 2014] Srinivas Nedunuri, Sailesh Prabhu,
Mark Moll, Swarat Chaudhuri, and Lydia E. Kavraki.
SMT-based synthesis of integrated task and motion plans
from plan outlines. In IEEE International Conference on
Robotics and Automation, pages 655–662, 2014.
[Redacted, 2018] Redacted. Human-in-the-loop slam. In
Redacted, 2018.
[Weiss et al., 2017] Aaron Weiss, Arjun Guha, and Yuriy
Brun. Tortoise: Interactive System Configuration Repair. In IEEE/ACM International Conference on Automated Software Engineering, pages 625–636, 2017.
[Wong et al., 2014] Kai Weng Wong, Rädiger Ehlers, and
Hadas Kress-Gazit. Correct High-level Robot Behavior
in Environments with Unexpected Events. In Robotics:
Science and Systems, 2014.
[Yang et al., 2014] Xiangdong Yang, Liao Wu, Jinquan Li,
and Ken Chen. A Minimal Kinematic Model for Serial
Robot Calibration Using POE Formula. Robotics and
Computer-Integrated Manufacturing, pages 326 – 334,
2014.
| 6cs.PL
|
arXiv:1504.03021v1 [physics.comp-ph] 12 Apr 2015
Elastic properties of the degenerate f.c.c.
crystal of polydisperse soft dimers at zero
temperature
J. W. Narojczyk 1 and K. W. Wojciechowski 2
Institute of Molecular Physics, Polish Academy of Science, Smoluchowskiego 17,
PL-60-179 Poznań, Poland
Abstract
Elastic properties of soft, three-dimensional dimers, interacting through site-site
n-inverse-power potential, are determined by computer simulations at zero temperature. The degenerate crystal of dimers exhibiting (Gaussian) size distribution
of atomic √
diameters - i.e. size polydispersity - is studied at the molecular number
density 1/ 2; the distance between centers of atoms forming dimers is considered
as a length unit. It is shown that, at the fixed number density of the dimers, increasing polydispersity causes, typically, an increase of pressure, elastic constants
and Poisson’s ratio; the latter is positive in most direction. A direction is found,
however, in which the size polydispersity causes substantial decrease of Poisson’s
ratio, down to negative values for large n. Thus, the system is partially auxetic for
large polydispersity and large n.
Keywords: auxetic materials, elastic constants, polydispersity, modeling and
simulation, mechanical properties, negative Poisson’s ratio
PACS: 07.05.Tp, 61.43.-j, 62.20.de, 62.20.dj
1
Introduction
Among the characteristics of real materials, elastic properties are the ones that
are crucial from the point of view of various applications. Recently, increasing
interest is observed in the area of materials with unusual elastic properties an example are materials with negative Poisson’s ratio [1–7]. When stretched
(or resp. compressed) such materials increase (resp. decrease) their size not
1
2
[email protected]
[email protected]
Preprint submitted to Elsevier
14 April 2015
only in the direction of the stretch (resp. compression) but also in one or
more directions transverse to it [7]. Materials exhibiting such counterintuitive
behavior are known as anti-rubber [8], dilational materials [9] or auxetics [2].
In this paper, the last name will be used for its brevity.
As for isotropic systems the Poisson’s ratio is direction independent, any
isotropic material can be either auxetic or not. For anisotropic systems, which
are the subject of the present paper, the situation is more complex. Apart
from the alternative that the Poisson’s ratio is in all directions negative or
not, a third possibility exists: in some directions it is negative and in other - it
is not. In the literature related to the field, various names have been proposed
to describe different situations [4, 10–12]. Here we will adopt the scheme introduced in Ref. [12], in which - as in the isotropic case - the names auxetics
and nonauxetics correspond, respectively, to negative or nonnegative Poisson’s
ratio in all directions. Materials with Poisson’s ratios negative in some directions and nonnegative in the other ones will be referred to as partially auxetic
materials or just partial auxetics.
The very existence of auxetics and partial auxetics encourages one to study
influence of various micro-level mechanisms on the elastic properties of condensed matter [13–44]. An important problem in this context is the influence of disorder on the Poisson’s ratio. For some two-dimensional (2D) models which are elastically isotropic (at least for small deformations) and for
some anisotropic 2D models, it has been found that various kinds of disorder
(such as vacancies, interstitials, aperiodicity or polydispersity) introduced in
crystalline structures, increase Poisson’s ratio [45–50]. Studies of some threedimensional (3D) molecular models [51] revealed similar effect caused by vacancies, what might suggest a general conclusion that (at least in simple molecular systems) disorder weakens or eliminates auxeticity.
Recently, however, it has been found that in one of the simplest 3D systems soft spheres, forming the f.c.c. phase, there exists a direction in which one of
the form of disorder (polydispersity) decreases Poisson’s ratio, which reaches
negative values down to -1 [52]. This observation might find practical applications, e.g. in production of partial auxetics of latex meso- or macroscopic
spheres for which size polydispersity is easy to control. Unfortunately, the
mentioned lowest Poisson’s ratios were observed only for the softest spheres
with n = 6, i.e. when the f.c.c. structure may be unstable with respect to the
b.c.c. structure [53].
Taking into account that elastic properties of many-body systems strongly depend on details of the intermolecular interaction potential and, in particular,
on the molecular shape, it is interesting to study other 3D systems searching
for stable structures for which increasing polydispersity can lead to more negative Poisson’s ratios in some directions. As it is meaningful to start with the
2
simplest molecular shapes, the natural candidate for a first 3D molecule to
investigate is a polydisperse dimer.
The aim of this study is to determine the influence of disorder introduced
to a solid of soft dimers by the size dispersion of their atoms, on the elastic
properties of the model. The study
√ concerns the zero temperature, T = 0, and
the number density N/V = 1/ 2, where V is the volume and N is the number
of dimers. At this density atoms of dimers can be arranged in a perfect f.c.c.
lattice of lattice constant equal to the distance of atomic centers in the dimer.
The dimers form a degenerate crystalline (DC) phase - an analogue of that
observed in 2D [54]. The phase is characterized by non-periodic positions and
orientations of molecules, whereas the atoms forming molecules are arranged in
a perfect f.c.c. lattice (when the atoms are identical) or (for slightly different
sizes of atoms) in a lattice close to the f.c.c. one. The DC phase is known
to be thermodynamically stable and effectively cubic from the point of view
of elastic constants for hard dimers [55] and is expected to preserve those
properties for soft dimers with short ranged interactions which are studied in
the present paper.
The soft dimer system can be seen as a rough model of some man-made
nano-, meso- or macro-particle systems, e.g. systems of latex particles [56, 57].
Recently, an increasing interest is observed in systems of soft particles [58],
especially in the context of physics of colloids. This is due to the fact that
the latter have a broad range of possible applications. Systems of soft polydisperse particles seem to be more realistic models of colloids than those built
of identical particles. Polydispersity is also important for nanoparticle crystals [59–61], where the speed of crystallization and resulting crystal quality is
strongly related to size dispersion of particles.
Studies of elastic properties of models of polydisperse systems can be thought
of as a first step on a path to better understanding mechanisms and phenomena
that govern the elastic properties of real systems. Such a knowledge is not only
important from the point of view of fundamental research but also useful from
the material engineering point of view - it can help to engineer materials with
desired elastic properties.
2
Description of the studied model
The model studied in this work consists of N diatomic molecules (dimers) in
periodic boundary conditions. The dimers are rigid i.e. the distance between
centers of the atoms forming each one is constant and equal to σ (which
constitutes a unit of length) for each dimer. Initially the atoms form the perfect
f.c.c. lattice and the molecules form a degenerate crystalline (DC) phase. The
3
atoms interact via purely repulsive potential of the form:
uij (dij , rij ) = u0
dij
rij
!n
,
(1)
where dij = (di + dj )/2, di , dj are the diameters of the interacting spheres
(atoms), rij is the distance between their centers and u0 is the energy unit.
The exponent n is further referred to as the hardness parameter and its inverse, 1/n, as the softness parameter. (These names come from the observation
that when n → ∞ the interaction potential described by Eq. (1) tends to the
hard-body potential, which is widely used in computer simulations and condensed matter theory [34].) Atomic interactions are assumed to be short-range
ones, i.e. only the nearest neighbors (shearing a face of their Voronoi polyhedra) interact. Since the molecules are considered as rigid, interactions between
atoms forming a molecule are neglected.
2.1 Atomic size polydispersity
In the studied system, atomic diameters were generated randomly according
to the Gauss distribution function with a given standard deviation δ
1q 2
hd i − hdi2 .
δ=
σ
(2)
In above equation, d is the atomic diameter and σ = hdi. Further, in this
work, δ is treated as the measure of disorder in the system and is referred to
as the polydispersity parameter. Generated values of atomic diameters were
a)
b)
Fig. 1. Example of studied structures with atomic size polydispersity. The structure
shown consists of 432 molecules and has the polydispersity parameter δ equal to 3%.
In (a) the atoms are drawn in the shades of gray, indicating their size relative to
other atoms. The ones drawn in white are the smallest and those drawn in black are
the largest. The gray cube indicates the periodic box. In (b) connections between
atoms in the same structure as in (a) are shown.
4
randomly distributed among atoms in the structure. In the Fig. 1 examples of
studied structures are presented. It can be seen that even in the presence of
atomic size polydispersity atoms form nearly perfect f.c.c. lattice.
3
Basic formulae
In the following, it will be assumed that the studied system of soft dimers
exhibits effective regular symmetry. For the latter symmetry, when the external pressure p is zero, elastic properties can be described by just three elastic
constants Cxxxx, Cxxyy and Cxyxy [62]. However, when p 6= 0, it is more convenient [22, 45] to use other elastic constants, Bijkl , obtained by expanding the
free enthalpy (Gibbs free energy), G, with respect to the components of the
Lagrange strain tensor, ε:
∆G/Vref = ∆(F + pV )/Vref =
1X
Bijkl εij εkl .
2 ijkl
(3)
F in the above equation is the (Helmholtz) free energy and Vref is the volume of
the deformation-free (reference) system. The elastic constants Bijkl are simply
related with the constants Cijkl [63, 64]
Bijkl = Cijkl − p (δik δjl + δil δjk − δij δkl ) ,
(4)
where δij is the Kronecker delta, equal to 1 for i = j and zero otherwise.
In the case of cubic symmetry, considered in this work, only the following
elastic constants are of interest (the Voigt notation is used below [63]):
B11 = C11 − p ,
B12 = C12 + p ,
B66 = C66 − p ,
(5)
(6)
(7)
and the free enthalpy expansion (3) takes the form:
1
∆G/Vref = B11 ε2xx + ε2yy + ε2zz
2
+ B12 (εxx εyy + εyy εzz + εzz εxx ) + 2B66 ε2xy + ε2yz + ε2zx .
(8)
For cubic systems, instead of constants defined by Eq. (5)-(7), the below elastic
moduli are also often used:
5
1
(B11 + 2B12 ) ,
3
µ1 = B66 ,
1
µ2 = (B11 − B12 ) ,
2
(9)
B=
(10)
(11)
where B is the bulk modulus, and the µi are the shear moduli. In the following,
both sets of the quantities will be used while presenting and discussing the
results.
The Poisson’s ratio is defined as the negative ratio of transverse to longitudinal
strain when only the longitudinal component of the stress tensor is infinitesimally changed. For anisotropic systems it depends, in general, on both the
longitudinal and the transverse direction. For cubic symmetry, the Poisson’s
ratio along two high-symmetry longitudinal directions ([100] and [111]) does
not depend on the choice of the transverse direction [10] and can be expressed
by the elastic constants, Bij , in the form [65]:
B12
1 3B − 2µ2
=
,
B11 + B12
2 3B + µ2
B11 + 2B12 − 2B66
1 3B − 2µ1
ν[111] =
=
.
2 (B11 + 2B12 + B66 )
2 3B + µ1
ν[100] =
(12)
(13)
In this paper, the Poisson’s ratio along the longitudinal direction [110] and
two transverse directions [11̄0] and [001] was also computed:
2
2
B11
+ B11 B12 − 2B12
− 2B11 B66
2
2
B11 + B11 B12 − 2B12 + 2B11 B66
3B(3µ2 − µ1 ) − 4µ1 µ2
,
=
3B (3µ2 + µ1 ) + 4µ1 µ2
(14)
4B12 B66
2
+ B11 B12 − 2B12
+ 2B11 B66
6Bµ1 − 4µ1 µ2
=
.
3B (3µ2 + µ1 ) + 4µ1 µ2
(15)
ν[110][11̄0] =
ν[110][001] =
4
2
B11
Numerical determination of the elastic properties
In order to obtain the elastic constants, a sample was considered which, at
equilibrium, is described by three vectors a0 , b0 and c0 parallel to the unit
cell edges of the f.c.c. lattice. Components of those vectors form columns of a
reference box matrix [66, 67] H. Applying a uniform deformation that transforms the sample into a parallelepiped described by the box matrix h one can
6
write the Lagrange strain tensor as [66, 67]:
ε = H′
−1
h′ h H−1 − I /2 ,
(16)
where h′ is the transposed matrix h and I is the unit matrix. Differentiating
the free energy F with respect to the strain tensor components, one obtains
all the elastic constants and pressure. Is is worth to note, that in the case of
zero temperature (T = 0◦ K), the free energy is just equal to the potential
energy of the system.
After determining equilibrium positions and orientations of all the molecules
in the reference state for a given δ, the following deformations were applied:
hαβ = (1 + ξα ) Hαβ δαβ ,
(17)
for which new equilibrium positions and orientations were determined. In (17)
α, β indicate directions, and ξα is a small real number. The relations below
define the elastic constants and pressure:
∂2F
∂ξα ∂ξβ
∂F
∂ξα
ξα =0
∂2F
∂ξα2
ξα =0
ξα =ξβ =0, α6=β
= −p ,
(18)
= B11 ,
(19)
= B12 − p .
(20)
The B66 constant was obtained by applying the deformation of the form:
hαα = Hαα ,
hαβ = Hαβ + ζαβ Hαα ,
(21)
for which new equilibrium positions and orientations were determined. In (21)
ζαβ = ζβα is a small real number. For Hxx = Hyy = Hzz this leads to:
∂2F
2
∂ζαβ
5
= 6 (2B66 + p) .
(22)
ζαβ =0
Results
In the Figs. 2 (a) and 2 (b) values of the pressure and the bulk modulus
are shown, respectively. Is is clearly visible that increasing polydispersity and
7
1025
1025
δ
δ
δ
δ
δ
δ
1020
=
=
=
=
=
=
0
0.001
0.003
0.007
0.01
0.03
δ
δ
δ
δ
δ
δ
1020
=
=
=
=
=
=
0
0.001
0.003
0.007
0.01
0.03
1015
p
B
1015
1010
1010
105
105
100
100
0.001
0.01
0.001
0.1
0.01
a)
1/n
0.1
b)
1/n
Fig. 2. The values of (a) pressure and (b) bulk modulus B for polydisperse dimers,
plotted against the softness parameter (1/n). The thick solid line represents values
for the system with δ = 0.
increasing n leads to increase of those quantities as it was earlier observed in
other systems [47–50, 52].
The observed behavior can be qualitatively understood by noticing that dense
packing of identical molecules in the hard body limit requires less space than
dense packing of polydisperse molecules of the same average size [46]. As all
the considered systems are studied at the same volume, their densities relative
to close packing grow with increasing polydispersity. Increase of the relative
density implies an increase of the pressure and the bulk modulus. Obviously,
the latter quantities show the largest increase for the largest n, when the
interaction potential is the steepest one.
In Fig. 3 the elastic constants Bij are shown. It can be seen that all elastic
constants also increase with increasing polydispersity and increasing vaule of
n. Presented behavior of elastic constants is also similar to that observed for
other 2D and 3D systems [47–50, 52] and can be qualitatively explained by
the close packing argument used above.
1025
1025
δ
δ
δ
δ
δ
δ
1020
=
=
=
=
=
=
0
0.001
0.003
0.007
0.01
0.03
1020
1015
=
=
=
=
=
=
0
0.001
0.003
0.007
0.01
0.03
105
1010
105
100
0.01
1/n
0.1
1010
100
0.001
a)
0
0.001
0.003
0.007
0.01
0.03
105
100
0.001
=
=
=
=
=
=
1015
B66
1010
δ
δ
δ
δ
δ
δ
1020
1015
B12
B11
1025
δ
δ
δ
δ
δ
δ
0.01
1/n
0.1
0.001
b)
0.01
1/n
0.1
c)
Fig. 3. The values of elastic constants (a) B11 , (b) B12 and (c) B66 . plotted against
the softness parameter (1/n). The thick solid line represents values for the system
with δ = 0.
8
In Fig. 4 plots of µi /B ratios are presented. As in the case of earlier studies [47–
50, 52] for both 2D and 3D, this ratios seem to tend to 0 for any nonzero
polydispersity, in the hard interactions limit (n → ∞).
1
1
δ
δ
δ
δ
δ
δ
0.8
=
=
=
=
=
=
0
0.001
0.003
0.007
0.01
0.03
0.8
=
=
=
=
=
=
0
0.001
0.003
0.007
0.01
0.03
0.6
µ2 /B
0.6
µ1 /B
δ
δ
δ
δ
δ
δ
0.4
0.4
0.2
0.2
0
0
0.001
0.01
1/n
0.001
0.1
a)
0.01
1/n
0.1
b)
Fig. 4. The values of µ/B ratio for (a) µ1 and (b) µ2 , plotted against the softness
parameter (1/n). Thick solid line represents values measured for the system with
δ = 0.
According to the formulae (12) and (13) the mentioned above asymptotics of
µi /B implies that the system behaves like rubber (νrubber = 0.5) when a small
stress is applied along the directions [100] and [111] in the limit n → ∞. This
is shown in Fig. 5, where the plots of Poisson’s ratio are presented. It can be
seen there that, typically, presence of any nonzero polydispersity causes an
increase of the Poisson’s ratio in most of directions corresponding to the high
symmetry axes. It is worth to notice that in the cubic system studied, the
Poisson’s ratio ν[110][001] exceeds the maximum value 1/2 allowed for isotropic
materials. One should also stress that a pair of exceptional directions (see
Fig. 5(d)) exists in the system for which the Poisson’s ratio decreases with
increasing polydispersity. This occurs when the direction of the deformation
is [110] and the response of the system is measured in the direction [11̄0]. For
this pair of directions, the Poisson’s ratio reaches negative values both for small
and large n limits! The decrease for large n is, however, much more significant.
This new behavior of Poisson’s ratio is opposite to what was discovered in
the soft polydisperse spheres system [52], where the most negative values of
Poisson’s ratio were observed for small n only.
The observed dependence of ν[110][11̄0] , surprising in the context of results
obtained for various 2D isotropic systems including the DC phase of 2D
dimers [49], is of interest from the point of view of production of partial auxetics. As shown in Fig. 5(d), solid structure of dimers obtained by ‘gluing’
together pairs of polydisperse soft spheres arranged in the f.c.c. lattice will
show the Poisson’s ratio as low as ν[110][11̄0] = −0.8.
9
0.4
0.4
0.3
0.3
ν[111]
0.5
ν[100]
0.5
0.2
0.2
0.1
δ
δ
δ
δ
δ
δ
=
=
=
=
=
=
0
0.001
0.003
0.007
0.01
0.03
δ
δ
δ
δ
δ
δ
0.1
=
=
=
=
=
=
0
0.001
0.003
0.007
0.01
0.03
0
0
0.001
0.01
a)
1/n
2
δ
δ
δ
δ
δ
δ
1.5
0.001
0.1
=
=
=
=
=
=
0.01
0.1
b)
1/n
0
0.001
0.003
0.007
0.01
0.03
0.4
0.2
ν[110][11̄0]
ν[110][001]
0
1
0.5
−0.2
−0.4
δ
δ
δ
δ
δ
δ
−0.6
−0.8
0
−1
0.001
0.01
1/n
0.1
c)
0.001
0.01
1/n
=
=
=
=
=
=
0
0.001
0.003
0.007
0.01
0.03
0.1
d)
Fig. 5. Poisson’s ratio plotted against the softness parameter (1/n). Plots
(a), (b) show the Poisson’s ratio measured perpendicularly to the direction of the
high-symmetry axis (a) [100] and (b) [111]. Plots (c), (d) show Poisson’s ratio perpendicularly to the direction [110] in the direction (c) [001] and (d) [11̄0], respectively.
6
Conclusions
The elastic properties of polydisperse soft dimer system in three dimensions
were studied by computer simulations in the static (zero temperature) case.
Disorder was introduced to the DC f.c.c. structure in the form of atomic size
dispersion with polydispersity parameter δ. The influence of polydispersity on
elastic properties of 3D DC dimers system was determined. It was found that
increasing polydispersity and hardness of the interaction potential causes a
significant increase of elastic constants and pressure.
The simulations have shown that Poisson’s ratio of the dimer system measured
in [100] and [111] directions increases to its maximum positive value, 1/2, in
the presence of any nonzero polydispersity and sufficiently hard interaction
10
potential. An increase of Poisson’s ratio was observed also in other directions.
Such a behavior was earlier observed in the case of 2D [47–50] and 3D [52]
systems and seems to be a typical result.
It is worth to stress, however, that for the longitudinal direction [110] and
transverse direction [11̄0] the Poisson’s ratio decreases reaching negative values
along with increasing polydispersity value both for large and small n. This
unusual phenomenon is of interest from the point of view of manufacturing
stable auxetics of cubic symmetry.
The questions whether the effect of auxeticity enhancement by polydispersity
is characteristic for the f.c.c. lattice only or if it can be observed for elastic
symmetries other than the f.c.c. one, e.g. for packing of spheres in the h.c.p.
lattice or stacking fault lattices, will be a subject of a separate paper. Studies
of elastic properties of other molecular shapes are in progres.
Acknowledgements
This work was partially supported by the grants NN202 070 32/1512 and
NN202 261438 MNiSzW. We are grateful to Dr. Mikolaj Kowalik for preparing
the samples of the DC phase of the dimers, used in the simulations. Most of the
simulations were carried out at the Poznań Supercomputing and Networking
Center (PCSS).
References
[1] R. S. Lakes. Foam structures with a negative Poisson’s ratio. Science,
235:1038–1040, 1987.
[2] K. E. Evans. Auxetic polymers: a new range of materials. Endeavour,
15:170–174, 1991.
[3] R. S. Lakes. Advances in negative Poisson’s ratio materials. Advanced
Materials, 5:293–296, 1993.
[4] R. H. Baughman, J. M. Shacklette, A. A. Zakhidov, and S. Stafstrom.
Negative Poisson’s ratios as a common feature of cubic metals. Nature,
392:362–365, 1998.
[5] K. E. Evans and K. L. Alderson. Auxetic materials: the positive side of
being negative. Engineering Science and Education Journal, 9:148–154,
2000.
[6] R. H. Baughman. Avoiding the shrink. Nature, 425:667, 2003.
[7] C. Remillat, F. Scarpa, and K. W. Wojciechowski. Preface. Physica
Status Solidi (b), 246:2007–2009, 2009. See also references therein and
other papers in that issue.
11
[8] R. S. Lakes, web page:. http://silver.neep.wisc.edu/∼lakes/Poisson.html.
[9] G. Milton. Composite materials with Poisson’s ratios close to -1. J. Mech.
Phys. Solids, 40:1105–1137, 1992.
[10] K. W. Wojciechowski. Poisson’s ratio of anisotropic systems. Comp.
Meth. Sci. Technol., 11:73–79, 2005.
[11] T. C. T. Ting and D. M. Barnett. Negative Poisson’s ratios in anisotropic
linear elastic media. Journal of Applied Mechanics - Transactions of the
ASME, 72:929–931, 2005.
[12] A. C. Branka, D. M. Heyes, and K. W. Wojciechowski. Auxeticity of
cubic materials. Physica Status Solidi (b), 246:2063–2071, 2009.
[13] R. F. Almgren. An isotropic three-dimensional structure with Poisson’s
ratio =-1. Journal of Elasticity, 15:427–430, 1985.
[14] K. W. Wojciechowski. Constant thermodynamic tension Monte Carlo
studies of elastic properties of a two-dimensional system of hard cyclic
hexamers. Molecular Physics, 61:1247–1258, 1987.
[15] R. J. Bathurst and L. Rothenburg. Note on a random isotropic granular
material with negative Poisson’s ratio. International Journal of Engineering Science, 26:373–383, 1988.
[16] K. W. Wojciechowski. Two-dimensional isotropic model with a negative
Poisson ratio. Physics Letters A, 137:60–64, 1989.
[17] K. W. Wojciechowski and A. C. Brańka. Negative Poisson ratio in a
two-dimensional isotropic solid. Phys. Rev. A, 40:7222–7225, 1989.
[18] K. E. Evans, M. A. Nkansah, I. J. Hutchinson, and S. C. Rogers. Molecular network design. Nature, 353:124, 1991.
[19] L. Rothenburg, A. A. Berlin, and R. J. Bathurst. Microstructure of
isotropic materials with negative Poisson’s ratio. Nature, 354:470–472,
1991.
[20] G. Wei. J. Chem. Phys., 96:3226, 1992.
[21] D. H. Boal, U. Seifert, and J. C. Shillcock. Negative Poisson ratio in
two-dimensional networks under tension. Phys. Rev. E, 48:4274–4283,
1993.
[22] K. W. Wojciechowski. Negative Poisson ratios at negative pressures.
Molecular Physics Reports, 10:129–136, 1995.
[23] D. Prall and R. S. Lakes. Properties of a chiral honeycomb with a Poisson’s ratio of -1. Int. J. Mech. Sci., 39:305, 1997.
[24] G. Y. Wei and S. F. Edwards. Phys. Rev. E, 58:6173, 1998.
[25] R. H. Baughman, S. O. Dantas, S. Stafstrom, A. A. Zakhidov, T. B.
Mitchell, and D. H. E. Dubin. Negative Poisson’s ratios for extreme
states of matter. Science, 288:2018–2022, 2000.
[26] J. N. Grima and K. E. Evans. Auxetic behavior from rotating squares.
J. Mater. Sci. Lett., 19:1563–1565, 2000.
[27] Y. Ishibashi and M. Iwata. A microscopic model of a negative Poisson’s
ratio in some crystals. J. Phys. Soc. Japan, 69:2702–2703, 2000.
[28] H. Kimizuka, H. Kaburaki, and Y. Kogure. Mechanism for negative
Poisson ratios over the a-b transition of cristobalite, sio2: A molecular12
[29]
[30]
[31]
[32]
[33]
[34]
[35]
[36]
[37]
[38]
[39]
[40]
[41]
[42]
[43]
[44]
[45]
dynamics study. Phys. Rev. Lett., 84:5548–5551, 2000.
C. W. Smith, J. N. Grima, and K. E. Evans. A novel mechanism for generating auxetic behaviour in reticulated foams: Missing rib foam model.
Acta Materialia, 48:4349–4356, 2000.
M. Bowick, A. Cacciuto, G. Thorleifsson, and Travesset. Universal negative Poisson ratio of self-avoiding fixed-connectivity membranes. Phys.
Rev. Lett., 87:148103, 2001.
A. A. Vasiliev, S. V. Dmitriev, Y. Ishibashi, and T. Shigenari. Elastic
properties of a two-dimensional model of crystals containing particles
with rotational degrees of freedom. Phys. Rev. E, 65:094101, 2002.
K. W. Wojciechowski. Non-chiral, molecular model of negative Poisson’s
ratio in two dimensions. Journal of Physics A: Math Gen., 36:11765–
11778, 2003.
X. Xing and L. Radzihovsky. Universal elasticity and fluctuations of
nematic gels. Phys. Rev. Lett., 90:168301, 2003.
K. W. Wojciechowski, K. V. Tretiakov, and M. Kowalik. Elastic properties of dense solid phases of hard cyclic pentamers and heptamers in two
dimensions. Physical Review E, 67:036121, 2003.
P. V. Pikhitsa. Regular network of contacting cylinders with implications
for materials with negative Poisson ratios. Phys. Rev. Lett., 93:155595,
2004.
J. N. Grima, V. Zammit, R. Gatt, A. Alderson, and K. E. Evans. Auxetic behaviour from rotating semi-rigid units. Physica Status Solidi (b),
244:866–882, 2007.
D. Attard and J. N. Grima. Auxetic behaviour from rotating rhombi.
Physica Status Solidi (b), 245:2395–2404, 2008.
J. N. Grima, R. Gatt, and P. S. Farrugia. On the properties of auxetic
meta-tetrachiral structures. Physica Status Solidi (b), 245:511–520, 2008.
L. J. Hall, V. R. Coluci, D. S. Galvao, M. E. Koslov, M. Zhang, S. O.
Dantas, and R. H. Baughman. Sign change of Poisson’s ratio for carbon
nanotube sheets. Science, 320:504–507, 2008.
M. C. Rechtsman, F. H. Stillinger, and S. Torquato. Negative Poisson’s
ratio materials via isotropic interactions. Phys. Rev. Lett., 101:085501,
2008.
R. Lakes and K. W. Wojciechowski. Negative compressibility, negative
Poisson’s ratio, and stability. Physica Status Solidi b, 245:545–551, 2008.
D. Attard, E. Manicaro, and J. N. Grima. On rotating rigid parallelograms and their potential for exhibiting auxetic behaviour. Physica Status
Solidi (b), 246:2033–2044, 2009.
D. Attard, E. Manicaro, R. Gatt, and J. N. Grima. On the properties of
auxetic rotating stretching squares. Physica Status Solidi (b), 246:2045–
2054, 2009.
P. V. Pikhitsa, M. Choi, H. J. Kim, and S. H. Ahn. Auxetic lattice of
multipods. Physica Status Solidi (b), 246:2098–2101, 2009.
K. W. Wojciechowski and K. V. Tretiakov. Computer simulation of elastic
13
[46]
[47]
[48]
[49]
[50]
[51]
[52]
[53]
[54]
[55]
[56]
[57]
[58]
[59]
properties of solids under pressure. Computer Physics Communications,
121–122:528–530, 1999.
K. V. Tretiakov and K. W. Wojciechowski. Monte Carlo simulations of
two-dimensional hard body systems with extreme values of the Poisson’s
ratio. Physica Status Solidi (b), 242:730–741, 2005.
J. W. Narojczyk and K. W. Wojciechowski. Elastic properties of twodimensional soft polydisperse trimers at zero temperature. Physica Status
Solidi (b), 244:943–954, 2007.
J. W. Narojczyk and K. W. Wojciechowski. Elastic properties of twodimensional soft discs of various diameters at zero temperature. Journal
of Non-Crystalline Solids, 352:4292–4298, 2006.
J. W. Narojczyk and K. W. Wojciechowski. Elasticity of periodic and
aperiodic structures of polydisperse dimers in two dimensions at zero
temperature. Physica Status Solidi (b), 245:2463–2468, 2008.
J. W. Narojczyk, A. Alderson, A.R. Imre, F. Scarpa, and K. W. Wojciechowski. Negative Poisson’s ratio behavior in the planar model of
asymmetric trimers at zero temperature. Journal of Non-Crystalline
Solids, 354:4242–4248, 2008.
M. Kowalik and K. W. Wojciechowski. Poisson’s ratio of degenerate crystalline phases of three-dimensional hard dimers and hard cyclic trimers.
Physica Status Solidi (b), 242:626–631, 2005.
J. W. Narojczyk and K. W. Wojciechowski. Elastic properties of the fcc
crystals of soft spheres with size dispersion at zero temperature. Physica
Status Solidi (b), 245:606–613, 2008.
W. G. Hoover, D. A. Young, and R. Groover. Statistical mechanics of
phase diagrams. I. Inverse power potentials and the close-packed to bodycentered cubic transition. J. Chem. Phys., 56:2207–2210, 1971.
K. W. Wojciechowski, D. Frenkel, and A. C. Brańka. Nonperiodic solid
phase in a two-dimensional hard-dimer system. Phys. Rev. Let, 67:3168–
3171, 1991.
M. Kowalik. Computer simulations of the Poisson’s ratio for selected hard
core models. 2005. PhD Thesis (in Polish); see also references therein.
J. P. Hoogenboom, A. K. van Langen-Suurling, J. Romijn, and A. van
Blaaderen. Epitaxial growth of a colloidal hard-sphere hcp crystal and
the effects of epitaxial mismatch on crystal structure. Physical Review E,
69:051602, 2004.
V. N. Manoharan and D. J. Pine. Building materials by packing shperes.
MRS Bulletin, 29:91–95, 2004.
D. M. Heyes and A. C. Branka. Physical properties of soft repulsive
particle fluids. Physical Chemistry and Chemical Physics, 9:5570–5575,
2007.
A. M. Kalsin, M. Fialkowski, M. Paszewski, S. K. Smoukov, K. J. M.
Bishop, and B. A. Grzybowski. Electrostatic self-assembly of binary
nanoparticle crystals with a diamond-like lattice. Science, 312:420–424,
2006.
14
[60] A. M. Kalsin and B. A. Grzybowski. Controlling the growth of ionic
nanoparticle supracrystals. Nano Letters, 7:1018–1021, 2007.
[61] A. O. Pinchuk, A. M. Kalsin, B. Kowalczyk, G. C. Schatz, and B. A. Grzybowski. Modeling of electrodynamic interactions between metal nanoparticles aggregated by electrostatic interactions into closely-packed clusters.
Journal of Physical Chemistry C, 111:11816–11822, 2007.
[62] L. D. Landau and E. M. Lifshitz. Theory of Elasticity. Pergamon Press,
London, 1986.
[63] D. C. Wallace. Thermodynamics of Crystals. Wiley, New York, 1972.
[64] K. V. Tretiakov and K. W. Wojciechowski. Poisson’s ratio of the fcc hard
sphere crystal at high densities. J. Chem. Phys, 123:74509, 2005.
[65] M. Kowalik and K. W. Wojciechowski. Poisson’s ratio of orientationally
disordered hard dumbbell crystal in three dimensions. Journal of NonCrystalline Solids, 352:4269–4278, 2006.
[66] M. Parrinello and A. Rahman. Polymorphic transitions in single crystals:
A new molecular dynamics method. J. Appl. Phys., 52:7182–7190, 1981.
[67] M. Parrinello and A. Rahman. Strain fluctuations and elastic constants.
Journal of Chemical Physics., 76:2662–2666, 1982.
15
| 5cs.CE
|
1
Variation Evolving for Optimal Control
Computation, A Compact Way
Sheng ZHANG and Kai-Feng HE
(2017.08)
Abstract: A compact version of the Variation Evolving Method (VEM) is developed for the optimal control computation. It follows the
idea that originates from the continuous-time dynamics stability theory in the control field. The optimal solution is analogized to the
equilibrium point of a dynamic system and is anticipated to be obtained in an asymptotically evolving way. With the introduction of a
virtual dimension——the variation time, the Evolution Partial Differential Equation (EPDE), which describes the variation motion
towards the optimal solution, is deduced from the Optimal Control Problem (OCP), and the equivalent optimality conditions with no
employment of costates are established. In particular, it is found that theoretically the analytic feedback optimal control law does not
exist for general OCPs because the optimal control is related to the future state. Since the derived EPDE is suitable to be solved with the
semi-discrete method in the field of PDE numerical calculation, the resulting Initial-value Problems (IVPs) may be solved with mature
Ordinary Differential Equation (ODE) numerical integration methods.
Key words: Optimal control, dynamics stability, variation evolution, initial-value problem, costate-free optimality condition.
I. INTRODUCTION
Optimal control theory aims to determine the inputs to a dynamic system that optimize a specified performance index while
satisfying constraints on the motion of the system. It is closely related to engineering and has been widely studied [1]. Because of
the complexity, Optimal Control Problems (OCPs) are usually solved with numerical methods. Various numerical methods are
developed and generally they are divided into two classes, namely, the direct methods and the indirect methods [2]. The direct
methods discretize the control or/and state variables to obtain the Nonlinear Programming (NLP) problem, for example, the
widely-used direct shooting method [2] and the classic collocation method [3]. These methods are easy to apply, whereas the
results obtained are usually suboptimal [4], and the optimal may be infinitely approached. The indirect methods transform the OCP
to a Boundary-value Problem (BVP) through the optimality conditions. Typical methods of this type include the well-known
indirect shooting method [2] and the novel symplectic method [5]. Although be more precise, the indirect methods often suffer
from the significant numerical difficulty due to the ill-conditioning of the Hamiltonian dynamics, that is, the stability of costates
dynamics is adverse to that of the states dynamics [6]. The recent development, representatively the Pseudo-spectral (PS) method
[7], blends the two types of methods, as it unifies the NLP and the BVP in a dualization view [8]. Such methods inherit the
advantages of both types and blur their difference.
Theories in the control field often enlighten strategies for the optimal control computation, for example, the non-linear variable
transformation to reduce the variables [9]. Recently, a new Variation Evolving Method (VEM), which is enlightened by the states
The authors are with the Computational Aerodynamics Institution, China Aerodynamics Research and Development Center, Mianyang, 621000, China. (e-mail:
[email protected]).
2
evolution within the stable continuous-time dynamic system, is proposed for the optimal control computation [10]. The VEM also
synthesizes the direct and indirect methods, but from a new standpoint. The Partial Differential Equation (PDE), which describes
the evolution of variables towards the extremal solution, is derived from the viewpoint of variation motion in typical OCPs. Using
the well-known semi-discrete method in the field of PDE numerical calculation [11], the PDEs are transformed to the
finite-dimensional Initial-value Problems (IVPs) to be solved, with the mature Ordinary Differential Equation (ODE) integration
methods. Because the extremum is guaranteed be the equilibrium point of the deduced dynamic system, the optimal solution will
be gradually approached. However, in the work of Ref. [10], besides the states and the controls, the costates are also introduced,
which increases the complexity of the computation. In this paper, a compact version of the VEM that uses only the original
variables is developed. The corresponding variation dynamic evolution equations, which may be re-presented in the PDE
formulation, are derived.
Throughout the paper, our work is built upon the assumption that the solution for the optimization problem exists. We do not
describe the existing conditions for the purpose of brevity. Relevant researches such as the Filippov-Cesari theorem are
documented in [12]. In the following, first preliminaries that state the inspiration of the VEM are presented. Then the foundational
VEM bred under this idea is demonstrated for the unconstrained calculus-of-variations problem. Next the compact VEM to solve
the OCPs is established. During this course, the costate-free optimality conditions are derived, and it is proved equivalent to the
traditional conditions. Later illustrative examples are solved to verify the effectiveness of the method. Besides, comparison
between the evolution equation and that in Ref. [10] is presented at the end.
II. PRELIMINARIES
The VEM is a newly developed method for the optimal solutions. For a better understanding, its motivations are recalled. For a
continuous-time autonomous dynamic system like
x = f ( x )
where x ∈ \ n is the state, x =
(1)
dx
is its time derivative, and f : \ n → \ n is a vector function. Suppose that x̂ is a
dt
asymptotically stable equilibrium point of system (1) that satisfies f ( xˆ ) = 0 , then from any initial condition x (t ) t = 0 = x0 within
the stability domain D that contains x̂ , the state x will tend to x̂ over time t [13]. According to the Lyapunov theory, there is a
continuously differentiable function V : D → \ such that
i) V ( xˆ ) = 0 and V ( x ) > 0 in D / { xˆ } .
ii) V ( x ) ≤ 0
For example, maybe f ( x ) satisfies ( x − xˆ )T f ( x ) ≤ 0 , and then a feasible Lyapunov function can be constructed as
V=
1
( x − xˆ )T ( x − xˆ )
2
(2)
where the superscript “ T ” denotes the transpose operator. The dynamics given by f ( x ) determines that V ≤ 0 and x will
converge to the equilibrium x̂ . Fig. 1 sketches the trajectory of some state in the stable dynamic system and the corresponding
Lyapunov function value. No matter what the initial condition x0 is, as long as it falls into the stability domain D , the state x
will approaches the equilibrium x̂ gradually.
3
Fig. 1. The sketch for the state trajectory and the Lyapunov function value profile.
In the system dynamics theory, from the stable dynamics of state x , we may construct a monotonously decreasing function
V ( x ) , which will achieve its minimum when x reaches x̂ . Inspired by it, now we consider its inverse problem, that is, from a
performance index function to derive the dynamics that minimize this performance index. Consider the parameter optimization
problem with performance index
J = h(θ )
(3)
where θ is the optimization parameter vector and h : \ n → \ is a scalar function. To find the optimal value θ̂ that minimizes J ,
we make the analogy to the Lyapunov function and differentiate J , i.e., function h here, with respect to a virtual time τ , which is
used to describe the derived dynamics.
dJ dh
∂h dθ
=
= ( )T
dτ dτ
∂θ dτ
To guarantee that J decreases with respect to τ , i.e.,
(4)
δJ
≤ 0 , we may set
δτ
dθ
∂h
= −Kh
dτ
∂θ
(5)
where K h is a positive-definite matrix. Under this dynamics, h will decrease until it reaches a extremum, and θ will approaches
θ̂ , the equilibrium point of system (5), which satisfies
∂h
∂θ
= 0 . This equilibrium condition is exactly the first-order optimality
θ =θˆ
condition for the optimization problem (3).
A bolder idea further arises hereafter. If the optimization parameter θ can approach its optimal under the dynamics given by Eq.
(5), we can imagine a variable x (t ) might also evolve to the optimal solution to minimize some performance index within certain
dynamics. Fig. 2 illustrates the idea of the VEM in solving the OCP, and we formally introduce the virtual variation time τ , a new
dimension orthogonal to the normal time t , to describe the variation evolution process. Through the variation motion, the initial
guess of variable will evolve to the optimal solution. We will detail the implementation of the idea in the following.
4
Fig. 2. The illustration of the variable evolution along the variation time
τ
in the VEM.
III. THE FOUNDATIONAL VARIATION EVOLVING METHOD
Calculus-of-variations problems may be regarded as OCPs with integrator dynamics. To start with, the foundational VEM,
which was first demonstrated in Ref. [10], is again presented for the unconstrained calculus-of-variations problem defined as
Problem 1: For the following functional depending on variable vector y (t ) ∈ \ n
J = ∫ F ( y (t ), y (t ), t ) dt
tf
(6)
t0
where t ∈ \ is the time. The elements of y belong to C 2 [t0 , t f ] , which denotes the set of variables with continuous second-order
derivatives (indicated by the superscript). The function F : \ n × \ n × \ → \ and its first-order and second-order partial
dy
derivatives are continuous with respect to y , its time derivative y =
and t . t0 and t f are the fixed initial and terminal time,
dt
and the boundary conditions are prescribed as y (t0 ) = y0 and y(t f ) = y f . Find the extremal solution ŷ that minimizes J , i.e.
yˆ = arg min( J )
(7)
Follow the idea of dynamics evolution to reduce some performance index, we anticipate that any initial guess of y (t ) , whose
elements belong to C 2 [t0 , t f ] , will evolve to the minimum along the variation dimension. Like the decrease of a Lyapunov
function, if J in Eq. (6) decreases with respect to the variation time τ , i.e.,
δJ
≤ 0 , we may finally obtain the optimal solution.
δτ
Differentiating (6) with respect to τ (even τ does not explicitly exist) produces
t
δJ
=
δτ ∫t
0
f
δ y ⎞
⎛ Tδy
dt
+ Fy T
⎜ Fy
δτ
δτ ⎟⎠
⎝
t
δy
δy
= Fy
− Fy T
+
δτ t
δτ t ∫t
T
0
f
where the column vectors Fy =
0
f
T
⎛⎡
d
⎤ δy⎞
⎜ ⎢ Fy − ( Fy ) ⎥
⎟ dt
⎜⎣
dt
⎦ δτ ⎟⎠
⎝
(8)
∂F
∂F
and Fy =
are the shorthand notations of partial derivatives. From an initial guess y (t )
∂y
∂y
that satisfies the boundary conditions at t0 and t f , then by enforcing
δJ
≤ 0 , we may set that
δτ
δy
d
⎛
⎞
= − K ⎜ Fy − ( Fy ) ⎟ ,t ∈ (t0 , t f )
δτ
dt
⎝
⎠
(9)
5
where K is a n × n dimensional positive-definite matrix. The variation dynamic evolution equation (9) describes the variation
motion of y (t ) starting from y (t ) , and it is proved that the motion is directed to the extremum [10]. It drives the performance
index J to decrease until
δJ
δJ
= 0, this determines the optimal conditions, namely, the Euler-Lagrange
= 0 , and when
δτ
δτ
equation [14][15]
Fy −
d
( Fy ) = 0
dt
(10)
The variation dynamic evolution equation (9) may be considered from the view of PDE formulation, by replacing the variation
operation “ δ ” and the differential operator “ d ” with the partial differential operator “ ∂ ” as
∂y
∂
⎛
⎞
= − K ⎜ Fy − ( Fy ) ⎟
∂τ
∂t
⎝
⎠
(11)
For this PDE, its right function only depends on the time t . Thus it is suitable to be solved with the semi-discrete method in the
field of PDE numerical calculation. With the discretization along the normal time dimension, Eq. (11) is transformed to be IVPs
with finite states. Note that the resulting IVP is defined with respect to the variation time τ , not the normal time t . In the previous
work [10], a demonstrative example is solved to verify the result.
IV. THE COMPACT VARIATION EVOLVING METHOD
A. Problem definition
In this paper, we consider the following class of OCP that is defined as
Problem 2:Consider performance index of Bolza form
J = ϕ ( x (t f ), t f ) + ∫ L ( x (t ), u(t ), t ) dt
tf
t0
(12)
subject to the dynamic equation
x = f ( x,u, t )
(13)
where t ∈ \ is the time. x ∈ \ n is the state vector and its elements belong to C 2 [t0 , t f ] . u ∈ \ m is the control vector and its
elements belong to C1[t0 , t f ] . The function L : \ n × \ m × \ → \ and its first-order partial derivatives are continuous with
respect to x , u and t . The function ϕ : \ m × \ → \ and its first-order and second-order partial derivatives are continuous with
respect to x and t . The vector function f : \ n × \ m × \ → \ n and its first-order partial derivatives are continuous and Lipschitz
in x , u and t . The initial time t0 is fixed and the terminal time t f is free. The initial boundary conditions are prescribed as
x (t0 ) = x0
(14)
and the terminal states are free. Find the optimal solution ( xˆ , uˆ ) that minimizes J , i.e.
( xˆ , uˆ ) = arg min( J )
(15)
B. Derivation of variation dynamic evolution equations
In Ref. [10], the problem is addressed by constructing an equivalent unconstrained functional problem that has the same
extremum. This operation is practical but it introduces the costate vector, which has the same dimension as the state vector. To
avoid the resulting complexity, here we will address Problem 2 directly. Consider the problem within the feasible solution domain
6
D o , in which any solution satisfies Eqs. (13) and (14). First we transform the Bolza performance index to the equivalent Lagrange
type, i.e.
J =∫
tf
t0
(ϕ + ϕ
t
x
T
)
f ( x,u, t ) + L( x , u, t ) dt
(16)
where ϕt and ϕ x are the partial derivatives notated as before. Similarly we differentiate Eq. (16) with respect to the variation time
τ to obtain
δtf
t
δJ
= (ϕt + ϕ x T f + L)
+∫
t
t δτ
δτ
f
0
f
δu⎞
⎛
T
T
T
T δx
dt
+ (ϕ x T fu + Lu T )
⎜ (ϕtx + f ϕ xx + ϕ x f x + Lx )
δτ
δτ ⎟⎠
⎝
(17)
where ϕtx and ϕ xx are second-order partial derivatives in the form of (column) vector and matrix, and f x and f u are the Jacobi
matrixes. Different from the calculus-of-variations problems,
δx
δu
and
are related because the profiles of x are determined by
δτ
δτ
u . For the solutions in D o , they need to satisfies the following variation equation
δ x
δx
δu
= fx
+ fu
δτ
δτ
δτ
with the initial condition
(18)
δx
= 0 . Note that f x and f u are time-dependent matrixes linearized at the feasible solution x (t ) and
δτ t
0
u(t ) . Eq. (18) is linear with respect to the variables
δx
δu
and
, and has a zero initial value. Thus it satisfies the superposition
δτ
δτ
principle, and its solution may be explicitly expressed.
Lemma 1 [16]: For the linear system
x = A(t ) x + B (t )u
(19)
with the initial value x (t0 ) = 0 , where x ∈ \ n is the state vector, u ∈ \ m is the control vector, A(t ) and B (t ) are the right
dimensional coefficient matrixes, the solution of system (19) is
t
x (t ) = ∫ H (t , s ) u( s ) d s
t0
(20)
where is the n × m dimensional H (t , s) is the impulse response function that satisfies
⎧Φ (t , s) B ( s )
H (t , s) = ⎨
⎩0
t≥s
s <t
(21)
and Φ (t , s) is the n × n dimensional state transition matrix for the system from time point s to time point t .
According to Lemma 1, it may be derived that Eq. (18) has the solution
t
δx
δu
= ∫ H o (t , s )
(s) d s
t
δτ
δτ
(22)
0
where H o (t , s) is the impulse response function corresponding to the specific f x (t ) and f u (t ) . Substitute Eq. (22) into Eq. (17),
there is
7
δtf
t ⎧
δJ
δu
δ u⎫
⎛ t
⎞
( s ) d s ⎟ + (φ x T f u + Lu T ) ⎬ dt
= (ϕt + ϕ x T f + L)
+ ∫ ⎨ ϕtx T + f Tϕ xx + ϕ x T f x + Lx T ⎜ ∫ H o (t , s )
t
t
t
δτ
δτ
δτ
δτ ⎭
⎝
⎠
⎩
δtf
t
t ⎧
t ⎛
δu ⎫
δu⎞
( s ) ⎬ d s d t + ∫ ⎜ (ϕ x T f u + Lu T )
dt
= (ϕt + ϕ x T f + L)
+ ∫ ∫ ⎨ ϕtx T + f Tϕ xx + ϕ x T f x + Lx T H o (t , s )
t
t ⎩
t
t δτ
δτ
δτ ⎠⎟
⎭
⎝
f
0
f
(
)
(
f
0
f
0
0
)
(23)
f
0
By exchanging the order in the double integral, we may derive the following transformation as
δu ⎫
(s)⎬ d s d t
δτ
⎭
δu
T
T
T
T
( s) d s
ϕtx (t ) + f (t )ϕ xx (t ) + ϕ x (t ) f x (t ) + Lx (t ) H o (t , s) d t
δτ
∫t ∫t ⎨⎩(ϕtx
=∫
tf
t
0
0
tf
t0
⎧
(∫
tf
s
(
T
)
(t ) + f T (t )ϕ xx (t ) + ϕ x T (t ) f x (t ) + Lx T (t ) H o (t , s)
(24)
)
)
To make the result clear, the change of variable symbol t → σ and s → t , without changing the final result of Eq. (24), produce
tf
tf
δu
T
T
T
T
∫t0 ∫s ϕtx (t ) + f (t )ϕ xx (t ) + ϕ x (t ) f x (t ) + Lx (t ) H o (t , s) d t δτ (s) d s
(25)
tf
tf
δu
= ∫ ∫ ϕtx T (σ ) + f T (σ )ϕ xx (σ ) + ϕ x T (σ ) f x (σ ) + Lx T (σ ) H o (σ , t ) d σ
(t ) d t
(
(
t0
(
)
)
(
t
) δτ
)
Thus, Eq. (23) may be reformulated as
δtf
δJ
= (ϕt + ϕ x T f + L)
δτ
+∫
tf
t0
Now to achieve
{( ∫
tf
tf
t
(ϕ
tx
T
δτ
)
)
(σ ) + f (σ )ϕ xx (σ ) + ϕ x (σ ) f x (σ ) + Lx (σ ) H o (σ , t ) d σ + (ϕ x
T
T
T
T
δJ
≤ 0 , we may derive the variation dynamic evolution equation for the control u as
δτ
t
δu
= − K Lu + f u Tϕ x + ∫ H o T (σ , t ) Lx (σ ) + ϕtx (σ ) + ϕ xx T (σ ) f (σ ) + f x (σ )T ϕ x (σ ) d σ
t
δτ
{
(
(
f
}
δu
(t ) d t
fu + Lu )
δτ
T
)
)}
(26)
(27)
and for the terminal time as
δtf
δτ
(
= − kt f L + ϕt + ϕ x T f
)
(28)
tf
where K is the m × m dimensional positive-definite matrix and kt f is a positive constant. Presume that we already have a feasible
initial solution x (t ) and u (t ) , then Eqs. (22), (27) and (28) drive it to the one that satisfies
Lu + fu Tϕ x +
(∫
tf
t
(
)
)
H o T (σ , t ) Lx (σ ) + ϕtx (σ ) + ϕ xx T (σ ) f (σ ) + f x (σ )T ϕ x (σ ) d σ = 0
L(t f ) + φt (t f ) + ϕ x T (t f ) f (t f ) = 0
(29)
(30)
C. Equivalence to the classic optimality conditions
Actually, Eqs. (29) and (30) are the first-order optimality conditions for Problem 2 without the employment of costates. We will
show that they are equivalent to the traditional ones with costates [17]
λ + H x = λ + Lx + f x T λ = 0
H u = Lu + f u T λ = 0
(31)
(32)
and transversality conditions
λ(t f ) = ϕ x (t f )
(33)
H (t f ) + ϕt f = 0
(34)
8
where H = L + λT f is the Hamiltonian and λ is the costate vector.
Theorem 1: For Problem 2, the optimal conditions given by Eqs. (29) and (30) are equivalent to the optimality conditions given by
(31)-(34).
Proof: With Eq. (21), Eq. (29) may be reformulated as
Lu + fu Tϕ x + f u T
(∫
tf
t
(
)
)
Φo T (σ , t ) Lx (σ ) + ϕtx (σ ) + ϕ xx T (σ ) f (σ ) + f x (σ )T ϕ x (σ ) d σ = 0
where Φo (σ , t ) is the state transition matrix related with H o (σ , t ) . Define a quantity γ (t ) as
(
tf
(35)
)
γ (t ) = ϕ x (t ) + ∫ Φo T (σ , t ) Lx (σ ) + ϕtx (σ ) + ϕ xx T (σ ) f (σ ) + f x (σ )T ϕ x (σ ) d σ
t
(36)
Then Eq. (35) is simplified as
Lu + fu T γ = 0
(37)
γ (t f ) = φ x (t f )
(38)
Obviously, from Eq. (36), when t = t f , there is
Differentiate γ (t ) with respect to t . In the process, we will use the Leibniz rule [18]
d
dt
(∫
a (t )
b (t )
)
h(σ , t ) d σ = h ( a(t ), t )
a (t )
d
d
a(t ) − h ( b(t ), t ) b(t ) + ∫ ht (σ , t ) d σ
(t )
b
dt
dt
(39)
and the property of Φo (σ , t ) [16]
∂Φo (σ , t )
= −Φo (σ , t ) f x (t )
∂t
(40)
Φo (t , t ) = 1
(41)
where 1 is the n × n dimensional identity matrix. Then we have
(
)
(
)
tf
d
γ (t ) = ϕtx + ϕ xx T f − Lx + ϕtx + ϕ xx T f + f x Tϕ x − f x T ∫ Φo T (σ , t ) Lx (σ ) + ϕtx (σ ) + ϕ xx T (σ ) f (σ ) + f x (σ )T ϕ x (σ ) d σ
t
dt
(
tf
(
)
= − Lx − f x T ϕ x (t ) + ∫ Φo T (σ , t ) Lx (σ ) + ϕtx (σ ) + ϕ xx T (σ ) f (σ ) + f x (σ )T ϕ x (σ ) d σ
t
)
(42)
= − Lx − f x T γ (t )
From Eqs. (42) and (38), it is found that γ (t ) conforms to the same dynamics and boundary conditions as the costates λ(t ) . Thus,
we can conclude that γ (t ) = λ(t ) . Then Eq. (37) and Eq. (32) are identical. This means that Eq. (29) is equivalent to Eqs. (31), (32)
and (33).
On the other hand, with Eq. (33), it is readily to show that Eqs. (30) and (34) are same.
■
By investigating the optimality condition (29), it is found that the optimal control are related to the future state, and this means
the optimal feedback control law in the analytic form does not exists for general OCPs. However, optimal control aided with
numerical computation is still possible. After proving the equivalence of optimality conditions, now the variables evolving
direction using the VEM is easy to determine.
Theorem 2: Solving the IVP with respect to τ , defined by the variation dynamic evolution equations (22), (27) and (28), from a
feasible initial solution, when τ → +∞ , ( x, u) will satisfy the optimality conditions of Problem 2.
9
Proof: From a feasible initial solution, any evolution under the dynamics of Eq. (22) guarantees the feasibility of solution.
Substitute Eqs. (27) and (28) into Eq. (26), we have
τ → +∞ due to the asymptotical approach. When
δJ
δJ
≤ 0 . The functional J will decrease until
= 0 , which occurs when
δτ
δτ
δJ
=0, this determines the optimal conditions, namely, Eqs. (29) and (30).
δτ
■
Presume that we already have a feasible initial solution x (t ) and u (t ) that satisfy Eqs. (13) and (14), then theoretically the
infinite-dimensional variation dynamic evolution equations (22), (27) and (28) may be used to obtain the optimal solution that
minimizes Eq. (12). The corn during the computation is to solve H o (t , s ) which may be evaluated upon the current solution of
x (t ) and u(t ) .
D. Formulation of Evolution PDE
Similarly, we may use the partial differential operator “ ∂ ” and the differential operator “ d ” to reformulate the variation
dynamic equations to get the following Evolution PDE (EPDE) and Evolution Differential Equation (EDE) as
⎡
∂ ⎡ x⎤ ⎢
=⎢
∂τ ⎣⎢ u ⎦⎥ ⎢
− K Lu + f u Tϕ x +
⎢⎣
{
(∫
tf
t
∂u
(s) d s
∂τ
⎤
⎥
⎥
H o T (σ , t ) Lx (σ ) + ϕtx (σ ) + ϕ xx T (σ ) f (σ ) + f x (σ )T ϕ x (σ ) d σ ⎥
⎦⎥
t
∫t
H o (t , s )
0
(
dt f
dτ
)
(
= −kt f L + ϕt + ϕ x T f
)
)}
(43)
(44)
tf
Put into this perspective, the definite conditions are the initial guess of t f , i.e., t f
τ =0
= tf , and
⎡ x (t ,τ ) ⎤
⎡ x (t ) ⎤
=⎢
⎢ u(t ,τ ) ⎥
⎥
⎣
⎦ τ = 0 ⎣ u (t ) ⎦
(45)
where x (t ) and u (t ) are the initial feasible solution. Recall Fig. 2, Eqs. (43) and (44) realize the anticipated variable evolution
along the variation time τ . The initial conditions of x (t ,τ ) and u(t ,τ ) at τ = 0 belong to the feasible solution domain and their
value at τ = +∞ may be the optimal solution of the OCP. The right part of the EPDE (43) is also only a vector function of time t .
Thus we may apply the semi-discrete method to discretize it along the normal time dimension and further use ODE integration
methods to get the numerical solution.
This paper considers the OCPs defined with free terminal time, yet the results obtained are also applicable to the simpler case
with fixed terminal time. For those OCPs, the evolution equations regarding state variable x and control variable u are same,
while the equation regarding the terminal time t f is not necessary anymore.
V. ILLUSTRATIVE EXAMPLES
First a linear example taken from Xie [19] is considered.
Example 1: Consider the following dynamic system
x = Ax + bu
⎡x ⎤
⎡0 1 ⎤
⎡0⎤
where x = ⎢ 1 ⎥ , A = ⎢
, b = ⎢ ⎥ . Find the solution that minimizes the performance index
⎥
⎣0 0⎦
⎣1 ⎦
⎣ x2 ⎦
10
J=
(
)
1
1 tf
x (t f )T Fx (t f ) + ∫ x T Qx + Ru 2 dt
2
2 t0
⎡1⎤
with the initial boundary conditions x (t0 ) = ⎢ ⎥ , where the initial time t0 = 0 and the terminal time t f = 3 are fixed. The
⎣1⎦
⎡1 0 ⎤
⎡2 1⎤
1
weighted matrixes are F = ⎢
⎥ , Q = ⎢ 1 4 ⎥ and R = 2 .
0
2
⎣
⎦
⎣
⎦
In solving this example using the VEM, the EPDE derived is
t A ( t − s ) ∂u
⎡
⎤
∫t0 e b ∂τ (s) d s
⎥
∂ ⎡ x⎤ ⎢
⎥
=⎢
⎢
⎥
∂τ ⎣ u ⎦ ⎢
⎧
⎞ ⎫⎥
T
T ⎛ tf
T
A (σ −t ) T
−
+
+
+
+
+
K
Ru
e
u
σ
σ
σ
b
Fx
b
(
Q
FA
A
F
)
x
(
)
Fb
(
)
d
⎨
⎜
⎟⎬
⎢⎣
⎝ ∫t
⎠ ⎭⎥⎦
⎩
(
)(
)
with the one-dimensional matrix K = 2 × 10−2 . The definite conditions of the EPDE, i.e., the initial guess of the states x (t ) and the
control u (t ) , were obtained by numerical integration with control input u (t ) = 0 . Using the semi-discrete method, the time horizon
[t0 , t f ] was discretized uniformly, with 61 points. Thus, a dynamic system with 183 states was obtained and the OCP was
transformed to an IVP. The ODE integrator “ode45” in Matlab, with default relative error tolerance 1×10-3 and default absolute
error tolerance 1×10-6, was employed to solve the IVP. Even for this simple example, there is no analytic solution. For comparison,
we computed the optimal solution with GPOPS-II [20], a Radau PS method based OCP solver.
Figs. 3, 4 and 5 show the evolving process of x1 (t ) , x2 (t ) and u (t ) solutions to the optimal, respectively. At τ = 300s, the
numerical solutions are indistinguishable from the optimal, and this shows the effectiveness of the VEM. Fig. 6 plots the profile of
performance index value against the variation time. It declines rapidly at first and almost reaches the minimum when τ = 50s. Then
it keeps approaching the minimum monotonously.
4
3.5
The optimal solution
Numerical solutions with VEM
τ = 0s
3
x1(t)
2.5
τ = 0.4s
2
τ = 1.0s
1.5
τ = 20.7s
1
0.5
0
0
τ = 1.8s
τ = 300s
0.5
1
1.5
2
2.5
3
t
Fig. 3 The evolution of numerical solutions of x1 to the optimal solution.
11
The optimal solution
Numerical solutions with VEM
1.2
1
τ = 0s
x2(t)
0.8
τ = 0.4s
0.6
0.4
τ = 1.0s
0.2
τ = 1.8s
0
-0.2
τ = 20.7s
-0.4
τ = 300s
0
0.5
1
1.5
2
2.5
3
t
Fig. 4 The evolution of numerical solutions of
1
0
-1
x2
to the optimal solution.
τ = 0s
τ = 0.4s
τ = 1.8s
u (t)
τ = 20.7s
-2
-3
τ = 70.9s
-4
τ = 300s
The optimal solution
Numerical solutions with VEM
-5
-6
-0.5
0
0.5
1
1.5
2
2.5
3
t
Fig. 5 The evolution of numerical solutions of
u
to the optimal solution.
50
Minimum of J
Funcitonal value of numerical solution
40
40
20
J
J
30
20
0
0
10
0
0
50
100
150
τ (s)
200
2
4 6
τ (s)
250
300
Fig. 6 The approach to the minimum of performance index.
Now we consider a nonlinear example with free terminal time t f , the homing missile problem adapted from Hull [21].
Example 2: Consider the problem of a constant speed missile intercepting a constant speed target moving in a straight line. The
dynamic equations are
12
x = f ( x , u )
⎡ VT sin(θT ) − VM sin(θ M ) ⎤
⎡ x ⎤
⎢V cos(θ ) − V cos(θ ) ⎥
T
M
M ⎥
. x and y are the relative abscissa and ordinate, respectively. θ M is the
where x = ⎢⎢ y ⎥⎥ , and f = ⎢ T
⎢
⎥
u
⎢⎣θ M ⎥⎦
⎢
⎥
VM
⎣
⎦
azimuth of missile. θT =30 deg is the azimuth of the target. VM =1000 m/s is the constant speed of missile. VT =500 m/s is the
constant speed of the target. u is the missile normal acceleration. To intercept the target and penalize too large normal acceleration,
the performance index to be minimized is defined as
J=
⎡1× 10−2
⎢
where the weighted matrixes are F = ⎢ 0
⎢ 0
⎢⎣
1
1 tf
x (t f )T Fx (t f ) + ∫ Ru 2 dt
2
2 t0
0
2 × 10−2
0
0⎤
⎥
0 ⎥ and R = 5 × 10−4 . The initial boundary conditions are
0 ⎥⎥
⎦
⎡ x ⎤
⎡10000m ⎤
⎢ y ⎥
= ⎢⎢ 5000m ⎥⎥ and the terminal time t f is free.
⎢ ⎥
⎢⎣θ M ⎥⎦
⎢⎣ 0 deg ⎥⎦
t0 = 0
Before the computation, the states and the control variables were scaled to improve the numerical efficiency. In the specific form
of the EPDE (43) and the EDE (44), the parameters K and kt f were set to be 1.5 × 10−6 and 1× 10−4 , respectively. The definite
⎡ x (t ,τ ) ⎤
⎢
⎥
conditions, i.e., ⎢u (t ,τ ) ⎥
, were obtained by numerical integration at time horizon [0, 25]s with control input u (t ) = 0 . We also
⎢ t f (τ ) ⎥
⎣
⎦ τ =0
discretized the time horizon [t0 , t f ] uniformly, with 51 points. Thus, a large IVP with 205 states (including the terminal time) is
obtained. We still employed “ode45” in Matlab for the numerical integration. In the integrator setting, the default relative error
tolerance and the absolute error tolerance are 1×10-3 and 1×10-6, respectively. For comparison, the optimal solution is again
computed with GPOPS-II.
Fig. 7 gives the states curve in the x y relative coordinate plane, showing that the numerical results approach the optimal
solution over time. For the optimal solution, the missile will intercept the target with a fairly small position error. The control
solutions are plotted in Fig. 8, and the asymptotical approach of the numerical results are demonstrated. In Fig. 9, the terminal time
profile against the variation time τ is plotted. The result of t f oscillates sharply at first and then gradually approaches to the
optimal interception time, and it only changes slightly after τ = 40s. At τ = 300s, we compute that t f = 23.52s from the VEM,
same to the result from GPOPS-II.
13
12000
The optimal solution
Numerical solutions with VEM
10000
τ = 0s
y (m)
8000
τ = 0.6s
6000
4000
Initial relative coordintates
τ = 1.2s
τ = 300s
2000
τ = 2.1s
τ = 3.1s
0
-5000
Optimal terminal relative coordintates
0
5000
10000
x (m)
Fig. 7 The evolution of numerical solutions in the
xy
relative coordinate plane to the optimal solution.
70
The optimal solution
Numerical solutions with VEM
τ = 300s
60
50
u (t)
40
τ = 3.1s
τ = 2.1s
30
τ = 1.2s
20
10
τ = 0.6s
0
-10
0
τ = 0s
5
10
15
20
25
t
Fig. 8. The evolution of numerical solutions of
u
to the optimal solution.
25
Minimum decline time
Evolving profile of tf
24.8
24.6
25
tf (s)
24.2
f
t (s)
24.4
24
24.5
24
23.5
-2 0 2 4 6
23.8
τ (s)
23.6
23.4
0
50
100
150
τ (s)
200
250
300
Fig. 9 The evolution profile of t f to the optimal interception time.
14
VI. FURTHER COMMENTS
Through the substitution of operator, the variation dynamic evolution equations may be reformulated as PDE. Discussions
between the EPDE (43) from the compact VEM and the Augmented Evolution PDE (AEPDE) derived in [10], which was called
the ZS equation originally, is worthwhile. For convenience, the AEPDE is again presented here.
⎛
⎡⎛
∂λ ⎞ ⎤
⎡ ⎛ ∂x
⎞ ⎤⎞
⎜
⎢⎜ H x + ∂t ⎟ ⎥
⎢ ⎜ ∂t − f ⎟ ⎥ ⎟
⎠⎥
⎝
⎠ ⎥⎟
⎜
⎢⎝
∂y
∂ ⎢
= −2 K ⎜ H yy ⎢ ⎛
∂x ⎞ ⎥ − ⎢⎛ ∂λ
⎞⎥ ⎟
⎜
∂τ
⎢ ⎜ f − ⎟ ⎥ ∂t ⎢⎜ + H x ⎟ ⎥ ⎟
∂t ⎠ ⎥
⎠⎥ ⎟
⎜
⎢⎝
⎢⎝ ∂t
⎜
⎢⎣
⎥
⎢
⎥⎦ ⎟⎠
H
0
⎣
u
⎦
⎝
(46)
⎡ x⎤
where y = ⎢⎢ λ ⎥⎥ and H = L + λT f is the Hamiltonian.
⎢⎣ u ⎥⎦
Advantages of the EPDE over the AEPDE are listed as follows. i) The costates are not included and the evaluation on the
second-order derivatives of H is avoided, which will relieve the computation burden. ii) The solution of the EPDE is more
capable to reach a minimum, while the solution of AEPDE may halt at a saddle extremum. iii) Generally the EPDE requires the
integration, and the differentiation, as displayed in the AEPDE, may be avoided. This is advantageous to reduce the numerical error
in seeking solutions.
Regarding the disadvantages, i) currently the EPDE may only address OCPs with free terminal states. When the terminal states
are constrained, which is common in the OCP formulation, it is not directly applicable. One may penalize the terminal boundary
conditions in the performance index. However, this is not a satisfactory solution. ii) Moreover, it requires the initial solution to be
feasible, which is also inflexible.
About the computation, both the right parts of the PDEs are only the functions of time t . This makes them suitable to be solved
with the semi-discrete method in the field of PDE numerical calculation. Then they may be solved with the mature ODE integration
methods. During the numerical calculation, techniques such as the Legendre-Gauss (LG), Legendre-Gauss-Radau (LGR) and
Legendre-Gauss-Lobatto (LGL) discretization, which have stronger approximation capacity, may further improve the accuracy
and efficiency. The common deficiency that both equations face is the incapability to address the general state- and
control-constrained OCPs. These are interesting topics for future studies. Return to the principle, since complex numerical
computations are avoided, and the integration may be achieved with the simple analog circuit, the equations may provide a
promising way of optimal control in the engineering.
VII. CONCLUSION
A compact version of the Variation Evolving Method (VEM) for the optimal control computation is developed. It introduces no
extra variables in transforming the Optimal Control Problems (OCPs) to the Initial-value Problems (IVPs). The optimality
conditions that use no information of the costates are derived and they are proved to be equivalent to the traditional optimality
conditions. One important conclusion drawn by analyzing the optimality conditions is that generally the analytic optimal feedback
control law does not exists because the control is related to the future state. With the mature Ordinary Differential Equation (ODE)
integration methods, the solution of the resulting IVP may reach the minimum of the OCP. In particular, under the frame of IVPs
upon continuous-time dynamics, daunting task of searching reasonable step size and annoying oscillation phenomenon around the
extremum, as occurs in the discrete numerical method, are eliminated. However, currently the method can only solve the OCP with
free terminal states, and this restricts its application. Further studies will be carried out to address this issue.
15
REFERENCES
[1] H. J. Pesch and M. Plail, “The maximum principle of optimal control: A history of ingenious ideas and missed opportunities,” Control &
Cybernetics, vol. 38, no. 4, pp. 973-995, 2009.
[2] J. T. Betts, “Survey of numerical methods for trajectory optimization,” J. Guid. Control Dynam., vol. 21, no. 2, pp. 193-206, 1998.
[3] C. Hargraves and W. Paris, “Direct trajectory optimization using nonlinear programming and collocation,” J. Guid. Control Dynam., vol. 10,
no. 4, pp. 338-342, 1987.
[4] O. V. Stryk and R. Bulirsch, “Direct and indirect methods for trajectory optimization,” Ann. Oper. Res., vol. 37, no. 1, pp. 357-373, 1992.
[5] H. J. Peng, Q. Gao, Z. G. Wu, and W. X. Zhong, “Symplectic approaches for solving two-point boundary-value problems,” J. Guid. Control
Dynam., vol. 35, no. 2, pp. 653-658, 2012.
[6] A. V. Rao, “A survey of numerical methods for optimal control,” in Proc. AAS/AIAA Astrodynam. Specialist Conf., Pittsburgh, PA, 2009, AAS
Paper 09-334.
[7] D. Garg, M. A. Patterson, W. W. Hager, A. V. Rao, et al, A Unified framework for the numerical solution of optimal control problems using
pseudospectral methods,” Automatica, vol. 46, no. 11, pp. 1843-1851, 2010.
[8] I. M. Ross and F. Fahroo, “A perspective on methods for trajectory optimization,” in Proc. AIAA/AAS Astrodynam. Conf., Monterey, CA, 2002,
AIAA Paper No. 2002-4727.
[9] I. M. Ross and F. Fahroo, “Pseudospectral methods for optimal motion planning of differentially flat systems,” IEEE Trans. Autom. Control,
vol. 49, no. 8, pp. 1410-1413, 2004.
[10] S. Zhang, E. M. Yong, W. Q. Qian, and K. F. He, “A Variation Evolving Method for Optimal Control,” arXiv: 1703.10263 [cs.SY]
[11] H. X. Zhang and M. Y. Shen. Computational Fluid Dynamics — Fundamentals and Applications of Finite Difference Methods. Beijing, China:
National Defense Industry Press, 2003, pp. 76-78.
[12] R. F. Hartl, S. P. Sethi, and R. G. Vickson, “A survey of the maximum principles for optimal control problems with state constraint,” SIAM
Rev., vol. 37, no. 2, pp. 181-218, 1995.
[13] H. K. Khalil, Nonlinear Systems. New Jersey, USA: Prentice Hall, 2002, pp. 111-181.
[14] D. G. Wu, Variation Method. Beijing, China: Higher Education Press, 1987, pp. 12-68.
[15] K. W. Cassel, Variational Methods with Applications in Science and Engineering. New York: Cambridge University Press, 2013, pp. 28-81
[16] D.Z. Zhen. Linear System Theory. Beijing, China: Tsinghua University Press, 2002, pp. 85-134.
[17] A. E. Bryson and Y. C. Ho, Applied Optimal Control: Optimization, Estimation, and Control. Washington, DC, USA: Hemisphere, 1975, pp.
42-125.
[18] H. Wang, J. S. Luo, and J. M. Zhu. Advanced Mathematics. Changsha, China: National University of Defense Technology Press, 2000, pp.
203-210.
[19] X. S. Xie, Optimal Control Theory and Application. Beijing, China: Tsinghua Univ. Press, 1986, pp. 167-215.
[20] M. A. Patterson and A. V. Rao, “GPOPS-II: AMATLAB software for solving multiple-phase optimal control problems using hp-adaptive
Gaussian quadrature collocation methods and sparse nonlinear programming,” ACM Trans. Math. Software, vol. 41, no. 1, pp. 1-37, 2014.
[21] D. G. Hull, Optimal Control Theory for Applications, New York, USA: Springer, 2003, pp. 89-71.
| 3cs.SY
|
arXiv:1611.02466v1 [math.AC] 8 Nov 2016
Serre Dimension of Monoid Algebras
Manoj K. Keshari and Husney Parvez Sarwar
Department of Mathematics, IIT Bombay, Powai, Mumbai - 400076, India;
[email protected]; [email protected]
Abstract
Let R be a commutative Noetherian ring of dimension d, M a commutative cancellative torsionfree monoid of rank r and P a finitely generated projective R[M ]-module of rank t.
(1) Assume M is Φ-simplicial seminormal. (i) If M ∈ C(Φ), then Serre dim R[M ] ≤ d. (ii) If
r ≤ 3, then Serre dim R[int(M )] ≤ d.
(2) If M ⊂ Z2+ is a normal monoid of rank 2, then Serre dim R[M ] ≤ d.
(3) Assume M is c-divisible, d = 1 and t ≥ 3. Then P ∼
= ∧t P ⊕R[M ]t−1 .
(4) Assume R is a uni-branched affine algebra over an algebraically closed field and d = 1.
∼ ∧t P ⊕R[M ]t−1 .
Then P =
1
Introduction
Throughout rings are commutative Noetherian with 1; projective modules are finitely generated and of
constant rank; monoids are commutative cancellative torsion-free; Z+ denote the additive monoid of
non-negative integers.
Let A be a ring and P a projective A-module. An element p ∈ P is called unimodular, if there
exists φ ∈ Hom (P, A) such that φ(p) = 1. We say Serre dimension of A (denoted as Serre dim A)
is ≤ t, if every projective A-module of rank ≥ t + 1 has a unimodular element. Serre dimension of
A measures the surjective stabilization of the Grothendieck group K0 (A). Serre’s problem on the
freeness of projective k[X1 , . . . , Xn ]-modules, k a field, is equivalent to Serre dim k[X1 , . . . , Xn ] = 0.
After the solution of Serre’s problem by Quillen [16] and Suslin [21], many people worked on surjective stabilization of polynomial extension of a ring. Serre [20] proved Serre dim A ≤ dim A, Plumstead
[14] proved Serre dim A[X] ≤ dim A, Bhatwadekar-Roy [4] proved Serre dim A[X1 , . . . , Xn ] ≤ dim A
and Bhatwadekar-Lindel-Rao [3] proved Serre dim A[X1 , . . . , Xn , Y1±1 , . . . , Ym±1 ] ≤ dim A.
Anderson conjectured an analogue of Quillen-Suslin theorem for monoid algebras over a field which
was answered by Gubeladze [8] (see 1.1) as follows.
Theorem 1.1 Let k be a field and M a monoid. Then M is seminormal if and only if all projective
k[M ]-modules are free.
Gubeladze [11] asked the following
Question 1.2 Let M ⊂ Zr+ be a monoid of rank r with M ⊂ Zr+ an integral extension. Let R be a
ring of dimension d. Is Serre dim R[M ] ≤ d?
1
We answer Question 1.2 for some class of monoids. Recall that a finitely generated monoid M of
rank r is called Φ-simplicial if M can be embedded in Zr+ and the extension M ⊂ Zr+ is integral (see
[10]). A Φ-simplicial monoid is commutative, cancellative and torsion-free.
Definition 1.3 Let C(Φ) denote the class of seminormal Φ-simplicial monoids M ⊂ Zr+ of rank r
such that if Zr+ = {ts11 . . . tsrr | si ≥ 0}, then for 1 ≤ m ≤ r, Mm = M ∩ {ts11 . . . tsmm | si ≥ 0} satisfies
the following properties: Given a positive integer c, there exist integers ci > c for i = 1, . . . , m − 1
such that for any ring R, the automorphism η ∈ AutR[tm ] (R[t1 , . . . , tm ]) defined by η(ti ) = ti + tcmi for
i = 1, . . . , m − 1, restricts to an R-automorphism of R[Mm ]. It is easy to see that Mm ∈ C(Φ) and
rank Mm = m for 1 ≤ m ≤ r.
The following result (3.4, 3.8) answers Question 1.2 for monoids in C(Φ).
Theorem 1.4 Let M ⊂ Zr+ be a seminormal Φ-simplicial monoid of rank r and R a ring of dimension
d.
(1) If M ∈ C(Φ), then Serre dim R[M ] ≤ d.
(2) If r ≤ 3, then Serre dim R[int(M )] ≤ d, where int(M ) = int(R+ M ) ∩ Z3+ and int(R+ M ) is
the interior of the cone R+ M ⊂ R3 with respect to Euclidean topology.
The following result (3.6) follows from (1.4(1)). When R is a field, this result is due to Anderson
[1].
Theorem 1.5 Let R be a ring of dimension d and M ⊂ Z2+ a normal monoid of rank 2. Then Serre
dim R[M ] ≤ d.
The next result answers Question 1.2 partially for 1-dimensional rings (see 3.13, 3.16). The proof
uses the techniques of Kang [12], Roy [17] and Gubeladze’s [9]. Let us recall two definitions. (i) A
monoid M is called c-divisible, where c > 1 is an integer, if cX = m has a solution in M for all m ∈ M .
All c-divisible monoids are seminormal. (ii) Let R be a ring, R the integral closure of R and C the
conductor ideal of R ⊂ R. Then R is called uni-branched if for any p ∈ Spec R containing C, there is
a unique q ∈ Spec R such that q ∩ R = p.
Theorem 1.6 Let R be a ring of dimension 1, M a monoid and P a projective R[M ]-module of rank
r.
(i) If M is c-divisible and r ≥ 3, then P ∼
= ∧r P ⊕R[M ]r−1 .
(ii) If R is a uni-branched affine algebra over an algebraically closed field, then P ∼
= ∧r P ⊕R[M ]r−1 .
If R is a 1-dimensional anodal ring with finite seminormalization, then (1.6(ii)) is due to Sarwar
([18], Theorem 1.2). Note that if k is an algebraically closed field of characteristic 2, then node
k[X, Y ]/(X 2 − Y 2 − Y 3 ) is not anodal but is uni-branched, by Kang ([12], Example 2).
At the end, we give some applications to minimum number of generators of projective modules.
2
2
Preliminaries
Let A be a ring and Q an A-module. We say p ∈ Q is unimodular if the order ideal OQ (p) =
{φ(p) | φ ∈ Hom (Q, A)} equals A. The set of all unimodular elements in Q is denoted by Um(Q). We
write En (A) for the group generated by set of all n × n elementary matrices over A and Umn (A) for
Um(An ). We denote by Aut A (Q), the group of all A-automorphisms of Q.
For an ideal J of A, we denote by E(A ⊕ Q, J), the subgroup of Aut A (A ⊕ Q) generated by all the
aφ
and Γq = 1q id0Q with a ∈ J, φ ∈ Q∗ and q ∈ Q. Further, we shall
automorphisms ∆aφ = 10 id
Q
write E(A ⊕ Q) for E(A ⊕ Q, A). We denote by Um(A ⊕ Q, J) the set of all (a, q) ∈ Um(A ⊕ Q) with
a ∈ 1 + J and q ∈ JQ.
We state some results of Lindel [13] for later use.
Proposition 2.1 (Lindel [13], 1.1) Let A be a ring and Q an A-module. Let Qs be free of rank r for
some s ∈ A. Then there exist p1 , . . . , pr ∈ Q, φ1 , . . . , φr ∈ Q∗ and t ≥ 1 such that following holds:
2
(i) 0 :A s′ A = 0 :A s′ A, where s′ = st .
Pr
Pr
′
′ ∗
(ii) s Q ⊂ F and s Q ⊂ G, where F = i=1 Api ⊂ Q and G = i=1 Aφi ⊂ Q∗ .
(iii) the matrix (φi (pj ))1≤i,j≤r = diagonal (s′ , . . . , s′ ). We say F and G are s′ -dual submodules of
Q and Q∗ respectively.
Proposition 2.2 (Lindel [13], 1.2, 1.3) Let A be a ring and Q an A-module. Assume Qs is free of
rank r for some s ∈ A. Let F and G be s-dual submodules of Q and Q∗ respectively. Then
(i) for p ∈ Q, there exists q ∈ F such that ht (OQ (p + sq)As ) ≥ r.
(ii) If Q is projective A-module and p ∈ Um(Q/sQ), then there exists q ∈ F such that ht (OQ (p +
sq)) ≥ r.
Proposition 2.3 (Lindel [13], 1.6) Let Q be a module over a positively graded ring A = ⊕i≥0 Ai and
Qs be free for some s ∈ R = A0 . Let T ⊆ A be a multiplicatively closed set of homogeneous elements.
Let p ∈ Q be such that pT (1+sR) ∈ Um(QT (1+sR) ) and s ∈ rad(OQ (p) + A+ ), where A+ = ⊕i≥1 Ai .
Then there exists p′ ∈ p + sA+ Q such that p′T ∈ Um(QT ).
Proposition 2.4 (Lindel [13], 1.8) Under the assumptions of (2.3), let p ∈ Q be such that OQ (p) +
sA+ = A and A/OQ (p) is an integral extension of R/(R ∩ OQ (p)). Then there exists p′ ∈ Um(Q)
with p′ − p ∈ sA+ Q.
The following result is due to Amit Roy ([17], Proposition 3.4).
Proposition 2.5 Let A, B be two rings with f : A → B a ring homomorphism. Let s ∈ A be nonzerodivisor such that f (s) is a non-zerodivisor in B. Assume that we have the following cartesian
square.
A
As
f
fs
3
/B
/ Bf (s)
Further assume that SLr (Bf (s) ) = Er (Bf (s) ) for some r > 0. Let P and Q be two projective A-modules
of rank r such that (i) ∧r P ∼
= ∧r Q, (ii) Ps and Qs are free over As , (iii) P ⊗ A B ∼
= Q ⊗ A B and
∼
Q ⊗ A B has a unimodular element. Then P = Q.
Definition 2.6 (see [10], Section 6) Let R be a ring and M a Φ-simplicial monoid of rank r. Fix an
integral extension M ֒→ Zr+ . Let {t1 , . . . , tr } be a free basis of Zr+ . Then M can be thought of as a
monoid consisting of monomials in t1 , . . . , tr .
For x = ta1 1 . . . tar r and y = tb11 . . . tbrr in Zr+ , define x is lower than y if ai < bi for some i and
aj = bj for j > i. In particular, ti is lower than tj if and only if i < j.
For f ∈ R[M ], define the highest member H(f ) of f as am, where f = am + a1 m1 + . . . + ak mk
with m, mi ∈ M , a ∈ R \ {0}, ai ∈ R and each mi is strictly lower than m for 1 ≤ i ≤ k.
An element f ∈ R[Zr+ ] is called monic if H(f ) = atsr , where a ∈ R is a unit and s > 0. An element
f ∈ R[M ] is said to be monic if f is monic in R[Zr+ ] via the embedding R[M ] ֒→ R[Zr+ ].
sr−1
Define M0 to be the submonoid {ts11 . . . tr−1
| si ≥ 0} ∩ M of M . Clearly M0 is finitely generated
r−1
as M is finitely generated. Also M0 ֒→ Z+ is integral. Hence M0 is Φ-simplicial. Further, if M is
seminormal, then M0 is seminormal.
Grade R[M ] as R[M ] = R[M0 ] ⊕ A1 ⊕ A2 ⊕ . . ., where Ai is the R[M0 ]-module generated by the
sr−1 i
tr ∈ M . For an ideal I in R[M ], define its leading coefficient ideal λ(I) as
monomials ts11 . . . tr−1
{a ∈ R | ∃f ∈ I with H(f ) = am for some m ∈ M }.
Lemma 2.7 ([10], Lemma 6.5) Let R be a ring and M ⊂ Zr+ a Φ-simplicial monoid. If I ⊆ R[M ] is
an ideal, then ht (λ(I)) ≥ ht (I), where λ(I) is defined in (2.6).
3
Main Theorem
This section contains main results stated in the introduction. We also give some examples of monoids
in C(Φ).
3.1
Over C(Φ) class of monoids
Lemma 3.1 Let R be a ring and M ⊂ Zr+ a monoid in C(Φ) of rank r. Let f ∈ R[M ] ⊂ R[Zr+ ] =
R[t1 , . . . , tr ] with H(f ) = uts11 . . . tsrr for some unit u ∈ R. Then there exist η ∈ AutR (R[M ]) such
that η(f ) is a monic polynomial in tr .
Proof Since M ∈ C(Φ), we can choose positive integers c1 , . . . , cr−1 such that the automorphism
η ∈ AutR[tr ] R[t1 . . . , tr ] defined by η(ti ) = ti + tcri for i = 1, . . . , r − 1, restricts to an automorphism
of R[M ] and such that η(f ) is a monic polynomial in tr .
Lemma 3.2 Let R be a ring of dimension d and M ⊂ Zr+ a monoid in C(Φ) of rank r. Let P be
a projective R[M ]-module of rank > d. Write R[M ] = R[M0 ] ⊕ A1 ⊕ A2 . . ., as defined in (2.6) and
4
A+ = A1 ⊕ A2 ⊕ . . . an ideal of R[M ]. Assume that Ps is free for some s ∈ R and P/sA+ P has a
unimodular element. Then the natural map Um(P ) → Um(P/sA+ P ) is surjective. In particular, P
has a unimodular element.
Proof Write A = R[M ]. Since every unimodular element of P/sA+ P can be lifted to a unimodular
element of P1+sA+ , if s is nilpotent, then elements of 1+sA+ are units in A and we are done. Therefore,
assume that s is not nilpotent.
Let p ∈ P be such that p ∈ Um(P/sA+ P ). Then OP (p) + sA+ = A. Hence OP (p) contains an
element of 1 + sA+ . Choose g ∈ A+ such that 1 + sg ∈ OP (p). Applying (2.2) with sg in place of s, we
get q ∈ F ⊂ P such that ht (OP (p + sgq)) > d. Since p + sgq is a lift of p, replacing p by p + sgq, we
may assume that ht (OP (p)) > d. By (2.7), we get ht (λ(OP (p))) ≥ ht (OP (p)) > d. Since λ(OP (p))
is an ideal of R, we get 1 ∈ λ(OP (p)). Hence there exists f ∈ OP (p) such that the coefficient of H(f )
(highest member of f ) is a unit.
Suppose H(f ) = uts11 . . . tsrr with u a unit in R. Since M ∈ C(Φ), by (3.1), there exists α ∈
Aut R (R[M ]) such that α(f ) is monic in tr . Thus we may assume that OP (p) contains a monic
polynomial in tr . Hence A/OP (p) is an integral extension of R[M0 ]/(OP (p) ∩ R[M0 ]) and p ∈
Um(P/sA+ P ). By (2.4), there exists p′ ∈ Um(P ) such that p′ − p ∈ sA+ P . This means p′ ∈ Um(P )
is a lift of p. This proves the result.
Remark 3.3 In (3.2), we do not need the monoid M to be seminormal.
The next result proves (1.4(1)).
Theorem 3.4 Let R be a ring of dimension d and M a monoid in C(Φ) of rank r. If P is a projective
R[M ]-module of rank r′ ≥ d + 1, then P has a unimodular element. In other words, Serre dim
R[M ] ≤ d.
Proof We can assume that the ring is reduced with connected spectrum. If d = 0, then R is a field.
Since M is seminormal, projective R[M ]-modules are free, by (1.1). If r = 0, then M = 0 and we are
done by Serre [20]. Assume d, r ≥ 1 and use induction on d and r simultaneously.
If S is the set of all non-zerodivisor of R, then dim S −1 R = 0 and so S −1 P is free S −1 R[M ]-module
(d = 0 case). Choose s ∈ S such that Ps is free. Consider the ring R[M ]/(sR[M ]) = (R/sR)[M ].
Since dim R/sR = d − 1, by induction on d, Um(P/sP ) is non-empty.
Write R[M ] = R[M0 ] ⊕ A1 ⊕ A2 . . ., as defined in (2.6) and A+ = A1 ⊕ A2 ⊕ . . . an ideal of R[M ].
Note that M0 ∈ C(Φ) and rank M0 = r −1. Since R[M ]/A+ = R[M0 ], by induction on r, Um(P/A+ P )
is non-empty. Write A = R[M ] and consider the following fiber product diagram
A/(sA ∩ A+ )
/ A/sA
A/A+
/ A/(s, A+ )
5
If B = R/sR, then A/(s, A+ ) = B[M0 ]. Let u ∈ Um(P/A+ P ) and v ∈ Um(P/sP ). Let u and v
denote the images of u and v in P/(s, A+ )P . Write P/(s, A+ )P = B[M0 ] ⊕ P0 , where P0 is some
projective B[M0 ]-module of rank = r′ − 1. Note that dim(B) = d − 1 and u, v are two unimodular
elements in B[M0 ] ⊕ P0 .
Case 1. Assume rank(P0 ) ≥ max {2, d}. Then by ([6], Theorem 4.5), there exists σ ∈ E(B[M0 ] ⊕
P0 ) such that σ(u) = v. Lift σ to an element σ1 ∈ E(P/A+ P ) and write σ1 (u) = u1 ∈ Um(P/A+ P ).
Then images of u1 and v are same in P/(s, A+ )P . Patching u1 and v over P/(s, A+ )P in the above
fiber product diagram, we get an element p ∈ Um(P/(sA ∩ A+ )P ).
Note sA ∩ A+ = sA+ . We have Ps is free and P/sA+ P has a unimodular element. Use (3.2), to
conclude that P has a unimodular element.
Case 2. Now we consider the remaining case, namely d = 1 and rank(P ) = 2. Since B = R/sR
is 0 dimensional, projective modules over B[M0 ] and B[M ] are free, by (1.1). In particular, P/sP
and P/(s, A+ )P are free modules of rank 2 over the rings B[M ] and B[M0 ] respectively. Consider the
same fiber product diagram as above.
Since any two unimodular elements in Um2 (B[M0 ]) are connected by an element of GL2 (B[M0 ]).
Further B[M0 ] is a subring of B[M ] = A/sA. Hence the natural map GL2 (B[M ]) → GL2 (B[M0 ]) is
surjective. Hence any automorphism of P/(s, A+ )P can be lifted to an automorphism of P/sP . By
same argument as above, patching unimodular elements of P/sP and P/A+ P , we get a unimodular
element in P/(sA ∩ A+ )P . Since sA ∩ A+ = sA+ and P/sA+ P has a unimodular element, by (3.2),
P has a unimodular element. This completes the proof.
Example 3.5 (1) If M is a Φ-simplicial normal monoid of rank 2, then M ∈ C(Φ). To see this, by
([10], Lemma 1.3), M ∼
= (α1 , α2 ) ∩ Z2+ , where α1 = (a, b) and α2 = (0, c) and (α1 , α2 ) is the group
generated by α1 and α2 . It is easy to see that M ∼
= ((1, a1 ), (0, a2 )) ∩ Z2+ , where gcd(b, c) = g and
a1 = b/g, a2 = c/g. Hence M ∈ C(Φ).
(2) If M ⊂ Z2+ is a finitely generated rank 2 normal monoid, then it is easy to see that M is
Φ-simplicial. Hence M ∈ C(Φ) by (1).
(3) If M is a rank 3 normal quasi-truncated or truncated monoid (see [10], Definition 5.1), then
M ∈ C(Φ). To see this, by ([10], Lemma 6.6), M satisfies properties of (1.3). Further, M0 is a
Φ-simplicial normal monoid of rank 2. By (1), M0 ∈ C(Φ).
Corollary 3.6 Let R be a ring of dimension d and M ⊂ Z2+ a normal monoid of rank 2. Then Serre
dim R[M ] ≤ d.
Proof If M is finitely generated, then result follows from (3.5(2)) and (3.4).
If M is not finitely generated, then write M as a filtered union of finitely generated submonoids,
say M = ∪λ∈I Mλ . Since M is normal, the integral closure M λ of Mλ is contained in M . Hence
M = ∪λ∈I M λ . By ([5], Proposition 2.22), M λ is finitely generated. If P is a projective R[M ]-module,
then P is defined over R[M λ ] for some λ ∈ I as P is finitely generated. Now the result follows from
(3.5(2)) and (3.4).
6
The following result follows from (3.5(3)) and (3.4).
Corollary 3.7 Let R be a ring of dimension d and M a truncated or normal quasi-truncated monoid
of rank ≤ 3. Then Serre dim R[M ] ≤ d.
Now we prove (1.4(2)).
Proposition 3.8 Let R be a ring of dimension d and M a Φ-simplicial seminormal monoid of rank
≤ 3. Then Serre dim R[int(M )] ≤ d.
Proof Recall that int(M ) = int(R+ M ) ∩ Z3+ . Let P be a projective R[int(M )]-module of rank
≥ d + 1. Since M is seminormal, by ([5], Proposition 2.40), int(M ) = int(M ), where M is the
normalization of M . Since normalization of a finitely generated monoid is finitely generated (see [5],
Proposition 2.22), M is a Φ-simplicial normal monoid. By ([10], Theorem 3.1), int(M ) = int(M ) is a
filtered union of truncated (normal) monoids (see [10], Definition 2.2). Since P is finitely generated, we
get P is defined over R[N ], where N ⊂ int(M ) is a truncated monoid. By (3.7), Serre dim R[N ] ≤ d.
Hence P has a unimodular element. Therefore Serre dim R[int(M )] ≤ d.
Assumptions: In the following examples, R is a ring of dimension d, Monoid operations are written
multiplicatively and K(M ) denotes the group of fractions of monoid M .
P
Example 3.9 For n > 0, consider the monoid M ⊂ Zr+ generated by {ti11 ti22 . . . tirr | ij = n}. Then
M is a Φ-simplicial normal monoid. For integers ci = nki + 1, ki > 0 and i = 1, . . . , r − 1, consider
η ∈ Aut R[tr ] (R[t1 , . . . , tr ]) defined by ti 7→ ti + tcri for i = 1, . . . , r − 1.
ir−1 ir
c
A typical monomial in the expansion of η(ti11 . . . tr−1
tr ) = (t1 + tcr1 )i1 . . . (tr−1 + trr−1 )ir−1 tirr will
ir−1 −lr−1 cr−1 lr−1 ir
ir−1 −lr−1 l1 +...+lr−1 +ir n(k1 l1 +...+kr−1 lr−1 )
look like (t1i1 −l1 trc1 l1 ) . . . (tr−1
)tr = (t1i1 −l1 . . . tr−1
tr
)tr
tr
−1
which belong to M . So η(R[M ]) ⊂ R[M ]. Similarly, η (R[M ]) ⊂ R[M ]. Hence η restricts to an
R-automorphism of R[M ]. Therefore η satisfies the property of (1.3) for M . It is easy to see that
Mm = M ∩ {ts11 . . . tsmm |si ≥ 0} for 1 ≤ m ≤ r − 1 also satisfy this property. Hence M ∈ C(Φ). By
(3.4), Serre dim R[M ] ≤ d.
Example 3.10 Let M be a Φ-simplicial monoid generated by monomials t21 , t22 , t23 , t1 t3 , t2 t3 . For
integers cj = 2kj − 1 with kj > 1, consider the automorphism η ∈ Aut R[t3 ] (R[t1 , t2 , t3 ]) defined by
c
tj 7→ tj + t3j for j = 1, 2. Then it is easy to see that η restricts to an automorphism of R[M ].
We claim that M is seminormal but not normal. For this, let
z = (t23 )−1 (t1 t3 )(t2 t3 ) = t1 t2 ∈ K(M ) \ M, but z2 ∈ M,
showing that M is not normal. For seminormality, let
z = (t21 )α1 (t22 )α2 (t23 )α3 (t1 t3 )α4 (t2 t3 )α5 ∈ K(M ) with αi ∈ Z and z2 , z3 ∈ M.
7
We may assume that 0 ≤ α4 , α5 ≤ 1. Now z 2 ∈ M ⇒ α1 , α2 ≥ 0 and 2α3 + α4 + α5 ≥ 0. If α3 < 0,
1 +1 2α2 +1 3
then α4 = α5 = 1 and α3 = −1. In this case, z 3 = (t2α
t2
) ∈
/ M , a contradiction. Therefore
1
α3 ≥ 0 and z ∈ M . Hence M is seminormal. It is easy to see that M ∈ C(Φ). By (3.4), Serre dim
R[t21 , t22 , t23 , t1 t3 , t2 t3 ] ≤ d.
Remark 3.11 (1) Let R be a ring and P a projective R-module of rank ≥ 2. Let R be the
seminormalization of R. It follows from arguments in Bhatwadekar ([2], Lemma 3.1) that P ⊗ R R has
a unimodular element if and only if P has a unimodular element.
(2) Assume R is a ring of dimension d and M ∈ C(Φ). Let M be the seminormalization of M . If
M is in C(Φ), then Serre dim R[M ] ≤ max{1, d}, using ([2] and 3.4).
(3) Let (R, m, K) be a regular local ring of dimension d containing a field k such that either char
k = 0 or char k = p and tr-deg K/Fp ≥ 1. Let M be a seminormal monoid. Then, using Popescu
([15], Theorem 1) and Swan ([23], Theorem 1.2), we get Serre dim R[M ] = 0. If M is not seminormal,
then Serre dim R[M ] = 1 using ([11], [2] and [23]).
Example 3.12 For a monoid M , M denotes the seminormalization of M .
1. Let M ⊂ Z2+ be a Φ-simplicial monoid generated by tn1 , t1 t2 , tn2 , where n ∈ N. We claim that
M is normal. To see this, let z = ti1 tj2 = (tn1 )p (t1 t2 )q (tn2 )r ∈ K(M ) with p, q, r ∈ Z such that
z t ∈ M for some t > 0. Then i, j ≥ 0. We need to show that z ∈ M . We may assume that
0 ≤ q < n. Since i, j ≥ 0, we get p, r ≥ 0. Thus z ∈ M and M is normal. Hence, by (3.6), Serre
dim R[tn1 , t1 t2 , tn2 ] ≤ d.
2. The monoid M ⊂ Z2+ generated by t21 , t1 t22 , t22 is seminormal but not normal. For this, let
z = (t1 t22 )(t22 )−1 = t1 ∈ K(M ) \ M . Then z 2 ∈ M showing that M is not normal. For
seminormality, let z = (t21 )α (t1 t22 )β (t22 )γ ∈ K(M ) with α, β, γ ∈ Z be such that z 2 , z 3 ∈ M . We
may assume 0 ≤ β ≤ 1. If β = 0, then α, γ ≥ 0 and hence z ∈ M . If β = 1, then z 2 ∈ M implies
α ≥ 0 and γ + 1 ≥ 0. If γ = −1, then z 3 = (t1 )6α+3 ∈
/ M , a contradiction. Hence γ ≥ 0, proving
that z ∈ M and M is seminormal. It is easy to see that M ∈ C(Φ). Therefore, by (3.4), Serre
dim R[t21 , t1 t22 , t22 ] ≤ d.
3. Let M be a monoid generated by (t21 , t1 tj2 , t22 ), where j ≥ 3. Then M is not seminormal. For
2(j−2)
this, if z = (t1 tj2 )(t22 )−1 = t1 tj−2
∈ K(M ) \ M , then z 2 = t21 t2
and z 3 = (t21 )(t1 tj2 )(t2j−6
)
2
2
are in M , showing that M is not seminormal.
If j = 3, then observe that t1 t2 belongs to M . Since the monoid generated by t21 , t1 t2 , t22 is
normal, we get that M is generated by t21 , t1 t2 , t22 . Hence Serre dim R[M ] ≤ d by (1) above.
Observe that if j is odd, then M = (t21 , t1 t2 , t22 ) and if j is even, then M = (t21 , t1 t22 , t22 ). So Serre
dim R[M ] ≤ d by (1, 2) above.
In both cases, applying (3.11(1)), we get Serre dim R[M ] ≤ max {1, d}.
8
4. Let M be a monoid generated by (t31 , t1 t22 , t32 ) Then M is not seminormal. For this, let z =
2
3
2
3
6 3
(t1 t22 )2 t−3
2 ∈ K(M ) \ M . Then z = t1 (t1 t2 ) ∈ M and z = t1 t2 ∈ M . Hence seminormalization
of M is M = (t31 , t21 t2 , t1 t22 , t32 ). By (3.9), Serre dim R[M ] ≤ d. Therefore, applying (3.11(1)), we
get Serre dim R[M ] ≤ max {1, d}.
3.2
Monoid algebras over 1-dimensional rings
The following result proves (1.6(i)).
Theorem 3.13 Let R be a ring of dimension 1 and M a c-divisible monoid. If P is a projective
R[M ]-module of rank r ≥ 3, then P ∼
= ∧r P ⊕R[M ]r−1 .
Proof If R is normal, then we are done by Swan [23]. Assume R is not normal.
Case 1. Assume R has finite normalization. Let R be the normalization of R and C the conductor
ideal of the extension R ⊂ R. Then ht C = 1. Hence R/C and R/C are zero dimensional rings.
Consider the following fiber product diagram
R[M ]
/ R[M ]
(R/C)[M ]
/ (R/C)[M ]
∼ P ′ ⊗ R[M ].
If P ′ = ∧r P ⊕R[M ]r−1 , then by Swan [23], P ⊗ R[M ] ∼
= ∧r (P ⊗ R[M ])⊕R[M ]r−1 =
By Gubeladze [8], P/CP and P ′ /CP ′ are free (R/C)[M ]-modules. Further, SLr ((R/C)[M ]) =
Er ((R/C)[M ]) for r ≥ 3, by Gubeladze [9]. Now using standard arguments of fiber product diagram,
we get P ∼
= P ′.
Case 2. Now R need not have finite normalization. We may assume R is a reduced ring with
connected spectrum. Let S be the set of all non-zerodivisors of R. By [8], S −1 P is a free S −1 R[M ]module. Choose s ∈ S such that Ps is a free Rs [M ]-module.
Now we follow the arguments of Roy ([17],Theorem 4.1). Let R̂ denote the s-adic completion R.
Then R̂red has a finite normalization. Consider the following fiber product diagram
R[M ]
/ R̂[M ]
Rs [M ]
/ R̂s [M ]
Since R̂s is a zero dimensional ring, by [9], SLr (R̂s [M ]) = Er (R̂s [M ]) for r ≥ 3. If P ′ = ∧r P ⊕R[M ]r−1 ,
then Ps and Ps′ are free Rs [M ]-modules and by Case 1, P ⊗ R̂[M ] ∼
= P ′ ⊗ R̂[M ]. By (2.5), P ∼
= P ′.
This completes the proof.
The following result is due to Kang ([12], Lemma 7.1 and Remark).
9
Lemma 3.14 Let R be a 1-dimensional uni-branched affine algebra over an algebraically closed field,
R the normalization of R and C the conductor ideal of the extension R ⊂ R. Then R/C = R/C +
√
a1 R/C + · · · + am R/C, where ai ∈ C the radical ideal of C in R.
Lemma 3.15 Let R be a 1-dimensional ring, R the normalization of R and C the conductor ideal of
√
the extension R ⊂ R. Assume R/C = R/C + a1 R/C + · · · + am R/C, where ai ∈ C the radical ideal
of C in R. Let M be a monoid and write A = R/C.
(i) If σ ∈ SLn (A[M ]), then σ = σ1 σ2 , where σ1 ∈ SLn ((R/C)[M ]) and σ2 ∈ En (A[M ]).
(ii) If P is a projective R[M ]-module of rank r, then P ∼
= ∧r P ⊕R[M ]r−1 .
Proof (i) Let σ = (bij ) ∈ SLn (A[M ]). Write bij = (bij )0 + (bij )1 a1 + · · · + (bij )m am , where (bij )l ∈
√
(R/C)[M ]. If α = ((bij )0 ), then det(σ) = 1 = det(α) + c, where c ∈ ( C/C)[M ]. Since c ∈ (R/C)[M ]
is nilpotent, det(α) is a unit in (R/C)[M ]. Let β = diagonal (1/(1 − c), 1, . . . , 1) ∈ GLn ((R/C)[M ])
and σ1 = αβ ∈ SLn ((R/C)[M ]).
Note that σ1−1 σ = β −1 α−1 σ = β −1 1/(1 − c) ασ, where α = ((bij )0 ), (bij )0 are minors of (bij )0 .
σ2 := σ1−1 σ =
1
0
..
.
0
0
1
1−c
..
.
0
···
···
···
···
0
0
..
.
1
1−c
1 + c11
c21
..
.
cn1
c12
1 + c22
..
.
cn2
···
···
···
···
c1n
c2n
..
.
1 + cnn
,
√
where cij ∈ ( C/C)[M ].
Note that σ2 ∈ SLn (A[M ]) and σ2 = Id modulo the nilpotent ideal of A[M ]. Hence σ2 ∈ En (A[M ]).
Thus we get σ = σ1 σ2 with the desired properties.
(ii) Follow the proof of (3.13) and use (3.15(i)) to get the result.
Now we prove (1.6(ii)) which follows from (3.14) and (3.15).
Theorem 3.16 Let R be a 1-dimensional uni-branched affine algebra over an algebraically closed field
and M a monoid. If P is a projective R[M ]-module of rank r, then P ∼
= ∧r P ⊕R[M ]r−1 .
4
Applications
Let R be a ring of dimension d and Q a finitely generated R-module. Let µ(Q) denote the minimum
number of generators of Q. By Forster [7] and Swan [22], µ(Q) ≤ max{µ(Qp ) + dim(R/p)|p ∈
Spec (R), Qp 6= 0}. In particular, if P is a projective R-module of rank r, then µ(P ) ≤ r + d.
The following result is well known.
Theorem 4.1 Let A be a ring such that Serre dim A ≤ d. Assume Am is cancellative for m ≥ d + 1.
If P is a projective A-module of rank r ≥ d + 1, then µ(P ) ≤ r + d.
10
Proof Assume µ(P ) = n > r + d. Consider a surjection φ : An →
→ P with Q = ker(φ). Then
An ∼
= P ⊕Q. Since Q is a projective A-module of rank ≥ d + 1, Q has a unimodular element q. Since
→ P . Since n − 1 > d, An−1 is cancellative. Hence
φ(q) = 0, φ induces a surjection φ : An /qAn →
n−1 ∼ n
A
= A /qA and P is generated by n − 1 elements, a contradiction.
The following result is immediate from (4.1, 3.4, 3.6 and [6]).
Corollary 4.2 Let R be a ring of dimension d, M a monoid and P a projective R[M ]-module of rank
r > d. Then:
(i) If M ∈ C(Φ), then µ(P ) ≤ r + d.
(ii) If M ⊂ Z2+ is a normal monoid of rank 2, then µ(P ) ≤ r + d.
Let M be a c-divisible monoid, R a ring of dimension d and n ≥ max{2, d + 1}. Then Schaubhüser
[19] proved that En+1 (R[M ]) acts transitively on Umn+1 (R[M ]). Using Schaubhüser’s result and
arguments of Dhorajia-Keshari ([6], Theorem 4.4), we get that if P is a projective R[M ]-module
of rank n, then E(R[M ]⊕P ) acts transitively on Um(R[M ]⊕P ). Therefore the following result is
immediate from (4.1 and 3.13).
Corollary 4.3 Let R be a ring of dimension 1, M a c-divisible monoid and P a projective R[M ]module of rank r ≥ 3. Then µ(P ) ≤ r + 1.
Acknowledgement. We would like to thank the referee for his/her critical remark. The second
author would like to thank C.S.I.R., India for their fellowship.
References
[1] D.F. Anderson, Projective modules over subrings of k[X, Y] generated by monomials, Pacific J. Math. 79
(1978) 5-17.
[2] S.M. Bhatwadekar, Inversion of monic polynomials and existence of unimodular elements (II), Math. Z.
200 (1989) 233-238.
[3] S.M. Bhatwadekar, H. Lindel and R.A. Rao, The Bass-Murthy question: Serre dimension of Laurent
polynomial extensions, Invent. Math. 81 (1985) 189-203.
[4] S.M. Bhatwadekar and A. Roy, Some theorems about projective modules over polynomial rings, J. Algebra
86 (1984) 150-158.
[5] W. Bruns and J. Gubeladze, Polytopes, Rings and K-Theory, Springer Monographs in Mathematics, 2009.
[6] A.M. Dhorajia and M.K. Keshari, A note on cancellation of projective modules, J. Pure and Applied
Algebra 216 (2012) 126-129.
[7] Otto Forster, Über die Anzahl der Erzeugenden eines Ideals in einem Noetherschen Ring, Math. Z. 84
(1964) 80-87.
[8] J. Gubeladze, Anderson’s conjecture and the maximal class of monoid over which projective modules are
free, Math. USSR-Sb. 63 (1988), 165-188.
11
[9] J. Gubeladze, Classical algebraic K-theory of monoid algebras, Lect. Notes Math. 1437 (1990), Springer,
36-94.
[10] J. Gubeladze, The elementary action on unimodular rows over a monoid ring, J. Algebra 148 (1992)
135-161.
[11] J. Gubeladze, K-Theory of affine toric varieties, Homology, Homotopy and Appl. 1 (1999) 135-145.
[12] M.C. Kang, Projective modules over some polynomial rings, J. Algebra 59 (1979) 65-76.
[13] H. Lindel, Unimodular elements in projective modules, J. Algebra 172 (1995) no-2, 301-319.
[14] B. Plumstead, The conjectures of Eisenbud and Evans, Amer. J. Math. 105 (1983) 1417-1433.
[15] D. Popescu. On a question of Quillen, Bull. Math. Soc. Sci. Math. Roumanie (N.S.) 45 (93) no. 3-4,
(2002) 209-212.
[16] D. Quillen. Projective modules over polynomial rings, Invent. Math. 36 (1976), 167-171.
[17] A. Roy, Application of patching diagrams to some questions about projective modules, J. Pure Appl.
Algebra 24 (1982), no. 3, 313-319.
[18] H.P. Sarwar, Some results about projective modules over monoid algebras, to appear in Communications
in Algebra.
[19] G. Schabhüser, Cancellation properties of projective modules over monoid rings, Universitt Münster,
Mathematisches Institut, Münster, (1991) iv+86 pp.
[20] J.P. Serre, Sur les modules projectifs, Sem. Dubreil-Pisot 14 (1960-61) 1-16.
[21] A.A. Suslin, Projective modules over polynomial rings are free, Sov. Math. Dokl. 17 (1976), 1160-1164.
[22] R.G. Swan, The number of generators of a module, Math. Z. 102 (1967), 318-322.
[23] R.G Swan, Gubeladze proof of Anderson’s conjecture, Contemp. Math 124 (1992), 215-250.
12
| 0math.AC
|
Paradigm and Paradox in Topology Control of Power Grids
Shuai Wang & John Baillieul
arXiv:1803.05852v2 [cs.SY] 16 Mar 2018
Abstract
Corrective Transmission Switching can be used by the grid operator to relieve line overloading and voltage violations,
improve system reliability, and reduce system losses. Power grid optimization by means of line switching is typically formulated
as a mixed integer programming problem (MIP). Such problems are known to be computationally intractable, and accordingly,
a number of heuristic approaches to grid topology reconfiguration have been proposed in the power systems literature. By
means of some low order examples (3-bus systems), it is shown that within a reasonably large class of “greedy” heuristics,
none can be found that perform better than the others across all grid topologies. Despite this cautionary tale, statistical evidence
based on a large number of simulations using using IEEE 118- bus systems indicates that among three heuristics, a globally
greedy heuristic is the most computationally intensive, but has the best chance of reducing generation costs while enforcing
N-1 connectivity. It is argued that, among all iterative methods, the locally optimal switches at each stage have a better chance
in not only approximating a global optimal solution but also greatly limiting the number of lines that are switched.
I. I NTRODUCTION
Power grid control by means of transmission line switching has been the focus of research since the 1980s [4], [5] in the
hope of taking advantage of its fast time constants in changing the system state to reduce losses and improve grid security.
After the adoption of energy deregulation in the 1990s, a good deal of effort in the study of power markets has been focused
on the co-optimization of generation unit commitment and transmission line switching when congestion occurs.
A standard and widely adopted approach to modeling topology reconfiguration uses binary variables to indicate the status
of candidate lines (in or out of service) in a mixed integer programming (MIP) formulation [8]. To address the complexity
caused by the NP-hardness of MIP, most of recent work focuses on developing fast heuristic algorithms. References [9],
[10], [11], [12], [13] show the effectiveness of heuristics co-optimizing the generation and the network topology through
simulations on the IEEE 118-bus system and the the WECC 179-bus system, and the running time records of such heuristics
have been consistently set and then shattered. At the same time, the quest for firmer theoretical foundations of the heuristic
approaches continues. References [6] and [7], for instance, show that in a voltage-controlled or current-controlled DC circuit,
the sign of the overall I 2 R congestion change is always predictable. Unfortunately, the magnitude of change can only be
determined by solving Kirchhoff equations.
Some NP-complete or NP-hard problems may admit efficient heuristics in practice as long as their inputs meet certain
criteria. For example, there is a pseudo-polynomial time algorithm using dynamic programming for the knapsack problem if
the inputs are of relatively small magnitude [2], and the Fincke and Pohst algorithm [3] is suitable for solving integer
programming with pseudo continuous inputs, etc. There are, however, no such algorithms for general MIP problems,
indicating a strong form of NP-hardness for MIP.
The present paper examines fundamental challenges associated with heuristics for topology reconfiguration of power grids.
The paper is organized as follows. We begin the discussion in the next section by explicitly showing the NP-hardness of
topology control with a simple proof. In Section III, we explore a list of paradoxical behaviors associated with greedy
heuristics for topology control, and describe examples showing that many plausible heuristic approaches fail to achieve
acceptable grid operation. In particular, we define the concepts of commutativity which is the ease of creating an optimal
sequence of operations out of optimal sub-sequences, and monotonicity which is the possibility of continued step-wise
improvement on the effects of previous operations, and consistency which is the ease of obtaining better operation by
increasing the computational complexity. Simulation results in Section IV indicate that the shortcomings of heuristics pointed
out in Section III are statistically insignificant across a wide range of power grids that are frequently studied in the power
systems literature. The section ends with a theoretical justification in supporting the value of greedy heuristic in topology
control. Concluding remarks are contained in Section V.
II. T HE NP- HARDNESS OF T OPOLOGY C ONTROL
Mathematically, the DC model of power flow is equivalent to a current driven network, where power injections are
equivalent to current sources; power flowing through lines is equivalent to current through edges, etc. See Table 1.
Reference [7] approaches the topology control problem by combining graph theory and Kirchhoff laws. The work in [7]
shows that disconnecting a resistance edge in a current driven network always increases the total I 2 R congestion of the
Shuai Wang is with the Division of Systems Engineering and John Baillieul is with the Departments of Mechanical Engineering; Electrical and
Computer Engineering, and the Division of Systems Engineering at Boston University, Boston, MA 02115. Corresponding author is John Baillieul (Email:
[email protected]).
The authors gratefully acknowledge support of NSF EFRI grant number 1038230.
1
network. In other words, the new circuit network obtained after line switching has fewer edges but has higher overall I 2 R
congestion.
network potential injection
admittance
equation
circuit voltage V current I conductance G I = GV
grid
phase θ power P susceptance B P = Bθ
Table 1: The equivalence between a current driven circuit and a transmission grid.
By the equivalence between the current-controlled circuits and DC power flow models of transmission grids, we know
the total real f 2 /B (squared line flow over line susceptance) of the transmission network must be increased after switching
off a transmission line. Defining f 2 /B as the squared line flow limit over line susceptance, we find that the total f 2 /B
capacity must strictly decrease after disconnecting a line. This means that the total f 2 /B stability margin, the difference
between the total f 2 /B capacities and actual real f 2 /B, must be decreased after each step switching out lines. This also
suggests a good rule of thumb of line switching in transmission networks: do not switch out lines in a congested network
with relatively low f 2 /B stability margin on those uncongested lines. But what if we are dealing with a congested network
with high capacity margin on uncongested lines?
Topology control is typically formulated as a mixed integer programming (MIP) problem [8]. Although the common
wisdom is that many MIP problems are NP-hard and some of them don’t even have pseudo-polynomial time solutions, an
explicit proof of the NP-hardness of topology control, to the best of our knowledge, is somehow lacking in the literature.
Thus, we start the discussion by answering this question by proving the following.
Proposition 1: Given the capacity of each line and the net power injection/withdrawal of each bus in an arbitrary DC
model of a power network, the topology control problem is NP-complete.
Proof: First we know that the feasibility problem of topology control is NP because we can verify in polynomial time
whether an instance is a feasible solution. The verification involves two steps. The first is to calculte the new line flows by
solving the updated OPF problem. Next, we check whether line congestions still exist. Clearly, both steps can be done in
polynomial time.
The second part of the proof involves a reduction from an arbitrary instance of an NP complete problem to an instance
of the topology control problem.
Here, we use the well known subset sum problem for the reduction. The subset sub problem is this: given a set of numbers,
is there a non-empty subset whose sum is zero? For instance, given the set {−1, −2, −3, 4, 8}, the answer is yes because
the subset {−1, −3, 4} sums to zero. The problem is known to be NP-complete [1]. We take an instance of the subset sum
problem and reduce it to a topology control instance that has a feasible solution if and only if the subset sum problem has
a non-empty subset whose sum is zero.
Let X = {x1 , ..., xm , y1 , ..., yn } (xi > 0, i = 1, ..., m and yj < 0, j = 1, ..., n) be an instance of the subset sum problem.
We then can reduce it to the topology control problem shown in Fig. 1.
Bus 1
x1
Bus 2
. ..
~
xm
Main Source
-y1
Line L1
. ..
Line L2
-yn
Bus 3
Bus 4
Load = 2MW
Fig. 1.
An instance of topology control problem.
In Fig. 1, we assume that the susceptances of vertical lines are {x1 , ..., xm } (xi > 0, i = 1, ..., m) and {−y1 , ..., −yn }
(yj < 0, j = 1, ..., n), respectively. All other lines are assumed to be of same susceptance. In addition, the line capacities
of the lowest two lines {L1 , L2 } are both 1 M W , and we assume the line capacities of other lines are all large enough. To
2
satisfy the 2 M W demand of the lower bus, we must balance the susceptance of the left group of lines {x1 , ..., xm } with
that of the right group of lines {−y1 , ..., −yn } . Then we see that the topology control instance has a feasible solution if
and only if the subset sum problem {x1 , ..., xm , y1 , ..., yn } has a non-empty subset whose sum is zero.
III. PARADOX OF T OPOLOGY C ONTROL
Proposition 1 is not surprising as most integer programming is NP-hard. The NP-hardness naturally leads researchers
to think about possible heuristic methods. In recent years there has been a significant interest in developing heuristics to
co-optimize network topology and generation [10], [11], [12], [13]. For example, the work reported in [11] finds topology
improvements by iteratively solving the linear programming (LP) formulation of the DC optimal power flow (DCOPF) by
means of a heuristic algorithm that disconnects the one unprofitable line per iteration while enforcing a relaxed form of
N-1 reliability. Such a heuristic approach is one way of avoiding the severe computational complexity of the line switching
problems, and makes the real time topology control possible. The NP-hardness of the problem, however, makes optimality
not guaranteed by any heuristic, and we are led to a set of interesting paradoxical phenomena.
We focus our attention on several iterative greedy heuristics in which the main idea is to disconnect/connect the line(s)
that can reduce the cost most in each iteration. We show paradoxical behaviors associated with the heuristics by using some
simple 3-bus power system examples.
A. Non-commutativity
The first paradoxical behavior is that the most beneficial single line may not be included in the most beneficial pair of
lines or the most beneficial set of n (n > 2) lines. We call this the non-commutativity property of the topology control
problem. This problem can be easily illustrated as follows.
Bus 1
~
$10/MW
Line L1
|Flow|≤10MW
Bus 2
Line L3
|Flow|≤1MW
Line L2
|Flow|≤10MW
Line L4
|Flow|≤1MW
Line L5
|Flow|≤10MW
Load = 15MW
Fig. 2.
~
Bus 3
$80/MW
The example of non-commutativity problem.
In Fig. 2, there are two generators with the cheap one on bus 1 and the expensive one on bus 3 and a 15MW demand on
bus 3. We assume that all transmission lines have the same susceptance, and the line capacities range from 1MW to 10MW
as marked in the figure. The original cost before applying topology control is $710 with the cheap generator supplying
7MW and the expensive generator supplying 8MW.
If we remove the most beneficial single line per iteration, then we will remove the line L1 and the cost will be $500
with the cheap generator supplying 10MW and the expensive generator supplying 5MW. The algorithm will stop here as
we can’t further reduce the cost by removing another line. However, if we are allowed to remove the most beneficial pair
of lines per iteration, then we will keep L1 connected and instead remove the line L3 and L4 together and the cost will be
$150 which actually equals the cost of unconstrained optimal power flow.
B. Non-monotonicity
The second paradoxical behavior is that one line which was removed earlier may be reconnected later because keeping it
switched off is no longer beneficial. We call this the non-monotonicity property of the topology control problem.
This problem is illustrated in Fig. 3 which shows a power system with the cheapest generator on bus 2, a slightly more
expensive generator on bus 1, and the most expensive generator on bus 3. We assume that the susceptance of the horizontal
3
Bus 1
~
$20/MW
Line L1 B1 =∞
|Flow|≤100MW
Line L4 B
|Flow|≤10MW
Line L5 B
|Flow|≤10MW
Line L3 B
|Flow|≤2MW
Line L6 B
|Flow|≤10MW
~
$10/MW
Bus 2
Line L2 B
|Flow|≤1MW
Fig. 3.
~
Load = 100MW
Bus 3
$80/MW
The example of non-monotonicity.
transmission line is large enough and all other lines are of the same but limited susceptance. There is a demand of 100MW
on bus 3 and the line capacities range from 1MW to 100MW as marked in the figure. The original cost before applying
topology control is $7650 with the cheapest generator supplying 5MW and the most expensive generator supplying 95MW.
Suppose we can either remove or connect the most beneficial single line per iteration, then we will remove the line L1
first, line L2 second, and line L3 third. In the fourth iteration, however, we find that having L1 out of service is no longer
beneficial and we can reduce the cost by reconnecting L1. After the reconnecting, the cost would be $5900 with the cheapest
generator supplying 30MW and the most expensive generator supplying 70MW. The algorithm will stop here as we can’t
further reduce the cost by removing or reconnecting another line.
C. Non-consistency
The third example illustrated in in Fig. 4 shows that an algorithm that only allows removal of one line per iteration
may outperform another algorithm that allows to either remove or reconnect one line per iteration. We call this the nonconsistency property of the topology control problem. This shows that the increased computational complexity sometimes
is not compensated by lower generation cost.
~
Line L4 B
|Flow|≤10MW
Line L5 B
|Flow|≤10MW
Line L3 B
|Flow|≤3MW
Line L6 B
|Flow|≤15.5MW
Line L2 B
|Flow|≤1MW
Line L7 B
|Flow|≤35MW
Load = 100MW
Fig. 4.
~
Line L1 B1 =∞
|Flow|≤100MW
~
Bus 1
$20/MW
$10/MW
Bus 2
Bus 3
$80/MW
The first example of non-consistency problem.
Fig. 4 shows a power system with the cheapest generator on bus 2, and the mid-cost generator on bus 1, and the most
expensive generator on bus 3. We assume that the susceptance of the horizontal transmission line is large enough and all
other lines are of the same but limited susceptance. There is a demand of 100MW on bus 3 and the line capacities range
from 1MW to 100MW as marked in the figure. The OPF with all lines in service is $7580 with the cheapest generator
supplying 6MW and the most expensive generator supplying 94MW.
4
Algorithm (1) (only allowing removal of one line per iteration) will remove line L1 first, line L2 second, line L3 third,
line L5 fourth, and line L6 last. The final cost will be $4950 and with the cheapest generator supplying 35MW, and the
mid-cost generator supplying 10MW, and the most expensive generator supplying 55MW.
Algorithm (2) (allowing to either remove or reconnect one line per iteration) will remove line L1 first, line L2 second,
and line L3 third. In the fourth iteration, line L1 will be reconnected and the algorithm stops. The cost will be $5200 with
the cheapest generator supplying 40MW and the most expensive generator supplying 60MW.
As we can see algorithm (1) outperforms algorithm (2).
The fourth example illustrated in Fig. 5 shows another type of non-consistency property: one algorithm that only allows
removal of one line per iteration may outperform another algorithm that allows removal of at most 2 lines line per iteration.
Line L6
B=5S (R=0.2Ω)
|Flow|≤10MW
~
Bus 1
$10/MW
Line L1
B=8S
Line L2
B=1.1S
Line L3
B=1.1S
Line L4
B=5S
Line L5
B=5S
Line L7
B=10S
|Flow|≤10MW
Fig. 5.
~
Load = 100MW
Bus 2
Bus 3
$80/MW
The second example of non-consistency problem.
Fig. 5 shows a power system with the cheap generator on the upper bus and the expensive generator on the lower bus.
We assume that the susceptances of L1 through L7 are 8S, 1.1S, 1.1S, 5S, 5S, 5S and 10S, respectively. There is a demand
of 100MW on the lower bus and the line capacities of L6 and L7 are both 10MW. The line capacities of other lines are
assumed to be sufficiently large. The OPF with all lines in service is $6775 with the cheap generator supplying 17.5MW
and the expensive generator supplying 82.5MW.
Algorithm (1) (only allowing removal of one line per iteration) will remove line L1 first, line L2 second, and line L3
third. The cost will be $6600 with the cheap generator supplying 20MW and the expensive generator supplying 80MW. The
algorithm will stop here as we can’t further reduce the cost by removing another line.
Algorithm (3) (allowing to remove at most two lines per iteration) will remove line L4 and L5 in the first iteration, with
the resulting cost being $6607 with the cheap generator supplying 19.9MW and the expensive generator supplying 80.1MW.
The algorithm will stop here as we can’t further reduce the cost by removing another line or another pair of lines.
As we can see algorithm (1) outperforms algorithm (3).
Mathematically, the Algorithms (1), (2) and (3) described above are of the same level of performance, i.e. no one dominates
another. For a general binary programming problem, only when the search space of one heuristic explicitly contains that
of the other can it declare dominancy. Thus the paradoxical phenomenon, “no ‘guaranteed’ extra return for increased
computational complexity”, can be observed in all types of non-brute-force greedy heuristics. This phenomenon, which
makes the binary programming problem extremely challenging, is visualized in Fig. 6.
IV. PARADIGM OF T OPOLOGY C ONTROL
Section III explicitly discounts the value of increased computational effort of heuristics in reducing the generation cost for
specific grid scenarios. It is natural to ask if the next best thing is true: can the increased computational effort “statistically”
5
Relative performance
(dominancy level)
Brute force
method
Computational complexity
of heuristic
Fig. 6.
Visualization of the paradoxical phenomenon: no extra return for increased computational complexity of heuristics in topology control.
reduce generation costs for a large set of scenarios? The result of our simulations suggests the answer is yes.
A. Test Network Overview
The heuristics were tested on the IEEE 118-bus test system. This test system represents a portion of the Midwestern
US Power System as of December, 1962. The version of the test system employed is available at [14]. The generator cost
information used in the IEEE 118 network is extracted from [15]. The test system consists of 118 buses, 54 generators, and
194 lines, all of which are assumed to be connected in the initial topology.
B. Heuristics Overview
Three heuristics were tested and compared in this section. All of them sequentially disconnect transmission lines until no
further generation costs can be reduced.
To make this a fair comparison, all heuristics only open closed switches and do not close open switches since the Line
Profits Heuristic [11] (described below) cannot compute potential improvements from reconnecting disconnected lines.
1) Random Heuristic: The algorithm is specified in Fig. 7. This heuristic sequentially solves the DCOPFs. In each
iteration, if the DCOPF is feasible, a set of switchable candidate lines is then created. The cardinality of the switchable
set is reduced in each iteration after randomly disconnecting a switchable unprofitable line. In addition, the switchable set
enforces a relaxed form of the “N-1” reliability requirement: at no time is a load or generator bus connected by less than
TWO lines. The heuristic stops when no switchable unprofitable lines can be found.
Step 0
Solve the initial OPF and store solutions.
Initialize the switchable line set.
Step 1
Randomly select a candidate line from the
switchable set and change its status.
Reconnect the disconnected
line and remove it from the
switchable set.
No
Step 2
Solve the updated DCOPF (with one new
line removed) problem.
Store solution and remove
the disconnected line from
the switchable set.
Step 3
Improved
Solution?
Yes
Step 4
Stopping criteria?
Yes
Step 5
Store solution.
Fig. 7.
Flow chart describing general algorithm structure of the Random Heuristic.
No
6
2) Line Profit Heuristic: This heuristic is proposed in [11], and is named after the metric used in the switching criteria.
Its algorithm structure is almost the same as Fig. 7 except for the line switching step (Step 1 in Fig. 7). In the line switching
step, the line profits, fl (πnl − πml ), are computed where fl is the power flow on transmission line l, and πnl − πml are the
locational marginal price (LMP) difference between the two ending buses of line l. The convention is that the flow direction
of line l is from bus m and to bus n. The most unprofitable line (with lowest line profit fl (πnl − πml )), rather than a random
line, is selected as a candidate for opening. Please refer [11] for more details.
3) Standard Greedy Heuristic: The algorithm is specified in Fig. 8. Unlike the Line Profit Heuristic that first sorts the
candidate lines based on their line profits fl (πnl − πml ) and then selects the first line whose removal leads to savings in
the updated DCOPF, the Standard Greedy Heuristic redoes the updated DCOPF for each allowable line removal and then
selects the single line to be removed that leads to maximum savings in each iteration.
Step 0
Solve the initial OPF and store solutions.
Initialize the switchable line set.
Step 1
Calculate the savings for each switchable
line by redoing the DCOPF for each
switchable line.
Step 2
Select the line of maximum savings from
the switchable set and change its status.
Reconnect the disconnected
line and remove it from the
switchable set.
No
Step 3
Solve the updated DCOPF (with one new
line removed) problem.
Store solution and remove
the disconnected line from
the switchable set.
Step 4
Improved
Solution?
Yes
Step 5
Stopping criteria?
No
Yes
Step 6
Store solution.
Fig. 8.
Flow chart describing general algorithm structure of the Random Heuristic.
Clearly, optimality is not guaranteed with any of the heuristics, since the transmission topology is not co-optimized with
power dispatch.
C. Simulation Results and Analysis
To generate the test scenarios for the heuristics, a fixed load is maintained and we perform a Monte Carlo simulation
where the generator costs are randomly varied. The sample size used for the Monte Carlo simulation is 50. The percent
savings rather than the dollar value are the focus of the paper.
Two benchmark cases are used to evaluate the savings of the heuristic: Case one considers the initial topology and line
constraints whose DCOPF sets an upper bound of the total generation costs, and Case two considers the unconstrained case
whose DCOPF provides a lower bound of the generation costs. The cost difference between the two benchmark cases is
called the maximum attainable savings (MAS).
The three heuristics are implemented in MATLAB, using MATPOWER [16] as the DCOPF solver. The performance
comparison among the three heuristic is detailed in Table 2.
heuristic
Random
Line Profit
Greedy
saving/MAS lines disconnected mean effort
0.517 ± 0.092 31.22 ± 6.37
0.193
0.631 ± 0.049 14.53 ± 4.12
0.317
0.672 ± 0.051 10.18 ± 3.98
1
Table 2: Performance comparison.
7
Strictly speaking, the three heuristics are said to be of the same level computational complexity as they need to redo
the DCOPF for each switchable line in the worst case. For example, the Random Heuristic or the Line Profit Heuristic
may, though with very low probability, not be able to find a switchable unprofitable line until after redoing the DCOPF
for each allowable line removal. In general, the Standard Greedy Heuristic, however, costs much more computational effort
than the Random Heuristic and the Line Profit Heuristic especially for a large scale networks. The benefit of the additional
computational effort is the increased switching quality, i.e. higher cost reduction achieved at each stage. In general, the
switching savings in each iteration is the best in Standard Greedy Heuristic, the worst in the Random Heuristic and better
in Line Profit Heuristic. Unlike the paradoxical behaviors for specific scenarios, the better switching quality accumulated in
each iteration does lead to more average saving for a set of test scenarios as shown in Table 2, which may outweigh the
extra computational cost.
It is natural to expect one heuristic may save more if it disconnects more lines. What seems counterintuitive is that,
on average, the Standard Greedy Heuristic not only attains maximum savings but also disconnects the fewest lines. This,
however, can be well explained by the work in [7] and [17].
Theorem 1: [7] For an arbitrary current-controlled circuit (a circuit network that is comprised purely of current sources
and resistors), the total I 2 R losses of the network must increase after removing an arbitrary resistance link.
Theorem 2: [17] The increase of total I 2 R loss, ∆P , resulting from the removal of a resistor link with endpoint pair
0
{m, n} from a current-controlled circuit is given by |∆P | = |Imn Vmn |, where Imn denotes the current flowing on the link
0
before its removal, and Vmn denotes the voltage difference between node pair {m, n} after its removal.
Recalling the equivalence between the current-controlled circuits and DC power flow models of transmission grids shown
in Table 1, Theorem 1 tells us that the new transmission network obtained after line switching is of fewer lines but higher
total real f 2 /B (squared line flow over line susceptance) congestion. Theorem 2 quantifies the increase of the I 2 R losses of
a circuit due to a disconnected resistor by using the product of two electrical parameters associated with that disconnected
resistor. In the DC power flow models of transmission grids, it is equivalent to say that the increase of total real f 2 /B of a
transmission grid due to one line removal is given by the product of the power flowing through that transmission line flow
before its removal and the phase difference between its ending buses after its removal.
One profitable switching that can greatly reduce the generation cost usually significantly redistributes the power flowing
across the network. Such effect is unlikely to be obtained by switching a transmission line with relatively small pre-removal
line flow and post-removal phase difference between its ending buses. Since the Standard Greedy Heuristic always executes
the line removal leading to maximum savings in each iteration, it is reasonable to expect that the average change of of total
real f 2 /B in each iteration of the Standard Greedy Heuristic is usually larger than that of the Random Heuristic and Line
Profit Heuristic. The combination of the above result together with the ever decreasing total f 2 /B capacity due to fewer
lines in service explain the superior performance of the Standard Greedy Heuristic: not only better approximating the global
optimal solution but also better enforcing network connectivity.
V. C ONCLUSION
In spite of the seemingly promising simulation results of the heuristic approaches pursued by the research community
and a certain level of proven predictability [6], [7], [17] of topology control, satisfactory grid-scale solutions are everelusive. The cautionary tales associated with our non-commutativity, non-monotonicity, and non-consistency paradoxes leads
us to wonder whether other paradox – possibly more problematic – may associated with as yet untried heuristics. While
optimality for NP-hard problems is not obtained, our simulation results on a set of iterative heuristics nevertheless offer
some justification that, with similar searching space, a greedy heuristic has a better chance in reducing generation cost
and enforcing connectivity. Future work will be focused on further simplifying the problem by developing fast partition
algorithms for the decomposition approach [18]. Adaptability of the decomposition with respect to various types (traditional
& renewable) of generators will also be the subject of future work.
R EFERENCES
[1] Murty, K.G. and Kabadi, S.N., (1987). Some NP-complete problems in quadratic and nonlinear programming. Mathematical programming, 39(2),
pp.117-129.
[2] Kellerer, H., Pferschy, U. and Pisinger, D., 2004. Introduction to NP-Completeness of knapsack problems (pp. 483-493). Springer Berlin Heidelberg.
[3] Fincke, U. and Pohst, M., 1985. Improved methods for calculating vectors of short length in a lattice, including a complexity analysis. Mathematics
of computation, 44(170), pp.463-471.
[4] Koglin, H.J. and Muller, H., 1980, June. Overload reduction through corrective switching actions. In Int. Conf. Power Sys. Monitor. & Contr Vol. 24,
No. 26.
[5] Van Amerongen, R. and Van Meeteren, H.P., 1980. Security control by real power rescheduling network switching and load shedding. Proc. 1980
CTGRE Report 32-02.
[6] Baillieul, J., Zhang, B., and Wang, S. (2015). The Kirchhoff-Braess paradox and its implications for smart microgrids. In Decision and Control (CDC),
2015 IEEE 54th Annual Conference on, pp. 6556-6563. IEEE.
[7] Wang, S., and Baillieul, J. (2016). Kirchhoff-Braess phenomena in DC electric networks. In Decision and Control (CDC), 2016 IEEE 55th Conference
on, pp. 3286-3293. IEEE.
[8] Chen, C.S. and Cho, M.Y., 1993. Energy loss reduction by critical switches. IEEE Transactions on Power Delivery, 8(3), pp.1246-1253.
8
[9] Hedman, K.W., ONeill, R.P., Fisher, E.B. and Oren, S.S., 2009. Optimal transmission switching with contingency analysis. IEEE Transactions on
Power Systems, 24(3), pp.1577-1586.
[10] Fisher, E. B., O’Neill, R. P., and Ferris, M. C. (2008). Optimal transmission switching. IEEE Transactions on Power Systems, 23(3):13461355
[11] Ruiz, P. A., Foster, J. M., Rudkevich, A., and Caramanis, M. C. (2011). On fast transmission topology control heuristics. In 2011 IEEE Power and
Energy Society General Meeting, pp. 18. IEEE.
[12] Fuller, J. D., Ramasra, R., and Cha, A. (2012). Fast heuristics for transmission-line switching. IEEE Transactions on Power Systems, 27(3):1377-1386
[13] Soroush, M. and Fuller, J. D. (2014). Accuracies of optimal transmission switching heuristics based on dcopf and acopf. IEEE Transactions on Power
Systems, 29(2):924932.
[14] https://www2.ee.washington.edu/research/pstca/pf118/pg tca118bus.htm
[15] Blumsack, S. A., 2006, Network topologies and transmission investment under electric-industry restructuring, Ph.D. dissertation, Eng. Public Pol.,
Carnegie Mellon Univ., Pittsburgh, PA.
[16] Zimmerman, R.D., Murillo-Snchez, C.E. and Thomas, R.J., 2011. MATPOWER: Steady-state operations, planning, and analysis tools for power
systems research and education. IEEE Transactions on power systems, 26(1), pp.12-19.
[17] Wang, S. and Baillieul, J., 2017. A Novel Decomposition for Control of DC Circuits and Grid Models with Heterogeneous Energy Sources, arXiv
preprint arXiv:1709.07569, accepted to the American Control Conference (ACC), 2018.
[18] Wang, S. and Baillieul, J., 2018. Power Grid Decomposition Based on Vertex Cut Sets and Its Applications to Topology Control and Power Trading,
arXiv preprint arXiv:1803.05860.
| 3cs.SY
|
Understanding Negations in Information Processing:
Learning from Replicating Human Behavior
Nicolas Pröllochsa,∗, Stefan Feuerriegela , Dirk Neumanna
arXiv:1704.05356v1 [cs.AI] 18 Apr 2017
a
Chair for Information Systems Research, University of Freiburg, Platz der Alten Synagoge,
79098 Freiburg, Germany
Abstract
Information systems experience an ever-growing volume of unstructured data, particularly in the form of textual materials. This represents a rich source of information from which one can create value for people, organizations and businesses.
For instance, recommender systems can benefit from automatically understanding preferences based on user reviews or social media. However, it is difficult for
computer programs to correctly infer meaning from narrative content. One major
challenge is negations that invert the interpretation of words and sentences. As
a remedy, this paper proposes a novel learning strategy to detect negations: we
apply reinforcement learning to find a policy that replicates the human perception
of negations based on an exogenous response, such as a user rating for reviews.
Our method yields several benefits, as it eliminates the former need for expensive
and subjective manual labeling in an intermediate stage. Moreover, the inferred
policy can be used to derive statistical inferences and implications regarding how
humans process and act on negations.
Keywords:
Unstructured data, information processing, decision-making, natural language
∗
Corresponding author. Mail: [email protected]; Tel: +49 761 203 2395;
Fax: +49 761 203 2416.
Email addresses: [email protected] (Nicolas Pröllochs),
[email protected] (Stefan Feuerriegel),
[email protected] (Dirk Neumann)
processing, reinforcement learning, negations
1. Introduction
When making decisions in their daily lives, humans base their reasoning on
information, while pondering expected outcomes and the importance of individual
arguments. At the same time, they are continuously confronted with novel information of potentially additional value [1]. Psychological theories suggest that,
when processing information, humans constantly categorize and filter for relevant
tid bits [1, 2]. The outcome of this filtering then drives decision-making , which
in turn affects interactions with information technology, personal relationships,
businesses or whole organizations. Information Systems (IS) research [3] thus
strives for insights into how humans interpret and react to information in order
“to understand and improve the ways people create value with information” [4,
p. 20].
Information is increasingly encoded not only in quantitative figures, but also
in qualitative formats, such as textual materials [5]. Common examples from the
digital age include blog entries, posts on social media platforms, user-generated
reviews or negotiations in electronic commerce. These materials predominantly
encompass feedback, comments or reviews, and thus immediately impact the
decision-making processes of individuals and organizations [6, 7]. Rather than
a manual text analysis, a computerized evaluation is generally preferable, as it
can process massive volumes of documents, often in realtime. Recent advances
in information technology render it possible to automatically investigate the influence of qualitative information from narrative language and word-of-mouth –
especially in order to gain an understanding of its content [8]. This, in turn, opens
up novel opportunities for computerized decision support, e. g. question answering
and information retrieval (e. g. [9]). Consequently, understanding decision-making
2
and providing decision support both increasingly rely upon computerized natural
language processing.
The exact interpretation of language is largely impracticable with computer
programs at present. Among the numerous difficulties is the particularly daunting challenge of analyzing negations [10, 11], since their context-dependent nature
hampers bag-of-words approaches for natural language. The latter method considers only word frequencies without looking at the order of words from the beginning
to the end of a document. Such a careful consideration is, however, necessary as
negations occur in various forms; they reverse the meanings of individual words,
but also of phrases or even whole sentences [12]. Thus, one must handle negations
properly in order to achieve an accurate comprehension of texts. The importance
of profound language understanding is demonstrated by the following exemplary
applications:
Recommender Systems. Recommender systems support users by predicting
their rating or preference for a product or service. An increasing number of usergenerated reviews constitutes a compelling source of information [13]. Hence,
recommender systems must accurately classify positive and negative content in
order to interpret the intended opinion contained within reviews [10, 14, 11] or
their credibility [15].
Financial News. Investors in financial markets predominantly base their decision on news when choosing whether to exercise stock ownership. In addition
to quantitative numbers, qualitative information found in news, such as tone
and sentiment, strongly influences stock prices (e. g. [16, 17]). For example,
companies often frame negative news using positive words [18]; therefore, empirical research, investors and automated traders demand the precise processing of
negations.
3
Question Answering Systems. Question answering systems support users with
insights drawn from immense bodies of data. For instance, IBM’s Watson processes millions of medical documents in order to discover potential diseases and
recommends treatments based on symptoms. Similarly, one can automatically
determine software requirements from descriptions. For such applications of information retrieval, it is necessary to distinguish between certainty and beliefs
in natural language by considering negations [19, 20, 9].
Negotiations. Negotiations usually consists of a seesaw of offers and counteroffers, of which most are usually rejected until one is finally accepted. Even
in the digital area, negotiations are based on textual arguments [21] and, in
order for systems to automatically decode outcomes, it is necessary to examine
language correctly [22, 23]. Similarly, this holds for cases in which language helps
to predict deception in human communication [24, 25].
Despite the fact that language offers a rich source of information, its processing
and the underlying decision-making are still subject to ongoing research activities. This includes negation processing, which affects virtually every context or
domain, since neglecting negations can lead to erroneous implications or false interpretations. In the following, we refer to the part of a document whose meaning
is reversed as the negation scope. Identifying negation scopes is difficult as these
are latent, unobservable and – even among experts – highly subjective [12]. In
addition, many machine learning algorithms struggle with this type of problem as
it is virtually impossible to encode with a fixed-length vector while preserving its
order and context [8].
This paper develops a novel method, based on reinforcement learning, for
detecting, understanding and interpreting negations in natural language. This
approach exhibits several favorable features that overcome shortcomings found
in prior works. Among them, reinforcement learning is well suited to learning
4
tasks of varying lengths; that is, it can process sentences of arbitrary complexity
while preserving context and order of information. Furthermore, our approach
eliminates the need for manual labeling of individual words and thus avoids the
detrimental influence of subjectivity and misinterpretation. On the contrary, our
model is solely trained on an exogenous response variable at document level. We
refer to this score as the gold standard, not only because it represents a common
term in text mining, but also to stress that it can reflect any human behavior of
interest. As a result of its learning process, our method adapts to domain-specific
cues or particularities of the given prose.
Our contribution goes beyond the pure algorithmic benefits, since we envision
the goal of understanding human information processing. For this purpose, our
approach essentially learns to replicate human decision-making in order to gain
insights into the workings of the human mind when processing narrative content.
In fact, the reinforcement learning approach is trained based on past decisions.
While the model receives feedback as to how well it matches the human decision, it
does not receive explicit information regarding how to improve accuracy. Rather,
the learner iteratively processes information in textual materials and experiments
with different variants of negation processing in a trial-and-error manner that
imitates human behavior.
Reinforcement learning can considerably advance our understanding of decisionmaking. Indeed, learning itself has long been conceptualized as the process of creating new associations between stimuli, actions and outcomes, which then guide
decision-making in the presence of similar stimuli [26]. We thus show how to make
the knowledge of these associations explicit: we propose a framework by which
to study negation scopes that were previously assumed to be latent and unobservable. Contrary to this presumption, we manage to measure their objective
perception. Therefore, we exploit the action-value function inside the reinforce-
5
ment learning model in order draw statistical inferences and derive conclusions
regarding how the human mind processes and acts upon negations. As such, our
approach presents an alternative or supplement to experiments, such as those of
a psychological or neuro-physiological nature (along the lines of NeuroIS).
This paper is structured as follows. Section 2 provides an overview of related
works that investigate human information processing of textual materials, while
also explaining the motivation behind our research objective of understanding
negations in natural language. Subsequently, Section 3 explains how we adapt
reinforcement learning to improve existing methods of negation scope detection.
In Section 4, we demonstrate our novel approach with applications from recommender systems and finance in order to contribute to existing knowledge of
information processing. Finally, Section 5 discusses implications for IS research,
practice and management.
2. Background
This section presents background on natural language processing. First, we
discuss recent advances in computational intelligence and then outline challenges
that arise when working with narrative content. We conclude by briefly reviewing
previous works on the handling of negation in natural language.
2.1. Human Information Processing
Advances in computational intelligence have revolutionized our understanding
of learning processes in the human brain. As a result, research has yielded precise theories regarding the reception of information and function of human memory [26]. For instance, statistical models provide insights into human memory
formation and the dynamics of memory updating, while also validating these theories by replicating experiments with statistical computations [27]. Reinforcement
learning, especially, has gained considerable traction as it mines real experiences
6
with the help of trial-and-error learning to understand decision-making [26]. Accordingly, existing studies find that the brain naturally reduces the dimensionality
of real-world problems to only those dimensions that are relevant for predicting
the outcome [26]. Along these lines, a recent review argues for jointly combining
both perception and learning in order to draw statistical inferences regarding information processing [28]. While the previous reference materials predominantly
address visual perception, the focus of this paper is rather on natural language.
Behavioral theories suggest that human decision-makers seek as much information as possible in order to make an informed decision [29]. In the case of natural
language, researchers have devised advanced methods to study the influence of
textual information on the resulting decision. On the one hand, it is common to
extract specific facts or features from the content and relate these to a decision
variable [14]. On the other hand, information diffusion is also frequently studied
by measuring the overall tone of documents. This latter approach comprises a
variety of different aspects of perception, including negative language, sentiment
and emotions [11, 30, 17].
In the case of natural language, a variety of textual sources have served as
research subjects for studying word-of-mouth communication and information diffusion. For instance, the dissemination of information and sentiment has been empirically tested in social networks [31], revealing that emotionally-charged tweets
are retweeted more often and faster [30]. Similarly, measuring the response to information allows one to test behavioral theories, such as attribution theories or the
negativity bias, by distinguishing between the reaction to positive and negative
content [32, 30].
2.2. Natural Language Processing
Addressing the above research questions on information processing requires
accurate models for understanding and interpreting natural language. However,
7
the majority of such methods only count the occurrences of words (or combinations), resulting in so-called bag-of-words methods. By doing so, these techniques
have a tendency to ignore information relating to the order of words and their
context [8], such as inverted meanings through negations.
Neglecting negations can substantially impair accuracy when studying human
information processing; for example, it is common “to see the framing of negative
news using positive words” [18]. To avoid false attributions, one must identify
and predict negated text fragments precisely, since information is otherwise likely
to be classified erroneously. This holds true not only for negations in information
retrieval [19, 20], but especially when studying sentiment [10, 33]; even simple
heuristics can yield substantial improvements in such cases [34].
2.3. Negation Processing
Previous methods for detecting, handling and interpreting negations can be
grouped into different categories (cf. [35, 36, 20]).
Rule-based approaches are among the most common due to their ease of implementation and solid out-of-the-box performance. In addition, rules have been
found to work effectively across different domains and rarely need fine-tuning [37].
They identify negations based on pre-defined lists of negating cues and then hypothesize a language model which assumes a specific interpretation by the audience. For example, some rules invert the meaning of all words in a sentence,
while others suppose a forward influence of negation cues and thus invert only a
fixed number of subsequent words [38]. Furthermore, a rule-based approach can
also incorporate syntactic information in order to imitate subject and object [39].
However, rules cannot effectively cope with implicit expressions or particular,
domain-specific characteristics.
Machine learning approaches can partially overcome previous shortcomings [20],
such as the difficulty of recognizing implicit negations. Common examples of such
8
methods include generative probabilistic models in the form of Hidden Markov
models and conditional random fields (e. g. [12]). These methods can adapt to
domain-specific language, but require more computational resources and rely upon
ex ante transition probabilities. Although approaches based on unsupervised
learning avoid the need for any labels, practical applications reveal inferior performance compared to supervised approaches [35]. The latter usually depend
on manual labels at a granular level, which are not only costly but suffer from
subjective interpretations [12].
3. Method Development
This section posits the importance of developing a novel method for learning
negation scopes in textual materials. After first formulating a problem statement,
we introduce our approach, which is based on reinforcement learning.
3.1. Rationale and Intuition of Proposed Methodology
Negation scope detection in related research predominantly relies on rule-based
algorithms. Rule-based approaches entail several drawbacks, as the list of negations must be pre-defined and the selection criterion according to which rule a
rule is chosen is usually random or determined via cross validation. Rules aim to
reflect the “ground truth” but fail at actually learning this.
For those seeking to incorporate a learning strategy, a viable alternative exists
in the form of generative probabilistic models (e. g. Hidden Markov models or
conditional random fields [20]). These process narrative language word-by-word
and move between hidden states representing negated and non-negated parts. On
the one hand, unsupervised learning can estimate the models without annotations,
but yields less accurate results overall [35]. On the other hand, supervised learning
offers better performance, but this approach requires a training set with manual
labels for each word (see Figure 1) which are supposed to approximate the latent
9
negation scopes. Such labeling requires extensive manual work and is highly
subjective, thus yielding only fair performance [35, 36]. As a further drawback,
many approaches from supervised machine learning are simply infeasible as they
usually require an input vector of a fixed, pre-defined length without considering
its order. This circumstance thus necessitates a tailored method for dealing with
negations in narrative materials.
Rules
Apply static rule
Corpus
Negation
Scopes
Insert
Information
processing
Insert
Information
processing
Insert
Information
processing
Unsupervised learning
Estimate
Training set
Model
Apply
Negation
scopes
Corpus
Supervised learning
Training set
Label
Word
annotations
Estimate
Model
Apply
Negation
scopes
Corpus
Our method
Corpus
Find optimal policy for negation scopes
Information
processing
Interpret policy
Figure 1: Process chart compares the different stages of labeling, training and applying rules in
order to evaluate information processing.
In contrast to these suboptimal methods, we propose a novel approach to
determining latent negation scopes based on reinforcement learning. It works well
with learning tasks of arbitrary length [40] and is adaptable to domain-specific
features and particularities. Since it relies only upon a gold standard at document
level, it represents a more objective strategy. However, such an approach has
10
been largely overlooked in previous works on natural language processing (see
Section 2).
Reinforcement learning aims at learning a suitable policy directly through
trial-and-error experience. It updates its knowledge episodically and learns the
policy from past experience using only limited feedback in the form of a reward.
This reward indicates the current performance of the classifier, but does not necessarily specify how to improve the policy. In addition, this type of learning can
also handle highly complex sentences and is thus well suited to the given task.
3.2. Learning Task for Negation Detection
Understanding negations and their influence on language is – as previously
mentioned – a non-trivial computational problem, since the underlying learning
task suffers from several undesirable features:
(1) Even though sentences follow grammatical rules, they can be nested up to
arbitrary complexity and thus become arbitrarily long.
(2) Words have a meaning based on their context, which is implicitly established
by their order. By merely rearranging the word order, one can produce a
completely different meaning. This constitutes a dependency according to
which the meaning of words depends, in part, on all other words and their
order in the same document.
(3) Negation scopes affect individual words; however, we lack annotations on a
word-by-word basis. Instead, we only observe a gold standard for the whole
document upon which we must reconstruct negation scopes for each individual
word within the document.
Based on these challenging features, we can formalize the problem, resulting in
the following learning task. Both negation scopes and sentences are of different
11
length Nd depending on the specific document d. This length can theoretically
range from one to infinity. Each word wd,i in document d with i ∈ {1, . . . , Nd }
thus represents an individual classification task, which also depends on all other
words in that document, i. e.
f : (wd,i , [wd,1 , wd,2 , . . . , wd,Nd ]) 7→ {Negated, ¬Negated},
|
{z
}
(1)
Ordered sequence of words
where [wd,1 , wd,2 , . . .] is an ordered list of variable length providing context information.
Each document comes with a single label yd , i. e. the gold standard, which
reflects the response of human decision-making to the text processing. In order
to estimate f , we minimize the expected error (or any other loss-like function)
via the gold standard and the result of a text processing function. The latter
function maps the words as a predictor onto the gold standard. Examples of
text processing functions are functions that measure the accuracy of information
retrieval or sentiment based on the presence of polarity words.
3.3. Reinforcement Learning
Reinforcement learning constructs a suitable policy for negation classification
through trial-and-error experience. That is, it mimics human-like learning and
thus appears well suited to natural language processing. In the following section,
we introduce its key elements and tailor the method to our problem statement.
The overall goal is to train an agent based on a recurrent sequence of interactions. After observing the current state, the agent decides upon an action. Based
on the result of the action, the agent receives immediate feedback via a reward.
It is important to note that the agent aims only to maximize the rewards, but it
never requires pairs of input and the true output (i. e. words and a flag indicating
whether they are negated). This forms a setting in which the agent learns the
latent negation scopes.
12
More formally, the model consists of a finite set of environmental states S
and a finite set of actions A. The agent models the decision-maker by iteratively
interacting with an environment over a sequence of discrete steps and seeks to
maximize the reward over time. Here, the environment is a synonym for the
states and the transition rules between them. At each iteration i, the decisionmaking agent observes a state si ∈ S. Based on the current state si , the agent
picks an action ai ∈ A(si ), where A(si ) ⊆ A is the subset of available actions in
the given state si . Subsequently, the agent receives feedback related to its decision
in the form of a numerical reward ri+1 , after which it moves then moving to the
next state si+1 . The entire process is depicted in Figure 2.
Agent
State
si
Reward
ri
Action
ai
ri+1
si+1
Text Processing
Environment
Figure 2: Interaction between agent and environment in reinforcement learning [40].
In order to build up knowledge, reinforcement learning updates a state-action
function Q(si , ai ), which specifies the expected reward for each possible action ai
in state si . This knowledge can then be used to infer the optimal behavior, i. e.
the policy that maximizes the expected reward from any state. Specifically, the
optimal policy π ∗ (si , ai ) chooses in state si the actions ai that maximizes Q(si , ai ).
Several algorithms have been devised to learn an optimal policy π ∗ , among
which is an approach known as Q-learning [40, 41]. This methods seeks an optimal policy without an explicit model of the environment. In other words, it knows
neither explicitly the reward function nor the state transition function [42]. Instead, it iteratively updates its action-value Q(st , at ) based on past experience [41].
In our case, we use a variant with eligibility traces named Watkin’s Q(λ) due to
13
better convergence; see [40] for details.
3.4. Learning Negation Processing
In this section, we outline how we adapt reinforcement learning to our attempt
to simulate human negation processing. In each iteration, the agent observes the
current state si = (wi , ai−1 ) that we engineer as the combination of the i-th word
wi in a document and the previous action ai−1 . This specification establishes
a recurrent architecture whereby the previous negation can pass on to the next
word.1 At the same time, this allows for nested negations, as a word can first
introduce a negation scope and another subsequent negation can potentially revert
it based on ai−1 = Negated to follow a non-negating action again. In our case, we
incorporate the actual words into the states, while other variants are also possible,
such as using part-of-speech tags or word stems instead. The latter variants work
similarly; however, our tests suggest a lower out-of-sample performance.2
After observing the current state, the agent chooses an action at from of two
possibilities: (1) it can set the current word to negated or (2) it can mark it
as not negated. Hence, we obtain the following set of possible actions A =
{Negated, ¬Negated}. Based on the selected action, the agent receives a reward,
ri which updates the knowledge in the state-action function Q(si , ai ). This stateaction function is then used to infer the best possible action ai in each state si ,
i. e. the optimal policy π ∗ (si , ai ).
Our approach relies upon a text processing function that measures the correlation between a given gold standard at document level (e. g. the author’s rating in
movie reviews) and the content of a document. We later show possible extensions
1
Such a design is common in partially observable Markov decision processes (POMDP for
short) that feature a similar relaxation into so-called belief states [43].
2
By definition, the use of n-grams is not necessary, as the context is implicitly modeled by
the ordered sequence of states and actions.
14
(see Section 5.1), but for now demonstrate only how the tone (or sentiment) in
a document works as a predictor of its exogenous assessment. Examples of such
predicted variables are movie ratings in the case of reviews or stock market returns in the case of financial disclosures. Even though more advanced approaches
from machine learning are possible, we prefer – for reasons of clarity – an approach is based on pre-defined lists of positive and negative terms, Lpos and Lneg .
We then measure the tone Sd in document d as the difference between positively
and negatively opinionated terms divided by the overall number of terms in that
document [11], i. e.
Sd =
|{wi | wi ∈ Lpos }| − |{wi | wi ∈ Lneg }|
.
Nd
(2)
If a term is negated by the policy, the polarity of the corresponding term is
inverted, i. e. positively opinionated terms are counted as negative and vice versa.
Our list of opinionated words originates from the Harvard IV General Inquirer
dictionary which contains 1915 opinionated entries with a positive connotation
and 2291 entries marked as negative.
Let us now demonstrate the learning process via an example, where the agent
processes word-by-word the first document, which consists of “this is a good product”, with gold standard +1 (i. e. positive content). The agent might then, at
random, decide to explore the environment by negating the word “good ”. Upon
reaching the last word, it receives feedback in the form of a zero as there is no
improvement from having negation scopes compared to having none. Thus, the
agent will discard this action in the future. It then processes the second document:
(“this isn’t a good product” with gold standard −1), where it negates all words following “isn’t”. As this inversion now better reflects the gold standard, the agent
receives a positive reward and will apply this rule in the future. Ultimately, the
agent is also able to learn a suitable policy for nested negations, e. g. for the third
document “this product isn’t good but fantastic” with gold standard +1. Based
15
on the current policy, it negates all words following “isn’t” but receives a negative
reward as there is an inferior resulting correlation compared to not incorporating
negations. However, through further exploration, the agent learns that it is beneficial to terminate the negation scope after “but.” Thus, the agent will invert
all words subsequent to “isn’t” and terminate the negation scope subsequent to
“but” if (and potentially only if) the previous state is negated. Table 1 illustrates
an exemplary resulting state-action function for this learning process.
State=(wi , ai−1 )
ai = Negated
ai = ¬Negated
π ∗ (si , ai )
(this, ¬Negated)
3
6
¬Negated
(product, ¬Negated)
1
3
¬Negated
(isn’t, ¬Negated)
5
1
Negated
(good, Negated)
3
1
Negated
(but, Negated)
2
4
¬Negated
(fantastic, ¬Negated)
2
3
¬Negated
Table 1: Exemplary table for the state-action function Q(si , ai ) with recurrent state architecture and actions A = {Negated, ¬Negated}. Each cell contains the expected reward for the
corresponding state-action pairs. The last column shows optimal policy π ∗ (si , ai ) for all states
and actions.
We now specify a reward ri such that it incentivizes the outcome of the text
processing function to match the gold standard. When processing a document,
we cannot actually compute the reward (as not all negations are clear) until we
have processed all words. Therefore, we set the reward before the last word to
almost zero, i. e. ri ≈ 0 for all i = 1, . . . , Nd −1. Upon reaching the final word, the
agent compares the text processing function without any negation to the current
policy π ∗ . The former is defined by the absolute difference between gold standard
yd and tone Sd0 , whereas the latter is defined by the absolute difference between
gold standard yd and the adjusted tone using the current policy Sdπ . Then the
difference between the text processing functions returns the terminal reward rNd .
16
This results in the reward
0,
if ai = Negated and i < Nd ,
ri = c,
if ai = ¬Negated and i < Nd ,
|yd − Sd0 | − |yd − Sdπ | , if i = Nd ,
(3)
with constant c = 0.005 that adds a small reward for default (i. e. non-negating)
actions to avoid overfitting.
At the beginning, we initialize the action-value function Q(s, a), i. e. the current knowledge of the agent, to zero for all states and actions.3 The agent then
successively observes a sequence of words in which it can select between exploring
new actions or taking the current optimal one. This choice is made by ε-greedy
selection according to which the agent explores the environment by selecting a
random action with probability ε or, alternatively, exploits the current knowledge
with probability 1 − ε. In the latter case, the agent chooses the action with the
highest estimated reward for the given policy.4
3.5. Inferences, Understanding and Hypothesis Testing
Our approach features several beneficial characteristics that make inferences
and statistical testing easy. In contrast to black-box approaches in machine learning, we can use the state-action function Q(s, a) to infer rules regarding how the
content is processed because the function reflects the ground truth. For instance,
this state-action function specifically determines which cues introduce explicit or
3
This also controls our default action when encountering unknown states or words in the
out-of-sample dataset. In such cases, the non-negated action is preferred.
4
First, we perform 4000 iterations with a higher exploration rate as given by the following
parameters: exploration ε = 0.1 %, discount factor γ = 0 % and learning rate α = 0.5 %. In a
second phase, we run 1000 iterations for fine-tuning with exploration ε = 0.01 %, discount factor
γ = 0 % and learning rate α = 0.1 %. See [40, 41] for detailed explanations.
17
implicit negations. Additionally, we can gain a metric of confidence about the
rules by comparing the largest reward to all other rewards in a specific state. A
larger discrepancy expresses higher confidence with regard to a certain action.
Applying the policy to out-of-sample documents benchmarks its performance
in comparison to the absence of negation handling. Furthermore, we can study,
for instance, which cues prompt this policy to introduce negation scopes, as well
as their position, size or other characteristics as a basis for statistical testing.
4. Evaluating Negation Processing
This section evaluates our method for replicating human negation processing.
First, we show how policy learning can help to yield a more accurate interpretation
of movie reviews. We then detail the role of negation cues and compare explicit
versus implicit negations. In the next step, we validate the robustness of our
results and introduce a second application scenario which addresses the relevance
of accurate negation handling in financial disclosures.
4.1. Case Study: Recommender System
Recommender systems can benefit greatly from user-generated reviews, which
represent a rich source of information. We thus demonstrate our method using
a common dataset [44] of 5006 movie reviews from the Internet Movie Database
archive (IMDb), each annotated with an overall rating at document level.5 It is
widely accepted that measuring the tone of movie reviews is particularly difficult
because positive movie reviews often mention some unpleasant scenes, while negative reviews, conversely, often detail certain pleasant scenes [45]. Thus, this corpus
5
We
use
the
scaled
dataset
available
from
www.cs.cornell.edu/people/pabo/
movie-review-data/. All reviews are written by four different authors and preprocessed, e. g.
by removing explicit rating indicators [44].
18
appears particularly suitable for a case study since it allows one to examine the
importance of human-like negation processing beyond simple rules. Accordingly,
we use 10-fold cross validation to verify the predictive accuracy.
4.2. Policy Learning for Negation Processing
Shown below are the results from policy learning for negation processing. Table 2 summarizes the main results and we explicate these findings in more depth.
As part of a benchmark, we study the proportion of variance of the gold standard
that is explained by the tone when leaving negations untreated. We observe an
in-sample R2 of 0.0870 and a R2 of 0.0867 in the out-of-sample set. We then
compare this to our approach of policy learning. We perform 5000 learning iterations, thereby yielding significant improvements: the in-sample R2 increases by
158.94 %, leading to an overall R2 of 0.2233. Similarly, we see a rise by 58.94 % to
a R2 of 0.1378 in the out-of-sample set. A better handling of negations thus contributes to more accurate text processing (we later perform additional robustness
checks; see Section 4.5).
R2
(no negation handling)
R2
(with negation policy)
In-sample set
0.0870
0.2233
158.94
Out-of-sample set
0.0867
0.1378
58.94
Improvement
(in %)
Table 2: Comparison of gold standard variance explained by the tone. Figures are reported
for both the in-sample and out-of-sample sets using 10-fold cross validation after 5000 learning
iterations.
We now provide descriptive statistics of negation scopes in order to gain further
insights (Table 3). For this purpose, we apply the learned policy to the out-ofsample documents and record its effects. In the first place, the policy negates a
large share (38.11 %) of opinionated words, i. e. words that convey a positive or
negative polarity. On average, each document contains 75.18 separate negation
19
scopes of different size and extent, all of which invert opinion words. For example,
the length of the corresponding negation scopes, i. e. sequences that are uniformly
negated, is unevenly distributed and ranges from 1 to 18 words, whereas the
average length of each scope is 1.74 words. 75.46 % of all negation scopes consist
of only a single word, while 24.53 % encompass two or more words.
Minimum length of negation scopes
1
Maximum length of negation scopes
18
Mean length of negation scopes
1.74
Share of negation scopes with ≤ 1 word
75.46 %
Share of negation scopes with ≥ 2 word
24.53 %
Share of negated polarity words
38.11 %
Mean number of negation scopes per document
75.18
Table 3: Descriptive statistics on the out-of-sample set after applying the in-sample policy.
4.3. Negation Cues
Negation scopes are typically initiated by specific cues that invert the meaning
of surrounding words. These negation cues can be grouped in two categories. On
the one hand, a negation cue can be explicit, such as not in the sentence, “This
is not a terrible movie”. On the other hand, negations can also flip the meaning
of sentences implicitly, e. g. “The actor did a great job in his last movie; it was
the first and last time”.
Given this understanding, we investigate individual effects of explicit and implicit negations on text reception. For this purpose, we group the words that
initiate a negation scope according to their part-of-speech tag and depict in Figure 3 the resulting share of negation cues by word class. Here, the last bar relies
on a list of explicit negations as proposed by [34]. We thus find evidence that a
major share of negations (4 out of 8, i. e. 50.00 %) are evoked by explicit cues,
while the remainder originate from implicit negations.
20
Share of Negated Words in %
80.00
60.00
50.00
40.00
20.00
9.50
17.59
14.73
0.00
0.00
Adjective
Adverb
Conjunction
Implicit Negations
5.76
Noun
Verb
Negation
Explicit Negations
Figure 3: Negation cues per word class based on policy learned after 5000 iterations.
We now provide additional descriptions of the appearance of implicit negations. For instance, we frequently observe words such as fairly or hopefully as
part of implicit negation cues, which often transform a positive statement into a
negative one, e. g. “Hopefully, the movie is better next time”. Contrary to our
prior expectations, conjunctions seem unlikely to initiate a negation scope, but
are often accountable for double negations. Here, words such as but and nor frequently revert the meaning of negated words, i. e. terminate the negation scope,
as in the sentence, “The movie is not great but absolutely unmissable”.
Table 4 provides statistics for all explicit negation cues based on [34].6 Their
frequency in the documents differs considerably, while some cues also involve a
larger negation scope than others. For example, the negation word not negates
1.60 subsequent words on average, whereas this figure stands at 1.92 for the term
without. Based on the Q-value, we assess their strength, i. e. a larger value
6
Here, we divide the corpus into two subsets: an in-sample set of 4005 reviews which we
use to learn the agent, and (b) an out-of-sample set with the remaining 1001 documents to test
implications. We exclude the use of cross validation since we desire a single model with which
can perform statistical analyses.
21
indicates a higher reward from negating. We can also gain confidence in negations
by comparing the gap between the highest and second highest Q-value of each
word. Interestingly, several words that were previously considered negation cues
do not negate surrounding words in our case, namely, barely, less, hardly and
rarely.
Word
Negating Action
Q-Value
Confidence (Difference
to Second Best Policy)
Occurrences
Mean Length
of Negation Scope
not
3
0.0700
0.0456
1941
1.60
no
3
0.0696
0.0491
699
1.71
never
3
0.0680
0.0367
398
1.67
without
3
0.0779
0.0419
249
1.92
barely
7
–
–
–
–
less
7
–
–
–
–
hardly
7
–
–
–
–
rarely
7
–
–
–
–
Table 4: Explicit negation words from [34] according to policy learned after 5000 iterations.
This provides evidence that static negation lists are generally inadequate in
mimicking human perception. Even though explicit negations can be recognized
with predefined lists of cues, implicit ones are often hidden and difficult to identify
algorithmically. As a remedy to this shortcoming, our approach is capable of
learning both kinds of negations and can handle them accordingly.
4.4. Behavioral Implications of Negation Processing
Policy learning is also a valuable tool for analyzing behavioral implications.
In this section, we demonstrate potential policy learning applications that allow
for the testing of certain hypotheses regarding human information processing of
natural language.
As an example, our method allows one to test the hypothesis whether negations
appear evenly throughout different parts of narrative content. Such a test is not
tractable for rules or supervised learning with intermediate labeling, since these
22
introduce a subjective choice of negation cues, rules or labels; however, our method
infers a negation policy model from an exogenous response variable. Hence, we
can evaluate where authors place negations when composing reviews, i. e. do they
generally introduce negative aspects in the beginning or rather at the end? We
thus compare the frequency of negations (as a proxy for negativity) across different
parts of documents in the corpus. Let µ1 denote the mean of negated words in
the first half and µ2 in the second half of a document or sentence, respectively.
We can then test a null hypothesis H0 : µ1 = µ2 to infer behavioral implications.
As a result, we find that the second half of an out-of-sample document contains
1.38 % more negations than its first half on average. This difference is statistically
significant at even the 0.1 % significance level when performing a two-sided Welch
t-test. It also coincides with psychological research according to which senders
of information are more likely to place negative content at the end [46]; however,
we can provide evidence outside of a laboratory setting by utilizing human information behavior in a real-life environment. Furthermore, the share of negated
words also varies across different segments of sentences. However, at this level,
the effect tends in the opposite direction as the first half of a sentence in the
out-of-sample contains 0.09 % more negations than the second half. The latter is
also statistically significant at the 0.1 % level.
4.5. Robustness Checks
We investigate the convergence of the reinforcement learning process to a stationary policy. Accordingly, Figure 4 visualizes the proportion of variance of the
gold standard that is explained by the tone for the first 5000 learning iterations.
Here, the horizontal lines denote the explained variance in the benchmark setting
(i. e. no negation handling). Both the in-sample and out-of-sample R2 improve
relatively quickly and outperform the benchmark considerably. In the end, we
use our above policy based on 4000 iterations, since the next 1000 iterations con23
sistently show fluctuations below 0.05 % in terms of in-sample R2 . This pattern
indicates a fairly stationary outcome.
0.20
R2
0.15
Benchmark (no negation handling)
0.10
0.05
Explained variance (in−sample)
0.00
Explained variance (out−of−sample)
1000
2000
3000
Iteration
0
4000
5000
Figure 4: The fluctuating series show the converging explained variance of user ratings based
on tone (i. e. sentiment) across different learning iterations using 10-fold cross validation, while
the uniform lines shows it after smoothing. Here, the dark gray series corresponds to the insample set, whereas the light gray series corresponds to the out-of-sample set. The horizontal
line denotes the R2 in the benchmark setting (without handling negations).
Next, we compare the performance of our reinforcement learning approach to
common rules proposed in the literature [38, 37], which essentially try to imitate
the grammatical structure of a sentence. For this purpose, the negation rules
search for the occurrence of specific cues based on pre-defined lists and then
invert the meaning of a fixed number of surrounding words. Hence, we apply the
individual rules to each document and again compare the out-of-sample R2 ; see
Table 5 for results. Negating a fixed window of the next 4 words achieves the
highest fit among all rules similar to [47]. This rule exceeds the benchmark with
no negation handling by 10.84 %. Most importantly, our approach works even
more accurately, and dominates all of the rules, outperforming them by at least
43.39 %.
24
Approach
Correlation
Benchmark: no negation handling
0.0867
Negating all subsequent words
0.0840
Negating the whole sentence
0.0661
Negating a fixed window of 1 word
0.0918
Negating a fixed window of 2 words
0.0948
Negating a fixed window of 3 words
0.0953
Negating a fixed window of 4 words
0.0962
Negating a fixed window of 5 words
0.0961
Our approach (based on reinforcement learning)
0.1378
Table 5: Table compares the out-of-sample R2 (using 10-fold cross validation) of our approach
and different rules from previous literature.
Finally, we evaluated further setups and methods for handling negations. We
first tested alternative action sets for reinforcement learning that not only negate
single words but also whole phrases, including backward negations. However,
this configuration leads to inferior R2 values on both the in-sample and out-ofsample set. We also explored other dictionaries of opinionated words and the
performance of generative probabilistic models. Here, we find similar results for
alternative dictionaries but inferior results for generative probabilistic models. All
results confirm our findings.7
4.6. Comparison with Negation Processing in Financial News
Our second case study investigates information processing in financial markets by analyzing how qualitative content in financial disclosures influences stock
prices. For this purpose, we use 14,463 regulated ad hoc announcements8 from
European companies, all of which are written in English. These entail several
advantages; for example, ad hoc announcements must be authorized by company
7
8
Available on request.
Kindly provided by the Deutsche Gesellschaft für Ad-Hoc-Publizität (DGAP).
25
executives, their content is largely quality-checked by federal authorities and previous evidence finds a strong relationship between content and subsequent stock
market reaction [48]. As our gold standard, we calculate the daily abnormal return of the corresponding stock [49, 50]. We measure the tone in these disclosures
with the help of a finance-specific dictionary, the Loughran and McDonald dictionary [18]. This dictionary contains 354 entries with positive polarity, as well as
2350 entries marked as negative.
As detailed below, we derive a policy for negation processing and briefly introduce our main findings. Again, our reinforcement learning approach improves
the link between tone and market response. Our benchmark without negation
handling yields an out-of-sample R2 of 0.0042, while our method increases this by
37.02 %, resulting in an out-of-sample R2 for 10-fold cross validation of 0.0057.
Both the absolute R2 and its improvements are – as expected – higher for movie
reviews; this is a domain-specific disparity since “very few control variables predict
next-day returns” in efficient markets [51].
Next, we apply the learned policy to the out-of-sample documents and record
its effects. Interestingly, we find that negations are less frequent in financial news.
On average, each document contains 5.30 separate negation scopes that invert
10.88 % of all opinion words. The length of the corresponding negation scopes
is shorter, ranging from 1 to 14 words with an average length of 1.60 words.
Similarly, to the results for the movie reviews, we find that the end of a document
is more likely to contain negations than the beginning. On average, the second
half of an out-of-sample announcement contains 6.45 % more negation that its
first half. It is noteworthy that this difference is significant at the 10 % level using
a two-sided Welch t-test. This might suggest that authors of financial disclosures
utilize negations as a tool to convey negative information through positive words.
Overall, the results show that negations are domain-specific and depend on the
26
particularities of the chosen prose. Additionally, the comparison strongly affirms
that negation handling enhances the understanding of information processing for
natural language of an arbitrary domain.
5. Discussion
In the following sections, we discuss the implications of our research, as our
method not only improves text comprehension, but also suggests a new approach
to understanding decision-making in the social and behavioral sciences. Furthermore, our research is highly relevant for practitioners when extending information
systems with interfaces for natural language.
5.1. Extensibility
Our method of negation learning is not limited to the study of tone or sentiment; on the contrary, one can easily adapt it to all applications of natural
language processing which utilize a gold standard and where negations play an
important role. To accomplish this, one replaces the function calculating the sentiment with a corresponding counterpart that maps words onto a gold standard
for the given application. Our only requirement is that this function takes into
consideration – in some way – whether each word is negated or not.
To better illustrate this concept, we briefly describe how this works using
two examples. We first consider a medical question-answering system into which
users enter their symptoms and, in return, are provided a list of potential illnesses. The system bases its answers on a collection of medical reports and one
measures its performance by counting the number of correctly retrieved answers
relative to the given input. For example, the system should return “fever” for
input “flu” when the corpus contains “a flu causes fever”. Reinforcement learning can improve accuracy in the presence of negations; i. e. it learns that diseases
can also be unrelated to symptoms, as in the statement, “A flu does not result
27
in high blood pressure”. As a second example, we assume an information system
for negotiations that proposes offers to customers, who then reply in natural language. Subsequently, the information system automatically determines whether
a customer’s response was positive or negative based on its content. A naı̈ve
bag-of-words model considers only specific cues (such as accept without context),
whereas our approach can even learn to correctly classify cases with negations,
e. g. by appending the prefix “not ” to words that are negated [33].
We now generalize the reward function in order to search for an optimal negation policy for the above applications. For each document d with gold standard
yd , we calculate the predictive performance perf 0d that should forecast the gold
standard negation handling, as well as perf πd using the current policy π. The agent
then gains a reward
0,
if ai = Negated and i < Nd ,
ri = c,
if ai = ¬Negated and i < Nd ,
yd − perf 0d − |yd − perf πd | , if i = Nd
(4)
with a suitable constant c. The first two cases add a small reward c for default
(i. e. non-negating) actions to avoid overfitting, while the last case rewards how
much better the current policy approximates the gold standard compared to no
treatment of negations. This definition thus extends reinforcement learning to
seek optimal negation processing across almost arbitrary applications of natural
language processing.
5.2. Limitations
The current research faces a number of limitations, which can provide investigative possibilities for further works as follows: first and foremost, our method
exhibits shortcomings when language is intricate, such as when piece of text refers
28
to content that is located in an entirely different part of the document. Sometimes one even requires additional background knowledge to correctly interpret
the content, as in the statement, “The movie was not at all different from the last
one”. This complexity poses challenges to natural language processing – not only
for our method but also for those discussed in the related work. In addition, we
predominantly focus on implementations where negations have a forward-looking
scope, i. e. a negation cue affects subsequent words but not words that precede it.
Therefore, we have also tested variants with a backward-looking analysis as part of
our robustness checks; however, this offers opportunities for additional variations
with advanced actions which could, for instance, invert the meaning of the full
sentence or the subsequent object in order to further improve accuracy. Finally,
further effort is necessary to develop an unsupervised variant which eliminates the
need for a gold standard.
5.3. Implications for IS Research
The unique and enduring purpose of IS research as an academic field is to
understand and improve the ways in which people, organizations and businesses
create value with information [3, 4]. Hence, the design and implementation of systems to provide “the right information to the right person at the right time was
the raison d’être of early IS research” [32]. In the past, “information” predominantly referred to structured data, while companies nowadays also exploit unstructured data and especially textual materials. This development has found its
way into IS research, which thus focuses on how textual information is processed.
Among the earliest references to this area of inquiry is an article in Management
of Information Systems Quarterly from 1982 that explicitly addresses information
processing [52].
The field of information processing has gained great traction with advances
in neuroscience and NeuroIS [53]. By acquiring neuro-physiological data, schol29
ars can gather information on how the human brain reacts to external stimuli.
For this purpose, one measures (neuro-)physiological parameters (e. g. heart rate
and skin conductance) to study the information processing of human agents [54].
This makes it possible to measure informational and cognitive overload in users
in the course of their interaction with information systems [54] and text-based
information [55]. However, NeuroIS remains very costly and the methods exhibit
many weaknesses [56]. For example, interpreting data from functional magnetic
resonance imaging (fMRI) is hampered by the complexity and non-localizable
activities of the brain.
Our computational intelligence method promises to fill the gap in existing
approaches to understanding negations. It is analogous to revealed preferences
estimations in economics, where the choices of individuals reveal the individuals’
latent utility function, since we utilize text documents that are tagged by the
users with a rating or gold standard. In addition, applying computational intelligence offers the potential to automatically unveil negations in texts – without the
need to manually label individual words. This entails several advantages as the
understanding of language is highly subjective and, in contrast, we derive the (latent) negation model that best fits the data. The results can thus also contribute
to linguistic and psychological models of negation usage and representation [57].
Overall, reinforcement learning manifests immense potential for future IS research
involving the study of information processing in depth.
5.4. Implications for Practitioners
Previous IS research argues that “a basic issue in the design of expert systems
is how to equip them with representational and computational capabilities” [58].
As a remedy, this paper presents a tool to practitioners in order to improve the
automated processing of natural language in their information systems. As such,
our methodology can enhance the accuracy of decision support based on textual
30
data. It does not necessarily require changes in the derivation of the original
algorithms; instead, our methodology can be built on top of routines and thus
enables a seamless integration into an existing tool chain.
Practitioners can benefit from negation handling when assessing the semantic
orientation of written materials. For example, in the case of recommender systems
and opinion mining, texts provide decision support by tracking the public mood
in order to measure brand perception or judge the launch of a new product based
on blog posts, comments, reviews or tweets. Based on our case study, we see a
significant improvement of up to 58.94 % in explained variance by adjusting for
negated text units.
A better understanding of human language can spark business innovations
in multiple areas. For instance, our approach facilitates the interactive control
of information systems through natural language, such as in question-answering
systems. With the advent of cognitive computing, the accurate processing of
natural language will gain even more in importance [59]. Ultimately, the relevance
of our methodology goes beyond these examples and comprises almost all textbased applications of individuals, organizations and businesses.
6. Conclusion
Information is at the heart of all decision-making that affects humans, businesses and organizations. Consequently, understanding the formation of decisions
represents a compelling research topic and yet knowledge gaps become visible
when it comes to information processing with regard to natural language. Negations, for example, are a frequently utilized linguistic tool for expressing disapproval or framing negative content with positive words; however, existing methods
struggle to accurately recognize and interpret negations in written text. Moreover, these methods are often tethered to large volumes of manually labeled data,
31
which introduce an additional source of subjectivity and noise.
In order to address these shortcomings, this paper develops a novel approach
based on reinforcement learning, which has the advantage of being human-like
and thus capable of learning to replicate human decision-making. As a result, our
evaluation shows superior performance in predicting negation scopes, while this
method also reveals an unbiased approach to identifying negation scopes based on
an exogenous response variable collected at document level. It thereby sheds light
on the “ground truth” of negation scopes, which would have otherwise been latent
and unobservable. In addition, reinforcement learning allows for hypothesis testing in order to pinpoint how humans process and act on negations. For instance,
this paper demonstrates that negations are unequally distributed across document
segments, showing that the second half of movie reviews and financial news items
contain significantly more negations than the first half. Our approach serves as an
intriguing alternative or supplement to experimental research, as it unleashes computational intelligence for the purpose of performing behavioral research, thereby
fostering unprecedented insights into human information processing.
References
[1] D. LaBerge, S. Samuels, Toward a Theory of Automatic Information Processing in Reading, Cognitive Psychology 6 (1974) 293–323.
[2] W. Schneider, R. M. Shiffrin, Controlled and Automatic Human Information Processing: Detection, Search, and Attention, Psychological Review 84
(1977) 1–66.
[3] R. O. Briggs, Special Section: Cognitive Perspectives on Information Systems, Journal of Management Information Systems 31 (2015) 3–5.
[4] J. F. Nunamaker, R. O. Briggs, Toward A Broader Vision for Information
32
Systems, ACM Transactions on Management Information Systems 2 (2011)
1–12.
[5] M. C. Lacity, M. A. Janson, Understanding Qualitative Data: A Framework
of Text Analysis Methods, Journal of Management Information Systems 11
(1994) 137–155.
[6] M. Chau, J. Xu, Business Intelligence in Blogs: Understanding Consumer
Interactions and Communities, MIS Quarterly 36 (2012) 1189–1216.
[7] S. Vodanovich, D. Sundaram, M. Myers, Digital Natives and Ubiquitous
Information Systems, Information Systems Research 21 (2010) 711–723.
[8] J. Hirschberg, C. D. Manning, Advances in Natural Language Processing,
Science 349 (2015) 261–266.
[9] R. E. Vlas, W. N. Robinson, Two Rule-Based Natural Language Strategies
for Requirements Discovery and Classification in Open Source Software Development Projects, Journal of Management Information Systems 28 (2012)
11–38.
[10] N. P. Cruz, M. Taboada, R. Mitkov, A Machine–Learning Approach to
Negation and Speculation Detection for Sentiment Analysis, Journal of the
Association for Information Science and Technology In Press (2015).
[11] B. Pang, L. Lee, Opinion Mining and Sentiment Analysis, Foundations and
Trends in Information Retrieval 2 (2008) 1–135.
[12] I. G. Councill, R. McDonald, L. Velikovich, What’s Great and What’s Not:
Learning to Classify the Scope of Negation for Improved Sentiment Analysis,
in: Proceedings of the Workshop on Negation and Speculation in Natural
33
Language Processing, Association for Computational Linguistics, Stroudsburg, PA, USA, 2010, pp. 51–59.
[13] N. Archak, A. Ghose, P. G. Ipeirotis, Deriving the Pricing Power of Product
Features by Mining Consumer Reviews, Management Science 57 (2011) 1485–
1509.
[14] T. T. Thet, J.-C. Na, C. S. G. Khoo, Aspect-Based Sentiment Analysis
of Movie Reviews on Discussion Boards, Journal of Information Science 36
(2010) 823–848.
[15] M. L. Jensen, J. M. Averbeck, Z. Zhang, K. B. Wright, Credibility of Anonymous Online Product Reviews: A Language Expectancy Perspective, Journal
of Management Information Systems 30 (2013) 293–324.
[16] E. Henry, Are Investors Influenced by How Earnings Press Releases are
Written?, Journal of Business Communication 45 (2008) 363–407.
[17] P. C. Tetlock, Giving Content to Investor Sentiment: The Role of Media in
the Stock Market, Journal of Finance 62 (2007) 1139–1168.
[18] T. Loughran, B. McDonald, When Is a Liability Not a Liability? Textual
Analysis, Dictionaries, and 10-Ks, Journal of Finance 66 (2011) 35–65.
[19] N. P. Cruz Dı́az, Maña López, Manuel J., J. M. Vázquez, V. P. Álvarez,
A Machine-Learning Approach to Negation and Speculation Detection in
Clinical Texts, Journal of the American Society for Information Science and
Technology 63 (2012) 1398–1410.
[20] L. Rokach, R. Romano, O. Maimon, Negation Recognition in Medical Narrative Reports, Information Retrieval 11 (2008) 499–538.
34
[21] N. A. Johnson, R. B. Cooper, Understanding the Influence of Instant Messaging on Ending Concessions During Negotiations, Journal of Management
Information Systems 31 (2015) 311–342.
[22] H. Lai, W.-J. Lin, G. E. Kersten, Effects of Language Familiarity on eNegotiation: Use of Native vs. Nonnative Language, in: Proceedings of the
42nd Hawaii International Conference on System Sciences (HICSS), IEEE,
2002, pp. 1–9.
[23] D. P. Twitchell, M. L. Jensen, D. C. Derrick, J. K. Burgoon, J. F. Nunamaker, Negotiation Outcome Classification Using Language Features, Group
Decision and Negotiation 22 (2013) 135–151.
[24] C. M. Fuller, D. P. Biros, J. Burgoon, J. Nunamaker, An Examination
and Validation of Linguistic Constructs for Studying High-Stakes Deception,
Group Decision and Negotiation 22 (2013) 117–134.
[25] L. Zhou, J. K. Burgoon, D. P. Twitchell, T. Qin, J. F. Nunamaker, A
Comparison of Classification Methods for Predicting Deception in ComputerMediated Communication, Journal of Management Information Systems 20
(2004) 139–166.
[26] Y. Niv, R. Daniel, A. Geana, S. J. Gershman, Y. C. Leong, A. Radulescu,
R. C. Wilson, Reinforcement Learning in Multidimensional Environments
Relies on Attention Mechanisms, Journal of Neuroscience 35 (2015) 8145–
8157.
[27] S. J. Gershman, A. Radulescu, K. A. Norman, Y. Niv, O. Sporns, Statistical Computations Underlying the Dynamics of Memory Updating, PLoS
Computational Biology 10 (2014).
35
[28] J. Fiser, P. Berkes, G. Orbán, M. Lengyel, Statistically Optimal Perception
and Learning: From Behavior to Neural Representations, Trends in Cognitive
Sciences 14 (2010) 119–130.
[29] T. D. Wilson, Models in Information Behaviour Research, Journal of Documentation 55 (1999) 249–270.
[30] S. Stieglitz, L. Dang-Xuan, Emotions and Information Diffusion in Social Media: Sentiment of Microblogs and Sharing Behavior, Journal of Management
Information Systems 29 (2013) 217–248.
[31] D. N. Trung, T. T. Nguyen, J. J. Jung, D. Choi, Understanding Effect of
Sentiment Content Toward Information Diffusion Pattern in Online Social
Networks: A Case Study on TweetScope, in: P. C. Vinh, V. Alagar, E. Vassev, A. Khare (Eds.), Context-Aware Systems and Applications, volume 128
of Lecture Notes for Computer Sciences, Social Informatics and Telecommunications Engineering, Springer, Cham, Switzerland, 2014, pp. 349–358.
[32] R. Aggarwal, R. Gopal, R. Sankaranarayanan, P. V. Singh, Blog, Blogger,
and the Firm: Can Negative Employee Posts Lead to Positive Outcomes?,
Information Systems Research 23 (2012) 306–322.
[33] M. Wiegand, A. Balahur, B. Roth, D. Klakow, A. Montoyo, A Survey on the
Role of Negation in Sentiment Analysis, in: Proceedings of the Workshop on
Negation and Speculation in Natural Language Processing, Association for
Computational Linguistics, Stroudsburg, PA, USA, 2010, pp. 60–68.
[34] L. Jia, C. Yu, W. Meng, The Effect of Negation on Sentiment Analysis and
Retrieval Effectiveness, in: D. Cheung (Ed.), Proceeding of the 18th ACM
Conference on Information and Knowledge Management (CIKM ’09), ACM,
New York, NY, 2009, pp. 1827–1830.
36
[35] N. Pröllochs, S. Feuerriegel, D. Neumann, Enhancing Sentiment Analysis of
Financial News by Detecting Negation Scopes, in: 48th Hawaii International
Conference on System Sciences (HICSS), 2015, pp. 959–968.
[36] N. Pröllochs, S. Feuerriegel, D. Neumann, Detecting Negation Scopes for
Financial News Sentiment Using Reinforcement Learning, in: 49th Hawaii
International Conference on System Sciences (HICSS), 2016, pp. 1164–1173.
[37] M. Taboada, J. Brooke, M. Tofiloski, K. Voll, M. Stede, Lexicon-Based
Methods for Sentiment Analysis, Computational Linguistics 37 (2011) 267–
307.
[38] A. Hogenboom, P. van Iterson, B. Heerschop, F. Frasincar, U. Kaymak, Determining Negation Scope and Strength in Sentiment Analysis, in: IEEE
International Conference on Systems, Man, and Cybernetics, 2011, pp. 2589–
2594.
[39] S. Padmaja, S. Fatima, S. Bandu, Evaluating Sentiment Analysis Methods and Identifying Scope of Negation in Newspaper Articles, International
Journal of Advanced Research in Artificial Intelligence 3 (2014) 1–6.
[40] R. S. Sutton, A. G. Barto, Reinforcement Learning: An Introduction, Adaptive Computation and Machine Learning, MIT Press, Cambridge, MA, 1998.
[41] C. J. C. H. Watkins, P. Dayan, Q-Learning, Machine Learning 8 (1992)
279–292.
[42] J. Hu, M. P. Wellman, Nash Q-Learning for General-Sum Stochastic Games,
Journal of Machine Learning Research 4 (2003) 1039–1069.
[43] L. P. Kaelbling, M. L. Littman, A. W. Moore, Reinforcement Learning: A
Survey, Journal of Artificial Intelligence Research 4 (1996) 237–285.
37
[44] B. Pang, L. Lee, Seeing Stars: Exploiting Class Relationships for Sentiment
Categorization with Respect to Rating Scales, in: Proceedings of the 43rd
Annual Meeting on Association for Computational Linguistics (ACL ’05),
2005, pp. 115–124.
[45] P. D. Turney, Thumbs Up or Thumbs Down? Semantic Orientation Applied
to Unsupervised Classification of Reviews, Association for Computational
Linguistics, 2002.
[46] A. M. Legg, K. Sweeny, Do You Want the Good News or the Bad News First?
The Nature and Consequences of News Order Preferences, Personality and
Social Psychology Bulletin 40 (2014) 279–288.
[47] M. Dadvar, C. Hauff, F. de Jong, Scope of Negation Detection in Sentiment
Analysis, in: Proceedings of the Dutch-Belgian Information Retrieval Workshop, University of Amsterdam, Amsterdam, Netherlands, 2011, pp. 16–20.
[48] J. Muntermann, A. Guettler, Intraday Stock Price Effects of Ad Hoc Disclosures: The German Case, Journal of International Financial Markets,
Institutions and Money 17 (2007) 1–24.
[49] Y. Konchitchki, D. E. O’Leary, Event Study Methodologies in Information
Systems Research, International Journal of Accounting Information Systems
12 (2011) 99–115.
[50] A. C. MacKinlay, Event Studies in Economics and Finance, Journal of
Economic Literature 35 (1997) 13–39.
[51] P. C. Tetlock, M. Saar-Tsechansky, S. Macskassy, More Than Words: Quantifying Language to Measure Firms’ Fundamentals, Journal of Finance 63
(2008) 1437–1467.
38
[52] D. Robey, W. Taggart, Human Information Processing in Information and
Decision Support Systems, MIS Quarterly 6 (1982) 61.
[53] A. Dimoka, P. A. Pavlou, F. D. Davis, NeuroIS: The Potential of Cognitive Neuroscience for Information Systems Research: Research Commentary,
Information Systems Research 22 (2011) 687–702.
[54] R. Riedl, F. D. Davis, A. R. Hevner, Towards a NeuroIS Research Methodology: Intensifying the Discussion on Methods, Tools, and Measurement,
Journal of the Association for Information Systems 15 (2014) 1–35.
[55] R. K. Minas, R. F. Potter, A. R. Dennis, V. Bartelt, S. Bae, Putting on the
Thinking Cap: Using NeuroIS to Understand Information Processing Biases
in Virtual Teams, Journal of Management Information Systems 30 (2014)
49–82.
[56] A. Dimoka, R. D. Banker, I. Benbasat, F. D. Davis, A. R. Dennis, D. Gefen,
A. Gupta, A. Ischebeck, P. H. Kenning, P. A. Pavlou, et al., On the Use of
Neurophysiological Tools in IS Research: Developing a Research Agenda for
NeuroIS, MIS Quarterly 36 (2012) 679–702.
[57] S. Khemlani, I. Orenes, P. N. Johnson-Laird, Negation: A Theory of Its
Meaning, Representation, and Use,
Journal of Cognitive Psychology 24
(2012) 541–559.
[58] W.-R. Zhang, POOL: A Semantic Model for Approximate Reasoning and
Its Application in Decision Support, Journal of Management Information
Systems 3 (1987) 65–78.
[59] D. S. Modha, R. Ananthanarayanan, S. K. Esser, A. Ndirango, A. J. Sherbondy, R. Singh, Cognitive Computing, Communications of the ACM 54
(2011) 62.
39
| 2cs.AI
|
1
Deterministic Annealing Optimization for
Witsenhausen’s and Related Decentralized
Stochastic Control Problems
arXiv:1607.02893v1 [cs.SY] 11 Jul 2016
Mustafa Said Mehmetoglu, Student Member, IEEE, Emrah Akyol, Member, IEEE,
and Kenneth Rose, Fellow, IEEE
Abstract—This note studies the global optimization of controller mappings in discrete-time stochastic control problems
including Witsenhausen’s celebrated 1968 counter-example. We
propose a generally applicable non-convex numerical optimization method based on the concept of deterministic annealing
– which is derived from information theoretic principles and
was successfully employed in several problems including vector
quantization, classification and regression. We present comparative numerical results for two test problems that show strict
superiority of the proposed method over prior approaches in
literature.
Index Terms—Decentralized control, Optimization methods,
Numerical simulation, Physical models.
I. I NTRODUCTION
Decentralized control systems have multiple controllers
designed to collaboratively achieve a global objective while
taking actions based on local observations. One of the most
studied structures, termed “linear quadratic Gaussian” (LQG),
involves linear dynamics, quadratic cost functions and Gaussian variables. Since in the case of centralized LQG problems,
the optimal mappings are linear, it was naturally conjectured
that linear control mappings remain optimal in decentralized
settings. However, Witsenhausen proposed an example of a
decentralized LQG control problem, commonly referred to
as Witsenhausen’s counter-example (WCE), for which he
provided a simple non-linear control strategy that outperforms
all linear strategies [1]. The problem has been viewed as a
benchmark in stochastic networked control, see, e.g., [2] for
a detailed treatment.
Decentralized control systems such as WCE arise in many
practical applications, and numerous variations on WCE have
been studied in the literature (see, e.g., [3]–[8]). In general,
linear control strategies are not optimal for LQG systems,
except when the system admits some specific information
structure (see, e.g., [9], [10]). It is well-understood that if
the information structure in a decentralized control problem
Mustafa S. Mehmetoglu and Kenneth Rose are with the Department of
Electrical and Computer Engineering, University of California, Santa Barbara,
CA, 93106, USA (e-mail: [email protected], [email protected])
Emrah Akyol is with the Coordinated Science Laboratory, University of Illinois at Urbana-Champaign, Urbana, IL, 61801, USA (email:
[email protected])
This work is supported by the NSF under grants CCF-1118075 and CCF1016861. The material in this paper was presented in part at the IEEE
International Symposium on Information Theory (ISIT), Honolulu, HI, USA,
June 2014
is nonclassical, as in the case of WCE, non-linear strategies
may widely outperform optimal linear strategies. Finding the
optimal mappings for such problems is usually a difficult task
unless they admit an explicit (and often as simple as linear)
solution [3].
Recent research efforts have focused on developing efficient
numerical methods for decentralized control problems [11]–
[14], specifically for WCE [15]–[18]. Some of the existing
methods rely on simplifying properties of WCE, such as
monotonicity, and are therefore not easily generalizable [11],
[12], [19]. Moreover, methods that require analytical derivation
for each particular setting are not fully automated [14], [19].
In this work, building on our prior work [20], we propose
an optimization method, based on the concept of deterministic
annealing (DA), for a class of decentralized stochastic control
problems. DA has been successfully used in various problems
in control theory including dynamic coverage control problems
[21]–[23] and cluster analysis in control systems [24], in
addition to other problems involving non-convex optimization
such as vector quantization [25], regression [26], zero-delay
source-channel coding [27], and more (see review in [28]).
There are many important advantages of the proposed method
compared to prior work, including ability to avoid poor local
minima and independence from initialization.
We demonstrate the DA-based method on two specific
problems. We first analyze the numerically ”over-mined” WCE
problem. We then study a more involved variation, introduced
in [7], which includes an additional noisy channel over which
the two controllers communicate. The second controller, therefore, has access to some side information which is controlled
by the first controller. We refer to this setting as the “side
channel problem” motivated by the class of ”decoder side
information” problems in communications and information
theory [29]. It has been demonstrated in [7] that non-linear
strategies may outperform the best linear strategies, however,
the question of how to approach the optimal solution remains
open.
Having a powerful optimization method at hand, we analyze the structure of experimentally obtained mappings. For
instance, Wu and Verdú have shown [30] that the optimal
solution of WCE must have real analytic left inverse, thus,
a piecewise linear function cannot be optimal. Our numerical
results demonstrate that the “steps” in obtained mappings show
small deviations from linear, experimentally confirming this
theoretical finding.
2
II. P ROBLEM D EFINITION
A. Derivation
A. Notation
Let R, E(·) and P(·) denote the set of real numbers, the
expectation and probability operators, respectively. We represent random variables and their realizations with uppercase
and lowercase letters (e.g., X and x), respectively. Let Xij
denote the set Xi , . . . , Xj . The probability density function of
the random variable X is fX (x). The Gaussian density with
mean µ and standard deviation σ is denoted as N (µ, σ 2 ). We
use natural logarithms which, in general, may be complex, and
the integrals are, in general, Lebesgue integrals.
B. General Problem Definition
Formally, we consider a discrete-time stochastic control
problem with nonclassical information pattern involving n
controllers, and assume that the order of control actions is
fixed in advance, i.e., the system is sequential [31]. Following
the problem definition in [31], let (Ω, B, P) be a probability
space, where Ω denotes the random quantities involved in the
system such as initial input, and (Ui , Σi ), for i = 1, . . . , n,
are measurable spaces with Ui denoting the set of control
actions. Controller mappings (functions) are denoted by gi :
Ω×U1 ×U2 . . . Ui−1 → Ui , for i = 1, . . . , n. For convenience,
we denote the input set of gi by Xi = Ω × U1 × U2 . . . Ui−1 .
The system is then defined by the following set of equations
ui = gi (xi ), i = 1, . . . , n.
(1)
Let f be a real-valued and bounded measurable function of
ω, un1 on (Ω, B), i.e., f is a random variable. The problem
objective is to find the set of functions g1n that minimize the
value of the cost function J:
J = E{f (ω, un1 )}.
(2)
III. P ROPOSED M ETHOD
A quick overview of the proposed method at the high
level is as follows: We introduce controlled randomization
into the optimization process by randomizing the controller
mappings, and impose a constraint on the level of randomness
(measured by the Shannon entropy) while minimizing the
expected cost of the system. The resultant Lagrangian functional can be viewed as the “free energy” of a corresponding
physical system, wherein the Lagrangian parameter is the
“temperature”. The optimization is equivalent to an annealing
process that starts by minimizing the cost (free energy) at a
high temperature, which effectively maximizes the entropy.
The minimum cost is then tracked at successively lower
temperatures as the system typically undergoes a sequence of
phase transitions through which the complexity of the solution
(controller mappings) grows. As the temperature approaches
zero, hard (nonrandom) mappings are obtained. DA avoids
poor local minima through randomization of mappings, slowly
tracks the minimum cost, and can achieve the global minimum
under certain conditions on the type (and continuity) of
phase transitions. However, there is no general guarantee of
convergence to the globally optimal solution.
Let us denote the space of controller input xi by Rxi , for i =
1, . . . , n. Assume there exists a partition of Rxi into Mi > 0
disjoint regions denoted by Ri,mi (mi = 1, . . . , Mi ):
M
[i
Ri,mi = Rxi .
(3)
mi =1
Note that each value of xi belongs to exactly one of the
partition regions, referred to as a deterministic (non-random)
partition.
We begin our formulation by imposing a piecewise structure
on the controller mappings. Consider the structured mapping
gi , for i = 1, . . . , n, written as
gi (xi ) = gi,mi (xi ) for xi ∈ Ri,mi .
(4)
Each gi,mi (xi ) is a parametric function referred to as “local
model”. Effectively, each of the mappings gi is defined with
a structure determined by two components: a space partition
where regions are denoted by Ri,mi and a parametric local
model per partition cell, i.e., gi,mi (xi ) for Ri,mi . The number
of local models (partition regions) for mapping gi is Mi .
The local models can take any prescribed form such as
linear, quadratic or Gaussian and we let Λ(gi,mi ) denote the
parameter set for local model gi,mi .
The crucial idea in DA is to introduce controlled randomization into the problem formulation. We replace the deterministic
partition of space by a random partition, i.e., we associate
every input point (xi ) with partition regions in probability. To
this end, we introduce random variables Mi , for i = 1, . . . , n,
whose realization is the partition index mi . We define the
association probabilities as conditional distribution on the
partition index given the input:
pi (mi |xi ) = P{xi ∈ Ri,mi } = P{gi (xi ) = gi,mi (xi )}, (5)
for i = 1, . . . , n. Consequently, the mappings are now random,
in the sense that the output of controller gi for an input xi is
given in probability as
gi (xi ) = gi,mi (xi ) with probability pi (mi |xi ).
(6)
By construction, we have that given Xi , Mi is independent of
the random variables M1i−1 .
The expectation in (2) is now taken over Xin and Min . Let
us rewrite it for a fixed value of i as follows:
Z X
Mi
J=
E{f (ω, un1 )|mi , xi }pi (mi |xi )fxi (xi )dxi (7)
xi m =1
i
where E{f (ω, un1 )|mi , xi } can be viewed as the cost of associating xi with local model gi,mi . Assuming fixed local model
parameters, optimizing (7) with respect to pi (mi |xi ) would
clearly produce deterministic mappings, since the minimum is
achieved by setting pi (mi |xi ) = 1 for the pair {mi , xi } for
which E{f (ω, un1 )|mi , xi } is minimum. Therefore, the ultimate objective of obtaining optimum deterministic controllers
is preserved as the random encoders share the same global
minimum as deterministic ones. However, direct optimization
of the cost with respect to pi (mi |xi ) results in poor local
3
minima. Instead, we minimize (2) at prescribed levels of
randomness, which we measure by the Shannon entropy. The
joint entropy of the system can be written
H(X1n , M1n ) = H(X1 ) +
n
X
i=2
+H(M1 |X1 ) +
H(Xi |M1i−1 , X1i−1 )
n
X
H(Mi |Xi , M1i−1 , X1i−1 ).
n
X
H(Mi |Xi ).
i=2
(8)
It is easy to see from conditional independence arguments
that the conditional entropies in the second term in the
righthand side of (8) can be simplified to H(Xi |X1i−1 ), and
those in the last term to H(Mi |Xi ). Thus the first two terms
of (8) are fixed and determined by the problem statement (the
joint distribution of X1n ). We therefore discard the first two
fixed terms of (8), rearrange the remaining terms, to obtain a
conveniently compact measure of randomness defined as
H,
i=1
(9)
The conditional entropy H(Mi |Xi ) is given by
Z X
Mi
p(mi |xi ) log p(mi |xi )fXi (xi )dxi .
H(Mi |Xi ) = −
xi m =1
i
Accordingly, we construct the Lagrangian
F = J − TH
(10)
(11)
as the objective function to be minimized, where J is given
in (2), H is given in (9) and T is the Lagrange multiplier
associated with the entropy constraint. The notational choices
are to emphasize the analogy to statistical physics, where
F can be viewed as the Helmholtz free energy, J as the
thermodynamic energy, H as the entropy, and T as the
temperature, of a corresponding physical system (see [28] for
a detailed treatment of the statistical physics analogy).
B. Optimization Method
The practical method consists of gradually reducing the
temperature T while tracking the minimum of the free energy F . The central iteration at each temperature consists
of optimizing the local model parameters and association
probabilities. Initially, for T → ∞, the minimum F is obtained
by maximizing H, which is achieved by uniform association
probabilities as can be seen from (9). Consequently, for each
controller, the local models are all optimized for the same
distribution over the input space, and are therefore all identical,
i.e., there is effectively a single “distinct” local model. As
the temperature is decreased, the system will undergo “phase
transitions” where the current solution no longer represents a
minimum (the old minimum typically becomes a saddle point)
and there exists a better solution with increased number of
distinct local models. Since it is computationally more efficient
to keep only distinct models, we initialize with a single model
(Mi = 1) and trigger phase transitions by duplicating existing
models and slightly perturb them at each temperature. The
minimization of F will either produce the existing solution
(the duplicated and perturbed local models seek to merge
at their initial values), or a better solution with increased
number of distinct models, depending on whether a “critical
temperature” has been reached. Accordingly, in we combine
identical models. At the limit T → 0, we perform zero
temperature iteration (equivalent to gradient descent) by fully
assigning source points to the model that makes the smallest
contribution to J, thus obtaining the desired deterministic
mappings. (This is referred to as ”quenching” in the physical
analogy.)
Remark 1: Our method is derived without recourse to discretization. Although practical simulations involve sampling
of the continuous space during numerical computations of
integrals, this is in contrast to methods that are entirely
formulated in discrete settings.
Remark 2: Critical temperatures can be derived analytically
if, for the problem considered, phase transitions are of “continuous” nature, in the sense that tracked minimum becomes
a saddle point at the exact critical temperature. The condition
for saddle point can be obtained using variational calculus,
see [28] for phase transition analysis in DA. Our experiments
indicate that, at least for the test cases considered in this paper,
phase transitions are not continuous. While pre-calculating the
critical temperature may enable a numerical speed up of the
annealing process, it is not necessary to implementing the
practical algorithm. Hence, the derivation and characteristics
of phase transitions are kept outside the scope of this paper.
The optimal pi (mi |xi ) that minimize (11) can be derived
in closed form. Plugging (7) and (10) in (11), straightforward
derivation gives the optimal pi (mi |xi ) as
n
e−E{f (ω,u1 )|mi ,xi }/T
pi (mi |xi ) = P −E{f (ω,un )|m ,x }/T
i i
1
e
(12)
mi
Optimization of parameters in Λ(gmi ) can be done using
any standard method. Typically, a variant of gradient descent
is used when closed form expressions cannot be obtained.
IV. A PPLICATIONS OF THE P ROPOSED DA M ETHOD
A. Witsenhausen’s Counterexample
1) Problem Description: Let X0 and W be Gaussian ran2
dom variables with distributions N (0, σX
) and N (0, 1), re0
spectively. WCE is a 2-stage control problem with controllers
g1 : R → R and g2 : R → R, defined by the following
equations:
U1 = g1 (X0 ),
U2 = g2 (X1 + W ),
X1 = X0 + U1 , X2 = X1 − U2 .
(13)
The schematic representation is given in Figure 1a. The
objective is to minimize the cost
J = E{k 2 U12 + X22 }.
(14)
For convenience, we define f1 (X0 ) = g1 (X0 ) + X0 .
Some properties of f1 (·) are known, including the property
of symmetry about the origin (thus, positive half is enough to
describe a given solution) [1]. Witsenhausen has provided the
4
TABLE I
R ESULTS FOR WCE
Solution
Optimal linear Solution
1-step, Witsenhausen [1]
2-step, [11]
Sloped 2.5 - step, [15]
Sloped 3.5 - step, [19]
Sloped 3.5 - step, [17]
Sloped 4 - step, [16]
Sloped 5 - step, our result
(a)
(b)
Fig. 1. Settings used for testing the proposed method (a) Witsenhausen’s
counter-example (b) Side channel problem.
following solution that outperforms the optimal linear solution
for a given set of problem parameters (k = 0.2, σX0 = 5):
f1 (x0 ) = σX0 sgn(x0 )
(15)
where sgn(·) is the signum function. Since there is a single
“step” in the positive half of real line, this solution is referred
to as a “1-step” solution. Improved solutions that appeared in
literature utilize 2.5, 3, 3.5 and 4-step functions (an x.5 step
function has a step that straddles the origin). Moreover, the
latter solutions made improvements by using slightly sloped
steps rather than constant ones.
Although in standard application of DA-based method we
randomize all controllers, for computational efficiency, we
restrict the randomization to only g1 as
g1 (x0 ) = g1,m1 (x0 ) with probability p1 (m1 |x0 )
(16)
and numerically compute (update) g2 by using the fact that
optimal g2 given g1 is
g2 (Y2 ) = E{X1 |Y2 }
(17)
where Y2 = X1 + W .
For this particular problem, we use linear local models given
by
g1,m1 (x0 ) = a1,m1 x0 + b1,m1 .
(18)
while noting that optimal g1 must have analytic left inverse and
hence cannot be piecewise linear [30]. Nevertheless, the minimal cost can be approached arbitrarily closely by piecewise
linear functions [30]. Thus, for numerical algorithms, linear
models are sufficient.
2) Results for WCE: Preliminary results on the application
to WCE appeared in [20]. We first provide results for the standard benchmark case where k = 0.2, σX0 = 5 that was used in
many papers in literature. The annealing process is illustrated
in Figure 2, where evolution of the mapping can be seen (only
the positive half is shown thanks to the symmetry property).
The obtained mapping is referred to as a “sloped 5-step”
solution. At high temperature, there is only one local model,
thus, the function is 1-step. As the temperature is lowered, the
solution undergoes phase transitions, revealing more steps for
the mapping function. In this work we calculated the solution
with 5 steps. Although more steps possibly exist, improvement
to cost is numerically insignificant with additional steps. Some
Cost
0.96
0.404253
0.190
0.1701
0.1673132
0.1670790
0.16692462
0.16692291
earlier results from the literature are given in Table I, where
it can be seen that our method produced the minimum cost
achieved to date.
Another benchmark case, k = 0.63, was suggested in [5] as
potentially being more relevant for confirming the high gains
of optimal non-linear mappings. Our resulting mapping for
k = 0.63, σX0 = 5 is given in Figure 3a, which is a 6-step
solution. Our numerical results suggest that the gain over linear
solution is smaller compared to the standard benchmark case
above: J = 0.844 for the solution in Figure 3a whereas cost
associated with the optimal linear mapping is J = 0.961.
These numerical results illustrate an important theoretical
result as well. In [30] authors proved that the optimal f1 must
have analytic left inverse and therefore cannot be piecewise
linear, which was believed to be the case due to numerical
results (see, e.g., [19]). Our numerical results indicate that
steps are in fact non-linear, as shown in Figure 3b. The steps
become non-linear during the final stages of the algorithm as
multiple local models appear to form a single step. To the best
of our knowledge, this is the first numerical result illustrating
non-linearity of the steps.
B. Side Channel Problem
1) Problem Description: Let X0 be a Gaussian random
2
variable with distribution N (0, σX
), and W1 , W2 be inde0
pendent Gaussian random variables, both with a distribution
N (0, 1). The system is defined by the following equations:
U1 = g1 (X0 ), U2 = g2 (X0 ), U3 = g3 (X1 + W1 , U2 + W2 ),
X1 = X0 + U1 ,
X2 = X1 − U3 .
(19)
The problem is to optimize the cost function
J = E{k 2 U12 + X22 }
(20)
for given σX0 and positive parameter k, subject to a power
constraint on U2 :
bSN R = E{U22 }
(21)
where bSN R is the specified power level. We again define
f1 (X0 ) = g1 (X0 ) + X0 .
This problem setting is illustrated in Figure 1b and was introduced in [7]. It can be seen as a generalization of WCE with
an additional communication channel between the controllers,
i.e., a non-linear function of input X0 is communicated by
g2 to the controller denoted by g3 : R2 → R. The non-linear
mappings analyzed in [7], which widely outperform the best
linear solution in a large range of bSN R , are such that both f1
and g2 are staircase functions of x0 .
5
T = 5.000, D = 0.3510, H = 0.693
T = 0.275, D = 0.1898, H = 0.121
T = 0.153, D = 0.1729, H = 0.068
T = 0.021, D = 0.1671, H = 0.009
T = 0.005, D = 0.1670, H = 0.002
30
30
30
30
30
15
15
15
15
15
f 1 (x 0 )
0
0
0
10
20
30
0
0
10
20
30
0
0
10
20
30
0
0
10
20
30
0
10
20
30
Fig. 2. Evolving graph of f1 (x0 ) in WCE during various phases of the annealing process. We note that mapping is actually random during algorithm run.
Here, for demonstration, we fully associate every x0 with g1,m1 for which p1 (m1 |x0 ) is largest.
f1 (x0 )
30
0.04
20
0.02
10
0
0
0
10
f1 (x0 )-line
20
-0.02
30
0
2
(a)
4
6
(b)
Fig. 3. Numerical result for WCE in the case of k = 0.63, σX0 = 5. (a)
6-step solution. (b) The deviation of the first step in f1 (x0 ) from a straight
line between the end points of the step.
TABLE II
C OST C OMPARISON TABLE FOR S IDE C HANNEL P ROBLEM
bSN R
0
2.6
4.7
5.9
9.0
Linear Cost
0.960
0.696
0.432
0.344
0.203
J M ( [7])
0.185
0.149
0.101
0.081
0.052
J∗
0.167
0.079
0.040
0.026
0.012
V. A DVANTAGES OF P ROPOSED M ETHOD
(J M −J ∗)/J M
0.10
0.47
0.60
0.68
0.77
2) Results for Side Channel Problem: The original problem
is to minimize (20) subject to the constraint in (21). We follow
the standard approach in optimization theory and convert this
constrained problem to unconstrained Lagrangian formulation:
J = E{k 2 U12 + X22 + λU22 }
stage. Intuitively, as the second controller has access to better
side information (i.e. at higher SNR), the estimation error is
decreased and as observed in Figure 4, f1 (x0 ) approaches x0 .
The relative improvement in cost, given in Table II, increases
with SNR, which is consistent with the above observation.
The mappings for the side channel, g2 , are irregular and
the overall shape varies with SNR. This observation, together
with the above for f1 , suggests that the mappings f1 and g2 are
not scale invariant. The discontinuities in f1 and g2 coincide
as expected, as the discontinuities in side information signal
those in f1 to g3 .
Note: For numerical results in this paper, MATLAB codes
can be found in [32].
(22)
where λ is chosen to satisfy the power constraint (21) with
equality. In the experiments, we used the standard benchmark
parameters that were used for the original WCE, that is,
k = 0.2 and σX0 = 5. We have varied λ to obtain results
at different bSN R .
In Table II we compare the cost of our solutions (denoted
by J ∗ ) to the ones given in [7] (denoted by J M ), and the best
linear mappings. Significant cost reductions can be observed.
The relative improvement over the solution of [7] is listed in
the last column.
Remark 3: When bSN R = 0, the problem degenerates to
WCE, thus the cost is 0.1669, the best known to date.
We present several mappings obtained by our method in
Figure 4. Some interesting features of these mappings are
observed. The mappings f1 are staircase functions with constant steps similar to the ones obtained for the original WCE
problem, however, the steps get smaller and increase in number
as the side channel SNR increases; that is, f1 (x0 ) approaches
x0 . Note that the control cost term in (20), E{k 2 U12 }, achieves
its minimum when g1 = 0, i.e., f1 (x0 ) = x0 . This is,
however, not optimal due to the estimation error at the second
There are several improvements of the method proposed
here over existing methods in literature.
1) It is derived in the original, continuous domain, without
discretization. The continuous space is sampled during
numerical computation of integrals only. This is in
contrast with many prior methods such as those in [12],
[16], [17] that are entirely formulated in a discrete
setting.
2) Our method is based on DA, a powerful non-convex
optimization framework. DA has been successfully used
as a remedy to the problem of poor local minima in
non-convex optimization problems [28], and is shown to
outperform competing methods such as “noisy channel
relaxation” (NCR) [27]. Although NCR performs well
for the simple setting of WCE [16], it is susceptible to
get trapped in local minima in more involved settings.
3) From its DA foundation, our method directly inherits
notably useful properties including reduced sensitivity
to initialization. The authors in [15] had to experiment
with a large number of initial weight vectors to obtain
the result included in Table I.
4) We do not make any assumptions about the controller
mappings. Methods presented in [11], [12], [19] benefit
from the monotonicity of optimal mapping in WCE. The
results in Figure 4 demonstrate that monotonicity may
not hold for optimal mappings in the general setting.
5) The method is fully automated and does not require
analytical derivations or manual interventions during
algorithm run. This is in contrast to the method presented in [19] which requires analytical work during the
procedure.
6) Method is applicable to a broad class of stochastic
control problems. Many prior methods require nontrivial work in order to generalize, for instance, [17]
6
bsnr = 2.6
20
cost = 0.079
f1
0
-20
-15
cost = 0.040
0
-5
0
5
10
15
-20
-15
cost = 0.012
f1
g2
-10
bsnr = 9.0
20
f1
g2
-10
bsnr = 4.8
20
0
-5
x0
0
5
x0
10
15
-20
-15
g2
-10
-5
0
5
10
15
x0
Fig. 4. Some of the mappings we obtained for the side channel variation problem. The first controller is plotted at various SNR levels.
proposes a method that is generalizable, but it requires
conversion to a potential game problem.
VI. C ONCLUSIONS
In this paper, we proposed an optimization method for
distributed control problems, whose solutions are known to be
non-linear, and demonstrated its effectiveness on two problems
from the literature. The first problem is the celebrated benchmark problem known as Witsenhausen’s counter-example, for
which our approach obtained the best known cost value. As
a second test case we focused on the side channel setting
introduced in [7], where it is motivated as a two stage
noise cancellation problem. The mappings obtained are highly
nontrivial, offer considerably improved performance, and raise
interesting questions about the functional properties of optimal
mappings in decentralized control, which are the focus of
ongoing research.
R EFERENCES
[1] H. Witsenhausen, “A counterexample in stochastic optimum control,”
SIAM Journal on Control, vol. 6, no. 1, pp. 131–147, 1968.
[2] S. Yüksel and T. Başar, Stochastic Networked Control Systems: Stabilization and Optimization under Information Constraints. Springer,
2013.
[3] T. Başar, “Variations on the theme of the Witsenhausen counterexample,”
in 47th IEEE Conference on Decision and Control Proceedings (CDC).
IEEE, 2008, pp. 1614–1619.
[4] G. Gnecco, M. Sanguineti, and M. Gaggero, “Suboptimal solutions to
team optimization problems with stochastic information structure,” SIAM
Journal on Optimization, vol. 22, no. 1, pp. 212–243, 2012.
[5] P. Grover, S. Y. Park, and A. Sahai, “Approximately optimal solutions to
the finite-dimensional Witsenhausen counterexample,” Automatic Control, IEEE Transactions on, vol. 58, no. 9, pp. 2189–2204, 2013.
[6] Y. Ho and K. Chu, “Information structure in dynamic multi-person
control problems,” Automatica, vol. 10, no. 4, pp. 341 – 351, 1974.
[7] N. Martins, “Witsenhausen’s counter example holds in the presence of
side information,” in Decision and Control, 2006 45th IEEE Conference
on, 2006, pp. 1111–1116.
[8] N. Saldi, S. Yüksel, and T. Linder, “Finite Model Approximations and
Asymptotic Optimality of Quantized Policies in Decentralized Stochastic
Control,” ArXiv e-prints, 2015.
[9] Y. Ho and K. Chu, “Team decision theory and information structures in
optimal control problems–Part I,” Automatic Control, IEEE Transactions
on, vol. 17, no. 1, pp. 15–22, 1972.
[10] R. Radner, “Team decision problems,” The Annals of Mathematical
Statistics, vol. 33, no. 3, pp. 857–881, 09 1962.
[11] M. Deng and Y. Ho, “An ordinal optimization approach to optimal
control problems,” Automatica, vol. 35, no. 2, pp. 331 – 338, 1999.
[12] Y.-C. Ho and J. Lee, “Granular optimization: An approach to function
optimization,” in Decision and Control, 2000. Proceedings of the 39th
IEEE Conference on, vol. 1, 2000, pp. 103–111 vol.1.
[13] L. Jiang, D. Shah, J. Shin, and J. Walrand, “Distributed random access
algorithm: Scheduling and congestion control,” Information Theory,
IEEE Transactions on, vol. 56, no. 12, pp. 6182–6207, 2010.
[14] A. Kulkarni and T. Coleman, “An optimizer’s approach to stochastic
control problems with nonclassical information structures,” Automatic
Control, IEEE Transactions on, vol. PP, no. 99, pp. 1–1, 2014.
[15] M. Baglietto, T. Parisini, and R. Zoppoli, “Numerical solutions to the
Witsenhausen counterexample by approximating networks,” Automatic
Control, IEEE Transactions on, vol. 46, no. 9, pp. 1471–1477, 2001.
[16] J. Karlsson, A. Gattami, T. Oechtering, and M. Skoglund, “Iterative
source-channel coding approach to Witsenhausen’s counterexample,” in
American Control Conference (ACC), 2011. IEEE, 2011, pp. 5348–
5353.
[17] N. Li, J. Marden, and J. Shamma, “Learning approaches to the Witsenhausen counterexample from a view of potential games,” in Decision
and Control, 2009 held jointly with the 2009 28th Chinese Control
Conference. CDC/CCC 2009. Proceedings of the 48th IEEE Conference
on. IEEE, 2009, pp. 157–162.
[18] W. McEneaney and S. Han, “Optimization formulation and monotonic
solution method for the Witsenhausen problem,” Automatica, vol. 55,
pp. 55 – 65, 2015.
[19] J. Lee, E. Lau, and Y.-C. Ho, “The Witsenhausen counterexample:
a hierarchical search approach for nonconvex optimization problems,”
Automatic Control, IEEE Transactions on, vol. 46, no. 3, pp. 382–397,
2001.
[20] M. Mehmetoglu, E. Akyol, and K. Rose, “A deterministic annealing
approach to Witsenhausen’s counterexample,” in Information Theory
(ISIT), 2014 IEEE International Symposium on, June 2014, pp. 3032–
3036.
[21] P. Sharma, S. Salapaka, and C. Beck, “Entropy-based framework for
dynamic coverage and clustering problems,” Automatic Control, IEEE
Transactions on, vol. 57, no. 1, pp. 135–150, 2012.
[22] Y. Xu, S. Salapaka, and C. Beck, “Clustering and coverage control for
systems with acceleration-driven dynamics,” Automatic Control, IEEE
Transactions on, vol. 59, no. 5, pp. 1342–1347, 2014.
[23] A. Kwok and S. Martinez, “A distributed deterministic annealing algorithm for limited-range sensor coverage,” Control Systems Technology,
IEEE Transactions on, vol. 19, no. 4, pp. 792–804, 2011.
[24] M. Morozkov, O. Granichin, Z. Volkovich, and X. Zhang, “Fast algorithm for finding true number of clusters. Applications to control
systems,” in Control and Decision Conference (CCDC), 2012 24th
Chinese, 2012, pp. 2001–2006.
[25] K. Rose, E. Gurewitz, and G. Fox, “Vector quantization by deterministic
annealing,” Information Theory, IEEE Transactions on, vol. 38, no. 4,
pp. 1249–1257, 1992.
[26] A. Rao, D. Miller, K. Rose, and A. Gersho, “A deterministic annealing
approach for parsimonious design of piecewise regression models,”
Pattern Analysis and Machine Intelligence, IEEE Transactions on,
vol. 21, no. 2, pp. 159–173, 1999.
[27] M. Mehmetoglu, E. Akyol, and K. Rose, “Deterministic annealingbased optimization for zero-delay source-channel coding in networks,”
Communications, IEEE Transactions on, vol. 63, no. 12, pp. 5089–5100,
2015.
[28] K. Rose, “Deterministic annealing for clustering, compression, classification, regression, and related optimization problems,” Proceedings of
the IEEE, vol. 86, no. 11, pp. 2210–2239, 1998.
[29] A. El Gamal and Y. Kim, Network Information Theory. Cambridge
University Press, 2011.
[30] Y. Wu and S. Verdu, “Witsenhausen’s counterexample: A view from
optimal transport theory,” in Decision and Control and European Control
Conference (CDC-ECC), 2011 50th IEEE Conference on, 2011, pp.
5732–5737.
[31] H. Witsenhausen, “A standard form for sequential stochastic control,”
Mathematical systems theory, vol. 7, no. 1, pp. 5–11, 1973.
[32] http://lab.scl.ece.ucsb.edu/html/witsen.html.
| 3cs.SY
|
Non-Termination Inference of Logic Programs
arXiv:cs/0406041v1 [cs.PL] 22 Jun 2004
Etienne Payet and Fred Mesnard
IREMIA, Université de La Réunion, France
We present a static analysis technique for non-termination inference of logic programs. Our
framework relies on an extension of the subsumption test, where some specific argument
positions can be instantiated while others are generalized. We give syntactic criteria to
statically identify such argument positions from the text of a program. Atomic left looping
queries are generated bottom-up from selected subsets of the binary unfoldings of the program of interest. We propose a set of correct algorithms for automating the approach. Then,
non-termination inference is tailored to attempt proofs of optimality of left termination conditions computed by a termination inference tool. An experimental evaluation is reported.
When termination and non-termination analysis produce complementary results for a logic
procedure, then with respect to the leftmost selection rule and the language used to describe
sets of atomic queries, each analysis is optimal and together, they induce a characterization
of the operational behavior of the logic procedure.
Keywords: languages, verification, logic programming, static analysis, non-termination analysis, optimal termination condition
1
Introduction
Since the work of N. Lindenstrauss on TermiLog [20, 12], several automatic tools for termination
checking (e.g. TALP [3]) or termination inference (e.g. cTI [25, 26] or TerminWeb [17]) are now
available to the logic programmer. As the halting problem is undecidable for logic programs, such
analyzers compute sufficient termination conditions implying left termination. In most works,
only universal left termination is considered and termination conditions rely on a language for
describing classes of atomic queries. The search tree associated to any (concrete) query satisfying
a termination condition is guaranteed to be finite. When terms are abstracted using the term-size
norm, the termination conditions are (disjunctions of) conjunctions of conditions of the form “the
i-th argument is ground”. Let us call this language Lterm .
In this report, which is based on an earlier conference paper [27], we present the first approach
to non-termination inference tailored to attempt proofs of optimality of termination conditions at
verification time for pure logic programs. The aim is to ensure the existence, for each class of
atomic queries not covered by a termination condition, of one query from this class which leads to
an infinite search tree when such a query is proved using any standard Prolog engine. We shall first
present an analysis which computes classes of left looping queries, where any atomic query from
such a class is guaranteed to lead to at least one infinite derivation under the usual left-to-right
selection rule. Intuitively, we begin by computing looping queries from recursive binary clauses
of the form p(. . .) ← p(. . .). Then we try to add binary clauses of the form q(. . .) ← p(. . .) to
increase the set of looping queries. Finally by combining the result of non-termination inference
with termination inference, for each predicate, we compute the set of modes for which the overall
verification system has no information.
The main contributions of this work are:
• A new application of binary unfoldings to left loop inference. [16] introduced the binary
1
unfoldings of a logic program P as a goal independent technique to transform P into a
possibly infinite set of binary clauses, which preserves the termination property [7] while
abstracting the standard operational semantics. We present a correct algorithm to construct
left looping classes of atomic goals, where such classes are computed bottom-up from selected
subsets of the binary unfoldings of the analyzed program.
• A correct algorithm which, when combined with termination inference [23], may detect
optimal left termination conditions expressed in Lterm for logic programs. When termination
and non-termination analysis produce complementary results for a logic procedure, then with
respect to the leftmost selection rule and the language used to describe sets of atomic queries,
each analysis is optimal and together, they induce a characterization of the operational
behavior of the logic procedure.
• A report on the experimental evaluation we conduct. We have fully implemented termination
and non-termination inference for logic programs. We have run the couple of analyzers on
a set of classical logic programs, the sizes of which range from 2 to 177 clauses. The results
of this experiment should help the reader to appreciate the value of the approach.
We organize the paper as follows: Section 2 presents the notations. In Section 3 we study
loop inference for binary programs. We offer a full set of correct algorithms for non-termination
inference in Section 4 and optimality proofs of termination conditions in Section 5. Finally, in
Section 6, we discuss related works. The detailed proofs of the results can be found in Appendix B,
at the end of the article.
2
2.1
Preliminaries
Functions
Let E and F be two sets. Then, f : E → F denotes that f is a partial function from E to F and
f : E F denotes that f is a function from E to F . The domain of a partial function f from E
to F is denoted by Dom(f ) and is defined as: Dom(f ) = {e | e ∈ E, f (e) exists}. Thus, if f is a
function from E to F , then Dom(f ) = E. Finally, if f : E → F is a partial function and E ′ is a
set, then f |E ′ is the function from Dom(f ) ∩ E ′ to F such that for each e ∈ Dom(f ) ∩ E ′ , f |E ′
maps e to f (e).
2.2
Logic Programming
We strictly adhere to the notations, definitions, and results presented in [1].
N denotes the set of non-negative integers and for any n ∈ N , [1, n] denotes the set {1, . . . , n}.
If n = 0 then [1, n] = ∅.
From now on, we fix a language L of programs. We assume that L contains an infinite number
of constant symbols. The set of relation symbols of L is Π, and we assume that each relation
symbol p has a unique arity, denoted arity(p). T UL (resp. T BL ) denotes the set of all (ground
and non ground) terms of L (resp. atoms of L). A query is a finite sequence of atoms A1 , . . . , An
(where n ≥ 0). When n = 1, we say that the query is atomic. Throughout this article, the
variables of L are denoted by X, Y, Z, . . . , the constant symbols by a, b, . . . , the function symbols
by f, g, h, . . . , the relation symbols by p, q, r, . . . , the atoms by A, B, . . . and the queries by Q, Q′ ,
. . . or by A, B, . . .
Let t be a term. Then V ar(t) denotes the set of variables occurring in t. This notation is
extended to atoms, queries and clauses. Let θ := {X1 /t1 , . . . , Xn /tn } be a substitution. We
denote by Dom(θ) the set of variables {X1 , . . . , Xn } and by Ran(θ) the set of variables appearing
in t1 , . . . , tn . We define V ar(θ) = Dom(θ) ∪ Ran(θ). Given a set of variables V , θ|V denotes the
substitution obtained from θ by restricting its domain to V .
2
Let t be a term and θ be a substitution. Then, the term tθ is called an instance of t. If θ is a
renaming (i.e. a substitution that is a 1-1 and onto mapping from its domain to itself), then tθ is
called a variant of t. Finally, t is called more general than t′ if t′ is an instance of t.
A logic program is a finite set of definite clauses. In program examples, we use the ISO-Prolog
syntax. Let P be a logic program. Then ΠP denotes the set of relation symbols appearing in P .
In this paper, we only focus on left derivations i.e. we only consider the leftmost selection rule.
Consider a non-empty query B, C and a clause c. Let H ← B be a variant of c variable disjoint
θ
with B, C and assume that B and H unify. Let θ be an mgu of B and H. Then B, C =⇒(B, C)θ
c
is a left derivation step with H ← B as its input clause. If the substitution θ or the clause c is
irrelevant, we drop a reference to it.
θ2
θ1
· · · of left derivation steps is called a
Q1 =⇒
Let Q0 be a query. A maximal sequence Q0 =⇒
c1
c2
left derivation of P ∪ {Q0 } if c1 , c2 , . . . are clauses of P and if the standardization apart condition
holds, i.e. each input clause used is variable disjoint from the initial query Q0 and from the mgu’s
and input clauses used at earlier steps. A finite left derivation may end up either with the empty
query (then it is a successful left derivation) or with a non-empty query (then it is a failed left
derivation). We say Q0 left loops with respect to (w.r.t.) P if there exists an infinite left derivation
+
of P ∪ {Q0 }. We write Q =⇒ Q′ if there exists a finite non-empty prefix ending at Q′ of a left
P
derivation of P ∪ {Q}.
2.3
The Binary Unfoldings of a Logic Program
Let us present the main ideas about the binary unfoldings [16] of a logic program, borrowed from
[7]. This technique transforms a logic program P into a possibly infinite set of binary clauses.
Intuitively, each generated binary clause H ← B (where B is either an atom or the atom true
which denotes the empty query) specifies that, with respect to the original program P , a call to
H (or any of its instances) necessarily leads to a call to B (or its corresponding instance).
More precisely, let Q be an atomic query. Then A is a call in a left derivation of P ∪ {Q} if
+
Q =⇒ A, B. We denote by calls P (Q) the set of calls which occur in the left derivations of P ∪ {Q}.
P
The specialization of the goal independent semantics for call patterns for the left-to-right selection
rule is given as the fixpoint of an operator TPβ over the domain of binary clauses, viewed modulo
renaming. In the definition below, id denotes the set of all binary clauses of the form true ← true
or p(X1 , . . . , Xn ) ← p(X1 , . . . , Xn ) for any p ∈ ΠP , where arity(p) = n.
c := H ← B1 , . . . , Bm ∈ P, i ∈ [1, m],
hHj ← trueii−1
∈
X
renamed
with
fresh
variables,
j=1
β
TP (X) = (H ← B)θ Hi ← B ∈ X ∪ id renamed with fresh variables,
i < m ⇒ B 6= true
θ = mgu(hB1 , . . . , Bi i, hH1 , . . . , Hi i)
We define its powers as usual. It can be shown that the least fixpoint of this monotonic operator
always exists and we set bin unf (P ) := lfp(TPβ ). Then the calls that occur in the left derivations of
P ∪{Q} can be characterized as follows: calls P (Q) = {Bθ|H ← B ∈ bin unf (P ), θ = mgu(Q, H)}.
This last property was one of the main initial motivations of the proposed abstract semantics, enabling logic programs optimizations. Similarly, bin unf (P ) gives a goal independent representation
of the success patterns of P .
But we can extract more information from the binary unfoldings of a program P : universal
left termination of an atomic query Q with respect to P is identical to universal termination of
Q with respect to bin unf (P ). Note that the selection rule is irrelevant for a binary program and
an atomic query, as each subsequent query has at most one atom. The following result lies at the
heart of Codish’s approach to termination:
Theorem 2.1 [7] Let P be a program and Q an atomic query. Then Q left loops with respect to
P iff Q loops with respect to bin unf (P ).
3
Notice that bin unf (P ) is a possibly infinite set of binary clauses. For this reason, in the algorithms
of Section 4, we compute only the first max iterations of TPβ where max is a parameter of the
analysis. As an immediate consequence of Theorem 2.1, assume that we detect that Q loops with
respect to a subset of the binary clauses of TPβ ↑ i, with i ∈ N . Then Q loops with respect to
bin unf (P ) hence Q left loops with respect to P .
Example 2.2 Consider the following program P (see [21], p. 56–58):
p(X,Z) :- p(Y,Z),q(X,Y).
p(X,X).
q(a,b).
The binary unfoldings of P are:
TPβ
TPβ
TPβ
TPβ
TPβ
TPβ
↑0
↑1
↑2
↑3
↑4
↑5
=
=
=
=
=
=
∅
{p(X, Z) ← p(Y, Z), p(X, X) ← true, q(a, b) ← true} ∪ TPβ ↑ 0
{p(a, b) ← true, p(X, Y ) ← q(X, Y )} ∪ TPβ ↑ 1
{p(X, b) ← q(X, a), p(X, Z) ← q(Y, Z)} ∪ TPβ ↑ 2
{p(X, b) ← q(Y, a)} ∪ TPβ ↑ 3
TPβ ↑ 4 = bin unf (P )
Let Q := p(X, b). Note that Q loops w.r.t. TPβ ↑ 1, hence it loops w.r.t. bin unf (P ). So Q left
loops w.r.t. P .
3
Loop Inference Using Filters
In this paper, we propose a mechanism that, given a logic program P , generates at verification
time classes of atomic queries that left loop w.r.t. P . Our approach is completely based on
the binary unfoldings of P and relies on Theorem 2.1. It consists in computing a finite subset
BinProg of bin unf (P ) and then in inferring a set of atomic queries that loop w.r.t. BinProg. By
Theorem 2.1, these queries left loop w.r.t. P .
Hence, we reduce the problem of inferring looping atomic queries w.r.t. a logic program to
that of inferring looping atomic queries w.r.t. a binary program. This is why in the sequel, our
definitions, results and discussions mainly concentrate on binary programs only.
The central point of our method is the subsumption test, as the following lifting lemma,
specialized for the leftmost selection rule, holds:
Lemma 3.1 (One Step Lifting, [1]) Let Q =⇒ Q1 be a left derivation step, Q′ be a query that is
c
more general than Q and c′ be a variant of c variable disjoint with Q′ . Then, there exists a query
Q′1 that is more general than Q1 and such that Q′ =⇒ Q′1 with input clause c′ .
c
From this result, we derive:
Corollary 3.2 Let c := H ← B be a binary clause. If B is more general than H then H loops
w.r.t. {c}.
Corollary 3.3 Let c := H ← B be a clause from a binary program BinProg . If B loops w.r.t.
BinProg then H loops w.r.t. BinProg .
These corollaries provide two sufficient conditions that can be used to design an incremental
bottom-up mechanism that infers looping atomic queries. Given a binary program BinProg , it
suffices to build the set Q of atomic queries consisting of the heads of the clauses whose body is
more general than the head. By Corollary 3.2, the elements of Q loop w.r.t. BinProg. Then, by
Corollary 3.3, the head of the clauses whose body is more general than an element of Q can safely
been added to Q while retaining the property that every query in Q loops w.r.t. BinProg.
Notice that using this technique, we may not detect some looping queries. In [15], the authors
show that there is no algorithm that, when given a right-linear binary recursive clause (i.e. a
4
binary clause p(· · · ) ← p(· · · ) such that all variables occur at most once in the body) and given
an atomic query, always decides in a finite number of steps whether or not the resolution stops. In
the case of a linear atomic query (i.e. an atomic query such that all variables occur at most once)
however, the halting problem of derivations w.r.t. one binary clause is decidable [33, 13, 14].
It can be argued that the condition provided by Corollary 3.2 is rather weak because it fails
at inferring looping queries in some simple cases. This is illustrated by the following example.
Example 3.4 Let c be the clause p(X) ← p(f (X)). We have the infinite derivation:
p(X) =⇒ p(f (X)) =⇒ p(f (f (X))) =⇒ p(f (f (f (X)))) · · ·
c
c
c
But, since the body of c is not more general than its head, Corollary 3.2 does not allow to infer
that p(X) loops w.r.t. {c}.
In this section, we distinguish a special kind of argument positions that are “neutral” for
derivation. Our goal is to extend the relation “is more general than” by, roughly, disregarding the
predicate arguments whose position has been identified as neutral. Doing so, we aim at inferring
more looping queries.
Intuitively, a set of predicate argument positions ∆ is “Derivation Neutral” (DN for short) for
a binary clause c when the following holds. Let Q be an atomic query and Q′ be a query obtained
by replacing by any terms the predicate arguments in Q whose position is in ∆. If Q =⇒ Q1 then
c
Q′ =⇒ Q′1 where Q′1 is more general than Q1 up to the arguments whose position is in ∆.
c
Example 3.5 (Example 3.4 continued) The predicate p has only one argument position, so let
us consider ∆ := hp 7→ {1}i which distinguishes position 1 for predicate p. For any derivation
step p(s) =⇒ p(s1 ) if we replace s by any term t then there exists a derivation step p(t) =⇒ p(t1 ).
c
c
Notice that p(t1 ) is more general than p(s1 ) up to the argument of p. So, by the intuition described
above, ∆ is DN for c. Consequently, as in c the body p(f (X)) is more general than the head p(X)
up to the argument of p which is neutral, by an extended version of Corollary 3.2 there exists an
infinite derivation of {c} ∪ {p(X)}.
Let us give some more concrete examples of DN positions.
Example 3.6 The second argument position of the relation symbol append in the program APPEND:
append([],Ys,Ys).
append([X|Xs],Ys,[X|Zs]) :- append(Xs,Ys,Zs).
% C1
% C2
is DN for C2. Notice that a very common programming technique called accumulator passing
(see for instance e.g. [28], p. 21–25) always produces DN positions. A classical example of the
accumulator passing technique is the following program REVERSE.
reverse(L,R) :- rev(L,[],R).
rev([],R,R).
rev([X|Xs],R0,R) :- rev(Xs,[X|R0],R).
% C1
% C2
% C3
Concerning termination, we may ignore the second and the third argument of rev in the recursive
clause C3 while unfolding a query with this clause. Only the first argument can stop the unfolding.
But we can be even more precise. Instead of only identifying positions that can be totaly
disregarded as in the above examples, we can try to identify positions where we can place any
terms for which a given condition holds.
5
Example 3.7 Consider the clause c := p(f (X)) ← p(f (f (X))). If we mean by a DN position
a position where we can place any terms, then the argument position of p is not DN for c. This
is because, for example, we have the derivation step p(X) =⇒ p(f (f (X1 ))) but if we replace X by
c
g(X) then there is no derivation step of {c} ∪ {p(g(X))}. However, if we mean by a DN position
a position where we can place any instances of f (X), then the argument position of p is DN for
c.
In the sequel of the section, we define more precisely DN positions as positions where we can
place any terms satisfying certain conditions identified by “filters”. We use filters to present an
extension of the relation “is more general than” and we propose an extended version of Corollary 3.2. We offer two syntactic conditions of increasing power for easily identifying DN positions
from mere inspection of the text of a logic program. The practical impact of such filters will be
tackled in Section 5.
3.1
Filters
Let us first introduce the notion of a filter. We use filters in order to distinguish atoms, some
arguments of which satisfy a given condition. A condition upon atom arguments, i.e. terms, can
be defined as a function in the following way.
Definition 3.8 (Term-condition) A term-condition is a function from the set of terms T UL to
{true, false}.
Example 3.9 The following functions are term-conditions.
ftrue : T UL
t
{true, false}
7→ true
f1 : T UL
{true, false}
t
f2 : T UL
t
7→
true iff t is an instance of [X|Y ]
{true, false}
7→
true iff t unifies with h(a, X)
Notice that a term-condition might give distinct results for two terms which are equal modulo
renaming. For instance f2 (X) = false and f2 (Y ) = true. However, in Definition 3.12 below, we
will only consider variant independent term-conditions.
Definition 3.10 (Variant Independent Term-Condition) A term-condition f is variant independent if, for every term t, f (t) = true implies that f (t′ ) = true for every variant t′ of t.
Example 3.11 (Example 3.9 continued) ftrue and f1 are variant independent while f2 is not.
We restrict the class of term-conditions to that of variant independent ones because we want
to extend the relation “is more general than” so that if an atom A is linked to an atom B by
the extended relation, then every variant of A is also linked to B (see Proposition 3.16 below).
This will be essential to establish the forthcoming main Proposition 3.20 which is an extension of
Corollary 3.2. Now we can define what we exactly mean by a filter.
Definition 3.12 (Filter) A filter, denoted by ∆, is a function from Π such that: for each p ∈ Π,
∆(p) is a partial function from [1, arity(p)] to the set of variant independent term-conditions.
Example 3.13 (Example 3.9 continued) Let p be a relation symbol whose arity equals 3. The
filter ∆ which maps p to the function h1 7→ ftrue , 2 →
7 f1 i and any q ∈ Π \ {p} to hi is noted
∆ := h p 7→ h1 7→ ftrue , 2 7→ f1 i i.
6
3.2
Extension of the Relation “Is More General Than”
Given a filter ∆, the relation “is more general than” can be extended in the following way: an atom
A := p(· · · ) is ∆-more general than B := p(· · · ) if the “is more general than” requirement holds
for those arguments of A whose position is not in the domain of ∆(p) while the other arguments
satisfy their associated term-condition.
Definition 3.14 (∆-more general) Let ∆ be a filter and A and B be two atoms.
• Let η be a substitution. Then A is ∆-more general than B for η if:
A = p(s1 , . . . , sn )
B = p(t1 , . . . , tn )
∀i ∈ [1, n] \ Dom(∆(p)), ti = si η
∀i ∈ Dom(∆(p)), ∆(p)(i)(si ) = true .
• A is ∆-more general than B if there exists a substitution η s.t. A is ∆-more general than B
for η.
An atomic query Q is ∆-more general than an atomic query Q′ if either Q and Q′ are both empty
or Q contains the atom A, Q′ contains the atom B and A is ∆-more general than B.
Example 3.15 (Example 3.13 continued) Let
A := p( b , X , h(a, X) )
B := p( a , [a|b] , X
)
C := p( a , [a|b] , h(Y, b) ) .
Then, A is not ∆-more general than B and C because, for instance, its second argument X is
not an instance of [X|Y ] as required by f1 . On the other hand, B is ∆-more general than A for
the substitution {X/h(a, X)} and B is ∆-more general than C for the substitution {X/h(Y, b)}.
Finally, C is not ∆-more general than A because h(Y, b) is not more general than h(a, X) and C
is not ∆-more general than B because h(Y, b) is not more general than X.
As in a filter the term-conditions are variant independent, we get the following proposition.
Proposition 3.16 Let ∆ be a filter and A and B be two atoms. If A is ∆-more general than B
then every variant of A is ∆-more general than B.
The next proposition states an intuitive result:
Proposition 3.17 Let ∆ be a filter and A and B be two atoms. Then A is ∆-more general than
B if and only if there exists a substitution η such that V ar(η) ⊆ V ar(A, B) and A is ∆-more
general than B for η.
3.3
Derivation Neutral Filters: Operational Definition
In the sequel of this paper, we focus on “derivation neutral” filters. The name “derivation neutral”
stems from the fact that in any derivation of an atomic query Q, the arguments of Q whose position
is distinguished by such a filter can be safely replaced by any terms satisfying the associated termcondition. Such a replacement does not modify the derivation process.
Definition 3.18 (Derivation Neutral) Let ∆ be a filter and c be a binary clause. We say that ∆
is DN for c if for each derivation step Q =⇒ Q1 where Q is an atomic query, for each Q′ that is
c
∆-more general than Q and for each variant c′ of c variable disjoint with Q′ , there exists a query
Q′1 that is ∆-more general than Q1 and such that Q′ =⇒ Q′1 with input clause c′ . This definition
c
is extended to binary programs: ∆ is DN for P if it is DN for each clause of P .
7
Example 3.19 The following examples illustrate the previous definition.
• Let us reconsider the program APPEND from Example 3.6 with the term-condition ftrue defined
in Example 3.9 and the filter ∆ := happend 7→ h2 7→ ftrue ii. ∆ is DN for C2. However, ∆
is not DN for APPEND because it is not DN for C1.
• Consider the following clause:
merge([X|Xs],[Y|Ys],[X|Zs]) :- merge(Xs,[Y|Ys],Zs).
The filter hmerge 7→ h2 7→ f1 ii, where the term-condition f1 is defined in Example 3.9, is
DN for this clause.
In the next subsection, we present some syntactic criteria for identifying correct DN filters. For
proving that the above filters are indeed DN, we will just check that they actually fulfill these
syntactic criteria that are sufficient conditions.
Derivation neutral filters lead to the following extended version of Corollary 3.2 (take ∆ such
that for any p, ∆(p) is a function whose domain is empty):
Proposition 3.20 Let c := H ← B be a binary clause and ∆ be a filter that is DN for c. If B is
∆-more general than H then H loops w.r.t. {c}.
We point out that the above results remain valid when the program under consideration is
restricted to its set of clauses used in the derivation steps. For instance, although the filter ∆ of
Example 3.19 is not DN for APPEND, it will help us to construct queries which loop w.r.t. C2. Such
queries also loop w.r.t. APPEND.
Notice that lifting lemmas are used in the literature to prove completeness of SLD-resolution.
As Definition 3.18 corresponds to an extended version of the One Step Lifting Lemma 3.1, it may
be worth to investigate its consequences from the model theoretic point of view.
First of all, a filter may be used to “expand” atoms by replacing every argument whose position
is distinguished by any term that satisfies the associated term-condition.
Definition 3.21 Let ∆ be a filter and A be an atom. The expansion of A w.r.t. ∆, denoted A↑∆ ,
is the set defined as
def
A↑∆ = {A} ∪ {B ∈ T BL | B is ∆-more general than A for ǫ}
where ǫ denotes the empty substitution.
Notice that in this definition, we do not necessary have the inclusion
{A} ⊆ {B ∈ T BL | B is ∆-more general than A for ǫ} .
For instance, suppose that A := p(f (X)) and that ∆ maps p to the function h1 7→ f i where f is
the term-condition mapping any term t to true iff t is an instance of g(X). Then
{B ∈ T BL | B is ∆-more general than A} = {p(t) | t is an instance of g(X)}
with A 6∈ {p(t) | t is an instance of g(X)}.
Term interpretations in the context of logic programming were first introduced in [6] and further
investigated in [11] and then in [22]. A term interpretation for L is identified with a (possibly
empty) subset of the term base T BL . So, as for atoms, a term interpretation can be expanded by
a filter.
Definition 3.22 Let ∆ be a filter and I be a term interpretation for L. Then I↑∆ is the term
interpretation for L defined as:
def [
I↑∆ =
A↑∆ .
A∈I
8
For any logic program P , we denote by C(P ) its least term model.
Theorem 3.23 Let P be a binary program and ∆ be a DN filter for P . Then C(P )↑∆ = C(P ).
Proof. The inclusion C(P ) ⊆ C(P )↑∆ is straightforward so let us concentrate on the other one
i.e. C(P )↑∆ ⊆ C(P ). Let A′ ∈ C(P )↑∆ . Then there exists A ∈ C(P ) such that A′ ∈ A↑∆ . A well
known result states:
C(P ) = {B ∈ T BL | there exists a successful derivation of P ∪ {B}}
(1)
Consequently, there exists a successful derivation ξ of P ∪{A}. Therefore, by successively applying
Definition 3.18 to each step of ξ, one construct a successful derivation of A′ . So by (1) A′ ∈ C(P ).
3.4
Some Particular DN Filters
In this section, we provide two sufficient syntactic conditions for identifying DN filters.
3.4.1
DN Sets of Positions
The first instance we consider corresponds to filters, the associated term-conditions of which are
all equal to ftrue (see Example 3.9). Within such a context, as the term-conditions are fixed, each
filter ∆ is uniquely determined by the domains of the partial functions ∆(p) for p ∈ Π. Hence the
following definition.
Definition 3.24 (Set of Positions) A set of positions, denoted by τ , is a function from Π to 2N
such that: for each p ∈ Π, τ (p) is a subset of [1, arity(p)].
Example 3.25 Let append and append3 be two relation symbols. Assume that arity(append ) = 3
and arity(append3 ) = 4. Then τ := h append 7→ {2}, append3 7→ {2, 3, 4} i is a set of positions.
Not surprisingly, the filter that is generated by a set of positions is defined as follows.
Definition 3.26 (Associated Filter) Let τ be a set of positions and ftrue be the term-condition
defined in Example 3.9. The filter ∆[τ ] defined as:
for each p ∈ Π, ∆[τ ](p) is the function from τ (p) to {ftrue }
is called the filter associated to τ .
Example 3.27 (Example 3.25 continued) The filter associated to τ is
∆[τ ] :=
happend 7→ h2 7→ ftrue i, append3 7→ h2 7→ ftrue , 3 7→ ftrue , 4 7→ ftrue ii.
Now we define a particular kind of sets of positions. These are named after “DN” because, as
stated by Theorem 3.30 below, they generate DN filters.
Definition 3.28 (DN Set of Positions) Let τ be a set of positions. We say that τ is DN for a
binary clause p(s1 , . . . , sn ) ← q(t1 , . . . , tm ) if:
si is a variable
si occurs only once in p(s1 , . . . , sn )
∀i ∈ τ (p),
∀j ∈ [1, m], si ∈ V ar(tj ) ⇒ j ∈ τ (q) .
A set of positions is DN for a binary program P if it is DN for each clause of P .
9
The intuition of Definition 3.28 is the following. If for instance we have a clause c :=
p(X, Y, f (Z)) ← p(g(Y, Z), X, Z) then in the first two positions of p we can put any terms and get
a derivation step w.r.t. c because the first two arguments of the head of c are variables that appear
exactly once in the head. Moreover, X and Y of the head reappear in the body but again only in
the first two positions of p. So, if we have a derivation step p(s1 , s2 , s3 ) =⇒ p(t1 , t2 , t3 ), we can rec
place s1 and s2 by any terms s′1 and s′2 and get another derivation step p(s′1 , s′2 , s3 ) =⇒ p(t′1 , t′2 , t′3 )
where t′3 is the same as t3 up to variable names.
c
Example 3.29 (Example 3.25 continued) τ is DN for the program:
append([X|Xs],Ys,[X|Zs]) :- append(Xs,Ys,Zs).
append3(Xs,Ys,Zs,Ts) :- append(Xs,Ys,Us).
which is a subset of the binary unfoldings of the program APPEND3:
append([],Ys,Ys).
append([X|Xs],Ys,[X|Zs]) :- append(Xs,Ys,Zs).
append3(Xs,Ys,Zs,Ts) :- append(Xs,Ys,Us), append(Us,Zs,Ts).
DN sets of positions generate DN filters.
Theorem 3.30 Let τ be a DN set of positions for a binary program P . Then ∆[τ ] is DN for P .
Proof. As we will see in Section 3.4.2, this theorem is a particular case of Theorem 3.39.
Notice that the set of DN sets of positions of any binary program P is not empty because, by
Definition 3.28, τ0 := hp 7→ ∅ | p ∈ Πi is DN for P . Moreover, an atom A is ∆[τ0 ]-more general
than an atom B iff A is more general than B.
3.4.2
DN Sets of Positions with Associated Terms
Now we consider another instance of Definition 3.18. As we will see, it is more general than the
previous one. It corresponds to filters whose associated term-conditions have all the form “is an
instance of t” where t is a term that uniquely determines the term-condition. Notice that such
term-conditions are variant independent, so it makes sense to consider such filters. Hence the
following definition.
Definition 3.31 (Sets of Positions with Associated Terms) A set of positions with associated
terms, denoted by τ + , is a function from Π such that: for each p ∈ Π, τ + (p) is a partial function
from [1, arity(p)] to T UL .
Example 3.32 Let p and q be two relation symbols whose arity is 2. Then
τ + := h p 7→ h2 7→ Xi, q 7→ h2 7→ g(X)i i
is a set of positions with associated terms.
The filter that is generated by a set of positions with associated terms is defined as follows.
Definition 3.33 (Associated Filter) Let τ + be a set of positions with associated terms. The filter
associated to τ + , denoted by ∆[τ + ], is defined as: for each p ∈ Π, ∆[τ + ](p) is the function
Dom(τ + (p))
i
The set of term-conditions
(
T UL {true, false}
7→
t
7→ true iff t is an instance of τ + (p)(i)
10
Example 3.34 (Example 3.32 continued) The filter associated to τ + is
∆[τ + ] :=
where
f1 : T UL
t
f2 : T UL
t
h p 7→ h2 7→ f1 i, q 7→ h2 7→ f2 i i
{true, false}
7→
true iff t is an instance of X
{true, false}
7→
true iff t is an instance of g(X)
As for sets of positions, we define a special kind of sets of positions with associated terms.
Definition 3.35 (DN Sets of Positions with Associated Terms) Let τ + be a set of positions with
associated terms. We say that τ + is DN for a binary clause p(s1 , . . . , sn ) ← q(t1 , . . . , tm ) if these
conditions hold:
• (DN1) ∀i ∈ Dom(τ + (p)), ∀j ∈ [1, n] \ {i}: V ar(si ) ∩ V ar(sj ) = ∅,
• (DN2) ∀hi 7→ ui i ∈ τ + (p): si is more general than ui ,
• (DN3) ∀hj 7→ uj i ∈ τ + (q): tj is an instance of uj ,
• (DN4) ∀i ∈ Dom(τ + (p)), ∀j 6∈ Dom(τ + (q)): V ar(si ) ∩ V ar(tj ) = ∅.
A set of positions with associated terms is DN for a binary program P if it is DN for each clause
of P .
This definition says that any si where i is in the domain of τ + (p) (i.e. position i is distinguished
by τ + ): (DN1) does not share its variables with the other arguments of the head, (DN2) is more
general than the term ui that i is mapped to by τ + (p), (DN4) distributes its variables to some tj
such that j is in the domain of τ + (q) (i.e. position j is distinguished by τ + ). Moreover, (DN3)
says that any tj , where j is distinguished by τ + , is such that tj is an instance of the term uj that
j is mapped to by τ + (q).
Example 3.36 (Example 3.32 continued) τ + is DN for the following program:
p(f(X),Y) :- q(X,g(X)).
q(a,g(X)) :- q(a,g(b)).
The preceding notion is closed under renaming:
Proposition 3.37 Let c be a binary clause and τ + be a set of positions with associated terms that
is DN for c. Then τ + is DN for every variant of c.
Notice that a set of positions is a particular set of positions with associated terms in the
following sense.
Proposition 3.38 Let τ be a set of positions and X be a variable. Let τ + be the set of positions
with associated terms defined as: for each p ∈ Π, τ + (p) := ( τ (p) {X} ). Then, the following
holds.
1. An atom A is ∆[τ ]-more general than an atom B iff A is ∆[τ + ]-more general than B.
2. For any binary clause c, τ is DN for c iff τ + is DN for c.
Proof. A proof follows from these remarks.
11
• Item 1 is a direct consequence of the definition of “∆-more general” (see Definition 3.14)
and the definition of the filter associated to a set of positions (see Definition 3.26) and to a
set of positions with associated terms (see Definition 3.33).
• Item 2 is a direct consequence of the definition of DN sets of positions (see Definition 3.28)
and DN sets of positions with associated terms (see Definition 3.35).
The sets of positions with associated terms of Definition 3.35 were named after “DN” because
of the following result.
Theorem 3.39 Let P be a binary program and τ + be a set of positions with associated terms that
is DN for P . Then ∆[τ + ] is DN for P .
As in the case of sets of positions, the set of DN sets of positions with associated terms of any
binary program P is not empty because, by Definition 3.35, τ0+ := hp 7→ hi | p ∈ Πi is DN for
P . Moreover, an atom A is ∆[τ0+ ]-more general than an atom B iff A is more general than B.
Finally, in Appendix A, we give an incremental algorithm (see Section 4.2) that computes a DN
set of positions with associated terms. Its correctness proof is also presented.
3.5
Examples
This section presents some examples where we use filters obtained from DN sets of positions and
DN sets of positions with associated terms to infer looping queries. As the filters we use in each
case are not “empty” (i.e. are not obtained from τ0 or τ0+ ), we are able to compute more looping
queries than using the classical subsumption test.
Example 3.40 Consider the program APPEND that we introduced in Example 3.6. Every infinite
derivation w.r.t. APPEND starting from an atomic query only uses the non-unit clause C2. Therefore, as we aim at inferring looping atomic queries w.r.t. APPEND, we only focus on C2 in the
sequel of this example.
As in C2 the body, which is append (Xs, Ys, Zs), is more general than the head, which is
append ([X |Xs], Ys, [X |Zs]), by Corollary 3.2 we have that the query append ([X |Xs], Ys, [X |Zs])
loops w.r.t. {C2}. Consequently, by the One Step Lifting Lemma 3.1, each query that is more
general than append ([X |Xs], Ys, [X |Zs]) also loops w.r.t. {C2}.
But we can be more precise than that. According to Definition 3.28, τ := h append 7→ {2} i
is a DN set of positions for {C2}. The filter associated to τ (see Definition 3.26) is ∆[τ ] :=
h append 7→ h2 7→ ftrue i i. By Theorem 3.30, ∆[τ ] is a DN filter for {C2}. Consequently, by
Definition 3.18, each query that is ∆[τ ]-more general than append ([X |Xs], Ys, [X |Zs]) loops w.r.t.
{C2}. This means that
t2 is any term and
append (t1 , t2 , t3 ) ∈ TB L
t1 , t3 is more general than [X |Xs], [X |Zs]
is a set of atomic queries that loop w.r.t. {C2}, hence w.r.t. APPEND. This set includes the ’welltyped’ query append (As, [ ], Bs).
Example 3.41 Consider the program REVERSE that was introduced in Example 3.6. As in the
example above, in order to infer looping atomic queries w.r.t. REVERSE, we only focus on the
non-unit clauses C1 and C3 in the sequel of this example. More precisely, we process the relation
symbols of the program in a bottom-up way, so we start the study with clause C3 and end it with
clause C1.
According to Definition 3.28, τ := h rev 7→ {2, 3} i is a DN set of positions for {C3}. The
filter associated to τ (see Definition 3.26) is ∆[τ ] := h rev 7→ h2 7→ ftrue , 3 7→ ftrue i i. By
Theorem 3.30, ∆[τ ] is DN for {C3}. As rev (Xs, [X |R0 ], R) (the body of C3) is ∆[τ ]-more general
than rev ([X |Xs], R0 , R) (the head of C3), by Proposition 3.20 we get that rev ([X |Xs], R0 , R) loops
w.r.t. {C3}. Notice that, unlike the example above, here we do not get this result from Corollary 3.2
12
as rev (Xs, [X |R0 ], R) is not more general than rev ([X |Xs], R0 , R). Finally, as ∆[τ ] is DN for
{C3}, by Definition 3.18 we get that each query that is ∆[τ ]-more general than rev ([X |Xs], R0 , R)
loops w.r.t. {C3}, hence w.r.t. REVERSE. This means that
t2 and t3 are any terms and
Q := rev (t1 , t2 , t3 ) ∈ TB L
t1 is more general than [X |Xs]
is a set of atomic queries that loop w.r.t. REVERSE. This set includes the ’well-typed’ query
rev (As, [ ], [ ]).
Now, consider clause C1. As rev (L, [], R) (its body) is an element of Q, then rev (L, [], R) loops
w.r.t. {C3}, hence w.r.t. {C1, C3}. Consequently, by Corollary 3.3, reverse(L, R) (the head of C1)
loops w.r.t. {C1, C3}. Let τ ′ := h rev 7→ {2, 3}, reverse 7→ {2} i. By Definition 3.28, τ ′ is DN for
{C1, C3}, so ∆[τ ′ ] is DN for {C1, C3}. Consequently, each query that is ∆[τ ′ ]-more general than
reverse(L, R) also loops w.r.t. {C1, C3} hence w.r.t. REVERSE. This means that
reverse(X, t) ∈ TB L | X is a variable and t is any term
is a set of atomic queries that loop w.r.t. REVERSE. This set includes the ’well-typed’ query
reverse(As, [ ]).
Example 3.42 Consider the two recursive clauses of the program MERGE where we have removed
the inequalities:
merge([X|Xs],[Y|Ys],[X|Zs]) :- merge(Xs,[Y|Ys],Zs). % C3
merge([X|Xs],[Y|Ys],[Y|Zs]) :- merge([X|Xs],Ys,Zs). % C4
Every set of positions τ that is DN for {C3} is such that τ (merge) = ∅ because each argument
of the head of C3 is not a variable (see Definition 3.28). Hence, using Proposition 3.20 with
a filter obtained from a DN set of positions leads to the same results as using Corollary 3.2:
as merge(Xs, [Y |Ys], Zs) is more general than merge([X |Xs], [Y |Ys], [X |Zs]), by Corollary 3.2
merge([X |Xs], [Y |Ys], [X |Zs]) loops w.r.t. {C3}. So, by the One Step Lifting Lemma 3.1, each
query that is more general than merge([X |Xs], [Y |Ys], [X |Zs]) also loops w.r.t. {C3}, hence w.r.t.
MERGE.
But we can be more precise than that. According to Definition 3.35, τ + := hmerge 7→ h2 7→
[Y |Ys]i i is a set of positions with associated terms that is DN for {C3}. Hence, by Theorem 3.39,
the associated filter ∆[τ + ] (see Definition 3.33) is DN for {C3}. So, by Definition 3.18, each query
that is ∆[τ + ]-more general than merge([X |Xs], [Y |Ys], [X |Zs]) loops w.r.t. {C3}. This means that
t is any instance of [Y |Ys] and
merge(t1 , t2 , t3 ) ∈ TB L 2
t1 , t3 is more general than [X |Xs], [X |Zs]
is a set of atomic queries that loop w.r.t. MERGE. Notice that this set includes the ’well-typed’ query
merge(As, [0], Bs). Finally, let us turn to clause C4. Reasoning exactly as above with the set of
positions with associated terms hmerge 7→ h1 7→ [X |Xs]i i which is DN for {C4}, we conclude that:
t1 is any instance of [X |Xs] and
merge(t1 , t2 , t3 ) ∈ TB L
t2 , t3 is more general than [Y |Ys], [Y |Zs]
is a set of atomic queries that loop w.r.t. MERGE. Notice that this set includes the ’well-typed’ query
merge([0], As, Bs).
4
Algorithms
We have designed a set of correct algorithms for full automation of non-termination analysis of
logic programs. These algorithms are given in Appendix A with their correctness proofs. In this
section, we present the intuitions and conceptual definitions underlying our approach.
13
4.1
Loop Dictionaries
Our technique is based on a data structure called dictionary which is a set of pairs (BinSeq, τ + )
where BinSeq is a finite ordered sequence of binary clauses and τ + is a set of positions with
associated terms. In the sequel, we use the list notation of Prolog and a special kind of dictionaries
that we define as follows.
Definition 4.1 (Looping Pair, Loop Dictionary) A pair (BinSeq, τ + ), where the list BinSeq is a
finite ordered sequence of binary clauses and τ + is a set of positions with associated terms, is a
looping pair if τ + is DN for BinSeq and:
• either BinSeq = [H ← B] and B is ∆[τ + ]-more general than H,
• or BinSeq = [H ← B, H1 ← B1 | BinSeq 1 ] and there exists a set of positions with associated
terms τ1+ such that ([H1 ← B1 | BinSeq 1 ], τ1+ ) is a looping pair and B is ∆[τ1+ ]-more general
than H1 .
A loop dictionary is a finite set of looping pairs.
Example 4.2 The pair (BinSeq := [H1 ← B1 , H2 ← B2 , H3 ← B3 ], τ1+ ) where
H1 ← B1 := r(X) ← q(X, f (f (X)))
H2 ← B2 := q(X, f (Y )) ← p(f (X), a)
H3 ← B3 := p(f (g(X)), a) ← p(X, a)
and τ1+ := hp 7→ h2 7→ ai, q 7→ h2 7→ f (X)ii is a looping pair:
• Let τ3+ := hp 7→ h2 7→ aii. Then τ3+ is a DN set of positions with associated terms for
[H3 ← B3 ]. Moreover, B3 is ∆(τ3+ )-more general than H3 . Consequently, ([H3 ← B3 ], τ3+ )
is a looping pair.
• Notice that B2 is ∆(τ3+ )-more general than H3 . Now, let τ2+ := τ1+ . Then τ2+ is DN for
[H2 ← B2 , H3 ← B3 ]. So, ([H2 ← B2 , H3 ← B3 ], τ2+ ) is a looping pair.
• Finally, notice that B1 is ∆(τ2+ )-more general than H2 . As τ1+ is DN for BinSeq, we conclude
that (BinSeq, τ1+ ) is a looping pair.
A looping pair immediately provides an atomic looping query. It suffices to take the head of
the first clause of the binary program of the pair:
Proposition 4.3 Let ([H ← B|BinSeq], τ + ) be a looping pair. Then H loops with respect to
[H ← B|BinSeq].
Proof. By induction on the length of BinSeq using Proposition 3.20, Corollary 3.3 and Theorem 3.39. So, a looping pair denotes a proof outline for establishing that H left loops. Moreover,
looping pairs can be built incrementally in a simple way as described below.
4.2
Computing a Loop Dictionary
Given a logic program P and a positive integer max , the function infer loop dict from Appendix A first computes TPβ ↑ max (the first max iterations of the operator TPβ ), which is a
finite subset of bin unf (P ). Then, using the clauses of TPβ ↑ max , it incrementally builds a loop
dictionary Dict as follows.
At start, Dict is set to ∅. Then, for each clause H ← B in TPβ ↑ max , the following actions
are performed.
• infer loop dict tries to extract from H ← B the most simple form of a looping pair: it
computes a set of positions with associated terms τ + that is DN for H ← B, then it tests if
B is ∆[τ + ]-more general than H. If so, the looping pair ([H ← B], τ + ) is added to Dict .
14
• infer loop dict tries to combine H ← B to some looping pairs that have already been
added to Dict in order to build other looping pairs. For each ([H1 ← B1 |BinSeq 1 ], τ1+ ) in
Dict, if B is ∆[τ1+ ]-more general than H1 , then a set of positions with associated terms
τ + that is DN for [H ← B, H1 ← B1 |BinSeq 1 ] is computed and the looping pair ([H ←
B, H1 ← B1 |BinSeq 1 ], τ + ) is added to Dict .
Notice that in the second step above, we compute τ + that is DN for [H ← B, H1 ← B1 |BinSeq 1 ].
As we already hold τ1+ that is DN for [H1 ← B1 |BinSeq 1 ], it is more interesting, for efficiency
reasons, to compute τ + from τ1+ instead of starting from the ground. Indeed, starting from τ1+ ,
one uses the information stored in τ1+ about the program [H1 ← B1 |BinSeq 1 ], which may speed
up the computation substantially. This is why we have designed a function dna that takes two
arguments as input, a binary program BinProg and a set of positions with associated terms τ + . It
computes a set of positions with associated terms that is DN for BinProg and that refines τ + . On
+
the other hand, the function unit loop calls dna with τmax
which is the initial set of positions with
+
+
associated terms defined as follows: Dom(τmax (p)) = [1, arity(p)] for each p ∈ Π and τmax
(p)(i) is
a variable for each i ∈ [1, arity(p)].
Example 4.4 Consider the program APPEND3
append3(Xs,Ys,Zs,Us) :- append(Xs,Ys,Vs), append(Vs,Zs,Us).
β
augmented with the APPEND program. The set TAPPEND3
↑ 2 includes:
append([A|B],C,[A|D]) :- append(B,C,D).
append3(A,B,C,D) :- append(A,B,E).
append3([],A,B,C) :- append(A,B,C).
% BC1
% BC2
% BC3
From clause BC1 we get the looping pair (BinSeq 1 , τ1+ ) where
BinSeq 1 = append ([X1 |X2 ], X3 , [X1 |X4 ]) ← append (X2 , X3 , X4 )
and τ1+ (append ) = h2 7→ X3 i. From this pair and the clause BC2, we get the looping pair
(BinSeq 2 , τ2+ ) where:
BinSeq 2 =
append3 (X1 , X2 , X3 , X4 ) ← append (X1 , X2 , X5 ),
append ([X1 |X2 ], X3 , [X1 |X4 ]) ← append (X2 , X3 , X4 )
and τ2+ (append ) = h2 7→ X3 i and τ2+ (append3 ) = h2 7→ X2 , 3 7→ X3 , 4 7→ X4 i.
Finally, from (BinSeq 1 , τ1+ ) and BC3, we get the looping pair (BinSeq 3 , τ3+ ) where:
BinSeq 3 =
append3 ([], X1 , X2 , X3 ) ← append (X1 , X2 , X3 ),
append ([X1 |X2 ], X3 , [X1 |X4 ]) ← append (X2 , X3 , X4 )
and τ3+ (append ) = h2 7→ X3 i and τ3+ (append3 ) = h3 7→ X2 i.
Example 4.5 Consider the program PERMUTE:
delete(X,[X|Xs],Xs).
delete(Y,[X|Xs],[X|Ys]) :- delete(Y,Xs,Ys).
permute([],[]).
permute([X|Xs],[Y|Ys]) :- delete(Y,[X|Xs],Zs), permute(Zs,Ys).
β
The set TPERMUTE
↑ 1 includes:
15
delete(B,[C|D],[C|E]) :- delete(B,D,E).
permute([B|C],[D|E]) :- delete(D,[B|C],F).
% BC1
% BC2
From clause BC1 we get the looping pair (BinSeq 1 , τ1+ ) where
BinSeq 1 = delete(X1 , [X2 |X3 ], [X2 |X4 ]) ← delete(X1 , X3 , X4 )
and τ1+ (delete) = h1 7→ X1 i. From this pair and BC2, we get the looping pair (BinSeq 2 , τ2+ ) where:
BinSeq 2 =
permute([X1 |X2 ], [X3 |X4 ]) ← delete(X3 , [X1 |X2 ], X5 ),
delete(X1 , [X2 |X3 ], [X2 |X4 ]) ← delete(X1 , X3 , X4 )
and τ2+ (delete) = h1 7→ X1 i and τ2+ (permute) = h2 7→ [X3 |X4 ]i.
4.3
Looping Conditions
One of the main purposes of this article is the inference of classes of atomic queries that left loop
w.r.t. a given logic program. Classes of atomic queries we consider are defined by pairs (A, τ + )
where A is an atom and τ + is a set of positions with associated terms. Such a pair denotes the
set of queries A↑τ + , the definition of which is similar to that of the expansion of an atom, see
Definition 3.21.
Definition 4.6 Let A be an atom and τ + be a set of positions with associated terms. Then A↑τ +
denotes the class of atomic queries defined as:
def
A↑τ + = {A} ∪ {B ∈ T BL | B is ∆[τ + ]-more general than A} .
Once each element of A↑τ + left loops w.r.t. a logic program, we get what we call a looping
condition for that program:
Definition 4.7 (Looping Condition) Let P be a logic program. A looping condition for P is a
pair (A, τ + ) such that each element of A↑τ + left loops w.r.t. P .
The function infer loop cond takes as arguments a logic program P and a non-negative
integer max . Calling infer loop dict(P, max ), it first computes a loop dictionary Dict . Then,
it computes from Dict looping conditions for P as follows. The function extracts the pair (H, τ + )
from each element ([H ← B|BinSeq], τ + ) of Dict . By Proposition 4.3, H loops w.r.t. [H ←
B|BinSeq]. As τ + , hence ∆[τ + ], is DN for [H ← B|BinSeq], by Definition 3.18 each element of
H↑τ + loops w.r.t. [H ← B|BinSeq]. Finally, as [H ← B|BinSeq] ⊆ TPβ ↑ max ⊆ bin unf (P ), by
Theorem 2.1, each element of H↑τ + left loops w.r.t. P .
Example 4.8 (Example 4.4 continued) From each looping pair we have infered, we get the following information.
• (append ([X1 |X2 ], X3 , [X1 |X4 ]), τ1+ ) is a looping condition. So, each query append (t1 , t2 , t3 ),
where [X1 |X2 ] = t1 η and [X1 |X4 ] = t3 η for a substitution η and t2 is an instance of X3
(because τ1+ (append )(2) = X3 ), left loops w.r.t. APPEND3. In other words, each query
append (t1 , t2 , t3 ), where [X1 |X2 ] = t1 η and [X1 |X4 ] = t3 η for a substitution η and t2 is
any term, left loops w.r.t. APPEND3.
• (append3 (X1 , X2 , X3 , X4 ), τ2+ ) is a looping condition. As we have τ2+ (append3 )(2) = X2 ,
τ2+ (append3 )(3) = X3 and τ2+ (append3 )(4) = X4 , this means that each query of form
append3 (x1 , t2 , t3 , t4 ), where t2 , t3 and t4 are any terms, left loops w.r.t. APPEND3.
• (append3 ([], X1 , X2 , X3 ), τ3+ ) is a looping condition. So, as τ3+ (append3 )(3) = X2 , this
means that each query of form append3 ([], X1 , t, X3 ), where t is any term, left loops w.r.t.
APPEND3.
16
Example 4.9 (Example 4.5 continued) From each looping pair we have infered, we get the following information.
• (delete(X1 , [X2 |X3 ], [X2 |X4 ]), τ1+ ) is a looping condition. As τ1+ (delete)(1) = X1 , this means
that each query of form delete(t1 , t2 , t3 ), where t1 is any term and [X2 |X3 ] = t2 η and
[X2 |X4 ] = t3 η for a substitution η, left loops w.r.t. PERMUTE.
• (permute([X1 |X2 ], [X3 |X4 ]), τ2+ ) is a looping condition. As τ2+ (permute)(2) = [X3 |X4 ], this
means that each query of form permute(t1 , t2 ), where t1 is more general than [X1 |X2 ] and
t2 is any instance of [X3 |X4 ], left loops w.r.t. PERMUTE.
5
An Application: Proving Optimality of Termination Conditions
[26] presents a tool for inferring termination conditions that are expressed as multi-modes, i.e.
as disjunctions of conjunctions of propositions of form “the i-th argument is ground”. In this
section, we describe an algorithm that attempts proofs of optimality of such conditions using the
algorithms for non-termination inference of the previous section.
5.1
Optimal Terminating Multi-modes
Let P be a logic program and p ∈ ΠP be a relation symbol, with arity(p) = n. First, we describe
the language we use for abstracting sets of atomic queries:
Definition 5.1 (Mode) A mode mp for p is a subset of [1, n], and denotes the following set of
atomic goals: [mp ] = {p(t1 , . . . , tn ) ∈ TB L | ∀i ∈ mp Var (ti ) = ∅}. The set of all modes for p,
i.e. 2[1,n] , is denoted modes(p).
Note that if mp = ∅ then [mp ] = {p(t1 , . . . , tn ) ∈ TB L }. Since a logic procedure may have
multiple uses, we generalize:
Definition 5.2 (Multi-mode) A multi-mode Mp for p is a finite set of modes for p and denotes
the following set of atomic queries: [Mp ] = ∪m∈Mp [m].
Note that if Mp = ∅, then [Mp ] = ∅. Now we can define what we mean by terminating and
looping multi-modes:
Definition 5.3 (Terminating mode, terminating multi-mode) A terminating mode mp for p is a
mode for p such that any query in [mp ] left terminates w.r.t. P . A terminating multi-mode TM p
for p is a finite set of terminating modes for p.
Definition 5.4 (Looping mode, looping multi-mode) A looping mode mp for p is a mode for p
such that there exists a query in [mp ] which left loops w.r.t. P . A looping multi-mode LM p for p
is a finite set of looping modes for p.
As left termination is instantiation-closed, any mode that is “below” (less general than) a
terminating mode is also a terminating mode. Similarly, as left looping is generalization-closed,
any mode that is “above” (more general than) a looping mode is also a looping mode. Let us be
more precise:
Definition 5.5 (Less general, more general) Let Mp be a multi-mode for the relation symbol p.
We set:
less general (Mp ) =
more general (Mp ) =
{m ∈ modes(p) | ∃m′ ∈ Mp [m] ⊆ [m′ ]}
{m ∈ modes(p) | ∃m′ ∈ Mp [m′ ] ⊆ [m]}
17
looping modes(L, p):
in: L: a finite set of looping conditions
p: a predicate symbol
out: a looping multi-mode for p
1: LM p := ∅
2: for each (p(t1 , . . . , tn ), τ + ) ∈ L do
3:
mp := Dom(τ + (p)) ∪ {i ∈ [1, n] | Var (ti ) = ∅}
4:
LM p := LM p ∪ {mp }
5: return LM p
Figure 1:
We are now equipped to present a definition of optimality for terminating multi-modes:
Definition 5.6 (Optimal terminating multi-mode) A terminating multi-mode TM p for p is optimal if there exists a looping multi-mode LM p verifying:
modes(p) = less general (TM p ) ∪ more general (LM p )
Otherwise stated, given a terminating multi-mode TM p , if each mode which is not less general
than a mode of TM p is a looping mode, then TM p characterizes the operational behavior of p
w.r.t. left termination and our language for defining sets of queries.
Example 5.7 Consider the program APPEND. A well-known terminating multi-mode is the set
TM append = {{1}, {3}}. Indeed, any query of the form append(t,Ys,Zs) or append(Xs,Ys,t),
where t is a ground term ( i.e. such that Var(t) = ∅), left terminates. We have:
less general (TM append ) = {{1}, {3}, {1, 2}, {1, 3}, {2, 3}, {1, 2, 3}}
On the other hand, append(Xs,[],Zs) left loops. Hence LM append = {{2}} is a looping condition
and more general (LM append ) = {∅, {2}}.
Since modes(append ) = less general (TM append ) ∪ more general (LM append ), we conclude that
the terminating multi-mode TM append is optimal.
5.2
Algorithms
Suppose we hold a finite set L of looping conditions for P . Then, each element (p(t1 , . . . , tn ), τ + )
of L provides an obvious looping mode for p: it suffices to take {i ∈ [1, n] | Var(ti ) = ∅}. But
actually, we can extract more information from L. Let p(t′1 , . . . , t′n ) be an atom such that:
• for each hi 7→ ui i ∈ τ + (p), t′i is a ground instance of ui ,
• for each i in [1, n] \ Dom(τ + (p)), t′i = ti .
Then, p(t′1 , . . . , t′n ) belongs to p(t1 , . . . , tn )↑τ + , hence it left loops w.r.t. P . Consequently, we
have that Dom(τ + (p)) ∪ {i ∈ [1, n] | Var (ti ) = ∅} is a looping mode for p. The function
looping modes of Fig. 1 is an application of these remarks.
Now we have the essential material for the design of a tool that attempts proofs of optimality
of left terminating multi-modes computed by a termination inference tool as e.g. cTI [26] or
TerminWeb [17]. For each pair (p, ∅) in the set the function optimal tc of Fig. 2 returns, we can
conclude that the corresponding TM p is the optimal terminating multi-mode which characterizes
the operational behavior of p with respect to Lterm .
18
optimal tc(P , max , {TM p }p∈ΠP ):
in: P : a logic program
max : a non-negative integer
{TM p }p∈ΠP : a finite set of terminating multi-modes
out: a finite set of pairs (p, Mp ) such that p ∈ ΠP and
Mp is a multi-mode for p with no information w.r.t. its left behaviour
note: if for each p ∈ Πp , Mp = ∅, then {TM p }p∈ΠP is optimal
1:
2:
3:
4:
5:
6:
7:
Res := ∅
L := infer loop cond(P, max )
for each p ∈ ΠP do
LM p := looping modes(L, p)
Mp := modes(p) \ (less general(TM p ) ∪ more general(LM p ))
Res := Res ∪ {(p, Mp )}
return Res
Figure 2:
Example 5.8 (Example 4.8 continued) We apply our algorithm to the program APPEND3 of Example 4.4. We get that
L := { (append ([X1 |X2 ], X3 , [X1 |X4 ]),
(append3 (X1 , X2 , X3 , X4 ),
(append3 ([], X1 , X2 , X3 ),
τ1+ ),
τ2+ ),
τ3+ )
}
is a finite set of looping conditions for APPEND3 (see Example 4.8) with
Dom(τ1+ (append ))
=
{2}
Dom(τ2+ (append3 )) =
{2, 3, 4}
Dom(τ3+ (append3 ))
{3}
=
So, for append we have:
LM append :=
more general(LM append ) =
looping modes(L, append ) = {{2}}
{∅, {2}}
TM append
less general(TM append )
=
=
{{1}, {3}}
{{1}, {3}, {1, 2}, {1, 3}, {2, 3}, {1, 2, 3}}
Mappend
=
{}
For append3 , we get:
• the looping mode {2, 3, 4} from (append3 (X1 , X2 , X3 , X4 ), τ2+ ) and
• the looping mode mp := {1, 3} from (append3 ([], X1 , X2 , X3 ), τ3+ ) (notice that 3 ∈ mp because
Dom(τ3+ (append3 )) = {3} and 1 ∈ mp because of constant [] which is the first argument of
append3 ([], X1 , X2 , X3 ).)
19
So, we have:
LM append3 :=
more general(LM append3 ) =
looping modes(L, append3 ) = {{2, 3, 4}, {1, 3}}
{∅, {1}, {2}, {3}, {4}, {1, 3}, {2, 3}, {2, 4},
{3, 4}, {2, 3, 4}}
TM append3
less general(TM append3 )
Mappend3
=
=
{{1, 2}, {1, 4}}
{{1, 2}, {1, 4}, {1, 2, 3}, {1, 2, 4}, {1, 3, 4},
=
{1, 2, 3, 4}}
{}
Hence in both cases, we have characterized the left behaviour of the predicates by using two complementary tools.
5.3
An Experimental Evaluation
We have implemented1 the algorithms presented in Sections 4 and 5.2. The binary unfoldings
algorithm is derived from the one described in [7], where we added time stamps to precisely
control what is computed at each iteration. Looping modes are computed starting from the leaves
of the call graph then moving up to its roots. The cTI termination inference tool2 is detailed in
[26, 24]. Here is the configuration we used for this experiment: Intel 686, 2.4GHz, 512Mb, Linux
2.4, SICStus Prolog 3.10.1, 24.8 MLips. Timings in seconds are average over 10 runs.
First we have applied them on some small programs from standard benchmarks of the termination analysis literature [30, 2, 9] (predefined predicates were erased). The column opt? of Table
1 indicates whether the result of cTI (see [26]) is proved optimal (X) or not (? ). The column
max gives the least non-negative integer implying optimality or the least non-negative integer n
where it seems we get the most precise information from non-termination inference (i.e. for n and
n + 1, the analyser delivers the same results). Then timings in seconds (t[s]) appear, followed by
a pointer to a comment to the notes below.
Notes:
1. The predicate fold/3 is defined by:
fold(X,[],X).
fold(X,[Y|Ys],Z) :- op2(X,Y,V), fold(V,Ys,Z).
When the predicate op2/3 is defined by the fact op2(A,B,C), the result of cTI is optimal.
When the predicate op2/3 is defined by the fact op2(a,b,c), no looping mode is found and
the result of cTI is indeed sub-optimal as the query fold(X,Y,Z) terminates.
2. Termination proofs for mergesort require the list-size norm, while cTI applies the term-size
norm.
3. The result of cTI is not optimal. The analyzed program:
p(A,B) :- q(A,C),p(C,B).
p(A,A).
q(a,b).
has finite binary unfoldings because there is no function symbol. Hence its termination is
decidable (see [7]). This could be easily detected at analyze time. We notice that no looping
mode is found. But as any constant is mapped to 0 by the term-size norm, the modes
modes(p) remain undecided for cTI while they all terminate.
1 Available
2 Available
from http://www.univ-reunion.fr/~gcc
from http://www.cs.unipr.it/cTI
20
Table 1: Some De Schreye’s, Apt’s, and Plümer’s programs.
program
permute
duplicate
sum
merge
dis-con
reverse
append
list
fold
lte
map
member
mergesort
mergesort ap
naive rev
ordered
overlap
permutation
quicksort
select
subset
sum peano
pl2.3.1
pl3.5.6
pl4.4.6a
pl4.5.2
pl4.5.3a
pl5.2.2
pl7.2.9
pl7.6.2a
pl7.6.2b
pl7.6.2c
pl8.3.1a
pl8.4.1
pl8.4.2
top-level predicate
permute(X,Y)
duplicate(X,Y)
sum(X,Y,Z)
merge(X,Y,Z)
dis(X)
reverse(X,Y,Z)
append(X,Y,Z)
list(X)
fold(X,Y,Z)
goal
map(X,Y)
member(X,Y)
mergesort(X,Y)
mergesort ap(X,Y,Z)
naive rev(X,Y)
ordered(X)
overlap(X,Y)
permutation(X,Y)
quicksort(X,Y)
select(X,Y,Z)
subset(X,Y)
sum(X,Y,Z)
p(X,Y)
p(X)
perm(X,Y)
s(X,Y)
p(X)
turing(X,Y,Z,T)
mult(X,Y,Z)
reach(X,Y,Z)
reach(X,Y,Z,T)
reach(X,Y,Z,T)
minsort(X,Y)
even(X)
e(X,Y)
cTI
term-cond
X
X ∨Y
X ∨Y ∨Z
(X ∧ Y ) ∨ Z
X
X
X ∨Z
X
Y
1
X ∨Y
Y
0
Z
X
X
X ∧Y
X
X
Y ∨Z
X ∧Y
Y ∨Z
0
X
X
0
0
0
X ∧Y
0
0
Z∧T
X
X
X
21
t[s]
0.01
0.01
0.01
0.02
0.02
0.02
0.01
0.01
0.01
0.01
0.01
0.01
0.04
0.08
0.02
0.01
0.01
0.03
0.05
0.01
0.01
0.01
0.01
0.01
0.02
0.03
0.01
0.08
0.02
0.02
0.02
0.02
0.03
0.02
0.05
opt?
X
X
X
X
X
X
X
X
?
X
X
X
?
?
X
X
X
X
X
X
X
X
?
X
X
X
X
?
X
?
?
?
X
X
X
Optimal
max
t[s]
1
0.01
1
0.01
1
0.01
1
0.01
2
0.01
1
0.01
1
0.01
1
0.01
2
0.01
1
0.01
2
0.01
1
0.01
2
0.01
2
0.02
1
0.01
1
0.01
2
0.01
1
0.01
1
0.01
1
0.01
2
0.01
1
0.01
1
0.01
2
0.01
1
0.01
1
0.01
1
0.01
2
0.03
4
0.03
1
0.01
1
0.01
2
0.02
2
0.02
2
0.01
3
0.04
cf.
note 1
note 2
note 3
note 4
note 5
note 6
Table 2: Some middle-sized programs.
program
name
ann
bid
boyer
browse
credit
peephole
plan
qplan
rdtok
read
warplan
clauses
177
50
136
30
57
134
29
148
55
88
101
cTI
Q%
48
100
84
53
100
88
100
61
44
52
32
t[s]
1.00
0.14
0.30
0.26
0.11
1.08
0.11
1.13
0.65
1.72
0.49
max=1
Opt%
t[s]
46
0.14
55
0.02
80
0.03
46
0.03
91
0.02
23
0.06
68
0.02
50
0.11
44
0.11
39
0.04
37
0.07
Optimal
max=2
Opt%
t[s]
68
1.34
90
0.08
96
0.22
80
0.18
95
0.11
70
3.62
81
0.09
79
1.60
88
40.2
47
0.80
83
0.99
max=3
Opt%
t[s]
74
32.4
95
0.50
100
3.66
100
6.05
100
4.46
70
406
81
0.37
81
1911
?
> 3600
47
10.9
91
21.5
4. The analyzed program (from [30], p. 64) simulates a Turing machine. The result of cTI is
optimal.
5. With respect to the program:
mult(0,A,0).
mult(s(A),B,C) :- mult(A,B,D),add(D,B,C).
add(0,A,A).
add(s(A),B,s(C)) :- add(A,B,C).
the query mult(s(s(0)),A,B) is automatically detected as looping, although mult(0,A,B)
and mult(s(0),A,B) do terminate.
6. These three programs propose various definitions of the reachability relation between two
nodes in a list of edges. For the first and the third definition, cTI is indeed optimal. For the
second one, cTI is not optimal.
Next, we have applied the couple of analyzers to some middle-sized Prolog programs, see Table
2. Again, predefined predicates were all erased, while they are usually taken into account for cTI
which of course improves the analysis. In other words, we only consider the logic programming
skeleton of each program. The first two columns give the name of the file and its size (number of
clauses). The fourth column indicates the running time (in seconds) of the termination analysis,
while the third column is the ratio of predicates for which a non-false termination condition is
computed over the total number of predicates defined in the program. For instance, cTI is able
to show that there is at least one terminating mode for 48% of the predicates defined in the
program ann. We ran the non-termination analyzer with 1 ≤ max ≤ 3 iterations. For each value
of max, we give the running time (in seconds) and the ratio of predicates for which looping modes
complement terminating modes. For example, with respect to the program ann, for max = 2 we
get the full complete mode termination behavior of 68% of all the defined predicates.
We note that when we increase max, we obtain better results but the running times also
increase, which is fairly obvious. For max = 3, we get good to optimal results but the binary
unfoldings approach reveals its potentially explosive nature: we aborted the analysis of rdtok
after one hour of computation.
In conclusion, from such a naive implementation, we were rather surprised by the quality of the
combined analysis. Adopting some more clever implementation schemes, for instance computing
the binary unfoldings in a demand driven fashion, could be investigated to improve the running
times.
22
6
Related Works
Some extensions of the Lifting Theorem with respect to infinite derivations are presented in [18],
where the authors study numerous properties of finite failure. The non-ground finite failure set
of a logic program is defined as the set of possibly non-ground atoms which admit a fair finitely
failed SLD-tree w.r.t. the program. This denotation is shown correct in the following sense. If two
programs have the same non-ground finite failure set, then any ground or non-ground goal which
finitely fails w.r.t. one program also finitely fails w.r.t. the other. Such a property is false when we
consider the standard ground finite failure set. The proof of correctness of the non-ground finite
failure semantics relies on the following result. First, a derivation is called non-perpetual if it is
a fair infinite derivation and there exists a finite depth from which unfolding does not instantiate
the original goal any more. Then the authors define the definite answer goal of a non-perpetual
derivation as the maximal instantiation of the original goal. A crucial lemma states that any
instance of the definite answer goal admits a similar non-perpetual derivation. Compared to our
work, note that we do not need fairness as an hypothesis for our results. On the other hand,
investigating the relationships between non-ground arguments of the definite answer and neutral
arguments is an interesting problem.
In [35], the authors present a dynamic approach to characterize (in the form of a necessary
and sufficient condition) termination of general logic programs. Their technique employs some
key dynamic features of an infinite generalized SLDNF-derivation, such as repetition of selected
subgoals and recursive increase in term size.
Loop checking in logic programming is also a subject related to our work. In this area, [5] sets
up some solid foundations. A loop check is a device to prune derivations when it seems appropriate.
A loop checker is defined as sound if no solution is lost. It is complete if all infinite derivations
are pruned. A complete loop check may also prune finite derivations. The authors show that even
for function-free programs (also known as Datalog programs), sound and complete loop checks are
out of reach. Completeness is shown only for some restricted classes of function-free programs.
We now review loop checking in more details. To our best knowledge, among all existing
loop checking mechanisms only OS-check [32], EVA-check [34] and VAF-check [36] are suitable for
logic programs with function symbols. They rely on a structural characteristic of infinite SLDderivations, namely, the growth of the size of some generated subgoals. This is what the following
theorem states.
Theorem 6.1 Consider an infinite SLD-derivation ξ where the leftmost selection rule is used.
Then there are infinitely many queries Qi1 , Qi2 , . . . (with i1 < i2 < . . . ) in ξ such that for
any j ≥ 1, the selected atom Aij of Qij is an ancestor of the selected atom Aij+1 of Qij+1 and
size(Aij+1 ) ≥ size(Aij ).
Here, size is a given function that maps an atom to its size which is defined in terms of the number
of symbols appearing in the atom. As this theorem does not provide any sufficient condition to
detect infinite SLD-derivations, the three loop checking mechanisms mentioned above may detect
finite derivations as infinite. However, these mechanisms are complete w.r.t. the leftmost selection
rule i.e. they detect all infinite loops when the leftmost selection rule is used.
OS-check (for OverSize loop check) was first introduced by Shalin [31, 32] and was then formalized by Bol [4]. It is based on a function size that can have one of the three following definitions:
for any atoms A and B, either size(A) = size(B), either size(A) (resp. size(B)) is the count of
symbols appearing in A (resp. B), either size(A) ≤ size(B) if for each i, the count of symbols of
the i-th argument of A is smaller than or equal to that of the i-th argument of B. OS-check says
that an SLD-derivation may be infinite if it generates an atomic subgoal A that is oversized, i.e.
that has ancestor subgoals which have the same predicate symbol as A and whose size is smaller
than or equal to that of A.
EVA-check (for Extented Variant Atoms loop check) was introduced by Shen [34]. It is based
on the notion of generalized variants (if Gi and Gj (i < j) are two goals in an SLD-derivation, an
atom A in Gj is a generalized variant of an atom A′ in Gi if A is a variant of A′ except for some
arguments whose size increases from A′ to A via a set of recursive clauses.) EVA-check says that
23
an SLD-derivation may be infinite if it generates an atomic subgoal A that is a generalized variant
of some of its ancestor A′ . Here the size function that is used applies to predicate arguments,
i.e. to terms, and it is fixed: it is defined as the the count of symbols that appear in the terms.
EVA-check is more reliable than OS-check because it is less likely to mis-identify infinite loops
[34]. This is mainly due to the fact that, unlike OS-check, EVA-check refers to the informative
internal structure of subgoals.
VAF-check (for Variant Atoms loop check for logic programs with Functions) was proposed by
Shen et al. [36]. It is based on the notion of expanded variants. An atom A is an expanded variant
of an atom A′ if, after variable renaming, A becomes B that is the same as A′ except that there
may be some terms at certain positions in A′ , each A′ [i] . . . [k] of which grows in B into a function
B[i] . . . [k] = f (. . . , A′ [i] . . . [k], . . . ) (here, we use A′ [i] . . . [k] (resp. B[i] . . . [k]) to refer to the k-th
argument of . . . of the i-th argument of A′ (resp. B)). VAF-check says that an SLD-derivation
may be infinite if it generates an atomic subgoal A that is an expanded variant of some of its
ancestor A′ . VAF-check is as reliable as and more efficient than EVA-check [36].
The main difference with our work is that we want to infer atomic queries which are guaranteed
to be left looping. Hence, we consider sufficient conditions for looping, in contrast to the above
mentioned methods which consider necessary conditions. Our technique returns a set of queries
for which it has pinpointed one infinite derivation. Hence, we are not interested in soundness
as we do not care of finite derivations, nor in completeness, as the existence of just one infinite
derivation suffices. Of course, using the ∆-subsumption test as a loop checker leads to a device that
is neither sound (since ∆-subsumption is a particular case of subsumption) nor complete (since
the ∆-subsumption test provides a sufficient but not necessary condition). This is illustrated by
the following example.
Example 6.2 Let c := p(X, X) ← p(f (X), f (X)). As the arguments of the head of c have one
common variable X, every set of positions with associated terms τ + that is DN for {c} is such
that the domain of τ + (p) is empty (see (DN1) in Definition 3.35). Notice that from the head
p(X, X) of c we get
p(X, X) =⇒ p(f (X), f (X)) =⇒ · · · =⇒ p(f n (X), f n (X)) =⇒ · · ·
c
c
c
c
As the arguments of p grow from step to step, there cannot be any query in the derivation that is
∆[τ + ]-more general than one of its ancestors. Consequently, we can not conclude that p(X, X)
left loops w.r.t {c}.
On the other hand, using loop checking approaches to infer classes of atomic left looping queries
is not satisfactory because, as we said above, non-looping queries may be mis-identified as looping.
Example 6.3 We cannot replace, in Corollary 3.2, the subsumption test by the expanded variant
test used in VAF-check because, for instance, in the clause c := p(a) ← p(f (a)), we have: p(f (a))
is an expanded variant of p(a), but p(a) does not loop w.r.t. c.
Finally, [10] is also related to our study. In this paper, the authors describe an algorithm for
detecting non-terminating queries to clauses of the type p(· · · ) ← p(· · · ). The algorithm is able to
check if such a given clause has no non-terminating queries or has a query which either loops or fails
due to occur check. Moreover, given a linear atomic goal (i.e. a goal where all variable occurs at
most once), the algorithm is able to check if the goal loops or not w.r.t. the clause. The technique
of the algorithm is based on directed weighted graphs [14] and on a necessary and sufficient
condition for the existence of non-terminating queries to clauses of the type p(· · · ) ← p(· · · ). This
condition is proved in [8] and is expressed in terms of rational trees.
7
Conclusion
We have presented a extension of the subsumption test which allows to disregard some arguments,
termed neutral arguments, while checking for subsumption. We have proposed two syntactic
24
criteria for statically identifying neutral arguments. From these results, in the second part of this
report we have described algorithms for automating non-termination analysis of logic programs,
together with correctness proofs. Finally, we have applied these techniques to check the optimality
of termination conditions for logic programs.
This paper leaves numerous questions open. For instance, it might be interesting to try to
generalize this approach to constraint logic programming [19]. Can we obtain higher level proofs
compared to those we give? Can we propose more abstract criteria for identifying neutral arguments? A first step in this direction is presented in [29]. Also, our work aims at inferring classes
of atomic left looping queries, using a bottom-up point of view. Experimental data show that it
may sometimes lead to prohibitive time/space costs. How can we generate only the useful binary
clauses without fully computing the iterations of this TP -like operator? Or can we adapt our
algorithms towards a more efficient correct top-down approach for checking non-termination?
Acknowledgments
We thank Ulrich Neumerkel for numerous discussions on this topic, Roberto Bagnara and anonymous referees for interesting suggestions.
References
[1] K. R. Apt. From Logic Programming to Prolog. Prentice Hall, 1997.
[2] K. R. Apt and D. Pedreschi. Modular termination proofs for logic and pure Prolog programs.
In G. Levi, editor, Advances in Logic Programming Theory, pages 183–229. Oxford University
Press, 1994.
[3] T. Arts and H. Zantema. Termination of logic programs using semantic unification.
In Logic Program Synthesis and Transformation, volume 1048 of Lecture Notes in Computer Science. Springer-Verlag, Berlin, 1996. TALP can be used online at the address:
http://bibiserv.techfak.uni.biekefeld.de/talp/.
[4] R. N. Bol. Loop checking in partial deduction. Journal of Logic Programming, 16:25–46,
1993.
[5] R. N. Bol, K. R. Apt, and J. W. Klop. An analysis of loop checking mechanisms for logic
programs. Theoretical Computer Science, 86:35–79, 1991.
[6] K. L. Clark. Predicate logic as a computational formalism. Technical Report Doc 79/59,
Logic Programming Group, Imperial College, London, 1979.
[7] M. Codish and C. Taboch. A semantic basis for the termination analysis of logic programs.
Journal of Logic Programming, 41(1):103–123, 1999.
[8] D. De Schreye, M. Bruynooghe, and K. Verschaetse. On the existence of nonterminating
queries for a restricted class of Prolog-clauses. Artificial Intelligence, 41:237–248, 1989.
[9] D. De Schreye and S. Decorte. Termination of logic programs : the never-ending story. Journal
of Logic Programming, 19-20:199–260, 1994.
[10] D. De Schreye, K. Verschaetse, and M. Bruynooghe. A practical technique for detecting nonterminating queries for a restricted class of Horn clauses, using directed, weighted graphs. In
Proc. of ICLP’90, pages 649–663. The MIT Press, 1990.
[11] P. Deransart and G. Ferrand. Programmation en logique avec négation: présentation
formelle. Technical Report 87/3, Laboratoire d’Informatique, Département de Mathématiques
et d’Informatique, Université d’Orleans, 1987.
25
[12] N. Dershowitz, N. Lindenstrauss, Y. Sagiv, and A. Serebrenik. A general framework
for automatic termination analysis of logic programs. Applicable Algebra in Engineering,Communication and Computing, 12(1/2):117–156, 2001.
[13] P. Devienne. Weighted graphs, a tool for expressing the behavious of recursive rules in logic
programming. pages 397–404. OHMSHA Ltd. Tokyo and Springer-Verlag, 1988. Proc. of the
Inter. Conf. on Fifth Generation Computer Systems 88, Tokyo, Japan.
[14] P. Devienne. Weighted graphs: A tool for studying the halting problem and time complexity
in term rewriting systems and logic programming. Theoretical Computer Science, 75(2):157–
215, 1990.
[15] P. Devienne, P.Lebègue, and J-C. Routier. Halting problem of one binary Horn clause is
undecidable. In LNCS, volume 665, pages 48–57. Springer-Verlag, 1993. Proc. of STACS’93.
[16] M. Gabbrielli and R. Giacobazzi. Goal independency and call patterns in the analysis of
logic programs. In Proceedings of the ACM Symposium on applied computing, pages 394–399.
ACM Press, 1994.
[17] S. Genaim and M. Codish. Inferring termination condition for logic programs using backwards
analysis. In Proceedings of Logic for Programming, Artificial intelligence and Reasoning,
Lecture Notes in Computer Science. Springer-Verlag, Berlin, 2001. TerminWeb can be used
online from http://www.cs.bgu.ac.il/~codish.
[18] R. Gori and G. Levi. Finite failure is and-compositional. Journal of Logic and Computation,
7(6):753–776, 1997.
[19] J. Jaffar and J. L. Lassez. Constraint logic programming. In Proc. of the ACM Symposium
on Principles of Programming Languages, pages 111–119. ACM Press, 1987.
[20] N. Lindenstrauss. TermiLog: a system for checking termination of queries to logic programs,
1997. http://www.cs.huji.ac.il/~naomil.
[21] J. W. Lloyd. Foundations of Logic Programming. Springer-Verlag, 1987.
[22] M. Martelli M. Falaschi, G. Levi and C. Palamidessi. A model-theoretic reconstruction of the
operational semantics of logic programs. Information and Computation, 102(1):86–113, 1993.
[23] F. Mesnard. Inferring left-terminating classes of queries for constraint logic programs by
means of approximations. In M. J. Maher, editor, Proc. of the 1996 Joint Intl. Conf. and
Symp. on Logic Programming, pages 7–21. MIT Press, 1996.
[24] F. Mesnard and R. Bagnara. cTI: a constraint-based termination inference tool for ISOProlog. Theory and Practice of Logic Programming, 2004. To appear.
[25] F. Mesnard and U. Neumerkel. cTI: a tool for inferring termination conditions of ISO-Prolog,
april 2000. http://www.complang.tuwien.ac.at/cti.
[26] F. Mesnard and U. Neumerkel. Applying static analysis techniques for inferring termination
conditions of logic programs. In P. Cousot, editor, Static Analysis Symposium, volume 2126
of Lecture Notes in Computer Science, pages 93–110. Springer-Verlag, Berlin, 2001.
[27] F. Mesnard, E. Payet, and U. Neumerkel. Detecting optimal termination conditions of logic
programs. In M. Hermenegildo and G. Puebla, editors, Proc. of the 9th International Symposium on Static Analysis, volume 2477 of Lecture Notes in Computer Science, pages 509–525.
Springer-Verlag, Berlin, 2002.
[28] R. O’Keefe. The Craft of Prolog. MIT Press, 1990.
26
[29] E. Payet and F. Mesnard. Non-termination inference of logic programs. In R. Giacobazzi,
editor, Proc. of the 11th International Symposium on Static Analysis, volume 3148 of Lecture
Notes in Computer Science. Springer-Verlag, Berlin, 2004.
[30] L. Plümer. Terminations proofs for logic programs. Number 446 in LNAI. Springer-Verlag,
Berlin, 1990.
[31] D. Sahlin. The mixtus approach to automatic partial evaluation of full Prolog. In S. Debray and M. Hermenegildo, editors, Proc. of the 1990 North American Conference on Logic
Programming, pages 377–398. MIT Press, Cambridge, MA, 1990.
[32] D. Sahlin. Mixtus: an automatic partial evaluator for full Prolog. New Generation Computing,
12(1):7–51, 1993.
[33] M. Schmidt-Schauss. Implication of clauses is undecidable. Theoretical Computer Science,
59:287–296, 1988.
[34] Y-D. Shen. An extended variant of atoms loop check for positive logic programs. New
Generation Computing, 15(2):187–204, 1997.
[35] Y-D. Shen, J-H. You, L-Y. Yuan, S. Shen, and Q. Yang. A dynamic approach to characterizing
termination of general logic programs. ACM Transactions on Computational Logic, 4(4):417–
434, 2003.
[36] Y-D. Shen, L-Y. Yuan, and J-H. You. Loops checks for logic programs with functions. Theoretical Computer Science, 266(1-2):441–461, 2001.
27
A
Algorithms
First, we define a pre-order relation over sets of positions with associated terms. Such a relation
is useful for the design of the algorithms that we present in the sequel of this section.
+
Definition A.1 (4 and τmax
)
• τ1+ 4 τ2+ if for each p ∈ Π, Dom(τ1+ (p)) ⊆ Dom(τ2+ (p)) and for each i ∈ Dom(τ1+ (p)),
τ2+ (p)(i) is more general than τ1+ (p)(i).
+
+
• τmax
denotes a set of positions with associated terms s.t. Dom(τmax
(p)) = [1, arity(p)] for
+
each p ∈ Π and τmax (p)(i) is a variable for each i ∈ [1, arity(p)].
A.1
DN Sets of Positions with Associated Terms for Binary Programs
We present below an algorithm for computing DN sets of positions with associated terms.
dna BinProg, τ1+ :
in: BinProg: a finite set of binary clauses
τ1+ : a set of positions with associated terms
out: τ2+ s.t. τ2+ 4 τ1+ and τ2+ is DN for BinProg
1:
2:
3:
4:
5:
6:
7:
τ2+ := τ1+
τ2+ := satisfy DN1(BinProg, τ2+ )
τ2+ := satisfy DN2(BinProg, τ2+ )
τ2+ := satisfy DN3(BinProg, τ2+ )
while satisfy DN4(BinProg, τ2+ ) 6= τ2+ do
τ2+ := satisfy DN4(BinProg, τ2+ )
return τ2+
The algorithm dna calls four auxiliary functions that correspond to conditions (DN1), (DN2)
(DN3) and (DN4) in the definition of a DN set of positions with associated terms (see Definition 3.35). These functions are detailed below.
After τ2+ := satisfy DN1(BinProg , τ2+ ) at line 2 of dna, τ2+ satisfies item (DN1) of Definition 3.35.
satisfy DN1 BinProg, τ1+ :
1: τ2+ := τ1+
2: for each p(s1 , . . . , sn ) ← B ∈ BinProg do
3:
E := {i ∈ [1, n] | Var (si ) ∩ Var ({sj | j 6= i}) = ∅}
4:
τ2+ (p) := τ2+ (p)|(Dom(τ2+ (p)) ∩ E)
5: return τ2+
After τ2+ := satisfy DN2(BinProg , τ2+ ) at line 3 of dna, τ2+ satisfies item (DN2) of Definition 3.35. Notice that less general at line 5 of satisfy DN2 is a function that returns the less
general term of two given terms; if none of the given terms is less general than the other, then
this function returns undefined.
28
satisfy DN2 BinProg , τ1+ :
1: τ2+ := τ1+
2: for each p(s1 , . . . , sn ) ← B ∈ BinProg do
3:
F := ∅
4:
for each i ∈ Dom(τ2+ (p)) do
5:
ui := less general(si , τ2+ (p)(i))
6:
if ui = undefined then F := F ∪ {i}
7:
else τ2+ (p)(i) := ui
8:
τ2+ (p) := τ2+ (p)|(Dom(τ2+ (p)) \ F )
9: return τ2+
After τ2+ := satisfy DN3(BinProg , τ2+ ) at line 4 of dna, τ2+ satisfies item (DN3) of Definition 3.35. The function satisfy DN3 is detailed below.
satisfy DN3 BinProg, τ1+ :
1: τ2+ := τ1+
2: for each H ← q(t1 , . . . , tm ) ∈ BinProg do
3:
F := ∅
4:
for each i ∈ Dom(τ2+ (q)) do
5:
if τ2+ (q)(i) is not more general than ti then F := F ∪ {i}
6:
τ2+ (q) := τ2+ (q)|(Dom(τ2+ (q)) \ F )
7: return τ2+
Finally, the function satisfy DN4 is defined as follows. After line 6 of dna, the set of positions
with associated terms τ2+ satisfies item (DN4) of Definition 3.35.
satisfy DN4 BinProg, τ1+ :
1: τ2+ := τ1+
2: for each p(s1 , . . . , sn ) ← q(t1 , . . . , tm ) ∈ BinProg do
3:
F := ∅
4:
for each i ∈ Dom(τ2+ (p)) do
5:
for each j ∈ [1, m] \ Dom(τ2+ (q)) do
6:
if Var(si ) ∩ Var (tj ) 6= ∅ then F := F ∪ {i}
+
7:
τ2 (p) := τ2+ (p)|(Dom(τ2+ (p)) \ F )
8: return τ2+
Proposition A.2 (Correctness of dna) Let BinProg be a binary program and τ1+ be a set of
positions with associated terms.
1. satisfy DN1(BinProg, τ1+ ), . . . , satisfy DN4(BinProg, τ1+ ) terminate;
2. satisfy DN1(BinProg, τ1+ ) 4 τ1+ , . . . , satisfy DN4(BinProg , τ1+ ) 4 τ1+ ;
3. dna(BinProg, τ1+ ) terminates;
4. dna(BinProg , τ1+ ) 4 τ1+ and dna(BinProg, τ1+ ) is a set of positions with associated terms that
is DN for BinProg .
Proof. We have:
1. satisfy DN1(BinProg, τ1+ ) terminates because, as BinProg is a finite set of binary clauses,
the loop at lines 2–4 terminates. Concerning satisfy DN2–4, the inner loops terminate since
for each p ∈ Π, Dom(τ2+ (p)) ⊆ [1, arity(p)] and the outer loop terminates as BinProg is a
finite set of binary clauses.
29
• satisfy DN1(BinProg , τ1+ ) 4 τ1+ :
Line 1, we start from τ1+ . Line 4, we have for each relation symbol p from the heads of
the clauses of BinProg :
2.
Dom(τ2+ (p)) ⊆ Dom(τ1+ (p)) and ∀i ∈ Dom(τ2+ (p)), τ2+ (p)(i) = τ1+ (p)(i) .
Hence, when we reach line 5, we have: satisfy DN1(BinProg, τ1+ ) 4 τ1+ .
• satisfy DN2(BinProg , τ1+ ) 4 τ1+ :
Line 1, we start from τ1+ . Then, for each relation symbol p from the heads of the
clauses of BinProg and for each i ∈ Dom(τ2+ (p)), either τ2+ (p)(i) is set to a less general
term than τ2+ (p)(i) (line 7) or i is removed from the domain of τ2+ (p) (lines 6 and 8).
Therefore, when we reach line 9, we have: satisfy DN2(BinProg , τ1+ ) 4 τ1+ .
• satisfy DN3(BinProg , τ1+ ) 4 τ1+ :
Line 1, we start from τ1+ . Line 6, we have for each relation symbol q from the bodies
of the clauses of BinProg:
Dom(τ2+ (q)) ⊆ Dom(τ1+ (q)) and ∀i ∈ Dom(τ2+ (q)), τ2+ (q)(i) = τ1+ (q)(i) .
Hence, when we reach line 7, we have: satisfy DN3(BinProg, τ1+ ) 4 τ1+ .
• satisfy DN4(BinProg , τ1+ ) 4 τ1+ :
Line 1, we start from τ1+ . Line 7, we have for each relation symbol p from the heads of
the clauses of BinProg :
Dom(τ2+ (p)) ⊆ Dom(τ1+ (p)) and ∀i ∈ Dom(τ2+ (p)), τ2+ (p)(i) = τ1+ (p)(i) .
(2)
Hence, when we reach line 8, we have: satisfy DN4(BinProg, τ1+ ) 4 τ1+ .
3. Each call to satisfy DN1, . . . , satisfy DN4 terminate. Moreover, concerning function
satisfy DN4, we mentioned above that (2) holds. As ⊂ is a well-founded relation over
the set of sets, the loop at lines 5–6 terminates.
4. Line 1, we start from τ1+ . Then satisfy DN1, . . . , satisfy DN4 weaken τ1+ with respect to
Definition 3.35. When we reach the fixpoint, the property holds.
A.2
Loop Dictionaries
A.2.1
Proof of Proposition 4.3, page 14
We proceed by induction on the length n of BinSeq.
• Basis. If n = 0, then, as ([H ← B], τ + ) is a looping pair, B is ∆[τ + ]-more general than H
and τ + is DN for H ← B, i.e. ∆[τ + ] is DN for H ← B by Theorem 3.39. Consequently, by
Proposition 3.20, H loops w.r.t. [H ← B].
• Induction. Suppose that for an n ≥ 0, each looping pair ([H ← B|BinSeq], τ + ) with BinSeq
of length n is such that H loops w.r.t. [H ← B|BinSeq].
If BinSeq is of length n + 1, it has form [H1 ← B1 |BinSeq 1 ] with BinSeq 1 of length n.
Moreover, as ([H ← B|BinSeq], τ + ) is a looping pair, there exists a set of positions with
associated terms τ1+ such that ([H1 ← B1 |BinSeq 1 ], τ1+ ) is a looping pair and B is ∆[τ1+ ]more general than H1 . So, by the induction hypothesis, H1 loops w.r.t. [H1 ← B1 |BinSeq 1 ]
i.e. H1 loops w.r.t. BinSeq. As B is ∆[τ1+ ]-more general than H1 and ∆[τ1+ ] is DN for
BinSeq, by Definition 3.18 B loops w.r.t. BinSeq. Therefore, by Corollary 3.3, H loops
w.r.t. [H ← B|BinSeq].
30
A.2.2
Computing a Loop Dictionary
The top-level function for inferring loop dictionaries from a logic program is the following. It uses
the auxiliary functions unit loop and loops from dict described below.
infer loop dict(P , max ):
in: P : a logic program
max : a non-negative integer
out: a loop dictionary, each element (BinSeq, τ + ) of which
is such that BinSeq ⊆ TPβ ↑ max
1: Dict := ∅
2: for each H ← B ∈ TPβ ↑ max do
3:
Dict := unit loop(H ← B, Dict )
4:
Dict := loops from dict(H ← B, Dict )
5: return Dict
The function unit loop is used to extract from a binary clause the most simple form of a
looping pair:
unit loop(H ← B, Dict):
in: H ← B: a binary clause
Dict: a loop dictionary
out: Dict′ : a loop dictionary, every element (BinSeq, τ + ) of which is
such that either (BinSeq, τ + ) ∈ Dict or BinSeq = [H ← B]
1:
2:
3:
4:
5:
Dict′ := Dict
+
τ + := dna([H ← B], τmax
)
+
if B is ∆[τ ]-more general than H then
Dict ′ := Dict ′ ∪ {([H ← B], τ + )}
return Dict ′
Termination of unit loop relies on that of dna. Partial correctness is deduced from the next
theorem.
Theorem A.3 (Partial correctness of unit loop) Let H ← B be a binary clause and Dict be a
loop dictionary. Then unit loop(H ← B, Dict) is a loop dictionary, every element (BinSeq, τ + )
of which is such that either (BinSeq, τ + ) ∈ Dict or BinSeq = [H ← B].
Proof. Let τ + be the set of positions with associated terms computed at line 2. If B is not
∆[τ + ]-more general than H then, at line 5 of unit loop, we have Dict ′ = Dict, so the theorem
holds.
Now suppose that B is ∆[τ + ]-more general than H. Then, at line 5 we have Dict ′ := Dict ∪
{([H ← B], τ + )} where Dict is a loop dictionary, τ + is DN for H ← B and B is ∆[τ + ]-more
general than H. So at line 5 Dict ′ is a loop dictionary, every element (BinSeq, τ + ) of which is
such that either (BinSeq, τ + ) ∈ Dict or BinSeq = [H ← B].
The function loops from dict is used to combine a binary clause to some looping pairs that
have already been infered in order to get some more looping pairs.
31
loops from dict(H ← B, Dict ):
in: H ← B: a binary clause
Dict: a loop dictionary
out: Dict ′ : a loop dictionary, every element (BinSeq, τ + ) of which is
such that (BinSeq, τ + ) ∈ Dict or BinSeq = [H ← B|BinSeq 1 ]
for some (BinSeq 1 , τ1+ ) in Dict
1: Dict ′ := Dict
2: for each [H1 ← B1 |BinSeq 1 ], τ1+ ∈ Dict do
3:
if B is ∆[τ1+ ]-more general than H1 then
4:
τ + := dna([H ← B, H1 ← B1 |BinSeq 1 ], τ1+ )
5:
Dict ′ := Dict ′ ∪ {([H ← B, H1 ← B1 |BinSeq 1 ], τ + )}
6: return Dict ′
Termination of loops from dict follows from finiteness of Dict (because Dict is a loop dictionary) and termination of dna. Partial correctness follows from the result below.
Theorem A.4 (Partial correctness of loops from dict) Let H ← B be a binary clause and Dict
be a loop dictionary. Then loops from dict(H ← B, Dict) is a loop dictionary, every element
(BinSeq, τ + ) of which is such that (BinSeq, τ + ) ∈ Dict or BinSeq = [H ← B|BinSeq 1 ] for some
(BinSeq 1 , τ1+ ) in Dict .
Proof. Upon initialization at line 1, Dict ′ is a loop dictionary. Suppose that before an iteration of
the loop at line 2, Dict ′ is a loop dictionary. Let ([H1 ← B1 |BinSeq 1 ], τ1+ ) ∈ Dict.
If the condition at line 3 is false, then Dict ′ remains unchanged, so after the iteration Dict ′
is still a loop dictionary. Otherwise, the pair ([H ← B, H1 ← B1 |BinSeq 1 ], τ + ) is added to
Dict ′ at line 5. Notice that this pair is a looping one because τ + defined at line 4 is DN for
[H ← B, H1 ← B1 |BinSeq 1 ] and ([H1 ← B1 |BinSeq 1 ], τ1+ ) is a looping pair and B is ∆[τ1+ ]-more
general than H1 . Therefore, after the iteration, Dict ′ is a loop dictionary. Finally, notice that as
Dict is a finite set, the loop at line 2 terminates. Hence, at line 6 Dict ′ is a finite set of looping
pairs i.e. Dict ′ is a loop dictionary.
Moreover, at line 1, each element of Dict ′ belongs to Dict . Then, during the loop, pairs of form
([H ← B|BinSeq 1 ], τ + ) are added to Dict ′ where BinSeq 1 is such that there exists (BinSeq 1 , τ1+ ) ∈
Dict . Consequently, at line 6 each element (BinSeq, τ + ) of Dict ′ is such that either (BinSeq, τ + ) ∈
Dict or BinSeq = [H ← B|BinSeq 1 ] for some (BinSeq 1 , τ1+ ) in Dict .
Finally, here is the correctness proof of the function infer loop dict.
Theorem A.5 (Correctness of infer loop dict) Let P be a logic program and max be a nonnegative integer. Then, infer loop dict(P, max ) terminates and returns a loop dictionary, every
element (BinSeq, τ + ) of which is such that BinSeq ⊆ TPβ ↑ max .
Proof. At line 1, Dict is initialized to ∅ which is a loop dictionary. Suppose that before an
iteration of the loop at line 2, Dict is a loop dictionary. Then at lines 3 and 4 unit loop and
loops from dict fullfil their specifications. Hence, the call to these functions terminates and after
the iteration Dict is still a loop dictionary. Finally, as TPβ ↑ max is a finite set, the loop at line 2
terminates and at line 5 Dict is a loop dictionary.
Moreover, at line 1 each element (BinSeq, τ + ) of Dict is such that BinSeq ⊆ TPβ ↑ max . Then,
during the loop, unit loop and loops from dict are called with clauses from TPβ ↑ max . So, by
Theorem A.3 and Theorem A.4, after the iteration each element (BinSeq, τ + ) of Dict is such that
BinSeq ⊆ TPβ ↑ max .
A.3
Looping Conditions
The following function computes a finite set of looping conditions for any given logic program.
32
infer loop cond(P , max ):
in: P : a logic program
max : a non-negative integer
out: a finite set of looping conditions for P
1:
2:
3:
4:
5:
L := ∅
Dict := infer loop dict(P, max )
for each ([H ← B|BinSeq], τ + ) ∈ Dict do
L := L ∪ {(H, τ + )}
return L
A call to infer loop cond(P , max ) terminates for any logic program P and any non-negative
integer max because infer loop dict(P, max ) at line 2 terminates and the loop at line 3 has a
finite number of iterations (because, by correctness of infer loop dict, Dict is finite.) Partial
correctness of infer loop cond follows from the next theorem.
Theorem A.6 (Partial correctness of infer loop cond) Let P be a logic program and max be a
non-negative integer. Then infer loop cond(P, max ) is a finite set of looping conditions for P .
Proof. By correctness of infer loop dict, Dict is a loop dictionary.
Let ([H ← B|BinSeq], τ + ) ∈ Dict . Then ([H ← B|BinSeq], τ + ) is a looping pair. Consequently, by Proposition 4.3, H loops w.r.t. [H ← B|BinSeq]. As τ + , hence ∆[τ + ], is DN for
[H ← B|BinSeq], by Definition 3.18 every atom that is ∆[τ + ]-more general than H loops w.r.t.
[H ← B|BinSeq].
As ([H ← B|BinSeq], τ + ) ∈ Dict , by Theorem A.5 we have
[H ← B|BinSeq] ⊆ TPβ ↑ max ⊆ bin unf (P ) .
So, by Theorem 2.1, H left loops w.r.t. P and every atom that is ∆[τ + ]-more general than H left
loops w.r.t. P . So, (H, τ + ) is a looping condition for P . Consequently, at line 5, L is a finite set
of looping conditions for P because, as Dict is finite, the loop at line 3 iterates a finite number of
times.
B
Proofs
B.1
Two Useful Lemmas
Lemma B.1 Let c := H ← B be a binary clause. Then, for every variant cγ of c such that
Var (cγ) ∩ Var (H) = ∅, we have H =⇒ Bγ ′ where γ ′ := γ|Var(B) \ Var (H).
c
Proof. Let µ := {xγ/x|x ∈ Var (H)}. By Claim B.2 below, µ is an mgu of Hγ and H. Hence, as
µ
Var (cγ) ∩ Var(H) = ∅, we have the left derivation step H =⇒ Bγµ where cγ is the input clause
c
used.
µ
If Var(B) = ∅, then Bγµ = Bγ ′ , so we have H =⇒ Bγ ′ i.e. H =⇒ Bγ ′ .
c
If Var(B) 6= ∅, take a variable x ∈ Var(B):
• if x ∈ Var(H), then x(γµ) = (xγ)µ = x by definition of µ,
• if x 6∈ Var(H), then x(γµ) = (xγ)µ = xγ by definition of µ.
µ
Hence, Bγµ = Bγ ′ , so we have H =⇒ Bγ ′ i.e. H =⇒ Bγ ′ .
c
c
Claim B.2 µ is an mgu of Hγ and H.
33
c
Proof. Let p(s1 , . . . , sn ) := H. The set of unifiers of Hγ and H is the same as that of E1 :=
{s1 γ = s1 , . . . , sn γ = sn }. Let E2 := {xγ = x | x ∈ Var (H)}. Notice that, as γ is a renaming,
if x, y ∈ Var (H) then x 6= y ⇒ xγ 6= yγ. Moreover, for each x ∈ Var(H), xγ 6= x because
Var (cγ) ∩ Var (H) = ∅. So, E2 is solved. Consequently, by Lemma 2.15 page 32 of [1], µ is an
mgu of E2 . Notice that, by Claim B.3 below, the set of unifiers of E1 is that of E2 . So µ is an
mgu of E1 i.e. µ is an mgu of Hγ and H.
Claim B.3 E1 and E2 have the same set of unifiers.
Proof. Let θ be a unifier of E1 . Let x ∈ Var (H) and let i ∈ [1, n] such that x ∈ Var (si ). Then
si γθ = si θ, so, if xk is an occurrence of x in si , we have xk γθ = xk θ i.e. (xk γ)θ = xk θ. As x
denotes any variable of H, we conclude that θ is a unifier of E2 . Conversely, let θ be a unifier of
E2 . Then, for each i ∈ [1, n], (si γ)θ = si θ by definition of E2 . Hence, θ is a unifier of E1 .
Lemma B.4 Let c := H ← B be a binary clause, cγ be a variant of c such that Var (cγ) ∩
Var (H) = ∅ and γ ′ := γ|Var (B)\Var (H). Then, there exists a renaming γ ′′ such that Bγ ′ = Bγ ′′ .
Proof. Let A := {x | x ∈ Ran(γ ′ ) and x 6∈ Dom(γ ′ )} and B := {x | x ∈ Dom(γ ′ ) and x 6∈
Ran(γ ′ )}. Notice that Ran(γ ′ ) and Dom(γ ′ ) have the same number of elements, so A and B have
the same number of elements. Let σ be a 1-1 and onto mapping from A to B. Then, γ ′′ := γ ′ ∪ σ
is a well-defined substitution, is such that Dom(γ ′′ ) = Ran(γ ′′ ), is 1-1 and is onto. Consequently,
γ ′′ is a renaming.
Now, let us prove that Bγ ′ = Bγ ′′ . If Var (B) = ∅, then the result is straightforward.
Otherwise, let x ∈ Var(B).
• If x ∈ Var (H) then, as Dom(γ ′ ) ⊆ Var (B) \ Var (H), we have x 6∈ Dom(γ ′ ), so xγ ′ = x.
Moreover, xγ ′′ = x(γ ′ ∪σ) = xσ = x because Dom(σ) ⊆ Ran(γ ′ ) and Ran(γ ′ )∩Var (H) = ∅.
Consequently, we have xγ ′ = xγ ′′ .
• If x 6∈ Var (H) and x ∈ Dom(γ ′ ) then xγ ′′ = x(γ ′ ∪ σ) = xγ ′ .
• If x 6∈ Var (H) and x 6∈ Dom(γ ′ ) then xγ ′ = x.
Now, suppose that x ∈ Dom(σ). Then, as Dom(σ) ⊆ Ran(γ ′ ) ⊆ Ran(γ), we have x ∈
Ran(γ). But, as γ is a renaming, Ran(γ) = Dom(γ), so we have x ∈ Dom(γ). As
x ∈ Var (B), as x 6∈ Var(H) and as γ ′ := γ|Var (B) \ Var (H), we have x ∈ Dom(γ ′ ).
Contradiction.
Consequently, x 6∈ Dom(σ), so xσ = x and xγ ′′ = x(γ ′ ∪ σ) = xσ = x. Finally, we have
proved that xγ ′ = xγ ′′ .
B.2
Proof of Corollary 3.2, page 4
By Lemma B.1 and Lemma B.4, we have H =⇒ Bγ ′′ where γ ′′ is a renaming. As by hypothesis
c
B is more general than H, then Bγ ′′ is more general than H. Therefore, by the One Step Lifting
Lemma 3.1, H loops w.r.t. {c}.
B.3
Proof of Corollary 3.3, page 4
By Lemma B.1 and Lemma B.4, we have H =⇒ Bγ ′′ where γ ′′ is a renaming. As Bγ ′′ is more
c
general than B and as B loops w.r.t. P , then, by the One Step Lifting Lemma 3.1, Bγ ′′ loops
w.r.t. P , so H loops w.r.t. P .
34
B.4
Proof of Proposition 3.16, page 7
If A is ∆-more general than B, we have, for a substitution η:
A = p(s1 , . . . , sn )
B = p(t1 , . . . , tn )
∀i ∈ [1, n] \ Dom(∆(p)), ti = si η
∀i ∈ Dom(∆(p)), ∆(p)(i)(si ) = true .
Let A′ be a variant of A. Then, there exists a renaming γ such that A′ = Aγ. As for each
i ∈ Dom(∆(p)), ∆(p)(i) is a variant independent term-condition, we have:
′
A = p(s1 γ, . . . , sn γ)
B = p(t1 , . . . , tn )
∀i ∈ [1, n] \ Dom(∆(p)), ti = si η = (si γ)(γ −1 η)
∀i ∈ Dom(∆(p)), ∆(p)(i)(si γ) = true .
Consequently, A′ is ∆-more general than B for γ −1 η, i.e. A′ is ∆-more general than B.
B.5
Proof of Proposition 3.17, page 7
⇐ By definition.
⇒ Let p(s1 , . . . , sn ) := A and p(t1 , . . . , tn ) := B. As A is ∆-more general than B, there exists a
substitution σ such that A is ∆-more general than B for σ. Notice that A is also ∆-more
general than B for the substitution obtained by restricting the domain of σ to the variables
appearing in the positions of A not distinguished by ∆. More precisely, let
η := σ|V ar({si | i ∈ [1, n] \ Dom(∆(p))}) .
Then,
Dom(η) ⊆ V ar(A)
(3)
and A is ∆-more general than B for η.
Now, let x ∈ Dom(η). Then, there exists i ∈ [1, n] \ Dom(∆(p)) such that x ∈ V ar(si ).
As A is ∆-more general than B for η and i ∈ [1, n] \ Dom(∆(p)), we have ti = si η. So, as
x ∈ V ar(si ), xη is a subterm of ti . Consequently, V ar(xη) ⊆ V ar(ti ), so V ar(xη) ⊆ V ar(B).
So, we have proved that for each x ∈ Dom(η), V ar(xη) ⊆ V ar(B), i.e. we have proved that
Ran(η) ⊆ V ar(B) .
(4)
Finally, (3) and (4) imply that Dom(η) ∪ Ran(η) ⊆ V ar(A, B) i.e. that
V ar(η) ⊆ V ar(A, B) .
B.6
Proof of Proposition 3.20, page 8
By Lemma B.1 and Lemma B.4, we have H =⇒ Bγ ′′ where γ ′′ is a renaming. As by hypothesis B
c
is ∆-more general than H, then by Proposition 3.16 Bγ ′′ is ∆-more general than H. Therefore,
as ∆ is DN for c, by Definition 3.18, H loops w.r.t. {c}.
B.7
Proof of Proposition 3.37, page 11
Let c := p(s1 , . . . , sn ) ← q(t1 , . . . , tm ) and c′ := p(s′1 , . . . , s′n ) ← q(t′1 , . . . , t′m ) be a variant of c.
Then, there exists a renaming γ such that c′ = cγ.
35
(DN1) Let i ∈ Dom(τ + (p)). Suppose that there exists j 6= i such that V ar(s′i ) ∩ V ar(s′j ) 6= ∅
and let us derive a contradiction.
Let x′ ∈ V ar(s′i ) ∩ V ar(s′j ). As s′j = sj γ, there exists x ∈ V ar(sj ) such that x′ = xγ.
For such an x, as j 6= i and as V ar(si ) ∩ V ar(sj ) = ∅ (because τ + is DN for c), we
have x 6∈ V ar(si ). So, as γ is a 1-1 and onto mapping from its domain to itself, we have
xγ 6∈ V ar(si γ)3 , i.e. x′ 6∈ V ar(s′i ). Contradiction!
Consequently, V ar(s′i ) ∩ V ar(s′j ) = ∅.
(DN2) Let hi 7→ ui i ∈ τ + (p). As si is more general than ui (because τ + is DN for c) and as s′i
is a variant of si , s′i is more general than ui .
(DN3) Let hj 7→ uj i ∈ τ + (q). As tj is an instance of uj (because τ + is DN for c) and as t′j is a
variant of tj , t′j is an instance of uj .
(DN4) Let i ∈ Dom(τ + (p)). Suppose there exists j 6∈ Dom(τ + (q)) such that V ar(s′i )∩V ar(t′j ) 6=
∅. Let us derive a contradiction.
Let x′ ∈ V ar(s′i ) ∩ V ar(t′j ). As t′j = tj γ and x′ ∈ V ar(t′j ), there exists x ∈ V ar(tj ) such that
x′ = xγ. For such an x, as the elements of V ar(si ) only occur in those tk s.t. k ∈ Dom(τ + (q))
(because τ + is DN for c) and as x ∈ V ar(tj ) with j 6∈ Dom(τ + (q)), we have x 6∈ V ar(si ).
So, as γ is a 1-1 and onto mapping from its domain to itself, we have xγ 6∈ V ar(si γ) (see
footnote 3), i.e. x′ 6= V ar(s′i ). Contradiction! So, for each j 6∈ Dom(τ + (q)), we have
V ar(s′i ) ∩ V ar(t′j ) = ∅.
Finally, we have established that τ + is DN for c′ .
B.8
DN Sets of Positions with Associated Terms Generate DN Filters
In this section, we give a proof of Theorem 3.39, page 12.
B.8.1
Context
All the results of this section are parametric to the following context:
• P is a binary program and τ + is a set of positions with associated terms that is DN for P ,
θ
• Q =⇒ Q1 is a left derivation step where
c
– c ∈ P,
– Q := p(t1 , . . . , tn ),
– c1 := p(s1 , . . . , sn ) ← B is the input clause used (consequently, c1 is a variant of c that
is variable disjoint from Q),
• Q′ := p(t′1 , . . . , t′n ) is ∆[τ + ]-more general than Q i.e., by Proposition 3.17, there exists a
substitution η such that V ar(η) ⊆ V ar(Q, Q′ ) and Q′ is ∆[τ + ]-more general than Q for η.
3 Because if xγ ∈ V ar(s γ), then either x ∈ V ar(s ), either xγ ∈ V ar(s ) and (xγ)γ = xγ. The former case is
i
i
i
impossible because we said that x 6∈ V ar(si ). The latter case is impossible too because (xγ)γ = xγ implies that
xγ 6∈ Dom(γ) i.e. x 6∈ Dom(γ) (because γ is a 1-1 and onto mapping from its domain to itself); so, x = xγ i.e., as
xγ ∈ V ar(si ), x ∈ V ar(si ).
36
B.8.2
Technical Definitions and Lemmas
Definition B.5 (Technical Definition) Let c′1 := p(s′1 , . . . , s′n ) ← B ′ be a binary clause such that
• V ar(c′1 ) ∩ V ar(Q, Q′ ) = ∅ and
• c1 = c′1 γ for some renaming γ satisfying V ar(γ) ⊆ V ar(c1 , c′1 ).
As c′1 is a variant of c1 and c1 is a variant of c, then c′1 is a variant of c. Moreover, as τ +
is DN for c, by Proposition 3.37, τ + is DN for c′1 . So, by (DN2) in Definition 3.35, for each
hi 7→ ui i ∈ τ + (p) there exists a substitution δi such that ui = s′i δi .
Moreover, as p(t′1 , . . . , t′n ) is ∆[τ + ]-more general than p(t1 , . . . , tn ), for each hi 7→ ui i ∈ τ + (p),
′
ti is an instance of ui . So, there exists a substitution δi′ such that t′i = ui δi′ .
For each i ∈ Dom(τ + (p)), we set
def
σi = (δi δi′ )|V ar(s′i ) .
Moreover, we set:
def
[
σ =
σi .
i∈Dom(τ + (p))
Lemma B.6 The set σ of Definition B.5 is a well-defined substitution.
Proof. Notice that, as τ + is DN for c′1 , by (DN1) in Definition 3.35, we have
∀i ∈ Dom(τ + (p)), ∀j ∈ [1, n] \ {i}, V ar(s′i ) ∩ V ar(s′j ) = ∅ .
Consequently,
∀i, j ∈ Dom(τ + (p)), i 6= j ⇒ Dom(σi ) ∩ Dom(σj ) = ∅ .
Moreover, for each i ∈ Dom(τ + (p)), σi is a well-defined substitution. So, σ is a well-defined
substitution.
Lemma B.7 (Technical Lemma) Let c′1 := p(s′1 , . . . , s′n ) ← B ′ be a binary clause such that
• V ar(c′1 ) ∩ V ar(Q, Q′ ) = ∅ and
• c1 = c′1 γ for some renaming γ satisfying V ar(γ) ⊆ V ar(c1 , c′1 ).
Let σ be the substitution of Definition B.5.
p(t′1 , . . . , t′n ) and p(s′1 , . . . , s′n ).
Then, the substitution σηγθ is a unifier of
Proof. The result follows from the following facts.
• For each hi 7→ ui i ∈ τ + (p), we have:
s′i σ = s′i σi = s′i δi δi′ = (s′i δi )δi′ = ui δi′ = t′i
and t′i σ = t′i because Dom(σ) ⊆ V ar(c′1 ) and V ar(Q′ ) ∩ V ar(c′1 ) = ∅. So, s′i σ = t′i σ and
s′i σηγθ = t′i σηγθ.
• For each i ∈ [1, n] \ Dom(τ + (p)), we have:
s′i ηγθ = (s′i η)γθ = s′i γθ = (s′i γ)θ = si θ
and
t′i ηγθ = (t′i η)γθ = ti γθ = (ti γ)θ = ti θ
θ
and si θ = ti θ because θ is a unifier of p(s1 , . . . , sn ) and p(t1 , . . . , tn ) (because Q =⇒ Q1 with
c
c1 as input clause used). So,
s′i ηγθ = t′i ηγθ
37
(5)
• For each i ∈ [1, n] \ Dom(τ + (p)), we also have:
– s′i σ = s′i because Dom(σ) = V ar {s′j | j ∈ Dom(τ + (p))} and, by (DN1) in Defini
tion 3.35, V ar {s′j | j ∈ Dom(τ + (p))} ∩ V ar(s′i ) = ∅;
– t′i σ = t′i because Dom(σ) ⊆ V ar(c′1 ) and V ar(Q′ ) ∩ V ar(c′1 ) = ∅.
Therefore, because of (5), s′i σηγθ = t′i σηγθ.
B.8.3
∆-Propagation
Now we extend, in the case of left derivations with atomic queries and binary clauses, the following
Propagation Lemma that is proved by Apt in [1] p. 54–56.
Lemma B.8 (Propagation) Let G, G1 , G′ and G′1 be some queries such that
G =⇒ G1
G′ =⇒ G′1
and
c
c
and
• G is an instance of G′
• in G and G′ atoms in the same positions are selected.
Then, G1 is an instance of G′1 .
First we establish the following result.
θ′
Lemma B.9 Suppose there exists a left derivation step of form Q′ =⇒ Q′1 where the input clause
c
is c′1 such that V ar(Q) ∩ V ar(c′1 ) = ∅. Then, Q′1 is ∆[τ + ]-more general than Q1 .
Proof. Notice that we have
V ar(Q) ∩ V ar(c1 ) = V ar(Q, Q′ ) ∩ V ar(c′1 ) = ∅ .
Moreover, as c1 is a variant of c′1 , there exists a renaming γ such that
V ar(γ) ⊆ V ar(c1 , c′1 ) and
c1 = c′1 γ .
Let c′1 := p(s′1 , . . . , s′n ) ← B ′ . Then,
Q1 = Bθ
and
Q′1 = B ′ θ′ .
τ + is DN for c and c′1 is a variant of c. So, by Proposition 3.37, τ + is DN for c′1 . Let σ be the
substitution of Definition B.5.
′
Let q(v1′ , . . . , vm
) := B ′ . As B = B ′ γ, B has form q(v1 , . . . , vm ).
• For each hj 7→ uj i ∈ τ + (q), vj′ is an instance of uj (because τ + is DN for c′1 and (DN3) in
Definition 3.35.)
• For each j ∈ [1, m] \ Dom(τ + (q)) we have:
vj′ σηγθ = (vj′ σ)ηγθ = vj′ ηγθ
because, by (DN4) in Definition 3.35
V ar(vj′ ) ∩ V ar {s′i | i ∈ Dom(τ + (p))} = ∅
with Dom(σ) = V ar {s′i | i ∈ Dom(τ + (p))} . Moreover,
vj′ ηγθ = (vj′ η)γθ = vj′ γθ
because V ar(η) ⊆ V ar(Q, Q′ ) and V ar(c′1 ) ∩ V ar(Q, Q′ ) = ∅. Finally,
vj′ γθ = (vj′ γ)θ = vj θ
because B = B ′ γ.
38
Consequently, we have proved that
′
q(v1′ , . . . , vm
) is ∆[τ + ]-more general than q(v1 , . . . , vm )θ for σηγθ
i.e. that B ′ is ∆[τ + ]-more general than Bθ for σηγθ i.e. that
B ′ is ∆[τ + ]-more general than Q1 for σηγθ .
(6)
But, by the Technical Lemma B.7, σηγθ is a unifier of p(s′1 , . . . , s′n ) and p(t′1 , . . . , t′n ). As θ′ is an
θ′
mgu of p(s′1 , . . . , s′n ) and p(t′1 , . . . , t′n ) (because Q′ =⇒ Q′1 with c′1 as input clause), there exists δ
c
such that σηγθ = θ′ δ. Therefore, we conclude from (6) that B ′ is ∆[τ + ]-more general than Q1
for θ′ δ which implies that B ′ θ′ is ∆[τ + ]-more general than Q1 for δ i.e. that Q′1 is ∆[τ + ]-more
general than Q1 for δ. Finally, we have proved that Q′1 is ∆[τ + ]-more general than Q1 .
Using the Propagation Lemma B.8, the preceding result can be extended as follows.
θ′
Proposition B.10 (∆-Propagation) Suppose there exists a left derivation step Q′ =⇒ Q′1 . Then
c
Q′1 is ∆[τ + ]-more general than Q1 .
θ′
Proof. Let c′1 be the input clause used in Q′ =⇒ Q′1 . Take a variant Q′′ of Q such that
c
V ar(Q′′ ) ∩ V ar(c′1 ) = ∅
and a variant c′′1 of c such that
V ar(c′′1 ) ∩ V ar(Q′′ ) = ∅ .
Then, the left resolvent Q′′1 of Q′′ and c exists with the input clause c′′1 . So, for some θ′′ , we have
θ ′′
Q′′ =⇒ Q′′1 with input clause c′′1 . Consequently, we have:
c
θ
Q =⇒ Q1
c
θ ′′
and Q′′ =⇒ Q′′1 .
c
Q and Q′′ are instances of each other because Q′′ is a variant of Q. So, by the Propagation
Lemma B.8 used twice, Q′′1 is an instance of Q1 and Q1 is an instance of Q′′1 . So,
Q′′1 is a variant of Q1 .
But we also have
θ ′′
Q′′ =⇒ Q′′1
c
′
θ′
and Q′ =⇒ Q′1
c
+
with Q that is ∆[τ ]-more general than Q′′ (because Q′′ is a variant
with input clauses
and
′
of Q and Q is ∆[τ ]-more general than Q) and V ar(Q′′ ) ∩ V ar(c′1 ) = ∅. So, by Lemma B.9,
c′′1
+
c′1 ,
(7)
Q′1 is ∆[τ + ]-more general than Q′′1 .
(8)
Finally, from (7) and (8) we have: Q′1 is ∆[τ + ]-more general than Q1 .
B.8.4
Epilogue
Theorem 3.39 is a direct consequence of the following result.
Proposition B.11 (One Step ∆-Lifting) Let c′ be a variant of c variable disjoint with Q′ . Then,
θ′
there exist θ′ and a query Q′1 that is ∆[τ + ]-more general than Q1 such that Q′ =⇒ Q′1 with input
c
clause c′ .
39
Proof. Let c′1 := p(s′1 , . . . , s′n ) ← B ′ be a variant of c1 . Then there exists a renaming γ such that
V ar(γ) ⊆ V ar(c1 , c′1 ) and c1 = c′1 γ. Suppose also that
V ar(c′1 ) ∩ V ar(Q, Q′ ) = ∅ .
By the Technical Lemma B.7, p(s′1 , . . . , s′n ) and p(t′1 , . . . , t′n ) unify. Moreover, as V ar(c′1 ) ∩
V ar(Q′ ) = ∅, p(s′1 , . . . , s′n ) and p(t′1 , . . . , t′n ) are variable disjoint. Notice that the following claim
holds.
Claim B.12 Suppose that the atoms A and H are variable disjoint and unify. Then, A also
unifies with any variant H ′ of H variable disjoint with A.
Proof. For some γ such that Dom(γ) ⊆ V ar(H ′ ), we have H = H ′ γ. Let θ be a unifier of A and
H. Then, Aγθ = Aθ = Hθ = H ′ γθ, so A and H ′ unify.
Therefore, as c′ is a variant of c′1 and c′ is variable disjoint with Q′ , p(t′1 , . . . , t′n ) and the head
of c′ unify. As they also are variable disjoint, we have
θ′
Q′ =⇒ Q′1
c
for some θ′ and Q′1 where c′ is the input clause used. Moreover, by the ∆-Propagation Proposition B.10, Q′1 is ∆[τ + ]-more general than Q1 .
40
| 6cs.PL
|
Sensing-Constrained LQG Control
arXiv:1709.08826v1 [math.OC] 26 Sep 2017
Vasileios Tzoumas,1,2 Luca Carlone,2 George J. Pappas,1 Ali Jadbabaie2
Abstract—Linear-Quadratic-Gaussian (LQG) control is concerned with the design of an optimal controller and estimator
for linear Gaussian systems with imperfect state information.
Standard LQG assumes the set of sensor measurements, to be
fed to the estimator, to be given. However, in many problems,
arising in networked systems and robotics, one may not be able to
use all the available sensors, due to power or payload constraints,
or may be interested in using the smallest subset of sensors
that guarantees the attainment of a desired control goal. In this
paper, we introduce the sensing-constrained LQG control problem,
in which one has to jointly design sensing, estimation, and control,
under given constraints on the resources spent for sensing.
We focus on the realistic case in which the sensing strategy has to
be selected among a finite set of possible sensing modalities. While
the computation of the optimal sensing strategy is intractable,
we present the first scalable algorithm that computes a nearoptimal sensing strategy with provable sub-optimality guarantees.
To this end, we show that a separation principle holds, which
allows the design of sensing, estimation, and control policies in
isolation. We conclude the paper by discussing two applications
of sensing-constrained LQG control, namely, sensing-constrained
formation control and resource-constrained robot navigation.
I. I NTRODUCTION
Traditional approaches to control of systems with partially
observable state assume the choice of sensors used to observe
the system is given. The choice of sensors usually results from
a preliminary design phase in which an expert designer selects
a suitable sensor suite that accommodates estimation requirements (e.g., observability, desired estimation error) and system
constraints (e.g., size, cost). Modern control applications, from
large networked systems to miniaturized robotics systems,
pose serious limitations to the applicability of this traditional
paradigm. In large-scale networked systems (e.g., smart grids
or robot swarms), in which new nodes are continuously added
and removed from the network, a manual re-design of the
sensors becomes cumbersome and expensive, and it is simply
not scalable. In miniaturized robot systems, while the set of
onboard sensors is fixed, it may be desirable to selectively
activate only a subset of the sensors during different phases of
operation, in order to minimize power consumption. In both
application scenarios, one usually has access to a (possibly
large) list of potential sensors, but, due to resource constraints
(e.g., cost, power), can only utilize a subset of them. Moreover,
1 The authors are with the Department of Electrical and Systems Engineering, University of Pennsylvania, Philadelphia, PA 19104 USA (email:
{pappagsg, vtzoumas}@seas.upenn.edu).
2 The authors are with the Institute for Data, Systems and Society, and
the Laboratory for Information and Decision Systems, Massachusetts Institute of Technology, Cambridge, MA 02139 USA (email: {jadbabai,
lcarlone, vtzoumas}@mit.edu).
This work was supported in part by TerraSwarm, one of six centers
of STARnet, a Semiconductor Research Corporation program sponsored by
MARCO and DARPA, and in part by AFOSR Complex Networks Program.
the need for online and large-scale sensor selection demands
for automated approaches that efficiently select a subset of
sensors to maximize system performance.
Motivated by these applications, in this paper we consider
the problem of jointly designing control, estimation, and
sensor selection for a system with partially observable state.
Related work. One body of related work is control over
band-limited communication channels, which investigates the
trade-offs between communication constraints (e.g., data rate,
quantization, delays) and control performance (e.g., stability)
in networked control systems. Early work provides results
on the impact of quantization [1], finite data rates [2], [3],
and separation principles for LQG design with communication constraints [4]; more recent work focuses on privacy
constraints [5]. We refer the reader to the surveys [6]–[8].
A second set of related work is sensor selection and scheduling, in which one has to select a (possibly time-varying) set of
sensors in order to monitor a phenomenon of interest. Related
literature includes approaches based on randomized sensor
selection [9], dual volume sampling [10], [11], convex relaxations [12], [13], and submodularity [14]–[16]. The third set
of related works is information-constrained (or informationregularized) LQG control [17], [18]. Shafieepoorfard and Raginsky [17] study rationally inattentive control laws for LQG
control and discuss their effectiveness in stabilizing the system.
Tanaka and Mitter [18] consider the co-design of sensing,
control, and estimation, propose to augment the standard LQG
cost with an information-theoretic regularizer, and derive an
elegant solution based on semidefinite programming. The main
difference between our proposal and [18] is that we consider
the case in which the choice of sensors, rather than being
arbitrary, is restricted to a finite set of available sensors.
Contributions. We extend the Linear-Quadratic-Gaussian
(LQG) control to the case in which, besides designing an optimal controller and estimator, one has to select a set of sensors
to be used to observe the system state. In particular, we formulate the sensing-constrained (finite-horizon) LQG problem
as the joint design of an optimal control and estimation policy,
as well as the selection of a subset of k out of N available
sensors, that minimize the LQG objective, which quantifies
tracking performance and control effort. We first leverage a
separation principle to show that the design of sensing, control,
and estimation, can be performed independently. While the
computation of the optimal sensing strategy is combinatorial
in nature, a key contribution of this paper is to provide the
first scalable algorithm that computes a near-optimal sensing
strategy with provable sub-optimality guarantees. We demonstrate the effectiveness of the proposed algorithm in numerical
experiments, and motivate the importance of the sensing-
constrained LQG problem, by considering two application
scenarios, namely, sensing-constrained formation control and
resource-constrained robot navigation.
Notation. Lowercase letters denote vectors and scalars, and
uppercase letters denote matrices. We use calligraphic fonts to
denote sets. The identity matrix of size n is denoted with In
(dimension is omitted when clear from the context). For a
matrix M and a vector v of appropriate dimension, we define
kvk2M , v T M v. For matrices M1 , M2 , . . . , Mk , we define
diag (M1 , M2 , . . . , Mk ) as the block diagonal matrix with
diagonal blocks the M1 , M2 , . . . , Mk .
II. S ENSING -C ONSTRAINED LQG C ONTROL
In this section we formalize the sensing-constrained LQG
control problem considered in this paper. We start by introducing the notions of system, sensors, and control policies.
a) System: We consider a standard discrete-time (possibly time-varying) linear system with additive Gaussian noise:
xt+1 = At xt + Bt ut + wt ,
t = 1, 2, . . . , T,
(1)
where xt ∈ Rnt represents the state of the system at time t,
ut ∈ Rmt represents the control action, wt represents the
process noise, and T is a finite time horizon. In addition,
we consider the system’s initial condition x1 to be a Gaussian
random variable with covariance Σ1|0 , and wt to be a Gaussian
random variable with mean zero and covariance Wt , such that
wt is independent of x1 and wt′ for all t′ = 1, 2, . . . , T , t′ 6= t.
b) Sensors: We consider the case where we have a
(potentially large) set of available sensors, which take noisy
linear observations of the system’s state. In particular, let V be
a set of indices such that each index i ∈ V uniquely identifies
a sensor that can be used to observe the state of the system.
We consider sensors of the form
yi,t = Ci,t xt + vi,t ,
i ∈ V,
(2)
where yi,t ∈ Rpi,t represents the measurement of sensor i at
time t, and vi,t represents the measurement noise of sensor i.
We assume vi,t to be a Gaussian random variable with mean
zero and positive definite covariance Vi,t , such that vi,t is
independent of x1 , and of wt′ for any t′ 6= t, and independent
of vi′ ,t′ for all t′ 6= t, and any i′ ∈ V, i′ 6= i.
In this paper we are interested in the case in which we
cannot use all the available sensors, and as a result, we need
to select a convenient subset of sensors in V to maximize our
control performance (formalized in Problem 1 below).
Definition 1 (Active sensor set and measurement model).
Given a set of available sensors V, we say that S ⊂ V is an
active sensor set if we can observe the measurements from each
sensor i ∈ S for all t = 1, 2, . . . , T . Given an active sensor
set S = {i1 , i2 . . . , i|S| }, we define the following quantities
yt (S)
Ct (S)
Vt (S)
,
,
,
[yiT1 ,t , yiT2 ,t , . . . , yiT|S| ,t ]T ,
[CiT1 ,t , CiT2 ,t , . . . , CiT|S| ,t ]T ,
diag[Vi1 ,t , Vi2 ,t , . . . , Vi|S| ,t ]
(3)
which lead to the definition of the measurement model:
yt (S) = Ct (S)xt + vt (S)
(4)
where vt (S) is a zero-mean Gaussian noise with covariance Vt (S). Despite the availability of a possibly large set
of sensors V, our observer will only have access to the
measurements produced by the active sensors.
The following paragraph formalizes how the choice of the
active sensors affects the control policies.
c) Control policies: We consider control policies ut for
all t = 1, 2, . . . , T that are only informed by the measurements
collected by the active sensors:
ut = ut (S) = ut (y1 (S), y2 (S), . . . , yt (S)),
t = 1, 2, . . . , T.
Such policies are called admissible.
In this paper, we want to find a small set of active sensors S,
and admissible controllers u1 (S), u2 (S), . . . , uT (S), to solve
the following sensing-constrained LQG control problem.
Problem 1 (Sensing-constrained LQG control). Find a sensor set S ⊂ V of cardinality at most k to be active across all
times t = 1, 2, . . . , T , and control policies u1:T (S) , {u1 (S),
u2 (S), . . . , uT (S)}, that minimize the LQG cost function:
min
S ⊆ V, |S|≤ k,
u1:T (S)
T
X
t=1
E kxt+1 (S)k2Qt +kut (S)k2Rt ,
(5)
where the state-cost matrices Q1 , Q2 , . . . , QT are positive
semi-definite, the control-cost matrices R1 , R2 , . . . , RT are
positive definite, and the expectation is taken with respect to
the initial condition x1 , the process noises w1 , w2 , . . . , wT ,
and the measurement noises v1 (S), v2 (S), . . . , vT (S).
Problem 1 generalizes the imperfect state-information LQG
control problem from the case where all sensors in V are
active, and only optimal control policies are to be found [19,
Chapter 5], to the case where only a few sensors in V can
be active, and both optimal sensors and control policies are
to be found jointly. While we already noticed that admissible
control policies depend on the active sensor set S, it is worth
noticing that this in turn implies that the state evolution also
depends on S; for this reason we write xt+1 (S) in eq. (5).
The intertwining between control and sensing calls for a joint
design strategy. In the following section we focus on the design
of a jointly optimal control and sensing solution to Problem 1.
III. J OINT S ENSING
AND
C ONTROL D ESIGN
In this section we first present a separation principle that decouples sensing, estimation, and control, and allows designing
them in cascade (Section III-A). We then present a scalable
algorithm for sensing and control design (Section III-B).
A. Separability of Optimal Sensing and Control Design
We characterize the jointly optimal control and sensing
solutions to Problem 1, and prove that they can be found in
two separate steps, where first the sensing design is computed,
and second the corresponding optimal control design is found.
Algorithm 1 Joint Sensing and Control design for Problem 1.
Input: Time horizon T , available sensor set V, covariance
matrix Σ1|0 of initial condition x1 ; for all t = 1, 2, . . . , T ,
system matrix At , input matrix Bt , LQG cost matrices Qt
and Rt , process noise covariance matrix Wt ; and for all
sensors i ∈ V, measurement matrix Ci,t , and measurement
noise covariance matrix Vi,t .
b and control matrices K1 , . . . , KT .
Output: Active sensors S,
b
1: S is returned by Algorithm 2 that finds a (possibly approximate) solution to the optimization problem in eq. (6);
2: K1 , . . . , KT are computed using the recursion in eq. (8).
Theorem 1 (Separability of optimal sensing and control design). Let the sensor set S ⋆ and the controllers u⋆1 , u⋆2 , . . . , u⋆T
be a solution to the sensing-constrained LQG Problem 1. Then,
S ⋆ and u⋆1 , u⋆2 , . . . , u⋆T can be computed in cascade as follows:
S ⋆ ∈ arg min
T
X
S⊆V,|S|≤k t=1
u⋆t = Kt x̂t,S ⋆ ,
tr[Θt Σt|t (S)],
t = 1, . . . , T
(6)
(7)
where x̂t (S) is the Kalman estimator of the state xt ,
i.e., x̂t (S) , E(xt |y1 (S), y2 (S), . . . , yt (S)), and Σt|t (S)
is x̂t (S)’s error covariance, i.e., Σt|t (S) , E[(x̂t (S) −
xt )(x̂t (S) − xt )T ] [19, Appendix E]. In addition, the matrices
Θt and Kt are independent of the selected sensor set S, and
they are computed as follows: the matrices Θt and Kt are the
solution of the backward Riccati recursion
Algorithm 2 Sensing design for Problem 1.
Input: Time horizon T , available sensor set V, covariance
matrix Σ1|0 of system’s initial condition x1 , and for
any time t = 1, 2, . . . , T , any sensor i ∈ V, process
noise covariance matrix Wt , measurement matrix Ci,t , and
measurement noise covariance matrix Vi,t .
b
Output: Sensor set S.
1: Compute Θ1 , Θ2 , . . . , ΘT using recursion in eq. (8);
b ← ∅; i ← 0;
2: S
3: while i < k do
4:
for all a ∈ V \ Sb do
5:
Sba ← Sb ∪ {a}; Σ1|0 (Sba ) ← Σ1|0 ;
6:
for all t = 1, . . . , T do
7:
Σt|t (Sba ) ←
8:
[Σt|t−1 (Sba )−1 + Ct (Sba )T Vt (Sba )−1 Ct (Sba )]−1 ;
9:
Σt+1|t (Sba ) ← At Σt|t (Sba )AT
t + Wt ;
10:
end for P
T
11:
costa ← t=1 tr[Θt Σt|t (Sba )];
12:
end for
13:
ai ← arg mina∈V\S costa ;
14:
Sb ← Sb ∪ {ai }; i ← i + 1;
15: end while
vide more insight on the cost function in (6), we rewrite it as:
T
X
tr[Θt Σt|t (S)] =
t=1
T
X
t=1
=
T
X
t=1
St
Nt
Mt
Kt
Θt
= Qt + Nt+1 ,
−1
= AT
+ Bt Rt−1 BtT )−1 At ,
t (St
T
= Bt St Bt + Rt ,
= −Mt−1 BtT St At ,
= KtT Mt Kt ,
(8)
with boundary condition NT +1 = 0.
Remark 1 (Certainty equivalence principle). The control
gain matrices K1 , K2 , . . . , KT are the same as the ones that
make the controllers (K1 x1 , K1 x2 , . . . , KT xT ) optimal for
the perfect state-information version of Problem 1, where the
state xt is known to the controllers [19, Chapter 4].
Theorem 1 decouples the design of the sensing from the
controller design. Moreover, it suggests that once an optimal
sensor set S ⋆ is found, then the optimal controllers are equal
to Kt x̂t (S), which correspond to the standard LQG control
policy. This should not come as a surprise, since for a given
sensing strategy, Problem 1 reduces to standard LQG control.
We conclude this section with a remark providing a more
intuitive interpretation of the sensor design step in eq. (6).
Remark 2 (Control-aware sensor design). In order to pro-
E tr{[xt − x̂t (S)]T Θt [xt − x̂t (S)]}
E kKt xt − Kt x̂t (S)k2Mt ,
(9)
where
in the first line we used
the fact that Σt|t (S) =
E (xt − x̂t (S))(xt − x̂t (S))T , and in the second line we
substituted the definition of Θt = KtT Mt Kt from eq. (8).
From eq. (9), it is clear that each term tr[Θt Σt|t (S)]
captures the expected control mismatch between the imperfect
state-information controller ut (S) = Kt x̂t (S) (which is only
aware of the measurements from the active sensors) and the
perfect state-information controller Kt xt . This is an important
distinction from the existing sensor selection literature. In particular, while standard sensor selection attempts to minimize
the estimation covariance, for instance by minimizing
T
X
t=1
tr[Σt|t (S)] ,
T
X
t=1
E kxt − x̂t (S)k22 ,
(10)
the proposed LQG cost formulation attempts to minimize the
estimation error of only the informative states to the perfect
state-information controller: for example, the contribution of
all xt − x̂t (S) in the null space of Kt to the total control
mismatch in eq. (9) is zero. Hence, in contrast to minimizing
the cost function in eq. (10), minimizing the cost function in
eq. (9) results to a control-aware sensing design.
B. Scalable Near-optimal Sensing and Control Design
This section proposes a practical design algorithm for
Problem 1. The pseudo-code of the algorithm is presented in
Algorithm 1. Algorithm 1 follows the result of Theorem 1,
and jointly designs sensing and control by first computing an
active sensor set (line 1 in Algorithm 1) and then computing
the control policy (line 2 in Algorithm 1). We discuss each
step of the design process in the rest of this section.
1) Near-optimal Sensing design: The optimal sensor design
can be computed by solving the optimization problem in
eq. (6). The problem is combinatorial in nature, since it
requires to select a subset of elements of cardinality k out
of all the available sensors that induces the smallest cost.
In this section we propose a greedy algorithm, whose
pseudo-code is given in Algorithm 2, that computes a (possibly
approximate) solution to the problem in eq. (6). Our interest
towards this greedy algorithm is motivated by the fact that
it is scalable (in Section IV we show that its complexity is
linear in the number of available sensors) and is provably
close to the optimal solution of the problem in eq. (6)
(we provide suboptimality bounds in Section IV).
Algorithm 2 computes the matrices Θt (t = 1, 2, . . . , T )
which appear in the cost function in eq. (6) (line 1).
Note that these matrices are independent on the choice of
sensors. The set of active sensors Sb is initialized to the
empty set (line 2). The “while loop” in line 3 will be
executed k times and at each time a sensor is greedily
b In particular, the
added to the set of active sensors S.
“for loop” in lines 4-12 computes the estimation covariance
resulting by adding a sensor to the current active sensor
set and the corresponding cost (line 11). Finally, the sensor
inducing the smallest cost is selected (line 13) and added
to the current set of active sensors (line 14).
2) Control policy design: The optimal control design is
computed as in eq. (7), where the control policy matrices
K1 , K2 , . . . , KT are obtained from the recursion in eq. (8).
In the following section we characterize the approximation
and running-time performance of Algorithm 1.
IV. P ERFORMANCE G UARANTEES FOR J OINT S ENSING
AND C ONTROL D ESIGN
We prove that Algorithm 1 is the first scalable algorithm
for the joint sensing and control design Problem 1, and that it
achieves a value for the LQG cost function in eq. (5) that is
finitely close to the optimal. We start by introducing the notion
of supermodularity ratio (Section IV-A), which will enable to
bound the sub-optimality gap of Algorithm 1 (Section IV-B).
A. Supermodularity ratio of monotone functions
We define the supermodularity ratio of monotone functions.
We start with the notions of monotonicity and supermodularity.
Definition 2 (Monotonicity). Consider any finite ground
set V. The set function f : 2V 7→ R is non-increasing if and
only if for any A ⊆ A′ ⊆ V, f (A) ≥ f (A′ ).
Definition 3 (Supermodularity [20, Proposition 2.1]). Consider any finite ground set V. The set function f : 2V 7→ R is
supermodular if and only if for any A ⊆ A′ ⊆ V and x ∈ V,
f (A) − f (A ∪ {x}) ≥ f (A′ ) − f (A′ ∪ {x}).
In words, a set function f is supermodular if and only if it
satisfies the following intuitive diminishing returns property:
for any x ∈ V, the marginal drop f (A) − f (A ∪ {x})
diminishes as A grows; equivalently, for any A ⊆ V and
x ∈ V, the marginal drop f (A)−f (A∪{x}) is non-increasing.
Definition 4 (Supermodularity ratio). Consider any finite
ground set V, and a non-increasing set function f : 2V 7→ R.
We define the supermodularity ratio of f as
γf =
min
A⊆V,x,x′ ∈V\A
f (A) − f (A ∪ {x})
.
f (A ∪ {x′ }) − f [(A ∪ {x′ }) ∪ {x}]
In words, the supermodularity ratio of a monotone set
function f measures how far f is from being supermodular.
In particular, per the Definition 4 of supermodularity ratio, the
supermodularity ratio γf takes values in [0, 1], and
• γf = 1 if and only if f is supermodular, since if γf = 1,
then Definition 4 implies f (A) − f (A ∪ {x}) ≥ f (A ∪
{x′ }) − f [(A ∪ {x′ }) ∪ {x}], i.e., the drop f (A) − f (A ∪
{x}) is non-increasing as new elements are added in A.
• γf < 1 if and only if f is approximately supermodular, in
the sense that if γf < 1, then Definition 4 implies f (A)−
f (A ∪ {x}) ≥ γf {f (A ∪ {x′ }) − f [(A ∪ {x′ }) ∪ {x}]},
i.e., the drop f (A) − f (A ∪ {x}) is approximately nonincreasing as new elements are added in A; specifically,
the supermodularity ratio γf captures how much ones
needs to discount the drop f (A ∪ {x′ }) − f [(A ∪ {x′ }) ∪
{x}], such that f (A) − f (A ∪ {x}) remains greater then,
or equal to, f (A ∪ {x′ }) − f [(A ∪ {x′ }) ∪ {x}].
We next use the notion of supermodularity ratio Definition 4
to quantify the sub-optimality gap of Algorithm 1.
B. Performance Analysis for Algorithm 1
We quantify Algorithm 1’s running time, as well as, Algorithm 1’s approximation performance, using the notion of
supermodularity ratio introduced in Section IV-A. We conclude the section by showing that for appropriate LQG cost
matrices Q1 , Q2 , . . . , QT and R1 , R2 , . . . , RT , Algorithm 1
achieves near-optimal approximate performance.
Theorem 2 (Performance of Algorithm 1). For any active
sensor set S ⊆ V, and admissible control policies u1:T (S) ,
{u1 (S), u2 (S), . . . , uT (S)}, let h[S, u1:T (S)] be Problem 1’s
cost function, i.e.,
PT
h[S, u1:T (S)] , t=1 E(kxt+1 (S)k2Qt +kut(S)k2Rt );
Further define the following set-valued function and scalar:
g(S) , minu1:T (S) h[S, u1:T (S)],
g ⋆ , minS⊆V,|S|≤k, h[S, u1:T (S)].
u1:T (S)
The following results hold true:
(11)
1) (Approximation quality) Algorithm 1 returns an active
sensor set Sb ⊂ V of cardinality k, and gain matrices K1 ,
b u1:T (S)]
b attained by
K2 , . . . , KT , such that the cost h[S,
b
the sensor set S and the corresponding control policies
b , {K1 x̂1 (S),
b . . . , KT x̂T (S)}
b satisfies
u1:T (S)
b u1:T (S))
b − g⋆
h(S,
≤ exp(−γg )
g(∅) − g ⋆
T
= 1, and that
norm of each C̄i,t is 1, i.e., tr C̄i,t C̄i,t
tr[Σt|t (∅)] ≤ λ2max [Σt|t (∅)], γg ’s lower bound is
γg ≥
(12)
where γg is the supermodularity ratio of g(S) in eq. (11).
2) (Running time) Algorithm 1 runs in O(k|V|T n2.4 ) time,
where n , maxt=1,2,...,T (nt ) is the maximum system size
in eq. (1).
Theorem 2 ensures that Algorithm 1 is the first scalable
algorithm for the sensing-constrained LQG control Problem 1.
In particular, Algorithm 1’s running time O(k|V|T n2.4 ) is linear both in the number of available sensors |V|, and the sensor
set cardinality constraint k, as well as, linear in the Kalman
filter’s running time across the time horizon {1, 2 . . . , T }.
Specifically, the contribution n2.4 T in Algorithm 1’s running
time comes from the computational complexity of using the
Kalman filter to compute the state estimation error covariances
Σt|t for each t = 1, 2, . . . , T [19, Appendix E].
Theorem 2 also guarantees that for non-zero ratio γg
Algorithm 1 achieves a value for Problem 1 that is finitely
close to the optimal. In particular, the bound in ineq. (12)
improves as γg increases, since it is decreasing in γg , and
is characterized by the following extreme behaviors: for
γg = 1, the bound in ineq. (12) is e−1 ≃ .37, which
is the minimum for any γg ∈ [0, 1], and hence, the best
bound on Algorithm 1’s approximation performance among
all γg ∈ [0, 1] (ideally, the bound in ineq. (12) would be 0
for γg = 1, in which case Algorithm 1 would be exact,
b u1:T (S))
b = g ⋆ ; however,
since it would be implied h(S,
even for supermodular functions, the best bound one can
achieve in the worst-case is e−1 [21]); for γg = 0, ineq. (12)
b u1:T (S))
b ≤ g(∅) =
is uninformative since it simplifies to h(S,
h(∅, u1:T (∅)), which is trivially satisfied.1
In the remaining
PT of the section, we first prove that if the
strict inequality t=1 Θt ≻ 0 holds, where each Θt is defined
as in eq. (8), then the ratio γg in ineq. (12) is non-zero, and as
result Algorithm 1 achieves a near-optimal approximation performance
(Theorem 3). Then, we prove that the strict inequalP
ity Tt=1 Θt ≻ 0 is equivalent to a verifiable condition (Proposition 1) that holds for appropriate cost matrices Qt and Rt .
Theorem 3 (Lower bound for supermodularity ratio γg ).
Let Θt for all t = 1, 2, . . . , T be defined as in eq. (8), g(S)
be defined as in eq. (11), and for any sensor i ∈ V, C̄i,t be
−1/2
the normalized measurement matrix Vi,t Ci,t .
PT
If t=1 Θt ≻ 0, the supermodularity ratio γg is non-zero.
In addition, if we consider for simplicity that the Frobenius
1 The inequality h(S,
b u1:T (S))
b ≤ h(∅, u1:T (∅)) simply states that a control policy that is informed by the active sensor set S has better performance
than a policy that does not use any sensor; for a more formal proof we refer
the reader to Appendix B.
P
λmin ( Tt=1 Θt ) mint∈{1,2,...,T } λ2min [Σt|t (V)]
PT
λmax ( t=1 Θt ) maxt∈{1,2,...,T } λ2max [Σt|t (∅)]
1 + mini∈V,t∈{1,2...,T } λmin [C̄i Σt|t (V)C̄iT ]
.
2 + maxi∈V,t∈{1,2...,T } λmax [C̄i Σt|t (∅)C̄iT ]
(13)
The supermodularity ratio bound in ineq. (13) suggests two
cases under which γg can increase, and correspondingly, the
performance bound of Algorithm 1 in eq. (12) can improve:
a) Case 1 where γg ’s bound in ineq. (13) increases:
P
P
When the fraction λmin ( Tt=1 Θt )/λmax ( Tt=1 Θt ) increases
to 1, then the right-hand-side in ineq. (13) increases. Equivalently, the right-hand-side in ineq. (13) increases when on
(i)
(i)
average all the directions xt − x̂t of the estimation errors
(1)
(1)
(2)
(2)
(n )
(n )
xt − x̂t = (xt − x̂t , xt − x̂t , . . . , xt t − x̂t t ) become
equally important in selecting the active sensor set. To see this,
consider for example that λmax (Θt ) = λmin (Θt ) = λ; then,
the cost function in eq. (6) that Algorithm 1 minimizes to
select the active sensor set becomes
T
X
tr[Θt Σt|t (S)] = λ
t=1
=λ
T
X
E tr(kxt − x̂t (S)k22 )
t=1
nt
T X
X
t=1 i=1
i
h
(i)
(i)
E tr(kxt − x̂t (S)|22 ) .
Overall, it is easier for Algorithm 1 to approximate a solution
to Problem 1 as the cost function in eq. (6) becomes the cost
function in the standard sensor selection problems where one
minimizes the total estimation covariance as in eq. (10).
b) Case 2 where γg ’s bound in ineq. (13) increases:
When either the numerators of the last two fractions in the
right-hand-side of ineq. (13) increase or the denominators
of the last two fractions in the right-hand-side of ineq. (13)
decrease, then the right-hand-side in ineq. (13) increases.
In particular, the numerators of the last two fractions in righthand-side of ineq. (13) capture the estimation quality when
all available sensors in V are used, via the terms of the
T
form λmin [Σt|t (V)] and λmin [C̄i,t Σt|t (V)C̄i,t
]. Interestingly,
this suggests that the right-hand-side of ineq. (13) increases
when the available sensors in V are inefficient in achieving
low estimation error, that is, when the terms of the form
T
λmin [Σt|t (V)] and λmin [C̄i,t Σt|t (V)C̄i,t
] increase. Similarly,
the denominators of the last two fractions in right-handside of ineq. (13) capture the estimation quality when no
sensors are used, via the terms of the form λmax [Σt|t (∅)] and
T
λmax [C̄i,t Σt|t (∅)C̄i,t
]. This suggests that the right-hand-side of
ineq. (13) increases when the measurement noise increases.
We next give a P
control-level equivalent condition to TheoT
rem 3’s condition t=1 Θt ≻ 0 for non-zero ratio γg .
Theorem 4 (Control-level condition for near-optimal sensor
selection). Consider the LQG problem where for any time t =
1, 2, . . . , T , the state xt is known to each controller ut and
9
the process noise wt is zero, i.e., the optimization problem
PT
(14)
minu1:T t=1 [kxt+1 k2Qt +kut (xt )k2Rt ] Σ =W =0 .
7
6
5
4
3
t
Let At to
PTbe invertible for all t = 1, 2, . . . , T ; the strict
inequality t=1 Θt ≻ 0 holds if and only if for all non-zero
initial conditions x1 ,
PT
0∈
/ arg minu1:T t=1 [kxt+1 k2Qt +kut (xt )k2Rt ] Σ =W =0 .
t|t
t
4 suggests that Theorem 3’s sufficient condition
PTheorem
T
Θ
≻
0 for non-zero ratio γg holds if and only if for
t
t=1
any non-zero initial condition x1 the all-zeroes control policy
u1:T = (0, 0, . . . , 0) is suboptimal for the noiseless perfect
state-information LQG problem in eq. (14).
The all-zeroes control policy is always suboptimal for the
noiseless perfect state-information LQG problem in eq. (14)
for appropriate LQG cost matrices Q1 , Q2 , . . . , QT and
R1 , R2 , . . . , RT , as implied by Proposition 1 below.
Proposition 1 (System-level condition for near-optimal
sensor selection). Let N1 be defined as in eq. (8). The control
policy u1:T , (0, 0, . . . , 0) is suboptimal for the LQG problem
in eq. (14) for all non-zero initial conditions x1 if and only if
PT
T
T
(15)
t=1 A1 · · · At Qt At · · · A1 ≻ N1 .
The strict ineq. (15) holds for appropriate LQG cost matrices Qt and Rt , as, for example, the control cost matrices
Rt are closer to zero than the state cost matrices Qt , that
is, as the LQG cost function penalizes the state vector values
more than the control vector values. For example, consider
the case where the LQG cost matrix R1 tends to zero, i.e.,
consider ǫ such that R1 ǫI, and ǫ −→ 0; then, for
any Q1 , the strict ineq. (15) holds for ǫ small, since N1
−1
T −1
ǫAT
A1 −→ 0 for ǫ −→ 0. In particular,
1 (ǫS1 + B1 B1 )
R1 ǫI, and [22, Proposition 8.5.5],2 imply R1−1 I/ǫ, and
as a result, S1−1 + B1 R1−1 B1T (ǫS1−1 + B1 B1T )/ǫ, which
in turn implies (S1−1 + B1 R1−1 B1T )−1 ǫ(ǫS1−1 + B1 B1T )−1 ,
−1
T −1
and consequently, N1 ǫAT
A1 .
1 (ǫS1 + B1 B1 )
Overall, Algorithm 1 is the first scalable algorithm for the
sensing-constrained LQG control Problem 1, and for appropriate LQG cost matrices Q1 , Q2 , . . . , QT and R1 , R2 , . . . , RT ,
Algorithm 1 achieves near-optimal approximate performance.
V. N UMERICAL E XPERIMENTS
We consider two application scenarios for the proposed sensing-constrained LQG control framework: sensingconstrained formation control and resource-constrained robot
navigation. We present a Monte Carlo analysis for both scenarios, which demonstrates that (i) the proposed sensor selection
strategy is near-optimal, and in particular, the resulting LQGcost (tracking performance) matches the optimal selection in
all tested instances for which the optimal selection could
be computed via a brute-force approach, (ii) a more naive
selection which attempts to minimize the state estimation
2 [22, Proposition 8.5.5] states that for any positive definite matrices M
1
and M2 such that M1 M2 , M2−1 M1−1 .
2
y [meters]
t|t
8
1
0
-1
-2
-3
-4
-5
-6
-7
-8
-9
-9
-8
-7
-6
-5
-4
-3
-2
-1
0
1
2
3
4
5
6
7
8
9
x [meters]
(a) formation control
(b) unmanned aerial robot
Fig. 1. Examples of applications of the proposed sensing-constrained LQG
control framework: (a) sensing-constrained formation control and (b) resourceconstrained robot navigation.
covariance [15] (rather than the LQG cost) has degraded LQG
tracking performance, often comparable to a random selection,
(iii) in the considered instances, a clever selection of a small
subset of sensors can ensure an LQG cost that is close to the
one obtained by using all available sensors, hence providing an
effective alternative for control under sensing constraints [23].
VI. S ENSING - CONSTRAINED
FORMATION CONTROL
Simulation setup. The first application scenario is illustrated in Fig. 1(a). A team of n agents (blue triangles) moves
in a 2D scenario. At time t = 1, the agents are randomly
deployed in a 10m × 10m square and their objective is to
reach a target formation shape (red stars); in the example of
Fig. 1(a) the desired formation has an hexagonal shape, while
in general for a formation of n, the desired formation is an
equilateral polygon with n vertices. Each robot is modeled as
a double-integrator, with state xi = [pi vi ]T ∈ R4 (pi is the 2D
position of agent i, while vi is its velocity), and can control
its own acceleration ui ∈ R2 ; the process noise is chosen
as a diagonal matrix W = diag [1e−2 , 1e−2 , 1e−4 , 1e−4 ] .
Each robot i is equipped with a GPS receiver, which can
measure the agent position pi with a covariance Vgps,i = 2·I2 .
Moreover, the agents are equipped with lidar sensors allowing
each agent i to measure the relative position of another agent j
with covariance Vlidar,ij = 0.1 · I2 . The agents have very
limited on-board resources, hence they can only activate a
subset of k sensors. Hence, the goal is to select the subset of
k sensors, as well as to compute the control policy that ensure
best tracking performance, as measured by the LQG objective.
For our tests, we consider two problem setups. In the first
setup, named homogeneous formation control, the LQG weigh
matrix Q is a block diagonal matrix with 4 × 4 blocks, with
each block i chosen as Qi = 0.1 · I4 ; since each 4 × 4 block
of Q weights the tracking error of a robot, in the homogeneous
case the tracking error of all agents is equally important.
In the second setup, named heterogeneous formation control,
the matrix Q is chose as above, except for one of the agents,
say robot 1, for which we choose Q1 = 10 · I4 ; this setup
models the case in which each agent has a different role or
importance, hence one weights differently the tracking error
of the agents. In both cases the matrix R is chosen to be the
identity matrix. The simulation is carried on over T time steps,
and T is also chosen as LQG horizon. Results are averaged
over 100 Monte Carlo runs: at each run we randomize the
initial estimation covariance Σ1|0 .
Compared techniques. We compare five techniques. All
techniques use an LQG-based estimator and controller, and
they only differ by the selections of the sensors used.
The first approach is the optimal sensor selection, denoted
as optimal, which attains the minimum of the cost function
in eq. (6), and that we compute by enumerating all possible
subsets; this brute-force approach is only viable when the
number of available sensors is small. The second approach
is a pseudo-random sensor selection, denoted as random∗ ,
which selects all the GPS measurements and a random subset
of the lidar measurements; note that we do not consider a
fully random selection since in practice this often leads to an
unobservable system, hence causing divergence of the LQG
cost. The third approach, denoted as logdet, selects sensors
so to minimize the average log det of the estimation covariance
over the horizon; this approach resembles [15] and is agnostic
to the control task. The fourth approach is the proposed sensor
selection strategy, described in Algorithm 2, and is denoted as
s-LQG. Finally, we also report the LQG performance when all
sensors are selected; this is clearly infeasible in practice, due to
the sensing constraints, and it is only reported for comparison
purposes. This approach is denoted as allSensors.
Results. The results of our numerical analysis are reported
in Fig. 2. When not specified otherwise, we consider a
formation of n = 4 agents, which can only use a total of
k = 6 sensors, and a control horizon T = 20. Fig. 2(a)
shows the LQG cost attained by the compared techniques for
increasing control horizon and for the homogeneous case. We
note that, in all tested instance, the proposed approach s-LQG
matches the optimal selection optimal, and both approaches
are relatively close to allSensors, which selects all the
2
available sensors ( n+n
2 ). On the other hand logdet leads
to worse tracking performance, and it is often close to the
pseudo-random selection random∗ . These considerations are
confirmed by the heterogeneous setup, shown in Fig. 2(b).
In this case the separation between the proposed approach
and logdet becomes even larger; the intuition here is that
the heterogeneous case rewards differently the tracking errors
at different agents, hence while logdet attempts to equally
reduce the estimation error across the formation, the proposed
approach s-LQG selects sensors in a task-oriented fashion,
since the matrices Θt for all t = 1, 2, . . . , T in the cost
function in eq. (6) incorporate the LQG weight matrices.
Fig. 2(c) shows the LQG cost attained by the compared
techniques for increasing number of selected sensors k and for
the homogeneous case. We note that for increasing number of
sensors all techniques converge to allSensors (the entire
ground set is selected). As in the previous case, the proposed
approach s-LQG matches the optimal selection optimal.
Interestingly, while the performance of logdet is in general
inferior with respect to s-LQG, when the number of selected
sensors k decreases (for k < n the problem becomes unob-
servable) the approach logdet performs similarly to s-LQG.
Fig. 2(d) shows the same statistics for the heterogeneous case.
We note that in this case logdet is inferior to s-LQG even
in the case with small k. Moreover, an interesting fact is that
s-LQG matches allSensors already for k = 7, meaning
that the LQG performance of the sensing-constraint setup is
indistinguishable from the one using all sensors; intuitively,
in the heterogeneous case, adding more sensors may have
marginal impact on the LQG cost (e.g., if the cost rewards
a small tracking error for robot 1, it may be of little value
to take a lidar measurement between robot 3 and 4). This
further stresses the importance of the proposed framework as a
parsimonious way to control a system with minimal resources.
Fig. 2(e) and Fig. 2(f) show the LQG cost attained by the
compared techniques for increasing number of agents, in the
homogeneous and heterogeneous case, respectively. To ensure
observability, we consider k = round (1.5n), i.e., we select a
number of sensors 50% larger than the smallest set of sensors
that can make the system observable. We note that optimal
quickly becomes intractable to compute, hence we omit values
beyond n = 4. In both figures, the main observation is that
the separation among the techniques increases with the number
of agents, since the set of available sensors quickly increases
with n. Interestingly, in the heterogeneous case s-LQG remains relatively close to allSensors, implying that for the
purpose of LQG control, using a cleverly selected small subset
of sensors still ensures excellent tracking performance.
VII. R ESOURCE - CONSTRAINED
ROBOT NAVIGATION
Simulation setup. The second application scenario is illustrated in Fig. 1(b). An unmanned aerial robot (UAV) moves
in a 3D scenario, starting from a randomly selected initial
location. The objective of the UAV is to land, and more
specifically, it has to reach the position [0, 0, 0] with zero
velocity. The UAV is modeled as a double-integrator, with
state xi = [pi vi ]T ∈ R6 (pi is the 3D position of agent i,
while vi is its velocity), and can control its own acceleration
ui ∈ R3 ; the process noise is chosen as W = I6 . The UAV
is equipped with multiple sensors. It has an on-board GPS
receiver, measuring the UAV position pi with a covariance
2 · I3 , and an altimeter, measuring only the last component
of pi (altitude) with standard deviation 0.5m. Moreover, the
UAV can use a stereo camera to measure the relative position
of ℓ landmarks on the ground; for the sake of the numerical
example, we assume the location of each landmark to be
known only approximately, and we associate to each landmark
an uncertainty covariance (red ellipsoids in Fig. 1(b)), which is
randomly generated at the beginning of each run. The UAV has
limited on-board resources, hence it can only activate a subset
of k sensors. For instance, the resource-constraints may be due
to the power consumption of the GPS and the altimeter, or
may be due to computational constraints that prevent to run
multiple object-detection algorithms to detect all landmarks
on the ground. Similarly to the previous case, we phrase the
problem as a sensing-constraint LQG problem,
and we use
Q = diag [1e−3 , 1e−3 , 10, 1e−3 , 1e−3 , 10] and R = I3 .
12
random*
optimal
logdet
s-LQG
allSensors
6
2450
150
120
random*
optimal
logdet
s-LQG
allSensors
110
100
100
LQG cost
200
random*
optimal
logdet
s-LQG
allSensors
130
LQG cost / T
8
LQG cost
10
LQG cost
2500
250
random*
optimal
logdet
s-LQG
allSensors
4
2400
2350
2300
90
2
50
10
15
20
25
30
10
15
20
30
300
12
10
random*
optimal
logdet
s-LQG
allSensors
250
LQG cost
random*
optimal
logdet
s-LQG
allSensors
14
200
150
8
100
6
4
50
4
5
6
7
8
9
10
4
6
7
8
9
10
(d) heterogeneous
(c) homogeneous
25
180
random*
optimal
logdet
s-LQG
allSensors
15
random*
optimal
logdet
s-LQG
allSensors
160
140
LQG cost
20
LQG cost
5
maxNrUsedSensors
maxNrUsedSensors
10
120
0
100
60
40
3
5
7
nrRobots
(e) homogeneous
9
11
3
5
7
20
30
40
50
2250
4
horizon
6
8
10
maxNrUsedSensors
(b) heterogeneous
Fig. 3. LQG cost for increasing (a)-(b) control horizon T , (c)-(d) number of
selected sensors k, and (e)-(f) number of agents n. Statistics are reported for
the homogeneous formation control setup (left column), and the heterogeneous
setup (right column). Results are averaged over 100 Monte Carlo runs.
optimal selection optimal, while logdet and random∗
have suboptimal performance.
Fig. 3(b) shows the LQG cost attained by the compared
techniques for increasing number of selected sensors k.
Clearly, all techniques converge to allSensors for increasing k, but in the regime in which few sensors are used s-LQG
still outperforms alternative sensor selection schemes, and
matches in all cases the optimal selection optimal.
VIII. C ONCLUDING R EMARKS
80
5
10
(a) homogeneous
(b) heterogeneous
(a) homogeneous
16
LQG cost
25
horizon
horizon
9
11
nrRobots
(f) heterogeneous
Fig. 2. LQG cost for increasing (a)-(b) control horizon T , (c)-(d) number of
selected sensors k, and (e)-(f) number of agents n. Statistics are reported for
the homogeneous formation control setup (left column), and the heterogeneous
setup (right column). Results are averaged over 100 Monte Carlo runs.
Note that the structure of Q reflects the fact that during
landing we are particularly interested in controlling the vertical
direction and the vertical velocity (entries with larger weight
in Q), while we are less interested in controlling accurately the
horizontal position and velocity (assuming a sufficiently large
landing site). In the following, we present results averaged
over 100 Monte Carlo runs: in each run, we randomize the
covariances describing the landmark position uncertainty.
Compared techniques. We consider the five techniques
discussed in the previous section. As in the formation control
case, the pseudo-random selection random∗ always includes
the GPS measurement (which alone ensures observability) and
a random selection of the other available sensors.
Results. The results of our numerical analysis are reported
in Fig. 3. When not specified otherwise, we consider a total of
k = 3 sensors to be selected, and a control horizon T = 20.
Fig. 3(a) shows the LQG cost attained by the compared
techniques for increasing control horizon. For visualization
purposes we plot the cost normalized by the horizon, which
makes more visible the differences among the techniques. Similarly to the formation control example, s-LQG matches the
In this paper, we introduced the sensing-constrained LQG
control Problem 1, which is central in modern control applications that range from large-scale networked systems to
miniaturized robotics networks. While the computation of
the optimal sensing strategy is intractable, We provided the
first scalable algorithm for Problem 1, Algorithm 1, and
under mild conditions on the system and LQG matrices,
proved that Algorithm 1 computes a near-optimal sensing
strategy with provable sub-optimality guarantees. To this end,
we showed that a separation principle holds, which allows the
design of sensing, estimation, and control policies in isolation.
We motivated the importance of the sensing-constrained LQG
Problem 1, and demonstrated the effectiveness of Algorithm 1,
by considering two application scenarios: sensing-constrained
formation control, and resource-constrained robot navigation.
R EFERENCES
[1] N. Elia and S. Mitter, “Stabilization of linear systems with limited
information,” IEEE Trans. on Automatic Control, vol. 46, no. 9, pp.
1384–1400, 2001.
[2] G. Nair and R. Evans, “Stabilizability of stochastic linear systems with
finite feedback data rates,” SIAM Journal on Control and Optimization,
vol. 43, no. 2, pp. 413–436, 2004.
[3] S. Tatikonda and S. Mitter, “Control under communication constraints,”
IEEE Trans. on Automatic Control, vol. 49, no. 7, pp. 1056–1068, 2004.
[4] V. Borkar and S. Mitter, “LQG control with communication constraints,”
Comm., Comp., Control, and Signal Processing, pp. 365–373, 1997.
[5] J. L. Ny and G. Pappas, “Differentially private filtering,” IEEE Trans.
on Automatic Control, vol. 59, no. 2, pp. 341–354, 2014.
[6] G. Nair, F. Fagnani, S. Zampieri, and R. Evans, “Feedback control under
data rate constraints: An overview,” Proceedings of the IEEE, vol. 95,
no. 1, pp. 108–137, 2007.
[7] J. Hespanha, P. Naghshtabrizi, and Y.Xu, “A survey of results in networked control systems,” Pr. of the IEEE, vol. 95, no. 1, p. 138, 2007.
[8] J. Baillieul and P. Antsaklis, “Control and communication challenges in
networked real-time systems,” Proceedings of the IEEE, vol. 95, no. 1,
pp. 9–28, 2007.
12
[9] V. Gupta, T. H. Chung, B. Hassibi, and R. M. Murray, “On a stochastic
sensor selection algorithm with applications in sensor scheduling and
sensor coverage,” Automatica, vol. 42, no. 2, pp. 251–260, 2006.
[10] H. Avron and C. Boutsidis, “Faster subset selection for matrices and
applications,” SIAM Journal on Matrix Analysis and Applications,
vol. 34, no. 4, pp. 1464–1499, 2013.
[11] C. Li, S. Jegelka, and S. Sra, “Polynomial Time Algorithms for Dual
Volume Sampling,” ArXiv e-prints: 1703.02674, 2017.
[12] S. Joshi and S. Boyd, “Sensor selection via convex optimization,” IEEE
Transactions on Signal Processing, vol. 57, no. 2, pp. 451–462, 2009.
[13] J. L. Ny, E. Feron, and M. A. Dahleh, “Scheduling continuous-time
kalman filters,” IEEE Trans. on Aut. Control, vol. 56, no. 6, pp. 1381–
1394, 2011.
[14] M. Shamaiah, S. Banerjee, and H. Vikalo, “Greedy sensor selection:
Leveraging submodularity,” in Proceedings of the 49th IEEE Conference
on Decision and control, 2010, pp. 2572–2577.
[15] S. T. Jawaid and S. L. Smith, “Submodularity and greedy algorithms in
sensor scheduling for linear dynamical systems,” Automatica, vol. 61,
pp. 282–288, 2015.
[16] V. Tzoumas, A. Jadbabaie, and G. J. Pappas, “Sensor placement for
optimal Kalman filtering,” in Amer. Contr. Conf., 2016, pp. 191–196.
[17] E. Shafieepoorfard and M. Raginsky, “Rational inattention in scalar LQG
control,” in Proceedings of the 52th IEEE Conference in Decision and
Control, 2013, pp. 5733–5739.
[18] T. Tanaka and H. Sandberg, “SDP-based joint sensor and controller
design for information-regularized optimal LQG control,” in 54th IEEE
Conference on Decision and Control, 2015, pp. 4486–4491.
[19] D. P. Bertsekas, Dynamic programming and optimal control, Vol. I.
Athena Scientific, 2005.
[20] G. Nemhauser, L. Wolsey, and M. Fisher, “An analysis of approximations
for maximizing submodular set functions – I,” Mathematical Programming, vol. 14, no. 1, pp. 265–294, 1978.
[21] U. Feige, “A threshold of ln(n) for approximating set cover,” Journal
of the ACM, vol. 45, no. 4, pp. 634–652, 1998.
[22] D. S. Bernstein, Matrix mathematics. Princeton University Press, 2005.
[23] L. Carlone and S. Karaman, “Attention and anticipation in fast visualinertial navigation,” in Proceeding of the IEEE International Conference
on Robotics and Automation, 2017, pp. 3886–3893.
[24] P. R. Kumar and P. Varaiya, Stochastic systems: Estimation, identification and adaptive control. Prentice-Hall, Inc., 1986.
[25] Z. Wang, B. Moran, X. Wang, and Q. Pan, “Approximation for maximizing monotone non-decreasing set functions with a greedy method,”
Journal of Combinatorial Optimization, vol. 31, no. 1, pp. 29–43, 2016.
[26] L. F. Chamon and A. Ribeiro, “Near-optimality of greedy set selection
in the sampling of graph signals,” in Proceedings of the IEEE Global
Conference on Signal and Information Processing, 2016, pp. 1265–1269.
[27] D. Coppersmith and S. Winograd, “Matrix multiplication via arithmetic
progressions,” J. of Symbolic Comp., vol. 9, no. 3, pp. 251–280, 1990.
A PPENDIX A: P RELIMINARY
FACTS
This appendix contains a set of lemmata that will be used
to support the proofs in this paper (Appendices B–F).
Lemma 1 ([22, Proposition 8.5.5]). Consider two positive
definite matrices M1 and M2 . If M1 M2 then M2−1 M1−1.
Lemma 2 (Trace inequality [22, Proposition 8.4.13]). Consider a symmetric matrix A, and a positive semi-definite matrix
B of appropriate dimension. Then,
λmin (A)tr (B) ≤ tr (AB) ≤ λmax (A)tr (B) .
Lemma 3 (Woodbury identity [22, Corollary 2.8.8]). Consider matrices A, C, U and V of appropriate dimensions, such
that A, C, and A + U CV are invertible. Then,
(A + U CV )−1 = A−1 − A−1 U (C −1 + V A−1 U )−1 V A−1.
Lemma 4 ([22, Proposition 8.5.12]). Consider two symmetric
matrices A1 and A2 , and a positive semi-definite matrix B.
If A1 A2 , then tr (A1 B) ≤ tr (A2 B).
Lemma 5 ([19, Appendix E]). For any sensor set S ⊆ V,
and for all t = 1, 2, . . . , T , let x̂t (S) be the Kalman estimator
of the state xt , i.e., x̂t (S), and Σt|t (S) be x̂t (S)’s error
covariance, i.e., Σt|t (S) , E[(x̂t (S) − xt )(x̂t (S) − xt )T ].
Then, Σt|t (S) is the solution of the Kalman filtering recursion
Σt|t (S) = [Σt|t−1 (S)−1 + Ct (S)T Vt (S)−1 Ct (S)]−1,
Σt+1|t (S) = At Σt|t (S)AT
t + Wt ,
(16)
with boundary condition the Σ1|0 (S) = Σ1|0 .
Lemma 6. For any sensor set S ⊆ V, let Σ1|1 (S) be defined as
in eq. (16), and consider two sensor sets S1 , S2 ⊆ V. If S1 ⊆
S2 , then Σ1|1 (S1 ) Σ1|1 (S2 ).
Proof of Lemma 6: Let D = S2 \ S1 , and observe that
for all t = 1, 2, . . . , T , the notation in Definition 1 implies
X
T
Ct (S2 )T Vt (S2 )−1 Ct (S2 ) =
Ci,t
Vi,t Ci,t
i∈S2
=
X
T
Ci,t
Vi,t Ci,t +
i∈S1
=
X
X
T
Ci,t
Vi,t Ci,t
i∈D
T
Ci,t
Vi,t Ci,t
i∈S1
Ct (S1 )T Vt (S1 )−1 Ct (S1 ).
(17)
Therefore, Lemma 1 and ineq. (17) imply
T
−1
Σ1|1 (S2 ) = [Σ−1
Ct (S2 )]−1
1|0 + C1 (S2 ) Vt (S2 )
T
−1
[Σ−1
Ct (S1 )]−1 = Σ1|1 (S1 ).
1|0 + C1 (S1 ) Vt (S1 )
Lemma 7. Let Σt|t be defined as in eq. (16) with boundary
condition the Σ1|0 ; similarly, let Σ̄t|t be defined as in eq. (16)
with boundary condition the Σ̄1|0 . If Σt|t Σ̄t|t , then
Σt+1|t Σ̄t+1|t .
Proof of Lemma 7: We complete the proof in two
steps: first, from eq. (16), it its Σt+1|t = At Σt|t AT
t + Wt
+
W
=
Σ̄
.
Then,
from
Σ
Σ̄
,
At Σ̄t|t AT
t
t+1|t
t|t
t|t it follows
t
T
Σ̄
A
.
At Σt|t AT
A
t t|t t
t
Lemma 8. Let Σt|t−1 be defined as in eq. (16) with boundary
condition the Σ1|0 ; similarly, let Σ̄t|t−1 be defined as in
eq. (16) with boundary condition the Σ̄1|0 . If Σt|t−1 Σ̄t|t−1 ,
then Σt|t Σ̄t|t .
Proof of Lemma 8: From eq. (16), it is Σt|t =
T −1
−1
T −1
−1
(Σ−1
(Σ̄−1
= Σ̄t|t ,
t|t−1 + Ct Vt Ct )
t|t−1 + Ct Vt Ct )
since Lemma 1 and the condition Σt|t−1 Σ̄t|t−1 imply
−1
T −1
T −1
Σ−1
t|t−1 + Ct Vt Ct Σ̄t|t−1 + Ct Vt Ct , which in turn
−1
T −1
−1
T −1
−1
implies (Σt|t−1 + Ct Vt Ct )
(Σ̄−1
t|t−1 + Ct Vt Ct ) .
Corollary 1. Let Σt|t be defined as in eq. (16) with boundary
condition the Σ1|0 ; similarly, let Σ̄t|t be defined as in eq. (16)
with boundary condition the Σ̄1|0 . If Σt|t Σ̄t|t , then
Σt+i|t+i Σ̄t+i|t+i for any positive integer i.
Proof of Corollary 1: If Σt|t Σ̄t|t , from Lemma 7,
we get Σt+1|t Σ̄t+1|t , which, from Lemma 8, implies
Σt+1|t+1 Σ̄t+1|t+1 . By repeating the previous argument
another (i − 1) times, the proof is complete.
Corollary 2. Let Σt|t be defined as in eq. (16) with boundary
condition the Σ1|0 ; similarly, let Σ̄t|t be defined as in eq. (16)
with boundary condition the Σ̄1|0 . If Σt|t Σ̄t|t , then
Σt+i|t+i−1 Σ̄t+i|t+i−1 for any positive integer i.
Proof of Corollary 2: If Σt|t Σ̄t|t , from Corollary 1,
we get Σt+i−1|t+i−1 Σ̄t+i−1|t+i−1 , which, from Lemma 7,
implies Σt+i|t+i−1 Σ̄t+i|t+i−1 .
A PPENDIX B: P ROOF
OF
T HEOREM 1
The proof of Theorem 1 follows from the following lemma.
Lemma 9. For any active sensor set S ⊆ V, and admissible
control policies u1:T (S) , {u1 (S), u2 (S), . . . , uT (S)}, let
h[S, u1:T (S)] be Problem 1’s cost function, i.e.,
PT
h[S, u1:T (S)] , t=1 E(kxt+1 (S)k2Qt +kut (S)k2Rt );
Further define the following set-valued function:
g(S) , minu1:T (S) h[S, u1:T (S)],
Consider any sensor set S ⊆ V, and let u⋆1:T,S be the vector of control policies (K1 x̂1,S , K2 x̂2,S , . . . , KT x̂T,S ). Then
u⋆1:T,S is an optimal control policy:
u⋆1:T,S ∈ arg min h[S, u1:T (S)],
(18)
u1:T (S)
i.e., g(S) = h[S, u⋆1:T (S)], and in particular, u⋆1:T,S attains a
(sensor-dependent) LQG cost equal to:
g(S) = E(kx1 kN1 )+
T
X
tr[Θt Σt|t (S)] + tr (Wt St ) . (19)
t=1
Proof of Lemma 9: Let ht [S, ut:T (S)] be the LQG cost
in Problem 1 from time t up to time T , i.e.,
ht [S, ut:T (S)] ,
T
X
E(kxk+1 (S)k2Qt +kuk (S)k2Rt ).
k=t
and define gt (S) , minut:T (S) ht [S, ut:T (S)]. Clearly, g1 (S)
matches the LQG cost in eq. (19).
We complete the proof inductively. In particular, we first
prove Lemma 9 for t = T , and then for any other t ∈
{1, 2, . . . , T − 1}. To this end, we use the following observation: given any sensor set S, and any time t ∈ {1, 2, . . . , T },
gt (S) = min E(kxt+1 (S)k2Qt +kut (S)k2Rt ) + gt+1 (S) ,
ut (S)
(20)
with boundary condition the gT +1 (S) = 0. In particular,
eq. (20) holds since
gt (S) = min E kxt+1 (S)k2Qt +kut (S)k2Rt )+
ut (S)
min
ut+1:T (S)
ht+1 [S, ut+1:T (S)]} ,
where one can easily recognize the second summand to match
the definition of gt+1 (S).
We prove Lemma 9 for t = T . From eq. (20), for t = T ,
gT (S) = minuT (S) E(kxT +1 (S)k2QT +kuT (S)k2RT )
2
= minuT (S) E(kA
T xT + BT uT (S) + wT kQT +
2
kuT (S)kRT ) ,
(21)
since xT +1 (S) = AT xT + BT uT (S) + wT , as per eq. (1);
we note that for notational simplicity we drop henceforth the
dependency of xT on S since xT is independent of uT (S),
which is the variable under optimization in the optimization
problem in (21). Developing eq. (21) we get:
gT (S)
= minuT (S) E(uT (S)T BTT QT BT uT (S) + wTT QT wT +
T
T T
xT
T AT QT AT xT + 2xT AT QT BT uT (S)+
T T
2xT AT QT wT + 2uT (S)T BTT QT wT + kuT (S)k2RT )
= minuT (S) E(uT (S)T BTT QT BT uT (S) + kwT k2QT +
2
T T
T
xT
T AT QT AT xT + 2xT AT QT BT uT (S) + kuT kRT ) ,
(22)
where the latter equality holds since wT has zero mean
and wT , xT , and uT (S) are independent. From eq. (22),
rearranging the terms, and using the notation in eq. (8),
gT (S)
= minuT (S) E(uT (S)T (BTT QT BT + RT )uT (S)+
T T
T
kwT k2QT +xT
T AT QT AT xT + 2xT AT QT BT uT (S)
T
= minuT (S) E(kuT (S)k2MT +kwT k2QT +xT
T AT QT AT xT +
T T
2xT AT QT BT uT (S)
T
= minuT (S) E(kuT (S)k2MT +kwT k2QT +xT
T AT QT AT xT −
−1
T
T
2xT (−AT QT BT MT )MT uT (S)
2
2
T T
= minuT (S) E(kuT (S)k
MT +kwT kQT +xT AT QT AT xT −
T
T
2xT KT M
T uT (S)
= minuT (S) E(kuT (S) − KT xT k2MT +kwT k2QT +
T
T
xT
T (AT QT AT − KT MT KT )xT
= minuT (S) E(kuT (S) − KT xT k2MT +kwT k2QT +
T
xT
T (AT QT AT − ΘT )xT
= minuT (S) E(kuT (S) − KT xT k2MT +kwT k2QT +kxT k2NT
= minuT (S) E(kuT (S) − KT xT k2MT ) + tr (WT QT ) +
E(kxT k2NT ),
(23)
2
)
=
where
the
latter
equality
holds
since
E(kw
k
T QT
T
T
E tr wT QT wT = tr E(wT wT )QT = tr (WT QT ). Now
we note that
min E(kuT (S) − KT xT k2MT )
uT (S)
= E(kKT x̂T (S) − KT xT k2MT )
= tr ΘT ΣT |T (S) ,
(24)
since x̂T (S) is the Kalman estimator of the state xT , i.e.,
the minimum mean square estimator of xT , which implies
that KT x̂T (S) is the minimum mean square estimator of
KT xT (S) [19, Appendix E]. Substituting (24) back into
eq. (23), we get:
gT (S) = E(kxT k2NT ) + tr ΘT ΣT |T (S) + tr (WT QT ) ,
which proves that Lemma 9 holds for t = T .
We now prove that if Lemma 9 holds for t = l + 1, it
also holds for t = l. To this end, assume eq. (20) holds for
t = l + 1. Using the notation in eq. (8),
gl (S) = minul (S) E(kxl+1 (S)k2Ql +kul (S)k2Rl ) + gl+1 (S)
= minul (S) E(kxl+1 (S)k2Ql +kul (S)k2Rl )+
P
E(kxl+1 (S)k2Nl+1 ) + Tk=l+1 tr Θk Σk|k (S) +
tr (Wk Sk )]}
= minul (S) E(kxl+1 (S)k2Sl +kul (S)k2Rl )+
o
PT
k=l+1 [tr Θk Σk|k (S) + tr (Wk Sk )]
PT
= k=l+1 [tr Θk Σk|k (S) + tr (Wk Sk )]+
minul (S) E(kxl+1 (S)k2Sl +kul (S)k2Rl ).
(25)
In eq. (25), for the last summand in the last right-hand-side,
by following the same steps as for the proof of Lemma 9 for
t = T , we have:
2
minul (S) E(kxl+1 (S)k2Sl +ku
l (S)kRl ) =
E(kxl k2Nl ) + tr Θl Σl|l (S) + tr (Wl Ql ) ,
(26)
and ul (S) = Kl x̂l (S). Therefore, by substituting eq. (26) back
to eq. (25), we get:
PT
gl (S) = E(kxl k2Nl ) + k=l [tr Θk Σk|k (S) + tr (Wk Sk )].
(27)
which proves that if Lemma 9 holds for t = l +1, it also holds
for t = l. By induction, this also proves that Lemma 9 holds
for l = 1, and we already observed that g1 (S) matches the
original LQG cost in eq. (19), hence concluding the proof.
Proof of Theorem 1: The proof easily follows from
Lemma 9. Eq. (6) is a direct consequence
eq. (19), since
Pof
T
and
both E(xT
N
x
)
=
tr
Σ
N
1|1 1
1 1 1
t=1 tr (Wt St ) are
independent of the choice of the sensor set S. Second, (7)
directly follows from eq. (18).
A PPENDIX C: P ROOF
OF
T HEOREM 2
The following result is used in the proof of Theorem 2.
Proposition 2 (Monotonicity of cost function in eq. (6)).
Consider the cost function in eq.P
(6), namely, for any
sensor
T
set S ⊆ V the set function
tr
Θ
Σ
(S)
. Then,
t t|t
t=1
for
any
sensor
sets
such
that
S
⊆
S
⊆
V,
it
holds
1
2
PT
PT
tr
Θ
Σ
(S
)
≥
tr
Θ
Σ
(S
)
.
t
1
t
2
t|t
t|t
t=1
t=1
Proof: Lemma 6 implies Σ1|1 (S1 ) Σ1|1 (S2 ), and
then, Corollary 1 implies Σt|t (S1 ) Σt|t (S2 ). Finally, for
any t = 1, 2,. . . , T , Lemma 4 implies tr Θt Σt|t (S1 ) ≥
tr Θt Σt|t (S2 ) , since each Θt is symmetric.
Proof of part (1) of Theorem 2 (Algorithm 2’s approximation quality): Using Proposition 2, and the supermodularity
ratio Definition 4, the proof of the upper bound exp(−γg )
in ineq. (12) follows the same steps as the proof of [26,
Theorem 1].
Proof of part (2) of Theorem 2 (Algorithm 1’s running
time): We compute Algorithm 1’s running time by adding the
running times of Algorithm 1’s lines 1 and 2:
a) Running time of Algorithm 1’s line 1: Algorithm 1’s
line 1 needs O(k|V|T n2.4 ) time. In particular, Algorithm 1’s
line 2 running time is the running time of Algorithm 2, whose
running time we show next to be O(k|V|T n2.4 ). To this end,
we first compute the running time of Algorithm 2’s line 1,
and then the running time of Algorithm 2’s lines 3–15. Algorithm 2’s line 1 needs O(n2.4 ) time, using the Coppersmith
algorithm for both matrix inversion and multiplication [27].
Then, Algorithm 2’s lines 3–15 are repeated k times, due to the
“while loop” between lines 3 and 15. We now need to find the
running time of Algorithm 2’s lines 4–14; to this end, we first
find the running time of Algorithm 2’s lines 4–12, and then the
running time of Algorithm 2’s lines 13 and 14. In more detail,
the running time of Algorithm 2’s lines 4–12 is O(|V|T n2.4 ),
since Algorithm 2’s lines 5–11 are repeated at most |V|
times and Algorithm 2’s lines 6–10, as well as line 11 need
O(T n2.4 ) time, using the Coppersmith-Winograd algorithm
for both matrix inversion and multiplication [27]. Moreover,
Algorithm 2’s lines 13 and 14 need O[|V|log(|V|)] time, since
line 13 asks for the minimum among at most |V| values of the
cost(·) , which takes O[|V|log(|V|)] time to be found, using,
e.g., the merge sort algorithm. In sum, Algorithm 2’s running
time is O[n2.4 + k|V|T n2.4 + k|V|log(|V|)] = O(k|V|T n2.4 ).
b) Running time of Algorithm 1’s line 2: Algorithm 1’s
line 2 needs O(n2.4 ) time, using the Coppersmith algorithm
for both matrix inversion and multiplication [27].
In sum, Algorithm 1’s running time is O(k|V|T n2.4 +
2.4
n ) = O(k|V|T n2.4 ).
A PPENDIX D: P ROOF
OF
T HEOREM 3
Proof of Theorem 3: We complete the proof by first
deriving a lower bound for the numerator of the supermodularity ratio γg , and then, by deriving an upper bound for the
denominator of the supermodularity ratio γg .
use the following notation: c , E(xT
1 N1 x1 ) +
PWe
T
⊆
V,
and time
t=1 tr (Wt St ), and for any sensor set S
t = 1, 2, . . . , T , ft (S) , tr Θt Σt|t (S) . Then, the cost
P
function g(S) in eq. (11) is written as g(S) = c+ Tt=1 ft (S),
due to eq. (19) in Lemma 9.
a) Lower bound for the numerator of the supermodularity ratio γg : Per the supermodularity ratio Definition 4, the
numerator of the submodularity ratio γg is of the form
T
X
[ft (S) − ft (S ∪ {v})],
(28)
t=1
for some sensor set S ⊆ V, and sensor v ∈ V; to lower bound
the sum in (28), we lower bound each ft (S) − ft (S ∪ {v}).
To this end, from eq. (16) in Lemma 5, observe
X
T
C̄i,t
C̄i,t ]−1.
Σt|t (S ∪ {v}) = [Σ−1
t|t−1 (S ∪ {v}) +
i∈S∪{v}
PT
T
=
Define Ωt = Σ−1
i∈S C̄i,t C̄i,t , and Ω̄t
t|t−1 (S) +
P
T
−1
T
Σt|t−1 (S ∪{v})+ i∈S C̄i,t C̄i,t ; using the Woodbury identity
Lemmata 4 and 2,
in Lemma 3,
ft (S ∪ {v}) =
tr
−
tr Θt Ω̄−1
t
−1 T
Θt Ω̄t C̄v,t (I
g(S) − g(S ∪ {v}) ≥ l
T −1
.
) C̄v,t Ω̄−1
+ C̄v,t Ω̄t−1 C̄v,t
t
≥l
T
X
= ltr Φ
−1 T −1
T
C̄v,t Ω̄t−1 ≥
tr Θt Ω̄−1
t C̄v,t (I + C̄v,t Ω̄t C̄v,t )
−1 T −1
T
C̄v,t Ω̄t−1 ,
tr Θt Ω̄−1
t C̄v,t (I + C̄v,t Ω̄t C̄v,t )
≥ lλmin
≥ tr Θt Ω̄−1
where ineq. (29) holds because tr Θt Ω−1
t .
t
≥ tr Θt Ω̄t−1
In particular, the inequality tr Θt Ω−1
t
is implied as follows: Lemma 6 implies Σ1|1 (S)
Σ1|1 (S ∪ {u}). Then, Corollary 2 implies Σt|t−1 (S)
Σt|t−1 (S ∪ {v}), and as a result, Lemma 1 implies
Σt|t−1 (S)−1 Σt|t−1 (S ∪ {u})−1. Now, Σt|t−1 (S)−1
Σt|t−1 (S ∪ {u})−1 and the definition of Ωt and of Ω̄t
imply Ωt Ω̄t . Next, Lemma 1 implies Ωt−1 Ω̄−1
t .
As a result, since also Θt is a symmetric
matrix,
Lem
ma 4 gives the desired inequality tr Θt Ω−1
≥ tr Θt Ω̄−1
.
t
t
Continuing from the ineq. (29),
ft (S) − ft (S ∪ {v}) ≥
−1 T −1
−1 T
≥
tr C̄v,t Ω̄−1
t Θt Ω̄t C̄v,t (I + C̄v,t Ω̄t C̄v,t )
−1 T
T −1
)tr C̄v,t Ω̄−1
λmin ((I + C̄v,t Ω̄−1
t Θt Ω̄t C̄v,t , (30)
t C̄v,t )
where ineq. (30) holds due to Lemma 2. From ineq. (30),
−1 T
−1
T
≥ λ−1
max (I + C̄v,t Σt|t (∅)C̄v,t )tr C̄v,t Ω̄t Θt Ω̄t C̄v,t
T
X
Θt
t=1
T
X
t=1
(29)
−1
−1 T
T
,
= λ−1
max (I + C̄v,t Σt|t (∅)C̄v,t )tr Θt Ω̄t C̄v,t C̄v,t Ω̄t
(31)
where we used Ω̄−1
Σt|t (∅), which holds because of the
t
−1
following: the definition of Ω̄t implies Ω̄t Σt|t−1
(S ∪ {v}),
−1
and as a result, from Lemma 1 we get Ω̄t Σt|t−1 (S ∪{v}).
In addition, Corollary 2 and the fact that Σ1|1 (S ∪ {v})
Σ1|1 (∅), which holds due to Lemma 6, imply Σt|t−1 (S ∪
{v}) Σt|t−1 (∅). Finally, from eq. (16) in Lemma 5 it is
Σt|t−1 (∅) = Σt|t (∅). Overall, the desired inequality Ω̄−1
t
Σt|t (∅) holds.
Consider a time t′ ∈ {1, 2 . . . , T } such that for any time
−1
−1
−1 T
T
t ∈ {1, 2, . . . , T } it is Ω̄−1
t′ C̄v,t′ C̄v,t′ Ω̄t′ Ω̄t C̄v,t C̄v,t Ω̄t ,
−1 T
−1
and let Φ be the matrix Ω̄t′ C̄v,t′ C̄v,t′ Ω̄t′ ; similarly, let l be
T
the mint∈{1,2...,T },u∈V λ−1
max (I + C̄v,t Σt|t (∅)C̄v,t ). Summing
ineq. (31) across all times t ∈ {1, 2 . . . , T }, and using
tr (Θt Φ)
t=1
ft (S) − ft (S ∪ {v}) =
+
− tr Θt Ω̄−1
tr Θt Ω−1
t
t
−1 T
−1
−1 T
= λ−1
max (I + C̄v,t Ω̄t C̄v,t )tr C̄v,t Ω̄t Θt Ω̄t C̄v,t
−1
T
tr Θt Ω̄−1
t C̄v,t C̄v,t Ω̄t
t=1
Therefore, for any time t ∈ {1, 2 . . . , T },
ft (S) − ft (S ∪ {v}) ≥
T
X
!
Θt
!
tr (Φ)
> 0,
PT
which is non-zero because t=1 Θt ≻ 0 and Φ is a non-zero
positive semi-definite matrix.
Finally, we lower bound tr (Φ), using Lemma 2:
−1
T
tr (Φ) = tr Ω̄−1
t′ C̄v,t′ C̄v,t′ Ω̄t′
T
= tr Ω̄−2
t′ C̄v,t′ C̄v,t′
T
≥ λmin (Ω̄−2
t′ )tr C̄v,t′ C̄v,t′
T
= λ2min (Ω̄−1
t′ )tr C̄v,t′ C̄v,t′
T
(32)
≥ λ2min (Σt′ |t′ (V))tr C̄v,t
′ C̄v,t′ ,
where ineq. (32) holds because Ω̄−1
t′ Σt′ |t′ (V). In particular,
′
′
the inequality Ω̄−1
Σ
(S
∪
{v}) is derived by applying
t |t
t′
T
T
′
= Σ−1
C̄v,t
Lemma 1 to the inequality Ω̄t Ω̄t′ + C̄v,t
t′ |t′ (S ∪
{v}), where the equality holds by the definition of Ω̄t′ . In addition, due to Lemma 6 it is Σ1|1 (S ∪ {v}) Σ1|1 (V), and as
a result, from Corollary 1 it also is Σt′ |t′ (S ∪{v}) Σt′ |t′ (V).
Overall, the desired inequality Ω̄−1
t′ Σt′ |t′ (V) holds.
b) Upper bound for the denominator of the supermodularity ratio γg : The denominator of the submodularity ratio γg
is of the form
T
X
[ft (S ′ ) − ft (S ′ ∪ {v})],
t=1
for some sensor set S ′ ⊆ V, and sensor v ∈ V; to upper bound
it, from eq. (16) in Lemma 5 of Appendix A, observe
X
T
′
C̄i,t
C̄i,t ]−1,
Σt|t (S ′ ∪ {v}) = [Σ−1
t|t−1 (S ∪ {v}) +
i∈S ′ ∪{v}
PT
′
T
and let Ht = Σ−1
i∈S ′ C̄i,t C̄i,t , and H̄t =
t|t−1 (S ) +
P
T
T
′
Σ−1
i∈S ′ C̄i,t C̄i,t ; using the Woodbury ident|t−1 (S ∪ {v}) +
tity in Lemma 3,
ft (S ′ ∪ {v}) = tr Θt H̄t−1 −
T −1
T
) C̄v,t H̄t−1 .
(I + C̄v,t H̄t−1 C̄v,t
tr Θt H̄t−1 C̄v,t
Therefore,
T
X
t=1
T
X
t=1
[ft (S ′ ) − ft (S ′ ∪ {v})] =
[tr Θt Ht−1 − tr Θt H̄t−1 +
T
T −1
tr Θt H̄t−1 C̄v,t
(I + C̄v,t H̄t−1 C̄v,t
) C̄v,t H̄t−1 ] ≤
T
X
[tr Θt Ht−1 +
t=1
T −1
T
) C̄v,t H̄t−1 ],
(I + C̄v,t H̄t−1 C̄v,t
tr Θt H̄t−1 C̄v,t
(33)
where ineq. (33) holds since tr Θt H̄t−1 is non-negative. In
eq. (33), the second term in the sum is upper bounded as
follows, using Lemma 2:
T −1
T
) C̄v,t H̄t−1 =
(I + C̄v,t H̄t−1 C̄v,t
tr Θt H̄t−1 C̄v,t
T −1
T
≤
)
(I + C̄v,t H̄t−1 C̄v,t
tr C̄v,t H̄t−1 Θt H̄t−1 C̄v,t
−1 T −1
−1 T
−1
tr C̄v,t H̄t Θt H̄t C̄v,t λmax [(I + C̄v,t H̄t C̄v,t ) ] =
−1
T
T
)≤
λmin (I + C̄v,t H̄t−1 C̄v,t
tr C̄v,t H̄t−1 Θt H̄t−1 C̄v,t
−1
−1 T
−1
T
), (34)
tr C̄v,t H̄t Θt H̄t C̄v,t λmin (I + C̄v,t Σt|t (V)C̄v,t
T
T
since λmin (I + C̄v,t H̄t−1 C̄v,t
) ≥ λmin (I + C̄v,t Σt|t (V)C̄v,t
),
−1
−1
because H̄t Σt|t (V). In particular, the inequality H̄t
T
Σt|t (V) is derived as follows: first, it is H̄t H̄t + C̄v,t
C̄v,t =
′
−1
Σt|t (S ∪ {v}) , where the equality holds by the definition of
H̄t , and now Lemma 1 implies H̄t−1 Σt|t (S ′ ∪ {v}). In addition, Σt|t (S ′ ∪ {v}) Σt|t (V) is implied from Corollary 1,
since Lemma 6 implies Σ1|1 (S ′ ∪ {v}) Σ1|1 (V). Overall,
the desired inequality H̄t−1 Σt|t (V) holds.
T
Let l′ = maxt∈{1,2...,T },v∈V λ−1
min (I + C̄v,t Σt|t (V)C̄v,t ).
From ineqs. (33) and (34),
PT
[ft (S ′ ) − ft (S ′ ∪ {v})] ≤
Pt=1
(35)
T
−1
T
C̄v,t H̄t−1 ].
+ l′ tr Θt H̄t−1 C̄v,t
t=1 [tr Θt Ht
Consider times t′ ∈ {1, 2 . . . , T } and t′′ ∈ {1, 2 . . . , T } such
that for any time t ∈ {1, 2, . . . , T }, it is Ht−1
Ht−1 and
′
−1 T
−1
−1
−1 T
H̄t′′ C̄v,t′′ C̄v,t′′ H̄t′′ H̄t C̄v,t C̄v,t H̄t , and let Ξ = Ht−1
′
−1
T
and Φ′ = H̄t−1
′ C̄v,t′ C̄v,t′ H̄t′ . From ineq. (35), and Lemma 4,
T
X
[ft (S ′ ) − ft (S ′ ∪ {v})] ≤
t=1
T
X
[tr (Θt Ξ) + l′ tr (Θt Φ′ )] ≤
t=1
tr Ξ
T
X
Θt
t=1
!
′
+ l tr Φ
′
T
X
t=1
T
X
(tr (Ξ) + l′ tr (Φ′ ))λmax (
Θt
!
≤
Θt ).
(36)
t=1
Finally, we upper bound tr (Ξ)+l′ tr (Φ′ ) in ineq. (36), using
Lemma 2:
tr (Ξ) + l′ tr (Φ′ ) ≤
tr Ht−1
+
′
l′ λ2max (H̄t−1
′′ )tr
tr Σt′ |t′ (∅) +
T
≤
C̄v,t
′′ C̄v,t′′
′ 2
l λmax (Σt′′ |t′′ (∅))tr
(37)
T
C̄v,t
′′ C̄v,t′′ ,
(38)
where ineq. (38) holds because Ht−1
Σt′ |t′ (∅), and simi′
larly, H̄t−1
Σt′′ |t′′ (∅). In particular, the inequality Ht−1
′′
′
Σt′ |t′ (∅) is implied as follows: first, by the definition of Ht′ ,
it is Ht−1
= Σt′ |t′ (S ′ ); and finally, Corollary 1 and the fact
′
that Σ1|1 (S ′ ) Σ1|1 (∅), which holds due to Lemma 6, imply
Σt′ |t′ (S ′ ) Σt′ |t′ (∅). In addition, the inequality H̄t−1
′′
Σt′′ |t′′ (∅) is implied as follows: first, by the definition of H̄t′′ ,
′
it is H̄t′′ Σ−1
t′′ |t′′ −1 (S ∪ {v}), and as a result, Lemma 1
−1
implies H̄t′′ Σt′′ |t′′ −1 (S ′ ∪ {v}). Moreover, Corollary 2
and the fact that Σ1|1 (S ∪ {v}) Σ1|1 (∅), which holds due to
Lemma 6, imply Σt′′ |t′′ −1 (S ′ ∪ {v}) Σt′′ |t′′ −1 (∅). Finally,
from eq. (16) in Lemma 5 it is Σt′′ |t′′ −1 (∅) = Σt′′ |t′′ (∅).
Overall, the desired inequality H̄t−1
′′ Σt′′ |t′′ (∅) holds.
A PPENDIX E: P ROOF
OF
T HEOREM 4
For the proof of Theorem 4, we use Proposition 1, which
we prove in Appendix E, and Lemmata 10, 11, and 12 below.
Lemma 10. For any t = 1, 2, . . . , T ,
Θt = AT
t St At + Qt−1 − St−1 .
Proof of Lemma 10: Using the Woobury identity in
Lemma 3, and the notation in eq. (8),
−1
+ Bt Rt−1 BtT )−1 At
Nt = AT
t (St
−1 T
= AT
t (St − St Bt Mt Bt St )At
= AT
t St At − Θt .
The latter, gives Θt = AT
t St At −Nt . In addition, from eq. (8),
−Nt = Qt−1 − St−1 , since St = Qt + Nt+1 .
PT
T
T
Lemma 11. t=1 AT
1 A2 · · · At Qt At At−1 · · · A1 ≻ N1 if
and only if
T
X
T
T
AT
1 A2 · · · At−1 Θt At−1 At−2 · · · A1 ≻ 0.
t=1
Proof of Lemma 11: For i = t − 1, t − 2, . . . , 1, we preand post-multiply the identity in Lemma 10 with AT
i and Ai ,
respectively:
Θt = AT
t St At + Qt−1 − St−1 ⇒
T
T
T
AT
t−1 Θt At−1 = At−1 At St At At−1 + At−1 Qt−1 At−1 −
T
At−1 St−1 At−1 ⇒
T
T
T
AT
t−1 Θt At−1 = At−1 At St At At−1 + At−1 Qt−1 At−1 −
Θt−1 + Qt−2 − St−2 ⇒
T
T
Θt−1 + AT
t−1 Θt At−1 = At−1 At St At At−1 +
T
At−1 Qt−1 At−1 + Qt−2 − St−2 ⇒
... ⇒
T
T
Θ2 + AT
2 Θ3 A2 + . . . + A2 · · · At−1 Θt At−1 · · · A2 =
T
T
T
A2 · · · At St At · · · A2 + A2 · · · AT
t−1 Qt−1 At−1 · · · A2 +
. . . + AT
2 Q2 A2 + Q1 − S1 ⇒
T
T
Θ1 + AT
1 Θ2 A1 + . . . + A1 · · · At−1 Θt At−1 · · · A1 =
T
T
T
A1 · · · At St At · · · A1 + A1 · · · AT
t−1 Qt−1 At−1 · · · A1 +
. . . + AT
Q1 A1 − N1 ⇒
1
PT
AT · · · AT
t−1 Θt At−1 · · · A1 =
t=1
PT1
T
T
A
·
t=1 1 · · At Qt At · · · A1 − N1 .
(39)
The last equality in eq. (39) implies Lemma 11.
A PPENDIX F: P ROOF
Lemma 12.
for any t = 1, 2, . . . , T that At is
PConsider
T
T T
T
invertible.
A
A
t=1 1 2 · · · At−1 Θt At−1 At−2 · · · A1 ≻ 0 if
and only if
T
X
Θt ≻ 0.
t=1
Proof of Lemma 12: Let Ut = At−1 At−2 · · · A1 .
We Pfirst prove that for any non-zero vector z, if
T
T T
T
it is
t=1 A1 A2 · · · At−1 Θt At−1 At−2 · · · A1 ≻ 0, then
PT
T
t=1 z Θt z > 0. In particular, since Ut is invertible, —
because for any t ∈ {1, 2, . . . , T }, At is,—
PT
PT
T −⊤ T
T
Ut Θt Ut Ut−1 z
t=1 z Θt z = Pt=1 z Ut
(40)
T
T
= t=1 tr φt φT
t Ut Θ t Ut ,
where we let φt = Ut−1 z. Consider a time t′ such that for any
T
time t ∈ {1, 2 . . . , T }, φt′ φT
t′ φt φt . From eq. (40), using
Lemmata 4 and 2,
T
X
z T Θt z ≥
t=1
T
X
T
tr φt′ φT
t′ Ut Θt Ut
t=1
≥ tr φt′ φT
t′
T
X
UtT Θt Ut
t=1
finally provePthat for any non-zero vector z, if
PWe
T
T
T
T
t=1 Θt ≻ 0, then
t=1 zA1 · · · At−1 Θt At−1 · · · A1 z ≻ 0.
In particular,
tr ξtT Θt ξt ,
(41)
where we let ξt = Ut z. Consider time t′ such that for any
time t ∈ {1, 2 . . . , T }, ξt′ ξtT′ ξt ξtT . From eq. (40), using
Lemmata 4 and 2,
!
T
T
X
X
T
T
tr ξt Θt ξt ≥ tr ξt′ ξt′
Θt
t=1
t=1
T
X
Θt )
≥ tr ξt′ ξt′ λmin (
T
t=1
T
X
= kξt′ k22 λmin (
t=1
Σt|t =Wt =0
= xT
1 N1 x1 ,
(42)
since E(kx1 k2N1 ) = xT
N
x
,
because
x
is
known
(Σ
=
0),
1
1
1
1|1
1
and Σt|t and Wt are zero. In addition, for u1:T = (0, 0, . . . , 0),
the objective function in the noiseless perfect state information
LQG problem in eq. (14) is
PT
2
2
t=1 [kxt+1 kQt +kut (xt )kRt ] Σt|t =Wt =0
PT
(43)
= t=1 xT
Qx
PT t+1 T t Tt+1 T
T
= x1 t=1 A1 A2 · · · At Qt At At−1 · · · A1 x1 ,
since xt+1 = At xt = At At−1 xt−1 = . . . = At At−1 · · · A1 x1
when all u1 , u2 , . . . , uT are zero.
From eqs. (42) and (43), the inequality
T
X
T
X
t=1
t=1
t=1
[kxt+1 k2Qt +kut (xt )k2Rt ]
N1 ≺
> 0.
t=1
u1:T
T
X
T
T
AT
1 A2 · · · At Qt At At−1 · · · A1 x1
holds for any non-zero x1 if and only if
t=1
T
X
P ROPOSITION 1
t=1
!
T
X
UtT Θt Ut )
= kφt′ k22 λmin (
z T UtT Θt Ut z =
min
T
xT
1 N1 x1 < x1
T
X
UtT Θt Ut )
≥ tr φt′ φT
t′ λmin (
T
X
OF
Proof of Proposition 1: For any initial condition x1 ,
eq. (19) in Lemma 9 implies for the noiseless perfect state
information LQG problem in eq. (14):
Θt )
t=1
> 0.
Proof of Theorem 4: Theorem 4 follows from the sequential application of Proposition 1 and Lemmata 11, and 12.
T
AT
1 · · · At Qt At At−1 · · · A1 .
| 3cs.SY
|
ADEQUATE SUBGROUPS AND INDECOMPOSABLE MODULES
arXiv:1405.0043v3 [math.RT] 6 Mar 2017
ROBERT GURALNICK, FLORIAN HERZIG, AND PHAM HUU TIEP
Abstract. The notion of adequate subgroups was introduced by Jack Thorne [59]. It
is a weakening of the notion of big subgroups used by Wiles and Taylor in proving automorphy lifting theorems for certain Galois representations. Using this idea, Thorne was
able to strengthen many automorphy lifting theorems. It was shown in [22] and [23] that
if the dimension is smaller than the characteristic then almost all absolutely irreducible
representations are adequate. We extend the results by considering all absolutely irreducible modules in characteristic p of dimension p. This relies on a modified definition
of adequacy, provided by Thorne in [60], which allows p to divide the dimension of the
module. We prove adequacy for almost all irreducible representations of SL2 (pa ) in the
natural characteristic and for finite groups of Lie type as long as the field of definition
is sufficiently large. We also essentially classify indecomposable modules in characteristic p of dimension less than 2p − 2 and answer a question of Serre concerning complete
reducibility of subgroups in classical groups of low dimension.
Contents
1. Introduction
2. Linear groups of low degree
3. Extensions and self-extensions
4. Finite groups with indecomposable modules of dimension ≤ 2p − 2
5. Bounding Ext1G (V, V ) and Ext1G (V, V ∗ )
6. Modules of dimension p
6.1. Imprimitive case
6.2. Chevalley groups in characteristic p
6.3. Remaining cases
7. Certain PIMs for simple groups
7.1. The case H = PSLn (q) with p = (q n − 1)/(q − 1) and n ≥ 2
7.2. The case H = PSUn (q) with p = (q n + 1)/(q + 1), n ≥ 3, (n, q) 6= (3, 2)
2
7
11
15
20
28
29
30
31
38
38
39
Date: March 7, 2017.
2010 Mathematics Subject Classification. Primary 20C20; Secondary 11F80.
Key words and phrases. Artin-Wedderburn theorem, irreducible representations, automorphic representations, Galois representations, adequate representations, complete reducibility, indecomposable module.
The first author was partially supported by NSF grants DMS-1001962, DMS-1302886 and the Simons
Foundation Fellowship 224965. He also thanks the Institute for Advanced Study for its support. The second
author was partially supported by a Sloan Fellowship and an NSERC grant. The third author was partially
supported by the NSF grant DMS-1201374 and the Simons Foundation Fellowship 305247.
We thank Barry Mazur and Jack Thorne for thoughtful discussion of various questions considered in the
paper, and Frank Lübeck and Klaus Lux for help with several computations. We also thank the referee for
careful reading of the paper.
1
2
R. GURALNICK, F. HERZIG, AND P. TIEP
7.3. The case H = SL2 (q) and p = q − 1 ≥ 3
7.4. The case H = Ap with p ≥ 7
8. Indecomposable modules of dimension less than 2p − 2
9. Adequacy for SL2 (q)
10. Adequacy for SLn (q)
11. Asymptotic adequacy
References
40
40
40
48
51
52
55
1. Introduction
Throughout the paper, let k be a field of characteristic p and let V be a finite dimensional
vector space over k. Let ρ : G → GL(V ) be an absolutely irreducible representation. Thorne
[59] called (G, V ) is adequate if the following conditions hold (we rephrase the conditions
slightly by combining two of the properties into one):
(i) p does not divide dim V ;
(ii) Ext1G (V, V ) = 0; and
(iii) End(V ) is spanned by the elements ρ(g) with ρ(g) semisimple.
If G is a finite group of order prime to p, then it is well known that (G, V ) is adequate.
In this case, condition (iii) is often referred to as Burnside’s Lemma, and it is a trivial
consequence of the Artin-Wedderburn Theorem. Furthermore, if G is a connected algebraic
group over k and V is a faithful, absolutely irreducible rational G-module of dimension
coprime to p, then (G, V ) is adequate (cf. [21, Theorem 1.2] and Theorem 11.5).
These conditions are a weakening of the conditions used by Wiles and Taylor in studying the automorphic lifts of certain Galois representations. See [9] for some applications.
Thorne [59] generalized various results assuming the weaker hypotheses for p odd. We
refer the reader to [59] for more references and details. See also [12] for further applications. Recently Thorne [60, Corollary 7.3] has shown that one can relax the condition that
p ∤ (dim V ), still with p odd. So more generally, we say that an absolutely irreducible
representation ρ : G → GL(V ) is adequate if:
(i) H 1 (G, k) = 0;
(ii) H 1 (G, (V ∗ ⊗ V )/k) = 0;
(iii) End(V ) is spanned by the elements ρ(g) with ρ(g) semisimple.
Note that we allow the case p = 2 in the definition. Thorne has used this extended notion
of adequacy to prove an automorphy lifting theorem for 2-adic Galois representations of
unitary type over imaginary CM fields, see [60, Theorem 5.1].
Observe that if p ∤ (dim V ), k is a direct summand of V ∗ ⊗ V . Thus, Ext1G (V, V ) = 0
implies that H 1 (G, k) = 0 in this case. Also note that, by the long exact sequence in
cohomology, if H 2 (G, k) = 0, then H 1 (G, (V ∗ ⊗ V )/k) = 0 follows from Ext1G (V, V ) = 0.
Thus, under the assumption that either p ∤ (dim V ) or H i (G, k) = 0 for i = 1, 2, adequacy
is equivalent to the two conditions:
(i) Ext1G (V, V ) = 0;
(ii) End(V ) is spanned by the elements ρ(g) with ρ(g) semisimple.
ADEQUATE SUBGROUPS AND INDECOMPOSABLE MODULES
3
Following [20], we say that the representation ρ : G → GL(V ), respectively the pair
(G, V ), is weakly adequate if End(V ) is spanned by the elements ρ(g) with ρ(g) semisimple.
It was shown in [22, Theorem 9] that:
Theorem 1.1. Let k be a field of characteristic p and G a finite group. Let V be an
absolutely irreducible faithful kG-module. Let G+ denote the subgroup generated by the pelements of G. If dim W ≤ (p − 3)/2 for an absolutely irreducible kG+ -submodule W of V ,
then (G, V ) is adequate.
The example G = SL2 (p) with V irreducible of dimension (p − 1)/2 shows that the
previous theorem is best possible. However, the counterexamples are rare. In fact, as shown
in [23, Corollary 1.5], if dim V < p − 3, then the (p ± 1)/2-dimensional representations of
SL2 (p) are the only two counterexamples. More precisely, in [23] we extend Theorem 1.1 to
the more general situation that dim W < p and show that almost always (G, V ) is adequate:
Theorem 1.2. Let k be a field of characteristic p and G a finite group. Let V be an
absolutely irreducible faithful kG-module, and let G+ denote the subgroup generated by the
p-elements of G. Suppose that the dimension d of any irreducible kG+ -submodule in V is
less than p. Then the following statements hold.
(i) (G, V ) is weakly adequate.
(ii) Let W be an irreducible kG+ -submodule of V ⊗k k. Then (G, V ) is adequate, unless
the group H < GL(W ) induced by the action of G+ on W is as described in one
of the exceptional cases (a), (b)(i)–(vi) listed in [23, Theorem 1.3]. In particular,
if d < p − 3 and (G, V ) is not adequate, then d = (p ± 1)/2 and H ∼
= SL2 (p) or
PSL2 (p).
Above the threshold p−1 for dim W , there are lots of linear groups that are not adequate.
Still, if dim V = p, the situation is very much under control. In this paper, we extend
adequacy results to the case of linear groups of degree p and generalize the asymptotic
result [21, Theorem 1.2] to disconnected algebraic groups G (with p ∤ [G : G 0 ]) allowing
at the same time that p divides the dimension of the G-module. Next, we show that, in
all cases considered in Theorem 1.2, under some additional mild condition (say, G is not
p-solvable if p is a Fermat prime, and p > 5), one in fact has dim Ext1G (V, V ) ≤ 1 – a
result of interest in the deformation theory. An outgrowth of our results leads us to prove
an analogue of the first author’s result [19] and answer a question of Serre on complete
reducibility of finite subgroups of orthogonal and symplectic groups of small degree. In
fact, we essentially classify indecomposable modules in characteristic p of dimension less
than 2p − 2.
Note that if the kernel of ρ has order prime to p, then there is no harm in passing to
the quotient. So we will generally assume that either ρ is faithful or more generally has
kernel of order prime to p. Also, note that the dimension of cohomology groups and the
dimension of the span of the semisimple elements in G in End(V ) does not change under
extension of scalars. Hence, most of the time we will work over an algebraically closed field
k.
Our main results are the following. First we show that the condition that H 1 (G, k) = 0
in the definition of adequacy is not particularly constraining if dim V is small. In particular,
4
R. GURALNICK, F. HERZIG, AND P. TIEP
the next result follows fairly easily from [19] (see [20, Theorem 4.1]). See Theorem 4.10 for
a slightly more general result.
Theorem 1.3. Let G be a finite irreducible subgroup of GLd (k) with k algebraically closed
of characteristic p. Assume that H 1 (G, k) 6= 0 and d < 2p−2. Then G is solvable, d = p−1,
p or p + 1 and one of the following holds:
(i) d = p − 1, p = 2a + 1 is a Fermat prime, [G : Z(G)O2 (G)] = p and O2 (G) is a
group of symplectic type with O2 (G)/Z(O2 (G)) (elementary) abelian of order 22a ;
(ii) d = p and G has a normal abelian p′ -subgroup of index p;
(iii) d = p + 1, p = 2a − 1 is a Mersenne prime, and G contains a normal abelian
p′ -subgroup N such that G/N is a Frobenius group of order dp with kernel of order
d.
The following curious corollary is immediate from Theorem 4.10. We suspect that there
is a proof of this that does not require the classification of finite simple groups.
Corollary 1.4. Let G be a finite irreducible subgroup of GLd (k) with k algebraically closed
of characteristic p and d < 2p − 2. Suppose that G has a composition factor of order p.
Then G is solvable. Moreover, either d = p, or d = 2a with p = d ± 1 (and so p is either a
Mersenne prime or Fermat prime).
In the situation of Theorem 1.2, Ext1G (V, V ) may be nonzero and so G may fail to be
adequate. Nevertheless, we can prove the following two results, which were motivated
by discussions with Mazur and which are of interest in deformation theory. (Recall [47,
Section 1.2], for instance, that the inequality dim Ext1G (V, V ) ≤ n implies that the universal
deformation ring over the ring O of integers of a sufficiently large finite extension of Qp is
a quotient of O[[x1 , . . . , xn ]]. See also [6, Theorem 2.4].)
Theorem 1.5. Let k be a field of characteristic p and G a finite group. Let V be an
absolutely irreducible faithful kG-module, and let G+ denote the subgroup generated by the
p-elements of G. Suppose that the dimension d of any irreducible kG+ -submodule W in V
is less than p, and let H be the image of G+ in GL(W ).
(i) Suppose the following conditions hold:
(a) If p is a Fermat prime, then G is not p-solvable (equivalently, H is not solvable);
(b) If p = 3, then H ∼
6 SL2 (3a ) for all a ≥ 2;
=
(c) If p = 5 and dimk W = 4, then H 6∼
= Ω+
4 (5).
Then dimk Ext1G (V, V ) ≤ 1 and dimk Ext1G (V, V ∗ ) ≤ 1. In particular, H 1 (G, Sym2 (V )) and
H 1 (G, ∧2 (V )) are both at most 1-dimensional.
a
(ii) In the exceptional cases (p, dimk W, H) = (5, 4, Ω+
4 (5)) or (p, H) = (3, SL2 (3 )) with
1
1
∗
a ≥ 2, ExtG (V, V ) and ExtG (V, V ) are at most 2-dimensional.
Note that one cannot remove the conditions (a)–(c) in Theorem 1.5(i). In fact, in the
case G is p-solvable of Theorem 1.5, Ext1G (V, V ) and Ext1G (V, V ∗ ) can be of arbitrarily large
dimension. See Example 5.9. On the other hand, if dimk W < (p − 1)/2 in Theorem 1.5,
then H 1 (G, Sym2 (V )) = H 1 (G, ∧2 (V )) = 0, see Corollary 5.11.
ADEQUATE SUBGROUPS AND INDECOMPOSABLE MODULES
5
In fact, we can show that both Ext1G (V, V ) and Ext1G (V, V ∗ ) are at most 1-dimensional in
another situation, without any dimension condition, but instead with a condition on Sylow
p-subgroups.
Theorem 1.6. Let k be a field of characteristic p and G a finite group. Let V be an
absolutely irreducible faithful kG-module, and let G+ denote the subgroup generated by the pelements of G. Suppose that the image of G+ in GL(W ) for some irreducible G+ -submodule
W of V has Sylow p-subgroups of order p, and that G has no composition factor of order
p. Then dimk Ext1G (V, V ) ≤ 1 and dimk Ext1G (V, V ∗ ) ≤ 1. In particular, H 1 (G, Sym2 (V ))
and H 1 (G, ∧2 (V )) are both at most 1-dimensional.
Next we determine adequacy of linear groups of degree p:
Theorem 1.7. Let k be a field of characteristic p and G a finite group. Let V be an absolutely irreducible faithful kG-module with dim V = p. Then precisely one of the following
holds:
(i) (G, V ) is adequate;
(ii) G contains a normal abelian subgroup of index p;
(iii) p = 3 and the image of G in PGL(V ) is PSL2 (9).
Extending the results of [23, §3], we prove in Corollary 9.4 that, aside from some exceptions with p = 2, 3 and with (q, dim(V )) = (p, (p ± 1)/2), all nontrivial irreducible
representations of SL2 (q) over Fq are adequate. This and other results on weak adequacy
and on Ext1 , and the dearth of examples where weak adequacy fails suggest that quite a
lot of irreducible representations are indeed weakly adequate. (Currently, all but one counterexample to weak adequacy are induced modules, and the only primitive counterexample
is given in [20].)
Finally, we classify all low dimensional self-dual indecomposable and non-irreducible kGmodules V with k algebraically closed of characteristic p and G a finite subgroup of GL(V )
with Op (G) = 1.
First we recall one of the main results of [19] which settled a conjecture of Serre.
Theorem 1.8. Let k be a field of positive characteristic p. Let G be a subgroup of GLn (k) =
GL(V ) with no nontrivial normal unipotent subgroup and p ≥ n + 2. Then V is completely
reducible.
Serre asked for an analogous result for the other classical groups. The example Ap <
SOp (k) shows that one cannot do too much better. We also see that there are reducible
indecomposable self-dual SL2 (p)-modules of dimensions p and p ± 1 (contained in Sp for
the dimension p − 1 and SO in the other cases). Building on the methods used in computing Ext1 , we can essentially classify the self-dual reducible indecomposable modules of
dimension less than 2p − 2.
Theorem 1.9. Let k be an algebraically closed field of characteristic p. Let V be a vector
space over k with dim V ≤ 2p − 3. Suppose that G is a finite subgroup of GL(V ) such that
Op (G) = 1, and the kG-module V is indecomposable and self-dual but not irreducible. Then
p > 3, G+ is quasisimple, VG+ is uniserial, and one of the following statements holds for
some U ∼
= U ∗ ∈ IBrp (G+ ).
6
R. GURALNICK, F. HERZIG, AND P. TIEP
(i) VG+ = (k|U |k), and (G+ , p, dim U ) is (SL2 (q), q−1, p+1), (Ap , p, p−2), (SLn (q), (q n −
1)/(q − 1), p − 2), (M11 , 11, 9), (M23 , 23, 21), or (PSL2 (p), p, p − 2).
(ii) VG+ = (U |U ). Furthermore, (G+ , p, dim U ) = (SL2 (q), q + 1, p − 2), (2A7 , 7, 4),
(PSL2 (p), p ≡ ǫ(mod 4), (p + ǫ)/2) or (SL2 (p), p ≡ ǫ(mod 4), (p − ǫ)/2) with ǫ =
±1.
Moreover, V supports a non-degenerate G-invariant bilinear form that is either symmetric
or alternating. Furthermore, all such forms have the same type, which is symmetric in all
cases, except when (G+ , p, dim U ) = ((P) SL2 (p), p, (p−1)/2) in which case it is alternating.
Conversely, all the listed cases give rise to reducible self-dual indecomposable modules of
dimension < 2p − 2.
In particular, this gives a classification of all finite non-G-cr subgroups for G = Sp(V ) or
SO(V ) with dim V < 2p − 2, see Proposition 8.8 (recall that the notion of G-cr subgroups
was introduced by Serre in [56]). It also yields the following variant of the main result of
[19]:
Corollary 1.10. Let k be an algebraically closed field of characteristic p and V a vector
space over k with d := dim V ≤ p − 1. Suppose G is a finite subgroup of GL(V ) such that
Op (G) = 1 and the kG-module V is self-dual. Then either the kG-module V is completely
reducible, or d = p − 1, G+ = (P) SL2 (p), and any G-invariant non-degenerate bilinear
form on V must be alternating.
In Theorem 1.9 and Corollary 1.10, the notation (P) SL2 (p) means SL2 (p) if p ≡ 1(mod
4) and PSL2 (p) if p ≡ 3(mod 4).
This paper is organized as follows. In §2, we describe the structure of quasisimple linear
groups of degree at most 2p. We collect various facts concerning extensions and selfextensions of simple modules in §3 and prove Theorem 1.3 in §4. Theorems 1.5 and 1.6
are proved in §5. Adequacy of linear groups of degree p is discussed in §6; in particular,
we prove Theorem 1.7. In the next §7, we describe the PIMs for various simple modules
of simple groups. These data are used in §8 to classify reducible self-dual indecomposable
modules of dimension at most 2p − 3, cf. Theorem 1.9, and to classify the finite non-G-cr
subgroups of symplectic and orthogonal groups in dimensions at most 2p−3, cf. Proposition
8.8 and Corollary 1.10. §9 is devoted to proving weak adequacy of SL2 (q)-representations,
cf. Proposition 9.1. In §10, we show that almost always the natural module for SLn (q) is
adequate. In §11, we prove Theorem 11.5 concerning adequacy of (possibly disconnected)
reductive algebraic groups and asymptotic adequacy.
Notation. If V is a kG-module and X ≤ G is a subgroup, then VX denote the restriction
of V to X. The containments X ⊂ Y (for sets) and X < Y (for groups) are strict.
Fix a prime p and an algebraically closed field k of characteristic p. Then for any finite
group G, IBrp (G) is the set of isomorphism classes of irreducible kG-representations (or
their Brauer characters, depending on the context), dp (G) denotes the smallest degree of
nontrivial ϕ ∈ IBrp (G), P(ϕ) is the principal indecomposable module (PIM) corresponding
to ϕ, and B0 (G) denotes the principal p-block of G. Sometimes we use 1 to denote the
principal representation. Op (G) is the largest normal p-subgroup of G, Op (G) is the smallest
normal subgroup N of G subject to G/N being a p-group, and similarly for Op′ (G) and
ADEQUATE SUBGROUPS AND INDECOMPOSABLE MODULES
7
′
Op (G) = G+ . Furthermore, the Fitting subgroup F (G) is the largest nilpotent normal
subgroup of G, and E(G) is the product of all subnormal quasisimple subgroups of G,
so that F ∗ (G) = F (G)E(G) is the generalized Fitting subgroup of G. Given a finitedimensional kG-representation Φ : G → GL(V ), we denote by M the k-span
hΦ(g) | Φ(g) semisimpleik .
If M is a finite length module over a ring R, then define soci (M ) by soc0 (M ) = 0 and
socj (M )/ socj−1 (M ) = soc(M/ socj−1 (M )). If M = socj (M ) with j minimal, we say that
j is the socle length of M . If V is a vector space endowed with a non-degenerate quadratic
form, then O(V ) denotes the full isometry group of the form. For a linear algebraic group
G, G 0 denotes the connected component containing the identity.
2. Linear groups of low degree
First we recall the description of absolutely irreducible non-solvable linear groups of
degree less than p = char(k), relying on the main result of Blau and Zhang [5]:
Theorem 2.1. [23, Theorem 2.1]. Let W be a faithful, absolutely irreducible kH-module
′
for a finite group H with Op (H) = H. Suppose that 1 < dim W < p. Then one of the
following cases holds, where P ∈ Sylp (H).
(a) p is a Fermat prime, |P | = p, H = Op′ (H)P is solvable, dim W = p − 1, and Op′ (H)
is absolutely irreducible on W .
(b) |P | = p, dim W = p − 1, and one of the following conditions holds:
(b1) (H, p) = (SUn (q), (q n + 1)/(q + 1)), (Sp2n (q), (q n + 1)/2), (2A7 , 5), (3J3 , 19), or
(2Ru, 29).
(b2) p = 7 and H = 61 · PSL3 (4), 61 · PSU4 (3), 2J2 , 3A7 , or 6A7 .
(b3) p = 11 and H = M11 , 2M12 , or 2M22 .
(b4) p = 13 and H = 6 · Suz or 2G2 (4).
(c) |P | = p, dim W = p − 2, and (H, p) = (PSLn (q), (q n − 1)/(q − 1)), (Ap , p), (3A6 , 5),
(3A7 , 5), (M11 , 11), or (M23 , 23).
(d) (H, p, dim W ) = (2A7 , 7, 4), (J1 , 11, 7).
(e) Extraspecial case: |P | = p = 2n + 1 ≥ 5, dim W = 2n , Op′ (H) = RZ(H),
R = [P, R]Z(R) ∈ Syl2 (Op′ (H)), [P, R] is an extraspecial 2-group of order 21+2n , V[P,R]
is absolutely irreducible. Furthermore, S := H/Op′ (H) is simple non-abelian, and either
b ′
S = Sp2a (2b )′ or Ω−
2a (2 ) with ab = n, or S = PSL2 (17) and p = 17.
(f) Lie(p)-case: H/Z(H) is a direct product of simple groups of Lie type in characteristic
p.
Furthermore, in the cases (b)–(d), H is quasisimple with Z(H) a p′ -group.
Now we prove the following result which extends Theorem 2.1 for quasisimple groups
and is of independent interest. Note that the complex analogue of this result is given by
[63, Theorem 8.1].
Theorem 2.2. Let p be a prime, H a finite quasisimple group of order divisible by p.
Suppose W is a faithful, absolutely irreducible kH-module of dimension d, where p ≤ d ≤ 2p.
Then one of the following statements holds.
8
R. GURALNICK, F. HERZIG, AND P. TIEP
(i) H is a quasisimple group of Lie type in characteristic p.
(ii) (H, dim(W ), p) is as listed in Tables I, IIa, IIb, III, where the fourth column lists
the number of isomorphism classes of W for each choice of (H, dim(W ), p).
Proof. Let L be the universal covering group of S := H/Z(H) and let dp (L) denote the
smallest degree of nontrivial absolutely irreducible kL-representations. Then
(2.1)
2p ≥ dim(W ) ≥ dp (L).
This inequality will allow us to rule out the majority of the cases. We will assume that S
is not isomorphic to any finite simple group of Lie type in characteristic p.
First, let S be a sporadic group. Then dp (L) is listed in [33]. Furthermore, p ≤ 71 and
so dim W ≤ 142. Now the result follows from inspecting [31] and [34] (and also [49] for the
three Conway groups), and is listed in Table III.
Assume now that S = An . The cases 5 ≤ n ≤ 13 can be checked by inspecting [34],
and the result is listed in Table I. If 14 ≤ n ≤ 16, then p ≤ 13, dim W ≤ 26, and so the
statement follows by inspecting [31]. So we may assume n ≥ 17. In this case,
dim W ≤ 2p ≤ 2n < (n2 − 5n + 2)/2.
Hence, by [27, Lemma 6.1], W is the heart of the natural permutation module of G = An ,
yielding the first row of Table I.
Next suppose that S is an exceptional group of Lie type defined over Fq . The cases
S ∈ {2 B2 (8), G2 (3), G2 (4), 3 D4 (2), 2 F4 (2)′ , F4 (2)} can be checked using [34] and lead to the
last six rows of Table IIb. For all other groups, dp (L) is bounded below by the LandazuriSeitz-Zalesskii bounds (see [61, Table II] for latest improvements) and one can check that
(2.1) cannot hold. For instance, if S = F4 (q) with q ≥ 3, then p ≤ q 4 + 1 whereas
dp (L) ≥ q 8 + q 4 − 2.
From now on we may assume that S is a finite classical group defined over Fq and p ∤ q.
Suppose first that S = PSL2 (q). Using [34] we may assume that q ≥ 11. If q is even, then
L = SL2 (q) and each ϕ ∈ IBrp (L) has degree q or q ± 1, whereas p | (q ± 1). If in addition
p 6= q ± 1 then 2p ≤ 2(q + 1)/3 < q − 1 ≤ dim(W ), violating (2.1). So p = q ± 1, and
inspecting [7] we arrive at the first multi-row of Table IIa. Assume that q is odd. Then
again L = SL2 (q), and we also get additional possibilities ϕ(1) = (q ± 1)/2 for ϕ ∈ IBrp (L).
Note that p 6= (q ± 1), (q ± 1)/3 (as q ≥ 11 is odd) and (2.1) implies p > (q + 1)/5 as
dp (L) = (q − 1)/2. It follows that p = (q ± 1)/4 or p = (q ± 1)/2. A detailed analysis of
IBrp (L) leads to the 2nd and 3rd multi-rows of Table IIa.
Suppose now that S = PSLn (q) with n ≥ 3. Note that SL4 (2) ∼
= A8 . If (n, q) = (6, 3),
then p ≤ 13 whereas dp (L) ≥ 362 by [26, Table III]. If (n, q) = (6, 2), then p ≤ 31,
so [26, Table III] implies (dim W, p) = (62, 31), as recorded in Table IIa (the 9th row).
The cases (n, q) = (3, q ≤ 7), (4, 3) can be checked using [34]. So we may assume that
(n, q) 6= (3, q ≤ 7), (4, 2), (4, 3), (6, 2), (6, 3). In this case,
2
(q − 1)(q − 1)/ gcd(3, q − 1), n = 3,
2(q n − 1) (q 3 − 1)(q −
gcd(2, q −1), n = 4,
1)/
<
dim W ≤ 2p ≤
n−2
q
−q
q−1
− 1 , n ≥ 5.
(q n−1 − 1)
q−1
ADEQUATE SUBGROUPS AND INDECOMPOSABLE MODULES
9
Applying [26, Theorem 1.1], we see that W is one of the Weil modules of L = SLn (q), of
dimension (q n − 1)/(q − 1) − a with a = 0, 1, 2. Note that
qn − 1
q n−2 − 1 q n−1 − 1 2 q n − 1
− 2 > max 2(q + 1), 2 ·
,
, ·
.
q−1
q−1
q−1 3 q−1
Q
If q ≥ 3, then (q n − 1)/(q − 1) − 2 > 2(q n−1 − 1)/(q − 1). Recall that p | ni=1 (q i − 1) and
p ≤ dim W ≤ 2p. So we arrive at one of the following possibilities:
• q = 2, p = 2n−1 − 1, whence W is the unique Weil module of dimension 2p by [26,
Theorem 1.1], leading to the 9th row of Table IIa;
• p = (q n − 1)/(q − 1), whence n is an odd prime, S = L, and W is one of q − 2 Weil
modules of dimension p by [26, Theorem 1.1], leading to the 8th row of Table IIa;
• 2p = (q n − 1)/(q − 1). Here, q is odd and n must be even, but then
qn − 1 q + 1
qn − 1
= 2
·
2(q − 1)
q −1
2
cannot be a prime.
Next suppose that S = PSUn (q) with n ≥ 3. The cases (n, q) = (3, q ≤ 5), (4, q ≤ 3),
(5, 2), (6, 2) can be checked using [34]. So we may assume that none of these cases occurs.
Now observe that if n = p = 3 | (q + 1) then 2p < (q − 1)(q 2 + 3q + 2)/6, and furthermore
(q − 1)(q 2 − q + 1)/3,
n = 3, p 6= 3 | (q + 1),
(2q 3 − q 2 + 2q − 3)/3,
n = 3, 3 ∤ (q + 1)
2(q n − (−1)n ) (q 2 + 1)(q 2 − q + 1)
2p ≤
<
− 1,
n = 4,
q+1
gcd(2, q − 1)
n
(q − (−1)n )(q n−1 − q 2 )
− 1, n ≥ 5.
(q + 1)(q 2 − 1)
Applying [30, Theorem 16] and [24, Theorem 2.7], we conclude that W is one of the Weil
modules of L = SUn (q), of dimension (q n − (−1)n )/(q + 1) − b with b = 0, ±1. Note that
2(q n−2 − (−1)n ) q n−1 + (−1)n 2(q n − (−1)n )
q n − (−1)n
− 1 > max 2(q + 1),
,
,
.
q+1
q+1
q+1
3(q + 1)
If q ≥ 3, then
q n − (−1)n
q n−1 − (−1)n−1
−1>2·
.
q+1
q+1
Qn
Recall that p | i=2 (q i − (−1)i ) and p ≤ dim W ≤ 2p. So we arrive at one of the following
possibilities:
• q = 2, p = (2n−1 − (−1)n−1 )/3; in particular, n − 1 ≥ 5 is a prime. Hence W is either
the unique Weil module of dimension 2p, or one of the two Weil modules of dimension
2p − 1, leading to the 11th and 12th rows of Table IIa;
• p = (q n − (−1)n )/(q + 1), whence n is an odd prime, S = L, and W is one of q Weil
modules of dimension p, yielding the 10th row of Table IIa;
• 2p = (q n − (−1)n )/(q + 1). Here, q is odd and n must be even, but then
q n/2 − (−1)n/2 q n/2 + (−1)n/2
q n − (−1)n
=
·
2(q + 1)
q+1
2
10
R. GURALNICK, F. HERZIG, AND P. TIEP
Table I. Quasisimple linear groups: Alternating groups
H
An
A5
2A5
A6
2A6
3A6
6A6
A7
A7
A7
2A7
2A7
3A7
3A7
6A7
A8
2A8
2A9
2A10
2A11
dim W
2, p | n
n−
1, p ∤ n
3
6
5, resp. 8, 10
10
6
6
4
8, resp. 10
10, resp. 14
4, resp. 6
14
6
9
6
14
8
8
8
16
p
n−1
≤ p≤ n−1
2
3
3
5
5
5
5
2
5
7
3
7
5
7
5
7
5, 7
5, 7
5
11
Class number
1
2
1
2, resp. 1, 1
2
2
4
2
1, resp. 2
1, resp. 2
2
2
2
2
4
1
1
2
2
1
cannot be a prime.
Now let S = PSp2n (q) with n ≥ 2. Note that Sp4 (2)′ ∼
= A6 and PSp4 (3) ∼
= SU4 (2).
Also, the cases (n, q) = (2, 4), (3, 2) can be checked using [34]. So we will assume that
(n, q) 6= (2, q ≤ 4), (3, 2). In this case,
dim W ≤ 2p ≤
(q n − 1)(q n − q)
2(q n + 1)
<
.
gcd(2, q − 1)
2(q + 1)
Using the Landazuri-Seitz-Zalesskii bound for Sp2n (q) with 2 | q and applying [24, Theorem
2.1] to Sp2n (q) with q odd, we now see that q must be odd and W is one of the Weil modules
of L = Sp2n (q), of dimension (q n ± 1)/2. So we arrive at the 4th–7th rows of Table IIa.
Note in addition that if 2 < p = (q n − 1)/4 then q = 5 and n is an odd prime, and if
p = (q n + 1)/4 then q = 3 and n is again an odd prime. Similarly, if p = (q n − 1)/2 then
q = 3 and n is an odd prime, and if p = (q n + 1)/2 then n = 2m .
Now we may assume that S = Ω2n+1 (q) with n ≥ 3, or P Ω±
2n (q) with n ≥ 4. Again, the
±
cases of Ω7 (3) and Ω8 (2) can be checked directly using [34]. Aside from these cases, one
can verify that (2.1) cannot hold.
ADEQUATE SUBGROUPS AND INDECOMPOSABLE MODULES
11
Table IIa. Quasisimple linear groups: Groups of Lie type. I
H
dim W
p
p
p+1
p
2p − 2
2p − 1
2p
2p
p+1
2p
2p
2p
SL2 (q)
2|q
PSL2 (q)
2∤q
SL2 (q)
2∤q
PSp2n (q), 2 ∤ q, n ≥ 2
p
Sp2n (3), n odd prime
PSp2n (3), n odd prime
p+1
2p − 1
Sp2n (q), n odd prime
2p
SLn (q)
n odd prime
SLn (2)
n − 1 ≥ 3 prime
SUn (q)
n odd prime
PSUn (2)
n − 1 ≥ 5 prime
SUn (2)
n − 1 ≥ 5 prime
p
2p
p
q+1
q−1
q−1
(q ± 1)/2
(q + 1)/2
(q + 1)/4
(q − 1)/2
(q + 1)/2
(q − 1)/2
(q ± 1)/4
(q − 1)/2
(q + 1)/2
p = (q n − 1)/2, q = 3
p = (q n + 1)/2, n = 2m
(3n − 1)/2
(3n + 1)/4
p = (q n − 1)/4, q = 3
p = (q n + 1)/4, q = 5
qn − 1
q−1
Class number
q/2 − 1
q/2
1
2
1
2
(q − 3)/4
(q − 5)/4
2
2
(q + 1)/4
(q − 1)/4
2n−1 − 1
1
qn
2
2
2
2
q−2
+1
q+1
q
2p
(2n−1 + 1)/3
1
2p − 1
(2n−1 + 1)/3
2
p
3. Extensions and self-extensions
First we recall a convenient criterion concerning self-extensions in blocks of cyclic defect:
Lemma 3.1. [23, Lemma 7.1]. Suppose that G is a finite group and that V is an irreducible
Fp G-representation that belongs to a block of cyclic defect. Then Ext1G (V, V ) 6= 0 if and
only if V admits at least two non-isomorphic lifts to characteristic zero. In this case,
dim Ext1G (V, V ) = 1.
The next observation is useful in various situations:
Lemma 3.2. Let H ≤ G be a subgroup of index coprime to p = char(k). Suppose that V
is a kG-module and VH = V1 ⊕ V2 is a direct sum of two nonzero H-submodules, at least
one of which is also stabilized by G. Then the G-module V is decomposable.
12
R. GURALNICK, F. HERZIG, AND P. TIEP
Table IIb. Quasisimple linear groups: Groups of Lie type. II
H
SL3 (3)
2 · PSL3 (4)
2 · PSL3 (4)
41 · PSL3 (4)
42 · PSL3 (4)
6 · PSL3 (4)
PSL4 (3)
SU3 (3)
SU4 (2)
61 · PSU4 (3)
SU5 (2)
Sp4 (4)
Sp6 (2)
2 · Sp6 (2)
2 · Ω+
8 (2)
Ω−
8 (2)
2 B (8)
2
2 · 2 B2 (8)
G2 (3)
2 · G2 (4)
2 F (2)′
4
3 D (2)
4
dim W
p
Class number
16, resp. 26
13
1, resp. 3
6
3
1
10
5, resp. 7
2, resp. 1
8
5, resp. 7
2, resp. 4
4
3
2
6
5
2
26
13
2
14
7
1
10
2
5
6
1
6
5
2
10
5
1
18, resp. 34
17
1, resp. 2
7
5, 7
1
8
5, 7
1
8
5, 7
1
34
17
1
14
7, 13
2
8
5
1
16, 24
13
14
7, 13
1
12
7
1
26
13
2
26
13
1
Proof. Suppose for instance that V1 is stabilized by G, and consider the natural projection
π : V → V1 along V2 . Write G = ⊔m
i=1 gi H where m := [G : H] is coprime to p, and let
m
π̃ =
1 X
gi πgi−1 .
m
i=1
It is straightforward to check that π̃ is G-equivariant, π̃ 2 = π̃, and Im(π̃) = V1 . Hence the
G-module V decomposes as V1 ⊕ Ker(π̃).
From now on we again assume that k is algebraically closed of characteristic p. First we
record the following consequence of the Künneth formula, cf. [4, 3.5.6].
Lemma 3.3. Let H be a finite group. Assume that H is a central product of subgroups
Hi , 1 ≤ i ≤ t, and that Z(H) is a p′ -group. Let X and Y be irreducible kH-modules. Write
X = X1 ⊗ . . . ⊗ Xt and Y = Y1 ⊗ . . . ⊗ Yt where Xi and Yi are irreducible kHi -modules.
(i) If Xi and Yi are not isomorphic for two distinct i, then Ext1H (X, Y ) = 0.
ADEQUATE SUBGROUPS AND INDECOMPOSABLE MODULES
13
Table III. Quasisimple linear groups: Sporadic groups
H
M11
2M12
2J2
M11
2M22
M11
M12
2M12
6Suz
J1
J1
J2
2J2
3J3
M22
3M22
M23
HS
M cL
M24
M23
Co3
Co2
2Co1
dim W
p
Class number
5
3
2
2p
3, 5
2
6
3, resp. 5
2, resp. 1
10
5
3
10
5, resp. 7
2, resp. 1
11, 16
11
1
11, resp. 16
11
2, resp. 1
12
11
1
12
7, 11, 13
2
14
11
1
22, 34
19
1
14
7
2
14
7
1
18
17
4
20
11
1
21
11
2
22
11
1
22
11
1
22
11
1
23, resp. 45
23
1, resp. 2
45
23
2
23
23
1
23
23
1
24
13, 23
1
(ii) If X1 and Y1 are not isomorphic but Xi ∼
= Yi for i > 1, then Ext1H (X, Y ) ∼
=
Ext1H1 (X1 , Y1 ).
(iii) If Xi ∼
= Yi for all i, then Ext1H (X, Y ) ∼
= ⊕i Ext1Hi (Xi , Yi ).
Lemma 3.4. Let G be a finite group with a normal subgroup N = Op (N ) and V be a
kG-module. Suppose that N acts trivially on V . Then H 1 (G, V ) ∼
= H 1 (G/N, V ).
Proof. Since N acts trivially on V , we have that H 1 (N, V ) = Hom(N, V ). Furthermore,
Hom(N, V ) = 0 as Op (N ) = N . Now the inflation-restriction sequence in cohomology
implies that the sequence
0 → H 1 (G/N, V ) → H 1 (G, V ) → 0
is exact, whence the claim follows. (Note that if N is a p′ -group, then the Hochschild-Serre
spectral sequence degenerates, and so H i (G, V ) ∼
= H i (G/N, V N ) for all i. Similarly, if G/N
′
i
i
G/N
is a p -group, then H (G, V ) = H (N, V )
for all i.)
Lemma 3.5. [23, Lemma 7.8]. Let V be a kG-module of finite length.
14
R. GURALNICK, F. HERZIG, AND P. TIEP
(i) Suppose that X is a composition factor of V such that V has no indecomposable
subquotient of length 2 with X as a composition factor. Then V ∼
= X ⊕ M for some
submodule M ⊂ X.
(ii) Suppose that Ext1G (X, Y ) = 0 for any two composition factors X, Y of V . Then V
is semisimple.
Lemma 3.6. [23, Lemma 7.9]. Let V be a kG-module. Suppose that U is a composition
factor of V of multiplicity 1, and that U occurs both in soc(V ) and head(V ). Then V ∼
=
U ⊕ M for some submodule M ⊂ V .
Lemma 3.7. Let G be group with a normal subgroup N of index coprime to p. Let k be
an algebraically closed field of characteristic p, and let V be a kG-module of finite length.
(i) V is semisimple if and only if VN is semisimple. In particular, if V is reducible
indecomposable, then VN cannot be semisimple.
(ii) Suppose V is reducible indecomposable. Then the N -module V has no simple direct
summand.
Proof. (i) The “only if” part is obvious. For the “if” part, suppose U is a G-submodule of
V . Since VN is semisimple, VN = U ⊕ W for some N -submodule W . As U is G-stable, by
Lemma 3.2 there is a G-submodule W ′ such that V = U ⊕ W ′ .
(ii) Consider a decomposition VN = ⊕ti=1 Ui into indecomposable direct summands, and
write V = V1 ⊕ V2 , where V2 is the sum of those Ui ’s which are simple and V1 is the sum
of the non-simple Ui ’s. Assume that V2 6= 0.
Note that if U is any reducible indecomposable N -module, then soc(U ) ⊆ rad(U ). Indeed, suppose a maximal submodule M ⊂ U does not contain soc(U ). Then soc(U ) =
(M ∩ soc(U )) ⊕ W for some N -submodule W 6= 0, and U = M ⊕ W is decomposable, a contradiction. Applying this remark to the summands Ui in V1 , we see that soc(V1 ) ⊆ rad(V1 ).
But V2 is semisimple, so
soc(V1 ) = soc(V1 ) ∩ rad(V1 ) = soc(V ) ∩ rad(V )
is G-stable. By Lemma 3.2, there is a G-submodule V2′ 6= 0 such that soc(V ) = soc(V1 )⊕V2′ .
In this case, VN = V1 ⊕ V2′ . Since V2′ is G-stable, again by Lemma 3.2 we have that
V = V1′ ⊕ V2′ for some G-submodule V1′ . As V is indecomposable and V2′ 6= 0, we must have
that V1′ = 0, whence V1 = 0, VN = V2 is semisimple, contradicting (i).
Lemma 3.8. [23, Lemma 7.11]. Let V be an indecomposable kG-module.
(i) If the G+ -module VG+ admits a composition factor L of dimension 1, then all composition factors of VG+ belong to B0 (G+ ).
(ii) Suppose a normal p′ -subgroup N of G acts by scalars on a composition factor L of
the G-module V . Then N acts by scalars on V . If in addition V is faithful then N ≤ Z(G).
Corollary 3.9. Let V be an indecomposable kG-module of dimension ≤ 2p − 3. Suppose
that dp (G+ ) ≥ p − 3. Then one of the following holds:
(i) The G+ -module V is irreducible.
(ii) All composition factors of the G+ -module V have dimension ≤ p.
(iii) All composition factors of the G+ -module V belong to B0 (G+ ).
ADEQUATE SUBGROUPS AND INDECOMPOSABLE MODULES
15
Proof. Suppose that dim U > p for a composition factor U of the G+ -module V but V |G+
is reducible. Since dim(V ) − dim(U ) ≤ p − 4 < dp (G+ ), the G+ -module V must have a
composition factor L of dimension 1. Hence we are done by Lemma 3.8.
Finally, self-dual indecomposable modules of SL2 (q) (where q = pn ) of low dimension are
described in the following statement:
Proposition 3.10. [23, Proposition 8.2]. Suppose that V is a reducible, self-dual, indecomposable representation of SL2 (Fq ) over Fp , where q = pn . If dim V < 2p − 2, then q = p
and either of the following holds:
(i) dim V = p and V ∼
= P(1).
(ii) dim V = p + 1 and V is the unique nonsplit self-extension of L p−1
.
2
(iii) dim V = p − 1 and V is the unique nonsplit self-extension of L p−3
.
2
Conversely, all the listed cases give rise to examples.
4. Finite groups with indecomposable modules of dimension ≤ 2p − 2
Throughout this section, we assume that k is an algebraically closed field of characteristic
p > 3. First we recall several intermediate results proved in [23]:
Lemma 4.1. [23, Lemma 9.1]. Let G be a finite group, p > 3, and V be a faithful kGmodule of dimension < 2p. Suppose that Op (G) = 1 and Op′ (G) ≤ Z(G). Then F (G) =
Op′ (G) = Z(G), F ∗ (G) = E(G)Z(G), and G+ = E(G) is either trivial or a central product
of quasisimple groups of order divisible by p. In particular, G has no composition factor
isomorphic to Cp and so H 1 (G, k) = 0.
Lemma 4.2. [23, Lemma 9.3]. Let V be a faithful indecomposable kG-module with two
composition factors V1 , V2 . Assume that Op (G) = 1 and dim V ≤ 2p−2. If J := Op′ (G+ ) 6≤
Z(G+ ), then the following hold:
(i) p = 2a + 1 is a Fermat prime,
(ii) dim V1 = dim V2 = p − 1,
(iii) J/Z(J) is elementary abelian of order 22a ,
(iv) H 1 (G+ , k) 6= 0.
Lemma 4.3. [23, Lemma 9.5]. Let H be a quasisimple finite group of Lie type in char
p > 3. Assume that V1 , V2 ∈ IBrp (H) satisfy dim V1 + dim V2 < 2p.
(i) If H ∼
6 SL2 (q), PSL2 (q), then Ext1H (V1 , V2 ) = 0. In particular, there is no reducible
=
indecomposable kG-module V with G+ ∼
= H and dim V < 2p.
(ii) Suppose H ∼
= SL2 (q) or PSL2 (q), Ext1H (V1 , V2 ) 6= 0, and dim V1 = dim V2 . Then
q = p and V1 = L((p − 3)/2) or L((p − 1)/2).
Proposition 4.4. [23, Proposition 9.7]. Let p > 3 and let G be a finite group with a faithful,
reducible, indecomposable kG-module V of dimension ≤ 2p − 3. Suppose in addition that
Op (G) = 1. Then G+ = E(G+ ), G has no composition factor isomorphic to Cp , and one
of the following holds.
(i) G+ is quasisimple.
16
R. GURALNICK, F. HERZIG, AND P. TIEP
(ii) G+ is a central product of two quasisimple groups and dim V = 2p − 3. Furthermore,
V has one composition factor of dimension 1, and either one of dimension 2p − 4 or two
of dimension p − 2. In either case, V ∼
6 V ∗.
=
Corollary 4.5. Let k be a field of characteristic p and let V be a faithful reducible indecomposable kG-module of a finite group G with Op (G) = 1. If dim V ≤ 2p − 3, then VG+
is indecomposable.
Proof. Assume the contrary. Then we can pick an indecomposable direct summand U of
dimension ≤ p − 2 of VG+ and let H ≤ GL(U ) be the image of G+ acting on U . By
Proposition 4.4, G has no composition factors isomorphic to Cp . Hence Op (H) = 1. Since
the kH-module U is faithful and indecomposable, U is simple by [19, Theorem A]. But this
contradicts Lemma 3.7(ii).
Recall that a component of a finite group is any subnormal quasisimple subgroup. We
first note that:
Lemma 4.6. Let G be an irreducible subgroup of GL(V ) ∼
= GLd (k) with k algebraically
′
p
closed of characteristic p. Assume that G = O (G) and that G has a component of order
coprime to p. Then d ≥ 2p.
Proof. Assume the contrary: d < 2p. Write E(G) = E1 ∗ E2 , where E1 is a central product
of all components of G of order coprime to p and E2 is the product of the remaining
components; in particular, 1 6= E1 ✁ G. Since G is generated by p-elements, there is a
p-element x not centralizing E1 . Let W be an irreducible constituent of VE1 . Since d < 2p
and dim W ≥ 2, xW ∼
= W.
Now write E1 = Q1 ∗. . .∗Qn as a central product of n components and W ∼
= W1 ⊗. . .⊗Wn ,
where Wi is an irreducible kQi -module. Note that x acts on the set {Q1 , . . . , Qn }. If
this action is nontrivial, then dim W ≥ 2p. (Indeed, we may assume that x permutes
Q1 , . . . , Qm cyclically for some p ≤ m ≤ n, and, replacing W by another E1 -summand of V
if necessary, that Q1 acts nontrivially on W , i.e. dim W1 ≥ 2. Since xW ∼
= W , this implies
that dim Wi ≥ 2 for 1 ≤ i ≤ m, whence dim W ≥ 2m ≥ 2p ≥ 2p.) Thus we may assume
that x normalizes each Qi , but does not centralize Q1 . It follows that Q1 is a quasisimple
p′ -group with a nontrivial outer automorphism of p-power order; in particular, p > 2. If
p = 3, then Q1 ∼
= 2 B2 (22a+1 ) and dim W1 ≥ 14. So p > 3 and, using the description of outer
automorphisms of finite simple groups [18, Theorem 2.5.12], we see that Q1 is a quasisimple
group of Lie type over a field of size q p for some prime power q. Now applying [42], we see
that dim W1 ≥ 2p.
The proof of Lemma 4.6 certainly depends on the classification of finite simple groups.
We note the following result which does not require the classification:
Lemma 4.7. Let k = k̄ be of characteristic p and let G be a finite irreducible p-solvable
subgroup of GL(V ) ∼
= GLn (k) of order divisible by p. Then n ≥ p − 1.
Proof. We may assume that p > 2. By a result of Isaacs [50, Theorem 10.6], V has a
p-rational lift to characteristic 0. But then by [11], the Jordan blocks of any element g ∈ G
of order p acting on V have sizes 1, p − 1, or p. So if n < p − 1, then g acts trivially on V ,
a contradiction.
ADEQUATE SUBGROUPS AND INDECOMPOSABLE MODULES
17
In what follows, we will slightly abuse the language by also considering Cp as a Frobenius
group with kernel of order p.
Lemma 4.8. Let p > 2 be a prime and let G be a transitive subgroup of Sn with n < 2p.
Assume that G has a composition factor of order p. Then one of the following holds.
(i) n = p and G is a Frobenius group of order pe for some e | (p − 1) with kernel of
order p.
(ii) p = 2a − 1 is a Mersenne prime and n = 2a = p + 1. Moreover, soc(G) is a regular
elementary abelian subgroup of order n, G = soc(G) ⋊ G1 , and G1 is a Frobenius
group of order pe for some e | a, with kernel of order p. If H 1 (G, k) 6= 0, then
|G| = np.
Proof. Note that G is primitive and contains a p-cycle. Hence we can apply [65] and see
that either (i) holds, or n = 2a = p + 1 and G = soc(G) ⋊ G1 , with soc(G) ∼
= C2a being
regular, and G1 ≤ GLa (2) has Cp as a composition factor. Applying [38] to G1 , we arrive
at (ii).
Lemma 4.9. Let S := Sp2a (2) with p = 2a ± 1 and let V = F2a
2 denote the natural module
for S. Let X ≤ S be a group with Cp as a composition factor and p > 3. Then there is a
normal elementary abelian 2-subgroup E < X such that X/E is a Frobenius group of order
pe with kernel of order p, where e | 2a. Furthermore, if E 6= 1 then p = 2a − 1. Moreover,
X acts reducibly on V precisely when p = 2a − 1 and either E 6= 1 or |X| is odd, in which
case X stabilizes a maximal totally isotropic subspace of V .
′
Proof. (a) It is easy to see that Y := Op (X) can be reducible on V only when p = 2a − 1.
Let P ∈ Sylp (X) and consider the action of X on the natural module V = F2a
2 for S. If
P ✁ X, then X is contained in NS (P ), a Frobenius group of order 2ap, in which case we
set E = 1. It follows that, if p = 2a − 1 in addition, then X is reducible on V precisely
′
when |X| is odd. So we will assume that P 5 X. It follows that P 5 Y := Op (X).
Suppose that the Y -module V is reducible, and so p = 2a − 1 and a ≥ 3 is odd. Then
Y stabilizes a proper subspace U 6= 0 of V of dimension ≤ a. Choosing U minimal, we
see that U is irreducible over Y . If U ∩ U ⊥ = 0, then Y is contained in the p′ -subgroup
Sp(U ) × Sp(U ⊥ ), a contradiction. Hence U ⊆ U ⊥ . Now if dim U < a then Y is contained
in the p′ -subgroup StabS (U ), again a contradiction. Thus dim U = a and U is a maximal
totally isotropic subspace. Setting Q := O2 (R) for R := StabS (U ) and F := Q ∩ Y , we see
that F is an elementary abelian 2-subgroup and Y /F is a subgroup of R/Q ∼
= GLa (2) with
Cp as a composition factor. By the main result of [38], Y /F is a Frobenius group of order
pb for some b | a. In particular, |Y /F | is odd and so F = O2 (Y ) ✁ X. Note that F 6= 1 as
otherwise P ✁ Y , a contradiction. Also, Y /F acts irreducibly on V /U . Since Y /F acts on
CV (F ) ⊇ U and F 6= 1, it follows that CV (F ) = U and so U is fixed by X. Thus X ≤ R
and we are done by setting E := Q ∩ X ≥ F .
(b) From now on we may assume that VY is irreducible. Hence V is absolutely irreducible
over k0 := EndF2 Y (V ). We will consider V as a b-dimensional vector space V ′ over k0 (for
some b | 2a). Thus W := V ′ ⊗k0 k is an irreducible kY -module for k := k̄0 . Observe that
b ≤ 2a ≤ p − 1. Also, Z(Y ) is cyclic by Schur’s lemma.
18
R. GURALNICK, F. HERZIG, AND P. TIEP
Note that if N ✁ Y then the N -module W is homogeneous. Indeed, VN is the direct sum
of t ≤ b < p homogeneous N -components Vi . Hence any p-element 1 6= g ∈ Y stabilizes
′
each Vi , whence Vi is fixed by Y = Op (Y ) and t = 1.
(c) Now we show E(Y ) = 1. Suppose E(Y ) 6= 1 and write E(Y ) = L1 ∗ . . . ∗ Ln , a central
product of n quasisimple groups. Since |S|p = p and Cp is a composition factor of Y , E(Y )
is a p′ -group. By (b), WE(Y ) ∼
= e(W1 ⊗ . . . ⊗ Wn ), where Wi is an irreducible kLi -module
of dimension ≥ 2. Hence b ≥ 2n and so n < p. It follows that every p-element 1 6= g ∈ Y
normalizes each Li , and so does Y . On the other hand, if Y centralizes Li , then Li ≤ Z(Y ),
a contradiction. So some p-element 1 6= g ∈ Y normalizes but does not centralize L1 . As
in the proof of Lemma 4.6, we see that L1 is a quasisimple group of Lie type defined over
Fq with q = r cp for some prime r and some integer c, and conclude that dim W1 > p when
r 6= 2. If r = 2, then by [66], |L1 | is divisible by some prime divisor ℓ of 2p − 1 that does
Q
i
not divide p−1
i=1 (2 − 1), whence ℓ ∤ |S|, again a contradiction.
Next we observe that every normal abelian subgroup A of Y must be central and so
cyclic. Indeed, A acts by scalars on W by (b), and so A ≤ Z(Y ).
(d) We have shown that F ∗ (Y ) = F (Y ). Now if p divides |F (Y )|, then since |S|p = p, P =
Op (F (Y )) ✁ Y , a contradiction. Also, if F (Y ) ≤ Z(Y ), then Y ≤ CY (F (Y )) ≤ F (Y ), and
so Y = F (Y ) is nilpotent, again a contradiction. So F (Y ) is a p′ -group and moreover N :=
Or (F (Y )) is non-central in Y for some prime r 6= p. By (c), every characteristic abelian
subgroup of N is cyclic. Hence by Hall’s theorem, N = F ∗ D, where F is an extraspecial
r-group, and either D is cyclic, or r = 2 and C is dihedral, generalized quaternion, or
semi-dihedral. Arguing as in part (3) of the proof of [25, Theorem 6.7], we can find a
characteristic subgroup L of N such that L = Z(L)E, where E is an extraspecial r-group
of order r 2c+1 for some c ≥ 1 and Z(L) is cyclic. Note that Z(L) ≤ Z(Y ) by (c). It also
follows by (b) that r c | b and r 6= 2, whence a ≥ 3 must be odd (recall that p = 2a ± 1
is prime). As L 6≤ Z(Y ), some p-element 1 6= g ∈ Y normalizes but does not centralize
L, and centralizes Z(L). It follows that p divides the order of the group Outc (L) of outer
automorphisms of L that act trivially on Z(L). Since Outc (L) ֒→ Sp2c (r), we get p | (r d ±1)
for some d ≤ c. Since p ≥ 2a − 1 and r c | a, we arrive at a contradiction.
Now we can prove Theorem 1.3 in a slightly stronger version.
Theorem 4.10. Let G be a finite irreducible subgroup of GL(V ) ∼
= GLd (k) with k algebraically closed of characteristic p > 3. Assume that G has a composition factor of order
p and d < 2p − 2. Then d = p − 1, p or p + 1, a Sylow p-subgroup of G has order p, G is
solvable and one of the following holds:
(i) d = p − 1, p = 2a + 1 is a Fermat prime, F ∗ (G) = Z(G)O2 (G), G/F ∗ (G) is a
Frobenius group of order pe for some e | 2a with kernel of order p, and O2 (G) is a
group of symplectic type with O2 (G)/Z(O2 (G)) ∼
= C22a ;
(ii) d = p and G has a normal abelian p′ -subgroup N = F ∗ (G) such that G/N is a
Frobenius group of order pe for some e | (p − 1) with kernel of order p;
(iii) d = p + 1, p = 2a − 1 is a Mersenne prime and one of
ADEQUATE SUBGROUPS AND INDECOMPOSABLE MODULES
19
(a) G has an abelian normal p′ -subgroup N , where the action of G/N on the d
distinct eigenspaces of N induces a subgroup of Sd as described in Lemma 4.8;
or
(b) F ∗ (G) = Z(G)O2 (G), G/F ∗ (G) is a Frobenius group of order 2bp for some
b | a with kernel of order p, and O2 (G) is a group of symplectic type with
O2 (G)/Z(O2 (G)) ∼
= C22a .
Moreover, H 1 (G, k) 6= 0 if and only if one of the conclusions of Theorem 1.3 holds.
Proof. (a) First we show that G+ is irreducible on V . To this end, let W be an irreducible
summand of VG+ . Also let K1 and K2 denote the kernel of the action of G+ on W and
on a G+ -invariant complement V ′ to W in V . Then K1 ∩ K2 = 1 and so K1 embeds in
G+ /K2 as a normal subgroup. Since Cp is a composition factor of G+ , it follows that it
is a composition factor of G+ /K1 or of G+ /K2 . Replacing W by another irreducible G+ summand in V ′ if necessary, we may assume that G+ /K1 has a composition factor of order
p. Then dim W ≥ p−1 by Theorem 2.1. This is true for all other irreducible G+ -summands
in V and dim V < 2p − 2, whence the claim follows. In particular, Z(G+ ) = Z(G) ∩ G+ .
(b) By Lemma 4.1, we have that Q 6≤ Z(G+ ) and so Q 6≤ Z(G) for Q := Op′ (G+ ) ✁ G.
Suppose that Q contains a non-central (in G) abelian subgroup K ✁ G. Decompose V =
⊕ni=1 Vi into K-eigenspaces. By Clifford’s theorem, G acts transitively on {V1 , . . . , Vn }, with
kernel N , and G+ does as well. Note that n > 1 as K 6≤ Z(G). Since G+ is generated by
p-elements, n ≥ p. But d < 2p, so dim Vi = 1 and N is an abelian p′ -group. Now we can
apply Lemma 4.8 to G/N ֒→ Sd . If d = p, we are in case (ii) and F ∗ (G) = N . If d > p,
then d = p + 1 = 2a and G/N has the prescribed structure, i.e. case (iii)(a) holds.
(c) Assume now that Q contains no abelian non-central (in G) subgroup K ✁ G. Let
N be minimal among subgroups of Q that are normal but non-central in G, so N is
non-abelian. By Lemma 4.6, Q contains no components of G. Hence E(N ) = 1 and
F ∗ (N ) = F (N ). If F (N ) < N , the minimality of N implies that F (N ) ≤ Z(G), but
then F (N ) = F ∗ (N ) ≥ CN (F ∗ (N )) = N , a contradiction. So N = F (N ) is nilpotent,
and the minimality of N again implies that N is an r-group for some prime r 6= p. Let
A be any characteristic abelian subgroup of N . Then by the assumption, A ≤ Z(G) and
so it is cyclic. Thus every characteristic abelian subgroup of N is cyclic (and central in
G), and so Hall’s theorem applies to N . Arguing as in part (d) of the proof of Lemma
4.9 and using the minimality of N , we see that N = Z(N )E, where E is an extraspecial
r-group of order r 2a+1 for some a and Z(N ) ≤ Z(G) is cyclic; in particular, r a | d. Since
N 6≤ Z(G+ ), there is a p-element x that induces a nontrivial outer automorphism of N
acting trivially on Z(N ). As Outc (N ) ≤ Sp2a (r), we see that p divides r 2b − 1 for some
1 ≤ b ≤ a. On the other hand, r a ≤ d ≤ 2p − 3. This implies that r = 2, p = 2a ± 1
is either a Mersenne or Fermat prime, d = 2a , and N acts irreducibly on V . The latter
then implies that CG (N ) = Z(G) and X := G/Z(G)N is a subgroup of Outc (N ) ≤ Sp2a (2)
with Cp as a composition factor. Now we can apply Lemma 4.9 to X. Note that if X
stabilizes a maximal totally isotropic subspace of N/Z(N ), then its inverse image in N is
an abelian normal non-central subgroup of G, contrary to our assumptions. Hence either
p = 2a + 1 and we are in case (i), or p = 2a − 1 and we are in case (iii)(b). Also note that
F ∗ (G) = Z(G)N in either case.
20
R. GURALNICK, F. HERZIG, AND P. TIEP
(d) If G satisfies any of the conclusions of Theorem 1.3 then H 1 (G, k) 6= 0. Conversely,
suppose that H 1 (G, k) 6= 0. Then G possesses a normal subgroup L of index p. Thus we
can apply the above results to G. In particular, |G|p = p and so L = Op′ (G). Now the
description of G in (i)–(iii) shows that G must satisfy one of the conclusions of Theorem
1.3.
One can also consider an analogue of Theorem 4.10 for p = 3. In this case, d ≤ 3 and
the analogous result is straightforward by examining subgroups of GL2 and GL3 .
5. Bounding Ext1G (V, V ) and Ext1G (V, V ∗ )
The following result is well known:
Lemma 5.1. Let X be a finite group and let k be an algebraically closed field of characteristic p. Let U and V be irreducible kX-modules belonging to a kX-block B with cyclic
defect subgroups. Then dimk Ext1X (U, V ) ≤ 1.
Proof. By [23, Lemma 7.1], we may assume U ∼
6 V . It is known [53] that P(V ) has simple
=
head and simple socle, both isomorphic to V , and rad(P(V ))/V is a direct sum of at
most two uniserial submodules. Also, note that Ext1 (U, V ) ∼
= HomG (U, P(V )/V ). So if
1
dimk ExtX (U, V ) ≥ 2, then at least two edges of the Brauer tree of B correspond to U ,
which is impossible.
Lemma 5.2. Let H be a finite group with Sylow p-subgroups of order p. Suppose that
′
H = Op (H) and H has no composition factor of order p. Then H/Op′ (H) is a nonabelian simple group.
Proof. Replacing H by H/Op′ (H), we have that Op′ (H) = 1. Together with the condition
that H has no composition factor of order p, this implies that F (H) = 1, and so
F ∗ (H) = E(H) = S1 × . . . × Sn
is a product of non-abelian simple groups. It also follows that Op′ (F ∗ (H)) = 1, whence
′
n = 1 and F ∗ (H) = S1 has order divisible by p. Now H/S1 is a p′ -group and H = Op (H).
It follows that H = S1 .
Proposition 5.3. Let G be a finite group with a faithful kG-module V . Suppose that
V = W1 ⊕ . . . ⊕ Wt is a direct sum of kG+ -submodules, and that for each i the subgroup
Hi ≤ GL(Wi ) induced by the action of G+ on Wi has Sylow p-subgroups of order p. Suppose
in addition that G has no composition factor of order p. Then
G+ /Op′ (G+ ) ∼
= S1 × . . . × Sn
is a direct product of non-abelian simple groups Si , each of order divisible by p.
′
Proof. By assumption, Hi has no composition factor of order p, |Hi |p = p, and Op (Hi ) =
Hi . By Lemma 5.2, Hi /Op′ (Hi ) is simple non-abelian. Hence the claim follows by [23,
Lemma 2.3].
ADEQUATE SUBGROUPS AND INDECOMPOSABLE MODULES
21
Proposition 5.4. Let k = k be of characteristic p and let H be a finite group such that
′
H = Op (H) and
H/J = S1 × . . . × Sn
is a direct product of non-abelian simple groups of order divisible by p, where J := Op′ (H).
Suppose that W1 and W2 are irreducible kH-modules such that the image of H in GL(Wi )
has Sylow p-subgroups of order p for i = 1, 2, and that Ext1H (W1 , W2 ) 6= 0. Then the actions
of H on W1 and W2 have the same kernel.
Proof. Let Ki denote the kernel of the action of H on Wi , so that |H/Ki |p = p. Note that H,
and so K1 ∩K2 as well, has no composition factor of order p, whence K1 ∩K2 = Op (K1 ∩K2 ).
Hence by Lemma 3.4 there is no loss to assume that
(5.1)
K1 ∩ K2 = 1.
′
We aim to show in this case that K1 = K2 = 1. Note that the condition H = Op (H)
implies that n ≥ 1.
(i) Suppose for instance that J1 := J ∩ K1 6= 1. This implies by (5.1) that J1 6≤ K2 ,
i.e. J1 does not act trivially on W2 . Since J1 ✁ H, we see that (W2 )J1 is a direct sum of
nontrivial kJ1 -modules. On the other hand, the p′ -group J1 acts trivially on W1 and on
W1∗ . Setting M := W1∗ ⊗k W2 , we then have that M J1 = 0 and so
Ext1H (W1 , W2 ) ∼
= H 1 (H, M ) ∼
= H 1 (H/J1 , M J1 ) = 0,
a contradiction.
(ii) We have shown that J ∩ K1 = J ∩ K2 = 1. Hence
∼ K1 J/J ✁ H/J = S1 × . . . × Sn ,
K1 =
Q
and so K1 is isomorphic to the direct product i∈I Si for some subset I ⊆ {1, 2, . . . , n}.
As |H/K1 |p = p and p | |Si | for all i, we may assume that
(5.2)
K1 ∼
= JK1 /J = S2 × . . . × Sn .
In particular, if n = 1 then K1 = 1 and similarly K2 = 1, whence we are done.
(iii) Now we assume that n ≥ 2. Consider X := JK2 ∩ K1 . Then X ∩ K2 ≤ K1 ∩ K2 = 1
and so
X∼
= XK2 /K2 ✁ JK2 /K2 ∼
=J
Q
′
is a p -group. On the other hand, X ✁ K1 and so by (5.2) we again have that X ∼
= i∈I ′ Si
for some subset I ′ ⊆ {2, . . . , n}. As p | |Si | for all i, we conclude that X = 1. Similarly
JK1 ∩ K2 = 1. Together with (5.2), this implies that
K2 ֒→ H/JK1 ∼
= (H/J)/(JK1 /J) ∼
= S1 .
Q
Furthermore, as shown in (ii), JK2 /J ∼
= K2 ∼
= i∈I ′′ Si for some subset I ′′ ⊆ {1, 2, . . . , n}
of cardinality n − 1. It follows that n = 2, K2 ∼
= S1 , K1 ∼
= S2 , and
H = JK2 K1 ∼
= JK2 × K1 = (J × K2 ) × K1 ∼
= J × K1 × K2 .
Now we can write
W1 ∼
= A1 ⊗k k ⊗k B2 , W2 ∼
= A2 ⊗k B1 ⊗k k,
22
R. GURALNICK, F. HERZIG, AND P. TIEP
where A1 , A2 ∈ IBrp (J) and Bi ∈ IBrp (Ki ) for i = 1, 2. In this case, if B1 ∼
6 k and B2 ∼
6 k,
=
=
1
then ExtH (W1 , W2 ) = 0 by Lemma 3.3(i), a contradiction. So we may assume that B1 ∼
= k,
i.e. K1 acts trivially on W2 . It then follows that K1 ≤ K1 ∩ K2 = 1, contradicting (5.2)
and the equality n = 2.
Proof of Theorem 1.6. We take the convention that V ǫ is V for ǫ = + and V ∗ if ǫ = −,
and the same holds for other modules. Assume that Ext1G (V, V ǫ ) 6= 0 for some ǫ = ±.
Decompose
t
t
M
M
Wiǫ
Wi , VGǫ + = e
VG + = e
i=1
i=1
where W1 , . . . , Wt are pairwise non-isomorphic and G-conjugate irreducible kG+ -modules.
By assumption, the image of G+ in each GL(Wi ) has Sylow p-subgroups of order p, and
G+ has no composition factor of order p. By Proposition 5.3,
(5.3)
G+ /Op′ (G+ ) = S1 × . . . × Sn
is a direct product of non-abelian simple groups of order divisible by p.
′
(i) First we consider the case k = k. Recall that G+ = Op (G+ ). So by Proposition 5.4
1
we have that ExtG+ (Wi , Wjǫ ) = 0, unless G+ has the same kernel on Wi and Wjǫ .
Let Ki denote the kernel of G+ on Wi , and on Wiǫ as well. Relabeling W1 , . . . , Wt , we
may assume that K1 , . . . , Ks are pairwise distinct, with s := |{K1 , . . . , Kt }|. Defining
M
Vi := e
Wj
j:Kj =Ki
for 1 ≤ i ≤ s, we then have that
V = V1 ⊕ . . . ⊕ Vs , V ǫ = V1ǫ ⊕ . . . ⊕ Vsǫ .
Certainly, G acts transitively on {W1 , . . . , Wt }, {V1 , . . . , Vs }, and on {K1 , . . . , Ks } via conjugation. Also, H := NG (K1 ) ✄ G+ stabilizes V1 and has index s in G. It follows that
H = StabG (V1 ), V ∼
= IndG
H (V1 ), and so V1 is an irreducible kH-module.
By the definition of Vi , we have that Ext1G+ (V1 , Viǫ ) = 0 for all i > 1. As H/G+ is a
L
p′ -group, it follows that Ext1H (V1 , i>1 Viǫ ) = 0. Now by Frobenius’ reciprocity,
ǫ ∼
1
ǫ
1
ǫ
Ext1G (V, V ǫ ) = Ext1G (IndG
H (V1 ), V ) = ExtH (V1 , (V )H ) = ExtH (V1 , V1 ).
Recall that K1 acts trivially on V1 and V1ǫ , and |H/K1 |p = |G+ /K1 |p = p. Hence
dimk Ext1H/K1 (V1 , V1ǫ ) ≤ 1 by Lemma 5.1. Finally, K1 has no composition factor of order p by (5.3). So Ext1H (V1 , V1ǫ ) ∼
= Ext1H/K1 (V1 , V1ǫ ) by Lemma 3.4, and so we are done.
(ii) Now we consider the general case. By [32, Theorem 9.21], W1 ⊗k k is a direct sum
of irreducible kG+ -modules W11 , . . . , W1m , which form a Galois conjugacy class over k. By
assumption, |G+ /K1 |p = p, where K1 is the kernel of G+ on W1 . Certainly, K1 is contained
in the kernel K11 of the action of G+ on W11 , whence |G+ /K11 |p ≤ p. If |G+ /K11 |p < p,
′
then the equality G+ = Op (G+ ) implies that K11 = G+ , whence G+ acts trivially on W11
and so on W1 and on V as well, contradicting the faithfulness of V and the assumption
Ext1G (V, V ǫ ) 6= 0. Hence we must have that |G+ /K11 |p = p. Since the dimension of
ADEQUATE SUBGROUPS AND INDECOMPOSABLE MODULES
23
Ext1G (V, V ǫ ) does not change under field extensions, we are done by replacing V by V ⊗k k
and applying the result of (i).
A key ingredient of the proof of Theorem 1.5 is the following statement:
′
Proposition 5.5. Let X be a finite group with a normal subgroup Y ≥ Op (X). Let A, B,
W , W ′ be kX-modules, where A and B are absolutely irreducible and Y acts via scalars on
both A and B. Suppose in addition that AY ∼
= BY . Then
dimk Ext1X (A ⊗k W, B ⊗k W ′ ) ≤ dimk Ext1Y (WY , WY′ ).
Proof. Since the dimensions of Ext1 -spaces do not change under field extensions, we may
assume that k is algebraically closed. By assumption, X/Y is a p′ -group and Y acts trivially
on A∗ ⊗k B. Without loss we may assume that dimk B ≤ dimk A. Denoting
H := H 1 (Y, (WY )∗ ⊗k W ′ ) ∼
= Ext1 (WY , W ′ )
Y
Y
Y
we then have dimk B ⊗k H ≤ (dimk A)(dimk H) and so
dimk HomkX (A, B ⊗k H) ≤ dimk H = dimk Ext1Y (WY , WY′ ).
Applying the inflation-restriction spectral sequence, we obtain
dimk Ext1X (A ⊗k W, B ⊗k W ′ ) = dimk (H 1 (Y, A∗ ⊗k B ⊗k W ∗ ⊗k W ′ ))X/Y
= dimk (A∗ ⊗k B ⊗k H)X/Y
= dimk HomkX (A, B ⊗k H)
≤ dimk Ext1Y (WY , WY′ ).
Proposition 5.6. Let k be an algebraically closed field of characteristic p. Assume the
hypothesis of Theorem 1.2 and write VG+ = ⊕ti=1 Vi , where Vi ∼
= eWi and W1 , . . . , Wt are
+
pairwise non-isomorphic irreducible kG -modules. Suppose that there is a unique j ≥ 1
such that Ext1G+ (W1 , Wj ) 6= 0. Then
dimk Ext1G (V, V ) ≤ dimk Ext1G+ (W1 , Wj ).
Proof. Let G1 := StabG (V1 ) be the inertia group of W1 in G. Since G+ ✁G1 , the uniqueness
of j implies that G1 = StabG (Vj ) as well. Next, V ∼
= IndG
G1 ((V1 )G1 ), and so
1
∼
Ext1G (V, V ) = Ext1G (IndG
G1 ((V1 )G1 ), V ) = ExtG1 ((V1 )G1 , VG1 )
L
1
1
∼
= ExtG1 ((V1 )G1 , (Vj )G1 ) ⊕ ExtG1 ((V1 )G1 , i6=j (Vi )G1 ).
L
Since G+ contains a Sylow p-subgroup of G1 , Ext1G1 ((V1 )G1 , i6=j (Vi )G1 ) injects in
M
M
Ext1G+ ((V1 )G+ ,
(Vi )G+ ) ∼
Ext1G+ (W1 , Wi ) = 0
= e2
i6=j
i6=j
and so it is zero.
It remains therefore to show that
dimk Ext1G1 ((V1 )G1 , (Vj )G1 ) ≤ dimk Ext1G+ (W1 , Wj ).
24
R. GURALNICK, F. HERZIG, AND P. TIEP
Let X denote a universal p′ -cover of G1 (so that G1 ∼
= X/Z for some p′ -subgroup Z ≤
′
p
Z(X) ∩ [X, X]), and let Y := O (X). Now we view V1 as an irreducible kX-module by
inflation and note that
dimk Ext1G1 ((V1 )G1 , (Vj )G1 ) = dimk Ext1X ((V1 )X , (Vj )X )
as Z is a p′ -group. Since Z acts trivially on V1 , we also have that (V1 )Y ∼
= e(W1 )Y and also
Y Z/Z ∼
= G+ . Hence (W1 )Y is irreducible, and similarly for Wj . Also,
dimk Ext1Y ((W1 )Y , (Wj )Y ) = dimk Ext1G+ (W1 , Wj ).
Fix a basis of W1 and the corresponding representation Φ of Y on W1 in this basis. By
the Clifford theory, we can decompose the irreducible representation Θ of X on V1 as a
tensor product of an irreducible projective representation Λ of X/Y (of degree e) and an
irreducible projective representation Ψ of X, with
Ψ(y) = Φ(y)
for all y ∈ Y . Since X is
p′ -centrally
closed, there is a function f : X → k× such that
Ψ′ : x 7→ f (x)Ψ(x)
is a linear representation. Note that fY ∈ Hom(Y, k × ) since ΨY = Φ is a linear represen′
tation, and so fY = 1Y as Y = Op (Y ). In particular, Ψ′ (y) = Φ(y) for all y ∈ Y . Now we
inflate Λ to a projective representation of X and define
Λ′ : x 7→ f (x)−1 Λ(x)
so that Θ(x) = Λ′ (x) ⊗ Ψ′ (x) for all x ∈ X. Then Λ′ is also a linear representation of X
and furthermore Λ′Y is trivial (since fY = 1Y ). Thus we can decompose
(V1 )X = A ⊗k W,
where the kX-modules A and W are irreducible, Y acts trivially on A, and WY
Similarly,
(Vj )X = B ⊗k W ′ ,
where the kX-modules B and W ′ are irreducible, Y acts trivially on B, and WY′
Now our statement follows by applying Proposition 5.5.
∼
= (W1 )Y .
∼
= (Wj )Y .
The same proof as above yields:
Proposition 5.7. Let k be an algebraically closed field of characteristic p. Assume the
hypothesis of Theorem 1.2 and write VG+ = ⊕ti=1 Vi , where Vi ∼
= eWi and W1 , . . . , Wt are
pairwise non-isomorphic irreducible kG+ -modules. Suppose that there is a unique j ≥ 1
such that Ext1G+ (W1 , Wj∗ ) 6= 0. Then
dimk Ext1G (V, V ∗ ) ≤ dimk Ext1G+ (W1 , Wj∗ ).
✷
Lemma 5.8. Given the assumption of Theorem 1.5, suppose that H is as in the extraspecial
case (e) of Theorem 2.1. Then
Ext1G (V, V ∗ ) = 0.
ADEQUATE SUBGROUPS AND INDECOMPOSABLE MODULES
25
L
Proof. Write VG+ = e ti=1 Wi as usual. It suffices to show that Ext1G+ (Wi , Wj∗ ) = 0 for
all i, j. Recall that J := Op′ (G) acts irreducibly on Wi and Wj∗ by [23, Theorem 2.4(ii)].
Since J is a p′ -group, we have M = CM (J) ⊕ [M, J] for M := Wi∗ ⊗ Wj∗ . As J has no fixed
point on [M, J], H 1 (G+ , [M, J]) = 0. Also,
CM (J) ∼
= HomJ (Wi , W ∗ )
j
is either 0 or k. Hence
Ext1G+ (Wi , Wj∗ ) ∼
= H 1 (G+ , M ) ∼
= H 1 (G+ , CM (J)) ֒→ H 1 (G+ , k)
As G+ is perfect by [23, Theorem 2.4], H 1 (G+ , k) = 0, and so we are done.
Proof of Theorem 1.5. (i) Assume that (G, V ) satisfies all the hypotheses of Theorem 1.5.
We take the convention that V ǫ is V for ǫ = + and V ∗ if ǫ = −, and the same holds for other
modules. Since the dimension of Ext1G (V, V ǫ ) does not change under field extensions, we
will assume that k = k. Assume that Ext1G (V, V ǫ ) 6= 0 for some ǫ = ±. It suffices to show
that G then fulfills the conditions of Propositions 5.6 and 5.7 (with Ext1G+ (W1 , Wjǫ ) ∼
=k
for the index j indicated in these propositions). By [23, Lemma 7.2], there is some j such
that
(5.4)
Ext1G+ (W1 , Wjǫ ) 6= 0.
Note that Ext1G (V, V ǫ ) = 0 in the extra special case (e) of Theorem 2.1, by [23, Proposition
10.4] and Lemma 5.8. So we may assume that the image H of G+ in GL(W ) is a central
product of quasisimple groups, whence, by [23, Theorem 2.4],
G+ = L1 ∗ . . . ∗ Ln
is also a central product of quasisimple groups Li . Moreover, if some Li is not a quasisimple group of Lie type in characteristic p, then by [23, Theorem 2.4], the image of G+ in
each GL(Wi ) has Sylow p-subgroups of order p, and so Theorem 1.6 applies. So in what
follows we may assume that all Li are quasisimple groups of Lie type in characteristic p.
Correspondingly, we can decompose
W1 = A1 ⊗ . . . ⊗ An , Wjǫ = B1 ⊗ . . . ⊗ Bn ,
where Ai and Bi are irreducible kLi -modules and Li′ acts trivially on Ai and Bi whenever
i′ 6= i. By Lemma 3.3 and (5.4), we may assume that
Ai ∼
= Bi
for i > 1, and furthermore Ext1L1 (A1 , B1 ) 6= 0. Since dimk W1 = dimk Wj , it follows that
dimk Ai = dimk Bi for all i.
Note that if dimk Ai = 1, then Ai ∼
= k as Li is perfect, and similarly Bi ∼
= k, whence
1
1
ExtLi (Ai , Bi ) = 0. In fact, ExtLi (Ai , Bi ) = 0 if dimk Ai ≤ (p − 3)/2 by the main result of
[19]. It follows that dimk A1 ≥ (p − 1)/2. Since dimk W1 ≤ p − 1, we arrive at two possible
cases:
(a) dimk Ai = 1 (and so Ai ∼
= Bi ∼
= k) for all i > 1; or
(b) p ≥ 5, dimk Ai = 1 (and so Ai ∼
= Bi ∼
= k) for all i > 2, and {dimk A1 , dimk A2 } =
{(p − 1)/2, 2}.
26
R. GURALNICK, F. HERZIG, AND P. TIEP
(ii) Suppose we are in case (b). Then the quasisimple group Lm (for some m ∈ {1, 2}) is
acting irreducibly on Am ∼
= k2 . As Lm is a Lie-type group in characteristic p, we have that
a
∼
Lm = SL2 (p ) for some a ≥ 1. By Lemma 4.3, L1 ∼
= SL2 (p) (modulo a central subgroup),
∼
∼
dim A1 = (p − 1)/2, Ext1L1 (A1 , B1 ) ∼
k,
and
A
=
1 = B1 . We have shown that Ai = Bi for
1
ǫ
∼
all i; in particular Wj = W1 . Now we have that m = 2, and dimk ExtL2 (A2 , B2 ) equals 0 if
pa > 5 and 1 if pa = 5, see [23, Lemma 8.1]. Again by Lemma 3.3,
dimk Ext1G+ (W1 , Wjǫ ) = 1 + dimk Ext1L2 (A2 , B2 ).
In the case pa = 5, we have (dim W, H) = (4, Ω+
4 (5)) and conclude by Propositions 5.6 and
5.7 that Ext1G (V, V ) and Ext1G (V, V ∗ ) are at most 2-dimensional. Moreover, Example 5.9(i)
shows that the upper bound 2 can indeed be attained. If pa > 5, then Ext1G+ (W1 , Wjǫ ) ∼
=k
and Wj ∼
= W1ǫ for any j satisfying (5.4).
(iii) Now we consider the case (a). Then
∼ Ext1 + (W1 , W ǫ ) 6= 0
(5.5)
Ext1 (A1 , B1 ) =
L1
j
G
by Lemma 3.3.
Suppose first that p = 3. Then L1 ∼
= SL2 (3a ) for some a ≥ 2, and
W1 = A1 ⊗k k ⊗k . . . ⊗k k, Wj = B1ǫ ⊗k k ⊗k . . . ⊗k k.
We may also assume that A1 is the natural kL1 -module. If a = 2, then by (5.5) and
(3)
[2, Corollary 4.5] we have that B1 is isomorphic to the Frobenius twist A1 of A1 , and
Ext1L1 (A1 , B1 ) ∼
= k2 . Thus Wj is uniquely determined, and so dimk Ext1G (V, V ǫ ) ≤ 2 by
Propositions 5.6 and 5.7. Suppose now that a > 2. Since G1 := StabG (V1 ) stabilizes
the isomorphism class of W1 , we see that G1 normalizes each of L1 and L2 ∗ . . . ∗ Ln ,
and induces an inner-diagonal automorphism of L1 . Next, by (5.5) and [2, Corollary 4.5]
(3)
(3a−1 )
we have that B1 is isomorphic to one of the Frobenius twists A1 , A1
of A1 , and
Ext1L1 (A1 , B1 ) ∼
= k. Thus there are at most two possibilities for Wj , each stabilized by G1 .
If only one of them occurs among the submodules Wi , then we have dimk Ext1G (V, V ǫ ) ≤ 1
by Propositions 5.6 and 5.7. Suppose that both of them occur, say for j1 and j2 . It follows
that G1 = StabG (Vj1 ) = StabG (Vj2 ) and furthermore both Vj1 and Vj2 are irreducible over
G1 . Then, arguing as in the proof of Proposition 5.6 we have
1
ǫ ∼
ǫ
Ext1G (V, V ǫ ) = Ext1G (IndG
G1 ((V1 )G1 ), V ) = ExtG1 ((V1 )G1 , VG1 )
∼
= Ext1 ((V1 )G , (V ǫ )G ) ⊕ Ext1 ((V1 )G , (V ǫ )G )
G1
1
j1
1
G1
1
j2
1
has dimension at most 2. In fact, Example 5.9 shows that the upper bound 2 can indeed
be attained.
Suppose now that p > 3. Then by Lemma 4.3, L1 = SL2 (p) (modulo a central subgroup),
A1 ∼
= B1 , Ext1L1 (A1 , B1 ) ∼
= k, Wj ∼
= W1ǫ , and Ext1G+ (W1 , Wjǫ ) ∼
= k.
(iv) We have shown that in the case of Theorem 1.5(i), there is a unique j such that
Ext1G+ (W1 , Wjǫ ) 6= 0, in which case it has dimension 1. Hence we are done by Propositions
5.6 and 5.7.
Example 5.9. (i) Let p = 5 and let S = L1 × L2 , with Li ∼
= SL2 (5), be acting on V =
W1 ⊗ W2 , where Wi ∼
= k2 is an irreducible kLi -module and Li acts trivially on W3−i . Note
ADEQUATE SUBGROUPS AND INDECOMPOSABLE MODULES
27
that the kernel of this action is the diagonal cyclic subgroup Z ∼
= C2 of Z(L1 )× Z(L2 ). Now
G = G+ := S/Z ∼
(5)
acts
faithfully
and
irreducibly
on
V
, and dimk Ext1G (V, V ) = 2
= Ω+
4
∗
∼
by Lemma 3.3. Also, V = V .
(ii) Let p = 3, S = SL2 (3a ) for some a ≥ 2 coprime to 3, W1 = k2 be the natural
i
kS-module, and let Wi+1 denote the Frobenius (W1 )(3 ) twist of W1 for 1 ≤ i ≤ a − 1. Then
G = S ⋊ hσi (with σ being the field automorphism of S, of order a) acts irreducibly and
faithfully on V = W1 ⊕ . . . ⊕ Wa , G+ = S, and
a
M
1
∼
Ext1S (W1 , Wi ) ∼
(5.6)
ExtG (V, V ) =
= k2
i=1
by [2, Corollary 4.5]. (Indeed, if a = 2 then Ext1S (W1 , W2 ) ∼
= k2 . If a ≥ 3, then
Ext1S (W1 , W2 ) ∼
= Ext1S (W1 , Wa ) ∼
= k. All other summands in the middle term of (5.6)
are zero.) Also, V ∼
= V ∗.
(iii) Let p = 2f + 1 be a Fermat prime and let H = Op′ (H)P (with P ∼
= Cp and
1+2f
p−1
∼
as in case (i) of
Op′ (H) = 2− ) acting faithfully and absolutely irreducibly on W1 = k
Theorem 2.1. Note that the kH-module W1 is self-dual. Let n be coprime to p and let
G = H1 ≀ Cn = (H1 × . . . × Hn ) ⋊ Cn
∼
with Hi = H1 = H, so that G+ = H1 × . . . × Hn . Inflate W1 to a kG+ -module and consider
+
V := IndG
G+ (W1 ). Note that J := Op′ (G ) acts absolutely irreducibly on W1 , and
W1∗ ⊗ W1 = CW1∗ ⊗W1 (J) ⊕ [W1∗ ⊗ W1 , J]
with CW1∗⊗W1 (J) ∼
= k. Since G+ /J ∼
= Cpn , it now follows that
Ext1G+ (W1 , W1 ) ∼
= H 1 (G+ , W1∗ ⊗ W1 ) ∼
= H 1 (G+ /J, k) ∼
= kn .
On the other hand, the actions of J on W1 and Wj have different kernels for any j > 1,
and so Ext1G+ (W1 , Wj ) = 0. Hence V ∼
= V ∗ and
Ext1 (V, V ) ∼
= Ext1 + (W1 , W1 ) ∼
= Ext1 + (W1 , VG+ ) ∼
= kn .
G
G
G
Next we strengthen Theorem 1.5 in the case dim W is small.
Theorem 5.10. Let k be a field of characteristic p and let V and V ′ be absolutely irreducible faithful kG-modules. Suppose that dimk W + dimk W ′ ≤ p − 2, where W and W ′
are irreducible kG+ -submodules of V and V ′ , respectively. Then H 1 (G, M ) = 0 for any
subquotient M of the G-module V ⊗ V ′ .
Proof. It suffices to prove H 1 (G+ , M ) = 0. Note that VG+ = ⊕ti=1 Wi and VG′ + = ⊕sj=1 Wj′
with Wi , Wj′ ∈ IBrp (G+ ), and Op (G+ ) ≤ Op (G) = 1. Since
(5.7)
dimk Wi + dimk Wj′ ≤ p − 2,
by the main result of [19] we have Ext1G+ (Wi∗ , Wj′ ) = 0. It follows that Ext1G+ (VG∗+ , VG′ + ) =
0, i.e. H 1 (G+ , (V ⊗ V ′ )G+ ) = 0. By Corollary 1 to [55, Theorem 1], (5.7) also implies
that the G+ -module V ⊗ V ′ is semisimple. Thus M is isomorphic to a direct summand of
(V ⊗ V ′ )G+ , whence H 1 (G+ , M ) = 0, as desired.
28
R. GURALNICK, F. HERZIG, AND P. TIEP
Corollary 5.11. Let k be a field of characteristic p and let V be an absolutely irreducible
faithful kG-modules. Suppose that dimk W < (p − 1)/2 for any irreducible kG+ -submodule
of V . Then H 1 (G, Sym2 (V )) = H 1 (G, ∧2 (V )) = 0.
✷
6. Modules of dimension p
Let p be a prime and let k be algebraically closed of characteristic p. The aim of
this section is to show that if G is an irreducible subgroup of GLp (k) = GL(V ), then
almost always (G, V ) is adequate (using Thorne’s new definition). We begin with some
observations.
Remark 6.1. Suppose that G ≤ GL(V ) is a finite irreducible subgroup. Note that, to show
(G, V ) is adequate it suffices to show that G+ is adequate on V . Indeed, any subgroup
being weakly adequate implies that the spanning condition holds for G. Next, adequacy
for any subgroup containing a Sylow p-subgroup of G implies that necessary vanishing of
H 1 for G.
Lemma 6.2. Let G be a finite group with a Sylow p-subgroup P of order p and let V ∈
IBrp (G) be such that p | (dim V ). Then V is projective.
Proof. Assume that V is non-projective and set N := NG (P ). By the Green correspondence
[29, Lemma 4.1.1], in this case we have VN = W ⊕ M , where W is a non-projective
indecomposable N -module and M is a projective N -module (or zero). Now W belongs to
an N -block b of defect 1. By [29, Lemma 4.2.14], W is a uniserial (non-projective) quotient
of P(U ) where U := head(W ) ∈ IBrp (N ). By [29, Lemma 4.2.13], P(U ) has length p,
so W has length l < p. According to [29, Remark 4.2.11], all simple kN -modules in b
are of the same dimension d and have P in their kernel. It follows that d divides |N/P |
and so d is coprime to p. Hence p ∤ dl = dim W and so p ∤ (dim V ) (as p | (dim M )), a
contradiction.
Lemma 6.3. Let G be a finite group with a cyclic Sylow p-subgroup P and p = char(k).
Suppose that G = Op (G). Then H 1 (G, k) = H 2 (G, k) = 0.
Proof. The vanishing of H 1 (G, k) is obvious. Suppose that H 2 (G, k) 6= 0. Since the dimension of H 2 does not change under extension of scalars, we may assume that H 2 (G, Cp ) 6= 0.
As moreover H 1 (G, Cp ) = 0, it follows that p divides the order of the Schur multiplier of
G. It is well known that the latter then implies that Sylow p-subgroups of G are non-cyclic
(see e.g. [32, Corollary (11.21)]).
Next we give an example showing that for modules of dimension 2p, we can satisfy all
conditions aside from the spanning condition.
Example 6.4. Assume that p > 2. Let C be a nontrivial cyclic group of order coprime to p,
with a faithful character λ : C → k× , and let G = C ≀D where D is a dihedral group of order
2p. Let V be the irreducible kG-module of dimension 2p induced from the 1-dimensional
representation with character
λ ⊗ 1C ⊗ . . . ⊗ 1C
ADEQUATE SUBGROUPS AND INDECOMPOSABLE MODULES
29
of the abelian normal subgroup A = C × C × . . . × C ∼
= C 2p of G. Let E be the unique
subgroup of D of order p. Note that V = V1 ⊕ V2 , where the Vi are irreducible AEsubmodules of V (of dimension p). Then the following statements hold:
(i) H 1 (G, k) = H 2 (G, k) = 0 by Lemma 6.3;
(ii) Ext1G (V, V ) = 0 (indeed, V is projective by Lemma 6.2);
(iii) The span M of the p′ -elements of G in End(V ) is precisely A ⊕ Hom(V1 , V2 ) ⊕
Hom(V2 , V1 ), where A is the image of kA in End(V1 ) ⊕ End(V2 ).
Now we describe all irreducible linear groups of degree p:
Proposition 6.5. Let k be an algebraically closed field of characteristic p and let G <
GLp (k) be a finite irreducible subgroup. Then one of the following holds:
(i) G is imprimitive on W := kp , G < GL1 (k) ≀ Sp , and furthermore A := G ∩ GL1 (k)p
is non-central in G;
(ii) G is almost quasisimple. Furthermore, H := G(∞) is quasisimple of order divisible
by p acting irreducibly on W , and so (H, W ) is as described in Theorem 2.2.
Proof. By the hypothesis, G acts irreducibly on W = kp . Suppose the action is imprimitive.
Then G permutes transitively the p summands of a decomposition W = W1 ⊕ . . . ⊕ Wp ,
with kernel say A. If A 6≤ Z(G), we arrive at (i). Assume that A ≤ Z(G). Note that
S := G/A is a transitive subgroup of Sp , and so we can apply the main result of [65] to
S. In particular, if S is solvable, then S = P : C with P ∼
= Cp and C ≤ Cp−1 . Then AP
is a normal abelian subgroup of G, whence by Ito’s theorem the degree of any χ ∈ Irr(G)
divides [G : AP ] | (p − 1). On the other hand, G is solvable, and so by the Fong-Swan
theorem, W lifts to an irreducible complex module of dimension p, a contradiction. Thus
S is non-solvable, which implies by [65] that S is almost simple, G is almost quasisimple,
and H := G(∞) is a normal subgroup of index coprime to p. Since dim W = p, the last
condition also implies that H is irreducible on W and so we arrive at (ii).
We may now assume that the G-module W is primitive. Since dim(W ) = p is prime, this
module cannot be tensor decomposable nor tensor induced. Now we can apply Aschbacher’s
theorem in the version given in [28, Proposition 2.8] to (G, W ) to conclude that G is almost
quasisimple: S ✁ G/Z(G) ≤ Aut(S) for some non-abelian simple group S. In particular,
H = G(∞) ✁ G is quasisimple, and moreover irreducible on W by [28, Lemma 2.5]. Hence
we can apply Theorem 2.2 to (H, W ).
6.1. Imprimitive case.
Proposition 6.6. Suppose we are in case (i) of Proposition 6.5. Then (G, W ) is adequate
if and only if |G/A| =
6 p.
Proof. Let P ∈ Sylp (G), so that |P | = p (if P = 1 then G cannot act irreducibly on W ). If
|G/A| = p, then G = AP , A = Op′ (G) contains all the p′ -elements of G but does not act
irreducibly on W (as A is a p′ -group), whence G is not weakly adequate.
Now assume that |G/A| 6= p; in particular, p > 2. Suppose that G has a normal pcomplement K. Then K = Op′ (G) > A (as otherwise G = AP and so |G/A| = p), and
H := G/A ≤ Sp has a normal p-complement K/A 6= 1. Thus H is a transitive subgroup of
Sp with Cp as a composition factor. But then Op′ (H) = 1 by Lemma 4.8, a contradiction.
30
R. GURALNICK, F. HERZIG, AND P. TIEP
Thus G cannot have a normal p-complement, and so H i (G, k) = 0 for i = 1, 2 by Lemma
6.3. Also, W is projective as a G-module by Lemma 6.2, whence Ext1G (W, W ) = 0.
Since A 6≤ Z(G), A has p distinct eigenspaces W1 , . . . , Wp on W permuted transitively
by P . Thus, it remains only to prove that
End(W ) ∼
= ⊕1≤i,j≤p Hom(Wi , Wj )
is spanned by the images of the p′ -elements of G. Given 1 ≤ i 6= j ≤ p, we claim that there
exists a p′ -element x ∈ G with xWi = Wj . Since P is transitive on {W1 , . . . , Wp }, we can
choose y ∈ P with yWi = Wj . Note that N acts on this set as the Frobenius subgroup
Cp ⋊ Cs of Sp , with kernel A ∩ N , and all the elements of (Cp ⋊ Cs ) \ Cp are p′ -elements. So,
since s > 1, we can find z ∈ N \ AP such that zWj = Wj and set x := zy. Then xWi = Wj
and x ∈ N \ AP , whence x is a p′ -element.
Now B := hA, xi is a p′ -group. Note that WA = ⊕pa=1 Wa is a direct sum of p nonisomorphic simple A-submodules. Hence WB = ⊕tb=1 Ub is a direct sum of t ≥ 1 nonisomorphic simple B-modules, with U1 ⊇ Wi ⊕ Wj . By the Artin-Wedderburn theorem,
the image of kB in End(W ) is just ⊕tb=1 End(Ub ), and so it contains
End(U1 ) ⊇ End(Wi ) ⊕ End(Wj ) ⊕ Hom(Wi , Wj ) ⊕ Hom(Wj , Wi ),
and the result follows.
6.2. Chevalley groups in characteristic p. We first point out the following:
Proposition 6.7. Let H be a quasisimple finite group of Lie type in characteristic p. Let k
be an algebraically closed field of characteristic p. Let W be a faithful irreducible kH-module
of prime dimension r ≤ p. Then one of the following statements holds:
(i) H = SL2 (pa ) for r = 2 and H = PSL2 (pa ) for r > 2;
(ii) H = SLr (pa ) or SUr (pa ), and r > 2;
(iii) H = Ωr (pa ) and r ≥ 5; or
(iv) r = 7 and H = G2 (pa ).
Proof. Since char(k) = p and V is faithful, Op (H) = 1. Hence there is a simple simply
connected algebraic group G in characteristic p and a Frobenius endomorphism F : G → G
such that H ∼
= G/Z for G := G F and Z ≤ Z(G). Inflate W to a kG-module. Since
r = dim W is prime, W is tensor indecomposable and in particular is a twist of a restricted
representation. So we may assume that W is restricted and extend W to a kG-module.
By [36], it follows that W = L(λ) where λ is a dominant weight, and dim W equals the
dimension of the Weyl module V (λ) labeled by λ. Thus, we can apply the same result for
characteristic 0 which was proved by Gabber [39, 1.6].
Proposition 6.8. Suppose we are in case (ii) of Proposition 6.5. Assume in addition that
H = G(∞) is a quasisimple group of Lie type in characteristic p > 3. Then (G, W ) is
adequate.
Proof. By the hypothesis, we have that H is quasisimple and irreducible on W . So we
can apply Proposition 6.7 to H; in particular we have that WH = L(λ) is a restricted
module (up to a Frobenius twist; in what follows we will ignore this twist). In the case
H = PSL2 (pa ), we have that λ = (p − 1)̟1 , where ̟1 is the fundamental weight. Since
ADEQUATE SUBGROUPS AND INDECOMPOSABLE MODULES
31
WH is G-invariant, we see that G cannot induce nontrivial field automorphisms on H; in
particular, G+ = H. In other cases, applying Propositions 5.4.11 and 5.4.12 of [40], we
see that WH ∼
= N or N ∗ where N is the natural kH-module of dimension p (with highest
weight ̟1 ), and again G+ = H.
By Remark 6.1, without loss we may now assume G = H. Note that all the classical
groups given in the previous proposition when r = p contain an irreducible subgroup
L∼
= PSL2 (p). Indeed, the irreducible kL-representation of degree p embeds L in M ∼
= Ωp (p).
In turn, M embeds in SLp (q) and SUp (q) for any q = pa . The same is true for G2 (p) with
p = 7: G2 (7) > G2 (2) > PSL2 (7). (It is well known, see e.g. [41] that H = G2 (7) contains
a maximal subgroup X ∼
= G2 (2) which acts irreducibly on the minimal 7-dimensional Hmodule W . Next, X contains a maximal subgroup Y ∼
= PSL2 (7), cf. [10]. Using [34] one
can check that Y is irreducible on W .) Thus weak adequacy follows by [23, Proposition
3.1].
It is well known that H 1 (G, k) = H 2 (G, k) = 0 (since p > 3). Thus, it suffices to show
that Ext1G (W, W ) = 0. If G = PSL2 (pa ), the result follows by [2]. If G = Ω5 (5), one
computes directly that Ext1G (W, W ) = 0 (this was done by Klaus Lux). In all other cases,
Ext1G (W, W ) = 0 by the main result of [48].
6.3. Remaining cases.
Lemma 6.9. Let k = k̄, H = Ap+1 with p ≥ 5, and let W be an irreducible kH-module of
dimension p. Then (H, W ) is weakly adequate.
Proof. Note that W is irreducible over a subgroup L ∼
= PSL2 (p) of H. Hence the claim
follows by [23, Proposition 3.1].
We record the following useful observation:
Lemma 6.10. Let X be a finite p′ -subgroup of G < GL(W ) where W is a finite dimensional
vector space over k. Suppose that WX is multiplicity-free. Then (End(W )/M)X = 0.
Proof. Note that the X-module End(W ) is semisimple. Furthermore, the multiplicity-free
assumption implies M ⊇ End(W )X by the Artin-Wedderburn theorem. Hence the claim
follows.
Proposition 6.11. Let k = k̄, H = PSp2n (q) with 2 < p = (q n ± 1)/2, and let W be an
irreducible kH-module of dimension p. Then (H, W ) is weakly adequate.
Proof. (a) Note that W is a Weil module and restricts irreducibly to a subgroup PSL2 (q n )
of H. So without loss we may assume n = 1. We will inflate W to a kL-module for
L := SL2 (q). Note that W is obtained by reducing modulo p one of the four complex
Weil modules of L, with characters ηi of degree (q − 1)/2 and ξi of degree (q + 1)/2, where
i = 1, 2 and ξi + ηi is a reducible Weil character of L, see e.g. [24] and [64]. Let τ denote the
permutation character of L acting on the set of all vectors of the natural module N := F2q .
Using the character table of L as given on [13, p. 155], we see that
(6.1)
(ξi + ηi )(ξ̄i + η̄i ) = τ.
32
R. GURALNICK, F. HERZIG, AND P. TIEP
Let P := StabL (hviFq ) for some 0 6= v ∈ N with normal subgroup Q := StabL (v) of order
q, and let ϕ denote the Brauer character of W . Assume the contrary: M =
6 End(W ), and
let ϑ denote the Brauer character of Q := End(W )/M.
(b) Consider the case p = (q + 1)/2, whence ϕ = ξi◦ and P is a p′ -group. Inspecting
the values of ϕP , we see that WP = W1 ⊕ W2 with W1 , W2 ∈ Irr(P ) of dimension 1 and
(q − 1)/2 > 1. Moreover, (W1 )Q is trivial, and W2Q = 0. By the Artin-Wedderburn theorem
applied to P , M ⊇ End(W1 ) ⊕ End(W2 ); in particular, dim MP ≥ 2 = dim End(W )P .
Hence we conclude that for any composition factor Y of End(W )/M, Y Q = 0 and dim Y ≤
q − 1.
Let ρ denote the permutation character of L acting on the 1-spaces of N . Then ρ =
1L + St, where St is the Steinberg character of L. Moreover, all irreducible constituents of
τ − ρ − 1L have degree q + 1 or (q + 1)/2 and thus have p-defect 0. Note that St◦ = 1L + ψ
with ψ ∈ IBrp (L) (see [7]), and ρ is the character of the PIM P(1L ) of 1L . Since ϕ = ξi◦ has
degree p and (the projective module) End(W ) contains a trivial simple submodule, we see
that End(W ) is the direct sum of P(1L ) and some p-defect 0 modules of dimension q + 1
or (q + 1)/2. In particular, since ψ is the Brauer character of the heart of P(1L ), it cannot
be afforded by a quotient of End(W ), and so ϑ 6= ψ. Since ϑ(1) ≤ q − 1, it follows that
all irreducible constituents of ϑ are of degree 1 (with multiplicity ≤ 2) and (q + 1)/2 (with
multiplicity ≤ 1). But the principal character and the Weil characters of degree (q + 1)/2
of L all contain 1Q when restricted to Q, a contradiction.
(c) Now assume that p = (q − 1)/2; in particular, ϕ = ηi◦ and q ≡ 3(mod 4). Consider a
cyclic subgroup C ∼
= C(q+1)/2 of H. It is straightforward to check that for any χ ∈ Irr(H),
either [χQ , 1Q ]Q 6= 0 or [χC , 1C ]C 6= 0. Since irreducible p-Brauer characters of H lift to
complex characters (cf. [7]), it follows that for any U ∈ IBrp (H), either U Q 6= 0, or U C 6= 0.
Now we may assume ϕ = η1◦ and observe that both ϕQ and ϕC are multiplicity-free.
Hence, each of Q, C has no nonzero fixed points on End(W )/M by Lemma 6.10. Consequently, M = End(W ).
Proposition 6.12. Let k = k̄ and let H = SLn (q), where either 3 < p = (q n − 1)/(q − 1)
or (n, p) = (2, q − 1). Let W be an irreducible kH-module of dimension p. Then (H, W ) is
weakly adequate.
Proof. Let N = he1 , . . . , en iFq denote the natural Fq H-module, and let P := StabH (he1 iFq ).
Since SL2 (4) ∼
= PSL2 (5) and SL3 (2) ∼
= PSL2 (7), we may assume (n, q) 6= (2, 4), (3, 2). Also,
let ϕ denote the Brauer character of W .
(a) First we consider the case p = (q n − 1)/(q − 1). In this case, W is induced from a
one-dimensional kP -module with character say λ. So we can write W = ⊕ω∈PN Wω as a
direct sum of one-dimensional subspaces Wω permuted transitively by H, where PN is the
set of 1-spaces in N .
(a1) Assume in addition that n ≥ 3. It suffices to show that, for any two distinct
ω1 = heiFq , ω2 = hf iFq ∈ PN ,
(6.2)
M ⊇ End(Wω1 ) ⊕ Hom(Wω1 , Wω2 ) ⊕ Hom(Wω2 , Wω1 ).
Since H acts transitively on those pairs (ω1 , ω2 ), we may assume that e = e1 and e = e2 .
ADEQUATE SUBGROUPS AND INDECOMPOSABLE MODULES
33
Consider an opposite parabolic subgroup R := StabH (N1 ) for N1 := he1 , . . . , en−1 iFq ,
which is a p′ -subgroup. Then R stabilizes the subspace W1 := ⊕ω∈PN1 Wω of dimension
(q n−1 − 1)/(q − 1). Note that the unipotent radical Q of R acts trivially on W1 . Indeed,
q ≥ 3 since we are assuming n ≥ 3 and (n, q) 6= (3, 2). Now the Levi subgroup L :=
StabH (N1 , hen iFq ) of R acts transitively on q n−1 −1 > dim W1 nontrivial linear characters of
Q, whence the claim follows. Now we identify L with GLn−1 (q) via diag(X, det(X)−1 ) 7→ X.
Then the L-character of W1 is just induced from the character λP ∩L 6= 1P ∩L of the maximal
parabolic subgroup P ∩ L (of index (q n−1 − 1)/(q − 1)) of L. Hence W1 is an irreducible Weil
module of dimension (q n−1 − 1)/(q − 1) for L, and it is irreducible over R. Note that λ is a
linear character of order dividing q − 1 = |P/P ′ | and so it takes value 1 on any unipotent
element of P . Using this, one can check that ϕ(t) = (q n−1 − 1)/(q − 1) for any 1 6= t ∈ Q.
In particular,
ϕQ =
q n−1 − 1
· 1Q +
q−1
X
ν = (dim W1 + 1) · 1Q +
X
ν.
1Q 6=ν∈Irr(Q)
ν∈Irr(Q)
It now follows (by Clifford’s theorem) that WR = W1 ⊕ W2 ⊕ W3 , where W2 has dimension
1, W Q = W1 ⊕ W2 , and W3 is irreducible of dimension q n−1 − 1. Applying the ArtinWedderburn theorem, we see that M ⊇ End(W1 ). Since e1 , e2 ∈ N1 , (6.2) follows.
(a2) Assume now that n = 2, and so p = q + 1 ≥ 17. In this case, ϕ is real, and so W is
self-dual and supports a non-degenerate H-invariant symmetric bilinear form (·, ·). Write
P = QT where Q is elementary abelian of order q and T ∼
= Cq−1 . We also consider another
parabolic subgroup P ♯ = Q♯ T := StabH (he2 iFq ), with T = P ∩ P ♯ . Letting ρ denote the
regular character of T and ν := λT , we see that
X
(6.3)
ϕT = ρ + ν + ν −1 , ϕQ = 1Q +
α.
α∈Irr(Q)
Next, using (6.3) one can see that WP = CW (Q) ⊥ [W, Q], a direct orthogonal sum of
two P -submodules. Here, C := CW (Q) is of dimension 2 and affords
the T -character
P
ν + ν −1 , [W, Q] is of dimension q − 1 and affords the Q-character 1Q 6=α∈Irr(Q) α and the
T -character ρ (as T permutes cyclically and transitively the q − 1 non-principal irreducible
characters of Q). It also follows that these two subspaces are non-degenerate and self-dual
P -submodules. Next, we can further decompose:
[W, Q] = A ⊥ B
as an orthogonal sum of two self-dual T -modules, where A affords the T -character ρ − ν −
ν −1 , and B affords the T -character ν + ν −1 . Summarizing, we have that
WP = A ⊥ B ⊥ C,
where A ⊥ B is an irreducible P -module of dimension q − 1, and C is a sum of two
irreducible P -modules of dimension 1. Applying the Artin-Wedderburn theorem to (P, W ),
we obtain
(6.4)
M ⊃ End(A ⊕ B) := {f ∈ End(W ) | f (A ⊕ B) ⊆ A ⊕ B, f (C) = 0}.
34
R. GURALNICK, F. HERZIG, AND P. TIEP
Repeating the above argument for P ♯ instead of P , we have that
WP ♯ = A♯ ⊥ B ♯ ⊥ C ♯ ,
where A♯ affords the T -character ρ − ν − ν −1 , B ♯ affords the T -character ν + ν −1 , and
C ♯ = CW (Q♯ ) affords the T -character ν + ν −1 , and
(6.5)
M ⊃ End(A♯ ⊕ B ♯ ) := {f ∈ End(W ) | f (A♯ ⊕ B ♯ ) ⊆ A♯ ⊕ B ♯ , f (C ♯ ) = 0}.
Comparing with (6.3), we see that A♯ = A. Furthermore, C ∩ C ♯ is centralized by hQ, Q♯ i =
H, so C ∩C ♯ = 0. But both C and C ♯ are of dimension 2 and orthogonal to A = A♯ , whence
C ⊕ C ♯ = A⊥ . Next, B ∩ B ♯ is a subspace of the non-degenerate subspace A⊥ which is
orthogonal to both C and C ♯ , so B ∩ B ♯ = 0. Since dim B + dim B ♯ = 4 = dim A⊥ , we have
shown that
A♯ = A, A⊥ = B ⊕ B ♯ = C ⊕ C ♯ , W = A ⊥ (B ⊕ B ♯ ).
Suppose now that f ∈ End(W ) belongs to both End(A ⊕ B) and End(A ⊕ B ♯ ) as identified
in (6.4) and (6.5). Then f = 0 on C ⊕ C ♯ = A⊥ , i.e. f (A⊥ ) = 0. Next,
f (A) ⊆ (A ⊕ B) ∩ (A ⊕ B ♯ ) = A.
It follows that
End(A ⊕ B) ∩ End(A ⊕ B ♯ ) ⊆ End(A) := {f ∈ End(W ) | f (A) ⊆ A, f (A⊥ ) = 0},
and so by (6.4), (6.5) we have
dim M ≥ 2(q − 1)2 − (q − 3)2 = q 2 + 2q − 7,
i.e. codimEnd(W ) M ≤ 8.
On the other hand, all non-principal ψ ∈ IBrp (H) have degree ≥ q − 1 ≥ 15. So,
assuming M 6= End(W ), we see that all composition factors of the H-module Q :=
End(W )/M are trivial. Since H is perfect, it follows that H acts trivially on Q. But
dim HomkH (End(W ), 1H ) = 1, so M is contained in the unique submodule E0 := {f ∈
End(W ) | tr(f ) = 0} of codimension 1 in End(W ). But this is a contradiction, since
by (6.4), M contains the map g which acts as identity on A ⊕ B and as 0 on C, with
tr(g) = q − 1 = p − 2 6= 0.
(b) Now we handle the case p = q − 1 (so 2 | q ≥ 8). Then for the unipotent radical Q
of P we have
M
WQ =
Wα
1Q 6=α∈Irr(Q)
with Wα affording the Q-character α. Next, let S ∼
= Cq+1 be a non-split torus in H. Then
there is some 1S 6= γ ∈ Irr(S) such that
M
WS =
Wβ
β∈Irr(S), β6=γ,γ −1
with Wβ affording the S-character β. Thus both Q and S are multiplicity-free on W . By
Lemma 6.10, we see that for any composition factor U of End(W )/M, U Q = U S = 0. On
the other hand, inspecting the (Brauer) character table of H (see [7]), one sees that U Q 6= 0
if dim U = 1, q, q + 1 and U S 6= 0 if dim U = q − 1, for any U ∈ IBrp (H). Hence we conclude
that M = End(W ).
ADEQUATE SUBGROUPS AND INDECOMPOSABLE MODULES
35
Proposition 6.13. Let k = k̄ and let H = SUn (q) with 3 < p = (q n + 1)/(q + 1) and n ≥ 3.
Let W be an irreducible kH-module of dimension p. Then (H, W ) is weakly adequate.
Proof. Let ϕ denote the Brauer character of W and let N := Fnq2 denote the natural Fq2 Hmodule. Recall that H possesses the so-called reducible Weil character
dimF
ζn,q : g 7→ (−1)n (−q)
(6.6)
q2
Ker(g−1)
for all g ∈ H, which decomposes as the sum of q + 1 distinct irreducible Weil characters
ζn,q =
q
X
ζni
i=0
(q n − q)/(q + 1)
(q n + 1)/(q + 1)
(of degree
for i = 0 and
for i > 0), see [64]. Then ϕ can be
j
′
obtained by restricting some ζn with j > 0 to p -elements of H. We also let P := StabH (U )
for a maximal totally singular subspace U of N , with unipotent radical Q (so P is a p′ group), and let ρ denote the permutation character of H acting on the set Ω of singular
1-spaces of N .
(a) First we show that
• the only irreducible constituents of ζnj ζ̄nj that are not of p-defect 0 are 1H and (possibly)
another one, σ, of degree
(6.7)
σ(1) =
(q n − q)(q n + q 2 )
;
(q 2 − 1)(q + 1)
• all p-defect 0 constituents of ζnj ζ̄nj have degree > 2p if n > 3, and
• σ is the Steinberg character St of H if n = 3 and it is a constituent of ρ if n > 3.
Indeed, (6.6) implies that (ζn,q )2 is just the permutation character of H acting on the point
set of N , and at the same time it equals the restriction to H of the reducible Weil character
ζ2n,q of SU2n (q), if we embed H diagonally into SU2n (q): X 7→ diag(X, X). Assume n > 3.
Then all irreducible constituents of the latter restriction are described by [44, Proposition
6.3], and their degrees are listed in [44, Table III]. It follows that (ζn,q )2 has exactly two
non-p-defect 0 irreducible constituents, namely 1H (with multiplicity q + 1) and another
one σ of indicated degree (with multiplicity q). Certainly, the permutation representation
of H on (the point set of) N contains the permutation representation of G on Ω as a
subrepresentation (no matter if n > 3 or not). On the other hand, ρ contains an irreducible
constituent of degree as listed in (6.7) (see [57, Table 2]), so ρ = 1H + σ + ψ (and ψ ∈ Irr(H)
has p-defect 0). One also easily checks all defect 0 constituents of (ζn,q )2 have degree > 2p.
Suppose that n = 3; in particular 3 ∤ (q + 1) and q > 2. Inspecting the character table
of H = SU3 (q) as given in [17], we see that the only non-p-defect 0 irreducible characters
of H are 1H , the Weil character ζ30 of degree q 2 − q, the Steinberg character St of degree
(u)
q 3 matching (6.7), and (q 2 − q)/3 characters χ(q+1)2 (q−1) . Direct calculations show that
(u)
[ζ3j ζ̄3j , χ(q+1)2 (q−1) ]H = 0. Next, observe that
H
(ζ3,q )2 = 1H + 1H
Q + (q − 1)1L ,
36
R. GURALNICK, F. HERZIG, AND P. TIEP
where Q = StabH (u) is the unipotent radical of P as above (if U = huiFq2 ) and L =
StabH (v) ∼
= SU2 (q) for some non-singular v ∈ N . Furthermore,
[(ζ30 )Q , 1Q ]Q = 0, (ζ30 )L =
q
X
ζ2i .
i=1
[ζ30 , 1H
Q ]H
The former relation implies
= 0. On the other hand, by [64, Lemma 4.7(ii)],
i
each ζ2 in the latter relation is obtained by restricting an irreducible character of degree
q − 1 ≥ 2 of GU2 (q) ✄ L to L. It follows by Clifford’s theorem that [ζ30 , 1H
L ]H = 0. Thus we
have shown that ζ30 is not a constituent of (ζ3,q )2 , as claimed.
(b) Now we show that, if β is an irreducible constituent of ϕϕ̄ and β 6= 1H , then either
β(1) ≥ 2p, or n = 3, β(1) = p, and [βQ , 1Q ]Q > 0. Indeed, suppose that β(1) < 2p. Suppose
for the moment that n > 3. Then by the results of (a), β is a constituent of the Brauer
character σ ◦ . But according to [43], σ ◦ − 1H ∈ IBrp (H), so β(1) = σ(1) − 1 > 2p by (6.7), a
contradiction. Thus n = 3. If moreover β is in a block of p-defect 0, then using [17, Table
3.1] we see that β(1) = p, β = (ζ3i )◦ for some i > 0 and so βQ contains 1Q . Otherwise, by
the results of (a), β is a constituent of St◦ . In this case, according to [17, Theorem 4.2],
St◦ − 1H ∈ IBrp (H) and so β(1) = St(1) − 1 = q 3 − 1 > 2p, again a contradiction.
(c) When n ≥ 5, according to Lemmas 12.5 and 12.6 of [24], ϕZ(Q) contains a nonprincipal linear character λ, whose P -orbit O has length (q n−1 − 1)/(q + 1); moreover, any
irreducible character of Q above λ has degree q. Since ϕ(1) = (q n + 1)/(q + 1), it follows
that WP = A ⊕ B, where B := CW (Z(Q)) has dimension 1, A := [W,
P Z(Q)] ∈ Irr(P ) has
dimension (q n − q)/(q + 1) = p − 1 and affords the Z(Q)-character q α∈O α. The same is
also true for n = 3, see Tables 2.1 and 3.1 of [17]. Applying the Artin-Wedderburn theorem
to (P, W ), we see that
M ⊇ End(A) ⊕ End(B).
In particular, if M 6= End(W ), then any composition factor X of the H-module End(W )/M
has dimension ≤ 2p − 2 and moreover X Q ⊆ X Z(Q) = 0. But this is impossible by the
results of (b).
Lemma 6.14. Let k = k̄ and let W be an irreducible kH-module of dimension p ≥ 3,
where H is quasisimple and (H, W ) is one of the non-serial examples listed in Tables I,IIa,
IIb, or III. Then (H, W ) is weakly adequate.
Proof. Let ϕ denote the Brauer character of W . Note that the cases (H, p) = (A5 , 3), (A6 , 5)
are covered by Proposition 6.11 since A5 ∼
= PSp2 (5) and A6 ∼
= PSL2 (9).
Suppose that (H, p) = (Sp6 (2), 7). Then H > L ∼
= SL2 (8), and ϕL is irreducible (see
[34]), so we are done by Proposition 6.12.
Assume that (H, p) = (M11 , 11). Then H contains a p′ -subgroup L = M10 ∼
= A6 · 23 ,
and using [16] we can check that ϕL = λ + ψ, where λ, ψ ∈ Irr(L) are rational of degree 1
and 10 (and λ 6= 1L ). It follows that WL = A ⊕ B, where A affords the character λ and
B affords the character ψ. Applying the Artin-Wedderburn theorem to (L, W ) we see that
M ⊇ End(A) ⊕ End(B). In particular, if M 6= End(M ), then any composition factor U of
the H-module End(W )/M has dimension ≤ 20 and moreover all composition factors of UL
afford the character λψ = ψ. The latter condition also implies that dim U = 10 or 20. On
ADEQUATE SUBGROUPS AND INDECOMPOSABLE MODULES
37
the other hand, using [34] and [16] we see that any such U must be of dimension 10 and
its character restricted to L yields an irreducible non-rational character, different from ψ.
Hence M = End(W ).
Assume that (H, p) = (M12 , 11). Then H contains a maximal subgroup L ∼
= PSL2 (11),
and using [16] we can check that ϕL is irreducible. So we are done by [23, Proposition 3.1].
Assume that (H, p) = (M24 , 23). Then H contains a maximal subgroup L ∼
= PSL2 (23),
and using [16] we can check that ϕL is irreducible. So we are done by [23, Proposition 3.1].
Assume that (H, p) = (Co2 , 23) or (Co3 , 23). Then H contains a p′ -subgroup L ∼
= M cL,
and using [10] we can check that ϕL = 1L + ψ, with ψ ∈ Irr(L). It follows that WL = A⊕ B,
where A := CW (L) has dimension 1 and B affords the character ψ. Applying the ArtinWedderburn theorem to (L, W ) we see that M ⊇ End(A) ⊕ End(B). In particular, if
M=
6 End(M ), then any composition factor U of the H-module End(W )/M has dimension
≤ 44 and moreover U L = 0. On the other hand, using [49] we see that the only irreducible
kH-modules of dimension ≤ 44 are k and W , and both have nonzero L-fixed points. Hence
we conclude that M = End(W ).
Now we can prove Theorem 1.7 which we restate:
Theorem 6.15. Let k = k̄ be of characteristic p and let G be a finite group with a faithful
irreducible kG-module V of dimension p. Then precisely one of the following holds:
(i) G is adequate on V ;
(ii) G contains an abelian normal subgroup A of index p (and G permutes p onedimensional summands of V with kernel A); or
(iii) p = 3 and the image of G in PGL(V ) is PSL2 (9).
Proof. First assume that p > 3. Apply Proposition 6.5 to G. In the case (i) of the proposition, we are done by Proposition 6.6. So we may assume that G is almost quasisimple,
H := G(∞) is quasisimple, with simple quotient S, and H is irreducible on V . If S is of
Lie type in characteristic p, we can apply Proposition 6.8. Assume we are in the remaining
cases. In all these cases, observe that the outer automorphism group Out(S) is a p′ -group
and the Schur multiplier Mult(S) is a p′ -group as well (as p > 3). The first condition
implies that G+ = H, whence by Remark 6.1 without loss we may assume G = H and so
H 1 (G, k) = 0. The second condition implies that H 2 (G, k) = 0. Furthermore, in all cases
V lifts to a complex module of p-defect 0, whence V is projective and so Ext1G (V, V ) = 0.
Finally, H is weakly adequate on V by Propositions 6.11, 6.12, 6.13, and Lemmas 6.9, 6.14.
Now consider the cases when p = 2 or 3. If V is imprimitive the result follows as above.
So assume that V is primitive. Set H = G(∞) .
Suppose that G = H = SL2 (pa ) or PSL2 (pa ). Then a ≥ 2 and the result follows by
Corollary 9.4. If G > H then as V g ∼
= V as H-modules for all g ∈ G, G/H is a p′ -group
and G is adequate on V whenever H is. Thus the last case to consider is H = PSL2 (9) ∼
=
A6 . The normalizer of H in PGL(V ) is PGL2 (9) (the normalizer is just the subgroup of
the automorphism group which fixes the isomorphism class of V ). If the image of G in
PGL(V ) is PGL2 (9), H 1 (G, k) = H 2 (G, k) = 0 (see the proof of Corollary 9.5) and since
Ext1G (V, V ) = 0, V is adequate in this case.
By Proposition 6.5 and Theorem 2.2, the remaining cases to consider are G almost
quasisimple, p = 3 and H ∈ {A5 , PSL2 (7), SL3 (3a ), SU3 (3a )}. In the first two cases, the
38
R. GURALNICK, F. HERZIG, AND P. TIEP
order of G is not divisible by 9, whence V is projective and so Ext1G (V, V ) = 0. Note also
that H 1 (G, k) = H 2 (G, k) = 0. In the first case, V ⊗ V ∗ is a direct sum of the projective
cover of k and a 3-dimensional module. Elements of order 5 have nonzero trace and 3dimensional fixed space. Since elements of order 5 have only a 2-dimensional fixed space
on the projective cover of k, it follows that the span of the elements of order 5 generate
V ⊗ V ∗ . In the second case, V ⊗ V ∗ is the projective cover of k and since the trace of an
irreducible character cannot be identically 0, it follows that H is weakly adequate on V in
this case as well. Thus, (G, V ) is adequate.
In the last two cases, weak adequacy follows from the fact that V ⊗ V ∗ is a uniserial
module with trivial socle and head. It follows by the main result of [48] that Ext1G (V, V ) = 0
for a > 2. One computes directly that Ext1G (V, V ) = 0 in all other cases (Klaus Lux did
the computation; also see [37] for the case of SL3 (3a )). Since H 1 (G, k) = H 2 (G, k) = 0, the
result follows.
7. Certain PIMs for simple groups
For a finite group X and a fixed prime p, let B0 (X) denote the principal p-block of
X. We will sometimes use the same notation for an irreducible kX-module and its Brauer
character.
First we describe the submodule structure of the PIMs for some non-projective modular
representations of simple groups H described in Theorems 2.1 and 2.2.
Assume that H has a Sylow p-subgroup P of order p and furthermore that P = CH (P ).
In this case, P has a unique block b with defect group P and canonical character 1P , see
[46, Theorem 4.6.12]. According to Brauer’s theorem [46, Theorem 4.12.1], H has a unique
p-block B of defect d > 0 (hence d = 1), and B = bG . In particular, B = B0 (H). Note
that the number of exceptional characters in B equals (p − 1)/|NH (P )/P | in this situation,
and all of them are p-conjugate (and so non-rational if |NH (P )/P | < p − 1), cf. Theorem
4.12.1 and Corollary 4.12.2 of [46]. We will use [46, Theorem 4.12.1] to find PIMs P(ϕ) for
some ϕ ∈ IBrp (B).
7.1. The case H = PSLn (q) with p = (q n − 1)/(q − 1) and n ≥ 2. First suppose that
n ≥ 3. Then B contains unipotent characters χ0 = 1H , χ1 , and χ2 labeled by the partitions
(n), (n − 1, 1), and (n − 2, 12 ), and Brauer characters ϕ0 = 1H , ϕ1 of degree p − 2 (afforded
by D), and ϕ2 of degree
(q n − 2q 2 + 1)(q n − q)
+1
(q 2 − 1)(q − 1)
(afforded by a kH-module say U ) among others (see e.g. [26, Proposition 3.1]). More
precisely,
(7.1)
χ◦0 = ϕ0 , χ◦1 = ϕ0 + ϕ1 , χ◦2 = ϕ1 + ϕ2 .
Note that
dim(U ) = ϕ2 (1) > 2p
ADEQUATE SUBGROUPS AND INDECOMPOSABLE MODULES
39
unless (n, q) = (3, ≤ 3). Since χi are rational for i = 0, 1, 2, they are all non-exceptional.
Next, the character of any PIM in B is of the form ψ1 + ψ2 , where ψ1 ∈ Irr(B) is nonexceptional, and either ψ2 ∈ Irr(B), or ψ2 is the sum of all (p − 1)/n exceptional characters
in B. Hence the relations (7.1) show that
• P(ϕ0 ) affords the character (χ0 + χ1 )◦ = 2ϕ0 + ϕ1 . In fact, one can see that P(k) is
the uniserial module (k|D|k). In particular, this shows that Ext1H (k, U ) = Ext1H (U , k) = 0;
• P(ϕ1 ) affords the character (χ1 + χ2 )◦ = ϕ0 + 2ϕ1 + ϕ2 . By [46, Corollary 4.12.5], the
module P(ϕ1 ) = P(D) has socle series (D|k ⊕ U |D). Since ϕ1 is real, P(D) is self-dual.
Furthermore, the only nonzero proper submodules of P(D) are
D = soc(P(D)), (D|k), (D|U ), (D|k ⊕ U ) = rad(P(D)),
(cf. [46, Figure 4.3]), and so none is of the form (D|k|D).
Next, let H = SL2 (q) and p = q + 1. The decomposition numbers for B0 (H) are given
in [7]. In particular, Irr(B) consists of χ0 = 1H , χ1 = St of degree q, and q/2 exceptional
characters θi , 1 ≤ i ≤ q/2, of degree q − 1, and IBrp (B) = {1H , ϕ1 }, with ϕ1 afforded by
D. So as before, we have that P(k) = (k|D|k) is uniserial. Next, P(D) = P(ϕ1 ) affords the
character
q/2
X
q
(St +
θi )◦ = 1H + ( + 1)ϕ1 .
2
i=1
If we let Dj = (D|D| . . . |D) denote a uniserial module with Brauer character jϕ1 , then
P(D) = (D|k ⊕ D(q−2)/2 |D) (cf. [46, Corollary 4.12.5]). Furthermore, the only nonzero
proper submodules of P(D) are Dj or (D|k ⊕ Dj−1 ) with 1 ≤ j ≤ q/2.
7.2. The case H = PSUn (q) with p = (q n + 1)/(q + 1), n ≥ 3, (n, q) 6= (3, 2). Note that
in this case H̃ ∼
= Z(H̃) × H for H̃ := GUn (q); moreover, the unipotent characters of H̃ as
well as the characters in B0 (H̃) are all trivial at Z(H̃). Hence without loss we may assume
H = GUn (q). We will consider the unipotent characters χ0 = 1H , χ1,2,3 , labeled by the
partitions (n), (n − 1, 1), (n − 2, 12 ), and (n − 3, 13 ) (the latter being considered only when
n > 3). Using the description of Brauer trees for H given in [15, §6], we see that, when
n ≥ 5, there exist Brauer characters ϕ0 = 1H , ϕ1,2,3 , such that
(7.2)
χ◦0 = ϕ0 , χ◦1 = ϕ1 , χ◦2 = ϕ0 + ϕ2 , χ◦3 = ϕ1 + ϕ3 .
In particular, ϕ0 = 1H , ϕ1 is a Weil character of degree p − 1,
ϕ2 (1) = p
qn + q2 − q − 1
(q n − q)(q n − q 3 + q 2 − 1)
−
2
>
8p,
ϕ
(1)
=
p
− 2p + 2 > 28p.
3
q2 − 1
(q 2 − 1)(q 3 − 1)
Since χi are all rational, they are all non-exceptional, so as in §7.1, the relations (7.2) and
[46, Corollary 4.12.5] show that both P(ϕ0,1 ) are uniserial:
P(ϕ0 ) = (ϕ0 |ϕ2 |ϕ0 ), P(ϕ1 ) = (ϕ1 |ϕ3 |ϕ1 ),
where we have used the same notation for the module and its Brauer character.
Suppose now that n = 3 and q ≥ 3. Then we still have P(ϕ0 ) = (ϕ0 |ϕ2 |ϕ0 ) is uniserial
for ϕ0 = 1H and ϕ2 (1) > 2p. For the Weil character ϕ1 of degree p − 1, now P(ϕ1 ) affords
40
R. GURALNICK, F. HERZIG, AND P. TIEP
the character
(p−1)/3
(χ1 +
X
θi )◦ =
i=1
p+2
p−1
ϕ1 +
ϕ2 ,
3
3
where θi are exceptional characters in B, of degree (q 2 −1)(q +1) > 2p, for 1 ≤ i ≤ (p−1)/3.
We claim that
P(ϕ1 ) = (ϕ1 |ϕ2 |ϕ1 | . . . |ϕ2 |ϕ1 )
is self-dual, uniserial of length (2p+1)/3, with the composition factors ϕ1 and ϕ2 alternating.
The first statement follows since ϕ1 is real. The second one holds because in this case, both
the socle soc(P(ϕ1 )) and head P(ϕ1 )/rad(P(ϕ1 )) are simple and rad(P(ϕ1 ))/ soc(P(ϕ1 ))
is uniserial. By [63, Theorem 1.1], H has a unique complex character of degree equal to
ϕ0 (1) or ϕ1 (1). Hence the last statement holds by Lemma 3.1 since ϕ0,1 each has a unique
lift to characteristic 0.
7.3. The case H = SL2 (q) and p = q − 1 ≥ 3. The decomposition numbers for B0 (H) are
given in [7]. In particular, Irr(B) consists of χ0 = 1H , χ1 = St of degree q, and (q − 2)/2
exceptional characters θi , 1 ≤ i ≤ q/2, of degree q + 1, and IBrp (B) = {ϕ0 = 1H , ϕ1 }, with
ϕ1 = St◦ afforded by D. Clearly, both ϕ0,1 have a unique complex lift, so by Lemma 3.1
they have no self-extensions. Arguing as in §7.2 and using [46, Corollary 4.12.5], we see
that both
P(ϕ0 ) = (ϕ0 |ϕ1 |ϕ0 | . . . |ϕ1 |ϕ0 ), P(ϕ1 ) = (ϕ1 |ϕ0 |ϕ1 | . . . |ϕ0 |ϕ1 )
are self-dual and uniserial of length p, and with the composition factors ϕ0 and ϕ1 alternating.
7.4. The case H = Ap with p ≥ 7. Consider the irreducible complex characters χ0,1,2 of
Sp labeled by (p), (p − 1, 1), and (p − 2, 12 ). By Peel’s theorem [54],
(7.3)
χ◦0 = ϕ0 , χ◦1 = ϕ0 + ϕ1 , χ◦2 = ϕ1 + ϕ2 ,
where ϕ0,1,2 ∈ IBrp (Sp ), ϕ0 (1) = 1, ϕ1 (1) = p − 2, ϕ2 (1) = (p − 2)(p − 3)/2. It is well known
that χ0,1,2 and ϕ0,1 are all irreducible over H. Restricting to Sp−1 , it is easy to see that
ϕ2 is irreducible over H as well. We will use the same notation for the restrictions of these
characters to H. Since χ0,1,2 are rational, they are non-exceptional in B0 (H). Hence, (7.3)
and [46, Theorem 4.12.1] imply that P(ϕ0 ) = (ϕ0 |ϕ1 |ϕ0 ) is uniserial and that P(ϕ1 ) has
socle series (ϕ1 |ϕ0 ⊕ ϕ2 |ϕ1 ). In particular, there is no kH-module of the form (ϕ1 |ϕ0 |ϕ1 ).
8. Indecomposable modules of dimension less than 2p − 2
First we record a simple observation
Lemma 8.1. Let b ∈ N and let V be a kG-module of dimension ≤ b with a G+ -composition
factor U . Suppose that any quotient of length 2 of P(U ) or P(U ∗ ) has dimension > b. Then
U is a direct summand of the G+ -module V . If moreover U has multiplicity 1, then the
G-module V is either irreducible of dimension dim U , or decomposable.
ADEQUATE SUBGROUPS AND INDECOMPOSABLE MODULES
41
Proof. Suppose that W is an indecomposable subquotient of length 2 of the G+ -module
V with U as a composition factor. Replacing W by W ∗ if necessary, we may assume that
head(W ) ∼
= U and so W is a quotient of P(U ). But then by the hypothesis, dim W > b ≥
dim V , a contradiction. So U is a direct summand of the G+ -module V by Lemma 3.5(i):
VG+ = U1 ⊕ M with U1 ∼
= U . The last claim now follows from Lemma 3.7(ii).
Given a nontrivial U ∈ IBrp (X), we call any kX-module V U -special, if V has U or U ∗
as composition factors of total multiplicity ≤ 1, and moreover all other composition factors
of V are trivial.
Lemma 8.2. Let N = Op (N ), b ∈ N, and let U ∈ IBrp (N ) be a nontrivial module. Suppose
that the only U -special quotients of P(k), P(U ), and P(U ∗ ) of dimension ≤ b are uniserial
modules in the list
X := {k, Y, (k|Y ), (Y |k), (k|Y |k) | Y = U or U ∗ }.
Let V be any U -special kN -module of dimension ≤ b. Then V ∼
= ⊕m
i=1 Xi for some Xi ∈ X .
Proof. We induct on the length of V . Suppose V has length ≥ 2. If all composition factors
of V are trivial, then N acts trivially on V since N = Op (N ), and we are done. Replacing
V by V ∗ if necessary, we may assume that V has U as a composition factor of multiplicity
1, and all other composition factors of V are k.
Suppose that U embeds in head(V ) := V /R, where R := rad(V ). Then all composition
factors of R are trivial, and so N acts trivially on R. Assume in addition that V /R is not
simple. Then V /R = M/R ⊕ Y /R for some submodules M, Y with Y /R ∼
= k. Again, N
∼
acts trivially on Y , so we can write Y = R ⊕ Z for some submodule Z = k. It follows
that V = M ⊕ Z, and we are done by induction. Assume now that V /R ∼
= U . Then the
surjection P(U ) → V /R lifts to a surjection P(U ) → V . Since dim V ≤ b, we must then
have that V ∈ X .
The case U ֒→ soc(V ) now follows from the previous case by duality.
Now we may assume that U embeds neither in head(V ) nor in soc(V ). Letting W :=
[N, V ] and T := rad(W ), we see that W has no trivial quotient. But W/T is semisimple,
so W/T ∼
= U . Applying the induction hypothesis to V /T and noting that U is in the socle
but not in the head of V /T , we see that V /T ∼
= L/T ⊕ Y /T , where L/T ∼
= (U |k) and N
acts trivially on Y /T . In this case, N acts trivially on Y as well. If moreover Y 6= T , then
we can decompose Y = T ⊕ Z for some submodule Z 6= 0, whence V = L ⊕ Z and we are
done by induction. Thus we may assume V /T ∼
= (U |k). Consider any maximal submodule
M of V . Since U 6֒→ head(V ), V /M ∼
= k and so M ⊇ W . It follows that R ⊇ T and
R/T = rad(V /T ) ∼
= k. In this final case, the surjection P(k) → V /R lifts
= U . Hence V /R ∼
to a surjection P(k) → V . Since dim V ≤ b, we must again have that V ∈ X .
Corollary 8.3. Let G+ be perfect, b ∈ N, and let U ∈ IBrp (G+ ) be a nontrivial module.
Suppose that the only U -special quotients of dimension ≤ b of P(k), P(U ), and P(U ∗ ) are
uniserial modules in the list
X := {k, Y, (k|Y ), (Y |k), (k|Y |k) | Y = U or U ∗ }.
Let V be any indecomposable kG-module of dimension ≤ b such that VG+ is U -special. Then
VG+ is also indecomposable and belongs to X .
42
R. GURALNICK, F. HERZIG, AND P. TIEP
Proof. We may assume that exactly one indecomposable direct summand A of VG+ has U
as a composition factor, and so VG+ = A ⊕ B with G+ acting trivially on B. Hence B = 0
by Lemma 3.7(ii).
Theorem 8.4. Let G be a finite group, k an algebraically closed field of characteristic
p, Op (G) = 1, and let V be a faithful, indecomposable kG-module of dimension less than
2p − 2. Assume in addition that G+ is quasisimple but not of Lie-type in characteristic p.
Then one of the following statements holds, where U, W ∈ IBrp (G+ ).
(i) V is irreducible.
(ii) (G+ , p, dim U ) = (SL2 (q), q −1, p+1), (Ap , p, p−2), (SLn (q), (q n −1)/(q −1), p−2),
(M11 , 11, 9), (M23 , 23, 21). Furthermore, VG+ is uniserial of the form (k|U ), (U |k),
or (k|U |k), and U ∼
= U ∗.
(iii) (G+ , p, dim U ) = (SL2 (q), q + 1, p − 2), U ∼
= U ∗ , and VG+ is indecomposable of the
form (U |U ), (U |k ⊕ U ), or (k ⊕ U |U ).
(iv) (G+ , p, dim U ) = (2A7 , 7, 4), VG+ = (U |U ) is uniserial, and U ∼
= U ∗.
+
(v) (G , p) = (M11 , 11) and VG+ = (U |W ) is uniserial, {dim U, dim W } = {9, 10}.
(vi) (G+ , p, dim U ) = (3A6 , 5, 3), VG+ = (U |U ) is uniserial, and U ∼
6 U ∗.
=
+
2
(vii) (G , p, dim U ) = ( B2 (8), 13, 14), VG+ is uniserial of the form (k|U ) or (U ∗ |k) for
a fixed U ∼
6 U ∗.
=
Proof. (a) Note that the statement is vacuous for p = 2. Throughout the proof, we assume
that p > 2, V is reducible, and let U be a composition factor of the G+ -module V of
largest dimension. Also set b := 2p − 3 whenever we apply Lemma 8.2 and Corollary
8.3. Note that VG+ is (reducible) indecomposable by Corollary 4.5. Next, G+ must act
irreducibly and non-trivially on some subquotient X of VG+ . Applying Theorems 2.1 and
2.2 to the action of G+ on X, we see that Mult(G+ /Z(G+ )), and so Z(G+ ), has p′ -order.
The indecomposability of VG+ then implies that Z(G+ ) acts via scalars on V and that G+
acts faithfully on U (and so we may identify G+ with its image in GL(U )). In particular, if
k is a composition factor of VG+ , then G+ is simple. This must be the case if dp (G+ ) ≥ p−1.
Also, if Z(G+ ) 6= 1, then G+ acts faithfully on every composition factor of VG+ .
(b) Assume first that (G+ , p) = (J1 , 11). According to [34], the only ϕ ∈ IBrp (G+ ) of
degree < 2p are ϕ1,7,14 . Here we use the notation ϕj to denote the unique ϕ ∈ IBrp (G+ ) of
degree j. Moreover, using [49] we see that
(8.1) P(ϕ1 ) = (ϕ1 |ϕ119 |ϕ1 ), P(ϕ7 ) = (ϕ7 |ϕ49 ⊕ ϕ69 |ϕ7 ), P(ϕ14 ) = (ϕ14 |ϕ106 ⊕ ϕ119 |ϕ14 ).
Since dim V < 2p, each composition factor X of the G+ -module V must afford the Brauer
character ϕi for some i ∈ {1, 7, 14}. Now (8.1) shows that Ext1G+ (X, Y ) = 0 for any two
such composition factors X and Y . Hence the G+ -module V is semisimple by Lemma 3.5,
a contradiction.
From now one we may assume that G+ 6∼
= J1 and so dp (G+ ) ≥ p − 3 by Theorem 2.1. In
particular, dim U ≥ p − 3 and Corollary 3.9 applies.
(c) Here we consider the case where dim U > p. Since dim V ≤ 2p − 3 and VG+ is
reducible, it follows that k is a composition factor of VG+ , and so G+ is simple as noted in
(a). Also, all composition factors of VG+ other than U are trivial. Now we apply Theorem
2.2 to (G+ , U ).
ADEQUATE SUBGROUPS AND INDECOMPOSABLE MODULES
43
Suppose that G+ = An with n ≥ p as in the first row of Table I. Since p + 1 ≤ dim U ≤
2p − 3, we have that 5 ≤ p ∤ n and p + 2 ≤ n ≤ 2p − 2. By [51, Lemma 6.10], H 1 (An , U ) = 0,
whence Ext1G+ (k, U ) = Ext1G+ (U, k) = 0. Also, Ext1G+ (k, k) = Ext1G+ (U, U ) = 0 by Lemma
3.1. It follows by Lemma 3.5 that VG+ is semisimple, a contradiction.
Next suppose that (G+ , p, dim U ) = (SL2 (q), q − 1, p + 1) as in Table IIa. Then, as shown
in §7.3, (G+ , U ) satisfies the hypothesis of Corollary 8.3, and so we arrive at (ii).
In the cases where (G+ , p, dim U ) = (A7 , 7, 10), (SL3 (3), 13, 16), (SU4 (2), 5, 6), (Sp4 (4), 17, 18),
(G2 (3), 13, 14), (J1 , 11, 14), (J1 , 19, 22 or 34), (M12 , 11, 16), or (M11 , 11, 16), using the information on decomposition numbers given in [49], one can check that U satisfies the
hypothesis of Lemma 8.1, and so V is decomposable, a contradiction.
Assume that (G+ , p, dim U ) = (2 B2 (8), 13, 14). Then V is U -special, and using [49] one
can check that the only quotients of dimension ≤ 23 of P(k), P(U ), and P(U ∗ ) are k, Y ,
(k|Y ), or (Y |k), with Y = U or U ∗ . Applying Corollary 8.3, we arrive at (vii).
(d) Next we consider the case dim U = p, and apply Theorem 2.2 to (G+ , U ). By Lemma
6.2, U is projective, and so it is a direct summand of VG+ , a contradiction.
(e) Assume now that dim U = p − 1, and apply Theorem 2.1 to (G+ , U ). Note that U
has multiplicity 1 as dim V < 2p − 2. First we consider the case (G+ , p) = (SUn (q), (q n +
1)/(q + 1)). In this case, G+ is simple, dp (G+ ) = p − 1 and so all other composition factors
of the G+ -module V are trivial. As shown in §7.2,
Ext1G+ (k, U ) = Ext1G+ (U, k) = Ext1G+ (k, k) = Ext1G+ (U, U ) = 0.
It follows by Lemma 3.5 that VG+ is semisimple, a contradiction.
Suppose now that (G+ , p) = (Sp2n (q), (q n + 1)/2), (2Ru, 29, 28), (3J3 , 19, 18), (2A7 , 5, 4),
(3A7 , 7, 6), (6A7 , 7, 6), (2J2 , 7, 6), (61 ·PSU4 (3), 7, 6), (6·PSL3 (4), 7, 6), (2M12 , 11, 10), (2M22 , 11, 10),
(6Suz, 13, 12), or (2G2 (4), 13, 12). Since Z(G+ ) 6= 1, G+ acts faithfully on every composition factor X of VG+ as noted in (a), whence dim X ≥ p − 1 > (dim V )/2 by Theorem 2.1.
It follows that VG+ is irreducible, a contradiction.
Assume that (G+ , p, dim U ) = (M11 , 11, 10). The Brauer tree of B0 (G+ ) is given in
[46, Example 4.12.11]. Using this information, we see that the only quotient of length 2 of
dimension ≤ 19 of P(U ) is of form (W |U ), where W ∈ IBrp (M11 ) has dimension 9. Arguing
as in the proof of Lemma 8.1, we arrive at (v).
(f) Next we consider the case dim U = p − 2 and apply Theorem 2.1 to (G+ , U ). We can
exclude the subcase (G+ , p) = (SL3 (2) ∼
= PSL2 (7), 7).
(f1) First we assume that (G+ , p) = (SLn (q), (q n − 1)/(q − 1)) or (Ap , p), and moreover
U is a composition factor of V of multiplicity 2. Since dim V ≤ 2p − 3, we have two cases.
• dim V = 2p − 3 and so k is also a composition factor of the G+ -module V . Suppose
that head(VG+ ) is not simple. Then VG+ contains two maximal submodules A, B of length
2 and A ∩ B ⊆ soc(VG+ ). On the other hand, the indecomposability of VG+ implies that
soc(VG+ ) ⊆ rad(VG+ ) ⊆ A ∩ B, whence soc(VG+ ) = A ∩ B is simple. So up to duality, we
may assume that head(VG+ ) is simple. It follows that VG+ is a quotient of P(U ) or P(k).
The structure of PIMs described in §§7.1, 7.4 shows that (iii) holds.
44
R. GURALNICK, F. HERZIG, AND P. TIEP
• dim V = 2p − 4 and so VG+ has exactly two composition factors, both isomorphic to
U . As VG+ is indecomposable, it is a quotient of P(U ). Using the results of §§7.1, 7.4, we
again arrive at (iii).
(f2) Now we assume that (G+ , p) = (SLn (q), (q n − 1)/(q − 1)) or (Ap , p), and moreover
U is a composition factor of V of multiplicity 1. By Theorem 2.1, U is the only nontrivial
irreducible kG+ -module of dimension ≤ p − 1. Since dim V ≤ 2p − 3, it follows that
all other composition factors of VG+ are trivial, i.e. VG+ is U -special. The structure of
PIMs described in §§7.1, 7.4 shows that the only U -special quotients of dimension at most
b = 2p − 3 of P(U ) and P(k) all belong to {k, U, (U |k), (k|U ), (k|U |k)}. Also, U ∼
= U ∗.
Hence we arrive at (ii) by Corollary 8.3.
(f3) Assume that (G+ , p, dim U ) = (M23 , 23, 21). Then U ∼
= U ∗ , P(k) = (k|U |k), and
the only quotient of length 2 of dimension ≤ 43 of P(U ) is (k|U ). Arguing as in the case
of Ap in (e1) and (e2), we arrive at (ii).
Consider the case (G+ , p, dim U ) = (M11 , 11, 9). Then U ∼
= U ∗ and P(k) = (k|U |k).
Using [46, Example 4.12.11] as above, we see that P(U ) has only two non-simple quotients
of dimension ≤ 19, namely (k|U ) and (W |U ) with W ∈ IBrp (G+ ) of dimension 10. Arguing
as above we arrive at (ii).
Suppose now that (G+ , p, dim U ) = (3A7 , 5, 3). Recall that U is a composition factor of
largest dimension of VG+ and Z(G+ ) acts via scalars on V . Using [34] one can then check
that all composition factors of VG+ are isomorphic to U . But Ext1G+ (U, U ) = 0 by Lemma
3.1. Hence VG+ is semisimple by Lemma 3.5(ii), a contradiction.
Suppose that (G+ , p, dim U ) = (3A6 , 5, 3). As in the case of (3A7 , 5, 3), we see that all
composition factors of VG+ are isomorphic to U . But dim V ≤ 7 and VG+ is indecomposable,
so head(VG+ ) ∼
= U . Inspecting the structure of P(U ) using [49], we conclude that VG+ ∼
=
(U |U ) is uniserial, i.e (vi) holds.
(g) Finally, let dim U = p − 3. By Theorem 2.1, we have that (G+ , p) = (2A7 , 7). As
in the case of (3A7 , 5, 3), we see that all composition factors of VG+ are isomorphic to
U . But dim V ≤ 11 and VG+ is indecomposable, so head(VG+ ) ∼
= U . Note that P(U ) =
(U |U ⊕ W |U ), where W ∈ IBrp (G+ ) has dimension 16 (as one can see using [49]). It follows
that VG+ ∼
= (U |U ), the unique quotient of dimension 8 of P(U ), and we arrive at (iv).
Lemma 8.5. Suppose that p = 3 and V is a reducible, faithful, indecomposable kG-module
of dimension ≤ 2p − 3. Then Op (G) 6= 1.
∼k
Proof. Suppose first that every G+ -composition factor of V is of dimension 1 and so =
′
+
+
+
+
p
(as G = O (G )). By faithfulness, G is a p-group; moreover G 6= 1 as otherwise G is
a p′ -group. Thus 1 6= G+ = Op (G).
Since VG+ is reducible, it remains to consider the case where VG+ has exactly two composition factors, U of dimension 2 and W of dimension 1, and moreover Op (G) = 1. Let
′
K denote the kernel of the action of G+ on U . Again, G+ = Op (G+ ) acts trivially on
W . It follows by faithfulness of G on V that K ≤ Op (G+ ) ≤ Op (G) = 1. Next, since
′
G+ = Op (G+ ), the image of G+ in GL(U ) is contained in SL(U ). Now if |G+ | is odd, then
G+ is solvable and so by the Fong-Swan theorem cannot act irreducibly on U of dimension
2. So G+ contains an element of order 2 which must then act as −1U and belong to Z(G+ ).
ADEQUATE SUBGROUPS AND INDECOMPOSABLE MODULES
45
Thus U and W have different central characters and so VG+ is semisimple, contradicting
Lemma 3.7.
Next we will prove some criteria to decide the type of a self-dual indecomposable module.
Lemma 8.6. Let k = k be of characteristic p > 2 and let V be a self-dual indecomposable kG-module with dim EndkG (V ) ≤ 2. Then V supports a non-degenerate G-invariant
bilinear form that is either symmetric or alternating. Furthermore, all such forms have the
same, symmetric or alternating, type.
Proof. Let Φ denote the matrix representation of G on V relative to a fixed basis (e1 , . . . , en )
of V . Since V ∼
= V ∗ as G-modules, we can find b ∈ GLn (k) such that t Φ(g)−1 = bΦ(g)b−1 ,
and so b yields a non-degenerate G-invariant bilinear form on V . Note that the map
π : X 7→ bX yields a k-space isomorphism between EndkG (V ) and the space B of Ginvariant bilinear forms on V . In particular, dim B ≤ 2, and, since p > 2, it is a direct
sum S ⊕ A of symmetric and alternating G-invariant forms. Hence the claims follow if
dim EndkG (V ) = 1. Assume dim EndkG (V ) = 2. Since V is indecomposable, EndkG (V )
is a local algebra, cf. [46, Corollary 1.6.5], and its unique maximal ideal J, which then
has dimension 1, consists of (nilpotent) non-units. Thus π(J) is contained in the subset
D of degenerate G-invariant bilinear forms on V . But π −1 (D) is obviously contained in
J. It follows that D = π(J) is a subspace and dim D = 1. Hence we are also done if S
or A is zero. Assume S, A 6= 0, whence both of them are 1-dimensional. Now if Y ∈ D,
then t Y ∈ B and it is degenerate. As p > 2 and dim D = 1, it follows that t Y = ±Y .
Thus D is either S or A, and so the nonzero forms in the other subspace are precisely the
non-degenerate G-invariant forms on V that are either symmetric or alternating.
Lemma 8.7. Suppose that G is a finite group with a Sylow p-subgroup P of order p > 2
such that NG (P )/P is abelian. Let V be a reducible self-dual indecomposable G-module
over k = k of characteristic p, of even dimension d < 2p. Then V is not orthogonal if
d < p and V is not symplectic if d > p.
Proof. For 1 ≤ i ≤ p, let Xi denote the unique indecomposable kP -module of dimension
i (so Xp is projective). By the Green correspondence (see e.g. [46, Theorem 4.9.2]),
VN = X⊕Y for N := NG (P ), where X is non-projective indecomposable and Y is projective
(if nonzero). Let M denote any indecomposable kN -module. According to [1, p. 42], M
is uniserial. Also, Lemma 8 of [1, §5] says that the P -radical filtration agrees with the
N -radical filtration on M ; in particular, rad(M ) = rad(MP ). As N/P is abelian, any
irreducible kN -module remains irreducible as over P . It follows that MP is indecomposable.
Applying this to X and Y , we see that VP = Xd if d < p, respectively VP = Xd−p ⊕ Xp if
d > p. Now suppose that V is equipped with a non-degenerate G-invariant bilinear form of
a fixed parity. The claim then follows by using the description of Jordan forms of unipotent
elements in classical groups, see e.g. [45, Theorem 3.1].
Proof of Theorem 1.9. There is nothing to prove for p = 2; furthermore p 6= 3 by
Lemma 8.5. So we may assume p > 3. By Proposition 4.4, the self-duality of V implies
that G+ is quasisimple. If furthermore G+ is not a Lie-type group in characteristic p, then
by Theorem 8.4 we arrive at (i) and (ii). Assume that G+ is of Lie-type in characteristic
46
R. GURALNICK, F. HERZIG, AND P. TIEP
p. By Lemma 4.3(i), G+ ∼
= SL2 (q) or PSL2 (q) for some q = pa . By Corollary 4.5, VG+ is
indecomposable of length ≥ 2. Applying Proposition 3.10, we arrive at (i) and (ii).
Note that in each of the listed cases, there is a unique (up to isomorphism) reducible
indecomposable G+ -module V of the indicated shape (indeed, if W := head(VG+ ) then there
is a unique quotient of P(W ) of this shape). Since W ∗ ∼
=W ∼
= soc(VG+ ), it follows that
VG+ is self-dual. Thus all the listed cases give rise to examples of reducible indecomposable
self-dual modules (at least for G+ ).
It remains to determine the type of each indecomposable module. Note that in all cases
dim EndkG+ (V ) = 2, whence dim EndkG (V ) ≤ 2 and Lemma 8.6 applies to both G and G+ .
Thus V supports a non-degenerate G-invariant form that is either symmetric or alternating.
If dim V is odd, then all such forms must be symmetric. Consider the case dim V is even.
Note that in all cases |P | = p and NG+ (P )/P is abelian for P ∈ Sylp (G+ ). So by Lemma
8.7, all such forms are symmetric when dim V > p, respectively alternating when dim V < p.
✷
Recall from [56] that for G a connected reductive group over an algebraically closed field k
and for G ≤ G a subgroup we say that G is G-cr if whenever G ≤ P for a parabolic subgroup
P of G, then G is contained in a Levi subgroup of P. If G = Sp(V ) or SO(V ) for some
finite-dimensional vector space equipped with a non-degenerate alternating or symmetric
bilinear form, then this is equivalent to saying that for any G-stable isotropic subspace
W ⊂ V there exists a G-stable isotropic subspace W ′ ⊂ V with W + W ′ non-degenerate.
For these G and provided p > 2, a subgroup G ≤ G is G-cr if and only if the kG-module V
is completely reducible [56, §3.2.2].
We can extend Serre’s notion to the disconnected group G = O(V ) by saying that a
subgroup G is O(V )-cr if for any G-stable isotropic subspace W ⊂ V there exists a Gstable isotropic subspace W ′ ⊂ V with W + W ′ non-degenerate. We then see using the
same argument as in [56, §3.2.2] as well as Lemma 3.7(i), that for G ≤ O(V ) and p > 2 the
following are equivalent:
(i) G is O(V )-cr,
(ii) G ∩ SO(V ) is SO(V )-cr,
(iii) the kG-module V is completely reducible.
The next result shows that for G = Sp(V ) or O(V ), the finite non-G-cr subgroups of G
are made up from the groups with a nontrivial unipotent normal subgroup and the groups
described in Theorem 1.9.
Proposition 8.8. Let k = k be of characteristic p > 0 and let G be either Sp(V ) or O(V )
with dimk V ≤ 2p − 3. Suppose that G < G is a finite subgroup such that the G-module V is
not completely reducible. Then there is a G-invariant decomposition V = V1 ⊕ V2 ⊕ V3 of V
into an orthogonal direct sum of three subspaces, where Vi is either zero or non-degenerate,
at least one of the Vi ’s is zero and at least one of V1 and V2 is nonzero, and the following
conditions hold for the images Gi of G in GL(Vi ).
(i) If V1 6= 0, then Op (G1 ) = 1, the kG-module V1 is reducible indecomposable, and
(G1 , V1 ) is as described in Theorem 1.9.
(ii) If V2 6= 0, then Op (G2 ) 6= 1.
ADEQUATE SUBGROUPS AND INDECOMPOSABLE MODULES
47
(iii) If V3 6= 0, then V3 is an orthogonal direct sum of non-degenerate subspaces, each
being an irreducible G-module.
Proof. (a) First note that p > 2. Setting V2 = V when Op (G) 6= 1, we may assume
Op (G) = 1. Setting V1 = V when VG is indecomposable, we may assume that VG is
decomposable.
First we consider the case where no composition factor of G has order p. Choose a
decomposition VG = A ⊕ B with A, B 6= 0 being G-invariant and A of smallest possible
dimension. Then dim A ≤ p − 2 and the image X of G in GL(A) has Op (X) = 1. By
[19], the X-module A is completely reducible, whence it is irreducible by its choice. If A is
non-degenerate, then VG = A ⊕ A⊥ . Consider the case A ∩ A⊥ 6= 0. By the irreducibility
of A, A ⊆ A⊥ and so A⊥ = A ⊕ C for C := B ∩ A⊥ . It is easy to see that C ∩ C ⊥ = 0
and so VG = C ⊕ C ⊥ . Note that C ⊥ 6= 0. Also, C 6= 0 as otherwise A⊥ = A, B ∼
= V /A =
V /A⊥ ∼
= A∗ is an irreducible G-module and so VG is semisimple, a contradiction. Thus in
either case V is an orthogonal direct sum of nonzero non-degenerate G-invariant subspaces.
Repeating this process for the summands, we obtain an orthogonal direct sum V = ⊕ni=1 Ui ,
where each Ui is non-degenerate and indecomposable as a kG-module, and n ≥ 2. Since
VG is not semisimple, we may assume that U1 is reducible. Again the image Yi of G in
GL(Ui ) has Op (Yi ) = 1. By Theorem 1.9, dim U1 ≥ p − 1, whence all Ui with i ≥ 2 must
be irreducible over G. Setting V1 = U1 and V3 = ⊕ni=2 Ui , we are done. Note that in this
case dim V > dim U1 ≥ p − 1.
(b) Let W1 , . . . , Wm denote all the composition factors of VG+ (with counting multiplicities) and let J := Op′ (G+ ).
Consider the case p = 3. If dim Wi = 1 for all i, then the first paragraph of the proof of
Lemma 8.5 shows that Op (G) 6= 1, contrary to our hypotheses. As VG is decomposable of
dimension ≤ 3, it follows that VG+ = W1 ⊕ W2 with {dim W1 , dim W2 } = {1, 2} and this
decomposition is G-invariant. Thus VG is completely reducible, again a contradiction. So
we must have that p > 3.
Suppose that J acts by scalars on each of the Wi ’s. Then, in a suitable basis of V ,
[J, G+ ] is represented by unitriangular matrices, and so it is a p-subgroup. But Op (G) = 1,
so J ≤ Z(G+ ). Applying Lemma 4.1 to G+ , we see that G+ , and so G as well, has no
composition factors of order p. Thus we are done by (a).
So we may now assume that J does not act by scalars on W1 . It follows that the image
of G+ in GL(W1 ) contains a non-scalar normal p′ -subgroup. Applying Theorem 2.1, we see
that dim W1 ≥ p − 1. Since dim V ≤ 2p − 3, it follows that J acts by scalars on each Wi
with i > 1, and m ≥ 2 as VG is reducible. Since J is a p′ -group, VJ ∼
= W1 ⊕ (⊕m
i=2 Wi ), and
this decomposition is G-invariant. It follows that G fixes a decomposition V = W1 ⊕ U
where UG+ has composition factors Wi , 2 ≤ i ≤ m. Since J acts by scalars on each Wi
with i > 1 but not on W1 , it also follows that U = W1⊥ , whence W1 is non-degenerate. If
Op (Y ) = 1 for the image Y of G in GL(U ), then UG is semisimple by [19] (as dim U ≤
p − 2), a contradiction. So we can now set V2 = U and V3 = W1 . Note that in this case
dim V > dim W1 ≥ p − 1.
48
R. GURALNICK, F. HERZIG, AND P. TIEP
Proof of Corollary 1.10. Suppose that the kG-module V is not completely reducible.
If VG is indecomposable, then we are done by Theorem 1.9. Otherwise, the proof of Proposition 8.8 shows that dim V ≥ p.
✷
9. Adequacy for SL2 (q)
The aim of this section is to prove the following statement which extends the results of
[23, §3]:
Proposition 9.1. Any nontrivial irreducible representation V of G := SL2 (pr ) over Fp is
weakly adequate, except when q := pr ≤ 3.
By the Steinberg tensor product theorem we can write
r−1
L(ai )(i)
V = L(a) := ⊗i=0
Pr−1
for some a = i=0
ai pi , 0 ≤ ai ≤ p − 1, where L(1) is the natural 2-dimensional Fp Grepresentation, L(b) = Symb (L(1)), and (i) denote the ith Frobenius twist. Also, G ∼
= SL2
denotes the underlying algebraic group for G.
Lemma 9.2. We have that
headG (End(V )) ∼
=
M
r−1
⊗i=0
L(2bi )(i) .
b0 ,...,br−1 : 0≤bi ≤min( p−1
,ai )
2
Moreover, if a < q − 1 then
headG (End(V )) = headG (End(V )),
whereas if a = q − 1, then
headG (End(V )) = headG (End(V )) ⊕ L(q − 1).
Proof. As End(V ) is self-dual, we may replace “head” by ”socle”. By [14, Lemmas 1.1 and
1.3], we have for 0 ≤ b ≤ (p − 1)/2
L(b) ⊗ L(b) ∼
= ⊕b T (2i),
i=0
and for (p − 1)/2 ≤ b ≤ p − 1,
⌊(p−1)/2⌋
p−2−b
L(b) ⊗ L(b) ∼
= ⊕i=0 T (2i) ⊕ ⊕i=p−1−b T (2p − 2 − 2i),
where T (λ) denotes the tilting module of G with highest weight λ ≥ 0. Recall that T (λ) =
L(λ) if λ ≤ p − 1, and that, when 0 ≤ λ ≤ p − 2, T (2p − 2 − λ) is uniserial of shape
(L(λ)|L(2p − 2 − λ)|L(λ)) and T (2p − 2 − λ) ∼
= Q1 (λ) in the notation of [2, §3].
r−1
The statement will follow if we can show for any 0 ≤ bi ≤ 2p−2 that (i) socG (⊗i=0
T (bi )(i) )
r−1
is simple, and (ii) socG (⊗i=0
T (bi )(i) ) is simple if bi < 2p−2 for at least one i and isomorphic
Pr−1 i
to L(0) ⊕ L(q − 1) otherwise. Let ci := min(bi , 2p − 2 − bi ) ≤ p − 1 and c := i=0
ci p .
Then
r−1
r−1
⊗i=0
T (bi )(i) ֒→ ⊗i=0
Q1 (ci )(i) = Qr (c)
in the notation of [2, §3]. By [2, Theorem 3.7], socG (Qr (c)) = L(c). Furthermore, by [2,
Lemma 4.1], socG (Qr (c)) = L(c) if c 6= 0 and socG (Qr (c)) = L(0) ⊕ L(q − 1) if c = 0 (note
ADEQUATE SUBGROUPS AND INDECOMPOSABLE MODULES
49
that “⊗” should be “⊕” in [2, Lemma 4.1(b)]). Finally, if c = 0 then it is easy to check
r−1
T (bi )(i) , unless bi = 2p − 2 for all i.
that L(q − 1) does not occur in ⊗i=0
Proof of Proposition 9.1. By [23, Proposition 3.1] we may assume that r > 1. We will
follow the same strategy of proof. It suffices to show M = headG (End(V )), where M
denotes the span of the images of all p′ -elements of G in headG (End(V )).
Pr−1
Suppose that k = i=0
ki pi with 0 ≤ ki ≤ min((p − 1)/2, ai ). By [23, Lemma 3.5], the
r−1 (i)
G-subrepresentation L(2k) in End(V ) is generated by the weight 0 element ∆k := ⊗i=0
∆ki ,
where ∆ki ∈ End(L(ai )) is defined in [23, Lemma 3.5]. Let δk := tr(− ◦ ∆k ) ∈ (End(V ))∗ .
Pr−1 i
r−1 (i)
For ℓ = i=0
ℓi p with 0 ≤ ℓi ≤ ai , let πℓ := ⊗i=0
πℓi ∈ End(V ), where πℓi ∈ End(L(ai ))
is the projection X j Y ai −j 7→ δjℓi X j Y ai −j . For any other ℓ let πℓ := 0. Also let pk (ℓ) :=
Qr−1
pki (ℓi ), where pki (ℓi ) agrees with a polynomial of degree
δk (πℓ ) ∈ Fp . Then pk (ℓ) = i=0
ki for 0 ≤ ℓi ≤ ai . In particular, as ki ≤ ai , there exist 0 ≤ ℓi ≤ ai such that pki (ℓi ) 6= 0 for
all i. Thus pk (ℓ) 6= 0 for some ℓ.
Pr−1
(a) Suppose a < q − 1 and p > 2. Also, suppose that there exists a k = i=0
ki pi with
0 ≤ ki ≤ min((p − 1)/2, ai ) such that M does not contain L(2k). Then δk (M ) = 0, so the
action of the split Cartan subgroup gives
X
pk (ℓ) = 0, ∀ℓ′ .
ℓ≡ℓ′ (mod (q−1)/2)
As in [23, §3], the action of a non-split Cartan subgroup similarly gives
X
pk (ℓ) = 0, ∀ℓ′ .
ℓ≡ℓ′ (mod (q+1)/2)
Therefore, if 0 ≤ ℓ < (q − 1)/2, pk (ℓ) = −pk (ℓ + (q − 1)/2) = pk (ℓ − 1), and so by induction
pk (ℓ) = pk (ℓ − 1) = . . . = pk (−1) = 0. Similarly, pk (ℓ) = 0 for ℓ > a − (q − 1)/2, and so
pk (ℓ) = 0 for all ℓ, a contradiction.
(b) Now we consider the case a = q − 1 and p > 2.
(b1) Suppose that M does not contain L(2k) for some k < (q − 1)/2. The same argument
as in (a) shows that
pk (0) = pk (1) = . . . = pk ((q − 3)/2) = −pk ((q + 1)/2) = . . . = −pk (q − 1)
and pk ((q − 1)/2) = 0. Hence pki ((p − 1)/2) = 0 for some i. As r > 1 we deduce that
pk (ℓ) = 0 for some 0 ≤ ℓ < (q − 1)/2 (e.g. ℓ = pi (p − 1)/2), so pk (ℓ) = 0 for all ℓ, again a
contradiction.
(b2) Suppose that M does not contain L(q − 1)⊕2 . By [23, §3], the G-representation
i(i)
h
r−1
∂ (p−1)/2
is the unique G-subrepresentation L(q − 1) in
X ∂Y
generated by v := ⊗i=0
End(V ). Note that the upper-triangular Borel subgroup B := ( ∗ ∗∗ ) ⊂ G fixes v 2 =
h
i(i)
r−1
∂ p−1
X ∂Y
⊗i=0
and that v and v 2 are linearly independent. As v 2 ∈
/ (End(V ))G = Fp ,
the G-representation generated by v 2 is isomorphic to L(q − 1) or to L(q − 1) ⊕ L(0) ∼
=
2
IndG
B (1). In particular, for some c ∈ Fp , v + c generates the second copy of L(q − 1)
50
R. GURALNICK, F. HERZIG, AND P. TIEP
in End(V ). A calculation as in [23, §3] shows that c = (−1)r . Now we can deduce that
pk (ℓ) = 0 for all ℓ exactly as in part (b2) of the proof of [23, Proposition 3.1].
(c) Suppose now that p = 2. Note that headG (End(V )) is multiplicity-free. If M does not
contain L(0), then the argument in (a) (but using only a non-split Cartan subgroup) shows
that p0 (ℓ) = 0 for all ℓ (as q + 1 > a), a contradiction. (In fact, we could alternatively
use only a split Cartan subgroup, even when a = q = 1.) Suppose that a = q − 1 and
r−1
∂ (i)
+ 1 generates the unique Gthat M does not contain L(q − 1). By (b2), ⊗i=0
X ∂Y
subrepresentation L(q − 1) of End(V ). However, as in (b2) of the proof of [23, Proposition
3.1],
∂ (i)
α
r−1
)
6= 0
tr
◦ ⊗i=0 (X
α−1
∂Y
6 ∅, and this gives a final contradiction.
for any α ∈ F×
q \ {1} =
Remark 9.3. The results of [2] play a key role in our analysis of SL2 (q)-representations.
We should also point out some minor inaccuracies in [2, §4]. The first line of the displayed
formula right before [2, Corollary 4.5] should have the extra condition λ, µ 6= p − 1. Furthermore, in the case n = 2 of [2, Corollary 4.5(b)], there are four (not just two as stated)
cases when dim Ext1 = 2, namely when λ0 , λ1 ∈ {(p − 3)/2, (p − 1)/2} and µi = p − 2 − λi
for all i = 0, 1. (Also, the k and i in [2, Corollary 4.5(a)] satisfy 0 ≤ i, k ≤ n − 1.)
Corollary 9.4. Let V be nontrivial absolutely irreducible representation of G = SL2 (pr ) in
characteristic p. Then either V is adequate, or one of the following holds:
(i) r = 1, 1 < dim(V ) = (p ± 1)/2, and dim Ext1G (V, V ) = 1.
(ii) pr = 2, 3, 4 and dim V = pr .
(iii) pr = 9 and dim V = 3, 6, 9.
Proof. The case r = 1 is already treated by [23, Corollary 1.4], so we will assume r > 1.
In this case, Ext1G (V, V ) = 0 by [2, Corollary 4.5(a)]. Suppose that pr 6= 4, 9. Then
H 2 (G, k) = 0, and furthermore H 1 (G, k) = 0 as G is perfect. It follows that V is adequate.
The same conclusion holds if p ∤ dim(V ).
Now we consider the case pr = 4, 9 and keep the notation of the proof of Proposition 9.1.
The proof of Lemma 9.2 shows that the one-dimensional subspace End(V )G is contained
in the direct summand W := T (b0 ) ⊗ T (b1 )(1) , where bi = 0 if ai < p − 1 and bi = 2p − 2 if
ai = p − 1. As H 1 (G, End(V )) = 0, we deduce that H 1 (G, End(V )/k) = H 1 (G, W/k).
(a) If a0 = a1 = p − 1, then W = Q2 (0) ∼
= P(1) ⊕ L(p2 − 1) by [2, Lemma 4.1]. Hence
H 1 (G, End(V )/k) ∼
= H 1 (G, P(1)/k) ∼
= H 2 (G, k), which is one-dimensional.
(b) Suppose that precisely one of a0 , a1 is p − 1. Without loss we may assume that
a0 = p − 1 > a1 . Then W ∼
= T (2p − 2). Note that T (2p − 2) has composition factors
L(0) = 1 (twice) and L(p − 2) ⊕ L(1)(1) . As T (2p − 2) is self-dual and injects into Q2 (0),
we deduce that it is uniserial with trivial socle and head. Thus the sequence
0 → k → H 1 (G, L(p − 2) ⊗ L(1)(1) ) → H 1 (G, End(V )/k) → H 1 (G, k) = 0
is exact, whence
1
dim H (G, End(V )/k) =
dim Ext1G (k, L(p
(1)
− 2) ⊗ L(1)
)−1=
1, if p = 3,
0, if p = 2,
ADEQUATE SUBGROUPS AND INDECOMPOSABLE MODULES
by [2, Corollary 4.5].
51
If one replaces SL2 (q) by GL2 (q), then in fact there are no exceptions to adequacy for
q > 3 odd (if q = 3 and dim V = 3, then weak adequacy fails).
Corollary 9.5. Let G be a finite group and V be a faithful absolutely irreducible representation of G in odd characteristic p. If the image of G in PGL(V ) is PGL2 (pa ) with pa > 3,
then (G, V ) is adequate.
Proof. Without loss we may assume that V is an irreducible kG-module with k = k. Let H
be the inverse image of PSL2 (pa ) under the projection from G onto PGL2 (pa ) < PGL(V ).
Then H/Z(H) ∼
= PSL2 (pa ) and Z(H) = Z(G) is a p′ -group. Since the universal p′ -cover
a
of PSL2 (p ) is SL2 (pa ), it follows that H = Z(H)L, where L := [H, H] is the quotient of
SL2 (pa ) by a central subgroup (of order 1 or 2). Moreover, G normalizes L and centralizes
Z(H), and in fact G induces the full subgroup of inner-diagonal automorphisms of L. It
is well known that any irreducible kL-representation is invariant under any inner-diagonal
automorphism. It follows that, if W is an irreducible kH-summand of V |H , then G preserves
the isomorphism class of W . But G/H ∼
= C2 , hence W extends to a kG-module W̃ (see
e.g. [50, Theorem 8.12]), and so by Frobenius’ reciprocity, V ∼
= W̃ ⊗k A for some onedimensional k(G/H)-module A. We have shown that VH is irreducible. By Proposition
9.1, (H, V ) is weakly adequate, so is (G, V ). Also, as Op (H) = H and G/H ∼
= C2 , we
see that Op (G) = G and so H 1 (G, k) = 0. Moreover, since p 6= 2, the inflation-restriction
sequence in cohomology implies that adequacy of (H, V ) yields the same for (G, V ). So by
Corollary 9.4, it suffices to consider the following cases:
(a) a = 1 and dim V = (p ± 1)/2;
(b) pa = 9 and dim V = 3, 6, 9.
In the first case, G has a cyclic Sylow p-subgroup P of order p. It follows that H 2 (G, k) = 0
and so it it suffices to show that Ext1G (V, V ) = 0. Note that V has no lifts to characteristic
0 (since NG (P ) acts transitively on the p − 1 nontrivial elements of P , an element g ∈ P
of order p would have at least p − 1 distinct eigenvalues in any characteristic 0 lift). Thus,
Ext1G (V, V ) = 0 by Lemma 3.1 and (G, V ) is adequate.
In the second case, note that H 2 (PGL2 (9), k) = 0 [10]. Since G/Z(G) ∼
= PGL2 (9)
and Z(G) is a p′ -group, it follows that H 2 (G, k) = 0. So again it suffices to show that
Ext1G (V, V ) = 0. Note that the p′ -group Z(H) acts trivially on V ⊗k V ∗ and H 1 (L, V ⊗k
V ∗ ) = Ext1L (V, V ) = 0 by [23, Lemma 8.1]. Hence, H 1 (H, V ⊗k V ∗ ) = 0. Since G/H ∼
= C2 ,
it follows that H 1 (G, V ⊗k V ∗ ) = 0, and so we are done.
10. Adequacy for SLn (q)
In this section, we give another family of examples of modules that are adequate. The
result follows from [9, Lemma 2.5.6] if p > n. Also, recall that the case n = 2 was considered
in the previous section.
Theorem 10.1. Let p be a prime and q a power of p. Let k be an algebraically closed field
of characteristic p and V = kn with n > 2. Suppose that G < GL(V ) is a finite group that
contains a normal subgroup S ∼
= SLn (q). Then (G, V ) is adequate.
52
R. GURALNICK, F. HERZIG, AND P. TIEP
Proof. By [40, Proposition 5.4.11], any nontrivial irreducible kS-representations of dimension ≤ n is quasi-equivalent to the natural n-dimensional kS-module U . It follows that the
kS-module V is irreducible and quasi-equivalent to U . Next, the only automorphisms of
S that preserve the isomorphism class of U (hence of V ) are the inner-diagonal automorphisms. Therefore, G induces only inner-diagonal automorphisms of S, and so p ∤ [G : S].
This implies that it is enough to prove the statement for S with V being the standard
representation.
Note that V ⊗ V ∗ = W ⊕ k with W irreducible if p ∤ n and that V ⊗ V ∗ is uniserial
(of length three) with trivial head and socle if p | n. Let W denote the unique nontrivial
irreducible composition factor of V ⊗ V ∗ . Since there are semisimple elements in S with
nonzero trace on V and since not all semisimple elements of S are scalars, it follows that
End(V ) is spanned by the images of the semisimple elements of S.
By the table in [37] or by [62, Theorem 9], it follows that Ext1S (V, V ) = 0 whence the
result holds as long as p ∤ n. If p | n, then using the fact that H 1 (S, k) = 0 and H 0 (S, W ) = 0
and the long exact sequence for cohomology we see that H 1 (S, V ⊗ V ∗ /k) = 0 if and only
if dim H 1 (S, W ) = 1. By [37], this is the case and so the result follows (one can give an
alternate proof using [62] as well).
A slight modification of the proof shows that if gcd(n, q) = 1, then (G, V ) is in fact
big. Indeed, we only need observe the obvious fact that there exists a semisimple regular
element g ∈ SLn (q) with nonzero trace.
11. Asymptotic adequacy
In this section, we extend [21, Theorem 1.2] to include disconnected groups as well as
to allow the possibility that p divides dim V . First we prove some statements relating
discrete cohomology (i.e. of abstract groups) and rational cohomology (i.e. in the category
of rational modules), of linear algebraic groups on the one side, and cohomology of finite
groups of Lie type on the other side. We use subscripts disc and rat to make distinction
between these two types of cohomology groups.
First we record the following result (which essentially is a special case of a result of van
der Kallen, cf. [52, p. 239]):
Lemma 11.1. Let k = Fp and let G be a linear algebraic group defined over Fq ⊂ k. Let
V be a finite-dimensional rational kG(k)-module. If H 1 (G(Fqf ), V ) = 0 for large enough f ,
1 (G(k), V ) = 0.
then Hdisc
Proof. First we note that if U is any finite-dimensional kG(k)-module, then G(Fqf ) and G(k)
have the same subspace of fixed points on U when f is divisible by some integer N = N (U ).
Indeed, let Uj denote the fixed point subspace for G(Fqj! ) on U . Then U1 ⊇ U2 ⊇ . . ., and
so Uj stabilizes when j ≥ j0 for some j0 . But each element of G(k) is contained in G(Fqj! )
for some j ≥ j0 . It follows that CU (G(k)) = Uj0 = CU (G(Fqj! )) for all j ≥ j0 . In particular,
we can choose N = j0 !.
Consider any exact sequence 0 → V → W → k → 0 of kG(k)-modules. By assumption,
it is split over G(Fqf ) for f large enough. Hence CW (G(Fqf )) has dimension equal to
dimk CV (G(Fqf ))+1, which by our claim is equal to dimk CV (G(k))+1 when N (U )|f . Again
ADEQUATE SUBGROUPS AND INDECOMPOSABLE MODULES
53
by our claim, CW (G(Fqf )) = CW (G(k)) for N (W )|f . It follows that dimk CW (G(k)) =
1 (G(k), V ) = 0.
dimk CV (G(k)) + 1, whence W is split over G(k). Hence Hdisc
Next we observe that the results of [35, Prop. II.2.14] and [8, Theorem 6.6] hold in more
generality than they were stated.
Proposition 11.2. Let k be an algebraically closed field of characteristic p and let G be
a (not necessarily connected) reductive algebraic group defined over k. Let V be a finitedimensional rational kG-module.
(i) Suppose that p ∤ [G : G 0 ] and V is irreducible. Then Ext1G (V, V )rat = 0.
(ii) Suppose G is connected and defined over Fq ⊂ k. Then for e and f large enough
(depending on V and n),
n
Hrat
(G, V (e)) ∼
= H n (G(Fqf ), V ),
= H n (G(Fqf ), V (e)) ∼
where V (e) is the e-th Frobenius twist of V .
Proof. (i) Since p ∤ [G : G 0 ], it suffices to show that Ext1G 0 (X, Y )rat = 0 for any two
irreducible G 0 -submodules X, Y of V . Assume the contrary: Ext1G 0 (X, Y )rat 6= 0 for some
such X and Y . By Clifford’s theorem, Y ∼
= g(X) for some g ∈ G. Given a pair (T , B) of a
maximal torus T and a Borel subgroup B containing T of G 0 , we have that g−1 (T , B)g =
h−1 (T , B)h for a suitable h ∈ G 0 . Replacing g by gh−1 , we get that g normalizes both T
and B, and Y ∼
= g(X). Suppose that X = L(λ) for some dominant weight λ with respect to
T . Then τ (λ) is dominant and Y = L(τ (λ)), where τ is the outer automorphism (possibly
trivial) of G 0 induced by g. By [35, Proposition II.2.14], Ext1G 0 (X, Y )rat 6= 0 implies that
λ 6= τ (λ) but λ and τ (λ) are comparable, say λ > τ (λ). Since τ fixes (T , B), it fixes the set
of positive roots with respect to T , whence τ i (λ) > τ i+1 (λ) for all i ≥ 0. Also, note that
the action of τ on the weight lattice X(T ) has finite order N . Thus we arrive at the chain
λ > τ (λ) > τ 2 (λ) > . . . > τ N (λ) = λ,
a contradiction.
(ii) Consider the action of the central torus Z := Z(G)0 on V and decompose V =
n (G, [Z, V ]) = 0, and so H n (G, V ) ∼ H n (G, V ′ ).
V ⊕ [Z, V ] with V ′ := CV (Z). Then Hrat
= rat
rat
The same holds for Frobenius twists V (e) of V ; moreover, V ′ (e) ∼
= CV (e) (Z). Applying [8,
Theorem 6.6] to the semisimple group H := G/Z (and recalling that Z is a torus), we get
for e and f large enough that
′
n
n
Hrat
(G, V ′ (e)) ∼
(H, V ′ (e)) ∼
= H n (H(Fqf ), V ′ ).
= Hrat
= H n (H(Fqf ), V ′ (e)) ∼
On the other hand, H(Fqf ) is isomorphic to G(Fqf )/Z(Fqf ) (by the Lang-Steinberg theorem). Moreover, for f large enough, Z and Z(Fqf ) have the same eigenspaces on V . It
follows that [Z, V ] = [Z(Fqf ), V ] and V ′ = CV (Z(Fqf )), whence
H n (G(Fqf ), V ) = H n (G(Fqf ), V ′ ) = H n (H(Fqf ), V ′ )
(as Z(Fqf ) is a p′ -group). The same holds for V (e), and so the statement follows.
54
R. GURALNICK, F. HERZIG, AND P. TIEP
Lemma 11.3. Let p be a prime and let k be an algebraically closed field of characteristic p. Let G be a connected reductive algebraic group over k and V be a rational G1 (G, V (e)) = 0 for all Frobenius twists V (e) of V with e large enough, then
module. If Hrat
1
Hdisc (G(k), V ) = 0.
Proof. If the result fails, then there exists a (possibly non-rational) kG(k)-module W and
a non-split extension 0 → V → W → k → 0.
Let K be the algebraic closure of Fp in k. Note that G can be defined over Fq ⊂ k for
q sufficiently large (as it can be defined over K by the isomorphism theorem for reductive
groups). Also, let T (k) be a maximal torus of G(k) containing a maximal torus T (K) of
G(K). For e and f large enough, we have by assumption and by Proposition 11.2(ii) that
1 (G, V (e)) = 0. It follows by Lemma 11.1 that W is split over G(K),
H 1 (G(Fqf ), V ) = Hrat
whence
(11.1) dimk CW (G(K)) = dimk CV (G(K)) + 1, dimk CW (T (K)) = dimk CV (T (K)) + 1.
We claim that CW (T (K)) = CW (T (k)). Clearly, the fixed point subspace U := CW (T (K))
is T (k)-invariant. Also, since V is a rational kG(k)-module, T (k) acts trivially on U ∩ V =
CV (T (K)), which has codimension 1 in U by (11.1). Thus, T (k) maps into a unipotent
subgroup of GL(U ). Note that T (k) is p-divisible, and so is any homomorphic image of it.
It follows that T (k) acts trivially on U , as stated.
Thus, the fixed point subspace of hT (k), G(K)i on W is the fixed point subspace of
hT (K), G(K)i = G(K) on W . Observe that G(k) = hT (k), G(K)i. (Indeed, if Uα (k) ⊇
Uα (K) are root subgroups corresponding to a root α with respect to T , then T (k) acts
transitively on Uα (k) \ {1}. Since G(K) ⊃ Uα (K) and G(k) is generated by T (k) and all
the root subgroups Uα (k), the claim follows.) Hence, CW (G(k)) = CW (G(K)) and so
dimk CW (G(k)) ≥ dimk CV (G(k)) + 1
by (11.1). Hence W is split as a G(k)-module, a contradiction.
Corollary 11.4. Let k be an algebraically closed field of characteristic p and let G be a
reductive algebraic group over k. Let V be an irreducible rational kG(k)-module. Assume
that p ∤ [G : G 0 ]. Then
H 1 (H(k), k) = Ext1H(k) (V, V ) = H 1 (H(k), (V ∗ ⊗ V )/k) = 0,
both as rational and discrete cohomology groups, and for both H = G, G 0 .
Proof. Since p ∤ [G : G 0 ], it suffices to prove the statement for G 0 . As shown in Proposition
i (G 0 , k) = 0 for i > 0 by [35, Corollary II.4.11]. We
11.2(i), Ext1G 0 (V, V )rat = 0. Also, Hrat
1 (G 0 , k) = H 1 (G 0 , (V ∗ ⊗ V )/k) = 0. The same applies to
have therefore shown that Hrat
rat
1 (G 0 (k), k) = H 1 (G 0 (k), (V ∗ ⊗
Frobenius twists. Hence Ext1G 0 (k) (V, V )disc = 0 and Hdisc
disc
V )/k) = 0 by Lemma 11.3.
We finally show that adequacy holds over a sufficiently large field and also for (not
necessarily connected) reductive algebraic groups (whether one uses rational cohomology
or discrete cohomology in the definition). Note that if p does divide [G : G 0 ], then adequacy
may fail (the spanning may fail as well as the cohomological conditions even assuming that
p ∤ (dim V ) – one can construct examples precisely as in [20]).
ADEQUATE SUBGROUPS AND INDECOMPOSABLE MODULES
55
Theorem 11.5. Let k be an algebraically closed field k of characteristic p. Let G be a
reductive algebraic group defined over Fq ⊂ k such that p ∤ [G : G 0 ], and let V be a finitedimensional faithful irreducible rational kG-module. Then the following statements hold.
(i) (G, V ) is adequate.
(ii) Assume that every coset of G 0 in G is defined over Fq . Then (G(Fqf ), V ) is adequate
for f sufficiently large (with f possibly depending upon V ).
Proof. (a) Arguing precisely as in [22], we see that the set of semisimple elements in any
coset of G 0 is Zariski dense in G. It follows that the linear span of semisimple elements of
G is Zariski dense in the linear span of G in End(V ). Thus, the span of the semisimple
elements in G is all of End(V ).
Let T ⊂ B be a maximal torus and a Borel subgroup of G 0 that are defined over Fq .
Choose f large enough so that T (Fqf ) has exactly the same weight spaces on End(V ) and
V as does T . Let N := NG (T , B) denote the simultaneous normalizer of (T , B) in G. Then
N ∩ G 0 = T , hence every element of N is semisimple (as p ∤ [G : G 0 ]). Conversely, if
g ∈ G is semisimple, then by [58, 7.5] g normalizes some pair (T ′ , B ′ ) of a maximal torus
T ′ contained in a Borel subgroup B ′ . We deduce that
(11.2)
Gss = ∪x∈G xN x−1 ,
where Gss denotes the set of semisimple elements in G.
Let W be the linear span of G(Fqf )ss := G(Fqf ) ∩ Gss in End(V ). Then W is G(Fqf )stable and hence in particular T -stable (as T and T (Fqf ) have the same eigenspaces on
End(V )). Arguing as in [21], we see that hT, G(Fqf )i is Zariski dense in G. It follows that
W is G-stable. Since N /T ֒→ G/G 0 and every coset of G 0 is defined over Fq , we deduce
by Lang’s theorem that N = N (Fqf ) · T . Moreover, as T (Fqf ) and T have the same
eigenspaces on V , T (Fqf ) and T span the same subspace of End(V ). Now W contains the
span of N (Fqf ) ⊂ G(Fqf )ss , hence contains the span of N . Since W is G-stable, we deduce
from (11.2) that W contains the span of Gss . Thus for f sufficiently large we have that
W = End(V ); in particular, G(Fqf ) acts absolutely irreducibly on V .
1 (G(k), k) = H 1 (G(k), (V ∗ ⊗ V )/k) = 0.
(b) From Corollary 11.4 we get that Hdisc
disc
Together with (a), this implies (i).
1 (G 0 , k) = H 1 (G 0 , (V ∗ ⊗ V )/k) = 0, and the same holds for
We also have that Hrat
rat
all Frobenius twists. Applying Proposition 11.2(ii) we obtain (for f large enough) that
H 1 (G 0 (Fqf ), k) = H 1 (G 0 (Fqf ), (V ∗ ⊗ V )/k) = 0, whence H 1 (G(Fqf ), k) = H 1 (G(Fqf ), (V ∗ ⊗
V )/k) = 0 as well since p ∤ [G : G 0 ]. Hence (ii) holds.
References
[1] J. L. Alperin, ‘Local Representation Theory. Modular Representations as an Introduction to the
Local Representation Theory of Finite Groups, Cambridge Studies in Advanced Mathematics, 11.
Cambridge University Press, Cambridge, 1986.
[2] H. Andersen, J. Jorgensen, and P. Landrock, The projective indecomposable modules of SL(2, pn ).
Proc. London Math. Soc. (3) 46 (1983), 38–52.
[3] C. Bendel, D. Nakano, and C. Pillen, On the vanishing ranges for the cohomology of finite groups
of Lie type II. Recent developments in Lie algebras, groups and representation theory, 25–73, Proc.
Sympos. Pure Math., 86, Amer. Math. Soc., Providence, RI, 2012.
56
R. GURALNICK, F. HERZIG, AND P. TIEP
[4] D. J. Benson, ‘Representations and Cohomology. I’ 2nd ed., Cambridge Stud. Adv. Math. 30,
Cambridge University Press, Cambridge 1998.
[5] H. I. Blau and J. Zhang, Linear groups of small degree over fields of finite characteristic, J. Algebra
159 (1993), 358–386.
[6] G. Böckle, A local-to-global principle for deformations of Galois representations, J. reine angew
Math. 509 (1999), 199–236.
[7] R. Burkhardt, Die Zerlegungsmatrizen der Gruppen PSL(2, pf ), J. Algebra 40 (1976), 75–96.
[8] E. Cline, B. Parshall, L. Scott, and Wilberd van der Kallen, Rational and generic cohomology.
Invent. Math. 39 (1977), 143–163.
[9] L. Clozel, M. Harris, and R. Taylor, Automorphy for some l-adic lifts of automorphic mod l Galois
representations. With Appendix A, summarizing unpublished work of Russ Mann, and Appendix
B by Marie-France Vignéras, Publ. Math. Inst. Hautes Études Sci. No. 108 (2008), 1–181.
[10] J. H. Conway, R. T. Curtis, S. P. Norton, R. A. Parker, and R. A. Wilson, ‘An ATLAS of Finite
Groups’, Clarendon Press, Oxford, 1985.
[11] F. E. Diederichsen, Über die Ausreduction ganzzahliger Gruppendarstellungen bei arithmetischer
Äquivalenz, Abh. Math. Sem. Univ. Hamburg 13 (1938), 357–412.
[12] L. Dieulefait, Automorphy of Symm5 (GL(2)) and base change, J. Math. Pures Appl. 104 (2015),
619–656.
[13] F. Digne and J. Michel, ‘Representations of Finite Groups of Lie Type’, London Mathematical
Society Student Texts 21, Cambridge University Press, 1991.
[14] S. Doty and A. Henke, Decomposition of tensor products of modular irreducibles for SL2 , Quart.
J. Math. 56 (2005), 189–207.
[15] P. Fong and B. Srinivasan, Brauer trees in classical groups, J. Algebra 131 (1990), 179–225.
[16] The GAP group, ‘GAP - groups, algorithms, and programming’, Version 4.4, 2004, http://www.gapsystem.org.
[17] M. Geck, Irreducible Brauer characters of the 3-dimensional special unitary groups in non-describing
characteristic, Comm. Algebra 18 (1990), 563–584.
[18] D. Gorenstein, R. Lyons, and R. Solomon, ‘The Classification of the Finite Simple Groups’, Number
3, Mathematical Surveys and Monographs Volume 40, American Math. Soc. 1998.
[19] R. M. Guralnick, Small dimensional representations are semisimple, J. Algebra 220 (1999), 531–541.
[20] R. M. Guralnick, Adequate subgroups II, Bull. Math. Sci. 2 (2012), 193–203.
[21] R. M. Guralnick, Adequacy of representations of finite groups of Lie type, Appendix A to: L.
Dieulefait, Automorphy of Symm5 (GL(2)) and base change, J. Math. Pures Appl. 104 (2015),
619–656.
[22] R. M. Guralnick, F. Herzig, R. Taylor, and J. Thorne, Adequate subgroups, J. Inst. Math. Jussieu
11 (2012), 907–920.
[23] R. M. Guralnick, F. Herzig, and Pham Huu Tiep, Adequate groups of low degree, Algebra & Number
Theory 9 (2015), 77–147.
[24] R M. Guralnick, K. Magaard, J. Saxl, and Pham Huu Tiep, Cross characteristic representations of
odd characteristic symplectic groups and unitary groups, J. Algebra 257 (2002), 291–347.
[25] R. M. Guralnick, G. Navarro, and Pham Huu Tiep, Real class sizes and real character degrees,
Math. Proc. Camb. Philos. Soc. 150 (2011), 47–71.
[26] R. M. Guralnick and Pham Huu Tiep, Low-dimensional representations of special linear groups in
cross characteristic, Proc. London Math. Soc. 78 (1999), 116–138.
[27] R. M. Guralnick and Pham Huu Tiep, The non-coprime k(GV ) problem, J. Algebra 293 (2005),
185–242.
[28] R. M. Guralnick and Pham Huu Tiep, Symmetric powers and a problem of Kollár and Larsen,
Invent. Math. 174 (2008), 505–554.
[29] G. Hiss and K. Lux, ‘Brauer Trees of Sporadic Groups’, Clarendon Press, 1989, 525 pp.
[30] G. Hiss and G. Malle, Low dimensional representations of special unitary groups, J. Algebra 236
(2001), 745–767.
ADEQUATE SUBGROUPS AND INDECOMPOSABLE MODULES
57
[31] G. Hiss and G. Malle, Corrigenda: Low-dimensional representations of quasi-simple groups, LMS
J. Comput. Math. 5 (2002), 95–126.
[32] I. M. Isaacs, ‘Character Theory of Finite Groups’, AMS-Chelsea, Providence, 2006.
[33] C. Jansen, The minimal degrees of faithful representations of the sporadic simple groups and their
covering groups, LMS J. Comput. Math. 8 (2005), 122–144.
[34] C. Jansen, K. Lux, R. A. Parker, and R. A. Wilson, ‘An ATLAS of Brauer Characters’, Oxford
University Press, Oxford, 1995.
[35] J. C. Jantzen, Representations of algebraic groups. Second edition. Mathematical Surveys and
Monographs, 107. American Mathematical Society, Providence, RI, 2003.
[36] J. C. Jantzen, Low-dimensional representations of reductive groups are semisimple, in: ‘Algebraic
Groups and Lie Groups’, 255–266, Austral. Math. Soc. Lect. Ser., 9, Cambridge Univ. Press, Cambridge, 1997.
[37] W. Jones and B. Parshall, On the 1-cohomology of finite groups of Lie type. Proceedings of the
Conference on Finite Groups (Univ. Utah, Park City, Utah, 1975), pp. 313–328. Academic Press,
New York, 1976.
[38] W. M. Kantor, Linear groups containing a Singer cycle, J. Algebra 62 (1980), 232–234.
[39] N. M. Katz, Exponential sums and differential equations, Annals of Math. Studies 124, Princeton
Univ. Press, Princeton, NJ 1999.
[40] P. B. Kleidman and M. W. Liebeck, ‘The Subgroup Structure of the Finite Classical Groups’, London
Math. Soc. Lecture Note Ser. no. 129, Cambridge University Press, 1990.
[41] P. B. Kleidman, The maximal subgroups of the Chevalley groups G2 (q) with q odd, the Ree groups
2
G2 (q), and their automorphism groups, J. Algebra 117 (1988), 30–71.
[42] V. Landazuri and G. Seitz, On the minimal degrees of projective representations of the finite Chevalley groups, J. Algebra 32 (1974), 418–443.
[43] M. W. Liebeck, Permutation modules for rank 3 unitary groups, J. Algebra 88 (1984), 317- 329.
[44] M. W. Liebeck, E. O’Brien, A. Shalev, and Pham Huu Tiep, The Ore conjecture, J. Eur. Math.
Soc. 12 (2010), 939–1008.
[45] M. W. Liebeck and G. M. Seitz, ‘Unipotent and Nilpotent Classes in Simple Algebraic Groups and
Lie Algebras’, Math. Surveys and Monographs, vol. 180, AMS, Providence, RI, 2012.
[46] K. Lux and H. Pahlings, ‘Representations of Groups: A Computational Approach’, Cambridge Univ.
Press, 2010.
[47] B. Mazur, Deforming Galois representations, in: ‘Galois Groups over Q (Berkeley, 1987)’, SpringerVerlag, Berlin-Heidelberg-New York, 1989, pp. 385–437.
[48] G. McNinch, Dimensional criteria for semisimplicity of representations. Proc. London Math. Soc.
76 (1998), 95–149.
[49] Decomposition matrices, http://www.math.rwth-aachen.de/homes/MOC/decomposition/
[50] G. Navarro, ‘Characters and Blocks of Finite Groups’, Cambridge University Press, 1998.
[51] G. Navarro and Pham Huu Tiep, Characters of p′ -degree over normal subgroups, Annals of Math.
178 (2013), 1135–1171.
[52] B. J. Parshall, Cohomology of algebraic groups, in: The Arcata Conference on Representations of
Finite Groups (Arcata, Calif., 1986), 233–248, Proc. Sympos. Pure Math. 47, Part 1, Amer. Math.
Soc., Providence, RI, 1987.
[53] R. M. Peacock, Blocks with a cyclic defect group, J. Algebra 34 (1975), 232–259.
[54] M. H. Peel, Hook representations of the symmetric groups, Glasgow Math. J. 12 (1971), 136–149.
[55] J.-P. Serre, Sur la semi-simplicité des produits tensoriels de représentations de groupes, Invent.
Math. 116 (1994), 513–530.
[56] J.-P. Serre, Complète réductibilité, Séminaire Bourbaki Vol. 2003/2004, Astérisque No. 299 (2005),
Exp. No. 932, viii, 195–217.
[57] P. Sin and Pham Huu Tiep, Rank 3 permutation module of the finite classical groups, J. Algebra
291 (2005), 551–606.
[58] R. Steinberg, Endomorphisms of linear algebraic groups. Memoirs of the American Mathematical
Society, No. 80, American Mathematical Society, Providence, R.I. 1968
58
R. GURALNICK, F. HERZIG, AND P. TIEP
[59] J. Thorne, On the automorphy of l-adic Galois representations with small residual image. With an
appendix by Robert Guralnick, Florian Herzig, Richard Taylor and Thorne, J. Inst. Math. Jussieu
11 (2012), 855–920.
[60] J. Thorne, A 2-adic automorphy lifting theorem for unitary groups over CM fields, Math. Z. (2016),
DOI:10.1007/s00209-016-1681-2.
[61] Pham Huu Tiep, Finite groups admitting grassmannian 4-designs, J. Algebra 306 (2006), 227–243.
[62] O. Taussky and H. Zassenhaus, On the 1-cohomology of the general and special linear groups,
Aequationes Math. 5 (1970), 129–201.
[63] Pham Huu Tiep and A. E. Zalesskii, Minimal characters of the finite classical groups, Commun.
Algebra 24 (1996), 2093–2167.
[64] Pham Huu Tiep and A. E. Zalesskii, Some characterizations of the Weil representations of symplectic
and unitary groups, J. Algebra 192 (1997), 130–165.
[65] T. E. Zieschang, Primitive permutation groups containing a p-cycle, Arch. Math. 64 (1995), 471–474.
[66] K. Zsigmondy, Zur Theorie der Potenzreste, Monatsh. Math. Phys. 3 (1892), 265–284.
Department of Mathematics, University of Southern California, Los Angeles, CA 900892532, USA
E-mail address: [email protected]
Department of Mathematics, University of Toronto, 40 St. George Street, Room 6290,
Toronto, ON M5S 2E4, Canada
E-mail address: [email protected]
Department of Mathematics, University of Arizona, Tucson, AZ 85721-0089, USA
E-mail address: [email protected]
| 4math.GR
|
1
Hydra: an Ensemble of Convolutional Neural
Networks for Geospatial Land Classification
arXiv:1802.03518v1 [cs.CV] 10 Feb 2018
Rodrigo Minetto, Maurı́cio Pamplona Segundo, Sudeep Sarkar
Abstract—We describe in this paper Hydra, an ensemble of convolutional neural networks (CNN) for geospatial land classification.
The idea behind Hydra is to create an initial CNN that is coarsely optimized but provides a good starting pointing for further
optimization, which will serve as the Hydra’s body. Then, the obtained weights are fine tuned multiple times to form an ensemble of
CNNs that represent the Hydra’s heads. By doing so, we were able to reduce the training time while maintaining the classification
performance of the ensemble. We created ensembles using two state-of-the-art CNN architectures, ResNet and DenseNet, to
participate in the Functional Map of the World challenge. With this approach, we finished the competition in third place. We also applied
the proposed framework to the NWPU-RESISC45 database and achieved the best reported performance so far. Code and CNN
models are available at https://github.com/maups/hydra-fmow.
Index Terms—Geospatial land classification, remote sensing image classification, functional map of world, ensemble learning, on-line
data augmentation, convolutional neural network.
F
1
I NTRODUCTION
Land use is a critical piece of information for a wide
range of applications, from humanitarian to military purposes. For this reason, automatic land use classification
from satellite images has been drawing increasing attention
from academia, industry and government agencies. One of
the most recent initiatives in this area is the Functional
Map of the World (FMOW) challenge [1] sponsored by the
Intelligence Advanced Research Projects Activity (IARPA),
an organization within the Office of the USA Director of
National Intelligence.
The FMOW challenge consists of creating automatic
solutions to classify a specific given location as one of the
62 target classes (e.g. airport, flooded road, nuclear power
plant and so on) or as none of them (false detections).
FMOW images vary in quality and are distributed over
more than 100,000 globe locations, which leads to high
intraclass variations and considerable interclass confusion.
This, added to traditional satellite imaging problems like
viewpoint, weather, shadow and scale variations, makes this
classification problem a lot harder than previous land use
datasets, such as UC Merced Land Use Dataset [2], WHURS19 [3] and NWPU-RESISC45 [4]. Finally, the FMOW
challenge also limits time and computational resources for
training and testing to minimize the disparity among participants’ solutions.
To cope with the difficulties and restrictions of the
FMOW challenge, as our main contribution, in this work
•
•
•
•
R. Minetto is with Universidade Tecnológica Federal do Paraná (UTFPR),
Brazil. E-mail: [email protected]
M. P. Segundo is with Universidade Federal da Bahia (UFBA), Brazil.
E-mail: [email protected]
S. Sarkar is with Department of Computer Science and Engineering, University of South Florida (USF), Tampa, FL, USA. E-mail: [email protected]
The research in this paper was conducted while the authors were at the
Computer Vision and Pattern Recognition Group, USF.
we present a framework that creates ensembles of Convolutional Neural Networks (CNN) for land use classification in satellite images, which we called Hydra. The idea
behind Hydra is to create an initial CNN that is coarsely
optimized but provides a good starting pointing for further
optimization, which will serve as the Hydra’s body. Then,
the obtained weights are fine tuned multiple times to form
an ensemble of CNNs that represent the Hydra’s heads. The
Hydra framework tackles one of the most common problem
in multiclass classification, which is the existence of several
local minima that prioritize some classes over others and the
eventual absence of a global minimum within the classifier
search space. The ensemble ends up expanding this space
by combining multiple classifiers that converged to local
minima and reaches a better global approximation. Figure 1
illustrates this process, where a black line represents the
body optimization part and the red lines represent the heads
reaching different local minima. To stimulate convergence to
different end points, we exploit different strategies, such as
using online data augmentation, variations in the size of the
region of interest, and different image formats released by
FMOW.
2
T HE FMOW C HALLENGE
The main goal of the FMOW challenge was to encourage
researchers and machine learning experts to design automatic classification solutions for land use interpretation
in satellite images. The competition was hosted by TopCoder1 , where participants had one submission every three
hours to keep track of their ongoing performance. Details
regarding dataset, scoring, and restrictions are given in
Sections 2.1, 2.2, and 2.3, respectively.
1. https://www.topcoder.com/
2
(a)
(b)
(c)
Fig. 1. Illustration of the optimization process in the Hydra framework.
The black line represents the coarse parameter optimization that forms
the Hydra’s body. The red lines represent the Hydra’s heads, which are
obtained after fine tuning the body parameters multiple times seeking to
reach different local minima.
2.1
Dataset
The FMOW dataset, as detailed by Christie et al. [1], contains
almost half of a million images split into training, evaluation
and testing subsets, as presented in Table 1. It was publicly
released2 in two image formats: JPEG (194 GB) and TIFF (2.8
TB). For both formats, high-resolution pan-sharpened [5]
and multi-spectral images were available, although the latter one varies with the format. While TIFF images provided
the original 4/8-band multi-spectral information, the color
space was compressed in JPG images to fit their 3-channel
limitation.
Fig. 2. Different challenges in FMOW satellite images: (a) shadow and
viewpoint variations, (b) arbitrary weather conditions, (c) inaccurate
annotations and (d) scale variations.
TABLE 1
Table of contents of the FMOW dataset.
Training
Evaluation
Testing
Total
# of images
# of boxes
# of distinct boxes
363,572
53,041
53,473
470,086
363,572
63,422
76,988
503,982
83,412
12,006
16,948
112,366
Pan-sharpened image dimensions range from 293 × 230
to 16184 × 16288 pixels, and multi-spectral from 74 × 58
to 4051 × 4077. Each image has one or more annotated
boxes that correspond to regions of interest. Some of these
regions may appear in several images taken in different
time periods, adding a temporal element to the problem,
as shown in Figures 2(a) and 2(b). Traditional problems
arising from that include, but are not limited to, variations
in shadows, satellite viewpoint and weather conditions. Figures 2(c) and 2(d) illustrate other recurrent problems in the
FMOW dataset: inaccurate annotations and large variations
in region size.
Each region is an instance of one of the 62 classes
or a false detection. All classes considered in the FMOW
challenge are illustrated in Figure 3. Those classes have an
unbalanced distribution, as shown in Figure 4. Images in
the training subset contain a single region that is never a
2. https://www.iarpa.gov/challenges/fmow.html
(d)
false detection. The evaluation subset has images with one
or two regions, with at least one not being a false detection.
Testing images may have several regions but their labels are
unknown (see Figure 2(d)). From 53,473 images in the test
subset, 82.60% have a single region, 4.96% have two regions,
5.66% have three regions and 6.78% have four regions or
more, with a maximum number of fourteen regions per
image.
The FMOW dataset also provides different metadata
along with each region, such as bounding box and image
size, ground sample distance, region visibility, cloud cover,
timestamps, wavelengths, scan direction, sun elevation,
Universal Transverse Mercator (UTM) zone, and so on.
2.2
Scoring
Submissions consisted of a list with one label prediction
— among the m possible classes (m = 63, i.e. 62 land use
classes plus false detection) — for each distinct region in the
test set. When the same region appeared in several images,
like the ones in Figures 2(a) and 2(b), the competitors
were asked to merge all these information into a single
label outcome. The quantitative criteria used by the FMOW
challenge to rank its competitors was a weighted average of
the F -measure [6] for each class.
3
Airport
(w: 0.6)
Airport hangar
(w: 1.0)
Airport terminal
(w: 1.0)
Amusement
park (w: 1.0)
Aquaculture
(w: 1.0)
Archaeological
site (w: 1.0)
Barn
(w: 1.0)
Border checkpoint
(w: 1.4)
Burial site
(w: 1.0)
Car dealership
(w: 1.0)
Construction
site (w: 1.4)
Crop field
(w: 0.6)
Dam
(w: 1.0)
Debris or rubble
(w: 0.6)
Educational institution (w: 1.4)
Electric substation
(w: 1.0)
Factory or power
plant (w: 1.4)
Fire station
(w: 1.4)
Flooded road
(w: 0.6)
Fountain
(w: 1.0)
Gas station
(w: 1.4)
Golf course
(w: 1.0)
Ground transp.
station (w: 1.0)
Helipad
(w: 1.0)
Hospital
(w: 1.0)
Impoverished settlement (w: 1.0)
Interchange
(w: 1.0)
Lake or pond
(w: 1.0)
Lighthouse
(w: 1.0)
Military facility
(w: 0.6)
Multi-unit residen- Nuclear powerplant
tial (w: 1.0)
(w: 0.6)
Office building
(w: 1.0)
Oil or gas facility
(w: 1.0)
Park
(w: 1.0)
Parking lot or
garage (w: 1.0)
Place of worship
(w: 1.0)
Police station
(w: 1.4)
Port
(w: 1.0)
Prison
(w: 1.0)
Race track
(w: 1.0)
Railway bridge
(w: 1.0)
Recreational
facility (w: 1.0)
Road bridge
(w: 1.4)
Runway
(w: 1.0)
Shipyard
(w: 1.0)
Shopping mall
(w: 1.0)
Single-unit residential (w: 0.6)
Smokestack
(w: 1.4)
Solar farm
(w: 0.6)
Space facility
(w: 1.0)
Stadium
(w: 1.0)
Storage tank
(w: 1.0)
Surface mine
(w: 1.0)
Swimming pool
(w: 1.0)
Toll booth
(w: 1.0)
Tower
(w: 1.4)
Tunnel opening
(w: 0.6)
Waste disposal
(w: 1.0)
Water treatment
facility (w: 1.0)
Wind farm
(w: 0.6)
Zoo
(w: 1.0)
False detection
(w: 0.0)
Fig. 3. List of classes of the FMOW challenge. An image example, a label and an associated weight are presented for each class. The least
challenging classes have a lower weight (0.6) while the most difficult ones have a higher weight (1.4). These weights impact the final classification
score.
4
Fig. 4. The class histogram distribution for the training (gray bars) and evaluation sets (black bars) by using the 3-band pansharpened
JPEG/RGB set. Note the highly unbalanced class distribution.
class 2
class m
class 1
C=
Ground-truth label
Let P = he1 , e2 , . . . , en i be the predicted labels provided
by a competitor and G = hg1 , g2 , . . . , gn i the ground-truth
labels for n distinct test regions. From P and G, one can
derive a confusion matrix C :
Predicted label
···
class 1
C1,1
C1,2
...
C1,m
class 2
..
.
C2,1
..
.
C2,2
..
.
...
..
.
C2,m
..
.
class m-1
Cm−1,1
Cm−1,2
...
Cm−1,m
class m
Cm,1
Cm,2
...
Cm,m
where Ci,i is the number of correct classifications for the ith class and Ci,j the number of images from the i-th class
that were mistakenly classified as the j -th class. With these
values we compute the precision Pi and recall Ri scores for
the i-th class as follows:
Pi =
tpi
tpi + f pi
Ri =
tpi
tpi + f ni
Pm
Fi × w i
Pm
F̄ = i=1
i=1 wi
where wi is the weight of i-th class. The weights for each
class are provided in Figure 3. It is worth noting that the
weight for false detections is 0, but it does not mean it will
not affect F̄ . If a region is misclassified as a false detection,
its class will have an additional false negative. If a false
detection is misclassified as another class, one more false
positive will be taken into account.
2.3 Hardware and time restrictions
The competition ran from September 21st to December 31st,
2017. The provisional standings were used to select the top
10 competitors as finalists. For the final round, competitors
were asked to provide a dockerized version3 of their solutions, and the final standings were determined based on
the results for a separate sequestered dataset (i.e. none of
the competitors had access to these images). The dockerized
solution had to cope with the following limitations:
•
•
where:
tpi = Ci,i
f pi =
m
X
Cj,i
j=1,j6=i
f ni =
m
X
•
Ci,j
All models required by the solution should be generated during training using raw data only (i.e. preprocessed data was not allowed) within 7 days.
The prediction for all test images should be performed in no more than 24 hours. Prebuilt models
should be provided to enable testing before training.
Hardware was restricted to two types of Linux AWS
instances: m4.10xlarge and g3.16xlarge.
j=1,j6=i
are respectively the number of true positives, false positives
and false negatives for the i-th class. The F -measure for each
class is then computed as the harmonic mean of precision
and recall:
Fi =
(1)
2 × Pi × R i
Pi + R i
The final score F̄ is the weighted sum of the F -measure
for all classes:
Instances of the type m4.10xlarge have 40 Intel Xeon E52686 v4 (Broadwell) processors and 160GB of memory and
were recommended for CPU-based systems. Instances of the
type g3.16xlarge have 4 NVIDIA Tesla M60 GPUs, 64 similar
processors and 488GB of memory and were recommended
for GPU-based systems. However, as can be noticed, a
g3.16xlarge instance was best suited for both CPU-based and
GPU-based systems.
3. https://www.docker.com/
5
2.4
Baseline
4
The organizers released a baseline classification code in
October 14th, 2017, and updated that solution in November
17th of the same year. The most recent and accurate version
of the baseline consists in extracting discriminant features
from images and metadata using deep neural networks.
To this end, they concatenated image features obtained
by a CNN (DenseNet-161 [7]) to a preprocessed vector of
metadata (mean subtraction) and fed this to a multilayer
perceptron (MLP) with 2 hidden layers. A softmax loss is
then used by the Adam optimizer [8] during training. They
used both training and validation subsets for training, and
no augmentation was performed. More details can be found
in the work of Christie et al. [1]. The classifiers employed in
our Hydra framework are variations of this baseline code.
3
on I MAGE N ET [15] as a starting point. Then, the obtained
weights serve as starting point for several copies of these
CNNs, which are further optimized to form the heads of the
Hydra. During testing, an image is fed to all Hydra’s heads
and their outputs are fused to generate a single decision, as
illustrated in Figure 6.
FMoW dataset
...
T HE H YDRA F RAMEWORK
Ensembles of learning algorithms have been effectively used
to improve the classification performance in many computer vision problems [9], [10], [11]. The reasons for that,
as pointed out by Dietterich [12] are: the training phase
could not provide sufficient data to build a single best
classifier; the optimization algorithm fails to converge to the
global minimum, but an ensemble using distinct starting
points could better approximate the optimal result; or the
space being searched may not contain the optimal global
minimum, but an ensemble may expand this space for a
better approximation.
Formally,
a
supervised
machine
learning
algorithm receives a list of training samples
{(x1 , y1 ), (x2 , y2 ), . . . , (xm , ym )} drawn from some
unknown function y = f (x) — where x is the feature
vector and y the class — and searches for a function h
through a space of functions H, also known as hypotheses,
that best matches y . As described by Dietterich [12],
an ensemble of learning algorithms build a set of
hypotheses {h1 , h2 , . . . , hk } ∈ H with respective weights
{w1 , w2 , . . . , wk }, and then provides a classification decision
ȳ through hypotheses fusion. Different fusion approaches
Pk
may be exploited, such as weighted sum ȳ = i=1 wi hi (x),
majority voting, and so on.
Hydra is a framework to create ensembles of CNNs. As
pointed out by Sharkey [13], a neural network ensemble
can be build by: varying the initial weights; varying the
network architecture; and varying the training set. Varying
the initial weights, however, requires a full optimization for
each starting point and thus consumes too much computational resources. For the same reason, varying the network
architecture demands caution when it is not possible to
share learned information between different architectures.
Unlike previous possibilities, varying the training set can be
done in any point of the optimization process for one or
multiple network architectures, and, depending on how its
done, it may not impact the final training cost.
Our framework uses two state-of-the-art CNN architectures, ResNet [14] and DenseNet [7], as shown in Figures 5 and 6. The training process depicted in Figure 5 consists in first creating the body of the Hydra by coarsely optimizing the chosen architectures using weights pretrained
4. https://github.com/fmow/baseline
ResNet1
ResNet
FMoW
Weights
ResNet2
ResNet3
...
ImageNet
Weights
ResNetm
DenseNet1
DenseNet
FMoW
Weights
DenseNet2
DenseNet3
...
Hydra’s body
DenseNetn
Hydra’s heads
Fig. 5. Hydra’s training flowchart: two CNNs, ResNet and DenseNet,
are optimized starting from the ImageNet weights to create the Hydra’s
body. The obtained weights are then used as starting point for several
copies of these CNNs, which are further optimized to form the heads of
the Hydra.
ResNet1
O UTPUT
Shipyard
ResNet2
I NPUT I MAGE
ResNet3
...
ResNetm
Fusion
DenseNet1
...
DenseNet2
DenseNet3
...
63 classes
DenseNetn
Fig. 6. Hydra’s inference flowchart: an input image is fed to all heads of
the Hydra, and each head outputs the probability of each class being the
correct one. A majority voting is then used to determine the final label,
considering that each head votes for its most probable label.
6
A key point on ensemble learning, as observed by
Krogh et al. [16] and Xandra et al. [17], is that the hypotheses should be as accurate and as diverse as possible. In Hydra, such properties were prompted by applying different geometric transformations over the training
samples, like zoom, shift, reflection and rotations. More
details regarding the proposed framework are presented in
Sections 3.1, 3.2 and 3.3.
3.1
Input
ResNet
or
DenseNet
I MAGE
CNN
x` = F` (x`−1 ) + x`−1
(2)
where x`−1 and x` are the input and output of layer `, and
x0 is the input image. ResNets are built by stacking several
of these units, creating bypasses for gradients that improve
the back-propagation optimization in very deep networks.
As a consequence, ResNets may end up generating redundant layers. As a different solution to improve the flow of
gradients in deep networks, Huang et al. [7] proposed to
connect each layer to all preceding layers, which was named
a DenseNet unit:
x` = F` ([x0 , x1 , . . . , x`−1 ])
(3)
where [x0 , x1 , . . . , x`−1 ] is the concatenation of the ` previous layer outputs. DenseNets also stack several units,
but they use transition layers to limit the number of connections. In the end, DenseNets have less parameters than
ResNets and compensate this facts through feature reuse.
This difference in behavior may be one of the causes for
their complementarity.
Both networks are initialized with weights from ImageNet [15] and trained for six epochs using the Adam optimization algorithm [8] with a learning rate of 10−4 . Fully
connected layers with ImageNet weights are discarded, and
three new layers with 4096 neurons are trained from scratch
using a 50% dropout rate, as illustrated in Figure 7. Any
given image metadata that is useful for classification (e.g.
ground sample distance, sun angle) is concatenated to the
input of the first fully connected layer.
The obtained CNN weights from the previous step will
then be used as starting point to multiple copies of the
chosen networks, which will be trained for five more epochs
using progressive drops in the learning rate as follows: a
learning rate of 10−4 is used for the first epoch, 10−5 for the
following three epochs, and 10−6 for the last epoch.
During training, we added different class weights to
the loss function for different heads seeking to enhance
the complementarity between them. Four different weighting schemes were used: unweighted classes, FMOW class
weights as presented in Figure 3 (false detection weight was
set to 1), a frequency-based weighting using the balanced
heuristic [18], and a manual adjustment of the latter.
Metadata
FC
FC
Softmax
...
...
...
...
...
CNN architectures
Both CNN architectures used in this work, ResNet (ResNet50) [14] and DenseNet (DenseNet-161) [7], were chosen for
achieving state-of-the-art results in different classification
problems while being complementary to each other. Let
F` (·) a non-linear transformation — a composite function
of convolution, relu, pooling, batch normalization and so on
— for layer `. As described by He et al. [14], a ResNet unit
can be defined as:
FC
...
Fig. 7. The convolutional neural network architecture used by the Hydra
framework.
3.2
On-line data augmentation
The process of artificially augmenting the image samples in
machine learning by using class-preserving transformations
is meant to reduce the overfitting in imbalanced classification problems or to improve the generalization ability in the
absence of enough data [19], [20], [21], [22], [23]. The breakthroughs achieved by many state-of-the-art algorithms that
benefit from data augmentation has lead many authors [24],
[25], [26], [27] to study the effectiveness of this technique.
Different techniques can be considered, such as geometric (e.g. reflection, scaling, warping, rotation and translation)
and photometric (e.g. brightness and saturation enhancements, noise perturbation, edge enhancement and color
palette changing) transformations. However, as pointed out
by Ratner et al. [28], selecting transformations and tuning
their parameters can be a tricky and time-consuming task.
A careless augmentation may produce unrealistic or meaningless images that will negatively affect the performance.
The process of data augmentation can be conducted offline, as illustrated in Figure 8. In this case, training images
undergo geometric and/or photometric transformations before the training. Although this approach avoids repeating
the same transformation several times, it also considerably
increases the size of the training set. For instance, if we
only consider basic rotations (90, 180 and 270 degrees) and
reflections, the FMOW training set will have more than 2.8
million samples. This would not only increase the amount of
required storage space, but the time consumed by a training
epoch as well.
In our framework we apply an on-line augmentation,
as illustrated in Figure 9. To this end, different random
transformations were applied to the training samples every
epoch. This way, the number of transformations seen during
training increase with the number of epochs. In addition,
different heads of the Hydra experience different versions
of the training set and hardly converge to the same local
minima.
On-line data augmentations were carried out by the
ImageDataGenerator function from Keras5 . We used random flips in vertical and horizontal directions, random
zooming and random shifts over different image crops. We
did not use any photometric distortion to avoid creating
5. https://keras.io/
7
Training samples (n regions)
Training samples (n regions)
...
...
CNN-Training
Off-line data augmentation
Randomly transformed samples for the 1st epoch (n regions)
...
CNN-Training
Image samples for all epochs (8n regions)
CNN-Training
...
Fig. 8. Illustration of an off-line data augmentation process. In this
example considering basic rotations (90, 180 and 270 degrees) and
reflections only, each image is augmented to a set of 8 images before
the training starts. After that, the augmented training set is static for all
CNN epochs.
meaningless training samples. Three image crop styles were
considered, as illustrated in Figure 10: the original bounding
box that was provided as a metadata (Figure 10(a)), and
an expanded bounding box extracted from both JPG pansharpened images (Figure 10(b)) and JPG multi-spectral
images (Figure 10(c)). As multi-spectral images have low
resolution, we discarded samples with less than 96 pixels
of width or height. Table 2 presents the configuration of
each head in terms of network architecture, augmentation
technique and class weighting.
Randomly transformed samples (n regions)
for the 2nd, 3rd and following epochs
Fig. 9. Illustration of an on-line data augmentation process. In this
example considering basic rotations (90, 180 and 270 degrees) and
reflections only, each image is randomly transformed into a new image
before each training epoch starts.
(a)
(c)
Fig. 10. Different image crops used for training: (a) original bounding
box and (b) expanded bounding box extracted from JPG pan-sharpened
images, and (c) expanded bounding box extracted from JPG multispectral images.
4
3.3
(b)
E XPERIMENTAL RESULTS
Fusion and decision
To determine the most appropriate label for an input region
according to the models generated by Hydra, we have to
combine the results from each head. Each head produces
a vector of score values that indicate how well the input
region fits each class. As some regions may appear in
more than one image, their vectors are summed so that
each region ends up with only one vector of scores. The
softmax function is then applied to convert these scores to
probabilities, and the most probable class is selected for each
head. A majority voting is the used to select the final label.
However, if the number of votes is below or equal to half of
the head count, the region is considered a false detection.
4.1
FMOW dataset
In this section we report and compare the Hydra performance in the FMOW dataset. First, to visualize the benefits
of using the Hydra framework, we show the accuracy of
the trained CNNs (body and heads) over the epochs in
Figure 11. We also show the ensemble accuracy when the
heads are available. In this experiment, we use the entire
training subset and false detections of the evaluation subset
for training, and the remaining images of the evaluation
subset for accuracy computation. As can be observed, the
body of the Hydra provides a good starting point for its
8
TABLE 2
Hydra’s heads description. For each head are given the network
architecture, image crop style, augmentation technique and class
weighting method. Three different image crop styles were considered:
ORIG-PAN (Figure 10(a)), EXT-PAN (Figure 10(b)) and EXT-MULTI
(Figure 10(c)). Augmentation techniques included random flips in
vertical and horizontal directions (Flip), random zooming (Zoom) and
random shifts (Shift). Class weighting methods were: no weighting,
FMOW weights (Figure 3) and frequency-based weighting using the
balanced heuristic [18] before (Frequency #2) and after (Frequency #1)
a manual adjustment.
Head
#1
#2
#3
#4
#5
#6
#7
#8
#9
#10
#11
#12
CNN
DenseNet
DenseNet
DenseNet
DenseNet
DenseNet
DenseNet
DenseNet
DenseNet
ResNet
ResNet
ResNet
ResNet
Crop
EXT-PAN
ORIG-PAN
EXT-MULTI
EXT-PAN
EXT-PAN
EXT-MULTI
EXT-PAN
ORIG-PAN
EXT-PAN
EXT-MULTI
ORIG-PAN
EXT-MULTI
Augment
Flip
Flip
Flip
Zoom
Shift
Shift
Flip
Flip
Flip
Flip
Flip
Flip
Class weighting
Unweighted
Frequency #1
Frequency #1
Frequency #2
Unweighted
FMOW weights
Frequency #2
Frequency #2
Unweighted
Frequency #1
Frequency #1
Frequency #2
heads, which have slightly different accuracy in the end
of the training process. When the heads are combined, the
obtained accuracy is considerably higher than the accuracy
of the best performing head.
We then reran the training process using all images from
the training and evaluation subsets. The TopCoder submission system was used to obtain the F̄ -measure (Equation 1)
for the testing subset, as it has no ground truth available
so far. The obtained F̄ -measure is shown in Table 3 along
with results reported by Christie et al. [1] and results for
our best individual classifiers. As previously reported by
Christie et al. [1], using metadata for classification purposes
is better than just using the image information. In Table 3
we show that on-line data augmentation has also a big
impact, increasing the accuracy of their respective versions
without augmentation in more than 2%. Still, our ensemble
can improve the performance even more, with a gap of at
least 3% to all individual classifiers.
TABLE 3
F̄ -measure for the FMOW testing subset. Evaluated classifiers may
use metadata information (M ) and/or on-line data augmentation (O).
F̄ -measure values for classifiers marked with † were reported by
Christie et al. [1].
F̄ -measure
Hydra (DenseNet + ResNet)M,O
0.781
DenseNetM,O
0.749
ResNetM,O
0.737
†
LSTMM
0.734
†
DenseNetM
0.722
ResNetM
0.712
LSTM
†
0.688
DenseNet†
Fig. 11. Evaluation of the ensemble accuracy. The first six 6 epochs
show the accuracy of the Hydra’s body using DenseNet and Resnet.
The following epochs show the accuracy for each head separately as
well as for the fusion of all heads (ensemble).
The confusion matrix for the best ensemble result in
Figure 11 (epoch 11) is presented on Figure 12. The hardest
classes for Hydra were: shipyard (mainly confused with
port), hospital (confused with educational institution),
multi unit residential (confused with single unit residential), police station (confused with educational institution),
and office building (confused with fire station, police station, etc). We also had high confusion between nuclear powerplant and port, between prison and educational institution, between space facility and border checkpoint, and
between stadium and recreational facility. These, however,
are natural mistakes that could easily be repeated by human
experts. Most of these classes look alike in aerial images (e.g.
shipyard and port) or have similar features that can trick
an automatic classifier (e.g. both stadium and recreational
facility have a sport court). In Figure 13 we show examples
of mislabeled regions that cannot be easily identified, even
by a human.
0.679
With this performance, we managed to finish the competition among the top ten competitors in the provisional
scoreboard (5th place). We then submitted a dockerized
version of Hydra, which was evaluated by the FMOW
organizers using a sequestered dataset. As we show in
Table 4, the Hydra ensemble was very stable, with nearly
the same performance in the testing subset and sequestered
dataset. Thanks to this, our final ranking was third place,
with accuracy 1% lower than the best result achieved by
another competitor.
TABLE 4
Final ranking: F̄ -measure for the top five participants of the FMOW
challenge using the available testing subset (Open) and the
sequestered dataset (Sequestered).
Rank
Handle
1
pfr
0.7934
0.7917
2
jianminsun
0.7940
0.7886
usf bulls (Hydra) 0.7811
0.7817
3
Open Sequestered
4
zaq1xsw2tktk
0.7814
0.7739
5
prittm
0.7681
0.7670
9
Fig. 12. Confusion matrix for the Hydra ensemble after 11 training epochs (Figure 11). Each row represents the ground truth label, while the
column shows the label obtained by the Hydra. Large values outside of the main diagonal indicate that the corresponding classes are hard to be
discriminated.
4.2
NWPU-RESISC45 dataset
We also reported the Hydra performance in the NWPURESISC45 dataset, which was recently compiled by
Cheng et al. [4]. This dataset has 45 classes, with 700 images
per class, each one with resolution of 256 × 256 pixels,
totaling 31,500 images. The intersection of classes between
FMOW and NWPU-RESISC45 is reasonable, with some
land uses being overcategorized in NWPU-RESISC45 (e.g.
basketball court, baseball diamond and tennis court are
all labeled as recreational facility in the FMOW dataset) and
some classes not representing land use, such as objects (e.g.
airplane and ship) and vegetation (e.g. desert, forest and
wetland). This dataset does not provide satellite metadata.
We followed the experimental setup proposed by
Cheng et al. [4] and randomly chose 10% or 20% of the
samples in each class for training. The remaining samples
were used for testing. We repeated this experiment five
times for each configuration, and reported the average accuracy and standard deviation. As can be shown in Table 5,
Cheng et al. [4] compared six classifiers based on handcrafted features and three different CNN architectures. In
their experiments, the best performance was achieved by
a VGG16 network [10] that was trained using ImageNet
weights as a starting point.
The configuration of the Hydra was slightly different
in this experiment. We used 4 DenseNets and 4 ResNets,
which were trained for 16 epochs (8 for the body and 8 for
the heads). Each head for each architecture has a different
augmentation: 1) no augmentation; 2) random vertical and
horizontal flips; 3) random zoomimg; and 4) random shifts.
The accuracy results for the NWPU-RESISC45 dataset are
shown in Table 5. As NWPU-RESISC45 is less challenging
than FMOW, the results are higher and the improvements
are lower. The on-line data augmentation increased ResNet
and DenseNet accuracies in about 1.0% and 1.6%, respectively. Individual classifiers for both architectures outperformed all previous results reported by Cheng et al. [4], and
the Hydra ensemble was able to achieve the highest accuracy. The improvement on accuracy, however, was slightly
greater than 1% when compared to individual CNNs. It is
worth noting that we outperformed the best accuracy results
reported by Cheng et al. [4] by more than 4%.
10
5
(a) Shipyard mislabeled as port
(b) Hospital mislabeled as educational institution.
(c) Multi-unit residential misla- (d) Office building mislabeled as
beled as single-unit residential
gas station
Fig. 13. Regions from the evaluation subset that were mislabeled by our
Hydra ensemble.
TABLE 5
Accuracy for the NWPU-RESISC45 dataset using training/testing splits
of 10%/90% and 20%/80%. Average accuracy and standard deviation
were reported by using five different random splits. Evaluated
classifiers may use on-line data augmentation (O) and/or ImageNet
weights (I ). Accuracy values for classifiers marked with † were
reported by Cheng et al. [4].
Hydra (DenseNet + ResNet)O,I
DenseNetO,I
ResNetO,I
VGG16I †
AlexNetI †
GoogleNetI †
AlexNet†
VGG16†
GoogleNet†
BoVW†
LLC†
BoVW + SPM†
Color histograms†
LBP†
GIST†
Accuracy
10%/90% 20%/80%
92.44 ± 0.34 94.51 ± 0.21
91.06 ± 0.61 93.33 ± 0.55
89.24 ± 0.75 91.96 ± 0.71
87.15 ± 0.45 90.36 ± 0.18
81.22 ± 0.19 85.16 ± 0.18
82.57 ± 0.12 86.02 ± 0.18
76.69 ± 0.21 79.85 ± 0.13
76.47 ± 0.18 79.79 ± 0.15
76.19 ± 0.38 78.48 ± 0.26
41.72 ± 0.21 44.97 ± 0.28
38.81 ± 0.23 40.03 ± 0.34
27.83 ± 0.61 32.96 ± 0.47
24.84 ± 0.22 27.52 ± 0.14
19.20 ± 0.41 21.74 ± 0.18
15.90 ± 0.23 17.88 ± 0.22
D ISCUSSION
There is an extensive literature on algorithms for geospatial
land image processing — often called remote sensing image
processing. This broad and active field of research has many
branches, such as semantic segmentation [29], [30], [31],
[32], [33], target location [34] and region classification [35],
[36], [37], [38], [39]. An exhaustive literature review was
carried out by Cheng and Han [40] and covered most of the
literature works based on handcrafted features. However, as
can be seen in Table 5, handcrafted approaches are no longer
competitive due to the recent advances on deep learning.
The FMOW challenge is focused on the classification
branch and currently constitutes the most difficult task of
its kind (63 classes, 470086 images). Other smaller datasets,
such as UC Merced Land Use Dataset [2] (UCMerced, 21
classes, 2100 images), WHU-RS19 [3] (19 classes, 950 image),
Brazilian Coffe Scenes [41] (BCS, 2 class, 2876 images)
and Aerial Image Dataset et al. [42] (AID, 30 classes, 10000
images), were used in the literature but not necessarily
represent a challenging task (i.e. reported results are reaching a nearly perfect score). Even NWPU-RESISC45 [4] (45
classes, 31500 images), the most recent dataset other than
FMOW, is not as challenging. We were able to achieve nearly
95% accuracy using only 20% of its images for training. In
comparison, the training/testing split for FMOW is about
85%/15%, but the top performance achieved by a competitor was still below 80%.
Anyway, there is no doubt that deep CNNs are becoming more and more popular for land use classification.
Nogueira et al. [38] compared different state-of-the-art CNN
architectures, such as AlexNet [19], GoogleNet [22] and
VGG [10], and evaluated different training setups, such as
using ImageNet weights as starting point and Support Vector Machines (SVM) for classification. They reported results
for UCMerced, WHU-RS19 and BCS datasets, which were
very successful when compared to many other approaches
based on handcrafted features. Chaib et al. [39] improved
regular VGG networks [10] by fusing the output of the last
two fully connected layers. The work was validated using
UCMerced, WHU-RS19 and AID. We also have CNN-based
results reported by Christie et al. [1] and Cheng et al. [4]
for NWPU-RESISC45 and FMOW datasets, respectively,
as shown in Tables 3 and 5. Thus, CNN classifiers were
definitely the best choice for our Hydra framework. After
experimenting different architectures, we ended up using
DenseNets and ResNets. The main reasons are that they
perform better than previously mentioned architectures,
have a reasonable level of complementarity, and achieve
similar classification results.
In terms of computational resources consumption, Hydra has some disadvantages when compared to individual
classifiers. If N heads are used, its training and inference
costs tend to be N/2 and N times more expensive, respectively. On the other hand, when compared to other ensemble
techniques with the same number of classifiers, Hydra’s
training is approximately two times faster because half of
the epochs are carried out for the Hydra’s body only.
Overall, the Hydra framework was a good fit to the
FMOW restrictions described in Section 2.3. The time limit
for testing was large enough to allow using many classi-
11
fiers, making the training time to generate them the main
problem. Hydra succeeded in increasing the number of classifiers for inference without losing complementarity, a key
requirement for ensembles. As a consequence, we finished
the competition in the third place, with accuracy 1% lower
than the best result achieved by another competitor.
6
C ONCLUSIONS
Automatic and robust classification of aerial scenes is
critical for decision-making by governments and intelligence/military agencies in order to support fast disaster
response. This research problem, although extensively addressed by many authors, is far from being solved, as
evidenced by the final results of the FMOW challenge.
The main contribution of this work was the development
of a framework that automatically creates ensembles of
CNNs to perform land use classification in satellite images. We called this framework Hydra due to its training
procedure: the Hydra’s body is a CNN that is coarsely
optimized and then fine tuned multiple times to form the
Hydra’s heads. The resulting ensemble achieved the fifth
best performance for the open testing subset of the FMOW
challenge, qualifying our solution to the second phase of
the competition. Then, the same ensemble was applied to
a sequestered testing set that was used to officially rank
the competitors, and it obtained the third best performance.
Given that there were more than 50 active participants, including teams and individuals from academia and industry,
and most of them probably were experimenting different
CNN-based setups, we believe that Hydra is well aligned
with the most recent state-of-the-art developments.
[9]
[10]
[11]
[12]
[13]
[14]
[15]
[16]
[17]
[18]
[19]
[20]
[21]
[22]
ACKNOWLEDGMENTS
Part of the equipments used in this project are supported by
a grant (CNS-1513126) from the National Science Foundation (NSF) of USA. The Titan Xp used for this research was
donated by the NVIDIA Corporation.
[23]
[24]
R EFERENCES
[25]
[1]
[26]
[2]
[3]
[4]
[5]
[6]
[7]
[8]
G. Christie, N. Fendley, J. Wilson, and R. Mukherjee, “Functional
map of the world,” arXiv preprint arXiv:1711.07846, 2017.
Y. Yang and S. Newsam, “Bag-of-visual-words and spatial extensions for land-use classification,” in Proceedings of the 18th SIGSPATIAL International Conference on Advances in Geographic Information
Systems, ser. GIS ’10. ACM, 2010, pp. 270–279.
D. Dai and W. Yang, “Satellite image classification via two-layer
sparse coding with biased image representation,” IEEE Geoscience
and Remote Sensing Letters, vol. 8, no. 1, pp. 173–176, 2011.
G. Cheng, J. Han, and X. Lu, “Remote sensing image scene
classification: Benchmark and state of the art,” Proceedings of the
IEEE, vol. 105, no. 10, pp. 1865–1883, Oct 2017.
H. Li, L. Jing, Y. Tang, Q. Liu, H. Ding, Z. Sun, and Y. Chen,
“Assessment of pan-sharpening methods applied to worldview-2
image fusion,” in IEEE International Geoscience and Remote Sensing
Symposium (IGARSS), 2015, pp. 3302–3305.
D. M. W. Powers, “Evaluation: From precision, recall and fmeasure to roc., informedness, markedness & correlation,” Journal
of Machine Learning Technologies, vol. 2, no. 1, pp. 37–63, 2011.
G. Huang, Z. Liu, L. van der Maaten, and K. Q. Weinberger,
“Densely connected convolutional networks,” in IEEE Conference
on Computer Vision and Pattern Recognition (CVPR), 2017, pp. 4700–
4708.
D. P. Kingma and J. Ba, “Adam: A method for stochastic optimization,” CoRR, vol. abs/1412.6980, 2014.
[27]
[28]
[29]
[30]
[31]
[32]
H. Li, Z. Lin, X. Shen, J. Brandt, and G. Hua, “A convolutional
neural network cascade for face detection,” in IEEE Conference on
Computer Vision and Pattern Recognition (CVPR), 2015, pp. 5325–
5334.
K. Simonyan and A. Zisserman, “Very deep convolutional networks for large-scale image recognition,” pp. 1–14, 2015.
C. Ding and D. Tao, “Trunk-branch ensemble convolutional neural
networks for video-based face recognition,” IEEE Transactions on
Pattern Analysis and Machine Intelligence (TPAMI), vol. PP, no. 99,
pp. 1–11, 2017.
T. G. Dietterich, Ensemble Methods in Machine Learning. Berlin,
Heidelberg: Springer Berlin Heidelberg, 2000, pp. 1–15.
A. J. Sharkey, Ed., Combining Artificial Neural Nets: Ensemble and
Modular Multi-Net Systems, 1st ed. Secaucus, NJ, USA: SpringerVerlag New York, Inc., 1999.
K. He, X. Zhang, S. Ren, and J. Sun, “Deep residual learning
for image recognition,” in IEEE Conference on Computer Vision and
Pattern Recognition (CVPR), 2016.
J. Deng, W. Dong, R. Socher, L.-J. Li, K. Li, and L. Fei-Fei,
“ImageNet: A Large-Scale Hierarchical Image Database,” in IEEE
Conference on Computer Vision and Pattern Recognition (CVPR), 2009.
A. Krogh and J. Vedelsby, “Neural network ensembles, cross validation and active learning,” in International Conference on Neural
Information Processing Systems (NIPS), 1994, pp. 231–238.
A. Chandra and X. Yao, “Evolving hybrid ensembles of learning
machines for better generalisation,” Neurocomputing, vol. 69, no. 7,
pp. 686–700, 2006.
G. King and L. Zeng, “Logistic regression in rare events data,”
Political Analysis, vol. 9, pp. 137–163, 2001.
A. Krizhevsky, I. Sutskever, and G. E. Hinton, “Imagenet classification with deep convolutional neural networks,” Commun. ACM,
vol. 60, no. 6, pp. 84–90, May 2017.
A. G. Howard, “Some improvements on deep convolutional neural network based image classification,” CoRR, vol. abs/1312.5402,
2013. [Online]. Available: http://arxiv.org/abs/1312.5402
K. He, X. Zhang, S. Ren, and J. Sun, “Spatial pyramid pooling
in deep convolutional networks for visual recognition,” IEEE
Transactions on Pattern Analysis and Machine Intelligence (TPAMI),
vol. 37, no. 9, pp. 1904–1916, 2015.
C. Szegedy, W. Liu, Y. Jia, P. Sermanet, S. Reed, D. Anguelov,
D. Erhan, V. Vanhoucke, and A. Rabinovich, “Going deeper with
convolutions,” in IEEE Computer Vision and Pattern Recognition
(CVPR), 2015, pp. 1–9.
E. Ahmed, M. Jones, and T. K. Marks, “An improved deep learning
architecture for person re-identification,” in IEEE Conference on
Computer Vision and Pattern Recognition (CVPR), 2015, pp. 3908–
3916.
K. Chatfield, K. Simonyan, A. Vedaldi, and A. Zisserman, “Return
of the devil in the details: Delving deep into convolutional nets.”
in British Machine Vision Conference (BMVC). BMVA Press, 2014.
T. DeVries and G. W. Taylor, “Dataset Augmentation in Feature
Space,” ArXiv e-prints, 2017.
L. Perez and J. Wang, “The Effectiveness of Data Augmentation
in Image Classification using Deep Learning,” ArXiv e-prints, Dec.
2017.
S. C. Wong, A. Gatt, V. Stamatescu, and M. D. McDonnell, “Understanding data augmentation for classification: When to warp?” in
International Conference on Digital Image Computing: Techniques and
Applications, 2016, pp. 1–6.
A. J. Ratner, H. R. Ehrenberg, J. D. Zeshan Hussain, and C. Re,
“Learning to compose domain-specific transformations for data
augmentation,” in International Conference on Neural Information
Processing Systems (NIPS), 2017, pp. 1–11.
Q. Shi, B. Du, and L. Zhang, “Spatial coherence-based batchmode active learning for remote sensing image classification,”
IEEE Transactions on Image Processing (TIP), vol. 24, no. 7, pp. 2037–
2050, 2015.
H. Lee and H. Kwon, “Going deeper with contextual cnn for
hyperspectral image classification,” IEEE Transactions on Image
Processing (TIP), vol. 26, no. 10, pp. 4843–4855, 2017.
H. Wu and S. Prasad, “Semi-supervised deep learning using
pseudo labels for hyperspectral image classification,” IEEE Transactions on Image Processing (TIP), vol. 27, no. 3, pp. 1259–1270, 2018.
J. Zhao, Y. Zhong, H. Shu, and L. Zhang, “High-resolution image
classification integrating spectral-spatial-location cues by conditional random fields,” IEEE Transactions on Image Processing (TIP),
vol. 25, no. 9, pp. 4033–4045, 2016.
12
[33] X. Xu, W. Li, Q. Ran, Q. Du, L. Gao, and B. Zhang, “Multisource
remote sensing data classification based on convolutional neural
network,” IEEE Transactions on Geoscience and Remote Sensing,
vol. PP, no. 99, pp. 1–13, 2017.
[34] Z. Zou and Z. Shi, “Random access memories: A new paradigm for
target detection in high resolution aerial remote sensing images,”
IEEE Transactions on Image Processing (TIP), vol. 27, no. 3, pp. 1100–
1111, 2018.
[35] Y. Xia, L. Zhang, Z. Liu, L. Nie, and X. Li, “Weakly supervised
multimodal kernel for categorizing aerial photographs,” IEEE
Transactions on Image Processing (TIP), vol. 26, no. 8, pp. 3748–3758,
2017.
[36] E. Li, J. Xia, P. Du, C. Lin, and A. Samat, “Integrating multilayer
features of convolutional neural networks for remote sensing
scene classification,” IEEE Transactions on Geoscience and Remote
Sensing, vol. 55, no. 10, pp. 5653–5665, 2017.
[37] X. Lu, X. Zheng, and Y. Yuan, “Remote sensing scene classification
by unsupervised representation learning,” IEEE Transactions on
Geoscience and Remote Sensing, vol. 55, no. 9, pp. 5148–5157, 2017.
[38] K. Nogueira, O. A. Penatti, and J. A. dos Santos, “Towards better
exploiting convolutional neural networks for remote sensing scene
classification,” Pattern Recognition - Elsevier, vol. 61, pp. 539–556,
2017.
[39] S. Chaib, H. Liu, Y. Gu, and H. Yao, “Deep feature fusion for
vhr remote sensing scene classification,” IEEE Transactions on
Geoscience and Remote Sensing, vol. 55, no. 8, pp. 4775–4784, 2017.
[40] G. Cheng and J. Han, “A survey on object detection in optical
remote sensing images,” ISPRS Journal of Photogrammetry and
Remote Sensing - Elsevier, vol. 117, pp. 11–28, 2016.
[41] O. A. B. Penatti, K. Nogueira, and J. A. dos Santos, “Do deep
features generalize from everyday objects to remote sensing and
aerial scenes domains?” in IEEE Conference on Computer Vision and
Pattern Recognition Workshops (CVPRW), 2015, pp. 44–51.
[42] G. S. Xia, J. Hu, F. Hu, B. Shi, X. Bai, Y. Zhong, L. Zhang, and
X. Lu, “Aid: A benchmark data set for performance evaluation
of aerial scene classification,” IEEE Transactions on Geoscience and
Remote Sensing, vol. 55, no. 7, pp. 3965–3981, 2017.
| 1cs.CV
|
arXiv:1405.2322v2 [math.ST] 4 Oct 2016
Parameter estimation of a two-colored urn model
class
Line Le Goff
Philippe Soulier
January 29, 2018
Abstract
Though widely used in applications, reinforced random walk on graphs
have never been the subject of a valid statistical inference. We develop in
this paper a statistical framework for a general two-colored urn model. The
probability to draw a ball at each step depends on the number of balls of
each color and on a multidimensional parameter θ through a function f ,
called a choice function. We introduce two estimators of θ: the maximum
likelihood estimator and a weighted least squares estimator which is less
efficient, but is closer to the calibration techniques used in the applied literature. In general, the model is an inhomogeneous Markov chain and
this property makes the estimation of the parameter impossible on a single path, even if it were infinite. Therefore we assume that we observe
i.i.d. experiments, each of a predetermined finite length. This is coherent
with the usual experimental set-ups. We apply the statistical framework to
a real life experiment: the selection of a path among pre-existing channels
by an ant colony. We performed experiments, which consisted of letting
ants pass through the branches of a fork. We consider the particular urn
model proposed by J.-L. Deneubourg in 1990 to describe this phenomenon.
We simulate this model for several parameter values in order to assess the
accuracy of the MLE and the WLSE. Then we estimate the parameter
from the experimental data and evaluate confident regions with Bootstrap
algorithms. The findings of this paper do not contradict the biological literature, but give statistical significance to the values of the parameter found
therein.
1
1
Introduction
Urn models have been studied for nearly one century. In 1931, G. Pólya provided
the first probabilistic result on the game consisting in drawing a ball from an urn
initially containing one red ball and one black ball (see Pólya, 1931). At each time
step, a ball is drawn and put back in the urn with an additional ball of the same
color. The probability to draw a red ball is the proportion of red balls in the urn.
G. Pólya proved that, as the number of draws tends to infinity, the proportion of
red balls tends to a random variable following the uniform distribution on [0, 1].
The Pólya urn is easily generalizable to a large class of two-colored urn models
characterized by a choice function f : Θ × N × N → [0, 1] which itself depends on
a parameter θ ∈ Θ ⊂ Rd , d ≤ 1. Let Rn and Bn be the numbers of red and black
balls in the urn after n draws. Note that, by construction, Rn + Bn = n. The
probability that the (n + 1)-th ball is red is given by
probR
n+1 = f (θ, Rn , Bn ) = f (θ, Rn , n − Rn ) .
(1)
Consequently, the probability to draw a black ball at time n + 1 is 1 − probR
n+1 .
The goal of this paper is to propose a valid statistical methodology to estimate
the parameter θ. We suppose that we observe N independent paths, each consisting of a sequence of n colors drawn by the model defined in (1). The statistical
theory is developed as n is fixed and N tends to infinity. We choose this framework since in some models, it is not possible to obtain consistent estimators of the
parameter with only one path, even if its length n increases to infinity. Moreover
data from real experiments comprises a set of finite paths. We define estimators
for θ that we prove to be consistent and asymptotically normal under some usual
regularity assumptions on the model (1). We study more precisely two particular
cases: the maximum likelihood estimator (MLE) and the weighted least squares
estimators (WLSE).
We have applied these statistical tools to the problem of path formation by
an ant colony. One of the fundamental factors affecting an organism’s survival is
its ability to optimally and dynamically exploit its environment. For example, in
order to take advantage of the best sites of resources, housing or reproduction,
these areas must be discovered and exploited at the earliest opportunity. Many
species of ants rise to this challenge by developing a network of paths, which
connects different strategic sites such as nests and food sources. These paths
consist of pheromones, attractive chemical substances. We focus on a specific
aspect of this phenomenon: the selection of a path among pre-existing channels.
When exploring their environment, ants often face bifurcations and must bypass
obstacles. As shown by experimental studies, the laying of pheromones by ants
passing successively through a bifurcation results in two possible outcomes: either
one branch is eventually selected and the other abandoned, or both branches end
2
up being uniformly chosen (see Deneubourg, Aron, Goss, and Pasteels, 1990).
The analysis of the spontaneous path formation by a colony of ants is made
difficult by the absence of any means to measure precisely the quantity of, or even
detect, the pheromones laid by the ants.
It is commonly assumed that when approaching a bifurcation, ants choose a
branch and lay a certain constant amount of pheromone without ever turning back.
Consequently, the quantity of pheromone laid on a branch is proportional to the
number of ants which passed through it. Thus this phenomenon can be described
by a urn model as proposed by J.-L. Deneubourg et al. in 1990 (see Deneubourg
et al., 1990). More precisely they define a choice function with a two-dimension
parameter (α, c) ∈ (0, 1)2 such that the probability for an ant to choose the right
branch after Rn passages through the right branch and n passages in total is given
by
(c + Rn )α
.
(2)
P robR
n+1 =
(c + Rn )α + (c + n − Rn )α
The probability to choose the left branch is consequently 1 − P robR
n+1 . The parameter α makes this model non linear with respect to the proportion of passages
through one branch. It models the sensitivity of the ant to the concentration of
pheromone. The parameter c is the intrinsic attractiveness of each branch and
can also be interpreted as the inverse of the attractiveness (or the strength) of the
pheromone deposit laid by each ant.
Several probabilistic studies provide the asymptotic behavior of Rn /n in terms
of α and c (see Pólya, 1931; Tarrès, 2011; Davis, 1990). The influence of the two
parameters is on different time scales, but they can contribute to the same effect
(selection of one branch or unifomization of the traffic on the two branches) or have
antagonistic effects. The model is thus characterized by four phases, according to
the values of α and c: slow or fast uniformization; slow or fast selection. The phase
most commonly considered in the literature is slow selection. This corresponds
in our model to α and c larger than 1: selection of one branch will eventually
happen, though slowly because of weak pheromone deposits (see Deneubourg
et al., 1990; Vittori, Talbot, Gautrais, Fourcassié, Araujo, and Theraulaz, 2006;
Garnier, Guérécheau, Combe, Fourcassié, and Theraulaz, 2009). However, the
model may account for other possibilities, such as fast uniformization, which occurs when α < 1 and c > 1. One purpose of this paper is to investigate more
thoroughly these possibilities which have been more or less overlooked in the previous literature.
Ethological studies have already provided values for the parameter (α, c), but
the methods used mainly consisted of calibration without control of the statistical
validity of these methods and results (see Deneubourg et al., 1990; Vittori et al.,
2006; Garnier et al., 2009; Thienen, Metzler, Choe, and Witte, 2014) and in particular these methods do not produce confidence regions. However this type of
3
information supplies interesting and important elements to the behavioral discussion. However this type of information supply interesting and important elements
to the behavioral discussion. In this paper, we define the MLE and the WLSE for
the ant behavior model (2). We assess the quality of these estimators in a simulation experiment. We then use them on experimental data provided by a real
life experiment performed to this purpose with ants. We also compute confidence
region by a Bootstrap algorithm.
The model (2) can be applied, mutatis mutandis, to many other fields. For
instance we can consider a fork with two branches as a neuron having two axons.
During each period of time, the length of one of the two axons increases. The
longer an axon is, the higher the probability that it will further grow. Thus
the dynamic of this biological system may also be modeled by (2) (see Khanin
and Khanin, 2001). Furthermore, using the notion of a choice function (see
Section 2.3), the model (1) can be adapted and applied to many situations where
a binary choice occurs, or to even more complex situations such as networks with
several nodes (see Jeanson, Ratnieks, and Deneubourg, 2003; Pemantle, 2007), for
instance network exploration by an ant colony (see Aron, Deneubourg, Goss, and
Pasteels, 1990; Beckers, Deneubourg, and Goss, 1993; Nicolis and Deneubourg,
1999; Dussutour, Deneubourg, and Fourcassié, 2005; Nicolis and Dussutour, 2008;
Thienen et al., 2014; Arganda, Nicolis, Perochain, Péchabadens, Latil, and Dussutour, 2014).
The paper is organized as follows. The model (1) and the statistical framework is rigorously defined in Section 2. Section 2.1 is focused on the MLE and
Section 2.2 on the WLSE. Under some usual regularity conditions, we prove that
both estimators are consistent and asymptotically normal. Moreover the MLE
is asymptotically efficient. The numerical implementation of the MLE may be
difficult and unstable (and lengthy), therefore, a WLSE is considered and theoretically studied. This estimator does not match the theoretical performances of
the MLE, but is easier to compute and is popular among practitioners. Section 2.3
proposes an extension of the general urn model to a class of vertex reinforced random walk on graphs. Section 3 is an adaptation of the statistical framework to
the ethological problem. In Section 3.1, we first introduce the assumptions on
the ant behavior and then we define the model proposed by J.-L. Deneubourg.
The four phases of the model are described more precisely and are interpreted
from the point of view of ethology. Section 3.2 rewrites the MLE and the WLSE
for this particular case. In Section 3.3, we show that it is not possible to consistently estimate the parameter of the model on a single experiment of length n,
even if n tends to infinity. In order to assess the performance of the estimators,
a short simulation experiment is reported in Section 3.4. Section 4 reports the
study on the experimental data. The experimental protocol and the data produced are described in Sections 4.1 and 4.2. Section 4.3 supplies the estimation
4
results (computation of the estimators and their confidence regions). We provide
some concluding remarks in Section 5 and prove the theoretical statistical results
of this paper in Section 6.
2
Parameter estimation
Let us first write precisely the model studied and statistical framework used. We
assume that {Xk , k ≥ 1} is a sequence of Bernoulli random variables (representing
the colors of the balls drawn: 1 for red and 0 for black) and that there exists a
function f0 : N2 → [0, 1] such that, for all integers k,
P(Xk+1 = 1 | Fk ) = f0 (Zk , k − Zk ) .
where Z0 = 0 and for k ≥ 1, Zk = X1 + · · · + Xk and Fk is the sigma-field
generated by Z0 , X1 , . . . , Xk . The random walk {Zk , k ≥ 0} is an inhomogeneous
Markov chain. For n ≥ 1 and a sequence (e1 , . . . , en ) ∈ {0, 1}n , applying the
Markov property, we obtain
P(X1 = e1 , . . . , Xn = en ) =
n−1
Y
f0 (zk , k − zk )ek+1 {1 − f0 (zk , k − zk )}1−ek+1 , (3)
k=0
where zk = e1 + · · · + ek with z0 = 0, by convention.
We assume that we observe N experiments, each consisting in a path of
length n of the model (3). In other words, we have a set of N sequences of n consecutive draws. For j = 1, . . . , N and k = 1, . . . , n, let Xkj ∈ {0, 1} denote the
color of the k-th ball drawn in the j-th experiment. Let Z0j = 0 and Zkj =
Pk
j
i=1 Xi , k ≥ 1 be the total number of red balls drawn at time k during the j-th
j
experiment, so that Xkj = Zkj − Zk−1
. In all the paper, n will be fixed and our
asymptotic results will be obtained with N (the number of experiments) tending
to ∞.
Let Θ ⊂ Rd and f : Θ × N2 → (0, 1) be a function, called the choice function
of the urn. We assume that there exists θ0 ∈ Θ such that f0 (·, ·) = f (θ0 , ·, ·),
i.e. for k = 0, . . . , n − 1 and i = 0, . . . , k,
j
P(Xk+1
= 1 | Zkj = i) = f (θ0 , i, k − i) .
To proof the consistency and the asymptotic normality of the estimators introduced below, we need the following assumptions on the choice function f . For
any function g defined on Θ, we denote ġ and g̈ the gradient and Hessian matrix
with respect to θ, ∂s g the partial derivative with respect to the s-th component θs
of θ, 1 ≤ s ≤ d and A0 the transpose of the vector or matrix A.
5
Assumption 1.
(i) (Regularity) The set Θ is a compact with non empty interior. For 0 ≤
i ≤ k ≤ n − 1, f0 (i, k − i) > 0 and the function θ → f (θ, i, k − i) is twice
continuously differentiable on Θ.
(ii) (Identifiability) If f (θ1 , i, k − i) = f (θ2 , i, k − i) for all 0 ≤ i ≤ k ≤ n − 1,
then θ1 = θ2 ,
(iii) The n(n − 1)-dimensional vectors {∂s f (θ0 , i, k − i), 0 ≤ i ≤ k ≤ n − 1},
1 ≤ s ≤ d, are linearly independent in Rn(n−1) .
Assumption 1 ensures that θ0 is the unique maximizer of L and that the Fisher
information matrix
In (θ0 ) = −L̈(θ0 ) =
n−1 X
k
X
k=0 i=0
P(Zk = i)
f˙0 (i, k − i)f˙0 (i, k − i)0
¯
f0 (i, k − i)f0 (i, k − i)
is invertible, where we denote f˙0 (i, k − i) = f˙(θ0 , i, k − i) and f¯0 (i, k − i) =
1 − f0 (i, k − i). The explicit expression of the probabilities P(Zk = i), i, k ∈ N, is
given in Section 6.1, Equation (13).
2.1
Maximum likelihood estimation (MLE)
The structure of the model (3) allows to have an explicit expression of likelihood VN (θ). The independence of the N experiments yields the following multiplicative form
VN (θ) =
N n−1
Y
Y
j
j
f (θ, Zkj , k − Zkj )Xk+1 {1 − f (θ, Zkj , k − Zkj )}1−Xk+1 .
j=1 k=0
The log-likelihood function LN based on N paths, is thus given by
LN (θ) =
N X
n−1
X
j
Xk+1
log f (θ, Zkj , k − Zkj )
j=1 k=0
j
+ (1 − Xk+1
) log{1 − f (θ, Zkj , k − Zkj )} . (4)
Let θ̂N be the maximum likelihood estimator of θ0 , that is
θ̂N = arg max LN (θ) .
θ∈Θ
6
(5)
Define L(θ) = N −1 E[LN (θ)] (where the dependence in n is omitted). Then,
L(θ) =
n−1
X
E f0 (Zk , k − Zk ) log f (θ, Zk , k − Zk )
k=0
+ {1 − f0 (Zk , k − Zk )} log{1 − f (θ, Zk , k − Zk )} . (6)
Let N (m, Σ) denote the Gaussian distribution with mean m and covariance Σ.
Theorem 2. If Assumptions 1-(i) and 1-(ii) hold then the maximum likelihood
estimator θ̂N is a strongly consistent estimator of θ0 . If moreover√Assumption 1-(iii)
holds and θ0 is an interior point of Θ, then, as N tends to ∞, N (θ̂N − θ0 ) converges weakly towards N (0, In−1 (θ0 )).
The proof is in Section 6.4. It is the consequence of a more general result
stated and proved therein.
2.2
Weighted least squares estimation (WLSE)
Least squares estimators are very popular among practitioners. Moreover for some
urn models, the MLE may be numerically unstable hence difficult (and lengthy) to
compute so the WLSE constitutes a convenient alternative. In order to describe
this estimator, we introduce some notation. For 0 ≤ i ≤ k ≤ n − 1, define
PN
j
1
N
1 X
j=1 1{Zkj =i} Xk+1
N
, (7)
aN (i, k − i) =
1 j
and pN (i, k − i) =
N j=1 {Zk =i}
aN (i, k − i)
with the convention 00 = 0. The quantity aN (i, k − i) is the empirical probability
that i red balls have been drawn at time k and pN (i, k − i) is the empirical
conditional probability that a red ball is again chosen at time k + 1 given i red
balls were drawn at time k.
We further define qN (i, k−i) = 1−pN (i, k−i) and f¯(θ, i, k−i) = 1−f (θ, i, k−i).
Let {wN (i, k − i), 0 ≤ i ≤ k} be a sequence of weights and define the contrast
function
WN (θ) =
n−1 X
k
X
wN (i, k − i){pN (i, k − i) − f (θ, i, k − i)}2 .
(8)
k=0 i=0
The weighted least squares estimator minimizes WN , that is
W
θ̂N
= arg min WN (θ) .
θ∈Θ
7
(9)
Theorem 3. If Assumptions 1-(i) and 1-(ii) hold and if the weights wN converge
almost surely to a sequence of positive weights w0 , then the weighted least squares
W
estimator θ̂N
is a strongly consistent estimator of θ0 .
If moreover
1-(iii) holds and θ0 is an interior point of Θ, then as N
√ Assumption
W
tends to ∞, N (θ̂N − θ0 ) converges weakly towards N (0, Σn (θ0 )), where Σn (θ0 )
is a definite positive covariance matrix.
If moreover wN (i, k − i) = pN −1 qN −1 aN (i, k − i), for all 0 ≤ i ≤ k ≤ n − 1, the
W
estimator θ̂N
is asymptotically efficient, i.e. Σn (θ0 ) = In (θ0 ).
The proof is in Section 6.4, where a explicit expression of Σn (θ0 )−1 is supplied.
2.3
Generalization
It is possible to extend the statistical framework introduced in the previous
sections to a large class of reinforced random walks on graphs. For instance,
let G = (X
, E) be a locally finite non oriented graph, with X the set of its vertices
and E ⊂ {i, j} : i, j ∈ X , i 6= j the set of its non oriented edges. We denote
by x ∼ y, if {x, y} ∈ E. Let NX be the set of integer vectors indexed on X . We
define X = (Xn )n≥0 a random walk on G, i.e. a sequence of vertices, such that,
for all n ≥ 0, Xn+1 ∼ Xn . The vector Zn ∈ NX is such that, for all vertex x ∈ X ,
Zn (x) is the number of times the walk X has visited x up to time n. Let Θ ⊂ Rd ,
d ≥ 1, we suppose that the walk X is vertex-reinforced and that there exists a
choice function f : Θ × X × NX → [0, 1] and a parameter θ ∈ Θ such that, for
all n ≥ 0 and x ∈ X ,
P(Xn+1 = x|X0 , · · · , Xn ) = f (θ, x, Zn )1{x∼Xn } .
For instance, the choice function can be similar to the one proposed by J.-L.
Deneubourg (see Deneubourg et al., 1990), for n ≥ 0 and x ∈ X ,
α
c + Zn (x)
P(Xn+1 = x|X0 , · · · , Xn ) = X
α 1{x∼Xn } ,
c + Zn (y)
y∼Xn
where Θ = (0, +∞)2 and θ = (α, c).
The statistical framework introduced for the general urn model is easily adaptable to this vertex reinforced random work. Under some adequate regular conditions, it would be not difficult to prove the consistency and the asymptotic
normality of the MLE and the WLSE by establishing a theorem similar of the
general result proved in Section 6.3.
8
3
Application to an ethological problem
In 1990, J.-L. Deneubourg et al. used a particular urn model to reproduce the
sequences of consecutive choices made by ants at a fork (see Deneubourg et al.,
1990). Let replace the urn filled with balls of two colors by a fork with two
branches. Drawing a ball and adding a ball of the same color in the urn is
equivalent to an ant choosing a branch and reinforcing it with pheromone by going
throw it. Then the probability to draw a red ball depending on the previous draws
is equal to the probability to choose the right branch depending on the previous
passages.
We first introduce the model proposed by J.-L. Deneubourg et al. in the statistical framework described in the previous section. Futher, we provide a description of the model behavior depending on the parameter value. We also supply an
ethological interpretation of the parameter. We then prove that it is impossible
to estimate the parameter on a single path. Finally we report the study of the
estimator accuracy that we perform on simulated data.
3.1
Formalization and results
Behavioral assumptions We first introduce the hypotheses assumed on the
ant behavior.
1. Each ant regularly deposits a constant amount of pheromone as it walks.
2. The ants are strictly identical which means that every ant has the same
reaction to the same amount of pheromone.
3. Pheromone trails do not evaporate during the experiment.
4. Each ant reaches the fork alone, chooses a branch and leaves the bifurcation
by crossing only once into the chosen branch without passing through or
reinforcing the non-chosen branch.
Under these assumptions, the quantity of pheromone laid on each branch is proportional to the number of passages through it. In path formation modeling, these
assumptions are commonly made. However, because of the inter-individual variability in ant behavior, the first two assumptions are unrealistic. For instance, the
pheromone perception noise implies that each ant could detect a different signal
from the same quantity of pheromone. These assumptions are an approximation
of the real ant behavior. The implicit hypothesis here is that the inter-individual
variability is small enough to consider that all ants are identical. For the third
assumption, we suppose that the persistence of the pheromone trails allows to
ignore the evaporation of the pheromone. Experimental protocols are designed to
9
make the four assumptions more acceptable by choosing the ant species adequately
and by placing them in an appropriate situation (see Section 4).
The model The random variable Xk , introduced previously, is the choice of
the k-th ant going through the fork (1 for right and 0 for left). Consequently, for
k ≥ 1, Zk is the number of passages through the right branch after k passages.
For θ = (α, c) ∈ (0, ∞)2 and all integers 0 ≤ i ≤ k, we define choice function
f (θ, i, k − i) =
(c + i)α
.
(c + i)α + (c + k − i)α
(10)
We assume that the probability that an ant chooses the right branch at time k + 1
given the first k choices is given by:
P(Xk+1
(c + Zk )α
= 1|Fk ) = f (θ, Zk , k − Zk ) =
,
(c + Zk )α + (c + k − Zk )α
(11)
where c > 0 is the intrinsic attractiveness of each branch and α > 0 is the
possible non-linearity of the choice. This process is an urn model which has been
exhaustively investigated in the probabilistic literature. We recall here its main
features.
Theorem 4.
(i) If α < 1, then
lim
n→∞
1
Zn
= a.s.
n
2
(ii) If α = 1, then Zn /n converges almost surely to a random limit with a
Beta(c, c) distribution with density x → Γ−2 (c)Γ(2c)xc−1 (1 − x)c−1 with respect to Lebesgue’s measure on [0, 1], and Γ is the Gamma function.
(iii) If α > 1, then eventually only one branch will be chosen, i.e.
∃x ∈ {0, 1} , ∃n0 ∈ N , ∀n ≥ n0 , Xn = x .
The case α < 1 is due to Tarrès (2011); the case α > 1 to Davis (1990) and
the case α = 1 to Pólya (1931) (see Freedman (1965) for an online access).
Ethological interpretation of the parameters and properties of the model
The parameter α characterizes the ant’s differential sensitivity to the pheromone.
When α > 1, the ants can detect better and better increasing amounts of pheromones laid on each branch and thus are more likely to choose the branch with the
10
most pheromones. Moreover, after a random but almost surely finite number of
passages, one branch will eventually be selected, i.e. all ants will afterwards choose
this branch (see Theorem 4-(iii)). In the opposite case, when α < 1, the ants are
less able to perceive the differences between the amounts of pheromones laid on
each branch as these amounts increase. This minimization effect is so strong that
the proportion of passages on each branch converges to 1/2 (see Theorem 4-(i)). It
is important to note that, when α 6= 1, the asymptotic behavior of the proportion
of passages through each branch depends only on α and not on c. Furthermore
the larger α is or the closer α is to zero, the faster these effects will happen.
The role of c is clearer when (11) is rewritten as follows:
P(Xk+1 = 1|Fk ) =
(1 + Zk /c)α
.
(1 + Zk c)α + (1 + (k − Zk )/c)α
The parameter c is the inverse of the reinforcement incrementation and thus can be
interpreted as the inverse of the attractiveness (or the strength) of the pheromones
laid at each passage. Consequently when α is neither very close to zero nor very
large, c has a strong short term influence. When c is small compared to 1, the
first passage strongly reinforces the first chosen branch. Thus during the first
few passages, a branch will be highly favored even if α < 1 (in which case the
branches will eventually be uniformly crossed). When c is large, the first passages
weakly reinforce the chosen branches. Then if α > 1 (in which case a branch will
eventually be selected), a large number of passages must be observed before the
clear emergence of a preference. Naturally, the larger c is or the closer c is to zero,
the longer these effects will be seen.
When α = 1, the asymptotic behavior of the passage proportion is determined
by c (see Theorem 4-(ii)). As c grows from zero to infinity, the limiting distribution
of Zn /n (as n → ∞) evolves continuously from two Dirac point masses at 0 and 1
to a single Dirac mass at 1/2. To illustrate this point, we show in Figure 1 the
density of the Beta distribution for c = 0.1 and c = 10. We make some further
comments.
• If c < 1, a strong asymmetry in the choices of the branches appears. One
branch is eventually chosen much more frequently than the other. Furthermore as c tends to 0, the Beta distribution tends to the distribution with
two point masses at 0 and 1. This limit case corresponds to the situation in
which a branch is selected, i.e. α > 1.
• If c = 1, the limiting distribution is uniform on [0, 1].
• If c > 1, Zn /n appears to be much more concentrated around 1/2. This is
similar to what is observed in the case α < 1.
11
Figure 1: Graph of the Beta distribution for parameters (c, c) with c = 0.1, c = 1
and c = 10
To summarize, the model possesses four phases: fast and slow selections and
fast and slow uniformizations. These phases are delimited by two phase transitions: a discontinuous one between α > 1 (branch selection) and α < 1 (branch
uniformization) with a critical state α = 1 and a smooth one between c < 1 (strong
pheromone deposits) and c > 1 (weak pheromone deposits). These properties are
summarized in the phase diagram in Figure 2. When c is small, it is very likely
that one branch will be favored during the first passages, thus the empirical distribution of the choices resembles the Beta distribution with a small c (the grey
solid line in Figure 1). As the number of experiments increases, the shape of the
empirical distribution will be closer and closer to its limit: a Dirac mass at 1/2
if α < 1 and two Dirac masses at 0 and 1 if α > 1. When c is large, the earlier passages do not show any preference between the branch. Again, when the number
of experiments increases, the asymptotic behavior is progressively revealed.
To date, the most commonly used behavioral state in the model is the slow selection of a branch (see Deneubourg et al., 1990; Beckers, Deneubourg, and Goss,
1992). But at least two other states are interesting. The fast uniformization
can describe the case where none of the branches are preferred. The slow uniformization could reproduce the saturation phenomenon. There exists a threshold
concentration of pheromone upon which ants can no longer detect the pheromone
concentration variations (see Pasteels, Deneubourg, and Goss, 1987). In experiments involving many ants, one can first observe the favorization of a branch.
But when this branch is saturated (its attractiveness stops increasing), ants go
more and more through the other branch, whose attractiveness still increases.
Eventually, the two branches are uniformly chosen.
12
Remark 5. In the context of an estimation procedure, the similar effects of α
and c (favorization/selection of a branch or not) induce an identifiability issue.
Indeed, we observe a finite number of choices and consequently we only see the
short term behavior. We have seen that the favorization of a branch in the first
passages could be due to a pair of parameter values (α, c) with c small compared
to 1 and α close to 1 or to a pair (α, c) with c close to 1 and α large compared to 1.
On the other hand, if the first passages are nearly uniform on the two branches,
it could be the result of c close to 1 and α small, or of c large and α close to 1.
Thus, we can expect that the estimation of the parameters will be difficult
when both parameters contribute to the same effect, e.g. α large and c small (fast
selection of one branch) or α small and c large (no selection); and also when
the parameters have competing effects: very small c and α < 1, or very large c
and α > 1. The statistical procedure that we introduce in this paper partially
circumvents this difficulty, since it focuses on the transition probabilities rather
than on the general shape of a curve, which is what calibration methods do. This
will be illustrated in Section 3.4.
Figure 2: Phase diagram of the model. The graphs in the shaded boxes show
the shape of the empirical distribution of Zn /n for small n (left) and its limiting
distribution (as n → ∞, right).
13
3.2
Parameter estimation
We start with the maximum likelihood estimator, that is θ̂N = (α̂N , ĉN ) defined
by (5). The Fisher information matrix has the following expression.
In (θ) =
n−1 X
k
X
P(Zk = i)f (α, c, i, k − i)f¯(α, c, i, k − i)J (α, c, i, k − i) ,
(12)
k=0 i=0
with θ = (α, c) and for 0 ≤ i ≤ k ≤ n − 1,
c+i
log
log2 c+k−i
α(k−2i)
J (α, c, i, k − i) =
c+i
log c+k−i (c+i)(c+k−i)
α(k−2i)
c+i
c+k−i (c+i)(c+k−i)
α2 (k−2i)2
(c+i)2 (c+k−i)2
!
.
It is important to note that the Fisher information matrix is not diagonal. Thus
the estimation of each parameter has an effect on the estimation of the other.
Corollary 6. Let Θ be a compact subset of (0, ∞)2 which contains (α0 , c0 ). Then
the maximum√
likelihood estimator θ̂N is consistent and asymptotically normal and
efficient, i.e. N (θ̂N − θ0 ) converges weakly to N (0, In−1 (θ0 )).
As mentioned above, we also use weighted least squared estimators defined
by (9) for several different weight sequences wN , such that wN (i, k − i) converges
almost surely to w0 (i, k − i) > 0, for all 0 ≤ k ≤ n − 1 and 0 ≤ i ≤ k.
Corollary 7. Let Θ be a compact subset of (0, ∞)2 which contains (α0 , c0 ) and
assume that wN converges almost surely to positive weights w0 . Then the
√weighted
W
W
least squared estimator θ̂N
is consistent and asymptotically normal, i.e. N (θ̂N
− θ0 )
converges weakly to N (0, Σn (θ0 )), where Σn (θ0 ) is a positive definite covariance
−1
matrix. It is efficient, if wN (i, k − i) = p−1
N qN aN (i, k − i), for all 0 ≤ k ≤ n − 1
and 0 ≤ i ≤ k.
The proofs of these corollaries are in Section 6.5. They are an application of
Theorems 2 and 3. Since Assumption 1-(i) obviously holds, it remains only to
check (ii) and (iii) of Assumption 1.
3.3
Estimation on a single path
The main feature of the binary choice model for α0 > 1 is that only one branch
will be crossed eventually. It seems clear then that a statistical procedure based
on only one path (one sequence of choices) cannot be consistent, since no new
information will be obtained after one branch is eventually abandoned. This
intuition is true and more surprisingly, it is also true in the case α0 = 1. This
is translated in statistical terms in the following theorem. Let `n denote the loglikelihood based on a single path of length n and `˙n its gradient. The model is
regular, so the Fisher information is varθ (`˙n (θ)).
14
Theorem 8.
(i) If α0 = 1 and c0 > 0, then limn→∞ In (c0 ) < ∞.
(ii) If α0 < 1, n−1 `n (θ0 ) → − log 2.
(iii) If α0 > 1, then `n (θ0 ) converges almost surely to a random variable as n → ∞.
The proof is in Section 6.6. Statement (i) means that, when α0 = 1, the
Fisher information is bounded. This implies that the parameter c0 cannot be
estimated on a single path. This also implies that the length n of each path
should be taken as large as possible (theoretically infinite) in order to minimize
the asymptotic variance of the estimators. Statements (ii) and (iii) imply that the
maximum likelihood estimator is inconsistent, since the likelihood does not tend
to a constant.
3.4
Simulation experiment
In order to assess the quality of the estimators proposed, we have made a short
simulation study. For several pairs (α, c), we have simulated 1000 experiments
of N = 50 paths of length n = 100 (recall that n is the number of ants going
through the bifurcation). These are reasonable values in view of the practical
experiments with actual ants. We compare the performance of the maximum
likelihood estimator θ̂N (MLE) defined in (5) and of the weighted least squares
W
estimator θ̂N
(WLSE) defined in (9) with the weights wN (i, k − i) = aN (i, k − i)
defined in (7). The asymptotically efficient WLSE with the weights wN (i, k − i) =
aN (i, k − i)pN (i, k − i)−1 qN (i, k − i)−1 provides a severely biased estimation of α
and always estimates a very small value of c with a very small dispersion. This
is caused by the fact that the empirical pN and qN vanish frequently, so that the
weights are infinite. We will not report the study for this estimator.
The theoretical standard deviation We first evaluate numerically some values of the theoretical standard deviations of both estimators for several values of α
and c. We have chosen arbitrary values of α and c in the range 0.5, 2. We have
also chosen values of α and c which correspond to those found in the literature
cited and to those that we have estimated in the real life experiment described in
Section 4. These results are reported in Table 1 and in Figure 3 and their features
are summarized in the following points.
• As theoretically expected, the asymptotic variance of the MLE, which is the
Fisher information bound, is smaller than the variance of the WLSE, but
the ratio between the variances of the two estimators is never less than one
fourth. Moreover, their overall behavior is similar.
15
• The variance of the estimators of α is smaller when both parameters do not
contribute to the same effect. The worst variance is for α large and c small,
that is when the values of both parameters imply fast selection of a branch.
The variance tend to infinity when α tends to infinity.
• The variance of the estimators of c increases with c and tends to infinity
when α tends to 0 and to ∞.
• These effects are explained by the fact that the coefficients of the Fisher
information matrix tend to zero when α tends to zero, except the coefficient
corresponding to α. See Formula (12).
(a) TSD of α
(b) TSD of c
Figure 3: Theoretical standard deviation for N = 50 paths of length n = 100 of
the MLE of α (a) and of c (b), for α in (0, 2] and fixed values of c. Theoretical
standard deviation of the WLSE has the same shape, but with higher convergence
speed as α tend to 0 or ∞.
Performance of the estimators Recall that we have simulated 1000 experiments, each of N = 50 paths of length n = 100. Because of the length of the
computations, each MLE was computed only 500 times. Table 1 reports root
mean squared error (MSE) of both estimators based on the simulated data for the
same values of the parameters and their features are summarized in the following
points.
• For most values of the parameters, the MSE are close to the theoretical
standard deviation.
16
• The MSE increase significantly when c is large or when both parameters
contribute to the same effect.
• This increase is more noticeable for the WLSE than for the MLE.
• This increase is in part due to the skewness of these estimators. For some
values of the parameters, both estimators tend to overestimate the parameters.
• For the MLE, the MSE is much larger in the case of non selection than in
the case of selection where the empirical performance of the MLE nearly
matches the theoretical value.
• These effects are always stronger for the estimation of c than for the estimation of α.
This degraded performance for some specific or extreme values of the parameters is in part due to numerical issues.
• In the case where selection of a branch is fast, many of the empirical weights
used to compute the WLSE vanish, and the least squares method uses very
few points to fit the curve. The MLE is not affected by this problem.
• In the case where both parameters concur to non selection, the probability
of choosing one branch converges very fast to 1/2, and thus the experiment
brings very little information. This affects both the MLE and the WLSE,
and in addition, many of the empirical weights vanish so the WLSE is even
less efficient.
The degraded performance may also be caused by the identifiability problem
explained in Remark 5, i.e. the similar effects of the two parameters makes the
estimation more difficult.
Bootstrap confidence intervals Since the asymptotic variance depends on
the unknown parameters, we have computed the pivotal Bootstrap 95% confidence
intervals for the parameters based on one simulation of N = 50 paths of length
n = 100 and a Bootstrap sample size of 500 (see Wasserman (2004), Section 8.3,
for details on this method). We have compared these Bootstrap intervals with
the corresponding Monte-Carlo intervals, based on 500 simulations (see Table 2).
The match is nearly perfect for the MLE for α, but as before, the performance is
poorer for the estimation of c. The intervals for c are noticeably skewed to the
right but always contain the true value. For further comparison, we only show
here the results corresponding to the values of the parameters estimated in the
real life experiment reported below and those corresponding to values found in
the earlier literature.
17
Table 1:
Theoretical standard deviations (TSD) for N = 50 paths of
length n = 100 and square root of the mean squared errors (MSE) for 500 (for
the MLE) or 1000 (for the WLSE) simulated experiments of N = 50 paths of
length n = 100. All figures of this table must be mutiply by 0.01.
(α, c)
(0.5, 0.5)
(0.5, 1.0)
(0.5, 2.0)
(1.0, 0.5)
(1.0, 1.0)
(1.0, 2.0)
(1.5, 0.5)
(1.5, 1.0)
(1.5, 2.0)
(2.0, 0.5)
(2.0, 1.0)
(2.0, 2.0)
(2.0, 20.0)
(2.6, 60.0)
(1.1, 3.0)
(1.1, 7.0)
α
c
MLE
WLSE
MLE
WLSE
√
√
√
√
TSD
M SE TSD
M SE TSD
M SE TSD
M SE
5.02
5.60
6.25
7.60
25.4
54.1
31.7
58.8
6.45
7.39
8.56
10.2
59.8
137
79.4
169
8.80
16.9
12.9
356
146
651
214
29500
3.81
3.90
4.97
6.25
11.8
12.4
15.9
21.0
4.34
4.98
5.91
7.34
25.2
31.3
34.9
47.3
5.83
5.80
8.72
9.38
59.3
64.9
89.1
111
7.83
7.85
12.8
19.4
12.3
13.0
18.7
24.6
6.69
6.59
10.8
15.1
21.0
21.4
33.1
40.3
6.88
7.24
11.5
13.9
41.7
45.9
68.8
78.4
19.4
26.1
41.8
2690
16.4
19.8
28.6
1410
13.5
14.2
28.7
985
23.9
26.0
44.3
988
11.2
11.7
23.1
35.4
40.7
43.4
77.2
101
35.5
58.8
129
124
794
1420
2880
3240
166
864
1230
3590
5780
32500
43200 142000
7.20
7.80
11.9
11.3
89.9
111
148
201
13.8
17.4
29.5
28.3
297
433
633
758
All figures must be multiply by 0.01
Table 2: Monte-Carlo 95% confidence intervals for 500 simulated experiment of
N = 50 paths of length n = 100 and Bootstrap 95% confidence intervals for one
simulated experiment of 50 paths of length 100
IDC 95% for α
IDC 95% for c
(α, c)
Monte-Carlo Bootstrap Monte-Carlo Bootstrap
MLE (2.0, 20) (1.50, 3.38) (1.90, 5.10) (9.90, 55.5) (19.1, 94.4)
(2.6, 60) (1.23, 29.3) (1.12, 38.7) (15.9, 1053) (19.9, 1637)
(1.1, 3.0) (0.98, 1.29) (1.01, 1.23) (1.81, 6.22) (1.34, 3.99)
WLSE (2.0, 20) (1.26, 4.85) (1.06, 3.99) (5.92, 88.1) (2.76, 69.3)
(2.6, 60) (0.74, 88.3) (0.24, 87.7) (3.86, 3754) (0.17, 4132)
(1.1, 7.0) (0.75, 1.83) (0.55, 2.56) (1.68, 30.3) (1.48, 66.0)
18
4
Real life experiment with ants
In this section, we apply the previous estimators on data from a path selection
experiment by a colony of ants.
4.1
Experiment description
This experiment was done in the Research Center on Animal Cognition (UMR 5169)
of Paul Sabatier University Toulouse under the supervision of Guy Theraulaz,
Hugues Chaté and the first author. A small laboratory colony (approximately
200 workers) of Argentine ants Linepithema humile was starved for two days before the experiment. During the experiment, the colony had access to a fork
carved in a white PVC slab, partially covered by a Plexiglas plate (see Figure 4).
The angle between the branches was 60◦ . The fork galleries had a 0.5 cm square
section. The entrance of the maze was controlled by a door. Food was never
present during the experiment. The maze was initially free of any pheromone
trail.
Figure 4: The experimental set-up: a fork carved in a white PVC slab, partially
covered by a Plexiglass plate.
Each trial (N = 50) consisted in introducing separately each ant to the entrance of the fork (see Figure 4) one at a time. Once inside, an ant must choose
between the left or the right branch of the fork. As soon as the ant had made a
choice and stepped into one branch, it was removed from the set-up and another
ant was introduced. All the choices were recorded and a trial ended when 100 ants
had passed through the fork.
This experimental protocol was designed to strengthen the behavioral assumptions described in Section 3.1. Any return to the fork is forbidden so that we can
19
consider that each ant passed only one time. There was never more than one
ant in the set-up. This implies that each ant in the maze received no other
cue about the previous passages than the pheromone that was been laid. The
species Linepithema humile was in part chosen to justify the assumption of identical pheromone deposits. Indeed, these ant may deposit regularly the same type
of pheromone on their trajectory (see Van Vorhis Key and Baker, 1982; Aron,
Pasteels, and Deneubourg, 1989). All ants were prepared the same way before
the experiments to increase the credibility of the assumption stating that each
ant behaved by the same way. The length of the experiments was limited to stay
close to the half-life duration of the pheromone trails (see Jeanson et al., 2003).
4.2
Data representation
Figures 5(a) shows the 50 paths of length n = 100, that is, 50 choice sequences of
100 ants that went through the bifurcation. The paths are represented as random
walks with increment +1 when the right branch is chosen, and −1 when the left
one is chosen. In less than ten experiments, a branch seemed to be selected,
whereas in the others, selection of a branch was not obvious. Figure 5(b) shows
the histogram of the distribution of Z100 /100, that is the final proportion of the
choices of the right branch. There is no clear visual evidence that α > 1 as it is
claim in the literature (see Deneubourg et al., 1990; Vittori et al., 2006; Garnier
et al., 2009).
(a) The 50 paths of n = 100 ants choosing
either left (+1) or right (-1)
(b) Histogram of the final proportion of right
passages (Z100 /100)
Figure 5: Data representation
20
4.3
Parameter estimation
Several values of these parameters have been proposed in the applied literature.
Deneubourg et al. (1990) proposed α = 2, c = 20 and more recently Garnier
et al. (2009) suggested α = 2.6 and c = 60. It must be noted however that
these values are not obtained by a statistical method but by the calibration of
a curve to a plot. Therefore, these methods do not lead to confidence intervals.
Moreover, a calibration method has an inherent risk of over fitting, because of the
identifiability problem explained in Remark 5. As illustrated in Figure 2, if for
instance α and c are both small, then both branches will be asymptotically equally
chosen, but paths of finite length n might be misleading and the calibration will
suggest values of α and c corresponding to the selection of a branch. The statistical
procedure is based on the dynamics of the process and is thus less prone to this
type of error. Nevertheless, we will see that our results do not contradict those of
Deneubourg et al. (1990) and Garnier et al. (2009), but complement them.
Table 3: The MLE and the WLSE for the 50 paths of real ants and their
Boostrap 95% confidence intervals
α̂
Bootstrap 95% CI
ĉ
Bootstrap 95% CI
MLE 1.07
(0.80, 1.99)
3.26
(1.14, 23.0)
WLSE 1.10
(0.62, 3.81)
6.91
(0.94, 85.4)
Table 3 shows the results of the maximum likelihood estimation and the
weighted least squares estimation. Both estimates of α are close to 1.1 and the
estimates of c are between 3 and 7. The 95% confidence intervals are slightly
larger than the simulated ones (see Table 2). This increased variability may be
due to the extreme paths which seem to show a very fast selection of one branch
(see Figures 5(a) and 5(b)). This may suggest that the ants did not have the
same behavior and that the distribution of Z100 /100 could be a mixture of two
distributions.
For both methods, the 95% Bootstrap confidence intervals of α contain the
value 1. More precisely, as shown in Figure 6, approximately 1/3 of the bootstrap parameters gives weak pheromone deposits (c > 1) and a weak differential
sensitivity (α < 1), which means that branches are eventually uniformly crossed.
In almost all the others cases, we conclude for weak pheromone deposits (c > 1)
and a strong differential sensitivity (α > 1), which means that a branch will be
eventually, though slowly, selected. In only a few cases do the estimators give
strong pheromone deposits (c < 1), but a weak differential sensitivity (α < 1),
which means that a branch is chosen more than the other at the beginning of the
experiment, but branches are eventually uniformly crossed. Finally, there are no
values which imply both strong pheromone deposits (c < 1) and a strong diffe21
rential sensitivity (α > 1). Therefore, we can conclude that pheromone deposits
are weak with a good confidence but we cannot confidently decide for α.
The values obtained by Deneubourg et al. (1990) (α = 2, c = 20) and more
recently by Garnier et al. (2009) (α = 2.6, c = 60) are both in the confidence
intervals for the WLSE found in Table 3. But the values of α suggested by
these authors are out of the 95% confidence interval for the MLE. Thus these
parameters, which decide for a slow branch selection, are no more likely than a
parameter set which would yield non selection of a path.
Figure 6 illustrates the fact that the two estimators are strongly positively
correlated. There seems to be two cutoff values for c: if ĉ∗ > 8, then α̂∗ > 1, and
if ĉ∗ < 1.5, then α̂∗ < 1. The above mentioned values reported by Deneubourg
et al. (1990) and Garnier et al. (2009) exhibit these features: they both have c > 8
and α > 1 and α increase with c.
If we fix the value of c and estimate only α, then the 95% Bootstrap confidence
intervals for α are smaller. Figure 7 shows the estimated values of α and the
confidence intervals as functions of the fixed value of c. We see that if c is greater
than 6 for the MLE (or than 12 for the WLSE), then the confidence intervals of α
lie entirely above 1. Furthermore if c is less than 0.8 for the MLE (or than 2 for the
WLSE), then the confidence intervals of α lie entirely under 1. This shows that if
the deposits are weak enough, i.e. c > 12, we can conclude that a slow selection
of a branch will occur with probability 1. On the other hand, if the deposits
are strong enough, i.e. c < 0.8, we can conclude that branches will eventually be
uniformly crossed with probability 1.
(a) MLE
(b) WLSE
Figure 6: Log-log scatterplots of the estimates (α̂∗ , ĉ∗ ) for the 500 Bootstrap
samples for the MLE (a) and the WLSE (b) for the 50 paths of real ants.
22
(a) MLE
(b) WLSE
Figure 7: Graph of the estimates α̂ and their Bootstrap 95% confidence interval
for the MLE (a) and the WLSE (b) for the 50 paths of real ants as a function of
fixed value of c.
5
Concluding remarks
In the literature no parameter estimation methods for reinforced random walks
can be found. To partially fill this void, this article proposes a statistical framework to estimate the parameter of a general two-colored urn model. We define
the maximum likelihood estimator (MLE) and the weighted least squares estimators (WLSE) for the parameter of this model and prove their consistency and
their asymptotically normality under some usual regularity conditions. The proof
lies on a general result for a large class of estimators called minimum contrast
estimators. The MLE is asymptotically efficient, but can be difficult (lengthy)
to compute, which can be an issue specially while using Bootstrap algorithms.
The WLSE is a suitable alternative. Moreover this estimator is popular among
practitioners.
We apply this statistical tools to the problem of path selection by an ant
colony. To this purpose, we performed experiments with actual ants to collect
data. The experiment consisted of introducing one hundred ants into a Y shaped
device, one at a time, and observing their successive choices. We also consider
the particular urn model introduced by Deneubourg et al. (1990) to describe this
phenomenon. This urn has two parameters, α and c, which have distinct biological
interpretations, but contribute to the same effect: either selection of a branch or
uniformization of the choices. The parameter c influences the short term behavior,
whereas α determines the asymptotic behavior. Consequently the model exhibits
four phases which are illustrated by Figure 2. The case most commonly considered
in the literature is the case of slow selection, which corresponds to α > 1 and c > 1:
the ants will eventually always choose the same branch, but this selection will take
23
a long time. For instance, Deneubourg et al. (1990) provides the values α = 2
and c = 20. However other phases can be relevant to describe the ant behavior.
For instance the fast uniformization, corresponding to α < 1 and c > 1, can model
the less likely but not negligible case in which ants do not select a branch.
After assessing the accuracy of the MLE and the WLSE on simulated data,
we estimate the value of α and c with the two estimators. We also evaluate
confidence regions by Bootstrap proceeding. The estimated values of α and c
ranged between 1.1 and 3 and between 3 and 7, respectively. This tends to imply
that slow selection of a branch will occur. However, the Bootstrap sample gives a
confidence level of 65% for the hypothesis of slow selection, while the hypothesis
of fast uniformization has a confidence of 35%.
This low level of confidence for the commonly assumed slow selection phase
might be explained by technical reasons. The number of experiments (50) is relatively small; increasing the number of replicas will reduce the confidence regions.
Moreover the competition between the parameters for the same effect induces an
identifiability issue. For instance the apparent preference of a branch may be due
to α > 1 or c small with respect to 1. Therefore, the model, which is biologically
relevant, is statistically difficult to estimate. Indeed, for an ethological study, discriminating the ant pheromone sensitivity from the pheromone deposit strength
is meaningful. But for a statistical procedure, the similarity of effect of the two
parameters scales down the estimation performance.
However, the uncertainty may not come from an inefficiency of the statistical
procedure, but from shortcomings of the ethological hypotheses. Indeed, the estimated confidence intervals computed from the experimental data are larger than
the ones computed from the simulated data (for similar parameter values). Moreover the assumption that the inter-individual variability is negligible is strong.
For instance, it may be necessary to consider that the pheromone deposit varies
at each passage, i.e. that c is random.
These ethological considerations will be further discussed in a forthcoming
paper which will analyze more elaborated experimental designs. The ants will be
observed while freely evolving in a network with several nodes. In addition of a
data analysis, we will model the experiment with a reinforced random walk on
a finite graph for which we have provided probabilistic results (see Le Goff and
Raimond, 2015). The statistical methodology introduced in this paper will be
extended to a larger class of reinforced random walks.
24
6
6.1
Proofs
Distribution of Zk , for k ∈ N
In order to compute the distribution of Zk , we introduce some notation. Let Sk
be the set of sequences of length k + 1 of integers i0 , . . . , ik such that i0 = 0 and
ij − ij−1 ∈ {0, 1} for j = 1, . . . , k. For i ≤ k let Sk (i) = {(i0 , . . . , ik ) ∈ Sk | ik = i}.
Then we have
P(Zk = i) =
X
k−1
Y
f0 (iq , q − iq )iq+1 −iq (1 − f0 (iq , q − iq ))1−iq+1 +iq . (13)
(i0 ,...,ik )∈Sk (i) q=0
6.2
A central limit theorem for the empirical conditional
probabilities
For 0 ≤ i ≤ k ≤ n − 1, recall the definition of aN (i, k − i) and pN (i, k − i) in (7)
and that f¯0 (i, k − i) = 1 − f0 (i, k − i).
√
Lemma 9. { N (pN (i, k − i) − f0 (i, k − i)), 0 ≤ i ≤ k ≤ n − 1} converges weakly
to a Gaussian vector with diagonal covariance matrix Γ0 with diagonal elements
γ0 (i, k − i) =
f0 (i, k − i)f¯0 (i, k − i)
.
P(Zk = i)
(14)
P
j
Proof. Define bN (i, k − i) = N −1 N
j=1 1{Zkj =i} Xk+1 , the empirical estimate of
b(i, k − i) = P(Zk = i, Xk+1 = 1) and a(i, k − i) = E[aN (i, k − i)] = P(Zk = i).
Write then
pN (i, k − i) − f0 (i, k − i) =
bN (i, k − i) − b(i, k − i)
aN (i, k − i)
b(i, k − i)
−
(aN (i, k − i) − a(i, k − i)) .
aN (i, k − i)a(i, k − i)
Since the paths (Z1j , . . . , Znj ), 1 ≤ j ≤ N are i.i.d., the multivariate central limit
holds for the sequence of 2n(n − 1) dimensional vectors {(bN (i, k − i) − b(i, k −
i), aN (i, k − i) − a(i, k − i)), 0 ≤ i ≤ k ≤ n − 1}. The proof is concluded by tedious
computations using the Markov property, which we omit.
Remark 10. We can prove that the covariance matrix Γ0 is diagonal by a statistical argument. If we consider the tautological model {f (i, k − i), 0 ≤ i ≤ k ≤
25
n − 1}, i.e. θ = f and f0 is the true value. Then the likelihood is
LN (f ) =
n−1 X
k
X
aN (i, k − i){pN (i, k − i) log f (i, k − i)
k=0 i=0
+ qN (i, k − i) log f¯(i, k − i)} ,
where f¯(i, k−i) = 1−f (i, k−i). Thus we see that {pN (i, k − i), 0 ≤ i ≤ k ≤ n − 1}
is the maximum
likelihood estimator of f0 . This model is a regular statistical
√
model, thus N (pN − f0 ) converges weakly to the Gaussian distribution with covariance matrix In−1 (f0 ), where In (f ) is the Fisher information matrix of the
model. It is easily seen that In (f0 ) is the n(n − 1) dimensional diagonal matrix
with diagonal elements given by (14).
6.3
A general result for minimum contrast estimators
Theorems 2 and 3 are a consequence of the general result we prove in this section.
More precisely we demonstrate the consistency and the asymptotic normality of
a general estimator of which the MLE and the WLSE are particular cases.
For 0 ≤ i ≤ k ≤ n − 1, recall the definition of aN (i, k − i), pN (i, k − i) in (7)
and that f¯(θ, i, k − i) = 1 − f (θ, i, k − i). Let wN (i, k − i), 0 ≤ i ≤ k ≤ n − 1
be a sequence of random weights and let G be function defined on [0, 1] × (0, 1).
Define the empirical contrast function by
WN (θ) =
n−1 X
k
X
wN (i, k − i)G(pN (i, k − i), f (θ, i, k − i)) .
k=0 i=0
For instance, choosing G(p, q) = −p log q − (1 − p) log(1 − q) and wN (i, k − i) =
aN (i, k − i) yields
WN (θ) = −
n−1 X
k
X
aN (i, k − i) pN (i, k − i) log f (θ, i, k − i)
k=0 i=0
+ qN (i, k − i) log f¯(θ, i, k − i)
= − N −1 LN (θ) ,
so that minimizing WN is equivalent to maximizing the likelihood LN , defined
in (4). Choosing G(p, q) = (p − q)2 yields the weighted least squares contrast
function WN , defined in (8). We now define the minimum contrast estimator of θ0
by
W
θ̂N
= arg min WN (θ) .
θ∈Θ
26
W
In order to prove the consistency and asymptotic normality of θ̂N
, we make
the following assumptions on G and on the weights wN (i, k − i). Let ∂2 G and ∂22 G
denote the first and second derivatives of G with respect to its second argument.
Assumption 11. The function G is non negative, twice continuously differentiable
on [0, 1]×(0, 1) with G(p, q)−G(p, p) > 0 if p 6= q, ∂2 G(p, p) = 0 and ∂22 G(p, p) > 0.
Assumption 12. For all 0 ≤ i ≤ k ≤ n − 1, wN (i, k − i) converge almost surely
to w0 (i, k − i) and w0 (i, k − i) > 0.
W
Theorem 13. If Assumptions 1-(i), 1-(ii), 11 and 12 hold, then θ̂N
is consistent.
If moreover θ0 is an interior point of Θ and Assumption 1-(iii) holds, then
√
W
N (θ̂N
− θ0 ) converges weakly to a Gaussian distribution with zero mean.
The exact expression of the variance is given in the proof.
Proof. Under Assumption 11, the strong law of large numbers shows that WN (θ)
converges almost surely to
W(θ) =
k
n−1 X
X
w0 (i, k − i)G(f0 (i, k − i), f (θ, i, k − i)) .
k=0 i=0
Assumptions 1-(ii) and 11 ensure that θ0 is the unique minimum of W. Indeed,
G(p, q) > 0 if p 6= q and G(p, p) = 0. Thus, W is minimized by any value of θ
such that f (θ, i, k − i) = f (θ0 , i, k − i). By Assumption 1-(ii), this implies θ = θ0 .
Moreover the convergence of WN to W is uniform, since Θ is compact and the
function f is twice continuously differential with respect to θ, its first variable.
W
. For the sake of completeness, we give a brief
This yields the consistency of θ̂N
W
minimizes WN , we have
proof. Since θ0 minimizes W and θ̂N
W
0 ≤ W(θ̂N
) − W(θ0 )
W
W
W
) − WN (θ0 ) + WN (θ0 ) − W(θ0 )
= W(θ̂N
) − WN (θ̂N
) + WN (θ̂N
W
W
) − WN (θ̂N
) + WN (θ0 ) − W(θ0 ) ≤ 2 sup |WN (θ) − W(θ)| .
≤ W(θ̂N
θ∈Θ
Since θ0 is the unique minimizer of W, for > 0, we can find δ such that if θ ∈ Θ
and kθ − θ0 k > , then W(θ) − W(θ0 ) ≥ δ. Thus
P(kθ̂N − θ0 k > ) ≤ P(W(θ̂N ) − W(θ0 ) ≥ δ)
≤ P 2 sup |WN (θ) − W(θ)| ≥ δ → 0 .
θ∈Θ
27
The central limit theorem is a consequence of the consistency and Lemma 9. A
first order Taylor extension of ẆN (θ) at θ0 yields
W
W
0 = ẆN (θ̂N
) = ẆN (θ0 ) + ẄN (θ̃N )(θ̂N
− θ0 ) ,
W
where θ̃N ∈ [θ0 , θ̂N
]. Setting f˙0 (i, k − i) = f˙(θ0 , i, k − i), we have
ẆN (θ0 ) =
n−1 X
k
X
wN (i, k − i)∂2 G(pN (i, k − i), f0 (i, k − i))f˙0 (i, k − i) .
k=0 i=0
2
G be the mixed second derivative of G. Note that
Let ∂12
∂2 G(f0 (i, k − i), f0 (i, k − i)) = 0 .
Thus, by the delta-method (see Dacunha-Castelle and Duflo,√
1986, Theorem 3.3.11)
and since wN converges almost surely to w0 , we obtain that N ẆN (θ0 ) converges
weakly towards
k
n−1 X
X
2
w0 (i, k − i)∂12
G(f0 (i, k − i), f0 (i, k − i))Λ0 (i, k − i)f˙0 (i, k − i) ,
k=0 i=0
where Λ0 (i, k) are independent Gaussian random
√ variables with zero mean and
variance γ0 (i, k) defined in 14. Equivalently, N ẆN (θ0 ) converges weakly to a
Gaussian vector with zero mean and covariance matrix H(θ0 ) defined by
H(θ0 ) =
n−1 X
k
X
2
w02 (i, k − i){∂12
G(f0 (i, k − i), f0 (i, k − i))}2
k=0 i=0
× γ0 (i, k)f˙0 (i, k − i)(f˙0 (i, k − i))0 .
By the law of large numbers, ẄN (θ) converges almost surely to Ẅ(θ) and this convergence is also locally uniform. Thus, ẄN (θ̃N ) converges almost surely to Ẅ(θ0 ).
Using again the fact that ∂2 G(p, p) = 0, we obtain
Ẅ(θ0 ) =
n−1 X
k
X
w0 (i, k − i)∂22 G(f0 (i, k − i), f0 (i, k − i))
k=0 i=0
× f˙0 (i, k − i)(f˙0 (i, k − i))0 .
Denote for brevity g(i, k − i) = w0 (i, k − i)∂22 G(f0 (i, k − i), f0 (i, k − i)). Then, for
any u ∈ Rd , we have
!2
n−1 X
k
d
X
X
uẄ(θ0 )u0 =
g(i, k − i)
us ∂s f (θ0 , i, k − i)
.
(15)
s=1
k=0 i=0
28
By assumption 12, g(i, k − i) > 0 for all 0 ≤ i ≤ k ≤P
n − 1, thus (15) is zero only
if for all k = 0, . . . , n − 1 and i = 0, . . . , k, we have ds=1 us ∂s f (θ0 , i, k) = 0. By
Assumption 1-(iii), this is possible only if us = 0 for all s = 1, . . . , d. Thus Ẅ(θ0 )
is positive definite.
We can now conclude that for large enough N , ẄN (θ̃N ) is invertible and we
can write
√
√
W
N (θ̂N
− θ0 ) = −Ẅ−1
(
θ̃
)
N ẆN (θ0 ) .
N
N
The right hand side converges weakly to the Gaussian distribution with zero mean
and covariance matrix Ẅ−1 (θ0 )H(θ0 )Ẅ−1 (θ0 ).
6.4
Proofs of theorems 2 and 3
Theorems 2 and 3 are a consequence of Theorem 13.
Lemma 14. Assumption 12 holds for the weights wN (i, k − i) = aN (i, k − i) and
−1
wN (i, k − i) = aN (i, k − i)p−1
N (i, k − i)qN (i, k − i), 0 ≤ i ≤ k ≤ n − 1.
Proof. For all 0 ≤ i ≤ k ≤ n − 1, aN (i, k − i) converges almost surely to P(Zk = i)
−1
−1
−1 ¯
and aN (i, k − i)p−1
N (i, k − i)qN (i, k − i) to P(Zk = i)f0 (i, k − i) f0 (i, k − i) .
Moreover Assumption 1-(i) implies that f0 (i, k − i) > 0 and f¯0 (i, k − i) > 0 for all
0 ≤ i ≤ k ≤ n − 1. Using Formula (13), this in turn implies that P(Zk = i) > 0
for all 0 ≤ i ≤ k ≤ n − 1.
Proof of Theorem 2. As mentioned above, the maximum likelihood estimator minimizes the contrast function W written with the function G(p, q) = −p log q −
(1 − p)log(1 − q) and the weights aN (i, k − i). Thus the proof of Theorem 2 consists in checking Assumption 11 and 12 to apply Theorem 13. Lemma 14 implies
that Assumption 12 holds.
The function G considered here satisfies Assumption 11. Indeed, for p, q ∈ (0, 1),
define
K(p, q) = G(p, q) − G(p, p) = p log(p/q) + (1 − p) log((1 − p)/(1 − q) .
Remark that K(p, q) is the Kullback-Leibler distance between the Bernoulli measures with respective success probabilities p and q. Then it is well known that
K(p, q) > 0 except if p = q. Indeed, by Jensen’s inequality,
K(p, q) ≥ − log(pq/p + (1 − p)(1 − q)/(1 − p)) = log 1 = 0 ,
and by strict concavity of the log function, equality holds only if p = q. Moreover,
∂2 G(p, q) = −p/q+(1−p)/(1−q) so ∂2 G(p, p) = 0 and ∂22 G(p, p) = p−1 (1 − p)−1 > 0.
29
Proof of Theorem 3. Again, the proof consists in checking Assumption 11 and 12
to apply Theorem 13. The latter holds by virtue of Lemma 14 and Assumption 11 trivially holds for the function G(p, q) = (p − q)2 . If wN (i, k − i) =
−1
p−1
N (i, k − i)qN (i, k − i)aN (i, k − i), then
H(θ0 ) = 2Ẅ(θ0 ) = 4In (θ0 )
=4
n−1 X
k
X
k=0 i=0
P(Zk = i)
f˙0 (i, k − i)(f˙0 (i, k − i))0 . (16)
f0 (i, k − i)f¯0 (i, k − i)
So that Σn (θ0 ) = Ẅ−1 (θ0 )H(θ0 )Ẅ−1 (θ0 ) = In−1 (θ0 ).
If the weights are chosen as wN (i, k) = aN (i, k), then w0 (i, k − i) = P(Zk = i)
and
H(θ0 ) = 4
Ẅ (θ0 ) = 2
k
n−1 X
X
k=0 i=0
n−1
k
XX
P(Zk = i)f0 (i, k − i)f¯0 (i, k − i)f˙0 (i, k − i)(f˙0 (i, k − i))0 , (17)
P(Zk = i)f˙0 (i, k − i)(f˙0 (i, k − i))0 .
(18)
k=0 i=0
6.5
Proofs of Corollaries 6 and 7
Corollaries 6 and 7 are a consequence of Theorem 13. The assumptions on the
weights wN and on the functions G have been already verified in the previous
section. We have to prove the Assumption 1 on the choice function f defined
in (10). Hypothesis 1-(i) is obvious.
By elementary computations, we have, for 0 ≤ i ≤ k ≤ n − 1,
α
α0
c+i
c0 + i
f (α, c, i, k − i) = f (α0 , c0 , i, k − i) ⇔
=
c+k−i
c0 + k − i
log(c0 + i) − log(c0 + k − i)
α
=
. (19)
⇔
α0
log(c + i) − log(c + k − i)
Plugging the pairs (i, k) = (0, 1) and (i, k) = (0, 2) into (19) yields
log(c0 ) − log(c0 + 1)
log(c0 ) − log(c0 + 2)
=
,
log(c) − log(c + 1)
log(c) − log(c + 2)
or equivalently
log(1 + 1/c0 )
log(1 + 1/c)
=
.
log(1 + 2/c0 )
log(1 + 2/c)
30
(20)
It is easily checked that the function x → log(1 + x)/ log(1/2x) is strictly increasing on (0, ∞). Thus (20) implies that c = c0 . Plugging this equality into (19)
yields α = α0 . This proves Assumption 1-(ii).
We now prove that if n ≥ 2, the vectors {∂α f (θ0 , i, k − i), 0 ≤ i ≤ k ≤ n − 1}
and {∂c f (θ0 , i, k − i), 0 ≤ i ≤ k ≤ n − 1} are linearly independent in Rn(n−1) .
For 0 ≤ i ≤ k ≤ n − 1, we have,
c+i
,
∂α f (α, c, i, k − i) = f (α, c, i, k − i)f (α, c, k − i, i) log
c+k−i
α(k − 2i)
∂c f (α, c, i, k − i) = f (α, c, i, k − i)f (α, c, k − i, i)
.
(c + i)(c + k − i)
Let (u, v) ∈ R2 and assume that for all i, j ≤ n − 1 such that i + j ≤ n − 1, it
holds that
c0 + i
α0 (j − i)
=0.
u log
+v
c0 + j
(c0 + i)(c0 + j)
Replacing (i, j) for instance successively by (0, 1) and (0, 2) yields
c
α0
0
+v
=0,
u log
c0 (c0 + 1)
c0 + 1
c0
2α0
=0.
+v
u log
c0 + 2
c0 (c0 + 2)
If (u, v) 6= (0, 0), this implies
c0 + 2
c0 + 2
c0 + 1
c0 + 1
log
+2
log
=0.
c0
c0
c0
c0
By strict convexity of the function x → x log x on (0, ∞), this is impossible.
Thus u = v = 0 and Assumption 1-(iii) holds.
6.6
Proof of Theorem 8
Proof of Theorem 8, case α0 = 1. In this case the model is Pólya’s urn, and we
have
n−1
X
1
1
4
1
E
+E
−
.
(21)
In (c) =
2c + k
c + Zk
c + k − Zk
2c + k
k=0
The distribution of Zk is given by
k c(c + 1) · · · (c + i − 1) × c(c + 1) · · · (c + k − i − 1)
P(Zk = i) =
.
2c(2c + 1) · · · (2c + k − 1)
i
31
Thus,
X
k
k c(c + 1) · · · (c + i − 1) × c(c + 1) · · · (c + k − i − 1) 1
1
=
.
E
c + Zk
i
2c(2c + 1) · · · (2c + k − 1)
c+i
i=0
For any c > 0, there exists constants C1 < C2 such that, for all integers h ≥ 1,
h
Y
C1 h ≤
(1 + c/i) ≤ C2 hc .
c
i=1
Therefore, there exists a constant C > 0 such that for all k ≥ 1,
−1
k−1
c−2
c−1
O(k ) if c > 1 ,
X i
i
1
= O(k −1 log k) if c = 1 ,
≤ Ck −2
1−
E
c + Zk
k
k
i=1
O(k −c ) if c < 1 .
In all three cases, we obtain that the first series in (21) is summable. By symmetry,
the sum of the second expectations is also finite.
Proof of Theorem 8, case α0 < 1. In this case, we know by Theorem 4 that Zn /n
converges almost surely to 1/2. This implies that f (θ, Zn , n−Zn ) converges almost
surely to 1/2 for all θ. By Cesaro’s Lemma, this implies that n−1 `n (θ) → − log 2
a.s.
Proof of Theorem 8, case α0 > 1. Let Ω1 be the event that color 1 is eventually selected, which happens with probability 1/2 by Theorem 4. Then, on Ω1 , Zn /n → 1
and if k > T∞ , then Xk+1 = 1 and Zk = k − Q∞ . Thus for large enough n, the
log-likelihood on one path becomes
`n (θ) =
T∞
X
Xk+1 log f (θ, Zk , k − Zk ) + (1 − Xk+1 ) log{1 − f (θ, Zk , k − Zk )}
k=0
+
n
X
log f (θ, k − Q∞ , Q∞ ) .
k=T∞ +1
As k → ∞, for any α > 0,
(c + Q∞ )α
log f (θ, k − Q∞ , Q∞ ) = − log 1 +
(c + k − Q∞ )α
32
∼−
(c + Q∞ )α
.
(c + k − Q∞ )α
If α ≤ 1 the series is divergent and thus limn→∞ `n (θ) = −∞. If α > 1 then the
series is convergent and thus, on Ω1 ,
lim `n (θ) =
n→∞
=
+
∞
X
k=0
T∞
X
Xk+1 log f (θ, Zk , k − Zk ) + (1 − Xk+1 ) log{1 − f (θ, Zk , k − Zk )}
Xk+1 log f (θ, Zk , k − Zk ) + (1 − Xk+1 ) log{1 − f (θ, Zk , k − Zk )}
k=0
∞
X
log f (θ, k − Q∞ , Q∞ ) .
T∞ +1
This implies that arg maxθ∈Θ `n (θ) = arg maxθ∈Θ,α>1 `n (θ) and that this argmax
is a random variable which is a function of the whole path, and does not depend
on the true value θ0 .
Acknowledgment We thanks Guy Theraulaz and Hugues Chaté for providing
their material framework and their field expertise to allow the first author to
collect the data of the Argentine ants experiments. These experiments are part
of the project TRACES supported by the CNRS. They were done during two
visits in April and July 2012 of the first author to the Centre de Recherches sur
la Cognition Animale (CRCA, Centre de Recherches sur la Cognition Animale,
UMR 5169, Paul Sabatier University, Toulouse), whose hospitality is gratefully
acknowledged.
References
Arganda, S., S. Nicolis, A. Perochain, C. Péchabadens, G. Latil, and A. Dussutour (2014): “Collective choice in ants: The role of protein and carbohydrates
ratios,” J. Insect Physiol., 69, 19–26.
Aron, S., J.-L. Deneubourg, S. Goss, and J. Pasteels (1990): Functional Selforganisation illustrated by Inter-nest Traffic in Ants : the Case of the Argentine
Ant, Springer-Verlag, chapter Biological Motion, 533–547.
Aron, S., J. Pasteels, and J.-L. Deneubourg (1989): “Trail-laying behaviour during
exploratory recruitment in the argentine ant, iridomyrmex humilis (mayr),”
Biol. of Behav., 14, 207–217.
Beckers, R., J.-L. Deneubourg, and S. Goss (1992): “Trails and u-turns in the
selection of a path by the ant lasius niger,” J. Theor. Biol., 159, 397–415.
33
Beckers, R., J.-L. Deneubourg, and S. Goss (1993): “Modulation of trail laying
in the ant lasius niger (hymenoptera: formicidae) and its role in the collective
selection of a food source,” J. of Insect Behav., 6, 751–759.
Dacunha-Castelle, D. and M. Duflo (1986): Probability and statistics. Vol. II, New
York: Springer-Verlag.
Davis, B. (1990): “Reinforced random walk,” Probab. Theory Related Fields, 84,
203–229.
Deneubourg, J.-L., S. Aron, S. Goss, and J. Pasteels (1990): “The self-organizing
exploratory pattern of the argentine ant,” J. of Insect Behav., 3, 159–168.
Dussutour, A., J.-L. Deneubourg, and V. Fourcassié (2005): “Amplification of
individual preferences in a social context: the case of wall-following in ants,”
Proc. R. Soc. London, Ser. B, 272, 705–714.
Freedman, D. (1965): “Bernard friedman’s urn,” Ann. Math. Stat., 36, 956–970.
Garnier, S., A. Guérécheau, M. Combe, V. Fourcassié, and G. Theraulaz (2009):
“Path selection and foraging efficiency in argentine ant transport networks,”
Behav. Ecol. Sociobiol., 63, 1167–1179.
Jeanson, R., F. Ratnieks, and J.-L. Deneubourg (2003): “Pheromone trail decay
rates on different substrates in the pharaohs ant, monomorium pharaonis,”
Physiol. Entomol., 28, 192–198.
Khanin, K. and R. Khanin (2001): “A probabilistic model for the establishment
of neuron polarity,” J. Math. Biol., 42, 26–40.
Le Goff, L. and O. Raimond (2015): “Vertex reinforced non-backtracking random
walks: an example of path formation,” URL http://arxiv.org/abs/1506.
01239, arXiv:1506.01239.
Nicolis, S. and J.-L. Deneubourg (1999): “Emerging patterns and food recruitment in ants: an analytical study,” J. Theor. Biol., 198, 575–592.
Nicolis, S. and A. Dussutour (2008): “Self-organization, collective decision making
and resource exploitation strategies in social insects,” Eur. Phys. J. B, 65, 379–
385.
Pasteels, J., J.-L. Deneubourg, and S. Goss (1987): “Transmission and amplification of information in a changing environment: The case of insect societies,”
Eds I. Prigogine & M. Sanglier. Gordes, Bruxelles.
34
Pemantle, R. (2007): “A survey of random processes with reinforcement,” Probability Surveys, 4, 1–79.
Pólya, G. (1931): “Sur quelques points de la théorie des probabilités,” Ann.
I.H.P., 1, 117–161.
Tarrès, P. (2011): “Localization of reinforced random walks,” URL http://
arxiv.org/abs/1103.5536, arXiv:1103.5536.
Thienen, W., D. Metzler, D.-H. Choe, and V. Witte (2014): “Pheromone communication in ants: a detailed analysis of concentration-dependent decisions in
three species,” Behav. Ecol. Sociobiol., 68, 1611–1627.
Van Vorhis Key, S. and T. Baker (1982): “Trail-following responses of the argentine ant, iridomyrmex humilis (mayr), to a synthetic trail pheromone component
and analogs,” J. Chem. Ecol., 8, 3–14.
Vittori, K., G. Talbot, J. Gautrais, V. Fourcassié, A. Araujo, and G. Theraulaz
(2006): “Path efficiency of ant foraging trails in an artificial network,” J. Theor.
Biol., 239, 507–515.
Wasserman, L. (2004): All of Statistics: A Concise Course in Statistical Inference,
Springer.
35
| 10math.ST
|
Sound and Automated Synthesis of Digital Stabilizing
Controllers for Continuous Plants
∗
Alessandro Abate1 , Iury Bessa2 , Dario Cattaruzza1 , Lucas Cordeiro1,2 ,
Cristina David1 , Pascal Kesseli1 and Daniel Kroening1
arXiv:1610.04761v3 [cs.SY] 16 Feb 2017
1
University of Oxford, Oxford, United Kingdom
ABSTRACT
Modern control is implemented with digital microcontrollers,
embedded within a dynamical plant that represents physical
components. We present a new algorithm based on counterexample guided inductive synthesis that automates the design
of digital controllers that are correct by construction. The
synthesis result is sound with respect to the complete range
of approximations, including time discretization, quantization effects, and finite-precision arithmetic and its rounding
errors. We have implemented our new algorithm in a tool
called DSSynth, and are able to automatically generate stable
controllers for a set of intricate plant models taken from the
literature within minutes.
Keywords
Digital control synthesis, CEGIS, finite-word-length representation, time sampling, quantization
1.
INTRODUCTION
Modern implementations of embedded control systems
have proliferated with the availability of low-cost devices that
can perform highly non-trivial control tasks, with significant
impact in numerous application areas such as environmental
control and robotics [4, 17]. Correct control is non-trivial,
however. The problem is exacerbated by artifacts specific
to digital control, such as the effects of finite-precision arithmetic, time discretization, and quantization noise introduced
by A/D and D/A conversion. Thus, programming expertise
is a key barrier to broad adoption of correct digital controllers, and requires considerable knowledge outside of the
expertise of many control engineers.
Beyond classical a-posteriori validation in digital control,
there has been plenty of previous work aiming at verifying
a given designed controller, which however broadly lack automation. Recent work has studied the stability of digital
∗
Supported by EPSRC grant EP/J012564/1, ERC project
280053 (CPROVER) and the H2020 FET OPEN SC2 .
Permission to make digital or hard copies of all or part of this work for personal or
classroom use is granted without fee provided that copies are not made or distributed
for profit or commercial advantage and that copies bear this notice and the full citation
on the first page. Copyrights for components of this work owned by others than ACM
must be honored. Abstracting with credit is permitted. To copy otherwise, or republish,
to post on servers or to redistribute to lists, requires prior specific permission and/or a
fee. Request permissions from [email protected].
c 2017 ACM. ISBN .
DOI:
2
Federal University of Amazonas, Manaus, Brazil
controllers considering implementation aspects, i.e., fixedpoint arithmetic and the word length [8]. They exploit
advances in bit-accurate verification of C programs to obtain
a verifier for software-implemented digital control.
By contrast, we leverage a very recent step-change in the
automation and scalability of program synthesis. Program
synthesis engines use a specification as the starting point, and
subsequently generate a sequence of candidate programs from
a given template. The candidate programs are iteratively
refined to eventually satisfy the specification. Program synthesizers implementing Counter-Example Guided Inductive
Synthesis (CEGIS) [34] are now able to generate programs
for highly non-trivial specifications with a very high degree of
automation. Modern synthesis engines combine automated
testing, genetic algorithms, and SMT-based automated reasoning [1, 11].
By combining and applying state-of-the-art synthesis engines we present a tool that automatically generates digital
controllers for a given continuous plant model that are correct by construction. This approach delivers a high degree of
automation, promises to reduce the cost and time of development of digital control dramatically, and requires considerably less expertise than a-posteriori verification. Specifically,
we synthesize stable, software-implemented embedded controllers along with a model of a physical plant. Due to the
complexity of such closed-loop systems, in this work we focus
on linear models with known configurations, and perform
parametric synthesis of stabilizing digital controllers (further closed-loop performance requirements are left to future
work).
Our work addresses challenging aspects of the control synthesis problem. We perform digital control synthesis over a
hybrid model, where the plant exhibits continuous behavior
whereas the controller operates in discrete time and over a
quantized domain. Inspired by a classical approach [4], we
translate the problem into a single digital domain, i.e., we
model a digital equivalent of the continuous plant by evaluating the effects of the quantizers (A/D and D/A converters)
and of time discretization. We further account for uncertainties in the plant model. The resulting closed-loop system is
a program with a loop that operates on bit-vectors encoded
using fixed-point arithmetic with finite word length (FWL).
The three effects of 1. uncertainties, 2. FWL representation
and 3. quantization errors are incorporated into the model,
and are taken into account during the CEGIS-based synthesis
of the control software for the plant.
In summary, this paper makes the following original contributions.
• We automatically generate correct-by-construction digital controllers using an inductive synthesis approach.
Our application of program synthesis is non-trivial and
addresses challenges specific to control systems, such
as the effects of quantizers and FWL. In particular, we
have found that a two-stage verification engine that
continuously refines the precision of the fixed-point representation of the plant yields a speed-up of two orders
of magnitude over a conventional one-stage verification
engine.
• Experimental results show that DSSynth is able to efficiently synthesize stable controllers for a set of intricate
benchmarks taken from the literature: the median runtime for our benchmark set considering the faster engine
is 48 s, i.e., half of the controllers can be synthesized in
less than one minute.
2.
2.1
PRELIMINARIES
Discretization of the Plant
The digital controllers synthesized using the algorithm
we present in this paper are typically used in closed loops
with continuous (physical) plants. Thus, we consider continuous dynamics (the plant) and discrete parts (the digital
controller). In order to obtain an overall model for the synthesis, we discretize the continuous plant and particularly
look at the plant dynamics from the perspective of the digital
controller.
As we only consider transfer function models, and require
a z-domain transfer function G(z) that captures all aspects
of the continuous plant, which is naturally described via
a Laplace-domain transfer function G(s). The continuous
model of the plant must be discretized to obtain the corresponding coefficients of G(z).
Among the discretization methods in the literature [17],
we consider the sample-and-hold processes in complex systems [20]. On the other hand, the ZOH discretization models
the exact effect of sampling and DAC interpolation over the
plant.
Assumption 1. The sample-and-hold effects of the ADC
and the presence of the ZOH of the DAC are synchronized,
namely there is no delay between sampling the plant output
at the ADC and updating the DAC accordingly. The DAC
interpolator is an ideal ZOH.
Lemma 1. [4] Given a synchronized ZOH input and sampleand-hold output on the plant, with a sample time T satisfying
the Nyquist criterion, the discrete pulse transfer function
G(z, T ) is an exact z-domain representation of G(s), and can
be computed using the following formula:
G(s)
G(z, T ) = (1 − z −1 )Z L−1
.
(1)
s
t=kT
In this study, for the sake of brevity, we will use the notation G(z) to represent the pulse transfer function G(z, T ).
Lemma
1 ensures that the poles and zeros match under the
Z L−1 {·}t=kT operations, and it includes the ZOH dynamics in the (1 − z −1 ) term. This is sufficient for stability
studies over G(s) [15], i.e., if there is any unstable pole (in
the complex domain <{s} > 0), the pulse transfer function
in (1) will also present the same number of unstable poles
(|z| > 1) [17].
2.2
Model Imprecision, Finite Word Length
Representation and Quantization Effects
Let C(z) be a digital controller and G(z) be a discrete-time
representation of the plant, given as
C(z) =
β0 + β1 z −1 + ... + βMC z −MC
Cn (z)
=
,
Cd (z)
α0 + α1 z −1 + ... + αNC z −NC
(2)
G(z) =
b0 + b1 z −1 + ... + bMG z −MG
Gn (z)
=
.
Gd (z)
a0 + a1 z −1 + ... + aNG z −NG
(3)
~ and α
where β
~ are vectors containing the controller’s coefficients; similarly, ~b and ~a denote the plant’s coefficients; and
finally N(·) and M(·) indicate the order of the polynomials,
and we require in particular that NG ≥ MG .
Uncertainties in G(z) may appear owing to: 1. uncertainties in G(s) (we denote the uncertain continuous plant by
G (s)+∆ G (s)
Ĝ(s) = Gnd (s)+∆pp Gnd (s) to explicitly encompass the effects of
the uncertainty terms ∆p G(·) (s)) arising from tolerances/imprecision in the original model; 2. errors in the numerical
calculations due to FWL effects (e.g., coefficient truncation
and round-off, which will be denoted as ∆b Gn (s), ∆b Gd (s));
and 3. errors caused by quantization (which we model later
as as external disturbances ν1 and ν2 ). These uncertainties
are parametrically expressed by additive terms, eventually
resulting in an uncertain model Ĝ(z), such that:
Ĝ(z) =
Gn (z) + ∆Gn (z)
,
Gd (z) + ∆Gd (z)
(4)
which will be represented by the following transfer function:
Ĝ(z) =
b̂0 + b̂1 z −1 + ... + b̂MG z −MG
.
â0 + â1 z −1 + ... + âNG z −NG
(5)
Notice that, due to the nature of the methods we use for
the stability check, we require that the parametric errors
in the plant have the same polynomial order as the plant
itself (indeed, all other errors described in this paper fulfill this property). We also remark that, due to its native digital implementation, there are no parametric errors
(∆p Cn (z), ∆p Cd (z)) in the controller. Thus Ĉ(z) ≡ C(z).
We introduce next a notation based on the coefficients
of the polynomial to simplify the presentation. Let P N be
the space of polynomials of order N . Let P ∈ P M,N be a
rational polynomial PPnd , where Pn ∈ P M and Pd ∈ P N . For
a vector of coefficients
~ ∈ RN +M +2 = [n0 n1 . . . nM d0 d1 . . . dN ]T
P
(6)
and an uncertainty vector
~ ∈ RN +M +2 = [∆n0 . . . ∆nM ∆d0 . . . ∆dN ]T
∆P
(7)
we write
~
~ + ∆G,
~ where
Ĝ = G
(8)
~ ∈ RNG +MG +2 = [b0 . . . bM a0 . . . aN ]T ,
G
G
G
~ ∈ RNG +MG +2 = [∆b0 . . . ∆bM ∆a0 . . . ∆aN ]T .
∆G
G
G
In the following we will either manipulate the transfer functions G(z), C(z) directly, or work over their respective coef~ C
~ in vector form.
ficients G,
A typical digital control system with a continuous plant
and a discrete controller is illustrated in Figure 1. The DAC
and ADC converters introduce quantization errors (notice
ν2 (z)
ν1 (z)
DAC
ADC
Controller
R(z)
+
e(z)
Ĉ(z)
-
Plant
U (z)
+
+
U (s)
ZOH
Ŷ (s)
Ĝ(s)
Q2
+
+
Ŷ (z)
Q1
Figure 1: Closed-loop digital control system (cf. Section 2.2 for notation)
that each of them may have a different FWL representation
than the controller), which are modeled as disturbances ν1 (z)
and ν2 (z); G(s) is the continuous-time plant model with
parametric additive uncertainty ∆p Gn (s) and ∆p Gd (s) (as
mentioned above); R(z) is a given reference signal; U (z) is
the control signal; and Ŷ (z) is the output signal affected by
the disturbances and uncertainties in the closed-loop system
The ADC and DAC may be abstracted by transforming the
closed-loop system in Figure 1 into the digital system in
Figure 2, where the effect of ν1 and ν2 in the output Y (z) is
additive noise.
Controller
R(z)
+
e(z)
-
Ĉ(z)
U (z)
ν2 (z)
+
+
Plant
Ĝ(z)
where P n is the space of polynomials of n-th order, P n hI, F i
is the space of polynomials with coefficients in RhI, F i, and
(as a special case) F0 hI, F i(x) returns the element x̃ ∈ RhI, F i
that is closest to the real parameter x.
Similarly, Fn,m hI, F i(·) : P n,m → P n,m hI, F i applies the
same effect to a ratio of polynomials, where P n,m , P n,m hI, F i
are rational polynomial domains.
Thus, the perturbed controller model C̃(z) may be obn (z)
tained from the original model Ĉ(z) = C(z) = C
as
Cd (z)
follows:
ν1 (z)
+
+
Ŷ (z)
Figure 2: Fully digital equivalent to system in Figure 1
In Figure 2, two sources of uncertainty are illustrated:
parametric uncertainties model the errors (which are rep~ and uncertainties for the quantizations
resented by ∆p G),
in the ADC and DAC conversions (ν1 and ν2 ), which are
assumed to be non-deterministic. Recall that we discussed
how the quantization noise is an additive term, which means
it does not enter parametrically in the transfer function. Instead, we later show that the system is stable given these
non-deterministic disturbance.
The uncertain model may be rewritten as a vector of
~
~+
coefficients in the z-domain using equation (8) as Ĝ = G
~ The parametric uncertainties in the plant are assumed
∆p G.
to have the same order as the plant model, since errors of
higher order can move the closed-loop poles by large amounts,
thus preventing any given controller from stabilizing such a
setup. This is a reasonable assumption since most tolerances
do not change the architecture of the plant.
Direct use of controllers in fixed-point representation.
Since the controller is implemented using finite representation, C(z) also suffers disturbances from the FWL effects,
with roundoffs in coefficients that may change closed-loop
poles and zeros position, and consequently affect its stability,
as argued in [8].
Let Ĉ(z) be the digital controller transfer function represented using this FWL with integer size I and fractional
size F . The term I affects the range of the representation
and is set to avoid overflows, while F affects the precision
and the truncation after arithmetic operations. We shall
denote the FWL domain of the coefficients by RhI, F i and
define a function
Fn hI, F i(P ∈ P) : P n → P n hI, F i
~ = F hI, F i(c ),
~ ∧ c̃i ∈ P̃
, P̃ ∈ P n hI, F i : ci ∈ P
0
i
(9)
C̃(z) = FMC ,NC hI, F i(C(z)) =
FMC hI, F i(Ĉn (z))
FNC hI, F i(Ĉd (z))
. (10)
In the case of a digitally synthesized controller (as it is the
case in this work), C̃(z) ≡ Ĉ(z) ≡ C(z) because the synthesis
is performed directly using FWL representation. In other
words, we synthesize a controller that is already in the domain
RhI, F i and has therefore no uncertainties entering because
of FWL representations, that is, ∆b Cn (z) = ∆b Cd (z) = 0.
Fixed-point computation in program synthesis.
The program synthesis engine uses fixed-point arithmetic.
Specifically, we use the domain RhI, F i for the controller’s coefficients and the domain RhIp , Fp i for the plant’s coefficients,
where I and F , as well as Ip and Fp , denote the number of bits
for the integer and fractional parts, respectively, and where
it is practically motivated to consider RhIp , Fp i ⊇ RhI, F i.
Given the use of fixed-point arithmetic, we examine the
discretization effect during these operations. Let C̃(z) and
G̃(z) be transfer functions represented using fixed-point bitvectors.
C̃(z) =
β̃0 + β̃1 z −1 + ... + β̃MC z −MC
,
α̃0 + α̃1 z −1 + ... + α̃NC z −NC
(11)
G̃(z) =
b̃0 + b̃1 z −1 + ... + b̃MG z −MG
.
ã0 + ã1 z −1 + ... + ãNG z −NG
(12)
Recall that since the controller is synthesized in the RhI, F i
domain, C̃(z) ≡ Ĉ(z) ≡ C(z). However, given a real plant
Ĝ(z), we need to introduce G̃(z) = FMG ,NG hIp , Fp i(Ĝ(z)),
where
(b̂0 + ∆b b̂0 ) + ... + (b̂MG + ∆b b̂MG )z −MG
(â0 + ∆b â0 ) + ... + (âNG + ∆b âNG )z −NG
~
~
~ =G
~ + ∆p G
~ + ∆b G,
~
G̃ = Ĝ + ∆b G
(13)
G̃(z) =
where ∆b ci = c̃i − ĉi , and ∆b G represents the plant uncertainty caused by the rounding off effect. We capture the
~ = ∆p G
~ + ∆b G.
~
global uncertainty as ∆G
2.3
Closed-Loop Stability Verification under
Parametric Uncertainties, FWL Representation and Quantization Noise
Sound synthesis of the digital controller requires the consideration of the effect of FWL on the controller, and of
quantization disturbances in the closed-loop system. Let the
quantizer Q1 (ADC) be the source of a white noise ν1 , and
Q2 (DAC) be the source of a white noise ν2 . The following equation models the system in Figure 1, including the
~ and the FWL effects on the
parametric uncertainties ∆G
controller C̃(z):
Ŷ (z) = ν1 (z) + Ĝ(z)C̃(z)R(z) + Ĝ(z)ν2 (z) − Ĝ(z)C̃(z)Ŷ (z).
(14)
The above can be rewritten as follows:
Ŷ (z) = H1 (z)ν1 (z) + H2 (z)ν2 (z) + H3 (z)R(z),
(15)
where
H1 (z) =
1
,
1 + Ĝ(z)C̃(z)
H2 (z) =
Ĝ(z)
,
1 + Ĝ(z)C̃(z)
H3 (z) =
Ĝ(z)C̃(z)
.
1 + Ĝ(z)C̃(z)
Assumption 2. The quantization noises ν1 (from Q1)
and ν2 (from Q2) are uncorrelated white noises and their
amplitudes are always bounded by the half of quantization
step [4], i.e., |ν1 | ≤ q21 and |ν2 | ≤ q22 , where q1 and q2 are
the quantization steps of ADC and DAC, respectively.
A discrete-time dynamical system is said to be BoundedInput and Bounded-Output (BIBO) stable if bounded inputs
necessarily result in bounded outputs. This condition holds
true over an LTI model if and only if every pole of its transfer
function lies inside the unit circle [5]. Analyzing Eq. (15),
the following proposition provides conditions for the BIBO
stability of the system in Figure 1, with regards to the
exogenous signals R(z), ν1 , and ν2 , which are all bounded
(in particular, the bound on the quantization noise is given
by Assumption 2).
Proposition 1. [8, 15] Consider a feedback closed-loop
control system as given in Figure 1 with a FWL implementation of the digital controller C̃(z) = FMC ,NC hI, F i(C(z))
and uncertain discrete model of the plant from (6), (7)
Ĝ(z) =
Ĝn (z)
,
Ĝd (z)
~
~ + ∆p G.
~
Ĝ = G
Then Ĝ(z) is BIBO-stable if and only if:
• the roots of characteristic polynomial S(z) are inside
the open unit circle, where S(z) is:
S(z) = C̃n (z)Ĝn (z) + C̃d (z)Ĝd (z);
(16)
• the direct loop product C̃(z)Ĝ(z) has no pole-zero cancellation on or outside the unit circle.
Proposition 1 provides necessary (and sufficient) conditions for the controller to stabilize the closed-loop system,
~ quanconsidering plant parametric uncertainties (i.e., ∆p G),
tization noises (ν1 and ν2 ) and FWL effects in the control
software. In particular, note that the model for quantization
noise enters as a signal to be stabilized: in practice, if the
quantization noise is bounded, the noise may be disregarded
if the conditions on Proposition 1 are satisfied.
If the verification is performed using FWL arithmetic,
the above equations must use G̃(z) instead of Ĝ(z). The
former will provide sufficient conditions for the latter to be
stabilized.
3.
3.1
AUTOMATED PROGRAM SYNTHESIS
FOR DIGITAL CONTROL
Overview of the Synthesis Process
In order to synthesize closed-loop digital control systems,
we use a program synthesis engine. Our program synthesizer
implements Counter-Example Guided Inductive Synthesis
(CEGIS) [34]. We start by presenting its general architecture
followed by describing the parts specific to closed-loop control
systems. A high-level view of the synthesis process is given
in Figure 3. Steps 1 to 3 are performed by the user and
Steps A to D are automatically performed by our tool for
Digital Systems Synthesis, named DSSynth.
CEGIS-based control synthesis requires a formal verifier
to check whether a candidate controller meets the requirements when combined with the plant. We use the DigitalSystem Verifier (DSVerifier) [19] in the verification module
for DSSynth. It checks the stability of closed-loop control
systems and considers finite-word length (FWL) effects in the
digital controller, and uncertainty parameters in the plant
model (plant intervals) [8].
Given a plant model in ANSI-C syntax as input (Steps 1–3),
DSSynth constructs a non-deterministic model to represent
the plant family, i.e., it addresses plant variations as interval
sets (Step A), and formulates a function (Step B) using implementation details provided in Steps 2 and 3 to calculate
the controller parameters to be synthesized (Step C). Note
that DSSynth synthesizes the controller for the desired numerical representation and realization form. Finally, DSSynth
builds an intermediate ANSI-C code for the digital system
implementation, which is used as input for the CEGIS engine
(Step D).
This intermediate ANSI-C code model contains a specification φ for the property of interest (i.e., robust stability)
and is passed to the Counterexample-Guided Inductive Synthesis (CEGIS) module of CBMC [9], where the controller
is marked as the input variable to synthesize. CEGIS employs an iterative, counterexample-guided refinement process,
which is explained in detail in Section 3.2. CEGIS reports
a successful synthesis result if it generates a controller that
is safe with respect to φ. In particular, the ANSI-C code
model guarantees that a synthesized solution is complete
and sound with respect to the stability property φ, since
it does not depend on system inputs and outputs. In the
case of stability, the specification φ consists of a number of
assumptions on the polynomial coefficients, following Jury’s
Criteria, as well as the restrictions on the representation of
these coefficients as discussed in detail in Section 3.3.
3.2
Architecture of the Program Synthesizer
The input specification provided to the program synthesizer
~ .∀~
~ ) where P
~ ranges over functions,
is of the form ∃P
x.σ(~
x, P
User
Step 1
Determine plant
model and intervals
DSSynth
Step 2
Define controller
numerical representation
Step B
Formulate a FWL
effect function
Step A
Construct a nondeterministic plant model
Step 3
Define controller
realization form
Step C
Compute FWL
controller model
ANSI-C input
file
Intermediate
ANSI-C code
Step D
Synthesise digital
controller
Figure 3: Overview of the synthesis process
~
x ranges over ground terms and σ is a quantifier-free formula.
We interpret the ground terms over some finite domain D.
The design of our synthesizer is given in Figure 4 and
consists of two phases, Synthesize and Verify, which interact via a finite set of test vectors inputs that is updated
incrementally. Given the aforementioned specification σ,
~
the synth procedure tries to find an existential witness P
~
satisfying the specification σ(~
x, P ) for all ~
x in inputs (as
opposed to all ~x ∈ D). If synthesize succeeds in finding
~ , this witness is a candidate solution to the full
a witness P
synthesis formula. We pass this candidate solution to verify,
~ satisfies the
which checks whether it is a full solution (i.e., P
~
specification σ(~x, P ) for all ~
x ∈ D). If this is the case, then
the algorithm terminates. Otherwise, additional information
is provided to the synthesize phase in the form of a new
counterexample that is added to the inputs set and the loop
iterates again (the second feedback signal “Increase Precision” provided by the Verify phase in Figure 4 is specific to
control synthesis and will be described in the next section).
Each iteration of the loop adds a new input to the finite
set inputs that is used for synthesis. Given that the full set
of inputs D is finite, this means that the refinement loop can
only iterate a potentially very large, but finite number of
times.
3.3
Synthesis for Control
Formal specification of the stability property.
Next, we describe the specific property that we pass to
the program synthesizer as the specification σ. There are
a number of algorithms in our verification engine that can
be used for stability analysis [7, 8]. Here we choose Jury’s
criterion [4] in view of its efficiency and ease of integration
within DSSynth: we employ this method to check the stability
in the z-domain for the characteristic polynomial S(z) defined
in (16). We consider the following form for S(z):
S(z) = a0 z N + a1 z N −1 + · · · + aN −1 z + aN = 0, a0 6= 0.
Next, the following matrix M = [mij ](2N −2)×N is built
from S(z) coefficients:
M =
V (0)
V (1)
..
.
,
V (N −2)
(k)
where V (k) = [vij ]2×N such that:
(0)
vij =
aj−1 ,
if i = 1
0
v(1)(N
−j+1) , if i = 2
(k)
vij
0,
if j > n − k
(k−1)
(k−1)
(k−1) v11
−
v
.
v
,
if
j ≤ n − k and i = 1
=
(k−1)
2j
1j
v21
vk
if j ≤ n − k and i = 2
(1)(N −j+1) ,
and where k ∈ Z is such that 0 < k < N −2. We have that [4]
S(z) is the characteristic polynomial of a stable system if
and only if the following four conditions hold: R1 : S(1) > 0;
R2 : (1)N S(1) > 0; R3 : |a0 | < aN ; R4 : m11 > 0 ∧ m31 > 0 ∧
m51 > 0 ∧ . . . ∧ m(2N −3)(1) > 0. The stability property
is then encoded by a constraint of the form: φstability ≡
(R1 ∧ R2 ∧ R3 ∧ R4 ).
The synthesis problem.
The synthesis problem we are trying to solve is the following: find a digital controller C̃(z) that makes the closed-loop
system stable for all possible uncertainties G̃(z) (13). When
mapping back to the notation used for describing the general
architecture of the program synthesizer, the controller C̃(z)
denotes P and G̃(z) represents x.
As mentioned above, we compute the coefficients for C̃(z)
in the domain RhI, F i, and those for G̃(z) in the domain
RhIp , Fp i. While the controller’s precision hI, F i is given, we
can vary hIp , Fp i such that RhIp , Fp i ⊇ RhI, F i. As the cost of
SAT solving increases with in the size of the problem instance,
our algorithm tries to solve the problem first for small Ip ,
Fp , iteratively increasing the precision if it is insufficient.
3.4
The Synthesize and Verify phases
The synthesize phase uses BMC to compute a solution
C̃(z). There are two alternatives for the verify phase. The
first approach uses interval arithmetic [28] to represent the
coefficients [ci − ∆p ci − ∆b ci , ci + ∆p ci − ∆b ci + (2−Fp )]
and rounds outwards. This0 allows us to simultaneously
evaluate the full collection of plants Ĝ(s) (i.e., all concrete
plants G(s) in the range G(s) ± ∆p G(s)) plus the effects of
numeric calculations. Synthesized controllers are stable for
all plants in the family. Preliminary experiments show that
a synthesis approach using this verification engine has poor
performance and we therefore designed a second approach.
Our experimental results in Section 4 show that the speedup
yielded by the second approach is in most cases of at least
two orders of magnitude.
The second approach is illustrated in Figure 4 and uses
a two-stage verification approach: the first stage performs
potentially unsound fixed-point operations assuming a plant
precision hIp , Fp i, and the second stage restores soundness
by validating these operations using interval arithmetic on
the synthesized controller. In more detail, in the first stage,
denoted by Uncertainty in Figure 4, assuming a precision
hIp , Fp i we check whether the system is unstable for the current candidate solution, i.e., if ¬φstability is satisfiable for S(z).
If this is the case, then we obtain a counterexample G̃(z),
Increase Precision
Verify
Candidate solution
Synthesize
Uncertainty
Counterexample
Candidate
UNSAT/
Inputs
P
model
UNSAT/
candidate
Closed-loop System Search
BMC-based Verifier
Precision
Done
Candidate
P
True/
False
Fixed-point Arithmetic Verifier
Figure 4: Counterexample-Guided Inductive Synthesis of Closed-loop Systems (Step D)
which makes the closed-loop system unstable. This uncertainty is added to the set inputs such that, in the subsequent
synthesize phase, we obtain a candidate solution consisting
of a controller C(z), which makes the closed-loop system
stable for all the uncertainties accumulated in inputs.
If the Uncertainty verification stage concludes that the
system is stable for the current candidate solution, then we
pass this solution to the second verification stage, Precision,
which checks the propagation of the error in the fixed-point
calculations using a Fixed-point Arithmetic Verifier based
on interval arithmetic.
If the precision verification returns false, then we increase
the precision of hIp , Fp i and re-start the synthesize phase
with an empty inputs set. Otherwise, we found a full sound
solution for our synthesis problem and we are done.
In the rest of the paper, we will refer to the two approaches
for the verify phase as one-stage and two-stage, respectively.
3.5
Soundness
The synthesise phase generates potentially unsound candidate solutions. The soundness of the model is ensured by
the verify phase. If a candidate solution passes verification,
it is necessarily sound.
The verify phase has two stages. The first stage ensures
that no counterexample plant with an unstable closed loop
exists over finite-precision arithmetic. Since the actual plant
uses reals, we need to ensure we do not miss a counterexample because of rounding errors. For this reason, the second
verification stage uses an overapproximation with interval
arithmetic with outward rounding. Thus, the first verification
stage underapproximates and is used to generate counterexamples, and the second stage overapproximates and provides
proof that no counterexample exists.
3.6
Illustrative Example
We illustrate our approach with a classical cruise control
example from the literature [5]. It highlights the challenges
that arise when using finite-precision arithmetic in digital
control. We are given a discrete plant model (with a time
step of 0.2 s), represented by the following z-expression:
G(z) =
0.0264
.
z − 0.9998
(17)
Using an optimization tool, the authors of [36] have designed a high-performance controller for this plant, which is
characterized by the following z-domain transfer function:
C(z) =
2.72z 2 − 4.153z + 1.896
.
z 2 − 1.844z + 0.8496
(18)
The authors of [36] claim that the controller C(z) in (18)
stabilizes the closed-loop system for the discrete plant model
G(z) in (17). However, if the effects of finite-precision arithmetic are considered, then this closed-loop system becomes
unstable. For instance, an implementation of C(z) using
Rh4, 16i fixed-point numbers (i.e., 4 bits for the integer part
and 16 bits for the fractional part) can be modeled as:
2
−4.1529998779296875z+1.89599609375
C̃(z):= 2.7199859619140625z
.
z 2 −1.843994140625z+0.8495941162109375
(19)
The resulting system, where C̃(z) and G(z) are in the forward
path, is unstable. Notice that this is disregarding further
approximation effects on the plant caused by quantization in
the verifier (i.e., G̃(z)). Figure 5a gives the Bode diagram for
the digital controller represented in (18): as the phase margin
is negative, the controller is unstable when considering the
FWL effects.
3.7
Program Synthesis for the Example
We now demonstrate how our approach solves the synthesis problem for the example given in the previous section.
Assuming a precision of Ip = 16, Fp = 24, we start with
an a-priori candidate solution with all coefficients zero (the
controller performs FWL arithmetic, hence we use C̃(z)):
C̃(z) =
0z 2 +0z+0
.
0z 2 +0z+0
In the first verify stage, the uncertainty check finds the
following counterexample:
G̃(z) =
0.026506
.
1.000610z + 1.002838
We add this counterexample to inputs and initiate the synthesize phase, where we obtain the following candidate
solution:
C̃(z) =
12.402664z 2 −11.439667z+0.596756
.
4.003906z 2 −0.287949z+0.015625
This time, the uncertainty check does not find any counterexample and we pass the current candidate solution to
the precision verification stage. We obtain the result false,
meaning that the current precision is insufficient. Consequently, we increase our precision to Ip = 20, Fp = 28.
Since the previous counterexamples were obtained at lower
precision, we remove them from the set of counterexamples. Back in the synthesize phase, we re-start the process
with a candidate solution with all coefficients 0, as above.
Next, the uncertainty verification stage provides the first
counterexample at higher precision:
G̃(z) =
0.026314
.
0.999024z−1.004785
Bode Diagram
Gm = 16.7 dB (at 2.12 rad/s) , Pm = −57.2 deg (at 1.29 rad/s)
Magnitude (dB)
10
0
−10
−20
Phase (deg)
−30
−90
−180
−270
−360
−450
−1
10
0
10
1
10
2
10
Frequency (rad/s)
(a) Original controller [36]
Bode Diagram
Gm = 17.8 dB (at 15.7 rad/s) , Pm = Inf
Magnitude (dB)
0
−5
−10
−15
−20
Phase (deg)
−25
0
−45
−90
−135
−180
−225
−1
10
0
10
1
10
2
10
Frequency (rad/s)
(b) Controller synthesized by DSSynth
Figure 5: Bode diagram for original controller in [36] and
for newly synthesized closed-loop system
In the synthesize phase, we get a new candidate solution
that eliminates the new, higher precision counterexample:
C̃(z) =
11.035202z 2 +5.846100z+4.901855
.
1.097901z 2 +0.063110z+0.128357
This candidate solution is validated as the final solution
by both stages uncertainty and precision in the verify
phase. Figure 5 compares the Bode diagram using the digital
controller represented by Eq. (18) from [36] (Figure 5a) and
the final candidate solution from our synthesizer (Figure 5b).
The DSSynth final solution is stable since it presents an
infinite phase margin and a gain margin of 17.8 dB.
Figure 6 illustrates the step responses of the closed-loop
system with the original controller represented by Eq. (18)
(Figure 6a), the first (Figure 6b) and final (Figure 6c) candidate solutions provided by DSSynth. The step response
in Figure 6a confirms the stability loss if we consider FWL
effects. Figure 6b shows that the first candidate controller is
able to stabilize the closed-loop system without uncertainties,
but it is rejected during the precision phase by DSSynth
since this solution is not sound. Finally, Figure 6c shows a
stable behavior for the final (sound) solution, which presents
a lower settling time (hence the digitization effects).
4.
EXPERIMENTAL EVALUATION
4.1
Description of the Benchmarks
The first set of benchmarks uses the discrete model G1 of
a cruise control system for a car, and accounts for rolling
friction, aerodynamic drag, and the gravitational disturbance
force [5]. The second set of benchmarks considers the discrete
model G2 of a simple spring-mass damper plant [36]. A third
set of benchmarks uses the discrete model G3 for satellite
attitude dynamics [17], which require attitude control for
orientation of antennas and sensors w.r.t. Earth. The fourth
set of benchmarks presents an alternative discrete model G4
of a cruise control system [36]. The fifth and sixth set of
benchmarks describe the discrete model of a DC servo motor
velocity dynamics [27, 35]. The seventh set of benchmarks
contains a well-studied discrete non-minimal phase model
G7 . Non-minimal phase models cause additional difficulties
for the design of stable controllers [12]. The eighth set of
benchmarks describes the discrete model G8 for the Helicopter Longitudinal Motion, which provides the longitudinal
motion dynamics of a helicopter [17]. The ninth set of benchmarks contains the discrete model G9 for the known Inverted
Pendulum, which describes a pendulum dynamics with its
center of mass above its pivot point [17]. The tenth set of
benchmarks contains the Magnetic Suspension discrete model
G10 , which describes the dynamics of a mass that levitates
with support only of a magnetic field [17]. The eleventh set
of benchmarks contains the Computer Tape Driver discrete
model G11 , which describes a system to read and write data
on a storage device [17]. The last set of benchmarks considers
a discrete model G12 that is typically used for evaluating
stability margins and controller fragility [23, 24].
Additional benchmarks were created for the Cruise Control
System, Spring-mass damper, and Satellite considering parametric additive in the nominal plant model (represented by
~ in Eq. (13)). The uncertainties are deviations bounded
∆p G
to a maximum magnitude of 0.5 in each coefficient. These
uncertain models are respectively represented by G1b , G2b ,
G3b and G3d .
All experiments have been conducted on a 12-core 2.40 GHz
Intel Xeon E5-2440 with 96 GB of RAM and Linux OS. All
times given are wall clock times in seconds, as measured
by the UNIX date command. For the two-stage verification
engine in Figure 4 we have applied a timeout of 8 hours per
benchmark, whereas 24 hours have been set for the approach
using a one-stage engine.
4.2
Objectives
Using the closed-loop control system benchmarks given in
Section 4.1, our experimental evaluation aims to answer two
research questions:
RQ1 (performance) does the CEGIS approach generate a
FWL digital controller in a reasonable amount of time?
RQ2 (sanity check) are the synthesized controllers sound
and can their stability be confirmed outside of our
model?
4.3
Results
We give the run-times required to synthesize a stable
controller for each benchmark in Table 1. Here, Plant is
the discrete or continuous plant model, Benchmark is the
name of the employed benchmark, I and F represent the
Step Response
Step Response
28
1.5
Step Response
x 10
1.4
1
1.2
0.9
1
0.8
1
0.5
0
Amplitude
Amplitude
Amplitude
0.7
0.6
0.5
0.8
0.6
0.4
0.4
0.3
−0.5
0.2
0.2
0.1
−1
0
50
100
150
200
Time (seconds)
250
(a) Original controller
300
350
0
0
0
50
100
150
0
0.5
Time (seconds)
(b) First solution by DSSynth
1
1.5
2
2.5
Time (seconds)
3
3.5
4
(c) Final solution by DSSynth
Figure 6: Step responses for original [36] closed-loop system with FWL effects and for each synthesize iteration of DSSynth
number of integer and fractional bits of the stable controller,
respectively, while the two right columns display the total
time (in seconds) required to synthesize a stable controller
for the given plant.
For the majority of the benchmarks, the conjecture explained in Section 3.3 holds and the two-stage verification
engine is able to find a stable solution in less than one minute
for half of the benchmarks. This is possible if the inductive
solutions need to be refined with few counterexamples and
increments of the fixed-point precision. However, the benchmark SatelliteB2 with uncertainty (G3b ) has required too
many counterexamples to refine its solution. For this particular case, the one-stage engine is able to complement the
two-stage approach and synthesizes a solution. It is important to reiterate that the one-stage verification engine does
not take advantage of the inductive conjecture inherent to
CEGIS, but instead fully explores the counterexample space
in a single SAT instance. As expected, this approach is significantly slower on average and is only useful for benchmarks
where the CEGIS approach requires too many refinement
iterations such that exploring all counterexamples in a single
SAT instance performs better. Our results suggest an average
performance difference of at least two orders of magnitude,
leading to the one-stage engine timing out on the majority
of our benchmarks. Table 1 lists the results for both engines,
where in 16 out of 23 benchmarks, the two-stage engine is
faster.
The presence of uncertainty in some particular benchmarks
(2, 4, 6, and 8) leads to harder verification conditions to be
checked by the verify phase, which impacts the overall
synthesis time. However, considering the faster engine for
each benchmark (marked in bold in Table 1), the median
run-time is 48 s, implying that DSSynth can synthesize half of
the controllers in less than one minute. Overall, the average
fastest synthesis time considering both engines is approximately 42 minutes. We consider these times short enough
to be of practical use to control engineers, and thus affirm
RQ1. We further observe that the two-stage verification
engine is able to synthesize stable controllers for 19 out of
the 23 benchmarks, and can be complemented using the onestage engine, which is faster for two benchmarks where the
inductive conjectures fail. Both verification engines together
enable controller synthesis for 20 out of 23 benchmarks. For
the remaining benchmarks our approach failed to synthesize a stable controller within the time limits. This can be
addressed by either increasing either the time limit or the
fixed-point word widths considered, or by using floating-point
arithmetic instead. The synthesized controllers have been
#
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
Plant
G1a
G1b
G2a
G2b
G3a
G3b
G3c
G3d
G4
G5
G6
G7
G8
G9
G10
G11
G12a
G12a
G12a
G12b
G12b
G12b
G12c
Benchmark
CruiseControl02
CruiseControl02†
SpgMsDamper
SpgMsDamper†
SatelliteB2
SatelliteB2†
SatelliteC2
SatelliteC2†
Cruise
DCMotor
DCServomotor
Doyleetal
Helicopter
Pendulum
Suspension
Tapedriver
a ST1 IMPL1
a ST1 IMPL2
a ST1 IMPL3
a ST2 IMPL1
a ST2 IMPL2
a ST2 IMPL3
a ST3 IMPL1
I
4
4
15
15
3
3
3
3
3
3
4
4
3
3
3
3
16
16
16
16
16
16
16
F
16
16
16
16
7
7
5
5
7
7
11
11
7
7
7
7
4
8
12
4
8
12
4
2-stage
12 s
14600 s
52 s
7
36 s
7
3s
50 s
1s
1s
46 s
8769 s
44 s
1s
1s
1s
11748 s
351 s
8772 s
1128 s
7
15183 s
7
1-stage
67 s
52 s
318 s
7
7
4111 s
205 s
1315 s
1s
10 s
7
7
7
14826 s
5s
1s
7
7
7
7
7
7
7
Table 1: DSSynth results (7 = time-out, † = uncertainty)
confirmed to be stable outside of our model representation
using MATLAB, positively answering RQ2. A link to the
full experimental environment, including scripts to reproduce
the results, all benchmarks and the DSSynth tool, is provided
in the footnote.1
4.4
Threats to Validity
We have reported a favorable assessment of DSSynth over
a diverse set of real-world benchmarks. Nevertheless, this
set of benchmarks is limited within the scope of this paper
and DSSynth’s performance needs to be assessed on a larger
benchmark set in future work.
Furthermore, our approach to select suitable FWL word
widths to model plant behavior employs a heuristic based
on user-provided controller word-width specifications. Given
the encouraging results of our benchmarks, this heuristic
appears to be strong enough for the current benchmark set,
but this may not generalize. Further experiments towards
determining suitable plant FWL configurations may thus be
necessary in future work.
Finally, the experimental results obtained using DSSynth
for stability properties may not generalize to other properties.
1
http://www.cprover.org/DSSynth/experiment.tar.gz
CBMC (SHA-1 hash) version:
7a6cec1dd0eb8843559591105235f1f2c4678801
The inductive nature of the two-stage back-end of DSSynth
increases performance significantly compared to the onestage back-end, but this performance benefit introduced
by CEGIS inductive generalizations may not be observed
for other controller properties. Additional experiments are
necessary to confirm that the performance of our inductive
synthesis approach can be leveraged in those scenarios.
5.
RELATED WORK
Robust Synthesis of Linear Systems.
The problem of parametric control synthesis based on stability measures for continuous Linear Time Invariant (LTI)
Single Input-Single Output (SISO) systems has been researched for several decades. On a theoretical level it is
a solved problem [37], for which researchers continuously
seek better results for a number of aspects in addition to
stability. A vast range of pole placement techniques such as
Moore’s algorithm for eigenstructure assignment [25] or the
more recent Linear Quadratic Regulator (LQR) [6] have been
used with increasing degrees of success. The latter approach
highlights the importance of conserving energy during the
control process, which results in lower running costs. Since
real systems are subject to tolerance and noise as well as
the need for economy, more recent studies focus on the problem of achieving robust stability with minimum gain [33,
26]. However, when applied with the aim of synthesizing a
digital controller, many of these techniques lack the ability
to produce sound or stable results because they disregard
the effects of quantization and rounding. Recent papers on
implementations/synthesis of LTI digital controllers [10, 18]
focus on time discretization, failing to account for these errorinducing effects and can result in digital systems that are
unstable even though they have been proven to be robustly
stable in a continuous space.
Formal Verification of Linear Digital Controllers.
Various effects of discretizing dynamics, including delayed
response [13] and Finite Word Length (FWL) semantics [3]
have been studied, with the goal to either verify [7] or to
optimize [29] given implementations.
There are two different problems that arise from FWL
semantics. The first is the error in the dynamics caused
by the inability to represent the exact state of the physical
system while the second relates to rounding errors during
computation. In [16], a stability measure based on the error
of the digital dynamics ensures that the deviation introduced
by FWL does not make the digital system unstable. A recent approach [38] uses the µ-calculus to directly model the
digital controller so that the selected parameters are stable
by design. Most work in verification focuses on finding a
correct variant of a known controller, looking for optimal
parameter representations using FWL, but ignore the effects
of rounding errors due to issues of mathematical tractability.
The analyses in [32, 36] rely on an invariant computation
on the discrete system dynamics using Semi-Definite Programming (SDP). While the former uses BIBO properties to
determine stability, the latter uses Lyapunov-based quadratic
invariants. In both cases, the SDP solver uses floating-point
arithmetic and soundness is checked by bounding the error.
An alternative approach is taken by [30], where the verification of existing code is performed against a known model
by extracting an LTI model of the code through symbolic
execution. In order to account for rounding errors, an upper
bound is introduced in the verification phase. If the error of
the implementation is lower than this tolerance level, then
the verification is successful.
Robust Synthesis of FWL Digital Controllers.
There is no technique in the existing literature for automatic synthesis of fixed-point digital controllers that considers FWL effects.
Other tools such as [14] are aimed at robust stability
problems, but they fail to take the FWL effects into account.
In order to provide a correct-by-design digital controller, [2]
requires a user-defined finite-state abstraction to synthesize
a digital controller based on high-level specifications. While
this approach overcomes the challenges presented by the
FWL problem, it still requires error-prone user intervention.
A different solution that uses FWL as the starting point is
an approach that synthesizes word lengths for known control
problems [22]; however, this provides neither an optimal
result nor a comprehensive solution for the problem.
The CEGIS Architecture.
Program synthesis is the problem of computing correctby-design programs from high-level specifications, and algorithms for this problem have made substantial progress in
recent years. One such approach [21] inductively synthesizes
invariants to generate the desired programs.
Program synthesizers are an ideal fit for synthesis of parametric controllers since the semantics of programs capture
effects such as FWL precisely. In [31], the authors use
CEGIS for the synthesis of switching controllers for stabilizing continuous-time plants with polynomial dynamics. The
work extends to its application on affine systems, finding its
major challenge in the hardness of solving linear arithmetic
with the state-of-the-art SMT solvers. Since this approach
uses switching states instead of linear dynamics in the digital
controller, it entirely circumvents the FWL problem. It is
also not suitable for the kind of control we seek to synthesize.
We require a combination of a synthesis engine with a control
verification tool that addresses the challenges presented here
in the form of FWL effects and stability measures for LTI
SISO controllers. We take the former from [11] and the latter
from [7] while enhancing the procedure by evaluating the
quantization effects of the Hardware interfaces (ADC/DAC)
to obtain an accurate discrete-time FWL representation of
the continuous dynamics.
6.
CONCLUSIONS
We have presented a method for synthesizing stable controllers and an implementation in a tool called DSSynth. The
novelty in our approach is that it is fully automated and algorithmically and numerically sound. In particular, DSSynth
marks the first use of the CEGIS that handles plants with
uncertain models and FWL effects over the digital controller.
Implementing this architecture requires transforming the
traditional CEGIS refinement loop into a two-stage engine:
here, the first stage performs fast, but potentially unsound
fixed-point operations, whereas the second stage restores
soundness by validating the operations performed by the first
stage using interval arithmetic. Our experimental results
show that DSSynth is able to synthesize stable controllers
for most benchmarks within a reasonable amount of time
fully automatically. Future work will be the extension of this
CEGIS-based approach to further classes of systems, including those with state space. We will also consider performance
requirements while synthesizing the digital controller.
7.
[19]
REFERENCES
[1] R. Alur, D. Fisman, R. Singh, and A. Solar-Lezama.
SyGuS-Comp 2016: Results and analysis. In Workshop
on Synthesis, volume 229 of EPTCS, 2016.
[2] R. Alur, S. Moarref, and U. Topcu. Compositional
synthesis with parametric reactive controllers. In
HSCC. ACM, 2016.
[3] A. Anta, R. Majumdar, I. Saha, and P. Tabuada.
Automatic verification of control system
implementations. In Embedded Software (EMSOFT),
pages 9–18, 2010.
[4] K. Åström and B. Wittenmark. Computer-controlled
systems: theory and design. 1997.
[5] K. J. Astrom and R. M. Murray. Feedback Systems: An
Introduction for Scientists and Engineers. 2008.
[6] A. Bemporad, M. Morari, V. Dua, and E. N.
Pistikopoulos. The explicit linear quadratic regulator
for constrained systems. Automatica, 38(1), 2002.
[7] I. Bessa, H. Ismail, L. Cordeiro, and J. Filho.
Verification of fixed-point digital controllers using
direct and delta forms realizations. Design Autom. for
Emb. Sys., 20(2), 2016.
[8] I. Bessa, H. Ismail, R. Palhares, L. Cordeiro, and
J. E. C. Filho. Formal non-fragile stability verification
of digital control systems with uncertainty. IEEE
Transactions on Computers, 66(3):545–552, 2017.
[9] E. M. Clarke, D. Kroening, and F. Lerda. A tool for
checking ANSI-C programs. In TACAS, volume 2988,
2004.
[10] S. Das, I. Pan, K. Halder, S. Das, and A. Gupta. LQR
based improved discrete PID controller design via
optimum selection of weighting matrices using
fractional order integral performance index. Applied
Mathematical Modelling, 37(6), 2013.
[11] C. David, D. Kroening, and M. Lewis. Using program
synthesis for program analysis. In LPAR, LNCS, 2015.
[12] J. C. Doyle, B. A. Francis, and A. R. Tannenbaum.
Feedback Control Theory. 1991.
[13] P. S. Duggirala and M. Viswanathan. Analyzing real
time linear control systems using software verification.
In IEEE Real-Time Systems Symposium, Dec 2015.
[14] C. Economakos, G. Economakos, M. Skarpetis, and
M. Tzamtzi. Automated synthesis of an FPGA-based
controller for vehicle lateral control. In MATEC Web of
Conferences, volume 41, 2016.
[15] S. Fadali and A. Visioli. Digital Control Engineering:
Analysis and Design, volume 303 of Electronics &
Electrical. 2009.
[16] I. J. Fialho and T. T. Georgiou. On stability and
performance of sampled-data systems subject to
wordlength constraint. IEEE Trans. on Automatic
Control, 39(12), 1994.
[17] G. Franklin, D. Powell, and A. Emami-Naeini. Feedback
Control of Dynamic Systems. 7th edition, 2015.
[18] S. Ghosh, R. K. Barai, S. Bhattarcharya,
P. Bhattacharyya, S. Rudra, A. Dutta, and R. Pyne.
An FPGA based implementation of a flexible digital
PID controller for a motion control system. In
[20]
[21]
[22]
[23]
[24]
[25]
[26]
[27]
[28]
[29]
[30]
[31]
[32]
[33]
[34]
[35]
[36]
[37]
[38]
Computer Communication and Informatics (ICCCI).
IEEE, 2013.
H. Ismail, I. Bessa, L. C. Cordeiro, E. B. de Lima Filho,
and J. E. C. Filho. DSVerifier: A bounded model
checking tool for digital systems. In SPIN, volume 9232,
2015.
R. Istepanian and J. F. Whidborne. Digital controller
implementation and fragility: A modern perspective.
2012.
S. Itzhaky, S. Gulwani, N. Immerman, and M. Sagiv.
A simple inductive synthesis methodology and its
applications. In ACM Sigplan Notices, volume 45.
ACM, 2010.
S. Jha and S. A. Seshia. SWATI: Synthesizing
wordlengths automatically using testing and induction.
arXiv preprint arXiv:1302.1920, 2013.
L. Keel and S. Bhattacharyya. Robust, fragile, or
optimal? IEEE Trans. on Automatic Control, 42(8),
1997.
L. Keel and S. Bhattacharyya. Stability margins and
digital implementation of controllers. In Proc.
American Control Conference, volume 5, 1998.
G. Klein and B. Moore. Eigenvalue-generalized
eigenvector assignment with state feedback. IEEE
Trans. on Automatic Control, 22(1), 1977.
U. Konigorski. Pole placement by parametric output
feedback. Systems & Control Letters, 61(2), 2012.
Y. Li, K. Ang, G. Chong, W. Feng, K. Tan, and
H. Kashiwagi. CAutoCSD–evolutionary search and
optimisation enabled computer automated control
system design. Int J Automat Comput, 1(1), 2004.
R. E. Moore. Interval analysis, volume 4. 1966.
A. K. Oudjida, N. Chaillet, A. Liacha, M. L.
Berrandjia, and M. Hamerlain. Design of high-speed
and low-power finite-word-length PID controllers.
Control Theory and Technology, 12(1), 2014.
J. Park, M. Pajic, I. Lee, and O. Sokolsky. Scalable
verification of linear controller software. In TACAS.
Springer, 2016.
H. Ravanbakhsh and S. Sankaranarayanan.
Counter-example guided synthesis of control Lyapunov
functions for switched systems. In Conference on
Decision and Control, CDC, 2015.
P. Roux, R. Jobredeaux, and P. Garoche. Closed loop
analysis of control command software. In HSCC, 2015.
R. Schmid, L. Ntogramatzidis, T. Nguyen, and
A. Pandey. A unified method for optimal arbitrary pole
placement. Automatica, 50(8), 2014.
A. Solar-Lezama. Program sketching. STTT, 15(5-6),
2013.
K. Tan and Y. Li. Performance-based control system
design automation via evolutionary computing.
Engineering Applications of Artificial Intelligence,
14(4), 2001.
T. E. Wang, P. Garoche, P. Roux, R. Jobredeaux, and
E. Feron. Formal analysis of robustness at model and
code level. In HSCC, 2016.
W. Wonham. On pole assignment in multi-input
controllable linear systems. IEEE Trans. on Automatic
Control, 12(6), 1967.
J. Wu, G. Li, S. Chen, and J. Chu. Robust finite word
length controller design. Automatica, 45(12), 2009.
| 3cs.SY
|
On Generalization and Regularization
in Deep Learning
An Introduction for Data Scientists
arXiv:1704.01312v2 [stat.ML] 6 Apr 2017
Pirmin Lemberger
[email protected]
Weave Business Technology
37 rue du Rocher, 75008 Paris
weave.eu
April 10, 2017
Abstract
Why do large neural network generalize so well on complex tasks such
as image classification or speech recognition? What exactly is the role regularization for them? These are arguably among the most important open
questions in machine learning today. In a recent and thought provoking
paper [1] several authors performed a number of numerical experiments
that hint at the need for novel theoretical concepts to account for this
phenomenon. The paper stirred quit a lot of excitement among the machine learning community but at the same time it created some confusion
as discussions in [2] testifies. The aim of this pedagogical paper is to make
this debate accessible to a wider audience of data scientists without advanced theoretical knowledge in statistical learning. The focus here is on
explicit mathematical definitions and on a discussion of relevant concepts,
not on proofs for which we provide references.
1
Motivation
The heart and essence of machine learning is the idea of generalization. Put
in intuitive terms this is the ability for an algorithm to be trained on samples
S = {(x1 , y1 ), . . . , (xn , yn )} of n examples of an unknown relation between some
features x = (x1 . . . , xp ) and a target response y and to provide accurate predictions on new, unseen data. To achieve this goal an algorithm tries to pick up an
estimator fˆ among a class of function F, called the hypothesis class hereafter,
which makes small prediction errors |yi − fˆ(xi )| when evaluated on the train
set S. Of course such an endeavor makes no sense unless we can ascertain that
the train set error is close in some sense to the true error we would make on
the whole population. Practically this discrepancy is estimated using validation
and test sets, a procedure familiar to any data scientist.
1
Again, on intuitive grounds we expect that in order to make good predictions we need to select a hypothesis class F that is appropriate for the problem
at hand. More precisely we should use some prior knowledge about the nature
of the link between between the features x and the target y to choose which
functions the class F should possess. For instance if, for any reason, we know
that with high probability the relation between x and y is approximately linear we better choose F to contain only such functions fw (x) = w · x. In the
most general setting this relationship is encoded in a complicated and unknown
probability distribution P on labeled observations (x, y). In many cases all we
know is that the relation between x and y has some smoothness properties.
The set of techniques that data scientists use to adapt the hypothesis class
F to a specific problem is know as regularization. Some of these are explicit in
the sense that they constrain estimators f in some way as we shall describe in
section 2. Some are implicit meaning that it is the dynamics of the algorithm
which walks its way through the set F in search for a good f (typically using
stochastic gradient descent) that provides the regularization. Some of these
regularization techniques actually pertain more to art than to mathematics as
they rely more on experience and intuition than on theorems.
Figure 1: The architecture of AlexNet which is one of the networks used by the authors
in [1]
Deep Learning is a a very popular class of machine learning models, roughly
inspired by biology, that are particularly well suited for tackling complex, AIlike tasks such as image classification, NLP or automatic translation. Roughly
speaking these models are defined by stacking layers that, each, combine linear
combinations of the input with non-linear activation functions (and perhaps
some regularization). We won’t enter into defining them in detail here as many
excellent textbooks [3, 4] will do the job. Figure 1 shows the architecture of
AlexNet a deep network used in the experiment [1]. For our purpose, which is a
discussion of the issue of generalization and regularization, suffice it to say here
that these Deep Learning problems share the following facts:
• The number n of samples available for training these networks is typically
much smaller than the number k of parameters w = (w1 , . . . , wk ) that
define the functions fw ∈ F 1 .
• The probability distribution P (x, y) is impossible to describe in any sensible way in practice. For concreteness, think of x as the pixels of and
1 The number of parameters k of a Deep Learning network such as AlexNet can be over a
hundred of millions while being trained on “only” a few millions of images in image-net.
2
image an of y as the name of an animal represented in the picture. Popular wisdom tells us nevertheless that conditional distributions P (x|y) are
located in the vicinity of some sort of “manifold” My ⊂ Rp .
• The hypothesis class F is defined implicitly by some neural network architecture together with one or more regularization procedures. In section
4 we shall briefly describe the more common such procedures.
As a matter of fact, from a practitioner’s point of view, Deep Learning with
its many tips and tricks [5] generalizes almost unreasonably well. The question
thus is: why? There are two kind of attempts at explaining this mystery.
1. On the one hand there are heuristic explanations, which rely mostly on
variants of physicist’s multi-scale analysis [6]. Proponents of these explanations argue that the efficiency of deep learning models F has its roots
in the physical generating process P of features x (such as image pixels)
that describe objects found in nature. They claim this process is generally
a hierarchy of simpler processes and that the multi-layered is well adapted
to learn such signals. We won’t touch upon this further here.
2. On the other there are classical results from Empirical Risk Minimization
theory [7] which substantiates the idea that the class F of hypothesis
functions should not be too flexible in order for a model to generalize
properly. This is our subject.
Numerical experiments in [1] are thought provoking because they challenge the
second class of explanations which all interpret regularization as a way of limiting some specific measures of class complexity. In the sequel we shall use
hypothesis class and model interchangeably.
The main results from Empirical Risk Minimization (ERM) theory which form
the necessary background for interpreting the experimental results in [1] are
presented in section 3. However, to put things in perspective we first review the
concepts of generalization and regularization in the context of the bias-variance
trade-off which is more familiar for data scientists. Section 2 and 3 are actually
logically independent but the underlying theme of the rigidity of a class F of
functions unifies them. In the context of bias-variance trade-off the rigidity of
a model is optimized to minimize the so called expected loss, whereas in the
context of ERM the rigidity of a model allows to bound population errors with
sample errors. Finally, section 4 explains in what sense the experiments in [1]
are challenging ERM.
2
The Bias-Variance Trade-off
Readers in a hurry to learn the basics of ERM can skip this section except for
definitions (1) and (3).
2.1
The Expected Loss
In the most general setting the relationship between the features x and the
target y is given by an unknown probability distribution P from which labeled
3
observations (x, y) are drawn. Assume we use a function f ∈ F from our
hypothesis class to make predictions and that we pick a loss function `(y, f (x)) ≡
`f (x, y) to measure the error between the true value y and our prediction f (x).
The population error errP [f ], also called the expected loss (EL), can then be
defined as
Z
errP [f ] ≡ `(y, f (x))P (x, y) dx dy
(1)
≡ EP [`f ].
This is the quantity that we would ideally like to minimize as a functional
over F. The special case of a square loss function `(y, f (x)) = [y − f (x)]2 is
interesting, not because it is particularly useful in practice, but because it leads
to explicit expressions of various quantities. In this special case, the optimal h
which minimizes (1) is given by the conditional mean
Z
h(x) = yP (y |x)dy ≡ EP [y|x].
(2)
As P will forever remain unknown to us we must contend ourselves with estimates ĥS of the optimal h based on finite samples S = {(x1 , y1 ), . . . , (xn , yn )}.
An estimate ĥS can be defined as a minimizer over f ∈ F of the sample version
of errP [f ]
n
err
c S [f ] ≡
1X
`(yi , f (xi ))
n i=1
(3)
bS [`f ].
≡E
In a frequentist perspective, the accuracy of these empirical minimizers ĥS ∈ F
can then be defined by taking an average of the EL over train sets S. We call it
the Average Expected Loss (AEL) even if this naming doesn’t particularly shine
with elegance. We denote the averaging operation over training samples S by
Ave to distinguish it from the expectation EP over labeled observations
AEL ≡ Ave[errP [ĥS ]].
2.2
(4)
The Bias-Variance Decomposition
It is instructive to examine the AEL for the special case of a square loss function `(y, f (x)) = [y − f (x)]2 because it allows an explicit decomposition of the
AEL into three components that are easy to interpret. Indeed, let us denote
the Average Expected Square Loss by AESL, the best possible estimator by
h(x) = EP [y|x] and the minimizer over F of the empirical error err
c S [.] by ĥS .
A straightforward application of the above definitions leads to the following
decomposition, see for instance [3]
AESL = (bias)2 + variance + noise,
4
(5)
where
Z
h
i
2
Ave ĥS (x) − h(x) P (x)dx,
Z
2
variance = Ave ĥS (x) − Ave[ĥS (x)]
P (x)dx,
Z
noise = [h(x) − y]2 P (x, y)dx dy.
2
(bias) =
(6)
The (bias)2 measures how much our predictions ĥS (x) averaged over all train
sets S deviate from the optimal prediction h(x). The variance measures how
much our predictions ĥS (x) fluctuate around their average value when the train
set S varies. Finally the noise measures how much the true values y fluctuate
around the best possible prediction h(x), this is only term which is independent
of our predictions ĥS (x).
2.3
Regularization as Constraints
Remember that all prediction functions ĥS belong to some hypothesis class F
that defines our model. We can control the variance by putting some constraints
on functions which belong to F, thus preventing too large fluctuations of ĥS
when training the model on different samples S. Stronger constraint means
a more rigid model and thus typically a smaller variance but a larger (bias)2 .
Regularization of the model amounts to choosing the amount of rigidity that
will minimize AEL using an optimal trade-off between the bias and the variance.
For the AESL it is simply their sum which should be minimized as (5) shows.
If we consider a parametric model, each function fw ∈ F is characterized
by a vector w ∈ Rp of parameters and in particular ĥ = fw
b . One way then to
make the regularization procedure explicit in this context is to put a constraint
on w such as for instance kwk2 < c (Ridge regularization) or kwk1 < c (Lasso
regularization) where the constant c can be tuned for optimal rigidity. To minimize err
c S [fw ] under such a constraint one proceeds the usual way by defining
a Lagrange function and look for its minimum
reg
err
c S [fw ] ≡ err
c S [fw ] + λkwkp
(7)
One can show that for each constraint c there is indeed a corresponding λ for
b p < c. Summarizing the intuition gained so far and denoting Fλ the
which kwk
class of regularized functions
larger λ ⇔ smaller c ⇔ stronger constraints ⇔
“smaller” Fλ ⇔ (smaller variance and larger bias).
If we want to explicit the dependence of our minimizer on the regularization
parameter λ we use ĥS,λ .
2.4
Regularization in Practice
Practically the proper amount of regularization λ in (7) is chosen by using a
procedure such as cross-validation (CV) well known to data scientist. This
5
[ for the true AEL defined
procedure can be viewed as giving an estimate AEL
in (4) which involve two distinct sampling procedures:
1. The first procedure estimates Ave in (4) by an arithmetic mean over r
train sets S1 , ..., Sr that correspond to a splitting of the original data S
into r folds as depicted in figure 2.
2. The second procedure estimates the population errors errP [·] in (4) by
their sample versions err
c Tj [·] on the test sets Tj = S\Sj .
Figure 2: A data set S split into r = 4 folds. The red rectangles are the test sets
Tj = S\Sj associated to the train sets Sj .
We thus define the estimate of AEL as a function of λ
r
1X
[
AEL(λ)
≡
err
c S\Sj [ĥSj ,λ ].
r j=1
(8)
d as a function of the regularization λ allows to find an estimator
Plotting ESL
b
λ of the optimal rigidity of the model. When r = 1 CV amounts to splitting
the data between a train set S and a test set T . The train error err
c S [ĥS,λ ] is
usually smaller than the test error err
c T [ĥS,λ ] which typically has an U-shaped
graph as shown in figure 3.
Remark 1 : The bias-variance decomposition in (5) is strictly valid only for a
Figure 3: Empirical estimation of the optimal regularization λ
6
squared loss function `(y, ŷ) = |y − ŷ|2 . However on experimental grounds the
heuristics behind the trade-off, namely the set of equivalences above and the
intuition behind figure 3 are expected to remain valid for other loss functions `
as well.
Remark 2 : Universality theorems for neural networks tell us that there exists
functions f , defined by even the simplest neural network (NN) architectures,
that will make the sample error err
c S [f ] as small as we want when we minimize
without regularization constraints (λ = 0). In other words, neural networks can
possibly over-fit any sample S provided the network is large enough. These are
mere existence theorems however and they tell us nothing neither about how to
optimize regularization λ to minimize EL nor on our practical ability to find a
minimizer in Fλ with these constraints.
3
Empirical Risk Minimization
The whole analysis in last section rests on our ability to approximate the expected loss errP [f ] = EP [`f ] defined in (1) with its sample estimate err
c S [f ] =
bS [`f ] defined in (3). But how good exactly is this estimate? This is the quesE
tion we examine in the current section. It is also the subject matter of Empirical
Risk Minimization in general.
We expect the discrepancy between the population expectation EP [h] of a
bS [h] to depend on the class of function
function h and its empirical estimate E
H from which we pick h. Intuition suggests that if the set F is too flexible
then there are high chances that our empirical estimates could be way off the
population expectation. There are several ways to make such hand waving
statements rigorous but they all rely on some measure of complexity of a set
H of functions. We restrict in this paper to the Rademacher complexity for its
intuitive character and because its one of the more recent concepts.
3.1
Rademacher Complexity
To introduce this concept consider a class H of real valued function h defined on
an arbitrary space Z and let S = {z1 , · · · , zn } be a set of examples zi drawn independently from a distribution P over Z. Our aim is to measure how well functions in H are able to match any prescribed binary sequence σ = {σ1 , . . . , σn }
when they are evaluated on samples S drawn from P . How well a single function h fits thePprescribed sequence σ on the sample S can be defined as the
n
correlation n1 i=1 σi h(zi ) between σ and the values h(S) ≡ (h(z1 ), ..., h(zn )).
It equals 1 for a perfect fit between h(S) and σ. How well the class of functions
H as a whole can fit a specific sequence σ on the sample S can naturally be
defined as the highest correlation we can achieve using functions h ∈ H
!
n
1X
sup
σi h(zi ) .
(9)
n i=1
h∈H
A measure of how well functions in H can fit any sequence σ can be defined
as the expectation Eσ of (9) over sequences σ (sampled uniformly). This is by
7
definition the empirical Rademacher complexity of the class of functions H on
the sample S
"
!#
n
X
1
d n (H) ≡ Eσ sup
Rad
σi h(zi )
.
(10)
n i=1
h∈H
Finally, the Rademacher complexity of the class H is defined as the expectation
of (10) over samples S of size n drawn from P
d n (H)].
Radn (H) ≡ EP [Rad
(11)
If we assume that functions h ∈ H are binary classifiers, which means h(z) ∈
d n (H) ≤ 1. When Rad
d n (H) is close
{−1, +1}, we see that (9) implies 0 < Rad
to its upper bound 1 the binary classification model defined by H can literally
“store” any binary assignment σ to the examples in S.
3.2
Bounding Population Expectations
The Rademacher complexity is the key ingredient for bounding a population
bS [h]. Assume we draw samples
expectation EP [h] with an empirical average E
S = {z1 , . . . , zn } of size n from a distribution P and that the functions h we
are interested in belong to a class H. Chose a small positive number 0 < δ < 1.
Then the following bound holds with a probability larger than 1 − δ for any
h ∈ H, see [7]
r
bS [h] + 2 Rad
d n (F) + 3 ln(2/δ) .
(12)
EP [h] ≤ E
n
The second term on the right hand side substantiates our intuition that the
discrepancy between the population expectation EP [h] and the empirical exbS [h] can grow when the set of functions H becomes more and more
pectation E
flexible. The last term is a price we pay for requiring small chances to be wrong,
fortunately it grows only logarithmicamlly as δ → 0.
3.3
Application to Binary Classification Errors
Let us apply (12) to a binary classification problem. In this case the set Z is
simply the set Rp × {−1, +1} of observations z = (x, σ). As errP [f ] = EP [`f ]
and err
c S [f ] = ES [`f ] the functions whose expectations we want to bound are
the errors function `f associated with binary classifiers f : Rp → {−1, +1}.
Therefore here H = {`f |f ∈ F } is the class of loss functions. We select the
miss-classification rate `f (x, σ) = If (x)6=σ as our loss function. Using If (x)6=σ =
[1 − σf (x)]/2 and the (almost) obvious property, see [7]
d n (aF + b) = |a| Rad
d n (F)
Rad
d n (H) = 1 Rad
d n (F). Using (12) we can thus express our basic inwe get Rad
2
equality directly in terms of the complexity of the hypothesis class F
r
ln(2/δ)
d
errP [f ] ≤ err
c S [f ] + Radn (F) + 3
(13)
n
with probability > 1 − η.
8
Inequality (13) is the basic prerequisite for interpreting the
challenging results in paper [1]
Remark 1: It is important to realize that inequality (13) holds, of course, uniformy for any f ∈ F. In particular f need not be a minimizer of the expected
loss which was our main concern in section 2.
Remark 2: Inequality (13) assumes that f is selected from a fixed class F
b
whereas in the previous section we empirically estimated an optimal rigidity λ
using a train set S and test set T . Although it is very tempting (and morally
right!) to substitute Fλb for F in (13) strictly speaking this is not correct.
d n (F) as a funcFor parametric models the next step would be to bound Rad
tion of the sample size n and the number k of parameters (w1 , . . . , wk ) defining
fw ∈ F. To our knowledge there are no explicit bounds of this kind. There
exists however an interesting bound for binary classification models which exd n (F) as n → ∞ for a fixed class F. It
emplifies the asymptotic behavior of Rad
involves an alternative notion of complexity namely the VC dimension d of F
defined as follows: it is the size of the largest set S = {x1 , . . . , xd } such that
for any binary sequence σ = (σ1 , . . . , σd ) we can find an f ∈ F that takes these
values on S. The bound reads
r
2d ln n
d
,
(14)
Radn (F) ≤
n
which vanishes when the sample size n grows larger which should come as no
surprise.
4
Regularization for Deep Neural Networks
Now asymptotic behavior is of interest for mathematicians but data scientist
are truly interested in finite samples! Here we can only speculate about the
d n (F) as a function of the size n of the sample and the number k of
value of Rad
parameters. Or we can make experiments. In the context of Deep Learning the
case of particular interest is n k. Recall the following:
Classical interpretation of regularization: Regularization is an explicit
or an implicit constraints on predictors f that shrinks the Rademacher complexity of a neural network model F towards zero so that inequality (13) nearly
saturates.
The most common such mechanisms in Deep Learning are, see [3, 4]
• L2 penalty on weights was shortly discussed in 2.3
• Dropout consists in randomly dropping some links of the neural network
during training thus preventing the model to adapt to closely to the train
data.
• Early stopping consists in monitoring the prediction error on a validation
set while performing gradient descent and stopping it when the validation
error start to increase. Conceptually it is close to the Lp penalty [3].
9
• Data augmentation is used in image recognition problems. The original
data set is augmented with artificial images obtained by distorting (the
size, the orientation, the hue of) the original images. It thus acts to
d n (F) as (14) illustrates.
increase n without changing F, thus reducing Rad
• Implicit regularization effectively shrinks the class of F as a consequence of the dynamics of how the algorithm explores F when optimizing
the network parameters w. Why this happens is more mysterious than
for the previous techniques.
The numerical experiments described in [1] involve large neural networks with
a number of parameters p > 1 000 000 such as AlexNet and deep Multilayer Perceptrons. The data sets S = {(x1 , y1 ), . . . , (xn , yn )} that where used are image
data sets such as CIFAR-10 which contains n = 60 000 images categorized in 10
classes. The authors also trained the models on pure noise images.
They then created artificial data sets S σ = {(x1 , σ1 , . . . , (xn , σn )} in which
the labels σi where generated randomly. They noticed the surprising fact that
for these large networks, even without any explicit regularization mechanism
switched on, the train error err
c S σ [hS σ ] was close to zero (< 0.18%) for any binary assignment σ and even for images made of random pixels. Assuming this
multi-class problem is cast into series of equivalent binary classification problems this strongly suggests:
d n (F) of these large models is very close to 1. In
Fact 1: The complexity Rad
other words these large networks are able to “learn” or “store” these artificial
data sets almost perfectly. But remember:
Fact 2: Deep Learning models are known to generalize very well in practice.
This is the reason why people use them! In other words minimizers of the sample error err
c S [.] are also verified to usefully approximate minimizers of the true
population error errP [.].
Conclusion: Considering the basic bound (13), one way to reconcile fact 1
and fact 2 is simply to give up the classical interpretation of regularization that
d n (F) towards zero. Anpretends its role is to shrink the model complexity Rad
other possibility is that we need more refined bounds than (13). Remember that
this inequality assumed strictly nothing about the distribution P from which
samples S are drawn. It should be no surprise then that these kind of bounds
are way too rough. They really don’t take into account at all what makes the
specificity of deep neural networks! The whole point of using techniques such as
deep learning is that the models F they define are somehow well adapted to the
actual samples S that nature produces. What is a stake is better understanding
of the subtle interplay between the dynamics of the learning process of a multilayered network, which defines an effective F, and the nature of the physical
processes P that generate physical samples S on which they are trained. But
for the moment deep neural networks keep their mystery.
10
Acknowledgments
I would like thank my colleagues Olivier Reisse, the founder of Weave Business
Technology entity, and Christophe Vallet who is leading the Weave Data entity
for their consistent support for all activities at the Weave data lab where I work.
I would also like to thank Marc-Antoine Giuliani who is an expert in statistical
learning theory and data scientist at the Weave data lab for pointing our the
many intricacies of his field to a somewhat carefree physicist like me.
References
[1] Chiyuan Zhang, Samy Bengio, Moritz Hardt, Benjamin Recht, Oriol Vinyals,
Understanding Deep Learning Requires Rethinking Generalization, ICLR
2017, arxiv.org/abs/1611.03530v2.
[2] Chiyuan Zhang, Samy Bengio, Moritz Hardt, Benjamin Recht, Oriol
Vinyals, Understanding Deep Learning Requires Rethinking Generalization, OpenReview.net, https://openreview.net/forum?id=Sy8gdB9xx&
noteId=Sy8gdB9xx.
[3] Christopher M. Bishop, Pattern Recognition And Machine Learning,
Springer-Verlag New York Inc, second edition, 2011.
[4] Ian Goodfellow, Yoshua Bengio and Aaron Courville, Deep Learning, MIT
Press, 2016, http://www.deeplearningbook.org.
[5] Nikolas Markou, The Black Magic of Deep Learning - Tips and Tricks for
the practitioner, EnVision blog, http://nmarkou.blogspot.fr/2017/02/
the-black-magic-of-deep-learning-tips.html.
[6] Henry W. Lin (Harvard), Max Tegmark (MIT), Why does deep and cheap
learning work so well? https://arxiv.org/abs/1608.08225v2.
[7] Maria-Florina Balcan, Rademacher Complexity, Lecture Notes in Machine Learning Theory CS 8803 - Georgia Tech, http://www.cs.cmu.edu/
~ninamf/ML11/lect1117.pdf
11
| 10math.ST
|
Scheduling Wireless Ad Hoc Networks in
Polynomial Time Using Claw-free Conflict
Graphs
arXiv:1711.01620v1 [cs.IT] 5 Nov 2017
Alper Köse∗† , Muriel Médard∗
∗ Research Laboratory of Electronics, Massachusetts Institute of Technology,
77 Massachusetts Avenue, Cambridge, MA 02139, USA
† Department of Electrical Engineering, École Polytechnique Fédérale de Lausanne
Route Cantonale, 1015 Lausanne, Switzerland
{akose, medard}@mit.edu
Abstract—In this paper, we address the scheduling
problem in wireless ad hoc networks by exploiting the
computational advantage that comes when such scheduling
problems can be represented by claw-free conflict graphs.
It is possible to formulate a scheduling problem of network
coded flows as finding maximum weighted independent
set (MWIS) in the conflict graph of the network. We
consider activation of hyperedges in a hypergraph to model
a wireless broadcast medium. We show that the conflict
graph of certain wireless ad hoc networks are claw-free.
It is known that finding MWIS of a general graph is NPhard, but in a claw-free conflict graph, it is possible to
apply Minty’s or Faenza et al.’s algorithms in polynomial
time. We discuss our approach on some sample networks.
Keywords—Wireless ad hoc networks; Claw-free graph;
Conflict graph; Independent Set
I.
I NTRODUCTION
The problem of scheduling in wireless ad hoc networks is generally computationally expensive. In [1],
Arikan proves that scheduling is NP-complete in general
packet radio networks when both primary and secondary interference are considered. In spread spectrum
networks, complexity reduces as shown in [2], where
link-based scheduling can be done in polynomial time
when each node can converse with at most one other
node at a time. We schedule subsets of hyperedges in
the hypergraph model of the network instead of doing
classical link-based scheduling due to inability of linkbased scheduling to capture the character of network
coded flows. In [3], authors prove the NP-completeness
of scheduling broadcasts without tolerance of secondary
conflicts. Another perspective for evaluation of interference is K-hop interference models in which no two links
within K hops can successfully transmit simultaneously.
It is proved in [4] and [5] that link scheduling can be
completed in polynomial time when K = 1, otherwise
it is NP-hard. In [6], scheduling of network coded flows
with conflict graphs is considered, but without exploiting
any graph characteristic. The model we illustrate is
∗ This
work has been presented at the 2017 IEEE PIMRC.
closely related to [6]. Novelty of this paper comes
from the fact that polynomial time scheduling property
of wireless networks having claw-free conflict graphs
is not investigated, and we contribute to literature by
introducing some families of networks which can be
scheduled in polynomial time.
In a conflict graph of a network, each node symbolizes a valid transmission and an edge between two
nodes represents that these two transmissions cannot
be scheduled simultaneously, owing to interference constraints which can differ based on the assumptions on
the network. The rate region of the network with random
linear network coding is determined by three different
constraints on capacity, flow and scheduling as in [6].
Among these constraints, the determinant for optimization complexity is the scheduling constraint. Therefore,
in this work, we concentrate on the scheduling constraint
rather than the others. The scheduling problem can be
formulated as finding maximum weighted independent
set (MWIS) in the conflict graph where independent
set is defined as follows. Given an undirected graph
G = (V, E), a subset of vertices S ⊆ V is an independent set if {i, j} ∈
/ E is satisfied for all i and j
in S. There are several examples for independent set
formulation including the scheduling for routed traffic
[7] and network code construction in a wireline setup
[8]. Finding MWIS dominates the complexity of the
rate maximization problem in the rate region. MWIS
problem is NP-hard for general graphs, therefore this
makes scheduling NP-hard in general networks. On other
hand, it is known that MWIS problem is solvable in
polynomial time in claw-free graphs [9], [10], [11]. A
graph G = (V, E) is claw-free if none of its vertices V
has three pairwise nonadjacent neighbours [12].
The remainder of the paper is organized as follows.
We detail on the conflict graph construction and present
different scenarios, which are on line and tree networks
for which the conflict graphs are claw-free, in Section II.
As a next step, we explain the rate region constraints and
discuss some results in a butterfly network in Section III.
Finally, we conclude the paper in Section IV.
II.
N ETWORK M ODEL AND C ONFLICT G RAPH
E
Throughout the scenarios, we use the Protocol model
[13] and K-hop interference model [4] with small variations to represent networks instead of the Physical model
[13], which takes SIN R levels into account.
r
A. Scenario I
r
B
r
A
C
r
D
r
r
F
G
We consider a wireless ad hoc network with n nodes.
We have a set of assumptions for the network:
A1.1) A node cannot receive from multiple nodes at Fig. 1: A wireless network example with the weights r
the same time and a node cannot receive if it is in the which show the Euclidean distance between nodes.
interference range of another transmitting node.
A1.2) Time division duplex transceivers are used in
network.
(E, B)
A1.3) The Protocol model [13] is used to decide interference relationships between transmissions. Suppose node
A is transmitting to node B where node C is simultaneously making a transmission to another node. Then,
the transmission between A and B will be successful if
(A, B)
and only if inequalities (1) and (2) are satisfied:
|A − B| ≤ rT
|B − C| ≥ (1 + ∆)|A − B|
(1)
(F, C)
(G, D)
Fig. 2: An induced subgraph of the conflict graph of the
(2) network in Fig. 1.
where rT is the maximum transmission range of
nodes and ∆ > 0 is the guard zone which can be
chosen arbitrarily small for simplicity without loss of
generality. Inequality (1) means that every node employs
a common range of transmission rT , and (2) says that
in a communication pair, among all transmitting nodes,
the receiver of this pair must be closest to its transmitter
with a guard zone ∆.
Without making additional assumptions, the conflict
graph of a network is not guaranteed to be claw-free.
Construction 1 (Construction of Conflict Graph):
Reference [6] shows the construction of conflict graph
G = (V, E) in a wireless network. Here, we use a similar
strategy. It consists of the steps below:
C1.1) We can denote transmission v as (i, J) where i
is the source and J as the set of receivers and N (i)
as the set of nodes that are in the transmission range
of node i. The condition for a transmission being valid
is given by J ⊂ N (i), which means that the set of
receiver nodes must be in the transmission range of the
transmitter node. A valid transmission v is modeled as
a vertex, v ∈ V.
C1.2) Say v1 , v2 ∈ V, then {v1 , v2 } ∈ E if v1 and v2
cannot be scheduled simultaneously.
Let v1 , v2 ∈ V be in the conflict graph.{v1, v2 } ∈ E if
any of the below conditions hold:
C1.2.1) i1 = i2 ;
C1.2.2) (i1 ∈ J2 )||(i2 ∈ J1 );
C1.2.3) J1 ∩ J2 6= ∅;
C1.2.4) |i2 − j| ≤ (1 + ∆)|i1 − j| for ∃j ∈ J1 ;
C1.2.5) |i1 − j| ≤ (1 + ∆)|i2 − j| for ∃j ∈ J2 .
Example 1: Consider the topology given in Fig.
1. Assume a transmission range rT and an Euclidean
distance r where rT ≥ r . In this case, when A is a transmitting, for instance to B, then there will be interference
to (E, B), (F, C), (G, D) due to the Protocol model [13]
and hence transmission node (A,B) shares edges with
these three possible transmissions in the conflict graph.
On the other hand, suppose ∠BAC, ∠CAD, ∠DAB =
120◦ , then there will not be any interference between any
pairs of (E, B), (F, C), (G, D) because these transmissions satisfy constraint (2) as well as (1). Consequently,
this will lead to a claw in the conflict graph which can
be seen in Fig. 2.
Example 2: A possible arrangement of wireless
nodes to have a claw-free conflict graph is shown in
Fig. 3. Source and sink can be thought as the nodes A
and E, respectively. Let the maximum possible transmission distance be rT and ∆ be very small. Then,
we can model the conflict graph of this network as
seen in Fig. 4. The independent set polytope is the
convex hull of the incidence vectors of the five independent sets {(A, B), (D, E)}, (A, C), {(B, C), (D, E)},
(C, D) and (A, {B, C}).
We can generalize Example 2 by realizing that
the conflict graphs of the line networks are claw-free
provided that there is enough distance between nodes
to make 3 node away transmission impossible. We
should physically satisfy rT < |µi − µi+3 | for all
i ∈ {1, 2, ..., n − 3} where µi is the ith node in the
A
2rT /3
B
rT /3
C
rT
D
rT
E
Fig. 3: A possible physical arrangement of the wireless
network which leads to a claw-free conflict graph for
Scenario I.
(A, B)
B
C
D
E
F
Fig. 6: Illustration for proof of Theorem 1.
v1
v2
...
vn−2
vn−1
Fig. 7: Conflict graph of a line network where only
possible transmission for a node i is vi = (i, i + 1).
(A, C)
(C, D)
A
(D, E)
(A, {B, C})
(B, C)
Fig. 4: Conflict graph of the network seen in Fig. 3.
network. This inequality can be easily satisfied by many
different positioning scenarios, so, for simplicity, we
can use a hypergraph H = (N , A) to represent our
model, where N denotes the nodes and A denotes the
hyperedges to symbolize valid transmissions between
wireless nodes. Hypergraph of a line network, which
has claw-free conflict graph, changes depending on the
number of nodes to which a node i can transmit, which
can be 1 or 2 for every i ∈ {1, 2, ..., n − 2} and 1
for i ∈ {n − 1}. We have 2n−2 different possible
hypergraphs of a line network, with n nodes, all of
which lead to claw-free conflict graphs. For instance,
hypergraph of the network in Fig. 3 can be seen in Fig.
5. Here, first node is able to transmit up to next two
neighbours whereas the other nodes are only able to
transmit to next node. Transmissions (A, B) and (C, D)
are not simultaneously possible, because we use the
Protocol model [13] to decide interference relations.
Receiver B is closer to C, a transmitter of another
transmission, than to A and this violates the constraint
(2). Directed antennas, which we do not assume in our
scenario, could be used to avoid the interference.
To have a claw in the conflict graph, a transmission
v1 should have conflicts with three other transmissions
v2 , v3 , v4 whereas those three should not have any
conflicts between them. Let us use Fig. 6 for ease of
understanding. Since transmissions are from µ1 to µn ,
from source to sink, assume that a node only transmits
to nodes that are located closer to sink in terms of hop
distance. To this end, assume v1 as the central node
of a possible claw, v1 = (C, D). Then, we can have
one interfering transmission from the source side of C,
say v2 = (A, B), and one from the sink side of D,
v3 = (E, F ) not to have interference between v2 and
v3 . B and E are chosen to be as far as possible. In such
situation, transmitting nodes C and E cause interference
on receiving nodes B and D, respectively. Now, we
have to place the transmitter and the receiver of the
last transmission. This one has to interfere with (C, D)
without interfering with (A, B) and (E, F ) to induce a
claw in the conflict graph of the network. If we place
the transmitter on the source side of C, this leads to
an interference with (A, B) which will break the claw,
so this option is not possible. Also, we cannot place
the receiver in the sink side of D since this leads to
an interference with (E, F ) which will again break the
claw. Therefore, since the receiver must be on the sink
side relative to the transmitter, the only remaining option
is to place both the transmitter and the receiver between
C and D. However, this option makes C able to transmit
to 3 different nodes where we assume each node is able
to transmit to at most 2 nodes.
Let us consider a line network to see the effect of
increasing number of nodes on end-to-end throughput,
first when all transmissions are orthogonal and second
when MWIS scheduling policy is used. To be very
simple, suppose we have a line network with n nodes
and each node can only transmit to next node where node
Proof: Let us prove this theorem by contradiction. µ1 is the source and node µn is the sink. Suppose n is
odd. Also, assume that the transmission (i, i + 1) does
not lead to an interference with (i + 2, i + 3). We name
the transmission (i, i+1) as vi . Under these assumptions,
B
our conflict graph is shown in Fig. 7. So we have two
different maximum independent sets, where weights are
A
C
D
E
assumed equal, which are S1 = {v1 , v3 , ..., vn−2 } and
S2 = {v2 , v4 , ..., vn−1 }. Consider the situation where
transmissions do not have any errors or loss. Since we
Fig. 5: Hypergraph of the network seen in Fig. 3.
only need 2 time slots to combine S1 and S2 to complete
Theorem 1: Under the assumptions A1.1-3 and
Construction 1, the conflict graph of a line network
where a node is able to transmit to at most 2 nodes
and all nodes convey information in the direction from
µ1 to µn is guaranteed to be claw-free.
end-to-end transmissions, we conclude that end-to-end
F
throughput is 1/2 bits/sec if we assume one time slot
D
has a duration of 1 second and the link capacity between
B
G
nodes is 1 bit/sec. The throughput does not depend
A
E
on n. However, if we assume all transmissions to be
orthogonal, we can say that throughput will decrease
C
linearly with the number of nodes in the network as it
equals 1/(n − 1) bits/sec per frequency use. As seen,
we have 0.5(n − 1) gain on throughput by using MWIS Fig. 8: An example of a tree network which has clawapproach. Using network coding does not provide any free conflict graph for Scenario II.
advantage in the end-to-end throughput of this system.
B. Scenario II
We can have other network topologies that induce
a claw-free conflict graph. One of them is a tree representation of the network, but since it is harder to get
claw-freeness with the same assumptions for the line
topology model, we propose new set of assumptions:
A2.1) A node cannot receive from multiple nodes at the
same time.
A2.2) Time division duplex transceivers are used in
network.
A2.3) Nodes are arranged as a tree topology.
A2.4) We directly work on hypergraph model without
any consideration on physical locations of nodes and
assume an interference model based on hops instead of
the Protocol model [13].
A2.5) Transmissions are in the direction from root node
to leaves of tree.
A2.6) Directed antennas are used, so interference can
only occur in the forward direction along the tree.
A2.7) A transmitting node does not lead to any interference to the receivers which are 3-hops or more away
from it.
A2.8) Only one node in every level can have children.
(A, B)
(B, D)
(D, F )
(A, C)
(B, E)
(D, G)
(A, {B, C})
(B, {D, E})
(D, {F, G})
Fig. 9: Conflict graph of the network seen in Fig. 8.
ik ’s parent. Since only one of these transmissions can
be scheduled in one time slot, they induce a complete
subgraph in the conflict graph. Therefore, we can only
choose one transmission, say v2 , from level k − 1 to k
which has interference with v1 because the cardinality
of maximum independent set of the complete graph is
1. Assuming that we have the node ik+1 , which belongs
to level k + 1 and has children, in the receiver set of the
transmission v1 (otherwise, it is easier to say that we will
not have a claw.), we have another complete subgraph
which contains the transmissions from the node ik+1 to
its children in level k + 2. One of these transmissions
can be selected for a possible claw, say v3 . Since, it is
not possible to find another independent transmission v4 ,
we have a claw-free conflict graph for the network.
Construction 2 (Construction of Conflict Graph):
In the construction of conflict graph, we implement the
steps below:
C2.1) Model valid transmissions as the vertices V of
conflict graph G = (V, E) as in C1.1.
C2.2) Say v1 , v2 ∈ V, then {v1 , v2 } ∈ E if v1 and v2
cannot be scheduled simultaneously.
Let v1 , v2 ∈ V be in the conflict graph.{v1, v2 } ∈ E if
any of the below conditions hold:
C2.2.1) i1 = i2 ;
An example of a tree network which has a claw-free
C2.2.2) (i1 ∈ J2 )||(i2 ∈ J1 );
conflict
graph and its conflict graph can be seen in Fig.
C2.2.3) J1 ∩ J2 6= ∅;
8
and
Fig.
9, respectively.
C2.2.4) (i1 is a child of i2 ) || (i2 is a child of i1 ).
Theorem 2: Under the assumptions A2.1-8 and C. Scenario III
Construction 2, conflict graph of a wireless network is
In this scenario, transmission and interference
guaranteed to be claw-free.
schemes are less restricted, since we only allow for
Proof: Let us assume that the root node belongs to full-duplex transceivers and do not allow for 2-hop
level 1 and a node, which has a distance k to root in interference, compared to Scenario II, but the network
terms of hyperedge number, belongs to level k +1. Now, topology is relaxed by letting every node have children.
consider the transmission v1 , from a node ik in level k Assumptions are below:
to its children that reside in level k +1. We have 2Nk −1 A3.1) A node cannot receive from multiple nodes at the
different interfering transmissions to v1 which are from same time.
level k − 1 to k where Nk is the number of children of A3.2) Full duplex transceivers are used in network.
A3.3) Nodes are arranged as a tree topology.
F
A3.4) We directly work on hypergraph model without
D
any consideration on physical locations of nodes and
G
assume an interference model based on hops instead of
B
the Protocol model [13].
A3.5) Transmissions are in the direction from root node
A
H
to leaves of tree.
C
E
A3.6) Directed antennas are used, so interference can
I
only occur in the forward direction along the tree.
A3.7) A transmitting node does not lead to any interference to the receivers which are 2-hops or more away Fig. 10: An example of a tree network which has a clawfrom it.
free conflict graph for Scenario III but not for Scenario
Construction 3 (Construction of Conflict Graph): II.
In the construction of conflict graph, we implement the
steps below:
C3.1) Model valid transmissions as the vertices V of
conflict graph G = (V, E) as in C1.1.
C3.2) Say v1 , v2 ∈ V, then {v1 , v2 } ∈ E if v1 and v2
cannot be scheduled simultaneously.
Let v1 , v2 ∈ V be in the conflict graph.{v1, v2 } ∈ E if
any of the below conditions hold:
C3.2.1) i1 = i2 ;
C3.2.2) J1 ∩ J2 6= ∅;
Theorem 3: Under the assumptions A3.1-7 and
Construction 3, conflict graph of a wireless network is
guaranteed to be claw-free.
Proof: Let us again assume that the root node
belongs to level 1 and a node, which has a distance k
to root in terms of hyperedge number, belongs to level
k + 1. In these settings, we eliminate the possibility
of having interference between any transmissions from
different levels. Let us denote a transmission from a node
in level k to a node in level k + 1 as k → k + 1. Any
transmission k → k+1 interferes neither with k−1 → k
nor with k + 1 → k + 2 because we use full-duplex
transceivers which makes a node eligible to transmit
and receive at the same time. Therefore, we only have
interference between the transmissions which initiate
from the same node. A node with j children has 2j − 1
possible transmissions where each pair has interference
between them which then leads to a complete graph with
2j − 1 nodes in the conflict graph. Assume we have m
non-leaf tree nodes, then we have m disjoint complete
subgraphs in the overall conflict graph which implies
that the conflict graph is claw-free.
An example of a tree network which has a claw-free
conflict graph and its conflict graph can be seen in Fig.
10 and Fig. 11, respectively.
(A, B)
(B, D)
(D, F )
(E, H)
(A, C)
(B, E)
(D, G)
(E, I)
(A, {B, C})
(B, {D, E})
(D, {F, G})
(E, {H, I})
Fig. 11: Conflict graph of the network seen in Fig. 10.
T ∈ N where all sinks T ∈ N demand the same
information and network coding is used. We can extend
it to multiple connections using intra-session coding.
When we use i to denote a wireless node, N (i) denotes
the set of nodes to which node i can transmit, namely
there is a hyperedge from i to set N (i). Recall that
MWIS problem dominates the complexity of the rate
maximization problem in the rate region. In this section,
we review the three constraints of the rate region to
highlight the importance of the scheduling problem that
we address by revisiting [6] and [14] and give the
formulation of MWIS problem for the conflict graph.
Firstly, we have capacity constraints given in (3).
X
(t)
xij ≤
j∈K
X
zij
(3)
j⊂N (i)
∀i ∈ N , K ⊂ N (i), t ∈ T .
(t)
In constraint (3), xij shows the flow rate of data
packets from node i to node j in the way of sink t. ziJ
III. R ATE R EGION
is the average packet injection rate to the output set J of
hyperedge
(i, J) and ziJ is guaranteed to exist and be
A. Rate Region Constraints
finite if the injection process is assumed to be stationary
To find the rate region, we assume that we have a and ergodic.
hypergraph H = (N , A) model of the network as in
Second, we have flow constraints given in (4) and
Fig. 8 where N symbolizes the nodes and A symbolizes
the hyperedges. We consider the multicast connection (5).
with rate R, we have a source s ∈ N and sinks
network has claw-free conflict graph. There are 12 valid
transmissions, 3 for each node being source except E
if i = s
R,
X
X (t)
and F . Therefore, possible transmissions from a node
(t)
xji = −R, if i = t
xij −
(4) lead to a complete subgraph of 3 nodes. To have a claw,
{j|i∈N (j)}
j∈N (i)
0,
otherwise
a transmission (i1 , J1 ) should have three conflicts, each
with a different source ia 6= ib for a, b ∈ {1, 2, 3, 4}
where these three should not have any conflicts between
∀i ∈ N , t ∈ T .
them. However, this is not possible in the given butterfly
network which lead to a claw-free conflict graph. So,
(t)
(5) the scheduling can be completed in polynomial time.
xij ≥ 0
Complement of the conflict graph can be seen in Fig.
∀i ∈ N , j ∈ N (i), t ∈ T .
13 for a more clear illustration.
Constraint (4) should be satisfied to guarantee a flow
Assume all transmissions are done without any errors
of rate R from the source to sinks and it is trivial that or loss from source to sinks and every link has a unit
flow rates cannot be negative as seen in (5).
capacity, say 1 bit/sec. We have 2 bits to send in the
multicast
connection. We consider four different conLastly, we have the scheduling constraint given in
ditions where the constraints (3)-(6) from the previous
(6).
subsection only apply to MWIS approach with network
coding:
z ∈ PIN D (G).
(6) 1) All transmissions are orthogonal without network
coding.
In (6), vector z = (ziJ ) is called network coding 2) All transmissions are orthogonal with network coding.
subgraph where (i, J) ∈ A. PIN D (G) denotes the 3) MWIS approach without network coding.
independent set polytope of G = (V, E), which is the 4) MWIS approach with network coding.
conflict graph of the considered network. In overall, the
In the fully orthogonal model [14], all transmission
network coding subgraph should lie in the independent
signals are orthogonal, making the network interferenceset polytope of the conflict graph.
free but this leads to a suboptimal bandwith usage.
The maximum weighted independent set problem We maximize bandwith efficiency by frequency reuse
of a weighted undirected graph G = (V, w, E) with n whenever possible. We could also consider the two-hop
vertices where w : V(G) → R can be formulated as constraints model [6] in which if a node i transmits,
none of the nodes in two-hop neighbourhood of i can
below:
P
transmit, but it adds up to the same thing with orthogonal
Maximize i∈V wi vi
model in this butterfly network. In 1-3, our conflict graph
construction, Construction 1, does not represent the
Subject to vi + vj ≤ 1 {i, j} ∈ E
conditions correctly owing to some additional constraints
where vi ∈ {0, 1} for 1 ≤ i ≤ n.
that show up. For instance, when we adopt orthogonal
We maximize R subject to (3)-(6). Scheduling con- model, conflict graph becomes a complete graph where
straint (6) can be formulated as MWIS problem, and we can choose only one transmission for a time slot
it is known to be NP-hard for general graphs to solve due to our bandwith limited regime. Our conflict graph
which makes our optimization problem NP-hard. How- formulation can only be used for MWIS approach with
ever, there are algorithms proposed for solving MWIS network coding. Throughput analysis can be seen below:
problem in claw-free graphs in polynomial time. For 1) We can achieve an end-to-end throughput of 1/3
instance, Minty’s [9], [10] algorithm can be used for bits/sec per frequency use.
solvability in O(n6 ) or Faenza et al.’s [11] algorithm 2) We can achieve an end-to-end throughput of 2/5
can be used for further improvement to O(n3 ). Since we bits/sec per frequency use which is better than the first
are able to find MWIS of the claw-free conflict graph in approach.
polynomial time, it is possible to solve the joint subgraph 3) We are now scheduling {(A, B), (C, {D, F })},
optimization and scheduling problem, i.e. maximizing R {(A, C), (B, {D, E})}, (D, E) and (D, F ) in four
time slots, thus have an end-to-end throughput of 1/2
subject to (3)-(6), in polynomial time [15].
bits/sec which is better than second approach.
4) We first set the conflict graph as seen in Fig. 13,
B. Illustration
then find the maximum weighted independent sets, and
Networks having claw-free conflict graphs are not finally use convex combination of them for scheduling.
limited with the discussed ones in Section II. Let us We have {(A, B), (C, {D, F })}, {(A, C), (B, {D, E})}
consider a butterfly network as seen in Fig. 12 with and (D, {E, F }) which we can combine in three time
the assumptions A1.1-3 which lead to Construction 1 slots. End-to-end throughput is 2/3 bits/sec which is
where r ≤ rT , |AD| > rT and ∆ is negligible. A the highest among four conditions.
is the source node where E and F are the sinks of
a multicast connection. First, we show that butterfly
r
C
r
A
r
r
r
D
r
B
[2]
F
r
[3]
r
[4]
E
Fig. 12: A butterfly network with the weights r which
show the Euclidean distance between nodes.
(A, C)
(C, D)
(C, F )
(C, {D, F })
(D, F )
(A, {B, C})
[5]
[6]
(D, {E, F })
[7]
(A, B)
(B, D)
(B, E)
(B, {D, E})
(D, E)
[8]
Fig. 13: Complement of the conflict graph of the network
seen in Fig. 12.
[9]
IV.
C ONCLUSION
We have investigated wireless ad hoc networks which
have claw-free conflict graphs. To this end, we used
conflict graph to model possible valid transmissions
and their interference relations in the network, then
we exploited the claw-freeness of the conflict graph of
certain networks and MWIS algorithm for graphs to
do the scheduling in polynomial time. We believe that
this paper can be used as a guide to set up wireless
networks which allow jointly solving the network coding
subgraph and the scheduling problem in polynomial
time. However, most of the real life networks do not have
claw-free conflict graphs and our approach can only be
applied to limited number of networks.
For future work, we work on a strategy which
breaks all of the claws in a conflict graph by iteratively
introducing edges. We believe this new strategy will
allow us to do polynomial time scheduling for more
general networks with a very small throughput loss.
Besides this new strategy, the Physical model [13] can
be considered to form the conflict graph of networks
which may complicate scenarios but give a more detailed
view at the same time. Lastly, a superset of clawfree graphs in which MWIS problem can be solved in
polynomial time can be searched to extend throughput
optimal polynomial time scheduling to more general
networks.
R EFERENCES
[1]
E. Arikan, “Some complexity results about packet radio networks (corresp.),” IEEE Transactions on Information Theory,
vol. 30, no. 4, pp. 681–685, 1984.
[10]
[11]
[12]
[13]
[14]
[15]
B. Hajek and G. Sasaki, “Link scheduling in polynomial time,”
IEEE transactions on Information Theory, vol. 34, no. 5, pp.
910–917, 1988.
A. Ephremides and T. V. Truong, “Scheduling broadcasts in
multihop radio networks,” IEEE Transactions on communications, vol. 38, no. 4, pp. 456–460, 1990.
G. Sharma, R. R. Mazumdar, and N. B. Shroff, “On the complexity of scheduling in wireless networks,” in Proceedings of
the 12th annual international conference on Mobile computing
and networking. ACM, 2006, pp. 227–238.
G. Sharma, N. B. Shroff, and R. R. Mazumdar, “Maximum
weighted matching with interference constraints,” in Pervasive
Computing and Communications Workshops, 2006. PerCom
Workshops 2006. Fourth Annual IEEE International Conference
on. IEEE, 2006, pp. 5–pp.
D. Traskov, M. Heindlmaier, M. Médard, and R. Koetter,
“Scheduling for network-coded multicast,” IEEE/ACM Transactions on Networking (TON), vol. 20, no. 5, pp. 1479–1488,
2012.
L. Tassiulas and A. Ephremides, “Stability properties of constrained queueing systems and scheduling policies for maximum
throughput in multihop radio networks,” IEEE transactions on
automatic control, vol. 37, no. 12, pp. 1936–1948, 1992.
J. K. Sundararajan, M. Médard, R. Koetter, and E. Erez, “A
systematic approach to network coding problems using conflict
graphs,” in Proceedings of the UCSD Workshop on Information
Theory and its Applications, 2006.
G. J. Minty, “On maximal independent sets of vertices in clawfree graphs,” Journal of Combinatorial Theory, Series B, vol. 28,
no. 3, pp. 284–304, 1980.
D. Nakamura and A. Tamura, “A revision of minty’s algorithm
for finding a maximum weight stable set of a claw-free graph,”
Journal of the Operations Research Society of Japan, vol. 44,
no. 2, pp. 194–204, 2001.
Y. Faenza, G. Oriolo, and G. Stauffer, “Solving the weighted
stable set problem in claw-free graphs via decomposition,”
Journal of the ACM (JACM), vol. 61, no. 4, p. 20, 2014.
M. Chudnovsky and P. D. Seymour, “The structure of claw-free
graphs.” Surveys in combinatorics, vol. 327, pp. 153–171, 2005.
P. Gupta and P. R. Kumar, “The capacity of wireless networks,”
IEEE Transactions on information theory, vol. 46, no. 2, pp.
388–404, 2000.
D. S. Lun, N. Ratnakar, M. Médard, R. Koetter, D. R. Karger,
T. Ho, E. Ahmed, and F. Zhao, “Minimum-cost multicast over
coded packet networks,” IEEE Transactions on information
theory, vol. 52, no. 6, pp. 2608–2623, 2006.
D. Traskov, M. Heindlmaier, M. Médard, R. Koetter, and D. S.
Lun, “Scheduling for network coded multicast: A conflict graph
formulation,” in GLOBECOM Workshops, 2008 IEEE. IEEE,
2008, pp. 1–5.
| 7cs.IT
|
Predicting Signed Edges with O(n1+o(1) log n) Queries
Michael Mitzenmacher∗
Charalampos E. Tsourakakis†
arXiv:1609.00750v2 [cs.DS] 4 Oct 2016
Abstract
Social networks and interactions in social media involve both positive and negative relationships. Signed graphs capture both types of relationships: positive edges correspond to pairs of
“friends”, and negative edges to pairs of “foes”. The edge sign prediction problem, which aims
to predict whether an interaction between a pair of nodes will be positive or negative, is an
important graph mining task for which many heuristics have recently been proposed [LHK10a;
LHK10b].
Motivated by social balance theory, we model the edge sign prediction problem as a noisy
correlation clustering problem with two clusters. We are allowed to query each pair of nodes
whether they belong to the same cluster or not, but the answer to the query is corrupted
with some probability 0 < q < 12 . Let c = 12 − q be the gap. We provide an algorithm that
recovers the clustering with high probability in the presence of noise for any constant gap c
1+
1
with O(n log log n log n) queries. Our algorithm uses simple breadth first search as its main
algorithmic primitive. Finally, we provide a novel generalization to k ≥ 3 clusters and prove that
our techniques can recover the clustering if the gap is constant in this generalized setting.
1
Introduction
With the rise of social media, where both positive and negative interactions take place, signed
graphs, whose study was initiated by Heider, Cartwright, and Harary [CH56; Hei46; Har53], have
become prevalent in graph mining. A key graph mining problem is the edge sign prediction problem,
which aims to predict whether an interaction between a pair of nodes will be positive or negative
[LHK10a; LHK10b]. Recent works have developed numerous heuristics for this task that perform
relatively well in practice [LHK10a; LHK10b].
In this work we propose a theoretical model for the edge sign prediction problem that highlights
its intimate connections with the famous planted partition problem [ABH16; CK01; HWX16; McS01].
Specifically, we model the edge sign prediction problem as a noisy correlation clustering problem,
where we are able to query a pair of nodes (u, v) to test whether they belong to the same cluster
(edge sign f (u, v) = +1) or not (edge sign f (u, v) = −1). The query fails to return the correct answer
with some probability 0 < q < 12 . Correlation clustering is a basic data mining primitive with a large
number of applications ranging from social network analysis [Har53; LHK10a] to computational
biology [HEP+16]. Our theoretical model is inspired by the famous balance theory: “the friend of
my enemy is my friend” [CH56; EK10; Hei46]. The details of our model follow.
Model I. Let V = [n] be the set of n items that belong to two clusters, call them red and blue.
Set f : V → {red, blue}, R = {v ∈ V (G) : f (v) = red} and B = {v ∈ V (G) : f (v) = blue}, where
∗
†
Harvard University, [email protected]
Harvard University, [email protected]
1
0 ≤ |R| ≤ n. The function f is unknown and we wish to recover the two clusters R, B by querying
pairs of items. (We need not recover the labels, just the clusters.) For each query we receive the
correct answer with probability 1 − q, where q > 0 is the corruption probability. That is, for a pair
of items u, v such that f (u) = f (v), with probability q it is reported that f˜(u) 6= f˜(v), and similarly
if f (u) 6= f (v) with probability q it is reported that f˜(u) = f˜(v). Our goal is to perform as few
queries as possible while recovering the underlying cluster structure.
Main result. Our main theoretical result is that we can recover the clusters (R, B) with high
probability1 in polynomial time. Our algorithm uses breadth first search (BFS) as its main
algorithmic primitive. Our result is stated as Theorem 1.
Theorem 1. There exists a polynomial time algorithm that performs Θ(n log n(2c)
queries and recovers the clustering (R, B) whp for any gap 0 < c = 21 − q < 12 .
1+
log n
− log
log n
) edge
1
When c is constant, then the number of queries is O(n log log n log n). A natural follow-up question
that we address here is whether our results generalize to the case of more than two clusters. We
provide a general model and show that our techniques recover the cluster structure whp as long as
the gap c is constant.
Model II. Our model is now that there are k groups, that we number {0, 1, ..., k − 1} and that we
think of as being arranged modulo k. Let g(u) refer to the group number associated with a vertex
u. We start by noting that if when querying an edge we returned only whether the the groups of
the two edges were equal, it would be difficult to reconstruct the clusters; indeed, even with no
errors, a chain of such responses along a path would not generally allow us to determine whether
the endpoints of a path were in the same group or not. A model that provides more information
and naturally generalizes the two cluster case is the following: when we query an edge e = (x, y),
we obtain
f˜(e) =
g(x) − g(y) mod k,
with probability 1 − q;
g(x) − g(y) + 1 mod k,
with probability q/2;
g(x) − g(y) − 1 mod k,
with probability q/2.
(1)
That is, we obtain the difference between the groups when no error occurs, and with probability
q we obtain an error that adds or subtracts one to this gap with equal probability. When q = 0, so
there are no errors from f˜(e), the edge queries would allow us to determine the difference between
the group numbers of vertices at the start and end of any path, and in particular would allow us to
determine if the groups were the same. We also note that we choose this description for ease of
exposition. More generally we could handle queries governed by more general error models, of the
form:
f˜(e) = g(x) − g(y) + i with probability qi , 0 ≤ i < k.
That is, the error does not depend on the group values x and y, but is simply independent and
identically distributed over the values 0 to k − 1.
1+
1
Theorem 2. There exists a polynomial time algorithm that performs O(n log log n log n) edge
queries and recovers the k clusters under the model of equation (1) whp for any constant gap
0 < c < 12 .
1
An event An holds with high probability (whp) if
lim Pr [An ] = 1.
n→+∞
2
Our proof techniques extend naturally to this model.
Roadmap. Section 2 presents some theoretical preliminaries. Section 3 presents our algorithmic
contributions. Section 4 briefly reviews related work. Finally, Section 5 concludes the paper.
2
Theoretical Preliminaries
We use the following powerful probabilistic results for the proofs in Section 3.
Theorem 3 (Chernoff bound, Theorem 2.1 [JLR11]). Let X ∼ Bin (n, p), µ = np, a ≥ 0 and
ϕ(x) = (1 + x) ln(1 + x) − x (for x ≥ −1, or ∞ otherwise). Then the following inequalities hold:
−µϕ
−a
µ
−µϕ
−a
µ
Pr [X ≤ µ − a] ≤ e
Pr [X ≥ µ + a] ≤ e
2
−a
2µ
≤e
,
(2)
a2
− 2(µ+a/3)
≤e
.
(3)
We define the notion of read-k families, a useful concept when proving concentration results for
weakly dependent variables.
Definition 1 (Read-k families). Let X1 , . . . , Xm be independent random variables. For j ∈ [r], let
Pj ⊆ [m] and let fj be a Boolean function of {Xi }i∈Pj . Assume that |{j|i ∈ Pj }| ≤ k for every
i ∈ [m]. Then, the random variables Yj = fj ({Xi }i∈Pj ) are called a read-k family.
Theorem 4 (Concentration of Read-k families [GLS+15]). Let Y1 , . . . , Yr be a family of read-k
indicator variables with Pr [Yi = 1] = q. Then for any > 0,
Pr
" r
X
#
Yi ≥ (q + )r ≤ e−DKL (q+||q)·r/k
(4)
i=1
and
Pr
" r
X
#
Yi ≤ (q − )r ≤ e−DKL (q−||q)·r/k .
(5)
i=1
Here, DKL is Kullback-Leibler divergence defined as
q
1−q
+ (1 − q) log
.
p
1−p
We will use the following corollary of Theorem 5, which provides Chernoff-type bounds for
read-k families. This is derived in a similar way that Chernoff multiplicative bounds are derived
from Equations (3) and (2), see [McD98]. Notice that the main difference compared to the standard
Chernoff bounds is the extra k factor in denominator of the exponent.
DKL (q||p) = q log
Theorem 5 (Concentration of Read-k families [GLS+15]). Let Y1 , . . . , Yr be a family of read-k
P
indicator variables with Pr [Yi = 1] = q. Also, let Y = ri=1 Yi . Then for any > 0,
Pr [Y ≥ (1 + )E [Y ]] ≤ e
Pr [Y ≤ (1 − )E [Y ]] ≤ e−
3
2 E[Y ]
− 2k(1+/3)
2 E[Y ]
2k
.
(6)
(7)
3
Proposed Method
We prove our main result through a sequence of claims and lemmas. For completeness we include all
proofs even if some claims are classic, e.g., Claim 1. At a high level, our proof strategy is as follows:
1. We compute the probability that a simple path between u and v provides us with the correct
information on whether f (u) = f (v) or not.
4L
2. Let L = logloglogn n . We show that there exist N = (2c)−L e 5 almost edge-disjoint paths of length
(1 + o(1))L between any pair of vertices with probability at least 1 − n13 . The reader can think
of the paths as being edge-disjoint, if that is helpful; we shall clarify both what we mean by
almost edge-disjoint paths and how it affects the proof later in the paper.
3. For each path from the collection of N almost edge-disjoint paths, we compute the product
of the sign of the edges along the path. Since the paths are not entirely edge disjoint, the
corresponding random variables are weakly dependent. We use concentration of multivariate
polynomials [GLS+15], see also [AS04; KV00], in combination with Claim 1 to show that
using the majority of the N resulting signs to decide whether f (u) = f (v) or not for a pair of
nodes u, v ∈ V (G) gives the
correct answer with probability lower bounded by 1 − n13 . Taking
n
the union bound over 2 pairs concludes the proof.
The pseudo-code is shown as Algorithm 1. The algorithm runs over each pair of nodes, and
it invokes Algorithm 2 to construct almost edge-disjoint paths for each pair of nodes u, v using
Breadth First Search. Note that since we perform 20n log n(2c)−L queries uniformly at random,
−L
the resulting graph is is asymptotically equivalent to G ∼ G(n, 40 log n(2c)
), see [FK15, Chapter 1].
n
Here, G(n, p) is the classic Erdös-Rényi model
(a.k.a
random
binomial
graph
model) where each
[n]
possible edge between each pair (u, v) ∈ 2 is included in the graph with probability p independent
from every other edge.
log n
It turns out that our algorithm needs an average degree O (2c)
only for the first level of the
L
trees Tu , Tv that we grow from u and v when we invoke Algorithm 2. For all other levels of the grown
trees, we need the degree to be only O(log n). This difference in the branching factors exists in order
1
to ensure that the number of leaves of trees Tu , Tv in Algorithm 2 is amplified by a factor of (2c)
L,
which then allows us to apply Theorem 5. Using appropriate data structures, Algorithm 1 runs
in O(n2 (n + m)) = O(n3 log n(2c)−L ). One can improve the run time in expectation by sampling
O(log n) neighbors for each node in O(log n) time instead of O(log n(2c)−L ) time using a standard
sublinear sampling technique that generates geometric random variables between successive successes,
see [Knu07; TKM11]. This results in total expected run time O(n3 log n). Since we use a branching
factor of O(log n) for all except the first two levels of Tu , Tv , we work with the G(n, p) model with
n
p = 40 log
to construct the set of almost edge disjoint paths. (Alternatively, one can think that we
n
start with the larger random graph with more edges, and then in the construction of the almost
edge disjoint paths we subsample a smaller collection of edges to use in this stage.) The diameter of
−L
this graph whp grows asymptotically as L [Bol98] for this value of p. We use the G(n, 40 log n(2c)
)
n
model only in Lemma 1 to prove that every node has degree at least 5 log n(2c)−L .
The following result is well known but we present a proof for completeness.
4
Algorithm 1 2-Correlation Clustering with Noise
L ← logloglogn n
Perform 20n log n(2c)−L queries uniformly at random.
Let G(V, E, f˜) be the resulting graph, f˜ : E → {+1, −1}
for each item pair u, v do
Pu,v = {P1 , . . . , PN } ← Almost-Edge-Disjoint-Paths(u, v)
Q
Yi ← e∈Pi f˜(e) for i = 1, . . . , N
P
Yuv ← P ∈Pu,v YP
if Yuv ≥ 0 then
f˜(u) = f˜(v)
else
f˜(u) 6= f˜(v)
end if
end for
Algorithm 2 Almost-Edge-Disjoint-Paths(u, v)
Require: G(V, E, f˜), u, v ∈ V (G)
← √log1log n
Using Breadth First Search (BFS) grow a tree Tu starting from u as follows.
−
log n
For the first level of the tree, we choose 4 log n(2c) log log n neighbors of u.
For the rest of the tree we use a branching factor equal to 4 log n until it reaches depth equal to
L. Similarly, grow a tree Tv rooted at v, node disjoint from Tu of equal depth.
From each leaf ui (vi ) of Tu (Tv ) for i = 1, . . . , N grow node disjoint trees until they reach depth
( 12 + )L with branching factor 4 log n. Finally, find an edge between Tui , Tvi
Claim 1. Consider a path Puv between nodes u, v of length L. Let Ruv =
Pr [Ruv = 1|f (u) = f (v)] = Pr [Ruv = −1|f (u) 6= f (v)] =
Q
e∈Puv
f˜(e). Then,
1 + (1 − 2q)L
2
Proof. Here Ruv = 1 iff f˜ agrees with the unknown clustering function f on u, v. This happens when
the number of corrupted edges along that path Puv is even. Let Zuv ∼ Bin(L, q) be the number of
corrupted edges/sign flips along the Puv path. Clearly, Pr [Zuv is even] + Pr [Zuv is odd] = 1. Also,
L
(1 − 2q) =
L
X
k=0
!
bLc
bLc
!
!
2
2
X
X
L
L 2k
L
(−q)k (1 − q)L−k =
q (1 − q)L−2k −
q 2k+1 (1 − q)L−(2k+1) =
k
2k
2k
+
1
k=0
k=0
Pr [Zuv is even] − Pr [Zuv is odd] .
Therefore Pr [Zuv is even] =
1+(1−2q)L
,
2
and the result follows.
The next lemma is a direct corollary of the lower tail multiplicative Chernoff bound.
log n
Lemma 1. Let G ∼ G(n, 40
) be a random binomial graph. Then whp all vertices have degree
(2c)L n
greater than 5 log n(2c)−L .
5
log n
Proof. The degree deg(u) of a node u ∈ V (G) follows the binomial distribution Bin(n − 1, 40
).
(2c)L n
Set δ = 34 . Then
δ2
i
h
−L
Pr deg(u) < 5 log n(2c)−L < e− 2 40 log n(2c)
n−1 .
Taking a union bound over n vertices gives the result.
Now we proceed to our construction of sufficiently enough almost edge-disjoint paths. Our construction is based on standard techniques in random graph theory [BFS+98; DFT15; FT12; Tso13], we
include the full proofs for completeness.
n
Lemma 2. Let G ∼ G(n, p) where p = 40 log
. Fix t ∈ Z+ and 0 < α < 1. Then, whp there does
n
not exist a subset S ⊆ [n], such that |S| ≤ αtL and e[S] ≥ |S| + t.
Proof. Set s = |S|.Then,
Pr [∃S : s ≤ αtL and e[S] ≥ s + t] ≤
X
s≤αtL
≤
X
(e
s≤αtL
2+o(1)
log n)
s
20es log n
n
t
n
s
s
2
!
s+t
2+o(1)
≤ αtL (e
!
s+t
p
≤
X ne s
s≤αtL
αL
log n)
s
20eαt log2 n
n log log n
es2 p
2(s + t)
!!t
<
!s+t
1
.
n(1−α−o(1))t
Lemma 3. Let T be a rooted tree of depth at most 4L
7 and let v be a vertex not in T . Then with
probability 1 − o(n−3 ), v has at most 10 neighbors in T , i.e., |N (v) ∩ T | ≤ 10.
Proof. Let T be a rooted tree of depth at most 4L
7 and let S consist of v, the neighbors of v in
T plus the ancestors of these neighbors. Set b = |N (v) ∩ T |. Then |S| ≤ 4bL/7 + 1 ≤ 3bL/5 and
e(S) = |S| + b − 2. It follows from Lemma 2 with α = 3/5 and t = 8, that we must have b ≤ 10
with probability 1 − o(n−3 ).
We show that by growing trees iteratively we can construct sufficiently many edge-disjoint paths for
n sufficiently large.
Lemma 4. Let = √log1log n , and k = L. For all pairs of vertices x, y ∈ [n] there exists a
subgraph Gx,y (Vx,y , Ex,y ) of G as shown in figure 1, whp. The subgraph consists of two isomorphic
vertex disjoint trees Tx , Ty rooted at x, y each of depth k. Tx and Ty both have a branching factor
of 4 log n(2c)−L for the first level, and 4 log n for the remaining levels. If the leaves of Tx are
x1 , x2 , . . . , xτ , τ ≥ (2c)−L n4/5 then yi = f (xi ) where f is a natural isomorphism. Between each pair
of leaves (xi , yi ), i = 1, 2, . . . , m there is a path Pi of length (1+2)L. The paths Pi , i = 1, 2, . . . , τ, . . .
are edge disjoint.
Proof. Because we have to do this for all pairs x, y, we note without further comment that likely
(resp. unlikely) events will be shown to occur with probability 1 − o(n−2 ) (resp. o(n−2 )).
To find the subgraph shown in Figure 1(b) we grow tree structures as shown in Figure 1(a).
Specifically, we first grow a tree from x using BFS until it reaches depth k. Then, we grow a tree
starting from y again using BFS until it reaches depth k. For the first level of both trees, we choose
5 log n
neighbors of x, y respectively. For all other levels we use a branching factor equal to 4 log n.
(2c)L
6
Before we show how to continue our construction, we need to prune down the degree of G([n]\{x, y})
so that the remaining subgraph behave as G(n, p) with p = Θ( logn n ). This can be achieved for
n
example either by considering a random subgraph of G according to G([n]\{x, y}, 40 log
), applying
n
Chernoff bounds as in Lemma 1 to show that each node has degree at least 5 log n, or by letting
each node choose 5 log n neighbors uniformly at random.
Finally, once trees Tx , Ty have been constructed, we grow trees from the leaves of Tx and Ty
using BFS for depth γ = ( 12 + )L. Now we analyze these processes. Since the argument is the same
we explain it in detail for Tx and we outline the differences for the other trees. We use the notation
(ρ)
Di for the number of vertices at depth i of the BFS tree rooted at ρ.
First we grow Tx . As we grow the tree via BFS from a vertex v at depth i to vertices at depth
i + 1 certain bad edges from v may point to vertices already in Tx . Lemma 3 shows with probability
1 − o(n−3 ) there can be at most 10 bad edges emanating from v.
Hence, we obtain the recursion
(x)
(x)
Di+1 ≥ (5 log n − 10) (Di
(x)
− 1) ≥ 4 log nDi .
(8)
Therefore the number of leaves satisfies
(x)
Dk ≥
L
1
1
≥
4
log
n
n4/5 .
(2c)L
(2c)L
(9)
We can make the branching factors exactly 4 log n(2c)−L for the first level and 4 log n for all remaining
levels by pruning. We do this so that the trees Tx are isomorphic to each other. With a similar
argument
4
1
(y)
n 5 .
Dk ≥
(10)
L
(2c)
The only difference is that now we also say an edge is bad if the other endpoint is in Tx . This
immediately gives
(y)
(y)
(y)
Di+1 ≥ (5 log n − 20) (Di − 1) ≥ 4 log nDi
and the required conclusion (10).
Similarly, from each leaf xi ∈ Tx and yi ∈ Ty we grow trees Tbxi , Tbyi of depth γ = 21 + L using
the same procedure and arguments as above. Lemma 3 implies that there are at most 20 edges from
the vertex v being explored to vertices in any of the trees already constructed (at most 10 to Tx
plus any trees rooted at an xi and another 10 for y). The number of leaves of each Tbxi now satisfies
1
4
b (xi ) ≥ (4 log n)γ+1 ≥ n 2 + 5 .
D
γ
(y )
bγ i .
The result is similar for D
Observe next that BFS does not condition on the edges between the leaves Xi , Yi of the trees Tbxi
and Tbyi . That is, we do not need to look at these edges in order to carry out our construction. On
the other hand we have conditioned on the occurrence of certain events to imply a certain growth
rate. We handle this technicality as follows. We go through the above construction and halt if ever
we find that we cannot expand by the required amount. Let A be the event that we do not halt the
construction i.e. we fail the conditions of Lemmas 2 or 3. We have Pr [A] = 1 − o(1) and so,
Pr [∃i : e(Xi , Yi ) = 0 | A] ≤
1+ 8
4
Pr [∃i : e(Xi , Yi ) = 0]
≤ 2n 5 (1 − p)n 5 ≤ n−n .
Pr(A)
7
(a)
(b)
Figure 1: Illustration of construction in Lemma 4. (a) By repeatedly growing trees appropriately,
(b) we create for each pair of nodes x, y two node disjoint trees Tx , Ty of depth k = L whose leaves
can be matched via a natural isomorphism and linked with edge disjoint paths of length (1 + o(1))L
We conclude that whp there is always an edge between each Xi , Yi and thus a path of length at
most (1 + 2)L between each xi , yi .
The proof of Theorem 1 follows. Set q =
1
2
− c.
Proof of Theorem 1. Fix a pair of nodes x, y ∈ V (G). Let Y1 , . . . , YN be the signs of the N edge
P
disjoint paths connecting them, i.e., Yi ∈ {−1, +1} for all i. Also let Y = N
i=1 Yi . Notice that
N
{Y1 , . . . , YN } is a read-k family where k = 4 log n(2c)
.
−L
By the linearity of expectation
4
E [Y ] = N (2c)L ≥ n 5 (2c)L .
By applying Theorem 5 we obtain
n4/5 (2c)L
= o(n−2 ).
Pr [Y < 0] = Pr [Y − E [Y ] < −E [Y ]] ≤ exp −
4/5
2n
4(2c)−L log n
Planted bisection model. Before we prove Theorem 2 we discuss the connection between our
formulation and the well studied planted bisection model. Suppose that n is even, and the graph
has two clusters of equal size. The probabilities of connecting are p within each cluster, and q < p
across the clusters. Now recall our setting as described in Model I, and consider just the edges
that correspond to queries that return +1. These form a graph drawn from the planted bisection
40 log n
40 log n
model where p = 1+c
, q = 1−c
. Therefore, one can apply existing methods for
2 ×
n
2 ×
n
exact recovery, e.g., [ABH16; McS01] instead of our method when the sizes of the two clusters
are (roughly) equal. It is worth noting that despite the wide variety of techniques that appear in
the context of the planted partition model, including the EM algorithm [SN97], spectral methods
[McS01; Vu14], semidefinite programming [ABH16; HWX16; MS15], hill-climbing [CI01], Metropolis
algorithm [JS98], modularity based methods [BC09], our edge-disjoint path technique is novel in
this context.
Hajek, Wu, and Xu proved that when each cluster has Θ(n) nodes, the average degree has
log n
√ 2 for exact recovery [HWX16]. Also, they showed that using semidefinite
to scale as (√1−q−
q)
8
programming (SDP) exact recovery is achievable at this threshold [HWX16]. Note that as q → 12 ,
log n
log n
this lower bound scales as Θ( (1−2q)
2 ) = Θ( (2c)2 ). It is an interesting theoretical problem to explore
if the techniques we develop in this work, or similar techniques can get closer to this lower bound.
Proof of Theorem 2. Since the proof of Theorem 2 overlaps with the proof of Theorem 1, we outline
the main differences. Let us return to the basic version of Model II, and let X(e) ∈ {−1, 0, 1} for
e = (x, y) be
f˜(e) − (g(x) − g(y)) mod k.
Then given a path between two vertices u and v,
g(v) = g(u) +
X
f˜(e) −
e∈Puv
X
X(e) mod k.
e∈Puv
P
Our question is now what is Zuv = e∈Puv X(e) mod k. We would like that Zuv be (even slightly)
more highly concentrated on 0 than on other values, so that when g(u) = g(v), we find that the
P
sum of the return values from our algorithm, e∈Puv f˜(e) mod k, is most likely to be 0. We could
then conclude by looking over many almost edge-disjoint paths that if this sum is 0 over a plurality
of the paths, then u and v are in the same group whp.
P
For our simple error model, the sum e∈Puv X(e) mod k behaves like a simple lazy random walk
on the cycle of values modulo k, where the probability of remaining in the same state at each step
is q. Let us consider this Markov chain on the values modulo k; we refer to the values as states.
Let ptij be the probability of going from state i to state j after t steps in such a walk. It is well
known than one can derive explicit formulae for ptij ; see e.g. [Fel68, Chapter XVI.2]. It also follows
by simply finding the eigenvalues and eigenvectors of the matrix corresponding to the Markov chain
and using that representation. One can check the resulting forms to determine that pt0j is maximized
when j = 0, and to determine the corresponding gap maxj∈[1,k−1] |pt00 − p0j |t . Based on this gap, we
can apply Chernoff-type bounds as in Theorem 5 to show that the plurality of almost edge-disjoint
paths will have error 0, allowing us to determine whether the endpoints of the path x and y are in
the same group with high probability.
The simplest example is with k = 3 groups, where we find
pt00 =
1 2
+ (1 − 3q/2)t ,
3 3
and
1 1
− (1 − 3q/2)t .
3 3
In our case t = L, and we see that for any q < 2/3, pt00 is large enough that we can detect paths
using the same argument as in Model I.
For general k, we use that the eigenvalues of the matrix
pt01 = pt02 =
1−q
q
0 ...
1 − q q ...
q
.
..
..
..
.
.
.
.
.
q
0
0 ...
q
0
..
.
1−q
are 1−q+q cos(2πj/k), j = 0, . . . , k−1, with the j-th corresponding eigenvector being [1, ω j , ω 2j , . . . , ω j(k−1) ]
where ω = e2πi/k is a primitive kth root of unity. Here, i is not an index but the square root of -1,
9
i.e., i =
√
−1. In this case we have
pt00 =
X
t
1 1 k−1
+
1 − q + q cos(2πj/k) .
k k j=1
Note that pt00 > 1/k. Some algebra reveals that the next largest value of pt0j belongs to pt01 , and
equals
X
t
1 1 k−1
pt01 = +
ω −j 1 − q + q cos(2πj/k) .
k k j=1
We therefore see that the error between ends of a path again have the plurality value 0, with a gap
of at least
pt00 − pt01 ≥ 2(1 − cos(2π/k))(1 − q + q cos(2π/k))t .
This gap is constant for any constant k ≥ 3 and q ≤ 1/2.
As we have already mentioned, the same approach could be used for the more general setting where
f˜(e) = g(x) − g(y) + j with probability qj , 0 ≤ j < k,
but now one works with the Markov chain matrix
q0
qk−1
.
.
.
q1
4
q1 q2 . . .
q0 q1 . . .
..
.. . .
.
.
.
q2 q3 . . .
qk−1
qk−2
..
.
.
q0
Related Work
Fritz Heider introduced the notion of a signed graph, with +1 or −1 labels on the edges, in the
context of balance theory [Hei46]. The key subgraph in balance theory is the triangle: any set
of three fully interconnected nodes whose product of edge signs is negative is not balanced. The
complete graph is balanced if every one of its triangles is balanced. Early work on signed graphs
focused on graph theoretic properties of balanced graphs [CH56]. Harary proved the famous balance
theorem which characterizes balanced graphs [Har53].
Bansal et al. [BBC04] studied Correlation Clustering: given an undirected signed graph partition the nodes into clusters so that the total number of disagreements is minimized. This problem
is NP-hard [BBC04; SST04]. Here, a disagreement can be either a positive edge between vertices in two clusters or a negative edge between two vertices in the same cluster. Note that in
Correlation Clustering the number of clusters is not specified as part of the input. The case when
the number of clusters is constrained to be at most two is known as 2-Correlation-Clustering.
Minimizing disagreements is equivalent to maximizing the number of agreements. However, from an approximation perspective these two versions are different: minimizing is harder.
For minimizing disagreements, Bansal et al. [BBC04] provide a 3-approximation algorithm for
2-Correlation-Clustering, and Giotis and Guruswami provide a polynomial time approximation
scheme (PTAS) [GG06]. Ailon et al. designed a 2.5-approximation algorithm [ACN08] that was
further improved by Coleman et al. to a 2-approximation [CSW08]. We remark that the notion of
imbalance studied by Harary is the 2-Correlation-Clustering cost of the signed graph. Mathieu and
10
Schudy initiated the study of noisy correlation clustering [MS10]. They develop various algorithms
when the graph is complete, both for the cases of a random and a semi-random model. Later,
Makarychev, Makarychev, and Vijayaraghavan proposed an algorithm for graps with O(npoly log n)
edges under a semi-random model [MMV15].
When the graph is not complete Correlation Clustering and Minimum Multicut reduce to
one another leading to a O(log n) approximations [CGW03; DI03]. The case of constrained size
clusters has recently been studied by Puleo and Mileknovic [PM15]. Finally, by using the GoemansWilliamson SDP relaxation for Max Cut [GW95], one can obtain a 0.878 approximation guarantee
for 2-Correlation-Clustering problem as noted by [CSW08].
Chen et al. [CJS+14; CSX12] consider also model I as described in Section 1 and provide a
method that can reconstruct the clustering for random binomial graphs with O(npoly log n edges.
Their method exploits low rank properties of the cluster matrix, and requires certain conditions,
including conditions on the imbalance between clusters, see [CSX12, Theorem 1, Table 1] to be true.
Their methods is based on a convex relaxation of a low rank problem. Also, closely related to our
work lies the work of Cesa-Bianchi et al. [CBGV+12] that take a learning-theoretic perspective
on the problem of predicting signs. They consider three types of models: batch, online, and active
learning, and provide theoretical bounds for prediction mistakes for each setting. They use the
correlation clustering objective as their learning bias, and they show that the risk of the empirical
risk minimizer is controlled by the correlation clustering objective. Chian et al. point out that the
work of Candès and Tao [CRT06] can be used to predict signs of edges, and also provide various other
methods, including singular value decomposition based methods, for the sign prediction problem
[CHN+14]. The incoherence is the key parameter that determines the number of queries, and is
n
equal to the group imbalance τ = max |C|
. The number of queries needed for exact recovery
cluster C
under Model I is O(τ 4 n log2 n).
5
Conclusion
In this work we have studied the edge sign prediction problem, showing that under our proposed
correlation clustering formulation and a fully random noise model querying O(n1+o(1) log n) pairs
of nodes uniformly at random suffices to recover the clusters efficiently, whp. We also provided a
generalization of our model and proof approach to more than two clusters. While our work here is
theoretical, in future work we plan to apply our method and additional heuristics to real data, and
compare against related alternatives. From a theoretical perspective, it is an interesting problem
log n
to close the gap between our upper bound and the known (2c)
2 lower bound for exact recovery
[HWX16] using techniques based on BFS.
Acknowledgment
We would like to thank Bruce Hajek and Zeyu Zhou for detecting an error in an earlier version
of our work. We also want to thank Yury Makarychev, Konstantin Makarychev, and Aravindan
Vijayaraghavan for their feedback.
This work was supported in part by NSF grants CNS-1228598, CCF-1320231, CCF-1563710,
and CCF-1535795.
11
References
[ABH16]
Emmanuel Abbe, Afonso S Bandeira, and Georgina Hall. “Exact recovery in the
stochastic block model”. In: IEEE Transactions on Information Theory 62.1 (2016),
pp. 471–487 (cit. on pp. 1, 8).
[ACN08]
Nir Ailon, Moses Charikar, and Alantha Newman. “Aggregating inconsistent information: ranking and clustering”. In: Journal of the ACM (JACM) 55.5 (2008), p. 23
(cit. on p. 10).
[AS04]
Noga Alon and Joel H Spencer. The probabilistic method. John Wiley & Sons, 2004
(cit. on p. 4).
[BBC04]
Nikhil Bansal, Avrim Blum, and Shuchi Chawla. “Correlation clustering”. In: Machine
Learning 56.1-3 (2004), pp. 89–113 (cit. on p. 10).
[BC09]
Peter J Bickel and Aiyou Chen. “A nonparametric view of network models and
Newman–Girvan and other modularities”. In: Proceedings of the National Academy
of Sciences 106.50 (2009), pp. 21068–21073 (cit. on p. 8).
[BFS+98]
Andrei Z Broder, Alan M Frieze, Stephen Suen, and Eli Upfal. “Optimal construction
of edge-disjoint paths in random graphs”. In: SIAM Journal on Computing 28.2
(1998), pp. 541–573 (cit. on p. 6).
[Bol98]
Béla Bollobás. “Random graphs”. In: Modern Graph Theory. Springer, 1998 (cit. on
p. 4).
[CBGV+12] Nicolo Cesa-Bianchi, Claudio Gentile, Fabio Vitale, Giovanni Zappella, et al. “A
Correlation Clustering Approach to Link Classification in Signed Networks.” In:
COLT. 2012, pp. 34–1 (cit. on p. 11).
[CGW03]
Moses Charikar, Venkatesan Guruswami, and Anthony Wirth. “Clustering with qualitative information”. In: Proceedings. 44th Annual IEEE Symposium on Foundations
of Computer Science (FOCS). IEEE. 2003, pp. 524–533 (cit. on p. 11).
[CH56]
Dorwin Cartwright and Frank Harary. “Structural balance: a generalization of Heider’s
theory.” In: Psychological review 63.5 (1956), p. 277 (cit. on pp. 1, 10).
[CHN+14]
Kai-Yang Chiang, Cho-Jui Hsieh, Nagarajan Natarajan, Inderjit S Dhillon, and Ambuj
Tewari. “Prediction and clustering in signed networks: a local to global perspective.”
In: Journal of Machine Learning Research 15.1 (2014), pp. 1177–1213 (cit. on p. 11).
[CI01]
Ted Carson and Russell Impagliazzo. “Hill-climbing finds random planted bisections”.
In: Proceedings of the twelfth annual ACM-SIAM Symposium on Discrete Algorithms
(SODA). Society for Industrial and Applied Mathematics. 2001, pp. 903–909 (cit. on
p. 8).
[CJS+14]
Yudong Chen, Ali Jalali, Sujay Sanghavi, and Huan Xu. “Clustering partially observed
graphs via convex optimization.” In: Journal of Machine Learning Research 15.1
(2014), pp. 2213–2238 (cit. on p. 11).
[CK01]
Anne Condon and Richard M Karp. “Algorithms for graph partitioning on the planted
partition model”. In: Random Structures and Algorithms 18.2 (2001), pp. 116–140
(cit. on p. 1).
12
[CRT06]
Emmanuel J Candès, Justin Romberg, and Terence Tao. “Robust uncertainty principles: Exact signal reconstruction from highly incomplete frequency information”. In:
IEEE Transactions on information theory 52.2 (2006), pp. 489–509 (cit. on p. 11).
[CSW08]
Tom Coleman, James Saunderson, and Anthony Wirth. “A local-search 2-approximation
for 2-correlation-clustering”. In: European Symposium on Algorithms (ESA). Springer,
2008, pp. 308–319 (cit. on pp. 10, 11).
[CSX12]
Yudong Chen, Sujay Sanghavi, and Huan Xu. “Clustering sparse graphs”. In: Advances
in neural information processing systems. 2012, pp. 2204–2212 (cit. on p. 11).
[DFT15]
Andrzej Dudek, Alan M Frieze, and Charalampos E Tsourakakis. “Rainbow connection
of random regular graphs”. In: SIAM Journal on Discrete Mathematics 29.4 (2015),
pp. 2255–2266 (cit. on p. 6).
[DI03]
Erik D Demaine and Nicole Immorlica. “Correlation clustering with partial information”. In: Approximation, Randomization, and Combinatorial Optimization
(APPROX-RANDOM). Springer, 2003, pp. 1–13 (cit. on p. 11).
[EK10]
David Easley and Jon Kleinberg. Networks, crowds, and markets: Reasoning about a
highly connected world. Cambridge University Press, 2010 (cit. on p. 1).
[FK15]
Alan Frieze and Michał Karoński. Introduction to random graphs. Cambridge University Press, 2015 (cit. on p. 4).
[FT12]
Alan Frieze and Charalampos E Tsourakakis. “Rainbow connectivity of sparse random graphs”. In: Approximation, Randomization, and Combinatorial Optimization
(APPROX-RANDOM). Springer, 2012, pp. 541–552 (cit. on p. 6).
[Fel68]
William Feller. An introduction to probability theory and its applications: volume I.
Vol. 3. John Wiley & Sons London-New York-Sydney-Toronto, 1968 (cit. on p. 9).
[GG06]
Ioannis Giotis and Venkatesan Guruswami. “Correlation clustering with a fixed
number of clusters”. In: Proceedings of the seventeenth annual ACM-SIAM Symposium
on Discrete Algorithms (SODA). Society for Industrial and Applied Mathematics.
2006, pp. 1167–1176 (cit. on p. 10).
[GLS+15]
Dmitry Gavinsky, Shachar Lovett, Michael Saks, and Srikanth Srinivasan. “A tail
bound for read-k families of functions”. In: Random Structures & Algorithms 47.1
(2015), pp. 99–108 (cit. on pp. 3, 4).
[GW95]
Michel X Goemans and David P Williamson. “Improved approximation algorithms
for maximum cut and satisfiability problems using semidefinite programming”. In:
Journal of the ACM (JACM) 42.6 (1995), pp. 1115–1145 (cit. on p. 11).
[HEP+16]
Jack P Hou, Amin Emad, Gregory J Puleo, Jian Ma, and Olgica Milenkovic. “A
new correlation clustering method for cancer mutation analysis”. In: arXiv preprint
arXiv:1601.06476 (2016) (cit. on p. 1).
[HWX16]
Bruce Hajek, Yihong Wu, and Jiaming Xu. “Achieving exact cluster recovery threshold
via semidefinite programming”. In: IEEE Transactions on Information Theory 62.5
(2016), pp. 2788–2797 (cit. on pp. 1, 8, 9, 11).
[Har53]
Frank Harary. “On the notion of balance of a signed graph.” In: The Michigan
Mathematical Journal 2.2 (1953), pp. 143–146 (cit. on pp. 1, 10).
13
[Hei46]
Fritz Heider. “Attitudes and cognitive organization”. In: The Journal of psychology
21.1 (1946), pp. 107–112 (cit. on pp. 1, 10).
[JLR11]
Svante Janson, Tomasz Luczak, and Andrzej Rucinski. Random Graphs. Vol. 45. John
Wiley & Sons, 2011 (cit. on p. 3).
[JS98]
Mark Jerrum and Gregory B Sorkin. “The Metropolis algorithm for graph bisection”.
In: Discrete Applied Mathematics 82.1 (1998), pp. 155–175 (cit. on p. 8).
[KV00]
Jeong Han Kim and Van H Vu. “Concentration of multivariate polynomials and its
applications”. In: Combinatorica 20.3 (2000), pp. 417–434 (cit. on p. 4).
[Knu07]
Donald E Knuth. “Seminumerical algorithms”. In: (2007) (cit. on p. 4).
[LHK10a]
Jure Leskovec, Daniel Huttenlocher, and Jon Kleinberg. “Predicting positive and
negative links in online social networks”. In: Proceedings of the 19th international
conference on World Wide Web (WWW). ACM. 2010, pp. 641–650 (cit. on p. 1).
[LHK10b]
Jure Leskovec, Daniel Huttenlocher, and Jon Kleinberg. “Signed networks in social
media”. In: Proceedings of the SIGCHI conference on Human Factors in Computing
Systems. ACM. 2010, pp. 1361–1370 (cit. on p. 1).
[MMV15]
Konstantin Makarychev, Yury Makarychev, and Aravindan Vijayaraghavan. “Correlation clustering with noisy partial information”. In: Proceedings of the Conference
on Learning Theory (COLT). Vol. 6. 2015, p. 12 (cit. on p. 11).
[MS10]
Claire Mathieu and Warren Schudy. “Correlation clustering with noisy input”. In:
Proceedings of the twenty-first annual ACM-SIAM symposium on Discrete Algorithms.
Society for Industrial and Applied Mathematics. 2010, pp. 712–728 (cit. on p. 11).
[MS15]
Andrea Montanari and Subhabrata Sen. “Semidefinite programs on sparse random graphs and their application to community detection”. In: arXiv preprint
arXiv:1504.05910 (2015) (cit. on p. 8).
[McD98]
Colin McDiarmid. “Concentration”. In: Probabilistic methods for algorithmic discrete
mathematics. Springer, 1998, pp. 195–248 (cit. on p. 3).
[McS01]
Frank McSherry. “Spectral partitioning of random graphs”. In: Proceedings. 42nd
IEEE Symposium on Foundations of Computer Science (FOCS). IEEE. 2001, pp. 529–
537 (cit. on pp. 1, 8).
[PM15]
Gregory J Puleo and Olgica Milenkovic. “Correlation clustering with constrained
cluster sizes and extended weights bounds”. In: SIAM Journal on Optimization 25.3
(2015), pp. 1857–1872 (cit. on p. 11).
[SN97]
Tom AB Snijders and Krzysztof Nowicki. “Estimation and prediction for stochastic
blockmodels for graphs with latent block structure”. In: Journal of classification 14.1
(1997), pp. 75–100 (cit. on p. 8).
[SST04]
Ron Shamir, Roded Sharan, and Dekel Tsur. “Cluster graph modification problems”.
In: Discrete Applied Mathematics 144.1 (2004), pp. 173–182 (cit. on p. 10).
[TKM11]
Charalampos E Tsourakakis, Mihail N Kolountzakis, and Gary L Miller. “Triangle
Sparsifiers.” In: J. Graph Algorithms Appl. 15.6 (2011), pp. 703–726 (cit. on p. 4).
[Tso13]
Charalampos E. Tsourakakis. “Mathematical and Algorithmic Analysis of Network
and Biological Data”. PhD thesis. Carnegie Mellon University, 2013 (cit. on p. 6).
14
[Vu14]
Van Vu. “A simple SVD algorithm for finding hidden partitions”. In: arXiv preprint
arXiv:1404.3918 (2014) (cit. on p. 8).
15
| 8cs.DS
|
Under review as a conference paper at ICLR 2018
E VIDENCE AGGREGATION FOR A NSWER R E -R ANKING
IN O PEN -D OMAIN Q UESTION A NSWERING
arXiv:1711.05116v1 [cs.CL] 14 Nov 2017
Shuohang Wang1 , Mo Yu2 , Jing Jiang1 ,Wei Zhang2 , Xiaoxiao Guo2 , Shiyu Chang2 , Zhiguo Wang2
Tim Klinger2 , Gerald Tesauro2 and Murray Campbell2
1
School of Information System, Singapore Management University
2
AI foundations, IBM Research. Yorktown Heights NY, USA
[email protected], [email protected], [email protected]
A BSTRACT
A popular recent approach to answering open-domain questions is to first search
for question-related passages and then apply reading comprehension models to
extract answers. Existing methods usually extract answers from single passages
independently. But some questions require a combination of evidence from across
different sources to answer correctly. In this paper, we propose two models which
make use of multiple passages to generate their answers. Both use an answerreranking approach which reorders the answer candidates generated by an existing state-of-the-art QA model. We propose two methods, namely, strengthbased re-ranking and coverage-based re-ranking, to make use of the aggregated
evidence from different passages to better determine the answer. Our models
have achieved state-of-the-art results on three public open-domain QA datasets:
Quasar-T, SearchQA and the open-domain version of TriviaQA, with about 8 percentage points of improvement over the former two datasets.
1
I NTRODUCTION
Open-domain question answering (QA) aims to answer questions from a broad range of domains
by effectively marshalling evidence from large open-domain knowledge sources. Such resources
can be Wikipedia (Chen et al., 2017), the whole web (Ferrucci et al., 2010), structured knowledge
bases (Berant et al., 2013; Yu et al., 2017) or combinations of the above (Baudiš & Šedivỳ, 2015).
Recent work on open-domain QA has focused on using unstructured text retrieved from the web
to build machine comprehension models (Chen et al., 2017; Dhingra et al., 2017b; Wang et al.,
2017). These studies adopt a two-step process: an information retrieval (IR) model to coarsely
select relevant passages to a question, followed by a reading comprehension (RC) model (Wang
& Jiang, 2017; Seo et al., 2017; Chen et al., 2017) to infer an answer from the passages. These
studies have made progress in bringing together evidence from large data sources, but they predict
an answer to the question with only a single retrieved passage at a time. However, answer accuracy
can often be improved by using multiple passages. In some cases, the answer can only be determined
by combining multiple passages.
In this paper, we propose a method to improve open-domain QA by explicitly aggregating evidence
from across multiple passages. Our method is inspired by two notable observations from previous
open-domain QA results analysis:
• First, compared with incorrect answers, the correct answer is often suggested by more passages
repeatedly. For example, in Figure 1(a), the correct answer “danny boy” has more passages
providing evidence relevant to the question compared to the incorrect one. This observation can
be seen as multiple passages collaboratively enhancing the evidence for the correct answer.
• Second, sometimes the question covers multiple answer aspects, which spreads over multiple
passages. In order to infer the correct answer, one has to find ways to aggregate those multiple
passages in an effective yet sensible way to try to cover all aspects. In Figure 1(b), for example,
the correct answer “Galileo Galilei” at the bottom has passages P1, “Galileo was a physicist ...”
1
Under review as a conference paper at ICLR 2018
Question1: What is the more popular name for the
londonderry air?
A1: tune from county
Question2: Which physicist , mathematician and astronomer
discovered the first 4 moons of Jupiter
A1: Isaac Newton
P1: the best known title for this melody is londonderry air lrb- sometimes also called the tune from county derry -rrb- .
P1: Sir Isaac Newton was an English physicist , mathematician ,
astronomer , natural philosopher , alchemist and theologian …
P2: Sir Isaac Newton was an English mathematician, astronomer, and
physicist who is widely recognized as one of the most influential
scientists …
A2: danny boy
P1: londonderry air words : this melody is more commonly
known with the words `` danny boy ''
P2: londonderry air danny boy music ftse london i love you .
P3: danny boy limavady is most famous for the tune
londonderry air collected by jane ross in the mid-19th century
from a local fiddle player .
P4: it was here that jane ross noted down the famous
londonderry air -lrb- ` danny boy ' -rrb- from a passing fiddler .
Question2: Which physicist , mathematician and astronomer
discovered the first 4 moons of Jupiter
A2: Galileo Galilei
P1: Galileo Galilei was an Italian physicist , mathematician ,
astronomer , and philosopher who played a major role in the Scientific
Revolution .
P2: Galileo Galilei is credited with discovering the first four moons
of Jupiter .
(a)
(b)
Figure 1: Two examples of questions and candidate answers. (a) A question benefiting from the repetition of
evidence. Correct answer A2 has multiple passages that could support A2 as answer. The wrong answer A1
has only a single supporting passage. (b) A question benefiting from the union of multiple pieces of evidence
to support the answer. The correct answer A2 has evidence passages that can match both the first half and the
second half of the question. The wrong answer A1 has evidence passages covering only the first half.
and P2, “Galileo discovered the first 4 moons of Jupiter”, mentioning two pieces of evidence to
match the question. In this case, the aggregation of these two pieces of evidence can help entail
the ground-truth answer “Galileo Galilei”. In comparison, the incorrect answer “Isaac Newton”
has passages providing partial evidence on only “physicist, mathematician and astronomer”.
This observation illustrates the way in which multiple passages may provide complementary
evidence to better infer the correct answer to a question.
To provide more accurate answers for open-domain QA, we hope to make better use of multiple
passages for the same question by aggregating both the strengthened and the complementary evidence from all the passages. We formulate the above evidence aggregation as an answer re-ranking
problem. Re-ranking has been commonly used in NLP problems, such as in parsing and translation, in order to make use of high-order or global features that are too expensive for decoding
algorithms (Collins & Koo, 2005; Shen et al., 2004; Huang, 2008; Dyer et al., 2016). Here we apply
the idea of re-ranking; for each answer candidate, we efficiently incorporate global information from
multiple pieces of textual evidence without significantly increasing the complexity of the prediction
of the RC model. Specifically, we first collect the top-K candidate answers based on their probabilities computed by a standard RC/QA system, and then we use two proposed re-rankers to re-score
the answer candidates by aggregating each candidate’s evidence in different ways. The re-rankers
are:
• A strength-based re-ranker, which ranks the answer candidates according to how often their
evidence occurs in different passages. The re-ranker is based on the first observation if an answer
candidate has multiple pieces of evidence, and each passage containing some evidence tends to
predict the answer with a relatively high score (although it may not be the top score), then the
candidate is more likely to be correct. The passage count of each candidate, and the aggregated
probabilities for the candidate, reflect how strong its evidence is, and thus in turn suggest how
likely the candidate is the corrected answer.
• A coverage-based re-ranker, which aims to rank an answer candidate higher if the union of all its
contexts in different passages could cover more aspects included in the question. To achieve this,
for each answer we concatenate all the passages that contain the answer together. The result is a
new context that aggregates all the evidence necessary to entail the answer for the question. We
then treat the new context as one sequence to represent the answer, and build an attention-based
match-LSTM model (Wang & Jiang, 2017) between the sequence and the question to measure
how well the new aggregated context could entail the question.
Overall, our contributions are as follows: 1) We propose a re-ranking-based framework to make use
of the evidence from multiple passages in open-domain QA, and two re-rankers, namely, a strength2
Under review as a conference paper at ICLR 2018
based re-ranker and a coverage-based re-ranker, to perform evidence aggregation in existing opendomain QA datasets. We find the second re-ranker performs better than the first one on two of the
three public datasets. 2) Our proposed approach leads to the state-of-the-art results on three different
datasets (Quasar-T (Dhingra et al., 2017b), SearchQA (Dunn et al., 2017) and TriviaQA (Joshi
et al., 2017)) and outperforms previous state of the art by large margins. In particular, we achieved
up to 8% improvement on F1 on both Quasar-T and SearchQA compared to the previous best results.
2
M ETHOD
Given an open-domain question q, the problem we are solving is to find the correct answer ag to q
based on all the information from the web. To retrieve all the contexts most related to the question,
an IR model (with the help of a search engine such as Google or Bing) is used to provide the top-N
candidate passages, p1 , p2 , . . . , pN , from the web. Then a reading comprehension (RC) model is
used to extract the answer from these passages.
This setting is different from closed-domain QA (Rajpurkar et al., 2016), where a single fixed passage is given, from which the answer is to be extracted. When developing a closed-domain QA
system, we can use the specific positions of the answer sequence in the given passage for training.
In comparison, in the open-domain setting, the RC models are usually trained under distant supervision (Chen et al., 2017; Dhingra et al., 2017b; Joshi et al., 2017). Specifically, as the training data
does not label the positions of the answer spans in passages, during the training stage, the RC model
will match all passages that contain the ground-truth answer with the question one by one. Throughout the paper, we will first directly apply an existing RC model called R3 (Wang et al., 2017) to
extract the candidate answers.
After the candidate answers are extracted, we start to aggregate evidence from multiple passages
for better answer prediction by adopting a re-ranking approach over answer candidates. Given a
question q, suppose we have a baseline open-domain QA system that could generate the top-K
answer candidates a1 , . . . , aK , each being a text span in some passage pi . The goal of the re-ranker
is to rank this list of candidates such that the top-ranked candidates have more chance to be the
correct answer ag .
This re-ranking step considers more powerful features and more context information that cannot
be easily handled by the baseline system. In this paper, we investigate two types of such more
powerful information based on the multiple pieces of evidence for each answer: evidence strength
and evidence coverage, as aggregated from multiple passages. An overview of our method is shown
in Figure 2.
2.1
E VIDENCE AGGREGATION FOR S TRENGTH - BASED R E - RANKER
For open-domain QA, unlike the closed-domain setting, we have more passages retrieved by the IR
model and the ground-truth answer may appear in different passages, which means different answer
spans may be referring to the same answer. Considering this property, we provide two features to
further re-rank the top-K answers generated by the RC model.
Measuring Strength by Count For this re-ranking method, we hypothesize that the more passages we have that could entail a particular answer for the question, the stronger the evidence is for
that answer. In the top-K answer spans generated by the RC model, each time an answer appears
in the top-K answer list, we increase the counter for that answer by one. In this way, in the end the
answer with the highest count will be predicted to be the final answer.
Measuring Strength by Probability Since we can get the probability of each answer span in a
passages based on the RC model, we can also sum up the probabilities of the answer spans that are
referring to the same answer. Then the answer with the highest probability would be the final prediction 1 . In the re-ranking scenario, it is not necessary to exhaustively consider all the probabilities
of all the spans in the passages, as there may be a large number of different answer spans and most
of them are irrelevant to the ground-truth answer.
1
This is an extension of the Attention Sum method in (Kadlec et al., 2016) from single-token answers to
phrase answers.
3
Under review as a conference paper at ICLR 2018
Figure 2: An overview of the full re-ranker. It consists of strength-based and coverage-based reranking.
Remark: Note that neither method above requires new model training. Both methods just take
the candidate predictions from the baseline QA system and then perform counting or probability
calculation. During testing the time complexity of strength-based re-ranking is negligible.
2.2
E VIDENCE AGGREGATION FOR C OVERAGE - BASED R E - RANKER
This section focuses on another type of evidence aggregation which needs to take the union of
complementary information from different evidence passages. As shown in Figure 1, the two answer
candidates both have evidence matching the first half of the question. However, only the correct
answer has evidence that could also match the second half. In this case, the strength-based re-ranker
will treat both answer candidates the same due to the equal amount of supporting evidence, while
actually the second answer has complementary evidence satisfying all aspects of the question. To
handle such case, we propose a coverage-based re-ranker that could rank the answer candidates
according to whether the unions of their evidence from different passages could well cover the
question.
In order to take the union of evidence into consideration, we first concatenate the passages containing
the answer into a single pseudo passage. Then we measure how well the new passage could entail
the answer for the question. As examples shown in Figure 1(b), we hope the textual entailment
model could reflect (i) how each aspect of the question is matched by the union of multiple passages,
where we simply define the aspect to be one hidden state of bi-directional LSTM; (ii) whether all the
aspects of the question can be matched by the union of multiple passages. The match-LSTM (Wang
& Jiang, 2016) model is one way to achieve the above effect in entailment. Therefore we build our
coverage-based re-ranker on top of the concatenated pseudo passages through match-LSTM. The
detailed method is described below.
Passage Aggregation We consider the top-K answers, a1 , . . . , aK , provided by the baseline QA
system. For each answer ak , k ∈ [1, K], we concatenate all the passages that contain ak , {pn |ak ∈
pn , n ∈ [1, N ]}, to form the union passage p̂k . Our further model is to identify which union
passage, e.g., p̂k , could better entail its answer, e.g., ak , for the question.
Measuring Aspect(Word)-Level Matching As discussed earlier, the first mission of the
coverage-based re-ranker is to measure how each aspect of the question is matched by the union
4
Under review as a conference paper at ICLR 2018
of multiple passages. We achieve this with word-by-word attention followed by a comparison module.
First, we write the answer candidate a, question q and the union passage p̂ of a as matrices A, Q, P̂,
with each column being the embedding of a word in the sequence. We then feed them to the bidirectional LSTM as follows:
Ha = BiLSTM(A), Hq = BiLSTM(Q),
Hp = BiLSTM(P̂),
(1)
where Ha ∈ Rl×A , Hq ∈ Rl×Q and Hp ∈ Rl×P are the hidden states for the answer candidate,
question and passage respectively; l is the dimension of the hidden states, and A,Q and P are the
length of the three sequences, respectively.
Next, we enhance the question representation Hq with Ha :
Haq
[Ha ; Hq ],
=
(2)
where [·; ·] is the concatenation of two matrices in row and Haq ∈ Rl×(A+Q) . As most of the answer
candidates do not appear in the question, this is for better matching with the passage and finding
more answer-related information from the passage. Now we can view each aspect of the question
as a column vector (i.e. a hidden state at each word position in the answer-question concatenation)
in the enhanced question representation Haq . Then the task becomes to measure how well each
column vector can be matched by the union passage; and we achieve this by computing the attention
vector Parikh et al. (2016) for each hidden state of sequences a and q as follows:
aq
(3)
α = SoftMax (Hp )T Haq , H = Hp α,
where α ∈ RP ×(A+Q) is the attention weight matrix which is normalized in column through softaq
max. H ∈ Rl×(A+Q) are the attention vectors for each word of the answer and the question by
weighted summing all the hidden states of the passage p̂. Now in order to see whether the aspects
in the question can be matched by the union passage, we use the following matching function:
aq J aq
H
H
m Haq − Haq
+ bm ⊗ e(A+Q) ,
(4)
M = ReLU
aq
W
H
aq
H
J
where · ⊗ e(A+Q) is to repeat the vector (or scalar) on the left A + Q times; (· ·) and (· − ·) are the
element-wise operations for checking whether the word in the answer and question can be matched
by the evidence in the passage. We also concatenate these matching representations with the hidden
aq
state representations Haq and H , so that some stop words or punctuation representations may not
affect the final aspect-level matching representations M ∈ R2l×(A+Q) , which is computed through
the non-linear transformation on four different representations with parameters Wm ∈ R2l×4l and
b m ∈ Rl .
Measuring the Entire Question Matching Next, in order to measure how the entire question is
matched by the union passage p̂ by taking into consideration of the matching result at each aspect,
we add another bi-directional LSTM on top of it to aggregate the aspect-level matching information 2 :
Hm = BiLSTM(M), hs = MaxPooling(Hm ),
(5)
where Hm ∈ Rl×(A+Q) is to denote all the hidden states and hs ∈ Rl , the max of pooling of each
dimension of Hm , is the entire matching representation which reflects how well the evidences in
questions could be matched by the union passage.
2
Note that we use LSTM here to capture the conjunction information (the dependency) among aspects,
i.e. how all the aspects are jointly matched. In comparison simple pooling methods will treat the aspects
independently. Low-rank tensor inspired neural architectures like in (Lei et al., 2017) could be another choice
and we will investigate them in future work.
5
Under review as a conference paper at ICLR 2018
Re-ranking Objective Function Our re-ranking is based on the entire matching representation.
For each candidate answer ak , k ∈ [1, K], we can get a matching representation hsk between the
answer ak , question q and the union passage p̂k through Eqn. (1-5). Then we transform all representations into scalar values followed by a normalization process for ranking as follows:
R = Tanh (Wr [hs1 ; hs2 ; ...; hsK ] + br ⊗ eK ) , o = Softmax(wo R + bo ⊗ eK ),
(6)
where we concatenate the match representations for each answer in row through [·; ·], and do a
non-linear transformation by parameters Wr ∈ Rl×l and br ∈ Rl to get hidden representation
R ∈ Rl×K . Finally, we map the transformed matching representations into scalar values through
parameters wo ∈ Rl and wo ∈ R. o ∈ RK is the normalized probability for the candidate answers
to be ground-truth. Due to the aliases of the ground-truth answer, there may be multiple answers in
the candidates are ground-truth, we use KL distance as our objective function as follows:
K
X
yk (log(yk ) − log(ok )) ,
(7)
k=1
where yk indicates whether ak the ground-truth answer or not and is normalized by
ok is the ranking output of our model for ak .
2.3
PK
k=1
yk and
C OMBINATION OF D IFFERENT T YPES OF AGGREGATIONS
Although the coverage-based re-ranker tries to deal with more difficult cases compared to the
strength-based re-ranker, the strength-based re-ranker works on more common cases according to
the distributions of most open-domain QA datasets. As a result we hope to make the best of both
methods.
We achieve our full re-ranker by weighted combination of the outputs of the above different rerankers without further training. Specifically, we first use softmax to re-normalize the top-5 answer
scores provided by the two strength-based rankers and the one coverage-based re-ranker; we then
weighted sum up the scores for the same answer and select the answer with the largest score as the
final prediction.
3
E XPERIMENTAL S ETTINGS
We conduct experiments on three publicly available open-domain QA datasets, namely, QuasarT (Dhingra et al., 2017b), SearchQA (Dunn et al., 2017) and TriviaQA (Joshi et al., 2017). These
datasets contain passages retrieved for all questions using a search engine such as Google or Bing.
We do not retrieve more passages but use the provided passages only.
3.1
DATASETS
The statistics of the three datasets are shown in Table 1.
Quasar-T 3 (Dhingra et al., 2017b) is based on a trivia question set and uses Lucene to collect
100 sentence-level passages for each question from the ClueWeb09 data source. The human performance is evaluated in an open-book setting, i.e., the human subjects had access to the same passages
retrieved by the IR model and tried to find the answers from the passages.
SearchQA 4 (Dunn et al., 2017) is based on Jeopardy! questions and uses Google to collect about 50
web page snippets as passages for each question. The human performance is evaluated in a similar
way to the Quasar-T dataset.
TriviaQA (Open-Domain Setting) 5 (Joshi et al., 2017) collected trivia questions coming from
14 trivia and quiz-league websites, and makes use of the Bing Web search API to collect the top 50
3
https://github.com/bdhingra/quasar
https://github.com/nyu-dl/SearchQA
5
http://nlp.cs.washington.edu/triviaqa/data/triviaqa-unfiltered.tar.gz
4
6
Under review as a conference paper at ICLR 2018
#q(train) #q(dev) #q(test)
Quasar-T
SearchQA
TriviaQA
28,496
99,811
66,828
3,000
13,893
11,313
#p
3,000 100
27,247 50
10,832 100
#p(truth) #p(aggregated)
14.8
16.5
16.0
5.2
5.4
5.6
Table 1: Statistics of the datasets. #q represents the number of questions for training (not counting
the questions that don’t have ground-truth answer in the corresponding passages for training set),
development, and testing datasets. #p is the number of passages for each question. For TriviaQA,
we split the raw documents into sentence level passages and select the top 100 passages based on the
its overlaps with the corresponding question. #p(golden) means the number of passages that contain
the ground-truth answer in average. #p(aggregated) is the number of passages we aggregated in
average for top 10 candidate answers provided by RC model.
webpages most related to the questions. We focus on the open domain setting (the unfiltered passage
set) of the dataset 6 and our model uses all the information retrieved by the IR model.
3.2
BASELINES
Our baseline models 7 include the following: GA (Dhingra et al., 2017a;b), a reading comprehension
model with gated-attention; BiDAF (Seo et al., 2017), a RC model with bidirectional attention flow;
AQA (Buck et al., 2017), a reinforced system learning to aggregate the answers generated by the
re-written questions; R3 (Wang et al., 2017), a reinforced model making use of a ranker for selecting
passages to train the RC model. As R3 is the first step of our system for generating candidate
answers, the improvement of our re-ranking methods can be directly compared to this baseline.
TriviaQA does not provide the leaderboard under the open-domain setting. As a result, there is no
public baselines in this setting and we only compare with the R3 baseline.8
3.3
I MPLEMENTATION D ETAILS
We first use a pre-trained R3 model (Wang et al., 2017), which gets the state-of-the-art performance
on the three public datasets we consider, to generate the top 50 candidate spans for the training,
development and test datasets, and we use them for further ranking. During training, if the groundtruth answer does not appear in the answer candidates, we will manually add it into the answer
candidate list.
For the coverage-based re-ranker, we use Adamax (Kingma & Ba, 2015) to optimize the model.
Word embeddings are initialized by GloVe (Pennington et al., 2014) and are not updated during
training. We set all the words beyond Glove as zero vectors. We set l to 300, batch size to 30,
learning rate to 0.002. We tune the dropout probability from 0 to 0.5 and the number of candidate
answers for re-ranking (K) in [3, 5, 10] 9 .
4
R ESULTS AND A NALYSIS
In this section, we will show the results of our different re-ranking methods on the three different
public datasets. We will also show some further analysis on our models.
6
Despite the open-domain QA data provided, the leaderboard of TriviaQA focuses on evaluation of RC
models over filtered passages that is guaranteed to contain the correct answers (i.e. more like closed-domain
setting). The evaluation is also passage-wise, different from the open-domain QA setting.
7
Most of the results of different models come from the public paper. While we re-run model R3 (Wang
et al., 2017) based on the authors’ source code and extend the model to the datasets of SearchQA and TriviaQA
datasets.
8
To demonstrate that R3 serves as a strong baseline on the TriviaQA data, we generate the R3 results
following the leaderboard setting. The results showed that R3 achieved F1 56.0, EM 50.9 on Wiki domain and
F1 68.5, EM 63.0 on Web domain, which is competitive to the state-of-the-arts. This confirms that R3 is a
competitive baseline when extending the TriviaQA questions to open-domain setting.
9
Our code will be released.
7
Under review as a conference paper at ICLR 2018
Quasar-T
EM
F1
SearchQA
EM
F1
TriviaQA (open)
EM
F1
GA (Dhingra et al., 2017a)
BiDAF (Seo et al., 2017)
AQA (Buck et al., 2017)
R3 (Wang et al., 2017)
26.4
25.9
35.3
26.4
28.5
41.7
28.6
40.5
49.0
34.6
47.4
55.3
47.3
53.7
Full Re-Ranker
Strength-Based Re-Ranker (Probability)
Strength-Based Re-Ranker (Counting)
Coverage-Based Re-Ranker
42.3
36.1
37.1
40.6
49.6
42.4
46.7
49.1
57.0
50.4
54.2
53.6
63.2
56.5
61.6
60.6
50.6
49.2
46.1
50.0
57.3
55.1
55.8
57.0
Human Performance
51.5
60.6
43.9
-
-
-
Table 2: Experiment results on three open-domain QA test datasets: Quasar-T, SearchQA and TriviaQA (open-domain setting). EM: Exact Match. Full Re-ranker is the combination of three different
re-rankers.
Figure 3: Performance decomposition according to the length of answers and the question types.
4.1
OVERALL R ESULTS
The performance of our models are shown in Table 2. We use F1 score and Exact Match (EM) as our
evaluation metrics 10 . From the results, we can clearly see that our full re-ranker, the combination of
different re-rankers, can significantly outperform the previous best performance with a large margin,
especially on the datasets of Quasar-T and SearchQA. Moreover, our model is much better than the
human performance on the SearchQA dataset. Besides, we can see that our coverage-based re-ranker
generally achieves good performance on the three datasets, even though its performance is 1% lower
than the strength-based re-ranker on the SearchQA dataset.
4.2
A NALYSIS
In this subsection, we analyze the benefits of our re-ranking models.
Re-ranking performance versus answer lengths and question types Figure 3 decomposes the
performance according to the length of the ground truth answers and the types of questions on
TriviaQA and Quasar-T. We do not include the analysis on SearchQA because the Jeopardy! style
10
Our evaluation is based on the tool from SQuAD (Rajpurkar et al., 2016).
8
Under review as a conference paper at ICLR 2018
Top-K
Quasar-T
EM
F1
SearchQA
EM
F1
TriviaQA (open)
EM
F1
1
3
5
10
35.1
46.2
51.0
56.1
51.2
63.9
69.1
75.5
47.6
54.1
58.0
62.1
41.6
53.5
58.9
64.8
57.3
68.9
73.9
79.6
53.5
60.4
64.5
69.0
Table 3: The upper bound (recall) of the Top-K answer candidates generated by the baseline R3
system (on dev set), which indicates the potential of the coverage-based re-ranker.
Candidate Set
Re-Ranker Results
EM
F1
Upper Bound
EM
F1
top-3
top-5
top-10
40.5
41.8
41.3
46.2
51.0
56.1
47.8
50.1
50.8
53.5
58.9
64.8
Table 4: Results of running coverage-based re-ranker on different number of the top-K answer
candidates on Quasar-T (dev set).
questions are more difficult to distinguish the questions types, and the range of answer lengths is
smaller.
According to the results, the coverage-based re-ranker could outperform the baseline in different
lengths of answers and different types of questions. The strength-based re-ranker (counting) also
gives improvement but is less stable across different datasets, while the strength-based re-ranker
(probability) tends to have results and trends that are close to the baseline curves, which is probably
because the method is dominated by the probabilities predicted by the baseline.
The coverage-based re-ranker and the strength-based re-ranker (counting) have similar trends on
most of the question types. The only exception is that the strength-based re-ranker performs significantly worse compared to the coverage-based re-ranker on the “why” questions. This is possibly
because those questions usually have non-factoid answers, which are less likely to have exactly the
same text spans predicted on different passages by the baseline.
Potential improvement of re-rankers Table 3 shows the percentage of times the correct answer is
included in the top-K answer predictions of the baseline R3 method. More concretely, the scores are
computed by selecting the answer from the top-K predictions with the best EM/F1 score. Therefore
the final top-K EM and F1 can be viewed as recall or upper bound of the top-K predictions. From
the results, we can see that although the top-1 prediction of R3 is not very accurate, there is high
chance that a moderate top-K list could cover the correct answer. This explains why our re-ranking
approach could achieve large improvement. Also by comparing the upper bound performance of
top-5 and our re-ranking performance in Table 2, we can see there is still a clear gap of about 10%
on both datasets and on both F1 and EM, showing the great potential improvement for the re-ranking
model in future work.
Effect of the selection of K for the coverage-based re-ranker As shown in Table 3, with the
increase of K from 1 to 10, the recall of top-K predictions from the baseline R3 system increase
significantly. Ideally, if we use a larger K, then the candidate lists will be more likely to contain
good answers. At the same time, the lists to be ranked are longer thus the re-ranking problem is
harder. Therefore, there is a trade-off between the coverage of rank lists and the difficulty of reranking; and selecting an appropriate K becomes important. Table 4 shows the effects of K on
the performance of coverage-based re-ranker. We train and test the coverage-based re-ranker on the
top-K predictions from the baseline, where K ∈ {3, 5, 10}. The upper bound results are the same
ones from Table 3. The results show that when K is small, like K=3, the performance is not very
good due to the low coverage (thus low upper bound) of the candidate list. With the increase of K,
the performance becomes better, but the top-5 and top-10 results are on par with each other. This
is because the higher upper bound of top-10 results counteracts the harder problem of re-ranking
9
Under review as a conference paper at ICLR 2018
Candidate Set
Re-Ranker Results
EM
F1
Upper Bound
EM
F1
top-10
top-50
top-100
top-200
37.9
37.8
36.4
33.7
56.1
64.1
66.5
68.7
46.1
47.8
47.3
45.8
64.8
74.1
77.1
79.5
Table 5: Results of running strength-based re-ranker (counting) on different number of top-K answer
candidates on Quasar-T (dev set).
Q:
A1:
P1
P2
Which children ’s TV programme , which first appeared in November 1969 , has won a record
122 Emmy Awards in all categories ?
Great Dane
A2: Sesame Street
The world ’s most famous Great Dane first P1: In its long history , Sesame Street has received more Emmy Awards than any other
appeared on television screens on Sept. 13 ,
program , ...
1969 .
premiered on broadcast television ( CBS ) P2: Sesame Street ... is recognized as a pioneer
Saturday morning , Sept. 13 , 1969 , ... yet
of the contemporary standard which combeloved great Dane .
bines education and entertainment in children ’s television shows .
Table 6: An example from Quasar-T dataset. The ground-truth answer is ”Sesame Street”. Q:
question, A: answer, P: passages containing corresponding answer.
longer lists. Since there is no significant advantage of the usage of K=10 while the computation
cost is higher, we report all testing results with K=5.
Effect of the selection of K for the strength-based re-ranker Similar to Table 4, we conduct
experiments to show the effects of K on the performance of the strength-based re-ranker. We run
the strength-based re-ranker (counting) on the top-K predictions from the baseline, where K ∈
{10, 50, 100, 200}. We also evaluate the upper bound results for these Ks. Note that the strengthbased re-ranker runs very fast and the different values of K do not affect the computation speed very
much compared to the other QA components. The results are shown in Table 5, where we achieve
the best results when K=50. The performance drops significantly when K increases to 200. This is
because the ratio of incorrect answers increases a lot, making incorrect answers also likely to have
high counts. When K is smaller, such incorrect answers appear less because statistically they have
lower prediction scores. We report all testing results with K=50.
Examples Table 6 shows an example from Quasar-T where the re-ranker successfully corrected
the wrong answer predicted by the baseline. This is a case where the coverage-based re-ranker
helped: the correct answer “Sesame Street” has evidence from different passages that covers the
aspects “Emmy Award” and “children ’s television shows”. Although it still does not fully match
all the facts in the question, it still helps to rank the correct answer higher than the top-1 prediction
“Great Dane” from the R3 baseline, which only has evidence covering “TV” and “1969” in the
question.
5
R ELATED W ORK
Open Domain Question Answering The task of open domain question answering dates back
to as early as (Green Jr et al., 1961) and was popularized by TREC-8 (Voorhees, 1999). The task
is to produce the answer to a question by exploiting resources such as documents (Voorhees, 1999),
webpages (Kwok et al., 2001) or structured knowledge bases (Berant et al., 2013; Bordes et al.,
2015; Yu et al., 2017).
Recent efforts (Chen et al., 2017; Dunn et al., 2017; Dhingra et al., 2017b; Wang et al., 2017) benefit
from the advances of machine reading comprehension (RC) and follow the search-and-read QA
direction. These deep learning based methods usually rely on a document retrieval module to retrieve
a list of passages for RC models to extract answers. As there is no passage-level annotation about
10
Under review as a conference paper at ICLR 2018
which passages entail the answer, the model has to find proper ways to handle the noise introduced
in the IR step. Chen et al. (2017) uses bi-gram passage index to improve the retrieval step; Dunn
et al. (2017); Dhingra et al. (2017b) propose to reduce the length of the retrieved passages. Wang
et al. (2017) focus more on noise reduction in the passage ranking step, in which a ranker module is
jointly trained with the RC model with reinforcement learning.
To the best of our knowledge, our work is the first to improve neural open-domain QA systems by
using multiple passages for evidence aggregation.
Multi-Step Approaches for Reading Comprehension We are the first to introduce re-ranking
methods to neural open-domain QA and multi-passage RC. Meanwhile, our two-step approach
shares some similarities to the previous multi-step approaches proposed for standard single-passage
RC, in terms of the purposes of either using additional information or re-fining answer predictions
that are not easily handled by the standard answer extraction models for RC.
On cloze-test tasks (Hermann et al., 2015), Epireader Trischler et al. (2016) relates to our work in
the sense that it is a two-step extractor-reasoner model, which first extracts K most probable singletoken answer candidates and then constructs a hypothesis by combining each answer candidate to the
question and compares the hypothesis with all the sentences in the passage. Their model differs from
ours in several aspects: (i) Epireader matches a hypothesis to every single sentence, including all the
“noisy” ones that does not contain the answer, that makes the model inappropriate for open-domain
QA setting; (ii) The sentence matching is based on the sentence embedding vectors computed by
a convolutional neural network, which makes it hard to distinguish redundant and complementary
evidence in aggregation; (iii) Epireader passes the probabilities predicted by the extractor to the
reasoner directly to sustain differentiability, which cannot be easily adapted to our problem to handle
phrases as answers or to use part of passages.
Similarly, (Cui et al., 2017) also combined answer candidates to the question to form hypotheses, and
then explicitly use language models trained on documents to re-rank the hypotheses. This method
benefits from the consistency between the documents and gold hypotheses (which are titles of the
documents) in cloze-test datasets, but does not handle multiple evidence aggregation like our work.
S-Net (Tan et al., 2017) proposes a two-step approach for generative QA. The model first extracts an
text span as the answer clue and then generates the answer according to the question, passage and
the text span. Besides the different goal on answer generation instead of re-ranking like this work,
their approach also differs from ours on that it extracts only one text span from a single selected
passage.
6
C ONCLUSIONS
We have observed that open-domain QA can be improved by explicitly combining evidence from
multiple retrieved passages. We experimented with two types of re-rankers, one for the case where
evidence is consistent and another when evidence is complementary. Both re-rankers helped to
significantly improve our results individually, and even more together. Our results considerably
advance the state-of-the-art on three open-domain QA datasets.
R EFERENCES
Petr Baudiš and Jan Šedivỳ. Modeling of the question answering task in the yodaqa system. In
International Conference of the Cross-Language Evaluation Forum for European Languages, pp.
222–228. Springer, 2015.
Jonathan Berant, Andrew Chou, Roy Frostig, and Percy Liang. Semantic parsing on freebase from
question-answer pairs. In Proceedings of the Conference on Empirical Methods in Natural Language Processing, 2013.
Antoine Bordes, Nicolas Usunier, Sumit Chopra, and Jason Weston. Large-scale simple question
answering with memory networks. Proceedings of the International Conference on Learning
Representations, 2015.
11
Under review as a conference paper at ICLR 2018
Christian Buck, Jannis Bulian, Massimiliano Ciaramita, Andrea Gesmundo, Neil Houlsby, Wojciech Gajewski, and Wei Wang. Ask the right questions: Active question reformulation with
reinforcement learning. arXiv preprint arXiv:1705.07830, 2017.
Danqi Chen, Adam Fisch, Jason Weston, and Antoine Bordes. Reading Wikipedia to answer opendomain questions. In Proceedings of the Conference on Association for Computational Linguistics, 2017.
Michael Collins and Terry Koo. Discriminative reranking for natural language parsing. Computational Linguistics, 31(1):25–70, 2005.
Yiming Cui, Zhipeng Chen, Si Wei, Shijin Wang, Ting Liu, and Guoping Hu. Attention-overattention neural networks for reading comprehension. Proceedings of the Conference on Association for Computational Linguistics, 2017.
Bhuwan Dhingra, Hanxiao Liu, Zhilin Yang, William W Cohen, and Ruslan Salakhutdinov. Gatedattention readers for text comprehension. Proceedings of the Conference on Association for Computational Linguistics, 2017a.
Bhuwan Dhingra, Kathryn Mazaitis, and William W Cohen. QUASAR: Datasets for question answering by search and reading. arXiv preprint arXiv:1707.03904, 2017b.
Matthew Dunn, Levent Sagun, Mike Higgins, Ugur Guney, Volkan Cirik, and Kyunghyun Cho.
SearchQA: A new q&a dataset augmented with context from a search engine. arXiv preprint
arXiv:1704.05179, 2017.
Chris Dyer, Adhiguna Kuncoro, Miguel Ballesteros, and Noah A Smith. Recurrent neural network
grammars. In Proceedings of the Conference on the North American Chapter of the Association
for Computational Linguistics, 2016.
David Ferrucci, Eric Brown, Jennifer Chu-Carroll, James Fan, David Gondek, Aditya A Kalyanpur,
Adam Lally, J William Murdock, Eric Nyberg, John Prager, et al. Building watson: An overview
of the deepqa project. AI magazine, 31(3):59–79, 2010.
Bert F Green Jr, Alice K Wolf, Carol Chomsky, and Kenneth Laughery. Baseball: an automatic
question-answerer. In Papers presented at the May 9-11, 1961, western joint IRE-AIEE-ACM
computer conference, pp. 219–224. ACM, 1961.
Karl Moritz Hermann, Tomas Kocisky, Edward Grefenstette, Lasse Espeholt, Will Kay, Mustafa
Suleyman, and Phil Blunsom. Teaching machines to read and comprehend. In Advances in
Neural Information Processing Systems, pp. 1693–1701, 2015.
Liang Huang. Forest reranking: Discriminative parsing with non-local features. In Proceedings of
the Conference on Association for Computational Linguistics, 2008.
Mandar Joshi, Eunsol Choi, Daniel S. Weld, and Luke Zettlemoyer. Triviaqa: A large scale distantly
supervised challenge dataset for reading comprehension. In Proceedings of the Annual Meeting
of the Association for Computational Linguistics, 2017.
Rudolf Kadlec, Martin Schmid, Ondrej Bajgar, and Jan Kleindienst. Text understanding with the
attention sum reader network. In Proceedings of the Annual Meeting of the Association for Computational Linguistics, 2016.
Diederik Kingma and Jimmy Ba. Adam: A method for stochastic optimization. In Proceedings of
the International Conference on Learning Representations, 2015.
Cody Kwok, Oren Etzioni, and Daniel S Weld. Scaling question answering to the web. ACM
Transactions on Information Systems (TOIS), 19(3):242–262, 2001.
Tao Lei, Wengong Jin, Regina Barzilay, and Tommi Jaakkola. Deriving neural architectures from
sequence and graph kernels. International Conference on Machine Learning, 2017.
Ankur P Parikh, Oscar Täckström, Dipanjan Das, and Jakob Uszkoreit. A decomposable attention
model for natural language inference. In Proceedings of the Conference on Empirical Methods in
Natural Language Processing, 2016.
12
Under review as a conference paper at ICLR 2018
Jeffrey Pennington, Richard Socher, and Christopher D Manning. GloVe: Global vectors for word
representation. In Proceedings of the Conference on Empirical Methods in Natural Language
Processing, 2014.
Pranav Rajpurkar, Jian Zhang, Konstantin Lopyrev, and Percy Liang. SQuAD: 100,000+ questions
for machine comprehension of text. In Proceedings of the Conference on Empirical Methods in
Natural Language Processing, 2016.
Minjoon Seo, Aniruddha Kembhavi, Ali Farhadi, and Hannaneh Hajishirzi. Bidirectional attention
flow for machine comprehension. In Proceedings of the International Conference on Learning
Representations, 2017.
Libin Shen, Anoop Sarkar, and Franz Josef Och. Discriminative reranking for machine translation. In Proceedings of the Conference on the North American Chapter of the Association for
Computational Linguistics, 2004.
Chuanqi Tan, Furu Wei, Nan Yang, Weifeng Lv, and Ming Zhou. S-net: From answer extraction to
answer generation for machine reading comprehension. arXiv preprint arXiv:1706.04815, 2017.
Adam Trischler, Zheng Ye, Xingdi Yuan, and Kaheer Suleman. Natural language comprehension
with the epireader. Proceedings of the Conference on Empirical Methods in Natural Language
Processing, 2016.
Ellen M. Voorhees. The trec-8 question answering track report. In Trec, volume 99, pp. 77–82,
1999.
Shuohang Wang and Jing Jiang. Learning natural language inference with LSTM. In Proceedings of
the Conference on the North American Chapter of the Association for Computational Linguistics,
2016.
Shuohang Wang and Jing Jiang. Machine comprehension using match-LSTM and answer pointer.
In Proceedings of the International Conference on Learning Representations, 2017.
Shuohang Wang, Mo Yu, Xiaoxiao Guo, Zhiguo Wang, Tim Klinger, Wei Zhang, Shiyu Chang,
Gerald Tesauro, Bowen Zhou, and Jing Jiang. R3: Reinforced reader-ranker for open-domain
question answering. arXiv preprint arXiv:1709.00023, 2017.
Mo Yu, Wenpeng Yin, Kazi Saidul Hasan, Cicero dos Santos, Bing Xiang, and Bowen Zhou. Improved neural relation detection for knowledge base question answering. Proceedings of the
Conference on Association for Computational Linguistics, 2017.
13
| 2cs.AI
|
Unconstrained Scene Text and Video Text
Recognition for Arabic Script
Mohit Jain, Minesh Mathew and C. V. Jawahar
arXiv:1711.02396v1 [cs.CV] 7 Nov 2017
Center for Visual Information Technology, IIIT Hyderabad, India.
[email protected], [email protected], [email protected]
Abstract—Building robust recognizers for Arabic has always
been challenging. We demonstrate the effectiveness of an end-toend trainable CNN - RNN hybrid architecture in recognizing Arabic
text in videos and natural scenes. We outperform previous stateof-the-art on two publicly available video text datasets - ALIF
and ACTIV. For the scene text recognition task, we introduce
a new Arabic scene text dataset and establish baseline results.
For scripts like Arabic, a major challenge in developing robust
recognizers is the lack of large quantity of annotated data. We
overcome this by synthesizing millions of Arabic text images
from a large vocabulary of Arabic words and phrases. Our
implementation is built on top of the model introduced here [37]
which is proven quite effective for English scene text recognition.
The model follows a segmentation-free, sequence to sequence
transcription approach. The network transcribes a sequence of
convolutional features from the input image to a sequence of
target labels. This does away with the need for segmenting input
image into constituent characters/glyphs, which is often difficult
for Arabic script. Further, the ability of RNNs to model contextual
dependencies yields superior recognition results.
Keywords—Arabic, Arabic Scene Text, Arabic Video Text, Synthetic Data, Deep Learning, Text Recognition.
I.
I NTRODUCTION
For many years, the focus of research on text recognition
in Arabic has been on printed and handwritten documents [7],
[11], [12], [13]. Majority of the works in this space were on
individual character recognition [12], [13]. Since segmenting
an Arabic word or line image into its sub units is challenging, such models did not scale well. In recent years there
has been a shift towards segmentation-free text recognition
models, mostly based on Hidden Markov Models (HMM) or
Recurrent Neural Networks (RNN). Such models generally
follow a sequence-to-sequence approach wherein the input
line/word image is directly transcribed to a sequence of labels.
Methods such as [9] and [10] use RNN based models for
recognizing printed/handwritten Arabic script. Our attempt
to recognize Arabic text on videos (video text recognition)
and natural scenes (scene text recognition) follows the same
paradigm. Video text recognition in Arabic has gained interest
recently [24], [25], [38]. There are now two benchmarking
datasets available for the task ALIF [24] and ACTIV [25]. In
the scene text domain, [8] uses sparse coding of SIFT features
for a bag-of-features model using spatial pyramid matching
for the recognition task at the character level in Arabic. To the
best of our knowledge, there has been no work so far on scene
text recognition at word level in Arabic.
The computer vision community experienced a strong
revival of neural networks based solutions in the form of
Deep Learning in recent years. This process was stimulated
Fig. 1: Examples of Arabic Scene Text (left) and Video Text
(right) recognized by our model. Our work deals only with
the recognition of cropped words/lines. The bounding boxes
were provided manually.
by the success of models like Deep Convolutional Neural
Networks (DCNNs) in feature extraction, object detection and
classification tasks as seen in [1], [3]. These tasks however
pertain to a set of problems where the subjects appear in
isolation, rather than appearing as a sequence. Recognising
a sequence of objects often requires the model to predict a
series of description labels instead of a single label. DCNNs are
not well suited for such tasks as they generally work well in
scenarios where the inputs and outputs are bounded by fixed
dimensions. Also, the lengths of these sequence-like objects
might vary drastically and that escalates the problem difficulty. Recurrent neural networks (RNNs) tackle the problems
faced by DCNNs for sequence-based learning by performing
a forward pass for each segment of the sequence-like-input.
Such models often involve a pre-processing/feature-extraction
step, where the input is first converted into a sequence of
feature vectors [4], [5]. These feature extraction stage would
be independent of RNN-pipeline and hence they are not endto-end trainable.
The upsurge in video sharing on social networking websites
and the increasing number of TV channels in today’s world
reveals videos to be a fundamental source of information.
Effectively managing, storing and retrieving such video data is
not a trivial task. Video text recognition can greatly aid video
content analysis and understanding, with the recognized text
giving a direct and concise description of the stories being
depicted in the videos. In news videos, superimposed tickers
running on the edges of the video frame are generally highly
correlated to the people involved or the story being portrayed
and hence provide a brief summary of the news event.
Reading text in natural scenes is relatively harder task
compared to printed text recognition. The problem has been
drawing increasing research interest in recent years. This can
partially be attributed to the rapid development of wearable and
mobile devices such as smart phones, google glass and selfdriving cars, where scene text is a key module to a wide range
of practical and useful applications. While the recognition
of text in printed documents has been studied extensively in
the form of Optical Character Recognition (OCR) Systems,
these methods generally do not generalize very well to a
natural scene setting where factors like inconsistent lighting
conditions, variable fonts, orientations, background noise and
image distortions add to the problem complexity. Even though
Arabic is the fourth most spoken language in the world after
Chinese, English and Spanish, to the best of our knowledge,
there has not been any work in the field of word-level scene
text recognition, which makes this area of research ripe for
exploration.
A. Intricacies of Arabic Script
Automatic recognition of Arabic is a pretty challenging
task due to various intricate properties of the script. There
are only 28 letters in the script and it is written in a semicursive fashion from right to left. The letters of the script
are generally connected by a line at its bottom to the letters
preceding and following it, except for 6 letters which can
be linked only to their preceding letters. Such an instance
in a word creates a paw (part-of Arabic word) in the word.
Arabic script has another exceptional characteristic where the
shape of a letter changes depending on whether the letter
appears in the word in isolation, at the beginning, middle
or at the end. In general, each letter can have one to four
possible shapes which might have little or no similarity in
shape whatsoever. Another frequent occurrence in Arabic is
that of dots. The addition of a single dot to a letter can
change the character completely. Arabic also follows ligature,
where two letters when combined form a third different letter
in a way that they cannot be separated by a simple baseline (i.e. a complex shape represents this combined letter).
These distinctive characteristics make automated Arabic script
recognition more challenging than most other scripts.
B. Scene Text and Video Text Recognition
Though there has been a lot of work done in the field of
text transcription in natural scenes and videos for the English
script [4], [5], [14], [30], it is still in a nascent state as far as
Arabic script is considered. Previous attempts made to address
similar problems in English [30], [31] first detect individual
characters and then character-specific DCNN models are used
to recognize these detected characters. The short-comings of
such methods are that they require training a strong character
detector for accurately detecting and cropping each character
out from the original word. In case of Arabic, this task becomes
even more difficult due to the intricacies of the script, as
discussed earlier. Another approach by Jaderberg et al. [14],
was to treat scene text recognition as an image classification
problem instead. To each image, they assign a class label from
a lexicon of words spanning the English language (90K most
frequent words were chosen to put a bound on the span-set).
However, this approach is limited to the size of lexicon used
for its possible unique transcriptions and the large number of
output classes add to training complexity. Hence the model
is not scalable to inflectional languages like Arabic where
number of unique words is much higher compared to English.
Another category of solutions typically embed image and its
text label in a common subspace and retrieval/recognition is
performed on the learnt common representations. For example,
Almazan et al. [32] embed word images and text strings in a
common vector-subspace, and thus convert the task of word
recognition into a retrieval problem. Yao et al. [35] and Gordo
et al. [36] used mid-level features for scene text recognition.
The segmentation-free, transcription approach was proved
quite effective for Indian Scripts OCR [21], [22] where segmentation is often problematic. Similar approach was used in [5]
for scene text recognition. Handcrafted features derived from
image gradients were used with a RNN to map the sequence of
features to a sequence of labels. Unlike the problem of OCR,
scene text recognition required more robust features to yield
results comparable to the transcription based solutions for OCR.
A novel approach combining the robust convolutonal features
and transcription abilities of RNN was introduced by [37]. We
employ this particular architecture where the hybrid CNN - RNN
network with a Connectionist Temporal Classification (CTC)
loss is trained end-to-end.
Works on text extraction from videos has generally been
in four broad categories, edge detection methods [39], [40],
[41], extraction using connected components [42], [43], texture
classification methods [44] and correlation based methods [45],
[46]. The previous attempts at solving video text for Arabic
used two separate routines; one for extracting relevant image
features and another for classifying features to script labels for
obtaining the target transcription. In [38] text-segmentation and
statistical feature extraction are followed by fuzzy k-nearest
neighbour techniques to obtain transcriptions. Similarly, [23]
experiment with two feature extraction routines; CNN based
feature extraction and Deep Belief Network (DBN) based
feature extraction, followed by a Bi-directional Long Short
Term Memory (LSTM) layer [16], [17].
The rest of the paper is organized as follows; Section II
describes the hybrid CNN - RNN architecture we use. Section
III focuses on the Arabic text recognition from a transcription
perspective. Section IV presents the results on benchmarking
datasets, followed by a discussion based on the qualitative
results. Section V concludes with the findings of our work.
II.
H YBRID CNN - RNN A RCHITECTURE
The network consists of three components. The initial
convolutional layers, the middle recurrent layers and a final
transcription layer. This architecture we employ was introduced in [37].
The role of the convolutional layers is to extract robust
feature representations from the input image and feed it into the
recurrent layers, which in turn will transcribe them to an output
sequence of labels or characters. The sequence to sequence
transcription is achieved by a CTC layer at the output.
All the images are scaled to a fixed height before being
fed to the convolutional layers. The convolutional components
then create a sequence of feature vectors from the feature maps
Conv 1
W: 3*3
S: 1
P:1,1
Input
Image
W*32
W*32*64
Conv 2
Conv 3
W: 3*3
W: 3*3
S: 1
S: 1
P:1,1
P:1,1
Max
Max
Pool
Pool
W: 2*2
W: 2*2
S: 2
S: 2
P : 0,0
P : 0,0
W/2*16*128
W/4*8*256
W/4*8*256
Conv 4
W: 3*3
S: 1
P:1,1
Conv 5 Conv 6
W: 3*3
W: 3*3
S: 1
S: 1
P:1,1
P:1,1
Max
Pool
W: 1*2
S: 2
P : 1,0
Batch
Norm.
W/4*4*512
(W/4+1)*4*
512
Conv 7
W: 3*3
S: 1
P: 0,0
Max
Pool
W: 1*2
S: 2
P : 1,0
Batch
Norm.
W/4*2*512
(W/4+2)*1*
512
Bidirectional
LSTM
Bidirectional
LSTM
softmax
Feature
Sequence
(W/4+1) *
512
CTC
1*256
1*256
L
A
B
E
L
S
E
Q
U
E
N
C
E
1* #labels
Fig. 2: The deep neural network architecture employed in our work, which was devised by [37].
The symbols ‘k’, ‘s’ and ‘p’ stand for kernel size, stride and padding size respectively.
by splitting them column-wise, which then act as inputs to
the recurrent layers (Fig. 2). This feature descriptor is highly
robust and most importantly can be trained to be adopted to a
wide variety of problems [1], [3], [14].
On top of the convolutional layers, the recurrent layers
take each frame from the feature sequence generated by the
convolutional layers and make predictions. The recurrent layers
consist of deep bidirectional LSTM nets. Number of parameters
in a RNN is independent of the length of the sequence, hence
we can simply unroll the network as many times as the number
of time-steps in the input sequence. This in our case helps
perform unconstrained recognition as the predicted output can
be any sequence of labels derived from the entire label set.
Traditional RNN units (vanilla RNNs) face the problem of
vanishing gradients [15] and hence (LSTM) units are used
which were specifically designed to tackle the vanishinggradients problem [16], [17]. In a text recognition problem,
contexts from both directions (left-to-right and right-to-left) are
useful and complementary to each other in outputting the right
transcription. Therefore, a combined forward and backward
oriented LSTM is used to create a bi-directional LSTM unit.
Multiple such bi-directional LSTM layers can be stacked to
make the network deeper and gain higher levels of abstractions
over the image-sequences as shown in [18].
The transcription layer at the top of the network is used
to translate the predictions generated by the recurrent layers
into label sequences for the target language. The CTC layer’s
conditional probability is used in the objective function as
shown in [19]. The complete network configuration used for
the experiments can be seen in (Fig. 2).
III.
A RABIC T EXT T RANSCRIPTION
The efficacy of a seq2seq approach lies in the fact that
the input sequence can be transcribed directly to the output
sequence without the need for a target defined at each timestep. This was proven quite effective in recognizing complex
scripts where sub-word segmentation is often difficult [22].
In addition, contextual modelling of the sequence in both
the directions, forward and backward, is achieved by the
bidirectional LSTM block. Contextual information is critical
in making accurate predictions for a Script like Arabic where
there are many similar looking characters/glyphs. The hybrid
architecture replaces the need for any handcrafted features to
be extracted from the image. Instead, more robust convolutional features are fed to the RNN layers.
Fig. 3: Sample images from the rendered synthetic Arabic
scene text dataset. The images closely resemble real world
scene images.
A. Datasets
Models for both video text and scene text recognition
problems are trained using synthetic images rendered from a
large vocabulary using freely available Arabic Unicode fonts
(Fig. 3). For scene text, the images were rendered from a
vocabulary of a quarter million most commonly used words
in Arabic Wikipedia. A random word from the vocabulary is
first rendered into the foreground layer of the image by varying
the font, stroke color, stroke thickness, kerning, skew and
rotation. Later a random perspective projective transformation
is applied to the image, which is then blended with a random
crop from a natural scene image. Finally the foreground layer
is alpha composed with a background layer, which is again a
random crop from a random natural image. The synthetic line
images for video text recognition are rendered from random
text lines crawled from Arabic news websites. The rendering
process is much simpler since real video text usually have
uniform color for the text and background and lacks any
perspective distortion. Details on the rendering process are
described here [20]. Around 2 million video text line images
and 4 million scene text word images were used for training the
respective models. The model for video text recognition task
was initially trained on the Synthetic video text dataset and
then fine-tuned on the train partitions of real-world datasets,
ALIF and ACTIV .
ALIF dataset consists of 6,532 cropped text line images
from 5 popular Arabic News channels. ACTIV dataset is larger
than ALIF and contains 21,520 line images from popular
Arabic News channels. The dataset contains video frames
wherein bounding boxes of text lines are annotated.
A new Arabic scene text dataset was curated by downloading freely available images containing Arabic script from
Google Images. The dataset consists of 2000 word images
of Arabic script occurring in various scenarios like local
CRR =
(nCharacters −
Fig. 4: Sample images from the Arabic scenetext dataset.
B. Implementation Details
Convolutional block in the network follows the VGG architecture [6]. In the 3rd and 4th max-pooling layers, the
pooling windows used are rectangular instead of the usual
square windows used in VGG. The advantage of doing this is
that the feature maps obtained after the convolutional layers are
wider and hence we obtain longer feature sequences as inputs
for the recurrent layers that follow. To enable faster batch
learning, all input images are re-sized to a fixed width and
height (32x100 for scene text and 32x504 for video text). We
have observed that resizing all images to a fixed width is not
affecting the performance much. The images are horizontally
flipped before feeding them to the convolutional layers since
Arabic is read from right to left.
To tackle the problems of training such deep convolutional
and recurrent layers, we used the batch normalization [27]
technique. The network is trained with stochastic gradient descent (SGD). Gradients are calculated by the back-propagation
algorithm. Precisely, the transcription layers’ error differentials
are back-propagated with the forward-backward algorithm,
as shown in [19]. While in the recurrent layers, the BackPropagation Through Time (BPTT) [28] algorithm is applied
to calculate the error differentials. The hassle of manually
setting the learning-rate parameter is taken care of by using
ADADELTA optimization [29].
IV.
R ESULTS AND D ISCUSSION
In this section we demonstrate the efficacy of above architecture in recognizing Arabic script appearing in video frames
and natural scene images. It is assumed that input images
are cropped word images from natural scenes, not full scene
images. Since there were no previous works in Arabic scene
text recognition at word level, the baseline results are reported
on the new Arabic scene text we introduce. For video text
recognition problem the results are reported on two existing
video text datasets - ALIF [23] and ACTIV [25].
Results on video text recognition are presented in Table
I. Since there has been no work done in word-level Arabic
scene text recognition, we compare the results obtained on the
Arabic scene text dataset using a popular free English OCR Tesseract [47]. The performance has been evaluated using the
following metrics; CRR - Character Recognition Rate, WRR Word Recognition Rate, LRR - Line Recognition Rate. In the
below equations, RT and GT stand for recognized text and
ground truth respectively.
EditDistance(RT, GT ))
nCharacters
W RR =
markets & shops, billboards, navigation signs, graffiti, etc, and
spans a large variety of naturally occurring image-noises and
distortions (Fig. 4). The images were manually annotated by
human experts of the script and the transcriptions as well as the
image data is being made publicly available for future research
groups to compare and improve performance upon.
P
LRR =
nW ordsCorrectlyRecognized
nW ords
nT extImagesCorrectlyRecognized
nImages
It should be noted that even though the methods compared
on for video text recognition use a separate convolutional
architecture for feature extraction, unlike the end-to-end trainable architecture, we obtain better character and line-level
accuracies for the Arabic video text recognition task and set
the new state-of-the-art for the same.
TABLE I: Accuracy for Video Text Recognition.
ALIF Test1
CRR(%)
LRR(%)
94.36
55.03
90.73
39.39
83.26
26.91
98.17
79.67
VideoText
ConvNet-BLSTM [23]
DBN-BLSTM [23]
ABBYY [26]
CNN - RNN hybrid network
The hybrid
ALIF Test2
CRR(%)
LRR(%)
90.71
44.90
87.64
31.54
81.51
27.03
97.84
77.98
AcTiV
CRR(%)
LRR(%)
–
–
–
–
–
–
97.44
67.08
CNN - RNN
architecture we employ outperforms previous
video text recognition benchmarks.
TABLE II: Accuracy for Scene Text Recognition.
SceneText
Tesseract [47]
Baseline using the hybrid CNN - RNN
Arabic SceneText Dataset
CRR(%)
WRR(%)
17.07
5.92
75.05
39.43
Lower accuracies on scene text recognition problem testify
the inherent difficulty associated with the problem compared
to printed or video text recognition.
On video text recognition, we report the best results so
far on both the datasets. Scene text recognition is a much
harder problem compared to OCR or video text recognition.
The variability in terms of lighting, distortions and typography
make the learning pretty hard and we provide baseline results
for the same. A qualitative analysis of the recognition tasks
can be seen in Fig. 5.
V.
C ONCLUSION
We demonstrate that the state-of-the-art deep learning
techniques can be successfully adapted to some rather challenging tasks like Arabic text recognition. The newer script
and language agnostic approaches are well suited for low
resource languages like Arabic where the traditional methods
often involved language specific modules. The success of
RNN s in sequence learning problems has been instrumental
in the recent advances in speech recognition and image to text
transcription problems. This came as a boon for languages
like Arabic where the segmentation of words into sub word
units was often troublesome. The sequence learning approach
could directly transcribe the images and also model the context
in both forward and backward directions. With better feature
representations and learning algorithms available, we believe
the focus should now shift to harder problems like scene text
recognition. We hope the introduction of a new Arabic scene
text dataset and the initial results would instill an interest
among the Arabic computer vision community to pursue this
field of research further.
Fig. 5: Qualitative results of Scene Text Recognition. For each image, the annotations on bottom-left and bottom-right are the
label and model prediction, respectively.
ACKNOWLEDGMENT
The authors would like to thank Maaz Anwar, Anjali,
Saumya, Vignesh and Rohan for helping annotate the Arabic
scenetext dataset and Dr. Girish Varma for his timely help and
discussions.
R EFERENCES
[1]
[2]
[3]
[4]
[5]
[6]
[7]
[8]
[9]
[10]
[11]
[12]
[13]
[14]
[15]
[16]
[17]
[18]
[19]
[20]
[21]
A. Krizhevsky, I. Sutskever and G.E. Hinton, Imagenet classification with
deep convolutional neural networks. NIPS 2012.
Y. LeCun, L. Bottou, Y. Bengio and P.Haffiner, Gradient-based learning
applied to document recognition. Proceedings of the IEEE, 1998.
R.B. Girshick, J. Donahue, T. Darrel and J. Malik, Rich feature hierarchies for accurate object detection and semantic segmentation. CVPR
2014.
A. Graves, M. Liwicki, S. Fernandez, R. Bertolami, H. Bunke and J.
Schidhuber, A novel connectionist system for unconstrained handwriting
recognition. TPAMI, 2009.
B. Su and S. Lu, Accuracte scene text recognition based on recurrent
neural network. ACCV 2014.
K. Simonyan and A. Zisserman. Very deep convolutional networks for
large-scale image recognition. CoRR 2014.
Prasad, Rohit, et al. Improvements in hidden Markov model based Arabic
OCR, ICPR 2008.
M. Tounsi, I. Moalla, A.M. Alimi, F. Lebouregois, Arabic characters
recognition in natural scenes using sparse coding for feature representations, ICDAR 2015.
Yousefi, Mohammad Reza, et al. A comparison of 1D and 2D LSTM
architectures for the recognition of handwritten Arabic, SPIE 2015.
Ul-Hasan, Adnan, et al, Offline printed Urdu Nastaleeq script recognition with bidirectional LSTM networks, ICDAR 2013.
El-Hajj, Ramy, Laurence Likforman-Sulem, and Chafic Mokbel, Arabic
handwriting recognition using baseline dependant features and hidden
Markov modeling. ICDAR 2005.
Amin, Adnan, Humoud Al-Sadoun, and Stephen Fischer, Hand-printed
Arabic character recognition system using an artificial network. Pattern
recognition 29.4 (1996): 663-675.
Amin, Adnan. Off-line Arabic character recognition: the state of the
art. Pattern recognition 31.5 (1998): 517-530.
M. Jaderberg, K. Simoyan, A. Vedaldi and A. Zisserman, Reading text
in the wild with convolutional neural networks. IJCV 2015.
Y. Bengio, P.Y. Simard and P. Frasconi, Learning long-term dependencies with gradient descent is difficult. NN 1994.
F.A. Gers, N.N. Schraudolph and J. Schmidhuber, Learning precise
timing with LSTM recurrent networks. JMLR 2002.
S. Hochreiter and J. Schmidhuber, Long short-term memory. Neural
Computation 1997.
A. Graves, A. Mohamed and G.E. Hinton, Speech recognition with deep
recurrent neural networks. ICASSP 2013.
A. Graves, S. Fernandez, F.J. Gomez and J. Schmidhuber, Connectionist temporal classification: labelling unsegmented sequence data with
recurrent neural networks. ICML 2006.
Praveen Krishnan and C.V. Jawahar, Generating Synthetic Data for Text
Recognition. arXiv 2016.
Naveen Sankaran and C.V. Jawahar, Recognition of printed Devanagari
text using BLSTM Neural Network. ICPR 2012.
[22]
[23]
[24]
[25]
[26]
[27]
[28]
[29]
[30]
[31]
[32]
[33]
[34]
[35]
[36]
[37]
[38]
[39]
[40]
[41]
[42]
[43]
[44]
[45]
[46]
[47]
Minesh Mathew, Ajeet Kumar Singh and C.V. Jawahar, Multilingual
OCR for Indic Scripts. DAS 2016.
S. Yousfi, B. Sid-Ahmed and G. Christophe, ALIF: A dataset for Arabic
embedded text recognition in TV broadcast. ICDAR 2015.
Yousfi, Sonia, Sid-Ahmed Berrani, and Christophe Garcia, Arabic
text detection in videos using neural and boosting-based approaches:
Application to video indexing. ICIP 2014.
O. Zayene, J. Hennebert, S.M. Touj, R. Ingold, N.E. Amara, A dataset
for Arabic text detection, tracking and recognition in news videos-AcTiV.
ICDAR 2015.
K. Wang, B. Babenko and S. Belongie, End-to-end scene text recognition. In ICCV, 2011.
S. Ioffe and C. Szegedy, Batch normalization: Accelerating deep
network training by reducing internal covariate shift. ICML 2015.
P.J. Werbos, Backpropagation through time: what it does and how to
do it. Proceedings of the IEEE 1990.
M.D. Zeiler, ADADELTA: an adaptive learning rate method. CoRR
2012.
T. Wang, D.J. Wu, A. Coates and A.Y. Ng, End-to-end text recognition
with convolutional neural networks. CVPR 2014.
A. Bissacco, M. Cummins, Y. Netzer and H. Neven, Photoocr: Reading
text in uncontrolled conditions. ICCV 2013.
Anand Mishra, Karteek Alahari and C.V. Jawahar, Word spotting and
recognition with embedded attributes. TPAMI 2014.
J. Almazan, A. Gordo, A. Fornes and E. Valveny, Scene Text Recognition using Higher Order Langauge Priors. BMVC 2012.
J.A. Rodriguez-Serrano, A. Gordo and F. Perronnin, Label embedding:
A frugal baseline for text recognition. IJCV 2015.
C. Yao, X. Bai, B. Shi and W. Liu, Strokelets : A learned multi-scale
representation for scene text recognition. ICPR 2012.
A. Gordo, Supervised mid-level features for word image representation.
CVPR 2015.
B. Shi, X. Bai and C. Yao, An end-to-end trainable neural network
for image-based sequence recognition and its application to scene text
recognition. arXiv 2015.
Halima, M. Ben, Hichem Karray, and Adel M. Alimi, Arabic text
recognition in video sequences. arXiv 2013.
L. Agnihotri and N. Dimitrova, Text detection for video analysis. CVPR
workshop, 1999.
L. Agnihotri., N.Dimitrova, M.Soletic, Multi-layered Videotext Extraction Method. ICME 2002.
S. Hua,X., X.-R. Chen., Automatic Location of Text in Video Frames.
MIR 2001.
A. K. Jain and B. Yu, Automatic text location in images and video
frames. PR 1998.
R. Lienhart and F. Stuber, Automatic text recognition indigital videos.
Proceedings of SPIE Image and Video 1996.
H. Karray, M. Ellouze and M.A. Alimi, Indexing Video Summaries for
Quick Video Browsing. Computer Communications and Networks 2009.
H. Karray , A.M. Alimi, Detection and Extraction of the Text in a video
sequence. ICES 2005.
M. Kherallah, H. Karray, M. Ellouze, A.M. Alimi, Toward an Interactive Device for Quick News Story Browsing. ICPR 2008,
”Tesseract OCR”, https://github.com/tesseract-ocr/tesseract.
| 1cs.CV
|
arXiv:1801.06634v1 [math.ST] 20 Jan 2018
Joint CLT for eigenvalue statistics from
several dependent large dimensional sample
covariance matrices with application
Weiming Li1,* Zeng Li2,** and Jianfeng Yao3,†
1
School of Statistics and
Management
Shanghai University of Finance
and Economics
e-mail:
*
[email protected]
2
Department of Statistics
Pennsylvania State University
e-mail: ** [email protected]
3
Department of Statistics and
Actuarial Science
The University of Hong Kong
e-mail: † [email protected]
Abstract: Let Xn = (xij ) be a k × n data matrix with complex-valued, independent
and standardized entries satisfying a Lindeberg-type moment condition. We consider
simultaneously R sample covariance matrices Bnr = n1 Qr Xn X∗n Q>
r , 1 ≤ r ≤ R,
where the Qr ’s are nonrandom real matrices with common dimensions p × k (k ≥
p). Assuming that both the dimension p and the sample size n grow to infinity,
the limiting distributions of the eigenvalues of the matrices {Bnr } are identified,
and as the main result of the paper, we establish a joint central limit theorem for
linear spectral statistics of the R matrices {Bnr }. Next, this new CLT is applied
to the problem of testing a high dimensional white noise in time series modelling.
In experiments the derived test has a controlled size and is significantly faster than
the classical permutation test, though it does have lower power. This application
highlights the necessity of such joint CLT in the presence of several dependent sample
covariance matrices. In contrast, all the existing works on CLT for linear spectral
statistics of large sample covariance matrices deal with a single sample covariance
matrix (R = 1).
Keywords and phrases: Large sample covariance matrices, central limit theorem,
linear spectral statistics, white noise test, high-dimensional times series.
MSC 2010 Mathematics Subject Classifications: Primary 62H10; secondary 60B12, 60B20.
1. Introduction
Modern information technology tremendously accelerates computing speed and greatly enlarges the amount of data storage, which enables us to collect, store and analyze data
1
Weiming Li, Zeng Li and Jianfeng Yao/Joint CLT for linear spectral statistics
2
of large dimensions. Classical limit theorems in multivariate analysis, which normally assume fixed dimensions, become no longer applicable for dealing with high dimensional
problems. Random matrix theory investigates the spectral properties of random matrices when their dimensions tend to infinity and hence provides a powerful framework for
solving high dimensional problems. This theory has made systematic corrections to many
classical multivariate statistical procedures in the past decades, see the monographs of Bai
and Silverstein (2010), Yao et al. (2015) and the review papers Johnstone (2007) and Paul
and Aue (2014). It has found diverse applications in various research areas, including signal processing, network security, image processing, statistical genetics and other financial
econometrics problems.
The sample covariance matrix is of central importance in multivariate analysis. Many
fundamental statistics in multivariate analysis can be written as functionals of eigenvalues
of a sample covariance matrix Sn such as linear spectral statistics (LSSs) of the form
f (λ1 ) + · · · + f (λp ) where the λj ’s are eigenvalues of Sn and f (·) is a smooth function.
The wide range of creditable applications in high dimensional statistics triggered an uptick
in the demand for CLTs of such LSSs. Actually one of the most widely used results in
this area is Bai and Silverstein (2004), which considers a sample covariance matrix of the
form Bn = n1 T1/2 Xn X∗n T1/2 , where Xn = (xij ) is p × n matrix consisting of i.i.d. complex
standardized entries and T is a p × p nonnegative Hermitian matrix. A CLT for LSSs
of Bn is established under the so-called Marčenko-Pastur regime, i.e. n, p → ∞, p/n →
c > 0. Further refinement and extensions can be found in Zheng et al. (2015), Chen and
Pan (2015), Zheng et al. (2017a), and Zheng et al. (2017b). Among them, Zheng et al.
(2015) studied the unbiased sample covariance matrix when the population mean vector
is unknown. Chen and Pan (2015) looked into the ultra-high dimensional case when the
dimension p is much larger than the sample size n, that is p/n → ∞ as n → ∞. Zheng et
al. (2017a) derived the CLT for LSSs of large dimensional general Fisher matrices. Zheng
et al. (2017b) attempted to relax the fourth order moment condition in Bai and Silverstein
(2004) and incorporated it into the limiting parameters.
However, this rich literature all deals with a single sample covariance matrix Bn . This
paper, on the contrary, aims at the joint limiting behaviour of functionals of several groups
of eigenvalues coming from different yet closely related sample covariance matrices. Specifically, we consider data samples {yjr }1≤j≤n,1≤r≤R of the form yjr = Qr xj where
(M1) {xj , 1 ≤ j ≤ n} is a sequence of k-dimensional independent and complex-valued
random vectors with independent standardized components (xij ), i.e. Exij = 0 and
E|xij |2 = 1, and the dimension k ≥ p;
Weiming Li, Zeng Li and Jianfeng Yao/Joint CLT for linear spectral statistics
3
(M2) {Qr , 1 ≤ r ≤ R} are R nonrandom real matrices with common dimensions p × k.
The R population covariance matrices {Tnr = Qr Q>
r , r = 1, . . . R} are assumed
product-commutative.
We thus consider R sample covariance matrices given by
n
Bnr
1
1X
∗
yjr yjr
= Qr Xn X∗n Q>
=
r , 1 ≤ r ≤ R,
n j=1
n
(1.1)
where Xn = (x1 , . . . , xn ) is of size k × n, ∗ denotes the conjugate transpose of matrices or
vectors, and > stands for the transpose of real ones. Let (λjr )1≤j≤p be the eigenvalues of
Bnr (1 ≤ r ≤ R), and consider L × R real-valued functions (flr )1≤l≤L, 1≤r≤R . This leads to
the family of L × R LSSs
ϕlr = flr (λ1r ) + · · · + flr (λpr ), 1 ≤ l ≤ L, 1 ≤ r ≤ R .
This paper establishes a joint CLT for these L × R statistics {ϕlr } under appropriate
conditions.
The importance of such joint CLT for LSSs is best explained and illustrated with the
following problem of testing a high dimensional white noise. Indeed, our motivation for the
joint CLT originates from this application to high-dimensional time series analysis. Testing
for white noise is a classical yet important problem in statistics, especially for diagnostic
checks in time series modelling. For high dimensional time series, current literatures focus
on estimation and dimension-reduction aspects of the modelling, including high dimensional VAR models and various factor models. Yet model diagnostics have largely been
untouched. Classical omnibus tests such as the multivariate Hosking and Li-McLeod tests
are no longer suitable for handling high dimensional time series. They become extremely
conservative, losing size and power dramatically. In a very recent work, Li et al. (2016)
looked into this high dimensional portmanteau test problem and proposed several new test
statistics based on single-lagged and multi-lagged sample auto-covariance matrices. More
precisely, let’s consider a p-dimensional time series modelled as a linear process
xt =
X
Al zt−l ,
(1.2)
l≥0
where {zt } is a sequence of independent p-dimensional random vectors with independent
components zt = (zit ) satisfying Ezit = 0, E|zit |2 = 1, E|zit |4 < ∞. Hence {xt } has
Ext = 0, and its lag-τ auto-covariance matrix Στ = Cov(xt+τ , xt ) depends on τ only. In
particular, Σ0 = Var(xt ) denotes the population covariance matrix of the series. The goal
Weiming Li, Zeng Li and Jianfeng Yao/Joint CLT for linear spectral statistics
4
is to test whether xt is a white noise, i.e.
H0 : Cov(xt+τ , xt ) = 0, τ = 1, · · · , q,
(1.3)
where q ≥ 1 is a prescribed constant integer. Let x1 , . . . , xn be a sample generated from
the model (1.2). The lag-τ sample auto-covariance matrix is
n
X
bτ = 1
Σ
xt x∗t−τ ,
n t=1
(1.4)
b τ . For any
where xt = xn+t when t ≤ 0. Li et al. (2016) proposed a test statistic based on Σ
eτ was designed to test the specific
given constant integer 1 ≤ τ ≤ q, their test statistic L
lag-τ autocorrelation of the sequence, i.e.
eτ =
L
p
X
f∗ M
f τ ),
λ2j,τ = Tr(M
τ
j=1
where {λj,τ , j = 1, · · · , p} are the eigenvalues of
n
1 X
1 b
∗
b
f
Στ + Στ =
xt x∗t−τ + xt−τ x∗t ,
Mτ =
2
2n t=1
which is the symmetrized lag-τ sample auto-covariance matrix.
f τ = 1 Xn (Dτ + D> )X∗ , where
Notice that in matrix form M
τ
n
2n
Dτ =
0 In−τ
Iτ
0
!
where Im denotes the mth order unit matrix. They have proved that, under the null
hypothesis, in the simplest setting when xt = zt , the limiting distribution of the test
eτ is
statistic L
ne
p d
1
3c(ν4 − 1)
Lτ − →
− N
, 1+
.
p
2
2
2
Here, p, n → ∞ and p/n → c > 0 and ν4 = E|zit |4 . The null hypothesis should be rejected
eτ . Simulation results also show that this test statistic is consistently
for large values of L
more powerful than the Hosking and Li-McLeod tests even when the latter two have been
size adjusted.
f τ , which can be studied with the
eτ is an LSS of M
It can be seen that the test statistic L
CLT in Bai and Silverstein (2004). Indeed, the non-null eigenvalues of the sample covariance
1/2
1/2
matrix Sn = n1 Tp Xn X∗n Tp considered there are the same as the matrix Sn = n1 Xn Tp X∗n
Weiming Li, Zeng Li and Jianfeng Yao/Joint CLT for linear spectral statistics
5
f τ . However, the test statistic L
eτ can only detect serial
which resembles to the matrix M
dependence in a single lag each time. In order to capture a multi-lag dependence structure,
a naturally more effective way would be accumulating the lags and consider the statistic
Lq =
q
X
τ =1
eτ =
L
q
X
fτ M
f ∗ ).
Tr(M
τ
(1.5)
τ =1
Note that the CLT in Bai and Silverstein (2004) (or in its recent extensions) can only
f τ , while to derive
be used to study the correlations between different LSSs of a given M
the null distribution of Lq , we need to study the correlations between LSSs of several
f τ , 1 ≤ τ ≤ q. Consequently, we need to resort to the joint CLT
covariance matrices M
eτ , 1 ≤ τ ≤ q}. It is worth
studied in this paper to characterize the correlations among {L
noticing that Li et al. (2016) proposed another multi-lagged test statistic Uq by stacking
a number of consecutive observation vectors. It will be shown in this paper that this test
statistic Uq is essentially much less powerful than Lq considered here due to the data loss
caused by observation stacking. This superiority of Lq over Uq demonstrates the necessity
and significance of studying a joint CLT for LSSs of several dependent sample covariance
matrices as proposed in this paper.
The rest of the paper is organized as follows. The main results of the joint CLT of LSSs
of different sample covariance matrices are presented in Section 2. The application on high
dimensional white noise test is provided in Section 3 to demonstrate the utility of this joint
CLT. Numerical studies have also lent full support to the theoretical derivations. Technical
lemmas and proofs are left to Section 4. Finally, Matlab codes for reproducing simulations
in the paper are available at: http://web.hku.hk/~jeffyao/papersInfo.html.
2. Joint CLT for linear spectral statistics of {Bnr }1≤r≤R
2.1. Preliminary knowledge on LSDs of {Bnr }1≤r≤R
Recall that the empirical spectral distribution (ESD) of a p × p square matrix A is the
P
probability measure F A = p−1 pi=1 δλi , where the λi ’s are eigenvalues of A and δa denotes
the Dirac mass at point a. For any probability measure F on the real line, its Stieltjes
transform is defined by
Z
1
m(z) =
dF (x), z ∈ C+ ,
x−z
+
where C denotes the upper complex plane.
The assumptions needed for the existence of limiting spectral distributions (LSDs) of
{Bnr }1≤r≤R are as follows. The setup as well as the following Lemma 2.1 are established
in Zheng et al. (2017b).
Weiming Li, Zeng Li and Jianfeng Yao/Joint CLT for linear spectral statistics
6
Assumption (a) Both dimensions p and n tend to infinity such that cn = p/n → c > 0
as n → ∞.
Assumption (b) Samples are {yjr = Qr xj , j = 1, . . . , n, r = 1, . . . , R}, where Qr is p×k,
xj = (x1j , . . . , xkj )> is k × 1, and the dimension k (k ≥ p) is arbitrary. Moreover,
{xij , i = 1, . . . , k, j = 1, . . . , n} is a k × n array of independent random variables, not
necessarily identically distributed, with common moments
Exij = 0, E|x2ij | = 1,
and satisfying the following Lindeberg-type condition: for each η > 0,
n
R
k
√
1 XXX
2
2
kqir k E|xij |I |xij | > η n/kqir k → 0,
pnη 2 i=1 j=1 r=1
where kqir k is the Euclidean norm of the i-th column vector qir of Qr .
Assumption (c) The ESD Hnr of the population covariance matrix Tnr = Qr Q>
r converges weakly to a probability distribution Hr , r = 1, . . . , R. Also the sequence of
the spectral norm of (Tnr ) is bounded in n and r.
Lemma 2.1. [Theorem 2.1 of Zheng et al. (2017b)] Under Assumptions (a)-(c), almost
surely, the ESD Fnr of Bnr weakly converges to a nonrandom LSD F c,Hr . Moreover, the
Stieltjes transform mr (z) of F c,Hr is the unique solution to the following Marčenko-Pastur
equation
Z
1
mr (z) =
dHr (t) ,
(2.1)
t[1 − c − czmr (z)] − z
on the set {mr (z) ∈ C : −(1 − c)/z + cmr (z) ∈ C+ }.
Define the companion LSD of Bnr as
F c,Hr = (1 − c)δ0 + cF c,Hr .
It is readily checked that F c,Hr is the LSD of the companion sample covariance matrix Bnr =
n−1 X∗n Q>
r Qr Xn (which is n × n), and its Stieltjes transform mr (z) = −(1 − c)/z + cmr (z)
satisfies the so-called Silverstein equation
Z
t
1
+c
dHr (t).
(2.2)
z=−
mr (z)
1 + tmr (z)
2.2. Main Results
Let A and B be two real symmetric p × p matrices satisfying AB = BA. The two matrices
can then be diagonalized simultaneously. We define the joint spectral distribution of (A, B)
Weiming Li, Zeng Li and Jianfeng Yao/Joint CLT for linear spectral statistics
7
as the two-dimensional spectral distribution of the complex matrix A + iB, i.e.,
1
G(x, y) = #{i ≤ p, <(si ) ≤ x, =(si ) ≤ y},
p
where (si ) are the p eigenvalues of A + iB and #E denotes the cardinality of a set E.
Recall the random vector of L × R LSSs of Bnr ’s
Z
f`r (x)dFnr (x)
,
(2.3)
1≤`≤L,1≤r≤R
where (Fnr ) are the corresponding empirical spectral distributions of (Bnr ) and (f`r ) are
L × R measurable functions on the real line. Our aim in this section is to establish the joint
distribution of (2.3) under suitable conditions. The main results are presented as follows.
Assumption (d) The variables {xij , i = 1, . . . , k, j = 1, . . . , n} are independent, with
common moments
Exij = 0, E|x2ij | = 1, βx = E|x4ij | − |Ex2ij |2 − 2, and αx = |Ex2ij |2 ,
and satisfying the following Lindeberg-type condition: for each η > 0
k
n
R
p
1 XXX
2
4
n/kq
k
→ 0.
kq
k
E|x
|I
|x
|
>
η
ir
ir
ij
ij
pnη 6 i=1 j=1 r=1
(2.4)
Assumption (e) Either βx = 0, or the mixing matrices {Qr } are such that the matrices
{Q>
r Qr } are diagonal (therefore with arbitrary βx ).
Assumption (f ) The joint spectral distribution Hnrs of Tnr and Tns converges weakly
to a probability distribution Hrs , 1 ≤ r, s ≤ R.
The framework with Assumptions (d)-(e)-(f) is inspired by the one advocated in Zheng
et al. (2017b). However, an extension is necessary here since we are dealing with several
random matrices simultaneously while only one matrix is considered in the reference.
Theorem 2.1. Under Assumptions (a)-(f ), let f11 , . . . , fLR be L × R functions analytic
on a complex domain containing
√
√ 2
[I(0<c<1) (1 − c)2 lim inf λT
c) lim sup λT
(2.5)
min , (1 +
max ]
n
n
T
with T = {Tnr }, and λT
min and λmax denoting the smallest and the largest eigenvalue of all
the matrices in T, respectively. Then, the random vector
Z
Z
cn ,Hnr
p
f`r (x)dFnr (x) − f`r (x)dF
(x)
.
(2.6)
1≤`≤L,1≤r≤R
Weiming Li, Zeng Li and Jianfeng Yao/Joint CLT for linear spectral statistics
8
converges to an (L × R)-dimensional Gaussian random vector (Xf11 , . . . , XfLR ). The mean
function is
I
1
βx
αx
+
dz,
EXf`r = −
f`r (z)g1 (z)
2πi C1
(1 − g2 (z))(1 − αx g2 (z)) 1 − g2 (z)
where
Z
g1 (z) =
cm3r (z)t2
dHr (t) and
(1 + tmr (z))3
cm2r (z)t2
dHr (t).
(1 + tmr (z))2
Z
g2 (z) =
The covariance function is
1
Cov(Xf`0 r , Xf`s ) =
4π 2
I I
f`0 (z1 )f` (z2 )
∂ 2 g(z1 , z2 )
dz1 dz2 ,
∂z1 ∂z2
(2.7)
C1 C2
where g(z1 , z2 ) = log(1 − a(z1 , z2 )) + log(1 − αx a(z1 , z2 )) − βx a(z1 , z2 ) with
ZZ
cmr (z1 )ms (z2 )t1 t2
dHrs (t1 , t2 ).
a(z1 , z2 ) =
(1 + t1 mr (z1 ))(1 + t2 ms (z2 ))
The contours C1 and C2 are non-overlapping, closed, positively orientated in the complex
plane, and enclosing both the supports of F c,Hr and of F c,Hs .
Remark 1. The centralization term in (2.6) is the expectation of f with respect to the
distribution F cn ,Hnr . This distribution is a finite dimensional version of the LSD F c,Hr ,
which is defined by (2.1) with the parameters (c, Hr ) replaced with (cn , Hnr ). The use of
F cn ,Hnr instead of F c,Hr aims to eliminate the effect of the convergence rate of (cn , Hnr ) to
(c, Hr ).
As an illustrative example of Theorem 2.1, we consider a simplified case where only
two sample covariance matrices are involved, i.e. Xn X0n /n and QXn X0n Q> /n, where Xn
is a p × n matrix of i.i.d. real standard Gaussian variables. The corresponding population
covariance matrices are Ip and Tn := QQ> , respectively. It’s clear that the ESD and its
limit of the identity matrix Ip are both the Dirac measure δ1 . Those of Tn are general
and denoted by Hn and H, respectively. Moreover, the joint spectral distribution function
Hn12 (t1 , t2 ) of Ip and Tn is equal to Hn (t2 ) for t1 = 1 and zero otherwise. Denote the ESDs
of the two sample covariance matrices by Fn1 and Fn2 , respectively, and let
Gn1 (x) = Fn1 (x) − F cn ,δ1 (x) and Gn2 (x) = Fn2 (x) − F cn ,Hn2 (x).
Then for any analytic function f , we have
Z
>
Z
d
p
f (x)dGn1 (x), f (x)dGn2 (x)
→
− N
!
!!
v1
ψ11 ψ12
,
.
v2
ψ12 ψ22
(2.8)
Weiming Li, Zeng Li and Jianfeng Yao/Joint CLT for linear spectral statistics
9
The parameters (v1 , v2 , ψ11 , ψ22 ) of the marginal distributions in (2.8) have been derived by
many authors, see Bai and Silverstein (2004) and Zheng et al. (2017b) for example. While
the covariance parameter ψ12 is new and, from Theorem 2.1, it can be formulated as
I I
c
f (z1 )f (z2 )(m1 (z1 ) + z1 m01 (z1 ))(m2 (z2 ) + z2 m02 (z2 ))
dz1 dz2 ,
v12 = − 2
2π C1 C2
[c − (1 + z1 m1 (z1 )(1 + z2 m2 (z2 )]2
where m1 (z) and m2 (z) are the companion Stieltjes transforms of the LSDs F c,δ1 (x) and
F c,H (x), respectively, and m0 (z) denotes the derivative of m(z) with respect to z. For the
R
simplest function f (z) = z, one may figure out v12 = 2c tdH(t) by the residual theorem.
3. Application to high dimensional white noise test
As discussed in the introduction, a notable application of the joint CLT presented in this
paper is to the high dimensional white noise test. In particular, it is expected that testing
power could be gained by accumulating information across different lags, that is, by using
P
fτ M
f ∗ ) defined in (1.5).
the test statistic Lq = qτ =1 Tr(M
τ
Define the scaled statistic
n
qp
φq = Lq − .
(3.1)
p
2
The null hypothesis will be rejected for large values of φq . We consider high-dimensional
situations where the dimension p is large compared to the sample size n. By applying the
CLT in Theorem 2.1, the asymptotic null distribution of φq is derived as follows.
Theorem 3.1. Let q ≥ 1 be a fixed integer, and assume that
1. {zit , i = 1, · · · , p, t = 1, · · · , n} is a set of i.i.d. real-valued variables satisfying
Ezit = 0, Ezit2 = 1, Ezit4 = ν4 < ∞;
2. Relaxed Marčenko-Pastur regime: both the sample size n and the dimension p grow
to infinity such that
p
p
0 < lim inf ≤ lim sup < ∞.
n→∞ n
n→∞ n
Then in the simplest setting where xt = zt , we have
q d
s(cn )−1/2 {φq − } →
− N (0, 1),
(3.2)
2
where s(u) = q + u(ν4 − 1)(q 2 + q/2).
The proof of this theorem is given in Section 4.
Let Zα be the upper-α quantile of the standard normal distribution at level α. Based on
Theorem 3.1, we obtain a procedure for testing the null hypothesis in (1.3) as follows.
p
q
Multi-Lag-q test: Reject H0 if φq − > Zα s(cn ).
(3.3)
2
Weiming Li, Zeng Li and Jianfeng Yao/Joint CLT for linear spectral statistics
10
3.1. Simulation Experiments
Most of the experiments of this section are designed to compare our test procedure in (3.3)
and the procedure based on the test statistic Uq from Li et al. (2016) using Simes’ method
(Simes, 1986). In Li et al. (2016), several testing procedures are discussed and the test Uq
performs quite satisfactorily in terms of both size and power across different scenarios.
More precisely, let q ≥ 1 be a fixed integer, define p(q + 1)-dimensional vectors yj =
xj(q+1)−q
h i
..
n
. Since Ext = 0 and Στ = Cov(xt+τ , xt ), we have
,
j
=
1,
.
.
.
,
N
,
N
=
.
q+1
xj(q+1)
Σ0 Σ1 · · · Σq
.
.
Σ1 Σ0 . . ..
.
.. . .
..
. Σ1
.
.
Σq · · · Σ1 Σ0 (q+1)p×(q+1)p
Cov(yj ) =
The null hypothesis H0 : Cov(xt+τ , xt ) = 0, τ = 1, · · · , q becomes H0 : Σ1 = · · · = Σq =
0, a test for a block diagonal covariance structure of the stacked sequence {yj }.
When Σ0 = σ 2 Ip , the white noise test of {xt } reduces to a sphericity test of {yj }.
The well known John’s test statistic Uq can be adopted for this purpose. In our case, the
corresponding John’s test statistic Uq is defined as
Uq =
1
p(q+1)
Pp(q+1)
i=1
lq
li,q − lq
2
2
,
where {li,q , i = 1, . . ., p(q + 1)} are the eigenvalues of the sample covariance matrix Sq =
PN
1
∗
j=1 yj yj , and l q is their average.
N
Notice however
h ithat the use of blocks above reduces the sample size n to the number of
n
blocks N = q+1
. This may result in a certain loss of power for the test. To limit such
loss of power, we adopt Simes’ method for multiple hypothesis testing in Simes (1986). To
implement Simes’ method, we denote
(0)
yj = yj (x1 , . . . , xn )
as the previously defined stacked sample. Then we rotate the sample (xj ) and define a
(k)
series of new stacked samples yj for k = 1, . . . , q, that is,
(k)
yj = yj (xk+1 , . . . , xn , x1 , . . . , xk )
Weiming Li, Zeng Li and Jianfeng Yao/Joint CLT for linear spectral statistics
11
Then John’s test statistic Uq can be calculated based on the q + 1 samples, which results
(k)
in q + 1 different statistics {Uq }. Moreover, let Pk , 0 ≤ k ≤ q, denote the (asymptotic)
P-value for the John’s test with the k-th set of yj ’s, i.e.
Pk = 1 − Φ (N Uq(k) − p(q + 1) − ν4 + 2)/2 ,
where Φ(·) is the cumulative distribution function of the standard normal distribution. Let
P(1) ≤ · · · ≤ P(q+1) be a permutation of P0 , . . . , Pq . Then by the Simes method, we reject
k
α at least for one 1 ≤ k ≤ q + 1 for the nominal level α.
H0 if P(k) ≤ q+1
To compare our test statistic φq with multi-lag-q John’s test statistic Uq , we set the
significance level α = 5% and the critical regions of the two tests are
p
(1) Our test φq : {φq > 2q + Z0.95 s(cn ) };
(2) Multi-lag-q John’s test Uq (using Simes’ method): {at least for one 1 ≤ k ≤ q +
k
1, P(k) ≤ q+1
0.05}.
Data are generated following four different scenarios for comparison:
i.i.d.
(I) Test size under Gaussian white noise: xt = zt , (zt ) ∼ Np (0, Ip );
i.i.d.
(II) Test size under Non-Gaussian white noise: xt = zt − 2, (zit ) ∼ Gamma(4, 0.5),
E(zit ) = 2, Var(zit ) = 1, ν4 (zit ) = 4.5;
(III) Test power under a Gaussian spherical AR(1) process: xt = Axt−1 + zt , A = aIp ,
i.i.d.
a = 0.1, (zt ) ∼ Np (0, Ip );
(IV) Test power under a Non-Gaussian spherical AR(1) process: xt = Axt−1 + (zt − 2),
i.i.d.
A = aIp , a = 0.1, (zit ) ∼ Gamma(4, 0.5), E(zit ) = 2, Var(zit ) = 1, ν4 (zit ) = 4.5.
Various (p, n)-combinations are tested to show the suitability of our test statistic for both
low and high dimensional settings. Empirical statistics are obtained using 2000 independent
replications. Table 1 compares the empirical sizes of the two tests φq and Uq . It can be
seen that both of them have reasonable sizes compared to the 5% nominal level across
all the tested (p, n)-combinations. Still, the two tests become slightly conservative under
Non-Gaussian distributions in Scenario (II) compared to the Gaussian case in Scenario (I).
A sample display of these sizes is given in Figure 1 (left panel).
In Table 2, we compare the power of the two tests. Our test φq displays a generally
much higher power than the multi-lag-q John’s test Uq , especially when the dimensions
(p, n) become larger. On the other hand, both tests have slightly lower power under the
Non-Gaussian distribution than under the Gaussian distribution, which is consistent with
the previous observation that the two tests become more conservative with Non-Gaussian
populations. A sample display of these powers is given in Figure 1 (right panel).
Weiming Li, Zeng Li and Jianfeng Yao/Joint CLT for linear spectral statistics
0.08
12
1
φq(q=1)
φq(q=1)
φq(q=3)
φq(q=3)
Uq(q=1)
0.07
0.8
Uq(q=3)
Uq(q=1)
Uq(q=3)
Size
Power
0.06
0.5
0.05
0.04
0.03
50
0.2
200
300
500
(p/n=0.5) dimension p
0
50
200
300
500
(p/n=0.5) dimension p
Fig 1. Sample plots of empirical sizes (left panel) from Table 1 (Scenario II with cn = 0.5) and
empirical powers (right panel) from Table 2 (Scenario III with cn = 0.5).
To further explore the powers of the two tests, we varied the AR coefficient a in Scenario (III) and (IV) from -0.1 to 0.1 (a = 0 corresponds to testing size). Smaller values
of the AR(1) coefficient a are used here leading to a more difficult testing problem and a
generally decreased power for both tests. Three dimensional settings are considered with
p/n ∈ {0.1, 0.5, 1.5} while the sample size is fixed as n = 600. The number of independent
replications is still 2000 in each case. Results for Scenario (III) and (IV) are plotted in
Figure 1. This Figure further consolidates that our test φq dominates Uq under all tested
scenarios. A nonnegligible increase in the testing power of both test statistics as the dimension p becomes larger sheds more light on the blessings of high dimensionality. Still both
tests are more conservative with Non-Gaussian population distribution than with Gaussian
distribution.
3.2. Comparison to a permutation test
As many complex analytic tools are employed to derive the asymptotic null distributions of
the test statistic φq , it is natural to wonder about the performance of a “simple-minded” test
procedure, namely the permutation test. Under the null hypothesis of white noise, since the
Weiming Li, Zeng Li and Jianfeng Yao/Joint CLT for linear spectral statistics
1
1
φq(q=1)
φq(q=1)
0.8
φq(q=3)
Power Values
Power Values
0.8
Uq(q=1)
0.5
Uq(q=3)
0.2
0.05
0
−0.1
Uq(q=1)
0.5
−0.05
0
0.05
(p/n=0.1) AR coefficient a
0.05
0
−0.1
0.1
Power Values
Power Values
Uq(q=3)
0.2
−0.05
0
0.05
(p/n=0.5) AR coefficient a
0.5
0.05
0
−0.1
0.1
−0.05
0
0.05
(p/n=0.5) AR coefficient a
0.1
φq(q=1)
0.8
φq(q=3)
Power Values
Power Values
Uq(q=3)
1
Uq(q=1)
Uq(q=3)
0.2
0.05
0
−0.1
φq(q=3)
Uq(q=1)
φq(q=1)
0.5
0.1
0.2
1
0.8
−0.05
0
0.05
(p/n=0.1) AR coefficient a
φq(q=1)
0.8
φq(q=3)
Uq(q=1)
0.05
0
−0.1
Uq(q=3)
1
φq(q=1)
0.5
φq(q=3)
0.2
1
0.8
13
φq(q=3)
Uq(q=1)
0.5
Uq(q=3)
0.2
−0.05
0
0.05
(p/n=1.5) AR coefficient a
0.1
0.05
0
−0.1
−0.05
0
0.05
(p/n=1.5) AR coefficient a
0.1
Fig 2. Empirical Powers for the two tests with varying AR coefficient a from -0.1 to 0.1. Left panel:
Scenario(III) for Gaussian Distribution. Right panel: Scenario(IV) for Gamma Distribution
Weiming Li, Zeng Li and Jianfeng Yao/Joint CLT for linear spectral statistics
14
sample vectors x1 , . . . , xn have an i.i.d. structure, one can permute these n sample vectors
say B times to obtain an empirical upper 5% quantiles of the test statistic φq . The null
hypothesis will be rejected if the observed statistic φq from the original (non permuted)
sample vectors x1 , . . . , xn is larger than this empirical quantile.
Data are generated following the spherical AR(1) process in Scenario (III) and (IV) to
compare this straightforward test with our test statistic φq . In order to compare the power
performance of two tests, the AR coefficient a takes different values, a = [0, 0.05, 0.09, 0.1]
(a = 0 corresponds to testing size). The sample size is fixed as n = 300 yet data dimension
p varies. As for the permutation test, the permutation times is set as B = 500. The nominal
level is α = 5%. Testing size and power of two tests are shown in Tables 3 and 4 based on
500 replicates for all (p, n) configurations.
It can be seen that the sizes of both tests are well controlled. As for their power, our test
offers an acceptable level while the permutation test consistently performs better in the
tested cases. However, the permutation test is extremely time consuming compared to our
test. For instance, to run one set of (p, n) = (150, 300) combination for 500 replicates, it
takes only 25 seconds with our test, while almost 3 hours for the permutation test with
permutation times B = 500. Particularly the computation time increases greatly when the
sample size n grows. Therefore, our test statistic φq provides a very competitive choice for
testing high dimensional white noise while the classical permutation test is simpler, more
powerful though much slower.
4. Proofs of the main theorems
4.1. Proof of Theorem 2.1
The general strategy for our main Theorem 2.1 follows the methods advocated in Bai and
Silverstein (2004), with its most recent update in Zheng et al. (2017b). However, as we
are dealing with several random matrices simultaneously, all the technical steps for the
implementation of this strategy have to be carefully rewritten. They are presented in this
section.
4.1.1. Sketch of the proof of Theorem 2.1
Let v0 > 0 be arbitrary, xr be any number greater than the right end point of interval
(2.5), and xl be any negative number if the left end point of (2.5) is zero, otherwise choose
√ 2
c) ). Define a contour C as
xl ∈ (0, lim inf p→∞ λT
min (1 −
C = {x + iv : x ∈ {xr , xl }, v ∈ [−v0 , v0 ]} ∪ Cu with Cu = {x ± iv0 : x ∈ [xl , xr ]},
(4.1)
Weiming Li, Zeng Li and Jianfeng Yao/Joint CLT for linear spectral statistics
15
and let Cn = Cu ∪ {x ± iv : x ∈ {xl , xr }, v ∈ [n−1 εn , v0 ]} with εn ≥ n−α for some α ∈ (0, 1).
By definition, the contour C encloses a rectangular region in the complex plane, which
contains the union of the support sets of all the LSDs F c,Hr , 1 ≤ r ≤ R. As a regularized
version of C, Cn excludes a small segment near the real line.
Let mnr (z), mnr (z), m0nr (z), m0nr (z) be the Stieltjes transforms of Fnr , F nr , F cn ,Hnr , and
F cn ,Hnr , respectively, where Fnr is the ESD of Bnr , F cn ,Hnr is the LSD defined in Remark
1, F and F are linked by the equation F = (1 − cn )δ0 + cn F . A major task of proving
Theorem 2.1 is to study the convergence of the empirical process
Mnr (z) := p[mnr (z) − m0nr (z)] = n[mnr (z) − m0nr (z)].
To this end, we need to truncate Mnr (z) as
z ∈ Cn ,
Mnr (z)
cnr (z) = M (x + in−1 ε ) x ∈ {x , x } and v ∈ [0, n−1 ε ],
M
nr
n
l
r
n
−1
−1
Mnr (x − in εn ) x ∈ {xl , xr } and v ∈ [−n εn , 0],
which agrees to Mnr (z) on Cn . This truncation is essential when proving the tightness
cnr (z) on C. Write
M
c
c
c
Mn (z) = Mn1 (z), . . . , MnR (z) ,
we will establish its convergence as stated in the following lemma.
c n (·) converges weakly to a Gaussian process
Lemma 4.1. Under Assumptions (a)-(f ), M
M(·) = (M1 , . . . , MR )(·) on C. The mean function is
EMr (z) =
αx g1 (z)
βx g1 (z)
+
,
(1 − g2 (z))(1 − αx g2 (z)) 1 − g2 (z)
where
Z
g1 (z) =
cm3r (z)t2
dHr (t) and
(1 + tmr (z))3
Z
g2 (z) =
cm2r (z)t2
dHr (t).
(1 + tmr (z))2
The covariance function is
Cov(Mr (z1 ), Ms (z2 )) = −
∂2
[log(1 − a(z1 , z2 )) + log(1 − αx a(z1 , z2 )) − βx a(z1 , z2 )]
∂z1 ∂z2
where
ZZ
a(z1 , z2 ) = c
t1 t2 mr (z1 )ms (z2 )
dHrs (t1 , t2 ).
(1 + t1 mr (z1 ))(1 + t2 ms (z2 ))
From this lemma, Theorem 2.1 follows by similar arguments on Pages 562 and 563 in
Bai and Silverstein (2004).
Weiming Li, Zeng Li and Jianfeng Yao/Joint CLT for linear spectral statistics
16
4.1.2. Proof of Lemma 4.1
Following closely the steps of truncation, centralization and rescaling in Appendix B of
Zheng et al. (2017b), one may find that it is sufficient to prove this lemma under the
assumption that
√
ηn n
|xij | <
,
(4.2)
max1≤r≤R {kqir k}
where the constant ηn → 0 as n → ∞.
Write for r ∈ {1, . . . , R} and z ∈ Cn ,
Mnr (z) = p[mnr (z) − Emnr (z)] + p[Emnr (z) − m0nr (z)]
1
2
:= Mnr
(z) + Mnr
(z).
The Lemma can be proved by verifying three conditions (Bai and Silverstein, 2004):
Condition 1: Finite dimensional convergence of Mn1 (z) in distribution;
Condition 2: Tightness of Mn1 (z) on Cn ;
Condition 3: Convergence of Mn2 (z).
Since the second and third conditions can be obtained directly from Lemma 5.1 in Zheng
et al. (2017b), we only consider the first one by showing that, for any W × R complex
1
(zjr ))1≤j≤W,1≤r≤R converges to a Gaussian
numbers z11 , . . . , zW R , the random vector (Mnr
vector. Without loss of generality, we assume max{kQr k} ≤ 1. We will also denote by K
any constants appearing in inequalities and K may take on different values for different
expressions.
√
With the notation rjr = (1/ n)Qr xj , we define some quantities:
Dr (z) = Bnr − zI, Djr (z) = Dr (z) − rjr r∗jr , Dijr (z) = Dr (z) − rir r∗ir − rjr r∗jr ,
−1
−1
jr (z) = r∗jr D−1
jr (z)rjr − n trTnr Djr (z),
−2
−1
δjr (z) = r∗jr D−2
jr (z)rjr − n trTnr Djr (z),
1
1
1
, βijr (z) =
, β̄jr (z) =
,
βjr (z) =
−1
−1
∗
∗
−1
1 + rjr Djr (z)rjr
1 + rir Dijr (z)rir
1 + n trTnr D−1
jr (z)
1
1
bnr (z) =
,
b
(z)
=
,
12r
1 + n−1 EtrTnr D−1
1 + n−1 EtrTnr D−1
r (z)
12r (z)
which will be frequently used in the sequel. Note that quantities in the last two rows are
all bounded in absolute value by |z|/=(z).
1
By martingale difference decomposition, the process Mnr
(z) can be expressed as
−1
p[mnr (z) − Emnr (z)] = tr[D−1
r (z) − EDr (z)]
Weiming Li, Zeng Li and Jianfeng Yao/Joint CLT for linear spectral statistics
=
n
X
17
−1
−1
−1
trEj [D−1
r (z) − Djr (z)] − trEj−1 [Dr (z) − Djr (z)]
j=1
n
X
= −
(Ej − Ej−1 )βjr (z)r∗jr D−2
jr (z)rjr
j=1
n
dX
(Ej − Ej−1 ) log βjr (z)
= −
dz j=1
n
dX
=
(Ej − Ej−1 ) log 1 + jr (z)β̄jr (z) ,
dz j=1
−1
−1
−1
∗
where the third equality is from the identity D−1
r (z) = Djr (z) − Djr (z)rjr rjr Djr (z)βjr (z)
and the last one is obtained using the identity βjr (z) = β̄jr (z)[1 + β̄jr (z)jr (z)]−1 . We next
show that
n
n
dX
dX
(Ej − Ej−1 ) log 1 + jr (z)β̄jr (z) −
(Ej − Ej−1 )jr (z)β̄jr (z) = op (1).
dz j=1
dz j=1
Considering the second moment of the above difference, by the Cauchy integral formula,
one may get
2
n
dX
E
(Ej − Ej−1 ) log 1 + jr (z)β̄jr (z) − jr (z)β̄jr (z)
dz j=1
I
n
X
log 1 + jr (ζ)β̄jr (ζ) − jr (ζ)β̄jr (ζ)
1
=E
dζ
2
2πi
(z
−
ζ)
|ζ−z|=v/2
j=1
n I
K X
E|jr (ζ)β̄jr (ζ)|4 |dζ|.
≤ 2 4
π v j=1 |ζ−z|=v/2
2
(4.3)
From Lemma A.1 and the truncation in (4.2), we have
k
2 X
K
−1
−1
4
8
> −1
E|jr (ζ)| ≤ 4 E trTnr Djr (ζ)Tnr Djr (ζ̄) +
E|xij | E|qir Djr (ζ)qir |
n
i=1
4
≤ Kn−2 + Kηn4 n−1 ,
by which the right hand side of (4.3) tends to zero. Therefore, we need only to consider
the limiting distribution of
n
n
dX
dX
(Ej − Ej−1 )jr (z)β̄jr (z) =
Ej jr (z)β̄jr (z)
dz j=1
dz j=1
(4.4)
Weiming Li, Zeng Li and Jianfeng Yao/Joint CLT for linear spectral statistics
18
in finite dimensional situations. To verify the Lyapunov condition, one can show that
n
2
X
d
d
E (Ej − Ej−1 ) jr (z)β̄jr (z) I (Ej − Ej−1 ) jr (z)β̄jr (z) ≥
dz
dz
j=1
n
1X
d
≤ 2
E Ej jr (z)β̄jr (z)
j=1
dz
4
→ 0,
where the convergence is again from Lemma A.1 and (4.2). Hence, from the martingale
1
(Billingsley, 1995, Theorem 35.12), the random vector (Mnr
(zjr )) will tend to a Gaussian
vector (Mr (zjr )) with covariance function
n
X
∂
∂
jr (z1 )β̄jr (z1 ) · Ej
js (z2 )β̄js (z2 ) . (4.5)
Cov(Mr (z1 ), Ms (z2 )) = lim
Ej−1 Ej
n→∞
∂z1
∂z2
j=1
We note that the referenced martingale CLT applies also to multidimensional martingale
by considering arbitrary linear combination of its components.
Using the same approach of Bai and Silverstein (2004) on Page 571, one may replace
β̄jr (z) by bnr (z). Then, by (1.15) of Bai and Silverstein (2004), we have
Γnrs (z1 , z2 ):=
n
X
bnr (z1 )bns (z2 )Ej−1 [Ej jr (z1 )Ej js (z2 )]
j=1
"
n
1 X
−1
> −1
= 2
bnr (z1 )bns (z2 ) trEj Q>
r Djr (z1 )Qr Ej Qs Djs (z2 )Qs
n j=1
−1
> −1
+ αx trEj Q>
r Djr (z1 )Qr Ej Qs Djs (z2 )Qs
+ βx
k
X
#
−1
−1
>
q>
ir Ej Djr (z1 )qir qis Ej Djs (z2 )qis
i=1
:= Γ1 + αx Γ2 + βx Γ3 ,
(4.6)
where αx = |Ex211 |2 and βx = E|x411 | − |Ex211 |2 − 2.
Now we derive the limit of the first term in (4.6). The means is to replace D−1
jr (z) (and
−1
similarly Djs (z)) by a proper nonrandom matrix. For this, we introduce such a one
Lr (z) = zI −
n−1
b12r (z)Tnr ,
n
whose inverse spectral norm is bounded, that is,
||Lr (z)||−1 ≤
|b−1
1 + p/(nv)
12r (z)|
≤
.
−1
v
=(zb12r (z))
(4.7)
Weiming Li, Zeng Li and Jianfeng Yao/Joint CLT for linear spectral statistics
19
−1
−1
∗
We will show that the major part of D−1
jr (z) is just −Lr (z). From the identity rir Djr (z) =
βijr (z)r∗ir D−1
ijr (z), we get
−1
−1
−1
D−1
jr (z) + Lr (z) = Lr (z) (Djr (z) + Lr (z)) Djr (z)
X
= L−1
r (z)
i6=j
X
= L−1
r (z)
n−1
b12r (z)Tnr
rir r∗ir −
n
βijr (z)rir r∗ir D−1
ijr (z) −
i6=j
!
D−1
jr (z)
n−1
b12r (z)Tnr D−1
jr (z)
n
= b12r (z)R1r (z) + R2r (z) + R3r (z),
!
(4.8)
where
R1r (z) =
X
−1
∗
−1
L−1
r (z)(rir rir − n Tnr )Dijr (z),
i6=j
X
−1
∗
(βijr (z) − b12r (z))L−1
R2r (z) =
r (z)rir rir Dijr (z),
i6=j
R3r (z) = n−1 b12r (z)L−1
r (z)Tnr
X
−1
D−1
ijr (z) − Djr (z) .
i6=j
−1
From this decomposition, after substituting −L−1
r (z) for Djr (z) in the first term in (4.6),
there are three remaining quantities. Let’s check which one (or ones) of them can be
omitted. From Lemma A.3, (4.7), and (4.3) of Bai and Silverstein (1998), for any p × p
matrix M, we have
2
1/2
E|trR2r (z)M| ≤ nE
2
1/2
(|β12r (z) − b12r (z)| )E
≤ n1/2 K|||M|||
−1
r∗1r D−1
12r MLr (z)r1r
|z|2 (1 + p/(nv))
,
v5
(4.9)
where |||M||| denotes a nonrandom bound on the spectral norm of M. From Lemma A.2,
|trR3r (z)M| ≤ |||M|||
|z|(1 + p/(nv))
.
v3
(4.10)
Again from Lemma A.3 and (4.7), for nonrandom M,
−1
−1
−1
−1
2
E|trR1r (z)M| ≤ nE1/2 |r∗ir D−1
ijr (z)MLr (z)rir − n trTnr Dijr (z)MLr (z)|
≤ n1/2 K||M||
(1 + p/(nv))
.
v2
(4.11)
Weiming Li, Zeng Li and Jianfeng Yao/Joint CLT for linear spectral statistics
20
Therefore, quantities containing R2r (z) and R3r (z) are both negligible. For the quantity
−1
−1
−1
∗
involving R1r (z), applying the identity D−1
js (z) = Dijs (z) − Dijs (z)rjs rjs Dijs (z)βijs (z), it
can be divided into three parts, that is,
> −1
trQ>
r Ej (R1r (z1 ))Qr Qs Djs (z2 )Qs = R11 (z1 , z2 ) + R12 (z1 , z2 ) + R13 (z1 , z2 ),
(4.12)
where
R11 (z1 , z2 ) = −
X
−1
> −1
∗
> −1
βijs (z2 )r∗ir Ej (D−1
ijr (z1 ))Qr Qs Dijs (z2 )ris ris Dijs (z2 )Qs Qr Lr (z1 )rir ,
i<j
R12 (z1 , z2 ) = −tr
X
−1
−1
−1
−1
>
>
L−1
r (z1 )n Tnr Ej (Dijr (z1 ))Qr Qs (Djs (z2 ) − Dijs (z2 ))Qs Qr ,
i<j
R13 (z1 , z2 ) = tr
X
−1
∗
−1
> −1
>
L−1
r (z1 )(rir rir − n Tnr )Ej (Dijr (z1 ))Qr Qs Dijs (z2 )Qs Qr .
i<j
From Lemma A.2 and (4.7) we get |R12 (z1 , z2 )| ≤ (1 + p/(nv0 ))/v03 , and similar to (4.9),
E|R13 (z1 , z2 )| ≤ n1/2 (1 + p/(nv0 ))/v03 . Thus these two parts are trivial. We then turn to
dealing with R11 (z1 , z2 ). Using Lemma A.1, Lemma A.3, and (4.3) of Bai and Silverstein
(1998) we get, for i < j,
−1
> −1
∗
> −1
E βijs (z2 )r∗ir Ej (D−1
ijr (z1 ))Qr Qs Dijs (z2 )ris ris Dijs (z2 )Qs Qr Lr (z1 )rir
−1
> −1
>
> −1
>
−b12s (z2 )n−2 tr Ej (D−1
ijr (z1 ))Qr Qs Dijs (z2 )Qs Qr tr Dijs (z2 )Qs Qr Lr (z1 )Qr Qs }
≤ Kn−1/2 .
So we may simplify R11 (z1 , z2 ) by replacing βijs (z2 ) with b12s (z2 ) and remove the random
parts of rir and ris . By Lemma A.2, we have
−1
> −1
>
> −1
>
tr Ej (D−1
ijr (z1 ))Qr Qs Dijs (z2 )Qs Qr tr Dijs (z2 )Qs Qr Lr (z1 )Qr Qs }
−1
> −1
>
> −1
>
≤ Kn.
−tr Ej (D−1
jr (z1 ))Qr Qs Djs (z2 )Qs Qr tr Djs (z2 )Qs Qr Lr (z1 )Qr Qs }
−1
−1
It implies that we may further replace D−1
ijr (z1 ) and Dijs (z2 ) in R11 (z1 , z2 ) with Djr (z1 )
and D−1
js (z2 ), respectively, which yields
E R11 (z1 , z2 )
+
j−1
−1
> −1
> −1
> −1
b12s (z2 )tr Q>
r Ej (Djr (z1 ))Qr Qs Djs (z2 )Qs tr Qs Djs (z2 )Qs Qr Lr (z1 )Qr
2
n
Weiming Li, Zeng Li and Jianfeng Yao/Joint CLT for linear spectral statistics
≤ Kn1/2 .
21
(4.13)
Integrating the results in (4.8)-(4.13), we obtain
−1
> −1
tr Q>
r Ej (Djr (z1 ))Qr Qs Djs (z2 )Qs
j−1
> −1
> −1
b12r (z1 )b12s (z2 )tr Qs Djs (z2 )Qs Qr Lr (z1 )Qr
× 1+
n2
> −1
−1
= −trQ>
r Lr (z1 )Qr Qs Djs (z2 )Qs + R14 (z1 , z2 ),
(4.14)
where E|R14 (z1 , z2 )| ≤ Kn1/2 . Furthermore, from this and (4.8)-(4.11), we may substitute
−1
for the second and third D−1
js (z2 ) in (4.14) with −Ls (z2 ) and then get
−1
> −1
tr Q>
E
(D
(z
))Q
Q
D
(z
)Q
j
1
r
2
s
r
s
jr
js
j−1
> −1
> −1
b12r (z1 )b12s (z2 )tr Qs Ls (z2 )Qs Qr Lr (z1 )Qr
× 1−
n2
−1
> −1
= trQ>
r Lr (z1 )Qr Qs Ls (z2 )Qs + R15 (z1 , z2 ),
(4.15)
where E|R15 (z1 , z2 )| ≤ Kn1/2 .
From Lemma A.2 and (4.3) of Bai and Silverstein (1998), we have
|b12r (z) − bnr (z)| ≤ Kn−1
and |bnr (z) − Eβ1r (z)| ≤ Kn−1/2 ,
respectively. By (2.2) of Silverstein (1995) and discussions in Section 5 of Bai and Silverstein
(1998), we have
Eβ1r (z) = −zEmnr (z) and |Emnr (z) − m0nr (z)| ≤ Kn−1 ,
respectively. Therefore, we get
|b12r (z) + zm0nr (z)| ≤ Kn−1/2 .
Combining this and (4.15), it follows that
j−1 0
tr
1−
mnr (z1 )m0ns (z2 )
n2
>
0
−1
>
0
−1
×tr Qs (I + mns (z2 )Tns ) Qs Qr (I + mnr (z1 )Tnr ) Qr
j−1
−1
>
> −1
= tr Qr Ej (Djr (z1 ))Qr Qs Djs (z2 )Qs 1 −
cn m0nr (z1 )m0ns (z2 )
n
Z Z
t1 t2 dHprs (t1 , t2 )
×
(1 + t1 m0nr (z1 ))(1 + t2 m0ns (z2 ))
−1
> −1
Q>
r Ej (Djr (z1 ))Qr Qs Djs (z2 )Qs
(4.16)
Weiming Li, Zeng Li and Jianfeng Yao/Joint CLT for linear spectral statistics
ncn
=
z1 z2
Z Z
t1 t2 dHprs (t1 , t2 )
+ R16 (z1 , z2 ),
(1 + t1 m0nr (z1 ))(1 + t2 m0ns (z2 ))
22
(4.17)
where E|R16 (z1 , z2 )| ≤ Kn1/2 . Similar to the arguments in Bai and Silverstein (2004) (page
577), using (4.17) and letting
Z Z
t1 t2 dHprs (t1 , t2 )
0
0
an (z1 , z2 ) = cn mnr (z1 )mns (z2 )
,
(1 + t1 m0nr (z1 ))(1 + t2 m0ns (z2 ))
we get
n
1X
an (z1 , z2 )
i.p.
Γ1 =
+ op (1) −→ − log(1 − a(z1 , z2 )),
n j=1 1 − ((j − 1)/n)an (z1 , z2 )
(4.18)
where
Z Z
a(z1 , z2 ) = cmr (z1 )ms (z2 )
t1 t2 dHrs (t1 , t2 )
.
(1 + tr mr (z1 ))(1 + ts ms (z2 ))
Similar to the derivation of Γ1 , one can easily show that
n
1X
αx an (z1 , z2 )
i.p.
αx Γ2 =
+ op (1) −→ − log(1 − αx a(z1 , z2 )).
n j=1 1 − αx ((j − 1)/n)an (z1 , z2 )
(4.19)
Considering the third term of (4.6), βx Γ3 with βx 6= 0, from Assumption (e), the matrix
> −1
Q>
r Qr is diagonal, so is Qr Lr Qr . Using (4.8)-(4.11) and (4.16), we have
n
k
1 XX > >
−1
> >
βx Γ3 = βx bnr (z1 )bns (z2 ) 2
e Q Ej (D−1
jr (z1 ))Qr ei ei Qs Ej (Djs (z2 ))Qs ei
n j=1 i=1 i r
n
k
1 X X > > −1
> −1
= βx bnr (z1 )bns (z2 ) 2
ei Qr Lr (z1 )Qr ei e>
i Qs Ls (z2 )Qs ei + op (1)
n j=1 i=1
n
1 X
−1
> −1
tr Q>
= βx bnr (z1 )bns (z2 ) 2
r Lr (z1 )Qr Qs Ls (z2 )Qs + op (1)
n j=1
i.p.
−→ βx a(z1 , z2 ).
(4.20)
Collecting the results in (4.5), (4.18)-(4.20), we finally get the covariance function in the
Lemma and the proof of this Lemma is completed.
Weiming Li, Zeng Li and Jianfeng Yao/Joint CLT for linear spectral statistics
23
4.2. Proof of Theorem 3.1
First we show that it is it is enough to establish the following claim: under the (classical)
Marčenko-Pastur regime, i.e., n → ∞, p = pn → ∞ such that p/n → c > 0, it holds that
φq,n −
q d
→
− N (0, s(c)) ,
2
(4.21)
where recall that s(u) = q + u(ν4 − 1)(q 2 + 2q ). Here we use φq,n for φq to signify the
dependence in n. So assume this claim is true. Under the relaxed Marčenko-Pastur regime,
the sequence {pn /n} is bounded below and above. For any subsequence (pnk , nk )k of (pn , n),
we can extract a further subsequence (pnk` , nk` )` such that the ratios pnk` /nk` converge to
α > 0 when ` → ∞. On this subsequence, by Claim (4.21),
φq,nk` −
q d
→
− N (0, s(α)) ,
2
` → ∞.
By continuity of the function u → s(u), we have
q d
−1/2
→
− N (0, 1) ,
s(pnk` /nk` )
φq,nk` −
2
` → ∞.
As this limit is independent of the subsequence and it holds for all such subsequences, the
same limit holds for the whole sequence, that is,
q d
→
− N (0, 1) , ` → ∞.
s(pn /n)−1/2 φq,n −
2
The required asymptotic normality is thus established.
The remaining of the section is devoted to a proof of Claim (4.21) assuming p/n → c > 0.
Define the banded Toeplitz matrix
0 · · · 21 · · · 0
.. . .
..
1
.
. 0
.
2
1
.
1
.
Cn,τ =
. 0 2
0
2
.
.. 1
..
. ..
0
. 2
0 · · · 12 · · · 0 n×n
and
n
1
1 X
b
Nτ =
xt x∗t−τ + xt−τ x∗t = Xn Cn,τ X∗n .
2p t=1+τ
p
Define the associated Fourier series f (λ) of the banded Toeplitz matrix Cn,τ as
f (λ) = lim
n→∞
τ
X
k=−τ
tk eikλ =
1 iτ λ
e + e−iτ λ = cos(τ λ),
2
Weiming Li, Zeng Li and Jianfeng Yao/Joint CLT for linear spectral statistics
24
where tk is entry on the k-diagonal of Cn,τ .
According to the fundamental eigenvalue distribution theorem of Szegö for Toeplitz
forms, see Section 5.2 in Grenander and Szegö (1958) and Theorem 4.1 in Gray (2006), we
can infer that
Lemma 4.2. Suppose {lt , t = 1, · · · , n} are eigenvalues of Cn,τ with Fourier series f (λ),
then
(1) For any positive integer s,
n
1
1X s
lt =
lim
n→∞ n
2π
t=1
Z
0
2π
1
f (λ) dλ =
2π
s
Z
2π
(cos(τ λ))s dλ,
0
(2) For any continuous function on support of {lt , t = 1, · · · , n},
n
1
1X
F (lt ) =
lim
n→∞ n
2π
t=1
Z
2π
F (cos(τ λ)) dλ,
0
(3) Sequence {lt , t = 1, · · · , n} and
2πτ t
, t = 1, · · · , n
cos
n
are asymptotically equally distributed.
The limiting spectral distribution of Cn,τ is also derived in Lemma 3.1 of Bai and Wang
(2015), this useful lemma is stated as follows:
Lemma 4.3. As T → ∞, the ESD of Cn,τ tends to H, which is an Arcsine distribution
with density function
1
H 0 (t) = √
, t ∈ (−1, 1).
π 1 − t2
Recall for the permutation matrices D1 and Dτ = Dτ1 defined in Introduction, it holds
that
>
>
>
D1 D>
1 = D1 D1 = Dτ Dτ = Dτ Dτ = In .
Meanwhile, from the properties of Chebyshev polynomials, we can derive the following
lemma.
has eigenvalue
Lemma 4.4. (1) 12 D1 + D>
1
2πt
cos
, t = 1, · · · , n ,
n
Weiming Li, Zeng Li and Jianfeng Yao/Joint CLT for linear spectral statistics
(2)
1
2
25
Dτ + D>
has eigenvalue
τ
2πt
Tτ cos
, t = 1, · · · , n ,
n
where Tτ (·) stands for the Chebyshev polynomial of order τ .
shares the same asymptotic spectral distribution with Cn,τ as n → ∞.
(3) 12 Dτ + D>
τ
Since
n
X
eτ = 1
xt x∗t−τ + xt−τ x∗t
N
2p t=1
!
q
X
1
Dτ + D>
(x1 , · · · , xn )∗
(x1 , · · · , xn )
=
τ
2p
τ =1
!
q
X
1
= Xn
Dτ + D>
X∗n ,
τ
2p
τ =1
here for t ≤ 0, xt = xn+t , by Lemmas 4.2 and 4.4, it doesn’t take too much effort to see
e τ and N
b τ share the same limiting spectral distribution.
that N
e τ , by
Consider the Stieltjes transform mτ (z) of the limiting spectral distribution of N
implementing the Silverstein equation (2.2), we can infer that mτ (z) satisfies
Z
1
1
t
z=−
+
dHτ (t)
mτ (z) c
1 + tmτ (z)
!
1
1
1
−1 + − p
=
,
mτ (z)
c c 1 − m2τ (z)
where p/n → c > 0 as n → ∞, which coincides with the results in Bai and Wang (2015)
and Li et al. (2016).
Note that our test statistic
Lq =
q
X
τ =1
eτ =
L
q
X
τ =1
fτ M
f∗ ) =
Tr(M
τ
q
p 2 X
n
e τN
e ∗ ),
Tr(N
τ
τ =1
fτ = 1 Σ
bτ + Σ
b ∗ = 1 Pn xt x∗ + xt−τ x∗ , thus the asymptotic properties
where M
τ
t−τ
t
t=1
2
2n
f
e τ since M
fτ = p N
e .
of Mτ can be inferred from those of N
n τ
eτ
Actually in Li et al. (2016), the asymptotic behavior of the single-lag-τ test statistic L
has already been thoroughly explored and characterized. Theorem 2.1 in Li et al. (2016) is
stated as follows:
Lemma 4.5. Let τ ≥ 1 be a fixed integer, and assume that
Weiming Li, Zeng Li and Jianfeng Yao/Joint CLT for linear spectral statistics
26
1. {zit , i = 1, · · · , p, t = 1, · · · , n} are all independently distributed satisfying Ezit =
0, Ezit2 = 1, Ezit4 = ν4 < ∞;
2. (Marčenko-Pastur regime). The dimension p and the sample size n grow to infinity
in a related way such that cn := p/n → c > 0.
eτ
Then in the simplest setting when xt = zt , the limiting distribution of the test statistic L
is
3(ν4 − 1)
p d
1
ne
, 1+
c .
Lτ − →
− N
p
2
2
2
Pq e
Now consider the multi-lag-q test statistic Lq =
τ =1 Lτ , combining with Lemma
4.5,
all we need is the joint distribution of any two different single-lag test statistic, i.e.
er , L
es , 1 ≤ r 6= s ≤ q.
L
For a given integer q > 0, 1 ≤ r 6= s ≤ q, let fr (x) = fs (x) = x2 ,
∗
∗
1
1
Dr + D>
Ds + D>
r Xn Xn , Bns =
s Xn Xn ,
2p
2p
e r = 1 Xn Dr + D> X∗ , B ns = N
e s = 1 Xn Ds + D> X∗ ,
=N
r
n
s
n
2p
2p
Bnr =
Bnr
then both the LSDs of Bnr and Bns , i.e. F c,Hr , F c,Hs have Stieltjes transform mr (z) and
ms (z) satisfying the equation
!
1
1
1
.
z=
−1 + − p
m(z)
c c 1 − m2 (z)
Meanwhile,
e rN
e ∗) =
Tr(N
r
Z
e sN
e ∗) =
fr (x) dFnr (x), Tr(N
s
Z
fs (x) dFns (x).
where Fnr and Fns are the ESDs of Bnr and Bns . Thus, by directly implementing our joint
CLT for linear spectral statistics ofthe samplecovariance matrices,
i.e. Theorem 2.1, we
e1 , · · · , L
eq or any pair of L
er , L
es , 1 ≤ r 6= s ≤ q.
can derive the joint distribution of L
Precisely, the covariance function in Theorem 2.1 for the present case can be calculated to
be
3
1+ 2 c(β2 x +2) , if r = s,
c
(4.22)
Cov (Xfr , Xfs ) =
βx +2 ,
if
r
=
6
s.
c
The details of this lengthy derivation are postponed to Appendix B. Combining with
Lemma 4.5, for any given integer q ≤ 1, it can be inferred that, under the same assumptions
Weiming Li, Zeng Li and Jianfeng Yao/Joint CLT for linear spectral statistics
27
e1 , · · · , L
eq is
in Lemma 4.5, the joint limiting distribution of L
e1
c(ν4 − 1)
1 + 3(ν42−1) c · · ·
L
n . p
d
1
..
..
...
− N 1q ,
,
.. − 1q →
.
.
p
2
2
eq
c(ν4 − 1) · · · 1 + 3(ν42−1) c
L
where 1q = (1, · · · , 1)> is a q dimensional vector with q ones.
Recall that
q
q
p 2 X
X
e ∗ ),
e τN
e
Tr(N
Lq =
Lτ =
τ
n
τ =1
τ =1
then by the Delta method, we can derive the limiting distribution of our test statistic Lq ,
i.e.,
q
n
pq d
q
Lq −
→
− N
, q + c(ν4 − 1)(q 2 + ) .
p
2
2
2
Claim (4.21) is thus established.
5. Discussions
In this paper we have introduced, for the first time in the literature on eigenvalues of
large sample covariance matrices, a joint central limit theorem involving several population covariance matrices. This theorem is believed to provide wide applications to current
problems in high-dimensional statistics, especially for testing on structures of population
covariances. As a show-case, we treated the problem of testing for a high-dimensional
white noise in time series modelling. The derived new test shows very promising performance compared to existing competitors For future study, it would be worth investigating
other significant applications of this CLT.
Acknowledgments. We thank a Referee for the suggestion of the comparison to a
permutation test made in Section 3.1. Weiming Li’s research is partially supported by
National Natural Science Foundation of China, No. 11401037, MOE Project of Humanities
and Social Sciences, No. 17YJC790057, and Program of IRTSHUFE. Jianfeng Yao thanks
support from HKSAR GRF Grant 17305814.
References
Anderson, T. W. (2003). An Introduction to Multivariate Statistical Analysis. 3rd Edition.
John Wiley & Sons.
Weiming Li, Zeng Li and Jianfeng Yao/Joint CLT for linear spectral statistics
28
Bai, Z. D., (1999) Methodologies in spectral analysis of large dimensional random matrices,
a review. Statistica Sinica, 9, 611-677.
Bai, Z. D., Jiang, D. D., Yao, J. F. and Zheng, S. R. (2009). Corrections to LRT on large
dimensional covariance matrix by RMT. Annals of Statistics, 37, 3822-3840.
Bai, Z. D., Jiang, D. D., Yao, J. F., and Zheng, S. R. (2013). Testing linear hypotheses in
high-dimensional regressions. Statistics, 47, 1207-1223.
Bai, Z. D. and Silverstein, J. W. (1998). No eigenvalues outside the support of the limiting
spectral distribution of large-dimensional sample covariance matrices. Ann. Probab., 26,
316-345.
Bai, Z. D. and Silverstein, J. W. (2004). CLT for linear spectral statistics of large dimensional sample covariance matrices. Ann. Probab., 32, 553-605.
Bai, Z. D. and Silverstein, J. W. (2010). Spectral Analysis of Large Dimensional Random
Matrices. Science Press: Beijing.
Bai, Z. D. and Wang, C. (2015). A note on the limiting spectral distribution of a symmetrized auto-cross covariance matrix. Statistics & Probability Letters, 96, 333-340.
Bai, Z. D. and Zhou, W. (2008). Large sample covariance matrices without independence
structures in columns. Statistica Sinica, 28, 425-442.
Chen, B. B. and Pan, G. M. (2015) CLT for linear spectral statistics of normalized sample
covariance matrices with the dimension much larger than the sample size. Bernoulli, 21,
1089-1133.
Billingsley, P. (1995). Probability and Measure. John Wiley & Sons: New York
Burkholder, D. L. (1973). Distribution function inequalities for martingales. Ann. Probab.,
1, 19-42.
Gray, R. M. (2006). Toeplitz and Circulant Matrices: a Review. Now Publishers Inc.
Grenander, U. and Szegö, G.(1958). Toeplitz Forms and Their Applications. In: California
Monographs in Mathematical Sciences. University of California Press, Berkeley.
Johnstone, I. M. (2007). High dimensional statistical inference and random matrices. Int.
Cong. Mathematicians, Vol. I, 307-333. Zürich, Switzerland: European Mathematical
Society.
Li, Z., Yao, J., Lam, C., and Yao, Q. (2016). On testing a high-dimensional white noise.
Manuscript.
Marčenko, V. A. and Pastur, L. A. (1967). Distribution of eigenvalues for some sets of
random matrices. Math. USSR-Sb, 1, 457-483.
Pan, G. M. (2012). Comparison between two types of large sample covariance matrices.
Annales de l’Institut Henri Poincare-Probabiliteset Statistiques, 50, 655-677.
Paul, D. and Aue, A. (2014). Random matrix theory in statistics: A review, Journal of
Weiming Li, Zeng Li and Jianfeng Yao/Joint CLT for linear spectral statistics
29
Statistical Planning and Inference, 150, 1-29.
Silverstein, J. W. (1995). Strong convergence of the empirical distribution of eigenvalues
of large dimensional random matrices. J. Multivariate Anal., 5, 331-339.
Silverstein, J. W. and Bai, Z. D. (1995). On the empirical distribution of eigenvalues of a
class of large dimensional random matrices. J. Multivariate Anal., 54, 175-192.
Silverstein, J. W. and Choi, S. I. (1995). Analysis of the limiting spectral distribution of
large dimensional random matrices. J. Multivariate Anal., 54, 295-309.
Simes, R. J. (1986). An improved Bonferroni procedure for multiple tests of significance.
Biometrika, 73, 751-754.
Srivastava, M. S. (2005). Some tests concerning the covariance matrix in high dimensional
data. J. Japan Statist. Soc., 35, 251–272.
Yao, J. F., Bai, Z. D., and Zheng, S. R. (2015). Large Sample Covariance Matrices and
High-Dimensional Data Analysis, Cambridge University Press.
Zheng, S. R., Bai, Z. D., and Yao, J. F. (2015). Substitution principle for CLT of linear
spectral statistics of high-dimensional sample covariance matrices with applications to
hypothesis testing. Ann. Statist., 43, 546-591.
Zheng, S. R., Bai, Z. D., and Yao, J. F. (2017a). CLT for large dimensional general Fisher
matrices and its applications in high-dimensional data analysis. Bernoulli, 23, 1130-1178.
Zheng, S. R., Bai, Z. D., Yao, J. F., and Zhu, H. T. (2017b). CLT for linear spectral statistics
of large dimensional sample covariance matrices with dependent data. Manuscript.
Appendix A: Mathematical Tools
Lemma A.1. Let X = (X1 , . . . , Xn )> be a (complex) random vector with independent and
standardized entries having finite fourth moment and C = (cij ) be n × n (complex) matrix.
We have
!
n
X
E|X∗ CX − trC|4 ≤ K [tr(CC∗ )]2 +
E|Xii8 ||cii |4 .
i=1
The proof of the lemma follows easily by simple calculus and thus omitted.
Lemma A.2. (Lemma 2.6 of Silverstein and Bai (1995)). Let z ∈ C+ with v = = z, A
and B being n × n with B Hermitian, and r ∈ Cn . Then
kAk
r∗ (B − zI)−1 A(B − zI)−1 r
≤
.
tr (B − zI)−1 − (B + rr∗ − zI)−1 A =
∗
−1
1 + r (B − zI) r
v
Weiming Li, Zeng Li and Jianfeng Yao/Joint CLT for linear spectral statistics
30
Lemma A.3. [Formula 2.3 of Bai and Silverstein (2004)] For any nonrandom p × p
e ` , ` = 1, . . . q2 .
matrices Ck , k = 1, . . . , q1 and C
!
q2
q1
Y
Y
e ` r1r − n−1 trTnr C
e `)
E
(r∗ C
r∗ Ck r1r
1r
1r
`=1
q1
q2
Y
Y
−(1∧q2 ) (q2 −2)∨0
e ` ||,
Kn
δn
||Ck ||
||C
k=1
`=1
k=1
≤
q1 , q2 ≥ 0,
(A.1)
where K is a positive constant depending on q1 and q2 .
Appendix B: Derivation of the covariance (4.22)
Applying Theorem 2.1 to the functions fr (x) = fs (x) where 1 ≤ r 6= s ≤ q, the
corresponding covariance function is
I I
∂ 2 g(z1 , z2 )
1
dz1 dz2 ,
(B.1)
f
(z
)f
(z
)
Cov(Xfr , Xfs ) =
r 1 s 2
4π 2
∂z1 ∂z2
C1 C 2
where g(z1 , z2 ) = log(1 − a(z1 , z2 )) + log(1 − αx a(z2 , z2 )) − βx a(z1 , z2 ) with
ZZ
cmr (z1 )ms (z2 )t1 t2
a(z1 , z2 ) =
dHrs (t1 , t2 ).
(1 + t1 mr (z1 ))(1 + t2 ms (z2 ))
Mapping into our case, we have
1
p ↔ n, n ↔ p, c ↔ , αx = 1, βx = ν4 − 3, fr (x) = fs (x) = x2 ,
c
1
a(z1 , z2 ) =
c
1
=
c
ZZ
mr (z1 )ms (z2 )t1 t2
dHrs (t1 , t2 )
(1 + t1 mr (z1 ))(1 + t2 ms (z2 ))
1
m1 m2 Tr (t)Ts (t)
−1
(1 + Tr (t)m1 )(1 + Ts (t)m2 )
Z
dH(t),
where m1 , mr (z1 ), m2 , ms (z2 ), Tr (t), Ts (t) are Chebyshev polynomial of order r and
s respectively. Furthermore, we have
∂a (z1 , z2 )
1
=
∂z1
c
Z
∂a (z1 , z2 )
1
=
∂z2
c
Z
1
−1
1
−1
Ts (t) m2
Tr (t)
∂m1
·
dH(t),
2 ·
1 + Ts (t) m2 (1 + Tr (t) m1 )
∂z1
Tr (t) m1
Ts (t)
∂m2
·
dH(t),
2 ·
1 + Tr (t) m1 (1 + Ts (t) m2 )
∂z2
Weiming Li, Zeng Li and Jianfeng Yao/Joint CLT for linear spectral statistics
1
∂ 2 a (z1 , z2 )
=
∂z1 ∂z2
c
Z
1
Tr (t)
Ts (t)
∂m1 ∂m2
·
dH(t).
2 ·
2 ·
∂z1 ∂z2
(1 + Tr (t) m1 ) (1 + Ts (t) m2 )
−1
Since g(z1 , z2 ) = 2 log (1 − a(z1 , z2 )) − βx a(z1 , z2 ),
2
∂ a
∂a
· ∂a
∂ 2 log (1 − a(z1 , z2 ))
∂z1 ∂z2
∂z1 ∂z2
,
=−
−
∂z1 ∂z2
1 − a (1 − a)2
Thus
1
Cov (Xfr , Xfs ) = 2
4π
I I
C1
z12 z22
C2
∂ 2 g (z1 , z2 )
dz1 dz2
∂z1 ∂z2
I I
∂2a
∂a
· ∂a
1
1
2 2 ∂z1 ∂z2
=− 2
dz1 dz2 − 2
z1 z2
z12 z22 ∂z1 ∂z22 dz1 dz2
2π C1 C2
1−a
2π C1 C2
(1 − a)
I I
2
βx
∂ a
− 2
dz1 dz2 , M1 + M2 + M3 .
z12 z22
4π C1 C2
∂z1 ∂z2
I I
Consider M1 first, by Cauchy’s residue theorem, we have
I
1
z12
∂ 2a
·
dz1
2πi C1 1 − a ∂z1 ∂z2
I
Z
1
Ts (t)
∂m1 ∂m2
z12
1 1
Tr (t)
=
·
dz1
·
2 ·
2 dH(t) ·
2πi C1 1 − a c −1 (1 + Tr (t) m1 ) (1 + Ts (t) m2 )
∂z1 ∂z2
Z
I
1
∂m2 1 1
Tr (t)Ts (t)
z12
·
dm1 dH(t)
=−
·
∂z2 c −1 (1 + Ts (t) m2 )2 2πi C1 (1 − a) (1 + Tr (t) m1 )2
2
1
1
Z
I
−1 + c − √
c 1−m21
1
∂m2 1 1
Tr (t)Ts (t)
=−
·
·
dm
1 dH(t)
∂z2 c −1 (1 + Ts (t) m2 )2 2πi C1 m21 (1 − a) (1 + Tr (t) m1 )2
∂m2 1
=−
·
∂z2 c
T (t)T (t)
r
s
2
−1 (1 + Ts (t) m2 )
Z
1
2 (1)
1
1
−1 + c − c√1−m2
1
·
(1 − a) (1 + Tr (t) m1 )2
dH(t).
m1 =0
Note that
∂a
1
=
∂m1
c
Z
1
−1
Ts (t)m2
Tr (t)
·
dH(t),
1 + Ts (t) m2 (1 + Tr (t) m1 )2
31
Weiming Li, Zeng Li and Jianfeng Yao/Joint CLT for linear spectral statistics
32
then
2 (1)
1
1
−1 + c − c√1−m2
1
2
(1 − a) (1 + Tr (t) m1 )
1
= −2Tr (t) +
c
Z
1
−1
Ts (u)Tr (u)m2
dH(u),
1 + Ts (u) m2
m1 =0
therefore,
I I
∂ 2a
1
1
2 2
·
dz1 dz2
z z ·
M1 = − 2
2π C1 C2 1 2 1 − a ∂z1 ∂z2
I
Z 1
Z
2
Tr (t)Ts (t)
1 1 Ts (u)Tr (u)m2
2 1
=
z ·
−2Tr (t) +
dH(u) dH(t)dm2
2πi C2 2 c −1 (1 + Ts (t) m2 )2
c −1 1 + Ts (u) m2
2
I −1 + 1c − √ 1 2
Z
c 1−m2
1 1 −2Tr2 (t)Ts (t)
2
·
dH(t)
=
dm2
2
2
2πi C2
m2
c −1 (1 + Ts (t) m2 )
1
+
c
1
=
c
Z
1
2 I
−1 2πi C2
Z
1
−1
−1 + 1c − √ 1
2
Tr (t)Ts (t) Z 1
1
Ts (u)Tr (u)
·
dH(u)
dm
2 dH(t)
2
c
1
+
T
(u)
m
m2 (1 + Ts (t) m2 )
s
−1
2
c
1−m22
2 (1)
1
1
2 −1 + c − √
c 1−m22
2
−2Tr (t)Ts (t) ·
2
(1 + Ts (t) m2 )
dH(t)
m =0
2
Z 1
Z 1
2
1
Ts (u)Tr (u)dH(u) ·
Tr (t)Ts (t)dH(t)
+
c −1
c −1
Z 1
2
Z
8 1 2
2
2
=
T (t)Ts (t)dH(t) + 2
Ts (u)Tr (u)dH(u) .
c −1 r
c
−1
Similarly, for M2 , considering
I
1
1
∂a ∂a
z12 ·
·
dz1
2·
2πi C1
(1 − a) ∂z1 ∂z2
2
1
1
Z 1
I
−1 + c − √
c 1−m21
1
1
Ts (t) m2
Tr (t)
∂m1
=
·
·
·
dH(t)
2πi C1
c −1 1 + Ts (t) m2 (1 + Tr (t) m1 )2 ∂z1
m21 (1 − a)2
Z 1
1
Tr (t) m1
Ts (t)
∂m2
·
·
·
dH(t) dz1
c −1 1 + Tr (t) m1 (1 + Ts (t) m2 )2 ∂z2
Weiming Li, Zeng Li and Jianfeng Yao/Joint CLT for linear spectral statistics
∂m2 1
=−
·
∂z2 c
1
Z
1 I
−1 2πi C1
2
−1 + 1c − √ 1
c
33
1−m21
2
m1 (1 − a)
·
Tr (t)Ts (t) m2
(1 + Ts (t) m2 ) (1 + Tr (t) m1 )2
Z 1
1
Tr (u) Ts (u)
·
dH(u) dm1 dH(t)
c −1 (1 + Tr (u) m1 ) (1 + Ts (u) m2 )2
Z
Z
1 1 Tr (u) Ts (u)
∂m2 1 1 Tr (t)Ts (t) m2
·
dH(t) ·
dH(u).
=−
∂z2 c −1 1 + Ts (t) m2
c −1 (1 + Ts (u) m2 )2
Then,
I I
1
1
∂a ∂a
M2 = − 2
z12 z22 ·
·
dz1 dz2
2·
2π C1 C2
(1 − a) ∂z1 ∂z2
I
Z
Z
1 1 Tr (u) Ts (u)
2
∂m2 1 1 Tr (t)Ts (t) m2
2
dH(t) ·
dH(u) dz2
=
z −
·
2πi C2 2
∂z2 c −1 1 + Ts (t) m2
c −1 (1 + Ts (u) m2 )2
2
1
1
Z 1
Z
I Tr (t)Ts (t) −1 + c − √
c 1−m22
1 1
Tr (u) Ts (u)
1
2
=
dH(u)
dm
2 dH(t)
c −1 2πi C2
m2 (1 + Ts (t) m2 )
c −1 (1 + Ts (u) m2 )2
2
= 2
c
Z
2
1
Tr (t)Ts (t) dH(t)
.
−1
As for M3 ,
I
1
∂ 2a
z12
dz1
2πi C1 ∂z1 ∂z2
2
1
1
Z 1
I
−1 + c − √
c 1−m21
Tr (t)Ts (t)
∂m1 ∂m2
1
1
=
·
dH(t)
·
dz1
2
2
2πi C1
m21
c −1 (1 + Tr (t) m1 ) (1 + Ts (t) m2 )
∂z1 ∂z2
2
1
1
Z
−1 + c − √
1 I
c 1−m21
Tr (t)Ts (t)
∂m2 1 1
=−
·
·
dm
1 dH(t)
2
2
2
∂z2 c −1 (1 + Ts (t) m2 ) 2πi C1 m1 (1 + Tr (t) m1 )
∂m2 1
= −
·
∂z2 c
Z
1
−1
Tr (t)Ts (t)
(1 + Ts (t) m2 )2
1
c
√1
c 1−m21
−1 + −
·
(1 + Tr (t) m1 )2
2 (1)
dH(t)
m1 =0
=
∂m2 1
·
∂z2 c
Z
1
−1
2Tr2 (t)Ts (t)
(1 + Ts (t) m2 )2
dH(t),
Weiming Li, Zeng Li and Jianfeng Yao/Joint CLT for linear spectral statistics
thus
βx
M3 =
2πi
I
z22
C2
∂m2 1
·
∂z2 c
Z
1
1 I
−1 2πi C2
βx
= −
c
1
2Tr2 (t)Ts (t)
2 dH(t) dz2
−1 (1 + Ts (t) m2 )
2
1
1
−1 + c − √
c 1−m22
2Tr2 (t)Ts (t)
·
dm
2 dH(t)
2
m22
(1 + Ts (t) m2 )
Z
βx
= −
c
Z
Z
1
1
c
√1
c 1−m22
2 (1)
−1 + −
(1 + Ts (t) m2 )2
1
2Tr2 (t)Ts (t)
−1
dH(t)
m2 =0
=
4βx
c
Tr2 (t)Ts2 (t)dH(t).
−1
Combining the three terms gives
4(βx + 2)
Cov (Xfr , Xfs ) =
c
Z
1
Tr2 (t)Ts2 (t)dH(t)
−1
1
Note that for dH(t) = √
dt, we have
π 1 − t2
Z 1
Tr (t)Ts (t) dH(t) =
−1
Z 1
Tr2 (t)Ts2 (t) dH(t) =
−1
4
+ 2
c
Z
1
2
Ts (u)Tr (u)dH(u) .
−1
1
1{r=s} ,
2
3
1
1{r=s} + 1{r6=s} .
8
4
Therefore,
Cov (Xfr , Xfs ) =
The required formula is established.
1+ 23 c(βx +2)
,
c2
if r = s,
βx +2
,
c
if r 6= s.
34
Weiming Li, Zeng Li and Jianfeng Yao/Joint CLT for linear spectral statistics
Table 1
Test Size under Scenario (I) and (II)
p
5
10
25
40
10
20
50
80
50
100
250
400
10
40
60
100
50
200
300
500
90
360
540
900
150
600
900
1500
200
800
1200
2000
500
2000
3000
5000
n
1000
2000
5000
8000
1000
2000
5000
8000
1000
2000
5000
8000
100
400
600
1000
100
400
600
1000
100
400
600
1000
100
400
600
1000
100
400
600
1000
100
400
600
1000
cn
0.005
0.005
0.005
0.005
0.01
0.01
0.01
0.01
0.05
0.05
0.05
0.05
0.1
0.1
0.1
0.1
0.5
0.5
0.5
0.5
0.9
0.9
0.9
0.9
1.5
1.5
1.5
1.5
2
2
2
2
5
5
5
5
φq (I)
q=1 q=3
0.081 0.078
0.059 0.060
0.051 0.054
0.050 0.049
0.072 0.067
0.066 0.059
0.046 0.053
0.056 0.049
0.063 0.056
0.058 0.052
0.056 0.055
0.049 0.047
0.073 0.075
0.053 0.062
0.049 0.043
0.062 0.058
0.066 0.067
0.053 0.052
0.053 0.054
0.052 0.050
0.051 0.055
0.056 0.051
0.058 0.050
0.048 0.053
0.042 0.047
0.048 0.054
0.056 0.055
0.051 0.052
0.051 0.051
0.047 0.056
0.055 0.050
0.054 0.053
0.063 0.053
0.049 0.054
0.052 0.056
0.052 0.052
Uq (I)
q=1 q=3
0.065 0.049
0.052 0.050
0.047 0.043
0.054 0.036
0.057 0.048
0.050 0.040
0.045 0.044
0.051 0.046
0.051 0.048
0.061 0.047
0.050 0.047
0.047 0.040
0.062 0.061
0.050 0.043
0.055 0.047
0.053 0.045
0.066 0.050
0.051 0.045
0.044 0.046
0.045 0.051
0.050 0.057
0.050 0.050
0.061 0.049
0.058 0.046
0.065 0.064
0.049 0.040
0.040 0.046
0.041 0.043
0.057 0.049
0.052 0.049
0.051 0.052
0.050 0.051
0.049 0.044
0.042 0.044
0.052 0.042
0.047 0.049
φq (II)
q=1 q=3
0.081 0.074
0.058 0.055
0.054 0.059
0.062 0.055
0.063 0.060
0.057 0.058
0.048 0.053
0.046 0.046
0.046 0.058
0.048 0.052
0.046 0.048
0.055 0.042
0.072 0.074
0.051 0.059
0.052 0.053
0.051 0.054
0.051 0.059
0.048 0.045
0.040 0.048
0.041 0.045
0.048 0.051
0.047 0.048
0.037 0.046
0.045 0.045
0.039 0.048
0.036 0.045
0.039 0.043
0.042 0.049
0.045 0.045
0.043 0.052
0.043 0.052
0.048 0.048
0.051 0.052
0.040 0.048
0.034 0.044
0.043 0.045
Uq (II)
q=1 q=3
0.090 0.081
0.068 0.067
0.055 0.050
0.057 0.051
0.068 0.052
0.065 0.049
0.055 0.044
0.052 0.050
0.055 0.058
0.049 0.047
0.047 0.037
0.046 0.044
0.079 0.083
0.056 0.055
0.053 0.049
0.054 0.044
0.069 0.070
0.053 0.059
0.043 0.038
0.048 0.038
0.069 0.078
0.047 0.047
0.054 0.057
0.048 0.045
0.059 0.070
0.048 0.049
0.048 0.046
0.049 0.047
0.067 0.066
0.046 0.048
0.053 0.040
0.049 0.040
0.051 0.068
0.055 0.048
0.049 0.051
0.049 0.057
35
Weiming Li, Zeng Li and Jianfeng Yao/Joint CLT for linear spectral statistics
Table 2
Test Power under Scenario (III) and (IV)
p
5
10
25
40
10
20
50
80
50
100
250
400
10
40
60
100
50
200
300
500
90
360
540
900
150
600
900
1500
200
800
1200
2000
500
2000
3000
5000
n
1000
2000
5000
8000
1000
2000
5000
8000
1000
2000
5000
8000
100
400
600
1000
100
400
600
1000
100
400
600
1000
100
400
600
1000
100
400
600
1000
100
400
600
1000
cn
0.005
0.005
0.005
0.005
0.01
0.01
0.01
0.01
0.05
0.05
0.05
0.05
0.1
0.1
0.1
0.1
0.5
0.5
0.5
0.5
0.9
0.9
0.9
0.9
1.5
1.5
1.5
1.5
2
2
2
2
5
5
5
5
φq (III)
q=1
q=3
0.999
0.990
1
1
1
1
1
1
1
0.998
1
1
1
1
1
1
1
0.9995
1
1
1
1
1
1
0.335
0.213
0.983
0.764
1
0.973
1
1
0.416
0.245
1
0.957
1
1
1
1
0.506
0.311
1
0.991
1
1
1
1
0.607
0.365
1
1
1
1
1
1
0.694
0.428
1
1
1
1
1
1
0.9375 0.704
1
1
1
1
1
1
Uq (III)
q=1 q=3
0.807 0.635
0.9995 0.986
1
1
1
1
0.824 0.647
1
0.992
1
1
1
1
0.859 0.681
1
0.993
1
1
1
1
0.085 0.077
0.294 0.207
0.482 0.338
0.851 0.651
0.093 0.093
0.287 0.190
0.497 0.327
0.878 0.669
0.090 0.079
0.323 0.208
0.527 0.338
0.897 0.655
0.089 0.078
0.337 0.203
0.573 0.346
0.922 0.674
0.092 0.082
0.351 0.207
0.609 0.351
0.923 0.657
0.102 0.082
0.452 0.190
0.734 0.353
0.986 0.659
φq (IV)
q=1
q=3
0.999
0.986
1
1
1
1
1
1
1
0.997
1
1
1
1
1
1
1
1
1
1
1
1
1
1
0.3055 0.1955
0.968 0.6935
1
0.94
1
1
0.3075 0.1805
0.9995 0.8585
1
0.995
1
1
0.3785 0.217
1
0.952
1
0.9995
1
1
0.4545 0.2745
1
0.992
1
1
1
1
0.5165 0.2985
1
0.9985
1
1
1
1
0.809
0.519
1
1
1
1
1
1
Uq (IV)
q=1 q=3
0.761 0.633
0.999 0.984
1
1
1
1
0.79 0.636
1
0.989
1
1
1
1
0.835 0.660
1
0.996
1
1
1
1
0.129 0.128
0.283 0.225
0.483 0.331
0.852 0.652
0.094 0.091
0.310 0.223
0.491 0.322
0.886 0.646
0.096 0.097
0.315 0.214
0.504 0.331
0.894 0.671
0.102 0.098
0.319 0.212
0.576 0.326
0.906 0.656
0.108 0.098
0.352 0.204
0.592 0.342
0.933 0.656
0.108 0.097
0.430 0.202
0.712 0.329
0.984 0.679
36
Weiming Li, Zeng Li and Jianfeng Yao/Joint CLT for linear spectral statistics
37
Table 3
Size and power comparison of permutation test and φq for Gaussian distribution under Scenario (III),
nominal level α = 5%, testing size is shown in the first row of each (p, n) configuration block.
Permutation
φq
p
n
cn
a
q=1
q=3
q=1
q=3
150
300
0.5
0
0.056
0.062
0.052
0.054
150
300
0.5
0.05
0.360
0.256
0.254
0.146
150
300
0.5
0.09
0.992
0.948
0.934
0.694
150
300
0.5
0.1
1
0.988
0.976
0.820
270
300
0.9
0
0.068
0.074
0.060
0.050
270
300
0.9
0.05
0.510
0.408
0.376
0.216
270
300
0.9
0.09
1
1
0.990
0.820
270
300
0.9
0.1
1
1
0.998
0.914
600
300
2
0
0.056
0.066
0.062
0.062
600
300
2
0.05
0.808
0.708
0.536
0.294
600
300
2
0.09
1
1
1
0.974
600
300
2
0.1
1
1
1
0.994
Table 4
Size and power comparison of permutation test and φq for Gamma distribution under Scenario (IV),
nominal level α = 5%, testing size is shown in the first row of each (p, n) configuration block.
Permutation
φq
p
n
cn
a
q=1
q=3
q=1
q=3
150
300
0.5
0
0.052
0.044
0.050
0.058
150
300
0.5
0.05
0.344
0.276
0.228
0.142
150
300
0.5
0.09
0.996
0.962
0.892
0.534
150
300
0.5
0.1
1
0.988
0.956
0.692
270
300
0.9
0
0.058
0.048
0.046
0.052
270
300
0.9
0.05
0.470
0.372
0.244
0.144
270
300
0.9
0.09
1
1
0.960
0.662
270
300
0.9
0.1
1
1
0.988
0.802
600
300
2
0
0.058
0.054
0.042
0.056
600
300
2
0.05
0.766
0.692
0.366
0.202
600
300
2
0.09
1
1
0.998
0.884
600
300
2
0.1
1
1
1
0.944
| 10math.ST
|
A Multi-Layer Market for Vehicle-to-Grid Energy Trading in the Smart Grid
Albert Y.S. Lam
∗1
, Longbo Huang
1
†1
arXiv:1609.01437v1 [cs.GT] 6 Sep 2016
‡1
, and Walid Saad
§2
University of California, Berkeley
2
University of Miami
Abstract
cies [2, 3, 4, 5, 6] and is expected to lie at the heart of the
emerging smart grid system.
Enabling V2G interactions has several advantages such as
serving as backup power sources during outages or supplying ancillary services back to the grid for regulation services.
However, in order to fully reap the benefits of V2G systems,
several key challenges must be addressed at different level
such as control, communications, charging behavior, implementation, and market mechanisms. In [7], the authors propose a scheme that uses PHEV batteries to absorb the randomness in intermittent wind power generation. The authors
in [8] study the use of game theory for providing frequency
regulation through V2G operation. Using the PHEVs as
storage units is studied and analyzed in [9] while communication architectures suitable for V2G systems are discussed
in [10]. Further, the authors in [11] considers the problem
of optimally providing energy and ancillary services using
electric vehicles.
Clearly, most existing work are focused on implementation, communication, and energy transfer in V2G systems.
However, the need for energy transfer and exchange from
PHEVs to the grid has also an economical aspect that must
be addressed. In this respect, the work in [12] sheds a light
on this aspect by investigating the price and quantities exchanged if the PHEVs and the grid elements form an energy
trade market. Beyond [12], little work seems to have been
focused on the economics of V2G exchanges which are essential for a better understanding on the potential of using V2G
in future power grid systems.
The main contribution of this paper is to propose a general framework and algorithm for studying the economics of
the market emerging between PHEVs, aggregators, and the
smart grid elements. To address this problem, we propose
a multi-layered market mechanisms in which the agreggators, the PHEVs, and the grid elements can decide on the
quantity and prices at which they wish to trade energy while
optimizing the tradeoff between the benefits (e.g., revenues)
and costs from this energy exchange. In this proposed market, first, the aggregators and the smart grid elements (e.g.,
substations) submit their reservation prices and bids so as to
agree on a price and energy trading mechanism. These interactions are modeled using a double auction whose result
is then fed back into the second layer, which deals with the
management of PHEV resources at each aggregator. In this
In this work, we propose a multi-layer market for vehicleto-grid energy trading. In the macro layer, we consider a
double auction mechanism, under which the utility company
act as an auctioneer and energy buyers and sellers interact.
This double auction mechanism is strategy-proof and converges asymptotically. In the micro layer, the aggregators,
which are the sellers in the macro layer, are paid with commissions to sell the energy of plug-in hybrid electric vehicles
(PHEVs) and to maximize their utilities. We analyze the
interaction between the macro and micro layers and study
some simplified cases. Depending on the elasticity of supply
and demand, the utility is analyzed under different scenarios.
Simulation results show that our approach can significantly
increase the utility of PHEVs.
1
, Alonso Silva
Introduction
The rising oil prices combined with the ongoing trend for developing environmental-friendly technological solutions, implies that electrically-operated vehicles will lie at the heart of
future transportation systems. In particular, it is envisioned
that plug-in hybrid electric vehicles (PHEVs), which are essentially electric vehicles equipped with storage devices, will
constitute one key component towards realizing the vision
of green, environment-friendly transportation networks. For
instance, it is forecast that up to 2.7 million electric vehicles
will be put on the road in the United States, by 2020 [1].
The presence of energy storage devices implies that PHEVs
can not only serve as a green means of transportation, but
also, if properly configured, they can function as a “moving”
energy reservoir that can store and, possibly, supply power
back to the power grid. While current PHEV deployment
are mostly concerned with grid-to-vehicle interactions, enabling two-way vehicle-to-grid (V2G) interactions between
the grid and PHEVs, has recently started to receive considerable attention both in research and standardization agen-
∗ Email: [email protected] To whom correspondence should
be addressed.
† Email: [email protected]
‡ Email: [email protected] To whom correspondence should
be addressed.
§ Email: [email protected]
1
PHEVs denoted by In = {1, . . . , In }. In this model, we are
particularly interested in smart grid elements that are unable
to meet their demand and, hence, need to buy energy from
(Xk , Bk ) 1
alternative sources such as the PHEV aggregators. Hence,
hereinafter, all grid elements are referred to as buyers while
Macro layer
Auctioneer
the aggregators are referred to as sellers.
The energy exchange process between the aggregators and
(An , Sn ) 4 5 (P, Qn )
the grid elements is modeled using a two-layered market
8
model as shown in Fig. 1 with the utility company’s control
Aggregator n
center acting as a middleman that handles the prospective
energy trading mechanisms. On the one hand, at the first
pn 6 7 a i
layer, referred to as the macro layer, the aggregators and the
Micro layer
grid elements interact so as to trade energy. At this layer,
PHEV i
the buyers wish to optimize their performance and meet their
demand by buying energy from the PHEVs through the aggregators while the aggregators wish to strategically choose
Figure 1: The two-layer market model. The numbers in the
their price and quantity to trade so as to optimize their revfigure correspond to the step numbers in Algorithm 1.
enues. On the other hand, at the second layer, referred to
as the micro layer, the aggregators must interact with the
layer, within each PHEV group, the aggregator negotiates PHEVs so as to optimize the energy resources and provide
with the PHEVs to settle for an agreement on the resource incentives for the PHEVs to actually participate in the trade.
usage. In particular, the aggregator will announce its energy Clearly, the outcomes of these two layers are coupled and,
buying price to the PHEVs, and each PHEV determines how thus, any market solution must take into account this intermuch energy it is willing to supply to the aggregator. The layer dependence. Below, we discuss and analyze, in details,
outcome of this layer is directly linked to the previous market the market operation at each layer.
due to the fact that the aggregator has to carefully balance
its earnings from the energy market and its payments to the 2.1 Macro Layer
PHEVs within its group. Hence, unlike existing work such
as in [12], the proposed scheme depends, not only on pricing An auction is a mechanism for buying or selling goods or
issues, but also on modeling the PHEVs-to-aggregator inter- services by taking bids and then selling them to the highactions (from an economical perspective) as well as on pro- est bidders. The main approach to study this mechanism
viding incentives for the PHEVs to participate in the foreseen is game theory by considering the bidders as the players of
market and, hence, it can leverage V2G, for improving the this game, and their bids as their strategies. For more deoverall smart grid performance. We characterize the equilib- tails on auction theory see [13]. For the completeness of
ria resulting from the proposed multi-layered market and we this work, here we give an overview of the double auction
show their existence. Further, using linear approximation mechanism [14, 15, 12]. In this layer, each potential seller
techniques we provide a large-system analysis on the eco- or aggregator n ∈ N sends the quantity of energy An that
nomics of V2G energy trading. Using simulations, we assess it intends to supply and its reservation price Sn to the aucthe properties and performance of the energy trading mecha- tioneer. The reservation price sent by the potential sellers
nisms resulting from proposed scheme and we show that our corresponds to the minimum price at which the seller is willing to sell its offered amount of energy. Each buyer k ∈ K
approach can significantly increase the utility of PHEVs.
The paper is organized as follows: In Section 2, we present proposes a bid Bk and the quantity it requests, denoted by
the proposed system model. In Section 3, we analyze the Xk , to the auctioneer. Here, we are mainly focused on the
system for different PHEV energy supply costs. Simulation interactions between buyers and sellers in a certain window
results are discussed and analyzed in Section 4 while conclu- of time during which the bids and reservation prices do not
vary. This can correspond to an energy trading market in
sions are drawn in Section 5.
which decisions are based on medium or long-term energy
needs such as in a day-ahead market. In each round, each
2 The Model and the Market Mech- aggregator n decides its own An with the fixed Sn . After
receiving all An ’s, the auctioneer determines the price P (A)
anism
of the energy, where A = (An , 1 ≤ n ≤ N ), and Qn (A),
which corresponds to the total quantity sold by aggregator
Consider a smart grid system consisting of K grid elements n, ∀n ∈ N , by a double auction.
(e.g., substations) with K = {1, . . . , K} denoting the set of
In this work, we adopt a double auction mechanism based
all such elements. In this grid, N electric vehicles aggregators on [14, 12, 16, 15]. In this auction:
are deployed. We let N = {1, . . . , N } denote the set of all
aggregators. Each aggregator n ∈ N manages a group of
• we order the sellers in an increasing order of their reserBuyer k
2
2.2
vation price. W.l.o.g. we consider
S1 < S2 < . . . < SN .
Micro Layer
In this layer, each aggregator announces a price pn to its
PHEVs by
(1)
pn = γn P (A), ∀n ∈ N ,
• we order the buyers in a decreasing order of their reservation bids. W.l.o.g. we consider
•
•
•
•
(5)
where 0 < γn < 1 is the commission rate. The price differB1 > B2 > . . . > BK .
(2) ence, P (A)−pn , is the commission (i.e., cost of management)
earned by aggregator n from its managed PHEVs. Each
aggregator can make a profit in this way and thus it has
if two sellers (respectively, buyers) have equal reservaan incentive to help its PHEVS participate in the market.
tion prices (bids), they are aggregated into one single
This provides an incentive for an aggregator to maximize
“virtual” seller (or buyer).
its PHEVs’ profits. By utility maximization, each PHEV
max
we generate the supply curve (selling reservation price i ∈ In determines its available supply ai ∈ [0, ai ] according
max
to its utility where ai
characterizes the amount of energy
Sn versus the amount of energy put out for sale An )
the owner of PHEV i can afford to sell, i.e., after reserving
we generate the demand curve (offered bids Bk versus enough for its own use. For the same type of vehicle, a PHEV
which needs more reservation for its proper operation has a
quantity needed Xk ).
lower amax
. We have
i
we find an intersection point.
This intersection is at the level of a certain seller L and
buyer M , such that BM ≥ SL and BM +1 < SL+1 . We
find seller L and buyer M and the double auction dictates
that the first L − 1 and M − 1 buyers will participate in the
energy trading. We don’t consider seller L and buyer M in
this trade since it’s a necessary condition for matching the
total supply and demand while maintaining a strategy-proof
mechanism [15].
Thus all sellers with index n < L and all buyers with
index k < M become the participants in the double auction
so as to clear the market. In consequence, the trading prices
for the sellers and the buyers can be chosen within any point
in the range [SL , BM ] [16]. In this work, for any strategy
choice A (or An , ∀n ∈ N ) by the sellers (i.e. aggregators),
given seller L and buyer M at the intersection, we consider
all sellers i < L and buyers k < M trade at a price P (A),
given by
SL (A) + BM (A)
P (A) =
,
(3)
2
where the dependence on A is due to the fact that each A
can give different interaction points with the demand and
supply curves, and thus we can have different L and M .
At the end of the auction, numerous criteria can be used
for determining the amount of traded energy between each
one of the L − 1 sellers and M − 1 buyers. We adopt the
approach of [15] in which the volume is divided in such a
way as to ensure a strategy-proof auction. Using the method
in [15] the total quantity Qn (A) sold by any PHEV group n,
for a given choice A is:
PM −1
Pn
if
An
k=1 Xk ≥
j=1 Aj ,
Qn (A) =
(4)
(An − Ψ)+ if n = L − 1,
0
if n > L − 1,
An =
In
X
i=1
ai , ∀n ∈ N .
(6)
Let an = (ai , 1 ≤ i ≤ In ) be the strategy of the PHEVs
in group i. Aggregator n determines the actual quantity
qi (an , Qn (A)) allocated to PHEV i in group n proportional
to ai by
ai
× Qn (A),
(7)
qi (an , Qn (A)), ∀n ∈ N .
(8)
qi (an , Qn (A)) = P
i∈In
ai
and thus
Qn (A) =
In
X
i=1
Consider that each PHEV i ∈ In imposes a cost of discharging its battery to supply energy to its aggregator. We
denote this cost by ci (a), where a is the amount of energy
sold by PHEV i. We assume that during each transaction,
each PHEV will try to maximize its profit by choosing the
amount of energy ai to be
ai = arg max{pn (an ) − ci (ai )}.
ai
2.3
Market Mechanism
The interaction between the macro and micro layers can be
seen as a market mechanism or an algorithm, shown in Algorithm 1, which is used to find the market equilibrium P ∗ , A∗n .
It terminates when a pre-determined number of iterations
tmax has been reached or the percentage change of the market price is less than a certain threshold ξ.
As we can see in simulation later, Algorithm 1 performs
very efficiently and converges within a few steps.
where (x)+ = max{0, x} and Ψ is the oversupply, i.e., Ψ =
PL−1
PM −1
j=1 Aj −
k=1 Xk .
3
price(p)
price(p)
Algorithm 1 Market Mechanism
1: For all k, buyer k submits its bid Bk and its requested
qd = q0 − βp
demand
amount Xk to the auctioneer
supply
qs = αp
2: t ← 1
3: repeat
4:
For all n, aggregator n submits its reservation price Sn
and its proposed supply An to the auctioneer
5:
The auctioneer implements a double auction and determines the market price P (t) and the allocated quantity
quantity(q)
quantity(q)
Qn for aggregator n for all n
6:
For each aggregator n, the selling price pn is announced
(a) Real situation
(b) Linear approximation
to its PHEVs
7:
For each PHEV i, it determines its proposed selling
Figure 2: Supply and demand curves
amount ai by maximizing its utility according to pn
and returns ai back to its aggregator
We note that, a PHEV can always decide not to participate in
8:
Each aggregator n sums up all ai ’s from its PHEVs
the market in which case it maximum utility will be u∗i = 0.
9:
t←t+1
P (t) −P (t−1)
max
As a result, the maximum utility in (9) is always nonnegative.
|<ξ
10: until t > t
or |
P (t)
In this case, the solution a∗i of (9) is
max
ai
if ηi ≥ pn ,
∗
ai =
(10)
3 Linear Approximation for Large
0
else.
systems
We can then subdivide the set of PHEVs In in two dis(2)
(1)
(2)
(1)
joint sets In and In , such that In ∪ In = In , where
(2)
(1)
, ∀i ∈ In . Thus, we obtain
a∗i = 0, ∀i ∈ In , and a∗i = amax
i
X
X
X
An =
ai =
ai +
ai .
(11)
In a practical smart grid, both the number of PHEVs and
smart grid element are expected to be large. In this respect,
it is of interest to analyze the impact of the presence of large
numbers of buyers and aggregators on the overall proposed
market mechanism. Therefore, here, we consider the situations when N and M are sufficiently large such that the
corresponding supply and demand curves can be approximated by a linear function, depending on the distribution
of aggregators’ reservation price (buyers’ bids). We assume
that the reservation prices Sn from each one can be ordered
nicely into a line with each point being one unit apart. Fig. 2
shows one example of the supply and demand curves, each
of which is approximated by one single linear function. In
the following, since the focus of this paper is on the supply
side, we study different types of supply curves while always
keeping the demand curve of the same type.
i∈In
(1)
i∈In
P
(1)
Since for all i ∈ In , a∗i = 0, then i∈I (1) ai = 0, and in
n
consequence
X
X
An =
ai =
amax
.
(12)
i
(2)
i∈In
3.1.1
(2)
i∈In
Linear Approximation
Consider the linear case as in Fig. 2(b). The PHEVs are
price takers and the supply and demand curves are given by
Supply(P, Q)
3.1
(2)
i∈In
= αP,
(13)
Demand(P, Q) = Q0 − βP.
(14)
Linear Cost Function with Homogeneous PHEVs
Here Q0 is the total demand from all the buyers and P is
the price determined from the double auction in the macro
(2)
layer. Also, α will depend on In for all aggregator n. In
that case, the equilibrium price P ∗ and the quantity sold Q∗
can be determined when the supply meets the demand, i.e.,
In this subsection, we consider that the cost function of
PHEV i is a linear function with respect to the amount of
energy it provides, i.e., ci (a) = ηi a, within a certain interval [0, amax
]. If the amount of energy to be sold exceeds amax
,
i
i
the cost will become infinite. Note that this case also takes
into account the inconvenience cost (e.g., when the PHEV
does not have enough energy to operate normally). Then its
utility function is given by ui (a) = (γn P −ηi )a. The problem
PHEV i needs to address is the following:
u∗i = maximize
ui (ai ).
max
ai ∈[0,ai
]
Supply(P ∗ , Q∗ ) = Demand(P ∗ , Q∗ ) ⇒ αP ∗ = Q0 − βP ∗ ,
or equivalently, when
P∗ =
(9)
Q0
.
α+β
(15)
The utility for each PHEV i in group n will be thus given by
4
1. If ηi ≥
γn Q 0
(α+β)
then a∗i = 0 and u∗i = 0.
2. If ηi <
γn Q 0
(α+β)
and
then a∗i = amax
i
u∗i = (γn P ∗ − ηi ) a∗i =
γn Q0
− ηi amax
.
i
(α + β)
The total utility Un of aggregator n is given by
X γn Q0
Un =
− ηi amax
.
i
(α
+
β)
(2)
Based on the above observation, we have the following simple
lemma characterizing the necessary conditions under which
there exists market equilibriums, i.e., (19) and (21) both
hold.
(16) Lemma 1. The following conditions are necessary for the
above iteration process converges to an market equilibrium
(P ∗ , A∗n ):
(β + dn )2 − 4(dn β − Cn Q0 ) ≥
(17)
2
(β − dn ) + 4Cn Q0
i∈In
≥
0, ∀n ∈ N
0, ∀n ∈ N . 3
(22)
(23)
Proof. In equilibrium, this price must result in a supply that
From this simple example, we can deduce the following is exactly equal to the resulting An , i.e.,
properties:
Cn Q0 γn
− dn .
(24)
An =
An + β
1. If the supply slope of a market 1 is higher than that
of a market 2, i.e., α1 > α2 , then the utility gained in
This gives rise to the following condition on An :
market 1 is smaller than that in market 2.
A2n + (β + dn )An + βdn − Cn γn Q0 = 0.
(25)
2. If the demand slope of a market 1 is higher than that
of a market 2, i.e., β1 > β2 , then the utility gained in Note that the above argument also shows an interesting fact
market 1 is smaller than that in market 2.
that there is an implicit iteration for the market price P as
follows:
3. If the total possible demand of a market 1 is higher than
1
2
Q0
that of a market 2, i.e., Q0 > Q0 , then the utility gained
P∗ =
.
(26)
in market 1 is greater than that in market 2.
C n γn P ∗ − dn + β
3.2
This similarly implies that the fixed point should be:
Quadratic Cost Function
Cn γn P ∗2 + (β − dn )P ∗ − Q0 = 0.
We first recall that under the quadratic cost model, each
PHEV i will supply the following amount of energy:
a∗i =
pn (an ) − ηi
2υi
Since both (25) and (27) are quadratic functions, we see that
the only way there exists a market equilibrium is when (22)
and (23) hold.
amax
i
.
(18)
0
In the next section, we will show how the algorithm evolves
through simulation and demonstrate the intuition behind the
iteration process.
In order to make the analysis easier, below we assume that
a∗i ≤ amax
for all i. Then, we have:
i
a∗i =
where
pn (an ) − ηi
,
2υi
and A∗n = Cn pn (an ) − dn ,
X 1
Cn =
2υi
i
X ηi
and dn =
.
2υi
i
4
(19)
Q0
.
A∗n + β
Simulation Results
For simulations, we consider a smart grid network in which
a number of aggregators sell their energy surplus to smart
grid elements (buyers) through a utility company. The simulation setting is as follows. Each aggregator manages a
certain number of PHEVs, randomly generated in the range
of [500, 1000]. Each PHEV has a maximum battery capacity
of 250 miles with power consumption 22kWh per 100 miles
[17, 18] out of which an arbitrary amount of energy, between
30 and 100 miles, is reserved for the PHEV’s private use. The
reservation prices of the aggregators are uniformly selected
in [10, 50] dollars/MWh while the buyers’ bids are randomly
chosen from [15, 60] dollars/MWh. Each buyer requests energy demand with the amount chosen in [20, 60] MWh. The
commission rate is set to γn = 0.91, ∀n ∈ N . Each PHEV
i has random cost function parameters ηi ∈ [10, 50] and
υi ∈ [1000, 2000] for quadratic cost function and βi = 0 for
the linear cost function. The algorithm always starts by setting ai = amax
, ∀i ∈ In , ∀n ∈ N .
i
(20)
In this case, A∗n is the supply from one aggregator and A∗n is
the slope of the supply curve, i.e., α = A∗n . Thus, we have
by (15) that:
P∗ =
(27)
(21)
Hence, we see that there is an iteration process of the market
price, which approximates the actual price iteration:
• In iteration t, with An (t) computed, we obtain the op0
timal price P ∗ (t) = AnQ
(t)+β .
• In iteration t + 1, we compute the new supply quantity
by (19), i.e., An (t + 1) = Cn γn P ∗ (t) − dn .
5
Greedy
approach
Price
50
5
40
50
30
20
0
4
6
-‐50
8
10
15
20
4
Price
(P)
Average
u.lity
per
aggregator
Proposed
2-‐layer
approach
100
2
3
Demand
1
10
0
Number
of
aggregators
(N)
(a) Total utility in each iteration
(b) Supply and demand curves
(a) Total utility and price for linear cost
Greedy
approach/100
4
48.5
2
48
47.5
0
-‐2
4
6
8
10
15
20
47
46.5
-‐4
Figure 4: Linear cost function with 1000 buyers (K) and 1000
aggregators (N)
Price
when N ≥ 6, an increase in the number of aggregators N will
yield a decrease in the settled price which leads to a decrease
in the utility. In the cases with quadratic cost, the average
utility increases with N on the grounds that more aggregators participate in the market resulting in a larger amount
of total energy sold. Hence, in general, the equilibrium trading price decreases with N as more aggregators lead to an
increased competition, which subsequently imposes a lower
market price.
Fig. 3(c) shows the average number of iterations required
to reach an equilibrium. Clearly, as more aggregators participate in the market, the number of iterations till convergence
increases. Moreover, Fig. 3(c) shows that the convergence
time is faster in the case with quadratic cost. With a linear
cost function, each PHEV i takes either 0 or amax
in each
i
iteration, and thus, the algorithm is more like to oscillate
more around the equilibrium point before convergence. With
a quadratic cost function, due to the concavity of the utility,
the algorithm moves toward the equilibrium in a smoother
manner which is further corroborated in the subsequent simulations.
Price
(P)
Average
u.lity
per
aggregator
Proposed
2-‐layer
approach
46
-‐6
Number
of
aggregators
(N)
45.5
(b) Total utility and price for quadratic cost
Number
of
itera-ons
Linear
cost
Quadra6c
cost
15
10
5
0
4
6
8
10
15
Number
of
aggregators
(N)
20
(c) Iterations required for convergence
Figure 3: Basic simulations for small numbers of buyers and
aggregators.
4.1
4.2
Large Numbers of Buyers and Aggregators
Small Numbers of Buyers and AggregaHere, we simulate cases in which a large number of buyers
tors
(K = 1000) and aggregators (N = 1000) are deployed so
as to verify the analytical results induced from the linear
approximation studied in Section 3.1. As previously mentioned, when N (K) increases, the supply (demand) curve
approaches a linear function as all random numbers are generated uniformly. We first study the results with a fixed
demand curve (i.e. with β and Q0 fixed) and they correspond to the situations when the value evolves in a particular simulation. Fig. 41 shows the results for linear PHEV
cost functions when the algorithm iterates. Fig. 4(a) gives
the total utility computed from double auction for each iteration while we have the corresponding supply and demand
curves in Fig. 4(b) ( the part shows intersection points only).
We can see that the total utility decreases with the supply
We simulate the cases with small numbers of buyers and aggregators. We consider 5 buyers (K = 5) in each case and we
compare our two-layer approach with a greedy approach, in
which each PHEV always proposes to sell amax
. Fig. 3 shows
i
the average results of 1000 independent simulation runs for
each case. Figs. 3(a) and 3(b) present the average utility per
aggregator corresponding to the linear and quadratic cost
functions, respectively. We can see that our approach always gives higher average utility than the greedy one, as
shown in Figs. 3(a) and 3(b). In the cases of linear cost, we
can see that the average utility start by increasing with N
but then, it starts to decrease when the number of aggregators reaches that of buyers (N = 6). This result is due to the
fact that, for small N , an increase in the number of partic1 The numbers in Subfigure (b) correspond to iteration/case numbers
ipating aggregators leads to a larger amount of energy sold in Subfigure (a). For clearer demonstration, In Subfigure (b), only the
which, subsequently, improves the average utility. However, curves corresponding to the first few iterations/cases are given.
6
References
2
(a) Total utility in each iteration
4 3
[1] T. A. Becker and I. Sidhu, “Electric vehicles in the
united states: A new model with forecasts to 2030,”
Tech. Rep. 2009.1.v.2.0, Center for Entrepreneurship
& Technology, University of California, Berkeley, Aug.
2009.
Demand
1
[2] A. N. Brooks and S. H. Thesen, “PG&E and Tesla
motors: Vehicle to grid demonstration and evaluation
program,” in Proc. 23rd International Electric Vehicles
Symposium and Exposition, (Anaheim, CA, USA), Dec.
2007.
(b) Supply and demand curves
Figure 5: Quadratic cost function with 1000 buyers (K) and
1000 aggregators (N)
[3] Electric Power Research Institute (EPRI), “PAP11electric vehicle roaming scenarios,” EPRI Research Program, Use Case.
5
4
Supply
3
2
[4] National Institute for Standards and Technology
(NIST), “SGIP CoS: SAE J2836 use cases for communication between plug-in vehicles and the utility grid,”
NIST Standards.
1
(a) Total Utility in each case
(b) Supply and demand curves
[5] C. Guille and G. Gross, “A conceptual framework for the
vehicle-to-grid (V2G) implementation,” Energy Policy,
vol. 37, pp. 4379–4390, Nov. 2009.
Figure 6: Fixed Q0 with 1000 buyers (K) and 1000 aggregators (N)
[6] B. K. Sovacool and R. F. Hirsh, “Beyond batteries:
An examination of the benefits and barriers to plug-in
hybrid electric vehicles (PHEVs) and a vehicle-to-grid
(V2G) transition,” Energy Policy, vol. 37, pp. 1095–
1103, Mar. 2009.
slope (α). For example, we consider iterations 1 and 2. α1 is
larger than α2 and we have the utility gained in iteration 1 is
smaller than that in iteration 2. We also study the quadratic
PHEV cost functions and the similar results are shown in
Fig. 5.1 However, with the quadratic cost function, the algorithm converges faster and smoother. Next we study the
results for six different demand curves with a fixed supply
curve (i.e. α fixed). Fig. 61 shows the six cases with a fixed
Q0 . The simulation also aligns the results deduced in Section
3.1: the larger β, the smaller the utility.
5
[7] J. Pillai and B. Bak-Jensen, “Vehicle-to-grid for islanded
power system operation in bornholm,” in Power and
Energy Society General Meeting, 2010 IEEE, pp. 1 –8,
july 2010.
[8] C. Wu, H. Mohsenian-rad, and J. Huang, “Vehicle-toaggregator interaction game,” IEEE Trans. Smart Grid,
to appear 2011.
Conclusion
[9] M. Erol-Kantarci and H. Mouftah, “Management of
We have studied the V2G energy trading market, in which
phev batteries in the smart grid: Towards a cyberPHEVs sell their excessive energy to some loads in the disphysical power infrastructure,” in Wireless Communitribution network. We have proposed a multi-layer system
cations and Mobile Computing Conference (IWCMC),
to coordinate the trading where those PHEVs in a close ge2011 7th International, pp. 795 –800, july 2011.
ographical area are represented by an aggregator. In the
macro layer, the energy buyers and the aggregators engage [10] N. Matta, R. Rahim-Amoud, L. Merghem-Boulahia,
in a double auction to determine the trading price and the
and A. Jrad, “A cooperative aggregation-based architecactual energy quantity sold for each aggregator. In the micro
ture for vehicle-to-grid communications,” in Global Inlayer, each aggregator helps its managed PHEVs maximize
formation Infrastructure Symposium (GIIS), 2011, pp. 1
their utilities. A mechanism is proposed to coordinate the
–6, aug. 2011.
interaction between the macro and micro layers. We have
analyzed the system performance when the numbers of buy- [11] E. Sortomme and M. A. El-Sharkawi, “Optimal schedulers and aggregators are large. Simulation results show that
ing of vehicle-to-grid energy and ancillary services,”
our mechanism is always better than the greedy approach
Smart Grid, IEEE Transactions on, vol. PP, no. 99, p. 1,
and verify some of our analytical results.
2011.
7
[12] W. Saad, Z. Han, H. V. Poor, and T. Basar, “A noncooperative game for double auction-based energy trading between phevs and distribution grids,” in Proc.
IEEE International Conference on Smart Grid Communications (SmartGridComm), (Brussels, Belgium), Oct.
2011.
[13] V. Krishna, Auction Theory. 2002.
[14] P. Huang, A. Scheller-Wolf, and K. Sycara, “A strategyproof multiunit double auction mechanism,” in Proceedings of the first international joint conference on Autonomous agents and multiagent systems: part 1, AAMAS ’02, 2002.
[15] P. Huang, A. Scheller-Wolf, and K. Sycara, “Design of
a multi-unit double auction e-market,” Computational
Intelligence, vol. 18, pp. 596–617, Feb. 2002.
[16] D. Friedman and J. Rust, The Double Auction Market: Institutions, Theories, and Evidence. Boulder, CO,
USA: Westview Press, 1993.
[17] C. Silva, M. Ross, and T. Farias, “Evaluation of energy
consumption, emissions and cost of plug-in hybrid vehicles,” Elsevier Energy Conversion and Management,
vol. 50, pp. 1635–1643, Jul. 2009.
[18] T. Motors, “Roadster innovations: Motor,” Feb. 2011.
8
| 3cs.SY
|
1
On a class of optimization-based robust estimators
arXiv:1705.02837v1 [cs.SY] 8 May 2017
Laurent Bako
Abstract—We consider in this paper the problem of estimating
a parameter matrix from observations which are affected by two
types of noise components: (i) a sparse noise sequence which,
whenever nonzero can have arbitrarily large amplitude (ii) and a
dense and bounded noise sequence of "moderate" amount. This is
termed a robust regression problem. To tackle it, a quite general
optimization-based framework is proposed and analyzed. When
only the sparse noise is present, a sufficient bound is derived on
the number of nonzero elements in the sparse noise sequence that
can be accommodated by the estimator while still returning the
true parameter matrix. While almost all the restricted isometrybased bounds from the literature are not verifiable, our bound
can be easily computed through solving a convex optimization
problem. Moreover, empirical evidence tends to suggest that it is
generally tight. If in addition to the sparse noise sequence, the
training data are affected by a bounded dense noise, we derive
an upper bound on the estimation error.
I. I NTRODUCTION
In many engineering fields such as control system design,
signal processing, machine learning or statistics, one is frequently confronted with the problem of empirically uncovering
a mathematical relationship between a number of signals of
interest. The usual method to achieve this goal is to run an
experiment during which one measures (a finite number of)
samples of the relevant signals and proceed with fitting a
certain model structure to the experimental data samples. This
process is known as system identification [11], [19]. A issue of
critical importance during this process is that the experimental
data samples might be contaminated by a measurement noise
of relatively high level due for example to intermittent sensor
failures or various communication disruptions. To cope with
the troublesome effects of the noise, the model estimation must
be designed with care.
In this paper we consider the situation where the data are
corrupted by two types of noise: a sparse noise sequence which
shows up only intermittently in time but can take on arbitrarily
large values whenever it is nonzero; and a more standard dense
noise component of moderate amount.
II. T HE
ROBUST REGRESSION PROBLEM
Consider a system described by an equation of the form
yt = Ao xt + ft + et
(1)
where yt ∈ Rm and xt ∈ Rn are respectively the output and
the regressor vector at time t; Ao ∈ Rm×n is an unknown
parameter matrix; ft and et are some noise terms which are
unobserved.
L. Bako is with Laboratoire Ampère – Ecole Centrale de Lyon – Université
de Lyon – 36 avenue Guy de Collongue, 69134 Ecully, France – E-mail:
[email protected]
N
Problem. Given a finite collection {xt , yt }t=1 of measurements obeying the relation (1), the robust regression problem
of interest here is the one of finding an estimate of the
parameter matrix Ao under the assumptions that {et } and {ft }
are unknown but enjoy the following (informal) properties:
• {et } is a dense noise sequence with bounded elements
accounting for moderate model mismatches or measurement noise.
• {ft } is such that the majority of its elements are equal
to zero while the remaining nonzero elements can be of
arbitrarily large magnitude. The nonzero elements of that
sequence are usually termed gross errors or outliers. They
can account for possible intermittent sensor faults. We
will refer to {ft } as the sequence of sparse noise.
For the time being, these are just informal descriptions of the
characteristics of the sequences {ft } and {et }. They will be
made more precise whenever necessary in the sequel for the
need of stating more formal results.
Let Y ∈ Rm×N and X ∈ Rn×N be data matrices formed respectively with N output measurements and regressor vectors.
Then it follows from (1) that
Y = Ao X + E + F,
m×N
(2)
m×N
where E ∈ R
and F ∈ R
are unknown noise
components. The matrices Y and X can be structured or
not, depending on whether the system (1) is dynamic or not.
For example, when the model (1) is of MIMO FIR type, Y
contains a finite collection of output measurements while X
is a Hankel matrix containing lagged inputs of the system. In
this case Y and X take the form
Y = y1 y2 · · · yN ,
u1
u2
···
uN
u0
u1
· · · uN −1
X= .
.
.. .
..
..
···
.
u1−nf
u2−nf
···
uN −nf
where {ut } and {yt } stand respectively for the input and
output of the system and the maximum lag nf is called the
order of the model. In the sequel, the notations of the type yt
and xt with subindex t ∈ I , {1, . . . , N } refer to the columns
of Y and X respectively.
Relevant prior works. The so formulated regression problem
is called a robust regression problem in connection with the
fact that the error matrix F assume columns of (possibly)
arbitrarily large amplitude. It has applications in e.g., the identification of switched linear systems [1], [15], [14], subspace
clustering [2], etc. Existing approaches for solving the robust
regression problem can be roughly divided into two groups:
methods from the field of robust statistics [17], [12], [9] which
have been developed since the early 60s and a class of more
2
recent methods inspired by the compressed sensing paradigm
[3], [4], [18], [21], [13]. The first group comprises methods
such as the least absolute deviation (LAD) estimator [8], the
least median of squares [16], the least trimmed squares [17],
the family of M-estimators [9]. The latter group can be viewed
essentially as a refreshed look at the so-called least absolute
deviation method. There has been however a fundamental
shift of philosophy in the analysis. While in the framework
of robust statistics, robustness of an estimator is measured
in terms of the breakdown point (the asymptotic minimum
proportion of points which cause the estimation error induced
by an estimator to be unbounded if they were to be arbitrarily
corrupted by gross errors), in the compressed-sensing-inspired
category of robust methods, the analysis aims generally at
characterizing properties of the data that favor exact recovery
of the true parameter matrix Ao . In this latter group, the LAD
estimator is sometimes regarded as a convex relaxation of a
combinatorial sparse optimization problem.
To the best of our knowledge, only the papers [18] provides
an explicit bound on the estimation error induced by the
LAD estimator. However that bound does not fully apply to
the current setting since the estimators although similar are
of different natures. Indeed, the LAD estimator stands only
as a special case of the current framework. Moreover the
bound in [18] is not easily computable while ours is. The
references [4] and [13] provide some bounds for a noise-aware
version of the LAD estimator which are based respectively
on the Restricted Isometry Property (RIP) and a measure of
subspace angles. Unfortunately numerical evaluation of those
bounds is a process of exponential complexity, a price that is
unaffordable in practice.
A related but different problem from the regression problem
considered here is that of sparse signal recovery studied in the
field of compressed sensing [5], [7]. This is about finding the
sparsest solution to an underdetermined set of linear equations.
Various analysis approaches have been devised which rely on
the RIP constant, the mutual coherence, the nullspace property,
to name but a few. Again, these analysis results either cannot
be extended efficiently to the robust regression problem or lead
to bounds that are NP-hard to compute [20], [10], [6].
Contributions. In this paper we propose and analyze a class
of optimization-based robust estimators. It is shown that the
robust properties of the estimators are essentially inherited
from a key property of the to-be-optimized performance function (or loss function) called column-wise summability. The
proposed framework admits the LAD estimator and its usual
variants as special cases. Moreover it applies to both SISO and
MIMO systems. When the dense noise component E in (2)
is identically equal to zero, we derive bounds on the number
of gross errors (nonzero columns of F ) that the estimator is
able to accommodate while still returning the true parameter
matrix Ao . In comparison with the existing literature, the
proposed bounds have the important advantage that they are
numerically computable through convex optimization. When
both E and F are active, exact recovery of the true parameter
matrix is no longer possible. In this scenario, we derive upper
bounds on the parametric estimation error in function of the
amplitude of E and the number of nonzero columns of F .
Again, computable but (possibly) looser versions of those
bounds are obtainable.
The current paper can be viewed as a generalization of our
previous work reported in [3]. While [3] provides an analysis
of mostly a single estimator (namely the LAD estimator)
relying on nonsmooth optimization theory, we focus here
on a much larger class of optimization-based robust estimators by highlighting some key robustness-inducing properties.
Moreover, we provide, for the considered class of estimators,
stability results which permit the estimation of parametric error
bounds.
Outline. The rest of the paper is organized as follows. Section
III defines the optimization-based approach to the robust
regression problem. Section IV discusses the properties of the
proposed estimation framework. Section V provides further
comments. Section VI reports some numerical experiments.
Lastly, Section VII contains some concluding remarks.
Notations. R is the set of real numbers; R≥0 (respectively
R>0 ) is the set of nonnegative (respectively positive) real
numbers ; RN is the space of N -tuples (vectors) of real
numbers. For any vector x = [x1 · · · xN ]⊤ ∈ RN , the
p-norm of x with p ∈ {1, . . . , ∞} is defined by kxkp =
PN
p 1/p
. A special case is the limit case p = ∞
i=1 |xi |
in which kxk∞ = maxi=1,...,N |xi |. For any matrix A =
[a1 · · · aN ] with ai ∈ Rm , the induced p-norm of A is
defined by kAkp = supx∈RN ,kxkp =1 kAxkp .
Cardinality of a finite set. Throughout the paper, whenever S
is a finite set, the notation |S| will refer to the cardinality of
S. However, for a real number x, |x| will denote the absolute
value of x.
Submatrices and subvectors. Let X ∈ Rn×N and I =
{1, . . . , N } be the index set for the columns of X. If I ⊂ I,
the notation XI denotes a matrix in Rn×|I| formed with the
columns of X indexed by I. We will use the convention that
XI = 0 ∈ Rn when the index set I is empty.
III. A
CLASS OF ROBUST ESTIMATORS
Let DN be the set of N data points generated by system
(1) for any possible values of the noise sequences, i.e.,
n
DN = (Y, X) ∈ Rm×N × Rn×N :
o
f
e
∃(E, F ) ∈ GN
× GN
, (2) holds ,
f
e
with GN
⊂ Rm×N and GN
⊂ Rm×N denoting the set of dense
and sparse noise matrices respectively. The estimation problem
aims at determining the unknown parameter matrix Ao given
a point (Y, X) in DN . Of course, this quest would not make
much sense if the noises E and F were completely arbitrary
since in this case, we would have DN = Rm×N × Rn×N
hence losing any informativity concerning the data-generating
system. Therefore some minimum constraints need to be put
on E and F as informally described above.
With respect to the estimation problem just stated, an estimator
is a set-valued map Ψ : DN → P(Rm×n ), (Y, X) 7→
Ψ(Y, X) which is defined from the data space DN to the power
3
set P(Rm×n ) of the parameter space. For (Y, X) generated
by a system of the form (1), one would like to design an
estimator achieving, whenever possible, the ideal property that
Ψ(Y, X) = {Ao }. In default of that ideal situation, a more
pragmatic goal is to search for a Ψ so that Ao ∈ Ψ(Y, X) and
Ψ(Y, X) is of small size in some sense despite the troublesome
effects of the unknown noise components E and F . The design
of an optimal estimator requires specifying a performance
index (usually called a loss function) which is to be minimized.
In this paper, we study the properties of the estimator of
the parameter matrix Ao in (2) defined by
Ψ(Y, X) = arg min ϕ(Y − AX)
(3)
A∈Rm×n
where ϕ : M (R) → R≥0 is a convex function defined on the
set M (R) of (all) real matrices. It is assumed that ϕ has the
following properties:
P1. For all B, C ∈ M (R) of compatible dimensions,
ϕ([B
C]) = ϕ(B) + ϕ(C)
(5)
P3. There exists a constant real number ε ≥ 0 such that for
all B ∈ M (R) with n rows and N columns,
ℓ(B) − |Iεc (B)| ε ≤ ϕ(B) ≤ ℓ(B)
IV. P ROPERTIES
(6)
where
We first study the conditions under which the true parameter
matrix Ao in (1) can be exactly recovered. Theorem 1 and
Theorem 2 stated next show that if the number of nonzero
columns in the matrix V , E + F is less than a certain
threshold, then Ψ(Y, X) = {Ao }.
Theorem 1 (A necessary and sufficient condition). Let ϕ
be a function satisfying (4)-(6) with ε = 0 and Ψ be
defined as in (3). Let d be an integer and assume that
rank(X) = n. For any A ∈ Rm×n and Y ∈ Rm×N , let
Ic (Y − AX) = {t ∈ I : yt − Axt 6= 0}. Then the following
statements are equivalent.
(i)
Iεc (B) = i ∈ {1, . . . , N } : ℓ(bi ) > ε
∀A ∈ Rm×n , ∀Y ∈ Rm×N , |Ic (Y − AX)| ≤ d
and |Iεc (B)| is the cardinality of Iεc (B) and bi ∈ Rn is
the ith column of the (n, N )-matrix B.
The property (4) will be called column-wise summability.
Since ϕ is a function defined over the space of real matrices of any dimensions, it is also defined for n-dimensional
vectors of real numbers. Hence according to property (4), if
B = [b1 · · · bN ] with column vectors bi ∈ Rn , then
ϕ(B) =
N
X
ϕ(bi ).
i=1
The so-defined function ϕ is not necessarily a norm. For any
εo ≥ 0 and any vector norm ℓo , it can be verified that the
function ϕ defined by
ϕ(B) =
N
X
max(0, ℓo (bi ) − εo )
OF THE ROBUST ESTIMATORS
A. Exact recoverability
(4)
with [B C] denoting the matrix formed by concatenating column-wise B and C.
P2. There exists a matrix norm ℓ : M (R) → R≥0 such that
for all B, C ∈ M (R), conformable for addition,
ϕ(B) ≤ ϕ(B − C) + ℓ(C)
enjoys some impressive robustness properties with respect to
the sparse noise matrix F . The term sparse is used here to
mean that a relatively large proportion of the column vectors
of F are equal to zero. And saying that Ψ is robust with
respect to F means that Ψ(Y, X) does not depend on (or
is insensitive to) the magnitudes of the nonzero columns of
F under the sparsity condition. Therefore those few columns
which are nonzero can have arbitrarily large magnitude. As
will be shown in the sequel, the robustness properties of Ψ are
inherited from the properties P1-P3 of the objective function
ϕ. In the special case where ϕ is a norm, the properties P2P3 are automatically satisfied so that P1 becomes the only
key property required. As to the convexity of ϕ, it is intended
just for computational reasons as it eases the solving of the
optimization problem in (3).
(7)
i=1
is positive and convex and satisfies properties (4)-(6) but it
is not a norm for εo > 0 since in this case, ϕ(B) = 0 does
not imply that B = 0. But if εo = 0 in (7), then ϕ = ℓ
by (6) soP
that ϕ corresponds to the matrix norm defined by
N
ϕ(B) = i=1 ℓo (bi ). We note in this latter case that (6) is
trivial while (5) reduces to the triangle inequality.
We will show in the sequel that the estimator Ψ in (3)
⇒
(ii)
max
c
max
I ⊂I: Λ∈Rm×n
|I c |=d
Λ6=0
Ψ(Y, X) = A
(8)
1
ϕ(ΛXI c )
<
ϕ(ΛX)
2
(9)
Here and in the following, the notation I , {1, . . . , N } is used
to denote the index set for the columns of the data matrices.
Proof: We first note that the rank assumption on X is
intended to insure that (9) is well-defined since then, with ϕ
being a norm, ϕ(ΛX) 6= 0 whenever Λ 6= 0.
(i) ⇒ (ii): Assume that (i) holds.
Consider an arbitrary subset I c of I such that |I c | = d.
Let Λ be any matrix in Rm×n satisfying Λ 6= 0. Finally,
consider a matrix Y ∈ Rm×N defined by YI c = 0 and
YI 0 = ΛXI 0 where I 0 = I \ I c . Then Ic (Y − ΛX) ⊂ I c and
so |Ic (Y − ΛX)| ≤ d. Hence by (i) {Λ} = arg minH ϕ(Y −
HX) which means that ϕ(Y − ΛX) < ϕ(Y − HX) for any
H ∈ Rm×n , H 6= Λ. In particular, by taking H = 0 we get
ϕ(Y − ΛX) < ϕ(Y ). It follows from the property (4) that
ϕ(YI c − ΛXI c ) + ϕ(YI 0 − ΛXI 0 ) < ϕ(YI c ) + ϕ(YI 0 ).
Using now the relations YI c = 0 and YI 0 = ΛXI 0
yields ϕ(ΛXI c ) < ϕ(ΛXI 0 ) or, equivalently, ϕ(ΛXI c ) <
4
1/2ϕ(ΛX). Eq. (9) then follows from the fact that I c and
Λ are arbitrary.
(ii) ⇒ (i): To begin with, note that if Eq. (9) holds for some
d, then it holds also for any d0 ≤ d. As a result, the equality
|I c | = d in (9) can be changed to |I c | ≤ d. Assuming
(ii), let A ∈ Rm×n and Y ∈ Rm×N be matrices satisfying
|Ic (Y − AX)| ≤ d. Set I c = Ic (Y − AX) and I 0 = I \ I c .
Then for all Λ ∈ Rm×n such that Λ 6= 0,
2ϕ(ΛXI c ) < ϕ(ΛX) = ϕ(ΛXI c ) + ϕ(ΛXI 0 ),
where the equality is obtained by the property (4) of ϕ. It
follows that
ϕ(ΛXI c ) < ϕ(YI 0 − (A + Λ)XI 0 ).
(10)
On the other hand, we know by (5) that
ϕ(YI c − AXI c )−ϕ(YI c − (A + Λ)XI c ) ≤ ϕ(ΛXI c ).
Combining with the inequality (10) yields
ϕ(Y − AX) < ϕ(Y − (A + Λ)X).
Since Λ is an arbitrary nonzero matrix, this inequality says
that A is the unique minimizer of V (H) = ϕ(Y − HX).
Consider a data pair (Y, X) generated by (1). By letting
πϕc (X) = max d : Eq. (9) holds ,
(11)
and assuming that πϕc (X) > 0 we can see that whenever
|Ic (Y − Ao X)| ≤ πϕc (X), Ao can be exactly recovered by
computing Ψ(Y, X). Of course this is likely to hold only
if the dense noise component E does not exist. So in the
situation where E = 0, the theorem says that Ao can be
uniquely obtained by convex optimization provided that the
number of outliers (nonzero columns of F ) is less than or
equal to πϕc (X). For the condition of exact recoverability to
be checkable we must be able to compute πϕc (X). The bad
news are that evaluating numerically such a number is likely
to be NP-hard in most cases.
In the sequel, we investigate sufficient conditions of exact recovery which are more tractable from a numerical standpoint.
For this purpose let us introduce some definitions.
Definition 1. A matrix X = [x1 · · · xN ] ∈ Rn×N is said
to be self-decomposable if rank(X) = n and for all k ∈ I,
xk ∈ im(X6=k ) where X6=k , XI\{k} is the matrix obtained
from X by removing its k-th column and im(·) refers to range
space.
For a matrix to be self-decomposable it is enough that X6=k
be full row rank for any k ∈ I. Achieving this condition in
practice seems easy provided that the number N of measurements is large enough compared to the dimension n of X.
Definition 2 (self-decomposability amplitude). Let X ∈
Rn×N be a self-decomposable matrix. We call selfdecomposability amplitude of X, the number ξ(X) defined
by
o
n
(12)
kγk k∞ : xk = X6=k γk .
ξ(X) = max min
k∈I γk ∈RN −1
The so-defined ξ(X) constitutes a quantitative measure of
richness (or genericity) of the regressor matrix X. By richness
it is meant here how much, in a global sense, the columns of
X are linearly independent. ξ(X) is expected to be small if
the columns of X are somehow strongly linearly independent.
Remark 1. If for some k the norm of xk was to be considerably large in comparison to the norm of the other columns of
X, then ξ(X) would get large hence reducing recoverability
capacity of the considered class of estimators (see also Eq.
(9)). Such situations can be alleviated by normalizing each
column of X, i.e., for example by replacing (yk , xk ) by
(ỹk , x̃k ) , (yk / kxk k , xk / kxk k) under the assumption that
xk 6= 0 for all k ∈ I.
With the help of the device of self-decomposability amplitude (12), we can state a condition for exact recovery of the
parameter matrix Ao by solving the optimization problem in
(3). A similar result was proven in [3] for the Least Absolute
Deviation (LAD) estimator.
Theorem 2 (A sufficient condition for exact recovery). Let ϕ
be a function satisfying (4)-(6) with ε = 0 and Ψ be defined as
in (3). Assume that X is self-decomposable. Then the following
statement is true:
∀A ∈ Rm×n , ∀Y ∈ Rm×N ,
|Ic (Y − AX)| < T ξ(X)
⇒
(13)
Ψ(Y, X) = A .
where T : R>0 → R>0 is the function defined by T (α) =
1
1
1+
.
2
α
Proof: The proof is completely parallel to that of Theorem
11 in [3]. From the assumptions, each xk , k ∈ I, can be
written as a linear combination of the columns of X6=k . Let
γk ∈ RN −1 be any vector satisfying xk = X6=k γk . It follows
that for any Λ ∈ Rm×n ,
X
γk,t Λxt
ϕ(Λxk ) = ϕ
t∈I\{k}
with γk,t denoting the entry of γk ∈ RN −1 indexed by t.
Under the assumptions of the theorem, ϕ is a norm. So, it
is positive and satisfies the triangle inequality property. As a
result we can write
X
ϕ(Λxk ) ≤
|γk,t | ϕ(Λxt ) ≤ kγk k∞ (ϕ(ΛX) − ϕ(Λxk ))
t6=k
where the rightmost term follows from the property (4) of ϕ.
Since this holds for any γk such that xk = X6=k γk , it holds
also for
n
o
γk⋆ = arg min kγk∞ : xk = X6=k γ .
γ∈RN −1
Hence,
ϕ(Λxk ) ≤ ξ(X) (ϕ(ΛX) − ϕ(Λxk )) ∀k ∈ I, ∀Λ ∈ Rm×n .
(14)
or equivalently,
ϕ(Λxk ) ≤
ξ(X)
ϕ(ΛX) ∀k ∈ I, ∀Λ ∈ Rm×n .
1 + ξ(X)
Let I c be any subset of I and pose |I c | = d. Summing the
5
previous inequality over the set I c yields
max
Λ6=0
ϕ(ΛXI c )
1
|I c |
≤
ϕ(ΛX)
2T ξ(X)
relation
(15)
Note that the term on the right hand side is well-defined since
by the self-decomposability assumption, rank(X) = n which
implies that ϕ(ΛX)
6= 0 whenever Λ 6= 0. Therefore (9) holds
if |I c | < T ξ(X) and the conclusion follows from Theorem
1.
It is worth noting that the threshold T (ξ(X)) on the number
of correctable outliers does not depend on ϕ. Hence this
threshold is valid when the estimator is defined from any
matrix norm obeying (4).
Remark 2. The statement of Theorem 2 still holds true if we
replace ξ(X) with the ϕ-dependent number δϕ (X) defined by
ϕ(Λxk )
δϕ (X) = max sup
k∈I Λ6=0 ϕ(ΛX6=k )
(16)
when it is assumed that ϕ is a norm and rank(X6=k ) = n
for all k. Doing so will give a less conservative condition
for exact recovery. However δϕ (X) seems much harder to
evaluate numerically than ξ(X).
Remark 3 (A few useful properties of ξ(X)).
•
•
For any nonsingular matrix R ∈ Rn×n , ξ(RX) = ξ(X).
It follows that the number ξ(X) depends only on the
subspace spanned by the rows of the regressor matrix X.
For any self-decomposable X ∈ Rn×N , ξ(X) is lowerbounded in the following sense
1
,
N −1
This follows from the more general observation that
ξ(X) ≥
ξ(X) ≥ max P
k∈I
kxk k
t6=k kxt k
for any vector norm k·k. As a result, T (ξ(X) is upperbounded as follows
N
.
2
Theorem 2 provides a sufficient condition for exact recovery
in the situation where the function ϕ is a norm. Next, another
condition is stated which holds in the general case.
T (ξ(X)) ≤
ϕ(YI c − AXI c ) − ϕ(YI c − (A + Λ)XI c ) < ϕ(ΛXI 0 ).
By (5), we can note that ϕ(YI c − AXI c ) − ϕ(YI c − (A +
Λ)XI c ) ≤ ℓ(ΛXI c ). It then follows that
ℓ(ΛXI c ) < ϕ(ΛXI 0 )
is a sufficient condition for Ψ(Y, X) = {A}. Finally, invoking
(6) allows us to observe that ℓ(ΛXI 0 ) − |Iεc (ΛXI 0 )| ε ≤
ϕ(ΛXI 0 ) which implies that ℓ(ΛXI c ) < ℓ(ΛXI 0 ) −
|Iεc (ΛXI 0 )| ε is a sufficient condition for Ψ(Y, X) = {A}.
We have hence proved the proposition.
B. Uncertainty set induced by dense noise
When both E and F are nonzero in the data-generating
system (1), Ψ(Y, X) is likely to be a non-singleton subset of
P(Rm×n ) especially if we consider all possible realizations of
the unknown components E and F . In this case the desirable
properties of the estimator are in default of better (i) that it
contains Ao and (ii) that its size with respect to some metric
is as small as possible. In this section we are interested in
estimating the size of Ψ(Y, X) when both dense noise E and
sparse noise F are active in the data-generating system (1).
A notion of estimator gain. Similarly to the concept of
system gain in control [22], one could define the gain of an
estimator, that is, a quantitative measure of the sensitivity
of the estimator with respect to the perturbations affecting
the measurements. Consider a data pair (Y, X) generated
by a system of the form (1) with Ao being the parameter
matrix sought for. Let us fix the sparse noise matrix F or
view it somehow as part of the data-generating system. This
consideration proceeds from the fact that Ψ can be insensitive
to F (when acting alone) under, for example, the condition
derived in Theorem 2. Let E be bounded in the sense that
ℓ(E) is finite with ℓ being the norm appearing in (6). Then
we can define a gain of the estimator with respect to the dense
noise component E. More specifically, an (ℓ, q)-gain of the
estimator Ψ with respect to the dense noise E may be defined
by
kA⋆ − Ao kq
.
(18)
gℓ,q (Y, X) =
sup
ℓ(E)
A⋆ ∈Ψ(Y,X)
0<ℓ(E)<∞
F sparse
Proposition 1. Consider a triplet (ϕ, ℓ, ε) satisfying (4)-(6).
For A ∈ Rm×n and Y ∈ Rm×N , pose I c = Ic (Y − AX),
I 0 = I \ I c = {t ∈ I : yt − Axt = 0} and Iεc (ΛXI 0 ) =
t ∈ I 0 : ℓ(Λxt ) > ε . Then Ψ(Y, X) = {A} if
Here k·kq denotes matrix q-norm. The so-defined number
gℓ,q (Y, X) provides an upper bound on the distance from the
set Ψ(Y, X) to Ao in function of the amount of dense noise.
The following theorem and its corollaries show that if the
number of nonzero columns in F is no larger than a certain
threshold, then gℓ,q (Y, X) exists and is finite.
∀Λ ∈ Rm×n , Λ 6= 0.
Theorem 3. Let (Y, X) be the data generated by system (1)
subject to the noise components E and F . Consider a triplet
(ϕ, ℓ, ε) satisfying (4)-(6). Let S 0 ⊂ I be a set such that FS 0 =
0 and let S c = I \ S 0 . Assume that the matrix X and the
partition (S 0 , S c ) are such that there exists α > 0 such that
|Iεc (ΛXI 0 )| ε < ℓ(ΛXI 0 ) − ℓ(ΛXI c )
(17)
Proof: Ψ(Y, X) = {A} is equivalent to
ϕ(Y − AX) < ϕ(Y − (A + Λ)X)
for any Λ ∈ Rm×n , Λ 6= 0. Using the definitions of the sets
I 0 and I c and applying property (4) of ϕ yields the equivalent
ℓ(ΛXS 0 ) − ℓ(ΛXS c ) ≥ α kΛkq ∀Λ ∈ Rm×n ,
(19)
6
with k·kq denoting some matrix q-norm.
Then for any A⋆ ∈ Ψ(Y, X), it holds that
1
kA⋆ − Ao kq ≤
2ℓ(ES 0 ) + |Iεc | ε
(20)
c
γℓ,q (X, S )
with1 Iεc = Iεc (YS 0 − A⋆ XS 0 ) = t ∈ S 0 : ℓ(yt − A⋆ xt ) > ε
and
ℓ(ΛXS 0 ) − ℓ(ΛXS c )
(21)
γℓ,q (X, S c ) = inf
m×n
kΛkq
Λ∈R
Λ6=0
if the dense noise matrix E is such that ℓo (et ) ≤ εo for
all t ∈ I, then by taking ε = εo the set Iεc defined in the
statement of Theorem 3 corresponds to the empty set so that
(22) holds as well in this case. In connection with the concept
of estimator gain discussed earlier, one can interpret the factor
2/γℓ,q (X, S c ) as an estimate of the gain (of the estimator Ψ)
with respect to dense noise.
Lastly, it is interesting to see that when ϕ is a norm, if E =
0 then the result of Theorem 3 implies that Ψ(Y, X) = {Ao }
provided (19) is true.
where k·kq refers to matrix q-norm.
V. D ISCUSSIONS
Proof: By definition of Ψ(Y, X) in (3),
For the purpose of illustrating the extent of the results above,
let us discuss further the situation where ϕ reduces to a norm.
ϕ(Y − A⋆ X) ≤ ϕ(Y − AX) ∀A ∈ Rm×n
By letting Λ = A − Ao , Λ⋆ = A⋆ − Ao and applying (2), the
last inequality takes the form
⋆
ϕ(F + E − Λ X) ≤ ϕ(F + E − ΛX) ∀Λ ∈ R
m×n
.
In particular, for Λ = 0, we get ϕ(F + E − Λ⋆ X) ≤ ϕ(F + E)
which, thanks to property (4) of ϕ, takes the form
ϕ(FS c + ES c − Λ⋆ XS c )+ϕ(ES 0 − Λ⋆ XS 0 )
≤ ϕ(FS c + ES c ) + ϕ(ES 0 ).
Now applying property (5) to the first member of the left hand
side and rearranging yields
⋆
A. Scenario when the loss function is a norm
Corollary 1. Let (Y, X) be the data generated by system (1)
subject to the noise components E and F . Let S 0 and S c be
defined as in the statement of Theorem 3. Assume that ϕ is a
norm i.e., it satisfies (4)-(6) with ε = 0.
If X is self-decomposable and |S c | < T ξ(X) , then for any
A⋆ ∈ Ψ(Y, X),
kA⋆ − Ao kq ≤ Bϕ,q (|S 0 |, X)ϕ(ES 0 )
2
,
h
N −r i
σϕ,q (X) 1 −
T (ξ(X))
ϕ(ΛX)
σϕ,q (X) = inf
Λ6=0 kΛkq
Bϕ,q (r, X) =
Using (6) gives
ℓ(ES 0 − Λ⋆ XS 0 ) − |Iεc | ε − ℓ(Λ⋆ XS c ) ≤ ϕ(ES 0 ) ≤ ℓ(ES 0 ).
Here we used the fact that Iεc (ES 0 − Λ⋆ XS 0 ) is equal to the
set Iεc defined in the statement of the theorem.
Applying the triangle inequality property of ℓ, it can be seen
that ℓ(Λ⋆ XS 0 ) − ℓ(ES 0 ) ≤ ℓ(ES 0 − Λ⋆ XS 0 ). Combining with
the previous inequality yields
ℓ(Λ⋆ XS 0 ) − ℓ(Λ⋆ XS c ) ≤ 2ℓ(ES 0 ) + |Iεc | ε.
Finally, it follows from the definition of γℓ,q (X, S c ) in (21)
that
γℓ,q (X, S c ) kΛ⋆ kq ≤ 2ℓ(ES 0 ) + |Iεc | ε .
The condition (19) guarantees that γℓ,q (X, S c ) is well-defined
and is positive. Hence the statement of the theorem is established.
Theorem 3 constitutes an interesting stability result in that
it provides a finite upper bound on the distance from Ao to
the set Ψ(Y, X) as a function of the amplitude of the dense
noise matrix E. It applies to any estimator Ψ defined as in (3)
with ϕ a function obeying (4)-(6). In particular, in the situation
where ϕ is a norm (in which case ε can be taken equal to zero
in (6)), the inequality in (20) simplifies to
2
ℓ(ES 0 ).
γℓ,q (X, S c )
(22)
If ϕ is defined as in (7) (which, recall, is not a norm) and
1 The
notation Iεc is used for simplicity reasons.
(23)
where
⋆
ϕ(ES 0 − Λ XS 0 ) − ℓ(Λ XS c ) ≤ ϕ(ES 0 ).
kA⋆ − Ao kq ≤
ON SOME SPECIAL CASES
(24)
(25)
Proof: The principle of the proof is to show that
γℓ,q (X, S c ) is well-defined and then find a positive underestimate of it. Using the property (4) of ϕ and the fact that
ϕ = ℓ, we can write
2ϕ(ΛX) 1 ϕ(ΛXS c )
ℓ(ΛXS 0 ) − ℓ(ΛXS c )
.
=
−
kΛkq
kΛkq
2
ϕ(ΛX)
On the other hand we know from the proof of Theorem 2 (see
Eq. (15)) that
1
ϕ(ΛXS c )
≤
|S c |
ϕ(ΛX)
2T (ξ(X))
so that
1−
|S c |
ϕ(ΛX)
ℓ(ΛXS 0 ) − ℓ(ΛXS c )
≤
T (ξ(X)) kΛkq
kΛkq
Taking now the infimum on both sides of the inequality symbol
over all nonzero matrices Λ ∈ Rm×n yields
|S c |
≤ γℓ,q (X, S c ).
σϕ,q (X) 1 −
T (ξ(X))
It follows from the rank condition imposed on X (by the selfdecomposability assumption) that σϕ,q (X) > 0. This shows
that γℓ,q (X, S c ) is well defined and is strictly positive. Finally,
since ϕ = ℓ, invoking (22) gives the result.
Two important comments can be made at this stage.
7
First it is interesting to note that the bound Bϕ,q (r, X)
is an increasing function of ξ(X). Therefore it is all the
smaller as ξ(X) is small. That is, the error bound will be
small if the data matrix X is rich enough.
• Second, Bϕ,q (r, X) is a decreasing function of r. This
means that the upper bound on the estimation error
decreases when the number of gross error columns in F
decreases. In the extreme case where S 0 = N (no gross
error), Bϕ,q (|S 0 |, X) in (23) reduces to 2/σϕ,q (X).
Beyond these observations it should be noted that
a key
assumption of Corollary 1 is that |S c | < T ξ(X) with S c
being the index set of the nonzero columns in F . Realizing
this condition requires on the one hand that the number of
nonzero columns in the sparse noise matrix F be small and
on the other hand that ξ(X) be small2 (which means that the
data must be generic). Indeed this condition is not necessarily
as strong as it might appear to be at first sight. For example,
it can be relaxed as follows. Observe that the sum E + F
is not uniquely defined from model (2). Taking advantage of
this, one can always absorb in E all nonzero columns of F
whose magnitude does not exceed a certain level. To see this,
let I = {t ∈ S c : ℓ(et + ft ) ≤ εo } where εo = maxt∈I ℓ(et ).
Then we can define Ẽ and F̃ such that E + F = Ẽ + F̃ and
F̃S 0 ∪I = 0 that is, we set ẽt = ft +et and f˜t = 0 for any t ∈ I
and (ẽt , f˜t ) = (et , ft ) otherwise. As a consequence, E and F
in Corollary 1 can be replaced by Ẽ and F̃ respectively so
that |S| and |S c | are replaced by |S| + |I| and |S c | − |I|. The
condition of the corollary then becomes |S c |−|I| < T ξ(X) ,
which is potentially easier to fulfill.
•
Remark 4 (sum of p-norms). Evaluating numerically the
bound Bϕ (r, X) might prove to be a hard problem due to
the potential difficulty in computing the term σϕ,q (X) in (25).
A particular case of interest is when ϕ consists of a sum
of p-norms
the column vectors, i.e. when it is defined by
Pof
N
bN ]. In this case
ϕ(B) =
i=1 kbi kp for B = [b1 · · ·
if we take q = 2 in (23) and (25), it is easy to see that
1/2
1/2
λmin (XX ⊤) ≤ σϕ,2 (X) with λmin (·) denoting the square
root of the minimum eigenvalue. Replacing σϕ,2 (X) with
1/2
λmin (XX ⊤) in (24) yields an overestimate of Bϕ (r, X) which
is computable.
Remark 5. Corollary 1 still holds true if one replaces
T (ξ(X)) with πϕc (X) defined in (11). As shown in [18], the
number πϕc (X) in (11) is computable although at the price
of a combinatorial complexity. However if the n-dimension of
X is small enough the complexity of the algorithm proposed
there can be affordable. Then by using our formula (24) and
Remark 4 above, it is possible therefore to obtain a smaller
bound on the estimation error.
B. Single output case: ℓ1 norm
In this section, we discuss for an illustrative purpose, the
applicability of Theorem 3 to the case of single-output systems. This is an interesting case to highlight since it represents
2 Recall that T is a decreasing function hence implying that T (ξ(X)) is
large when ξ(X) is small.
the most classical situation. Consider the single-output system
defined by
yt = (θo )⊤ xt + ft + et
(26)
where yt , et , ft are scalars and xt and θo are n-dimensional
vectors. By letting Y = [y1 · · · yN ] ∈ R1×N and defining
E and F similarly, we obtain
Y = (θo )⊤ X + F + E.
(27)
This last equation corresponds indeed to (2) where the matrix
Ao reduces
to the row vector (θo )⊤ . In this case, if we let
PN
n
ϕ(B) =
i=1 kbi k2 then for any θ ∈ R , the columns of
(the row vector) Y − AX are scalars so that
ϕ(Y − θ⊤ X) =
N
X
yt − θ⊤ xt
t=1
2
=
N
X
yt − θ⊤ xt . (28)
t=1
As a result, Ψ coincides in this case with the Least Absolute
Deviation (LAD) estimator. The following corollary specializes the result of Theorem 3 to the LAD estimator.
1×N
Corollary 2. Let (Y, X)
× Rn×N be generated by
∈R
c
c
model (26). Let S = t ∈ I : ft 6= 0 , S 0 = I \ S
. Assume
c
that X is self-decomposable and |S | < T ξ(X) . Then for
any θ⋆ ∈ arg min Y − θ⊤ X 1 ,
θ∈Rn
where
kθ⋆ − θo k2 ≤ B1,2 |S 0 |, X kES 0 k1
2
,
h
N −r i
σ1,2 (X) 1 −
T (ξ(X))
X ⊤η 1
.
σ1,2 (X) = inf
η6=0
kηk2
B1,2 (r, X) =
Again here the bound B1,2 (r, X) can be numerically overestimated by following the idea of Remark 4.
VI. N UMERICAL
ILLUSTRATIONS
The performance of the estimator Ψ has been extensively
tested in some existing papers in the special case of the LAD
(see e.g., [3]) . We therefore concentrate here on evaluating
numerically an estimate of the gain of the estimator based on
Corollary 1 and Remark 4. The estimation is carried out for
the case where ϕ consists in the sum of 2-norms and q = 2.
Four different cases are studied:
(a) Static data: X ∈ R2×200 is sampled from a Gaussian distribution N (0, I2 ) with zero-mean and identitycovariance.
(b) Dynamic data generated by a switched linear system:
X ∈ R2×200 is formed with the regressors (yt−1 , ut−1 )
generated by a switched linear system composed of 3
subsystems of order 1. This is a switched ARX system defined by yt = aσ(t) yt−1 + bσ(t) ut−1 with the
switching signal σ(t) ∈ {1, 2, 3} generated from a
uniform distribution and input ut being a white noise
with Gaussian distribution; (a1 , b1 ) = (−0.40, −0.15),
(a2 , b2 ) = (1.55, −2.10) and (a3 , b3 ) = (1, −0.65).
8
3
3
T (ξ(X))
c (X)
πϕ
T (ξ(X))
c (X)
πϕ
Bound
Bound
2
2
1
1
0
0
2
4
6
8
10
12
14
16
18
20
22
24
26
28
0
2
Percentage of nonzeros [%]
(a) static system: ξ(X) = 0.0083
4
6
8
10
12
14
3
18
20
3
T (ξ(X))
c (X)
πϕ
T (ξ(X))
c (X)
πϕ
2
2
Bound
Bound
16
Percentage of nonzeros [%]
(b) switched system: ξ(X) = 0.0127
1
1
0
2
4
6
8
10
12
Percentage of nonzeros [%]
(c) linear system: ξ(X) = 0.0188
0
0
2
4
6
8
10
12
14
16
18
20
22
Percentage of nonzeros [%]
(d) nonlinear system: ξ(X) = 0.0107
Fig. 1: An overestimate of Bϕ using respectively πϕc (X) and T (ξ(X)) for a data matrix X ∈ R2×200 : (a) static data sampled
from a Gaussian distribution; (b) data generated by a switched system; (c) data generated by a linear dynamic system ; (d) data
generated by a dynamic nonlinear system. In each case, the x-axis is limited to the range of nonzero gross errors proportions
which statisfy the stability condition |S c | /N < T ξ(X) /N (see e.g., Corollary 1).
then the so-defined estimator will inherit robustness properties.
Considering a data set generated by a linear model subject to
both sparse and dense noises, we showed that the estimator is
insensitive to the sparse noise when this latter is acting alone
and provided that the number of its nonzero components is no
larger than a certain (computable) threshold. Conditions are
proposed for the exact recovery of the true parameter matrix
when only the sparse noise is active. When both types of noises
affect the measurements we propose computable bounds on
the parametric estimation error. By assuming stochasticity of
the dense noise sequence, the obtained bounds are probably
improvable by exploiting appropriately the statistics of the
dense noise. This is a matter than can be investigated in future
research.
(c) Dynamic data generated by a linear ARX system defined
by yt = a1 yt−1 + b1 ut−1 with the (a1 , b1 ) defined above
in case (b).
(d) Dynamic data generated by a nonlinear NARX system
2
defined by yt = (yt−1 + 2.5)/(1 + yt−1
) + ut−1 .
Following Remark 1, the columns of all data matrices X have
been normalized to unit 2-norm before being processed.
Figure 1 plots the obtained estimate of the estimator gain
against the proportion of correctable outliers. As remarked in
Section V, the gain estimate increases as the proportion of
outliers gets larger. But the growth rate of the gain estimate
depends on the genericity of the data matrix X. The more
generic the columns of X are, the smaller the growth rate
of the estimation error is when regarded as a function of
the proportion of outliers. The experiment confirms also the
intuition according to which static data tend to be more generic
than data generated by a dynamic system. Among the three
cases of dynamic systems, the linear system appears to be the
one generating the least generic data.
The author is grateful to the Associate Editor and the
anonymous reviewers for constructive feedback.
VII. C ONCLUSIONS
R EFERENCES
In this paper we have discussed a somewhat general framework for designing a robust estimator. Given the training data,
the estimator is defined as the minimizing set of a certain
performance index applying to the data. We have shown that
if the performance function possesses some key properties,
[1] L. Bako. Identification of switched linear systems via sparse optimization. Automatica, 47:668–677, 2011.
[2] L. Bako. Subspace clustering through parametric representation and
sparse optimization. IEEE Signal Processing Letters, 21:356–360, 2014.
[3] L. Bako and H. Ohlsson. Analysis of a nonsmooth optimization approach
to robust estimation. Automatica, 66:132–145, 2016.
ACKNOWLEDGEMENT
9
[4] E. Candès and P. A. Randall. Highly robust error correction by convex
programming. IEEE Transactions on Information Theory, 54:2829–
2840, 2006.
[5] E. J. Candès and M. B. Wakin. An introduction to compressive sampling.
IEEE Signal Processing Society, 25:21–30, 2008.
[6] D. L. Donoho, M. Elad, and V. Temlyakov. Stable recovery of
sparse overcomplete representations in the presence of noise. IEEE
Transactions on Information Theory, 52:6–18, 2006.
[7] S. Foucart and H. Rauhut. A mathematical introduction to compressive
sensing. Birkhäuser, 2013.
[8] P. J. Huber. The place of l1 -norm in robust estimation. Computational
Statistics and Data Analysis, 5:255–262, 1987.
[9] P. J. Huber and E. M. Ronchetti. Robust Statistics. A. John Wiley &
Sons, Inc. Publication (2nd Ed), 2009.
[10] A. Juditsky and A. Nemirovski. On verifiable sufficient conditions for
sparse signal recovery via ℓ1 minimization. Mathematical Programming,
127:57–88, 2011.
[11] L. Ljung. System Identification: Theory for the user (2nd Ed.). PTR
Prentice Hall., Upper Saddle River, USA, 1999.
[12] R. A. Maronna, R. D. Martin, and V. J. Yohai. Robust Statistics: Theory
and Methods. John Wiley & Sons, Inc., 2006.
[13] K. Mitra, A. Veeraraghavan, and R. Chellappa. Analysis of sparse
regularization based robust regression approaches. IEEE Transactions
on Signal Processing, 61:1249–1257, 2013.
[14] N. Ozay and M. Sznaier. Hybrid system identification with faulty measurements and its application to activity analysis. In IEEE Conference
on Decision and Control and European Control Conference, Orlando,
FL, USA, 2011.
[15] N. Ozay, M. Sznaier, C. Lagoa, and O. Camps. A sparsification approach
to set membership identification of a class of affine hybrid systems. IEEE
Transactions on Automatic Control, 57:634–648, 2012.
[16] P. J. Rousseeuw. Least median of squares regression. Journal of the
American Statistical Association, 79:871–880, 1984.
[17] P. J. Rousseeuw and A. M. Leroy. Robust Regression and Outlier
Detection. John Wiley & Sons, Inc., 2005.
[18] Y. Sharon, J. Wright, and Y. Ma. Minimum sum of distances estimator:
Robustness and stability. In American Control Conference, St Louis,
MO, USA, 2009.
[19] T. Soderstrom and P. Stoica. System identification. Prentice Hall, Upper
Saddle River, USA, 1989.
[20] A. M. Tillmann and M. E. Pfetsch. The computational complexity
of the restricted isometry property, the nullspace property, and related
concepts in compressed sensing. IEEE Transactions on Information
Theory, 60:1248–1259, 2014.
[21] W. Xu, E.-W. Bai, and M. Cho. System identification in the presence
of outliers and random noises: A compressed sensing approach. Automatica, 50:2905–2911, 2014.
[22] G. Zames. Feedback and optimal sensitivity: Model reference transformations, multiplicative seminorms, and approximate inverses. IEEE
Transactions on Automatic Control, 26:301–320, 1981.
| 3cs.SY
|
Systematic N-tuple Networks for Position
Evaluation: Exceeding 90% in the Othello League
Wojciech Jaśkowski
arXiv:1406.1509v3 [cs.NE] 25 Jun 2014
Institute of Computing Science, Poznan University of Technology, Poznań, Poland
[email protected]
Abstract—N-tuple networks have been successfully used as
position evaluation functions for board games such as Othello
or Connect Four. The effectiveness of such networks depends
on their architecture, which is determined by the placement
of constituent n-tuples, sequences of board locations, providing
input to the network. The most popular method of placing ntuples consists in randomly generating a small number of long,
snake-shaped board location sequences. In comparison, we show
that learning n-tuple networks is significantly more effective
if they involve a large number of systematically placed, short,
straight n-tuples. Moreover, we demonstrate that in order to
obtain the best performance and the steepest learning curve for
Othello it is enough to use n-tuples of size just 2, yielding a
network consisting of only 288 weights. The best such network
evolved in this study has been evaluated in the online Othello
League, obtaining the performance of nearly 96% — more than
any other player to date.
Keywords: Othello, Reversi, evolution strategy, n-tuple networks, Othello League, tabular value functions, strategy representation
I. I NTRODUCTION
Board games have always attracted attention in AI due
to they clear rules, mathematical elegance and simplicity.
Since the early works of Claude Shannon on Chess [1]
and Arthur Samuel on Checkers [2], a lot of research have
been conducted in the area of board games towards finding
either perfect players (Connect-4, [3]), or stronger than human
players (Othello, [4]). The bottom line is that board games still
constitute valuable test-beds for improving general artificial
and computational intelligence game playing methods such as
reinforcement learning, Monte Carlo tree search, branch and
bound, and (co)evolutionary algorithms.
Most of these techniques employ a position evaluation function to quantify the value of a given game state. In the context
of Othello, one of the most successful position evaluation
functions is tabular value function [5] or n-tuple network [6]. It
consists of a number of n-tuples, each associated with a look
up table, which maps contents of n board fields into a real
value. The effectiveness of n-tuple network highly depends on
the placement of n-tuples [7]. Typically, n-tuples architectures
consist of a small number of long, randomly generated, snakeshaped n-tuples [8], [7], [9].
Despite the importance of network architecture, to the best
of our knowledge no study exist that studies and evaluates
different ways of placing n-tuples on the board.
In this paper, we propose an n-tuple network architecture
consisting of a large number of short, straight n-tuples, gen-
a
b
c
d
e
f
g
h
1
2
3
4
5
6
7
8
Figure 1: An Othello position, where white has 6 legal moves
(dashed gray circles). If white places a piece on e3, the pieces
on d3, d4, and e4 are reversed to white.
erated in a systematic way. In the extensive computational
experiments, we show that for learning position evaluation for
Othello, such an architecture is significantly more effective
than the one involving randomly generated n-tuples. We also
investigate how the length of n-tuples affects the learning
results. Finally, the performance of the best evolved n-tuple
network is evaluated in the online Othello League.
II. M ETHODS
A. Othello
Othello (a.k.a. Reversi) is a two player, deterministic, perfect information strategic game played on an 8 × 8 board.
There are 64 pieces being black on one side and white on
the other. The game starts with two white and two black
pieces forming an askew cross in the center on the board.
The players take turns putting one piece on the board with
their color facing up. A legal move consists in placing a piece
on a field so that it forms a vertical, horizontal, or diagonal
line with another player’s piece, with a continuous, non-empty
sequence of opponent’s pieces in between (see Fig. 1), which
are reversed after the piece is placed. Player passes if and only
if it cannot make a legal move. The game ends when both
players passed consecutively. Then, the player having more
pieces with their color facing up wins.
Table I: The weights of the Standard WPC Heuristic player
(SWH)
1
−0.25
0.1
0.05
0.05
0.1
−0.25
1
−0.25
−0.25
0.01
0.01
0.01
0.01
−0.25
−0.25
0.1
0.01
0.05
0.02
0.02
0.05
0.01
0.1
0.05
0.01
0.02
0.01
0.01
0.02
0.01
0.05
0.05
0.01
0.02
0.01
0.01
0.02
0.01
0.05
0.1
0.01
0.05
0.02
0.02
0.05
0.01
0.1
−0.25
1
−0.25 −0.25
0.01 0.1
0.01 0.05
0.01 0.05
0.01 0.1
−0.25 −0.25
−0.25 1
a
B. Position Evaluation Functions
In this paper, our goal is not to design state-of-the-art
Othello players, but to evaluate position evaluation functions.
That is why our players are simple state evaluators in a 1-ply
setup: given the current state of the board, a player generates
all legal moves and applies the position evaluation function
to the resulting states. The state gauged as the most desirable
determines the move to be played. Ties are resolved at random.
The simplest position evaluation function is positionweighted piece counter (WPC), which is a linear weighted
board function. It assigns a weight wrc to a board location
(r, c) and uses scalar product to calculate the utility f of
a board state b = (brc )r,c=1...8 :
f (b) =
8 X
8
X
wrc brc ,
r=1 c=1
where bij is 0 in the case of an empty location, +1 if a black
piece is present or −1 in the case of a white piece.
A WPC player often used in Othello research as an expert
opponent [18], [6], [19], [13], [16], [7] is Standard WPC
Heuristic Player (SWH). Its weights, hand-crafted by Yoshioka
et al. [20], are presented in Table I.
C. Othello Position Evaluation Function League
WPC is only one of the possible position evaluation functions. Others popular ones include neural networks and n-tuple
networks. To allow direct comparison between various position
evaluation functions and algorithms capable of learning their
parameters, Lucas and Runarsson [18] have appointed the Othello Position Evaluation Function League 1 . Othello League,
for short, is an on-line ranking of Othello 1-ply state evaluator
players. The players submitted to the league are evaluated
against SWH (the Standard WPC Heuristic Player).
Both the game itself and the players are deterministic (with
an exception of the rare situation when at least two positions
have the same evaluation value). Therefore, to provide more
continuous performance measure, Othello League introduces
some randomization to Othello. Both players are forced to
make random moves with the probability of = 0.1. As
1 http://algoval.essex.ac.uk:8080/othello/League.jsp
c
d
3
1
2
3
4
5
Othello has been found to have around 1028 legal positions
[10] and has is not been solved; this is one reason why it has
become such a popular domain for computational intelligence
methods [11], [12], [13], [14], [15], [16], [7], [17].
b
6
3
e
g
f
2
2
1
1
0
0
0123 weight
h
3
3
2
1
0
0
1
2
2
1
0
0
1
2
3
7
3
8
0
0
1
1
2
2
3
3
0000
0001
0010
..
.
0111
..
.
1111
..
.
2211
..
.
2222
3.04
−3.90
−2.14
..
.
5.89
..
.
−1.01
..
.
−9.18
..
.
3.14
Figure 2: An 4-tuple employed eight times to take advantage of
board symmetries (symmetric sampling). The eight symmetric
expansions of the 4-tuple return, in total, 5×−1.01+2×5.89−
9.18 = −2.45 for the given board state.
a consequence the players no longer play (deterministic)
Othello, but stochastic -Othello. However, it was argued that
the ability to play -Othello is highly correlated with the ability
to play Othello [18].
The performance in Othello League is determined by the
number of wins against SWH player in -Othello in 50 double
games, each consisting of two single games played once white
and once black. To aggregate the performance into a scalar
value, we assume that a win counts as 1 point, while a draw
0.5 points. The average score obtained in this way against
SWH constitutes the Othello League performance measure,
which we incorporate in this paper.
D. N-tuple Network
The best performing evaluation function in the Othello
League is n-tuple network [16]. N-tuple networks have been
first applied to optical character recognition problem by Bledsoe and Browning [21]. For games, it have been used first
by Buro under the name of tabular value functions [5], and
later popularized by Lucas [6]. According to Szubert et al.
their main advantages of n-tuple networks “include conceptual
simplicity, speed of operation, and capability of realizing
nonlinear mappings to spaces of higher dimensionality” [7].
N-tuple network consists of m ni -tuples, where ni is tuple’s
size. For a given board position b, it returns the sum of
values returned by the individual n-tuples. The ith ni -tuple,
for i = 1 . . . m, consists of a predetermined sequence of board
locations (locij )j=1...ni , and a look up table LUTi . The latter
contains values for each board pattern that can be observed
on the sequence of board locations. Thus, n-tuple network is
a function
f (b) =
m
X
i=1
fi (b) =
m
X
i=1
LUTi index bloci1 , . . . , blocini .
a
b
c
d
e
f
g
h
a
1
1
2
2
3
3
4
4
5
5
6
6
7
7
8
8
(a) rand-8×4 network consisting of 8 randomly generated
snake-shaped 4-tuples (648 weights).
b
c
d
e
f
g
h
(b) all-3 network consisting of all 24 straight 3-tuples (648
weights).
Figure 3: Comparison of rand-* and all-* n-tuple network architectures. “Main” n-tuples have been shown by red, while their
symmetric expansions by light gray.
Among possible ways to map the sequence to an index in the
look up table, the following one is arguably convenient and
computationally efficient:
index(v) =
|v|
X
vj cj−1 ,
j=1
where c is a constant denoting the number of possible values
on a single board square, and v is the sequence of board values
(the observed pattern) such that 0 ≤ vj < c for j = 1 . . . |v|.
In the case of Othello, c = 3, and white, empty, and black
squares are encoded as 0, 1, and 2, respectively.
The effectiveness of n-tuple networks is improved by using
symmetric sampling, which exploits the inherent symmetries of
the Othello board [11]. In symmetric sampling, a single n-tuple
is employed eight times, returning one value for each possible
board rotation and reflection. See Fig. 2 for an illustration.
E. N-tuple Network Architecture
Due to the spatial nature of game boards, n-tuples are usually consecutive snake-shaped sequences of locations, although
this is not a formal requirement. If each n-tuple in a network is
of the same size, we denote it as m × n-tuple network, having
m × 3n weights. Apart from choosing n and m, an important
design issue of n-tuples network architecture is the location of
individual n-tuples on the board [7].
1) Random Snake-shaped N-tuple Network: Thus it is surprising that so many investigations in game strategy learning have involved randomly generated snake-shaped n-tuple
networks. Lucas [6] generated individual n-tuples by starting
from a random board location, then taking a random walk of 6
steps in any of the eight orthogonal or diagonal directions. The
repeated locations were ignored, thus the resulting n-tuples
were from 2 to 6 squares long. The same method Krawiec
and Szubert used for generating 7 × 4, 9 × 5 and 12 × 6-tuple
networks [22], [7], and Thill et al. [23] for generating 70 × 8
tuple networks playing Connect Four.
An m × n-tuple network generated in this way we will
denote as rand-m × n (see Fig. 3a for an example).
2) Systematic Straight N-tuple Network: Alternatively, we
propose a deterministic method of constructing n-tuple networks. Our systematic straight n-tuple networks consist of all
possible vertical, horizontal or diagonal n-tuples placed on
the board. Its smallest representative is a network of 1-tuples.
Thanks to symmetric sampling, only 10 of them is required
for an 8 × 8 Othello board, and such 10 × 1-tuple network,
which we denote as all-1 contains 3 × 101 = 30 weights. all2 network containing 32 2-tuples is shown in Fig. 3b. Table
II shows the number of weights in selected architectures of
rand-* and all-* networks.
3) Other Approaches: Logistello [4], computer player,
which beat the human Othello world champion in 1997, used
11 n-tuples of n ∈ {3, 10}, hand-crafted by an expert. External
knowledge has also been used by Manning [8], who, generated
a diverse 12 × 6-tuple network using random inputs method
from Breiman’s Random Forests basing on a set of 10 000
labeled random games.
F. Learning to Play Both Sides
When a single player defined by its evaluation function is
meant to play both as black and white, it must interpret the
result of the evaluation function complementary depending
on the color it plays. There are three methods serving this
purpose.
The first one is doubled function (e.g., [23]), which simply
employs two separate functions: one for playing white and
the other for playing black. It allows to fully separate the
strategy for white and black players. However, its disadvantage
consists in that two times more weights must be learned, and
all-2 (32 × 2)
all-3 (24 × 3)
all-4 (21 × 4)
weights
architecture
weights
288
648
1701
rand-10 × 3
rand-8 × 4
rand-7 × 5
270
648
1701
Table II: The number of weights for three pairs of systematic
straight (all-*) and random snake-shaped (rand-*) n-tuple
networks architectures.
the experience learned when playing as black does not used
when playing as white and vice versa.
Output negation and board inversion (e.g., [9]) are alternatives to doubled function. They use only single set of
weights, reducing the search space and allowing to transfer the
experience between the white and black player. When using
output negation, black selects the move leading to a position
with the maximal value of the evaluation function whereas
white selects the move leading to a position with the minimal
value.
If a player uses board inversion it learns only to play black.
As the best black move it selects the one leading to the position
with the maximum value. If it has to play white, it temporarily
flips all the pieces on the board, so it can interpret the board as
if it played black. Then it selects the best ‘black’ move, flips
all the pieces back, and plays the white piece in the selected
location.
The SWH player uses output negation.
III. E XPERIMENTS AND R ESULTS
A. Common Settings
1) Evolutionary Setup: In order to compare different ntuple network architectures, we performed several computational experiments. In each of them the weights of n-tuple
networks have been learned by (10 + 90) evolution strategy
[24] for 5000 generations. The weights of individuals in the
initial population were drawn from the [−0.1, 0.1] interval.
Evolution strategy used Gaussian mutation with σ = 1.0. The
individual’s fitness was calculated using the Othello League
performance measure estimated over 1000 double games (cf.
II-C).
In total, 1010 games were played in each evolutionary run.
This makes our experiments exceptionally large compared to
the previous studies. For example, in a recent study concerning
n-tuple networks [7] 3×106 games were played. Also, despite
using the much simpler WPC representation, Samothrakis et
al. [16] performed 108 games per run.
Such extensive experiment was possible due to efficient
n-tuple network and Othello implementation in Java, which
is capable of running about 1000 games per second on a
single CPU core. Thanks to it, we were able to finish one
evolutionary run in 28 hours on a 6-core Intel(R) Core(TM)
i7-2600 CPU @3.40GHz.
2) Performance Evaluation: We repeated each evolutionary
10 times. Every 10 generations, we measured the (Othello
League) performance of the fittest individual in the population
0.8
performance
architecture
0.7
0.6
v
-in
4
x
8
nd-
ra
ran
g
-ne
4
x
d-8
nv
1-i
l
l
a
g
-ne
1
all-
Figure 4: Comparison of output negation against board inversion for two n-tuples architectures. The performance is measured as the average score obtained against the Standard WPC
Heuristic Player at = 0.1 (Othello League performance). In
each violin shape, the white dot marks the median, the black
boxes range from the lower to the upper quartile, while the thin
black lines represent 1.5 interquartile range. Outliers beyond
this range are denoted by black dots. The outer shape shows
the probability density of the data.
using 50 000 double games. The performance of the fittest
individual from the last generation is identified with method’s
performance. Since, the sample size is only 10 per method, for
statistical analysis of the following experiments, we used nonparametric Wilcoxon rank sum test (a.k.a. the Mann-Whitney
U test) with the significance level α = 0.01 and Holm’s
correction when comparing more than two methods at once.
B. Preliminary: Board Inversion vs. Output Negation
Figure 4 presents the results of learning with board inversion
against output negation for representatives of both types of ntuple networks architectures: rand-8 × 4 having 8 × 43 = 648,
and all-1 with 10 × 31 = 30 weights.
The figure shows that board inversion surpasses output
negation regardless of the player architecture, which confirms
a previous study of the two methods for preference learning
[9]. The differences between the methods are statistically
significant (see also the detailed results in Table IV).
Moreover, visual inspection of the violin plots reveals that
board inversion leads to more robust learning, since the
variance of performances is lower. Therefore, in the following
experiments we employ exclusively board inversion.
C. All Short Straight vs. Random Long Snake-shaped N-tuples
In the main experiment, we compare n-tuple networks
consisting of all possible short straight n-tuples (all-2, all-3,
and all-4) with long random snake-shaped ones (rand-10 × 3,
rand-8 × 4 and rand-7 × 5). We chosen the number of ntuples and size of them to make the number of weights in of
performance
0.95
0.90
0.85
0.80
0.75
nv
nv
nv
nv
nv
nv
2-i
3-i
4-i
4-i
5-i
3-i
x
x
x
l
l
l
l
l
l
8
7
0
a
a
a
ddd-1
ran
ran
ran
Figure 5: The comparison of all short straight n-tuple networks
(all-*) with random long snake-shaped n-tuple networks (rand*). The distribution of performances is presented as violin plots
(see Fig. 4 for explanation).
corresponding architectures are equal, or, if impossible, similar
(see Table II).
The results of the experiment are shown in Figure 5 as violin
plots. Statistical analysis of three pairs having equal or similar
number of weights reveals that:
• all-2 is better than rand-10 × 3,
• all-3 is better than rand-8 × 4, and
• all-4 is better than rand-7 × 5.
Let us notice that the differences in performance are substantial: for the pair all-2 vs. rand-10 × 3, where the difference in
performance is the lowest, the best result obtained by rand10 × 3 is still lower than the worst result obtained by all-2
(see Table IV for details).
All-* architectures are also more robust, due to lower
variances than rand-* architectures (cf. Fig. 5). This is because
the variance of rand-* architectures is attributed to both its
random initialization and non-deterministic learning process,
while the variance of all-* is only due to the latter.
D. 2-tuples are Long Enough
Intuitively, longer n-tuples should lead to higher network’s
performance, since they can ‘react’ to patterns that the shorter
ones cannot. However, the results presented in Fig. 5 show no
evidence that this is a case. Despite having two times more
weights, all-3 does not provide better performance than all-2
(no statistical difference). Furthermore, all-4 is significantly
worse than both than all-2 and all-3.
Figure 6 shows the pace of learning for each of six analyzed
architectures. It plots methods’ performance as a function of
computational effort, which is proportional to the number of
generations.
The figure suggests that all-2 is not only the best (together
with all-3) in the long run, but it is also the method that learns
the quickest. all-3 catches up all-2 eventually, but it does not
date
player name
encoding
n/a
2013-09-17
2011-01-30
2011-01-28
2011-01-25
2008-05-03
2008-05-03
2008-03-28
2007-09-14
all-2-inv
wj-1-2-3-tuples
epTDLmpx_12x6 [7]
prb_nt15_001
epTDLxover [7]
t15x6x8
x30x6x8
Stunner
MLP(...)312-ties0.FF
n-tuple network
288
n-tuple network
966
n-tuple network
3240
n-tuple network
6561
n-tuple network
4698
n-tuple network 10 935
n-tuple network 21 870
n-tuple network
7725
neural network
1915
weights performance
0.9592
0.9149
0.871
0.845
0.83
0.805
0.73
0.675
0.62
Table III: Selected milestones (improvements) in the on-line
Othello Position Evaluation Function League since September
2007. The table consists also all-2, not submitted to the
League since it uses board inversion. The performances of
all but the three best players come from the Othello League
website and have been estimated using 50 double games. The
performances of all-2 and wj-1-2-3-tuples players have been
estimated using 50 000 double games, and the performance of
epTDLmpx_12x6 has been reported in [7].
seem to be able to surpass it. all-4 learns even slower than
all-3. Although the gap between all-3 and all-4 decreases over
time, it is still noticeable after 5000 generations.
Thus, our results suggest that for Othello, all-2 with just
288 weights, the smallest among the six considered n-tuple
network architectures, is also the best one.
E. Othello League Results
The best player obtained in this research consists of all 2tuples; its performance is 0.9592 with 95% confidence delta
of ±0.0012. This result is significantly higher than the best
results reported to this date in the Othello League (see III).
Notice also how small it is (in terms of the number of weights)
compared to other players in the league. Unfortunately, the online Othello League accepts only players employing output
negation; it does not allow for board inversion. Thus, our
player could not be submitted to the Othello League.
To be accepted in the Othello League, we performed some
experiments also with output negation. The best output negation player we were able to evolve was submitted under the
name of wj-1-2-3-tuples. It consists of all straight 1-, 2-, and
3-tuples, thus having 966 weights in total.
wj-1-2-3-tuples took the lead in the league and is the first
player exceeding the performance of 0.9. It obtained 0.94 in
the league, but this result should be taken with care, since to
evaluate player’s performance Othello League plays just 100
games. We estimate its performance to 0.9149±0.0017 basing
on 50 000 double games.
We suspect that the performance of ca. 0.96 against Standard WPC Heuristic player that all-2 and all-3 converge to,
cannot be significantly improved at 1-ply. = 0.1 random
moves using in all games leads to the situation when even a
perfect-playing player cannot guarantee not losing a game.
1.00
0
1000
2000
generation
3000
4000
5000
performance
0.90
0.80
0.70
all-2-inv
all-3-inv
all-4-inv
0.60
0.50
0
200
400
600
games played
rand-10x3-inv
rand-8x4-inv
rand-7x5-inv
800
1000
(×106 )
Figure 6: Pace of learning of six analyzed n-tuple networks architectures. Each point on the plot denotes the average performance
of method’s fittest individual in a given generation.
Despite the first place obtained in the Othello League, the
evolved player is not good in ‘general’, against a variety of
opponents, because is was evolved specifically to play against
the Standard WPC Heuristic player. When evaluated against
random WPC players (the expected utility measure [14], [25]),
the best all-2 player obtains a score of only 0.9584 ± 0.0012.
This is not much, since with considerably less computational
effort that used in this paper, it is possible to evolve an n-tuple
player scoring > 0.99 [26], [7]. However, our goal here was
not to design good players in general, but to compare different
position evaluation functions.
The best all-2 player evolved in this paper is printed in
Fig. 7.
IV. D ISCUSSION : THE MORE WEIGHTS , THE WORSE FOR
EVOLUTION ?
We have shown that among all-* methods, the more weights
the worse results; the same applies to rand-* methods (see
Fig. 5). This finding confirms the one of Szubert et al. [7],
who found out that among the networks of rand-12 × 6 (8748
weights), rand-9 × 5 (2187 weights), and rand-7 × 4 (567
weights), it is the latter that allows (co)evolutionary algorithm
for obtaining best results. The authors stated that this effect it
due to the higher dimensionality of the search space, for which
“the weight mutation operator is not sufficiently efficient to
elaborate fast progress”.
Although we do not challenge this claim, our results suggest
that the number of weights in a network is not the only performance factor. all-4 has 1701 weights, thus, the dimensionality
of its search space is considerably higher than the one for
rand-10 × 3 and rand-8 × 4, which have 270 and 648 weights,
respectively. Nonetheless, among these three architectures, it
is the all-4 network that obtains the highest performance (see
Fig. 5). Therefore, the second performance factor in learning
an n-tuple network is its (proper or not) architecture.
Finally, let us notice that an alternative to a fixed n-tuple
network architecture is a self-adaptive one, which can change
in response to variation operators [7], such as mutation or
crossover. Although such architecture is, in principle, more
flexible, it adds another dimension to the search space, making
the learning problem even harder.
V. C ONCLUSIONS
In this paper, we have analyzed n-tuple network architectures for position evaluation function in board games. We have
shown that a network consisting of all possible, systematically
generated, short n-tuples leads to a significantly better play
than long random snake-shaped tuples originally used by
Lucas [11]. With a simple network consisting of all possible
straight 2-tuples (with just 288 weights) we were able to beat
the best result in the on-line Othello League (having usually
many times more weights).
Moreover, our results suggest that tuples longer than 2 give
no advantage, causing slower learning rate, at the same time.
This is surprising, since capturing opponent’s pieces in Othello
requires a line of at least three pieces (e.g. white, black, white).
Let us emphasize that our result has been obtained in an
intensive computational experiment involving 5000 generations, an order of magnitude more than other studies in this
domain. Nevertheless, it remains to be seen whether they hold
for different experimental settings. We used evolution against
an expert player in 1-ply -Othello. The interesting questions
are: i) whether our systematic short 2-tuple network is also
advantageous for reinforcement learning, such as temporal
difference learning, and ii) whether such networks are also
profitable for other board games, e.g. Connect Four.
ACKNOWLEDGMENT
This work has been supported by the Polish National
Science Centre grant no. DEC-2013/09/D/ST6/03932. The
{ 32
{ 2
{
{ 2
{
{ 2
{
{ 2
{
{ 2
{
{ 2
{
{ 2
{
{ 2
{
{ 2
{
{ 2
{
{ 2
{
{ 2
{
{ 2
{
{ 2
{
{ 2
{
{ 2
{
{ 2
{
{ 2
{
{ 2
{
{ 2
{
{ 2
{
{ 2
{
{ 2
{
{ 2
{
{ 2
{
{ 2
{
{ 2
{
{ 2
{
{ 2
{
{ 2
{
{ 2
{
{ 2
{
}
8 { 6 7 } { 55 63 } { 7 15 } { 56 57 } { 62 63 } { 0 1 } { 48 56 } { 0 8 }
5 7 . 6 4 −91.70 1 1 1 . 0 5 −82.30 7 4 . 4 2 −96.30 2 1 1 . 4 7 −53.91 1 4 2 . 4 5 } }
4 { 49 56 } { 0 9 } { 7 14 } { 54 63 }
8 4 . 5 1 −33.37 −29.83 −72.21 −199.31 −18.72 −98.04 2 2 . 3 4 1 8 5 . 8 4 } }
8 { 1 2 } { 15 23 } { 8 16 } { 40 48 } { 57 58 } { 5 6 } { 47 55 } { 61 62 }
−42.97 1 0 9 . 7 6 −66.10 8 4 . 6 7 1 5 8 . 0 9 −148.21 −11.94 −94.92 1 1 1 . 5 2 } }
8 { 48 49 } { 54 55 } { 8 9 } { 54 62 } { 6 14 } { 14 15 } { 49 57 } { 1 9 }
−144.66 1 6 . 1 6 −78.97 −83.93 −7.37 −15.97 −102.98 −51.68 −3.99 } }
8 { 41 48 } { 8 17 } { 6 13 } { 50 57 } { 53 62 } { 1 10 } { 46 55 } { 15 22 }
−115.74 −43.49 −117.28 3 3 . 3 2 −14.29 1 2 . 8 5 −18.33 2 . 9 5 9 1 . 1 7 } }
8 { 4 5 } { 16 24 } { 39 47 } { 58 59 } { 60 61 } { 32 40 } { 2 3 } { 23 31 }
3 1 . 2 8 −32.65 3 7 . 4 6 −20.60 2 7 3 . 3 9 −90.25 6 0 . 1 6 −151.55 −30.45 } }
8 { 2 10 } { 16 17 } { 46 47 } { 22 23 } { 50 58 } { 40 41 } { 5 13 } { 53 61 }
9 3 . 1 8 −27.12 −16.53 −2.52 −80.43 6 2 . 2 3 3 6 . 4 6 3 9 . 8 6 −97.27 } }
8 { 52 61 } { 23 30 } { 51 58 } { 16 25 } { 5 12 } { 2 11 } { 38 47 } { 33 40 }
−42.75 3 6 . 9 1 4 4 . 6 5 −49.19 −19.01 −55.54 1 0 . 6 0 −36.50 7 4 . 3 7 } }
4 { 24 32 } { 59 60 } { 3 4 } { 31 39 }
4 3 . 7 7 −122.45 5 5 . 4 3 −5.38 2 8 4 . 3 9 −103.51 7 9 . 4 4 −94.92 1 5 7 . 0 2 } }
8 { 52 60 } { 24 25 } { 51 59 } { 32 33 } { 4 12 } { 30 31 } { 38 39 } { 3 11 }
9 9 . 4 5 2 0 . 8 9 −10.97 1 5 . 3 9 −28.77 1 6 . 6 5 −16.89 −12.47 −18.57 } }
8 { 30 39 } { 25 32 } { 3 12 } { 51 60 } { 24 33 } { 31 38 } { 52 59 } { 4 11 }
1 4 . 8 5 8 8 . 0 4 −3.28 2 6 . 8 8 3 3 . 4 6 −19.67 −5.65 2 8 . 8 5 −43.03 } }
8 { 39 46 } { 53 60 } { 4 13 } { 17 24 } { 50 59 } { 32 41 } { 3 10 } { 22 31 }
−32.77 2 2 . 2 7 −51.36 −2.01 −65.96 −33.23 1 6 . 3 9 8 . 5 9 −28.07 } }
8 { 47 54 } { 5 14 } { 40 49 } { 49 58 } { 2 9 } { 14 23 } { 9 16 } { 54 61 }
−82.49 −5.56 1 0 . 1 9 −68.91 2 9 . 8 4 −37.59 −69.56 −0.20 1 0 . 6 3 } }
4 { 6 15 } { 48 57 } { 55 62 } { 1 8 }
−34.15 2 0 . 8 9 −135.36 7 9 . 2 2 3 0 . 5 5 2 0 . 1 3 3 5 . 2 7 −11.57 1 6 . 4 3 } }
8 { 13 14 } { 9 10 } { 41 49 } { 9 17 } { 53 54 } { 46 54 } { 49 50 } { 14 22 }
2 0 . 9 8 −44.43 3 0 . 9 4 −64.79 −27.71 −37.59 1 7 . 0 5 4 . 3 4 −17.03 } }
4 { 45 54 } { 9 18 } { 14 21 } { 42 49 }
4 3 . 0 8 1 0 4 . 4 3 1 4 . 6 9 2 4 . 4 9 3 1 . 9 6 −14.64 −51.11 −22.12 1 4 . 4 8 } }
8 { 38 46 } { 12 13 } { 52 53 } { 22 30 } { 50 51 } { 10 11 } { 33 41 } { 17 25
1 9 . 7 5 3 9 . 6 3 −16.15 1 . 7 5 −38.84 9 . 2 1 6 . 7 7 1 4 . 8 5 1 9 . 9 9 } }
8 { 41 42 } { 13 21 } { 45 46 } { 45 53 } { 10 18 } { 21 22 } { 17 18 } { 42 50
5 . 2 8 −38.02 1 2 . 6 4 −90.60 6 0 . 6 0 5 . 9 6 6 0 . 3 8 2 7 . 6 1 3 . 0 0 } }
8 { 37 46 } { 10 19 } { 17 26 } { 43 50 } { 22 29 } { 44 53 } { 13 20 } { 34 41
−13.44 1 9 . 4 8 −13.49 0 . 7 2 −59.65 −3.23 4 5 . 2 7 4 5 . 3 1 3 0 . 3 9 } }
4 { 25 33 } { 30 38 } { 11 12 } { 51 52 }
8 . 6 6 1 4 . 8 3 1 5 . 7 3 −34.15 3 2 . 0 8 −9.15 1 5 . 1 5 4 1 . 6 1 6 6 . 0 3 } }
8 { 25 26 } { 12 20 } { 11 19 } { 33 34 } { 44 52 } { 43 51 } { 37 38 } { 29 30
−71.70 1 2 . 0 7 −54.50 1 8 . 1 2 8 6 . 3 6 2 2 . 2 7 −56.07 −4.46 −43.54 } }
8 { 30 37 } { 43 52 } { 29 38 } { 26 33 } { 44 51 } { 25 34 } { 11 20 } { 12 19
1 1 . 3 4 2 5 . 6 4 −28.34 4 1 . 8 2 7 3 . 3 3 −26.18 −0.64 −25.88 −29.12 } }
8 { 42 51 } { 21 30 } { 45 52 } { 11 18 } { 12 21 } { 18 25 } { 38 45 } { 33 42
−32.37 2 8 . 6 0 1 3 . 6 5 −48.41 −13.25 −63.15 −30.60 1 8 . 9 9 2 2 . 6 4 } }
4 { 10 17 } { 13 22 } { 46 53 } { 41 50 }
3 1 . 8 9 −78.88 −32.75 4 4 . 8 8 −42.65 3 9 . 9 1 2 6 . 4 8 −12.34 −46.59 } }
8 { 34 42 } { 21 29 } { 20 21 } { 18 26 } { 18 19 } { 42 43 } { 37 45 } { 44 45
0 . 6 6 −29.13 1 2 . 9 5 −17.71 −71.59 1 1 . 4 0 3 1 . 5 2 −4.66 7 9 . 8 9 } }
4 { 35 42 } { 18 27 } { 21 28 } { 36 45 }
7 6 . 5 3 1 4 1 . 0 5 −5.04 6 1 . 8 9 1 6 . 1 3 4 3 . 9 5 −4.87 1 8 2 . 8 5 −92.46 } }
4 { 26 34 } { 43 44 } { 29 37 } { 19 20 }
−10.60 1 1 . 6 0 −8.56 −6.06 −137.99 −8.81 −3.62 3 . 3 0 −39.96 } }
8 { 20 28 } { 34 35 } { 28 29 } { 36 37 } { 26 27 } { 35 43 } { 36 44 } { 19 27
3 8 . 0 3 5 6 . 9 0 −26.64 −61.84 2 1 . 6 9 −116.98 7 . 9 1 5 3 . 4 8 −58.83 } }
8 { 19 28 } { 36 43 } { 29 36 } { 20 27 } { 26 35 } { 27 34 } { 35 44 } { 28 37
−17.67 8 1 . 7 8 −63.71 1 5 . 6 2 2 . 1 6 1 6 . 6 3 −14.70 4 3 . 6 1 −24.67 } }
4 { 34 43 } { 37 44 } { 20 29 } { 19 26 }
−18.74 −52.99 −3.10 −31.68 −181.22 −24.62 3 2 . 6 3 5 8 . 1 9 4 0 . 7 9 } }
4 { 35 36 } { 27 28 } { 28 36 } { 27 35 }
−100.00 −28.48 −4.99 −63.27 −80.05 −55.95 2 2 . 6 3 2 2 . 5 7 1 3 3 . 6 5 } }
2 { 28 35 } { 27 36 }
2 0 . 0 0 −52.52 −12.54 4 0 . 6 4 1 9 2 . 6 1 1 4 . 1 4 4 . 7 0 −1.81 −42.70 } }
Figure 7: N-tuple network representing the best evolved all2 player in the online Othello League format. The player
contains 32 2-tuples. Each one has at most 8 symmetric
expansions (sometimes 4 or 2). The fields are numbered from
0 to 63 in row-wise fashion. The network has 32 × 9 = 288
weights. The player uses board inversion. Its Othello League
performance is 0.9584 ± 0.0012.
computations have been performed in Poznań Supercomputing
and Networking Center. The author would like to thank Marcin
Szubert for his helpful remarks on an earlier version of this
article.
R EFERENCES
[1] C. E. Shannon, “XXII. Programming a computer for playing chess,”
Philosophical magazine, vol. 41, no. 314, pp. 256–275, 1950.
[2] A. L. Samuel, “Some studies in machine learning using the game of
checkers,” IBM Journal of Research and Development, vol. 3, no. 3, pp.
211–229, 1959.
[3] L. V. Allis, A knowledge-based approach of connect-four.
Vrije
Universiteit, Subfaculteit Wiskunde en Informatica, 1988.
[4] M. Buro, “Experiments with Multi-ProbCut and a new high-quality
evaluation function for Othello,” Games in AI Research, pp. 77–96, 2000.
}
}
}
}
}
}
}
}
}
[5] ——, “An evaluation function for othello based on statistics,” NEC,
Princeton, NJ, NECI 31, Tech. Rep., 1997
[6] S. Lucas, “Learning to play Othello with n-tuple systems,” Australian
Journal of Intelligent Information . . . , no. 4, pp. 1–20, 2008
[7] M. Szubert, W. Jaśkowski, and K. Krawiec, “On Scalability, Generalization, and Hybridization of Coevolutionary Learning: a Case Study for
Othello,” IEEE Transactions on Computational Intelligence and AI in
Games, 2013.
[8] E. P. Manning and A. Othello, “Using Resource-Limited Nash Memory
to Improve an Othello Evaluation Function,” IEEE Transactions on
Computational Intelligence and AI in Games, vol. 2, no. 1, pp. 40–53,
2010.
[9] T. Runarsson and S. Lucas, “Preference Learning for Move Prediction
and Evaluation Function Approximation in Othello,” Computational
Intelligence and AI in Games, IEEE Transactions on, 2014.
[10] V. L. Allis, “Searching for solutions in games and artificial intelligence,”
Ph.D. dissertation, University of Limburg, Maastricht, The Netherlands,
1994.
[11] S. M. Lucas, “Learning to play Othello with N-tuple systems,” Australian Journal of Intelligent Information Processing Systems, Special
Issue on Game Technology, vol. 9, no. 4, pp. 01–20, 2007.
[12] Y. Osaki, K. Shibahara, Y. Tajima, and Y. Kotani, “An Othello
evaluation function based on Temporal Difference Learning using
probability of winning,” 2008 IEEE Symposium On Computational
Intelligence and Games, pp. 205–211, Dec. 2008
[13] E. P. Manning, “Using resource-limited nash memory to improve an
othello evaluation function,” Computational Intelligence and AI in
Games, IEEE Transactions on, vol. 2, no. 1, pp. 40 –53, march 2010.
[14] S. Y. Chong, P. Tino, D. C. Ku, and Y. Xin, “Improving Generalization
Performance in Co-Evolutionary Learning,” IEEE Transactions on
Evolutionary Computation, vol. 16, no. 1, pp. 70–85, 2012
[15] S. van den Dries and M. A. Wiering, “Neural-Fitted TD-Leaf
Learning for Playing Othello With Structured Neural Networks,” IEEE
Transactions on Neural Networks and Learning Systems, vol. 23,
no. 11, pp. 1701–1713, Nov. 2012
[16] S. Samothrakis, S. Lucas, T. Runarsson, and D. Robles, “Coevolving
Game-Playing Agents: Measuring Performance and Intransitivities,”
IEEE Transactions on Evolutionary Computation, no. 99, pp. 1–15,
2012
[17] W. Jaśkowski, M. Szubert, and P. Liskowski, “Multi-criteria comparison of coevolution and temporal difference learning on othello,” in
EvoGames, ser. Lectures Notes in Computer Science, 2014.
[18] S. M. Lucas and T. P. Runarsson, “Temporal difference learning versus
co-evolution for acquiring othello position evaluation,” in IEEE Symposium on Computational Intelligence and Games. IEEE, 2006, pp.
52–59.
[19] M. Szubert, W. Jaśkowski, and K. Krawiec, “Coevolutionary Temporal
Difference Learning for Othello,” in IEEE Symposium on Computational
Intelligence and Games, 2009, Conference proceedings (article), pp.
104–111
[20] T. Yoshioka, S. Ishii, and M. Ito, “Strategy acquisition for the game,”
Strategy Acquisition for the Game "Othello" Based on Reinforcement
Learning, vol. 82, no. 12, pp. 1618–1626, 1999.
[21] W. W. Bledsoe and I. Browning, “Pattern recognition and reading by
machine,” in Proc. Eastern Joint Comput. Conf., 1959, pp. 225–232.
[22] K. Krawiec and M. Szubert, “Learning n-tuple networks for othello by
coevolutionary gradient search,” in GECCO 2011 Proceedings, N. K.
et al, Ed., ACM. ACM, 2011, pp. 355–362.
[23] M. Thill, P. Koch, and W. Konen, “Reinforcement Learning with Ntuples on the Game Connect-4,” in Parallel Problem Solving from Nature
- PPSN XII, ser. Lecture Notes in Computer Science, C. A. C. Coello,
V. Cutello, K. Deb, S. Forrest, G. Nicosia, and M. Pavone, Eds., vol.
7491. Springer, 2012, pp. 184–194.
[24] H.-G. Beyer and H.-P. Schwefel, “Evolution strategies–a comprehensive
introduction,” Natural computing, vol. 1, no. 1, pp. 3–52, 2002.
[25] W. Jaśkowski, P. Liskowski, M. Szubert, and K. Krawiec, “Improving
coevolution by random sampling,” in GECCO’13: Proceedings of the
15th annual conference on Genetic and Evolutionary Computation,
C. Blum, Ed. Amsterdam, The Netherlands: ACM, July 2013, pp.
1141–1148.
[26] P. Liskowski, “Co-Evolution Versus Evolution with Random Sampling
for Acquiring Othello Position Evaluation,” Ph.D. dissertation, Poznan
University of Technology, 2012.
all-2-inv
all-3-inv
all-4-inv
rand-10x3-inv
rand-8x4-inv
rand-7x5-inv
rand-8x4-neg
all-1-inv
all-1-neg
mean
median
0
1
2
3
4
5
6
7
8
9
0.9401
0.9379
0.9122
0.8681
0.8454
0.8012
0.7698
0.7362
0.5946
0.9361
0.9385
0.9101
0.8770
0.8530
0.7974
0.7741
0.7374
0.5790
0.9529
0.9326
0.9108
0.8649
0.8519
0.8285
0.8104
0.7337
0.5799
0.9330
0.9314
0.8967
0.8145
0.7927
0.8565
0.6959
0.7395
0.5584
0.9270
0.9402
0.9171
0.8834
0.8050
0.7978
0.8429
0.7423
0.5821
0.9578
0.9282
0.9076
0.8920
0.8595
0.8559
0.7133
0.7355
0.5650
0.9327
0.9382
0.9094
0.8126
0.8366
0.7398
0.7453
0.7434
0.6588
0.9349
0.9387
0.9230
0.8398
0.8630
0.7310
0.7817
0.7217
0.5780
0.9225
0.9404
0.9051
0.9190
0.8728
0.7803
0.8085
0.7317
0.6678
0.9372
0.9472
0.9030
0.8958
0.8733
0.7810
0.7517
0.7395
0.6097
0.9495
0.9452
0.9269
0.8706
0.8540
0.7970
0.7668
0.7361
0.5713
0.9535
0.9370
0.9227
0.8880
0.8453
0.8440
0.7813
0.7387
0.5752
Table IV: Performances obtained in 10 evolutionary runs of all n-tuple network architectures considered in this study. Each
value is an average score in 50 000 double games against Standard WPC Heuristic in -Othello, where = 0.1.
| 9cs.NE
|
Forest-based methods and ensemble model output statistics for
rainfall ensemble forecasting
Maxime Taillardat1,2,3 , Anne-Laure Fougères2 , Philippe Naveau3 , and Olivier Mestre1
1
arXiv:1711.10937v1 [stat.ML] 29 Nov 2017
2
CNRM UMR 3589 and DirOP/COMPAS, Météo-France/CNRS, Toulouse, France
Univ Lyon, Université Claude Bernard Lyon 1, CNRS UMR 5208, Institut Camille Jordan, 43
blvd. du 11 novembre 1918, F-69622 Villeurbanne cedex, France
3
Laboratoire des Sciences du Climat et de l’Environnement (LSCE-CNRS-CEA-UVSQ-IPSL),
Gif-sur-Yvette, France
[email protected]
Abstract
Rainfall ensemble forecasts have to be skillful for both low precipitation and extreme events. We
present statistical post-processing methods based on Quantile Regression Forests (QRF) and Gradient
Forests (GF) with a parametric extension for heavy-tailed distributions. Our goal is to improve
ensemble quality for all types of precipitation events, heavy-tailed included, subject to a good overall
performance.
Our hybrid proposed methods are applied to daily 51-h forecasts of 6-h accumulated precipitation
from 2012 to 2015 over France using the Météo-France ensemble prediction system called PEARP.
They provide calibrated predictive distributions and compete favourably with state-of-the-art methods like Analogs method or Ensemble Model Output Statistics. In particular, hybrid forest-based
procedures appear to bring an added value to the forecast of heavy rainfall.
1
1.1
Introduction
Post-processing of ensemble forecasts
Accurately forecasting weather is paramount for a wide range of end-users, e.g. air traffic controllers,
emergency managers and energy providers (see, e.g. Pinson et al., 2007; Zamo et al., 2014). In meteorology, ensemble forecasts try to quantify forecast uncertainties due to observation errors and incomplete
physical representation of the atmosphere. Despite its recent developments in national meteorological
services, ensemble forecasts still suffer of bias and underdispersion (see, e.g. Hamill and Colucci, 1997).
Consequently, they need to be post-processed. At least two types of statistical methods have emerged in
the last decades: analogs method and ensemble model output statistics (EMOS) (see, e.g. Delle Monache
et al., 2013; Gneiting et al., 2005, respectively). The first one is fully non-parametric and consists in
finding similar atmospheric situations in the past and using them to improve the present forecast. In
contrast, EMOS belongs to the family of parametric regression schemes. If y represents the weather
variable of interest and (x1 , . . . , xm ) the corresponding m ensemble member forecasts, then the EMOS
predictive distribution is simply a distribution whose parameters depend on the values of (x1 , . . . , xm ).
Less conventional approaches have also been studied recently. For example, Van Schaeybroeck and Vannitsem (2015) investigated member-by-member post-processing techniques and Taillardat et al. (2016)
found that quantile regression forests (QRF) techniques performed well for temperatures and wind speed
data.
1
1.2
Forecasting and calibration of precipitation
Not all meteorological variables are equal in terms of forecast and calibration. In particular, Hemri et al.
(2014) highlighted that rainfall forecasting represents a steep hill. In this study, we will focus on 6-h
rainfall amounts in France because this is the unit of interest of the ensemble forecast system of MétéoFrance. For daily precipitation, extended logistic regression was frequently applied (see, e.g. Hamill
et al., 2008; Roulin and Vannitsem, 2012; Ben Bouallègue, 2013). Bayesian Model Averaging techniques
(Raftery et al., 2005; Sloughter et al., 2007) were also used in rainfall forecasting, but we will not cover
them here because a gamma fit is often applied to cube root transformed precipitation accumulations
and this complex transformation may not be adapted to 6h rainfall. Concerning analogs and EMOS
techniques, they have been applied to calibrate daily rainfall (see Hamill and Whitaker, 2006; Scheuerer,
2014; Scheuerer and Hamill, 2015). As the QRF method in Taillardat et al. (2016) performed better
than EMOS for temperatures and wind speeds, one may wonder if QRF could favourably compete with
EMOS and analogs techniques for rainfall calibration. This question is particularly relevant because
recent methodological advances have been made concerning random forests and quantile regressions. In
particular, Athey et al. (2016) proposed an innovative way, called gradient forests (GF), of using forests
to make quantile regression. In this context, we propose to implement and test this quantile regression
GF method for rainfall calibration and compare it with other approaches, see Section 2.
1.3
Parametric probability density functions (pdf ) of precipitation
Modeling precipitation distributions is a challenge by itself. It is a mixture of zeros (dry events) and
positive intensities, i.e. rainfall amounts for wet events. The latter have a skewed distribution. One
popular and flexible choice to model rainfall amounts is to use the gamma distribution or to built on
it. For example, Scheuerer and Hamill (2015) and Baran and Nemoda (2016) in a rainfall calibration
context employed the censored-shifted gamma (CSG) pdf defined by
(
κ−1
(1 − π) · (y+δ)
exp(−(y + δ)/θ), if y > 0
Γ(κ)
fCSG (y) =
(1)
π,
if y = 0,
where y ≥ 0, the positive constants (κ, θ) are the two gamma law parameters and the probability
π ∈ [0, 1] represents the mass of the gamma cumulative distribution function (cdf) below the level of
censoring δ ≥ 0. Hence, the probability of zero and positive precipitation are treated together. One
possible drawback of the CSG is that heavy daily and subdaily rainfall may not always have a nice upper
tail with an exponential decay like a gamma distribution, but rather a polynomial one, the latter point
being a key element in any weather risk analysis (see, e.g. Katz et al., 2002; De Haan and Ferreira, 2007).
To bring the necessary flexibility in modelling upper tail behavior in a rainfall EMOS context, Scheuerer
(2014) worked with a so-called censored generalized extreme value (CGEV) defined by
(1 − π) · g(y; µ, σ, ξ), if y > 0
fCGEV (y) =
(2)
π,
if y = 0,
where π = G(0; µ, σ, ξ) and the pdf g(y; µ, σ, ξ) which cumulative distribution function G is the classical
GEV
"
#
ξ(y − µ) −1/ξ
G(y; µ, σ, ξ) = exp − 1 +
for ξ 6= 0.
σ
+
Note that a+ = max(0, a) and that, if ξ = 0, then g(y; µ, σ, 0) represents the classical Gumbel pdf. To be
in compliance with extreme value theory (EVT) not only for heavy rainfall but also for low precipitation
amounts, Naveau et al. (2016) recently proposed a class of models referred as the extended generalized
Pareto (EGP) that allows a smooth transition between generalized Pareto (GP) type tails and the middle
part (bulk) of the distribution. It bypasses the complex thresholds selection step to define extremes.
Low precipitation can be shown to be gamma distributed, while heavy rainfall are Pareto distributed.
Mathematically, a cdf belonging to the EGP family has to be expressed as
T {Hξ (y/σ)} , for all y > 0,
2
where Hξ (y) = 1 − (1 + ξy)−1/ξ represents the GP cdf, while T denotes a continuous cdf on the unit
interval. To insure that the upper tail behavior of T is driven by the shape parameter ξ, the survival
function T̄ = 1 − T has to satisfy that lim T̄ (1−u)
is finite. To force low rainfall to follow a GPD for small
u
u↓0
values near zero, we need that
lim Tu(u)
s
u↓0
is finite for some real s > 0. Studies have already made this choice
(see, e.g. Vrac and Naveau, 2007; Naveau et al., 2016). In Naveau et al. (2016), different parametric
models of the cdf T satisfying the required constraints were compared. The special case where T (u) = uκ
with κ > 0 obeys these constraints and also corresponds to a model studied by Papastathopoulos and
Tawn (2013). In practice, this simple version of T appears to fit well daily and subdaily rainfall and
consequently, we will only focus on this case in this paper. In other words, our third model for the
precipitation pdf is
(1 − π) · σκ · {Hξ (x/σ)}κ−1 · hξ (y/σ), if y > 0
fEGP (y) =
(3)
π,
if y = 0,
where hξ (.) is the pdf associated with Hξ (.). In contrast to (1) and (2), the probability weight π is not
obtained by censoring, and it is just a parameter independent of (κ, σ, ξ)T .
At this stage, we have three parametric pdfs, see (1) and (2) and (3), to implement a EMOS approach
to 6-hour rainfall data, see Section 3. Besides comparing these three EMOS models, it is natural to
wonder if QRF and GF methods could take advantage of these three parametric forms.
1.4
Coupling parametric pdfs with random forest approaches
A drawback of data driven approaches like QRF and GF is that their intrinsic non parametric nature
make them useless to predict beyond the largest recorded rainfall. To circumvent this limit, we also
propose to combine random forest techniques with a EGP pdf defined by (3), see Section 2.3. Hence,
random forest-based post-processing techniques will be in compliance with EVT and this should be an
interesting path to improve prediction behind the largest values of the sample at hand.
1.5
Outline
This article is organized as follows. In Section 2, we recall the basic ingredients to create quantile
regression forests and gradient forests. In particular, we review the calibration process of the GF method
recently introduced by Athey et al. (2016) for quantile regression. Then, we explain how these trees are
combined with the EGP pdf defined by (3).
In Section 3, we propose to integrate the EGP pdf within a EMOS scheme.
The different approaches are implemented in Section 4 where the test bed dataset of 87 French
weather stations and the French ensemble forecast system of Météo-France called PEARP (Descamps
et al., 2014) is described. Then, we assess and compare each method with a special interest for heavy
rainfall, see Section 5. The paper closes with a discussion in Section 6.
2
2.1
Quantile regression forests and gradient forests
Quantile regression forests
Given a sample of predictors-response pairs, say (Xi , Yi ) for i = 1, . . . , n, classical regression techniques
connect the conditional mean of a response variable Y to a given set of predictors X. The quantile
regression forest (QRF) method introduced by Meinshausen (2006) also consists in building a link, but
between an empirical cdf and the outputs of a tree. Before explaining this particular cdf, we need to
recall how trees are constructed.
A random forest is an aggregation of randomized trees based on bootstrap aggregation on the one
hand, and on classification and regression trees (CART) (Breiman, 1996; Breiman et al., 1984) on the
other hand. These trees are built on a bootstrap copy of the samples by recursively maximizing a
3
splitting rule. Let D0 denote the group of observations to be divided into two subgroups, say D1 and
D2 . For each group, we can infer its homogeneity defined by
X
v(Dj ) =
[Y − Y (Dj )]2 ,
Y ∈Dj
where Y (Dj ) corresponds to the sample mean in Dj . To determine if this splitting choice is optimal,
the homogeneities v(D1 ) and v(D2 ) are compared to the one of D0 . For example, if wind speed is one
predictor in X and dividing low and large winds could better explain rainfall, then the cutting value,
say s, will be the one that maximizes
H(D1 , D2 ) = max∗ [v(D0 ) − v(D1 ) − v(D2 )]
s∈E
(4)
where E ∗ is a random subset of the predictors in the predictors’ space E. Each resulting group is itself
split into two, and so on until some stopping criterion is reached. As each tree is built on a random subset
of the predictors, the method is called “random forest” (Breiman, 2001). Binary regression trees can be
viewed as decision trees, each node being the criterion used to split the data and each final leaf giving
the predicted value. For example, if we observe a given wind speed x, we can find the final leaf that
corresponds to this value of x and the associated observations y, then we can compute the conditional
cumulative distribution function introduced by Meinshausen (2006)
Fb(y|x) =
n
X
ωi (x)1({Yi ≤ y}),
(5)
i=1
where the weights ωi (x) are deduced from the presence of Yi in a final leaf of each tree when one follows
the path determined by x. The interested reader is referred to Taillardat et al. (2016) for an application
of this approach to ensemble forecast of temperatures and winds.
2.2
Gradient forests
Meinshausen (2006) proposed splitting rule using CART regression splits. Arguing that this splitting
rule is not tailored to the quantile regression context, Athey et al. (2016) proposed another optimisation
scheme. Instead of maximizing the variance heterogeneity of the children nodes, one maximizes the
criterion
2
2
X
X
−1
∆(D1 , D2 ) =
ρi
(6)
|{i : Yi ∈ Dj }|
j=1
{i:Yi ∈Dj }
where the indicator function ρi = 1({Yi ≥ θ̂q,D0 }) is equal to one when Yi is greater than the q-th
quantile θ̂q,D0 of the observations of the parent node D0 . The terminology of gradient forests was
suggested because the choice of ρi is here linked with a gradient-based approximation of the quantile
function
Ψθ̂q,D (Yi ) = q1({Yi > q}) + (1 − q)1({Yi ≤ q}).
0
This technique using gradients is computationally feasible, an issue not to be omitted when dealing with
non-parametric techniques. Note here that for each split the order of the quantile is chosen among given
orders (0.1, 0.5, 0.9). In the special case of least-square regression, ρi becomes Yi −Y (D0 ), and H(D1 , D2 )
becomes equivalent to ∆(D1 , D2 ). In this special case, gradient trees are equivalent to build a standard
CART regression tree.
2.3
Fitting a parametric form to QRF and GF trees
As mentioned in Section 1.4, the predicted cdf defined by (5) cannot predict values which are not in the
learning sample. This can be a strong limitation if the learning sample sample is small or rare events
are of interest or both. The GF method has the same issue. To parametrically model rainfall, the EGP
4
pdf defined by (3) appears to be a good candidate. It allows more flexibility in the fitting than CSG or
CGEV. This distribution has four parameters, π, κ, σ and ξ, it is in compliance with EVT for low and
heavy rainfalls and works well in practice (see, e.g. Naveau et al., 2016). In terms of inference, a simple
and fast method-of-moment can be applied. Basically, probability weighted moments (PWM) of a given
random variable, say Y , with survival function F (y) = P(Y > y), can be expressed as (see, e.g. Hosking
and Wallis, 1987)
Z 1
r
µr = E([Y F (Y )]) =
F −1 (q)(1 − q)r dq.
(7)
0
If Y follows a EGP pdf defined by (3), then we have
ξ
ξ
1
µ0 = κB(κ, 1 − ξ) − 1 and µ1 = κ (B(κ, 1 − ξ) − B(2κ, 1 − ξ)) − ,
σ
σ
2
1
ξ
µ2 = κ (B(κ, 1 − ξ) − 2B(2κ, 1 − ξ) + B(3κ, 1 − ξ)) − ,
σ
3
where B(., .) represents the beta function. Knowing the PWM triplet (µ0 , µ1 , µ2 )T is equivalent to know
the parameter vector (κ, σ, ξ)T . Hence, we just need to estimate these three PWMs. For any given forest,
it is possible to estimate the distribution of [Y |X = x] by the empirical cdf Fb(y|X = x) defined by (5).
Then, we can plug it in (7) to get
Z
µ̂r (x) =
1
Fb−1 (q|X = x)(1 − q)r dq.
0
This leads to the estimates of (κ(x), σ(x), ξ(x))T and consequently of f (y|X = x) via Equation (3).
Note that the probability of no rain π(x) is just inferred by counting the number of dry events in the
corresponding trees. In the following, this technique is called ”EGP TAIL”, despite the fact that the
whole distribution is fitted from QRF and GF trees.
3
Ensemble model output statistics and EGP
In Section 1.3, three definitions of parametric pdfs were recalled. By regressing their parameters on the
ensemble values, different EMOS models have been proposed for the CSG and CGEV pdfs defined by
(1) and by (2), respectively. More precisely, Baran and Nemoda (2016) used the CSG pdf by letting
the mean µ = κθ and variance σ 2 = κθ2 depend linearly as functions of the raw ensemble values and
their mean, respectively. The coefficients of this regression were estimated by miminizing the continuous
ranked probability score (CRPS) (see, e.g. Scheuerer and Hamill, 2015; Hersbach, 2000). The same
strategy can be applied to fit the CGEV pdf (see, e.g. Hemri et al., 2014). Scheuerer (2014) modelled
the scale parameter σ in (2) as an affine function of the ensemble mean absolute deviation rather than
of the raw ensemble mean or variance. Another point to emphasize is that the shape parameter ξ was
considered invariant in space in Hemri et al. (2014).
In this section, we basically explain how an EMOS approach can be built with the EGP pdf defined
by (3) and we now highlight common features and differences between the two EMOS with CSG and
CGEV. The scale parameter σ 2 in (3) is estimated in the same way than for CGEV. The presence of the
parameter κ allows an additional degree of freedom. The expectation of our EGP is mainly driven by the
product κσ. Consequently, we model κ as an affine function of the predictors divided by σ. As France
has a diverse climate, it is not reasonable to assume a constant shape parameter among all locations,
see the map in Figure 1. In addition, minimizing the CRPS to infer different shape parameters may be
inefficient (see, e.g. Friederichs and Thorarinsdottir, 2012). To estimate ξ at each location, we simply
use the PWM inference scheme described in Section 2.3. To complete the estimation of the parameters
in (3), the probability π is modeled as an affine function on [0, 1] of the raw ensemble probability of
rain and affine function parameters are also estimated by CRPS minimization. The table 1 sums up the
optimal estimation strategies that we have found for each distribution.
5
shape parameter of EGPD3 derived from climatology
● ●
●
● ●
●
●
● ●
●
● ●●
●
● ●
● ● ●● ●
● ●
●
●
●
●
● ● ●
●
● ●●
●●
●
●
●
● ● ●
●
●
●
●
●
● ●
●
●
●
●
● ● ●
●
● ●● ● ● ● ●
●
● ● ● ●● ●
● ●
●
●● ● ● ● ● ● ●
● ●
0
0.025
0.05
0.075
0.1
0.125
0.15
0.175
0.2
0.225
0.25
0.275
0.3
0.325
0.35
0.375
0.4
0.425
0.45
0.475
0.5
0.525
0.55
0.575
0.6
●
●
Figure 1: Spatial values of ξ among locations.
4
4.1
Case study on the PEARP ensemble prediction system
Data description
Our rainfall dataset corresponds to 6-h rainfall amounts produced by 87 French weather stations and the
35-member ensemble forecast system called PEARP (Descamps et al., 2014) at a 51-h lead time forecast.
Our period of interest spans four years from 1 January 2012 to 31 December 2015.
4.2
Inferential details for EMOS and analogs
Verification has been made on this entire period. For a fair comparison each method has to be tuned
optimally. EMOS uses all the data available for each day (4 years less the forecast day as a training
period). The same strategy is used to fit the analogs method, see Appendix A for details on this approach.
6
Table 1: Optimal strategies for parameter estimation using CRPS minimization in the EMOS context.
Distribution
CSG
CGEV
EGP
Parameter
δ
µ
σ
κ
θ
µ
σ
ξ
θ
σ
µ
κ
ξ
π
Comments
free in R
affine function of covariates in C
affine function of raw ensemble mean
κ = µ2 /σ
θ = σ/µ
affine function of covariates in C
affine function of the mean absolute deviation of the raw ensemble
free in (−∞, 1)
θ = σ/µ
affine function of the mean absolute deviation of the raw ensemble
maximum between 0 and an affine function of covariates in C
κ = µ/σ
fixed, see Figure 1 for stations’ values
affine function of PR0 in C, bounded on [0, 1]
QRF and GF employ a cross-validation method: each month of the 4 years is kept as validation data
while the rest of the 4 years is used for learning. The tuning algorithm for EMOS is stopped after
few iterations in order to avoid overfitting, as suggested in Scheuerer (2014) concerning the parameter
estimations.
4.3
Sets of predictors used
We either use a subset of classical predictors (denoted by “C” in the rest of the paper) detailed in Table
2 or the whole set of available predictors as listed in Table 3.
Table 2: Subset “C” representing the most classical predictors.
Name
HRES
CTRL
MEAN
PR0
Description
high resolution member
control member
mean of raw ensemble
raw probability of rain
Note that we also considered for EMOS a third type of predictors set based on a variable selection
algorithm (see Appendix C). But this did not improve the results and we removed them from the analysis
(available upon request).
4.4
Zooming on extremes
Finding a way to assess the quality of ensembles for extreme and rare events is quite difficult, as seen
in Williams et al. (2014) in a comparison of ensemble calibration methods for extreme events. Weighted
scoring rules can be adopted as done in Gneiting and Ranjan (2011); Lerch et al. (2017) but there
are here two main issues. The ranking of compared methods depends on the weight function used, as
already suggested in Gneiting and Ranjan (2011). Besides, giving a weight to such rare events avoid
discriminant power of scoring rules, the same issue than for the Brier score (Brier, 1950). Moreover,
reliability is not sound here since there are not enough extreme cases (by definition) to measure it. We
have finally decided to focus on two ideas here, matching with forecasters’ desires: first, what is the
discriminant power of our forecasts for extreme events in terms of binary decisions ? Second, what is the
potential risk of our ensemble to mismatch an extreme event ? The choice done in our study is discussed
in Section 5.
7
Table 3: Set of all available predictors.
Name
HRES
CTRL
MEAN
MED
Q10
Q90
PR0
PR1
PR3
PR5
PR10
PR20
SIGMA
IQR
HU1500
UX
VX
FX
TCC
RR6CV
CAPE
Description
high resolution member
control member
mean of raw ensemble
median of raw ensemble
first decile of raw ensemble
ninth decile of raw ensemble
raw probability of rain
raw probability of rain > 1mm/6h
raw probability of rain > 3mm/6h
raw probability of rain > 5mm/6h
raw probability of rain > 10mm/6h
raw probability of rain > 20mm/6h
standard deviation of raw ensemble
IQR of raw ensemble
deterministic forecast of 6-h mean 1500m humidity
deterministic forecast of 6-h maximum of zonal wind gust
deterministic forecast of 6-h maximum of meridional wind gust
deterministic forecast of 6-h maximum of wind gust power
deterministic forecast of 6-h mean total cloud cover
deterministic forecast of 6-h convective rainfall amount
deterministic forecast of 6-h mean convective available potential energy
q10,50,90 are the first decile, the median and ninth decile of the raw ensemble for these variables:
HU q10,50,90
P q10,50,90
TCC q10,50,90
RR6CV q10,50,90
U10 q10,50,90
V10 q10,50,90
U500 q10,50,90
V500 q10,50,90
FF500 q10,50,90
TPW850 q10,50,90
FLIR6 q10,50,90
FLVIS6 q10,50,90
T q10,50,90
FF10 q10,50,90
5
6-h mean surface humidity
6-h mean sea level pressure
6-h mean total cloud cover
6-h convective rainfall amount
6-h mean surface zonal wind
6-h mean surface meridional wind
6-h mean 500m zonal wind
6-h mean 500m meridional wind
6-h mean 500m wind speed
6-h mean 850hPa potential wet-bulb temperature
6-h mean surface irradiation in infra-red wavelengths
6-h mean surface irradiation in visible wavelengths
6-h mean surface temperature
6-h mean surface wind speed
Results
Table 4 compares different metrics for all post-processing techniques which have been fitted to the 87
stations and averaged over 4 years of verification. Ten methods are competing: The raw ensemble, 4
analogs, 3 EMOS (3 different distributions using the set C), 2 forest-based methods (1 QRF and 1 GF)
and 2 tail-extended forest-based methods (1 QRF and 1 GF). Scores used concern respectively (i) global
performance (calibration and sharpness) measured by the CRPS; (ii) reliability performance, measured
by the mean, the normalized variance and the entropy of the PIT histograms, denoted by Ω in the sequel;
(iii) gain in CRPS compared to the raw ensemble, measured by the Skill of the CRPS using the raw
ensemble as baseline. A brief summary about these measures is done in D, where references are also
provided. And the boxplots showing rank histograms are in E.
According to Table 4, the raw ensemble is biased and underdispersive. The EMOS post-processed
ensembles share with QRF and GF a good CRPS. Moreover, we can consider them as unbiased and
mostly well-dispersed. The tail-extended methods get a lower CRPS, that can be explained by their
skill for extreme events. Finally, the four analog methods show a quite poor CRPS compared to the raw
ensemble, even if they exhibit reliability. Nevertheless we can notice that a weightning of the predictors,
especially with a non-linear variable selection algorithm (Analogs VSF), brings benefits to this method.
This phenomenon can be explained by Figure 2, where the ROC curves are given for the event of rain.
Consider a fixed threshold s and the contingency table associated to the predictor 1{rr6 > s}. Recall
that the ROC curve then plots the probability of detection (or hit rate) as a function of the probability
of false detection (or false alarm rate). A “good” prediction must maximize hit rates and minimize false
8
alarms (see, e.g. Jolliffe and Stephenson, 2012). Figure 2 explicitely shows the lack of resolution of the
analogs technique. Incidently, we can also notice that the rain event discrimination is not improved by
post-processed ensembles.
Table 4: Comparing performance statistics for different post-processing methods for 6-h rainfall forecasts
in France. The mean CRPS estimations come from bootstrap replicates, the estimation error is under
6.1 × 10−3 for all methods.
Types
Non-parametric
Parametric
with
covariates ∈ C
Hybrid
Methods
Raw ensemble
Analogs
Analogs C
Analogs COR
Analogs VSF
QRF
GF
EMOS
EMOS
EMOS
QRF
GF
pdf
CSG
GEV
EGP
EGP TAIL
EGP TAIL
CRPS
0.4694
0.5277
0.5376
0.5276
0.5247
0.4212
0.4134
0.4224
0.4228
0.4292
0.4138
0.4127
E(Z)
0.4164
0.5175
0.5050
0.5062
0.5060
0.5006
0.5070
0.4992
0.5000
0.4623
0.5095
0.5152
V(Z)
1.0612
1.0190
1.0051
1.0015
0.9986
0.9995
0.9771
1.0363
1.0073
1.0723
0.9558
0.9425
Ω
0.9809
0.9956
0.9964
0.9964
0.9961
0.9961
0.9957
0.9955
0.9961
0.9905
0.9957
0.9948
CRPSS
0%
-12.4%
-14.5%
-12.4%
-11.8%
10.3%
11.9%
10.0%
9.9%
8.6%
11.8%
12.1%
To sum up, the best improvement with respect to the raw ensemble is for the forest-based methods,
according to the CRPSS (which definition is in Appendix D). This improvement is however less significant
than for other weather variables (see Taillardat et al. (2016)). This corroborates Hemri et al. (2014)’s
conclusion that rainfall amounts are tricky to calibrate. If the analogs method looks less performant,
that might be imputable to the data depth of only 4 years. Indeed, this non-parametric technique is
data-driven (such as QRF and GF) and needs more data to be effective (see e.g. Van den Dool (1994)).
Concerning extreme events, Figure 3 shows the benefit of the tail extension for forest-based methods.
Note that we prefer to pay attention to the value of a forecast more than to its quality. According
to Murphy (1993), the value can be defined as the ability of the forecast to help users to take better
decisions. The quality of a forecast can be summarized by the area on the modelled ROC curve (classically
denoted by AUC), with some potential drawbacks exhibited by Lobo et al. (2008); Hand (2009). Zhu
et al. (2002) made a link between optimal decision thresholds, value and cost/loss ratios. In particular,
they show that the value of a forecast is maximized for the “climatological” threshold and equals the hit
rate minus the false alarm rate which is the maximum of the Peirce Skill Score (Manzato, 2007). This
value corresponds to the upper left corner of ROC curves, which is of main interest in terms of extremes
verification, as explained in Section 4.4. Several features already seen on Figure 2 can be observed on
Figure 3: analogs lack resolution and the other post-processed methods compete more or less favourably
with the raw ensemble. Nonetheless, the other post-processing techniques stay better than the raw
ensemble even for methods that cannot extrapolate observed values such as QRF and GF. Note that
QRF is rather surprisingly better than EMOS techniques. Tail extension methods show their gain in a
binary decision context.
6
Discussion
Throughout this study, we see that forest-based techniques compete favourably with EMOS techniques.
It is a good point to see that QRF and GF compared to EMOS exhibit nearly the same kind of improvement when focusing on rainfall amounts or on temperature and wind speed (see Taillardat et al. (2016)
Figures 6 and 13). It could be interesting to check these methods (especially GF) on smoother variables.
Tail extension of these non-parametric techniques generates ensembles more tailored for extremes
catchment. However, reliability as well as resolution remain quite stable when extending the tail, so that
our paradigm about verification (good extreme discrimination subject to satisfying overall performance)
9
0.4
Hit Rate
0.6
0.8
1.0
ROC Curve (rr6>0.2mm)
0.0
0.2
Raw ensemble
Analogs
Analogs_C
Analogs_COR
Analogs_VSF
EMOS CSG
EMOS EGP
EMOS GEV
QRF
QRF EGP TAIL
GF
GF EGP TAIL
0.0
0.2
0.4
0.6
0.8
1.0
False Alarm Rate
Figure 2: ROC Curves for the event of rain. A “good” prediction must maximize hit rate and minimize
false alarms. The analogs method lacks resolution. We can notice that there is no improvement of
post-processed methods compared to the raw ensemble.
remains.
One of the advantages of distribution-free calibration (analogs, QRF and GF) is that there is no
assumption on the parameters to calibrate. This benefit is emphasized for rainfall amounts for which
EMOS techniques have to be studied using different distributions. In this sense, the recent mixing method
of Baran and Lerch (2016) looks appealing. A brand new alternative solution consists in working with
(standardized) anomalies as done in Dabernig et al. (2016).
Another positive aspect of the forest-based methods is that there is no need of a predictor selection.
Concerning the analogs method, our results suggest that the work of Genuer et al. (2010) could be a
cheaper alternative to brute force algorithms like in Keller et al. (2017) for the weightning of predictors.
For analogs techniques, we can notice that the complete set of predictors gives the best results. In
10
0.4
Hit Rate
0.6
0.8
1.0
ROC Curve (rr6>15mm)
0.0
0.2
Raw ensemble
Analogs
Analogs_C
Analogs_COR
Analogs_VSF
EMOS CSG
EMOS EGP
EMOS GEV
QRF
QRF EGP TAIL
GF
GF EGP TAIL
0.0
0.2
0.4
0.6
0.8
1.0
False Alarm Rate
Figure 3: ROC Curves for the event of rain above 15mm. A “good” prediction must maximize hit rate
and minimize false alarms. The analogs method lacks resolution. Tail extension methods show their
gain in a binary decision context.
contrast, the choice of the set of predictors is still an ongoing issue for EMOS techniques regarding
precipitation. For easier variables to calibrate, Messner et al. (2017) shows that some variable selection
can be effective.
The tail extension can be viewed as a semi-parametric technique where the result of forest-based
methods is used to fit a distribution. This kind of procedure can be connected to the work of Junk
et al. (2015) who uses analogs on EMOS inputs. An interesting prospect would be to bring forest-based
methods in this context.
A natural perspective regarding spatial calibration and trajectory recovery could be to make use of
block regression techniques as done in Zamo et al. (2016), or of ensemble copula coupling, as suggested
by (Bremnes, 2007; Schefzik, 2016).
11
Finally, it appears that more and more weather services work on merging different forecasts from
different sources (multi-model ensembles). In this context, an attractive procedure could be to combine
raw ensembles and different methods of post-processing via sequential aggregation (Mallet, 2010; Thorey
et al., 2016), in order to get the best forecast according to the weather situations.
Acknowledgments
Part of the work of P. Naveau has been supported by the ANR-DADA, LEFE-INSU-Multirisk, AMERISKA,
A2C2, CHAVANA and Extremoscope projects. This work has been supported by Energy oriented Centre of Excellence (EoCoE), grant agreement number 676629, funded within the Horizon2020 framework
of the European Union. This work has been supported by the LABEX MILYON (ANR-10-LABX-0070)
of Université de Lyon, within the program ”Investissements d’Avenir” (ANR-11-IDEX-0007) operated
by the French National Research Agency (ANR). Thanks to Julie Tibshirani, Susan Athey and Stefan
Wager for providing gradient-forest source package.
Funding information
LABEX MILYON, Investissements d’Avenir and DADA, ANR, Grant/Award Numbers: ANR-10-LABX0070, ANR-11-IDEX-0007 and ANR-13-JS06-0007; EoCoE, Horizon2020, Grant/Award Number: 676629;
A2C2, ERC, Grant/Award Number: 338965
References
Akaike, H. (1998) Information theory and an extension of the maximum likelihood principle. In Selected
Papers of Hirotugu Akaike, 199–213. Springer.
Athey, S., Tibshirani, J. and Wager, S. (2016) Solving heterogeneous estimating equations with gradient
forests. arXiv preprint arXiv:1610.01271.
Baran, S. and Lerch, S. (2016) Mixture emos model for calibrating ensemble forecasts of wind speed.
Environmetrics.
Baran, S. and Nemoda, D. (2016) Censored and shifted gamma distribution based emos model for
probabilistic quantitative precipitation forecasting. Environmetrics, 27, 280–292.
Ben Bouallègue, Z. (2013) Calibrated short-range ensemble precipitation forecasts using extended logistic
regression with interaction terms. Weather and Forecasting, 28, 515–524.
Breiman, L. (1996) Bagging predictors. Machine learning, 24, 123–140.
— (2001) Random forests. Machine learning, 45, 5–32.
Breiman, L., Friedman, J., Stone, C. J. and Olshen, R. A. (1984) Classification and regression trees.
CRC press.
Bremnes, J. (2007) Improved calibration of precipitation forecasts using ensemble techniques. part 2:
Statistical calibration methods. met. Tech. rep., no research report 04.
Brier, G. W. (1950) Verification of forecasts expressed in terms of probability. Monthly weather review,
78, 1–3.
Bröcker, J. and Smith, L. A. (2007) Scoring probabilistic forecasts: The importance of being proper.
Weather and Forecasting, 22, 382–388.
Dabernig, M., Mayr, G. J., Messner, J. W. and Zeileis, A. (2016) Spatial ensemble post-processing with
standardized anomalies. Quarterly Journal of the Royal Meteorological Society.
12
De Haan, L. and Ferreira, A. (2007) Extreme value theory: an introduction. Springer Science & Business
Media.
Delle Monache, L., Eckel, F. A., Rife, D. L., Nagarajan, B. and Searight, K. (2013) Probabilistic weather
prediction with an analog ensemble. Monthly Weather Review, 141, 3498–3516.
Descamps, L., Labadie, C., Joly, A., Bazile, E., Arbogast, P. and Cébron, P. (2014) PEARP, the MétéoFrance short-range ensemble prediction system. Quarterly Journal of the Royal Meteorological Society.
Van den Dool, H. (1994) Searching for analogues, how long must we wait? Tellus A, 46, 314–324.
Ferro, C. (2014) Fair scores for ensemble forecasts. Quarterly Journal of the Royal Meteorological Society,
140, 1917–1923.
Friederichs, P. and Thorarinsdottir, T. L. (2012) Forecast verification for extreme value distributions
with an application to probabilistic peak wind prediction. Environmetrics, 23, 579–594.
Genuer, R., Poggi, J.-M. and Tuleau-Malot, C. (2010) Variable selection using random forests. Pattern
Recognition Letters, 31, 2225–2236.
Gneiting, T., Balabdaoui, F. and Raftery, A. E. (2007) Probabilistic forecasts, calibration and sharpness.
Journal of the Royal Statistical Society: Series B (Statistical Methodology), 69, 243–268.
Gneiting, T. and Katzfuss, M. (2014) Probabilistic forecasting. Annual Review of Statistics and Its
Application, 1, 125–151.
Gneiting, T. and Raftery, A. E. (2007) Strictly proper scoring rules, prediction, and estimation. Journal
of the American Statistical Association, 102, 359–378.
Gneiting, T., Raftery, A. E., Westveld III, A. H. and Goldman, T. (2005) Calibrated probabilistic
forecasting using ensemble model output statistics and minimum crps estimation. Monthly Weather
Review, 133, 1098–1118.
Gneiting, T. and Ranjan, R. (2011) Comparing density forecasts using threshold-and quantile-weighted
scoring rules. Journal of Business & Economic Statistics, 29, 411–422.
Hamill, T. M. and Colucci, S. J. (1997) Verification of eta-rsm short-range ensemble forecasts. Monthly
Weather Review, 125, 1312–1327.
Hamill, T. M., Hagedorn, R. and Whitaker, J. S. (2008) Probabilistic forecast calibration using ecmwf
and gfs ensemble reforecasts. part ii: Precipitation. Monthly weather review, 136, 2620–2632.
Hamill, T. M. and Whitaker, J. S. (2006) Probabilistic quantitative precipitation forecasts based on
reforecast analogs: Theory and application. Monthly Weather Review, 134, 3209–3229.
Hand, D. J. (2009) Measuring classifier performance: a coherent alternative to the area under the roc
curve. Machine learning, 77, 103–123.
Hemri, S., Scheuerer, M., Pappenberger, F., Bogner, K. and Haiden, T. (2014) Trends in the predictive
performance of raw ensemble weather forecasts. Geophysical Research Letters, 41, 9197–9205.
Hersbach, H. (2000) Decomposition of the continuous ranked probability score for ensemble prediction
systems. Weather and Forecasting, 15, 559–570.
Horton, P., Jaboyedoff, M. and Obled, C. (2017) Global optimization of an analog method by means of
genetic algorithms. Monthly Weather Review, 145, 1275–1294.
Hosking, J. R. and Wallis, J. R. (1987) Parameter and quantile estimation for the generalized pareto
distribution. Technometrics, 29, 339–349.
13
Hosking, J. R. M. (1989) Some theoretical results concerning L-moments. IBM Thomas J. Watson
Research Division.
Jolliffe, I. T. and Primo, C. (2008) Evaluating rank histograms using decompositions of the chi-square
test statistic. Monthly Weather Review, 136, 2133–2139.
Jolliffe, I. T. and Stephenson, D. B. (2012) Forecast verification: a practitioner’s guide in atmospheric
science. John Wiley & Sons.
Junk, C., Delle Monache, L. and Alessandrini, S. (2015) Analog-based ensemble model output statistics.
Monthly Weather Review, 143, 2909–2917.
Katz, R. W., Parlange, M. B. and Naveau, P. (2002) Statistics of extremes in hydrology. Advances in
water resources, 25, 1287–1304.
Keller, J. D., Delle Monache, L. and Alessandrini, S. (2017) Statistical downscaling of a high-resolution
precipitation reanalysis using the analog ensemble method. Journal of Applied Meteorology and Climatology.
Lerch, S., Thorarinsdottir, T. L., Ravazzolo, F., Gneiting, T. et al. (2017) Forecaster’s dilemma: extreme
events and forecast evaluation. Statistical Science, 32, 106–127.
Lobo, J. M., Jiménez-Valverde, A. and Real, R. (2008) Auc: a misleading measure of the performance
of predictive distribution models. Global ecology and Biogeography, 17, 145–151.
Mallet, V. (2010) Ensemble forecast of analyses: Coupling data assimilation and sequential aggregation.
Journal of Geophysical Research: Atmospheres, 115.
Manzato, A. (2007) A note on the maximum peirce skill score. Weather and Forecasting, 22, 1148–1154.
Matheson, J. E. and Winkler, R. L. (1976) Scoring rules for continuous probability distributions. Management science, 22, 1087–1096.
Meinshausen, N. (2006) Quantile regression forests. The Journal of Machine Learning Research, 7,
983–999.
Messner, J. W., Mayr, G. J. and Zeileis, A. (2017) Nonhomogeneous boosting for predictor selection in
ensemble postprocessing. Monthly Weather Review, 145, 137–147.
Murphy, A. H. (1993) What is a good forecast? an essay on the nature of goodness in weather forecasting.
Weather and forecasting, 8, 281–293.
Naveau, P., Huser, R., Ribereau, P. and Hannart, A. (2016) Modeling jointly low, moderate, and heavy
rainfall intensities without a threshold selection. Water Resources Research, 52, 2753–2769. URL:
http://dx.doi.org/10.1002/2015WR018552.
Papastathopoulos, I. and Tawn, J. A. (2013) Extended generalised pareto models for tail estimation.
Journal of Statistical Planning and Inference, 143, 131–143.
Pinson, P., Chevallier, C. and Kariniotakis, G. N. (2007) Trading wind generation from short-term
probabilistic forecasts of wind power. IEEE Transactions on Power Systems, 22, 1148–1156.
Raftery, A. E., Gneiting, T., Balabdaoui, F. and Polakowski, M. (2005) Using bayesian model averaging
to calibrate forecast ensembles. Monthly Weather Review, 133, 1155–1174.
Roulin, E. and Vannitsem, S. (2012) Postprocessing of ensemble precipitation predictions with extended
logistic regression based on hindcasts. Monthly weather review, 140, 874–888.
Roulston, M. S. and Smith, L. A. (2002) Evaluating probabilistic forecasts using information theory.
Monthly Weather Review, 130, 1653–1660.
14
Schefzik, R. (2016) Combining parametric low-dimensional ensemble postprocessing with reordering
methods. Quarterly Journal of the Royal Meteorological Society, 142, 2463–2477.
Scheuerer, M. (2014) Probabilistic quantitative precipitation forecasting using ensemble model output
statistics. Quarterly Journal of the Royal Meteorological Society, 140, 1086–1096.
Scheuerer, M. and Hamill, T. M. (2015) Statistical postprocessing of ensemble precipitation forecasts by
fitting censored, shifted gamma distributions. Monthly Weather Review, 143, 4578–4596.
Schwarz, G. et al. (1978) Estimating the dimension of a model. The annals of statistics, 6, 461–464.
Sloughter, J. M. L., Raftery, A. E., Gneiting, T. and Fraley, C. (2007) Probabilistic quantitative precipitation forecasting using bayesian model averaging. Monthly Weather Review, 135, 3209–3220.
Taillardat, M., Mestre, O., Zamo, M. and Naveau, P. (2016) Calibrated ensemble forecasts using quantile
regression forests and ensemble model output statistics. Monthly Weather Review, 144, 2375–2393.
Thorey, J., Mallet, V. and Baudin, P. (2016) Online learning with the continuous ranked probability
score for ensemble forecasting. Quarterly Journal of the Royal Meteorological Society.
Tribus, M. (1969) Rational Descriptions, Decisions and Designs. Pergamon Press, Elmsford, New York.
Van Schaeybroeck, B. and Vannitsem, S. (2015) Ensemble post-processing using member-by-member
approaches: theoretical aspects. Quarterly Journal of the Royal Meteorological Society, 141, 807–818.
Vrac, M. and Naveau, P. (2007) Stochastic downscaling of precipitation: From dry events to heavy
rainfalls. Water resources research, 43.
Weijs, S. V., Van Nooijen, R. and Van De Giesen, N. (2010) Kullback-leibler divergence as a forecast
skill score with classic reliability-resolution-uncertainty decomposition. Monthly Weather Review, 138,
3387–3399.
Williams, R., Ferro, C. and Kwasniok, F. (2014) A comparison of ensemble post-processing methods for
extreme events. Quarterly Journal of the Royal Meteorological Society, 140, 1112–1120.
Zamo, M. (2016) Statistical Post-processing of Deterministic and Ensemble Windspeed Forecasts on a
Grid. Ph.D. thesis, Université Paris-Saclay.
Zamo, M., Bel, L., Mestre, O. and Stein, J. (2016) Improved gridded wind speed forecasts by statistical
postprocessing of numerical models with block regression. Weather and Forecasting, 31, 1929–1945.
Zamo, M., Mestre, O., Arbogast, P. and Pannekoucke, O. (2014) A benchmark of statistical regression
methods for short-term forecasting of photovoltaic electricity production. part ii: Probabilistic forecast
of daily production. Solar Energy, 105, 804–816.
Zhou, B. and Zhai, P. (2016) A new forecast model based on the analog method for persistent extreme
precipitation. Weather and Forecasting, 31, 1325–1341.
Zhu, Y., Toth, Z., Wobus, R., Richardson, D. and Mylne, K. (2002) The economic value of ensemblebased weather forecasts. Bulletin of the American Meteorological Society, 83, 73–83.
A
Analogs method
Contrary to EMOS, this technique is data-driven. An analog for a given location and forecast lead
time is defined as a past prediction, from the same model, that has similar values for selected features
of the current model forecast. The method of analogs consists in finding these closest past forecasts
according to a given metric of the predictors’ space to build an analog-based ensemble (see e.g. Hamill
and Whitaker (2006)). We assume here that close forecasts leads to close observations. Making use of
15
analogs requires to choose both the set of predictors and the metric. Concerning the metric, several
have been tried like the Euclidean or the Mahalanobis distance but they have been outperformed by the
metric provided in Delle Monache et al. (2013):
v
u
N
t̃
v
X wj u
2
uX
t
Fj,t+i − Aj,t0 +i ,
(8)
σ fj
j=1
i=−t̃
where Ft represents the current forecast at time t for a given location. The analog for another time t0 at
this same location is At0 . The number of predictors is Nv and t̃ is half the time window used to search
analogs. We standardize the distance by the standard deviation of each predictor σfj calculated on the
learning sample for the considered location. In this study we take t̃ = 1 so the time window is ±24 hours
the forecast to calibrate. This distance has the advantages of being flow-dependent and thus defines a
real weather regime associated with the research of the analogs. Note that one could weight the different
predictors fj with wj and we fixed wj = 1 for all predictors in a first method (Analogs). We have
also tried two other weightning techniques using the absolute value of correlation coefficient between
predictors and the response variable (Analogs COR) like in Zhou and Zhai (2016), and a weightning
based on the frequency of predictors’ occurrences in variable selection algorithm described in Appendix
C (Analogs VSF). Note finally that other weightning techniques have been considered (Horton et al.,
2017; Keller et al., 2017) but we did not use them in this study because of their computational cost.
B
CRPS formula for EGP
The CRPS for the distribution F detailed in 3 is:
σ
CRP S(F, y) = y(2F (y) − 1) + (4π − 2F (y) − π 2 − 1)
ξ
"
!
#
1
2κσ(1 − π)
ξy − ξ
+
B
1+
; 1 − ξ, κ − (1 − π)B(1 − ξ, 2κ) − πB(1 − ξ, κ) ,
ξ
σ
where 0 < ξ < 1 and B( ; , ) and B( , ) denote respectively the incomplete beta and the beta functions.
C
Variable selection using random forests
We have seen that most parameters in EMOS and the distance used in analogs can be inferred using
different sets of predictors. Contrary to the QRF and GF methods where the add of a useless predictor
does not impact the predictive performance (since this predictor is never retained in the splitting rule),
it can be misguiding for EMOS and analogs. We have therefore investigated some methods that keep
the most informative meteorological variables and guarantee the best predictive performance. Our first
choice was to use the well-known Akaike information criterion and the Bayesian information criterion
(Akaike, 1998; Schwarz et al., 1978) but it resulted that the selection was not enough discriminant (too
many predictors kept in our initial set). The algorithm of Genuer et al. (2010) has then been considered.
Such an algorithm is appealing since it uses random forests (and we already have these objects from
the QRF method) and it permits to keep predictors without redundancy of information. For example
this algorithm eliminates correlated predictors even if they are informative. A reduced set of predictors
(mostly 3 or 4) is thus obtained, which avoids misestimation generated by multicolinearity. The method
of variable selection used here is one among plenty others. The interested reader in variable selection
using random forests can refer to Genuer et al. (2010) for detailed explanations.
The variable selection algorithm is used to keep the first predictors (max 4 of them) that form the set
of predictors for each location. Figure 4 shows the ranked frequency of each chosen predictor. Predictors
never retained are not on this figure. We can see here that only one third of the predictors in A are
retained at least in 10% of the cases. Moreover, predictors representing central and extreme tendencies
are preferred. Some predictors appear that differ from rainfall amounts ; see CAPE, FX or HU. It is not
16
Frequency of occurrence in variable selection algorithm on 86 stations
MEAN
Q90
IQR
PR1
HRES
PR3
CTRL
MED
PR0
RR6CV_q90
PR5
HU_q90
SIGMA
FLIR6_q90
FLIR6_q50
HU_q10
RR6CV_q50
U10_q90
CAPE
HU1500
RR6CV
FX
FLVIS6_q10
U500_q50
FF500_q90
FLVIS6_q50
TCC_q90
T_q50
FF500_q10
FLIR6_q10
HU_q50
P_q10
T_q10
T_q90
U500_q90
V10_q90
FF10_q90
FF500_q50
PR10
TCC_q10
TCC_q50
RR6CV_q10
U10_q10
FF10_q10
TCC
UX
VX
Q10
FLVIS6_q90
P_q50
P_q90
TPW850_q10
TPW850_q50
TPW850_q90
U10_q50
U500_q10
V500_q50
FF10_q50
0.0
0.2
0.4
0.6
0.8
Frequency
Figure 4: Frequency of predictors’ occurrence in variable selection algorithm. Variables representing
central and extreme tendencies are preferred. Some covariables like CAPE, FX or HU can be retained.
It is interesting to see that only one third of the predictors of the set is taken more than in 10% of the
cases.
surprising since these parameters are correlated with storms. It is not shown here but when the MEAN
variable is not selected, either MED or CTRL stands in the set. This shows that the algorithm mostly
selects just one information concerning central tendency and avoid potential correlations. So the results
concerning the variable algorithm selection seem to be sound. Last but not least, one notices that the
predictors of the set C are often chosen. This remark confirms both the robustness of the algorithm and
the relevance of previous studies on precipitation concerning the choice of the predictors.
17
D
Verification of ensembles
We recall here some facts about the scores used in this study.
D.1
Reliability
Reliability between observations and a predictive distribution can be checked by calculating Z 0 = F (Y )
where Y is the observation and F the cdf of the associated predictive distribution. Subject to calibration, the random variable Z 0 has a standard uniform distribution (Gneiting and Katzfuss, 2014) and we
can check ensemble bias by comparing E(Z 0 ) to 12 and ensemble dispersion by comparing the variance
1
Var(Z 0 ) to 12
. This approach is applied to a (K + 1) ranked ensemble forecast using the discrete random
variable Z = rank(y)−1
. Subject to calibration, Z has a discrete standard uniform distribution with
K
K
E(Z) = 21 and a normalized variance V(Z) = 12 K+2
Var(Z) = 1.
Another tool used to assess calibration is the entropy:
K+1
X
−1
Ω=
fi log(fi ).
log(K + 1)
i=1
For a calibrated system the entropy is maximum and equals 1. Tribus (1969) showed that the entropy is
an indicator of reliability linked to the Bayesian psi-test. It is also a proper measure of reliability used
in the divergence score described in Weijs et al. (2010); Roulston and Smith (2002).
These quantities are closely related to rank histograms which are discrete version of Probability
Integral Transform (PIT) histograms. However if one can assume the property of flatness of these
histograms, Jolliffe and Primo (2008) exhibit a test accounting for the slope and the shape of rank
histograms. In a recent work, Zamo (2016) extends this idea for accounting the presence of wave in
histograms as seen in Scheuerer and Hamill (2015); Taillardat et al. (2016). A more complete test can
thus be implemented that tests each histogram for flatness. Such a test is called the JPZ test (for
Jolliffe-Primo-Zamo). The results of the JPZ test is provided for each method in the E.
D.2
Scoring rules
Following Gneiting et al. (2007); Gneiting and Raftery (2007); Bröcker and Smith (2007), scoring rules
assign numerical scores to probabilistic forecasts and form attractive summary measures of predictive
performance, since they address calibration and sharpness simultaneously. These scores are generally
negatively oriented and we wish to minimize them. A proper scoring rule is designed such that the
expected value of the score is minimized by the perfect forecast, ie. when the observation is drawn
from the same distribution than the predictive distribution. The Continuous Ranked Probability Score
(CRPS) (Matheson and Winkler, 1976; Hersbach, 2000) is defined directly in terms of the predictive cdf,
F , as:
Z
∞
(F (x) − 1{x ≥ y})2 dx.
CRP S(F, y) =
−∞
Another representation (Gneiting and Raftery, 2007) shows that:
1
CRP S(F, y) = EF |X − y| − EF |X − X 0 |,
2
0
where X and X are independent copies of a random variable with distribution F and finite first moment.
An alternative representation for continuous distributions using L-moments (Hosking, 1989) is:
CRP S(F, y) = EF |X − y| + EF (X) − 2EF (XF (X)).
Throughout our study, if F is represented by an ensemble forecast with K members x1 , . . . , xK ∈ R,
we use a so-called fair estimator of the CRPS (Ferro, 2014) given by :
K
K X
K
X
1 X
1
\
CRP S(F, y) =
|xi − y| −
|xi − xj |.
K
2K(K − 1)
i=1
i=1 j=1
18
Notice that all CRPS have been computed following the recommendations of the Chapter 3 in Zamo
(2016).
We can also define the skill score in term of CRPS between an ensemble prediction system A and a
baseline B, in order to compare them directly:
CRP SS(A, B) = 1 −
CRP SA
CRP SB
The value of the CRPSS will be positive if and only if the system A is better than B for the CRPS
scoring rule.
E
Rank histograms boxplots
19
0.05
0.00
0.20
0.15
0.00
0.05
0.10
0.15
0.10
0.00
0.20
0.15
0.20
0.00
0.05
0.10
0.15
0.10
0.05
0.00
GF
GF EGP TAIL
JPZ test : 63 %
0.10
0.15
JPZ test : 98 %
0.05
0.05
0.10
0.15
JPZ test : 91 %
0.00
0.10
0.15
JPZ test : 100 %
QRF EGP TAIL
EMOS GEV
JPZ test : 98 %
0.00
QRF
EMOS EGP
JPZ test : 11 %
0.20
0.00
0.05
0.10
0.15
JPZ test : 89 %
0.20
0.20
0.00
0.05
0.10
0.15
JPZ test : 98 %
EMOS CSG
0.20
11
0.15
9
0.10
7
Analogs_COR
JPZ test : 99 %
0.05
5
JPZ test : 100 %
0.00
3
Analogs_VSF
Rank of observation
0.20
0.20
1
Analogs_C
0.05
0.10
0.05
0.00
0.00
0.05
0.10
0.15
JPZ test : 85 %
0.15
JPZ test : 0 %
Analogs
0.20
0.20
0.20
Raw ensemble
Figure 5: Boxplots of rank histograms for each technique according to the locations. The proportion
of rank histograms for which the JPZ test does not reject the flatness hypothesis is also provided. The
results confirm the Table 4.
20
| 10math.ST
|
Efficient Algorithms for Constructing Very Sparse Spanners and
Emulators∗
arXiv:1607.08337v2 [cs.DS] 6 Feb 2017
Michael Elkin†1 and Ofer Neiman‡1
1
Department of Computer Science, Ben-Gurion University of the Negev, Beer-Sheva, Israel.
Email: {elkinm,neimano}@cs.bgu.ac.il
Abstract
Miller et al. [MPVX15] devised a distributed1 algorithm in the CONGEST model, that given
a parameter k = 1, 2, . . ., constructs an O(k)-spanner of an input unweighted n-vertex graph with
O(n1+1/k ) expected edges in O(k) rounds of communication. In this paper we improve the result of
[MPVX15], by showing a k-round distributed algorithm in the same model, that constructs a (2k − 1)spanner with O(n1+1/k /ǫ) edges, with probability 1 − ǫ, for any ǫ > 0. Moreover, when k = ω(log n),
our algorithm produces (still in k rounds) ultra-sparse spanners, i.e., spanners of size n(1 + o(1)), with
probability 1 − o(1). To our knowledge, this is the first distributed algorithm in the CONGEST or in
the PRAM models that constructs spanners or skeletons (i.e., connected spanning subgraphs) that sparse.
Our algorithm can also be implemented in linear time in the standard centralized model, and for large k, it
provides spanners that are sparser than any other spanner given by a known (near-)linear time algorithm.
We also devise improved bounds (and algorithms realizing these bounds) for (1 + ǫ, β)-spanners and
emulators. In particular, we show that for any unweighted n-vertex graph and any ǫ > 0, there exists a
n log log n
)
)-emulator with O(n) edges. All previous constructions of (1 + ǫ, β)-spanners
(1 + ǫ, ( log log
ǫ
and emulators employ a superlinear number of edges, for all choices of parameters.
Finally, we provide some applications of our results to approximate shortest paths’ computation in
unweighted graphs.
1 Introduction
1.1 Setting, Definitions
We consider unweighted undirected n-vertex graphs G = (V, E). For a parameter α ≥ 1, a subgraph
H = (V, E ′ ), E ′ ⊆ E, is called an α-spanner of G, if for every pair u, v ∈ V of vertices, we have
dH (u, v) ≤ α · dG (u, v). Here dG (u, v) (respectively, dH (u, v)) stands for the distance between u and v
in G (resp., in H). The parameter α is called the stretch of the spanner H. More generally, if for a pair of
parameters α ≥ 1, β ≥ 0, for every pair u, v ∈ V of vertices, it holds that dH (u, v) ≤ α · dG (u, v) + β,
then the subgraph H is said to be an (α, β)-spanner of G. Particularly important is the case α = 1 + ǫ, for
∗
A preliminary version [EN17] of this paper appeared in SODA’17.
This research was supported by the ISF grant No. (724/15).
‡
Supported in part by ISF grant No. (523/12) and by BSF grant No. 2015813.
1
They actually showed a PRAM algorithm. The distributed algorithm with these properties is implicit in [MPVX15].
†
1
some small ǫ > 0. Such spanners are called near-additive. If H = (V, E ′′ , ω), where ω : E ′′ → R+ , is
not a subgraph of G, but nevertheless satisfies that for every pair u, v ∈ V of original vertices, dG (u, v) ≤
dH (u, v) ≤ (1 + ǫ)dG (u, v) + β, then H is called a near-additive β-emulator of G, or a (1 + ǫ, β)-emulator
of G.
Graph spanners have been introduced in [Awe85, PS89, PU89a], and have been intensively studied ever
since [ADD+ 93, ABCP93, Coh99, ACIM99, DHZ00, BS03, Elk04, Elk07a, EZ06, TZ06, Woo06, Elk07b,
Pet09, DGPV08, Pet10, BW15, MPVX15, AB16]. They were found useful for computing approximately
shortest paths [ABCP93, Coh99, Elk04, EZ06], routing [PU89b], distance oracles and labeling schemes
[Pel99, TZ05, EP15], synchronization [Awe85], and in other applications.
The simplest and most basic algorithm for computing a multiplicative α-spanner, for a parameter α ≥ 1,
is the greedy algorithm [ADD+ 93]. The algorithm starts with an empty spanner, and examines the edges of
the input graph G = (V, E) one after another. It tests if there is a path in H of length at most α between
the endpoints u and v of e. If it is not the case, the edge is inserted into the spanner. Otherwise the edge is
dropped.
It is obvious that the algorithm produces an α-spanner H. Moreover, the spanner H has no cycles of
length α + 1 or less, i.e., the girth of H, denoted g(H), satisfies g(H) ≥ α + 2. Denote m = m(n, g) the
maximum number of edges that a girth-g n-vertex graph may contain. It follows that |H| ≤ m(n, α + 2).
1+ 2
The function m(n, g) is known to be at most n g−2 , when g ≤ 2 log2 n, and for larger g (i.e., for m ≤ 2n),
it is given by m(n, g) ≤ n(1 + (1 + o(1)) ln(p+1)
), where p = m − n, [AHL02, BR10]. These bounds are
g
called “Moore’s bounds for irregular graphs”, or shortly, (generalized) Moore’s bounds.
Any construction of multiplicative α-spanners for n-vertex graphs with at most m′ (n, α + 2) edges
implies an upper bound m(n, α + 2) ≤ m′ (n, α + 2) for the function m(n, g). (As running the construction
on the extremal girth-(α + 2) n-vertex graph can eliminate no edge.) Hence the greedy algorithm produces
multiplicative spanners with optimal tradeoff between stretch and number of edges. (See also [FS16].)
However, the greedy algorithm is problematic from algorithmic perspective. In the centralized model of
computation, the best-known implementation of it [RZ04] requires O(α · n2+1/α ) time. Moreover, the
greedy algorithm is inherently sequential, and as such, it is generally hard2 to implement it in distributed
and parallel models of computation.
In the distributed model [Pel00] we have processors residing in vertices of the graph. The processors
communicate with their graph neighbors in synchronous rounds. In each round, messages of bounded length
can be sent. (This is the assumption of the CONGEST model. In the LOCAL model, messages’ size is
arbitrary.) The running time of an algorithm is this model is the number of rounds that it runs. By ”parallel”
model we mean here PRAM EREW model [Rei93], and we are interested in algorithms with small running
time (aka depth) and work complexities. (The latter measures the overall number of operations performed
by all processors.)
Dubhashi et al. [DMP+ 03] devised a distributed implementation of the greedy algorithm in the LOCAL
model of distributed computation. Their algorithm runs in O(α · log2 n) rounds, i.e., suboptimal by a factor
of log2 n. Moreover, it collects graph topology to depth O(α), and conducts heavy local computations.
To our knowledge, there is no distributed-CONGEST or PRAM implementation of the greedy algorithm
known. There is also no known efficient3 centralized, distributed-CONGEST, or PRAM algorithm that
constructs ultra-sparse spanners, i.e., spanners with n + o(n) edges.
2
In the sequel we discuss a distributed setting, specifically, the LOCAL model, in which a relatively efficient implementation of
the greedy is known.
3
By “efficient” centralized algorithm in this paper we mean an algorithm with running time close to O(|E|). By efficient
distributed or parallel algorithm we mean an algorithm that runs in polylogarithmic, or nearly-polylogarithmic, time.
2
In the distributed and parallel settings it is often enough to compute a sparse skeleton H of the input
graph G, where a skeleton is a connected subgraph that spans all the vertices of G, i.e., the stretch requirement is dropped. Dubhashi et al. [DMP+ 03] devised a distributed-LOCAL algorithm that computes ultrasparse skeletons of size m(n, α) ≤ n + O(n · logα n ) in O(α) rounds. Like their algorithm for constructing
spanners, this algorithm also collects topologies to depth O(α), and involves heavy local computations. To
our knowledge, no efficient distributed-CONGEST or PRAM algorithm for computing ultra-sparse skeletons is currently known. In this paper we devise the first such algorithms.
1.2 Prior Work and Our Results
In the centralized model of computation the best-known efficient algorithm for constructing multiplicative
spanners (for unweighted graphs) is due to Halperin and Zwick [HZ96]. Their deterministic algorithm, for
an integer parameter k ≥ 1, computes a (2k − 1)-spanner with n1+1/k + n edges in O(|E|) time. (Their
result improved previous pioneering work by [PS89, Coh99].) Note that their bound on the number of edges
is always at least 2n, i.e., in the range k = Ω(log n) it is very far from Moore’s bound.
Our centralized randomized algorithm computes (with probability close to 1), a (2k − 1)-spanner with
n · (1 + O( logk n )) edges in O(|E|) time, whenever k = Ω(log n). Note that when k = ω(log n), the number
of edges is n(1 + o(1)), i.e., in this range the algorithm computes an ultra-sparse spanner in O(|E|) time.
Moreover, whenever k ≤ n1−ǫ , for any constant ǫ > 0, up to a constant factor in the lower-order term, our
bound matches Moore’s bound. In fact, our algorithm and its analysis can be viewed as an alternative proof
of (a slightly weaker version of) the generalized Moore’s bound. Note that it is not the case for the greedy
algorithm and its implementations [ADD+ 93, RZ04, DMP+ 03]: the analysis of these algorithms relies on
Moore’s bounds, but these algorithms cannot be used to derive them.
Another variant of our algorithm, which works for any k ≥ 2, computes with high probability a (2k−1)2 ln n
spanner with n1+1/k (1 + O( logk k )) edges, in Õ(k|E|) time.4 In particular, for the range k ≥ ln
ln n the
1+1/k
number of edges in our spanner is n
+ o(n), improving the result of [HZ96] (albeit with a somewhat
2 ln n
1+1/k ) edges.
worse running time for ln
ln n ≤ k ≤ log n). Note that for any k ≥ 2 we have O(n
1+1/k
Yet another variant of our algorithm computes a (2k − 1)-spanner with O(n
) edges, in expected
O(|E|) time.
In the distributed-CONGEST and PRAM models, efficient algorithms for computing linear-size spanners were given in [Pet09, MPVX15]. Specifically, [MPVX15] devised an O(k)-round distributed-CONGEST
randomized algorithm for constructing O(k)-spanner (with high probability) with expected O(n1+1/k )
edges. In the PRAM model their algorithm has depth O(k log∗ n) and work O(|E|). There are also
k-round distributed-CONGEST randomized algorithms for constructing (2k − 1)-spanner with expected
O(k · n1+1/k ) edges [BS07, Elk07a]. It is known that at least k rounds are required for this task, under
Erdős’ girth conjecture [Elk07a, DGPV08].
Our randomized algorithm uses k rounds in the distributed-CONGEST model, and with probability at
least 1 − ǫ it constructs a (2k − 1)-spanner with O(n1+1/k /ǫ) edges (for any desired, possibly sub-constant,
ǫ > 0). In the PRAM model the depth and work complexities of our algorithm are the same as in [MPVX15].
n
Furthermore, when k ≥ log n we can bound the number of edges by n · (1 + O( log
ǫ·k )), again matching
Moore’s bound up to a constant factor in the lower-order term.
This result improves the previous state-of-the-art in the entire range of parameters. In particular, it is
also the first efficient algorithm in the distributed-CONGEST or PRAM models that constructs an ultrasparse skeleton. Specifically, in Õ(log n) time it computes an Õ(log n)-spanner with n(1 + o(1)) edges,
4
As usual, Õ(f (n)) stands for O(f (n)polylogf (n)).
3
with probability 1 − o(1).
We also use our algorithm for unweighted graphs to devise an improved algorithm for weighted graphs
as well. Specifically, our algorithm computes (2k − 1)(1 + ǫ)-spanner with O(n1+1/k · (log k)/ǫ) edges,
within expected O(|E|) time. See Theorem 2, and the discussion that follows it, for further details.
1.3 Near-Additive Spanners and Emulators
It was shown in [EP04] that for any ǫ > 0 and κ = 1, 2, . . ., and any (unweighted) n-vertex graph G =
(V, E), there exists a (1 + ǫ, β)-spanner with O(β · n1+1/κ ) edges, where β = β(κ, ǫ) ≤ O( logǫ κ )log κ . Additional algorithms for constructing such spanners were later given in [Elk04, EZ06, TZ06, DGPV08, Pet09,
Pet10]. Abboud and Bodwin [AB16] showed that multiplicative error of 1 + ǫ in [EP04]’s theorem cannot
be eliminated, while still keeping a constant (i.e., independent of n) additive error β, and more recently
log κ−1
1
.
[ABP17] showed that any such (1 + ǫ, β)-spanner of size O(n1+1/κ−δ ), δ > 0, has β = Ω ǫ·log
κ
In the regime of constant κ, the bound of [EP04] remains the state-of-the-art. Pettie [Pet09] showed that
n log log n
)
.
one can construct a (1 + ǫ, β)-spanner with O(n log log(ǫ−1 log log n)) edges and β = O( log log
ǫ
This result of [Pet09] is not efficient in the sense considered in this paper, i.e., no distributed or parallel
implementations of it are known, and also no efficient (that is, roughly O(|E|)-time) centralized algorithm
computing it is known. Also, this result does not extend ([Pet16]) to a general tradeoff between β and the
number of edges.
Improving upon previous results by [Elk05, EZ06], Pettie [Pet10] also devised an efficient distributedCONGEST algorithm, that for a parameter ρ > 0, constructs in Õ(nρ ) rounds a (1 + ǫ, β)-spanner with
logφ κ+1/ρ
√
O(n1+1/κ (ǫ−1 log κ)φ ) edges and β = O log κ+1/ρ
, for φ = 1+2 5 being the golden ratio. 5
ǫ
Independently and simultaneously to our work, [ABP17] showed that there exist (1 + ǫ, β)-spanners with
log κ−2
κ
< 3/4. This
, where h = (3/4)κ−1−log
O((ǫ−1 log κ)h · log κ · n1+1/κ ) edges and β = O logǫ κ
κ
spanner has improved dependence on ǫ in the number of edges (at the cost of worse dependence on κ).
In this paper we improve all of the tradeoffs [EP04, Pet10] in the entire range of parameters. Specifically,
log n
for any ǫ > 0, ρ > 0 and κ = 1, 2, . . . , log(1/ǫ)+log
log log n , our distributed-CONGEST algorithm constructs
in Õ(nρ ) rounds a (1 + ǫ, β)-spanner with O(n1+1/κ ) edges and
log κ + 1/ρ log κ+1/ρ
β≤O
.
ǫ
Our algorithm also admits efficient implementations in the streaming and standard models of computation,
see Section 3. Our spanners are sparser and have polynomially smaller β than the previous best efficient constructions. They are even sparser than the state-of-the-art existential ones (with essentially the same β), with
the following exceptions: whenever ǫ < 1/ log3 log n our result and that of [ABP17] are incomparable,6 and
the spanner from [Pet09] that has O(n log(4) n) edges, while ours never gets sparser than O(n log log n)/ǫ.
In the complementary range, ǫ > 1/ log3 log n, our result is strictly stronger than that of [ABP17].
Moreover, a variant of our algorithm efficiently constructs very sparse (1+ǫ, β)-emulators. In particular,
n log log n
we can obtain a linear-size (1 + ǫ, ( log log
)
)-emulator. (We stress that the number of edges does not
ǫ
depend even on ǫ.) All previous constructions of (1 + ǫ, β)-spanners or emulators employ a superlinear
number of edges, for all choices of parameters.
In the range of κ = o( logloglogn n ), the result of [Pet10] is incomparable with [EP04], as spanners of [EP04] provide smaller β,
while spanners of [Pet10] are slightly sparser.
6
The i-iterated logarithm is defined by log(i+1) n = log(log(i) n), for all i ≥ 0, and log(0) n = n.
5
4
We use our new algorithms for constructing near-additive spanners and emulators to improve approximate shortest paths’ algorithms, in the centralized and streaming models of computation. One notable result
in this context is a streaming algorithm that for any constant ǫ > 0 and any subset S ⊆ V with |S| = nΩ(1) ,
computes (1+ǫ)-approximate shortest paths for S ×V within O(|S|) passes over the stream, using O(n1+ǫ )
space. See Section 4 for more details, and additional applications of our spanners.
1.4 Technical Overview
Linial and Saks [LS93] were the first to employ exponential random variables to build network decompositions, i.e., partitions of graphs into clusters of small diameter, which possess some useful properties. This
technique was found useful for constructing padded partitions, hierarchically-separated trees, low-stretch
spanning trees [Bar96, Bar98, Bar04, EEST05, ABN11, AN12] and spanners [Coh99, BS03, Elk07b]. In
[LS93] every vertex v tosses a random variable rv from an exponential distribution, and broadcasts to all
vertices within distance rv from v. Every vertex v joins the cluster of a vertex u with largest identity number,
whose broadcast u heard.
Blelloch et al. [BGK+ 14] introduced a variant of this technique in which, roughly speaking, every vertex
v starts to broadcast at time −rv , and broadcasts indefinitely. A vertex x joins the cluster centered at a vertex
v, whose broadcast reaches x first. They called the resulting partition “exponential start time clustering”,
and it was demonstrated in [BGK+ 14, MPX13, EN16a] that this approach leads to very efficient distributed
and parallel algorithms for constructing padded partitions and network decompositions.
Miller et al. [MPVX15] used this approach to devise an efficient parallel and distributed-CONGEST
O(k)-time algorithm for constructing O(k)-spanner with O(n1+1/k ) edges. Specifically, they build the
exponential time clustering, add the spanning trees of the clusters into the spanner, and then every vertex x
adds into the spanner one edge (x, y) connecting x to every adjacent cluster Cy , y ∈ Cy .
The main property of the partition exploited by [MPVX15] in the analysis of their algorithm is that any
unit-radius ball in the input graph G intersects just O(n2/k ) clusters, in expectation. Note also that their
algorithm is doomed to use at least n1+1/k + (n − 1) edges, because it starts with inserting the spanning
trees of all clusters (amounting to up to n − 1 edges), and then inserts the O(n1+2/k ) edges crossing between
different clusters into the spanner. To get O(n1+1/k ) edges, one rescales k′ = 2k.
In our algorithm we do not explicitly construct the exponential start time clustering. Rather we run the
procedure that builds it, but every vertex x connects not just to the neighbor y through which x received its
first broadcast message at time, say, ty , but also to all neighbors z whose broadcast x received witin time
interval [ty , ty + 1]. We show that, in expectation, x connects to n1/k neighbors altogether, and not just to
that many adjacent clusters. As a result we obtain both a sparser spanner, a smaller stretch, and a smaller
running time. The stretch and running time are smaller roughly by a factor of 2 than in [MPVX15], because
we do not need to consider unit balls, that have diameter 2. Rather we tackle individual edges (of length 1).
In the context of weighted graphs, [MPVX15] showed how their efficient algorithm for constructing
sparse (4k − 2)-spanners for unweighted graphs can be converted into an efficient algorithm that constructs
(16k − 8)-spanners with O(n1+1/k log k) edges for weighted graphs. By using their scheme naively on top
of our algorithm for unweighted graphs, one gets an efficient algorithm for computing (4k − 2)(1 + ǫ)spanners with O(n1+1/k · (log k)/ǫ) edges. Roughly speaking, the overhead of 2 in the stretch is because
in the analysis of [MPVX15], every vertex contributes expected O(n1/k ) edges to the spanner on each of
roughly O(n1/k ) phases of the algorithm in which it participates. By employing a more delicate probabilistic
argument, we argue that in fact, the expected total contribution of every vertex in all phases altogether is
O(n1/k ), rather than O(n2/k ). This enables us to eliminate another factor of 2 from the stretch bound. See
Section 2.3 for details.
5
Our constructions of (1 + ǫ, β)-spanners and emulators follow the [EP04] superclustering and interconnection approach. One starts with a base partition P0 . In [EP04] this was the partition of [Awe85, PS89,
AP92], obtained via region-growing technique. Then every cluster C ∈ P0 that has “many” unclustered
clusters of P0 “nearby”, creates a supercluster around it. The “many” and the “nearby” are determined
by degree threshold deg 0 and distance threshold δ0 , respectively. Once the superclustering phase is over,
the remaining unclustered clusters enter an interconnection phase, i.e., every pair of participating nearby
clusters gets interconnected by a shortest path in the spanner. This completes one iteration of the process.
The resulted superclustering P1 is the input for the next iteration of this process, which runs with different,
carefully chosen thresholds deg 1 and δ1 . Such iterations continue until only very few clusters survive. The
latter are interconnected without further superclustering.
One bottleneck in devising efficient distributed algorithm based on this approach is the base partition. Known algorithms for constructing a region-growing partition of [Awe85] require almost linear distributed time [DMZ06]. We demonstrate that one can bypass it completely, and start from the base partition
P0 = {{v} | v ∈ V }. This requires some modfication of the algorithm, and a more nuanced analysis. In
addition, we show that the superclustering and interconnection steps themselves can be implemented efficiently. This part of the algorithm is based on our recent work on hopsets [EN16b], where we showed that
[EP04] approach is extremely useful in that context as well, and that it can be made efficient.
1.5 Related Work
Efficient algorithms for constructing (1 + ǫ, β)-spanners were also devised in [Elk05, EZ06, TZ06, Pet09,
Pet10]. These algorithms are based, however, on different approaches than that of the current paper. The
latter is based on [EP04]. Specifically, the approach of [Elk05, EZ06] is based on [Coh99, Coh00] construction of pairwise covers and hopsets, i.e., the algorithm works top-down. It recurses in small clusters, and
eliminates large ones. The approach of [TZ06, Pet09, Pet10] is based on [TZ05] collection of trees, used
originally for distance oracles.
Streaming algorithms for constructing multiplicative spanners were given in [FKM+ 05, Elk07b, Bas08],
and near-additive spanners in [Elk05, EZ06]. Spanners and emulators with sublinear error were given
in [TZ06, Pet09]. Spanners with purely additive error and lower bounds concerning them were given in
[ACIM99, EP04, BCE05, BKMP10, Che13, Woo06, BW15, AB16].
1.6 Organization
In Section 2 we present our algorithm for constructing multiplicative spanners and its analysis. In Section
2.3 we use this algorithm to provide improved spanners for weighted graphs as well. Our near-additive
spanners and emulators are presented in Section 3.
2 Sparse Multiplicative Spanners and Skeletons
Let G = (V, E) be a graph on n vertices, and let k ≥ 1 be an integer. Let c > 3 be a parameter governing
the success probability, and set β = ln(cn)/k. Recall the exponential distribution with parameter β, denoted
EX P(β), which has density
β · e−βx
x≥0
f (x) =
0
otherwise.
6
Construction. Each vertex u ∈ V samples a value ru from EX P(β), and broadcasts it to all vertices
within distance k. Each vertex x that received a message originated at u, stores mu (x) = ru − dG (x, u),
and also a neighbor pu (x) that lies on a shortest path from x to u (this neighbor sent x the message from u,
breaking ties arbitrarily if there is more than one). Let m(x) = maxu∈V {mu (x)}, then for every x ∈ V we
add to the spanner H the set of edges
C(x) = {(x, pu (x)) : mu (x) ≥ m(x) − 1} .
The following lemma is implicit in [MPVX15]. We provide a proof for completeness.
Lemma 1 ([MPVX15]). Let d1 ≤ . . . ≤ dn be arbitrary values and let δ1 , . . . , δn be independent random
variables sampled from EX P(β). Define the random variables M = maxi {δi − di } and I = {i : δi − di ≥
M − 1}. Then for any 1 ≤ t ≤ n,
Pr[|I| ≥ t] = (1 − e−β )t−1 .
Proof. Denote by X (t) the random variable which is the t-th largest among {δi − di }. Then for any value
a ∈ R, if we condition on X (t) = a, then the event |I| ≥ t is exactly the event that all the remaining t − 1
values X (1) , . . . , X (t−1) are at least a and at most a + 1. Using the memoryless property of the exponential
distribution and the independence of the {δi }, we have that
Pr[|I| ≥ t | X (t) = a] = (1 − e−β )t−1 .
Since this bound does not depend on the value of a, applying the law of total probability we conclude that
Pr[|I| ≥ t] = (1 − e−β )t−1 .
Using this lemma, we can bound the expected size of the spanner.
Lemma 2. The expected size of H is at most (cn)1/k · n.
Proof. Fix any x ∈ V , and we analyze E[|C(x)|]. Note that the event |C(x)| ≥ t happens when there are at
least t shifted random variables ru − dG (u, x) that are within 1 of the maximum. By Lemma 1 this happens
with probability at most (1 − e−β )t−1 (we remark that if x did not hear at least t messages, then trivially
Pr[|C(x)| ≥ t] = 0). We conclude that
E[|C(x)|] =
n
X
t=1
Pr[|C(x)| ≥ t] ≤
∞
X
t=0
(1 − e−β )t = eβ = (cn)1/k ,
and the lemma follows by linearity of expectation.
We now argue about the stretch of the spanner.
Claim 3. With probability at least 1 − 1/c, it holds that ru < k for all u ∈ V .
Proof. For any u ∈ V , Pr[ru ≥ k] = e−βk = 1/(cn). By the union bound, Pr[∃u, ru ≥ k] ≤ 1/c.
Assume for now that the event of Claim 3 holds, i.e., that ru < k for all u ∈ V .
Corollary 4. For any x ∈ V , if u ∈ V is the vertex maximizing mu (x), then dG (u, x) < k.
7
Proof. First note that m(x) ≥ mx (x) ≥ 0, and using Claim 3 we have ru < k. So 0 ≤ m(x) = mu (x) =
ru − dG (u, x) < k − dG (u, x).
Claim 5. For any u, x ∈ V , if x adds an edge to pu (x), then there is a shortest path P between u and x
that is fully contained in the spanner H.
Proof. We prove by induction on dG (u, x). In the base case dG (x, u) = 1, then pu (x) = u, so (x, u) is
in the spanner. Assume that every vertex y ∈ V with dG (u, y) = t − 1 which added an edge to pu (y) has
a shortest path to u in H, and we prove for x that has dG (u, x) = t. We know that x added an edge to
y = pu (x), which lies on a shortest path to u, and thus satisfies dG (u, y) = t − 1. It remains to show that
this y added an edge to pu (y). First we claim that
m(y) ≤ m(x) + 1 .
(1)
Seeking contradiction, assume that (1) does not hold, and let v ∈ V be the vertex maximizing mv (y). By
Corollary 4 we have dG (v, y) < k, and thus dG (v, x) ≤ k. Hence x will hear the message of v. This means
that mv (x) ≥ mv (y) − 1 = m(y) − 1 > m(x), which is a contradiction. This establishes (1). Now, since x
added an edge to y = pu (x), by construction
mu (x) ≥ m(x) − 1 .
We conclude that
(2)
(1)
(2)
mu (y) = mu (x) + 1 ≥ m(x) − 1 + 1 ≥ m(y) − 1 ,
so y indeed adds an edge to pu (y), and by the induction hypothesis we are done.
Lemma 6. The spanner H has stretch at most 2k − 1.
Proof. Since H is a subgraph of G, it suffices to prove for any (x, y) ∈ E, that dH (x, y) ≤ 2k − 1. Let
u be the vertex maximizing m(x) = mu (x), and w.l.o.g assume m(x) ≥ m(y). By Corollary 4 we have
dG (u, x) ≤ k − 1, so dG (u, y) ≤ k, and y heard the message of u (which was sent to distance k). This
implies that mu (y) ≥ mu (x) − 1 = m(x) − 1 ≥ m(y) − 1, so y adds the edge (y, pu (y)) to the spanner. By
applying Claim 5 on x and y, we see that both have shortest paths to u that are fully contained in H. Since
dG (x, u) ≤ k − 1 and dG (y, u) ≤ k, these two paths provide stretch 2k − 1 between x, y.
2.1 Main Theorem
We now state our main theorem, from which we will derive several interesting corollaries in various settings.
Theorem 1. For any unweighted graph G = (V, E) on n vertices, any integer k ≥ 1, c > 3 and δ > 0,
there is a randomized algorithm that with probability at least (1 − 1/c) · δ/(1 + δ) computes a spanner with
stretch 2k − 1 and number of edges at most
(1 + δ) ·
(cn)1+1/k
− δ(n − 1) .
c−1
Proof. Let Z be the event that {∀u ∈ V, ru < k}. By Claim 3 we have Pr[Z] ≥ 1 − 1/c. Note that
conditioning on Z, by Lemma 6 the algorithm produces a spanner H = (V, E ′ ) with stretch 2k − 1. In
particular, it must have at least n − 1 edges. Let X be the random variable |E ′ | − (n − 1), which conditioned
on Z takes only nonnegative values. By Lemma 2 we have E[X] = (cn)1/k · n − (n − 1). We now argue
8
that conditioning on Z will not affect this expectation by much. Indeed, by the law of total probability, for
any t, Pr[X = t] ≥ Pr[X = t | Z] · Pr[Z]. Thus
E[X | Z] ≤
By Markov inequality,
h
i
E[X]
c
≤
· (cn)1/k · n − (n − 1) .
Pr[Z]
c−1
Pr [X ≥ (1 + δ)E[X | Z] | Z] ≤
(3)
1
.
1+δ
We conclude that
Pr [(X < (1 + δ)E[X | Z]) ∧ Z] = Pr [X < (1 + δ)E[X | Z] | Z] · Pr[Z] ≥
1
1−
c
·
δ
.
1+δ
If this indeed happens, then
|E ′ | = X + n − 1
h
i
(3)
c
≤ (1 + δ) ·
· (cn)1/k · n − (n − 1) + n − 1
c−1
(cn)1+1/k − (n − 1)
= (1 + δ) ·
− δ(n − 1) .
c−1
2.1.1
Implementation Details
Distributed Model. It is straightforward to implement the algorithm in the LOCAL model of computation,
it will take k rounds to execute it – in each round, every vertex sends to its neighbors all the messages it
received so far. We claim that the algorithm can be implemented even when bandwidth is limited, i.e., in the
CONGEST model. This will require a small variation: in each round, every vertex v ∈ V will send to all its
neighbors the message (ru , dG (u, v)) for the vertex u that currently maximizes mu (v) = ru − dG (u, v). We
note that omitting all the other messages will not affect the algorithm, since if one such message would cause
some neighbor of v to add an edge to v, then the message about u will suffice, as the latter has the largest
mu (v) value. (Also recall that all vertices start their broadcast simultaneously, and do so for k rounds, so
any omitted message could not have been sent to further distance than the message from u, which implies
dropping it will have no effects on farther vertices as well.)
PRAM Model. In the parallel model of computation, we can use a variant of the construction that appeared
in [MPX13, MPVX15]. Roughly speaking, vertex u will start its broadcast at time k − ⌈ru ⌉, and every
vertex x will send only the first message that arrives to it (which realizes m(x)). As argued in [MPVX15],
the algorithm can be implemented in O(k log∗ n) depth and O(|E|) work.
Standard Centralized Model. Note that in the standard centralized model of computation, the running
time is at most the work of the PRAM algorithm, which is O(m). By taking constant c and δ, and repeating
the algorithm until the first success (we can easily check the number of edges of the spanner and that all
ru < k), we get a spanner with stretch 2k − 1 and O(n1+1/k ) edges in expected time O(|E|).
9
2.2 Implications of Theorem 1
2.2.1
Standard Centralized Model and PRAM
The currently sparsest spanners which can be constructed in linear time are those of Halperin and Zwick
[HZ96]. They provide for any k ≥ 1, a deterministic algorithm running in O(m) time, that produces a
spanner with n1+1/k + n edges. We can improve their result for a wide range of k, albeit with a randomized
algorithm. First we show a near-linear time algorithm (which can be also executed in parallel), that provides
a spanner sparser than Halperin and Zwick in the range k ≥ 2 ln n/ ln ln n.7
Corollary 7. For any unweighted graph G = (V, E) on n vertices and m edges, and any integer k ≥ 2,
there is a randomized
algorithm,
that with high probability8 computes a spanner for G with stretch 2k − 1
k)
edges. The algorithm has O(k2 ln n ln∗ n) depth and the running time (or work)
and n1+1/k · 1 + O(ln
k
is Õ(k|E|).
Proof. Apply Theorem 1 with parameters c = k and δ = 1/k. So with probability at least
we obtain a spanner whose number of edges is at most
(kn)1+1/k
O(ln k)
1+1/k
(1 + 1/k) ·
≤n
· 1+
.
k−1
k
k−1
k
·
1
k+1
≥
1
3k
(4)
Run the algorithm C · k ln n times for some constant C. We noted in Section 2.1.1 that each run takes
O(k ln∗ n) depth and O(|E|) work, so the time bounds are as promised. Now, with probability at least
1 − (1 − 1/(3k))C·k ln n ≥ 1 − n−C/3 , we achieved a spanner with number of edges as in (4) in one of the
executions.
√
Remark 1. Whenever k ≥ 2 ln n/ ln ln n, we have n1/k ≤ ln n, so the number of edges in Corollary 7 is
n1+1/k + o(n), and the running time is Õ(k|E|).
2.2.2
Distributed Model
In a distributed setting we have the following result.
Corollary 8. For any unweighted graph G = (V, E) on n vertices, any k ≥ 1 and 0 < ǫ < 1, there is a
randomized distributed algorithm that with probability at least 1 − ǫ computes a spanner with stretch 2k − 1
and O(n/ǫ)1+1/k edges, within k rounds.
Proof. Apply Theorem 1 with c = 3/ǫ and δ = 2/ǫ, so the success probability is at least
(1 − ǫ/3) · (1 − ǫ/(ǫ + 2)) > 1 − ǫ .
With these parameters, by Theorem 1, the number of edges in spanner will be bounded by O(n/ǫ)1+1/k .
7
8
In fact, the factor 2 can be replaced by any 1 + ǫ for constant ǫ > 0.
By high probability we mean probability at least 1 − n−C , for any desired constant C.
10
2.2.3
Ultra-Sparse Spanners and Skeletons
We now show that in the regime k ≥ ln n, our algorithm (that succeeds with probability close to 1) provides
a spanner whose number of edges is very close to n (as a function of k and the success probability). This
will hold in all computational models we considered. We note that for the centralized and PRAM models,
Corollary 7 gives high probability with roughly the same sparsity, albeit with larger depth and work.
Corollary 9. For any unweighted graph G = (V, E) on n vertices, and any integer k ≥ ln n and parameter
2/k < ǫ < 1, there is a randomized
algorithm,
that with probability at least 1 − ǫ computes a spanner for G
O(ln n)
with stretch 2k − 1 and n · 1 + ǫ·k
edges. The number of rounds in distributed model is k, in PRAM
∗
it is O(k log n) depth and O(|E|) work, and in the centralized model it is O(|E|) time.
Proof. Apply Theorem 1 with parameters c = k and δ = 2/ǫ, so with probability at least
≥ 1−ǫ
e(2 ln n)/k
≤ 1 + O(ln n)/k, so
(kn)1+1/k
O(ln n)
(1 + 2/ǫ) ·
− 2(n − 1)/ǫ ≤ n · 1 +
.
k−1
ǫ·k
(5)
we obtain a (2k − 1)-spanner. In the regime k ≥ ln n we have
the number of edges is at most
(kn)1/k
2/ǫ
k−1
k · 2/ǫ+1
≤
Remark 2. The spanner of Corollary 9 can be used as a skeleton. E.g., one can take ǫ = o(1) and
k = Õ(log n), to obtain with probability 1 − o(1), a skeleton with n(1 + o(1)) edges, which is computed in
Õ(log n) rounds.
2.3 Weighted Graphs
Miller et al. [MPVX15] used their efficient algorithm for constructing O(k)-spanners with O(n1+1/k ) edges
for unweighted graphs, to provide an efficient algorithm for constructing O(k)-spanners with O(n1+1/k log k)
edges for weighted graphs. In this section we argue that their scheme can be used to convert our algorithm
for constructing (2k − 1)-spanners with O(n1+1/k ) edges for unweighted graphs (Theorem 1; see also Section 2.1.1) into an efficient algorithm for constructing (2k − 1)(1 + ǫ)-spanners with O(n1+1/k · logǫ k ) edges
for weighted graphs.
The scheme of [MPVX15] works in the following way. It partitions all edges of G = (V, E) into
⌈log1+ǫ ωmax ⌉ = λ categories Et = {e ∈ E | ω(e) ∈ [(1 + ǫ)t−1 , (1 + ǫ)t )}, t = 1, 2, . . . , λ. (We assume
that the minimum weight is 1, and the maximum weight is ωmax . The last category Eλ should also contain
edges of weight exactly ωmax .) Now one defines ℓ = ⌈log1+ǫ kc ⌉, for a sufficiently large constant c, graphs
S
Gj = (V, Êj ), j = 0, 1, . . . , ℓ − 1, Êj = {Et | t ≡ j( mod ℓ)}.
Observe that the edge weights in (each) Gj are well-separated, i.e., Êj is a disjoint union of at most
q = ⌈λ/ℓ⌉ edge sets E (1) , . . . , E (q) , such that the edge weights within each set are within a factor of 1 + ǫ
from one another. Moreover, if edge weights in E (i) , i = 1, 2, . . . , q, are in the range [w(i) , (1 + ǫ)w(i) ),
then we have w(i) = w(1) (kc )i−1 , for every i = 1, 2, . . . , q.
For each graph Gj , the scheme of [MPVX15] constructs an O(k)-spanner with O(n1+1/k ) edges. It
then takes a union of ℓ = O( logǫ k ) such spanners as the ultimate O(k)-spanner of the original graphs. (In
fact, [MPVX15] used specifically ǫ = 1.) We will next outline the way in which [MPVX15] construct O(k)spanner with O(n1+1/k ) edges for each Gj , and show how to modify it to provide a (2k − 1)(1 + ǫ)-spanner.
11
The scheme starts with running a routine of [MPVX15] that constructs an O(k)-spanner H (1) with
O(n1+1/k ) edges for the unweighted graph (V (1) , E (1) ), V (1) = V , and constructing the exponential start
time partition P (1) for it. It then contracts each of the clusters of P (1) (which have unweighted radii at most
k − 1) into single vertices of V (2) , and runs the unweighted spanner routine on (V (2) , E (2) ). As a result, it
constructs an O(k)-spanner H (2) and a partition PS(2) of V (2) , contracts all clusters of P (2) to get V (3) , etc.
The final spanner returned by the scheme is H = qi=1 H (i) .
The scheme guarantees stretch (1 + ǫ)(1 + O(k−(c−1) ))O(k), because the blackbox routine for unweighted graphs provides stretch O(k) for each category of weights, but the weights are uniform only up to
a factor of 1 + ǫ. Also, the factor of 1 + O(k−(c−1) ) appears, because one contracts clusters of unweighted
diameter O(k) of lower scales, on which all edge weights are a factor of roughly k−c smaller than the edge
weights on the current scale.
In the analysis of |H|, [MPVX15] show that every vertex u is active (i.e., non-isolated vertex which
is not yet contracted into a larger super-vertex) for expected O(n1/k ) phases, and when it is active, it contributes expected O(n1/k ) edges to the spanner of the current phase. Hence the overall size of the spanner
is O(n1+2/k ), and by rescaling k′ = 2k, they ultimately get their result. (See the proof of Theorem 3.3 in
[MPVX15] for full details of this proof. We have sketched it for the sake of completeness.)
While the stretch analysis of [MPVX15] is sufficiently precise for our purposes, this is not the case with
the size analysis. Indeed, even when one plugs in stretch 2k − 1 of our unweighted spanner routine instead
of stretch O(k) of their routine, still one obtains a (2k − 1)(1 + ǫ)2 (1 + k−(c−1) )-spanner with O(n1+2/k )
edges, i.e., a (4k − 2)(1 + O(ǫ))-spanner with O(n1+1/k ) edges (for each Gj ).
In what follows we refine their size analysis, and show that, in fact, every vertex u contributes expected
O(n1/k ) edges in all phases of the algorithm altogether (for a single graph Gj with well-separated edge
(i)
weights). Denote by ru the radius that u tosses from EX P(β) in the ith phase, i = 1, 2, . . . , q, assuming
that it is active on that phase. We say that a vertex v (which is active on phase i) is a candidate vertex
(i)
of phase i if its broadcast message reaches u no later than within one time unit after the time −ru , i.e.,
(i)
(i)
−ru + 1 ≥ −rv + d(v, u), where d(v, u) is the unweighted distance between v and u in the graph on
which the unweighted spanner routine is invoked on phase i.
Let X (i) denote the random variable counting the number of such candidate vertices on phase i, for
i = 1, 2, . . . , q. (Recall that these are the vertices which might cause u to add an edge to the spanner.) Let
j denote the random variable which is the phase in which u was contracted (and j = q if there is no such
(i)
phase). That is, j indicates the level in which the broadcast of some candidate vertex v has −rv +d(v, u) <
(i)
−ru . Denote also by X̂ (i) , i = 1, 2, . . . , q, the total number of candidates u sees between the beginning
(j)
of phase i, and up until phase j, where a candidate vertex v reaches u before time −ru . On that phase
j, X̂ (i) counts the number of candidates with index not larger than that of the candidate vertex v (assume
every vertex has an arbitrary distinct index in {1, . . . n}). Note that for i > j, by definition, X̂ (i) = 0. Also,
in particular, X̂ = X̂ (1) is at least the total contribution of edges u adds to the spanner, except for up to
expected O(n1/k ) edges that it might contribute on phase j (as shown in Lemma 2).
We next argue that for any t = 0, 1, 2, . . .,
Pr(X̂ > t) ≤ (1 − e−β )t .
This implies that
E(X̂) =
∞
X
t=0
Pr(X̂ > t) ≤
∞
X
t=0
(1 − e−β )t = eβ = O(n1/k ) .
12
(6)
First, note that
Pr(X̂ > t) =
∞
X
t(1) =0
Pr(X (1) = t(1) ) · Pr(X̂ > t | X (1) = t(1) ) .
For t(1) > t, we have
Pr(X̂ > t | X (1) = t(1) ) = (1 − e−β )t .
To justify this equation, note that the left-hand side is exactly the probability that on the first phase, all the
(1)
(1)
t first candidate vertices v have −rv + d(v, u) ≥ −ru , conditioned on them being candidates, i.e., on
(1)
−rv + d(v, u) ≤ −ru + 1. Since these are independent shifted exponential random variables, the equation
follows from the memoryless property of the exponential distribution.
For t(1) ≤ t, we have
Pr(X̂ > t | X (1) = t(1) )
=
(1)
(1 − e−β )t
(1)
= (1 − e−β )t
· Pr(X̂ (2) > t − t(1) | X (1) = t(1) , X̂ (1) ≥ t(1) )
· Pr(X̂ (2) > t − t(1) | X̂ (1) ≥ X (1) ) .
(1)
(Again, (1 − e−β )t is the probability that no candidate vertex of the first phase reached u before time
(1)
−ru , and so u was not contracted away at this phase.)
We conduct an induction on the phase, where the induction base is the last phase i = q. On the last
phase, for any h,
Pr(X̂ (q) > h | X̂ (1) ≥ X (1) , X̂ (2) ≥ X (2) , . . . , X̂ (q−1) ≥ X (q−1) ) ≤ (1 − e−β )h ,
(q)
(1)
because it is just the probability that none of the first h candidates (that have −rv + d(v, u) ≤ −ru + 1)
(q)
reaches u before time −ru . (If there are fewer candidates or u was contracted in a previous phase, then
this probability is 0.)
Hence by the inductive hypothesis,
(1)
Pr(X̂ (2) > t − t(1) | X̂ (1) ≥ X (1) ) ≤ (1 − e−β )t−t
,
and so
for any t(1) ≤ t as well. Hence
Pr(X̂ (1) > t | X (1) = t(1) ) ≤ (1 − e−β )t ,
Pr(X̂ > t) =
≤
∞
X
t(1) =0
∞
X
t(1) =0
Pr(X (1) = t(1) ) · Pr(X̂ > t | X (1) = t(1) )
Pr(X (1) = t(1) ) · (1 − e−β )t = (1 − e−β )t ,
as required.
Hence the expected contribution of every vertex is O(n1/k ), and the overall spanner size for each Gj
is, in expectation, O(n1+1/k ). The running time of the algorithm is expected to be O(|E|), following the
analysis of [MPVX15]. Moreover, as in [MPVX15], our algorithm can be implemented in PRAM model,
in O(log n · log∗ n · log Λ) depth, and O(|E|) work, where Λ is the aspect ratio of the input graph. We
summarize the result below.
13
Theorem 2. Given a weighted n-vertex graph G, and a pair of parameters k ≥ 1, 0 < ǫ < 1, our algorithm
computes a (2k − 1)(1 + ǫ)-spanner of G with O(n1+1/k · (log k)/ǫ) edges, in expected O(|E|) centralized
time, or in O(log n · log∗ n · log Λ) depth and O(|E|) work.
The result of Theorem 2 can be used in conjunction with the scheme of [ES16] to devise an algorithm
that computes (2k − 1)(1 + ǫ)-spanners of size O(n1+1/k (log k/ǫ)1/ǫ), with lightness (i.e., weight of the
spanner divided by the weight of the MST of the input graph) O(k · n1/k (1/ǫ)2+1/k ), in expected time
O(|E| + min{n log n, |E|α(n)}), where α(·) is an inverse-Ackermann function. This improves a result
of [ES16] that provides spanners with the same stretch and lightness, but with more edges (specifically,
O((k + (1/ǫ)2+1/k )n1+1/k ), and using O(k · |E| + min{n log n, |E|α(n)}) time. Recently, consequently to
our work, Alstrup et al. [ADF+ 17] further improved these bounds. We thus omit the details of our argument
that provides the aforementioned bounds.
3 An Efficient Centralized Construction of Nearly-Additive Spanners and
Emulators
3.1 A Basic Variant of the Algorithm
In this section we present an algorithm for constructing (1 + ǫ, β)-spanners, which can be efficiently implemented in various settings. We start with the centralized setting. In this setting we present two variants of
our construction. The first variant presented in this section is somewhat simpler, while the second variant
presented in the next section provides better bounds.
Let G = (V, E) be an unweighted graph on n vertices, and let k ≥ 1, ǫ > 0 and 0 < ρ < 1/2 be
parameters. Unlike the algorithm of [EP04], our algorithm does not employ sparse partitions of [AP92].
The algorithm initializes the spanner H as an empty set, and proceeds in phases. It starts with setting
P̂0 = {{v} | v ∈ V } to be the partition of V into singleton clusters. The partition P̂0 is the input of phase 0
of our algorithm. More generally, P̂i is the input of phase i, for every index i in a certain appropriate range,
which we will specify in the sequel.
Throughout the algorithm, all clusters C that we will construct will be centered at designated centers rC . In particular, each singleton cluster C = {v} ∈ P̂0 is centered at v. We define Rad (C) =
max{dG(C) (rC , v) | v ∈ C}, and Rad (P̂i ) = maxC∈P̂i {Rad (C)}.
All phases of our algorithm except for the last one consist of two steps. Specifically, these are the
superclustering and the interconnection steps. The last phase contains only the interconnection step, and
the superclustering step is skipped. We also partition the phases into two stages. The first stage consists of
phases 0, l
1, . . . m, i0 = ⌊log(κρ)⌋, and the second stage consists of all the other phases i0 + 1, . . . , i1 where
i1 = i0 + κ+1
κρ − 2, except for the last phase ℓ = i1 + 1. The last phase will be referred to as the concluding
phase.
Each phase i accepts as input two parameters, the distance threshold parameter δi , and the degree parameter deg i . The difference between stage 1 and 2 is that in stage 1 the degree parameter grows exponentially,
while in stage 2 it is fixed. The distance threshold parameter grows in the same steady rate (increases by a
factor of 1/ǫ) all through the algorithm.
Next we describe the first stage of the algorithm. We start with describing its superclustering step. We
i
set deg i = n2 /κ , for all i = 0, 1, . . . , i0 . Let R0 = 0, and δi = (1/ǫ)i + 4 · Ri , where Ri is determined by
the following recursion: Ri+1 = δi + Ri = (1/ǫ)i + 5 · Ri . We will show that the inequality Rad (P̂i ) ≤ Ri
will hold for all i.
14
On phase i, each cluster C ∈ P̂i is sampled i.a.r. with probability 1/deg i . Let Si denote
S the set of
sampled clusters. We now conduct a BFS exploration to depth δi in G rooted at the set Si = C∈Si {rC }.
As a result, a forest Fi is constructed, rooted at vertices of Si . For a cluster center r ′ = rC ′ of a cluster
C ′ ∈ P̂i \Si such that r ′ is spanned by Fi , let rC be the root of the forest tree of Fi to which r ′ belongs. (The
vertex rC is by itself a cluster center of a cluster C ∈ Si .) The cluster C ′ becomes now superclustered in a
cluster Ĉ centered around the cluster C. (We also say that C ′ is associated with C. We will view association
as a transitive relation, i.e., if C ′ is associated with C and C ′′ is associated with C ′ , we will think of C ′′ as
associated with C as well.)
The cluster center rC of C becomes the new cluster center of Ĉ, i.e., rĈ = rC . The vertex set of the
new supercluster Ĉ is the union of the vertex set of C with the vertex sets of all clusters C ′ which are
superclustered into Ĉ. The edge set TĈ of the new cluster Ĉ contains the BFS spanning trees of all these
clusters, and, in addition, it contains shortest paths from the forest Fi between rC and each rC ′ as above. Ŝi
is the set of superclusters created by this process. We set P̂i+1 = Ŝi . All edges that belong to the edgeset of
one of these superclusters are now added to the spanner H.
For each supercluster Ĉ, we write Rad (Ĉ) = Rad (TĈ , rĈ ). Observe that Rad (P̂0 ) ≤ R0 = 0, and
Rad (Ŝ0 ) = max{Rad (Ĉ) | Ĉ ∈ Ŝ0 } ≤ δ0 + R0 = R1 = 1. More generally we have
Rad (Ŝi ) = max{Rad (Ĉ) | Ĉ ∈ Ŝi } ≤ δi + Rad (P̂i ) ≤ δi + Ri ≤ (1/ǫ)i + 5Ri = Ri+1 .
(7)
Denote by Ûi the set of clusters of P̂i which were not superclustered into clusters of Ŝi . In the interconnection step for i ≥ 1, every cluster center rC of a cluster C ∈ Ûi initiates a BFS exploration to depth 21 δi ,
i.e., half the depth of the exploration which took place in the superclustering step. For each cluster center
rC ′ for C ′ ∈ P̂i which is discovered by the exploration initiated in rC , the shortest path between rC and rC ′
is inserted into the spanner H. The first phase i = 0 is slightly different: the exploration depth is set to be
1, and we add an edge from {v} ∈ Û0 to all neighbors that are in Û0 . This completes the description of the
interconnection step.
Lemma 10. For any vertex v ∈ V , the expected number of explorations that visit v at the interconnection
step of phase i is at most deg i .
Proof. For i ≥ 1, assume that there are l clusters of P̂i whose centers are within distance δi /2 from v. If
at least one of them is sampled to Si , then no exploration will visit v (since in the superclustering phase the
sampled center will explore to distance δi , and thus will supercluster all these centers). The probability that
none of them is sampled is (1 − 1/deg i )l , in which case we get that l explorations visit v, so the expectation
is l · (1 − 1/deg i )l ≤ deg i (which holds for any l).
For i = 0, we note that we add an edge touching v iff none of its neighbors were sampled at phase 0
(as otherwise it would be clustered and thus not in Û0 ). The expected number of edges added is once again
l · (1 − 1/deg i )l ≤ deg i (here l is the number of neighbors).
We also note the following lemma for future use, its proof follows from a simple Chernoff bound.
Lemma 11. For any constant c > 1, with probability at least 1 − 1/nc−1 , for every vertex v ∈ V , at least
one among the deg i · c · ln n closest cluster centers rC ′ with C ′ ∈ P̂i to v is sampled, i.e., satisfies C ′ ∈ Si .
Observe that no vertex v ∈ V is explored by more than c · ln n · deg i explorations, with probability at
least 1 − n−(c−1) . Indeed, otherwise when i ≥ 1 there would be more than c · ln n · deg i cluster centers
rC of unsampled clusters C ∈ P̂i at pairwise distance at most δi . Applying Lemma 11 to any of them we
15
conclude that that the particular cluster C was superclustered by a nearby sampled cluster, i.e., C 6∈ Ûi ,
contradiction. In the case i = 0, we would have that v has at least c · ln n · deg i unsampled neighbors,
which occurs with probability at most n−c . Hence, by union-bound, every vertex v is explored by at most
c · ln n · deg i explorations, with probability at least 1 − n−(c−1) .
Lemma 10 suggests that the interconnection step of phase i can be carried out in expected O(|E| · deg i )
time. Clearly, the superclustering step can be carried out in just O(|E|) time, and thus the running time of
the interconnection step dominates the running time of phase i. In order to control the running time, we
terminate stage 1 and move on to stage 2 when i0 = ⌊log(κρ)⌋, so that deg i0 ≤ nρ .
Observe also that the superclustering step inserts into the spanner at most O(n) edges (because we
insert a subset of edges of Fi , and Fi is a forest), and by Lemma 10 the interconnection step inserts in
expectation at most O(|P̂i | · deg i · ((1/ǫ)i + Ri )) = O(|P̂i | · deg i · (1/ǫ)i ) edges. (We will soon show that
Ri = O((1/ǫ)i−1 ).) A more detailed argument providing an upper bound on the number of edges inserted
by the interconnection step will be given below.
Lemma 12. For all i, 1 ≤ i ≤ ℓ, for every pair of clusters C ∈ Ûi , C ′ ∈ P̂i at distance at most 21 (1/ǫ)i
from one another, a shortest path between the cluster centers of C and C ′ was inserted into the spanner H.
Moreover, for any pair {v} ∈ Û0 , {v ′ } ∈ P̂0 , such that e = (v, v ′ ) ∈ E, the edge e belongs to H.
Proof. We start with proving the first assertion of the lemma. For some index i, 1 ≤ i ≤ ℓ, and a pair
C ∈ Ûi , C ′ ∈ P̂i of clusters, let rC , rC ′ be the respective cluster centers. Then we have
dG (rC , rC ′ ) ≤ Rad (C) + dG (C, C ′ ) + Rad (C ′ )
≤ dG (C, C ′ ) + 2 · Ri
1
1
≤
(1/ǫ)i + 2 · Ri = δi ,
2
2
and so a shortest path between rC and rC ′ was inserted into the spanner H.
The second assertion of the lemma is guaranteed by the interconnection step of phase 0.
Next we analyze the radii of clusters’ collections P̂i , for i = 1, 2, . . ..
Lemma 13. For i = 0.1, . . . , ℓ, the value of Ri is given by
i−1
X
(1/ǫ)j · 5i−1−j .
Ri =
j=0
Proof. The proof is by induction of the index i. The basis (i = 0) is immediate as R0 = 0. For the induction
hypothesis, note that
Ri+1 = δi + Ri = (1/ǫ)i + 5 · Ri
i−1
X
= (1/ǫ)i + 5 · (1/ǫ)j · 5i−1−j
j=0
=
i
X
(1/ǫ)j · 5i−j ,
j=0
as required.
16
Observe that Lemma 13 implies that for ǫ < 1/10, we have Ri = 5i−1 ·
1/(5ǫ)i −1
1/(5ǫ)−1
≤
1
1−5ǫ
· (1/ǫ)i−1 ≤
2 · (1/ǫ)i−1 . Recall that P̂i = Ŝi−1 . Hence Rad (P̂i ) = Rad (Ŝi−1 ). By inequality (7), we have Rad (P̂i ) ≤
(1/ǫ)i−1 + 5 · Ri−1 = Ri , for all i = 0, 1, . . . , ℓ.
We analyze the number of clusters in collections P̂i in the following lemma.
Lemma 14. For i = 0, 1, . . . , i0 ,
|P̂i | ≤ 2 · n1−
with probability at least 1 − exp{−Ω(n
i
1− 2 κ−1
2i −1
κ
,
(8)
)}.
Proof. The probability that a vertex v ∈ V will be a center of a cluster in P̂i is
i
Thus the expected size of P̂i is n1−(2 −1)/κ , and by Chernoff bound,
Pr[|P̂i | ≥ 2E[|P̂i |]] ≤ exp{−Ω(E[|P̂i |])} = exp{−Ω(n1−
Since for ρ < 1/2 and i ≤ i0 = ⌊log(κρ)⌋, we have n1−
2i+1 −1
κ
i+1
1− 2 κ −1
Qi−1
2i −1
κ
j=0 1/deg j
i
= n−(2 −1)/κ .
)} .
≥ n1−2ρ = ω(log n), we conclude that
). Hence in particular, |P̂i0 +1 | = O(n1−ρ+1/κ ), whp.
whp for all 0 ≤ i ≤ i0 , |P̂i+1 | = |Ŝi | = O(n
The total expected running time of the first stage is at most
O(|E|)
i0
X
i=1
deg i = O(|E| · n
2i0
κ
) = O(|E| · nρ ) .
Since each superclustering step inserts at most O(n) edges into the spanner, the overall number of edges
inserted by the i0 superclustering steps of stage 1 is O(n · i0 ) = O(n · log(κρ)). The expected number of
edges added to the spanner by the interconnection step of phase i is at most
O(|P̂i | · deg i · (1/ǫ)i ) = O(n1−
2i −1
κ
2i
· (1/ǫ)log(κρ) · n κ ) = O(n1+1/κ · (1/ǫ)log(κρ) ) .
Next we describe stage 2 of the algorithm, i.e., phases i = i0 +1, i0 +2, . . . , i1 , where i1 = i0 +⌈ κ+1
κρ ⌉−2.
All these phases are executed with the same fixed degree parameter deg i = nρ . On the other hand, the
distance threshold keeps growing in the same steady rate as in stage 1, i.e., it is given by δi = (1/ǫ)i + 4Ri .
The sets P̂i0 +1 , P̂i0 +2 , . . . , P̂i1 on which phases i0 + 1, i0 + 2, . . . , i1 , respectively, operate are defined by
P̂i0 +i = Ŝi0 +i−1 , for 1 ≤ i ≤ i1 − i0 .
Lemma 13 keeps holding for these additional i1 − i0 phases, i.e.,
Rad (P̂i ) ≤ Ri ≤ 2 · (1/ǫ)i−1 .
(We assume all through that ǫ < 1/10.)
Also, for every pair of clusters C ∈ Ûi and C ′ ∈ P̂i which are at distance at most 12 (1/ǫ)i from one
another, their centers are interconnected in the spanner by a shortest path between them.
In addition, for every i ∈ [i0 , i1 ], the expected size of P̂i+1 is
E[|P̂i+1 |] = n ·
i
Y
j=0
1/deg j ≤ n1+1/κ−(i+1−i0 )ρ .
17
By Chernoff bound, for every such i, with probability at least 1 − exp{−Ω(nρ )}, we have
|P̂i+1 | = |Ŝi | ≤ 2 · n1+1/κ−ρ−(i−i0 )ρ .
Assuming that nρ = ω(1), we conclude that whp
|P̂i1 +1 | = |Ŝi1 | ≤ O(n1+1/κ−(i1 +1−i0 )ρ ) = O(n
⌉−1)ρ
1+1/κ−(⌈ κ+1
κρ
) = O(nρ ) .
(9)
log n
(For the assumption above to hold we will need to assume that ρ ≥ log
2 log n , say. We will show soon that
this assumption is valid in our setting.)
The time required to perform these ⌈ κ+1
κρ ⌉ − 2 ≤ 1/ρ additional phases is expected to be at most
ρ
O(|E| · deg i · (1/ρ)) = O(|E|n /ρ).
The final collection of clusters P̂i1 +1 is created by setting P̂i1 +1 = Ŝi1 .
We will next bound the expected number of edges inserted into the spanner during stage 2 of the algorithm. Each of the forests Fi , i ∈ [i0 + 1, i1 ], created during the superclustering steps contributes at
most n − 1 edges. The interconnection step of phase i + i0 contributes in expectation at most O(|P̂i+i0 | ·
deg i+i0 · (1/ǫ)i ) ≤ O(n1+1/κ−iρ · (1/ǫ)log(κρ)+i ) edges. Assuming that 1/ǫ < nρ /2, this becomes a
geometric progression, so the overall expected number of edges inserted into the spanner on stage 2 is
O(n1+1/κ · (1/ǫ)log(κρ) ). (We will show the validity of this assumption in the end of this section.)
Finally, we describe the concluding phase of the algorithm, i.e., phase ℓ = i1 + 1. In this phase we skip
the superclustering step (as the number of clusters is already sufficiently small), and proceed directly to the
interconnection step.
On this step each of the cluster centers rC for C ∈ P̂ℓ conducts a BFS exploration in G to depth
1
1
ℓ
δ
2 ℓ = 2 (1/ǫ) + 2Rℓ . (Essentially, we define Ûℓ = P̂ℓ , and perform the usual interconnection step of the
algorithm.) By (9), the number of edges inserted by this step into the spanner is whp only O(|P̂ℓ |2 ·(1/ǫ)ℓ ) =
O(|P̂i1 +1 |2 ·(1/ǫ)i1 +1 ) = O(n2ρ ·(1/ǫ)log(ρκ)+1/ρ ). Recall that we assume that ρ < 1/2. Hence this number
of edges is sublinear in n.
Hence the overall expected number of edges in the spanner is |H| = O(n1+1/κ · (1/ǫ)log(κρ) ). Observe
also that the running time of the last phase is O(|E| · nρ ). Hence the overall expected running time of the
ρ /ρ). It remains to analyze the stretch of the resulting spanner H.
algorithm is O(|E|n
Sℓ
Let Û = j=0 Ûj . Observe that every singleton cluster {v} ∈ P̂0 is associated with exactly one cluster
of Û , i.e., Û is a partition of V . Note that Rad (Û0 ) = 0, Rad (Û1 ) ≤ 1 = R1 , and for every j ∈ [ℓ], we have
Rad (Ûj ) ≤ Rad (P̂j ) ≤ Rj ≤ 2 · (1/ǫ)j−1 . Denote c = 2. Recall also (see Lemma 12) that for j ≥ 1, for
every pair of clusters C, C ′ ∈ Ûj at distance at most 21 (1/ǫ)j from one another, a shortest path between the
cluster centers of this pair of clusters in G was added to the spanner H. Moreover, neighboring clusters of
Û0 are also interconnected by a spanner edge.
Lemma 15. Consider a pair of indices 0 ≤ j < i ≤ ℓ, and a pair of neighboring (in G) clusters C ′ ∈ Ûj ,
C ∈ Ûi , and a vertex w′ ∈ C ′ and the center r of C. Then the spanner H contains a path of length at most
3Rad (Ûj ) + 1 + Rad (Ûi ) between w′ and r.
Proof. Let (z ′ , z) ∈ E ∩ (C ′ × C) be an edge connecting this pair of clusters. There exists a subcluster
C ′′ ⊆ C, C ′′ ∈ P̂j such that z ∈ C ′′ . Hence the interconnection step of phase j inserted a shortest path
π(r ′ , r ′′ ) in G between the cluster centers r ′ of C ′ and r ′′ of C ′′ into the spanner H. Note that the distance
between r ′ , r ′′ is at most 1 + 2Rad (P̂j ) ≤ 1 + 4(1/ǫ)j−1 < 1/2 · (1/ǫ)j , since we assume ǫ < 1/10.
Hence a path between w′ and r in H can be built by concatenating a path π(w′ , r ′ ) between w′ and r ′ in
18
the spanning tree T (C ′ ) of C ′ with the path π(r ′ , r ′′ ) in H, and with the path π(r ′′ , r) in the spanning tree
T (C) of C. (Note that both r ′′ and r belong to C.) Its length is at most
|π(w′ , r ′ )| + |π(r ′ , r ′′ )| + |π(r ′′ , r)| ≤ Rad (C ′ ) + (Rad (C ′ ) + 1 + Rad (C ′′ )) + Rad (C)
≤ 3Rad (Ûj ) + 1 + Rad (Ûi ) .
Now we are ready to analyze the stretch of our spanner.
Lemma 16. Suppose ǫ ≤ 1/10. Consider a pair of vertices u, v ∈ V . Fix a shortest path π(u, v) between
them in G, and suppose
that for some index i ∈ [0, ℓ], all vertices of π(u, v) are clustered in the set Û (i)
Si
(i)
defined by Û = j=0 Ûj . Then
dH (u, v) ≤ (1 + 16c · ǫ · i)dG (u, v) + 4
i
X
j=1
Rj · 2i−j .
Proof. The proof is by induction on i. For the induction basis i = 0, observe that all vertices of π(u, v) are
clustered in Û0 , and thus all edges of π(u, v) are inserted into the spanner on phase 0. Hence dH (u, v) =
dG (u, v).
For the induction step, consider first a pair of vertices x, y such that |π(x, y)| ≤ 21 (1/ǫ)i , and V (π(x, y)) ⊆
Û (i) . Let z1 and z2 be the leftmost and the rightmost Ûi -clustered vertices in π(x, y), if exist. (The case
when both these vertices exist is the one where the largest stretch is incurred; cf. [EP04].) Let C1 , C2 ∈ Ûi
be their respective clusters, i.e., z1 ∈ C1 , z2 ∈ C2 . Let w1 (respectively, w2 ) be the neighbor of z1 (resp.,
z2 ) on the subpath π(x, z1 ) (resp., π(z2 , y)) of π(x, y), and denote by C1′ and C2′ the respective clusters of
w1 and w2 . Observe that C1′ , C2′ ∈ Û (i−1) .
Denote r1 and r2 the cluster centers of C1 and C2 , respectively. The spanner H contains a path of length
at most dG (r1 , r2 ) between these cluster centers. Also, by Lemma 15, since C1′ and C1 are neighboring
clusters, the spanner H contains a path of length at most 3Rj + 1 + Ri ≤ 2Ri + 1 between w1 and r1 , and
a path of at most this length between r2 and w2 . (For ǫ < 1/10, 3Rj ≤ Ri , for all j < i.) Observe also
that the subpaths π(x, w1 ) and π(w2 , y) of π(x, y) have all their vertices clustered in Û (i−1) , and thus the
induction hypothesis is applicable to these subpaths.
Hence
dH (x, y) ≤ dH (x, w1 ) + dH (w1 , r1 ) + dH (r1 , r2 ) + dH (r2 , w2 ) + dH (w2 , y)
i−1
X
Rj · 2i−1−j + 2Ri + 1 + (dG (C1 , C2 ) + 2Ri )
≤ (1 + 16c · ǫ(i − 1))dG (x, w1 ) + 4
j=1
+2Ri + 1 + (1 + 16c · ǫ(i − 1)) · dG (w2 , y) + 4
i−1
X
j=1
Rj · 2i−1−j
= (1 + 16c · ǫ(i − 1)) · (dG (x, w1 ) + dG (w2 , y)) + dG (C1 , C2 ) + 4Ri + 2 + 8
i−1
X
j=1
Rj · 2i−1−j .
Note also that
dG (x, y) = dG (x, w1 ) + 1 + dG (z1 , z2 ) + 1 + dG (w2 , y) ≥ dG (x, w1 ) + dG (C1 , C2 ) + 2 + dG (w2 , y).
19
Hence
i−1
X
dH (x, y) ≤ (1 + 16c · ǫ(i − 1))dG (x, y) + 4Ri + 8
= (1 + 16c · ǫ(i − 1))dG (x, y) + 4
i
X
j=1
j=1
Rj · 2i−1−j
Rj · 2i−j .
Now consider a pair of vertices u, v such that all vertices of π(u, v) are clustered in Û (i) , without any
restriction on |π(u, v)|. We partition π(u, v) into segments π(x, y) of length exactly ⌊ 21 (1/ǫ)i ⌋, except
maybe one segment of possibly smaller length. Inequality (10) applies to all these segments. Hence
dH (u, v) ≤ (1 + 16c · ǫ(i − 1))dG (u, v) + 4
≤
1 + 16c · ǫ(i − 1) +
8
Pi
4
Pi
i
X
j=1
i
X
dG (u, v)
Rj · 2i−j
⌋
+
4
i
2 (1/ǫ) − 1
j=1
Rj · 2i−j ⌊ 1
i−j
j=1 Rj · 2
1
i
2 (1/ǫ) − 1
!
dG (u, v) + 4
i
X
j=1
Rj · 2i−j .
Rj 2i−j
j=1
≤ 16c · ǫ. Recall that for every j, we have Rj ≤ c · (1/ǫ)j−1 . Since
It remains to argue that (1/ǫ)
i −2
1/ǫ ≥ 10, the left-hand-side is at most
10c · ǫ
i
i
X
j−1
(1/ǫ)
j=1
i−j
·2
i−1
i
X
X
i−j
(2ǫ)h ≤ 16c · ǫ .
(2ǫ)
= 10c · ǫ
= 10c · ǫ
j=1
h=0
Observe that (as ǫ ≤ 1/10), we have
i
X
j=1
i−j
Rj · 2
i
i
X
X
1 j−1
j−1
i−j
i−1
(1/ǫ)
·2
= c·2
·
≤ c
2ǫ
j=1
j=1
= c · 2i−1
= c·ǫ·
1
2
i−1
X
j=0
1
2ǫ
j
(1/2ǫ)i − 1
(1/2ǫ) − 1
i−1 !
1
= O
.
ǫ
= c · 2i−1
· (1/ǫ)i − 2i−1
1
2 −ǫ
Note also that the condition of the last lemma holds with i = ℓ for every pair u, v ∈ V of vertices. Hence
Corollary 17. For every pair u, v ∈ V ,
dH (u, v) ≤ (1 + 16c · ℓ · ǫ)dG (u, v) + O((1/ǫ)ℓ−1 ) .
Recall that the spanner H contains, whp, |H| = O(n1+1/κ ·log n·(1/ǫ)log(κρ) +n·log n·(1/ǫ)log(κρ)+1/ρ )
ρ
edges, and the expected running time required to construct it is O(|E|
also that ℓ = i
1+1 ≤
· n /ρ). Recall
log κ+1/ρ
log
κ+1/ρ
. The
log(κρ) + 1/ρ + 1. Set now ǫ′ = 16c · ℓ · ǫ. We obtain stretch 1 + ǫ′ , O
ǫ′
condition ǫ < 1/10 translates now to ǫ′ ≤ 1.6c(log(κρ) + 1/ρ). We will replace it by a simpler stronger
condition ǫ ≤ 1.
20
Corollary 18. For any parameters 0 < ǫ ≤ 1, κ ≥ 2, and ρ > 0, and any n-vertex unweighted graph
log κ
·
G = (V, E), our algorithm computes a (1+ǫ, β)-spanner with expected number of edges O log κ+1/ρ
ǫ
n1+1/κ , in expected time O(|E| · nρ /ρ), where
O(log κ + 1/ρ) log κ+1/ρ
β=
.
ǫ
A particularly useful setting of parameters is ρ = 1/ log κ. Then we get a spanner with expected
log κ
2 log κ
1
O logǫ κ
· n1+1/κ edges, in time O(|E| · n log κ · log κ), and β = O logǫ κ
.
We remark that it makes no sense to set ρ < 1/κ, as the resulting parameters will be strictly worse than
when ρ = 1/κ. Also our assumptions that ρ > log log n/(2 log n) and 16c · ℓ/ǫ < nρ /2 are justified, as
otherwise we get β ≥ n, so a trivial spanner will do.
3.2 An Improved Variant of the Algorithm
In this section we show that the leading coefficient O((log κ + 1/ρ)/ǫ)log κ of n1+1/κ in the size of the
spanner can be almost completely eliminated at essentially no price. We also devise here yet sparser constructions of emulators.
For i = 0, 1, . . . , ℓ, denote by Ni = |P̂i | the expected number of clusters which take part in phase i.
′ i
Recall also that the interconnection step of the ith phase contributes Ni · deg i · cǫℓ edges in expectation,
where ℓ is the total number of steps, and c′ is a universal constant. Note that the contribution of the interconnection step dominates the contribution of the superclustering step in the current variant of the algorithm,
and it will still be the case after the modification that we will now introduce. Hence we will now focus on
decreasing the number of edges contributed by the interconnection steps.
We keep the structure of the algorithm intact, and have the values of distance thresholds δi unchanged.
The only change is in the degree sequence deg 0 , deg 1 , . . . of degree parameters used in phases 0, 1, . . .,
respectively. Next, we describe our new setting of these parameters for stage 1 of the algorithm (i.e., phases
i, 1 ≤ i ≤ i0 ). In the case that κ ≥ 16 let a = log log κ, otherwise, when κ < 16, let a = 2. Define
i
i0 = min{⌊log(aκρ)⌋, ⌊κρ⌋}, and for i = 0, 1, . . . , i0 let deg i = n(2 −1)/(aκ)+1/κ . We now have that for
i ≤ i0 + 1,
i−1
Y
2i −1−i
i
1/deg j = n1− aκ − κ ,
Ni = n
j=0
aκρ−1−(i0 +1)
i0 +1
− κ
aκ
and in particular, when i0 = ⌊log(aκρ)⌋ we have Ni0 +1 ≤ n1−
≤ n1−ρ (since a ≥ 2 and
i0 +1
i0 ≥ 1). Whenever i0 = ⌊κρ⌋ we also have Ni0 +1 ≤ n1− κ ≤ n1−ρ . Additionally, we always have
Ni · deg i = n1−
2i −1−i
− κi
aκ
·n
We restrict ourselves to the case that
2i −1
+ κ1
aκ
i
= n1+ aκ −
i−1
κ
.
1
c′ ℓ
(10)
≤ n 2κ /2 ,
ǫ
c0 ·log n
, for a sufficiently small constant c0 . Now the expected number of edges
which holds whenever κ ≤ log(ℓ/ǫ)
inserted at phase i ≤ i0 is at most
!i
′ i
1/(2κ)
i−1
i
1
cℓ
n
≤ n1+ 2κ − κ ·
Ni · deg i ·
= n1+ κ /2i .
(11)
ǫ
2
21
Thus the total expected number of edges inserted in the first stage is O(n1+1/κ ). The second stage proceeds
by setting deg i0 +1 = nρ/2 , and in all subsequent phases i0 + i, with i = 2, 3, . . . , i1 − i0 , we have deg i = nρ
as before. The ”price” for reducing the degree in the first phase of stage two is that the number of phases i1
may increase by an additive 1. It follows that Ni0 +1 · deg i0 +1 ≤ n1−ρ/2 . For i ≥ 2, at phase i0 + i we have
Ni0 +i ≤ n1−3ρ/2−(i−2)ρ . We set i1 = ⌊1/ρ⌋, so that Ni1 +1 ≤ nρ/2 , and whp we have that Ni1 +1 ≤ 2nρ/2 .
We calculate
Ni0 +i · deg i0 +i ≤ n1−ρ/2−(i−2)ρ .
Note that i0 /(2κ) ≤ ρ/2, which holds since i0 ≤ ⌊κρ⌋. Hence the condition (10) implies that
i0
≤ n 2κ ≤ nρ/2 . The total expected number of edges inserted at phase i0 + 1 is at most
(c′ ℓ/ǫ)i0
Ni0 +1 · deg i0 +1 ·
c′ ℓ
ǫ
i0 +1
≤ n1−ρ/2 · nρ/2 ·
c′ ℓ
≤ n1+1/κ .
ǫ
The expected contribution of phase i0 + i for i ≥ 2 is at most
Ni0 +i · deg i0 +i ·
c′ ℓ
ǫ
i0 +i
≤ n1−ρ/2−(i−2)ρ · nρ/2 · ni/(2κ) /2i ≤ n1+1/κ /2i ,
(12)
where the last inequality uses that ρ ≥ 1/κ (which we may assume w.l.o.g). This implies that the expected
number of edges in all these ⌊1/ρ⌋ phases is O(n1+1/κ ).
Ω(log n)
c0 ·log n
≥
The upper bound on κ under which this analysis was carried out is log(ℓ/ǫ)
.9
log(1/ǫ)+log(1/ρ)+log (3) n
We summarize this discussion with the following theorem.
c·log n
log(1/ǫ)+log(1/ρ)+log (3) n
= O( 1ǫ (log κ +
Theorem 3. For any unweighted graph G = (V, E) with n vertices , 0 < ǫ < 1/10, 2 ≤ κ ≤
for a constant c, and 1/κ ≤ ρ < 1/2, our algorithm computes a (1 + ǫ, β)-spanner with β
(3)
1/ρ))log κ+1/ρ+max{1,log κ} and expected number of edges O(n1+1/κ ). The expected running time is
O(|E| · nρ /ρ).
Note that the sparsest this spanner can be is O(n log log n), and at this level of sparsity its β =
O(log log n + 1/ρ)log log n+1/ρ . (To get this bound we set ǫ > 0 to be an arbitrary small constant, and
n
κ = c0 log
.)
log(3) n
This is sparser than the state-of-the-art efficiently-computable
sparsest (1+ ǫ, β)-spanner due to [Pet10],
√
1+ 5
φ
which has O(n(log log n) ) edges, where φ = 2 is the golden ratio. Moreover, this spanner has a
smaller β than the one of [Pet10] in its sparsest level. Denoting the latter as βP et , it holds that βP et ≈
O(log κ)1.44 log κ+1/ρ , i.e., for every setting of the time parameter ρ, the exponent of our β is smaller than
that of βP et .
3.2.1
Sparse Emulator
Finally, we note that if one allows an emulator instead of spanner, then we can decrease the size all the
way to O(n) when κ = log n. To achieve this, we insert single ”virtual” edges instead of every path (of
length (c′ ℓ/ǫ)i ) between every pair of cluster centers that we choose to interconnect on phase i, for every
i. Analogously, in the superclustering step we also form a supercluster around a center rC of a cluster C
by adding virtual edges (rC , rC ′ ) for each cluster C ′ associated with C. The weight of each such edge is
9
We denote log(k) n as the iterated logarithm function, e.g. log(3) n = log log log n.
22
defined by ω(rC , rC ′ ) = dG (rC , rC ′ ). The condition (10) was required to obtain converging sequences at
(11) and (12), but without the (c′ ℓ/ǫ)i terms, the number of edges already forms a converging sequence at
each stage.
Moreover, one can also use for emulators a shorter degree sequence than the one we used for spanners,
and as a result to save the additive term of log(3) κ in the exponent of β. Specifically, one can set deg i =
i
Q
2i
i
1− 2 κ−1
·
n κ /22 −1 , for each i = 0, 1, . . . , i0 = ⌊log(κρ)⌋. As a result we get Ni = n · i−1
j=0 1/deg j = n
i
22 −1−i , and thus the expected number of edges inserted at phase i ≤ i0 is at most
Ni · deg i = n1+1/κ /2i .
As before, when the first stage concludes, we run one phase with deg i0 +1 = nρ/2 , and all subsequent phases
with deg i = nρ . To bound the expected number of edges added at phase i0 + 1 we need to note that
i +1
22 0 ≤ 22κρ ≤ nρ/2 as long as κ ≤ (log n)/4. (The latter can be assumed without affecting any of the
2i0 +1 −1
i +1
parameters by more than a constant factor). It follows that Ni0 +1 · deg i0 +1 = n1− κ · 22 0 −1−(i0 +1) ·
nρ/2 ≤ n1+1/κ . In the remaining phases Ni0 +i ≤ n1+1/κ−(i−1)ρ for i ≥ 2, and the contribution of these
phases is a converging sequence. We conclude the discussion with the following theorem.
Theorem 4. For any unweighted graph G = (V, E) with n vertices, and for any parameters 0 < ǫ ≤
1, 2 ≤ κ ≤ (log n)/4, 1/κ ≤ ρ < 1/2, our algorithm computes a (1 + ǫ, β)-emulator with β =
log κ+1/ρ
and expected number of edges O(n1+1/κ ). The expected running time is O(|E| ·
O log κ+1/ρ
ǫ
nρ /ρ).
log log n+1/ρ
In particular, the algorithm produces a linear-size (1+ǫ, β)-emulator with β = O log logǫn+1/ρ
within this running time.
3.3 Distributed and Streaming Implementations
In this section we provide efficient distributed and streaming algorithms for constructing sparse (1 + ǫ, β)spanners. The distributed algorithm works in the CONGEST model.
To implement phase 0, each vertex selects itself into S0 with probability n−1/κ , i.a.r.. In distributed
model vertices of S0 send messages to their neighbors. Each vertex u that receives at least one message,
picks an origin v ∈ S0 of one of these messages, and joins the cluster centered at v. It also sends negative
acknowledgements to all its other neighbors from S0 . All unclustered vertices z insert all edges incident on
them into the spanner.
It is also straightforward to implement this in O(1) passes in the streaming model.
Each consecutive phase is now also implemented in a straightforward manner, i.e., BFS explorations
to depth δi in the superclustering steps are implemented via broadcasts and convergecasts in the distributed
model, and by δi passes in the streaming model. In the interconnection steps, however, we need to implement
many BFS explorations which may explore the same vertices. However, by Lemma 11 every vertex is
explored on phase i by up to O(degi · log n) explorations
P whp, it follows that in distributed setting this step
requires, whp, O(deg i · log n · δi ) time. Also note that i δi = O(β).
In the streaming model we have two possible tradeoffs. The first uses expected O(n · deg i ) space to
maintain for each vertex v the BFS parents and distance estimates, and requires just δi passes. To see that
such space suffices, recall that the expected number of explorations which visit any vertex v is at most deg i ,
by Lemma 10. Whp, the space is O(n · deg i · log n) = O(n1+ρ · log n).
23
The second option in the streaming algorithm is to divide the interconnection step of phase i to c ·
deg i · log n subphases, for a sufficiently large constant c. On each subphase each exploration source, which
was not sampled on previous subphases, samples itself i.a.r. with probability 1/deg i . Then the sampled
exploration sources conduct BFS explorations to depth δi /2. For every vertex v, the expected number of
explorations that traverse it on each subphase is O(log n). Moreover, by Chernoff’s inequality, whp, no
vertex v is ever traversed by more than O(log n) explorations. (Here we take a union-bound on all vertices,
all phases, and all subphases. The bad events are that some vertex is traversed by more than twice its
expectation explorations on some subphase.) Hence each subphase requires O(δi ) passes, and whp, the
space requirement is O(n log n), plus the size of the spanner. After c · deg i · log n subphases, whp, each
exploration source is sampled on at least one of the subphases, and so the algorithm performs all the required
explorations.
Finally, the stretch analysis of distributed and streaming variants of our algorithm remains the same as
in the centralized case.
Hence we obtain the following distributed and streaming analogues of Theorem 3.
Theorem 5. For any unweighted graph G = (V, E) with n vertices , 0 < ǫ < 1/10, 2 ≤ κ ≤
c·log n
log(1/ǫ)+log(1/ρ)+log (3) n
for a constant c, and 1/κ ≤ ρ < 1/2, our distributed algorithm (CONGEST model) computes a (1 + ǫ, β)(3)
spanner with β = O( 1ǫ (log κ + 1/ρ))log κ+1/ρ+max{1,log κ} and expected number of edges O(n1+1/κ ).
The required number of rounds is whp O(nρ /ρ · β · log n).
Our streaming algorithm computes a spanner with the above properties, in either: O(n log n + n1+1/κ )
expected space and O(nρ /ρ · log n · β) passes, or using O(n1+ρ · log n) space, whp, and O(β) passes.
The streaming algorithm described above can also be modified to provide a (1 + ǫ, β)-emulator as in
Theorem 4, within the same pass and space complexities.
4 Applications
In this section we describe applications of our improved constructions of spanners and emulators to computing approximate shortest paths for a set S × V of vertex pairs, for a subset S ⊆ V of designated sources.
4.1 Centralized Setting
We start with the centralized setting. Here our input graph G = (V, E) is unweighted, and we construct a
(1 + ǫ, β)-emulator H of G with O(n1+1/κ ) edges, in expected time O(|E| · nρ /ρ), where
β=O
log κ + 1/ρ
ǫ
log κ+1/ρ
.
(13)
Observe that all edge weights in H are integers in the range [1, β]. We round all edge weights up to the
closest power of 1 + ǫ. Let H ′ be the resulting emulator. Note that for any pair u, v of vertices, we have
dG (u, v) ≤ dH (u, v) ≤ dH ′ (u, v) ≤ (1 + ǫ)dH (u, v)
≤ (1 + ǫ)2 dG (u, v) + (1 + ǫ)β .
For a sufficiently small ǫ, (1 + ǫ)2 ≤ 3ǫ, and we rescale ǫ′ = 3ǫ. As a result the constant factor hidden by the
O-notation in the basis of β’s exponent grows, but other than that H ′ has all the properties of the emulator
24
H. Also, it employs only
log β
(log 1/ǫ + log(log κ + 1/ρ)) · (log κ + 1/ρ)
t=O
=O
ǫ
ǫ
different edge weights. Hence a single-source shortest path computation in H can be performed in O(|H| +
n log t) = O(n1+1/κ + n(log(1/ǫ) + log(log κ + 1/ρ))) time [OMSW10]. (See also [KMP11], Section 5.)
Hence computing S × V (1 + ǫ, β)-approximate shortest distances requires O(|E| · nρ /ρ + |S|(n1+1/κ +
n(log(1/ǫ) + log(log κ + 1/ρ)))) time.
Theorem 6. For any n, and for any parameters 0 < ǫ ≤ 1, 2 ≤ κ ≤ (log n)/4, 1/κ ≤ ρ ≤ 1/2, and any
n-vertex unweighted graph G = (V, E) with a set S ⊆ V , our algorithm computes (1 + ǫ, β)-approximate
S × V shortest distances in the centralized model in expected O(|E| · nρ /ρ + |S|(n1+1/κ + n(log(1/ǫ) +
log(log κ + 1/ρ)))) time, where β is given by (13).
If one is interested in actual paths rather than just in distances, then one can use our (1 + ǫ, β)-spanner
with
(3)
log κ + 1/ρ log κ+1/ρ+max{1,log κ}
β=O
,
(14)
ǫ
O(log n)
and O(n1+1/κ ) edges, but restricting κ ≤ log(1/ǫ)+log(1/ρ)+log
(3) . After computing the spanner H with
n
these properties, we conduct BFS explorations on H originated at each vertex of S. The overall running
time becomes O(|E| · nρ /ρ + |S| · n1+1/κ ).
Corollary 19. For any n, and for any parameters 0 < ǫ ≤ 1, κ ≤
O(log n)
,
log(1/ǫ)+log(1/ρ)+log (3) n
1/κ ≤ ρ ≤ 1/2,
and any n-vertex unweighted graph G = (V, E), our algorithm computes (1 + ǫ, β)-approximate S × V
shortest paths in the centralized model in expected O(|E| · nρ /ρ + |S| · n1+1/κ ) time, with β given by (14).
A useful setting of parameters is ρ = log1 κ . Then the running time of our algorithms from Theorem 6
and Corollary 19 become respectively O(|E| · n1/ log κ · log κ + |S|(n1+1/κ + n(log 1/ǫ + log log κ))) and
O(|E| · n1/ log κ · log κ + |S| · n1+1/κ ) (we note that the former has smaller β given by (13), while the latter
has slightly larger β given by (14)).
The algorithm of Corollary 19 always outperforms the algorithm which can be derived by using the
spanner of [Pet10] within the same scheme. Specifically, the running time of that algorithm is at least
Õ(|E|nρ ) + O(|S| · (n1+1/κ + n( logǫ κ )φ )), and the additive error βP et there is given by
βP et = O
log κ + 1/ρ
ǫ
√
logφ κ+1/ρ
,
where φ = 1+2 5 is the golden ratio. So βP et is typically polynomially larger than the additive error β in
our algorithm, e.g., for ρ = 1/ log κ we have βP et ≈ β 1.22 . (Setting ρ to be smaller than 1/ log κ makes less
sense, because then the additive errors β and βP et deteriorate. At any rate, as ρ tends to 0, the two estimates
approach each other.) Also, in the bound of [Pet10] there is a term of |S| · n · ( logǫ κ )φ )), which does not
occur in our construction.
25
4.2 Streaming Setting
In this section we show how efficient constructions of spanners and emulators for an unweighted graph G
in the streaming setting can be used for efficient computation of approximate shortest paths.
First, one can use O(nρ /ρ · log n · β) passes and expected space O(n1+1/κ + n · log n) to construct an
(1 + ǫ, β)-emulator H with β = (O(log κ + 1/ρ)/ǫ)log κ+1/ρ . One can now compute V × V (1 + ǫ, β)approximate shortest distances in G by computing exact V ×V shortest distances in H, using the same space
and without additional passes. (Observe that we do not store the output, as its size is larger than the size of
H.) In particular, one can use here space of O(n · log n), and have β = (O(log log n + 1/ρ)/ǫ)log log n+1/ρ .
O(
log n
)
1
log log n passes, β = O( log log n )2 log log n .
It is also possible to set here ρ = log log
n , and obtain 2
ǫ
Another option is to use space O(n1+ρ ·log n), whp, and O(β) passes for constructing the same emulator
H. Again given the emulator we can compute V × V approximate shortest distances in G by computing
shortest distances in H offline.
Corollary 20. For any n and any parameters 0 < ǫ ≤ 1, 2 ≤ κ ≤ (log n)/4, 1/κ ≤ ρ ≤ 1/2, and any
n-vertex unweighted graph G, our streaming algorithm computes (1 + ǫ, β)-approximate shortest distances
for V × V with β given by (13). It uses in expectation either O(nρ /ρ · log n · β) passes and expected space
O(n1+1/κ + n · log n) or O(β) passes and space O(n1+ρ · log n), whp.
If the actual paths rather than just distances are needed, then we compute a (1 + ǫ, β)-spanner H with
β given by (14) and with expected O(n1+1/κ ) edges (with the restriction on κ as above). Then we compute
V × V (1 + ǫ, β)-approximate shortest paths in H offline, using space O(H|).
Corollary 21. For any n, κ, ǫ, ρ and G as in Corollary 19, a variant of our streaming algorithm computes
(1 + ǫ, β)-approximate shortest paths for V × V with β given by (14). It uses either O(nρ /ρ · log n · β)
passes and expected space O(n1+1/κ + n · log n) or O(β) passes and space O(n1+ρ · log n), whp.
If one is interested only in S × V paths or distances, then it is possible to eliminate the additive term of
β by using O(|S| · β/ǫ) additional passes. These passes are used to compute exactly distances between pairs
(s, v) ∈ S × V , with dG (s, v) ≤ β/ǫ. The overall number of passes becomes O(|S| · β/ǫ + nρ /ρ · log n · β),
|S|
log log n
and space O(n1+1/κ + n · log n). Whenever |S| ≥ n1/κ log n, we can set ρ = log
log n − log n , and obtain
the following corollary.
Corollary 22. For any n, ǫ, ρ, κ and G as in Corollary 20, and any set S ⊆ V of size at least |S| ≥
n1/κ log n, a variant of our streaming algorithm computes (1 + ǫ)-approximate shortest distances for S × V
in expected
log n
log κ+
log |S|−log log n
1
|S|
log n
(15)
·O
log κ +
ǫ
ǫ
log |S|−log log n
passes, and space O(n1+1/κ + n · log n). To compute actual paths we have similar complexities10 , but one
needs to restrict κ as in Corollary 19.
Observe that for a constant ǫ > 0 and |S| = nΩ(1) , we can take a constant κ, so the number of passes
is O(|S|). One can also get for |S| = 2Ω(log n/ log log n) , a streaming algorithm for computing (1 + ǫ)approximate shortest paths for S × V by setting κ = c log n/ log log log n, and obtaining O(|S|/ǫ) ·
n 2 log log n
O( log log
)
passes and space O(n log n).
ǫ
10
Though there is an additional additive term of log(3) κ in the exponent in (15).
26
References
[AB16]
Amir Abboud and Greg Bodwin. The 4/3 additive spanner exponent is tight. In Proceedings of
the 48th Annual ACM SIGACT Symposium on Theory of Computing, STOC 2016, Cambridge,
MA, USA, June 18-21, 2016, pages 351–361, 2016.
[ABCP93] Baruch Awerbuch, Bonnie Berger, Lenore Cowen, and David Peleg. Near-linear cost sequential
and distribured constructions of sparse neighborhood covers. In 34th Annual Symposium on
Foundations of Computer Science, Palo Alto, California, USA, 3-5 November 1993, pages
638–647, 1993.
[ABN11]
Ittai Abraham, Yair Bartal, and Ofer Neiman. Advances in metric embedding theory. Advances
in Mathematics, 228(6):3026 – 3126, 2011.
[ABP17]
Amir Abboud, Greg Bodwin, and Seth Pettie. A hierarchy of lower bounds for sublinear
additive spanners. In Proceedings of the Twenty-Eighth Annual ACM-SIAM Symposium on
Discrete Algorithms, pages 568–576, 2017.
[ACIM99]
Donald Aingworth, Chandra Chekuri, Piotr Indyk, and Rajeev Motwani. Fast estimation of
diameter and shortest paths (without matrix multiplication). SIAM J. Comput., 28(4):1167–
1181, 1999.
[ADD+ 93] I. Althöfer, G. Das, D. Dobkin, D. Joseph, and J. Soares. On sparse spanners of weighted
graphs. Discrete Comput. Geom., 9:81–100, 1993.
[ADF+ 17] Stephen Alstrup, Soren Dahlgaard, Arnold Filtser, Morten Stockel, and Christian Wulff-Nilsen.
Personal communication, 2017.
[AHL02]
Noga Alon, Shlomo Hoory, and Nathan Linial. The moore bound for irregular graphs. Graphs
and Combinatorics, 18(1):53–57, 2002.
[AN12]
Ittai Abraham and Ofer Neiman. Using petal-decompositions to build a low stretch spanning
tree. In STOC, pages 395–406, 2012.
[AP92]
B. Awerbuch and D. Peleg. Routing with polynomial communication-space tradeoff. SIAM J.
Discrete Mathematics, 5:151–162, 1992.
[Awe85]
B. Awerbuch. Complexity of network synchronization. J. ACM, 4:804–823, 1985.
[Bar96]
Yair Bartal. Probabilistic approximations of metric spaces and its algorithmic applications. In
FOCS, pages 184–193, 1996.
[Bar98]
Yair Bartal. On approximating arbitrary metrices by tree metrics. In Proceedings of the Thirtieth Annual ACM Symposium on Theory of Computing, STOC ’98, pages 161–168, New York,
NY, USA, 1998. ACM.
[Bar04]
Yair Bartal. Graph decomposition lemmas and their role in metric embedding methods. In
Algorithms - ESA 2004, 12th Annual European Symposium, Bergen, Norway, September 1417, 2004, Proceedings, pages 89–97, 2004.
27
[Bas08]
S. Baswana. Streaming algorithm for graph spanners - single pass and constant processing
time per edge. Inf. Process. Lett., 106(3):110–114, 2008.
[BCE05]
Béla Bollobás, Don Coppersmith, and Michael Elkin. Sparse distance preservers and additive
spanners. SIAM J. Discrete Math., 19(4):1029–1055, 2005.
[BGK+ 14] Guy E. Blelloch, Anupam Gupta, Ioannis Koutis, Gary L. Miller, Richard Peng, and Kanat
Tangwongsan. Nearly-linear work parallel SDD solvers, low-diameter decomposition, and
low-stretch subgraphs. Theor. Comp. Sys., 55(3):521–554, October 2014.
[BKMP10] Surender Baswana, Telikepalli Kavitha, Kurt Mehlhorn, and Seth Pettie. Additive spanners
and (alpha, beta)-spanners. ACM Transactions on Algorithms, 7(1):5, 2010.
[BR10]
Ajesh Babu and Jaikumar Radhakrishnan. An entropy based proof of the moore bound for
irregular graphs. CoRR, abs/1011.1058, 2010.
[BS03]
S. Baswana and S. Sen. A simple linear time algorithm for computing a (2k − 1)-spanner
of O(n1+1/k ) size in weighted graphs. In Proceedings of the 30th International Colloquium
on Automata, Languages and Programming, volume 2719 of LNCS, pages 384–396. Springer,
2003.
[BS07]
Surender Baswana and Sandeep Sen. A simple and linear time randomized algorithm for
computing sparse spanners in weighted graphs. Random Struct. Algorithms, 30(4):532–563,
2007.
[BW15]
Gregory Bodwin and Virginia Vassilevska Williams. Very sparse additive spanners and emulators. In Proceedings of the 2015 Conference on Innovations in Theoretical Computer Science,
ITCS 2015, Rehovot, Israel, January 11-13, 2015, pages 377–382, 2015.
[Che13]
Shiri Chechik. New additive spanners. In Proceedings of the Twenty-Fourth Annual ACMSIAM Symposium on Discrete Algorithms, SODA ’13, pages 498–512, Philadelphia, PA, USA,
2013. Society for Industrial and Applied Mathematics.
[Coh99]
E. Cohen. Fast algorithms for t-spanners and stretch-t paths. SIAM J. Comput., 28:210–236,
1999.
[Coh00]
Edith Cohen. Polylog-time and near-linear work approximation scheme for undirected shortest
paths. J. ACM, 47(1):132–166, 2000.
[DGPV08] Bilel Derbel, Cyril Gavoille, David Peleg, and Laurent Viennot. On the locality of distributed
sparse spanner construction. In Proceedings of the Twenty-Seventh Annual ACM Symposium
on Principles of Distributed Computing, PODC 2008, Toronto, Canada, August 18-21, 2008,
pages 273–282, 2008.
[DHZ00]
D. Dor, S. Halperin, and U. Zwick. All-pairs almost shortest paths. SIAM J. Comput., 29:1740–
1759, 2000.
[DMP+ 03] D. Dubhashi, A. Mei, A. Panconesi, J. Radhakrishnan, and A. Srinivisan. Fast distributed
algorithm for (weakly) connected dominating sets and linear-size skeletons, 2003.
28
[DMZ06]
Bilel Derbel, Mohamed Mosbah, and Akka Zemmari. Fast distributed graph partition and
application. In 20th International Parallel and Distributed Processing Symposium (IPDPS
2006), Proceedings, 25-29 April 2006, Rhodes Island, Greece, 2006.
[EEST05]
Michael Elkin, Yuval Emek, Daniel A. Spielman, and Shang-Hua Teng. Lower-stretch spanning trees. In STOC, pages 494–503, 2005.
[Elk04]
M. Elkin. An unconditional lower bound on the time-approximation tradeoff of the minimum
spanning tree problem. In Proc. of the 36th ACM Symp. on Theory of Comput. (STOC 2004),
pages 331–340, 2004.
[Elk05]
Michael Elkin. Computing almost shortest paths. ACM Trans. Algorithms, 1(2):283–323,
2005.
[Elk07a]
Michael Elkin. A near-optimal distributed fully dynamic algorithm for maintaining sparse
spanners. In Proceedings of the Twenty-Sixth Annual ACM Symposium on Principles of Distributed Computing, PODC 2007, Portland, Oregon, USA, August 12-15, 2007, pages 185–194,
2007.
[Elk07b]
Michael Elkin. Streaming and fully dynamic centralized algorithms for constructing and maintaining sparse spanners. In Automata, Languages and Programming, 34th International Colloquium, ICALP 2007, Wroclaw, Poland, July 9-13, 2007, Proceedings, pages 716–727, 2007.
[EN16a]
Michael Elkin and Ofer Neiman. Distributed strong diameter network decomposition. In
Proceedings of the 2016 ACM Symposium on Principles of Distributed Computing, PODC
2016, Chicago, IL, USA, July 25-28, 2016, pages 211–216, 2016.
[EN16b]
Michael Elkin and Ofer Neiman. Hopsets with constant hopbound, and applications to approximate shortest paths. In IEEE 57th Annual Symposium on Foundations of Computer Science,
FOCS 2016, 9-11 October 2016, Hyatt Regency, New Brunswick, New Jersey, USA, pages
128–137, 2016.
[EN17]
Michael Elkin and Ofer Neiman. Efficient algorithms for constructing very sparse spanners and
emulators. In Proceedings of the Twenty-Eighth Annual ACM-SIAM Symposium on Discrete
Algorithms, pages 652–669, 2017.
[EP04]
Michael Elkin and David Peleg. (1+epsilon, beta)-spanner constructions for general graphs.
SIAM J. Comput., 33(3):608–631, 2004.
[EP15]
Michael Elkin and Seth Pettie. A linear-size logarithmic stretch path-reporting distance oracle
for general graphs. In Proceedings of the Twenty-Sixth Annual ACM-SIAM Symposium on
Discrete Algorithms, SODA 2015, San Diego, CA, USA, January 4-6, 2015, pages 805–821,
2015.
[ES16]
Michael Elkin and Shay Solomon. Fast constructions of lightweight spanners for general
graphs. ACM Trans. Algorithms, 12(3):29:1–29:21, 2016.
[EZ06]
Michael Elkin and Jian Zhang. Efficient algorithms for constructing (1+epsilon, beta)-spanners
in the distributed and streaming models. Distributed Computing, 18(5):375–385, 2006.
29
[FKM+ 05] J. Feigenbaum, S. Kannan, A. McGregor, S. Suri, and J. Zhang. Graph distances in the streaming model: The value of space. In Proc. of the ACM-SIAM Symp. on Discrete Algorithms,
pages 745–754, 2005.
[FS16]
Arnold Filtser and Shay Solomon. The greedy spanner is existentially optimal. In Proceedings
of the 2016 ACM Symposium on Principles of Distributed Computing, PODC 2016, Chicago,
IL, USA, July 25-28, 2016, pages 9–17, 2016.
[HZ96]
S. Halperin and U. Zwick. Linear time deterministic algorithm for computing spanners for
unweighted graphs, 1996. manuscript.
[KMP11]
Ioannis Koutis, Gary L. Miller, and Richard Peng. A nearly-m log n time solver for sdd
linear systems. In Proceedings of the 2011 IEEE 52Nd Annual Symposium on Foundations of
Computer Science, FOCS ’11, pages 590–598, Washington, DC, USA, 2011. IEEE Computer
Society.
[LS93]
N. Linial and M. Saks. Decomposing graphs into regions of small diameter. Combinatorica,
13:441–454, 1993.
[MPVX15] Gary L. Miller, Richard Peng, Adrian Vladu, and Shen Chen Xu. Improved parallel algorithms for spanners and hopsets. In Proceedings of the 27th ACM Symposium on Parallelism in
Algorithms and Architectures, SPAA ’15, pages 192–201, New York, NY, USA, 2015. ACM.
[MPX13]
Gary L. Miller, Richard Peng, and Shen Chen Xu. Parallel graph decompositions using random
shifts. In 25th ACM Symposium on Parallelism in Algorithms and Architectures, SPAA ’13,
Montreal, QC, Canada - July 23 - 25, 2013, pages 196–203, 2013.
[OMSW10] James B. Orlin, Kamesh Madduri, K. Subramani, and M. Williamson. A faster algorithm
for the single source shortest path problem with few distinct positive lengths. J. of Discrete
Algorithms, 8:189–198, June 2010.
[Pel99]
David Peleg. Proximity-preserving labeling schemes and their applications. In GraphTheoretic Concepts in Computer Science, 25th International Workshop, WG ’99, Ascona,
Switzerland, June 17-19, 1999, Proceedings, pages 30–41, 1999.
[Pel00]
David Peleg. Distributed Computing: A Locality-sensitive Approach. Society for Industrial
and Applied Mathematics, Philadelphia, PA, USA, 2000.
[Pet09]
Seth Pettie. Low distortion spanners. ACM Transactions on Algorithms, 6(1), 2009.
[Pet10]
Seth Pettie. Distributed algorithms for ultrasparse spanners and linear size skeletons. Distributed Computing, 22(3):147–166, 2010.
[Pet16]
Seth Pettie. Personal communication, 2016.
[PS89]
D. Peleg and A. Schäffer. Graph spanners. J. Graph Theory, 13:99–116, 1989.
[PU89a]
D. Peleg and J. D. Ullman. An optimal synchronizer for the hypercube. SIAM J. on Comput.,
18:740–747, 1989.
30
[PU89b]
D. Peleg and E. Upfal. A tradeoff between size and efficiency for routing tables. J. of the ACM,
36:510–530, 1989.
[Rei93]
John H. Reif. Synthesis of Parallel Algorithms. Morgan Kaufmann Publishers Inc., San Francisco, CA, USA, 1st edition, 1993.
[RZ04]
Liam Roditty and Uri Zwick. On dynamic shortest paths problems. In Algorithms - ESA 2004,
12th Annual European Symposium, Bergen, Norway, September 14-17, 2004, Proceedings,
pages 580–591, 2004.
[TZ05]
Mikkel Thorup and Uri Zwick. Approximate distance oracles. J. ACM, 52(1):1–24, 2005.
[TZ06]
M. Thorup and U. Zwick. Spanners and emulators with sublinear distance errors. In Proc. of
Symp. on Discr. Algorithms, pages 802–809, 2006.
[Woo06]
David P. Woodruff. Lower bounds for additive spanners, emulators, and more. In Proceedings
of the 47th Annual IEEE Symposium on Foundations of Computer Science, FOCS ’06, pages
389–398, Washington, DC, USA, 2006. IEEE Computer Society.
31
| 8cs.DS
|
Draft of 2016-09-30
Type checking through unification
Francesco Mazzoli1 and Andreas Abel2
1
FP Complete∗
<[email protected]>
Gothenburg University
<[email protected]>
arXiv:1609.09709v1 [cs.PL] 30 Sep 2016
2
Abstract
In this paper we describe how to leverage higher-order unification to type check a dependently
typed language with meta-variables. The literature usually presents the unification algorithm
as a standalone component, however the need to check definitional equality of terms while type
checking gives rise to a tight interplay between type checking and unification. This interplay
is a major source of complexity in the type-checking algorithm for existing dependently typed
programming languages. We propose an algorithm that encodes a type-checking problem entirely
in the form of unification constraints, reducing the complexity of the type-checking code by
taking advantage of higher order unification, which is already part of the implementation of
many dependently typed languages.
Keywords and phrases Dependent types, type checking, higher order unification, type reconstruction
1
Introduction
Theories with dependent types have been successfully exploited to design programming
languages and theorem provers, such as Agda [9], Idris [3], or Coq [2]. To make these
systems practical, the user is presented with a language much richer than the underlying
type theory, which will hopefully be small enough to gain confidence in the correctness of
the code that type checks it.
One common way to make a type theory palatable is extending it with meta-variables,
standing for yet to be determined terms, and solved by unification. Their usage in traditional
programming languages is confined to type inference, and thus traditionally they can stand
for types only. In dependently typed languages types can contain terms, and thus metavariables are usually extended to stand for any term in our language. A typical use case
for meta-variables is implicit arguments as introduced by Pollack [11], relieving the user of
having to write easily inferrable arguments to functions. For example, in Agda we can write
a safe head function which extracts the first element of a list, inferring both the type of the
elements and the length of the list:
head : {A : Set} → {n : Nat} → Vec A (1 + n) → A
head (x :: xs) = x
∗
The work presented in this paper was performed at the Chalmers University of Technology.
2
Type checking through unification
Here, Vec A n denotes a list of length n with elements of type A, and Set is the type of types.
The expression {A : Set} → {n : Nat} → ... binds two implicit arguments. When invoking
head, the type checker will insert two meta-variables standing for A and n and attempt to
solve them by inspecting the Vec argument that follows. Note that n is a value, while in
languages such ML and Haskell only types can be implicit.
The task of integrating meta-variables in a type-checking algorithm for dependent types
gives rise to complications. For example, consider the task of type checking
true : if α 6 2 then Bool else Nat,
where α is a yet to be determined (uninstantiated) meta-variable of type Nat. We want the
type of true to be Bool, but reduction is impeded by α. Thus, we cannot complete type
checking until α is instantiated.1 The problem lies in the fact that type checking dependent
types involves reducing terms to their normal forms, something that can be affected by
meta-variables, like in this case.
To solve issues like the one above, the only viable option—apart from refusing to solve
them—is to wait for the meta-variables that are affecting type checking to be instantiated,
and then resume. This gives rise to a sort of concurrency that makes reasoning about the
type checking algorithm arduous. In this paper, expanding on ideas developed in Agda [9]
and Epigram [7], we propose an algorithm that encodes a type-checking problem in a set
of unification constraints with a single traversal of the term to be checked. The generated
constraints can be solved effectively by the unification procedure already employed by Agda,
but our elaboration procedure is considerably simpler and shorter than Agda’s type-checking
code. This highlights an overlap in functionality between the type checker, which needs to
check that types and terms are of a certain shape; and the unifier, which checks the equality
of terms. Moreover, our algorithm lets us clearly separate concerns between type checking
and unification, making it easier to gain confidence on the elaboration procedure and then
experiment with various unification “backends”.
In the rest of the paper, we will explain the problem more clearly (Section 2). Then we
will introduce a simple type theory (Section 3) that will serve as a vector to explain our
algorithm in detail. In Section 4 we will give a specification to the unification procedure.
The algorithm itself is presented in Section 5, along with some of its properties. We will then
briefly discuss the performance and how the algorithm can be extended to support certain
popular language features (Section 6).
We have implemented the presented algorithm in a prototype, tog, which covers a subset
of Agda—every tog program is also a valid Agda program.2
2
The problem
In this section we will explain the challenges faced when type checking dependent types with
meta-variables. An Agda-like syntax will be used throughout the examples, please refer to
Appendix A for clarifications.
Coming back to the problem of type checking
true : BoolOrNat α,
given unistantiated meta-variable α and definition
1
2
Note that we cannot instantiate α without loss of generality, since both 0 and 1 are acceptable solutions.
The source code for tog is available at https://github.com/bitonic/tog.
F. Mazzoli and A. Abel
BoolOrNat : Nat → Set
BoolOrNat = λx → if x 6 2 then Bool else Nat
there are various tempting ways to approach the problem. The most conservative approach
is to stop type checking when faced with blocked terms (terms whose normalization is impeded by some meta-variables). However, this approach is unsatisfactory in many instances.
Consider
(true, refl) : BoolOrNat α × (α ≡ 0)
Where x ≡ y is the type inhabited by proofs that x is equal to y (propositional equality), and
refl is of type t ≡ t for any t (reflexivity). Type checking this pair will involve type checking
true : BoolOrNat α and then refl : α ≡ 0. If we give up on the first type-checking problem, we
will not examine the second, which will give us a solution for α (α := 0). After instantiating
α we can easily go back and successfully type check the first part. In general, we want to
attempt to type check as much as possible, and to instantiate as many meta-variables as
possible—as long as we do so without loss of generality, like in this case.
Another approach is to assume that blocked type-checking problems will eventually be
solved, and continue type checking. However, this road is dangerous since we need to be
careful not to generate ill-typed terms or invalid type-checking contexts, as noted by Norell
and Coquand [10]. Consider
test : (α ≡ 0) × (((x : BoolOrNat α) → BoolOrNat (1 + x)) → Nat)
test = (refl, λg → g true)
Type checking the definition test will involve checking that its type is a valid type, and that
its body is well typed. Checking the former will involve making sure that
BoolOrNat α = Nat
since we know that the type of x must be Nat, given that x is used as an argument of
(1+) : Nat → Nat.3
If we assume that the type is valid, we will proceed and type check the body pairwise.
Type checking the first element—a proof by reflexivity that α is equal to 0—will instantiate
α to 0, and then we will be faced with
(λg → g true) : ((x : Bool) → BoolOrNat (1 + x)) → Nat
Note that the type is ill-typed,4 violating the usual invariants present when type checking—
namely the fact that when we make progress we always generate well-typed terms. Worse,
to type check we will instantiate x with 0, ending up with BoolOrNat (1 + true). With some
effort we can exploit this problem to make the type checker loop, and thus type checking
will be undecidable.
As mentioned in the introduction, at the heart of the problem lies the fact that to type
check we need to reduce terms to their weak head normal form. If reduction is impeded
3
4
Note that checking that an equality type is a well-formed type does not involved checking that the
equated things are equal—4 ≡ 5 is a valid type. In this instance while α ≡ 0 appears in the type for
test, this does not mean that α will be unified with 0 when type checking the type. However, type
checking its proof refl : α ≡ 0 will.
x, of type Bool, appears as an argument to the function (1+).
3
4
Type checking through unification
by meta-variables, we cannot proceed. To overcome this problem, Norell proposed to define
type checking as an elaboration procedure:5 given the problem of type checking t against A
in context Γ, type checking will produce a term u that approximates t:
JΓ ⊢ t : AK
u
u is an approximation of t in the sense that it it can be turned into t by instantiating certain
meta-variables—if a subterm of t cannot be type checked a placeholder meta-variable will be
put in its place, an type checking that subterm will be postponed. Type checking will also
consist in making sure that, once the postponed type-checking problems can be solved, the
placeholder meta-variables will be instantiated accordingly with the corresponding omitted
subterm of t (possibly instantiated further).
For instance, when type checking the type of test, we’ll have
J· ⊢ ((x : BoolOrNat α) → BoolOrNat (1 + x)) → Nat : SetK
((x : BoolOrNat α) → BoolOrNat β) → Nat
Since we cannot type check
x : BoolOrNat α ⊢ 1 + x : Nat
a fresh meta-variable β of type Nat in context x : BoolOrNat α replaces 1 + x. Then, when
checking the body of test, we will check it against the approximated type generated above.
When α is instantiated, we can resume checking that BoolOrNat α = Nat, and if we are
successful, instantiate β := 1 + x. This will prevent us from running into problems when type
checking the body, since when we do instantiate α to 0, we do not have 1 + x later: instead,
β is in its place, preserving the well-typedness of the type.
The Agda system, as described in Norell’s thesis, currently implements this elaboration
interleaving type checking and unification, using some fairly delicate machinery. Our contribution is to describe a type-checking problem entirely in terms of unification constraints,
thus simplifying the algorithm. This highlights an overlap in functionality between the type
checker, which needs to check that types and terms are of a certain shape, and the unifier,
which checks the equality of terms: we are using the unifier as an engine to pattern match
on types, with taking meta-variables into account. Moreover, separating the unifier from the
type checker makes it easy easy to experiment with different unification “backends” used by
the same type checking “frontend”.
3
The type theory
To illustrate the type-checking algorithm we will make use of a dependent type theory with
booleans and one universe. Its syntax is shown in Figure 1.
3.1
Terms and types
Terms and types inhabit the same syntactic class. We usually denote terms with t, u, and
v; and types with A, B, and C . The theory is designed to be the simplest fragment that
presents the problems described in Section 2. For this reason we include a universe Set
5
Norell was following a long tradition of elaborating user syntax when working with type theories, see
Section 7.1 for more details.
F. Mazzoli and A. Abel
5
x, y, z
α, β, γ
-- Variables
-- Meta-variables
-- Types/terms
A, B, C , t, u, v
::= Set
| Bool | true | false
| (x : A) → B | λx → t
| n
-----
n
-- Neutral terms
::= h
| nt
| if n /x.A then t else u
::= x | α
h
Type of types
Booleans
Dependent functions
Neutral term
-- Head
-- Function application
-- Bool elimination
-- Neutral term heads
Γ, ∆ ::= · | Γ, x : A
-- Contexts
Σ, Ξ ::= · | Σ, α : A
-- Signatures
θ, η ::= · | θ, α := t
-- Meta-variable substitutions
Figure 1 Syntax
and means of computing with booleans, so that we can write functions from booleans to
types—otherwise meta-variables can never prevent us from knowing how a type looks like.
The typing rules and algorithms presented in this paper can be extended to a richer theory,
as we have done for our implementation, which includes implicit arguments, user defined
inductive data types and records, and propositional equality.
3.2
Neutral terms, substitutions, and term application
Terms are always kept in β-normal form. Terms headed by a variable or meta-variable are
called neutral, the others canonical. Variable and meta-variable substitution immediately
restore the β-normal form as soon as the substitution is performed, a technique known as
hereditary substitution [13]. Substituting a term u for a head h, i.e., a variable x or metavariable α, is written t[h := u ], reading “substitute u for h in t”. The rules for substitution
are not relevant to the paper and are shown in Appendix B. The appendix also defines rules
to eliminate redexes that substitution might generate, to restore the β-normal form.
3.3
Contexts and signatures
Most operations are done under a context (denoted by Γ or ∆), that stores the types of free
variables; and a signature (denoted by Σ or Ξ), that stores the type of meta-variables. We
tacitly assume that no duplicate names are present in contexts and signatures. We often
make use of a global signature Σ throghout the rules, if there is no need for the rules to carry
it explicitely since it is never changed. Note that a signature contains only closed types for
the meta-variables—we do not make use of an explicit representation of meta-variables in
context. This is for the sake of simplicity, since we do not present our unification algorithm
in detail, where the contextual representation would be most convenient. Throughout the
paper, we will use Γ → A to indicate the function type formed by all the types in Γ as the
6
Type checking through unification
Γ ⊢ Set : Set
Γ ⊢ Bool : Set
Γ ⊢ true : Bool
Γ ⊢ false : Bool
Γ ⊢ A : Set Γ, x : A ⊢ B : Set
Γ, x : A ⊢ t : B
Γ ⊢ n ⇒ A Γ ⊢ A ≡ B : Set
Γ⊢n:B
Γ ⊢ (x : A) → B : Set
Γ ⊢ λx → t : (x : A) → B
Figure 2 Σ; Γ ⊢ t : A Type checking canonical terms
x :A∈Γ
Γ⊢x⇒A
Γ ⊢ n ⇒ Bool
α:A ∈ Σ
Γ⊢α⇒A
Γ ⊢ n ⇒ (x : A) → B
Γ⊢t :A
Γ ⊢ n t ⇒ B[x := t]
Γ, x : Bool ⊢ A : Set
Γ ⊢ t : A[x := true]
Γ ⊢ u : A[x := false]
Γ ⊢ if n /x.A then t else u ⇒ A[x := n]
Figure 3 Σ; Γ ⊢ n ⇒ A Type inference for neutral terms
domains and terminating with A, and t Γ to indicate the term formed by t applied to all
the variables in Γ. Moreover, every mention of a context and a signature is assumed to be
valid according to the rules in Figure 5 and 4.
Throughout the paper, we will also concatenate whole contexts and signatures, e.g. Σ, Ξ.
3.4
Well-typed terms
The bidirectional typing checking rules are shown in figures 2 and 3. The type of neutral
terms can be inferred, while canonical terms are checked. Our type theory includes a universe
Set equipped with an inconsistent typing rule Set : Set for the sake of simplicity, but our
presentation can be extended with stratified universes.
Finally, definitional equality of terms (needed to define the typing rules) is specified in
figures 7 and 8. The conversion rules are performed in a type-directed way, so that it can
respect the η-laws of functions.
3.5
Meta-variable substitutions
We specify typed meta-variable substitutions, a construct that will be useful to give a specification to our unification algorithm. A meta-variable substitution θ from Σ to Ξ gives
an instantiation to each meta-variable in Σ. The meta-variables in the instantiations are
scoped over a new signature Ξ. The validity rule shown in figure 6 makes sure that the
meta-variables instantiations are well-typed with respect to their type.
Applying a substitution θ to a term t amounts to substitute each meta-variable for its
instantiation in θ, as specified in appendix B. Moreover, if the substitution is valid, if we
have Σ; Γ ⊢ t : A and Ξ ⊢ θ : Σ, we will have that
Ξ; θΓ ⊢ θt : θA,
where applying a substitution to a context amounts to applying it to all the types it contains.
Like with contexts and signatures, we will use , to also concatenate meta-variable substitutions. So for example if we have Ξ ⊢ θ : Σ and Ξ ⊢ η : Σ′ , we have that Ξ ⊢ (θ, η) : (Σ, Σ′ ).
F. Mazzoli and A. Abel
⊢Σ
⊢·
7
Σ; · ⊢ A : Set
⊢ Σ, α : A
Σ⊢Γ
Σ; Γ ⊢ A : Set
Σ ⊢ Γ, x : A
Σ⊢·
Figure 4 ⊢ Σ Well-formed signatures
Figure 5 Σ ⊢ Γ Well-formed contexts
for all (α : A) ∈ Σ, α := t ∈ θ and Ξ; · ⊢ t : θA
Ξ⊢θ:Σ
Figure 6 Ξ ⊢ θ : Σ Well-formed meta-variable substitutions
Γ ⊢ Set ≡ Set : Set
Γ ⊢ Bool ≡ Bool : Set
Γ ⊢ false ≡ false : Bool
Γ, x : A ⊢ f x ≡ g x : B
Γ ⊢ f ≡ g : (x : A) → B
Γ ⊢ true ≡ true : Bool
Γ ⊢ A1 ≡ A2 : Set Γ, x : A1 ⊢ B1 ≡ B2 : Set
Γ ⊢ (x : A1 ) → B1 ≡ (x : A2 ) → B2 : Set
Γ ⊢ n ≡ n′ ⇒ A
Γ ⊢ A ≡ B : Set
Γ ⊢ n ≡ n′ : B
Figure 7 Σ; Γ ⊢ t ≡ u : A Definitional equality of canonical terms
Γ ⊢ n ≡ n ′ ⇒ (x : A) → B
Γ ⊢ t ≡ t′ : A
Γ ⊢ n t ≡ n ′ t ′ ⇒ B[x := n]
Γ⊢h⇒A
Γ⊢h≡h⇒A
Γ ⊢ n ≡ n ′ ⇒ Bool
Γ, x : Bool ⊢ A ≡ A : Set
Γ ⊢ t ≡ t ′ : A[x := true]
Γ ⊢ u ≡ u ′ : A[x := false]
Γ ⊢ if n /x.A then t else u ≡ if n ′ /x.A′ then t ′ else u ′ ⇒ A[x := n]
′
Figure 8 Σ; Γ ⊢ n ≡ n ′ ⇒ A Definitional equality of neutral terms
8
Type checking through unification
4
Unification
In this section we will give a specification for the unification algorithm that we will need to
solve the constraints generated by elaboration.
4.1
Unification constraints
The input for the unification algorithm are heterogeneous constraints of the form
Γ ⊢ t : A = u : B.
Such a constraint is well formed if we have that Γ ⊢ t : A and Γ ⊢ u : B. As we will see in
Section 5, it is crucial for the constraints to be heterogeneous for the elaboration procedure
to work as we intend to.
A constraint is solved if we have that Γ ⊢ A ≡ B : Set and Γ ⊢ t ≡ u : A. This means
that to solve a constraint the unifier will have to establish definitional equality of both the
types and the terms.
4.2
Unification algorithm specification
A unification algorithm takes a signature and set of constraints, and attempts to solve them
by instantiating meta-variables. Thus, unification rules will be of the form
Σ, C
Ξ, θ
Where Σ and C are the input signature and constraints, and Ξ and θ are the output signature
and substitution, such that Ξ ⊢ θ : Σ. If the substitution solves all the constraints we have
that
Ξ
θC.
Note that unification might make no progress at all, and just return Σ and the identity
substitution.
4.3
A suitable unification algorithm
Higher order unification in the context of dependently typed languages is still a poorly
understood topic, and we do not have the space to discuss it in depth here. The basis
for most of the unification algorithms employed in such languages is pattern unification, as
introduced by Miller [8]. However in modern languages such as Agda or Coq there are factors
complicating this process. The main inconvenience, as already mentioned in Section 1, is the
fact that we cannot always know if a constraint is solvable, since solving other constraints
might enable us to solve the current one. A algorithm that takes care of handling constraints
under these assumptions is usually called dynamic.
However, another issue when unifying terms in these type theories is that definitional
equality (specified by conversion rules such as the ones presented in this paper) often includes η-laws for functions and product types, and possibly other type-directed conversion
rules. For this reason our constraints equate typed expressions.6 Note that the types in the
constraints are only needed so that we can abide by the η laws.
6
We also have the constraints to equate the types too, but this is only for brevity: if that wasn’t the case,
all we would have to do is to convert each Γ ⊢ t : A = u : B into {Γ ⊢ A : Set = B : Set, Γ ⊢ t : A = u : B }.
F. Mazzoli and A. Abel
Ideally, to solve the heterogeneous constraints, a heterogeneous pattern unification algorithm is needed, such as the one described in chapter 4 of Adam Gundry’s thesis [5].
However, in our prototype, we have found that implementing such an algorithm is impractical for performance reasons.7 In practice, a homogeneous pattern unification algorithm
like the one employed in the Agda system works well enough in many of the examples that
we have analysed. In this context, a heterogeneous constraint Γ ⊢ t :A = u :B is converted to
two homogeneous constraints, Γ ⊢ A = B : Set and Γ ⊢ t = u : A. Some bookkeeping will be
needed to ensure that the constraint equating the types is solved before attempting the one
equating the terms, so that Γ ⊢ t = u : A is considered only when it is well-formed—when
we know that A ≡ B.
5
Type checking through unification
As mentioned in Section 2, our algorithm will elaborate a type-checking problem into a
well-typed term and a set of unification constraints. Given some type-checking problem
Σ; Γ ⊢ t : A, the algorithm will elaborate it into a term u and constraints C, along with an
extended signature Ξ—since the elaboration process will add new meta-variables.
The algorithm is specified using rules of the form
JΣ; Γ ⊢ t : AK
Ξ, u, C,
such that:
Ξ is an extension of Σ;
u is well typed: Ξ; Γ ⊢ u : A;
C is a set of well formed unification constraints;
if unification produces a signature Ξ′ and substitution Ξ′ ⊢ θ : Ξ such that Ξ′ θC, we
have that Ξ′ ; θΓ ⊢ θt ≡ θu : θA. In other words, solving all the constraints restores
definitional equality between the original term t and the original term u.
The main idea is to infer what the type must look like based on the term, and generate
constraints that make sure that, if the constraints can be solved, that will be the case. For
example, if faced with problem
Σ; Γ ⊢ true : A,
we know that A must be Bool. However, A might be a type stuck on a meta-variable, as
discussed in Section 2. At the same time, we want the elaboration procedure to immediately
return a well-typed term. The heterogeneous constraints let us do just that: we will create
a new meta-variable of type A in Γ, and use that as the elaborated term. Moreover we will
return a constraint equating the newly created meta-variable to true:
JΣ; Γ ⊢ true : AK
(Σ, α : Γ → A), α Γ, {Γ ⊢ true : Bool = α Γ : A}
Note how we respect the contract of elaboration—the elaborated term is well-typed, the
constraint is well-formed—without making any commitment on the shape of A.
For a more complicated example, consider the type-checking problem
7
Specifically, the need to typecheck meta-variable instantiations and retry if they are ill-typed is particularly taxing.
9
10
Type checking through unification
Σ; Γ ⊢ λx → t : A.
We know that A needs to be a function type, but we do not know what the domain and
codomain types are yet. To get around this problem we will add new meta-variables to the
signature acting as the domain and codomain, then elaborate the body using those, and
follow the same technique illustrated above to return a well-typed term by adding a new
meta-variable:
-- Add meta-variables for the domain (β) and codomain (γ):
Σ1 := Σ, β : Γ → Set, γ : Γ → (x : β) → Set
-- Elaborate the body of the abstraction:
JΣ1 ; Γ, x : β ⊢ t : γ Γ xK
Σ2 , u, C
-- Add meta-variable that we will return as the elaborated term:
Σ3 := Σ2 , α : Γ → A
-- Return the appropriate constraint equating the abstracted elaborated body to the new
-- meta-variable, together with the constraints generated from elaborating the body:
JΣ; Γ ⊢ λx → t : AK
Σ4 ,
α Γ,
{Γ ⊢ (λx → u) : (x : β Γ) → γ Γ x = α Γ : A} ∪ C
Note how the use of heterogeneous equality is crucial if we want to avoid to ever commit
to the types having a particular shape, while having all the constraints to be well-formed
immediately.
Every rule in full algorithm is going to follow the general pattern that emerged above:
(a) Elaborate sub-terms, adding meta-variables to have types to work with;
(b) Add a meta-variable serving as the elaborated term, say α;
(c) Return a constraint equating α to a term properly constructed using the elaborated
subterms; together with the constraints returned by elaborating said subterms.
For brevity we present the full algorithm using an abbreviated notation that implicitely
threads the signatures (Σ, Σ1 , Σ2 , and Σ3 in the example above) across rules. We will also use
the macro Fresh(_, _) to add new meta-variables in a context, such that α := Fresh(Γ, A)
is equivalent to Ξ := Σ, α : Γ → A, and successive appearances of α are automatically applied
to Γ, and where Σ and Ξ are the old and new signature—which are, as said, implicitly
threaded. Finally, we implicitly collect the constraints generated when elaborating the
subterms, and implicitly add a meta-variable that stands for the elaborated term, together
with an appropriate constraint—steps (b) and (c) in the process described above.8 For
example, the rule to elaborate abstractions, explained before, will be shown as
β := Fresh(Γ, Set)
γ := Fresh(Γ, x : β, Set)
JΓ, x : β ⊢ t : γK
u
JΓ ⊢ λx → t : AK
(λx → u) : (x : β) → γ
The complete algorithm is shown in figure 9. They are remarkably similar to the typing rules, however instead of matching directly on the type we expect we match through
constraints.
8
In our Haskell implementation, the elaboration is a state and writer monad over the signature and the
constraint set, respectively.
F. Mazzoli and A. Abel
JΓ ⊢ Set : AK
JΓ ⊢ false : AK
11
Set : Set
JΓ ⊢ Bool : AK
Bool : Set
JΓ ⊢ true : AK
true : Bool
JΓ ⊢ A : SetK
A′
Γ, x : A′ ⊢ B : Set
B′
JΓ ⊢ (x : A) → B : S K
(x : A′ ) → B ′ : Set
false : Bool
β := Fresh(Γ, Set)
γ := Fresh(Γ, x : β, Set)
JΓ, x : β ⊢ t : γK
u
JΓ ⊢ λx → t : AK
(λx → u) : (x : β) → γ
x :A∈Γ
JΓ ⊢ xK
x :A
β := Fresh(Γ, Set)
γ := Fresh(Γ, x : β, Set)
JΓ ⊢ n : (x : β) → γK
t
JΓ ⊢ u : βK
v
JΓ ⊢ n u : AK
t v : γ[x := v]
α:A ∈Σ
JΓ ⊢ αK
α:A
JΓ, x : Bool ⊢ B : SetK
B′
JΓ ⊢ n : BoolK
t
′
′
JΓ ⊢ u : B [x := true]K
u
JΓ ⊢ v : B ′ [x := false]K
v′
JΓ ⊢ if n /x.B then u else v : AK
if t /x.B ′ then u ′ else v ′ : B ′ [x := t]
Figure 9 JΣ; Γ ⊢ t : AK
Ξ, u, C Elaboration
The rules can easily be turned into an algorithm which pattern matches on the term and
decides how to proceed.9 Naturally the algorithm can still fail if it encounters an out of
scope meta-variable or variable, although in real systems scope checking is usually performed
beforehand.
5.1
Examples
We will explore how the algorithm works by going through various common situations. The
reader can experiment using the mentioned tog tool, passing the -d ’elaborate’ commandline flag to have it to print out the generated constraints. A wealth of examples are present
in the repository. We will assume the usage of pattern unification to solve constraints when
examining the examples.
5.1.1
A simple problem
Let’s take type-checking problem
·; · ⊢ true : Bool.
The algorithm will return the triple
α : Bool, α, {· ⊢ true : Bool = α : Bool }
The constraint is immediately solvable, yielding the substitution α := true, which will restore
definitional equality between the elaborated term and true.
5.1.2
An ill-typed problem
Now for something that should fail. Given
9
Our implementation can be found at https://github.com/bitonic/tog/blob/master/src/Tog/Elaborate.hs.
12
Type checking through unification
add : Nat → Nat → Nat,
we want to solve
·; x : Nat ⊢ add x : Nat.
The algorithm will return the triple
Σ, ζ x, C where
Σ = α : Nat → Nat, β : (x : Nat) → Nat → Set, γ : (x : Nat) → α x,
δ : (x : Nat) → (y : α x) → β x y, ζ : Nat → Nat
C = {x : Nat ⊢ δ x (γ x) : β x (γ x) = ζ x : Nat,
x : Nat ⊢ add : Nat → Nat → Nat = δ x : (y : α x) → β x y,
x : Nat ⊢ x : Nat = γ x : α x }
While looking scary at first, the meaning of the meta-variables and constraints is easy to
interpret, keeping in mind that we generate one constraint per subterm (including the top
level term).
At the top level, we elaborate the two subterms add and x. We know that add must be a
function type, since it is applied to something; and that the type of x must match the type
of the domain of said function type. Thus, two meta-variables are created to represent the
domain and codomain—α and β. Then, add and x are elaborated with said types, which in
turn requires the addition of γ and δ, serving as elaborated terms. These are the ingredients
for the second and third constraint. Finally, the elaborated δ (representing add) is applied to
γ (representing x), and equated to a new meta-variable ζ, which is the result of the top-level
elaboration.
The constraints reflect the fact that the term is ill-typed: β is equated both to Nat (in
the first constraint), and to Nat → Nat, in the second constraint. Thus, unification will fail.
5.1.3
An unsolvable problem
Finally, let’s go back to an example which cannot immediately be solved in its entirety:
α : Nat; · ⊢ (true, 0) : BoolOrNat α × Nat.
The desired outcome for this problem is to type check the second element of the pair, 0;
but “suspend” the type checking of the first element by replacing refl with a meta-variable.
Running the type-checking problem through the elaboration procedure yields
Σ, ζ x, C where
Σ = β : Set, γ : Set, δ : β, ζ : γ, ι : BoolOrNat α × Nat
C = {· ⊢ (δ, ζ) : β × γ = ι : BoolOrNat α × Nat,
· ⊢ 0 : Nat = ζ : γ,
· ⊢ true : Bool = δ : β }
The second and third constraints regard the two sub-problems individually, and are solvable
yielding the substitution
β := Bool, δ := true, γ := Nat, ζ := 0,
and leaving us with
F. Mazzoli and A. Abel
13
· ⊢ (true, 0) : Bool × Nat = ι : BoolOrNat α × Nat.
At this point the unifier will be able to substitute ι with a pair
· ⊢ (true, 0) : Bool × Nat = (ξ, 0) : BoolOrNat α × Nat.
Now solving the constraint amounts to solve
· ⊢ true : Bool = ξ : BoolOrNat α,
but the unifier is not going to be able to make progress, since substituting ξ for true will
leave the constraint ill-formed. Thus, the final result of the elaboration and unification will
be (ξ, 0), which is all we could hope for.
5.2
Some properties
◮ Lemma 1 (Well-formedness and functionality of elaboration). Let ⊢ Σ and Σ ⊢ Γ.
1. There uniquely exist a signature Ξ, constraints C, a term t ′ , and a type A such that
JΣ; Γ ⊢ tK
Ξ | C ⊢ t′ ⇒ A
and Ξ; Γ ⊢ A : Set.
2. If Σ; Γ ⊢ A : Set, then there uniquely exist a signature Ξ, constraints C, and a term t ′
such that
JΣ; Γ ⊢ t ⇐ AK
Ξ | C ⊢ t′.
In both cases, Ξ is necessarily an extension of Σ and all the outputs are well-formed, meaning
⊢ Ξ and Ξ; Γ ⊢ t ′ : A and Ξ; Γ ⊢ C.
Proof. By induction on t.
◭
◮ Lemma 2 (Soundness of elaboration).
If one of
JΣ; Γ ⊢ tK
Ξ | C ⊢ t′ ⇒ A
JΣ; Γ ⊢ t ⇐ AK
Ξ | C ⊢ t′
and there is some well-typed meta substitution Σ′ ⊢ θ : Ξ that solves the constraints, i.e.,
Σ′ θC, then
Σ′ , θΓ ⊢ θt ≡ θt ′ : θA.
Proof. By induction on term t.
◭
◮ Lemma 3 (Strong soundness of elaboration).
1. If
JΣ; Γ ⊢ tK
Ξ | C ⊢ t′ ⇒ A
and there is some closing untyped substitution σ such that dom(σ) ⊇ dom(Ξ) and ⊢ σ : Σ
and σΓ ⊢ σA : Set and σ solves the untyped constraints, then
σΓ ⊢ σt ≡ σt ′ : σA.
14
Type checking through unification
2. If
JΣ; Γ ⊢ t ⇐ AK
Ξ | C ⊢ t′
and there is some closing untyped substitution σ : Ξ that is well-typed for Σ, i.e, ⊢ σ : Σ
and solves the untyped constraints, i.e., σC, then
σΓ ⊢ σt ≡ σt ′ : σA.
Proof. By induction on term t.
Case Abstraction λx → t
[[(Σ, α : (Γ → Set)); (Γ, x : (α Γ)) ⊢ t]]
Ξ | C ⊢ t′ ⇒ B
[[Σ; Γ ⊢ (λx → t)]]
Ξ | C ⊢ (λx → t′ ) ⇒ ((x : α Γ) → B)
By assumption ⊢ σ : Σ and σΓ ⊢ σ((x : α Γ) → B) : Set, which by inversion gives
us σΓ ⊢ (σα) Γ : Set and σ(Γ, x : α Γ) ⊢ σB : Set. Thus ⊢ σα : (σΓ → Set) and
⊢ σ : (Σ, α : (Γ → Set)). By induction hypothesis, σΓ, x : σ(α Γ) ⊢ σt = σt′ : σB, thus by
the ξ rule for equality, σΓ ⊢ σ(λx → t) = σ(λx → t′ ) : σ((x:α Γ) → B).
Case Application t u
[[Σ; Γ ⊢ u]]
Σ1 | C 1 ⊢ u ′ ⇒ A
[[Σ1 , β : ((Γ, x:A) → Set); Γ, x:A ⊢ t ⇐ ((x:A) → β Γ x)]]
[[Σ; Γ ⊢ t u]]
Σ 2 | C 1 ∪ C 2 ⊢ t′ u ′ ⇒ β Γ u ′
Σ 2 | C 2 ⊢ t′
By the first induction hypothesis, σΓ ⊢ σu = σu′ : σA. By the second induction hypothesis
◭
◮ Lemma 4 (Completeness of elaboration). Let us assume a term t and a wellformed signature Σ and Σ ⊢ Γ and a second signature Ξ and a substitution Ξ ⊢ θ : Σ such that
Ξ; θΓ ⊢ θt : C .
1. Then
JΣ; Γ ⊢ tK
(Σ, Σ′ ) | C ⊢ t ′ ⇒ B
and there exists a substitution θ′ such that
Ξ ⊢ (θ, θ′ ) : (Σ, Σ′ )
Ξ (θ, θ′ )C
Ξ; θΓ ⊢ C = (θ, θ′ )B : Set
Ξ; θΓ ⊢ θt = (θ, θ′ )t ′ : C .
2. Further, if Σ; Γ ⊢ A : Set and Ξ; θΓ ⊢ θA = C : Set, then
JΣ; Γ ⊢ t ⇐ AK
(Σ, Σ′ ) | C ⊢ t ′
and there exists a substitution θ′ such that
Ξ ⊢ (θ, θ′ ) : (Σ, Σ′ )
Ξ (θ, θ′ )C
Ξ; θΓ ⊢ θt = (θ, θ′ )t ′ : C .
F. Mazzoli and A. Abel
15
In other words, if it’s possible to instantiate some meta-variables to make t well-typed, then
all the constraints generated by the elaboration procedure are solvable.
Proof. By induction on t.
◭
(Σ, Σ′ ) | C ⊢ t ′ ⇒ A′ , then
◮ Corollary 5 (Simple inference). If Σ; Γ ⊢ t : A and JΣ; Γ ⊢ tK
all the constraints in C are solvable by some substitution Σ ⊢ θ′ : Σ′ and Σ; Γ ⊢ A = θ′ A′ : Set.
Proof. From Completeness with Ξ = Σ and identity substitution θ.
◭
◮ Corollary 6 (Simple checking). If Σ; Γ ⊢ t : A and JΣ; Γ ⊢ t ⇐ AK
all the constraints in C are solvable.
(Σ, Σ′ ) | C ⊢ t ′ , then
Proof. From Completeness with Ξ = Σ and identity substitution θ.
◭
5.2.1
Effectiveness
While the properties above guarantee establish some basic results about the algorithm, they
are all also satisfied by the very useless elaboration algorithm
JΣ; Γ ⊢ t : AK
(Σ, α : Γ → A, β : Γ → Set), α Γ, {Γ ⊢ α Γ : A = t : β Γ}.
However, the intent of the developed algorithm is to be as effective, when used with pattern
unification, as the current techniques to type check dependent types with meta-variables.
To achieve this, it has been designed so that the generated constraints fall in the pattern
fragment when existing type checkers would be able to make progress, and by testing the
algorithm “in the wild” with existing Agda programs we have found it effective in practice.
For instance, if we did not keep our terms in β-normal form, we could not elaborate applications into constraints falling into the pattern fragment, due to the fact that we cannot
reliably infer the type of the function.
However, future work should involve a formal characterization of completeness in the
context of type checkers for dependent types with meta-variables, and a proof that our
algorithm is indeed complete.
6
Additional remarks
6.1
Additional features
In this section we will briefly sketch how to fit popular features into the framework described.
The general idea is to do everything which doesn’t require normalization in the elaboration
procedure, and the rest into the unifier.
6.1.1
Implicit arguments
We have already implemented a restricted form of implicit arguments, which we call “type
schemes” in line with ML terminology. Type schemes allow the user to define a number of
implicit arguments in top-level definitions, for example the already mentioned
head : {A : Set} → {n : Nat} → Vec A (1 + n) → A.
, before even
Under this scheme, every occurrence of head is statically replaced with head
elaborating—we do it while scope checking. However this is obviously limited, since we can
only have implicit arguments before any explicit ones and only for top-level definitions.
16
Type checking through unification
We want to enable a more liberal placement of implicit arguments. This is achieved in
Agda by allowing implicit arguments in all types, and in any many positions. The details of
the implementation are still in flux in Agda itself, but the core idea is to type-check function
application and abstractions bidirectionally, by first looking at the type and inserting implicit
arguments if needed. So elaborating t u where t : {x : A} → (y : B) → C will result in t u.
Similarly, elaborating t : {x : A} → B will result in λ{x } → t, where {x } binds an implicit
arguments.
We are exploring two ways to integrate this kind of mechanism in our framework:
Mimic the bidirectional type-checking performed in Agda and similar systems closely, by
adding a new kind of constraint for function application and abstraction which waits on
the type to have a rigid head, that is to say a type not blocked on a meta-variable.
Alternatively, force all implicit arguments to appear before an explicit one (with the
exception of type schemes), and always include an implicit arguments in →-types.10
Multiple implicit arguments will then be handled by one implicit argument carrying a
tuple.
We are currently implementing the latter proposal, since it is simpler to describe and to
implement, although only using it will tell if it is practical.11
6.1.2
Type classes
Type classes, as employed by Haskell, were introduced to handle overloaded operators in
programming languages [12]. Other similar structures include canonical structures in Coq.
In short, type classes let the user specify a collection of methods that can be implemented
for a specific type. For example, the type class identifying monoid is defined as
class Monoid a where
mempty : a
mappend : a → a → a
-- Monoid instance for list
instance Monoid [a ] where
mempty = [ ]
-- Empty list
mappend = (+
+) -- Concatenation
-- Monoid instance for pairs of monoids
instance (Monoid a, Monoid b) ⇒ Monoid (a, b) where
mempty = (mempty, mempty)
mappend (x1 , y1 ) (x2 , y2 ) = (x1 ‘mappend‘ x2 , y1 ‘mappend‘ y2 )
Type classes are a form of type-directed name resolution, and thus cannot be resolved at
elaboration time—we might need to instantiate meta-variables before being able to resolve
the right method. To integrate it in our framework we have to include type-classes into
our unification procedure. Luckily, this is exactly what the authors of the theorem prover
Matita accomplished using what they dubbed unification hints [1]. Briefly, the unifier is
given “hints” on how to solve problems that it cannot resolve by itself, and such hints are
repeatedly tried if unification fails.
10
Note that the restriction of having implicit arguments always paired with explicit ones is being planned
in Agda too, to make the automatic insertion of implicit arguments more predictable.
11
A more thorough proposal is available at https://github.com/bitonic/tog/wiki/Implicit-Arguments.
F. Mazzoli and A. Abel
Similar to type-classes, overloaded constructors are a feature introduced by Agda, that
lets the user define multiple data constructors with the same name. When such an overloaded constructor is used, its type must be determined by the type we are type checking
it against. It is easy to see how this problem is essentially the same as resolving the right
type class instance when encountering one of its methods—the type-class being “data types
with the same constructors”, the instances being the data-types, and the methods being the
constructors—, and thus we plan to implement this feature using unification hints as well.
6.2
Performance
One reason for concern is that our algorithm generates more constraints than ordinary typechecking algorithms. However, as already remarked, our algorithm generates a number of
constraints and meta-variables which is linear in the size of the input term. Moreover, we
would expect the unifier to spend little time solving the trivial constraints which are normally
handled by the type-checker directly.
In the examples we have collected, we have found that this is the case, and the run time
is dominated by unification filling in implicit arguments which can become very large. More
specifically, most of the time is spent dealing with η-expansion, which we plan to improve
in the future.
7
Conclusion
We have presented an algorithm that leverages the unifier, an important part of already
existing dependently typed programming languages and theorem provers, to greatly simplify
the process of type checking. The expressivity of higher-order unification lets us specify the
type-rules concisely. Moreover, we have clearly separated type checking from unification,
allowing for greater modularity.
We have implemented the ideas presented in the tog, covering a large subset of the Agda
languages. We are currently in the process of improving tog to get narrow the gap between
its capabilities and Agda.
7.1
Acknowledgements and related work
This work is a continuation of the work by Norell & Coquand [10], which describes how
Agda deals with issues that we presented. In fact, the algorithm described here is a simpler
re-implementation of what they specified.
The other main inspiration came from a discussion with Adam Gundry about how Epigram 2 deals with type checking in the presence of meta-variables. The propositional equality
Epigram 2 is powerful enough to represent constraints stuck on some meta-variable as an
unfinished equality proof. Thus, the unifier, when given a constraint Γ ⊢ t : A = u : B
produces a—possibly unfinished—proof that Γ ⊢ t : A ≡ u : B, where here ≡ denotes Epigram’s heterogeneous propositional equality. This proof can be used to “transport” terms
on one side of the equation to the other. From this discussion I realised that such a powerful
equality was not needed to implement a similar system.
The already cited work on Matita [1] convinced us further that isolating “dynamic”
procedures in the unifier is a good idea.
Finally, our work follows a long tradition of separating elaboration of the user syntax into
a core type theory, and the type-checking of such theory. As far as we know this line of work
17
18
Type checking through unification
Set[h := t]
Set
Bool[h := t]
Bool
true[h := t]
A[h := t]
A′
B[h := t]
B′
((x : A) → B)[h := t]
(x : A′ ) → B ′
h[h := t]
t
n[h := t]
w
h 6≡ h ′
h [h := t]
h′
true
u[h := t]
(λx → u)[h := t]
n[h := t]
′
v
u[h := t]
(n u)[h := t]
A[h := t]
A′
u[h := t]
u′
v[h := t]
′
′
′
if w /x.A then u else v
w′
(if n /x.A then u else v)[h := t]
w′
Figure 10 u[h := t]
terms
u ′ and n[h := t]
false[h := t]
u′
v′
false
u′
λx → u ′
v u′
v′
v′
u Hereditary substitution into canonical and neutral
goes back at least to Coquand and Huet’s “Constructive Engine” [6], with its separation
between the “concrete” user syntax and the internal “abstract” syntax.
Moreover, we’d like to thank Andrea Vezzosi, Nils Anders Danielsson, Conor McBride,
and Bas Spitters for the useful input.
A
Syntax and types used in examples
Throughout the examples we use a syntax close to the one in Agda and Haskell. Some
details regarding the syntax:
type and data constructors are shown in a sans serif font;
new meta-variables are introduced using underscores ( );
binary operators are referred to with parentheses, e.g. (+);
implicit arguments are indicated by curly braces;
definitions can be defined by pattern matching.
We use some standard types, namely:
Set : Set—Set is the type of all types, and its type is Set itself;
Bool : Set, inhabited by true and false;
Nat : Set, representing the natural numbers, introduced by number literals (1, 2, etc.);
(≡):{A:Set} → A → A → Set, the identity type; inhabited by refl:{A:Set} → {x :A} →
x ≡ x.
B
Substitution and term elimination
Figure 10 show the rules to substitute a term u for a head h, which can be a variable x or a
meta-variable α. Substituting (n u)[h := t] into proper neutral terms n t might (in case the
head of n is h) generate redexes, which are eliminated by invocations of the term elimination
judgment t u
v and if t /x.A then u else v
t, whose rules are given respectively in
Figure 11 and Figure 12. Term elimination in turn invokes substitution when the eliminated
term is a λ-abstraction.
While we use explicit names in our rules, we do not address issues related to α-renaming
here. In our prototype substitution is implemented using de Bruijn indices [4].
F. Mazzoli and A. Abel
19
t[x := u]
(λx → t) u
Figure 11 t u
t′
t′
v Application elimination
(if true /x.A then t else u)
Figure 12 if t /x.A then u else v
t
(if false /x.A then t else u)
u
t Bool elimination
References
1
2
3
4
5
6
7
8
9
10
11
12
13
Andrea Asperti, Wilmer Ricciotti, Claudio Sacerdoti Coen, and Enrico Tassi. Hints in
unification. In Theorem Proving in Higher Order Logics, pages 84–98. Springer, 2009.
Yves Bertot and Pierre Castéran. Interactive Theorem Proving and Program Development,
Coq’Art:the Calculus of Inductive Constructions. Springer-Verlag, 2004.
Edwin Brady. Idris, a general-purpose dependently typed programming language: Design
and implementation. Journal of Functional Programming, 23(05):552–593, 2013.
Nicolaas Govert De Bruijn. Lambda calculus notation with nameless dummies, a tool
for automatic formula manipulation, with application to the church-rosser theorem. In
Indagationes Mathematicae (Proceedings), volume 75, pages 381–392. Elsevier, 1972.
Adam Gundry. Type Inference, Haskell and Dependent Types. PhD thesis, Department of
Computer and Information Sciences, University of Strathclyde, 2013.
Gérard Huet. The constructive engine. A Perspective in Theoreticak Computer Science,
pages 38–69, 1989.
Conor McBride and James McKinna. The view from the left. Journal of Functional
Programming, 14(1):69–111, 2004.
Dale Miller. Unification under a mixed prefix. J. Symb. Comput., 14(4):321–358, October
1992.
Ulf Norell. Towards a practical programming language based on dependent type theory.
PhD thesis, Department of Computer Science and Engineering, Chalmers University of
Technology, SE-412 96 Göteborg, Sweden, 2007.
Ulf Norell and Catarina Coquand. Type checking in the presence of meta-variables. Unpublished draft, 2007.
Robert Pollack. Implicit syntax. Informal Proceedings of First Workshop on Logical Frameworks, Antibes, May 1990.
Philip Wadler and Stephen Blott. How to make ad-hoc polymorphism less ad hoc. In Proceedings of the 16th ACM SIGPLAN-SIGACT Symposium on Principles of Programming
Languages, POPL ’89, pages 60–76, New York, NY, USA, 1989. ACM.
Kevin Watkins, Iliano Cervesato, Frank Pfenning, and David Walker. A concurrent logical
framework i: Judgments and properties. Technical report, DTIC Document, 2003.
| 6cs.PL
|
Optimal Mission Planner with Timed Temporal Logic Constraints
arXiv:1510.01261v1 [cs.SY] 5 Oct 2015
Yuchen Zhou, Dipankar Maity and John S. Baras
Abstract— In this paper, we present an optimization based
method for path planning of a mobile robot subject to time
bounded temporal constraints, in a dynamic environment.
Temporal logic (TL) can address very complex task specification such as safety, coverage, motion sequencing etc. We use
metric temporal logic (MTL) to encode the task specifications
with timing constraints. We then translate the MTL formulae
into mixed integer linear constraints and solve the associated
optimization problem using a mixed integer linear program
solver. This approach is different from the automata based
methods which generate a finite abstraction of the environment
and dynamics, and use an automata theoretic approach to
formally generate a path that satisfies the TL. We have applied
our approach on several case studies in complex dynamical
environments subjected to timed temporal specifications.
I. I NTRODUCTION
Autonomous aircraft have been deployed for agriculture
research and management, surveillance and sensor coverage
for threat detection and disaster search and rescue operations.
All these applications require the tasks to be performed
in an optimal manner with specific timing constraints. The
high level task specifications for these applications generally
consist of temporal ordering of subtasks, motion sequencing
and synchronization etc. Given such specifications, it is
desirable to synthesize a reference trajectory that is both
optimal considering the dynamics of the vehicle and satisfies
the temporal constraints. Motion planning [1], [2], at its
early stage, considered optimal planning to reach a goal
from an initial position while avoiding obstacles [3]. New
techniques such as artificial potential functions [3], [4], cell
decomposition and probabilistic roadmaps [2] are introduced
for efficient planning in complex environment [5], [6] and
high dimensional state-space. However, these approaches
failed when task specifications have multiple goals or specific
ordering of goals, for example surveying some areas in
particular sequence.
Temporal logic [7]–[9] provides a compact mathematical
formulation for specifying such complex mission specifications. Previous approaches mainly focus on the usage of
linear temporal logic (LTL), which can specify tasks such
as visiting goals, periodically surveying areas, staying stable
and safe. The main drawback of the LTL formulation is that
it cannot specify time distance between tasks. In surveillance
examples, a simple task may be to individually monitor
*This work is supported by US AFOSR MURI grant FA9550-09-1-0538,
NSF grant CNS-1035655, NIST grant 70NANB11H148 and by DARPA
(through ARO) grant W911NF1410384.
The authors are with the Department of Electrical and Computer
Engineering, and the Institute for Systems Research, University of
Maryland, College Park, Maryland, USA. email: {yzh89, dmaity,
baras}@umd.edu
multiple areas for at least x amount of time. Additionally, the
LTL formulation commonly assumes the environment to be
static. Traditional approaches commonly start with creating a
finite abstraction of the environment including the dynamics,
then combine it with the automata that is generated from the
LTL specification [10]. The cell decomposition performed in
the abstraction process requires the environment to be static;
but in most situations this is not the case. For example, the
use of Unmanned Aerial Vehicles (UAVs) for surveillance in
the commercial airspace needs to consider motion of other
aircraft. The other weakness of the automata-based approach
is that it is computationally expensive. In this work, we are
interested in motion planning for surveillance in an airspace
with finite time task constraints and safety guarantees. For
this work, we only consider the other aircraft in the target
area as dynamic obstacles to the UAV. Further, we assume
that the motions of these dynamic obstacles can be either
predicted during the planning or are known a priori.
Due to the limitations of the previous approaches, we
instead present the method based on metric temporal logic
(MTL) [11], [12] and an optimization problem formulation
to solve the planning problem. MTL extends the LTL [7]
temporal operators so that it can express the requirements
on time distance between events and event durations. This
allows us to describe the dynamic obstacle and survey
durations in our case study.
An optimization based method for LTL was previously
proposed and extended by [13], [14]. In [13], the authors
propose to transform LTL specifications to mixed integer
constraints and solve the planning problem for finite horizon
using either a mixed integer linear program (MILP) or a
mixed integer quadratic program (MIQP) solver. In [14], the
algorithm is extended to infinite horizon so that trajectories
can contain loops. However, none of the methods consider
dynamic environment or moving obstacles, time varying
constraints, or duration of the tasks. MTL was used as a
temporal constraint to a routing planning problem in [15].
Their formulation unfortunately does not allow users to
incorporate dynamics of the vehicle.
In this paper, we consider a path planning problem for
surveillance under survey durations constraints for each
region and overall temporal constraint to visit each region
within given times. Our problem is considerably different
from the problems formulated in the existing literature in
the sense that we not only consider dynamic environment
but also associate each subtask with a duration constraint.
We generate a path that guarantee safety by avoiding static
and moving obstacles in the workspace and the path is
optimal in the sense that it minimizes a predefined cost
function. We do not adopt the linear encoding from [14],
since moving obstacles is not periodic in nature. Similar
to their approaches, we adopt the usage of mixed logic
dynamic (MLD) to model vehicle dynamics, so that the
overall problem is a MILP (considering linear cost function).
Our main contribution is usage of MTL to specify time
bounded tasks for the mission planner and reformulation of
the problem into a MILP. We also demonstrate the methods
on the case studies of using a quadrotor and ground vehicle
to survey multiple areas given the MTL specifications. The
rest of the paper is organized as follows. In section II we
present the fundamentals of MTL and define the overall
motion planning problem. We then formulate it into a mixed
integer linear optimization problem incorporating the temporal constraints in section III. Afterward, we demonstrate our
approach on motion planning for different simulation setups.
II. P RELIMINARIES
In this paper we consider a surveying task in an area by a
robot whose dynamics are given by the nonlinear model (1).
x(t + 1) = f (t, x(t), u(t))
(1)
where x(t) ∈ X , x(0) ∈ X0 ⊆ X , and u(t) ∈ U for all
t = 0, 1, 2, · · · . Let us denote the trajectory of the system
(1) starting at t0 with initial condition x0 and input u(t) as
xxt00 ,u = {x(s) |s ≥ t0 x(t + 1) = f (t, x(t), u(t)), x(t0 ) =
x0 }. For brevity, we will use xt0 instead of xxt00 ,u whenever
we do not need the explicit information about u(t) and x0 .
Definition 2.1: An atomic proposition is a statement
about the system variables (x) that is either True(>) or
False(⊥) for some given values of the state variables. [13]
Let Π = {π1 , π2 , · · · πn } be the set of atomic propositions
which labels X as a collection of survey areas, free space,
obstacles etc. The moving obstacles make the free space to
change from time to time, and hence labeling the environment is time dependent. We define a map that labels the time
varying environment as follows
L : X × I → 2Π
(2)
where I = {[a, b]| b > a ≥ 0} and 2Π is denoted as the
power set of Π. In general, I is used to denote a time interval
but it can be used to denote a time instance as well.
The trajectory of the system is a sequence of states such
that each state x(t) stays in X for all t and there exists u(t) ∈
U for all t such that x(t + 1) = f (t, x(t), u(t)). Corresponding to each trajectory x0 , the sequence of atomic proposition
satisfied is given by L(x0 ) = L(x(0), 0)L(x(1), 1)...
The high level specification of the surveying task will be
expressed formally using MTL which can incorporate timing
specifications.
A. Metric Temporal Logic (MTL)
Metric temporal logic, a member of temporal logic family,
deals with model checking under timing constraints. The
formulas for MTL are build on atomic propositions by
obeying some grammar.
Definition 2.2: The syntax of MTL formulas are defined
according to the following grammar rules:
φ ::= > | π | ¬φ | φ ∨ φ | φUI φ
where I ⊆ [0, ∞] is an interval with end points in N ∪ {∞}.
π ∈ Π, > and ⊥(= ¬>) are the Boolean constants true and
f alse respectively. ∨ denotes the disjunction operator and
¬ denotes the negation operator. UI symbolizes the timed
Until operator. Sometimes we will represent U[0,∞] by U.
Other Boolean and temporal operators such as conjunction
(∧), eventually within I (♦I ), always on I (I ) etc. can
be represented using the grammar desired in definition 2.2.
For example, we can express time constrained eventually
operator ♦I φ ≡ >UI φ and so on.
Definition 2.3: The semantics of any MTL formula φ is
recursively defined over a trajectory xt as:
xt |= π iff π ∈ L(x(t), t)
xt |= ¬π iff π ∈
/ L(x(t), t)
xt |= φ1 ∨ φ2 iff xt |= φ1 or xt |= φ2
xt |= φ1 ∧ φ2 iff xt |= φ1 and xt |= φ2
xt |= φ iff xt+1 |= φ
xt |= φ1 UI φ2 iff ∃s ∈ I s.t. xt+s |= φ2 and ∀ s0 ≤
s, xt+s0 |= φ1 .
Thus, the expression φ1 UI φ2 means that φ2 will be true
within time interval I and until φ2 becomes true φ1 must
be true. Similarly, the release operator φ1 Rφ2 denotes the
specification that φ2 should always hold and it can be
released only when φ1 is true. The MTL operator φ means
that the specification φ is true at next time instance, I φ
means that φ is always true for the time duration I, ♦I φ
means that φ will eventually become true within the time
interval I. Composition of two or more MTL operators
can express very sophisticated specifications; for example
♦I1 I2 φ means that within time interval I1 , φ will be true
and from that instance it will hold true always for a duration
of I2 . Other Boolean operators such as implication (⇒)
and equivalence (⇔) can be expressed using the grammar
rules and semantics given in definitions 2.2 and 2.3. More
details on MTL grammar and semantics can be found in [11].
Satisfaction of a temporal specification φ by a trajectory xt0
will be denoted as xt0 |= φ.
III. P ROBLEM F ORMULATION AND S OLUTION
We consider a planning problem to periodically survey
some selected areas in a given workspace. There are specific
time bounds, associated with the regions, by which the
surveillance has to be finished. Given the system dynamics
(1), the objective is to find a suitable control law that
will steer the robot in the survey area so that all regions
are surveyed within the time bound and that control will
optimize some cost function as well. The surveying task and
its associated timing constraints and safety constraints can
be expressed formally by Metric Temporal Logic (MTL).
Let φ denote the MTL formula for the surveying task, and
J(x(t, u), u) be a cost function to make the path optimal in
some sense. We formally present our planning objective as
an optimization problem given in Problem (3.1)
Problem 3.1:
min
J(x(t, u), u(t))
u
x(t + 1) = f (t, x(t), u(t))
xt0 |= φ
In the following section we are going to discuss the linearization techniques for the dynamics of the robot, and our
approach to translate an MTL constraint as linear constraints.
subject to
A. Linearized Dynamics of the Robot
Since we are interested in solving the planning problem
as an optimization problem with mixed integer and linear
constraints, we need to represent the dynamics of the robot
as a linear constraint to the optimization problem (3.1). We
will consider surveying some given areas by ground robots as
well as aerial robots. The dynamics of the autonomous aerial
robot and ground robot are given in (3) and (4) respectively.
1) Quadrotor Model: To capture the dynamics of the
quadrotor properly, we need two coordinate frames. One of
them is a fixed frame and will be named as earth frame,
and the second one is body frame which moves with the
quadrotor. The transformation matrix from body frame to
earth frame is R(t). The quadrotor dynamics has twelve
state variables (x, y, z, vx , vy , vz , φ, θ, ψ, p, q, r), where ξ =
[x, y, z]T and v = [vx , vy , vz ]T represent the position and
velocity of the quadrotor w.r.t the body frame. (φ, θ, ψ) are
the roll, pitch and yaw angle, and Ω = [p, q, r]T are the rates
of change of roll, pitch and yaw respectively.
The Newton-Euler formalism for the quadrotor rigid body
dynamics in earth fixed frame is given by:
ξ˙ = v
v̇ = −ge3 +
F
Re3
m
(3)
Ṙ = RΩ̂
Ω̇ = J −1 (−Ω × JΩ + u)
where g is the acceleration due to gravity, e3 = [0, 0, 1]T , F
is the total lift force and u = [u1 , u2 , u3 ]T are the torques
applied. F and u are the control inputs. More details on
the quadrotor dynamics can be found in [16], [17]. For this
work, we linearize the dynamics (3) about the hover with
yaw constraint to be zero, as it has been done in [14]. Since
ψ is constrained to be zero, we remove ψ and r from our
system and make the system ten dimensional. Consequently,
we only need three control inputs, F, u1 , and u2 for the
system. The linearized model is the same as what is done in
[14],
[18]. The system matrices
for thelinearized model are:
0 I 0 0
0
0
0
0 g
0 0 −g 0 0
0
0
; B =
A=
0 0
1/m
0 0
0
I
0
0
−1
0
I2×3 J
0 0
0
0
1 0 0
I2,3 =
0 1 0
All zero and identity matrices in A and B are of proper
dimensions.
2) Car-Like Model: We also investigate our approach on
a car-like dynamical system (4). The system has three state
variables: positions (x, y), heading angle θ.
ẋ
cos(θ) 0
ẏ = sin(θ) 0 u1
(4)
u2
0
1
θ̇
where u1 and u2 are the control inputs. We linearize this
nonlinear model about several values for θ and depending
on the value of θ, the closest linearization was used to drive
the linearized system. The linearization is similar to what is
suggested in [14]. The linearized system matrices at θ̂ are
given by:
0 0 −û1 sin(θ̂)
cos(θ̂) 0
A = 0 0 û1 cos(θ̂) ; B = sin(θ̂) 0
0 0
0
0
1
B. Mixed Integer Linear Constraints
In this section, we demonstrate our approach to translate a
time-bounded temporal logic formula to linear constraints on
state variables and inputs. The easiest example of it would be
how to express the temporal constraint that x(t) lies within
a convex polygon P at time t. This simple example will
serve as a building block for other complicated temporal
operators. Any convex polygon P can be represented as an
intersection of several halfspaces. A halfspace is expressed
by a set of points, Hi = {x : hTi x ≤ ki }. Thus, x(t) ∈ P
is equivalent to x(t) ∈ ∩ni=1 Hi = ∩ni=1 {x : hTi x ≤ ki }.
The temporal constraint that x(t) will be inside P for all
t ∈ {t1 , t1 + 1, · · · t1 + n} can be represented by the set of
linear constraints {hTi x(t) ≤ ki } for all i = {1, 2, · · · , n}
and ∀t ∈ {t1 , t1 + 1, · · · t1 + n}.
We adopted a method similar to the method used in [13]
to translate temporal constraint φ into mixed integer linear
constraints. We extend it to incorporate duration for task
completion and loop constraints of the trajectory. Comparing
to [14], we only enforce the loop constraints at the trajectory
level instead of the temporal logic level, since the moving
obstacles is not periodic in nature. The planning process will
be repeated when the vehicle returns to the initial point.
In a polygonal environment, atomic propositions (AP), p ∈
Π, can be related to states of the system using disjunction and
conjunction of halfspaces. In other words, the relationship
between measured outputs such as location of the vehicle and
the halfspaces defines the proposition used in the temporal
logics. Consider the convex polygon case and let zit ∈ {0, 1}
be the binary variables associated with halfspaces {x(t) :
hTi x(t) ≤ ki } at time t = 0, ..., N . We enforce the following
constraint zit = 1 if and only if hTi x(t) ≤ ki by adding the
linear constraints,
hTi x(t) ≤ ki + M (1 − zit )
(5)
hTi x(t) ≥ ki − M zit +
where M is a large positive number and is a small positive
number. If we denote PtP = ∧ni=1 zit , then PtP = 1 if and
only if x(t) ∈ P. This can be extended to the nonconvex
case by decomposing the polygon to convex ones and linking
them using disjunction operators. As discussed later in this
section, the disjunction operator can also be translated to
mixed integer linear constraints.
We will use Fφ (x, z, u, t) to denote the set of all mixed
integer linear constraints corresponding to the temporal logic
formula φ. Once we have formulated Fp (x, z, u, t) for atomic
propositions p, we can find Fφ (x, z, u, t) for any MTL
formula φ. The next essential part of the semantics of MTL
is the Boolean operations, such as ¬, ∧, ∨. Similarly these
operators can be translated into linear constraints. Let t ∈
{0, 1, ..., N }, Ptφ be the continuous variables within [0,1]
associated with formula φ made up with propositions p ∈ Π
at time t.
• φ = ¬p is the negation of an atomic proposition, and it
can be modeled as
Ptφ = 1 − Ptp .
•
(6)
The conjunction operation, φ = ∧m
i=1 pi , is modeled as
Ptφ ≤ Ptpi ,
i = 1, ..., m,
m
X
Ptpi ,
Ptφ ≥ 1 − m +
(7)
(8)
i=1
Similarly, the temporal operators can be modeled using
linear constraints as well. Let t ∈ {0, 1, ..., N − t2 }, where
[t1 , t2 ] is the time interval used in the MTL.
• Eventually: φ = ♦[t1 ,t2 ] p is equivalent to
Ptφ ≥ Pτp ,
Ptφ ≤
t+t
X2
τ ∈ {t + t1 , ..., t + t2 }
(9)
Always: φ = [t1 ,t2 ] p is equivalent to
Ptφ ≤ Pτp ,
Ptφ ≥
t+t
X2
τ ∈ {t + t1 , ..., t + t2 }
(10)
Pτp − (t2 − t1 ),
τ =t+t1
•
Until: φ = pU[t1 ,t2 ] q is equivalent to
atj ≤ Pqj
atj ≤
Ppk
(∧k=j−1
Ppk ) ∧ Pqj .
k=t
Other combinations for different temporal operators are also
straight forward and we are not enumerating them for the
sake of space, but one can easily derive them by using (6)
through (11).
Using this approach, we translate the given high level specification in MTL (xt0 |= φ) to a set of mixed integer linear
constraints Fφ (x, z, u, t). At the end, we add the constraint
P0φ = 1, i.e. the overall specification φ is satisfied. Since
Boolean variables are only introduced when halfspaces are
defined, the computation cost of MILP is at most exponential
to the number of halfspaces times the discrete steps N .
IV. C ASE S TUDY AND D ISCUSSION
Pτp
τ =t+t1
•
=
t+t
_2
j=t+t1
The disjunction operator, φ = ∨m
i=1 pi , is modeled as
Ptφ ≥ Ptpi , i = 1, ..., m,
m
X
Ptφ ≤
Ptpi ,
The until formulation (11) is obtained similarly to [13]. For
MTL, it is modified by noticing the following equality,
Ptφ
i=1
•
Fig. 1. Workspace setup of the first test case. Blue area represents an
obstacle moving from right to left. Grey areas represent static obstacles.
Green areas represent survey areas used in the temporal logic. The shaded
areas around obstacles represent boundary of the obstacles for discrete
planning, so that the obstacles can be avoided even for continuous dynamics.
The resulting 2D trajectory of the quadrotor for φ1 is shown as blue dots.
The resulting motion is counter clockwise.
j ∈ {t + t1 , · · · , t + t2 },
k ∈ {t, · · · , j − 1}, j ∈ {t + t1 , · · · , t + t2 },
We apply our method for solving mission planning with
finite time constraints on two different workspaces. Both
workspaces contain static and moving obstacles.The experiments are run through YALMIP-CPLEX on a computer
with 3.4GHz processor and 8GB memory. We performed the
simulation for both a quadrotor model and a car model.
The first environment is the one shown in Fig. 1, where
blue and gray areas represent moving and static obstacles
respectively, and green areas represent survey targets.
Let the temporal specification be the following
φ1 = ♦[0,2] A ∧ ♦[0,2] B ∧ ♦[0,2] C ∧ ¬O
φ2 = ♦[0,2] A ∧ ♦[0,2] B ∧ ♦[0,2] C ∧ ¬O ∧ ¬B U[0,N ] A
Ppk − (j − t) j ∈ {t + t1 , · · · , t + t2 }, where O represents the static and moving obstacles, N is the
k=t
horizon of the planning trajectory. Such N can be generally
t+t
2
X
obtained by performing a feasibility test using MILP solver
Ptφ ≤
atj ,
(11)
starting from N = 2, and increasing N until finding a
j=t+t1
feasible one. For the purpose of comparing different temporal
Ptφ ≥ atj j ∈ {t + t1 , · · · , t + t2 }.
constraints, we choose a feasible horizon N = 50 for both
atj ≥ Pqj +
j−1
X
Fig. 2. Time-state-space representation of the environment and resulting
trajectory for the quadrotor with temporal constraints φ1 . The vehicle starts
from (0.5,0.5) and surveys area b, c and a sequentially.
Fig. 3. Time-state-space representation of the environment and resulting
trajectory for the quadrotor with temporal constraints φ2 . Because of the
additional ordering requirement, the vehicle covers area a first before visiting
area b.
MTL specifications φ1 and φ2 . The specification φ1 requires
the vehicle to visit areas A, B and C eventually and stay
there for at least 2 time units, while avoiding obstacles O.
φ2 adds an additional requirement on the ordering between A
and B, so that region A has to be visited first.
PN We consider
the cost function, J, to be minimized is t=0 |u(t)|. The
dynamics of the vehicles are discretized at a rate of 2Hz.
The resulting trajectory for the quadrotor with temporal
specification φ1 is plotted in time-state-space in Fig. 2. The
projection of the trajectory on the workspace is shown in
Fig. 1. The motion of the quadrotor in Fig. 1 is counter
clockwise. The quadrotor safely avoids the moving obstacle
by navigating through the area after the obstacle passes.
The survey duration in individual area also satisfies the
requirements as shown in Fig. 1. The quadrotor stays within
each survey area for 5 discrete time units which is equivalent
to 2s duration. These plots show a better realization of
visiting individual areas comparing to [13] and [14]. In their
results, trajectory visits targeted areas for only 1 discrete
time unit which is not desired for most surveillance tasks.
Additional local planning is possible to generate a sweeping
pattern so that the target areas can be covered by onboard
sensors in designed durations.
The resulting trajectory for the vehicle with specification
φ2 is shown in time-state-space in Fig. 3. As can be verified
from the trajectory, the vehicle travels first to area A before
Fig. 4. Time-state-space representation of the environment and resulting
trajectory for the car model with temporal constraints φ1 . The result for φ2
is similar since the optimal solution for φ1 already goes through area A
first.
Fig. 5. Workspace setup of the second test case. The moving obstacle
moves from the the bottom left corner to upper right corner. 2D trajectory
of the vehicle is shown as blue dots. The resulting motion is clockwise.
visiting B as specified. The CPLEX solver returns the
solution for the first trajectory in 20.8 sec while the second
one takes 34.7 sec. The additional continuous variables used
in the until encoding have large influence in the performance.
One of the possible future research directions would be
finding different encoding of the until operator to improve
the speed of the algorithm.
The result of specification φ1 for the car model is shown
in Fig. 4, where the small blue arrow associated with each
blue dot indicates the instantaneous heading of the vehicle.
The computation time is 150s. The longer computation time
is caused by the additional binary variables introduced by
the linearization of the dynamics at various heading angles.
The second environment considers a fast moving obstacle
that moves across the workspace diagonally, and hence the
vehicle has to adjust its motion accordingly. The environment
is shown in Fig 5. Similar to the previous example, it shows
the motion of the moving obstacle, static obstacles and
survey areas.
The temporal logic specifications are similar to the previous one but have an additional area to be visited. We also
tested the case when certain area has to be visited first. The
result is similar to previous cases, so we only show the plots
Fig. 6. Time-state-space representation of the environment and resulting
trajectory for the quadrotor with temporal constraints φ3 . The planned
trajectory is very close to the dynamic obstacles.
problem as a Linear Programming problem. We have considered polygonal environments for our case studies, but if the
environment is not polygonal, one can approximate it with a
polygonal environment. We have used a binary variable (z)
with each halfspace, so if the polygonal approximation of
the environment contains too many halfspaces, the problem
would be complex.
Due to space constraints, we have reported the case studies
only for quadrotor and car dynamics. The simulation results
show promising performance of our approach to find an
optimal solution. We consider dynamic but deterministic environments and uncertainties in the dynamics of the robot are
also not considered. There are many possible directions such
as planning in uncertain environment, stochastic dynamics of
the robots or multi-robot cooperative planning that one might
consider as an extension of this framework.
R EFERENCES
Fig. 7. Time-state-space representation of the environment and resulting
trajectory for the car model with temporal constraints φ3 . The result for φ4
is the same since the optimal solution already goes through A first.
for φ3 .
φ3 = ♦[0,2] A ∧ ♦[0,2] B ∧ ♦[0,2] C ∧ ♦[0,2] D ∧ ¬O
The resulting trajectory in time-state-space for the quadrotor with temporal specification φ3 is plotted in Fig. 6. The
projected trajectory on the workspace of the robot is shown
in Fig. 5. The motion of the vehicle is clockwise in Fig.
5. As can be seen from Fig. 6, the quadrotor safely avoids
the moving obstacle and the static ones nearby. The survey
duration in individual area also satisfies the requirements
as shown in Fig. 5. The computation time is 138.8s. The
increase in computation time is because the complex environment introduces more binary variables.
The result of specification φ3 for the car model is shown
in Fig. 7, where the blue arrows indicate the heading of the
vehicle. The computation time is 500s.
V. C ONCLUSION
In this paper, we have presented an optimization based
approach to plan the trajectory of a robot in a dynamic
environment to perform some temporal task with finite time
constraints. Our approach is simple in the sense that it
translates the time constraints and the temporal specifications
as linear constraints on the state and input variables. We have
linearized the dynamics of the robot in order to formulate the
[1] J. Latombe, Robot motion planning, ser. Kluwer international series
in engineering and computer science. Boston: Kluwer Academic
Publishers, 1991.
[2] S. M. LaValle, Planning algorithms. Cambridge university press,
2006.
[3] H. M. Choset, Principles of robot motion: theory, algorithms, and
implementation. MIT press, 2005.
[4] W. Xi, X. Tan, and J. S. Baras, “A hybrid scheme for distributed control
of autonomous swarms,” in Proceedings of the 2005 American Control
Conference. IEEE, 2005, pp. 3486–3491.
[5] R. Sharma, “Locally efficient path planning in an uncertain, dynamic
environment using a probabilistic model,” Robotics and Automation,
IEEE Transactions on, vol. 8, no. 1, pp. 105–110, 1992.
[6] S. M. LaValle and R. Sharma, “On motion planning in changing, partially predictable environments,” The International Journal of Robotics
Research, vol. 16, no. 6, pp. 775–805, 1997.
[7] C. Baier, J.-P. Katoen et al., Principles of model checking. MIT press
Cambridge, 2008, vol. 26202649.
[8] E. M. Clarke, O. Grumberg, and D. Peled, Model checking. MIT
press, 1999.
[9] M. M. Quottrup, T. Bak, and R. Zamanabadi, “Multi-robot planning:
A timed automata approach,” in Robotics and Automation, 2004.
Proceedings. ICRA’04. 2004 IEEE International Conference on, vol. 5.
IEEE, 2004, pp. 4417–4422.
[10] H. Kress-Gazit, G. E. Fainekos, and G. J. Pappas, “Temporal-logicbased reactive mission and motion planning,” IEEE Transactions on
Robotics, vol. 25, no. 6, pp. 1370–1381, 2009.
[11] R. Koymans, “Specifying real-time properties with metric temporal
logic,” Real-time systems, vol. 2, no. 4, pp. 255–299, 1990.
[12] J. Ouaknine and J. Worrell, “Some recent results in metric temporal
logic,” in Formal Modeling and Analysis of Timed Systems. Springer,
2008, pp. 1–13.
[13] S. Karaman, R. G. Sanfelice, and E. Frazzoli, “Optimal control of
mixed logical dynamical systems with linear temporal logic specifications,” in 47th IEEE Conference on Decision and Control. IEEE,
2008, pp. 2117–2122.
[14] E. M. Wolff, U. Topcu, and R. M. Murray, “Optimization-based
trajectory generation with linear temporal logic specifications,” in Int.
Conf. on Robotics and Automation, 2014.
[15] S. Karaman and E. Frazzoli, “Vehicle routing problem with metric
temporal logic specifications,” in Decision and Control, 2008. CDC
2008. 47th IEEE Conference on. IEEE, 2008, pp. 3953–3958.
[16] N. Michael, D. Mellinger, Q. Lindsey, and V. Kumar, “The grasp
multiple micro-uav testbed,” IEEE Robotics & Automation Magazine,
vol. 17, no. 3, pp. 56–65, 2010.
[17] L. R. Garcı́a Carrillo, A. E. Dzul López, R. Lozano, and C. Pégard,
“Modeling the quad-rotor mini-rotorcraft,” Quad Rotorcraft Control,
pp. 23–34, 2013.
[18] D. J. Webb and J. van den Berg, “Kinodynamic rrt*: Asymptotically
optimal motion planning for robots with linear dynamics,” in 2013
IEEE International Conference on Robotics and Automation (ICRA).
IEEE, 2013, pp. 5054–5061.
| 3cs.SY
|
arXiv:1710.11087v1 [cs.CV] 30 Oct 2017
An Integrated Approach to Crowd Video Analysis: From Tracking to Multi-level
Activity Recognition
Neha Bhargava
Indian Institute of Technology Bombay
India
Subhasis Chaudhuri
Indian Institute of Technology Bombay
India
[email protected]
[email protected]
Abstract
priate to estimate them together instead of sequentially. See
Figure 1 as an example of this hierarchical structure where
the atomic actions of the individuals are all standing, there
are two groups each with group activity as talking and thus
leading to the collective activity also as talking. These inherent dependencies among the various components motivate us to explore this idea of simultaneous recognition of
tracks, groups and activities. We propose a novel approach
to build on the detections to obtain the tracks, groups and
activities in a causal framework, i.e. without considering
future frames into estimation process. We solve this unified
problem in two passes. The first pass consists of finding the
graph structure that corresponds to the track association and
group detection. We propose an linear programming based
formulation for the same. The second pass involves activity
recognition at various levels of granularity. We formulate
this problem under the structured SVM formulation [29].
We present an integrated framework for simultaneous
tracking, group detection and multi-level activity recognition in crowd videos. Instead of solving these problems independently and sequentially, we solve them together in a
unified framework to utilize the strong correlation that exists among individual motion, groups and activities. We explore the hierarchical structure hidden in the video that connects individuals over time to produce tracks, connects individuals to form groups and also connects groups together to
form a crowd. We show that estimation of this hidden structure corresponds to track association and group detection.
We estimate this hidden structure under a linear programming formulation. The obtained graphical representation
is further explored to recognize the node values that corresponds to multi-level activity recognition. This problem
is solved under a structured SVM framework. The results
on publicly available dataset show very competitive performance at all levels of granularity with the state-of-the-art
batch processing methods despite the proposed technique
being an online (causal) one.
1. Introduction
A crowd video analysis system first detects the individuals and then tracks them over time. These tracks are used
for higher level applications such as group detection and
activity recognition. This approach is sequential in nature
whereas the various components of the system are highly
correlated and influence each other. For example, a particular group activity motivates its group member for a particular action and all the groups together define the crowd
activity. On the other hand, group behavior is influenced
by its members and the overall crowd behavior. Effectively,
these components - individual’s motion, groups, group activity and collective activity are correlated and can be expressed in a hierarchical structure. Hence it is more appro-
Figure 1. Illustration of hierarchical structure present in a video.
It represents video in terms of atomic actions, groups, group activities and collective activity. There are 6 individuals who are
standing and forming two groups with group activities as talking
and hence the collective activity is also talking.
In this paper, the term action refers to an atomic movement performed by a single person, the term group activity denotes an activity performed by a group and collective
activity refers to the activity performed by all the groups
collectively. The paper is organized as follows. The next
section discusses the related work followed by our contri1
(a)
(b)
Figure 2. (a). Graphical representation showing the hierarchical structure present in a video. The first layer Tk−1 and second layer dk are
fully connected since the track association is unknown until estimated. The third layer corresponds to the actions hk associated with the
detections. The third and fourth layers are again fully connected since the group association is unknown. The final layer corresponds to the
connection between the overall activity and the group activities. (b). The figure shows a possible graphical structure obtained after track
association and group detection. xi , xg and x0 are the respective features for a person, group and collectively that are derived from the
video frames and to be used for activity recognition.
butions. The proposed model is described in Section 3. The
subsequent Sections 4, 5 and 6 elaborate on frameworks for
multi-target tracking with group detection followed by activity recognition. Experimentation details are provided in
Section 7 and the paper concludes in Section 8.
[2, 3, 7, 13, 14]. Amer et al. in [2] proposed a hierarchical
random field based modeling of higher order temporal dependencies of video features. Lan et al. in [14] jointly estimate actions, pairwise interactions and group activity. However, they assume the availability of action labels and they
do not handle track association. Choi and Savarese in [7]
proposed a hierarchical model and combine the problems
of tracklet association and multi-level activity recognition
(action, pairwise interaction and collective). All these methods either assumed availability of action label or trackelets
whereas our proposed framework requires only detections.
2. Related work
The task of multi-target tracking (MTT) is to correctly
associate all the detections (or tracklets) corresponding to
each individual. Linear programming (LP) based global
optimization for MTT is a popular approach. Many approaches formulate MTT either as min-cost flow optimization problem or MAP and use LP to find the global optimum. [4, 6, 9, 20, 35]. Recently, the approaches of utilizing social behavior to improve tracking are gaining attention [5, 15, 19, 22, 34]. The idea is to simultaneously associate a detection to a track and to a group. Our approach for
obtaining groups is similar to that of [22] where they combine track association with grouping under a LP framework.
Since the number of groups K is unknown, they run the algorithm with all possible values of K with a linear penalty.
Our proposed method exploits the group information from
the previous time instant and does not require to run for all
values of K resulting in a fast convergence.
Due to its various applications in video surveillance, activity recognition has been an active area of research. The
survey on action and activity recognition can be found in
[21, 30, 32]. There are many works dealing with single
person action [12, 17, 18, 26, 31] and with single group activity recognition [8, 11, 16, 24, 25]. Recently, researchers
have started exploring the problem of joint recognition of
these actions and activities under a hierarchical framework
Our work in this paper advances the existing approaches
and add one more intermediate layer (i.e. grouping layer) in
the hierarchy as shown in Figure 2a and explained in Section 3. The main contributions of this work are as follows:
1. We propose a hierarchical graphical structure that
combines multi-target tracking, group detection and
activity recognition under an unified framework.
2. We built a causal framework that takes only human
detections as an input and outputs tracks, groups and
activities at each time step.
3. We propose an iterative linear programming based
method for simultaneous track association and group
detection.
4. We propose an approach for simultaneous recognition
of activities at various levels of granularity under a
structured SVM framework.
5. To make it suitable for real-time applications, we provide a fast algorithm for both training and inferencing.
2
3. The Proposed Model
nition (Eq. 3). i.e.
In this section, we discuss the proposed model. Let
yk ∈ Y be the collective activity at time k with group activity vector gk = [g1k , g2k , ..., gmk ] where gik ∈ G is the
activity of ith group and m be the number of groups present
at time instant k. The atomic activity vector is denoted as
hk = [h1k , h2k , ..., hkN ] with hik ∈ H as the atomic activity of the ith person and N is the total number of persons
present at time k. Let Tk−1 denotes the estimated tracks
available till time k − 1 and Gk be the group label vector
of length N where its ith entry denotes the group label for
the ith detection at time k. Let dk denotes the detections
at time k. By a detection, we mean a person’s location in
the form of a bounding box. Now the problem statement
is as follows: Given the detections dk and tracks Tk−1 at
time k, the goals are (a) to associate these detections dk to
the appropriate tracks in Tk−1 to get Tk , (b) identify the
group label vector Gk and (c) recognize the atomic, group
and collective activities (hk , gk , yk ). Let zk = [yk , gk , hk ]
be the activity vector for notational convenience. The problem is formulated under the score maximization framework
with a linear function as,
z∗k , G∗k , T∗k
= arg
G∗k , T∗k = arg max w1 T Φ1 (Gk , Tk ; dk , Tk−1 , zk−1 )
Gk ,Tk
(2)
z∗k = arg max w2 T Φ2 (zk ; Tk , Gk , zk−1 ).
zk
(3)
The next two sections discuss these two sub problems in
detail.
4. Multi target tracking (MTT) and group detection
We estimate the tracks and groups together under a linear programming framework. Let N number of detections
and Ng (unknown) number of groups be present at time k.
Let Tk−1 be a set of T trajectories present at k − 1. We define Ψ ∈ {0, 1}N ×T as the track association matrix where
Ψij = 1 indicates association of the ith detection with the
j th track. We also define Ω ∈ {0, 1}N ×Ng as the group
association matrix where Ωil = 1 indicates that the ith
detection belongs to the lth group. Then the optimization
equation to estimate Ψ and Ω is as follows:
Ψ∗ , Ω∗ = arg max
T
max w Φ(zk , Gk , Tk ; dk , Tk−1 ).
Ψ,Ω
zk ,Gk ,Tk
(1)
N X
T
X
Ψij Mij +λ
i=1 j=1
Ng
N X
X
Ωil Cil (4)
i=1 l=1
s.t.
The problem is illustrated as a graphical model in Figure 2a. There are N detections with an unknown number
Ng of groups at time k. Tik−1 denotes the ith track available at time k − 1. The root node denotes the collective
activity which is connected to the group activity nodes. The
group activity nodes are also connected to the atomic activity nodes of the group members. The graph emphasizes that
collective activity is related to the group activities while a
group activity is correlated both with its members’ actions
and the collective activity of the scene. Since the track association (Tk−1 ↔ dk ) and group information (hi ↔ gj )
are unknown - (a) every node Tik−1 is connected to all the
detection nodes and (b) each node of the action layer is
connected to all the group activity nodes as shown in Figure 2a. Once we know the track association and group labels, the corresponding graph structure is known. One possible graph structure corresponding to Figure 2a is shown
in Figure 2b. Here xi , xg and x0 are the respective observations for a person, group and collective entity defining
the video. The procedure to obtain these observations are
discussed later.
Ψij , Ωij ∈ {0, 1},
Ng
X
Ωil ≤ 1 ∀i,
j=1
N
X
Ψij ≤ 1 ∀j,
i=1
T
X
Ψij ≤ 1 ∀i,
(5)
j=1
where λ ∈ R+ is a weighing factor that decides the balancing between the group association and track association
scores. Mij ∈ [−1, 1] is the compatibility score of the ith
detection with the j th track based on motion and visual similarity, and Cil ∈ [−1, 1] is the compatibility score for the
ith detection with the lth group based on motion, spatial
and pose compatibility. The constraints in Eq. 5 ensure that
each detection is assigned to at most one track and to one
group. It also ensures that each track gets at most one detection while there is no such constraint for the group. The
next sub-sections discuss the construction of compatibility
matrices M and C.
4.1. Construction of M
We break this complete problem in two sub problems (a) Graph structure estimation: This corresponds to track
association and group detection (Eq. 2), and (b) Node value
estimation: This corresponds to multi-level activity recog-
M ∈ RN ×T is a score matrix for track association where
Mij is the score of assigning ith track to the j th detection.
It is calculated based on visual similarity, spatial proximity
3
and the motion compatibility between the ith detection with
the j th track.
The visual similarity score is based on color histogram
matching of the j th detection with that at the last location
of the ith track. The spatial proximity is the measure of
closeness of the j th detection from the ith track. Lastly, the
motion compatibility is based on the velocity consistency
when the j th detection is added to the ith track. By combining these three scores, we obtain
Mij =
3
X
(n)
αn (2e−βn ||xi
(n)
−xj
||22
− 1),
Figure 3. (a) Illustration of score calculation for pose compatibility between a candidate group and a detection. In the figure, (p1, p2, p3) form a group with group’s FoV as ABCDE.
F IDE and GHIF are FoVs of detections q1 and q2 respecIDE
tively. Therefore S(q1, (p1, p2, p3)) = ABCDE∩F
= 1
ABCDE
while S(q2, (p1, p2, p3)) = ABCDE∩GHIF
=
0.
(b)
Illustration
ABCDE
of field of view (FoV) for a person. The arrow signifies the pose
direction. The boundary rectangle corresponds to the observed
image. Best viewd in color.
(6)
n=1
where α and β are the weight and normalizing vectors respectively. x(1) represents color histogram, x(2) is the location and x(3) is the velocity estimate. We keep αn = 31 ,
β1 = 1 and β3 = 1 in the experiments. β2 is chosen as the
inverse of height of the bounding box.
4.2. Construction of C
from the previous time instant k − 1 to get an initial estimate of C for the present detections. Then we solve Eq. 4
to get the optimal Ω. If any row (say ith ) of Ω consists of
all zeros, it indicates that ith detection does not belong to
any of the groups. In such a case, we add one more group
to the list with ith detection as its founding member and
again solve for Eq. 4. We iteratively do this until we get
group assignment for all the detections. Also, to discourage
formation of singleton groups (with one member) , we remove such groups before the start of the iterative algorithm
at each frame. To initialize in the first frame of the video,
we consider Ng = 1 i.e. all the detections belong to a single group. This iterative method is detailed in Algorithm 1.
The algorithm is found to converge within a few iterations
only. In the worst case when all the detections form singleton groups and different from the groups present at previous
time instant, the algorithm takes N number of iterations.
C ∈ RN ×Ng is a score matrix for group association
where Cil is the score of assigning the ith detection to the
lth group. It is calculated based on the motion similarity,
spatial closeness and the pose compatibility between the ith
detection and the lth group. The group location and group
velocity are defined as the averages over the locations and
velocities of the members, respectively. To compute motion
similarity between ith detection and lth group, we first find
the track associated with the ith detection from Ψ. We then
compute the velocity compatibility between the obtained
track with the lth group. To obtain pose compatibility, we
first calculate the interacting zone of the group formed by
the members. The normalized intersection of the field of vision of the detection with the group’s interacting zone gives
the score for the pose compatibility. This is illustrated in
Figure 3. Let p1, p2 and p3 form a group and q1, q2 are the
detections. We define field of view (FoV) for a person as
the complete area in the pose direction as illustrated in Figure 3(b). The pose compatibility between a detection d and
oV (d)
a group ḡ is defined as S(d, ḡ) = F oV F(ḡ)∩F
, where
oV (ḡ)
F oV (ḡ) is the intersection of FoVs of the group members.
In Figure 3, q1 has high compatibility score while q2 has
zero score since it has no intersection. The pose compatibility is added to discourage the non-facing persons forming a
group. Finally, we combine the three scores obtained from
motion, spatial and pose compatibilities to construct C as
done previously for M .
Algorithm 1 Algorithm to obtain Ψ and Ω
1: procedure
2:
t=0, Gtk = Gk−1
3:
Solve Eq. 4 to get Ψ∗ and Ω∗
4:
d = set of detections without any group assignment
5:
while d is non-empty do
• Add one column to Ω∗ with one of the detections
from d
• Solve Eq. 4 to get Ψ∗ and Ω∗
• Update Gtk and id
• t←t+1
6:
return Gtk , Ψ∗ and Ω∗
end
4.3. Iterative algorithm to obtain Ψ and Ω
Since the group information is initially unknown at time
k, we do not know the score matrix for group association
i.e. C. Hence, we propose an iterative algorithm to construct C and to solve Eq. 4. We use the group information
4
5. Activity recognition
4. Group Activity Potential:
wT3 φ3 (g, H(hg )) defines the compatibility of atomic
activities of the group members with the group activity.
It is modeled as
X
wT3 φ2 (g, H(hg )) =
wT3b 1(g = b)H(hg ), (12)
Solution of Eq. 4 gives an estimate of the latent graph
structure (e.g. Figure 2b). The next problem is to estimate
the optimal node values of this graph structure at all time
instants causally. In other words, the aim is to recognize the
activities at individual, group and collective levels.
The problem is cast under a linear energy function
framework as
Φ(y, g, h, x) = wT φ(y, g, h, x),
b∈G
where H(hg ) is the histogram of atomic activities of
the group members.
(7)
5. Atomic Action - Image Potential:
wT4 φ4 (hi , xi ) defines the compatibility of the individual’s observation with the atomic activity and modeled
as
X
wT4 φ4 (hi , xi ) =
wT4c 1(hi = c)xi .
(13)
where φ calculates the compatibility of activities (y, h, g)
and the observations x = {x0 , xg , xi }. We follow the motivation of [7] to solve the problem. As said before, x contains individual, group and collective features which are obtained once Tk and Gk are known. We take advantage of
hierarchical structure and decompose Φ(y, g, h, x) according to the graph Figure 2b as follows:
Φ(y, g, h, x) =
+
Ng
P
wT0 φ0 (y, x0 )
Ng
P
wT2 φ2 (gi , xgi ) +
i=1
+
c∈H
6. Inference and Learning for activity recognition
wT1 φ1 (y, H(g))
In this section, we discuss the learning and inference algorithms. Given a graph structure at any time instant k (i.e
Tk and Gk ), we need to recognize the activities at all levels.
Solution of Eq. 7 provides the inference about the unknown
node variables (y, g, h). We use the structured SVM framework [10] to learn w, and an iterative alternate optimization
method for the inference. The next two subsections discuss
both these algorithms in detail.
wT3 φ3 (gi , H(hgi ))
i=1
+wT4
N
P
φ4 (hi , xi ),
(8)
i=1
where w
=
[w0 , w1 , w2 , w3 , w4 ] and φ
[φ0 , φ1 , φ2 , φ3 , φ4 ]. Each term is described as follows:
=
1. Collective Activity - Image Potential:
It is the compatibility score of collective activity y ∈ Y
with the collective observation x0 . It is modeled as
X
wT0 φ0 (y, x0 ) =
wT0a 1(y = a)x0 ,
(9)
6.1. Inference
Given the learned model parameters w, the inference
problem is to find the optimal collective activity y ∗ , group
activity vector g∗ and atomic activity vector h∗ for the input
x. i.e.
a∈Y
where w0 = [w01 , w02 , ..., w0|Y| ] and 1(:) is an indicator function.
y ∗ , g∗ , h∗ = arg max wT φ(y, g, h, x).
y,g,h
2. Collective - Group Activity Potential:
wT1 φ1 (y, g) is the compatibility of group activities g
with the collective activity y and defined as
X
wT1 φ1 (y, H(g)) =
wT1a 1(y = a)H(g), (10)
We use an iterative method to solve Eq. 14. We initialize y, g and h with the values in the previous time step if
available or random otherwise. The method is detailed in
Algorithm 2.
6.2. Learning
a∈Y
Given a training data D = {xi , Gi , hi , gi , y i } ∀{i =
1, 2, ..., S} where S is the total number of training samples and Gi is the group label vector, the goal is to learn
the optimal weight vector w∗ . We use 1-Slack structured
SVM with margin-rescaling [10] where there is only a single slack variable ξ for all the constraints. Let us define
zi = [hi , gi , y i ] to simplify the notations. The optimization
equation is as follows:
where H(g) is the histogram of group activities.
3. Group Activity - Image Potential:
wT2 φ2 (g, xg ) defines the compatibility of group activity g ∈ G with the group observation xg as
wT2 φ2 (g, xg ) =
X
wT2b 1(g = b)xg .
(14)
(11)
b∈G
5
Algorithm 2 Inference algorithm
1: procedure I NFERENCE
2:
Initialize y 0 , g0 , h0
3:
t=0, err=1000 , = 0.01
4:
while err > do
5:
y t+1 ← arg max{wT0 φ0 (y, x0 ) + wT1 φ1 (y, H(gt ))}
y
6:
git+1 ← arg max{wT1 φ1 (y t+1 , H(gt \git , g)) + wT2 φ2 (gi , xg ) + wT3 φ3 (g, H(htg )}, ∀i = 1 : Ng
7:
ht+1
← arg max{wT3 φ3 (gjt+1 , H(ht \hti , h)) + wT4 φ4 (xi , h)}, ∀i = 1 : N , j: group index of ith person
i
g
h
err ← 1+N1+Ng {1(y t 6= y t+1 ) + 1(gt 6= gt+1 ) + 1(ht 6= ht+1 )}
t←t+1
10:
return y t , gt and ht
end
8:
9:
w∗ = arg min 12 ||w||22 + Dξ
w
talking) and 8 poses (right, right-front, ..., etc.) are provided. Additionally, the authors of [7] have provided annotations for target correspondence, atomic action labels
(standing, walking) and 8 pairwise interaction labels. Since
we are interested in finding groups and group activities instead of pair-wise interactions, we provide annotations for
group labels and group activities (walking, waiting, queuing
and talking) after every 10 frames. We consider collective
activity as the major activity happening at a time. For example - if out of 5 groups, 3 or 4 groups are talking and one is
walking, we consider the overall activity as talking. Moreover, we differ in the definition of crossing from that mentioned in [7]. In this paper, we consider crossing happens
when two or more groups cross each other on the contrary
to road crossing used in [7]. We have re-annotated crossing
videos accordingly.
As is common in most feature tracking methods, we preprocess the videos for image stabilization. To do this, we
use a time window of 20 frames where the 1st frame acts
as the reference frame. The camera motion is compensated
in the subsequent frames with respect to it by estimating an
affine transformation between the reference frame and the
k th frame.
(15)
s.t. ∀zi :
S
S
1X
1 TX
∆(zi , z̄i ) − ξ. (16)
w
[φ(xi , zi ) − φ(xi , z̄i )] ≥
S
S
i=1
i=1
The loss function ∆(z̄, zi ) is defined as
|z|
∆(z̄, zi ) =
1 X
1(z̄j 6= zji ),
|z| j=1
(17)
where z̄ is any possible combination and zi is the actual
output corresponding to the ith input.
Since the number of constraints grows exponentially
with S, the cutting plane algorithm [10] constructs a set
of working constraints and optimize the function over this
set. This set is constructed by identifying the most violated
constraint for each data sample (xi , zi ) at each iteration.
Finding the most violated constraint for (xi , zi ) is again an
optimization problem and is as follows:
ẑi = arg max wT φ(z, xi ) + ∆(z, zi ).
z∈Z
7.2. Observations
(18)
The observations x consist of individual related features
xi , group level features xg and collective features x0 . The
individual observations xi ∈ R|P|×|H| include pose ∈ P
and action ∈ H. xg is the mean of the feature vectors of
the group members while x0 is the mean of feature vectors of all the individuals. Note that only pose and action
are not enough to discriminate between waiting and queue
since all the members possess the same pose and action. To
incorporate some discrimination, we additionally include a
pose-position compatibility to xg . The score is calculated
for all the pairs (i, j) of the group members and is defined
as |pT (di − dj )| where p is the pose vector corresponding
to the statistical mode of the member poses and di is the
This is same as our inference problem with an additional
term of ∆(z, zi ). We use the same method to solve this.
7. Discussions and Experiments
7.1. Dataset
We demonstrate the performance of the proposed
method on the commonly used collective activity dataset
provided in [7]. The dataset has 44 video clips composed
of different challenging videos. The annotations for 5 collective activities (crossing, waiting, queuing, walking, and
6
position of the ith member. Higher value of the score corresponds to queue since both the vectors are aligned in the
same direction while waiting will have a low value because
both the vectors are orthogonal to each other. This is illustrated in Figure 4. We append the mean value of the score
values obtained for all the pairs of the group to xg .
model indicates the effectiveness of combined estimation of
groups and tracks over independent track association.
Table 1. Table showing tracking performance
Baseline model Full model
ID Switches
22 (4.5%)
17 (3.7%)
7.4. Group detection performance
(a) Waiting
To evaluate the group detection performance, we use the
following clustering measures which are commonly used:
Purity [1], Rand Index [23] and Normalized mutual information (NMI) [33]. We compare with a baseline case
present within our framework which corresponds to group
association (second part of Eq. 4). The full model incorporates both track association and group association. The
quantitative results are given in Table 2.
(b) Queue
Figure 4. Illustration of pose-position compatibility score. The
arrows for p1 and p2 indicate their pose directions. Basic setup in
case of waiting and queue to be utilized to discriminate between
them. (a) In case of waiting, the persons p1 and p2 are standing
side by side, thereby creating a right angle between position vector
(p1-p2) with pose vector. (b) In case of queue, the persons p1 and
p2 are one after another and hence the position vector is aligned
with pose vector.
Table 2. Table showing group detection performance
Framework Purity Rand Index NMI
Baseline
0.82
0.75
0.65
Full
0.89
0.81
0.72
To learn a pose classifier, we fine-tune all the 19 layers
of the VGG [27] network on PARSE-27k [28] pedestrian
attribute dataset comprised of 27 thousand labeled training
images. To account for inherent order in poses, we modify cross entropy loss by penalizing misclassification. The
penalty is less for predicting nearby pose and high otherwise; For example, the penalty is less if the classifier predicts Right-Front for the true pose of Right while the penalty
is high if the prediction is Left.
We employ the following procedure to estimate action.
We fit lines separately on the x and y coordinates of the topleft and bottom right of the bounding box as a function of
time over 20 frames and use the estimated slopes to learn a
SVM classifier for atomic action classification. The reason
for considering both top-left and bottom right coordinates
of the bounding box is to capture the possible movement
along the viewing direction of the camera (i.e. effect of approaching and receding).
Again, the higher values of the clustering measures in the
full model indicates the effectiveness of combined estimation of groups and tracks over independent group detection.
7.5. Activity recognition performance
We compare the collective activity results with [2], [14],
[8] and [7] in the Table 3. To ensure a fair comparison with
[2] and [14], we divide the dataset into separate training and
testing sets as suggested by them. We use leave-one-videoout method to compare with [8] as suggested. To compare
with [7], we use four fold setup with the splits mentioned
by [7]. The Figure 5 compares the confusion table of the
proposed framework with that of [7]. To find the accuracy
for the group activity, we first identify the correctly detected
groups and estimate accuracy for group activity on these
groups. The confusion tables for group activity and atomic
action are also given in Figure 5.
7.3. Tracking performance
We assume that the detections per frame are available to
us. We do not handle occlusion in this paper. Whenever
any target returns back to the scene after occlusion, a new
id is assigned to it. To evaluate the tracking performance,
we consider the number of identity switches. We compare
the tracking results with a baseline model present in our
framework. It corresponds to the track association based
on visual, spatial and velocity compatibility (first part of
Eq. 4) only. The full model incorporates both track association and group association. The number of ID switches are
given in Table 1. The total number of tracks in the dataset is
466. The decrease in the number of ID switches in the full
Table 3. Comparison of overall and mean accuracies
Accuracy [2] / [14] / Ours
[8] / Ours
[7] / Ours
Overall
79.7 81.1 74.4 79.1 76.3
Mean
92.0 78.4 80.5 70.9 75.7 79.9 76.2
Class
Form the Table 3, we notice that the proposed method
offers a better accuracy than the methods [14] and [8], and
is marginally inferior to [7]. However, all these methods assume availability of either tracklets or action labels whereas
our method only needs the detections. Further, all these
7
Cross 61.30% 9.50% 2.80% 2.00% 24.50%
Cross 78.63% 5.34% 0.00% 0.00% 16.03%
Wait 2.40% 82.90% 4.40% 2.40% 7.80%
Wait 7.67% 76.99% 13.70% 1.37% 0.27%
Queue 4.60% 0.00% 95.40% 0.00% 0.00%
Queue 8.21% 7.73% 77.54% 5.56% 0.97%
Talk 0.00% 0.00% 0.00% 94.90% 5.10%
Talk 5.01% 4.33% 18.22% 72.21% 0.23%
Walk 29.00% 4.80% 1.20% 0.00% 65.10%
Walk 23.14% 1.33% 0.00% 0.00% 75.53%
Cross
Wait
Queue
Talk
Walk
Cross
(a)
Wait
Queue
Talk
Walk
Walk 85.21%
14.43%
0.31%
0.05%
Wait 14.06%
73.48%
9.27%
3.19%
Queue 8.08%
18.46%
66.54%
6.92%
Talk 9.14%
14.52%
11.29%
65.05%
Wait
Queue
Talk
Walk
(b)
(c)
Walk
90.12%
9.88%
Stand
14.72%
85.28%
Walk
Stand
(d)
Figure 5. (a) Confusion matrix for collective activity y from [7]. (b), (c), (d) Confusion matrices for collective activity, group activity and
atomic action respectively form the proposed method.
(a) Two crossing groups
(b) Two waiting groups
(c) A group in a queue
(d) Two talking groups
(e) Two walking groups
(f) Two crossing groups
(g) A waiting group
(h) A group in a queue
(i) A talking group
(j) Three walking groups
Figure 6. Qualitative results showing various collective and group activities. Collective activities column-wise: ’cross’, ’wait’, ’queue’,
’talk’, and ’walk’. A group is represented by a same color. Best viewed in color and when zoomed.
methods are non-causal in nature and involve batch processing of data unlike the proposed method. Additionally,
we provide results at all levels of granularity (individual,
group and collective). Figure 6 shows some qualitative results for group detection, group activity and collective activity. The members forming a group are represented by
the same color. For example, Figure 6(a) has two groups
which are correctly identified as crossing each other. Hence
the group activity for both the groups is walking while the
collective activity is crossing.
8. Conclusions
7.6. Computational Performance
References
In this paper, we have proposed a novel approach for
video understanding at various levels of granularity. We
have presented a linear programming based method for joint
estimation of tracks and groups. We have also proposed a
method to recognize activities at various levels - individual,
group and collective. The framework being causal in nature
and computationally efficient, it is amenable for real-time
implementation in video surveillance applications. The experiments show that the proposed method is very competitive with the state-of-the-art algorithms.
[1] C. C. Aggarwal. A human-computer interactive method for
projected clustering. IEEE Transactions on Knowledge and
Data Engineering, 16(4):448–460, 2004.
[2] M. R. Amer, P. Lei, and S. Todorovic. Hirf: Hierarchical
random field for collective activity recognition in videos. In
European Conference on Computer Vision, pages 572–585.
Springer, 2014.
[3] M. R. Amer, D. Xie, M. Zhao, S. Todorovic, and S.-C. Zhu.
Cost-sensitive top-down/bottom-up inference for multiscale
activity recognition. In European Conference on Computer
Vision, pages 187–200. Springer, 2012.
Towards our main aim of developing a real-time system capable of simultaneous tracking, group detection
and multi-level activity recognition, currently we achieve
around 3 fps with our unoptimized MATLAB code on a i7
machine with 3.50 GHz processor. With a proper implementation in GPU, we expect the frame rate to go up to 25
fps. To compare the computation time with one of the stateof-the-art algorithms, the method proposed in [2] takes 6
hours of training and 120 s per inference whereas our proposed method takes around 90 s and 0.3 s respectively.
8
[4] A. Andriyenko and K. Schindler. Globally optimal multitarget tracking on a hexagonal lattice. In European Conference on Computer Vision, pages 466–479. Springer, 2010.
[5] L. Bazzani, M. Zanotto, M. Cristani, and V. Murino. Joint
individual-group modeling for tracking. IEEE transactions
on pattern analysis and machine intelligence, 37(4):746–
759, 2015.
[6] J. Berclaz, F. Fleuret, E. Turetken, and P. Fua. Multiple
object tracking using k-shortest paths optimization. IEEE
transactions on pattern analysis and machine intelligence,
33(9):1806–1819, 2011.
[7] W. Choi and S. Savarese. A unified framework for multitarget tracking and collective activity recognition. In European Conference on Computer Vision, pages 215–230.
Springer, 2012.
[8] W. Choi, K. Shahid, and S. Savarese. Learning context for
collective activity recognition. In Computer Vision and Pattern Recognition (CVPR), 2011 IEEE Conference on, pages
3273–3280. IEEE, 2011.
[9] H. Jiang, S. Fels, and J. J. Little. A linear programming
approach for multiple object tracking. In Computer Vision
and Pattern Recognition, 2007. CVPR’07. IEEE Conference
on, pages 1–8. IEEE, 2007.
[10] T. Joachims, T. Finley, and C.-N. J. Yu. Cutting-plane training of structural svms. Machine Learning, 77(1):27–59,
2009.
[11] S. M. Khan and M. Shah. Detecting group activities using
rigidity of formation. In Proceedings of the 13th annual
ACM international conference on Multimedia, pages 403–
406. ACM, 2005.
[12] T. Lan, L. Sigal, and G. Mori. Social roles in hierarchical
models for human activity recognition. In Computer Vision
and Pattern Recognition (CVPR), 2012 IEEE Conference on,
pages 1354–1361. IEEE, 2012.
[13] T. Lan, Y. Wang, W. Yang, and G. Mori. Beyond actions:
Discriminative models for contextual group activities. In
Advances in neural information processing systems, pages
1216–1224, 2010.
[14] T. Lan, Y. Wang, W. Yang, S. N. Robinovitch, and G. Mori.
Discriminative latent models for recognizing contextual
group activities. IEEE Transactions on Pattern Analysis and
Machine Intelligence, 34(8):1549–1562, 2012.
[15] L. Leal-Taixé, G. Pons-Moll, and B. Rosenhahn. Everybody
needs somebody: Modeling social and grouping behavior on
a linear programming multiple people tracker. In Computer
Vision Workshops (ICCV Workshops), 2011 IEEE International Conference on, pages 120–127. IEEE, 2011.
[16] R. Li, R. Chellappa, and S. K. Zhou. Learning multi-modal
densities on discriminative temporal interaction manifold for
group activity recognition. In Computer Vision and Pattern
Recognition, 2009. CVPR 2009. IEEE Conference on, pages
2450–2457. IEEE, 2009.
[17] J. Liu, J. Luo, and M. Shah. Recognizing realistic actions
from videos in the wild. In Computer vision and pattern
recognition, 2009. CVPR 2009. IEEE conference on, pages
1996–2003. IEEE, 2009.
[18] J. C. Niebles, H. Wang, and L. Fei-Fei. Unsupervised learning of human action categories using spatial-temporal words.
[19]
[20]
[21]
[22]
[23]
[24]
[25]
[26]
[27]
[28]
[29]
[30]
[31]
[32]
[33]
9
International journal of computer vision, 79(3):299–318,
2008.
S. Pellegrini, A. Ess, and L. Van Gool. Improving data association by joint modeling of pedestrian trajectories and
groupings. In European Conference on Computer Vision,
pages 452–465. Springer, 2010.
H. Pirsiavash, D. Ramanan, and C. C. Fowlkes. Globallyoptimal greedy algorithms for tracking a variable number of objects. In Computer Vision and Pattern Recognition (CVPR), 2011 IEEE Conference on, pages 1201–1208.
IEEE, 2011.
R. Poppe. A survey on vision-based human action recognition. Image and vision computing, 28(6):976–990, 2010.
Z. Qin and C. R. Shelton. Improving multi-target tracking
via social grouping. In Computer Vision and Pattern Recognition (CVPR), 2012 IEEE Conference on, pages 1972–1978.
IEEE, 2012.
W. M. Rand. Objective criteria for the evaluation of clustering methods. Journal of the American Statistical association,
66(336):846–850, 1971.
M. Ryoo and J. Aggarwal. Stochastic representation and
recognition of high-level group activities. International journal of computer Vision, 93(2):183–200, 2011.
M. S. Ryoo and J. K. Aggarwal. Spatio-temporal relationship
match: Video structure comparison for recognition of complex human activities. In Computer vision, 2009 ieee 12th
international conference on, pages 1593–1600. IEEE, 2009.
S. Savarese, A. DelPozo, J. C. Niebles, and L. Fei-Fei.
Spatial-temporal correlatons for unsupervised action classification. In Motion and video Computing, 2008. WMVC 2008.
IEEE Workshop on, pages 1–8. IEEE, 2008.
K. Simonyan and A. Zisserman. Very deep convolutional networks for large-scale image recognition. CoRR,
abs/1409.1556, 2014.
P. Sudowe, H. Spitzer, and B. Leibe. Person Attribute
Recognition with a Jointly-trained Holistic CNN Model. In
ICCV’15 ChaLearn Looking at People Workshop, 2015.
I. Tsochantaridis, T. Hofmann, T. Joachims, and Y. Altun. Support vector machine learning for interdependent and
structured output spaces. In Proceedings of the twenty-first
international conference on Machine learning, page 104.
ACM, 2004.
P. Turaga, R. Chellappa, V. S. Subrahmanian, and O. Udrea.
Machine recognition of human activities: A survey. IEEE
Transactions on Circuits and Systems for Video Technology,
18(11):1473–1488, 2008.
L. Wang, Y. Qiao, and X. Tang. Latent hierarchical model of
temporal structure for complex activity classification. IEEE
Transactions on Image Processing, 23(2):810–822, 2014.
D. Weinland, R. Ronfard, and E. Boyer. A survey of visionbased methods for action representation, segmentation and
recognition. Computer vision and image understanding,
115(2):224–241, 2011.
M. Wu and B. Schölkopf. A local learning approach for clustering. In Advances in neural information processing systems, pages 1529–1536, 2006.
[34] K. Yamaguchi, A. C. Berg, L. E. Ortiz, and T. L. Berg. Who
are you with and where are you going? In Computer Vision
and Pattern Recognition (CVPR), 2011 IEEE Conference on,
pages 1345–1352. IEEE, 2011.
[35] L. Zhang, Y. Li, and R. Nevatia. Global data association for
multi-object tracking using network flows. In Computer Vision and Pattern Recognition, 2008. CVPR 2008. IEEE Conference on, pages 1–8. IEEE, 2008.
10
| 7cs.IT
|
Warmstarting of Model-based Algorithm Configuration
Marius Lindauer and Frank Hutter
arXiv:1709.04636v3 [cs.AI] 28 Nov 2017
University of Freiburg
{lindauer,fh}@cs.uni-freiburg.de
Abstract
The performance of many hard combinatorial problem
solvers depends strongly on their parameter settings, and
since manual parameter tuning is both tedious and suboptimal the AI community has recently developed several algorithm configuration (AC) methods to automatically address
this problem. While all existing AC methods start the configuration process of an algorithm A from scratch for each new
type of benchmark instances, here we propose to exploit information about A’s performance on previous benchmarks in
order to warmstart its configuration on new types of benchmarks. We introduce two complementary ways in which we
can exploit this information to warmstart AC methods based
on a predictive model. Experiments for optimizing a flexible
modern SAT solver on twelve different instance sets show
that our methods often yield substantial speedups over existing AC methods (up to 165-fold) and can also find substantially better configurations given the same compute budget.
Introduction
Many algorithms in the field of artificial intelligence rely
crucially on good parameter settings to yield strong performance; prominent examples include solvers for many hard
combinatorial problems (e.g., the propositional satisfiability
problem SAT (Hutter et al. 2017) or AI planning (Fawcett
et al. 2011)) as well as a wide range of machine learning algorithms (in particular deep neural networks (Snoek,
Larochelle, and Adams 2012) and automated machine learning frameworks (Feurer et al. 2015)). To overcome the tedious and error-prone task of manual parameter tuning for a
given algorithm A, algorithm configuration (AC) procedures
automatically determine a parameter configuration of A with
low cost (e.g., runtime) on a given benchmark set. General
algorithm configuration procedures fall into two categories:
model-free approaches, such as ParamILS (Hutter et al.
2009), irace (López-Ibáñez et al. 2016) or GGA (Ansótegui,
Sellmann, and Tierney 2009), and model-based approaches,
such as SMAC (Hutter, Hoos, and Leyton-Brown 2011) or
GGA++ (Ansótegui et al. 2015).
Even though model-based approaches learn to predict the
cost of different configurations on the benchmark instances
at hand, so far all AC procedures start their configuration
Copyright c 2018, Association for the Advancement of Artificial
Intelligence (www.aaai.org). All rights reserved.
process from scratch when presented with a new set of
benchmark instances. Compared with the way humans exploit information from past benchmark sets, this is obviously
suboptimal. Inspired by the human ability to learn across different tasks, we propose to use performance measurements
for an algorithm on previous benchmark sets in order to
warmstart its configuration on a new benchmark set. As we
will show in the experiments, our new warmstarting methods can substantially speed up AC procedures, by up to a
factor of 165. In our experiments, this amounts to spending
less than 20 minutes to obtain comparable performance as
could previously be obtained within two days.
Preliminaries
Algorithm configuration (AC). Formally, given a target
algorithm with configuration space Θ, a probability distribution D across problem instances, as well as a cost metric c
to be minimized, the algorithm configuration (AC) problem
is to determine a parameter configuration θ∗ ∈ Θ with low
expected cost on instances drawn from D:
θ∗ ∈ arg min Eπ ∼D [c(θ, π)].
(1)
θ∈Θ
In practice, π ∼ D is typically approximated by a finite
set of instances Π drawn from D. An example AC problem is to set a SAT solver’s parameters to minimize its average runtime on a given benchmark set of formal verification instances. Througout the paper, we refer to algorithms
for solving the AC problem as AC procedures. They execute
the target algorithm with different parameter configurations
θ ∈ Θ on different instances π ∈ Π and measure the resulting costs c(θ, π).
Empirical performance models (EPMs). A core ingredient in model-based approaches for AC is a probabilistic
regression model ĉ : Θ × Π → R that is trained based on
the cost values hx = [θ, π], y = c(θ, π)i observed thus far
and can be used to predict the cost of new parameter configurations θ ∈ Θ on new problem instances π ∈ Π. Since this
regression model predicts empirical algorithm performance
(i.e., its cost), it is known as an empirical performance model
(EPM; Leyton-Brown, Nudelman, and Shoham; Hutter et
al. 2009; 2014b). Random forests have been established as
Algorithm 1: Model-based Algorithm Configuration
Input : Configuration Space Θ, Instances Π,
Configuration Budget B
1
2
3
4
5
6
θinc , H ← initial design(Θ, Π);
while B not exhausted do
ĉ ← fit EPM based on H;
Θchall ← select challengers based on ĉ and H;
θinc , H ← race(Θchall ∪ {θinc }, Π, H);
return θinc
θ, π
Configurator
Π1
c(θ, π)
1
1
ΘΠ
inc H := hθ, π, c(θ, π)i
θ, π
Configurator
Π2
Model-based algorithm configuration. The core idea of
sequential model-based algorithm configuration is to iteratively fit an EPM based on the cost data observed so far
and use it to guide the search for well-performing parameter configurations. Algorithm 1 outlines the model-based
algorithm configuration framework, similarly as introduced
by Hutter, Hoos, and Leyton-Brown (2011) for the AC procedure SMAC, but also encompassing the GGA++ approach
by Ansótegui et al. (2015). We now discuss this algorithm
framework in detail since our warmstarting extensions will
adapt its various elements.
First, in Line 1 a model-based AC procedure runs the algorithm to be optimized with configurations in a so-called
initial design, keeping track of their costs and of the best
configuration θinc seen so far (the so-called incumbent). It
also keeps track of a runhistory H, which contains tuples
hθ, π, c(θ, π)i of the cost c(θ, π) obtained when evaluating configuration θ on instance π. To obtain good anytime
performance, by default SMAC only executes a single run
of a user-defined default configuration θdef on a randomlychosen instance as its initial design and uses θdef as its initial incumbent θinc . GGA++ samples a set of configurations
as initial generation and races them against each other on a
subset of the instances.
In Lines 2-5, the AC procedure performs the model-based
search. While a user-specified configuration budget B (e.g.,
number of algorithm runs or wall-clock time) is not exhausted, it fits a random-forest-based EPM on the existing
cost data in H (Line 3), aggregates the EPM’s predictions
over the instances Π in order to obtain marginal cost predictions ĉ(θ) for each configuration θ ∈ Θ and then uses these
predictions in order to select a set of promising configurations Θchall to challenge the incumbent θinc (Line 4) (SMAC)
Algorithm
c(θ, π)
1
ΘΠ
inc
the best-performing type of EPM and are thus used in all
current model-based AC approaches.
For the purposes of this regression model, the instances π
are characterized by instance features. These features reach
from simple ones (such as the number of clauses and variables of a SAT formula) to more complex ones (such as
statistics gathered by briefly running a probing algorithm).
Nowadays, informative instance features are available for
most hard combinatorial problems (e.g., SAT (Nudelman et
al. 2004), mixed integer programming (Hutter et al. 2014b),
AI planning (Fawcett et al. 2014), and answer set programming (Hoos, Lindauer, and Schaub 2014)).
Algorithm
∪
2
ΘΠ
inc
1
H ∪H
2
θ, π
Π
3
Configurator
Algorithm
c(θ, π)
Figure 1: Control flow of warmstarting information
or to generate well-performing offsprings (GGA++). For this
step, a so-called acquisition function trades off exploitation
of promising areas of the configuration space versus exploration of areas for which the model is still uncertain; common choices are expected improvement (Jones, Schonlau,
and Welch 1998), upper confidence bounds (Srinivas et al.
2010) or entropy search (Hennig and Schuler 2012).
To determine a new incumbent configuration θinc , in
Line 5 the AC procedure races these challengers and the current incumbent by evaluating them on individual instances
π ∈ Π and adding the observed data to H. Since these evaluations can be computationally costly the race only evaluates
as many instances as needed per configuration and terminates slow runs early (Hutter et al. 2009).
Warmstarting Approaches for AC
In this section, we discuss how the efficiency of model-based
AC procedures (as described in the previous section) can be
improved by warmstarting the search from data generated
in previous AC runs. We assume that the algorithm to be
optimized and its configuration space Θ is the same in all
runs, but the set of instances Π can change between the runs.
To warmstart a new AC run, we consider the following data
from previous AC runs on previous instance sets Πi :
i
• Sets of optimized configurations ΘΠ
inc found in previous AC runs on Πi —potentially, multiple runs were performed on the same instance set to return
the result with
i
contains
the final
best training performance such that ΘΠ
inc
incumbents from each of these runs;
• We denote
the union of previous instances as
S
Π0 := i∈I Πi for set superscripts i ∈ I.
S
• Runhistory data H0 := i∈I Hi of all AC runs on previous instance sets Πi . 1
1
If the set of instances Π and the runhistory H are not indexed,
we always refer to the ones of the current AC run.
To design warmstarting approaches, we consider the following desired properties:
1. When the performance data gathered on previous instance
sets is informative about performance on the current instance set, it should speed up our method.
2. When said performance data is misleading, our method
should stop using it and should not be much slower than
without it.
3. The runtime overhead generated by using the prior data
should be fairly small.
In the following subsections, we describe different warmstarting approaches that satisfy these properties.
Warmstarting Initial Design (INIT)
The first approach we consider for warmstarting our modelbased AC procedure is to adapt its initial design (Line 1
of Algorithm 1) to start from configurations that performed
well in the past. Specifically, we include the incumbent coni
figurations ΘΠ
inc from all previous AC runs as well as the
user-specified default θdef .
i
Evaluating all previous incumbents ΘΠ
inc in the initial design can be inefficient (contradicting Property 3), particularly if they are very similar. This can happen when the previous instance sets are quite similar, or when multiple runs
were performed on a single instance set.
To obtain a complementary set of configurations that covers all previously optimized instances well but is not redundant, we propose to use a two step approach. First, we determine the best configuration for each previous Πi .
[
X
Θinc :=
arg min
c(θ, π)
(2)
i
Π
i∈I θ∈Θinc
π∈Πi
Secondly, we use an iterative, greedy forward search
to select a complementary set of configurations across all
previous instance sets—inspired by the per-instance selection procedure Hydra (Xu, Hoos, and Leyton-Brown 2010).
Specifically, for the second step we define the mincost c̃(Θj )
of a set of configurations Θj on the union of all previous instances Π0 as
1 X
c̃(Θj ) := 0
min c(θ, π),
(3)
θ∈Θj
|Π |
0
π∈Π
start with Θ1 := {θdef }, and at each iteration, add the configuration θ0 ∈ Θinc to Θj that minimizes c̃(Θj ∪{θ0 }). Because
c̃(·) is a supermodular set function this greedy algorithm is
guaranteed to select a set of configurations whose mincost is
within a factor of (1 − 1/e) ≈ 0.63 of optimal among sets
of the same size (Krause and Golovin 2012).
Since we do not necessarily know the empirical cost of
all θ0 ∈ Θinc on all π ∈ Π0 , we use an EPM ĉ : Θ × Π → R
as a plug-in estimator to predict these costs. We train this
EPM on all previous runhistory data H0 . In order to enable
this, the benchmark sets for all previous AC runs have to be
characterized with the same set of instance features.
In SMAC, we use this set of complementary configurations in the initial design using the same racing function as
in comparing challengers to the incumbent (Line 5) to obtain the initial incumbent; to avoid rejecting challengers too
quickly, a challenger is compared on at least 3 instances before it can be rejected. In GGA++, these configurations can
be included in the first generation of configurations.
Data-Driven Model-Warmstarting (DMW)
Since model-based AC procedures are guided by their EPM,
we considered to warmstart this EPM by including all cost
data H0 gathered in previous AC runs as part of its training
data. In the beginning, the predictions of this EPM would
mostly rely on H0 , and as more data is acquired on the current benchmark this would increasingly affect the model.
However, this approach has two disadvantages:
1. When a lot of warmstarting data is available it requires
many evaluations on the current instance set to affect
model predictions. If the previous data is misleading, this
would violate our desired Property 2.
2. Fitting the EPM on H ∪ H0 will be expensive even in
early iterations, because H0 will typically contain many
observations. Even by using SMAC’s mechanism to invest at least the same amount of time in Lines 3 and 4 as
in Line 5, in preliminary experiments this slowed down
SMAC substantially (violating Property 3).
For these two reasons, we do not use this approach for warmstarting but propose an alternative. Specifically, to avoid the
computational overhead of refitting a very large EPM in each
iteration, and to allow our model to discard misleading previous data, we propose to fit individual EPMs ĉi for each
Hi once and to combine their predictions with those of an
EPM ĉ fitted on the newly gathered cost data H. This relates
to stacking in ensemble learning (Wolpert 1992); however
in our case, each constituent EPM is trained on a different
dataset. Hence, in principle we could even use different instance features for each instance set.
To aggregate predictions of the individual EPMs, we propose to use a linear combination:
X
ĉDMW (θ, π) := w0 + wĉ · ĉ(θ, π) +
wi · ĉi (θ, π) (4)
i∈I
where w are weights fitted with stochastic gradient descent (SGD) to minimize the combined model’s root mean
squared error (RMSE). To avoid overfitting of the weights,
we randomly split the current H into a training and validation set (2 : 1), use the training set to fit ĉ, and then compute
predictions of ĉ and each ĉi on the validation set, which are
used to fit the weights w. Finally, we re-fit the EPM ĉ on all
data in H to obtain a maximally informed model.
In the beginning of a new AC run, with few data in H,
ĉ will not be very accurate, causing its weight wĉ to be low,
such that the previous models ĉi will substantially influence
the cost predictions. As more data is gathered in H, the predictive accuracy of ĉ will improve and the predictions of the
previous models ĉi will become less important.
Besides weighting based on the accuracy of the individual models, the weights have the second purpose of scaling the individual model’s predictions appropriately: these
scales reflect the different hardnesses of the instance sets
they were trained on and by setting the weights to minimize
RMSE of the combined model on the current instances Π,
they will automatically normalize for scale.
The performance predictions of DMW can be used in any
model-based AC procedure, such as SMAC and GGA++.
Combining INIT and DMW (IDMW)
Importantly, the two methods we propose are complementary. A warmstarted initial design (INIT) can be easily
combined with data-driven model-warmstarting (DMW) because both approaches affect different parts of model-based
algorithm configuration: where to start from and how to integrate the full performance data from the current and the
previous benchmarks to decide where to sample next. In
fact, the two warmstarting methods can even synergize to
yield more than the sum of their pieces: by evaluating strong
configurations from previous AC runs in the initial design
through INIT, the weights of the stacked model in DMW can
be fitted on these important observations early on, improving
the accuracy of its predictions even in early iterations.
Experiments
We evaluated how our three warmstarting approaches improve the state-of-the-art AC procedure SMAC.2 In particular, we were interested in the following research questions:
Q1 Can warmstarted SMAC find better performing configurations within the same configuration budget?
Q2 Can warmstarted SMAC find well-performing configurations faster than default SMAC?
Q3 What is the effect of using warmstarting data Hi from
related and unrelated benchmarks?
Experimental Setup To answer these questions, we ran
SMAC (0.5.0) and our warmstarting variants3 on twelve
well-studied AC tasks from the configurable SAT solver
challenge (Hutter et al. 2017), which are publicly available
in the algorithm configuration library (Hutter et al. 2014a).
Since our warmstarting approaches have to generalize across
different instance sets and not across algorithms, we considered AC tasks of the highly flexible and robust SAT solver
SparrowToRiss across 12 instance sets. SparrowToRiss is a
combination of two well-performing solvers: Riss (Manthey
2014) is a tree-based solver that performs well on industrial and hand-crafted instances; Sparrow (Balint et al. 2011)
is a local-search solver that performs well on random, satisfiable instances. SparrowToRiss first runs Sparrow for a
parametrized amount of time and then runs Riss if Sparrow
could not find a satisfying assignment. Thus, SparrowToRiss
can be applied to a large variety of different SAT instances.
Riss, Sparrow and SparrowToRiss also won several medals
in the international SAT competition. Furthermore, configuring SparrowToRiss is a challenging task because it has a
2
The source code of GGA++ is not publicly available and thus,
we could not run experiments on GGA++.
3
Code and data is publicly available at: http://www.
ml4aad.org/smac/.
very large configuration space with 222 parameters and 176
conditional dependencies.
To study warmstarting on different categories of instances, the AC tasks consider SAT instances from applications with a lot of internal structure, hand-crafted instances
with some internal structure, and randomly-generated SAT
instances with little structure. We ran SparrowToRiss on
• application instances from bounded-model checking (BMC), hardware verification (IBM) and fuzz testing
based on circuits (CF);
• hand-crafted instances from graph-isomorphism (GI),
low autocorrelation binary sequence (LABS) and n-rooks
instances (N-Rooks);
• randomly generated instances, specifically, 3-SAT instances at the phase transition from the ToughSAT instance generator (3cnf ), a mix of satisfiable and unsatisfiable 3-SAT instances at the phase transition (K3), and
unsatisfiable 5-SAT instances from a generator used in
the SAT Challenge 2012 and SAT Competition 2013
(UNSAT-k5); and on
• randomly generated satisfiable instances, specifically, instances with 3 literals per clause and 1000 clauses
(3SAT1k), instances with 5 literals per clause and 500
clauses (5SAT500) and instances with 7 literals per clause
and 90 clauses (7SAT90).
Further details on these instances are given in the description of the configurable SAT solver challenge (Hutter et al.
2017). The instances were split into a training set for configuration and a test set to validate the performance of the
configured SparrowToRiss on unseen instances.
For each configuration run on a benchmark set in one of
the categories, our warmstarting methods had access to observations on the other two benchmark sets in the category.
For example, warmstarted SMAC optimizing SparrowToRiss
on IBM had access to the observations and final incumbents
of SparrowToRiss on CF and BMC.
As a cost metric, we chose the commonly-used penalized
average runtime metric (PAR10, i.e., counting each timeout
as 10 times the runtime cutoff) with a cutoff of 300 CPU
seconds. To avoid a constant inflation of the PAR10 values,
we removed all test instances post hoc that were never solved
by any configuration in our experiments (11 CF instances,
69 IBM instances, 17 BMC instances, 21 GI instances, 72
LABS instances and 73 3cnf instances).
On each AC task, we ran 10 independent SMAC runs with
a configuration budget of 2 days each. All runs were run on
a compute cluster with nodes equipped with two Intel Xeon
E5-2630v4 and 128GB memory running CentOS 7.
Baselines
As baselines, we ran (I) the user-specified default configuration θdef to show the effect of algorithm configuration, (II) SMAC without warmstarting, and (III) a stateof-the-art warmstarting approach for hyperparameter optimizers proposed by Wistuba, Schilling, and SchmidtThieme (2016), which we abbreviate as “adapted acquisition
function” (AAF). The goal of AAF is to bias the acquisition
θdef
SMAC
PAR10 scores
AAF
INIT
DMW
IDMW
Speedup over default SMAC
AAF INIT DMW IDMW
CF
IBM
BMC
326.5
150.6
421.5
125.8
50.6
209.6
140.0
49.0
230.7
126.6
47.8
203.1
122.0
47.5
155.9
116.4
48.8
137.4
0.1
3.9
1.2
0.5
16.2
1
0.7
1.4
11
2.7
9
29.3
GI
LABS
N-Rooks
314.1
330.1
116.7
165.0
232.9
8.6
165.6
291.2
18.1
165.6
271.2
27.3
165.4
285.9
27.5
152.7
286.7
12.7
25.6
0.8
0.4
0.6
0.8
0.4
7.1
0.8
0.4
19.4
0.8
0.5
3cnf
K3
UNSAT-k5
890.5
152.8
151.9
890.5
30.1
1.1
822.8
53.9
1.2
877.5
42.9
1.1
890.3
39.9
1.3
812.8
29.7
1.2
10.7
0.9
1
1
0.9
1
1
1.8
1
8.4
1.8
1
3SAT1k
5SAT500
7SAT90
104.4
3000
52.3
76.6
20.5
38.0
75.2
14.6
31.7
75.2
14.7
20.2
82.6
8.3
19.7
69.8
9.6
31.2
3.1
6
53.5
2.1
0.7
2.3
2.1
0.7
0.5
3.8
0.8
165.3
2.4
1.1
1.3
4.3
∅
Table 1: Left: PAR10 score (sec) of θdef , i.e., the default configuation of SparrowToRiss, and the final SparrowToRiss configurations returned by the different SMAC variants; median across 10 SMAC runs. The “SMAC” column shows the performance
of default SMAC without warmstarting. Best PAR10 is underlined and we highlighted runs in bold face for which there is no
statistical evidence according to a (one-sided) Mann-Whitney U test (α = 0.05) that they performed worse than the best configurator. Right: Speedup of warmstarted SMAC compared to default SMAC. This is computed by comparing the time points
of SMAC with and without warmstarting after which they do not perform significantly worse (according to a permutation test)
than SMAC with the full budget. Speedups > 1 indicate that warmstarted SMAC reached the final performance of default SMAC
faster, speedups < 1 indicate that default SMAC was faster. We marked the best speedup (> 1) in bold-face. The last row shows
the geometric average across all speedups.
function (Line 4 in Algorithm 1) towards previously wellperforming regions in the configuration space.4 To generalize AAF to algorithm configuration, we P
use marginalized
1
prediction across all instances ĉ(θ) := |Π|
π∈Π ĉ(θ, π).
Q1: Same configuration Budget
The left part of Table 1 shows the median PAR10 test
scores of the finally-returned configurations θinc across the
10 SMAC runs. Default SMAC nearly always improved
the PAR10 scores of SparrowToRiss substantially compared
to the SparrowToRiss default, yielding up to a 138-fold
speedup (on UNSAT-k5). Warmstarted SMAC performed significantly better yet on 4 of the AC tasks (BMC, 3cnf,
5SAT500 and 7SAT90), with additional speedups up to 2.1fold (on 5SAT500). On two of the crafted instance sets
(LABS and N-Rooks), the warmstarting approaches performed worse than default SMAC—details discussed later.
Overall, the best results were achieved by the combination of our approaches, IDMW. This yielded the best performance of all approaches in 6 of the 12 scenarios (with
sometimes substantial improvements over default SMAC)
and statistically insignificantly different results than the best
approach in 3 of the scenarios. Notably, IDMW performed
better on average than its individual components INIT and
DMW and clearly outperformed AAF.
4
We note that combining AAF and INIT is not effective because
evaluating the incumbents of INIT would nullify the acquisition
function bias of AAF.
Q2: Speedup
The right part of Table 1 shows how much faster our warmstarted SMAC reached the PAR10 performance default that
SMAC reached with the full configuration budget.5 The
warmstarting methods outperformed default SMAC in almost all cases (again except LABS and N-Rooks), with
up to 165-fold speedups. The most consistent speedups
were achieved by the combination of our warmstarting
approaches, IDMW, with a geometric-average 4.3-fold
speedup. We note that our baseline AAF also yielded good
speedups (geometric average of 2.4), but its final performance was often quite poor (see left part of Table 1).
Figure 2 illustrates the anytime test performance of all
SMAC variants.6 In Figure 2a, AAF, INIT and IDMW improved the performance of SparrowToRiss very early (after
roughly 700-1000 seconds), but only the DMW variants per5
A priori it is not clear how to define a speedup metric comparing algorithm configurators across several runs. To take noise into
account across our 10 runs, we performed a permutation test (with
α = 0.05 with 10 000 permutations) to determine the first time
point from which onwards there was no statistical evidence that default SMAC with a full budget would perform better. To take early
convergence/stagnation of default SMAC into account, we compute
the speedup of default SMAC to itself and divide the speedups by
default SMAC’s speedup.
6
Since Figure 2 shows test performance on unseen test instances, performance is not guaranteed to improve monotonically
(a new best configuration on the training instances might not generalize well to the test instances).
(a) BMC
(b) N-Rooks
(c) LABS
Figure 2: Median PAR10 of SparrowToRiss over configuration time with 25% and 75% percentiles as uncertainties.
(a) red: IBM, blue: CF,
green: BMC
(b) red: UNSAT-k5, blue: K3,
green: 3cnf
Figure 3: Weights over time of all 10 runs SMAC+DMW.
The red curve is the weight on EPM ĉ on the current instances; the blue and green curves corresponds to weights
on EPMs based on previously optimized instances.
formed well in the long run.
To study the effect of our worst results, Figure 2b and
2c show the anytime performance on N-Rooks and LABS,
respectively. Figure 2b shows that warmstarted SMAC performed better in the beginning, but that default SMAC performed slightly better in the end. The better initial performance is not captured in our quantitative analysis in Table 1.
In contrast, Figure 2c shows that for LABS, warmstarted
SMAC was initially mislead and then started improving like
default SMAC, but with a time lag; we note that we only observed this pattern on LABS and conclude that configurations
found on N-Rooks and GI do not generalize to LABS.
Q3: Warmstarting Influence
To study how our warmstarting methods learn from previous data, in Figure 3 we show how the weights of the DMW
approach changed over time. Figure 3a shows a representative plot: the weights were similar in the beginning (i.e.,
all EPMs contributed similarly to cost predictions) and over
time, the weights of the previous models decreased, with the
weight of the current EPM dominating. When optimizing
on IBM, the EPM trained on observations from CF was the
most important EPM in the beginning.
In contrast, Figure 3b shows a case in which the previous performance data acquired for benchmarks K3 and 3cnf
do not help for cost predictions on UNSAT-k5. (This was
to be expected, because 3cnf comprises only satisfiable instances, K3 a mix of satisfiable and unsatisfiable instances,
and UNSAT-k5 only unsatisfiable instances.) As the figure
shows, our DMW approach briefly used the data from the
mixed K3 benchmark (blue curves), but quickly focused
only on data from the current benchmark. These two examples illustrate that our DMW approach indeed successfully
used data from related benchmarks and quickly ignored data
from unrelated ones.
Related Work
The most related work comes from the field of hyperparameter optimization (HPO) of machine learning algorithms.
HPO, when cast as the optimization of (cross-)validation
error, is a special case of AC. This special case does not
require the concept of problem instances, does not require
the modelling of runtimes of randomized algorithms, does
not need to adaptively terminate slow algorithm runs and
handle the resulting censored algorithm runtimes, and typically deals with fairly low-dimensional and all-continuous
(hyper-)parameter configuration spaces. These works therefore do not directly transfer to the general AC problem.
Several warmstarting approaches exist for HPO. A
prominent approach is to learn surrogate models across
datasets (Swersky, Snoek, and Adams 2013; Bardenet et
al. 2014; Yogatama and Mann 2014). All of these works
are based on Gaussian process models whose computational
complexity scales cubically in the number of data points,
and therefore, all of them were limited to hundreds or at
most thousands of data points. We generalize them to the
AC setting (which, on top of the differences to HPO stated
above, also needs to handle up to a million cost measurements for an algorithm) in our DMW approach.
Another approach for warmstarting HPO is by adapting
the initial design. Feurer, Springenberg, and Hutter (2015)
proposed to initialize HPO in the automatic machine learning framework Auto-Sklearn with well-performing configurations from previous datasets. They had optimized configurations from 57 different machine learning data sets available as warmstarting data and chose which of these to use for
a new dataset based on its characteristics; specifically, they
used the optimized configurations from the k most similar
datasets. This approach could be adapted to AC warmstarting in cases where we have many AC benchmarks. However, one disadvantage of the approach is that – unlike our
INIT approach – it does not aim for complementarity in the
selected configurations. Wistuba, Schilling, and SchmidtThieme (2015) proposed another approach for warmstarting
the initial design which does not depend on instance features
and is not limited to configurations returned in previous optimization experiments. They combined surrogate predictions
from previous runs and used gradient descent to determine
promising configurations. This approach is limited to continuous (hyper-)parameters and thus does not apply to the
general AC setting.
One related variant of algorithm configuration is the problem of configuring on a stream of problem instances that
changes over time. The ReACT approach (Fitzgerald et al.
2014) targets this problem setting, keeping track of configurations that worked well on previous instances. If the characteristics of the instances change over time, it also adapts
the current configuration by combining observations on previous instances and on new instances. In contrast to our setting, ReACT does not return a single configuration for an
instance set and requires parallel compute resources to run a
parallel portfolio all the time.
Discussion & Conclusion
In this paper, we introduced several methods to warmstart
model-based algorithm configuration (AC) using observations from previous AC experiments on different benchmark
instance sets. As we showed in our experiments, warmstarting can speed up the configuration process up to 165-fold
and can also improve the configurations finally returned.
While we focused on the state-of-the-art configurator
SMAC in our experiments, our methods are also applicable to other model-based configurators, such as GGA++, and
our warmstarted initial design approach is even applicable to
model-free configurators, such as ParamILS and irace. We
expect that our results would similarly generalize to these.
A practical limitation of our DMW approach (and thus
also of IDMW) is that the memory consumption grows substantially with each additional EPM (at least when using
random forests fitted on hundreds of thousands of observations). We also tried to study warmstarting SMAC for optimizing SparrowToRiss on all instance sets except the one at
hand, but unfortunately, the memory consumption exceeded
12GB RAM. Therefore, one possible approach would be to
reduce memory consumption and to use instance features to
select a subset of EPMs constructed on similar instances.
Another direction for future work is to combine warmstarting with parameter importance analysis (Hutter, Hoos,
and Leyton-Brown 2014; Biedenkapp et al. 2017), e.g., for
determining important parameters on previous instance sets
and focusing the search on these parameters for a new instance set. Finally, a promising future direction is to integrate warmstarting into iterative configuration procedures,
such as Hydra (Xu, Hoos, and Leyton-Brown 2010), ParHydra (Lindauer et al. 2017), or Cedalion (Seipp et al. 2015),
which construct portfolios of complementary configurations
in an iterative fashion using multiple AC runs.
Acknowledgements
The authors acknowledge funding by the DFG (German Research Foundation) under Emmy Noether grant HU 1900/21 and support by the state of Baden-Württemberg through
bwHPC and the DFG through grant no INST 39/963-1
FUGG.
References
[Ansótegui et al. 2015] Ansótegui, C.; Malitsky, Y.; Sellmann, M.;
and Tierney, K. 2015. Model-based genetic algorithms for algorithm configuration. In Yang, Q., and Wooldridge, M., eds., Proceedings of the 25th International Joint Conference on Artificial
Intelligence (IJCAI’15), 733–739.
[Ansótegui, Sellmann, and Tierney 2009] Ansótegui, C.; Sellmann,
M.; and Tierney, K. 2009. A gender-based genetic algorithm for
the automatic configuration of algorithms. In Gent, I., ed., Proceedings of the Fifteenth International Conference on Principles
and Practice of Constraint Programming (CP’09), volume 5732 of
Lecture Notes in Computer Science, 142–157. Springer-Verlag.
[Balint et al. 2011] Balint, A.; Frohlich, A.; Tompkins, D.; and
Hoos, H. 2011. Sparrow2011. In Proceedings of SAT Competition 2011.
[Bardenet et al. 2014] Bardenet, R.; Brendel, M.; Kégl, B.; and Sebag, M. 2014. Collaborative hyperparameter tuning. In Dasgupta,
S., and McAllester, D., eds., Proceedings of the 30th International
Conference on Machine Learning (ICML’13), 199–207. Omnipress.
[Biedenkapp et al. 2017] Biedenkapp,
A.;
Lindauer,
M.;
Eggensperger, K.; Fawcett, C.; Hoos, H.; and Hutter, F. 2017.
Efficient parameter importance analysis via ablation with surrogates. In Proceedings of the Thirty-First Conference on Artificial
Intelligence (AAAI’17), 773–779.
[Bonet and Koenig 2015] Bonet, B., and Koenig, S., eds. 2015.
Proceedings of the Twenty-nineth Conference on Artificial Intelligence (AAAI’15). AAAI Press.
[Fawcett et al. 2011] Fawcett, C.; Helmert, M.; Hoos, H.; Karpas,
E.; Roger, G.; and Seipp, J. 2011. Fd-autotune: Domain-specific
configuration using fast-downward. In Helmert, M., and Edelkamp,
S., eds., Working notes of the Twenty-first International Conference
on Automated Planning and Scheduling (ICAPS-11), Workshop on
Planning and Learning.
[Fawcett et al. 2014] Fawcett, C.; Vallati, M.; Hutter, F.; Hoffmann,
J.; Hoos, H.; and Leyton-Brown, K. 2014. Improved features
for runtime prediction of domain-independent planners. In Chien,
S.; Minh, D.; Fern, A.; and Ruml, W., eds., Proceedings of the
Twenty-Fourth International Conference on Automated Planning
and Scheduling (ICAPS-14). AAAI.
[Feurer et al. 2015] Feurer, M.; Klein, A.; Eggensperger, K.; Springenberg, J. T.; Blum, M.; and Hutter, F. 2015. Efficient and robust
automated machine learning. In Cortes, C.; Lawrence, N.; Lee,
D.; Sugiyama, M.; and Garnett, R., eds., Proceedings of the 29th
International Conference on Advances in Neural Information Processing Systems (NIPS’15).
[Feurer, Springenberg, and Hutter 2015] Feurer, M.; Springenberg,
T.; and Hutter, F. 2015. Initializing Bayesian hyperparameter optimization via meta-learning. In Bonet and Koenig (2015), 1128–
1135.
[2014] Fitzgerald, T.; O’Sullivan, B.; Malitsky, Y.; and Tierney, K.
2014. React: Real-time algorithm configuration through tournaments. In Edelkamp, S., and Barták, R., eds., Proceedings of the
Seventh Annual Symposium on Combinatorial Search (SOCS’14).
AAAI Press.
[2012] Hennig, P., and Schuler, C. 2012. Entropy search for
information-efficient global optimization. Journal of Machine
Learning Research 98888(1):1809–1837.
[2014] Hoos, H.; Lindauer, M.; and Schaub, T. 2014. claspfolio
2: Advances in algorithm selection for answer set programming.
Theory and Practice of Logic Programming 14:569–585.
[2009] Hutter, F.; Hoos, H.; Leyton-Brown, K.; and Stützle, T.
2009. ParamILS: An automatic algorithm configuration framework. Journal of Artificial Intelligence Research 36:267–306.
[2014a] Hutter, F.; López-Ibánez, M.; Fawcett, C.; Lindauer, M.;
Hoos, H.; Leyton-Brown, K.; and Stützle, T. 2014a. Aclib: a
benchmark library for algorithm configuration. In Pardalos, P., and
Resende, M., eds., Proceedings of the Eighth International Conference on Learning and Intelligent Optimization (LION’14), Lecture
Notes in Computer Science, 36–40. Springer-Verlag.
[2014b] Hutter, F.; Xu, L.; Hoos, H.; and Leyton-Brown, K. 2014b.
Algorithm runtime prediction: Methods and evaluation. Artificial
Intelligence 206:79–111.
[2017] Hutter, F.; Lindauer, M.; Balint, A.; Bayless, S.; Hoos, H.;
and Leyton-Brown, K. 2017. The configurable SAT solver challenge (CSSC). Artificial Intelligence Journal (AIJ) 243:1–25.
[2011] Hutter, F.; Hoos, H.; and Leyton-Brown, K. 2011. Sequential model-based optimization for general algorithm configuration.
In Coello, C., ed., Proceedings of the Fifth International Conference on Learning and Intelligent Optimization (LION’11), volume
6683 of Lecture Notes in Computer Science, 507–523. SpringerVerlag.
[2014] Hutter, F.; Hoos, H.; and Leyton-Brown, K. 2014. An efficient approach for assessing hyperparameter importance. In Xing,
E., and Jebara, T., eds., Proceedings of the 31th International Conference on Machine Learning, (ICML’14), 754–762. Omnipress.
[1998] Jones, D.; Schonlau, M.; and Welch, W. 1998. Efficient
global optimization of expensive black box functions. Journal of
Global Optimization 13:455–492.
[2012] Krause, A., and Golovin, D. 2012. Submodular function
maximization. Tractability: Practical Approaches to Hard Problems 3(19):8.
[2009] Leyton-Brown, K.; Nudelman, E.; and Shoham, Y. 2009.
Empirical hardness models: Methodology and a case study on combinatorial auctions. Journal of the ACM 56(4).
[2017] Lindauer, M.; Hoos, H.; Leyton-Brown, K.; and Schaub, T.
2017. Automatic construction of parallel portfolios via algorithm
configuration. Artificial Intelligence 244:272–290.
[2016] López-Ibáñez, M.; Dubois-Lacoste, J.; Caceres, L. P.; Birattari, M.; and Stützle, T. 2016. The irace package: Iterated racing
for automatic algorithm configuration. Operations Research Perspectives 3:43–58.
[2014] Manthey, N. 2014. Riss 4.27. In Belov, A.; Diepold, D.;
Heule, M.; and Järvisalo, M., eds., Proceedings of SAT Competition
2014: Solver and Benchmark Descriptions, volume B-2014-2 of
Department of Computer Science Series of Publications B, 65–67.
University of Helsinki.
[2004] Nudelman, E.; Leyton-Brown, K.; Devkar, A.; Shoham, Y.;
and Hoos, H. 2004. Understanding random SAT: Beyond the
clauses-to-variables ratio. In Wallace, M., ed., Proceedings of the
10th International Conference on Principles and Practice of Constraint Programming (CP’04), volume 3258 of Lecture Notes in
Computer Science, 438–452. Springer-Verlag.
[2015] Seipp, J.; Sievers, S.; Helmert, M.; and Hutter, F. 2015. Automatic configuration of sequential planning portfolios. In Bonet
and Koenig (2015), 3364–3370.
[2012] Snoek, J.; Larochelle, H.; and Adams, R. P. 2012. Practical
Bayesian optimization of machine learning algorithms. In Bartlett,
P.; Pereira, F.; Burges, C.; Bottou, L.; and Weinberger, K., eds.,
Proceedings of the 26th International Conference on Advances in
Neural Information Processing Systems (NIPS’12), 2960–2968.
[2010] Srinivas, N.; Krause, A.; Kakade, S.; and Seeger, M. 2010.
Gaussian process optimization in the bandit setting: No regret and
experimental design. In Fürnkranz, J., and Joachims, T., eds., Proceedings of the 27th International Conference on Machine Learning (ICML’10), 1015–1022. Omnipress.
[2013] Swersky, K.; Snoek, J.; and Adams, R. 2013. Multi-task
Bayesian optimization. In Burges, C.; Bottou, L.; Welling, M.;
Ghahramani, Z.; and Weinberger, K., eds., Proceedings of the 27th
International Conference on Advances in Neural Information Processing Systems (NIPS’13), 2004–2012.
[2015] Wistuba, M.; Schilling, N.; and Schmidt-Thieme, L. 2015.
Learning hyperparameter optimization initializations. In Proceedings of the International Conference on Data Science and Advanced Analytics (DSAA), 1–10. IEEE.
[2016] Wistuba, M.; Schilling, N.; and Schmidt-Thieme, L. 2016.
Hyperparameter optimization machines. In Proceedings of the International Conference on Data Science and Advanced Analytics
(DSAA), 41–50. IEEE.
[1992] Wolpert, D. 1992. Stacked generalization. Neural Networks
5(2):241–259.
[2010] Xu, L.; Hoos, H.; and Leyton-Brown, K. 2010. Hydra: Automatically configuring algorithms for portfolio-based selection. In
Fox, M., and Poole, D., eds., Proceedings of the Twenty-fourth National Conference on Artificial Intelligence (AAAI’10), 210–216.
AAAI Press.
[2014] Yogatama, D., and Mann, G. 2014. Efficient transfer learning method for automatic hyperparameter tuning. In Kaski, S., and
Corander, J., eds., Proceedings of the Seventeenth International
Conference on Artificial Intelligence and Statistics (AISTATS), volume 33 of JMLR Workshop and Conference Proceedings, 1077–
1085.
| 2cs.AI
|
A Comparison of Hybridized and
Standard DG Methods for
Target-Based hp-Adaptive
Simulation of Compressible Flow
Michael Woopen, Aravind Balan, Georg May, and Jochen Schütz
Aachen Institute
for Advanced Study in
Computational Engineering Science
Financial support from the
Deutsche Forschungsgemeinschaft (German Research Foundation)
through grant GSC 111 is gratefully acknowledged.
A COMPARISON OF HYBRIDIZED AND STANDARD DG
METHODS FOR TARGET-BASED hp-ADAPTIVE SIMULATION
OF COMPRESSIBLE FLOW
MICHAEL WOOPEN, ARAVIND BALAN, GEORG MAY
Aachen Institute for Advanced Study in Computational Engineering Science,
RWTH Aachen University, Aachen, Germany
JOCHEN SCHÜTZ
Institut für Geometrie und Praktische Mathematik, RWTH Aachen University,
Aachen, Germany
Abstract. We present a comparison between hybridized and non-hybridized
discontinuous Galerkin methods in the context of target-based hp-adaptation
for compressible flow problems. The aim is to provide a critical assessment of
the computational efficiency of hybridized DG methods.
Hybridization of finite element discretizations has the main advantage, that
the resulting set of algebraic equations has globally coupled degrees of freedom only on the skeleton of the computational mesh. Consequently, solving for
these degrees of freedom involves the solution of a potentially much smaller system. This not only reduces storage requirements, but also allows for a faster
solution with iterative solvers. Using a discrete-adjoint approach, sensitivities with respect to output functionals are computed to drive the adaptation.
From the error distribution given by the adjoint-based error estimator, h- or
p-refinement is chosen based on the smoothness of the solution which can be
quantified by properly-chosen smoothness indicators.
Numerical results are shown for subsonic, transonic, and supersonic flow
around the NACA0012 airfoil. hp-adaptation proves to be superior to pure
h-adaptation if discontinuous or singular flow features are involved. In all
cases, a higher polynomial degree turns out to be beneficial. We show that for
polynomial degree of approximation p = 2 and higher, and for a broad range
of test cases, HDG performs better than DG in terms of runtime and memory
requirements.
1. Introduction
During the last years, discontinuous Galerkin (DG) methods (see, e.g., [1, 2, 3])
have become increasingly popular. This is indisputable due to their advantages
— high-order accuracy on unstructured meshes, a variational setting, and local
conservation, just to name a few.
However, the use of discontinuous function spaces is at the same time the reason
for a major disadvantage: unlike in continuous Galerkin (CG) methods, degrees
1
2
WOOPEN, BALAN, MAY, SCHÜTZ
of freedom are not shared between elements. As a consequence, the number of
unknowns is substantially higher compared to a CG discretization. Especially for
implicit time discretization this imposes large memory requirements, and potentially leads to increased time-to-solution.
In order to avoid these disadvantages, a technique called hybridization may be
utilized (see [4, 5, 6, 7, 8, 9, 10]), resulting in hybridized discontinuous Galerkin
(HDG) methods. Here, the globally coupled unknowns have support on the mesh
skeleton, i.e. the element interfaces, only. This reduces the size of the global system
and coincidentally improves the sparsity pattern.
However, aiming at industry applications, e.g. turbulent flow around a complete airplane or within an aircraft engine, hybridization alone does most likely
not provide a sufficiently successful overall algorithm. In these applications one
is usually interested in certain quantities only, for example lift or drag coefficients
in aerospace, instead of the solution quality per se. Thus, it might be beneficial
to distribute the degrees of freedom within the computational domain in such a
way that the solution to the discretized problem is close to optimal with respect
to the accuracy of these quantities. To achieve this goal, target-based error control
methods have been developed (see [11, 12, 13, 14, 15]). One such method is based
on the adjoint solution of the original governing equations with respect to the target functional. In this method, an additional linear system of partial differential
equations is solved which then gives an estimate on the spatial error distribution
contributing to the error in the target functional. This estimate can be used as
a criterion for local adaptation. Within the context of low order schemes, mesh
refinement is used for adaptation [12, 13]. Using DG (or HDG), however, offers the
additional possibility of varying the polynomial degree within each element. For
smooth solutions, this is more efficient compared to mesh refinement, as it yields
exponential convergence. In the context of wave problems, Giorgiani et al. [16]
showed the benefit of using p-adaptation within an HDG-framework. Combining
both mesh- and order-refinement results in so-called hp-adaptation.
In [17], we presented a discretization method for nonlinear convection-diffusion
equations. The method is based on a discontinuous Galerkin discretization for
convection terms, and a mixed method using H(div) spaces for the diffusive terms.
Furthermore, hybridization is used to reduce the number of globally coupled degrees
of freedom. Adjoint consistency was shown in [18]. In [19, 20], we extended our
computational framework to include HDG schemes, as well as adjoint-based hand hp-adaptation. In the current paper, we compare our HDG method with a
standard DG method in the context of hp-adaptation for stationary compressible
flow, mainly with the aim to assess the efficiency of both methods.
This paper is structured as follows. We briefly cover the governing equations,
namely the compressible Euler and Navier-Stokes equations, in Sec. 2. After that
we introduce our discretization and describe the concept of hybridization in Sec. 3.
In Sec. 4 we establish the adjoint formulation and show how hybridization can be
applied to the dual problem. Then we show its efficiency and robustness with
examples from compressible flow, including the subsonic, transonic, and supersonic
regime, in Sec. 5. Finally, we offer conclusions and outlook on future work in Sec. 6.
A COMPARISON OF HDG AND DG FOR TARGET-BASED hp-ADAPTATION
3
2. Governing Equations
We consider systems of partial differential equations
(1)
∇ · (fc (w) − fv (w, ∇w)) = s (w, ∇w)
with convective and diffusive fluxes
(2)
fc : Rm → Rm×d
and fv : Rm × Rm×d → Rm×d ,
respectively, and a state-dependent source term
(3)
s : Rm × Rm×d → Rm
on domain Ω ⊂ Rd . Potentially, some of these quantities could be zero. We
denote the spatial dimension by d and the number of conservative variables by m.
Boundary conditions can be applied either to the conservative variables w ∈ Rm
and their gradient ∇w ∈ Rm×d or directly to the fluxes fc and fv .
2.1. Two-Dimensional Euler Equations. The Euler equations are comprised
of the inviscid compressible continuity, momentum and energy equations. They are
given in conservative form as
(4)
∇ · fc (w) = 0
with the vector of conserved variables
(5)
w = (ρ, ρv, E)T
where ρ is the density, v is the velocity vector v := (vx , vy )T , and E the total
energy. The convective flux is given by
(6)
T
fc = (ρv, p Id + v ⊗ v, v(E + p)) .
Pressure is related to the conservative flow variables w by the equation of state
1
(7)
p = (γ − 1) E − ρv · v
2
where γ = cp /cv is the ratio of specific heats, generally taken as 1.4 for air.
Along wall boundaries we apply the slip boundary condition
(8)
vn (w) := v · n = 0.
We also define a boundary function which satisfies vn (w∂Ω (w)) = 0 as
1
0T
0
(9)
w∂Ω (w) = 0 Id − n ⊗ n 0 w.
0
0T
1
Prescribing boundary conditions at the far-field can be realized with the aid of
characteristic upwinding [21]. Here, the normal convective flux Jacobian is decomposed as
(10)
fc0 (w) · n = Q(w, n) · Λ(w, n) · Q−1 (w, n)
with Λ(w, n) being a diagonal matrix containing the eigenvalues of fc0 (w) · n. The
corresponding right eigenvectors can be found in the columns of Q(w, n). The interior and far-field states in characteristic variables are then given by wc = Q(w, n)w
4
WOOPEN, BALAN, MAY, SCHÜTZ
and wc,∞ = Q(w, n)w∞ , respectively. Finally, depending on the sign of (Λ(w, n))i,i ,
we can construct a boundary state
(
(Q(w, n)wc )i ,
(Λ(w, n))i,i ≥ 0
(11)
(w∂Ω (w))i =
(Q(w, n)wc,∞ )i , (Λ(w, n))i,i < 0.
2.2. Two-Dimensional Navier-Stokes Equations. The Navier-Stokes equations
in conservative form are given by
∇ · (fc (w) − fv (w, ∇w)) = 0.
(12)
The convective part fc of the Navier-Stokes equations coincides with the Euler
equations. The viscous flux is given by
T
(13)
fv = (0, τ , τ v + k∇T ) .
The temperature is defined via the ideal gas law
µγ
E
1
1
p
(14)
T =
− v·v =
k · Pr ρ
2
(γ − 1)cv ρ
µc
where Pr = kp is the Prandtl number, which for air at moderate conditions can be
taken as a constant with a value of Pr ≈ 0.72. k denotes the thermal conductivity
coefficient. For a Newtonian fluid, the stress tensor is defined as
2
T
(15)
τ = µ ∇v + (∇v) − (∇ · v) Id .
3
The variation of the molecular viscosity µ as a function of temperature is determined by Sutherland’s law as
(16)
µ=
C1 T 3/2
T + C2
√
with C1 = 1.458 × 10−6 mskg
and C2 = 110.4 K.
K
Along wall boundaries, we apply the no-slip boundary condition, i.e.
(17)
v=0
with corresponding boundary function
(18)
T
w∂Ω (w) = (ρ, 0, E) .
Furthermore, one has to give boundary conditions for the temperature. In the
present work we use the adiabatic wall condition, i.e.
(19)
∇T · n = 0.
Combining both no-slip and adiabatic wall boundary conditions, yields a condition
for the viscous flux, namely
T
(20)
fv (w∂Ω , q∂Ω ) = 0 τ 0 .
A COMPARISON OF HDG AND DG FOR TARGET-BASED hp-ADAPTATION
5
3. Discretization
3.1. Notation. We tesselate the domain
S Ω into a collection of non-overlapping
elements, denoted by Th , such that K∈Th K = Ω. For the element edges we
consider two different kinds of sets, ∂Th and Γh , which are element-oriented and
edge-oriented, respectively.
(21)
(22)
∂Th := { ∂K\∂Ω : K ∈ Th },
Γh := { e : e = K ∩ K 0 for K, K 0 ∈ Th ; measd−1 (e) 6= 0 }.
The first is the collection of all element boundaries, which means that every edge
appears twice. The latter, however, includes every edge just once. The reason for
this distinction will become clear later. Please note that neither of these sets shall
include edges lying on the domain boundary; the set of boundary edges is denoted
by Γbh .
We denote by Πp (D) the set of polynomials of degree at most p on some domain D. We will need discontinuous function spaces for the domain and the mesh
skeleton:
(23)
(24)
(25)
Vh = {v ∈ L2 (Ω) : v|K ∈ ΠpK (K),
2
Wh = {w ∈ L (Ω) : w|K ∈ Π
pK
(K),
Mh = {µ ∈ L2 (Γh ) : µ|e ∈ Πpe (e),
K ∈ Th }m×d
K ∈ Th }m
e ∈ Γh }m .
Thus, v ∈ Vh , w ∈ Wh and µ ∈ Mh are piecewise polynomials of degree p which
can be discontinuous across edges (for v, w) or vertices (for µ), respectively.
Usually, the polynomial degree between elements and interfaces does not vary.
In the case of varying polynomial degrees pK − and pK + , we follow Cockburn
et al. [6] and choose the polynomial degree for the interface e = K − ∩ K + as
pe = max {pK − , pK + }. This approach is commonly applied for p-adaptive HDG
discretizations (see Chen and Cockburn [22], Cockburn and Gopalakrishnan [23]
and Giorgiani et al. [16]).
We will distinguish between element-oriented inner products (defined with Th ),
i.e.
X Z
(v, w)Th :=
(26)
vw dx,
K∈Th
(27)
(v, w)Th :=
K∈Th
(28)
hv, wi∂Th :=
K
X Z
v · w dx,
K
X Z
K∈Th
vw dσ,
∂K
and edge-oriented inner products (defined with Γh ), i.e.
XZ
(29)
hv, wiΓh :=
vw dσ.
e∈Γh
e
3.2. Weak Formulation. We can rewrite general convection-diffusion equations
as a first-order system by introducing an additional unknown representing the gradient of the solution
q = ∇w
(30)
∇ · (fc (w) − fv (w, q)) = s (w, q) .
6
WOOPEN, BALAN, MAY, SCHÜTZ
By multiplying the strong, mixed form (30) with appropriate test functions
(τ h , ϕh ) ∈ Vh × Wh and integrating by parts, we obtain a standard DG discretization in mixed formulation of the problem, i.e.:
Find (qh , wh ) ∈ Vh × Wh s.t. ∀(τ h , ϕh ) ∈ Vh × Wh
(31)
(32)
(33)
(34)
0 = NhDG (qh , wh ; τ h , ϕh )
:= (τ h , qh )Th + (∇ · τ h , wh )Th − hτ h · n, wi
b ∂Th
− (∇ϕh , fc (wh ) − fv (wh , qh ))Th
D
E
+ ϕh , fbc − fbv
− (ϕh , s(wh , qh ))Th
∂Th
(35)
+
DG
Nh,∂Ω
DG
(qh , wh ; τ h , ϕh ) + Nh,sc
(qh , wh ; ϕh ) .
Here the numerical trace w
b and the numerical fluxes fbc , fbv have to be chosen
appropriately to define a stable and consistent method. Furthermore, boundary
conditions and shock-capturing are incorporated using appropriate operators, here
DG
DG
denoted by Nh,∂Ω
(qh , wh ; τ h , ϕh ) and Nh,sc
(qh , wh ; ϕh ).
In contrast to a DG discretization, where the numerical trace w
b is defined explicitly in terms of wh and qh , it is treated as an additional unknown in an HDG
method. This additional unknown is called λh and has support on the skeleton of
the mesh only. In order to close the system the continuity of the numerical fluxes
across edges is required in a weak sense, resulting in an additional equation.
The weak formulation of the hybrid system, comprised of equations for the gradient qh , the solution wh itself and its trace on the mesh skeleton λh , is then given
by:
Find (qh , wh , λh ) ∈ Xh := Vh × Wh × Mh s.t. ∀(τ h , ϕh , µh ) ∈ Xh
(36)
(37)
(38)
(39)
0 = Nh (qh , wh , λh ; τ h , ϕh , µh )
:= (τ h , qh )Th + (∇ · τ h , wh )Th − hτ h · n, λh i∂Th
− (∇ϕh , fc (wh ) − fv (wh , qh ))Th
D
E
+ ϕh , fbc − fbv
− (ϕh , s(wh , qh ))Th
∂Th
(40)
(41)
+ Nh,∂Ω (qh , wh ; τ h , ϕh ) + Nh,sc (qh , wh ; ϕh )
D
r
zE
+ µh , fbc − fbv
.
Γh
Please note the use of ∂Th in the weak formulation of the mixed form (see
Eq. (37)–(40)) and Γh in Eq. (41) defining λh . This perfectly resembles the character of these equations, being element- and edge-oriented, respectively. The terms
tested against τ h and ϕh are called local solvers, meaning they do not depend
on the solution within neighboring elements but only on the trace of the solution
which is approximated by λh . The coupling between elements is then introduced
by weakly enforcing the normal continuity of the numerical fluxes across interfaces
(see Eq. (41)).
We choose numerical fluxes similar to the Lax-Friedrich flux and to the LDG
flux for the convective and diffusive flux, respectively, i.e.
(42)
fbc (λh , wh ) = fc (λh ) · n − αc (λh − wh )
(43)
fbv (λh , wh , qh ) = fv (λh , qh ) · n + αv (λh − wh )
A COMPARISON OF HDG AND DG FOR TARGET-BASED hp-ADAPTATION
7
which can be combined into
(44)
fbc − fbv = (fc (λh ) − fv (λh , qh )) · n − α (λh − wh )
where α = αc + αv . The stabilization introduced can be given by a tensor; in
our work, however, we restrict ourselves to a constant scalar α which seems to be
sufficient for a wide range of test cases.
3.2.1. Boundary Conditions. In order to retrieve an adjoint-consistent scheme, special care has to be taken when discretizing the boundary conditions (see Schütz and
May [18]). The boundary conditions have to be incorporated by using the boundary
states w∂Ω (wh ) and gradients q∂Ω (wh , qh ), i.e.
(45)
Nh,∂Ω (qh , wh ; τ h , ϕh )
:= hτ h · n, w∂Ω iΓb + hϕh , (fc (w∂Ω ) − fv (w∂Ω , q∂Ω )) · niΓb .
h
h
We would like to emphasize that λh does not occur in this boundary term.
3.2.2. Shock-Capturing. In non-smooth parts of the solution, for example shocks in
compressible flows, a stabilization term has to be introduced. We adopt the shockcapturing approach by Hartmann and Houston [11] where an artificial viscosity
term, given by ∇ · ( (w, ∇w) ∇w), is used. The viscosity is given by the L1 norm of the strong residual ∇ · fc (w) in every element. In order to accelerate the
convergence of this term to zero with mesh refinement, it is premultiplied with an
K
. The latter resembles the actual resolution within an
effective mesh size h̃K := hpK
element. Furthermore, a user-defined factor 0 is introduced which can be reliably
tuned for a rather large range of test cases. Finally, the artificial viscosity is given
by
Z
0 h̃2−β
K
(46)
|K :=
d(w) dx
|K|
K
where the strong residual is given by
(47)
d(w) :=
m
X
|(∇ · fc (w))i | .
i=1
In the discretization of this shock-capturing term the interface integral is neglected so that only the volume contribution is considered, i.e.
(48)
Nh,sc (wh ; ϕh ) := (∇ϕh , (wh , ∇wh ) ∇wh )Th .
This obviates the need for introducing qh in purely convective problems (e.g. the
compressible Euler equations). In the viscous case, where the gradient is explicitly
given, ∇wh can be replaced by qh yielding
(49)
Nh,sc (qh , wh ; ϕh ) := (∇ϕh , (wh , qh ) qh )Th .
Please note, that this term enters only the local part of the discretization.
Furthermore, it is noteworthy that this shock-capturing term is not only consistent and conservative but also yields an asymptotically adjoint-consistent scheme.
8
WOOPEN, BALAN, MAY, SCHÜTZ
3.3. Relaxation. In order to solve the nonlinear system of equations that defines
the HDG method, the Newton-Raphson
method is applied. Beginning with an
initial guess x0h := q0h , wh0 , λ0h , one iteratively solves the linear system
Nh0 [xnh ] (δ xnh ; yh ) = −Nh (xnh ; yh )
(50)
∀yh ∈ Xh
and updates the solution as
xn+1
= xnh + δ xnh
h
(51)
until the residual Nh (xnh ; yh ) has reached a certain threshold. Please note, that
we have grouped qh , wh and λh , and the test functions into xh := (qh , wh , λh )
and yh := (τ h , ϕh , µh ), respectively. Nh0 denotes the Fréchet derivative of Nh with
respect to xh .
This routine can, however, lead to stability problems if the starting value x0h is
too far away from the solution xh . Therefore, an artificial time is introduced and a
backward Euler method is applied, which yields a slight modification of the linear
system given in Eq. (50), namely ∀yh ∈ Xh
(52)
ϕh ,
1
δwhn
∆tn
n
n
+ Nh0 [xn
h ] (δ xh ; yh ) = −Nh (xh ; yh ) .
Th
Please note that by choosing ∆tn → ∞, a pure Newton-Raphson method is obtained. Usually the time step is kept finite for a few initial steps to ensure stability.
As soon as the residual is lower than a certain threshold, i.e. the current approximation xnh is thought to be sufficiently close to the solution xh , we let the time
step go towards infinity.
As we are interested in steady-state problems, we can use local time-stepping in
order to accelerate the computation. For each element, we apply a time step based
on a global CFL number, the element volume, and an approximation of the flux
Jacobian’s spectral radius, i.e.
(53)
∆tnK = CFLn
|K|
.
λc + 4λv
Here, λc and λv represent approximations to the maximum eigenvalue of the convective and diffusive flux, respectively (see Mavriplis and Jameson [24]).
The next question is, how to choose CFLn in each iteration such that for xnh →
xh , CFLn → ∞. Therefore, we choose a sequence (CFLn )n to consist of a ramping
phase followed by a very fast increase, i.e.
(54)
3
2
− 2 nn
c0 3 nn0
0
n−1
CFLn :=
kNh
k2
n−1
1 + c1 max 0, log
CFL
kN n k
h
2
n ≤ n0
otherwise
Strictly speaking, the parameters c0 , c1 and n0 depend on the actual problem;
experiments, however, showed that they can be reliably tuned for a wide range of
problems.
3.4. Hybridization. Using an appropriate polynomial expansion for δqh , δwh and
δλh , the linearized global system Eq. (50) is given in matrix form as
A B R
δQ
F
C D S δW = G
(55)
L M N
δΛ
H
A COMPARISON OF HDG AND DG FOR TARGET-BASED hp-ADAPTATION
9
T
where the vector [δQ, δW, δΛ] contains the expansion coefficients of δxh with respect to the chosen basis.
In order to carry on with the derivation of the hybridized method, we want to
formulate that system in terms of δΛ only. Therefore we split it into
A B
δQ
F
R
(56)
=
−
δΛ
C D
δW
G
S
and
(57)
L
M
δQ
δW
+ N δΛ = H.
Substituting Eq. (56) into Eq. (57) yields the hybridized system
(58)
K δΛ = E.
where the system matrix and right-hand side vector are given by
!
A B −1 R
(59)
K= N− L M
C D
S
−1
A B
F
E=H− L M
(60)
.
C D
G
The workflow is as follows: First, the hybridized system is assembled and then
being solved for δΛ. Subsequently, δQ and δW can be reconstructed inside the
elements via Eq. (56). It is very important to note that it is not necessary to solve
the large system given by Eq. (56). In fact, the matrix in Eq. (56) can be reordered
to be block diagonal. Each of these blocks is associated to one element. Thus, both
the assembly of the hybridized matrix in Eq. (58) and the reconstruction of δQ and
δW can be done in an element-wise fashion. In order to save computational time,
the solutions to Eq. (56) can be saved after the assembly of the hybridized system
and reused during the reconstruction of δQ and δW .
The hybridized matrix is an nf × nf block matrix, where nf = |Γh | is the
number of interior edges. In each block row there is one block on the diagonal
and 2d off-diagonal blocks in the case of simplex elements. These blocks represent
the edges of the
neighboring elements of one edge. Each block is dense and has
O m2 · p2(d−1) entries. Please recall that p is the polynomial degree of the ansatz
functions, d is the spatial dimension of the domain Ω and m is the number of
partial differential equations (m = 4 for the 2-dimensional Euler or Navier-Stokes
equations). This structure is very similar to that
of a normal DG discretization,
whereas the blocks in the latter have O m2 · p2d entries and thus are considerably
bigger for higher polynomial order p. The size of the system matrix does not only
play a big role in terms of memory consumption but also for the iterative solver.
Here, a major portion of the overall workload goes into matrix-vector products
which can obviously be performed faster, if the problem dimensions are smaller. In
our code we use an ILU(n)-preconditioned GMRES which is available through the
PETSc library [25, 26].
4. Adaptation Procedure
In the context of adjoint-based (also referred to as target- or output-based) error
estimation, one is interested in quantifying the error of a specific target functional
10
WOOPEN, BALAN, MAY, SCHÜTZ
Jh : Xh → R, i.e.
eh := Jh (x) − Jh (xh ) ,
(61)
where xh is the approximation to x in Xh . This target functional can for example
represent lift or drag coefficients in aerospace applications. In general, the target
functional is an integrated value, where integration can be both on a volume or
along the boundary. For the derivation of the adjoint-based error estimate we
expand the target functional in a Taylor series as follows
(62)
Jh (x) − Jh (xh ) = Jh0 [xh ] δ xh + O kδ xh k2
where we defined δ xh := x − xh .
We proceed in a similar manner with the error in the residual, i.e.
Nh (x; yh ) − Nh (xh ; yh ) = Nh0 [xh ] (δ xh ; yh ) + O kδ xh k2 .
(63)
As our discretization is consistent the first term Nh (x; yh ) vanishes.
Substituting Eq. (63) into Eq. (62) and neglecting the quadratic terms yields
eh ≈ η := −Nh (xh ; zh )
(64)
where
zh
is defined by the so-called adjoint equation
e h.
Nh0 [xh ] (yh ; zh ) = Jh0 [xh ] (yh )
∀yh ∈ X
eh ∈ X
e h represents the link between variaThe adjoint solution zh = qeh , w
eh , λ
tions in the residual and in the target functional.
The global error estimate η can then be restricted to a single element to yield a
local indicator to drive an adaptation procedure, i.e.
(65)
(66)
eh , w
eh , 0)
ηK := Nh (qh , wh , λh ; q
K
.
Here, we want to emphasize that, in contrast to the global error estimate, we ignore
eh . We found that by taking the
the contribution of the hybrid adjoint variable λ
whole adjoint into account, jumps across element interfaces were overly penalized.
This deserves a more in-depth analysis.
Please note, that the functionals Nh and Jh and their jacobians have to be
e h ⊃ Xh . Otherwise the
evaluated in a somewhat richer space than Xh , namely X
weighted residual Nh (xh ; zh ) would be identical zero as
(67)
Nh (xh ; yh ) = 0
∀yh ∈ Xh .
This can be achieved by either mesh refinement or a higher polynomial degree of
the ansatz functions. In our setting, especially when using a hierarchical basis, the
latter is advantageous with respect to implementational effort and efficiency.
4.1. Hybridization. In matrix form, the
follows
T
A B R
C D S
(68)
L M N
adjoint system (see Eq. (65)) reads as
e
Q
f
W
=
e
Λ
Fe
e
G
e
H
e = 0 as λh is not defined on the boundary
Please note, that in our formulation H
and thus the target functional depends only on wh and qh .
A COMPARISON OF HDG AND DG FOR TARGET-BASED hp-ADAPTATION
11
As the overall structure of the adjoint equation is similar to the primal system
(see Eq. (58)), one can also apply static condensation to the adjoint system which
then yields its hybridized form:
e=E
e
KT Λ
(69)
where the right-hand side is given by
(70)
e=−
E
RT
ST
A
C
B
D
−T "
Fe
e
G
#
.
It is interesting to note that the hybridized adjoint system matrix is also the
transpose of the hybridized primal system matrix (for a higher polynomial order).
This is very beneficial for the implementation as the routines for the assembly of
this matrix are already available.
The adjoint solution within each element can then be computed with the aid of
the adjoint local system, given by
#
# "
T "
e
T
Q
A B
Fe
e
− L M
Λ
(71)
=
e
f
C D
G
W
where the matrix is also the transpose of the primal local matrix (see Eq. (56)).
4.2. Marking Elements for Refinement. After having obtained a localized error estimate, we have to choose a set of elements to be refined. This can be done
in many different ways. We adopt a strategy proposed by Dörfler [27]. The aim
of this marking strategy is to find the smallest set M ⊆ Th such that the error
contributed by this set represents a certain fraction of the total error, i.e.
(72)
ηM ≥ (1 − θ) ηTh .
The user-defined parameter θ is of course problem dependent. It can, however, be
tuned for a large rangePof test cases. Please note, that we define the error of any
2
2
subset of Th as ηM
:= K∈M ηK
.
4.3. Choosing between h- and p-Adaptation. The final step in the adaptation
procedure is the decision between mesh refinement and order enrichment. There
exist several ways to make this decision. Ceze and Fidkowski [28] solve local adjoint
problems for both options and then decide which one is more efficient with respect
to degrees of freedom or the non-zero entries in the system matrix. We, however,
adopt the strategy by Wang and Mavriplis [29]. They used a smoothness sensor
originally devised by Persson and Peraire [30] for an artificial viscosity approach.
This sensor exploits the fact that the decay of the expansion coefficients of the
solution is closely linked to its smoothness. For smoother solutions, decay is faster.
This can be exploited to check the regularity of the solution. On each element, the
smoothness sensor is defined as
(w − w? , w − w? )K
(73)
SK :=
(w, w)K
where w? is the element-wise projection of w to the next smaller polynomial space,
given by
(74)
(ϕh , w? )K = (ϕh , w)K
∀ϕh ∈ ΠpK −1 (K).
12
WOOPEN, BALAN, MAY, SCHÜTZ
(a) Coarse mesh
(b) Adapted mesh
Figure 1. Smoothness sensor for a transonic test case
Hence, w − w? represents the higher order components of the solution (see Fig. 1).
As we use a hierarchical basis [31], this projection is very cheap. By introducing a
threshold S , a decision between mesh-refinement and p-enrichment can be made,
i.e.
(
(75)
SK
< S
≥ S
p-enrichment
mesh-refinement
First promising results for this approach are given in [20].
A COMPARISON OF HDG AND DG FOR TARGET-BASED hp-ADAPTATION
13
5. Results
In the following we compare our in-house HDG and DG solvers in terms of degrees of freedom and runtime. The DG discretization is based on the Lax-Friedrich
and the BR2 [32] fluxes for convective and viscous terms, respectively. Boundary
conditions and target functionals are evaluated in an adjoint-consistent manner
[33]. Both solvers share the same computational framework, so we believe that our
comparison is meaningful.
We apply both solvers to compressible flow problems, including inviscid subsonic,
transonic and supersonic, as well as subsonic laminar flow. In all cases we show
results for pure mesh-adaptation (p = 1 . . . 4) and hp-adaptation (p = 2 . . . 5).
Please note, that we choose the same relaxation parameters for all test cases,
namely, c0 = 106 , c1 = 103 , n0 = 4 (see Eq. (54)). If artificial viscosity is necessary,
we use 0 = 0.2 and β = 0. The parameters for the adaptation procedure are chosen
as θ = 0.05 and S = 10−6 . This set of parameters seems to be robust for both
DG and HDG for a broad range of test cases. In order to approximate the error
in drag, reference solutions on hp-adapted meshes with more than 2 · 106 degrees
of freedom are used. (Please note, that we refer to ndof w whenever we speak of
degrees of freedom in the following as this is a good measure for the resolution.)
Before we turn our attention to the adaptive computations, we compare runtimes for both methods on a fixed mesh for several polynomial orders. This way,
we can learn which improvement can be expected. In Fig. 2 timings for the assembly
procedure and the iterative solver are given. We show Euler and a Navier-Stokes
computation on a mesh with 2396 elements and 3544 interior faces. We used polynomial orders from p = 0 to p = 6. We want to emphasize that the necessary
Newton and GMRES iterations for both HDG and DG were comparable. As there
are more faces than elements, DG is faster than HDG for p = 0 and p = 1. However, already for p = 2 HDG outruns DG. At p = 6 there is a ratio of 2.5 for the
Euler test case and 2.1 for the Navier-Stokes test case. For the Euler test case it
is interesting to note, that the iterative solver dominates the computational time
for DG. For HDG it is the other way around. This has two reasons: firstly, the
assembly is more involved due to the local solves; and secondly, the global system
is considerably smaller for higher polynomial degree. In the case of a Navier-Stokes
computation, the DG assembly takes over the dominating part as the lifting operators are very expensive to compute. The time for the HDG assembly is also
increased which is among other things due to the introduction of the gradient. For
both HDG and DG, the time spent in the iterative solver is comparable for both
Euler and Navier-Stokes.
5.1. Subsonic Inviscid Flow over the NACA 0012 Airfoil. In the first test
case, we consider subsonic inviscid flow over the NACA 0012 airfoil which is defined
by
√
y = ±0.6 0.2969 x − 0.1260x − 0.3516x2 + 0.2843x3 − 0.1015x4
with x ∈ [0, 1]. Using this definition, the airfoil would have a finite trailing edge
thickness of .252 %. In order to obtain a sharp trailing edge we modify the x4
coefficient, i.e.
√
y = ±0.6 0.2969 x − 0.1260x − 0.3516x2 + 0.2843x3 − 0.1036x4 .
The flow is characterized by a free stream Mach number of Ma∞ = 0.5 and an
angle of attack of α = 2◦ . In Fig. 3 the baseline mesh for the Euler test cases
14
WOOPEN, BALAN, MAY, SCHÜTZ
Assembly
40
Assembly
200
Linear Solve
Linear Solve
t
t
150
100
20
50
0
0
1
2
3
p
4
5
6
(a) Euler
0
0
1
2
3
p
4
5
6
(b) Navier-Stokes
Figure 2. Runtime comparison of the hybridized and nonhybridized DG method for a fixed mesh and varying polynomial
degree (Solid: HDG, Shaded: DG).
(subsonic and transonic) can be seen. It consists of 719 elements and its far field is
over a 1000 chords away.
Admissible target functionals defined on the boundary for the Euler equations
are given by the weighted pressure along wall boundaries, i.e.
Z
(76)
J(w) =
ψ · (pn) dσ
∂Ω
where n is the outward pointing normal. By using ψ =
1
C∞
T
1
C∞
T
(cos α, sin α)
or
ψ =
(− sin α, cos α) along wall boundaries and 0 otherwise, the functional
represents the pressure drag coefficient cD or the pressure lift coefficient cL , respectively. C∞ is a normalized reference value defined by C∞ = 12 γMa2∞ p∞ l. Here, l is
the chord length of the airfoil.
In Fig. 4a, a purely h-adapted mesh can be seen. The most refined regions are
the leading and trailing edge. The former is of importance as the flow experiences
high gradients towards the stagnation point. Refinement of the latter is necessary
due to the sharp trailing edge and the slip-wall boundary conditions. As soon as
the error in these two regions is sufficiently low, other elements close to the airfoil
get refined as well. For the hp-adapted mesh (see Fig. 4b) the leading and trailing
edge are refined as well. All other regions, however, undergo mostly p-enrichment.
In terms of degrees of freedom, both HDG and DG show similar results. For
all computations it takes some adaptations until the critical regions, leading and
trailing edge, are resolved. From this point on, one can see the benefit of a higher
order discretization: the error drops significantly faster with respect to degrees of
freedom and computational time (see Fig. 5 and 6).
In Tbl. 1, we give the runtime ratios for a fixed error level (we always choose
the minimum level attained). For p = 1, HDG and DG are comparable in both
runtime and nonzero entries. From p = 2 on, HDG is faster than DG and needs
less memories for the global system. Here, it is important to note that the adjoint is approximated with p + 1, so that already for lower orders HDG is faster.
A COMPARISON OF HDG AND DG FOR TARGET-BASED hp-ADAPTATION
15
Figure 3. Baseline mesh with 719 elements for inviscid computations
p
1
2
3
4
tDG /tHDG
1.293 3.799 3.551 3.092
nnz,DG /nnz,HDG 1.123 2.150 3.248 4.281
Table 1. Runtime and nonzero ratios for a fixed
(Ma∞ = 0.5, α = 2◦ )
hp
2.209
4.601
error level
Furthermore, we list the ratio of nonzero entries in the system matrix in order to
compare the memory requirements of both methods. As expected, the ratio grows
with increasing polynomial degree in favor of HDG.
5.2. Transonic Inviscid Flow over the NACA 0012 Airfoil. Next, we turn
our attention to transonic flow which develops more complex features (e.g. compression shocks) compared to the subsonic regime. The flow is characterized by a
free stream Mach number of Ma∞ = 0.8 and an angle of attack of α = 1.25◦ .
In Fig. 7a a purely h-adapted mesh can be seen. The adjoint sensor detects all
regions of relevance for the drag: the upper shock, the leading and trailing edge,
and the lower weak shock. Further refinement is added upstream of the shock,
where the adjoint has steep gradients and thus needs higher resolution. In the case
of hp-adaptation, the mesh-refinement is stronger confined to the shock region and
the trailing edge. The other features undergo p-enrichment.
As expected, both methods show a similar accuracy for a given number of degrees
of freedom. The computations with p = 2 . . . 4 outperform p = 1 but are comparable
to each other. hp-adaptation shows very good results which is due to the accurate
prediction of the solution smoothness (see Fig. 8 and 9).
For this test case, HDG is faster than DG from p = 1 on (see Tbl. 2). The hpadaptive run is more than 2.5 times faster. The ratio of necessary nonzero entries
attains its highest value for p = 4. In the case of hp-adaptation, this ratio is not as
high, as in the shock region a lot of elements with p = 2 exist.
16
WOOPEN, BALAN, MAY, SCHÜTZ
(a) Pure h-adapation (p = 2)
(b) hp-adapation (p = 2 . . . 5)
Figure 4. Adapted meshes for the subsonic Euler test case
(Ma∞ = 0.5, α = 2◦ )
p
1
2
3
4
tDG /tHDG
2.636 1.607 2.154 2.362
nnz,DG /nnz,HDG 1.237 1.807 3.098 4.437
Table 2. Runtime and nonzero ratios for a fixed
(Ma∞ = 0.8, α = 1.25◦ )
hp
2.628
2.411
error level
A COMPARISON OF HDG AND DG FOR TARGET-BASED hp-ADAPTATION
10−3
10−5
∆cD
∆cD
10−3
17
p=1
p=2
p=3
p=4
hp
10−7
10−5
10−7
103
104
ndof w
105
p=1
p=2
p=3
p=4
hp
103
104
ndof w
(a) HDG
105
(b) DG
Figure 5. Drag convergence with respect to degrees of freedom
(Ma∞ = 0.5, α = 2◦ )
10−5
10−7
10−2
10−3
∆cD
∆cD
10−3
p=1
p=2
p=3
p=4
hp
10−5
10−7
10−1
100
t/t0
(a) HDG
101
102
10−2
p=1
p=2
p=3
p=4
hp
10−1
100
t/t0
101
102
(b) DG
Figure 6. Drag convergence with respect to time (Ma∞ = 0.5, α = 2◦ )
5.3. Supersonic Inviscid Flow over the NACA 0012 Airfoil. Now, we consider supersonic, inviscid flow with a free stream Mach number of Ma = 1.4. We
choose the angle of attack to be α = 0◦ . In contrast to the transonic test case, a
so-called bow shock develops in front of the airfoil.
A purely h-adapted mesh is given in Fig. 10a. Several refinement regions can
be identified: the bow shock, leading and trailing edge, and a feature in the adjoint solution emanating from the trailing edge in the upstream direction. During
hp-adaptation, the latter feature and the leading edge are being treated with penrichment.
Both HDG and DG show a similar behavior in terms of error reduction with
respect to degrees of freedom (see Fig. 11). A comparison between different polynomial orders is rather inconclusive which might be due to the lack of smoothness
of this test case. Furthermore, we note that the convergence behavior is not monotonic (see for example p = 3 in Fig. 11). The error reduction with respect to
18
WOOPEN, BALAN, MAY, SCHÜTZ
(a) Pure h-adaptation (p = 2)
(b) hp-adaptation (p = 2 . . . 5)
Figure 7. Adapted meshes for the transonic Euler test case
(Ma∞ = 0.8, α = 1.25◦ )
computational time is similar (see Fig. 12). In both measures, the hp-adaptive run
gives the overall best solution.
Considering the time to solution, HDG is approximately 50% faster than DG
(see Tbl. 3). The hp-adaptive run is more than 3.5 times faster. Similar to the
transonic test case, the ratio of necessary nonzero entries attains its highest value
for p = 4. In the case of hp-adaptation, this ratio is not as high, as in the shock
region a lot of elements with p = 2 exist.
5.4. Subsonic Laminar Flow over the NACA 0012 Airfoil. Finally, we consider viscous flow in the subsonic regime. The free stream Mach number is Ma∞ =
10−1
10−1
10−2
10−2
10−3
10−4
10−5
103
∆cD
∆cD
A COMPARISON OF HDG AND DG FOR TARGET-BASED hp-ADAPTATION
p=1
p=2
p=3
p=4
hp
10−3
10−4
104
ndof w
10−5
103
105
19
p=1
p=2
p=3
p=4
hp
104
ndof w
(a) HDG
105
(b) DG
10−1
10−1
10−2
10−2
10−3
10−4
10−5
10−1
∆cD
∆cD
Figure 8. Drag convergence with respect to degrees of freedom
(Ma∞ = 0.8, α = 1.25◦ )
p=1
p=2
p=3
p=4
hp
10−3
10−4
101
100
t/t0
(a) HDG
102
10−5
10−1
p=1
p=2
p=3
p=4
hp
101
100
102
t/t0
(b) DG
Figure 9. Drag convergence with respect to time (Ma∞ = 0.8,
α = 1.25◦ )
p
1
2
3
4
tDG /tHDG
2.817 1.335 1.751 1.441
nnz,DG /nnz,HDG 1.212 2.132 3.429 4.030
Table 3. Runtime and nonzero ratios for a fixed
(Ma∞ = 1.4, α = 0◦ )
hp
3.554
3.806
error level
0.5, the angle of attack α = 1◦ and the Reynolds number Re = 5000. Due to the
latter, a thin boundary layer develops around the airfoil.
The baseline mesh for the Navier-Stokes test case is more refined around the
airfoil such that the boundary layer is correctly captured (see Fig. 13). It consists
of 1781 elements and its far field is over a 1000 chords away.
20
WOOPEN, BALAN, MAY, SCHÜTZ
(a) Pure h-adapation (p = 2)
(b) hp-adapation (p = 2 . . . 5)
Figure 10. Adapted meshes for the supersonic Euler test case
(Ma∞ = 1.4, α = 0◦ )
Admissible target functionals defined on the boundary for the Navier-Stokes
equations are given by the weighted boundary flux (including pressure and shear
forces) along wall boundaries, i.e.
Z
(77)
J (w, ∇w) =
ψ · (pn − τ n) dσ
∂Ω
where n is the outward pointing normal. Here, ψ is nonzero only on wall boundaries.
T
T
By using ψ = C1∞ (cos α, sin α) or ψ = C1∞ (− sin α, cos α) along wall boundaries
and otherwise 0, the functional represents the viscous drag coefficient cD or the
viscous lift coefficient cL , respectively.
10−2
10−2
10−3
10−3
10−4
10−5
10−6
103
∆cD
∆cD
A COMPARISON OF HDG AND DG FOR TARGET-BASED hp-ADAPTATION
p=1
p=2
p=3
p=4
hp
10−4
10−5
104
ndof w
10−6
103
105
(a) HDG
21
p=1
p=2
p=3
p=4
hp
104
ndof w
105
(b) DG
Figure 11. Drag convergence with respect to degrees of freedom
(Ma∞ = 1.4, α = 0◦ )
p=1
p=2
p=3
p=4
hp
∆cD
10−3
10−4
10−5
10−6
10−1
10−2
p=1
p=2
p=3
p=4
hp
10−3
∆cD
10−2
10−4
10−5
100
101
t/t0
(a) HDG
102
10−6
10−1
100
101
102
t/t0
(b) DG
Figure 12. Drag convergence with respect to time (Ma∞ = 1.4, α = 0◦ )
Both the h-adapted mesh (see Fig. 14a) and the hp-adapted mesh (see Fig. 14b)
undergo refinement within the boundary layer and the wake region. The mesh
refinement for the hp-adaptive run is however more restricted to the leading edge
region where the boundary layer develops. Further downstream, p-enrichment is
used as soon as the necessary mesh-resolution is reached.
In terms of accuracy versus degrees of freedom, HDG and DG perform comparably well. The higher the polynomial degree the more accurate and efficient the
computations are for both HDG and DG (see Fig. 15 and 16). The difference between hp, p = 3 and p = 4 is not as big, though. This might lead to the conclusion
that isotropic mesh refinement is not longer efficiently applicable in cases involving
strong gradients. Anisotropic refinement might be able to remedy this problem so
that the full potential of hp-adaptation can be attained.
Concerning the timings, we can see a similar trend as in the previous test cases
(see Tbl. 4). For p = 1 . . . 4, HDG is more than twice as fast. The hp-adaptive
22
WOOPEN, BALAN, MAY, SCHÜTZ
Figure 13. Baseline mesh with 1781 elements for viscous computations
p
1
2
3
4
tDG /tHDG
2.244 2.572 2.397 2.288
nnz,DG /nnz,HDG 1.196 2.235 3.472 4.531
Table 4. Runtime and nonzero ratios for a fixed
(Ma∞ = 0.5, α = 1◦ , Re = 5000)
hp
3.122
3.463
error level
HDG computation is even three times as fast compared to the DG run. For p ≥ 2
the savings in nonzero entries for HDG become significant.
6. Conclusion and Outlook
We presented an adjoint-based hp-adaptation methodology and compared it for
hybridized and non-hybridized discontinuous Galerkin methods. hp-adaptation
proved to be superior to pure h-adaptation if discontinuous or singular flow features
were involved. In all cases, a higher polynomial degree turned out to be beneficial.
We showed that one can expect HDG to be better than DG in terms of runtime and
memory requirements from p = 2 on for a broad range of test cases. The results
are promising enough to pursue further comparisons with more complex test cases.
We plan to extend our computational framework to three dimensional problems
[34]. Then, adaptivity will play an even more crucial role, as the problem size
increases drastically compared to the two dimensional case.
Furthermore, compressible flows are often dominated by anisotropic features,
such as shocks or very thin boundary layers. Thus, taking this anisotropy into
account during adaptation is crucial. We plan to incorporate anisotropic adaptation
within future projects.
Acknowledgments
Financial support from the Deutsche Forschungsgemeinschaft (German Research
Association) through grant GSC 111 is gratefully acknowledged.
A COMPARISON OF HDG AND DG FOR TARGET-BASED hp-ADAPTATION
23
(a) Pure h-adaptation (p = 2)
(b) hp-adaptation (p = 2 . . . 5)
Figure 14. Adapted meshes for the Navier-Stokes test case
(Ma∞ = 0.5, α = 1◦ , Re = 5000)
References
[1] F. Bassi, S. Rebay, A High-Order Accurate Discontinuous Finite-Element
Method for the Numerical Solution of the Compressible Navier-Stokes Equations, Journal of Computational Physics 131 (1997) 267–279.
[2] B. Cockburn, C.-W. Shu, TVB Runge-Kutta Local Projection Discontinuous
Galerkin Finite Element Method for Conservation Laws II: General Framework, Mathematics of Computation 52 (1988) 411–435.
[3] D. Arnold, F. Brezzi, B. Cockburn, L. Marini, Unified Analysis of Discontinuous Galerkin Methods for Elliptic Problems, SIAM Journal on Numerical
Analysis 39 (2002) 1749–1779.
WOOPEN, BALAN, MAY, SCHÜTZ
10−2
10−2
10−3
10−3
10−4
∆cD
∆cD
24
p=1
p=2
p=3
p=4
hp
10−5
10−6
10−4
10−5
104
10−6
105
ndof w
p=1
p=2
p=3
p=4
hp
104
(a) HDG
105
ndof w
(b) DG
10−2
10−2
10−3
10−3
10−4
10−5
10−6
10−1
∆cD
∆cD
Figure 15. Drag convergence with respect to degrees of freedom
(Ma∞ = 0.5, α = 1◦ , Re = 5000)
p=1
p=2
p=3
p=4
hp
10−4
10−5
100
101
t/t0
(a) HDG
102
103
10−6
10−1
p=1
p=2
p=3
p=4
hp
100
101
t/t0
102
103
(b) DG
Figure 16. Drag convergence with respect to time (Ma∞ = 0.5,
α = 1◦ , Re = 5000)
[4] B. F. de Veubeke, Displacement and Equilibrium Models in the Finite Element
Method, chap. 9, Wiley New York, 145–197, 1965.
[5] B. Cockburn, J. Gopalakrishnan, A Characterization of Hybridized Mixed
Methods for Second Order Elliptic Problems, SIAM Journal on Numerical
Analysis 42 (1) (2004) 283–301.
[6] B. Cockburn, J. Gopalakrishnan, R. Lazarov, Unified Hybridization of Discontinuous Galerkin, Mixed, and Continuous Galerkin Methods for Second
Order Elliptic Problems, SIAM Journal on Numerical Analysis 47 (2) (2009)
1319–1365.
[7] N. Nguyen, J. Peraire, B. Cockburn, An Implicit High-Order Hybridizable
Discontinuous Galerkin Method for Linear Convection-Diffusion Equations,
Journal of Computational Physics 228 (9) (2009) 3232–3254.
A COMPARISON OF HDG AND DG FOR TARGET-BASED hp-ADAPTATION
25
[8] N. Nguyen, J. Peraire, B. Cockburn, An Implicit High-Order Hybridizable
Discontinuous Galerkin Method for Nonlinear Convection-Diffusion Equations,
Journal of Computational Physics 228 (2009) 8841–8855.
[9] J. Peraire, N. Nguyen, B. Cockburn, A Hybridizable Discontinuous Galerkin
Method for the Compressible Euler and Navier-Stokes Equations, AIAA Paper
2010-0363, 2010.
[10] A. Huerta, A. Angeloski, X. Roca, J. Peraire, Efficiency of High-Order Elements for Continuous and Discontinuous Galerkin Methods, Int. J. Numer.
Methods Eng. 96 (9) (2013) 529–560.
[11] R. Hartmann, P. Houston, Adaptive Discontinuous Galerkin Finite Element
Methods for the Compressible Euler Equations, Journal of Computational
Physics 183 (2) (2002) 508–532.
[12] D. Venditti, D. Darmofal, Grid Adaptation for Functional Outputs: Application to Two-Dimensional Inviscid Flows, Journal of Computational Physics
176 (1) (2002) 40–69.
[13] D. Venditti, D. Darmofal, Anisotropic Grid Adaptation for Functional Outputs: Application to Two-Dimensional Viscous Flows, Journal of Computational Physics 187 (1) (2003) 22–46.
[14] R. Hartmann, Adaptive Discontinuous Galerkin Methods with ShockCapturing for the Compressible Navier–Stokes Equations, International Journal for Numerical Methods in Fluids 51 (9-10) (2006) 1131–1156.
[15] K. Fidkowski, D. Darmofal, Review of Output-Based Error Estimation and
Mesh Adaptation in Computational Fluid Dynamics, AIAA Journal 49 (4)
(2011) 673–694.
[16] G. Giorgiani, S. Fernández-Méndez, A. Huerta, Hybridizable Discontinuous
Galerkin p-Adaptivity for Wave Propagation Problems, International Journal
for Numerical Methods in Fluids .
[17] J. Schütz, G. May, A Hybrid Mixed Method for the Compressible Navier–
Stokes Equations, Journal of Computational Physics 240 (2013) 58–75.
[18] J. Schütz, G. May, An Adjoint Consistency Analysis for a Class of Hybrid
Mixed Methods, IMA Journal of Numerical Analysis .
[19] M. Woopen, G. May, J. Schütz, Adjoint-Based Error Estimation and Mesh
Adaptation for Hybridized Discontinuous Galerkin Methods, arXiv preprint
arXiv:1309.3649 .
[20] A. Balan, M. Woopen, G. May, Adjoint-Based hp-Adaptation for a Class of
High-Order Hybridized Finite Element Schemes for Compressible Flows, AIAA
Paper 2013-2938, 2013.
[21] E. Godlewski, P. Raviart, Numerical Approximation of Hyperbolic Systems of
Conservation Laws, no. Nr. 118 in Applied Mathematical Sciences, Springer,
ISBN 9780387945293, 1996.
[22] Y. Chen, B. Cockburn, Analysis of Variable-Degree HDG Methods for
Convection–Diffusion Equations. Part I: General Nonconforming Meshes, IMA
Journal of Numerical Analysis 32 (4) (2012) 1267–1293.
[23] B. Cockburn, J. Gopalakrishnan, Error Analysis of Variable Degree Mixed
Methods for Elliptic Problems via Hybridization, Mathematics of Computation
74 (252) (2005) 1653–1677.
[24] D. Mavriplis, A. Jameson, Multigrid Solution of the Navier-Stokes Equations
on Triangular Meshes, AIAA Journal 28 (8) (1990) 1415–1425.
26
WOOPEN, BALAN, MAY, SCHÜTZ
[25] S. Balay, J. Brown, K. Buschelman, W. Gropp, D. Kaushik,
M. Knepley, L. McInnes, B. Smith, H. Zhang, PETSc Web Page,
http://www.mcs.anl.gov/petsc, 2013.
[26] S. Balay, J. Brown, K. Buschelman, V. Eijkhout, W. Gropp, D. Kaushik,
M. Knepley, L. McInnes, B. Smith, H. Zhang, PETSc Users Manual, Tech.
Rep. ANL-95/11 - Revision 3.4, Argonne National Laboratory, 2013.
[27] W. Dörfler, A Convergent Adaptive Algorithm for Poisson’s Equation, SIAM
Journal on Numerical Analysis 33 (3) (1996) 1106–1124.
[28] M. Ceze, K. Fidkowski, Output-Driven Anisotropic Mesh Adaptation for Viscous Flows using Discrete Choice Optimization, AIAA Paper 2010-0170, 2010.
[29] L. Wang, D. J. Mavriplis, Adjoint-Based h-p Adaptive Discontinuous Galerkin
Methods for the 2D Compressible Euler Equations, Journal of Computational
Physics 228 (2009) 7643–7661.
[30] P. Persson, J. Peraire, Sub-cell Shock Capturing for Discontinuous Galerkin
Methods, AIAA Paper 2006-0112, 2006.
[31] M. Dubiner, Spectral Methods on Triangles and Other Domains, J. Sci. Comput. 6 (4) (1991) 345–390.
[32] F. Bassi, A. Crivellini, S. Rebay, M. Savini, Discontinuous Galerkin Solution of
the Reynolds-Averaged Navier-Stokes and k-ω Turbulence Model Equations,
Computers & Fluids 34 (4) (2005) 507–540.
[33] R. Hartmann, Adjoint Consistency Analysis of Discontinuous Galerkin Discretizations, SIAM Journal on Numerical Analysis 45 (6) (2007) 2671–2696.
[34] M. Woopen, A. Balan, G. May, A Hybridized Discontinuous Galerkin Method
for Three-Dimensional Compressible Flow Problems, AIAA Paper 2014-0938,
2014.
| 5cs.CE
|
arXiv:1611.04196v3 [cs.IT] 21 Nov 2017
Self-Calibration and Bilinear Inverse Problems
via Linear Least Squares∗
Shuyang Ling†, Thomas Strohmer‡
November 22, 2017
Abstract
Whenever we use devices to take measurements, calibration is indispensable. While the
purpose of calibration is to reduce bias and uncertainty in the measurements, it can be quite
difficult, expensive, and sometimes even impossible to implement. We study a challenging
problem called self-calibration, i.e., the task of designing an algorithm for devices so that the
algorithm is able to perform calibration automatically. More precisely, we consider the setup
y = A(d)x+ε where only partial information about the sensing matrix A(d) is known and where
A(d) linearly depends on d. The goal is to estimate the calibration parameter d (resolve the
uncertainty in the sensing process) and the signal/object of interests x simultaneously. For three
different models of practical relevance, we show how such a bilinear inverse problem, including
blind deconvolution as an important example, can be solved via a simple linear least squares
approach. As a consequence, the proposed algorithms are numerically extremely efficient, thus
potentially allowing for real-time deployment. We also present a variation of the least squares
approach, which leads to a spectral method, where the solution to the bilinear inverse problem
can be found by computing the singular vector associated with the smallest singular value of a
certain matrix derived from the bilinear system. Explicit theoretical guarantees and stability
theory are derived for both techniques; and the number of sampling complexity is nearly optimal
(up to a poly-log factor). Applications in imaging sciences and signal processing are discussed
and numerical simulations are presented to demonstrate the effectiveness and efficiency of our
approach.
1
Introduction
Calibration is ubiquitous in all fields of science and engineering. It is an essential step to guarantee
that the devices measure accurately what scientists and engineers want. If sensor devices are not
properly calibrated, their measurements are likely of little use to the application. While calibration
is mostly done by specialists, it often can be expensive, time-consuming and sometimes even impossible to do in practice. Hence, one may wonder whether it is possible to enable machines to calibrate
themselves automatically with a smart algorithm and give the desired measurements. This leads
to the challenging field of self-calibration (or blind calibration). It has a long history in imaging
sciences, such as camera self-calibration [33, 22], blind image deconvolution [12], self-calibration in
∗
This research was supported by the NSF via Award Nr. dtra-dms 1322393 and Award Nr. DMS 1620455.
Courant Institute of Mathematical Sciences and the Center for Data Science, New York University, NY 10003
(Email: [email protected])
‡
Department of Mathematics, University of California Davis, CA 95616 (Email: [email protected]).
†
1
medical imaging [35], and the well-known phase retrieval problem (phase calibration) [16]. It also
plays an important role in signal processing [18] and wireless communications [38, 32].
Self-calibration is not only a challenging problem for engineers, but also for mathematicians. It
means that one needs to estimate the calibration parameter of the devices to adjust the measurements as well as recover the signal of interests. More precisely, many self-calibration problems are
expressed in the following mathematical form,
y = A(d)x + ε,
(1.1)
where y is the observation, A(d) is a partially unknown sensing matrix, which depends on an unknown parameter d and x is the desired signal. An uncalibrated sensor/device directly corresponds
to “imperfect sensing”, i.e., uncertainty exists within the sensing procedure and we do not know
everything about A(d) due to the lack of calibration. The purpose of self-calibration is to resolve
the uncertainty i.e., to estimate d in A(d) and to recover the signal x at the same time.
The general model (1.1) is too hard to get meaningful solutions without any further assumption
since there are many variants of the general model under different settings. In (1.1), A(d) may
depend on d in a nonlinear way, e.g., d can be the unknown orientation of a protein molecule
and x is the desired object [44]; in phase retrieval, d is the unknown phase information of the
Fourier transform of the object [16]; in direction-of-arrival estimation d represents unknown offset,
gain, and phase of the sensors [47]. Hence, it is impossible to resolve every issue in this field,
but we want to understand several scenarios of self-calibration which have great potential in real
world applications. Among all the cases of interest, we assume that A(d) linearly depends on the
unknown d and will explore three different types of self-calibration models that are of considerable
practical relevance. However, even for linear dependence, the problem is already quite challenging,
since in fact we are dealing with bilinear (nonlinear) inverse problems. All those three models have
wide applications in imaging sciences, signal processing, wireless communications, etc., which will
be addressed later. Common to these applications is the desire or need for fast algorithms, which
ideally should be accompanied by theoretical performance guarantees. We will show under certain
cases, these bilinear problems can be solved by linear least squares exactly and efficiently if no
noise exists, which is guaranteed by rigorous mathematical proofs. Moreover, we prove that the
solution is also robust to noise with tools from random matrix theory. Furthermore, we show that
a variation of our approach leads to a spectral method, where the solution to the bilinear problem
can be found by computing the singular vector associated with the smallest singular matrix of a
certain matrix derived from the bilinear system.
1.1
State of the art
By assuming that A(d) linearly depends on d, (1.1) becomes a bilinear inverse problem, i.e., we
want to estimate d and x from y, where y is the output of a bilinear map from (d, x). Bilinear
inverse problems, due to its importance, are getting more and more attentions over the last few
years. On the other hand, they are also notoriously difficult to solve in general. Bilinear inverse
problems are closely related to low-rank matrix recovery, see [15] for a comprehensive review. There
exists extensive literature on this topic and it is not possible do justice to all these contributions.
Instead we will only highlight some of the works which have inspired us.
Blind deconvolution might be one of the most important examples of bilinear inverse problems [12], i.e., recovering f and g from y = f ∗ g, where “∗” stands for convolution. If both
f and g are inside known low-dimensional subspaces, the blind deconvolution can be rewritten
2
as F(y) = diag(Bd)Ax, where F(f ) = Bd, F(g) = Ax and “F” denotes the Fourier transform. In the inspiring work [4], Ahmed, Romberg and Recht apply the “lifting” techniques [13]
and convert the problem into estimation of the rank-one matrix dx∗ . It is shown that solving a
convex relaxation enables recovery of dx∗ under certain choices of B and A. Following a similar
spirit, [30] uses “lifting” combined with a convex approach to solve the scenarios with sparse x
and [29] studies the so called “blind deconvolution and blind demixing” problem. The other line of
blind deconvolution follows a nonconvex optimization approach [3, 26, 25]. In [3], Ahmed, Romberg
and Krahmer, using tools from generic chaining, obtain local convergence of a sparse power factorization algorithm to solve this blind deconvolution problem when h and x are sparse and B and A
are Gaussian random matrices. Under the same setting as [3], Lee et al. [25] propose a projected
gradient descent algorithm based on matrix factorizations and provide a convergence analysis to
recover sparse signals from subsampled convolution. However, this projection step can be hard to
implement. As an alternative, the expensive projection step is replaced by a heuristic approximate
projection, but then the global convergence is not fully guaranteed. Both [3, 25] achieve nearly
optimal sampling complexity. [26] proves global convergence of a gradient descent type algorithm
when B is a deterministic Fourier type matrix and A is Gaussian. Results about identifiability
issue of bilinear inverse problems can be found in [27, 23, 28].
Another example of self-calibration focuses on the setup yl = DAl x, where D = diag(d).
The difference from the previous model consists in replacing the subspace assumption by multiple
measurements. There are two main applications of this model. One application deals with blind
deconvolution in an imaging system which uses randomly coded masks [5, 37]. The measurements
are obtained by (subsampled) convolution of an unknown blurring function D with several random
binary modulations of one image. Both [5] and [2] developed convex relaxing approaches (nuclear
norm minimization) to achieve exact recovery of the signals and the blurring function. The other
application is concerned with calibration of the unknown gains and phases D and recovery of the
signal x, see e.g. [10, 9]. Cambareri and Jacques propose a gradient descent type algorithm in [10, 11]
and show convergence of the iterates by first constructing a proper initial guess. An empirical
study is given in [9] when x is sparse by applying an alternating hard thresholding algorithm.
Recently, [1, 2] study the blind deconvolution when inputs are changing. More precisely, the authors
consider yl = f ∗ gl where each gl belongs to a different known subspace, i.e., gl = Cl xl . They
employ a similar convex approach as in [4] to achieve exact recovery with number of measurements
close to the information theoretic limit.
An even more difficult, and from a practical viewpoint highly relevant, scenario focuses on selfcalibration from multiple snapshots [47]. Here, one wishes to recover the unknown gains/phases
D = diag(d) and a signal matrix X = [x1 , · · · , xp ] from Y = DAX. For this model, the
sensing matrix A is fixed throughout the sensing process and one measures output under different
snapshots {xl }pl=1 . One wants to understand under what conditions we can identify D and {xl }pl=1
jointly. If A is a Fourier type matrix, this model has applications in both image restoration from
multiple filters [21] and also network calibration [6, 31]. We especially benefitted from work by
Gribonval and coauthors [20, 8], as well as by Balzano and Nowak [6, 7]. The papers [6, 7] study
the noiseless version of the problem by solving a linear system and [31] takes a total least squares
approach in order to obtain empirically robust recovery in the presence of noise. If each xl is
sparse, this model becomes more difficult and Gribonval et al. [8, 20] give a thorough numerical
study. Very recently, [43] gave a theoretic result under certain conditions. This calibration problem
is viewed as a special case of the dictionary learning problem where the underlying dictionary DA
3
possesses some additional structure. The idea of transforming a blind deconvolution problem into a
linear problem can also be found in [32], where the authors analyze a certain non-coherent wireless
communication scenario.
1.2
Our contributions
In our work, we consider three different models of self-calibration, namely, yl = DAl x, yl = DAl xl
and yl = DAxl . Detailed descriptions of these models are given in the next Section. We do not
impose any sparsity constraints on x or xl . We want to find out xl (or x) and D when yl (or y) and
Al (or A) are given. Roughly, they correspond to the models in [5, 1, 8] respectively. Though all of
the three models belong to the class of bilinear inverse problems, we will prove that simply solving
linear least squares will give solutions to all those models exactly and robustly for invertible D and
for several useful choices of A and Al . Moreover, the sampling complexity is nearly optimal (up to
poly-log factors) with respect to the information theoretic limit (degree of freedom of unknowns).
As mentioned before, our approach is largely inspired by [8] and [6, 7]; there the authors convert
a bilinear inverse problem into a linear problem via a proper transformation. We follow a similar
approach in our paper. The paper [8] provides an extensive empirical study, but no theoretical analysis. Nowak and Balzano, in [6, 7] provide numerical simulations as well as theoretical conditions
on the number of measurements required to solve the noiseless case.
Our paper goes an important step further: On the one hand we consider more general selfcalibration settings. And on the other hand we provide a rigorous theoretical analysis for recoverability and, perhaps most importantly, stability theory in the presence of measurement errors.
Owing to the simplicity of our approach and the structural properties of the underlying matrices, our framework yields self-calibration algorithms that are numerically extremely efficient, thus
potentially allowing for deployment in applications where real-time self-calibration is needed.
1.3
Notation and Outline
We introduce notation which will be used throughout the paper. Matrices are denoted in boldface
or a calligraphic font such as Z and Z; vectors are denoted by boldface lower case letters, e.g. z.
The individual entries of a matrix or a vector are denoted in normal font such as Zij or zi . For any
matrix Z, kZk denotes its operator
qP norm, i.e., the largest singular value, and kZkF denotes its the
2
Frobenius norm, i.e., kZkF =
ij |Zij | . For any vector z, kzk denotes its Euclidean norm. For
both matrices and vectors, Z T and z T stand for the transpose of Z and z respectively while Z ∗
and z ∗ denote their complex conjugate transpose. For any real number z, we let z+ = 12 (z + |z|).
We equip the matrix space CK×N with the inner product defined by hU , V i := Tr(U ∗ V ). A special
case is the inner product of two vectors, i.e., hu, vi = Tr(u∗ v) = u∗ v. We define the correlation
u∗ v
. For a given vector v, diag(v) represents the
between two vectors u and v as Corr(u, v) = kukkvk
diagonal matrix whose diagonal entries are given by the vector v.
C is an absolute constant and Cγ is a constant which depends linearly on γ, but on no other
parameters. In and 1n always denote the n × n identity matrix and a column vector of “1” in
Rn respectively. And {ei }m
el }pl=1 stand for the standard orthonormal basis in Rm and Rp
i=1 and {e
respectively. “∗” is the circular convolution and “⊗” is the Kronecker product.
The paper is organized as follows. The more detailed discussion of the models under consideration and the proposed method will be given in Section 2. Section 3 presents the main results
4
of our paper and we will give numerical simulations in Section 4. Section 5 contains the proof for
each scenario. We collect some useful auxiliary results in the Appendix.
2
Problem setup: Three self-calibration models
This section is devoted to describing three different models for self-calibration in detail. We will also
explain how those bilinear inverse problems are reformulated and solved via linear least squares.
2.1
Three special models of self-calibration
Self-calibration via repeated measurements Suppose we are seeking for information with
respect to an unknown signal x0 with several randomized linear sensing designs. Throughout this
procedure, the calibration parameter D remains the same for each sensing procedure. How can
we recover the signal x0 and D simultaneously? Let us make it more concrete by introducing the
following model,
yl = DAl x0 + εl , 1 ≤ l ≤ p
(2.1)
where D = diag(d) ∈ Cm×m is a diagonal matrix and each Al ∈ Cm×n is a measurement matrix.
Here yl and Al are given while D and x0 are unknown. For simplicity, we refer to the setup (2.1)
as “self-calibration from repeated measurements”. This model has various applications in selfcalibration for imaging systems [10, 11], networks [6], as well as in blind deconvolution from random
masks [5, 37].
Blind deconvolution via diverse inputs Suppose that one sends several different signals
through the same unknown channel, and each signal is encoded differently. Namely, we are considering
yl = f ∗ Cl xl + εl , 1 ≤ l ≤ p.
How can one estimate the channel and each signal jointly? In the frequency domain, this “blind
deconvolution via diverse inputs” [1, 2] problem can be written as (with a bit abuse of notation),
yl = DAl xl + εl ,
1≤l≤p
(2.2)
where D = diag(d) ∈ Cm×m and Al ∈ Cm×n are the Fourier transform of f and Cl respectively.
We aim to recover {xl }pl=1 and D from {yl , Al }pl=1 .
Self-calibration from multiple snapshots Suppose we take measurements of several signals
{xl }pl=1 with the same set of design matrix DA (i.e., each sensor corresponds one row of A and has
an unknown complex-valued calibration term di ). When and how can we recover D and {xl }pl=1
simultaneously? More precisely, we consider the following model of self-calibration model from
multiple snapshots:
yl = DAxl + εl , 1 ≤ l ≤ p.
(2.3)
Here D = diag(d) is an unknown diagonal matrix, A ∈ Cm×n is a sensing matrix, {xl }pl=1 are
n × 1 unknown signals and {yl }pl=1 are their corresponding observations. This multiple snapshots
model has been used in image restoration from multiple filters [21] and self-calibration model for
sensors [47, 6, 31, 20, 8].
5
2.2
Linear least squares approach
Throughout our discussion, we assume that D is invertible, and we let S := diag(s) = D−1 . Here,
D = diag(d) stands for the calibration factors of the sensor(s) [6, 8] and hence it is reasonable to
assume invertibility of D. For, if a sensor’s gain were equal to zero, then it would not contribute
any measurements to the observable y, in which case the associated entry of y would be zero.
But then we could simply discard that entry and consider the correspondingly reduced system of
equations, for which the associated D is now invertible.
One simple solution is to minimize a nonlinear least squares objective function. Let us take (2.1)
as an example (the others (2.2) and (2.3) have quite similar formulations),
min
D,x
p
X
l=1
kDAl x − yl k2 .
(2.4)
The obvious difficulty lies in the biconvexity of (2.4), i.e., if either D or x is fixed, minimizing over
the other variable is a convex program. In general, there is no way to guarantee that any gradient
descent algorithm/alternating minimization will give the global minimum. However, for the three
models described above, there is one shortcut towards the exact and robust recovery of the solution
via linear least squares if D is invertible.
We continue with (2.1) when εl = 0, i.e.,
diag(yl )s = Al x,
1≤l≤p
(2.5)
where Syl = diag(yl )s with si = d−1
and S is defined as diag(s). The original measurement
i
equation turns out to be a linear system with unknown s and x. The same idea of linearization
can be also found in [20, 8, 43, 6]. In this way, the ground truth z0 := (s0 , x0 ) lies actually inside
the null space of this linear system.
Two issues arise immediately: One the one hand, we need to make sure that (s0 , x0 ) spans
the whole null space of this linear system. This is equivalent to the identifiability issue of bilinear
problems of the form (2.4), because if the pair (α−1 d0 , αx0 ) for some α 6= 0 is (up to the scalar
α) unique solution to (2.1), then (αs0 , αx0 ) spans the null space of (2.5), see also [27, 23, 28]. On
the other hand, we also need to avoid the trivial scenario (s0 , x0 ) = (0, 0), since it has no physical
meaning. To resolve the latter issue, we add the extra linear constraint (see also [8, 6])
s
w,
= c,
(2.6)
x
where the scalar c can be any nonzero number (we note that w should of course not be orthogonal
to the solution). Therefore, we hope that in the noiseless case it suffices to solve the following linear
system to recover (d, x0 ) up to a scalar, i.e.,
diag(y1 ) −A1
..
..
0
s
.
.
(2.7)
=
c (mp+1)×1
x (m+n)×1
diag(yp ) −Ap
{z
} |
{z
}
|
w∗
z
(mp+1)×(m+n)
b
{z
}
|
Aw
6
In the presence of additive noise, we replace the linear system above by a linear least squares
problem
p
X
minimize
k diag(yl )s − Al xk2 + |w ∗ z − c|2
l=1
with respect to s and x, or equivalently,
minimize kAw z − bk2
z
(2.8)
s
0
where z =
,b=
, and Aw is the matrix on the left hand side of (2.7). Following the same
x
c
idea, (2.2) and (2.3) can also be reformulated into linear systems and be solved via linear least
squares. The matrix Aw and the vector z take a slightly different form for those cases, see (3.1)
and (3.3), respectively.
Remark 2.1. Note that solving (2.8) may not be the optimal choice to recover the unknowns
from the perspective of statistics since the noisy perturbation actually enters into Aw instead of b.
More precisely, the noisy perturbation δA to the left hand side of the corresponding linear system
for (2.1), (2.2) and (2.3), is always in the form of
diag(ε1 ) 0
..
..
.
.
(2.9)
δA :=
.
diag(εp ) 0
0
0
The size of δA depends on the models. Hence total least squares [31] could be a better alternative
while it is more difficult to analyze and significantly more costly to compute. Since computational
efficiency is essential for many practical applications, a straightforward implementation of total least
squares is of limited use. Instead one should keep in mind that the actual perturbation enters only
into diag(yl ), while the other matrix blocks remain unperturbed. Constructing a total least squares
solution that obeys these constraints, doing so in a numerically efficient manner and providing
theoretical error bounds for it, is a rather challenging task, which we plan to address in our future
work.
Remark 2.2. Numerical simulations imply that the performance under noisy measurements depends on the choice of w, especially how much w and z0 are correlated. One extreme case is that
hw, z0 i = 0, in which case we cannot avoid the solution z = 0. It might be better to add a constraint
like kwk = 1. However, this will lead to a nonlinear problem which may not be solved efficiently
and not come with rigorous recovery guarantees. Therefore, we present an alternative approach in
the next subsection.
2.3
Spectral method
In this subsection, we discuss a method for solving the self-calibration problem, whose performance
does not depend on the choice of w as it avoids the need of w in the first place. Let S be the
7
matrix Aw excluding the last row (the one which contains w). We decompose S into S = S0 + δS
where S0 is the noiseless part of S and δS is the noisy part1 .
We start with the noise-free scenario: if δS = 0, there holds S = S0 and the right singular
vector of S corresponding to the smallest singular value is actually z0 . Therefore we can recover z0
by solving the following optimization problem:
min kSzk.
kzk=1
(2.10)
Obviously, its solution is equivalent to the smallest singular value of S and its corresponding singular
vector.
If noise exists, the performance will depend on how large the second smallest singular value of
S0 is and on the amount of noise, given by kδSk. We will discuss the corresponding theory and
algorithms in Section 3.4, and the proof in Section 5.4.
3
Theoretical results
We present our theoretical findings for the three models (2.1), (2.2) and (2.3) respectively for
different choices of Al or A. In one of our choices the Al are Gaussian random matrices. The
rationale for this choice is that, while a Gaussian random matrix is not useful or feasible in most
applications, it often provides a benchmark for theoretical guarantees and numerical performance.
Our other choices for the sensing matrices are structured random matrices, such as e.g. the product
of a deterministic partial (or a randomly subsampled) Fourier matrix or a Hadamard matrix2 with a
diagonal binary random matrix3 . These matrices bring us closer to what we encounter in real world
applications. Indeed, structured random matrices of this type have been deployed for instance in
imaging and wireless communications, see e.g. [19, 41].
By solving simple variations (for different models) of (2.8), we can guarantee that the ground
truth is recovered exactly up to a scalar if no noise exists and robustly if noise is present. The
number of measurements required for exact and robust recovery is nearly optimal, i.e., close to the
information-theoretic limit up to a poly-log factor. However, the error bound for robust recovery
is not optimal. It is worth mentioning that once the signals and calibration parameter D are
identifiable, we are able to recover both of them exactly in absence of noise by simply solving a
linear system. However, identifiability alone cannot guarantee robustness.
Throughout this section, we let dmax := max1≤i≤m |di,0 | and dmin := min1≤i≤m |di,0 | where
{di,0 }m
i=1 are the entries of the ground truth d0 . We also define Aw,0 as the noiseless part of Aw
for each individual model.
3.1
Self-calibration via repeated measurements
For model (2.1) we will focus on three cases:
1
This is a slight abuse of notation, since the δA defined in (2.9) has an additional row with zeros. However, it will
be clear from the context which δA we refer to, and more importantly, in our estimates we mainly care about kδAk
which coincides for both choices of δA.
2
A randomly subsampled Fourier matrix is one, where we randomly choose a certain number of rows or columns
of the Discrete Fourier Transform matrix, and analogously for a randomly subsampled Hadamard matrix
3
At this point, we are not able to prove competitive results for fully deterministic sensing matrices.
8
(a) Al is an m × n complex Gaussian random matrix, i.e., each entry in Al is given by
√i N (0, 1).
2
√1 N (0, 1) +
2
(b) Al is an m × n “tall” random DFT/Hadamard matrix with m ≥ n, i.e., Al := HMl where H
consists of the first n columns of an m × m DFT/Hadamard matrix and each Ml := diag(ml )
is a diagonal matrix with entries taking on the value ±1 with equal probability. In particular,
there holds,
A∗l Al = Ml∗ H ∗ HMl = mIn .
(c) Al is an m × n “fat” random partial DFT matrix with m < n, i.e., Al := HMl where H
consists of m columns of an n × n DFT/Hadamard matrix and each Ml := diag(ml ) is a
diagonal matrix, which is defined the same as case (b),
Al A∗l = HH ∗ = nIm .
Our main findings are summarized as follows:
Theorem 3.1. Consider the self-calibration model given in (2.1), where Aw is as in (2.7) and
Aw,0 is the noiseless part of Aw . Then, for the solution ẑ of (2.8) and α = w∗cz0 , there holds
2
kẑ − αz0 k
≤ κ(Aw,0 )η 1 +
kαz0 k
1 − κ(Aw,0 )η
if κ(Aw,0 )η < 1 where η =
2kδAk
√
mp .
κ(Aw,0 ) ≤
s
The condition number of Aw satisfies
max{d2max kxk2 , m}
6(mp + kwk2 )
,
min{mp, kwk2 | Corr(w, z0 )|2 } min{d2min kxk2 , m}
√
mp
s
√
2 3
max{d2max kxk2 , m}
κ(Aw,0 ) ≤
,
| Corr(w, z0 )| min{d2min kxk2 , m}
n
log2 (m + n);
(a) with probability 1 − (m + n)−γ if Al is Gaussian and p ≥ c0 γ max 1, m
where Corr(w, z0 ) =
w ∗ z0
kwkkz0 k ,
and for kwk =
(b) with probability 1 − (m + n)−γ − 2(mp)−γ+1 if each Al is a “tall” (m × n, m ≥ n) random
Hadamard/DFT matrix and p ≥ c0 γ 2 log(m + n) log(mp);
(c) with probability 1 − (m + n)−γ − 2(mp)−γ+1 if each Al is a “fat” (m × n, m ≤ n) random
Hadamard/DFT matrix and mp ≥ c0 γ 2 n log(m + n) log(mp).
Remark 3.2. Our result is nearly optimal in terms of required number of measurements, because
the number of constraints mp is required to be slightly greater than n + m, the number of unknowns.
Theorem 3.1 can be regarded as a generalized result of [10, 11], in which D is assumed to be positive
and Al is Gaussian. In our result, we only need D to be an invertible complex diagonal matrix and
Al can be a Gaussian or random Fourier type matrix. The approaches are quite different, i.e., [10]
essentially uses nonconvex optimization by first constructing a good initial guess and then applying
gradient descent to recover D and x. Our result also provides a provable fast alternative algorithm
to “the blind deconvolution via random masks” in [5, 37] where a SDP-based approach is proposed.
9
3.2
Blind deconvolution via diverse inputs
We now analyze model (2.2). Following similar steps that led us from (2.1) to (2.7), it is easy to
see that the linear system associated with (2.2) is given by
diag(y1 ) −A1
0
···
0
s
diag(y2 )
0
−A2 · · ·
0
x1
0
..
..
..
.
.
x
..
..
=
.
(3.1)
2
.
.
.
c (mp+1)×1
..
diag(yp )
.
0
0
· · · −Ap
x
w∗
p (m+n)×1
(mp+1)×(np+m)
{z
}|
{z
}
|
z
Aw
We consider two scenarios:
(a) Al is an m × n complex Gaussian random matrix, i.e., each entry in Al yields
√i N (0, 1).
2
√1 N (0, 1)
2
+
(b) Al is of the form
Al = Hl Ml ,
(3.2)
where Hl ∈ Cm×n is a random partial Hadamard/Fourier matrix, i.e., the columns of Hl
are uniformly sampled without replacement from an m × m DFT/Hadamard matrix; Ml :=
diag(ml ) = diag(ml,1 , · · · , ml,n ) is a diagonal matrix with {ml,i }ni=1 being i.i.d. Bernoulli
random variables.
Theorem 3.3. Consider the self-calibration model given in (2.2), where Aw is as in (3.1). Let
xmin := min1≤l≤p kxl k and xmax := max1≤l≤p kxl k. Then, for the solution ẑ of (2.8) and α = w∗cz0 ,
there holds
2
kẑ − αz0 k
≤ κ(Aw,0 )η 1 +
kαz0 k
1 − κ(Aw,0 )η
if κ(Aw,0 )η < 1 where η =
κ(Aw,0
and for kwk =
√
2kδAk
√
.
m
v
u
u
)≤t
The condition number of Aw,0 obeys
max{pd2max , x2m }
6x2max (m + kwk2 )
min
,
x2min min{m, kwk2 | Corr(w, z0 )|2 } min{pd2min , x2m }
max
m, there holds
v
u
√
u max{pd2max , x2m }
2 3xmax
min
t
κ(Aw,0 ) ≤
,
xmin | Corr(w, z0 )| min{pd2min , x2m }
max
(a) with probability at least 1 − (np + m)−γ if Al is an m × n (m > n) complex Gaussian random
matrix and
n
1
1
+
(γ + 1) log 2 (np + m) ≤ .
C0
p m
4
10
(b) with probability at least 1 − (np + m)−γ if Al yields (3.2) and
n−1
1
1
+
γ 3 log4 (np + m) ≤ ,
C0
p m−1
4
m ≥ 2.
Remark 3.4. Note that if δA = 0, i.e., in the noiseless case, we have z = αz0 if mp ≥ (np +
m)poly(log(np + m)). Here mp is the number of constraints and np + m is the degree of freedom.
Therefore, our result is nearly optimal in terms of information theoretic limit. Compared with a
similar setup in [1], we have a more efficient algorithm since [1] uses nuclear norm minimization
to achieve exact recovery. However, the assumptions are slightly different, i.e., we assume that D
is invertible and hence the result depends on D while [1] imposes “incoherence” on d by requiring
kF (d)k∞
relatively small, where F denotes Fourier transform.
kdk
3.3
Self-calibration from multiple snapshots
We again follow a by now familiar procedure to derive the linear system associated with (2.3),
which turns out to be
s
diag(y1 ) −A 0 · · ·
0
x1
diag(y2 ) 0 −A · · ·
0
0
x2
..
..
..
..
.
.
=
.
(3.3)
.
.
.
.
.
c (mp+1)×1
..
diag(yp ) 0
.
0 · · · −A
x
w∗
p (m+np)×1
(mp+1)×(m+np)
{z
}|
{z
}
|
z
Aw
For this scenario we only consider the case when A is a complex Gaussian random matrix.
Theorem 3.5. Consider the self-calibration model given in (2.3), where Aw is as in (3.3) and Aw,0
corresponds to the noiseless part of Aw . Let xmin := min1≤l≤p kxl k and xmax := max1≤l≤p kxl k.
Then, for the solution ẑ of (2.8) and α = w∗cz0 , there holds
2
kẑ − αz0 k
≤ κ(Aw,0 )η 1 +
kαz0 k
1 − κ(Aw,0 )η
if κ(Aw,0 )η < 1 where η =
κ(Aw,0
and for kwk =
√
2kδAk
√
.
m
v
u
u
)≤t
Here the upper bound of κ(Aw,0 ) obeys
max{pd2max , x2m }
6x2max (m + kwk2 )
min
.,
x2min min{m, kwk2 | Corr(w, z0 )|2 } min{pd2min , x2m }
max
m, there holds
v
u
√
u max{pd2max , x2m }
2 3xmax
min
t
κ(Aw,0 ) ≤
,
xmin | Corr(w, z0 )| min{pd2min , x2m }
max
with probability at least 1 − 2m(np + m)−γ if A is a complex Gaussian random matrix and
n
1
kGk kGk2F
,
(3.4)
+
log2 (np + m) ≤
C0 max
2
p
p
m
16(γ + 1)
11
where G is the Gram matrix of
n
C0
xl
kxl k
op
l=1
n
1
+
p m
. In particular, if G = Ip and kGkF =
log2 (np + m) ≤
√
p, (3.4) becomes
1
.
16(γ + 1)
Remark 3.6. When kδAk = 0, Theorem 3.5qsays that the solution to (2.3) is uniquely determined
up to a scalar if mp = O(max{np + mkGk, mnp2 + m2 kGk2F }), which involves the norm of the
Gram matrix G. This makes sense if we consider two extreme cases: if {vl }pl=1 are all identical,
then we have kGk = p and kGkF = p and if the {vl }pl=1 are mutually orthogonal, then G = Ip .
Remark 3.7. Balzano and Nowak [6] show exact recovery of this model when A is a deterministic
DFT matrix (discrete Fourier matrix) and {xl }pl=1 are generic signals drawn from a probability
distribution, but their results do not include stability theory in the presence of noise.
Remark 3.8. For Theorem 3.3 and Theorem 3.5 it does not come as a surprise that the error
bound depends on the norm of {xl }pl=1 and D as well as on how much z0 and w are correlated.
We cannot expect a relatively good condition number for Aw if kxl k varies greatly over 1 ≤ l ≤ p.
Concerning the correlation between z0 and w, one extreme case is hz0 , wi = 0, which does not rule
out the possibility of z = 0. Hence, the quantity hz0 , wi affects the condition number.
3.4
Theoretical results for the spectral method
Let S be the matrix Aw excluding the last row and consider S = S0 + δS where S0 is the noiseless
part of S and δS is the noise term. The performance under noise depends on the second smallest
singular value of S0 and the noise strength kδSk.
Theorem 3.9. Denote ẑ as the solution to (2.10), i.e., the right singular vector of S w.r.t. the
smallest singular value and kẑk = 1. Then there holds,
kδSk
(I − ẑ ẑ ∗ )z0
kα0 ẑ − z0 k
≤
=
kz0 k
kz0 k
[σ2 (S0 ) − kδSk]+
α0 ∈C
min
where σ2 (S0 ) is the second smallest singular value of S0 , z0 satisfies S0 z0 = 0, and ẑ is the right
singular vector with respect to the smallest singular value of S, i.e., the solution to (2.10).
Moreover, the lower bound of σ2 (S0 ) satisfies
q
√
(a) σ2 (S0 ) ≥ p2 min{ m, dmin kxk} for model (2.1) under the assumption of Theorem 3.1;
(b) σ2 (S0 ) ≥
√1 xmin min
2
(c) σ2 (S0 ) ≥
√1 xmin min
2
n√
√ o
m
pdmin , xmax
for model (2.2) under the assumption of Theorem 3.3;
n√
√ o
m
for model (2.3) under the assumption of Theorem 3.5.
pdmin , xmax
Remark 3.10. Note that finding z which minimizes (2.10) is equivalent to finding the eigenvector
with respect to the smallest eigenvalue of S ∗ S. If we have a good approximate upper bound λ of
kS ∗ Sk, then it suffices to find the leading eigenvector of λI − S ∗ S, which can be done efficiently by
using power iteration.
How to choose λ properly in practice? We do not want to choose λ too large since this would
imply slow convergence of the power iteration. For each case, it is easy to get a good upper bound
of kSk2 based on the measurements and sensing matrices,
12
(a) for (2.1), λ = k
Pp
∗
l=1 diag(yl ) diag(yl )k
+k
Pp
∗
l=1 Al Al k;
(b) for (2.2), λ = k diag(yl ) diag(yl∗ )k + max1≤l≤p kAl k2 ;
(c) for (2.3), λ = k diag(yl ) diag(yl∗ )k + kAk2 .
Those choices of λ are used in our numerical simulations.
4
Numerical simulations
This section is devoted to numerical simulations. Four experiments for both synthetic and real data
will be presented to address the effectiveness, efficiency and robustness of the proposed approach.
For all three models presented (2.1), (2.2) and (2.3), the corresponding linear systems have
simple block structures which allow for fast implementation via the conjugate gradient method for
non-hermitian matrices [34]. In our simulations, we do not need to set up Aw explicitly to carry
out the matrix-vector multiplications arising in the conjugate gradient method. Moreover, applying
preconditioning via rescaling all the columns to be of similar norms can give rise to an even faster
convergence rate. Therefore, we are able to deal with medium- or large-scale problems from image
processing in a computationally efficient manner.
In our simulations the iteration stops if either the number of iterations reaches at most 2000 or
the residual of the corresponding normal equation is smaller than 10−8 . Throughout our discussion,
the SNR (signal-to-noise ratio) in the scale of dB is defined as
Pp
2
l=1 kyl k
P
.
SNR := 10 log10
p
2
l=1 kεl k
We measure the performance with RelError (in dB) := 20 log 10 RelError where
(
)
kα1 x̂ − x0 k
kα2 dˆ − d0 k
RelError = max min
, min
.
kx0 k
kd0 k
α1 ∈C
α2 ∈C
Here d0 and x0 are the ground truth. Although RelError does not match the error bound in our
theoretic analysis, certain equivalent relations hold if one assumes all |di,0 | are bounded away from
0 because there holds ŝ ≈ s0 if and only if dˆ ≈ d0 .
For the imaging examples, we only measure the relative error with respect to the recovered
x̂−x0 k
.
image x̂, i.e., minα1 ∈C kα1kx
0k
4.1
Self-calibration from repeated measurements
Suppose we have a target image x and try to estimate x through multiple measurements. However,
the sensing process is not perfect because of the missing calibration of the sensors. In order to
estimate both the unknown gains and phases as well as the target signal, a randomized sensing
procedure is used by employing several random binary masks.
We assume that yl = DHMl x0 + εl where H is a “tall” low-frequency DFT matrix, Ml is a
diagonal ±1-random matrix and x0 is an image of size 512×512. We set m = 10242 , n = 5122 , p = 8
2
pm
= 6.4. We
and D = diag(d) ∈ 10242 × 10242 with d ∈ C1024 ; the oversampling ratio is m+n
compare two cases: (i) d is a sequence distributed uniformly over [0.5, 1.5] with w = 1m+n , and (ii)
13
0m
. We
d is a Steinhaus sequence (uniformly distributed over the complex unit circle) with w =
1n
pick those choices of w because we know that the image we try to reconstruct has only non-negative
values. Thus, by choosing w to be non-negative, there are fewer cancellation in the expression w ∗ z0 ,
which in turn leads to a smaller condition number and better robustness. The corresponding results
of our simulations are shown in Figure 1 and Figure 2, respectively. In both cases, we only measure
the relative error of the recovered image.
Figure 1: Here m = 10242 , n = 5122 , p = 8, SNR=5dB, D = diag(d) where di is uniformly
distributed over [0.5, 1.5]. Left: original image; Middle: uncalibrated image, RelError = −13.85dB;
Right: calibrated image, RelError = −20.23dB
Figure 2: Here m = 10242 , n = 5122 , p = 8, SNR=5dB, D = diag(d) where d is a Steinhauss
sequence. Left: original image; Middle: uncalibrated image; Right: calibrated image, RelError =
−10.02dB
In Figure 1, we can see that both, the uncalibrated and the calibrated image are quite good.
Here the uncalibrated image is obtained by first applying the inverse Fourier transform and the
inverse of the mask to each yi and then taking the average of p samples. We explain briefly why
the uncalibrated image still looks good. Note that
x̂uncali
p
p
l=1
l=1
1 X −1 †
1 X −1 †
Ml H (DHMl x0 ) = x0 +
Ml H (D − I)HMl x0
=
p
p
1
H ∗ is the pseudo inverse of H. Here D−I is actually a diagonal matrix with random
where H † = m
1
entries ± 2 . As a result, each Ml−1 H † (D −I)HMl x0 is the sum of m rank-1 matrices with random
± 12 coefficients and is relatively small due to many cancellations. Moreover, [14] showed that most
2-D signals can be reconstructed within a scale factor from only knowing the phase of its Fourier
transform, which applies to the case when d is positive.
However, when the unknown calibration parameters are complex variables (i.e., we do not know
much about the phase information), Figure 2 shows that the uncalibrated recovered image is totally
14
meaningless. Our approach still gives a quite satisfactory result even at a relatively low SNR of
5dB.
4.2
Blind deconvolution in random mask imaging
The second experiment is about blind deconvolution in random mask imaging [5, 37]. Suppose we
observe the convolution of two components,
y l = h ∗ M l x 0 + εl ,
1≤l≤p
where both, the filter h and the signal of interests x0 are unknown. Each Ml is a random ±1-mask.
The blind deconvolution problem is to recover (h, x0 ). Moreover, here we assume that the filter is
actually a low-pass filter, i.e., F(h) is compactly supported in an interval around the origin, where
F is the Fourier transform. After taking the Fourier transform on both sides, the model actually
ends up being of the form (2.1) with Al = HMl where H is a “fat” partial DFT matrix and d is
the nonzero part of F(h). In our experiment, we let x0 be a 128 × 128 image and d = F(h) be a
2-D Gaussian filter of size 45 × 45 as shown in Figure 3.
In those experiments, we choose w = 1m+n since both d and x0 are nonnegative. Figure 4
shows the recovered image from p = 32 sets of noiseless measurements and the performance is quite
pm
≈ 3.52. We can see from Figure 5 that the blurring
satisfactory. Here the oversampling ratio is m+n
effect has been removed while the noise still exists. That is partially because we did not impose any
denoising procedure after the deconvolution. A natural way to improve this reconstruction further
would be to combine the blind deconvolution method with a total variation minimization denoising
step.
4.3
Blind deconvolution via diverse inputs
We choose Al to be random Hadamard matrices with m = 256 and n = 64 and D = diag(d0 )
with d0 being a positive/Steinhaus sequence, as we did previously. Each xl is sampled from
1m
standard Gaussian distribution. We choose w =
if d0 is uniformly distributed over [0.5, 1.5]
0np×1
√
me1
for Steinhaus d0 . 10 simulations are performed for each level of SNR. The
and w =
0np×1
pm
is 2, 2.67 and 3 for
test is also given under different choices of p. The oversampling ratio pn+m
p = 4, 8, 12 respectively. From Figure 6, we can see that the error scales linearly with SNR in
dB. The performance of Steinhaus d0 is not as good as that of positive d0 for SNR ≤ 10 when
∗
we use
squares method. That is because w z0 is quite small when d0 is complex and
√the least
me1
. Note that the error between ẑ and z0 is bounded by κ(Aw,0 )η 1 + 1−κ(A2 w,0 )η .
w =
0np×1
Therefore, the error bound does not depend on kδAk linearly if κ(Aw,0 )η is close to 1. This may
explain the nonlinear behavior of the relative error in the low SNR regime.
We also apply spectral method to this model with complex gains d0 and Al chosen as either a
random Hadamard matrix or a Gaussian matrix. Compared to the linear least squares approach,
the spectral method is much more robust to noise, as suggested in Figure 7, especially in the low
SNR regime.
15
Figure 3: Left: Original image; Right: Gaussian filter in Fourier domain. The support of the filter
is 45 × 45 and hence m = 452 = 2025, n = 1282 , p = 32.
Figure 4: Left: Blurred image without noise, Right: Recovered image, RelError = -45.47dB
Figure 5: Left: Blurred image with SNR = 5dB, Right: Recovered image, RelError = -5.84dB
4.4
Multiple snapshots
We make a comparison of performances between the linear least squares approach and the spectral
method when d0 is a Steinhaus sequence and A is a Gaussian random matrix A. Each xl is sampled
from the standard Gaussian distribution and hence the underlying Gram matrix G is quite close
to Ip (this closeness could be easily made more precise, but we refrain doing so here). The choice
of w and oversampling ratio are the same as those in Section 4.3. From Figure 8, we see that
the performance is not satisfactory for the Steinhaus case using the linear least squares approach,
especially in the lower SNR regime
√ (SNR
≤ 10). The reason is the low correlation between w and
me1
z0 if d0 is Steinhaus and w =
. The difficulty of choosing w is avoided by the spectral
0np×1
method. As we can see in Figure 8, the relative error given by spectral method is approximately
7dB smaller than that given by linear least squares approach when d0 is a complex vector and the
SNR is smaller than 20dB.
16
m = 256, n = 64, d:Positive, LS method, Hadamard
m = 256, n = 64, d:Steinhaus, LS method, Hadamard
0
0
p=4
p=8
p = 12
−20
−30
−40
−50
−60
−70
−80
p=4
p=8
p = 12
−10
Average of sin(θ) of 10 Samples(dB)
Average of sin(θ) of 10 Samples(dB)
−10
−20
−30
−40
−50
−60
−70
0
10
20
30
40
50
60
−80
70
0
10
20
30
SNR(dB)
40
50
60
70
SNR(dB)
Figure 6: Performance of linear least squares approach: RelError (in dB) vs. SNR for yl =
DAl xl + εl , 1 ≤ l ≤ p where m = 256, n = 64, D = diag(d0 ) and each Al is a random Hadamard
matrix. d0 is a Steinhaus sequence.
m = 256, n = 64, d:Steinhaus, spectral method, Gaussian
m = 256, n = 64, d:Steinhaus, spectral method, Hadamard
0
0
p=4
p=8
p = 12
−20
−30
−40
−50
−60
−70
−80
p=4
p=8
p = 12
−10
Average of sin(θ) of 10 Samples(dB)
Average of sin(θ) of 10 Samples(dB)
−10
−20
−30
−40
−50
−60
−70
0
10
20
30
40
50
60
−80
70
0
10
20
30
SNR(dB)
40
50
60
70
SNR(dB)
Figure 7: Performance of spectral method: RelError (in dB) vs. SNR for yl = DAl xl +εl , 1 ≤ l ≤ p
where m = 256, n = 64, D = diag(d0 ). Here Al is either a random Hadamard matrix or a Gaussian
matrix. d0 is a Steinhaus sequence.
5
Proofs
For each subsection, we will first give the result of noiseless measurements. We then prove the
stability theory by using the result below. The proof of spectral method can be found in Section 5.4.
Proposition 5.1. [46] Suppose that Au0 = b is a consistent and overdetermined system. Denote
û as the least squares solution to k(A + δA)u − bk2 with kδAk ≤ ηkAk. If κ(A)η < 1, there holds,
kû − u0 k
2
≤ κ(A)η 1 +
.
ku0 k
1 − κ(A)η
To apply the proposition above, it suffices to bound κ(A) and η.
17
m = 256, n = 64, d:Steinhaus, LS method
m = 256, n = 64, d:Steinhaus, spectral method
0
0
p=4
p=8
p = 12
−20
−30
−40
−50
−60
−70
−80
p=4
p=8
p = 12
−10
Average of sin(θ) of 10 Samples(dB)
Average of sin(θ) of 10 Samples(dB)
−10
−20
−30
−40
−50
−60
−70
0
10
20
30
40
50
60
−80
70
0
10
SNR(dB)
20
30
40
50
60
70
SNR(dB)
Figure 8: Comparison between linear least squares approach and spectral method: RelError (in
dB) vs. SNR for yl = DAxl + εl , 1 ≤ l ≤ p where m = 256, n = 64, D = diag(d0 ) and A is a
Gaussian random matrix. The gain d0 is a random vector with each entry uniformly distributed
over unit circle.
5.1
Self-calibration from repeated measurements
Let us start with (2.7) when εl = 0 and denote Λl := diag(Al v) and v :=
x
kxk
∈ Cn ,
∗
Λ1 − √1m A1
diag(y1 ) −A1
Dkxk √ 0
..
.. = ..
..
A0 :=
.
.
. .
.
0
mIn
1
∗
Λp − √m Ap
diag(yp ) −Ap
Then we rewrite A∗w Aw as
A∗w Aw = A∗0 A0 + ww ∗ =
where
Zl :=
"
Λl
− √1m A∗l
By definition,
#
∈C
(m+n)×m
,
p
X
P Zl Zl∗ P ∗ + ww ∗
l=1
D∗ kxk
0
√
P :=
∈ C(m+n)×(m+n) .
0
mIn
(5.1)
#
∗
√1 Λl Al
−
Λ
Λ
l
l
m
∈ C(m+n)×(m+n) .
Zl Zl∗ =
1
∗A
− √1m A∗l Λ∗l
A
l
m l
"
Our goal is to find out P
the smallest and the largest eigenvalue of Aw . Actually it suffices to under∗
stand the spectrum of " pl=1 Z
# l Zl . Obviously, its smallest eigenvalue is zero and the corresponding
√1
2
1m
√
m
. Let al,i be the i-th column of A∗l and we have E(al,i a∗l,i ) = In under
"
#
√1 1m v ∗
I
−
m
m
all the three settings in Section 3.1. Hence, C := E(Zl Zl∗ ) =
.
− √1m v1∗m
In
It is easy to see that rank(C) = m + n − 1 and the null space of C is spanned by u1 . C has an
eigenvalue with value 1 of multiplicity m + n − 2 and an eigenvalue with value 2 of multiplicity 1.
eigenvector is u1 :=
v
18
More importantly, the following proposition holds and combined with Proposition 5.1, we are able
to prove Theorem 3.1.
Proposition 5.2. There holds
p
X
l=1
(a) with probability 1 − (m +
n)−γ
Zl Zl∗ − pC ≤
p
2
n
if Al is Gaussian and p ≥ c0 γ max 1, m
log2 (m + n);
(b) with probability 1 − (m + n)−γ − 2(mp)−γ+1 if each Al is a “tall” (m × n, m ≥ n) random
Hadamard/DFT matrix and p ≥ c0 γ 2 log(m + n) log(mp);
(c) with probability 1 − (m + n)−γ − 2(mp)−γ+1 if each Al is a “fat” (m × n, m ≤ n) random
Hadamard/DFT matrix and mp ≥ c0 γ 2 n log(m + n) log(mp).
Remark 5.3. Proposition 5.2 actually addresses the identifiability issue of the model (2.1) in
absence of noise. More precisely, the invertibility of P is guaranteed by that
P of D. By Weyl’s
theorem for singular value perturbation in [36], mP
+ n − 1 eigenvalues of pl=1 Zl Zl∗ are greater
than p2 . Hence, the rank of A0 is equal to rank( pl=1 Zl Zl∗ ) = m + n − 1 if p is close to the
n
). In other words, the
information theoretic limit under the conditions given above, i.e., p ≥ O( m
null space of A0 is completely spanned by z0 := (s0 , x0 ).
5.1.1
Proof of Theorem 3.1
Note that Proposition 5.2 gives the result if εl = 0. The noisy counterpart is obtained by applying
perturbation theory for linear least squares.
Let Aw := Aw,0 + δA where Aw,0 is the noiseless part and δA is defined in (2.9).
Note
0
by the
that αz0 with α = w∗cz0 is actually a solution to the overdetermined system Aw,0 z =
c
definition of Aw,0 . Proposition 5.1 implies that it suffices to estimate the condition number κ(Aw,0 )
of Aw,0 and η such that kδAk ≤ ηkAw,0 k holds. Note that
!
p
X
A∗w,0 Aw,0 = P
(5.2)
Zl Zl∗ P ∗ + ww ∗
Proof:
= P
l=1
p
X
Zl Zl∗
l=1
e :=
where w
P −1 w.
ew
e
+w
∗
!
e ∗
P ∗ =: P CP
(5.3)
From Proposition 5.2 and Theorem 1 in [36], we know that
!
!
p
p
X
X
p
5p
Zl Zl∗ ≥ , λn+m
λ2
Zl Zl∗ ≤
2
2
l=1
l=1
Pp
where λ1 ≤ · · · ≤ λn+m and λ1 ( l=1 Zl Zl∗ ) = 0. Following from (5.2), we have
kA∗w,0 Aw,0 k
2
≤ kP k
p
X
l=1
Zl Zl∗ + kwk2 ≤ 3p max{d2max kxk2 , m} + kwk2
kwk2
≤ 3 p+
m
λ2max (P ).
19
(5.4)
On the other hand,
kA∗w,0 Aw,0 k ≥
p
X
l=1
A∗l Al ≥
mp
2
(5.5)
follows from Proposition 5.2. In other words, we have found the lower and upper bounds for
kAw,0 k or equivalently, λmax (A∗w,0 Aw,0 ). Now we proceed to the estimation of λmin (A∗w,0 Aw,0 ).
#
"
1m
√
P
Pm+n
m+n
1
2
m
with m+n
Let u := j=1 αj uj be a unit vector, where u1 = √2
j=1 |αj | = 1 and {uj }j=1
v
P
e defined in (5.3) has a lower
are the eigenvectors of pl=1 Zl Zl∗ . Then the smallest eigenvalue of C
bound as follows:
!
p
X
e
ew
e ∗u
Zl Z ∗ u + u∗ w
u∗ Cu
= u∗
l
l=1
≥
≥
e ≥
which implies λmin (C)
e ∗,
P CP
1
2
m+n
X
j=2
m+n
X
j=2
ew
e ∗ u1 u∗1 u
λj |αj |2 + u∗ u1 u∗1 w
λj |αj |2 +
o
n
∗ z |2
0
≥
min p, |w
mkxk2
1
2
|w ∗ z0 |2
|α1 |2
2mkxk2
(5.6)
n
o
2
2
0 )|
min p, kwk | Corr(w,z
. Combined with A∗w,0 Aw,0 =
m
e 2 (P ) ≥ 1 min mp, kwk2 | Corr(w, z0 )|2 λ2 (P ).
λmin (A∗w,0 Aw,0 ) ≥ λmin (C)λ
min
min
2m
Therefore, with (5.4), the condition number of A∗w,0 Aw,0 is bounded by
κ(A∗w,0 Aw,0 ) ≤
From (5.5), we set η =
2kδAk
√
mp
≥
6(mp + kwk2 )
κ2 (P ).
min{mp, kwk2 | Corr(w, z0 )|2 }
kδAk
kAw,0 k .
Applying Proposition 5.1 gives the following upper bound of the estimation error
κ(Aw,0 )η 1 + 1−κ(A2 w,0 )η where α = w∗cz0 and
κ(Aw,0 ) ≤
If kwk =
√
s
6(mp + kwk2 )
κ(P ).
min{mp, kwk2 | Corr(w, z0 )|2 }
mp, the upper bound of κ(Aw,0 ) satisfies
κ(Aw,0 ) ≤
s
s
√
2 3
12
max{d2max kxk2 , m}
κ(P
)
≤
.
| Corr(w, z0 )|2
|Corr(w, z0 )| min{d2min kxk2 , m}
20
kẑ−αz0 k
kαz0 k
≤
5.1.2
Proof of Proposition 5.2(a)
Proof: [Proof of Proposition 5.2(a)] From now on, we assume al,i ∈ Cn , i.e., the i-th column
of A∗l , obeys a complex Gaussian distribution, √12 N (0, In )+ √i2 N (0, In ). Let zl,i be the i-th column
of Zl ; it can be written in explicit form as
"
#
"
#
| hal,i , vi |2 ei e∗i − √1m ei v ∗ al,i a∗l,i
hal,i , viei
∗
, zl,i zl,i =
zl,i =
1
∗
− √1m al,i
− √1m al,i a∗l,i ve∗i
m al,i al,i .
∗ − E(z z ∗ ), we obtain
Denoting Zl,i := zl,i zl,i
l,i l,i
"
#
(| hal,i , vi |2 − 1)ei e∗i
− √1m ei v ∗ (al,i a∗l,i − In )
Zl,i :=
.
1
∗
− √1m (al,i a∗l,i − In )ve∗i
m (al,i al,i − In )
P
Obviously each Zl,i is independent. In order to apply Theorem 5.12 to estimate k l,i Zl,i k, we
Pp Pm
∗
need to bound maxl,i kZl,i kψ1 and
i=1 E(Zl,i Zl,i ) . Due to the semi-definite positivity of
l=1
∗ , we have kZ k ≤ max{kz k2 , k E(z z ∗ )k} ≤ max | ha , vi |2 + 1 ka k2 , 2 and hence
zl,i zl,i
l,i
l,i
l,i
l,i l,i
l,i
m
n
1
kZl,i kψ1 ≤ (| hal,i , vi |2 )ψ1 + (kal,i k2 )ψ1 ≤ C 1 +
m
m
n
which follows from Lemm 5.14 and k·kψ1 is a norm. This implies R := maxl,i kZl,i kψ1 ≤ C 1 + m
.
P
P
p
m
∗
∗
∗
Now we consider σ02 =
i=1 E(Zl,i Zl,i ) by computing (Zl,i Zl,i )1,1 and (Zl,i Zl,i )2,2 , i.e.,
l=1
∗ ,
the (1, 1)-th and (2, 2)-th block of Zl,i Zl,i
1 ∗
2
2
2
∗
∗
(Zl,i Zl,i )1,1 = (| hal,i , vi | − 1) + v (al,i al,i − In ) v ei e∗i ,
m
1
1
∗
(al,i a∗l,i − In )vv ∗ (al,i a∗l,i − In ) + 2 (al,i a∗l,i − In )2 .
(Zl,i Zl,i
)2,2 =
m
m
Following from (5.36), (5.37), (5.38) and Lemma 5.10, there holds
p X
p X
m
m
∗ )
X
X
0
E(Zl,i Zl,i
1,1
∗
2
E(Zl,i Zl,i ) ≤ 2
σ0 =
∗ )
0
E(Zl,i Zl,i
2,2
l=1 i=1
l=1 i=1
p X
m
n
X
1+ m
ei e∗i
0
= 2
n
1
0
m + m2 In
l=1 i=1
n
n
Im
0
1+ m
.
= 2p 1 +
= 2p
n
0
1 + m In
m
By applying the matrix Bernstein inequality (see Theorem 5.13) we obtain
p X
m
nr
X
n p
≤ C0 max
Zl,i
p 1+
t + log(m + n),
m
l=1 i=1
o p
n
(t + log(m + n)) log(m + n) ≤
1+
m
2
n
log2 (m+
with probability 1−e−t . In particular, by choosing t = γ log(m+n), i.e, p ≥ c0 γ max 1, m
n), the inequality above holds with probability 1 − (m + n)−γ .
21
5.1.3
Proof of Proposition 5.2(b)
Proof: [Proof of Proposition 5.2(b)] Each Zl is independent by its definition in (5.1) if
Al := HMl where H is an m × n partial DFT/Hadamard matrix with m ≥ n and H ∗ H = mIn
and Ml = diag(ml ) is a diagonal random binary ±1 matrix. Let Zl := Zl Zl∗ − C ∈ C(m+n)×(m+n) ;
in explicit form
#
"
− √1m (Λl Al − 1m v ∗ )
Λl Λ∗l − Im
.
Zl =
− √1m (A∗l Λ∗l − v1∗m )
0
where A∗l Al = mIn follows from the assumption. First we take a look at the upper bound of kZl k.
It suffices to bound kZl Zl∗ k since kZl k = kZl Zl∗ − Ck ≤ max {kZl Zl∗ k, kCk} and C is positive
semi-definite. On the other hand, due to Lemma 5.10, we have kZl Zl∗ k ≤ 2 max{kΛl Λ∗l k, 1} and
hence we only need to bound kΛl k. For kΛl k, there holds
max kΛl k = max kAl vk∞ =
1≤l≤p
1≤l≤p
max
1≤l≤p,1≤i≤m
| hal,i , vi |.
Also for any pair of (l, i), hal,i , vi can be rewritten as
| hal,i , vi | = | hdiag(ml )hi , vi | = | ml , diag(h̄i )v |
where hi is the i-th column of H ∗ and k diag(h̄i )vk = kvk = 1. Then there holds
P
max kΛl k ≥
1≤l≤p
p
p X
m
X
p
2γ log(mp)
≤
P | hal,i , vi | ≥ 2γ log(mp)
l=1 i=1
p
≤ mpP | hal,i , vi | ≥ 2γ log(mp)
≤ 2mp · e−γ log(mp) ≤ 2(mp)−γ+1 ,
(5.7)
where the third inequality follows from Lemma 5.11. Applying Lemma 5.10 to Zl ,
R := max kZl k ≤ 2 max {kΛl Λ∗l k, 1} ≤ 4γ log(mp),
1≤l≤p
1≤l≤p
with probability at least 1 − 2(mp)−γ+1
P. Denote the event {max1≤l≤p kZl k ≤ 4γ log(mp)} by E1 .
Now we try to understand σ02 = k pl=1 E(Zl Zl∗ )k. The (1, 1)-th and (2, 2)-th block of Zl Zl∗ are
given by
(Zl Zl∗ )1,1 = (Λl Λ∗l − Im )2 +
(Zl Zl∗ )2,2 =
1
(Λl Al − 1m v ∗ )(Λl Al − 1m v ∗ )∗ ,
m
1
(A∗ Λ∗ − v1∗m )(Λl Al − 1m v ∗ ).
m l l
By using (5.41), (5.42) and Al A∗l = HH ∗ mIm , we have
∗
E((Λl Λ∗l − Im )2 ) =
∗ ∗
E(Λl Al − 1m v )(Λl Al − 1m v )
E(A∗l Λ∗l
−
v1∗m )(ΛAl
=
∗
− 1m v ) =
=
22
E(Λl Λ∗l )2 − Im 2Im ,
E(Λl Al A∗l Λ∗l ) − 1m 1∗m mIm ,
E(A∗l Λ∗l Λl Al ) − mvv ∗
m
X
| hal,i , vi |2 al,i a∗l,i − mvv ∗
i=1
(5.8)
(5.9)
3mIn .
(5.10)
Combining (5.8), (5.9), (5.10) and Lemma 5.10,
p
X
0
E(Zl Zl∗ )1,1
2Im + Im 0
2
≤ 2p
≤ 6p.
σ0 ≤ 2
0
E(Zl Zl∗ )2,2
0
3In
l=1
By applying (5.32) with t = γ log(m + n) and R ≤ 4γ log(mp) over event E1 , we have
p
X
p
√ p
(Zl Zl∗ − C) ≤ C0 max{ p (γ + 1) log(m + n), γ(γ + 1) log(mp) log(m + n)} ≤
2
l=1
with probability 1 − (m + n)−γ − 2(mp)−γ+1 if p ≥ c0 γ 2 log(m + n) log(mp).
5.1.4
Proof of Proposition 5.2(c)
Proof: [Proof of Proposition 5.2(c)] Each Zl is independent due to (5.1). Let Zl := Zl Zl∗ −
C ∈ C(m+n)×(m+n) ; in explicit form
#
"
Λl Λ∗l − Im
− √1m (Λl Al − 1m v ∗ )
.
Zl =
1
∗
− √1m (A∗l Λl − v1∗m )
m Al Al − In
Here Al = HMl where H is a “fat” m × n, (m ≤ n) partial DFT/Hadamard matrix satisfying
HH ∗ = nIm and Ml is a diagonal ±1-random matrix. There holds A∗l Al = Ml∗ H ∗ HMl ∈ Cn×n
where H ∈ Cm×n and E(A∗l Al ) = mIn . For each l, kA∗l Al k = kH ∗ Hk = kHH ∗ k = n. Hence,
there holds,
nn
o
1
kA∗l Al k, kΛl k2 , 1 ≤ 2 max
, γ log(mp)
kZl k ≤ max {kZl Zl∗ k, kCkk ≤ 2 max
m
m
with probability at least 1 − 2(mp)−γ+1 , which
Pfollows exactly from (5.7) and Lemma 5.10.
Now we give an upper bound for σ02 := k pl=1 E(Zl Zl∗ )k. The (1, 1)-th and (2, 2)-th block of
Zl Zl∗ are given by
1
(Λl Al − 1m v ∗ )(ΛAl − 1m v ∗ )∗ ,
m
2
1 ∗
1
(A∗l Λ∗l − v1∗m )(Λl Al − 1m v ∗ ) +
Al Al − In .
m
m
(Zl Zl∗ )1,1 = (Λl Λ∗l − Im )2 +
(Zl Zl∗ )2,2 =
By using (5.41), (5.42) and Al A∗l = HH ∗ = nIm , we have
∗
E((Λl Λ∗l − Im )2 ) =
∗ ∗
E(Λl Al − 1m v )(Λl Al − 1m v )
E(A∗l Λ∗l
−
v1∗m )(Λl Al
=
∗
− 1m v ) =
=
For E
E(Λl Λ∗l )2 − Im 2Im ,
E(Λl Al A∗l Λ∗l ) − 1m 1∗m nIm ,
E(A∗l Λ∗l Λl Al ) − mvv ∗
m
X
| hal,i , vi |2 al,i a∗l,i − mvv ∗
i=1
(5.11)
(5.12)
3mIn . (5.13)
2
− In , we have
2
1 ∗
n − 2m ∗
2
1
Al Al − In = 2 A∗l Al A∗l Al − A∗l Al + In =
Al Al + In
m
m
m
m2
1
∗
m Al Al
23
where Al A∗l = nIm . Note that E(A∗l Al ) = mIn , and there holds,
2
1 ∗
n−m
A Al − In =
In .
E
m l
m
(5.14)
Combining (5.11), (5.12), (5.13), (5.14) and Lemma 5.10,
n
6np
Im
0
2+ m
2
σ0 ≤ 2p
≤
.
n
0
2 + m In
m
By applying (5.32) with t = γ log(m + n), we have
r
p
X
p
np p
n
∗
log(m + n)} ≤
(γ + 1) log(m + n), (γ + 1) γ log(mp) +
(Zl Zl − C) ≤ C0 max{
m
m
2
l=1
with probability 1 − (m + n)−γ − 2(mp)−γ+1 if mp ≥ c0 γ 2 n log(m + n) log(mp).
5.2
Blind deconvolution via diverse inputs
We start with (3.1) by setting εl = 0. In this way, we can factorize the matrix Aw
last row) into
√
pD √ 0
diag(A
A1
1 v1 )
√
√
−
·
·
·
0
mIn
kx1 kIm · · ·
0
p
m
0
kx1 k
.
.
.
.
.
.
.
..
..
..
..
..
..
..
A0 :=
..
...
.
Ap
diag(Ap vp )
0
· · · kxp kIm
√
0
· · · − √m
p
|
{z
}|
0
0
{z
}
Q
{z
|
mp×(np+m)
Z∈C
P
(excluding the
···
···
..
.
···
0
0
..
.
√
mIn
kxp k
}
(5.15)
where vl =
is the normalized xl , 1 ≤ l ≤ p. We will show that the matrix Z is of rank
v1
..
np + m − 1 to guarantee that the solution is unique (up to a scalar). Denote v := . ∈ Cnp×1
vp
P
√
and pl=1 eel ⊗ vl = v with kvk = p where {e
el }pl=1 is a standard orthonormal basis in Rp .
xl
kxl k
5.2.1
Proof of Theorem 3.3
The proof of Theorem 3.3 relies on the following proposition. We defer the proof of Proposition 5.4
to the Sections 5.2.2 and 5.2.3.
Proposition 5.4. There holds,
1
kZ ∗ Z − Ck ≤ ,
2
"
1
Im
− √mp
1m v ∗
C := E(Z ∗ Z) =
1
Inp
v1∗m
− √mp
#
(5.16)
(a) with probability at least 1 − (np + m)−γ with γ ≥ 1 if Al is an m × n (m > n) complex Gaussian
random matrix and
n
1
1
+
(γ + 1) log 2 (np + m) ≤ ;
C0
p m
4
24
(b) with probability at least 1 − (np + m)−γ − 2(mp)−γ+1 with γ ≥ 1 if Al yields (3.2) and
n−1
1
1
+
γ 3 log4 (np + m) ≤ .
C0
p m−1
4
Remark 5.5. Note that C has one eigenvalue equal to 0 and all the other eigenvalues are at
least 1. Hence the rank of C is np + m − 1. Similar to Remark 5.3, Proposition 5.4 shows
that the solution (s0 , {xl }pl=1 ) to (3.1) is uniquely identifiable with high probability when mp ≥
(np + m) · poly(log(np + m)) and kZ ∗ Z − Ck ≤ 12 .
Proof: [Proof of Theorem 3.3] From (3.1), we let Aw = Aw,0 + δA where Aw,0 is the noiseless
part of Aw . By definition of Aw,0 , we know that αz0 is the solution to the overdetermined system
0
Aw,0 z =
where α = w∗cz0 . Now, (5.15) gives
c
A∗w,0 Aw,0 = A∗0 A0 + ww ∗ = P ∗ Z ∗ Q∗ QZP + ww ∗ .
Define xmax := max1≤l≤p kxl k and xmin := min1≤l≤p kxl k. From Proposition 5.4 and Theorem 1
in [36], we know that the eigenvalues {λj }1≤j≤np+m of Z ∗ Z fulfill λ1 = 0 and λj ≥ 12 for j ≥ 2
since kZ ∗ Z − Ck ≤ 12 ; and the eigenvalues of C are 0, 1 and 2 with multiplicities 1, np + m − 2, 1
respectively.
The key is to obtain a bound for κ(Aw,0 ). From (5.15),
λmax (A∗w,0 Aw,0 ) ≤ kP k2 kQk2 kZ ∗ Zk + kwk2 ≤ 3x2max λmax (P ∗ P ) + kwk2
kwk2
2
λmax (P ∗ P )
≤ 3xmax 1 +
m
(5.17)
where x2max λmax (P ∗ P ) ≥ x2max x2m ≥ m. On the other hand, (5.16) gives
min
λmax (A∗w,0 Aw,0 ) ≥ max {kA∗l Al k} ≥
1≤l≤p
since
1
∗
m Al Al
m
2
− In ≤ 12 . For λmin (A∗w,0 Aw,0 ),
e .
A∗w,0 Aw,0 λmin (Q∗ Q)P ∗ Z ∗ ZP + ww ∗ x2min P ∗ Z ∗ ZP + ww ∗ =: P ∗ CP
#
" 1
√ 1m
m
e = x2 Z ∗ Z + w
ew
e ∗ where w
e = P −1 w. By
Denote u1 := √12 √
such that Zu1 = 0 and C
1
min
v
p
using the same procedure as (5.6),
where u :=
Since
Pnp+m
j=1
|u∗1 (P −1 )∗ w|2
e ≥ x2
u∗ Cu
min
αj uj with
=
P
1
∗
2mp |w z0
np+m
X
j=2
λj |αj |2 + |α1 |2 |u∗1 P −1 w|2
1
2
j |αj | = 1 and λj ≥ 2 for
|2 , the smallest eigenvalue of
j ≥ 2 follows from Proposition 5.4.
e satisfies
C
|w ∗ z0 |2
x2min
min 1,
2
mpx2min
1
x2min
2
2
min 1, kwk | Corr(w, z0 )|
≥
2
m
e ≥
λmin (C)
25
∗
2
∗
2
z0 |
z0 |
≥ |w
≥ kwk2 | Corr(w, z0 )|2 follows from kz0 k2 ≥ px2min .
where |w
kz0 k2
px2min
Therefore, the smallest eigenvalue of A∗w,0 Aw,0 satisfies
e min (P ∗ P )
λmin (A∗w,0 Aw,0 ) ≥ λmin (C)λ
x2
≥ min min m, kwk2 | Corr(w, z0 )|2 λmin (P ∗ P )
2m
(5.18)
Combining (5.17) and (5.18) leads to
κ(A∗w,0 Aw,0 ) ≤
Applying Proposition 5.1 and η =
6x2max (m + kwk2 )
κ(P ∗ P ).
x2min min{m, kwk2 | Corr(w, z0 )|2 }
2kδAk
√
m
≥
kδAk
kAw,0 k ,
we have
2
kẑ − αz0 k
≤ κ(Aw,0 )η 1 +
,
kαz0 k
1 − κ(Aw,0 )η
α=
c
w ∗ z0
if κ(Aw,0 )η < 1 where κ(Aw,0 ) obeys
v
u
max{pd2max , x2m }
u
6x2max (m + kwk2 )
min
t
.
κ(Aw,0 ) ≤
x2min min{m, kwk2 | Corr(w, z0 )|2 } min{pd2min , x2m }
max
In particular, if kwk =
√
m, then κ(Aw,0 ) has the following simpler upper bound:
v
u
√
u max{pd2max , x2m }
2 3xmax
min
t
κ(Aw,0 ) ≤
|Corr(w, z0 )|xmin min{pd2min , x2m }
max
which finishes the proof of Theorem 3.3.
5.2.2
Proof of Proposition 5.4(a)
In this section, we will prove that Proposition 5.4(a) if al,i ∼ √12 N (0, In ) + √i2 N (0, In ) where
al,i ∈ Cn is the i-th column of A∗l . Before moving to the proof, we compute a few quantities which
will be used later. Define zl,i as the ((l − 1)m + i)-th column of Z ∗ ,
"
#
√1 hal,i , vl iei
p
zl,i :=
, 1 ≤ l ≤ p, 1 ≤ i ≤ m
− √1m eel ⊗ al,i
(np+m)×1
m
where {ei }m
el }pl=1 ∈ Rp are standard orthonormal P
basis P
in Rm and Rp respectively;
i=1 ∈ R and {e
p
∗
“⊗” denotes Kronecker product. By definition, we have Z ∗ Z = l=1 m
i=1 zl,i zl,i and all zl,i are
independent from one another.
#
"
1
1
2
∗
− √mp
hvl , al,i i ei (e
e∗l ⊗ a∗l,i )
p | hal,i , vl i | ei ei
∗
zl,i zl,i =
1
1
el ee∗l ⊗ al,i a∗l,i
hal,i , vl i (e
el ⊗ al,i )e∗i
− √mp
me
26
and its expectation is equal to
"
∗
)=
E(zl,i zl,i
Pp
It is easy to verify that C =
l=1
1
∗
p ei ei
1
− √mp
(e
el ⊗ vl )e∗i
Pm
∗
i=1 E(zl,i zl,i ).
#
1
− √mp
ei (e
e∗l ⊗ vl∗ )
.
1
el ee∗l ⊗ In
me
Proof: [Proof of Proposition 5.4(a)] The
is to use apply the matrix Bernstein inPpkeyPhere
m
∗ . Let Z := z z ∗ − E(z z ∗ ) and
∗
equality in Theorem 5.13. Note that Z Z = l=1 i=1 zl,i zl,i
l,i l,i
l,i
l,i l,i
we have
1
1 1
1
2
∗
2
2
kZl,i k ≤ kzl,i k + k E(zl,i zl,i )k ≤ | hal,i , vl i | + kal,i k + 2 max
,
p
m
p m
∗ )k ≤ 2 max{ 1 , 1 } follows from Lemma 5.10. Therefore, the exponential norm of
since k E(zl,i zl,i
p m
kZl,i k is bounded by
1
1
n
1
1 1
2
2
kZl,i kψ1 ≤ 2
(| hal,i , vl i | )ψ1 + (kal,i k )ψ1 + 2 max
,
+
≤C
p
m
p m
p m
n
.
which follows from Lemma 5.14 and as a result R := maxl,i kZl,i kψ1 ≤ C p1 + m
P
P
p
m
∗
Now we proceed by estimating the variance σ02 :=
i=1 Zl,i Zl,i . We express Zl,i as
l=1
follows:
#
"
1
1
2
∗
− √mp
ei (e
e∗l ⊗ (vl∗ (al,i a∗l,i − In )))
p (| hal,i , vl i | − 1)ei ei
.
Zl,i =
1
1
el ee∗l ⊗ (al,i a∗l,i − In )
(e
el ⊗ ((al,i a∗l,i − In )vl ))e∗i
− √mp
me
∗ are
The (1, 1)-th and the (2, 2)-th block of Zl,i Zl,i
∗
)1,1 =
(Zl,i Zl,i
and
2
1
1 ∗
| hal,i , vl i |2 − 1 ei e∗i +
v (al,i a∗l,i − In )2 vl ei e∗i ,
2
p
mp l
∗
)2,2 = eel ee∗l ⊗
(Zl,i Zl,i
1
1
(al,i a∗l,i − In )vl vl∗ (al,i a∗l,i − In ) + 2 (al,i a∗l,i − In )2 .
mp
m
Following from (5.36), (5.37) and (5.38), we have
1
1
n
n
∗
∗
∗
∗
E(Zl,i Zl,i )1,1 =
+
In + 2 In .
ei ei , E(Zl,i Zl,i )2,2 = eel eel ⊗
p2 mp
mp
m
Due to Lemma 5.10, there holds,
σ02 :=
p X
m
X
l=1 i=1
=
2
1
p
∗
Zl,i Zl,i
≤2
+
n
m
0
Im
p X
m
X
E(Zl,i Z ∗ )1,1
l,i
l=1 i=1
0
1
p
+
n
m
27
Inp
0
≤2
0
∗ )
E(Zl,i Zl,i
2,2
n
1
+
p m
.
P P
∗
Note that σ02 ≥ k pl=1 m
i=1 E(Zl,i Zl,i )1,1 k =
matrix. By applying (5.34),
∗
kZ Z − Ck =
p X
m
X
l=1 i=1
1
p
+
Zl,i =
nr 1
n
m
∗ ) is a positive semi-definite
since E(Zl,i Zl,i
p X
m
X
l=1 i=1
∗
)−C
E(zl,i zl,i
np
≤ C0 max
+
t + log(np + m),
p m
o 1
1
n
+
(t + log(np + m)) log(np + m) ≤ .
p m
2
∗
With
t = γlog(mp + n), there holds kZ Z − Ck ≤
n
(γ + 1) log2 (np + m) ≤ 14 .
C0 1p + m
5.2.3
1
2
with probability at least 1 − (np + m)−γ if
Proof of Proposition 5.4(b)
We prove Proposition 5.4 based on assumption (3.2). Denote al,i and hl,i as the i-th column of A∗l
and Hl∗ and obviously we have al,i = Ml hl,i . Denote Λl = diag(Al vl ) and let Zl be the l-th block
of Z ∗ in (5.15), i.e.,
#
"
√1 Λl
p
∈ C(np+m)×m .
Zl =
− √1m eel ⊗ A∗l
With A∗l Al = mIn , we have
"
Zl Zl∗ =
1
∗
p Λl Λl
1
eel ⊗ (Λl Al )∗
− √mp
#
1
− √mp
ee∗l ⊗ (Λl Al )
∈ C(np+m)×(np+m)
(e
el ee∗l ) ⊗ In
where the expectation of i-th row of Λl Al yields E(Λl Al )i = E(vl∗ al,i a∗l,i ) = vl∗ . Hence E(Λl Al ) =
1m vl∗ ∈ Cm×n . Its expectation equals
"
#
1
∗ ⊗ (1 v ∗ )
√1 e
e
I
−
m
m
l
p
mp l
E(Zl Zl∗ ) =
.
1
− √mp
eel ⊗ (vl 1∗m )
eel ee∗l ⊗ In
Proof: [Proof of Proposition 5.4(b)] Note that each block Zl is independent and we want
to apply the matrix Bernstein inequality to achieve the desired result. Let Zl := Zl Zl∗ − E(Zl Zl∗ )
and by definition, we have
#
"
1
1
∗
− √mp
(Λl Al − 1m vl∗ )
p (Λl Λl − Im )
kZl k =
1
− √mp
(Λl Al − 1m vl∗ )∗
0
≤
1
1
kΛl Λ∗l − Im k + √ kΛl Al − 1m vl∗ k.
p
mp
Note that
√
√
kΛl Al − 1m vl∗ k ≤ kΛl kkAl k + k1m vl∗ k ≤ mkΛl k + m.
p
Since (5.7) implies that P max1≤l≤p kΛl k ≥ 2γ log(mp) ≤ 2(mp)−γ+1 , we have
p
2γ log(mp) + 1
2γ log(mp) + 1
kΛl k2 + 1 kΛl k + 1
≤
+
+
R := max kZl k ≤
√
√
1≤l≤p
p
p
p
p
28
with probability at least 1 − 2(mp)−γ+1 . We proceed with estimation of σ02 :=
looking at the (1, 1)-th and (2, 2)-th block of Zl Zl∗ , i.e.,
(Zl Zl∗ )1,1 =
(Zl Zl∗ )2,2 =
Pp
∗
l=1 E(Zl Zl )
by
1
1
(Λl Λ∗l − Im )2 +
(Λl Al − 1m vl∗ )(Λl Al − 1m vl∗ )∗ ,
2
p
mp
1
(e
el ee∗l ) ⊗ ((Λl Al − 1m vl∗ )∗ (Λl Al − 1m vl∗ )).
mp
Note that E(Λl Λ∗l − Im )2 = E((Λl Λ∗l )2 ) − Im . The i-th diagonal entry of (Λl Λ∗l )2 is | hal,i , vl i |4 =
| ml , diag(h̄l,i )vl |4 where al,i = Ml hl,i = diag(hl,i )ml and (5.42) implies E(| hal,i , vl i |4 ) ≤ 3
since diag(h̄l,i )vl is still a unit vector (note that diag(h̄l,i ) is unitary since hl,i is a column of Hl∗ ).
Therefore,
E(Λl Λ∗l − Im )2 = E((Λl Λ∗l )2 ) − Im 3Im − Im 2Im .
(5.19)
By using Lemma 5.18, we have
E(Λl Al − 1m vl∗ )(Λl Al − 1m vl∗ )∗
= E(Λl Al A∗l Λ∗l ) − 1m 1∗m
m(n − 1)Im
(n − 1)(mIm − 1m 1∗m )
.
=
m−1
m−1
(5.20)
With al,i = Ml hl,i and independence between {hl,i }m
i=1 and Ml , we have
E((Λl Al − 1m vl∗ )∗ (Λl Al − 1m vl∗ ))
= E(A∗l Λ∗l Λl Al ) − mvl vl∗
=E
m
X
i=1
=E
m
X
i=1
| hal,i , vl i |2 al,i a∗l,i
!
− mvl vl∗
∗
!
diag(hl,i ) | ml , diag(h̄l,i )vl |2 ml ml diag(h̄l,i )
3mIn − mvl vl∗ 3mIn
− mvl vl∗
(5.21)
where E | ml , diag(h̄l,i )vl |2 ml m∗l 3In follows from (5.41) and diag(hl,i ) diag(h̄l,i ) = In . By
using (5.19), (5.20), (5.21) and Lemma 5.10, σ02 is bounded above by
!
p
p
X
X
E(Zl Zl∗ )1,1
0
∗
2
≤2
Zl Zl
σ0 := E
0
E(Zl Zl∗ )2,2
l=1
l=1
#
"
p
2
n−1
X
I
0
+
m
2
(m−1)p
p
≤ 2
3
el ee∗l ) ⊗ In
0
p (e
l=1
"
#
2
n−1
+ m−1
Im
0
1
n−1
p
≤ 2
≤6
+
.
3
p m−1
Inp
0
p
29
n
o
p
Conditioned on the event max1≤l≤p kΛl k ≥ 2γ log(mp) , applying (5.32) with t = γ log(np+m)
gives
p
nr 1
X
n−1p
(γ + 1) log(np + m),
+
≤ C0 max
Zl
p m−1
l=1
s
o 1
2γ log(mp)
log(mp) log(np + m) ≤
(γ + 1)
p
2
−γ
−γ+1 and it suffices to require the condition
with
at least 1 − (np + m) − 2(mp)
probability
n−1
γ 3 log4 (np + m) ≤ 41 .
C0 1p + m−1
5.3
Blind Calibration from multiple snapshots
Recall that Aw in (3.3) and the only difference from (3.1) is that here all Al are
εl = 0, Aw (excluding the last row) can be factorized into
√
pD √ 0
diag(Av
A
1)
√
− √m · · ·
0
mIn
kx1 kIm · · ·
0
0
p
kx1 k
.
.
.
.
.
.
.
..
..
..
..
..
..
..
A0 :=
..
...
.
diag(Av
)
p
A
0
· · · kxp kIm
√
0
· · · − √m
p
|
{z
}|
0
0
{z
}
Q
{z
|
mp×(np+m)
Z∈C
equal to A. If
···
···
..
.
···
0
0
..
.
√
mIn
kxp k
P
}
(5.22)
xi
n is the normalized x .
where vi = kx
∈
C
i
ik
Before we proceed to the main result in this section we need to introduce some notation. Let
ai be the i-th column of A∗ , which is a complex Gaussian random matrix; define Zi ∈ C(np+m)×p
to be a matrix whose columns consist of the i-th column of each block of Z ∗ , i.e.,
#
"
√1 hai , v1 iei · · ·
√1 hai , vp iei
p
p
Zi =
− √1m ee1 ⊗ ai · · · − √1m eep ⊗ ai
(np+m)×p
m
where “⊗” denotes Kronecker product and both {ei }m
el }pl=1 ∈ Rp are the standard
i=1 ∈ R and {e
orthonormal basis in Rm and Rp , respectively. In this way, the Zi are independently from one
another. By definition,
" 1 Pp
#
2 e e∗ − √1 e v ∗ (I ⊗ a a∗ )
|
ha
,
v
i
|
i
i
i
p
i
l
i
i
l=1
p
mp
Zi Zi∗ =
1
1
∗
(Ip ⊗ ai a∗i )ve∗i
− √mp
m Ip ⊗ (ai ai )
where
by
Pp
el
l=1 e
⊗ vl = v ∈ Cnp×1
v1
√
and v = ... with kvk = p. The expectation of Zi Zi∗ is given
vp
#
∗
√1 ei v ∗
e
e
−
i
i
mp
,
E(Zi Zi∗ ) =
1
1
ve∗i
− √mp
m Inp
"
C :=
m
X
i=1
30
"
#
√1 1m v ∗
I
−
m
mp
E(Zi Zi∗ ) =
.
1
v1∗m
Inp
− √mp
Our analysis depends on the mutual coherence of {vl }pl=1 . One cannot expect to recover all
{vl }pl=1 and D if all {vl }pl=1 are parallel to each other. Let G be the Gram matrix of {vl }pl=1 with
p ≤ n, i.e., G ∈ Cp×p and Gk,l = hvk , vl i , 1 ≤ k ≤ l ≤ p and in particular, Gl,l = 1, 1 ≤ l ≤ p. Its
eigenvalues are denoted by {λl }pl=1 with λp ≥ · · · ≥ λ1 ≥ 0. Basic linear algebra tells that
p
X
U GU ∗ = Λ,
λl = p,
(5.23)
l=1
v1∗
where U ∈ Cp×p is unitary and Λ = diag(λ1 , · · · , λp ). Let V = ... ∈ Cp×n , then there holds
v∗
√
√p
∗
∗
∗
Λ = U GU = U V (U V ) since G = V V . Here 1 ≤ kGk ≤ p and p ≤ kGkF ≤ p. In
√
particular, if hvk , vl i = δkl , then G = Ip ; if | hvk , vl i | = 1 for all 1 ≤ k, l ≤ p, then kGk = p and
kGkF = p.
We are now ready to state and prove the main result in this subsection.
Proposition 5.6. There holds
kZ ∗ Z − Ck =
m
X
i=1
Zi Zi∗ − C ≤
1
2
with probability at least 1 − 2m(np + m)−γ if
kGk kGk2F
n
1
C0 max
,
+
log2 (np + m) ≤
2
p
p
m
16(γ + 1)
(5.24)
and each al is i.i.d. complex Gaussian, i.e., ai ∼ √12 N (0, In ) + √i2 N (0, In ). In particular, if
√
G = Ip and kGkF = p, (5.24) becomes
n
1
1
+
.
(5.25)
C0
log2 (np + m) ≤
p m
16(γ + 1)
Remark 5.7. The proof of Theorem 3.5 follows exactly from that of Theorem 3.3 when Proposition 5.6 holds. Hence we just give a proof of Proposition 5.6.
Proof: [Proof of Proposition 5.6] Let Zi Zi∗ − E(Zi Zi∗ ) =: Zi,1 + Zi,2 , where Zi,1 and Zi,2 are
defined as
1 Pp
(| hai , vl i |2 − 1)ei e∗i 0
l=1
p
Zi,1 :=
,
0
0
"
#
1
ei v ∗ (Ip ⊗ (ai a∗i − In ))
0
− √mp
Zi,2 :=
.
1
1
∗
− √mp
(Ip ⊗ (ai a∗i − In ))ve∗i
m Ip ⊗ (ai ai − In )
Estimation of k
p
X
l=1
Pm
i=1 Zi,1 k
Following from (5.23), we have
p
2
2
2
1/2
| hai , vl i | = kV ai k = kU V ai k = kΛ
31
−1/2
Λ
1X
2
λl ξi,l
U V ai k =
2
2
l=1
where Λ−1/2 U V is a p×n matrix with orthonormal
rows and hence each ξi,l is Rayleigh distributed.
√
(We say ξ is Rayleigh distributed if ξ = X 2 + Y 2 where both X and Y are standard real Gaussian
variables.)
Due to the simple form of Zi,1 , it is easy to see from Bernstein’s inequality for scalar random
variables (See Proposition 5.16 in [42]) that
m
X
i=1
p
Zi,1
1X
≤ max
| hai , vl i |2 − 1 ≤ C0 max
1≤i≤m p
l=1
with probability 1 − me−t . Here
Therefore,
p
X
Var
1
p
2
λl (ξi,l
l=1
2
max (λl |ξi,l
1≤l≤p
Pp
2
l=1 | hai , vl i |
!
− 1)
− 1|)ψ1
≤
2
Var(ξi,1
1
p
− 1)
tkGk
,
p
Pp
p
X
l=1
2
l=1 λl (ξi,l
√
tkGkF
p
− 1) where
(5.26)
Pp
l=1 λl
= p.
λ2l = c0 kGk2F ,
1≤l≤p
Pm
∗
i=1 E(Zi,2 Zi,2 )k
in order to bound k
Denote zi := (Ip ⊗ (ai a∗i − I))v and there holds,
Estimation of kZi,2 kψ1
≤ c1 max λl = c1 kGk.
Now we only need to find out kZi,2 kψ1 and σ02 = k
kZi,2 k ≤
−1 =
Pm
i=1 Zi,2 k.
1
1
1
1
max{kai k2 , 1} + √ kzi e∗i k =
max{kai k2 , 1} + √ kzi k.
m
mp
m
mp
For kai k2 , its ψ1 -norm is bounded by C0 n due to Lemma 5.14 and we only need to know kzi kψ1 :
v
u p
uX
√
∗
∗
| hai , vl i |2 kai k + p.
kzi k = k(Ip ⊗ (ai ai − In ))vk ≤ kIp ⊗ (ai ai )vk + kvk = t
l=1
Let u =
Pp
2
l=1 | hai , vl i |
=
√
( uv)ψ1
Pp
2
l=1 λl ξi,l
and v = kai k2 . The ψ1 -norm of kIp ⊗ (ai a∗i )vk satifies
√
= sup q −1 (E( uv)q )1/q ≤ sup q −1 (E uq )1/2q (E v q )1/2q
q≥1
≤
r
q≥1
√
sup q −1 (E uq )1/q sup q −1 (E v q )1/q ≤ C1 np
q≥1
q≥1
where the second inequality follows from the Cauchy-Schwarz inequality, kukψ1 ≤ C1 p, and kvkψ1 ≤
√
C1 n. Therefore, kzi kψ1 ≤ C2 np and there holds
kZi,2 kψ1 ≤ C0
r
√
np
n
n
n
+√
+
.
≤ C0
m
mp
m
m
32
(5.27)
Pm
∗
Estimation of σ02 Note that σ02 :=
i=1 E(Zi,2 Zi,2 ) . Let Ai,1,1 and Ai,2,2 be the (1, 1)-th and
∗ respectively, i.e.,
(2, 2)-th block of Zi,2 Zi,2
Ai,1,1 =
Ai,2,2 =
=
1
k(Ip ⊗ (ai a∗i − In ))vk2 ei e∗i ,
mp
1
1
(Ip ⊗ (ai a∗i − In ))vv ∗ (Ip ⊗ (ai a∗i − In )) + 2 Ip ⊗ (ai a∗i − In )2
mp
m
1
1
[(ai a∗i − In )vk vl∗ (ai a∗i − In )]1≤k≤l≤p + 2 Ip ⊗ (ai a∗i − In )2 .
mp
m
(5.28)
∗ is a positive semi-definite matrix, Lemma 5.10 implies
Since Zi,2 Zi,2
σ02
m
X
Ai,1,1
0
E
.
≤2
0
Ai,2,2
(5.29)
i=1
So we only need to compute E(Ai,1,1 ) and E(Ai,2,2 ).
E k(Ip ⊗
(ai a∗i
2
− In ))vk =
p
X
l=1
E k(ai a∗i
where E(ai a∗i − In )2 = nIn . Now we have E Ai,1,1 =
2
− In )vl k = n
n
∗
m ei ei .
p
X
l=1
kvl k2 = np
For E(Ai,2,2 ), note that
E((ai a∗i − In )vk vl∗ (ai a∗i − In )) = Tr(vk vl∗ )In = hvl , vk i In = Gk,l In
which follows from (5.35). By (5.28), (5.29) and Lemma 5.10, there holds,
n
m n
X
ei e∗i
0
0
n
kGk
2
m
m
≤2
+
.
≤2
σ0 :≤ 2
n
n
1
Inp
0
0 1p G ⊗ In + m
p
m
mp G ⊗ In + m2 Inp
i=1
P
n
∗ ) is positive
each E(Zi,2 Zi,2
One lower bound of σ02 is σ02 ≥ k m
i=1 E(Ai,1,1 )k = m because
√
√
√
≤ log 2C0 √ n
≤ log(2C0 m) where R :=
semi-definite. Therefore, we have log σmR
0
n/m
pn
n
max1≤i≤m kZi,2 kψ1 ≤ CP
0( m +
m ) and m ≥ n.
Applying (5.34) to m
Z
i=1 i,2 with (5.29) and (5.27), we have
m
n n r n
X
+
(t + log(np + m)) log(np + m),
Zi,2
≤ C0 max
m
m
i=1
s
o
kGk
n
+
(log(np + m) + t)
(5.30)
p
m
with
1 − e−t . By combining (5.30) with (5.26) and letting t = γ log(np + m), we have
Pm probability
∗
k i=1 Zi Zi − Ck ≤ 21 with probability 1 − 2m(np + m)−γ if
p
γ log(np + m)kGkF
kGk
1
n
1
≤ , C0 (γ + 1)
+
log2 (np + m) ≤
C0
p
4
p
m
16
n
o
kGk2F
n
1
or equivalently, C0 max kGk
+m
.
log2 (np + m) ≤ 16(γ+1)
p , p2
33
5.4
Proof of the spectral method
We provide the proof of the spectral method proposed in Section 2.3. The proof follows two steps: i)
we provide an error bound for the recovery under noise by using singular value/vector perturbation.
The error bound involves the second smallest singular value of S0 and the noise strength kδSk; ii)
we give a lower bound for σ2 (S0 ), which is achieved with the help of Proposition 5.2, 5.4 and 5.6
respectively for three different models.
The first result is a variant of perturbation theory for the singular vector corresponding to the
smallest singular value. A more general version can be found in [45, 36].
Lemma 5.8. Suppose S = S0 + δS where S0 is the noiseless part of S and δS is the noisy part.
Then
kδSk
kα0 ẑ − z0 k
(I − ẑ ẑ ∗ )z0
≤
=
.
min
kz
k
kz
k
[σ
(S
α0 ∈C
0
0
2 0 ) − kδSk]+
where σ2 (S0 ) is the second smallest singular value of S0 , z0 satisfies S0 z0 = 0, and ẑ is the right
singular vector with respect to the smallest singular value of S, i.e., the solution to (2.10).
s
Proof: By definition, there holds S0 z0 = 0 where z0 = 0 is the ground truth and also the
x0
right singular vector corresponding to the smallest singular value. Without loss of generality, we
assume kz0 k = kẑk = 1. For S, we denote its singular value decomposition as
S := S − σ1 (S)ûẑ ∗ + σ1 (S)ûẑ ∗
{z
} | {z }
|
B1
B0
where σ1 (S), û and ẑ are the smallest singular value/vectors of S. By definition, the vector ẑ is
also the solution to (2.10).
First note that I − ẑ ẑ ∗ = B1∗ (B1∗ )† where (B1∗ )† is the pseudo-inverse of B1 . Therefore, we
have
(I − ẑ ẑ ∗ )z0
kz0 k
= kz0 z0∗ B1∗ (B1∗ )† k = kz0 z0∗ (S0∗ + (δS)∗ − (B0 )∗ )(B1∗ )† k
= kz0 z0∗ (δS)∗ (B1∗ )† k ≤ kδSkk(B1∗ )† k ≤
kδAk
kδSk
≤
σ2 (S)
[σ2 (S0 ) − kδSk]+
where S0 z0 = 0 and (B0 )∗ (B1∗ )† = 0. And the last inequality follows from |σ2 (S0 ) − σ2 (S)| ≤ kδSk
and σ2 (S) ≥ [σ2 (S0 ) − kδSk]+ .
The second smallest singular value σ2 (S0 ) is estimated by using the proposition 5.2, 5.4 and 5.6
and the following fact:
Lemma 5.9. Suppose P is an invertible matrix, and A is a positive semi-definite matrix with the
dimension of its null space equal to 1. Then the second smallest singular value of P AP ∗ is nonzero
and satisfies
σ2 (P AP ∗ ) ≥ σ2 (A)σ12 (P )
where σ1 (·) and σ2 (·) denotes the smallest and second smallest singular values respectively.
34
Proof: The proof is very straightforward. Note that k(P AP ∗ )† k =
deficient. Also from the property of pseudo inverse, there holds
k(P AP ∗ )† k = k(P −1 )∗ A† P −1 k ≤ kA† kkP −1 k2 =
1
σ2 (P AP ∗ )
since A is rank-1
1
1
.
2
σ2 (A) σ1 (P )
Hence, σ2 (P AP ∗ ) ≥ σ2 (A)σ12 (P ).
Proof: [Proof of Theorem 3.9] Combined with Lemma 5.8, it suffices to estimate the lower
bound of the second smallest singular P
value of S0 for the proposed three models. We start with
∗
(a). From (5.1), we know that S0 S0 = pl=1 P Zl Zl∗ P ∗ where
"
#
∗
Λl
D kxk
0
(m+n)×m
√
∈ C(m+n)×(m+n) .
Zl :=
∈
C
,
P
:=
− √1m A∗l
mIn
0
P
From Proposition 5.2, we know that the second smallest eigenvalue of pl=1 Zl Zl∗ is at least
it is also rank-1 deficient. Applying Lemma 5.9 gives
!
p
X
√
p
Zl Zl∗ σ1 (P P ∗ ) ≥ (min{ m, dmin kxk})2
σ2 (S0∗ S0 ) ≥ σ2
2
p
2
and
l=1
and hence σ2 (S0 ) ≥
q
p
2
√
min{ m, dmin kxk}.
Since (b) and (c) are exactly the same, it suffices to show (b). From (5.15), we know that S0
can be factorized into A0 := QZP and Proposition 5.4 implies
"
#
√1 1m v ∗
I
−
m
1
mp
.
kZ ∗ Z − Ck ≤ , C := E(Z ∗ Z) =
1
− √mp
v1∗m
Inp
2
Therefore, S0∗ S0 = QZ ∗ P P ∗ ZQ∗ and σ2 (Z ∗ Z) ≥ 12 . Applying Lemma 5.9 leads to
σ2 (S0∗ S0 ) ≥ σ2 (Z ∗ P P ∗ Z)σ12 (Q) ≥ σ2 (Z ∗ Z)σ12 (P )σ12 (Q)
√ 2
√
m
1 2
pdmin ,
≥ xmin min
2
xmax
where xmin = min{kxl k} and xmax = max{kxl k}.
Appendix
S11 S12
, there
Lemma 5.10. For any Hermitian positive semi-definite matrix S with S :=
∗
S12
S22
holds,
S11 0
S11 S12
2
.
∗
S22
S12
0 S22
In other words, kSk ≤ 2 max{kS11 k, kS22 k}.
35
Lemma 5.11. Corollary 7.21 in [17]. Let a ∈ CM and ε = (ε1 , · · · , εM ) be a Rademacher sequence,
then for u > 0,
M
X
P
εj aj ≥ kaku ≤ 2 exp(−u2 /2).
j=1
For Gaussian and random Hadamard cases, the concentration inequalities are slightly different.
The following theorem is mostly due to Theorem 6.1 in [39] as well as due to [42].
Theorem 5.12. Consider a finite sequence of Zl of independent centered random matrices
PL with
dimension M1 × M2 . We assume that kZl k ≤ R and introduce the random matrix S := l=1 Zl .
Compute the variance parameter
σ02
L
L
n X
o
X
∗
= max k
E(Zl Zl )k, k
E(Zl∗ Zl )k ,
l=1
then for all t ≥ 0
kSk ≤ C0 max{σ0
p
(5.31)
l=1
t + log(M1 + M2 ), R(t + log(M1 + M2 ))}
(5.32)
with probability at least 1 − e−t where C0 is an absolute constant.
The concentration inequality is slightly different from Theorem 5.12 if kZl k is a sub-exponential
random variable. Here we are using the form in [24]. Before presenting the inequality, we introduce
the sub-exponential norm k · kψ1 of a matrix, defined as
kZkψ1 := inf {u : E[exp(kZk/u)] ≤ 2}.
u≥0
(5.33)
One can find more details about this norm and norm on Orlicz spaces in [42] and [40].
Theorem 5.13. For a finite sequence of independent M1 × M2 random matrices Zl with R :=
max1≤l≤L kZl kψ1 and σ02 as defined in (5.31), we have the tail bound on the operator norm of S,
!
√
p
LR
(t + log(M1 + M2 ))}
(5.34)
kSk ≤ C0 max{σ0 t + log(M1 + M2 ), R log
σ0
with probability at least 1 − e−t where C0 is an absolute constant.
The estimation of the ψ1 -norm of a sub-exponential random variable easily follows from the
following lemma.
Lemma 5.14 (Lemma 2.2.1 in [40]). Let z be a random variable which obeys P{|z| > u} ≤ ae−bu ,
then kzkψ1 ≤ (1 + a)/b.
Remark 5.15. A direct implication of Lemma 5.14 gives the ψ1 -norm of kak2 where a ∼ N (0, 12 In )+
iN (0, 21 In ) is a complex Gaussian random vector, i.e., (kak2 )ψ1 ≤ C0 n for the absolute constant
C0 .
36
Lemma 5.16. For a ∼ N (0, 12 In ) + iN (0, 21 In ), there holds
E(kak2 aa∗ ) =
∗
∗
E((a Xa)aa ) =
(n + 1)In ,
X + Tr(X)In ,
(5.35)
for any fixed x ∈ Cn and X ∈ Cn×n . In particular, we have
E | ha, xi |2 aa∗
(5.36)
4
= kxk2 In + xx∗ ,
= 2kxk ,
(5.37)
2
= nIn .
(5.38)
E | ha, xi |
∗
E(aa − In )
4
Lemma 5.17. Suppose that a ∈ Rn is a Rademacher sequence and for any fixed x ∈ Cn and
X ∈ Cn×n , there holds
E(kak2 aa∗ )
E((a∗ Xa)aa∗ )
= nIn ,
(5.39)
= Tr(X)In + X + X T − 2
n
X
Xkk Ekk
(5.40)
k=1
where Ekk is an n × n matrix with only one nonzero entry equal to 1 and at position (k, k). In
particular, setting X = xx∗ gives
E | ha, xi |2 aa∗
E | ha, xi |4
= kxk2 In + xx∗ + xx∗ − 2 diag(x) diag(x̄) 3kxk2 In ,
= 2kxk4 +
n
X
2
x2i
k=1
−2
n
X
k=1
|xk |4 ≤ 3kxk4 .
(5.41)
(5.42)
Proof: Since a is a Rademacher sequence, i.e, each ai takes ±1 independently with equal probability, this implies a2i =P1 and
kak2 = n. Therefore, E(kak2 aa∗ ) = n E(aa∗ ) = nIn . The (k, l)-th
P
entry of (a∗ Xa)aa∗ is ni=1 nj=1 Xij ai aj ak al .
1. If k = l,
n
n
n X
X
X
2
E(Xii |ai |2 |ak |2 ) = Tr(X)
Xij ai aj |ak |
=
E
i=1
i=1 j=1
where E(ai aj |ak |2 ) = 0 if i 6= j.
2. If k 6= l,
n X
n
X
Xij ai aj ak al = Xkl E(|ak |2 |al |2 ) + Xlk E(|ak |2 |al |2 ) = Xkl + Xlk .
E
i=1 j=1
Hence, we have E((a∗ Xa)aa∗ ) = Tr(X)In + X + X T − 2
Lemma 5.18. There holds
E(ΛA(ΛA)∗ ) =
Pn
k=1 Xkk Ekk .
(n − 1)(mIm − 1m 1∗m )
+ 1m 1∗m
m−1
37
where A = HM , Λ = diag(Av) and v = (v1 , · · · , vn )T ∈ Cn is a deterministic unit vector.
H ∈ Cm×n is a random partial Fourier/Hadamard matrix with H ∗ H = mIn and m ≥ n, i.e., the
columns of H are uniformly sampled without replacement from an m × m DFT/Hadamard matrix;
M is a diagonal matrix with entries random sampled from ±1 with equal probability; moreover, we
assume M and H are independent from each other. In particular, if m = n = 1, E(ΛA(ΛA)∗ ) = 1.
Proof: We only prove the case when A is a random Fourier matrix since the Hadamard case is
essentially the same modulo very minor differences. By definition,
ΛAA∗ Λ∗ = ΛHH ∗ Λ∗ = diag(HM v)HH ∗ diag(HM v).
Let hi be the i-th column of H ∗ and the (i, j)-th entry of diag(HM v)HH ∗ diag(HM v) is
hhi , M vi hhj , M vi hhi , hj i where hu, vi = u∗ v. The randomness of ΛAA∗ Λ∗ comes from both H
and M and we first take the expectation with respect to M .
E(hhi , M vi hhj , M vi |H)
= h∗i E(M vv ∗ M |H)hj = h∗i diag(v) diag(v̄)hj
= (H diag(v) diag(v̄)H ∗ )i,j
where E(M vv ∗ M ) = diag(v) diag(v̄) follows from each entry in M being a Bernoulli random
variable. Hence, E((ΛAA∗ Λ∗ )i,j |H) = (H diag(v) diag(v̄)H ∗ )i,j · (HH ∗ )i,j .
Let uk be the k-th columnPof H and 1 ≤ k ≤ n and “⊙” denotes the Hadamard (pointwise)
product. So we have HH ∗ = nk=1 uk u∗k . There holds,
!
n
X
|vk |2 ūk ū∗k ⊙ HH ∗
E(ΛAA∗ Λ∗ |H) = (H diag(v) diag(v̄)H ∗ ) ⊙ HH ∗ =
k=1
=
n
X
k=1
=
|vk |2 diag(ūk )HH ∗ diag(uk ) =
X
1≤k6=l≤n
2
|vk |
n
n X
X
k=1 l=1
diag(ūk )ul u∗l diag(uk ) +
|vk |2 diag(ūk )ul u∗l diag(uk )
1m 1∗m
(5.43)
where the third equation follows from linearity of the Hadamard product and from
ūk ū∗k ⊙ HH ∗ = diag(ūk )HH ∗ diag(uk ).
The last one uses the fact that diag(ūk )uk = 1m if uk is a vector from the DFT matrix or
Hadamard matrix. By the property of conditional expectation, we know that E(ΛAA∗ Λ∗ ) =
E(E(ΛAA∗ Λ∗ )|H) and due to the linearity of expectation, it suffices to find out for k 6= l,
E(diag(ūk )ul u∗l diag(uk )) where uk and ul , by definition, are the k-th and l-th columns of H
which are sampled uniformly without replacement from an m × m DFT matrix F . Note that
(uk , ul ) is actually an ordered pair of random vectors sampled without replacement from columns
of F . Hence there are in total m(m − 1) different choices of diag(ūk )ul and
P(uk = φi , ul = φj ) =
1
,
m(m − 1)
38
∀1 ≤ i 6= j ≤ m, ∀1 ≤ k 6= l ≤ n
where φi is defined as the i-th column of an m × m DFT matrix F . Now we have, for any k 6= l,
E(diag(ūk )ul u∗l diag(uk )) =
=
=
X
1
diag(φ̄i )φj φ∗j diag(φi )
m(m − 1)
i6=j
X
1
diag(φ̄i )φj φ∗j diag(φi ) − m1m 1∗m
m(m − 1)
1≤i,j≤m
!
m
X
1
∗
diag(φ̄i ) diag(φi ) − 1m 1m
m−1
i=1
=
mIm − 1m 1∗m
.
m−1
(5.44)
P
∗
∗ ∗
where diag(φ̄i )φi = 1m and m
i=1 φi φi = mIm . Now we return to E(ΛAA Λ ). By substituting (5.44) into (5.43), we get the desired formula:
X
E(ΛAA∗ Λ∗ ) = E(E(ΛAA∗ Λ∗ |H)) = E
|vk |2 diag(uk )ul u∗l diag(uk ) + 1m 1∗m
1≤k6=l≤n
=
where
P
2
1≤k6=l≤n |vk |
1m 1∗m
mIm −
m−1
=n−
Pn
X
1≤k6=l≤n
2
k=1 |vk |
|vk |2 + 1m 1∗m =
= n − 1 follows from
(n − 1)(mIm − 1m 1∗m )
+ 1m 1∗m ,
m−1
Pm
2
k=1 |vk |
= 1.
References
[1] A. Ahmed, A. Cosse, and L. Demanet, A convex approach to blind deconvolution with
diverse inputs, in 2015 IEEE 6th International Workshop on Computational Advances in MultiSensor Adaptive Processing (CAMSAP), IEEE, 2015, pp. 5–8.
[2] A. Ahmed and L. Demanet, Leveraging diversity and sparsity in blind deconvolution, arXiv
preprint arXiv:1610.06098, (2016).
[3] A. Ahmed, F. Krahmer, and J. Romberg, Empirical chaos processes and blind deconvolution, arXiv preprint arXiv:1608.08370, (2016).
[4] A. Ahmed, B. Recht, and J. Romberg, Blind deconvolution using convex programming,
IEEE Transactions on Information Theory, 60 (2014), pp. 1711–1732.
[5] S. Bahmani and J. Romberg, Lifting for blind deconvolution in random mask imaging:
Identifiability and convex relaxation, SIAM Journal on Imaging Sciences, 8 (2015), pp. 2203–
2238.
[6] L. Balzano and R. Nowak, Blind calibration of sensor networks, in Proceedings of the 6th
International Conference on Information processing in sensor networks, ACM, 2007, pp. 79–88.
[7] L. Balzano and R. Nowak, Blind calibration of networks of sensors: Theory and algorithms,
in Networked Sensing Information and Control, Springer, 2008, pp. 9–37.
39
[8] C. Bilen, G. Puy, R. Gribonval, and L. Daudet, Convex optimization approaches for
blind sensor calibration using sparsity, IEEE Transactions on Signal Processing, 62 (2014),
pp. 4847–4856.
[9] V. Cambareri and L. Jacques, A greedy blind calibration method for compressed sensing
with unknown sensor gains, arXiv preprint arXiv:1610.02851, (2016).
[10] V. Cambareri and L. Jacques, A non-convex blind calibration method for randomised
sensing strategies, in Compressed Sensing Theory and its Applications to Radar, Sonar and
Remote Sensing (CoSeRa), 2016 4th International Workshop on, IEEE, 2016, pp. 16–20.
[11] V. Cambareri and L. Jacques, Through the haze: A non-convex approach to blind calibration for linear random sensing models, arXiv preprint arXiv:1610.09028, (2016).
[12] P. Campisi and K. Egiazarian, Blind Image Deconvolution: Theory and Applications, CRC
press, 2007.
[13] E. J. Candes, Y. C. Eldar, T. Strohmer, and V. Voroninski, Phase retrieval via
matrix completion, SIAM Review, 57 (2015), pp. 225–251.
[14] S. Curtis, J. Lim, and A. Oppenheim, Signal reconstruction from one bit of fourier transform phase, in 1984 IEEE International Conference on Acoustics, Speech, and Signal Processing (ICASSP), vol. 9, IEEE, 1984, pp. 487–490.
[15] M. A. Davenport and J. Romberg, An overview of low-rank matrix recovery from incomplete observations, IEEE Journal of Selected Topics in Signal Processing, 10 (2016), pp. 608–
622.
[16] J. R. Fienup, Reconstruction of an object from the modulus of its fourier transform, Optics
Letters, 3 (1978), pp. 27–29.
[17] S. Foucart and H. Rauhut, A Mathematical Introduction to Compressive Sensing, Springer,
2013.
[18] B. Friedlander and T. Strohmer, Bilinear compressed sensing for array self-calibration,
in 2014 48th Asilomar Conference on Signals, Systems and Computers, Asilomar, 2014.
[19] L. Gan, T. T. Do, and T. D. Tran, Fast compressive imaging using scrambled block
hadamard ensemble, in 2008 16th European Signal Processing Conference, IEEE, 2008, pp. 1–
5.
[20] R. Gribonval, G. Chardon, and L. Daudet, Blind calibration for compressed sensing by
convex optimization, in 2012 IEEE International Conference on Acoustics, Speech and Signal
Processing (ICASSP), IEEE, 2012, pp. 2713–2716.
[21] G. Harikumar and Y. Bresler, Perfect blind restoration of images blurred by multiple
filters: Theory and efficient algorithms, IEEE Transactions on Image Processing, 8 (1999),
pp. 202–219.
40
[22] A. Ito, A. C. Sankaranarayanan, A. Veeraraghavan, and R. G. Baraniuk, Blurburst: Removing blur due to camera shake using multiple images, ACM Trans. Graph., Submitted, 3 (2014).
[23] M. Kech and F. Krahmer, Optimal injectivity conditions for bilinear inverse problems with
applications to identifiability of deconvolution problems, SIAM Journal on Applied Algebra and
Geometry, 1 (2017), pp. 20–37.
[24] V. Koltchinskii et al., Von Neumann entropy penalization and low-rank matrix estimation,
The Annals of Statistics, 39 (2011), pp. 2936–2973.
[25] K. Lee, Y. Li, M. Junge, and Y. Bresler, Blind recovery of sparse signals from subsampled
convolution, IEEE Transactions on Information Theory, 63 (2017), pp. 802–821.
[26] X. Li, S. Ling, T. Strohmer, and K. Wei, Rapid, robust, and reliable blind deconvolution
via nonconvex optimization, arXiv preprint arXiv:1606.04933, (2016).
[27] Y. Li, K. Lee, and Y. Bresler, Identifiability in blind deconvolution with subspace or
sparsity constraints, IEEE Transactions on Information Theory, 62 (2016), pp. 4266–4275.
[28] Y. Li, K. Lee, and Y. Bresler, Optimal sample complexity for blind gain and phase calibration, IEEE Transactions on Signal Processing, 64 (2016), pp. 5549–5556.
[29] S. Ling and T. Strohmer, Blind deconvolution meets blind demixing: Algorithms and performance bounds, arXiv preprint arXiv:1512.07730, (2015).
[30] S. Ling and T. Strohmer, Self-calibration and biconvex compressive sensing, Inverse Problems, 31 (2015), p. 115002.
[31] J. Lipor and L. Balzano, Robust blind calibration via total least squares, in 2014 IEEE
International Conference on Acoustics, Speech and Signal Processing (ICASSP), IEEE, 2014,
pp. 4244–4248.
[32] V. I. Morgenshtern, E. Riegler, W. Yang, G. Durisi, S. Lin, B. Sturmfels, and H. Bölcskei, Capacity pre-log of noncoherent SIMO channels via Hironaka’s Theorem, IEEE Transactions on Information Theory, 59 (2013), pp. 4213–4229,
http://www.nari.ee.ethz.ch/commth/pubs/p/mrydlsb12.
[33] M. Pollefeys, R. Koch, and L. Van Gool, Self-calibration and metric reconstruction inspite of varying and unknown intrinsic camera parameters, International Journal of Computer
Vision, 32 (1999), pp. 7–25.
[34] Y. Saad, Iterative Methods for Sparse Linear Systems, SIAM, 2003.
[35] P. J. Shin, P. E. Larson, M. A. Ohliger, M. Elad, J. M. Pauly, D. B. Vigneron,
and M. Lustig, Calibrationless parallel imaging reconstruction based on structured low-rank
matrix completion, Magnetic Resonance in Medicine, 72 (2014), pp. 959–970.
[36] G. W. Stewart, Perturbation theory for the singular value decomposition, Technical Report
CS-TR 2539, University of Maryland, (September 1990).
41
[37] G. Tang and B. Recht, Convex blind deconvolution with random masks, in Computational
Optical Sensing and Imaging, Optical Society of America, 2014, pp. CW4C–1.
[38] L. Tong, G. Xu, B. Hassibi, and T. Kailath, Blind identification and equalization based
on second-order statistics: A frequency domain approach, IEEE Transactions on Information
Theory, 41 (1995), pp. 329–334.
[39] J. A. Tropp, User-friendly tail bounds for sums of random matrices, Foundations of Computational Mathematics, 12 (2012), pp. 389–434.
[40] A. Van der Vaart and J. Wellner, Weak Convergence and Empirical Processes: with
Applications to Statistics, Springer Series in Statistics, Springer-Verlag, New York, 1996.
[41] S. Verdú and S. Shamai, Spectral efficiency of cdma with random spreading, IEEE Transactions on Information theory, 45 (1999), pp. 622–640.
[42] R. Vershynin, Introduction to the non-asymptotic analysis of random matrices, in Compressed Sensing: Theory and Applications, Y. C. Eldar and G. Kutyniok, eds., Cambridge
University Press, 2012, ch. 5.
[43] L. Wang and Y. Chi, Blind deconvolution from multiple sparse inputs, IEEE Signal Processing Letters, 23 (2016), pp. 1384–1388.
[44] L. Wang, A. Singer, and Z. Wen, Orientation determination of cryo-em images using
least unsquared deviations, SIAM journal on imaging sciences, 6 (2013), pp. 2450–2483.
[45] P.-Å. Wedin, Perturbation bounds in connection with singular value decomposition, BIT Numerical Mathematics, 12 (1972), pp. 99–111.
[46] M. Wei, The perturbation of consistent least squares problems, Linear Algebra and its Applications, 112 (1989), pp. 231–245.
[47] A. J. Weiss and B. Friedlander, Eigenstructure methods for direction finding with sensor
gain and phase uncertainties, Circuits, Systems, and Signal Processing, 9 (1990), pp. 271–300.
42
| 7cs.IT
|
arXiv:1712.04544v1 [cs.CR] 12 Dec 2017
HIERARCHICAL BLOOM FILTER TREES FOR
APPROXIMATE MATCHING
Frank Breitinger
Cyber Forensics Research
and Education Group
Tagliatela College of Engineering
University of New Haven
[email protected]
Mark Scanlon
Forensics and Security Research Group
School of Computer Science
University College Dublin
[email protected]
David Lillis
Forensics and Security Research Group
School of Computer Science
University College Dublin
[email protected]
ABSTRACT
Bytewise approximate matching algorithms have in recent years shown significant promise in detecting files that are similar at the byte level. This is very useful for digital forensic investigators,
who are regularly faced with the problem of searching through a seized device for pertinent data.
A common scenario is where an investigator is in possession of a collection of “known-illegal” files
(e.g. a collection of child abuse material) and wishes to find whether copies of these are stored on
the seized device. Approximate matching addresses shortcomings in traditional hashing, which can
only find identical files, by also being able to deal with cases of merged files, embedded files, partial
files, or if a file has been changed in any way.
Most approximate matching algorithms work by comparing pairs of files, which is not a scalable
approach when faced with large corpora. This paper demonstrates the effectiveness of using a “Hierarchical Bloom Filter Tree” (HBFT) data structure to reduce the running time of collection-againstcollection matching, with a specific focus on the MRSH-v2 algorithm. Three experiments are discussed,
which explore the effects of different configurations of HBFTs. The proposed approach dramatically
reduces the number of pairwise comparisons required, and demonstrates substantial speed gains,
while maintaining effectiveness.
Keywords: approximate matching, hierarchical bloom filter trees, mrsh-v2
1.
INTRODUCTION
ment agencies worldwide, this has resulted in
significant evidence backlogs becoming commonplace (Scanlon, 2016), frequently reaching 1824 months (Casey et al., 2009) and exceeding
4 years in extreme cases (Lillis et al., 2016). The
backlogs have grown due to a number of factors
including the volume of cases requiring analysis,
the number of devices per case, the volume of
data on each device, and the limited availability
Current digital forensic process models are
surprisingly arduous, inefficient, and expensive. Coupled with the sheer volume of digital forensic investigations facing law enforceThis paper is an extended version of Lillis et al.
(2017), which was presented at the 9th EAI International Conference on Digital Forensics and Cyber Crime
(ICDF2C), Prague, Czech Republic, 9-11 October, 2017.
1
This paper presents an improvement in the
runtime efficiency of approximate matching techniques, primarily through the implementation of
a Hierarchical Bloom Filter Tree (HBFT). Additionally, it examines some of the tunable parameters of the algorithm to gauge their effect on the
required running time. A number of experiments
were conducted, using two different formulations
of a HBFT, which indicated a substantial reduction in the running time, in addition to which
the final experiment achieved a 100% recall rate
for identical files and also for files that have a
MRSH-v2 similarity above a reasonable threshold
of 40%.
Section 2 outlines the prior work that has been
conducted in the area of approximate matching.
The operation of MRSH-v2 is discussed in Section 3. HBFTs are introduced in Section 4. Section 5 presents the series of experiments designed
to evaluate the effectiveness of the HBFT approach, and finally Section 6 concludes the paper
and outlines directions for further work.
of skilled experts (Quick & Choo, 2014). Automated techniques are in continuous development
to aid investigators, but due to the sensitive nature of this work, the ultimate inferences and
decisions will always be made by skilled human
experts (James & Gladyshev, 2015).
Perhaps the most common (and most timeconsuming) task facing digital investigators involves examination of seized suspect devices
to determine if pertinent evidence is contained
therein. Often, this examination requires significant manual, expert data processing and analysis during the acquisition and analysis phases
of an investigation. A number of techniques
have been created or are in development to expedite/automate parts of the typical digital forensic process. These include triage (Rogers et
al., 2006), distributed processing (Roussev &
Richard III, 2004), Digital Forensics as a Service (DFaaS) (van Baar et al., 2014), workflow
management and automation (de Braekt et al.,
2016; J. N. Gupta et al., 2016). While these
techniques can help to alleviate the backlog, the
premise behind many of them involves evidence
discovery based on exact matching of hash values (e.g., MD5, SHA1). Typically, this requires
a set of hashes of known incriminating/pertinent
content. The hash of each artefact from a suspect device is then compared against this set.
This approach falls short against basic counterforensic techniques (e.g., content editing, content
embedding, data transformation).
Approximate matching (also referred to
as “fuzzy hashing”) is one technique used
to aid the discovery of these obfuscated
files (Breitinger, Guttman, et al., 2014). A number of algorithms have been developed including ssdeep (Kornblum, 2006), sdhash (Roussev,
2010), and MRSH-v2 (Breitinger & Baier, 2012).
This paper focuses specifically on MRSH-v2. This
algorithm operates by generating a “similarity
digest” for each file, represented as Bloom filters
(Bloom, 1970). An all-against-all pairwise comparison is then required to determine if files from
a set of desired content is present in a corpus of
unanalysed digital material. Thus, MRSH-v2 does
not exhibit strong scalability for use with larger
datasets.
2. BACKGROUND:
APPROXIMATE MATCHING
Bytewise approximate matching for digital forensics gained popularity in 2006 when Kornblum
(2006) presented context-triggered piecewise
hashing (CTPH) including an implementation
called ssdeep. It was at that time referred
to as “fuzzy hashing”. Later, this term converted to “similarity hashing” (most likely due
to sdhash which stands for “similarity digest
hash” (Roussev, 2010)). In 2014, the National
Institute of Standards and Technology (NIST)
developed Special Publication 800-168, which
outlines the definition and technology for these
kinds of algorithms (Breitinger, Guttman, et al.,
2014).
In addition to the prominent aforementioned implementations, there are several others.
MinHash (Broder, 1997) and SimHash (Sadowski
& Levin, 2007) are ideas on how to detect/identify small changes (up to several bytes),
but were not designed to compare hard disk
images with each other. Oliver et al. (2013)
presented an algorithm named TLSH, which is
2
in a similarity score. Each similarity digest is a
collection of Bloom filters (Bloom, 1970).
To create the similarity digest, MRSH-v2 splits
an input into chunks (also known as “subhashes”) of approximately 160 bytes. These
chunks are hashed using FNV (a fast noncryptographic hash function), which is used to
set 5 bits of the Bloom filter. To divide the input
into chunks, it uses a window of 7 bytes, which
slides through the input byte-by-byte. The content of the window is processed and whenever it
hits a certain value (based on a modulus operation), the end of a chunk is identified. Thus, the
actual size of each chunk varies. Each Bloom filter has a specific capacity. Once this has been
reached, any further chunks are inserted into a
new Bloom filter that is appended to the digest. Approximate matching occurs by comparing similarity digests against one another. To
compare two file sets, an all-against-all pairwise
comparison is required.
One way to improve upon the all-against-all
comparison is to use the file-against-set strategy
outlined by Breitinger, Baier, and White (2014).
An alternative strategy that has not yet been
fully evaluated is to use a hierarchical Bloom
filter tree (HBFT), as suggested by Breitinger,
Rathgeb, and Baier (2014). This approach is intended to achieve speed benefits over a pairwise
comparison while supporting the identification
of specific matching files. The primary contribution of this paper is to investigate the factors
that affect the runtime performance of this latter
approach, compared to the pairwise comparisons
required by the original algorithm.
premised on locality sensitivity hashing (LSH).
There are significantly more algorithms, but to
explain all of them would be beyond the scope
of this paper; a good summary is provided by
Harichandran et al. (2016).
While these algorithms have great capabilities,
they suffer one significant drawback, which we
call the “database lookup problem”. In comparison to traditional hash values which can be
sorted and have a lookup complexity of O(1)
(hashmap) or O(log(n)) (binary tree; where n
is the number of entries in the database), looking up a similarity digest usually requires an
all-against-all comparison (O(n2 )) to identify all
matches. To overcome this drawback, Breitinger,
Baier, and White (2014) presented a new idea
that overcomes the lookup complexity (it is approximately O(1)) but at the cost of inaccuracy.
More specifically, the method allows item vs. set
queries, resulting in the answer either being “yes,
the queried item is in the set” or “no, it is not”;
one cannot say against which item it matches.
As a means of addressing these drawbacks,
Breitinger, Rathgeb, and Baier (2014) presented
a further article where they offered a theoretical solution to the lookup problem, based on a
tree of Bloom filters. However, an implementation (and thus a validation) has not been conducted to date. We refer to this as a Hierarchical Bloom Filter Tree (HBFT). The focus of the
present work is the empirical evaluation of this
approach, so as to demonstrate its effectiveness
and to investigate some practical factors that affect its performance.
3.
THE MRSH-V2 ALGORITHM
4.
The work in this paper is intended to improve
upon the performance of the MRSH-v2 algorithm.
Therefore, it is important to firstly outline its
operation in informal terms, which will aid the
discussion later. A more detailed, formal description of the algorithm can be found in the
paper by Breitinger and Baier (2012). The primary goal of MRSH-v2 is to compress any byte
sequence and output a similarity digest. Similarity digests are created in a way that they can
be compared with each other, which will result
HIERARCHICAL BLOOM
FILTER TREES (HBFT)
In a Hierarchical Bloom Filter Tree (HBFT), the
root node of the tree is a Bloom filter that represents the entire collection. A key feature of a
Bloom filter is that it can say only whether an
item is probably contained in it, or definitely not
contained in it. Thus it is possible to give false
positive results, but not false negatives. The
rate of false positives depends on the size of the
Bloom filter and the number of items it contains.
3
Figure 1: Hierarchical Bloom Filter Tree (HBFT) structure using (a) variable-width and (b) fixedwidth Bloom filters.
usually relates to multiple files.
Depending on the design of the tree, a leaf
node may represent multiple files. Thus a search
that reaches a leaf node will still require a pairwise comparison with each file in this subset, using MRSH-v2. However, given that most searches
will reach only a subset of the root nodes, the
number of pairwise comparisons required for
each file is greatly reduced.
The process to check if a file matches a Bloom
filter node is similar to the process of inserting
a file into the tree. However, instead of inserting each hash into the node, its subhashes are
instead checked against the Bloom filter to see
if they are contained in it. If a specific number
of consecutive hashes are contained in the node,
this is considered to be a match. The number of
consecutive hashes is configurable as a parameter named min run. The first experiment in this
paper (discussed in Section 5.2.1) explores the
effects of altering this value.
In constructing a HBFT, memory constraints
will have a strong influence on the design of the
tree. In practical situations, a typical workstation is unlikely (at present) to have access to over
16GiB of main memory. Thus trade-offs in the
design of the tree are likely. Larger Bloom filters have lower false positive rates (assuming the
quantity of data is constant), but lead to shallower trees (thus potentially increasing the number of pairwise comparisons required).
Of the two proposed designs for a HBFT, each
has its own theoretical advantages. One aim of
the ensuing experiments is to identify if any of
these has more influence in practice. Some considerations worthy of note include:
When searching for a file, if a match is found at
the root of the tree, its child nodes can then be
searched. Although this structure is inspired by
a classic binary search tree, a match at a particular node in a HBFT does not indicate whether
the search should continue in the left or right
subtree. Instead, both child nodes need to be
searched, with the search path ending when a
leaf node is reached or a node does not match.
Two forms of tree layout are shown in Figure 1: one uses Bloom filters of different sizes (referred to as a “variable-width” HBFT), whereas
the other uses a single fixed size for each Bloom
filter. For the variable-width tree, each level in
the tree is allocated an equal amount of memory.
Thus each Bloom filter occupies half the memory
of its parent, and also represents a file set that
is half the size of its parent. The expected false
positive rates will be approximately equal at all
levels in the tree. In contrast, a fixed-width tree
uses the same size for every Bloom filter. Thus
each level of the tree occupies twice the space of
the level above.
When a collection is being modelled as a
HBFT, each file is inserted into the Bloom filter at some leaf node in the tree, and also into
its ancestor nodes. The mechanism of inserting a
file into a Bloom filter is the same as for the single Bloom filter approach outlined by Breitinger,
Baier, and White (2014), which is also very similar to the approach taken by the classic MRSH-v2
algorithm outlined in Section 3. The key difference is that instead of creating a similarity digest
of potentially multiple small Bloom filters for an
individual file, each subhash is used to set 5 bits
of the larger Bloom filter within a tree node that
4
5.
• Calculating the union of two Bloom filters
of equal size is trivially performed using a
bitwise-OR operation. Thus a fixed-width
HBFT can be constructed in a bottom-up
manner, whereby each file needs only be inserted into a leaf Bloom filter. Once all files
have been processed, these leaves can be recursively merged to create the parent nodes.
In contrast, a variable-width tree design requires each file to be inserted separately into
an appropriate node at every level in the
tree.
EXPERIMENTS
As part of this work, a number of experiments
were conducted to examine the factors that affect the performance of the HBFT structure. In
each case, a HBFT was used to model the contents of a dataset. Files from another dataset
were then searched for in the tree, and the results reported. Because the speed of execution is
of paramount importance, and because the original MRSH-v2 implementation was written in C,
the HBFT implementation used for these experiments was also written in that language. The
source code has been made available under the
Apache 2.0 licence1 .
The workstation used for the experiments contains a quad-core Intel Core i7 2.67GHz processor, 12GiB of RAM and uses a solid state drive
for storage. The operating system is Ubuntu
Linux 16.04 LTS. The primary constraint this
system imposes on the design of experiments is
that of the memory that is available for storing
the HBFTs. For all experiments, the maximum
amount of memory made available for the HBFT
was 10GiB. The size of the individual Bloom filters within the trees then depended on the number of nodes in the tree (which in turn depends
on the number of leaf nodes).
For each experiment, the number of leaf nodes
(n) is specified in advance, from which the total
number of nodes can be computed (since this is
a complete binary tree). Given the upper total
memory limit (u, in bytes), and that the size of
each Bloom filter (in bytes) should be a power of
two (per Breitinger, Baier, and White (2014)),
it is possible to calculate the maximum possible
size of each Bloom filter.
For a variable-width tree, all levels in the
tree are allocated the same amount of memory.
Therefore the size of the root Bloom filter in
bytes (r) is given by:
• Another consequence of the above observation is that if the HBFT is to be distributed
over multiple computational nodes, this has
consequences for the quantity of data that
must be shared between nodes when building the tree. Instead of sending the hashes
of all files throughout the system, Bloom filters can be shared and locally merged where
necessary. This is outside of the scope of
this paper, but is discussed as future work
in Section 6.
• The memory required at each level of
a fixed-width tree increases exponentially.
This means that for an equal amount of
available memory, a fixed-width tree must
necessarily either be built to be shallower
than the variable-width tree, or make use of
smaller Bloom filters towards the top of the
tree. The latter approach results in a higher
false-positive rate in this part of the tree,
which will likely lead to deeper searches for
files that are not matched with anything in
the corpus. If the size of the leaf nodes is
equal, then the overall false positive rate of
the two trees will be equivalent.
r = 2blog2 (u/(log2 (n)+1))c
For both types of tree, larger Bloom filters result in lower false positive rates at the expense of
a shallower tree (since memory is limited). In a
shallower tree, each leaf node represents a larger
subset of the corpus, which may require a greater
number of pairwise comparisons for each search.
(1)
The size of the other nodes in bytes is then 2rd
where d is the depth of the node in the tree (i.e.
the size of a Bloom filter is half the size of its
parent).
1
5
Available at http://github.com/ishnid/mrsh-hbft
• The win7 dataset is a fresh installation of a
Windows 7 operating system, with default
options selected during installation. It consists of 48,384 files (excluding symbolic links
and zero-byte files) and occupies approximately 10GiB.
For a HBFT with fixed-sized Bloom filters, all
nodes have size equal to that of the root node.
Here, r is given by:
r = 2blog2 (u/(2n−1))c
(2)
The ultimate goal of the experiments is to
demonstrate that the HBFT approach can improve the running time of an investigation
over the all-against-all comparison approach of
MRSH-v2 without suffering a degradation in effectiveness. It achieves this by narrowing the
search space so that each file that is searched for
need only be compared against a subset of the
dataset.
Using a HBFT, the final outcome will be a set
of similarity scores. This score is calculated by
using MRSH-v2 to compare the search file with all
files contained in any leaves that are reached during the search. Therefore, the HBFT approach
will not identify a file as being similar if MRSH-v2
does not also do so.
In these experiments, the similarity scores generated by MRSH-v2 are considered to be ground
truth. Evaluating the degree to which this agrees
with the opinion of a human judge, or how it
compares with other algorithms, is outside the
scope of this paper. The primary difference between the outputs is that the HBFT may fail to
identify files that MRSH-v2 considers to be similar (i.e. false negatives) due to an appropriate
leaf node not being reached.
Therefore the primary metric used, aside from
running time, is recall: the proportion of knownsimilar (or known-identical) files for which the
HBFT search reaches the appropriate leaf node.
5.1
The first two experiments use one or both of
these datasets directly. The final experiment includes some modifications, as outlined in Section 5.2.3.
5.2
Experiment Overview
The following sections present three experiments
that were conducted to evaluate the HBFT approach. Section 5.2.1 compares the t5 dataset
with itself. This is intended to find whether the
HBFT approach is effective in finding identical
files, and to investigate the effect of varying certain parameters when designing and searching a
HBFT. It also aims to demonstrate the extent
to which the number of pairwise comparisons required can be reduced by using this technique.
Section 5.2.2 uses disjoint corpora of different sizes (t5 and win7). In a typical investigation, there may be a large difference between the
size of the collection of search files and a seized
hard disk. This experiment aims to investigate
whether it is preferable to use the tree to model
the smaller or the larger corpus. Additionally, it
examines the performance characteristics of fixed
and variable width HBFTs.
Finally, Section 5.2.3 uses overlapping corpora
where a number of files have been planted on the
disk image. These files are identical to, or similar
to, files in the search corpus. This experiment
demonstrates that using a HBFT is substantially
faster than the pairwise approach.
Datasets
Two datasets were used as the basis for the experiments conducted in this paper:
5.2.1
Experiment 1: t5 vs. t5
For the initial experiment, the HBFT was constructed to represent the t5 corpus. All files
from t5 were also used for searching. Thus every file searched for is also located in the tree
and should be found. Conducting an all-againstall pairwise comparison using MRSH-v2 required a
total of 19,864,849 comparisons, which took 319
seconds.
• The t5 dataset (Roussev, 2011) is frequently
used for approximate matching experimentation. It consists of 4,457 files (approximately 1.8 GiB) taken from US government
websites. It includes plain text files, HTML
pages, PDFs, Microsoft Office documents
and image files.
6
are 000462.text, 001774.html, 003225.html.
These files are 6.5 KiB, 6.6 KiB and 4.5 KiB
in size respectively. Although each chunk is approximately 160 bytes, this is variable depending
on the file content. While these are relatively
small files, they are not the smallest in the corpus. This shows that even when the file is large
enough to contain 8 chunks of the average size,
a min run requirement of 8 successive matches
may still not be possible. Similarly, using 6 as the
min run value results in two files being missed.
The type of HBFT used did not alter these results.
To construct the tree, the smallest number of
leaf nodes was 32. Following this, the number of
leaf nodes was doubled each time (maintaining
a balanced tree). The exception was that after
the experiment with 2,048 leaf nodes, 4,457 leaf
nodes were used for the final run, thereby representing a single file from the corpus in each leaf.
The aims of this experiment were:
1. Evaluate the effectiveness of the HBFT approach for exact matching (i.e. finding identical files) using recall.
2. Identify an appropriate value for MRSH-v2’s
min run parameter.
Table 1: Effect of min run on recall: identical
files.
min run
Recall
3. Investigate the relationship between the size
of the tree and the time taken to build and
search the tree.
4
6
8
4. Investigate the relationship between the size
of the tree and the number of pairwise comparisons that are required to calculate a similarity score.
100%
99.96%
99.93%
It should be acknowledged that if the aim is
solely to identify identical files, then existing
hash-based techniques will take less time and
yield more reliable results. Intuitively, however,
a system that is intended to find similar files
should also find identical files. While the chunk
size of 160 bytes will always fail to match very
small files, it is desirable to find matches when
file sizes are larger.
Figure 2 shows the time taken to build the
tree and search for all files. As the number of
When running the experiment, it became apparent that the first two aims are linked. Table 1 shows the recall associated with three values of min run: 4, 6 and 8. Using a min run
value of 4 resulted in full recall. However, increasing min run to 6 or 8 resulted in a small
number of files being omitted. When min run is
set to 8, three files are not found in the tree.
This indicates the dangers inherent in requiring longer matching runs. The files in question
Figure 2: Effect of varying number of leaf nodes on time taken: t5 vs. t5
7
comparisons required by MRSH-v2. Thus reducing this search space is the primary function of
the tree. Larger trees tend to result in a smaller
number of comparisons. For the largest trees
(with 4,457 leaves), the min run value does not
have a material effect on the number of comparisons required, regardless of whether the tree is
variable-width or fixed-width. This implies that
although searches tend to reach deeper into the
tree (hence the longer running time), they do not
reach substantially more leaves.
From this experiment, it can be concluded that
using a min run value of 4 is desirable in order to
find exact matches. This causes the time taken
to search to be slightly longer, while having a
negligible impact on the number of pairwise comparisons required afterwards. Fixed-width and
variable-width HBFTs exhibit similar characteristics for a corpus of this size
leaf nodes in the tree increases, so too does the
time taken to search the tree. Higher values of
min run use slightly less time, due to the fact
that it is more difficult for a search to descend
to a lower level when more matches are required
to do so. However, as the recall for these higher
values is lower, 4 was used as the min run value
for further experiments.
The times shown here relate only to building
the tree and searching for files within it, and do
not include the time for the pairwise comparisons at the leaves. Therefore, although using
32 leaf nodes results in the shortest search time
(due to the shallower tree), it would require a
most comparisons, as each leaf node represents
1
32 of the entire corpus. As an illustration, using a variable-width tree with 32 leaf nodes and
min run value of 4 requires 8,538,193 pairwise
comparisons after searching the tree. A similar
tree with 4,457 leaves requires 617,860 comparisons.
5.2.2
Experiment 2: t5 vs. win7 and
win7 vs. t5
One issue that is important to note is that
the time required to perform a full pairwise comparison is 319 seconds. However, for the largest
trees, the times for building and searching the
tree are 274 and 309 seconds for a variable and
fixed HBFT respectively. Thus, for a relatively
small collection such as this, the use of the tree
is unlikely to provide benefits in terms of overall
running time.
The second experiment was designed to operate
with larger dataset sizes. In this experiment, t5
was used as a proxy for a set of known-illegal
files, and win7 was used to represent a seized
disk.
The aims of this experiment were:
Figure 3 plots the number of leaf nodes against
the total number of comparisons required to
complete the investigation. As the size of corpora increases, so does the number of pairwise
2. Contrast the performance of variable-width
and fixed-width trees.
1. Investigate whether the HBFT should represent the smaller or larger corpus.
3. Measure the effect on overall running time
Figure 3: Effect of varying number of leaf nodes on number of comparisons: t5 vs. t5
8
Figure 4: Time to search for win7 in a t5 tree.
Figure 5: Time to search for t5 in a win7 tree.
of using a HBFT.
for both types of tree. This is unsurprising in
the context of disjoint corpora. Most files will
not match, so many searches will end at the root
node, or at an otherwise shallow depth.
Figure 5 shows results when the tree models
win7. With only 32 leaf nodes, it is notable that
all four experimental runs take approximately
the same total time, regardless of the type of tree
or the dataset that is chosen for the tree to represent. Due to its size, the build times for the win7
trees are substantially longer than for t5. The
search time exhibits a generally upward trend as
the number of leaf nodes increases: a trend that
is far more pronounced for the fixed-width tree.
This is a consequence of the hardware constraints associated with the setup of the experiment. Because memory footprint is constrained,
a tree with 48,384 leaf nodes will contain Bloom
filters that are much smaller than for trees with
In pursuit of the first objective, the experiment was first run by building a tree to represent t5 and then searching for the files contained
in win7. The number of leaf nodes in this tree
was varied in the same way as in Experiment 1.
Then this was repeated by inserting win7 into a
tree and searching for the files from t5. Again
the number of leaf nodes was doubled every time,
with the exception that the largest tree contained
one leaf node for every file in the collection (i.e.
48,384 leaves). This procedure was followed for
both forms of tree.
The time taken to build and search the trees
are shown in Figures 4 and 5. Figure 4 shows
the results when the tree represents t5, with the
time subdivided into the time spent building the
tree and the time spent searching for all the files
from win7. The total time is relatively consistent
9
fewer nodes. For the variable-width tree representing win7, although its leaf nodes are 8KiB
in size, its root node is 512MiB. In the corresponding fixed-width tree, the Bloom filters are
all 64KiB. The false positive rate associated with
Bloom filters is much higher for smaller Bloom
filters. Thus even where two corpora have no files
in common, searches int he fixed-width tree will
descend deeper due to false positives higher in
the tree, hence increasing the search time. This
is likely to be even more pronounced in corpora
that have a substantial number of similar files.
Therefore, the fixed-width tree in its current design is unlikely to successfully scale to very large
corpora.
Overall, the total time taken is less when the
tree represents the smaller dataset. As with the
first experiment, the total number of pairwise
comparisons decreases as the number of leaves
increases. Table 2 shows the total number of
comparisons that are required when using the
largest number of leaf nodes (i.e. 4,457 when
the tree represents t5 and 48,384 when win7 is
stored in the tree). Both types of tree require
a smaller number of comparisons when the tree
models t5. This, combined with the lower build
and search time suggest that the preferred approach should be to use the smaller corpus to
construct the HBFT.
isons, was 1,094 seconds. In comparison, the
time taken to perform a full pairwise comparison using MRSH-v2 is 2,858 seconds.
5.2.3
The final experiment involved overlapping
datasets, constructed as follows:
• A set of simulated “known-illegal” files:
4,000 files from t5.
• A simulated seized hard disk: the win7 image, plus 140 files from t5, as follows:
– 100 files that are contained within the
4,000 “illegal” files.
– 40 files that themselves are not contained within the “illegal” files, but
that have a high similarity with files in
the corpus, according to MRSH-v2. 10
of these files have a similarity of 80%
or higher, 10 have a similarity between
60% and 79% (inclusive), 10 have a
similarity between 40% and 59% (inclusive) and 10 have a similarity between 20% and 39% (inclusive).
The aims of this third experiment were:
1. Evaluate the time taken to perform a full
search, compared with the all-against-all
pairwise approach of MRSH-v2.
Table 2: Number of pairwise comparisons required for largest trees: t5 vs. win7
Tree
Search
Fixed
Variable
t5
win7
win7
t5
98,260
193,924
Experiment 3: Planted evidence
2. Evaluate the success of the approach in finding the 100 “illegal” files that are included
verbatim in the hard disk image, and the
40 files from the image that are similar to
“illegal” files, according to MRSH-v2.
98,260
101,386
Memory is an additional consideration. Using
a HBFT to model the larger dataset requires the
similarity hashes of all its files to be cached at
the leaves. This requires more memory than for
the smaller collection, thus reducing the amount
of memory available to store the HBFT itself.
Following these observations, the experiment
was repeated once more. A variable-width tree
was used, which modelled t5 with 4,457 leaves.
All files from win7 were then searched for. The
total running time, including pairwise compar-
For the first aim, the primary metric is the
time taken for the entire process to run, comprising the time to build the tree, the time to
search the tree and the time required to conduct
the pairwise comparisons at the leaves. In evaluating the latter aim, recall is used. Here, “recall”
refers to the percentage of the 100 identical files
that are successfully identified, and “similar recall” refers to the percentage of the 40 similar
files that are successfully found. A file is considered to have been found if the search for the file
10
Figure 6: Time to search for planted evidence (including pairwise comparisons).
it is similar or identical to reaches the leaf node
that contains it, yielding a pairwise comparison.
The total running time for MRSH-v2 was 2,592
seconds. The running times of the HBFT approach are shown in Figure 6. Following the
insights gained in the previous experiment, the
smaller collection of 4,000 “illegal” files was used
to construct the tree and then searches were
conducted for all of the files in the larger corpus. The “Search Time” includes the time spent
searching the tree and the time to perform the
comparisons at the leaves.
As expected, for both types of tree the maximum number of leaf nodes resulted in the
fastest run time. This configuration also yielded
the maximum reduction in the number of pairwise comparisons required, without substantially
adding to the time required to build and search
the tree. The remainder of this analysis focuses
on this scenario, where the tree has 4,000 leaf
nodes.
Using a variable-width tree took 1,182 seconds
(a 54% reduction in the time required for an
all-against-all pairwise comparison). The fixedwidth tree took 1,207 seconds (a 53% reduction).
This illustrates that in terms of run-time, the
HBFT approach offers substantial speed gains
over pairwise comparison. Due to the lack of
scalability of the pairwise approach, this difference is likely to be even more pronounced for
larger datasets.
In terms of effectiveness, all 100 files that were
common to the two corpora were successfully
Table 3: Similar recall for Planted Evidence experiment.
MRSH-v2
Files
Files
Similar
similarity
planted found
recall
80%-100%
60%-79%
40%-59%
20%-39%
10
10
10
10
10
10
10
8
100%
100%
100%
80%
Overall
40
38
95%
found in both tree types. The similar recall is
shown in Table 3 and is the same for both types
of tree. All files with a MRSH-v2 similarity of 40%
or greater with a file in the “illegal” set were successfully identified. Two files with a lower similarity (25% and 26%) were not found. This yields
an overall similar recall score of 95% for all 40
files.
This is an encouraging result, indicating that
the HBFT approach is extremely effective at
finding files that are similar above a reasonable
threshold of 40% and exhibits full recall for identical files. Thus it can be concluded that the
HBFT data structure is a viable alternative to
all-against-all comparisons in terms of effectiveness, while achieving substantial speed gains.
6.
CONCLUSIONS AND
FUTURE WORK
This paper aimed to investigate the effectiveness of using a Hierarchical Bloom Filter Tree
11
A number of avenues for future work are apparent:
(HBFT) data structure to improve upon the allagainst-all pairwise comparison approach used
by MRSH-v2. A number of experiments were conducted with the aim of improving the speed of
the process. Additionally, it was important that
files that should be found were not omitted (i.e.
that recall is maintained).
The first experiment found that while HBFTs
with more leaf nodes take longer to build and
search, they reduce the number of pairwise comparisons required by the greatest degree. It
also suggested the use of a min run value of 4,
as higher values resulted in imperfect recall for
identical files.
The results of the second experiment indicated
that when using corpora of different sizes, it is
preferable to build the tree to model the smaller
collection and then search for the files that are
contained the larger corpus. For larger trees,
it was additionally noted that the fixed-width
HBFT did not scale as well as its variable-width
counterpart. This is due to the small size of the
Bloom filters used in the tree as the number of
nodes increases.
For the final experiment, a Windows 7 image
was augmented by the addition of a number of
files that were identical to those being searched
for, and a further group that were similar. The
HBFT approach yielded a recall level of 100% for
the identical files and of 95% for the similar files,
when using mrsh-v2 as ground truth. On examining the two files that were not found, it was
noted that these had a relatively low similarity
to the search files (25% and 26% respectively),
with all files with a higher similarity score being identified successfully. The run time for this
experiment was substantially quicker than an allagainst-all comparison: a 54% time reduction for
a variable-width tree and a 53% reduction for a
fixed-width tree.
These experiments lead to the conclusion that
the HBFT approach is a highly promising technique. Due the poor scalability of the traditional
all-against-all approach, it can be inferred that
this performance improvement will be even more
pronounced as datasets become larger.
Given the promising results of the experiments
presented in this paper, further work is planned.
• Cuckoo filters have been identified as a
promising replacement for Bloom filters for
approximate matching purposes (V. Gupta
& Breitinger, 2015). It is possible that these
could be incorporate into a similar hierarchical tree structure to produce further improvements.
• Currently, when building the tree, files are
allocated to leaf nodes in a round-robin fashion. For trees with multiple files represented at each leaf, it may be possible that a
more optimised allocation mechanism could
be used for this (e.g. to allocate similar files
to the same leaf node).
• The current model also uses balanced trees,
with the result that all successful searches
reach the same depth in the tree. Further investigation may reveal circumstances where
an unbalanced tree is preferable so as to
shorten some more common searches.
• Parallelisation and distribution are highly
likely to yield further performance improvements, and this should be investigated.
• Fixed-width HBFTs do not scale to the
same extent as variable trees, due to the
high false positive rates that are associated
with the small Bloom filters that result from
using large trees with many nodes. Although the experiments presented in this
paper indicate that variable-width HBFTs
are preferable, there may be circumstances
where fixed-width trees may be useful, due
to their theoretical advantages noted in Section 4.
• While these experiments have used MRSH-v2
as the algorithm for calculating the similarities at the leaf nodes, other algorithms
should be considered also (e.g. sdhash).
12
REFERENCES
9. doi: 10.1016/j.cor.2015.11.003
Gupta, V., & Breitinger, F. (2015). How
cuckoo filter can improve existing approximate matching techniques. In J. James &
F. Breitinger (Eds.), Digital forensics and
cyber crime (Vol. 157, p. 39-52). Springer
International Publishing. doi: 10.1007/
978-3-319-25512-5 4
Harichandran, V. S., Breitinger, F., & Baggili, I.
(2016). Bytewise Approximate Matching:
The Good, The Bad, and The Unknown.
The Journal of Digital Forensics, Security
and Law: JDFSL, 11 (2), 59.
James, J. I., & Gladyshev, P. (2015). Automated
Inference of Past Action Instances in Digital Investigations. International Journal of
Information Security, 14 (3), 249–261. doi:
10.1007/s10207-014-0249-6
Kornblum, J. (2006). Identifying Identical Files
Using Context Triggered Piecewise Hashing. Digital investigation, 3 , 91–97. doi:
10.1016/j.diin.2006.06.015
Lillis, D., Becker, B., O’Sullivan, T., & Scanlon,
M. (2016). Current Challenges and Future
Research Areas for Digital Forensic Investigation. In 11th ADFSL Conference on Digital Forensics, Security and Law (CDFSL
2016). Daytona Beach, FL, USA: ADFSL.
doi: 10.13140/RG.2.2.34898.76489
Lillis, D., Breitinger, F., & Scanlon, M.
(2017). Expediting MRSH-v2 Approximate Matching with Hierarchical Bloom
Filter Trees. In 9th EAI International
Conference on Digital Forensics and Cyber Crime (ICDF2C 2017). Prague, Czech
Republic.
Oliver, J., Cheng, C., & Chen, Y. (2013). TLSH–
A Locality Sensitive Hash. In Fourth
Cybercrime and Trustworthy Computing
Workshop (CTC), 2013 (pp. 7–13). doi:
10.1109/CTC.2013.9
Quick, D., & Choo, K.-K. R. (2014). Impacts
of Increasing Volume of Digital Forensic
Data: A Survey and Future Research Challenges. Digital Investigation, 11 (4), 273–
294. doi: 10.1016/j.diin.2014.09.002
Rogers, M. K., Goldman, J., Mislan, R., Wedge,
T., & Debrota, S. (2006). Computer Foren-
Bloom, B. H. (1970). Space/Time Trade-offs in
Hash Coding with Allowable Errors. Communications of the ACM , 13 (7), 422–426.
Breitinger, F., & Baier, H. (2012). Similarity Preserving Hashing: Eligible Properties
and a New Algorithm MRSH-v2. In International conference on digital forensics and
cyber crime (pp. 167–182). Springer.
Breitinger, F., Baier, H., & White, D. (2014). On
the Database Lookup Problem of Approximate Matching. Digital Investigation, 11 ,
S1–S9. doi: 10.1016/j.diin.2014.03.001
Breitinger, F., Guttman, B., McCarrin, M.,
Roussev, V., & White, D. (2014). Approximate Matching: Definition and Terminology. NIST Special Publication, 800 ,
168.
Breitinger, F., Rathgeb, C., & Baier, H. (2014,
sep).
An Efficient Similarity Digests
Database Lookup - A Logarithmic Divide
& Conquer Approach. Journal of Digital
Forensics, Security and Law , 9 (2), 155–
166.
Broder, A. Z. (1997). On the Resemblance
and Containment of Documents. In Compression and complexity of sequences 1997.
proceedings (pp. 21–29). doi: 10.1109/
SEQUEN.1997.666900
Casey, E., Ferraro, M., & Nguyen, L. (2009). Investigation Delayed is Justice Denied: Proposals for Expediting Forensic Examinations of Digital Evidence. Journal of forensic sciences, 54 (6), 1353–1364.
de Braekt, R. I., Le-Khac, N. A., Farina, J.,
Scanlon, M., & Kechadi, T. (2016, April).
Increasing Digital Investigator Availability Through Efficient Workflow Management and Automation. In 4th international symposium on digital forensic and
security (isdfs) (p. 68-73). doi: 10.1109/
ISDFS.2016.7473520
Gupta, J. N., Kalaimannan, E., & Yoo, S.-M.
(2016). A Heuristic for Maximizing Investigation Effectiveness of Digital Forensic Cases Involving Multiple Investigators.
Computers & Operations Research, 69 , 1–
13
Workshop (Vol. 94).
Sadowski, C., & Levin, G. (2007). Simhash:
Hash-based Similarity Detection. Citeseer.
Scanlon, M. (2016, 08). Battling the Digital
Forensic Backlog through Data Deduplication. In Proceedings of the 6th IEEE
International Conference on Innovative
Computing Technologies (INTECH 2016).
Dublin, Ireland: IEEE.
van Baar, R., van Beek, H., & van Eijk, E.
(2014). Digital Forensics as a Service: A
Game Changer. Digital Investigation, 11,
Supplement 1 , S54 - S62. doi: 10.1016/
j.diin.2014.03.007
sics Field Triage Process Model. Journal of
Digital Forensics, Security and Law , 1 (2),
19–38.
Roussev, V. (2010). Data Fingerprinting with
Similarity Digests. In IFIP International
Conference on Digital Forensics (pp. 207–
226). Springer. doi: 10.1007/978-3-642
-15506-2 15
Roussev, V. (2011). An Evaluation of Forensic
Similarity Hashes. Digital Investigation, 8 ,
S34–S41.
Roussev, V., & Richard III, G. G. (2004). Breaking the Performance Wall: The Case for
Distributed Digital Forensics. In Proceedings of the 2004 Digital Forensics Research
14
| 8cs.DS
|
Published as a conference paper at ICLR 2018
C GAN S WITH
P ROJECTION D ISCRIMINATOR
Takeru Miyato1 , Masanori Koyama2
[email protected]
[email protected]
1
Preferred Networks, Inc. 2 Ritsumeikan University
arXiv:1802.05637v1 [cs.LG] 15 Feb 2018
A BSTRACT
We propose a novel, projection based way to incorporate the conditional information into the discriminator of GANs that respects the role of the conditional
information in the underlining probabilistic model. This approach is in contrast
with most frameworks of conditional GANs used in application today, which use
the conditional information by concatenating the (embedded) conditional vector
to the feature vectors. With this modification, we were able to significantly improve the quality of the class conditional image generation on ILSVRC2012 (ImageNet) 1000-class image dataset from the current state-of-the-art result, and we
achieved this with a single pair of a discriminator and a generator. We were
also able to extend the application to super-resolution and succeeded in producing
highly discriminative super-resolution images. This new structure also enabled
high quality category transformation based on parametric functional transformation of conditional batch normalization layers in the generator. The code with
Chainer (Tokui et al., 2015), generated images and pretrained models are available
at https://github.com/pfnet-research/sngan_projection.
1
I NTRODUCTION
Generative Adversarial Networks (GANs) (Goodfellow et al., 2014) are a framework to construct a
generative model that can mimic the target distribution, and in recent years it has given birth to arrays
of state-of-the-art algorithms of generative models on image domain (Radford et al., 2016; Salimans
et al., 2016; Ledig et al., 2017; Zhang et al., 2017; Reed et al., 2016). The most distinctive feature
of GANs is the discriminator D(x) that evaluates the divergence between the current generative
distribution pG (x) and the target distribution q(x) (Goodfellow et al., 2014; Nowozin et al., 2016;
Arjovsky et al., 2017). The algorithm of GANs trains the generator model by iteratively training
the discriminator and generator in turn, with the discriminator acting as an increasingly meticulous
critic of the current generator.
Conditional GANs (cGANs) are a type of GANs that use conditional information (Mirza & Osindero, 2014) for the discriminator and generator, and they have been drawing attention as a promising
tool for class conditional image generation (Odena et al., 2017), the generation of the images from
text (Reed et al., 2016; Zhang et al., 2017), and image to image translation (Kim et al., 2017; Zhu
et al., 2017). Unlike in standard GANs, the discriminator of cGANs discriminates between the generator distribution and the target distribution on the set of the pairs of generated samples x and its
intended conditional variable y. To the authors’ knowledge, most frameworks of discriminators in
cGANs at the time of writing feeds the pair the conditional information y into the discriminator
by naively concatenating (embedded) y to the input or to the feature vector at some middle layer
(Mirza & Osindero, 2014; Denton et al., 2015; Reed et al., 2016; Zhang et al., 2017; Perarnau et al.,
2016; Saito et al., 2017; Dumoulin et al., 2017a; Sricharan et al., 2017). We would like to however,
take into account the structure of the assumed conditional probabilistic models underlined by the
structure of the discriminator, which is a function that measures the information theoretic distance
between the generative distribution and the target distribution.
By construction, any assumption about the form of the distribution would act as a regularization on
the choice of the discriminator. In this paper, we propose a specific form of the discriminator, a form
motivated by a probabilistic model in which the distribution of the conditional variable y given x is
1
Published as a conference paper at ICLR 2018
(a) cGANs,
input concat
(b) cGANs,
hidden concat
(Mirza & Osindero, 2014)
(Reed et al., 2016)
Adversarial
loss
Adversarial
loss
(c) AC-GANs
(d) (ours) Projection
(Odena et al., 2017)
Adversarial Classificaition
loss
loss
0
Adversarial
loss
Inner
product
y
y
Concat
y
Concat
x y
x
x
x
Figure 1: Discriminator models for conditional GANs
(a) Images generated with the projection model. (left) Tibetan terrier and (right) mushroom.
(b) (left) Consecutive category morphing with fixed z. geyser → Tibetan terrier → mushroom → robin. (right)
category morphing from Tibetan terrier to mushroom with different value of fixed z
Figure 2: The generator trained with the projection model can generate diverse set of images. For
more results, see the experiment section and the appendix section.
discrete or uni-modal continuous distributions. This model assumption is in fact common in many
real world applications, including class-conditional image generation and super-resolution.
As we will explain in the next section, adhering to this assumption will give rise to a structure of the
discriminator that requires us to take an inner product between the embedded condition vector y and
the feature vector (Figure 1d). With this modification, we were able to significantly improve the
quality of the class conditional image generation on 1000-class ILSVRC2012 dataset (Russakovsky
et al., 2015) with a single pair of a discriminator and generator (see the generated examples in
Figure 2). Also, when we applied our model of cGANs to a super-resolution task, we were able to
produce high quality super-resolution images that are more discriminative in terms of the accuracy
of the label classifier than the cGANs based on concatenation, as well as the bilinear and the bicubic
method.
2
T HE ARCHITECTURE OF THE C GAN DISCRIMINATOR WITH A
PROBABILISTIC MODEL ASSUMPTIONS
Let us denote the input vector by x and the conditional information by y 1 . We also denote the
cGAN discriminator by D(x, y; θ) := A(f (x, y; θ)), where f is a function of x and y, θ is the
parameters of f , and A is an activation function of the users’ choice. Using q and p to designate
the true distributions and the generator model respectively, the standard adversarial loss for the
1
When y is discrete label information, we can assume that it is encoded as a one-hot vector.
2
Published as a conference paper at ICLR 2018
discriminator is given by:
L(D) = −Eq(y) Eq(x|y) [log(D(x, y))] − Ep(y) Ep(x|y) [log(1 − D(x, y))] ,
(1)
with A in D representing the sigmoid function. By construction, the nature of the ‘critic’ D significantly affects the performance of G. A conventional way of feeding y to D until now has been
to concatenate the vector y to the feature vector x, either at the input layer (Mirza & Osindero,
2014; Denton et al., 2015; Saito et al., 2017), or at some hidden layer (Reed et al., 2016; Zhang
et al., 2017; Perarnau et al., 2016; Dumoulin et al., 2017a; Sricharan et al., 2017) (see Figure 1a and
Figure 1b). We would like to propose an alternative to this approach by observing the form of the
optimal solution (Goodfellow et al., 2014) for the loss function, Eq. (1), can be decomposed into the
sum of two log likelihood ratios:
f ∗ (x, y) = log
q(x|y)q(y)
q(y|x)
q(x)
= log
+ log
:= r(y|x) + r(x).
p(x|y)p(y)
p(y|x)
p(x)
(2)
Now, we can model the log likelihood ratio r(y|x) and r(x) by some parametric functions f1 and
f2 respectively. If we make a standing assumption that p(y|x) and q(y|x) are simple distributions
like those that are Gaussian or discrete log linear on the feature space, then, as we will show, the
parametrization of the following form becomes natural:
f (x, y; θ) := f1 (x, y; θ) + f2 (x; θ) = y T V φ(x; θΦ ) + ψ(φ(x; θΦ ); θΨ ),
(3)
where V is the embedding matrix of y, φ(·, θΦ ) is a vector output function of x, and ψ(·, θΨ ) is
a scalar function of the same φ(x; θΦ ) that appears in f1 (see Figure 1d). The learned parameters
θ = {V, θΦ , θΨ } are to be trained to optimize the adversarial loss. From this point on, we will
refer to this model of the discriminator as projection for short. In the next section, we would like to
elaborate on how we can arrive at this form.
3
M OTIVATION BEHIND THE projection DISCRIMINATOR
In this section, we will begin from specific, often recurring models and show that, with certain
regularity assumption, we can write the optimal solution of the discriminator objective function
in the form of (3). Let us first consider the a case of categorical variable. Assume that y is a
categorical variable taking a value in {1, . . . , C}, which is often common for a class conditional
image generation task. The most popular model for p(y|x) is the following log linear model:
log p(y = c|x) := vcpT φ(x) − log Z(φ(x)),
(4)
P
L
C
pT
where Z(φ(x)) :=
is the partition function, and φ : x 7→ Rd is the
j=1 exp vj φ(x)
input to the final layer of the network model. Now, we assume that the target distribution q can also
be parametrized in this form, with the same choice of φ. This way, the log likelihood ratio would
take the following form;
r(y|x) = log
q(y = c|x)
= (vcq − vcp )T φ(x) − (log Z q (φ(x)) − log Z p (φ(x))) .
p(y = c|x)
(5)
If we make the values of (vcq , vcp ) implicit and put vc := (vcq − vcp ), we can write f1 (x, y = c) =
vcT φ(x). Now, if we can put together the normalization constant − (log Z q (φ(x)) − log Z p (φ(x)))
and r(x) into one expression ψ(φ(x)), we can rewrite the equation above as
f (x, y) := y T V φ(x) + ψ(φ(x)).
(6)
by using y to denote a one-hot vector of the label y and using V to denote the matrix consisting
of the row vectors vc . Most notably, this formulation introduces the label information via an inner
product, as opposed to concatenation. The form (6) is indeed the form we proposed in (3).
We can also arrive at the form (3) for unimodal continuous distributions p(y|x) as well. Let
y ∈ Rd be a d-dimensional continuous variable, and let us assume that conditional q(y|x)
and p(y|x) are both given by Gaussian distributions, so that q(y|x) = N (y|µq (x), Λ−1
q ) and
3
Published as a conference paper at ICLR 2018
q
p
p(y|x) = N (y|µp (x), Λ−1
p ) where µq (x) := W φ(x) and µp (x) := W φ(x). Then the log
density ratio r(y|x) = log(q(y|x)/p(y|x)) is given by:
s
!
|Λq | exp(−(1/2)(y − µq (x))T Λq (y − µq (x)))
r(y|x) = log
(7)
|Λp | exp(−(1/2)(y − µp (x))T Λp (y − µp (x)))
1
= − y T (Λq − Λp ) y + y T (Λq W q − Λp W p )φ(x) + ψ(φ(x)),
2
(8)
where ψ(φ(x)) represents the terms independent of y. Now, if we assume that Λq = Λp := Λ, we
can ignore the quadratic term. If we further express Λq W q − Λp W p in the form V , we can arrive
at the form (3) again.
Indeed, however, the way that this regularization affects the training of the generator G is a little unclear in its formulation. As we have repeatedly explained, our discriminator measures the divergence
between the generator distribution p and the target distribution q on the assumption that p(y|x) and
q(y|x) are relatively simple, and it is highly possible that we are gaining stability in the training
process by imposing a regularity condition on the divergence measure. Meanwhile, however, the
actual p(y|x) can only be implicitly derived from p(x, y) in computation, and can possibly take
numerous forms other than the ones we have considered here. We must admit that there is a room
here for an important theoretical work to be done in order to assess the relationship between the
choice of the function space for the discriminator and training process of the generator.
4
C OMPARISON WITH OTHER METHODS
As described above, (3) is a form that is true for frequently occurring situations. In contrast, incorporation of the conditional information by concatenation is rather arbitrary and can possibly include
into the pool of candidate functions some sets of functions for which it is difficult to find a logical
basis. Indeed, if the situation calls for multimodal p(y|x), it might be smart not to use the model
that we suggest here. Otherwise, however, we expect our model to perform better; in general, it is
preferable to use a discriminator that respects the presumed form of the probabilistic model.
Still another way to incorporate the conditional information into the training procedure is to directly
manipulate the loss function. The algorithm of AC-GANs (Odena et al., 2017) use a discriminator
(D1 ) that shares a part of its structure with the classifier(D2 ), and incorporates the label information
into the objective function by augmenting the original discriminator objective with the likelihood
score of the classifier on both the generated and training dataset (see Figure 1c). Plug and Play
Generative models (PPGNs) (Nguyen et al., 2017) is another approach for the generative model that
uses an auxiliary classifier function. It is a method that endeavors to make samples from p(x|y)
using an MCMC sampler based on the Langevin equation with drift terms consisting of the gradient
of an autoencoder prior p(x) and a pretrained auxiliary classifier p(y|x). With these method, one
can generate a high quality image. However, these ways of using auxiliary classifier may unwittingly
encourage the generator to produce images that are particularly easy for the auxiliary classifier to
classify, and deviate the final p(x|y) from the true q(x|y). In fact, Odena et al. (2017) reports
that this problem has a tendency to exacerbate with increasing number of labels. We were able to
reproduce this phenomena in our experiments; when we implemented their algorithm on a dataset
with 1000 class categories, the final trained model was able to generate only one image for most
classes. Nguyen et al.’s PPGNs is also likely to suffer from the same problem because they are using
an order of magnitude greater coefficient for the term corresponding to p(y|x) than for the other
terms in the Langevin equation.
5
E XPERIMENTS
In order to evaluate the effectiveness of our newly proposed architecture for the discriminator,
we conducted two sets of experiments: class conditional image generation and super-resolution
on ILSVRC2012 (ImageNet) dataset (Russakovsky et al., 2015). For both tasks, we used the
ResNet (He et al., 2016b) based discriminator and the generator used in Gulrajani et al. (2017),
and applied spectral normalization (Miyato et al., 2018) to the all of the weights of the discriminator
to regularize the Lipschitz constant. For the objective function, we used the following hinge version
4
Published as a conference paper at ICLR 2018
of the standard adversarial loss (1) (Lim & Ye, 2017; Tran et al., 2017)
h
h
ii
L(Ĝ, D) = Eq(y) Eq(x|y) [max(0, 1 − D(x, y)] + Eq(y) Ep(z) max(0, 1 + D Ĝ(z, y), y)
,
h
h
ii
L(G, D̂) = −Eq(y) Ep(z) D̂(G(z, y), y)) ,
(9)
where the last activation function A of D is identity function. p(z) is standard Gaussian distribution
and G(z, y) is the generator network. For all experiments, we used Adam optimizer (Kingma & Ba,
2015) with hyper-parameters set to α = 0.0002, β1 = 0, β2 = 0.9. We updated the discriminator
five times per each update of the generator. We will use concat to designate the models (Figure 1b)2 ,
and use projection to designate the proposed model (Figure 1d) .
5.1
C LASS -C ONDITIONAL I MAGE G ENERATION
The ImageNet dataset used in the experiment of class conditional image generation consisted of
1,000 image classes of approximately 1,300 pictures each. We compressed each images to 128×128
pixels. Unlike for AC-GANs3 we used a single pair of a ResNet-based generator and a discriminator.
Also, we used conditional batch normalization (Dumoulin et al., 2017b; de Vries et al., 2017) for
the generator. As for the architecture of the generator network used in the experiment, please see
Figure 14 for more detail. Our proposed projection model discriminator is equipped with a ‘projection layer’ that takes inner product between the embedded one-hot vector y and the intermediate
output (Figure 14a). As for the structure of the the concat model discriminator to be compared
against, we used the identical bulk architecture as the projection model discriminator, except that we
removed the projection layer from the structure and concatenated the spatially replicated embedded
conditional vector y to the output of third ResBlock. We also experimented with AC-GANs as the
current state of the art model. For AC-GANs, we placed the softmax layer classifier to the same
structure shared by concat and projection. For each method, we updated the generator 450K times,
and applied linear decay for the learning rate after 400K iterations so that the rate would be 0 at the
end. For the comparative experiments, we trained the model for 450K iterations, which was ample
for the training of concat to stabilize. AC-GANs collapsed prematurely before the completion of
450K iterations, so we reported the result from the peak of its performance ( 80K iterations). For all
experiments throughout, we used the training over 450K iterations for comparing the performances.
On a separate note, our method continued to improve even after 450K. We therefore also reported
the inception score and FID of the extended training (850K iterations) for our method exclusively.
See the table 1 for the exact figures.
We used inception score (Salimans et al., 2016) for the evaluation of the visual appearance of the
generated images. It is in general difficult to evaluate how ‘good’ the generative model is. Indeed,
however, either subjective or objective, some definite measures of ‘goodness’ exists, and essential two of them are ‘diversity’ and the sheer visual quality of the images. One possible candidate
for quantitative measure of diversity and visual appearance is FID (Heusel et al., 2017). We computed FID between the generated images and dataset images within each class, and designated the
values as intra FIDs. More precisely, FID (Heusel et al., 2017) measures the 2-Wasserstein distance between the two distributions qy and py , and is given by F (qy , py ) = kµqy − µpy k22 +
trace Cqy + Cpy − 2(Cqy Cpy )1/2 , where {µqy , Cqy }, {µpy , Cpy } are respectively the mean and
the covariance of the final feature vectors produced by the inception model (Szegedy et al., 2015)
from the true samples and generated samples of class y. When the set of generated examples have
collapsed modes, the trace of Cpy becomes small and the trace term itself becomes large. In order
to compute Cqy we used all samples in the training data belonging to the class of concern, and used
5000 generated samples for the computation of Cpy . We empirically observed in our experiments
that intra FID is, to a certain extent, serving its purpose well in measuring the diversity and the visual
quality.
To highlight the effectiveness of our inner-product based approach (projection) of introducing the
conditional information into the model, we compared our method against the state of the art ACGANs as well as the conventional incorporation of the conditional information via concatenation
2
in the preliminary experiments of the image geneation task on CIFAR-10 (Torralba et al., 2008) and
CIFAR-100 (Torralba et al., 2008), we confirmed that hidden concatenation is better than input concatenation
in terms of the inception scores. For more details, please see Table 3 in the appendix section.
3
For AC-GANs, the authors prepared a pair of discriminator and generator for each set classes of size 10.
5
Published as a conference paper at ICLR 2018
35
500
Projection
Concat
20
Projection
25
300
200
100
0
15
10
0.0
400
Projection
inception score
30
1.0
2.0 3.0
iteration
0 100 200 300 400 500
Concat
600
500
400
300
200
100
0
0 100 200 300 400 500 600
ACGANs
4.04.5
1e5
(a) concat vs projection
(b) AC-GANs vs projection
Figure 3:
Learning curves of Figure 4: Comparison of intra FID scores for projection
cGANs with concat and projection concat, and AC-GANs on ImageNet. Each dot corresponds
to a class.
on ImageNet.
Table 1: Inception score and intra FIDs on ImageNet.
Method
Inception Score
Intra FID
AC-GANs
concat
projection
28.5±.20
21.1±.35
29.7±.61
260.0
141.2
103.1
*projection (850K iteration)
36.8±.44
92.4
at hidden layer (concat). As we can see in the training curves Figure 3, projection outperforms
inception score than concat throughout the training. Table 1 compares the intra class FIDs and the
inception Score of the images generated by each method. The result shown here for the AC-GANs is
that of the model at its prime in terms of the inception score, because the training collapsed at the end.
We see that the images generated by projection have lower intra FID scores than both adversaries,
indicating that the Wasserstein distance between the generative distribution by projection to the
target distribution is smaller. For the record, our model performed better than other models on the
CIFAR10 and CIFAR 100 as well (See Appendix A).
Figure 10a and 10b shows the set of classes for which (a) projection yielded results with better
intra FIDs than the concat and (b) the reverse. From the top, the figures are listed in descending
order of the ratio between the intra FID score between the two methods. Note that when the concat
outperforms projection it only wins by a slight margin, whereas the projection outperforms concat
by large margin in the opposite case. A quick glance on the cases in which the concat outperforms
the projection suggests that the FID is in fact measuring the visual quality, because both sets looks
similar to the human eyes in terms of appearance. Figure 5 shows an arbitrarily selected set of
results yielded by AC-GANs from variety of zs. We can clearly observe the mode-collapse on this
batch. This is indeed a tendency reported by the inventors themselves (Odena et al., 2017). ACGANs can generate easily recognizable (i.e classifiable) images, but at the cost of losing diversity
and hence at the cost of constructing a generative distribution that is significantly different from the
target distribution as a whole. We can also assess the low FID score of projection from different
perspective. By construction, the trace term of intra FID measures the degree of diversity within the
class. Thus, our result on the intra FID scores also indicates that that our projection is doing better
in reproducing the diversity of the original. The GANs with the concat discriminator also suffered
from mode-collapse for some classes (see Figure 6). For the set of images generated by projection,
we were not able to detect any notable mode-collapse.
Figure 7a shows the samples generated with the projection model for the classes on which the
cGAN achieved lowest intra FID scores (that is the classes on which the generative distribution
were particularly close to target conditional distribution), and Figure 7b the reverse. While most
of the images listed in Figure 7a are of relatively high quality, we still observe some degree of
mode-collapse. Note that the images in the classes with high FID are featuring complex objects
like human; that is, one can expect the diversity within the class to be wide. However, we note that
we did not use the most complicated neural network available for the experiments presented on this
paper, because we prioritized the completion of the training within a reasonable time frame. It is
very possible that, by increasing the complexity of the model, we will be able to further improve the
6
Published as a conference paper at ICLR 2018
Figure 5: comparison of the images generated by (a) AC-GANs and (b) projection.
Figure 6: Collapsed images on the concat model.
visual quality of the images and the diversity of the distribution. In Appendix ??, we list images of
numerous classes generated by cGANs trained with our projection model.
Category Morphing With our new architecture, we were also able to successfully perform category morphism. When there are classes y1 and y2 , we can create an interpolated generator by
simply mixing the parameters of conditional batch normalization layers of the conditional generator
corresponding to these two classes. Figure 8 shows the output of the interpolated generator with
the same z. Interestingly, the combination is also yielding meaningful images when y1 and y2 are
significantly different.
Fine-tuning with the pretrained model on the ILSVRC2012 classification task. As we mentioned in Section 4, the authors of Plug and Play Generative model (PPGNs) (Nguyen et al., 2017)
were able to improve the visual appearance of the model by augmenting the cost function with that
of the label classifier. We also followed their footstep and augmented the original generator loss with
an additional auxiliary classifier loss. As warned earlier regarding this type of approach, however,
this type of modification tends to only improve the visual performance of the images that are easy
for the pretrained model to classify. In fact, as we can see in Appendix B, we were able to improve
the visual appearance the images with the augmentation, but at the cost of diversity.
5.2
S UPER - RESOLUTION
We also evaluated the effectiveness of (3) in its application to the super-resolution task. Put formally,
the super-resolution task is to infer the high resolution RGB image of dimension x ∈ RRH ×RH ×3
from the low resolution RGB image of dimension y ∈ RRL ×RL ×3 ; RH > RL . This task is very
much the case that we presumed in our model construction, because p(y|x) is most likely unimodal
even if p(x|y) is multimodal. For the super-resolution task, we used the following formulation for
discriminator function:
X
f (x, y; θ) =
(yijk Fijk (φ(x; θΦ ))) + ψ(φ(x; θΦ ); θΨ ),
(10)
i,j,k
where F (φ(x; θΦ )) = V ∗ φ(x; θΦ ) where V is a convolutional kernel and ∗ stands for convolution
operator. Please see Figure 15 in the appendix section for the actual network architectures we used
7
Published as a conference paper at ICLR 2018
(a) Generated images on the class with ‘low’ FID scores.
(b) generated images on the class with ‘high’ FID scores.
Figure 7: 128×128 pixel images generated by the projection method for the classes with (a) bottom five FID scores and (b) top five FID scores. The string and the value above each panel are
respectively the name of the corresponding class and the FID score. The second row in each panel
corresponds to the original dataset.
for this task. For this set of experiments, we constructed the concat model by removing the module in
the projection model containing the the inner product layer and the accompanying convolution layer
altogether, and simply concatenated y to the output of the ResBlock preceding the inner product
module in the original. As for the resolutions of the image datasets, we chose RH = 128 and RL =
32, and created the low resolution images by applying bilinear downsampling on high resolution
images. We updated the generators 150K times for all methods, and applied linear decay for the
learning rate after 100K iterations so that the final learning rate was 0 at 150K-th iteration.
Figure 9 shows the result of our super-resolution. The bicubic super-resolution is very blurry, and
concat result is suffering from excessively sharp and rough edges. On the other hand, the edges
of the images generated by our projection method are much clearer and smoother, and the image
itself is much more faithful to the original high resolution images. In order to qualitatively compare
the performances of the models, we checked MS-SSIM (Wang et al., 2003) and the classification
accuracy of the inception model on the generated images using the validation set of the ILSVRC2012
dataset. As we can see in Table 2, our projection model was able to achieve high inception accuracy
and high MS-SSIM when compared to bicubic and concat. Note that the performance of superresolution with concat model even falls behind those of the bilinear and bicubic super-resolutions
8
Published as a conference paper at ICLR 2018
Figure 8: Category morphing. More results are in the appendix section.
Figure 9: 32x32 to 128x128 super-resolution by different methods
in terms of the inception accuracy. Also, we used projection model to generate multiple batches of
images with different random values of z to be fed to the generator and computed the average of the
logits of the inception model on these batches (MC samples). We then used the so-computed average
logits to make prediction of the labels. With an ensemble over 10 seeds (10 MC in Table 2), we were
able to improve the inception accuracy even further. This result indicates that our GANs are learning
the super-resolution as an distribution, as opposed to deterministic function. Also, the success with
the ensemble also suggests a room for a new way to improve the accuracy of classification task on
low resolution images.
9
Published as a conference paper at ICLR 2018
Table 2: Inception accuracy and MS-SSIM on different super-resolution methods. We picked up
dataset images from the validation set.
6
Method
biliear
bicubic
concat
projection
projection (10 MC)
Inception Acc.(%)
MS-SSIM
23.1
0.835
31.4
0.859
11.0
0.829
35.2
0.878
36.4
-
C ONCLUSION
Any specification on the form of the discriminator imposes a regularity condition for the choice for
the generator distribution and the target distribution. In this research, we proposed a model for the
discriminator of cGANs that is motivated by a commonly occurring family of probabilistic models.
This simple modification was able to significantly improve the performance of the trained generator
on conditional image generation task and super-resolution task. The result presented in this paper is
strongly suggestive of the importance of the choice of the form of the discriminator and the design
of the distributional metric. We plan to extend this approach to other applications of cGANs, such
as semantic segmentation tasks and image to image translation tasks.
ACKNOWLEDGMENTS
We would like to thank the members of Preferred Networks, Inc., especially Richard Calland, Sosuke
Kobayashi and Crissman Loomis, for helpful comments. We would also like to thank Shoichiro
Yamaguchi, a graduate student of Kyoto University, for helpful comments.
10
Published as a conference paper at ICLR 2018
(a) Images better with projection than concat.
(b) Images better with concat than projection.
Figure 10: Comparison of concat vs. projection. The value attached above each panel represents
the achieved FID score.
11
Published as a conference paper at ICLR 2018
R EFERENCES
Martin Arjovsky, Soumith Chintala, and Léon Bottou. Wasserstein generative adversarial networks. In ICML,
pp. 214–223, 2017.
Harm de Vries, Florian Strub, Jérémie Mary, Hugo Larochelle, Olivier Pietquin, and Aaron C Courville. Modulating early visual processing by language. In NIPS, pp. 6576–6586, 2017.
Emily Denton, Soumith Chintala, Arthur Szlam, and Rob Fergus. Deep generative image models using a
laplacian pyramid of adversarial networks. In NIPS, pp. 1486–1494, 2015.
Vincent Dumoulin, Ishmael Belghazi, Ben Poole, Alex Lamb, Martin Arjovsky, Olivier Mastropietro, and
Aaron Courville. Adversarially learned inference. In ICLR, 2017a.
Vincent Dumoulin, Jonathon Shlens, and Manjunath Kudlur. A learned representation for artistic style. In
ICLR, 2017b.
Ian Goodfellow, Jean Pouget-Abadie, Mehdi Mirza, Bing Xu, David Warde-Farley, Sherjil Ozair, Aaron
Courville, and Yoshua Bengio. Generative adversarial nets. In NIPS, pp. 2672–2680, 2014.
Ishaan Gulrajani, Faruk Ahmed, Martin Arjovsky, Vincent Dumoulin, and Aaron Courville. Improved training
of wasserstein GANs. arXiv preprint arXiv:1704.00028, 2017.
Kaiming He, Xiangyu Zhang, Shaoqing Ren, and Jian Sun. Deep residual learning for image recognition. In
CVPR, 2016a.
Kaiming He, Xiangyu Zhang, Shaoqing Ren, and Jian Sun. Identity mappings in deep residual networks. In
European Conference on Computer Vision, pp. 630–645. Springer, 2016b.
Martin Heusel, Hubert Ramsauer, Thomas Unterthiner, Bernhard Nessler, Günter Klambauer, and Sepp
Hochreiter. Gans trained by a two time-scale update rule converge to a nash equilibrium. arXiv preprint
arXiv:1706.08500, 2017.
Taeksoo Kim, Moonsu Cha, Hyunsoo Kim, Jungkwon Lee, and Jiwon Kim. Learning to discover cross-domain
relations with generative adversarial networks. In ICML, pp. 1857–1865, 2017.
Diederik Kingma and Jimmy Ba. Adam: A method for stochastic optimization. In ICLR, 2015.
Christian Ledig, Lucas Theis, Ferenc Huszár, Jose Caballero, Andrew Cunningham, Alejandro Acosta, Andrew
Aitken, Alykhan Tejani, Johannes Totz, Zehan Wang, and Wenzhe Shi. Photo-realistic single image superresolution using a generative adversarial network. In CVPR, 2017.
Jae Hyun Lim and Jong Chul Ye. Geometric GAN. arXiv preprint arXiv:1705.02894, 2017.
Mehdi Mirza and Simon Osindero. Conditional generative adversarial nets. arXiv preprint arXiv:1411.1784,
2014.
Takeru Miyato, Toshiki Kataoka, Masanori Koyama, and Yuichi Yoshida. Spectral normalization for generative
adversarial networks. In ICLR, 2018.
Anh Nguyen, Jeff Clune, Yoshua Bengio, Alexey Dosovitskiy, and Jason Yosinski. Plug & play generative
networks: Conditional iterative generation of images in latent space. In CVPR, 2017.
Sebastian Nowozin, Botond Cseke, and Ryota Tomioka. f-GAN: Training generative neural samplers using
variational divergence minimization. In NIPS, pp. 271–279, 2016.
Augustus Odena, Christopher Olah, and Jonathon Shlens. Conditional image synthesis with auxiliary classifier
GANs. In ICML, pp. 2642–2651, 2017.
Guim Perarnau, Joost van de Weijer, Bogdan Raducanu, and Jose M Álvarez. Invertible conditional gans for
image editing. In NIPS Workshop on Adversarial Training, 2016.
Alec Radford, Luke Metz, and Soumith Chintala. Unsupervised representation learning with deep convolutional
generative adversarial networks. In ICLR, 2016.
Scott Reed, Zeynep Akata, Xinchen Yan, Lajanugen Logeswaran, Bernt Schiele, and Honglak Lee. Generative
adversarial text to image synthesis. In ICML, pp. 1060–1069, 2016.
Olga Russakovsky, Jia Deng, Hao Su, Jonathan Krause, Sanjeev Satheesh, Sean Ma, Zhiheng Huang, Andrej
Karpathy, Aditya Khosla, Michael Bernstein, Alexander C. Berg, and Li Fei-Fei. ImageNet Large Scale
Visual Recognition Challenge. International Journal of Computer Vision (IJCV), 115(3):211–252, 2015.
doi: 10.1007/s11263-015-0816-y.
Masaki Saito, Eiichi Matsumoto, and Shunta Saito. Temporal generative adversarial nets with singular value
clipping. In ICCV, 2017.
Tim Salimans, Ian Goodfellow, Wojciech Zaremba, Vicki Cheung, Alec Radford, and Xi Chen. Improved
techniques for training GANs. In NIPS, pp. 2226–2234, 2016.
Kumar Sricharan, Raja Bala, Matthew Shreve, Hui Ding, Kumar Saketh, and Jin Sun. Semi-supervised conditional GANs. arXiv preprint arXiv:1708.05789, 2017.
Christian Szegedy, Wei Liu, Yangqing Jia, Pierre Sermanet, Scott Reed, Dragomir Anguelov, Dumitru Erhan,
Vincent Vanhoucke, and Andrew Rabinovich. Going deeper with convolutions. In CVPR, pp. 1–9, 2015.
Seiya Tokui, Kenta Oono, Shohei Hido, and Justin Clayton. Chainer: a next-generation open source framework
for deep learning. In Proceedings of workshop on machine learning systems (LearningSys) in the twentyninth annual conference on neural information processing systems (NIPS), 2015.
Antonio Torralba, Rob Fergus, and William T Freeman. 80 million tiny images: A large data set for nonparametric object and scene recognition. IEEE transactions on pattern analysis and machine intelligence, 30
(11):1958–1970, 2008.
12
Published as a conference paper at ICLR 2018
Dustin Tran, Rajesh Ranganath, and David M Blei. Deep and hierarchical implicit models. arXiv preprint
arXiv:1702.08896, 2017.
Zhou Wang, Eero P Simoncelli, and Alan C Bovik. Multiscale structural similarity for image quality assessment. In Asilomar Conference on Signals, Systems and Computers, pp. 1398–1402, 2003.
Han Zhang, Tao Xu, Hongsheng Li, Shaoting Zhang, Xiaolei Huang, Xiaogang Wang, and Dimitris Metaxas.
Stackgan: Text to photo-realistic image synthesis with stacked generative adversarial networks. In ICCV,
2017.
Jun-Yan Zhu, Taesung Park, Phillip Isola, and Alexei A Efros. Unpaired image-to-image translation using
cycle-consistent adversarial networks. In ICCV, 2017.
13
Published as a conference paper at ICLR 2018
A
R ESULTS OF CLASS CONDITIONAL IMAGE GENERATION ON CIFAR-10
AND CIFAR-100
As a preliminary experiment, we compared the performance of conditional image generation on
CIFAR-10 and CIFAR-100 3. For the discriminator and the generator, we reused the same architecture used in Miyato et al. (2018) for the task on CIFAR-10. For the adversarial objective functions,
we used (9), and trained both machine learners with the same optimizer with same hyper parameters
we used in Section 5. For our projection model, we added the projection layer to the discriminator in
the same way we did in the ImageNet experiment (before the last linear layer). Our projection model
achieved better performance than other methods on both CIFAR-10 and CIFAR-100. Concatenation
at hidden layer (hidden concat) was performed on the output of second ResBlock of the discriminator. We tested hidden concat as a comparative method in our main experiments on ImageNet,
because the concatenation at hidden layer performed better than the concatenation at the input layer
(input concat) when the number of classes was large (CIFAR-100).
To explore how the hyper-parameters affect the performance of our proposed architecture, we conducted hyper-parameter search on CIFAR-100 about the Adam hyper-parameters (learning rate α
and 1st order momentum β1 ) for both our proposed architecture and the baselines. Namely, we
varied each one of these parameters while keeping the other constant, and reported the inception
scores for all methods including several versions of concat architectures to compare. We tested with
concat module introduced at (a) input layer, (b) hidden layer, and at (c) output layer. As we can see
in Figure 11, our projection architecture excelled over all other architectures for all choice of the
parameters, and achieved the inception score of 9.53. Meanwhile, concat architectures were able
to achieve all 8.82 at most. The best concat model in term of the inception score on CIFAR-100
was the hidden concat with α = 0.0002 and β1 = 0, which turns out to be the very choice of the
parameters we picked for our ImageNet experiment.
Table 3: The performance of class conditional image generation on CIFAR-10 (C10) and CIFAR100 (C100).
Method
Inception score
C10
C100
C10
FID
C100
(Real data)
11.24
14.79
7.60
8.94
8.22
8.25
8.14
8.62
8.80
7.93
8.82
9.04
19.7
19.2
19.2
17.5
25.4
31.4
24.8
23.2
10
9
8
7
6
5
4
3
2
1
0.0001
Inception score
Inception score
AC-GAN
input concat
hidden concat
(ours) projection
Projection
Input concat
Hidden concat
Output concat
AC-GANs
0.0002
0.0005
(a) Varying α (fixing β1 = 0)
10
9
8
7
6
5
4
3
2
1
Projection
Input concat
Hidden concat
Output concat
AC-GANs
0.0
0.5
1
0.9
(b) Varying β1 (fixing α = 0.0002)
Figure 11: Inception scores on CIFAR-100 with different discriminator models varying hyperparameters (α and β1 ) of Adam optimizer.
14
Published as a conference paper at ICLR 2018
Figure 12: Effect of the finetuning with auxiliary classifier loss. Same coordinate in panel (a) and
(b) corresponds to same value of z
Table 4: Inception score and intra FIDs on ImageNet with a pretrained model on classification tasks
for ILSVRC2012 dataset. ‡Nguyen et al. (2017)
Method
Inception Score
Intra FID
‡
47.4
210
N/A
54.2
PPGNs
projection(finetuned)
B
O BJECTIVE FUNCTION WITH AN AUXILIARY CLASSIFIER COST
In this experiment, we followed the footsteps of Plug and Play Generative model (PPGNs) (Nguyen
et al., 2017) and augmented the original generator loss with an additional auxiliary classifier loss. In
particular, we used the losses given by :
h
h
ii
L G, D̂, p̂pre (y|x) = −Eq(y) Ep(z) D̂(G(z, y), y) − LC (p̂pre (y|G(z, y))) ,
(11)
where p̂pre (y|x) is the fixed model pretrained for ILSVRC2012 classification task. For the actual
experiment, we trained the generator with the original adversarial loss for the first 400K updates,
and used the augmented loss for the last 50K updates. For the learning rate hyper parameter, we
adopted the same values as other experiments we described above. For the pretrained classifier,
we used ResNet50 model used in He et al. (2016a). Figure 12 compares the results generated by
vanilla objective function and the results generated by the augmented objective function. As we
can see in Table 4, we were able to significantly outperform PPGNs in terms of inception score.
However, note that the images generated here are images that are easy to classify. The method
with auxiliary classifier loss seems effective in improving the visual appearance, but not in training
faithful generative model.
15
Published as a conference paper at ICLR 2018
C
M ODEL A RCHITECTURES
BN
Conv 3x3
ReLU
ReLU
Conv 3x3
Conv 3x3
BN
ReLU
ReLU
Conv 3x3
(a) ResBlock architecture for the
discriminator. Spectral normalization (Miyato et al., 2018) was
applied to each conv layer.
(b) ResBlock for the generator.
Figure 13: Architecture of the ResBlocks used in all experiments. For the generator generator’s
Resblock, conditional batch normalization layer (Dumoulin et al., 2017b; de Vries et al., 2017) was
used in place of the standard batch normalization layer. For the ResBlock in the generator for the
super resolution tasks that implements the upsampling, the random vector z was fed to the model by
concatenating the vector to the embedded low resolution image vector y prior to the first convolution
layer within the block. For the procedure of downsampling and upsampling, we followed the implementation by Gulrajani et al. (2017). For the discriminator, we performed downsampling (average
pool) after the second conv of the ResBlock. For the generator, we performed upsampling before
the first conv of the ResBlock. For the ResBlock that is performing the downsampling, we replaced
the identity mapping with 1x1 conv layer followed by downsampling to balance the dimension. We
did the essentially same for the Resblock that is performing the upsampling, except that we applied
the upsampling before the 1x1 conv.
16
Published as a conference paper at ICLR 2018
Linear
z
Inner product
Linear, 1024x4x4
Global sum pooling
Embed
ResBlock, Up, 1024
ReLU
y
ResBlock, Up, 512
ResBlock, 1024
ResBlock, Up, 256
ResBlock, Down, 1024
ResBlock, Up, 128
ResBlock, Down, 512
ResBlock, Up, 64
ResBlock, Down, 256
BN, ReLU, Conv 3x3
ResBlock, Down, 128
Tanh
ResBlock, Down, 64
x
x
(b) Generator
(a) Discriminator
Figure 14: The models we used for the conditional image generation task.
17
y
Published as a conference paper at ICLR 2018
y
Linear
Global sum pooling
ReLU
ResBlock, 256
ResBlock, 1024
ResBlock, 256
ResBlock, Down, 1024
ResBlock, 256
ResBlock, Down, 512
ResBlock, 256
ResBlock, Down, 128
ResBlock, Up, 128
Inner product
ResBlock, Down, 256
ResBlock, 128
Conv 3x3
y
ResBlock, 128
ResBlock, Up, 64
ResBlock,64
ResBlock, Down, 128
BN, ReLU, Conv 3x3
ResBlock, 64
Tanh
ResBlock, Down, 64
x
x
(b) Generator
(a) Discriminator
Figure 15: The models we used for the super resolution task.
18
z
z’
Published as a conference paper at ICLR 2018
D
R ESULTS OF C ATEGORY M ORPHING
(a) to Persian cat
(b) to Electric locomotive
(c) to Alp
(d) to Castle
(e) to Chiffonier
Figure 16: Dog (Lhasa apso) to different categories
19
Published as a conference paper at ICLR 2018
(a) Hip to Yellow lady’s slipper
(b) Pirate ship to Yawl
(c) Yurt to Castle
(d) Chiffonier to Chinese cabinet
(e) Valley to Sandbar
Figure 17: Morphing between different categories
20
Published as a conference paper at ICLR 2018
E
M ORE R ESULTS WITH SUPER - RESOLUTION
Figure 18: 32x32 to 128x128 super-resolution results
21
| 1cs.CV
|
Estimating Mixture Entropy with Pairwise Distances
Artemy Kolchinsky
1,∗
and Brendan D. Tracey
1,2,†
1
arXiv:1706.02419v3 [cs.IT] 8 Nov 2017
2
Santa Fe Institute
Massachusetts Institute of Technology
∗
[email protected]
†
[email protected]
Mixture distributions arise in many parametric and non-parametric settings, for example in
Gaussian mixture models and in non-parametric estimation. It is often necessary to compute
the entropy of a mixture, but in most cases this quantity has no closed-form expression,
making some form of approximation necessary. We propose a family of estimators based on
a pairwise distance function between mixture components, and show that this estimator class
has many attractive properties. For many distributions of interest, the proposed estimators
are efficient to compute, differentiable in the mixture parameters, and become exact when the
mixture components are clustered. We prove this family includes lower and upper bounds
on the mixture entropy. The Chernoff α-divergence gives a lower bound when chosen as
the distance function, with the Bhattacharyaa distance providing the tightest lower bound
for components that are symmetric and members of a location family. The Kullback-Leibler
divergence gives an upper bound when used as the distance function. We provide closed-form
expressions of these bounds for mixtures of Gaussians, and discuss their applications to the
estimation of mutual information. We then demonstrate that our bounds are significantly
tighter than well-known existing bounds using numeric simulations. This pairwise estimator
class is very useful in optimization problems involving maximization/minimization of entropy
and mutual information, such as MaxEnt and rate distortion problems.
I.
INTRODUCTION
A mixture distribution is a probability distribution whose density function is a weighted sum of
individual densities. Mixture distributions are a common choice for modeling probability distributions, in both parametric settings, for example learning a mixture of Gaussians statistical model,
and non-parametric settings, such as kernel density estimation.
It is often necessary to compute the differential entropy [6] of a mixture distribution, which is
a measure of the inherent uncertainty in the outcome of X. Entropy estimation arises in image
retrieval tasks [10], image alignment and error correction [33], speech recognition [3, 14], analysis
of debris spread in rocket launch failures [2], and many other settings. Entropy also arises in
optimization contexts [28–30, 33], where it is minimized or maximized under some constraints (e.g.,
MaxEnt problems). Finally, entropy also plays a central role in minimization or maximization of
mutual information, such as in problems related to rate distortion [20].
Unfortunately, in most cases, the entropy of a mixture distribution has no known closed-form
expression. This is true even when the entropy of each component distribution does have a known
closed-form expression. For instance, the entropy of a Gaussian has a well-known form, while the
entropy of a mixture of Gaussians does not. As a result, the problem of finding a tractable and
accurate estimate for mixture entropy has been described as “a problem of considerable current
interest and practical significance” [35].
One way to approximate the entropy is with Monte Carlo (MC) sampling. MC sampling provides an unbiased estimate of mixture entropy, and this estimate can become arbitrarily accurate
by increasing the number of MC samples. Unfortunately, MC sampling is very computationally
intensive as for each sample, the (log) probability of the sample location must be computed under
every component in the mixture. MC sampling typically requires a large number of samples to
2
estimate entropy, especially in high-dimensions. Sampling is thus typically impractical, especially
for optimization problems where for every parameter change a new entropy estimate is required.
An alternative to Monte Carlo sampling is to use an analytic estimator of mixture entropy.
Analytic estimators have estimation bias, but are much more computationally efficient. There are
several existing analytic estimators of entropy, discussed in-depth below. To summarize, however,
commonly-used estimators have significant drawbacks: they have large bias relative to the true
entropy, and/or they are invariant to the amount of “overlap” between mixture components. For
example, many estimators do not depend on the locations of the means in a Gaussian mixture
model.
In this paper, we introduce a novel family of estimators for the mixture entropy. Each member of
this family is defined via a pairwise-distance function between component densities. The estimators
in this family have several attractive properties. They are computationally efficient, as long as the
pairwise-distance function and the entropy of each component distribution are easy to compute.
The estimation bias of any member of this family is bounded by a constant. The estimator is
continuous and smooth and is therefore useful for optimization problems. In addition, we show that
the Chernoff α-divergence (i.e., a scaled Rényi divergence), used as a pairwise-distance function,
gives a lower-bound on the mixture entropy; in particular, the Bhattacharrya distance (α = 0.5)
provides the tightest lower bound of all Chernoff α-divergences when the mixture components are
symmetric and belong to a location family (such as a mixture of Gaussians with equal covariances).
We also show the Kullback-Leibler [KL] divergence, when used as a pairwise-distance function,
gives an upper-bound on the mixture entropy. Finally, our family of estimators can compute the
exact mixture entropy when the component distributions are grouped into well-separated clusters,
a property not shared by other analytic estimators of entropy. In particular, the bounds mentioned
above converge to the same value for well-separated clusters.
A layout of the paper is as follows. We first review mixture distributions and entropy estimation
in Section II. We then present the pairwise distance estimator in Section III, prove bounds on
the error of any estimator in this class, and show distance functions that bound the entropy as
discussed above. In Section IV, we consider the special case of mixtures of Gaussians, and give
explicit expressions for lower and upper bounds on the mixture entropy. When all the Gaussian
components have the same covariance matrix, we show that these bounds have particularly simple
expressions. Then in Section V, we consider the closely related problem of estimating the mutual
information between two random variables, and show that our estimators and bounds can be directly
used to estimate the mutual information. Specializing to the Gaussian case, we show how this can
be used to bound the mutual information across a type of Additive White Noise Gaussian channel.
Finally, in Section VI, we run numerical experiments and compare the performance of our lower
and upper bounds relative to existing estimators. We consider both mixtures of Gaussians and
mixtures of uniform distributions.
II.
BACKGROUND AND DEFINITIONS
We consider the differential entropy, defined as
Z
H(X) := −
pX (x) ln pX (x) dx ,
3
of the mixture distribution pX ,
pX (x) =
N
X
ci pi (x) ,
i=1
where ci indicates the weight of component i (ci ≥ 0,
of component i.
P
i ci
= 1) and pi is the probability density
We can treat the set of component weights as a discrete random variable C with outcomes 1..N ,
where Pr(C = i) = ci . Consider the mixed joint distribution of the discrete random variable C and
the continuous random variable X,
pX,C (x, i) = pi (x)ci ,
and observe that the common identities for conditional and joint entropy still apply [21],
H (X, C) = H (X|C) + H (C) = H (C|X) + H (X)
where we use H for discrete and differential entropy interchangeably. Here the conditional entropies
are
Z
X
pi (x)ci
dx .
H(X|C) =
ci H(pi )
and
H(C|X) = pi (x)ci log
pX (x)
i
Using elementary results from information theory [6], H(X) can be bounded from below by
H(X) ≥ H(X|C) ,
(1)
since conditioning can only decrease entropy. Similarly, H(X) can be bounded from above by
H(X) ≤ H(X, C) = H(X|C) + H(C) ,
(2)
following from H(X) = H(X, C) − H(C|X) and the non-negativity of the conditional discrete
entropy H(C|X). This upper bound on the mixture entropy was previously proposed by Huber et
al. [16].
It is easy to see that the bound in Eq. (1) is tight when all the components have the same
distribution, since then H(pX ) = H(pi ) for all i. The bound in Eq. (2) becomes tight when
H(C|X) = 0, i.e., when any sample from pX uniquely determines the component identity C. This
occurs when the different mixture components have non-overlapping supports, pi (x) > 0 =⇒
pj (x) = 0 for all x and i 6= j. More generally, the bound of Eq. (2) becomes increasingly tight as
the mixture distributions move farther apart from one another.
Assuming that H(pi ), the entropy of each individual component density, has a simple closed
form expression, the bounds in Eq. (1) and Eq. (2) can be computed quickly. However, neither
bound depends on the “overlap” between components. For instance, in a Gaussian mixture model
these bounds are invariant to changes in the component means. The bounds are thus unsuitable for
many problems; for instance, in optimization one typically tunes parameters to adjust component
means, but the above entropy bounds remain the same for regardless of mean location.
There are two other estimators of the mixture entropy that should be mentioned. The first
estimator is based on kernel density estimation [11, 19]. It estimates the entropy using the average
4
probability of the component means, µi ,
ĤKDE (X) := −
X
ci ln
X
i
cj pj (µi ) .
(3)
j
The second estimator is a lower bound that is derived using Jensen’s inequality, −E [ln f (X)] ≥
− ln [E(f (X))], giving
Z X
X
X
X Z
H(X) := −
pi (x)pj (x) dx =: ĤELK . (4)
ci pi (x) ln
cj pj (x) dx ≥ −
ci ln
cj
i
j
i
j
R
In the literature, the term pi (x)pj (x) dx has been referred to as the “Cross Information Potential”
[26, 34] and the “Expected Likelihood Kernel” [17, 18] [ELK] (we use this second acronym to label
this estimator). When the component distributions are Gaussian, pi (x) := N (x; µi , Σi ), the ELK
has a simple closed-form expression, giving the lower bound
X
X
ci ln
cj N (µi ; µj , Σi + Σj ) .
(5)
H(X) ≥ −
i
j
This lower bound was previously proposed for Gaussian mixtures in [16]. Both of the estimators
in Eq. (3) and Eq. (5) are computationally efficient, continuous and differentiable, and depend on
component overlap, making them suitable for optimization. However, as will be shown via numerical
experiments (Section VI), they exhibit significant underestimation bias. However, we will also show
that for Gaussian mixtures with equal covariance, Eq. (3) plus an additive constant is actually an
estimator in our proposed class.
III.
ESTIMATORS BASED ON PAIRWISE-DISTANCES
A.
Overview
Let D(pi kpj ) be some (generalized) distance function between probability densities pi and pj .
Formally, we assume that D is a premetric, meaning that it is non-negative and D(pi kpj ) = 0 if
pi = pj . We do not assume that D is symmetric, nor that it obeys the triangle inequality, nor that
it is strictly greater than 0 when pi 6= pj .
For any allowable distance function D, we propose the following entropy estimator:
X
X
ĤD (X) := H(X|C) −
ci ln
cj exp(−D(pi kpj )) .
i
(6)
j
This estimator can be efficiently computed if the entropy of each component and D(pi kpj ) for all
i, j have simple closed-form expressions. There are many distribution-distance function pairs that
satisfy these conditions (e.g., Kullback-Leibler divergence, Renyi divergences, Bregman divergences,
f-divergences, etc. for Gaussian, uniform, exponential, etc.) [1, 4, 5, 7, 9].
It is straightforward to show that for any D, ĤD falls between the bounds of Eq. (1) and Eq. (2),
H(X|C) ≤ ĤD (X) ≤ H(X, C) .
(7)
5
To do so, consider the “smallest” and “largest” allowable distance functions,
(
0 if pi = pj
Dmin (pi kpj ) = 0
and
Dmax (Xi kXj ) =
∞ otherwise
(8)
For any D and pi , pj , Dmin (pi kpj ) ≤ D(pi kpj ) ≤ Dmax (pi kpj ), thus
ĤDmin (X) ≤ ĤD (X) ≤ ĤDmax (X)
P
Plugging Dmin into Eq. (6) (noting that j cj = 1) gives ĤDmin (X) = H(X|C), while plugging
Dmax into Eq. (6) gives
X
X
X
ĤDmax = H (X|C) −
ci ln ci +
cj e−Dmax (Xi kXj ) ≤ H (X|C) −
ci ln ci = H(X, C)
i
i
j6=i
These two inequalities yield Eq. (7). The true entropy, as shown in Section II, also obeys H (X|C) ≤
H (X) ≤ H (X, C). The magnitude of the bias of ĤD is thus bounded by
ĤD (X) − H(X) ≤ H (X, C) − H (X|C) = H(C) .
In the next two subsections, we improve upon the bounds suggested in Eq. (1) and Eq. (2), by
examining bounds induced by particular distance functions.
B.
Lower Bound
Consider the “Chernoff α-divergence” [7, 22] for some real-valued α, defined as
Z
Cα (pkq) := − ln pα (x)q 1−α (x) dx .
(9)
Note that Cα (pkq) = (1 − α)Rα (pkq), where Rα is Rényi divergence of order α [32].
We show that for any α ∈ [0, 1], ĤCα (X) is a lower bound on the entropy (for α ∈
/ [0, 1], Cα is
not a valid distance function, see the Appendix). To do so, note that
H(X) = H(X|C) + M I(X; C)
(10)
where M I is mutual information. Using a derivation from [12], we bound M I from below,
Z X
pX (x)
dx
M I(X; C) = −
ci pi (x) ln
pi (x)
i
!
P
Z X
Z X
1−α
c
p
(x)
j
j
pX (x)
j
=−
ci pi (x) ln
dx
ci pi (x) ln
αP
1−α dx −
p
(x)
c
p
(x)
pi (x)1−α
i
j j j
i
i
!
P
Z X
1−α
(a)
j cj pj (x)
≥−
ci pi (x) ln
dx
1−α
p
(x)
i
i
Z
X
X
(b)
≥−
ci ln pi (x)α
cj pj (x)1−α dx
i
j
6
=−
X
i
ci ln
X
cj e−Cα (Xi kXj ) .
(11)
j
The inequalities (a) and (b) follow from Jensen’s inequality. This inequality is used directly in (b),
while in (a) it follows from
Z X
Z X
pX (x)
pX (x)
dx
≥
−
ln
ci pi (x)
−
ci pi (x) ln
P
α
1−α
αP
1−α dx
p
(x)
c
p
(x)
p
(x)
c
p
(x)
j
j
j
j
i
i
j
j
i
i
Z X
pX (x)
= − ln
ci pi (x)1−α P
1−α dx
j cj pj (x)
i
X Z
= − ln
ci pX (x) dx = 0
i
Combining gives
H(X) ≥ ĤCα (X) .
This shows that using Cα as a distance function gives a lower bound on the mixture entropy for
any α ∈ [0, 1]. For a general mixture distribution, one could optimize over the value of α to find
the tightest lower bound. We can show that the tightest bound is achieved α = 0.5 in the special
case when all of the mixture components pi are symmetric and come from a location family,
pi (x) = b(x − µi ) = b(µi − x)
Examples of this situation include mixtures of Gaussians with the same covariance (“homoscedastic”
mixtures), multivariate t-distributions with the same covariance, location-shifted bounded uniform
distributions, most kernels used in kernel density estimation, etc.
To show that α = 0.5 is optimal, first define the Chernoff α-coefficient as
Z
cα (pi kpj ) := pi (x)α pj (x)1−α dx .
(Hence, the Chernoff α-divergence is the negative logarithm of the Chernoff α-coefficient.) We show
that for any pair pi , pj of symmetric distributions from a location family, cα (pj kpj ) is minimized by
α = 0.5. This means that all pairwise distances Cα are maximized by α = 0.5, and therefore the
entropy estimator HCα (Eq. (6)) is maximized by α = 0.5.
Define a change of variables
y := µi + µj − x ,
which gives x − µi = µj − y and x − µj = µi − y. This allows us to write the Chernoff α-coefficient
as
Z
cα (pi kpj ) = pi (x)α pj (x)1−α dx
Z
= b(x − µi )α b(x − µj )1−α dx
Z
(a)
= b(µj − y)α b(µi − y)1−α dy
Z
(b)
= b(y − µj )α b(y − µi )1−α dy
7
=c1−α (pi kpj )
where in (a) we’ve substituted variables, and in (b) we used the assumption that b(x) = b(−x).
Since cα (pi kpj ) = c1−α (pi kpj ), cα is symmetric in α about α = 0.5. In the Appendix, we show that
cα (pkq) is everywhere convex in α. Together, this means that cα (pi kpj ) must achieve a minimum
value at α = 0.5. This value of α is a special case of the Chernoff α-coefficient, known as the
Bhattacharyya coefficient, with the corresponding Bhattacharyya distance [8] defined as,
Z p
BD(pkq) := − ln
p(x)q(x)dx = C0.5 (pkq)
Since any Chernoff α-divergence is a lower bound for the entropy, we write the particular case of
Bhattacharyya-distance lower bound as
X
X
H(X) ≥ ĤBD (X) := H(X|C) −
ci ln
cj e−BD(pi kpj ) .
(12)
i
C.
j
Upper bound
The Kullback-Leibler [KL] divergence [6], defined as
Z
p(x)
KL(pkq) := p(x) ln
dx ,
q(x)
provides an upper bound for the estimate of mixture entropy. We show this as follows:
X
X
H(X) = −
ci Epi ln
cj pj (x)
i
(a)
≤−
X
=−
ci ln
X
i
j
X
ci ln
X
i
=
j
X
cj eEpi [ln pj (x)]
cj e−H(pi kpj )
j
ci H(Xi ) −
X
i
ci ln
X
i
cj e−KL(pi kpj )
j
where we use H(·k·) to indicate the cross-entropy function, and employ the identity H(pi kpj ) =
H(pi ) + KL(pi kpj ). The inequality in step (a) uses a variational lower bound on the expectation of
a log-sum [14, 24],
X
X
E ln
Zj ≥ ln
exp (E [ln Zj ]) .
j
j
Combining gives the upper bound
H(X) ≤ ĤKL := H(X|C) −
X
i
ci ln
X
j
cj e−KL(pi kpj ) .
(13)
8
D.
Exact estimation in the “clustered” case
In the previous sections, we described lower and upper bounds on the mixture entropy in the
general case. In this section, we show that in the special case when the mixture components are
“clustered” into well-separated groups, these lower and upper bounds become equal, and so the
pairwise-distance estimate of the entropy is tight. By “clustered”, we mean that there is a grouping
of component distributions such that distributions in the same group are approximately the same,
while distributions assigned to different groups are very different from one another. Though this
situation may seem like an edge case, clustered distributions do arise in mixture estimation, e.g.,
when there are repeated data points, and we have encountered it as solutions to informationtheoretic optimization problems [20]. Note that the number of groups is arbitrary, and therefore
this situation includes the extreme cases of a single group (all component distributions are nearly
the same) as well as N different groups (all component distributions are very different).
Formally, let the function g(i) indicate the group of component i. We define that the components
are “clustered” with respect to grouping g iff KL(pi kpj ) ≤ κ whenever g(i) = g(j) forP
some small κ,
and BD(pi kpj ) ≥ β whenever g(i) 6= g(j) some large β. We use the notation pG (k) = i δ(g(i), k)ci
to indicate the sum of the weights of the components in group k.
We show that when κ is small and β is large, both ĤCα for α ∈ (0, 1] and ĤKL approach
X
H(X|C) −
pG (k) ln pG (k) .
k
Since one is a lower bound and one is an upper bound on the true entropy, the estimators become
exact as they converge in value.
Recall that BD = C0.5 . For α ∈ (0, 1], α−1 Cα (pkq) is a monotonically decreasing function for
α ∈ (0, 1] [27], meaning that Cα ≥ 2αBD(pkq) for α ∈ (0, 0.5]. In addition, (1 − α)−1 Cα (pkq) is a
monotonically increasing function for α > 0 [27], thus Cα ≥ 2(1 − α)BD(pkq) for α ∈ [0.5, 1]. Using
the assumption that BD(pi kpj ) ≥ β and combining gives the bound
Cα (pkq) ≥ (1 − |1 − α|)β
for α ∈ (0, 1], leading to
ĤCα (X) := H(X|C) −
X
ci ln
X
i
≥ H(X|C) −
X
≥ H(X|C) −
X
cj exp(−Cα (pi kpj ))
j
X
X
ci ln
δ(g(i), g(j))ci +
(1 − δ(g(i), g(j)))cj exp(−Cα (pi kpj ))
i
j
j
pG (k) ln [pG (k) + (1 − pG (k)) exp(−(1 − |1 − α|)β)] .
k
In the second line, for i, j in the same group, we’ve used that Cα (pi kpj ) ≥ 0.
For the upper bound ĤKL , we use that KL(pi kpj ) ≤ κ for i and j in the same group, and
otherwise exp(−KL(pi kpj )) ≥ 0. This gives the bound
X
X
ĤKL (X) := H(X|C) −
ci ln
cj exp(−KL(pi kpj ))
i
j
X
X
X
≤ H(X|C) −
ci ln
δ(g(i), g(j))ci e−κ +
(1 − δ(g(i), g(j)))cj exp(−KL(pi kpj ))
i
j
j
9
≤ H(X|C) −
X
pG (k) ln pG (k)e−κ
k
The difference between the bounds is bounded by
ĤKL (X) − ĤCα (X) ≤ κ +
X
≤κ+
X
k
(1 − pG (k)) exp(−(1 − |1 − α|)β)
pG (k) ln 1 +
pG (k)
pG (k)
k
(1 − pG (k)) exp(−(1 − |1 − α|)β)
pG (k)
= κ + (|G| − 1) exp(−(1 − |1 − α|)β)
where |G| is the number of groups. Thus, the difference decreases at least linearly in κ and exponentially in β. This shows that in the clustered case, when κ ≈ 0 and β is very large, our lower
and upper bounds become exact.
It also shows that any distance measure bounded between BD and KL also gives an exact
estimate of entropy in the clustered case. Furthermore, the idea behind this proof can be extended
to estimators induced by other bounding distance function, beyond BD and KL, so as to show that
a particular estimator converges to an exact entropy estimate in the clustered case. Note, however,
that for some distribution-distance pairs the components will never be considered as “clustered”;
e.g., the α-Chernoff distance for α = 0 between any two Gaussians is 0, and so a Gaussian mixture
distributions will never be considered clustered according to this distance.
IV.
GAUSSIAN MIXTURES
Gaussians are very frequently used as components in a mixture distributions. Our family of
estimators is well-suited to estimating the entropies of Gaussian mixtures, since the entropy of a
d-dimensional Gaussian Xi ∼ N (µi , Σi ) has a simple closed-form expression,
H (Xi ) =
1
[ln |Σi | + d ln 2π + d] ,
2
(14)
and because there are many distance functions between Gaussians with closed-form expressions
(KL divergence, the Chernoffα-divergences, Wasserstein distance, etc.). In this section, we consider
Gaussian mixtures and state explicit expression for the lower and upper bounds derived in the
previous section. We also consider these bounds in the special case where all Gaussian components
have the same covariance matrix (homoscedastic mixtures).
We first consider the lower bound, ĤCα , based on the Chernoff α-divergence distance function.
For two multivariate Gaussians p1 ∼ N (µ1 , Σ1 ) and p2 ∼ N (µ2 , Σ2 ), this distance is defined as
[13, Eq. 6]
(1 − α) α
1
|(1 − α)Σ1 + αΣ2 |
−1
T
Cα (p1 kp2 ) =
(µ1 − µ2 ) ((1 − α)Σ1 + αΣ2 ) (µ1 − µ2 ) + ln
.
2
2
|Σ1 |1−α |Σ2 |α
(15)
(As a warning, note that most sources show erroneous expressions for the Chernoff and/or Rényi
α-divergence between two multivariate Gaussians including [25, p. 33], [15, Eq. 2.5], [22, Eq. 25],
[9], [23, Eq. 36], and even a late draft of this manuscript.)
For the upper bound HKL , the KL divergence between two multivariate Gaussians p1 ∼
10
N (µ1 , Σ1 ) and p2 ∼ N (µ2 , Σ2 ) is
i
1h
−1
KL(p1 kp2 ) =
ln |Σ2 | − ln |Σ1 | + (µ1 − µ2 )T Σ−1
(µ
−
µ
)
+
tr
Σ
Σ
−
d
.
1
1
2
2
j
2
(16)
The appropriate lower and upper bounds can be computed by plugging in Eq. (15) and Section IV
into Eq. (6).
These bounds have simple forms when all of the mixture components have equal covariance
matrices, i.e., Σi = Σ for all i. First, define a transformation in which each Gaussian component pj
is mapped to a different Gaussian p̃j,α , which has the same mean but where the covariance matrix
1
is rescaled by α(1−α)
,
pj := N (µj , Σ)
7→
p̃j,α
:= N µj ,
1
Σ .
α(1 − α)
Then, the lower bound of Eq. (11) can be written as
ĤCα =
X
X
d d
+ ln (α(1 − α)) −
ci ln
cj p̃j,α (µi ) .
2 2
i
j
This is derived by combining the expressions for Cα , Eq. (15), the entropy of a Gaussian, Eq. (14),
and the Gaussian density function. For a homoscedastic mixture, the tightest lower bound among
the Chernoff α-divergences is given by α = 0.5, corresponding to the Bhattacharyya distance,
ĤBD =
X
d d 1 X
+ ln −
ci ln
cj p̃j,0.5 (µi ) .
2 2 4
i
j
(This is derived above in Section III B.)
For the upper bound, when all Gaussians have the same covariance matrix, we again combine
the expressions for KL, Section IV, the entropy of a Gaussian, Eq. (14), and the Gaussian p.d.f. to
give
ĤKL (X) =
X
d X
−
ci ln
cj pj (µi ) .
2
i
j
Note that this is exactly the expression for the kernel density estimator ĤKDE (Eq. (3)), plus a dimensional correction. Thus, surprisingly ĤKDE is a reasonable entropy estimator for homoscedastic
Gaussian mixtures, since it is only an additive constant away from KL-distance based estimator
ĤKL (which has various beneficial properties, as described above). This may explain why ĤKDE
has been used effectively in optimization contexts [28–30, 33], where the additive constant is often
irrelevant, despite lacking a principled justification in terms of being a a bound on entropy.
V.
ESTIMATING MUTUAL INFORMATION
It is often of interest, for example in rate distortion problems and related problems [20], to
calculate the mutual information across a communication channel,
M I(X; U ) = H(X) − H(X|U ),
11
where U is the distribution of signals sent across the channel, and X is the distribution of messages
received on the other end of the channel. As with mixture distributions, it is often easy to compute
H(X|U ), the entropy of the received signal given the sent signal (i.e., the distribution of noise on
the channel). The entropy of the received signals, H(X), on the other hand, is often difficult to
compute.
In some cases, the distribution of U may be well approximated by a mixture model. In this case,
we can estimate the entropy of the received signals, H(X), using our pairwise distance estimators,
as discussed in Section III. In particular, we have the lower bound
X
X
M I(X; U ) ≥ −
ci ln
cj exp(−Cα (pi kpj )),
i
j
and the upper bound,
M I(X; U ) ≤ −
X
i
ci ln
X
cj exp(−KL(pi kpj )),
j
where pi is the density of component i, and noting that the H(X|U ) terms cancel in the expression.
P
P
This also illuminates that the actual pairwise portion of the estimator, − i wi ln j wj exp(−D(pi kpj ))
is a measure of the mutual information between the random variable specifying the component
and the random variable generated from the mixture distribution. If the components are identical,
this mutual information is zero, since knowing the component tells you nothing about the value of
X. On the other hand, when all of the components are very different from one another, knowing
the component that generated X is very informative, giving the maximum amount of information,
H(C).
As a practical example, consider a scenario in which U is a random variable representing outside temperature on any particular day. This temperature is measured with a thermometer with
Gaussian measurement noise (the “Additive White Noise Gaussian channel”). This gives our measurement distribution
X = U + N 0, Σ0 .
If the actual temperature distribution is (approximately or exactly) distributed as a mixture of M
Gaussians, each one having mixture weight ci , mean µi , and covariance matrix Σi , then X will also
be distributed as a mixture of M Gaussians, each with weight ci , mean µi , and covariance matrix
Σ0j := Σi + Σ0 . We can then use our estimators to estimate the mutual information between actual
temperature, U , and thermometer measurements, X.
VI.
NUMERICAL RESULTS
In this section, we run numerical experiments and compare estimators of mixture entropy under
a variety of conditions. We consider two different types of mixtures, mixtures of Gaussians and
mixtures of uniform distributions, for a variety of parameter values. We evaluate the following
estimators:
1. The true entropy, H(X), as estimated by a Monte-Carlo sampling of the mixture model.
2,000 samples were used for each MC estimate for the mixtures of Gaussians, and 5,000
samples were used for the mixtures of uniform distributions.
2. Our proposed upper-bound, based on the KL divergence, ĤKL (Eq. (13))
12
3. Our proposed lower-bound, based on the Bhattacharyya distance, ĤBD (Eq. (12))
4. The kernel density estimate based on the component means, ĤKDE (Eq. (3))
5. The lower bound based on the “Expected Likelihood Kernel”, ĤELK (Eq. (4))
6. The lower bound based on the conditional entropy, H(X|C) (Eq. (1))
7. The upper bound based on the joint entropy, H(X, C) (Eq. (2)).
We show the values of the estimators 1-5 as line plots, while the region between the conditional (6)
and joint entropy (7) is shown in shaded green. The code for these figures can be found at http://
www.github.com/btracey/mixent, and uses the Gonum numeric library http://www.gonum.org.
A
B
Entropy (nats)
Entropy (nats)
18
15
12
9
18
15
12
9
-2
-1
0
1
0
2
Ln(Mean Spread)
D
18
Entropy (nats)
Entropy (nats)
C
4
6
Ln(Covariance Similarity)
15
12
40
30
Monte Carlo
Pair Dist: KL
Pair Dist: Bhat.
KDE
Exp. Lik. Ker.
[H(X|C), H(X,C)]
20
10
9
0
-2
-1
0
Ln(Cluster Spread)
8
16
24
Dimension
Figure 1: Entropy estimates for a mixture of a 100 Gaussians. In each plot, the vertical axis shows the
entropy of the distribution, and the horizontal axis changes a feature of the components: A) the distance
between means is increased; B) the component covariances become more similar (at the right side of the
plot, all Gaussians have covariance ≈ I); C) the components are grouped into 5 “clusters”, and the distance
between the locations of the clusters is increased; D) the dimension is increased.
A.
Mixture of Gaussians
In the first experiment, we evaluate the estimators on a mixture of randomly placed Gaussians,
and look at their behavior as the distance between the means of the Gaussians increases. The
mixture is composed of 100 10-dimensional Gaussians, each Gaussian Xi ∼ N (µi , I), with means
are sampled from µi ∼N (0, σI). Fig. 1A depicts the change in estimated entropy as the means grow
farther apart, in particular a function of ln(σ). We see that our proposed bounds are the closest
to the true entropy over the whole range, and in the extremes, we see that our proposed bounds
13
approach the exact value of the true entropy. This is as expected, since as σ → 0 all of the Gaussian
mixture components become identical, and as σ → ∞ all of the Gaussian components grow very
far apart, approaching the case where each Gaussian is in its own “cluster”. The ELK lower bound
is a strictly worse estimate than ĤBD , in this experiment. As expected, we also observe that the
KDE estimator differs by exactly d/2 from the KL estimator.
In the second experiment, we evaluate the entropy estimators as the covariance matrices change
from less to more similar. We again generate 100 10-dimensional Gaussians. Each Gaussian is
1
distributed as Xi ∼ N (µi , Σi ), where now µi ∼N (0, I) and Σi ∼ W( d+n
I, n), where W is a
Wishart distribution with n degrees of freedom. Fig. 1B compares the the estimators with the true
entropy as a function of ln(n). When n is small, the Wishart distribution is broad and the covariance
matrices differ significantly from one another, while as n → ∞, all the covariance matrices become
close to the identity I. Thus, for small n, we essentially recover a “clustered” case, in which every
component is in its own cluster and our lower and upper bounds giving highly accurate estimates.
For large n, we converge to the σ = 1 case of the first experiment.
In the third experiment, we again generate a mixture of 100 10-dimensional Gaussians. Now,
however, the Gaussians are grouped into 5 “clusters”, with each Gaussian component randomly
assigned to one of the clusters. We use g(i) ∈ {1..5} to indicate the group of each Gaussian’s
component i ∈ {1..100}, and each of the 100 Gaussians is distributed as Xi ∼ N (µ̃g(i) , I). The
cluster means µ̃k for k ∈ {1..5} are drawn from N (0, σI). The results are depicted in Fig. 1C. In the
first experiment, we saw that the joint entropy H(X, C) became an increasingly better estimator as
the Gaussians grew increasingly far apart. Here, however, we see that there is a significant difference
between H(X, C) and the true entropy, even as the groups become increasingly separated. Our
proposed bounds, on the other hand, provide accurate estimates of the entropy across the entire
parameter sweep. As expected, they become exact in the limits of all clusters being at the same
location, and all clusters being very far apart from each other.
Finally, we evaluate the entropy estimators while changing the dimension of the Gaussian components. We again generate 100 Gaussian components, each distributed as Xi ∼ N (µi , I (d) ), where
I (d) indicates a d × d dimensional identity matrix. We vary the dimensionality d from 1 to 60.
The results are shown in Fig. 1D. First, we see that when d = 1, the KDE estimator and the
KL-divergence based estimator give a very similar prediction (differing only by 0.5) , but as the
dimension increases, the two estimates diverge at a rate of d/2. Similarly, ĤELK grows increasingly less accurate as the dimension increases. Our proposed lower and upper bounds provide good
estimates of the mixture entropy across the whole dimensional sweep.
B.
Mixture of Uniforms
In the second set of experiments, we consider a mixture of uniform distributions. Unlike Gaussians, uniform distributions are bounded within a hyper-rectangle and do not have full support
over the domain. These means that there can be significant regions within which pX (x) > 0, but
pi (x) = 0 for some i.
Here we list the formulae for pairwise distance measure between uniform distributions. In the
following, we use Vi to indicate the “volume” of distribution pi . Uniform components have a constant
p(x) over their support, and so Vi = 1/pi (x) (for all x where pi (x) > 0). Similarly, we use Vi∩j as
the “volume
of overlap” between pi and pj , i.e., the volume of the intersection of the support of pi
R
and pj , x 1{pi (x) > 0}1{pj (x) > 0}dx. The distance measures between uniforms are then
H(pi ) = ln Vi
14
(
ln(Vj /Vi ) supp pi ⊆ supp pj
KL(pi kpj ) =
∞
o.w.
BD(pi ||pj ) = 0.5 ln Vi + 0.5 ln Vj − ln Vi∩j
X
X Vi∩j
ĤELK = −
wi ln
wj
Vi Vj
i
A
j
B
Entropy (nats)
Entropy (nats)
11
10
9
12
9
6
8
7
3
-4
-3
-2
-1
0
1
-2
0
Ln(Mean Spread)
D 15
11
Entropy (nats)
Entropy (nats)
C
2
Ln(Width Variability)
10
9
8
10
Monte Carlo
Pair Dist: KL
Pair Dist: Bhat.
KDE
Exp. Lik. Ker.
[H(X|C), H(X,C)]
5
7
0
-6
-4
-2
Ln(Cluster Spread)
0
5
10
15
Dimension
Figure 2: Entropy estimates for a mixture of a 100 uniform. In each plot, the vertical axis shows the
entropy of the distribution, and the horizontal axis changes a feature of the components: A) the mean
distance is increased; B) the uniform widths become more similar (at the right side of the plot, all
uniforms have width ≈ 2); C) the components are grouped into 5 “clusters”, and the distance between
these clusters is increased; D) the dimension is increased.
Like the Gaussian case, we run four different computational experiments and compare the mixture entropy estimates to the true entropy, as determined by Monte-Carlo sampling.
In the first experiment, the mixture consists of 100 10-dimensional uniform components, with
Xi ∼ U(µi − 1, µi + 1) , and µi ∼N (0, σI). Fig. 2A depicts the change in entropy as the value
of σ increases. For very small σ, the distributions are almost overlapping, while for large σ they
tend very far apart. As expected, the entropy increases with σ. Here, we see that the prediction
of ĤKL is identical to H(X, C), which arises because KL(pi kpj ) is infinite whenever pi has broader
support than pj . Uniform components with equal size and non-equal means must have some region
of non-overlap, and so the KL is infinite between all pairs of components, thus KL is effectively
Dmax (Eq. (8)). In contrast, we see that ĤBD estimates the true entropy quite well. This example
demonstrates that getting an accurate estimate of mixture entropy may require selecting a distance
function that works will with the component distributions. Finally, it turns out that for uniform
components of equal size, ĤELK = ĤBD . This can be seen by moving BD(pi kpj ) out of the
15
exponential, and noting that Vi = Vj when the components have equal size.
In the second experiment, we adjust the size of the uniform components. We again have 100
10-dimensional components, Xi ∼ U(µi − γi , µi + γi ) , where µi ∼N (0, I), and γi ∼ Γ(1 + σ, 1 + σ),
where Γ is the Gamma distribution. Fig. 2B shows the change in entropy as ln σ increases. When
σ is small, the widths have significant spread, while as σ grows the distributions become close to
equally sized. We again see that ĤBD is a good estimator of entropy, outperforming all of the
non-pairwise based estimators. Generally, not all supports will be non-overlapping, so ĤKL will not
necessarily be equal to H(X, C), though we find the two to be numerically quite close. However,
we also find that the difference between the estimates given ĤBD vs. ĤKL provides a tight estimate
of the true entropy.
In the third experiment, we again consider a mixture with clustered components, and evaluate
the entropy estimators as these clusters grow apart. Here, there are 100 components with Xi ∼
U(µg(i) − 1, µg(i) + 1), where g(i) ∈ {1..5} is the identity of the cluster for distribution i, which are
randomly assigned. The cluster centers are generated according to N (0, σI). Fig. 2C shows the
change in entropy as the clusters locations move apart. Note that in this case, the upper bound
ĤKL significantly outperforms H(X, C), unlike the first and second experiment. We again see that
ĤBD provides a relatively accurate lower bound for the true entropy.
In the final experiment, the dimension of the uniform components is varied. There are again 100
components, with Xi ∼ U(µi − 1, µi + 1) , and µi ∼N (0, σI). Fig. 2D shows the change in entropy
as the dimension increases. On the extreme left, the uniforms are univariate, and on the extreme
left the components are 16-dimensional. Interestingly, the low-dimensional case, H(X|C) is a very
close estimate for the true entropy, while in the high-dimensional case the entropy becomes very
close to H(X, C). This is because in the higher dimensional problems there is more space to be far
away from each other. As in the first experiment, ĤKL is equal to H(X; C). Despite this changing
regime, we see that ĤBD gives good estimates of mixture entropy, regardless of dimension.
VII.
DISCUSSION
We have presented a new class of estimators for the entropy of a mixture distribution. We have
shown that any estimator in this class has a bounded estimation bias, and that this class includes
useful lower and upper bounds on the entropy of a mixture. Finally, we show that these bounds
become exact when mixture components are grouped into well-separated clusters.
Our derivation of the bounds make use of some existing results [12, 14]. However, to our
knowledge, these results have not been previously used to estimate mixture entropies. Furthermore,
they have not been compared numerically or analytically to better-known bounds.
We evaluated these estimators using numerical simulations of mixtures of Gaussians as well as
mixtures of bounded (hypercube) uniform distributions. Our results demonstrate that our estimators perform much better than existing well-known estimators.
This estimator class can be especially useful for optimization problems that involve minimization
of entropy or mutual information. If the distance function used in the pairwise estimator class is
continuous and smooth in the parameters of the mixture components, then the entropy estimate is
also continuous and smooth. This enables use within gradient-based optimization techniques, for
example gradient descent, as often used for machine learning problems.
In fact, we have used our upper bound to carry out a non-parametric, nonlinear version of the
“Information Bottleneck” [31]. Specifically, we minimized an upper bound on the mutual information
between input and hidden layer in a neural networks [20]. We found that the optimal distributions
were often clustered (Section III D). That work demonstrated practically the value of having an
accurate, differentiable upper bound on mixture entropy that performs well in the clustered regime.
16
ACKNOWLEDGEMENTS
We thank David H. Wolpert for useful discussions. We would also like to thank the Santa Fe
Institute for helping to support this research. This work was made possible through the support
of AFOSR MURI on multi-information sources of multi-physics systems under Award Number
FA9550-15-1-0038.
AUTHOR CONTRIBUTIONS
AK and BDT designed the method and experiments; BDT performed the experiments; AK and
BDT wrote the paper.
CONFLICTS OF INTEREST
The authors declare no conflict of interest.
Appendix A: Chernoff α-divergence is not a distance function for α ∈
/ [0, 1]
For any pair of densities p and q, consider the Chernoff α-divergence
Z
Cα := − ln pα (x)q 1−α (x) dx = − ln cα
where the quantity cα is called the Chernoff α-coefficient [22]. Taking the second derivative of
cα with respect to α gives
d2
cα =
dα2
Z
α
p (x)q
1−α
p(x)
(x) ln
q(x)
2
dx
Observe that this quantity is everywhere positive, meaning that cα is convex everywhere. For
simplicity, consider the case p 6= q, in which case this function is strictly convex. Because cα is
equal to 1 for α = 0 and α = 1, this means that cα > 1 for α ∈
/ [0, 1]. This in turn means that
the Chernoff α-divergence Cα is strictly negative for α ∈
/ [0, 1]. Thus, Cα is not a valid distance
function for α ∈
/ [0, 1], as defined in Section III.
[1] Arindam Banerjee, Srujana Merugu, Inderjit S Dhillon, and Joydeep Ghosh. Clustering with
bregman divergences. Journal of machine learning research, 6(Oct):1705–1749, 2005.
[2] Francisco M Capristan and Juan J Alonso. Range safety assessment tool (rsat): An analysis
environment for safety assessment of launch and reentry vehicles. In 52nd Aerospace Sciences
Meeting, page 0304, 2014.
[3] Jia-Yu Chen, John R Hershey, Peder A Olsen, and Emmanuel Yashchin. Accelerated monte
carlo for kullback-leibler divergence between gaussian mixture models. In Acoustics, Speech
and Signal Processing, 2008. ICASSP 2008. IEEE International Conference on, pages 4553–
4556. IEEE, 2008.
[4] Andrzej Cichocki and Shun-ichi Amari. Families of alpha-beta-and gamma-divergences: Flexible and robust measures of similarities. Entropy, 12(6):1532–1568, 2010.
17
[5] Andrzej Cichocki, Rafal Zdunek, Anh Huy Phan, and Shun-Ichi Amari. Similarity measures
and generalized divergences. Nonnegative Matrix and Tensor Factorizations: Applications to
Exploratory Multi-Way Data Analysis and Blind Source Separation, pages 81–129, 2009.
[6] Thomas M. Cover and Joy A. Thomas. Elements of information theory. John Wiley & Sons,
2012.
[7] Gavin E Crooks. On Measures of Entropy and Information. Technical Report 009 v0.6, 2017.
[8] Keinosuke Fukunaga. Introduction to statistical pattern recognition. Computer science and
scientific computing. Academic Press, Boston, 2nd ed edition, 1990.
[9] Manuel Gil, Fady Alajaji, and Tamas Linder. Rényi divergence measures for commonly used
univariate continuous distributions. Information Sciences, 249:124–131, 2013.
[10] Jacob Goldberger, Shiri Gordon, Hayit Greenspan, et al. An efficient image similarity measure
based on approximations of kl-divergence between two gaussian mixtures. In ICCV, volume 3,
pages 487–493, 2003.
[11] Peter Hall and Sally C Morton. On the estimation of entropy. Annals of the Institute of
Statistical Mathematics, 45(1):69–88, 1993.
[12] D. Haussler and M. Opper. Mutual information, metric entropy and cumulative relative
entropy risk. Ann Stat, 25(6), 1997.
[13] Alfred O. Hero, Bing Ma, Olivier Michel, and John Gorman. Alpha-Divergence for Classification, Indexing and Retrieval. 2001.
[14] John R. Hershey and Peder A. Olsen. Approximating the Kullback Leibler divergence between
Gaussian mixture models. In 2007 IEEE International Conference on Acoustics, Speech and
Signal Processing-ICASSP’07, volume 4, pages IV–317. IEEE, 2007.
[15] Tomáš Hobza, Domingo Morales, and Leandro Pardo. Rényi statistics for testing equality of
autocorrelation coefficients. Statistical Methodology, 6(4):424–436, July 2009.
[16] Marco F Huber, Tim Bailey, Hugh Durrant-Whyte, and Uwe D Hanebeck. On entropy
approximation for gaussian mixture random vectors. In Multisensor Fusion and Integration
for Intelligent Systems, 2008. MFI 2008. IEEE International Conference on, pages 181–188.
IEEE, 2008.
[17] Tony Jebara and Risi Kondor. Bhattacharyya and expected likelihood kernels. In Learning
theory and kernel machines, pages 57–71. Springer, 2003.
[18] Tony Jebara, Risi Kondor, and Andrew Howard. Probability product kernels. Journal of
Machine Learning Research, 5(Jul):819–844, 2004.
[19] Harry Joe. Estimation of entropy and other functionals of a multivariate density. Annals of
the Institute of Statistical Mathematics, 41(4):683–697, 1989.
[20] Artemy Kolchinsky, Brendan D. Tracey, and David H. Wolpert. Nonlinear Information Bottleneck. arXiv:1705.02436 [cs, math, stat], May 2017. arXiv: 1705.02436.
[21] Chandra Nair, Balaji Prabhakar, and Devavrat Shah. On entropy for mixtures of discrete
and continuous variables. arXiv preprint cs/0607075, 2006.
[22] Frank Nielsen. Chernoff information of exponential families. arXiv preprint arXiv:1102.2684,
2011.
[23] Frank Nielsen. Generalized Bhattacharyya and Chernoff upper bounds on Bayes error using
quasi-arithmetic means. Pattern Recognition Letters, 42:25–34, June 2014.
[24] John Paisley. Two useful bounds for variational inference. Technical report, Technical report,
Department of Computer Science, Princeton University, Princeton, NJ, 2010.
[25] Leandro Pardo. Statistical Inference Based on Divergence Measures. CRC Press, October
2005. Google-Books-ID: ziDGGIkhqlMC.
[26] Jose C Principe, Dongxin Xu, and John Fisher. Information theoretic learning. Unsupervised
adaptive filtering, 1:265–319, 2000.
[27] Igal Sason and Sergio Verdú. f -divergence inequalities. IEEE Transactions on Information
Theory, 62(11):5973–6006, 2016.
[28] Nicol N. Schraudolph. Gradient-based manipulation of nonparametric entropy estimates.
Neural Networks, IEEE Transactions on, 15(4):828–837, 2004.
[29] Nicol Norbert Schraudolph. Optimization of entropy with neural networks. PhD thesis,
Citeseer, 1995.
18
[30] Sarit Shwartz, Michael Zibulevsky, and Yoav Y. Schechner. Fast kernel entropy estimation
and optimization. Signal Processing, 85(5):1045–1058, 2005.
[31] N. Tishby, F. Pereira, and W. Bialek. The information bottleneck method. In 37th Allerton
Conf on Communication, 1999.
[32] Tim Van Erven and Peter Harremos. Rényi divergence and kullback-leibler divergence. IEEE
Transactions on Information Theory, 60(7):3797–3820, 2014.
[33] Paul Viola, Nicol N. Schraudolph, and Terrence J. Sejnowski. Empirical Entropy Manipulation for Real-World Problems. Advances in neural information processing systems, pages
851–857, 1996.
[34] Jian-Wu Xu, António RC Paiva, Il Park, and Jose C Principe. A reproducing kernel hilbert
space framework for information-theoretic learning. IEEE Transactions on Signal Processing,
56(12):5891–5902, 2008.
[35] O Zobay et al. Variational bayesian inference with gaussian-mixture approximations. Electronic Journal of Statistics, 8(1):355–389, 2014.
| 7cs.IT
|
GENERIC MACHINE LEARNING INFERENCE ON HETEROGENOUS TREATMENT
EFFECTS IN RANDOMIZED EXPERIMENTS
arXiv:1712.04802v3 [stat.ML] 23 Feb 2018
V. CHERNOZHUKOV, M. DEMIRER, E. DUFLO, I. FERNANDEZ-VAL
Abstract. We propose strategies to estimate and make inference on key features of heterogeneous effects in randomized experiments. These key features include best linear predictors of the effects using machine learning proxies, average
effects sorted by impact groups, and average characteristics of most and least impacted units. The approach is valid in high
dimensional settings, where the effects are proxied by machine learning methods. We post-process these proxies into
the estimates of the key features. Our approach is generic, it can be used in conjunction with penalized methods, deep
and shallow neural networks, canonical and new random forests, boosted trees, and ensemble methods. Our approach
is agnostic and does not make unrealistic or hard-to-check assumptions; we don’t require conditions for consistency of
the ML methods. Estimation and inference relies on repeated data splitting to avoid overfitting and achieve validity.
For inference, we take medians of p-values and medians of confidence intervals, resulting from many different data
splits, and then adjust their nominal level to guarantee uniform validity. This variational inference method is shown
to be uniformly valid and quantifies the uncertainty coming from both parameter estimation and data splitting. The
inference method could be of substantial independent interest in many machine learning applications. An empirical
application to the impact of micro-credit on economic development illustrates the use of the approach in randomized
experiments. An additional application to the impact of the gender discrimination on wages illustrates the potential use
of the approach in observational studies, where machine learning methods can be used to condition flexibly on very
high-dimensional controls.
Key words: Agnostic Inference, Machine Learning, Confidence Intervals, Causal Effects, Variational P-values and
Confidence Intervals, Uniformly Valid Inference, Quantification of Uncertainty, Sample Splitting, Multiple Splitting,
Assumption-Freeness
1. Introduction
Randomized experiments play an important role in the evaluation of social and economic programs and medical treatments (e.g., [35, 27]). Researchers and policy makers are often interested
in features of the impact of the treatment that go beyond the simple average treatment effects. In
particular, very often, they want to know whether treatment effect depends on basic covariates,
such as gender, age, etc. It is essential to assess if the impact of the program would generalize to
a different population with different characteristics, and for economists, to better understand the
driving mechanism behind a particular program effects.
One issue with reporting treatment effects split by subgroups, however, is that there are often a large number of potential sample splits: choosing subgroups ex-post opens the possibility
Date: December, 2017.
We thank Susan Athey, Moshe Buchinsky, Denis Chetverikov, Siyi Luo, Max Kasy, Susan Murphy, Whitney Newey,
and seminar participants at UCLA and AEA for valuable comments.
1
2
V. CHERNOZHUKOV, M. DEMIRER, E. DUFLO, I. FERNANDEZ-VAL
of overfitting. To solve this problem, medical journals and the FDA require pre-registering subsample of interest in medical trials in advance. In economics, this approach has gained some traction, with the adoption of pre-analysis plan (which can be filed in the AEA registry for randomized
experiments). Restricting heterogeneity analysis to pre-registered subgroups, however, amounts
to throwing away a large amount of potentially valuable information, especially now that many
researchers collect large baseline data sets. It should be possible to use the data to discover ex post
whether there is any relevant heterogeneity in treatment effect by co-variates.
To do this in a disciplined fashion and avoid the risk of overfitting, scholars have recently proposed using machine learning tools (see e.g. [6] and below for a review). Indeed, ML tools seem
to be ideal to explore heterogeneity of treatment effect, when researchers have access to a potentially large array of baseline variables to form subgroup, and little guiding principles on which of
those are likely to be relevant. Several recent papers, which we review below, develop methods for
detecting heterogeneity in treatment effects. Empirical researchers have taken notice.1
This paper develops a generic approach to use any of the tools of machine learning to predict
and make inference on heterogeneous treatment or policy effects. A core difficulty of applying
ML tools to the estimation of heterogenous causal effects is that, while they are successful in prediction empirically, it is much more difficult to obtain uniformly valid inference. In fact, in high
dimensional settings, absent strong assumptions, generic ML tools may not even produce consistent estimates of the conditional average treatment effect (or CATE) (the difference in the expected
potential outcomes between treated and control groups conditional on the covariates Z).
Previous attempts to solve this problem focus on specific tools and situations where those assumptions are satisfied. Our approach to resolve the fundamental impossibilities in non-parametric
inference is different. Motivated by [29], instead of attempting to get consistent estimate and uniformly valid inference on CATE itself, we focus on providing valid estimation and inference for
features of CATE. We start by building a ML proxy predictor of CATE, and then develop valid inference for features of the CATE based on this proxy predictor. In particular, we develop valid
inference for the following three objects, which are likely to be of interest to applied researchers
and policy makers: First, the Best Linear Predictor (BLP) of the CATE based on the ML proxy predictor, second, the Sorted Group Average Treatment Effects (GATES), average treatment effect by
heterogeneity groups induced by the ML proxy predictor S(Z); third, the Classification Analysis
(CLAN): the average characteristics of the most and least affected units defined in terms of the ML
proxy predictor. Thus, we can find out if there is detectable heterogeneity in the treatment effect
based on observables, and if there is any, what is the treatment effect for different bins. And finally
we can describe which of the covariates is correlated with this heterogeneity.
1
In the last few months alone, several new empirical papers in economics used ML methods to estimate heterogenous
effects. E.g. [44], which shows that villagers outperform the machine learning tools when they predict heterogeneity in
returns to capital. [25] predict who benefits the most from a summer internship projects. The methodological papers
reviewed later also contain a number of empirical applications.
GENERIC ML FOR FEATURES OF HETEROGENOUS TREATMENT EFFECTS
3
Thus, in the trade off between more restrictive assumptions and a more ambitious estimation,
we chose a different point than previous papers: focus on coarser objects of the function rather
than the function itself, but make as little assumptions as possible. This seems to be a worthwhile
sacrifice: the objects that for which we have developed inference appear to us at this point to be
the most relevant, but in the future, one could easily develop methods for other objects of interest.
The Model and Key Causal Functions. Let Y (1) and Y (0) be the potential outcomes in the treatment state 1 and the non-treatment state 0; see [46]. Let Z be a vector of of covariates that characterize the observational units. The main causal functions are the baseline conditional average
(BCA):
b0 (Z) := E[Y (0) | Z],
(1.1)
and the conditional average treatment effect (CATE):
s0 (Z) := E[Y (1) | Z] − E[Y (0) | Z].
(1.2)
Suppose the binary treatment variable D is randomly assigned conditional on Z, with probability of assignment depending only on a subvector of stratifying variables Z1 ⊆ Z, namely
D ⊥⊥ (Y (1), Y (0)) | Z,
(1.3)
and the propensity score is known and is given by
p(Z) := P[D = 1 | Z] = P[D = 1 | Z1 ],
(1.4)
which we assume is bounded away from zero or one:
p(Z) ∈ [p0 , p1 ] ⊂ (0, 1).
(1.5)
The observed outcome is Y = DY (1) + (1 − D)Y (0). Under the stated assumption, the causal
functions are identified by the components of the regression function of Y given D, Z:
Y = b0 (Z) + Ds0 (Z) + U, E[U | Z, D] = 0,
that is,
b0 (Z) = E[Y | D = 0, Z],
(1.6)
s0 (Z) = E[Y | D = 1, Z] − E[Y | D = 0, Z].
(1.7)
and
We observe Data = (Yi , Zi , Di )N
i=1 , consisting of i.i.d. copies of the random vector (Y, Z, D)
having probability law P . Expectation with respect to P is denoted by E = EP . The probability
law of the entire data is denoted by P = PP and the corresponding expectation is denoted by
E = EP .
4
V. CHERNOZHUKOV, M. DEMIRER, E. DUFLO, I. FERNANDEZ-VAL
Properties of Machine Learning Estimators of s0 (Z) Motivating the Agnostic Approach. Machine learning (ML) is a name attached to a variety of new, constantly evolving statistical learning
methods: Random Forest, Boosted Trees, Neural Networks, Penalized Regression, Ensembles, and
Hybrids (see, e.g., [50] for a recent review, and [28] for a prominent textbook treatment). In modern
high-dimensional settings, machine learning methods effectively explore the various forms of nonlinear structured sparsity to yield “good” approximations to s0 (z) whenever such assumptions are
valid, based on equations (1.6) and (1.7). As a result these methods often work much better than
classical methods in high-dimensional settings, and have found widespread uses in industrial and
academic applications.
Motivated by the practical predictive success of the methods, it is really tempting to apply the
ML methods directly to try to learn the CATE function z 7→ s0 (z) (by learning the two regression
functions for treated and untreated and taking the difference). However, it is hard, if not impossible, to obtain uniformly valid inference on z 7→ s0 (z) using generic ML methods, under credible
assumptions and practical tuning parameter choices. There are several fundamental reasons as
well as huge gaps between theory and practice that are responsible for this.
One fundamental reason is that the ML methods might not even produce consistent estimators
of z 7→ s0 (z) in high dimensional settings. For example, if z has dimension d and the target function
z 7→ s0 (z) is assumed to have p continuous and bounded derivatives, then the worst case (minimax)
lower bound on the rate of learning this function cannot be better than N −p/(2p+d) as N → ∞, as
shown by Stone [47]. Hence if p is fixed and d is also small, slowly increasing with N , such as
d > log N , then there exists no consistent estimator of z 7→ s0 (z) generally.
Hence, ML estimators cannot be regarded as consistent, unless further very strong assumptions
are made. Examples of such assumptions include structured forms of linear and non-linear sparsity and super-smoothness. While these (sometime believable and yet untestable) assumptions
make consistent adaptive estimation possible (e.g.,[17]), inference remains a more difficult problem, as adaptive confidence sets do not exist even for low-dimensional nonparametric problems
([41, 29]). Indeed, adaptive estimators (including modern ML methods) have biases of comparable
or dominating order as compared to sampling error. Further assumptions such as ”self-similarity”
are needed to bound the biases and expand the confidence bands by the size of bias (see [30, 22])
to produce partly adaptive confidence bands. For more traditional statistical methods there are
constructions in this vein that make use of either undersmoothing or bias-bounding arguments
([30, 22]). These methods, however, are not yet available for ML methods in high dimensions (see,
however, [31] for a promising approach called ”targeted undersmoothing” in sparse linear models).
Suppose we did decide to be optimistic (or panglossian) and imposed the strong assumptions,
that made the theoretical versions of the ML methods provide us with high-quality consistent estimators of z 7→ s0 (z) and valid confidence bands based on them. This would still not give as a practical construction we’d want for our applications. The reason is that there is a huge gap between
GENERIC ML FOR FEATURES OF HETEROGENOUS TREATMENT EFFECTS
5
theoretical versions of the ML methods appearing in various theoretical papers and the practical
versions (with the actual, data-driven tuning parameters) coded up in statistical computing packages used by practitioners2.3 The use of ML, for example, involves many tuning parameters with
practical rules for choosing them, while theoretical works provide little guidance or backing for
such practical rules; see e.g., the influential book [28] for many examples of such rules.4
In this paper we shall take an agnostic view and we shall not rely on any structured assumptions,
which might be difficult to verify or believe in practice, and we don’t impose conditions that make
the ML estimators consistent. We simply treat ML as providing proxy predictors for the objects of
interest.
Our Agnostic Approach. Our approach will be radically different – we propose strategies for estimation and inference on
key features of s0 (Z) rather than s0 (Z) itself.
Because of this difference in focus we can avoid making strong assumptions about the properties
of the ML estimators.
Let (M, A) denote a random partition of the set of indices {1, . . . , N }. The strategies that we
consider rely on random splitting of
Data = (Yi , Di , Zi )N
i=1
into a main sample, denoted by DataM = (Yi , Di , Zi )i∈M , and an auxiliary sample, denoted by
DataA = (Yi , Di , Zi )i∈A . We will sometimes refer to these samples as M and A. We assume that
the main and auxiliary samples are approximately equal in size, though this is not required theoretically.
From the auxiliary sample A, we obtain ML estimators of the baseline and treatment effects,
which we call the proxy predictors,
z 7→ B(z) = B(z; DataA ) and z 7→ S(z) = S(z; DataA ).
These are possibly biased and noisy predictors of b0 (z) and s0 (z), and in principle, we do not even
require that they are consistent for b0 (z) and s0 (z). We simply treat these estimates as proxies,
which we post-process to estimate and make inference on the features of the CATE z 7→ s0 (z). We
condition on the auxiliary sample DataA , so we consider these maps as frozen, when working with
the main sample.
2There are cases where such gap does not exist, e.g., see [13, 15] for the lasso.
3For example, even the wide use of K-fold cross-validation in high-dimensional settings for machine learning remains
theoretically unjustified (there do exist, however, related subsample-based methods [52, 40] that do achieve near-oracle
performance for tuning selection).
4Unfortunately, theoretical work often only provides existence results: there exist theoretical ranges of the tuning
parameters that make the simple versions of the methods work for predictive purposes (under very strong assumptions),
leaving no satisfactory guide to practice.
6
V. CHERNOZHUKOV, M. DEMIRER, E. DUFLO, I. FERNANDEZ-VAL
Using the main sample and the proxies, we shall target and develop valid inference about key
features of s0 (Z) rather than s0 (Z), which include
(1) Best Linear Predictor (BLP) of the CATE s0 (Z) based on the ML proxy predictor S(Z);
(2) Sorted Group Average Treatment Effects (GATES): average of s0 (Z) (ATE) by heterogeneity groups induced by the ML proxy predictor S(Z);
(3) Classification Analysis (CLAN): average characteristics of the most and least affected units
defined in terms of the ML proxy predictor S(Z).
Our approach is generic with respect to the ML method being used, and is agnostic about its formal
properties.
Our point estimation will make use of many splits of the data into main and auxiliary samples
to produce robust estimates. Our estimation and inference will systematically account for two
sources of uncertainty:
(I) Estimation uncertainty conditional on the auxiliary sample.
(II) Splitting uncertainty induced by random partitioning of the data into the main and auxiliary samples.
Because we account for the second source, we call the resulting collection of methods as variational
estimation and inference methods (VEINs). For point estimates we report the median of the estimated key features over different random splits of the data. For the confidence intervals we take
the medians of many random conditional confidence sets and we adjust their nominal confidence
level to reflect the splitting uncertainty. We construct p-values by taking medians of many random
conditional p-values and adjust the nominal levels to reflect the splitting uncertainty. Note that
considering many different splits and accounting for variability caused by splitting is very important. Indeed, with a single splitting practice, empiricists may unintentionally look for a ”good” data
split, which supports their prior beliefs about the likely results, thereby invalidating inference.5
Relationship to the Literature. We focus the review strictly on the literatures about estimation
and inference on heterogeneous effects and inference using sample splitting.
We first mention work that uses linear and semiparametric regression methods. A semiparametric inference method for characterizing heterogeneity, called the sorted effects method, was
given in [20]. This approach does provide a full set of inference tools, including simultaneous
5This problem is “solved” by fixing the Monte-Carlo seed and the entire data analysis algorithm before the empirical
study. Even if such a huge commitment is really made and followed, there is a considerable risk that the resulting
data-split may be non-typical. Our approach allows one to avoid taking this risk.
GENERIC ML FOR FEATURES OF HETEROGENOUS TREATMENT EFFECTS
7
bands for percentiles of the CATE, but is strictly limited to the traditional semiparametric estimators for the regression and causal functions. [31] proposed a sparsity based method called ”targeted undersmoothing” to perform inference on heterogeneous effects. This approach does allow
for high-dimensional settings, but makes strong assumptions on sparsity as well as additional assumptions that enable the targeted undersmoothing. A related approach, which allows for simultaneous inference on many coefficients (for example, inference, on the coefficients corresponding
to the interaction of the treatment with other variables) was first given in [14] using a Z-estimation
framework, where the number of interactions can be very large; see also [26] for a more recent
effort in this direction, focusing on de-biased lasso in mean regression problems. This approach,
however, still relies on a strong form of sparsity assumptions. [53] proposed a post-selection inference framework within the high-dimensional linear sparse models for the heterogeneous effects.
The approach is attractive because it allows for some misspecification of the model.
Next we discuss the use of tree-based and other methods. [34] discussed the use of a heuristic
support-vector-machine method with lasso penalization for classification of heterogeneous treatments into positive and negative ones. They used the Horvitz-Thompson transformation of the
outcome (e.g., as in [33, 1]) such that that the new outcome becomes an unbiased, noisy version of
CATE. [5] made use of the Horvitz-Thompson transformation of the outcome variable to inform
the process of building causal trees, with the main goal of predicting CATE. They also provide a
valid inference result on average treatment effects for groups defined by the tree leaves, conditional
on the data split in two subsamples: one used to build the tree leaves and the one to estimate the
predicted values given the leaves. Unlike our generic method introduced below, this inference approach is limited to trees and does not account for splitting uncertainty.6 Like our methods, this approach is essentially assumption-free. [49] provided a subsampling-based construction of a causal
random forest, providing valid pointwise inference for CATE (see also the review in [49] on prior
uses of random forests in causal settings) for the case when covariates are very low-dimensional
(and essentially uniformly distributed).7 Unfortunately, this condition rules out the typical highdimensional settings that arise in many empirical problems, including the ones considered in this
paper.
Our approach is radically different from these existing approaches, in that we are changing the
target, and instead of hunting for CATE z 7→ s0 (z), we focus on key features of z 7→ s0 (z). Our
approach is generic, it can be used in conjunction with penalized methods, deep and shallow neural
6In principle, our (generic) inference methods described below applies to the [5]’s problem to provide valid inference
that does account for sample splitting uncertainty. Also, going beyond trees is crucial, since the best ML algorithms are
typically not trees.
7The dimension d is fixed in [49]; the analysis relies on the Stone’s model with smoothness index β = 1, in which no
consistent estimator exists once d > log n. It’d be interesting to establish consistency properties and find valid inferential
procedures for the random forest in high-dimensional (d ∝ n or d n) approximately sparse cases, with continuous and
categorical covariates, but we are not aware of any studies that cover such settings, which are of central importance to
us.
8
V. CHERNOZHUKOV, M. DEMIRER, E. DUFLO, I. FERNANDEZ-VAL
networks, canonical and new random forests, boosted trees, and ensemble methods. Our approach
is agnostic and does not make unrealistic or hard-to-check assumptions, for example, we don’t
even require conditions for consistency of the ML methods. We simply treat the ML methods as
providing a proxy predictor z 7→ S(z), which we post-process to estimate and make inference
on the key features of the CATE z 7→ s0 (z). Some of our strategies rely on Horvitz-Thompson
transformations of outcome and some do not. The inspiration for our approach draws upon an
observation in [29], namely that some fundamental impossibilities in non-parametric inference
could be avoided if we focus inference on coarser features of the non-parametric functions rather
than the functions themselves.
Our inference approach is also of independent interest, and could be applied to many problems,
where sample splitting is used to produce ML predictions, e.g. [2]. Related references include
[51, 42], where the ideas are related but quite different in details, which we shall explain below.
The premise is the same, however, as in [42, 45] – we should not rely on a single random split
of the data and should adjust inference in some way. Our approach takes the medians of many
conditional confidence intervals as the confidence interval and the median of many conditional
p-values as the p-value, and adjusts their nominal levels to account for the splitting uncertainty.
Our construction of p-values builds upon ideas in [16, 42], though what we propose is radically
simpler, and our confidence intervals appear to be brand new. Of course sample splitting ideas
are classical, going back to [32, 38, 12, 23, 43], though having been mostly underdeveloped and
overlooked for inference, as characterized by [45]. The overlooked status perhaps allowed us to
innovate on the inference side.
2. Main Identification Results and Estimation Strategies
2.1. BLP of CATE. We consider two strategies for identifying and estimating the best linear predictor of s0 (Z) using S(Z):
BLP[s0 (Z) | S(Z)] := arg
min
f (Z)∈Span(1,S(Z))
E[s0 (Z) − f (Z)]2 ,
which, if exists, is defined by projecting s0 (Z) on the linear span of 1 and S(Z) in the space L2 (P ).
BLP of CATE: The First Strategy. Here we shall identify the coefficients of the BLP from the
weighted linear projection:
Y = α0 X1 + β1 (D − p(Z)) + β2 (D − p(Z))(S − ES) + , E[w(Z)X] = 0,
where S := S(Z),
w(Z) = {p(Z)(1 − p(Z))}−1 ,
X1 := X1 (Z),
e.g.,
X := (X1 , X2 )
X1 = [1, B(Z)],
X2 := [D − p(Z), (D − p(Z))(S(Z) − (S − ES)].
Note that the above equation uniquely pins down β1 and β2 under weak assumptions.
(2.1)
GENERIC ML FOR FEATURES OF HETEROGENOUS TREATMENT EFFECTS
9
The interaction (D − p(Z))(S − ES) is orthogonal to D − p(Z) under the weight w(Z) and to all
other regressors that are functions of Z under any Z-dependent weight.8
A consequence is our first main identification result, namely that
β1 + β2 (S(Z) − ES) = BLP[s0 (Z) | S(Z)],
in particular β1 = Es0 (Z) and β2 = Cov(s0 (Z), S(Z))/ Var(S(Z)).
Theorem 2.1 (BLP 1). Consider z 7→ S(z) and z 7→ B(z) as fixed maps. Assume that Y and X have
finite second moments and that EXX 0 is full rank. Then, (β1 , β2 ) defined in (2.1) also solves the best linear
predictor/approximation problem for the target s0 (Z):
(β1 , β2 )0 = arg min E[s0 (Z) − b1 − b2 S(Z)]2 ,
b1 ,b2
in particular β1 = ES0 (Z) and β2 = Cov(s0 (Z), S(Z))/ Var(S(Z)).
The identification result is constructive. We can base the corresponding estimation strategy on
the empirical analog:
Yi = α
b0 X1i + βb1 (Di − p(Zi )) + βb2 (Di − p(Zi ))(Si − EN,M Si ) + b
i ,
i ∈ M,
EN,M [w(Zi )b
i Xi ] = 0,
where EN,M denotes the empirical expectation with respect to the main sample, i.e.
X
EN,M g(Yi , Di , Zi ) := |M |−1
g(Yi , Di , Zi ).
i∈M
The properties of this estimator, conditional on the auxilliary data, are well known and follow as
a special case of Lemma B.1 in the Appendix.
Comment 2.1 (Main Implications of the result). If S(Z) is a perfect proxy for s0 (Z), then β2 = 1.
In general, β2 6= 1, correcting for noise in S(Z). If S(Z) is complete noise, uncorrelated to s0 (Z),
then β2 = 0. Furthermore, if there is no heterogeneity, that is s0 (Z) = s, then β2 = 0. Rejecting
the hypothesis β2 = 0 therefore means that there is both heterogeneity and S(Z) is its relevant
predictor.
Figure 1 provides two examples. The left panel shows a case without heterogeneity in the CATE
where s0 (Z) = 0, whereas there right panel shows a case with strong heterogeneity in the CATE
where s0 (Z) = Z. In both cases we evenly split 1000 observations between the auxiliary and main
8The orthogonalization ideas embedded in this strategy do have classical roots in econometrics (going back to at
least Frisch and Waugh in the 30s), and similar strategies underlie the orthogonal or double machine learning approach
(DML) in [21]. Our paper has different goals than DML, attacking the problem of inference on heterogeneous effects
without rate and even consistency assumptions. The strategy here is more nuanced in that we are making it work under
misspecification or inconsistent learning, which is likely to be true in very high-dimensional problems.
V. CHERNOZHUKOV, M. DEMIRER, E. DUFLO, I. FERNANDEZ-VAL
0.5
−0.5
0.0
S(Z)
0
−4
−1.0
−2
S(Z)
2
1.0
4
10
−1.0
−0.5
0.0
0.5
1.0
−1.0
Z
−0.5
0.0
0.5
1.0
Z
Figure 1. Example. In the left panel we have a homogeneous CATE s0 (Z) = 0; in
the right panel we have heterogeneous CATE s0 (Z) = Z. The proxy predictor S(Z)
is produced by the Random Forest, shown by green line, the true BLP of CATE is
shown by black line, and the estimated BLP of CATE is shown by blue line. The
true and estimated BLP of CATE are more attenuated towards zero than the proxy
predictor.
samples, Z is uniformly distributed in (−1, 1), and the proxy predictor S(Z) is estimated by random
forest in the auxiliary sample following the standard implementation, see e.g. [28]. When there
is no heterogeneity, post-processing the ML estimates helps reducing sampling noise bringing the
estimated BLP close to the true BLP; whereas under strong heterogeneity the signal in the ML
estimates dominates the sampling noise and the post-processing has little effect.
Comment 2.2 (Digression: Naive Strategy that is not Quite Right). It is tempting and “more natural” to estimate
Y = α̃1 + α̃2 B + β̃1 D + β̃2 D(S − ES) + , E[X̃] = 0,
where X̃ = (1, B, D, D(S − ES)). This is a good strategy for predicting the conditional expectation
of Y given Z and D. But, β̃2 6= β2 , and β̃1 + β̃2 (S − ES) is not the best linear predictor of s0 (Z).
BLP of CATE: The Second Strategy. The second strategy makes use of the Horvitz-Thompson
transformation:
D − p(Z)
.
H = H(D, Z) =
p(Z)(1 − p(Z))
It is well known that the transformed response Y H provides an unbiased signal about CATE:
E[Y H | Z] = s0 (Z)
GENERIC ML FOR FEATURES OF HETEROGENOUS TREATMENT EFFECTS
11
and it follows that
BLP[s0 (Z) | S(Z)] = BLP[Y H | S(Z)].
This simple strategy is completely fine for identification purposes, but can severely underperform
in estimation and inference due to lack of precision. We can repair the deficiencies as follows.
We consider, instead, the linear projection:
Y H = µ0 X1 H + β1 + β2 (S − ES) + ˜,
E˜
X̃ = 0,
(2.2)
where B := B(Z), S := S(Z), and X̃ := (X10 H, X̃20 )0 , X̃2 = (1, (S − ES)0 )0 , where X1 = X1 (Z), e.g.
B(Z) or (B(Z), S(Z), p(Z))0 . The terms X1 are present in order to reduce noise.
We show that, as a complementary main identification result,
β1 + β2 (S − ES) = BLP[s0 (Z) | S(Z)].
Theorem 2.2 (BLP 2). Consider z 7→ S(z) and z 7→ B(z) as fixed maps. Assume that Y has finite second
moments and X̃ = (X1 H, 1, (S − ES)) is such that EX̃ X̃ 0 is finite and full rank. Then, (β1 , β2 ) defined
in (2.2) solves the best linear predictor/approximation problem for the target s0 (Z):
(β1 , β2 )0 = arg min E[s0 (Z) − b1 − b2 S(Z)]2 ,
b1 ,b2
in particular β1 = Es0 (Z) and β2 = Cov(s0 (Z), S(Z))/ Var(S(Z)).
The corresponding estimator is defined through the empirical analog:
Yi Hi = µ
b0 X1i Hi + βb1 + βb2 (Si − EN,M Si ) + b
i ,
EN,M b
i X̃i = 0,
and the properties of this estimator, conditional on the auxiliary data, are well known and given
in Lemma B.1.
2.2. The Sorted Group ATE. The target parameters are
E[s0 (Z) | G],
where G is an indicator of group membership.
Comment 2.3. There are many possibilities for creating groups based upon ML tools applied to
the auxiliary data. For example, one can group or cluster based upon predicted baseline response
(as in the “endogenous stratification” analysis, [2]) or based upon actual predicted treatment effect
S. We focus on the latter approach for defining groups, although our identification and inference
ideas immediately apply to other ways of defining groups, and could be helpful in these contexts.
We build the groups to explain as much variation in s0 (Z) as possible
Gk := {S ∈ Ik },
k = 1, ..., K,
12
V. CHERNOZHUKOV, M. DEMIRER, E. DUFLO, I. FERNANDEZ-VAL
where Ik = [`k−1 , `k ) are non-overlaping intervals that divide the support of S into regions [`k−1 , `k )
with equal or unequal masses:
−∞ = `0 < `1 < . . . < `K = +∞.
The parameters of interest are the Sorted Group Average Treatment Effects (GATES):
E[s0 (Z) | Gk ],
k = 1, . . . , K.
Given the definition of groups, it is natural for us to impose the monotonicity restriction
E[s0 (Z) | G1 ] 6 ... 6 E[s0 (Z) | GK ],
which holds asymptotically if S(Z) is consistent for s0 (Z) and the latter has an absolutely continuous distribution. Under the monotonicity condition, the estimates could be rearranged to obey the
weak monotonicity condition, improving the precision of the estimator. The joint confidence intervals could also be improved by intersecting them with the set of monotone functions. Furthermore,
as before, we can test for homogeneous effects, s0 (Z) = s, by testing whether,
E[s0 (Z) | G1 ] = ... = E[s0 (Z) | GK ].
GATES: The First Strategy. Here we shall recover GATES parameters from the weighted linear
projection equation:
0
Y = α X1 +
K
X
γk · (D − p(Z)) · 1(Gk ) + ν,
E[w(Z)νW ] = 0,
(2.3)
k=1
for B := B(Z), S := S(Z), W = (X10 , W20 )0 ,
0
W2 = ({(D − p(Z))1(Gk )}K
k=1 ) .
The presence of D − p(Z) in the interaction (D − p(Z))1(Gk ) orthogonalizes this regressor relative
to all other regressors that are functions of Z. The controls X1 , e.g. B, can be included to improve
precision.
The second main identification result is that the projection coefficients γk are the GATES
parameters:
K
γ = (γk )K
k=1 = (E[s0 (Z) | Gk ])k=1 .
Given the identification strategy, we can base the corresponding estimation strategy on the following empirical analogs:
Yi = α
b0 X1i + γ
b0 W2i + νbi ,
i ∈ M, EN,M [w(Zi )b
νi Wi ] = 0.
(2.4)
The properties of this estimator, conditional on the auxilliary data, are well known and stated as a
special case of Lemma B.1.
A formal statement appears below, together with a complementary result.
13
1.0
GENERIC ML FOR FEATURES OF HETEROGENOUS TREATMENT EFFECTS
4
●
●
●
●
●
●
●
●
●
●
●
0.0
●
●
E s(Z)|Group
●
0
●
●
●
●
●
●
●
●
●
−0.5
−2
E s(Z)|Group
2
0.5
●
●
−4
●
●
−1.0
●
1
2
3
4
5
1
2
Heterogeneity Group
3
4
5
Heterogeneity Group
Figure 2. In the left panel we have the homogeneous CATE s0 (Z) = 0; in the right
panel we have heterogeneous CATE s0 (Z) = Z. The proxy predictor S(Z) for CATE
is produced by the random forest, whose sorted averages by groups are shown as
red dots, exhibiting large biases. These are the naive estimates. The true sorted
group average treatment effects (GATES) E[s0 (Z) | Gk ] are shown by black dots, and
estimated GATES are shown by blue dots. The true and estimated GATES correct
for the biases relative to the naive strategy shown in red. The estimated GATES
shown by blue dots are always closer to the true GATEs shown by black dots than
the naive estimates shown in red.
Figure 2 provides two examples using the same designs as in fig. 1. Post-processing the ML
estimates again has stronger effect when there is no heterogeneity, but in both cases help bring the
estimated GATES close to the true GATES.
GATES: The Second Strategy. Here we employ linear projections on Horvitz-Thompson transformed variables:
K
X
Y H = µ0 X1 H +
γk · 1(Gk ) + ν, E[ν W̃ ] = 0,
(2.5)
k=1
for B := B(Z), S := S(Z), W̃ = (X10 H, W̃20 ), W̃20 = ({1(Gk )}K
k=1 ).
Again, we show that the projection parameters are GATES:
K
γ = (γk )K
k=1 = (E[s0 (Z) | Gk ])k=1 .
14
V. CHERNOZHUKOV, M. DEMIRER, E. DUFLO, I. FERNANDEZ-VAL
Given the identification strategy, we can base the corresponding estimation strategy on the following empirical analogs:
Yi Hi = µ
b0 X1i Hi + γ
b0 W̃2i + νbi ,
i ∈ M, EN,M [b
νi W̃i ] = 0.
(2.6)
The properties of this estimator, conditional on the auxiliary data, are well known and given in
Lemma B.1. The resulting estimator has similar performance to the previous estimator, and under
some conditions their first-order properties coincide.
The following is the formal statement of the identification result.
Theorem 2.3 (GATES). Consider z 7→ S(z) and z 7→ B(z) as fixed maps. Assume that Y has finite
second moments and the W ’s and W̃ defined above are such that EW W 0 and EW̃ W̃ 0 are finite and have full
rank. Consider γ = (γk )K
k=1 defined by the weighted regression equation (2.3) or by the regression equation
(2.5). These parameters defined in two different ways are equivalent and are equal to the expectation of s0 (Z)
conditional on the proxy group {S ∈ Ik }:
γk = E[s0 (Z) | Gk ].
2.3. Classification Analysis (CLAN). When the BLP and GATES analyses reveal substantial heterogeneity, it is interesting to know the properties of the subpopulations that are most and least
affected. Here we focus on the “least affected group” G1 and “most affect group” GK . Under the
monotonicity assumption, it is reasonable that the first and the last groups are the most and least
affected, where the labels “most” and “least” can be swapped depending on the context.
Let g(Y, Z) be a vector of characteristics of an observational unit. The parameters of interest are
the average characteristics of the most and least affected groups:
δ1 = E[g(Y, Z) | G1 ]
and
δK = E[g(Y, Z) | GK ].
The parameters δK and δ1 are identified because they are averages of variables that are directly
observed. We can compare δK and δ1 to quantify differences between the most and least affected
groups. We call this type of comparisons as classification analysis or CLAN.
3. ”Variational” Estimation and Inference Methods
3.1. Estimation and Inference: The Generic Targets. Let θ denote a generic target parameter or
functional, for example,
• θ = β2 is the heterogeneity predictor loading parameter;
• θ = β1 + β2 (S(z) − ES) is the “personalized” prediction of s0 (z);
• θ = γk is the expectation of s0 (Z) for the group Gk ;
• θ = γK − γ1 is the difference in the expectation of s0 (Z) between the most and least affected
groups;
GENERIC ML FOR FEATURES OF HETEROGENOUS TREATMENT EFFECTS
15
• θ = δK − δ1 is the difference in the expectation of the characteristics of the most and least
impacted groups.
3.2. Quantification of Uncertainty: Two Sources. There are two principal sources of sampling
uncertainty:
(I) Estimation uncertainty regarding the parameter θ, conditional on the data split;
(II) Uncertainty or ”variation” induced by the data splitting.
Conditional on the data split, quantification of estimation uncertainty is standard. To account
for uncertainty with respect to the data splitting, it makes sense to examine the robustness and
variability of the estimates/confidence intervals with respect to different random splits. One of our
goals is to develop methods, which we call ”variational estimation and inference” (VEIN) methods,
for quantifying this uncertainty, which can be of independent interest in many settings where the
sample splitting is used.
Quantifying Source (I): Conditional Inference. We first recognize that the parameters implicitly
depend on
DataA := {(Yi , Di , Xi )}i∈A ,
the auxiliary sample, used to create the ML proxies B = BA and S = SA . Here we make the
dependence explicit: θ = θA .
All of the examples admit an estimator θbA such that under mild assumptions,
2
θbA | DataA ∼a N (θA , σ
bA
),
in the sense that, as |M | → ∞,
−1 b
P(b
σA
(θA − θA ) 6 z | DataA ) →P Φ(z).
Implicitly this requires the auxiliary data DataA to be ”sufficiently regular”, and this should happen with high probability.
As a consequence, the confidence interval (CI)
[LA , UA ] := [θbA ± Φ−1 (1 − α/2)b
σA ]
covers θA with approximate probability 1 − α:
P[θA ∈ [LA , UA ] | DataA ] = 1 − α − oP (1).
This leads to straighforward conditional inference, which does not account for the sample splitting
uncertainty.
16
V. CHERNOZHUKOV, M. DEMIRER, E. DUFLO, I. FERNANDEZ-VAL
Quantifying Source (II): “Variational” Inference. Different partitions (A, M ) of {1, ..., N } yield
different targets θA . Conditional on the data, we treat θA as a random variable, since (A, M ) are
random sets that form random partitions of {1, . . . , N } into samples of size n and N − n. Different partitions also yield different estimators θbA and approximate distributions for these estimators.
Hence we need a systematic way of treating the randomness in these estimators and their distributions.
Comment 3.1. In cases where the data sets are not large, it may be desirable to restrict attention to
balanced partitions (A, M ), where the proportion of treated units is equal to the designed propensity score.
We want to quantify the uncertainty induced by the random partitioning. Conditional on Data,
the estimated θbA is still a random variable, and the confidence band [LA , UA ] is a random set. For
reporting purposes, we instead would like to report an estimator and confidence set, which are
non-random conditional on the data.
Adjusted Point and Interval Estimators. Our proposal is as follows. As a point estimator,
we shall report the median of θbA as (A, M ) vary (as random partitions):
θb := Med[θbA | Data].
This estimator is more robust than the estimator based on a single split. To account for partition uncertainty, we propose to report the following confidence interval (CI) with the nominal
confidence level 1 − 2α:
[l, u] := [Med[LA | Data], Med[UA | Data]].
Note that the price of splitting uncertainty is reflected in the discounting of the confidence level
from 1 − α to 1 − 2α. Alternatively, we can report the confidence interval based on inversion
of a test based upon p-values, constructed below.
The above estimator and confidence set are non-random conditional on the data. The confidence set reflects the uncertainty created by the random partitioning of the data into the main and
auxilliary data.
Comment 3.2. For a random variable X with law PX we define
Med(X) := inf{x ∈ R : PX (X 6 x) > 1/2},
Med(X) := sup{x ∈ R : PX (X > x) > 1/2},
Med(X) := (Med(X) + Med(X))/2.
Note that the lower median is the usual definition of the median. The upper median is the next
distinct quantile of the random variable (or it is the usual median after reversing the order on R).
For example, when X is uniform on {1, 2, 3, 4}, then Med(X) = 2 and Med(X) = 3; and if X is
GENERIC ML FOR FEATURES OF HETEROGENOUS TREATMENT EFFECTS
17
uniform on {1, 2, 3}, then Med(X) = Med(X) = 2. For continuous random variables the upper
and lower medians defined above coincide. For discrete random variables they can differ, but the
differences will be small for variables that are close to being continuous.
Suppose we are testing H0 : θA = θ0 against H1 : θA < θ0 , conditional on the auxiliary data,
then the p-value is given by
pA = Φ(b
σ −1 (θbA − θ0 )).
A
−1 b
The p-value for testing H0 : θA = θ0 against H1 : θA > θ0 , is given by pA = 1 − Φ(b
σA
(θA − θ0 )).
Under the null hypothesis pA is approximately distributed as the uniform variable, pA ∼ U (0, 1),
conditional on DataA . Note that, conditional on Data, pA still has randomness induced by random
partitioning of the data, which we need to address.
Adjusted P-values. We say that testing the null hypothesis, based on the p-values pA , that
are random conditional on data, has significance level α if
P(pA 6 α/2 | Data) > 1/2
or p.5 = Med(pA | Data) 6 α/2.
That is, for at least 50% of the random data splits, the realized p-value pA falls below the level
α/2. Hence we can call p = 2p.5 the sample splitting-adjusted p-value, and consider its small
values as providing evidence against the null hypothesis.
Comment 3.3. Our construction of p-values builds upon the false-discovery-rate type adjustment
ideas in [16, 42], though what we propose is radically simpler, and is minimalistic for our problem,
whereas the idea of our confidence intervals below appears to be completely new.
The main idea behind this construction is simple: the p-values are distributed as marginal uniform variables {Uj }j∈J , and hence obey the following property.
Lemma 3.1 (A Property of Uniform Variables). Consider M , the (usual, lower) median of a sequence
{Uj }j∈J of uniformly distributed variables, Uj ∼ U (0, 1) for each j ∈ J, where variables are not necessarily
independent. Then,
P(M 6 α/2) 6 α.
Proof. Let M denote the median of {Uj }j∈J . Then M 6 α/2 is equivalent to |J|−1
α/2)] − 1/2 > 0. So
X
P[M 6 α/2] = E1{|J|−1
[1(Uj 6 α/2)] > 1/2}.
P
j∈J [1(Uj
6
j∈J
By Markov inequality this is bounded by
X
2E|J|−1
[1(Uj 6 α/2)] 6 2E[1(Uj 6 α/2)] 6 2α/2 = α.
j∈J
where the last inequality holds by the marginal uniformity.
18
V. CHERNOZHUKOV, M. DEMIRER, E. DUFLO, I. FERNANDEZ-VAL
Main Inference Result: Variational P-values and Confidence Intervals. We present a formal result on adjusted p-values using this condition:
PV. Suppose that A is a set of regular auxiliary data configurations such that for all x ∈ [0, 1],
under the null hypothesis:
sup |PP [pA 6 x | DataA ∈ A] − x| 6 δ = o(1),
P ∈P
and inf P ∈P PP [DataA ∈ A] =: 1 − γ = 1 − o(1). In particular, suppose that this holds for
the p-values
−1 b
−1 b
pA = Φ(b
σA
(θA − θA )) and pA = 1 − Φ(b
σA
(θA − θA )).
Lemma B.1 shows that this condition is plausible for the least squares estimators defined in the
previous section under mild conditions.
Theorem 3.1 (Uniform Validity of Variational P-Value). Under condition PV and the null hypothesis
holding,
PP (p.5 6 α/2) 6 α + 2(δ + γ) = α + o(1),
uniformly in P ∈ P.
In order to establish the properties of the confidence interval [l, u], we first consider the properties of the related confidence interval, which is based on the inversion of the p-value based tests:
CI := {θ ∈ R : pu (θ) > α/2, pl (θ) > α/2},
(3.1)
for α < .25 , where, for σ
bA > 0,
−1 b
σA
(θA − θ)] | Data),
pl (θ) := Med(1 − Φ[b
(3.2)
−1 b
pu (θ) := Med(Φ[b
(θA − θ)] | Data).
σA
(3.3)
The confidence interval CI has the following representation in terms of the medians of t-statistics
implied by the proof Theorem 3.2 stated below:
h b
i
θA
−1 (1 − α/2) | Data < 0
Med θ−
−
Φ
h σbAb
i
CI = θ ∈ R :
.
(3.4)
Med θ−θA + Φ−1 (1 − α/2) | Data > 0
σ
bA
This CI can be (slightly) tighter than [l, u], while the latter is much simpler to construct.
The following theorem establishes that both confidence sets maintain the approximate confidence level 1 − 2α.
Theorem 3.2 (Uniform Validity of Variational Confidence Intervals). CI can be represented as (3.4)
and CI ⊆ [l, u], and under condition PV,
PP (θA ∈ CI) > 1 − 2α − 2(δ + γ) = 1 − 2α − o(1),
uniformly in P ∈ P.
GENERIC ML FOR FEATURES OF HETEROGENOUS TREATMENT EFFECTS
19
4. Other Considerations and Extensions
1. Choosing the Best ML Method Targeting CATE in Stage 1. There are several options. The
best ML method can be chosen using the auxiliary sample, based on either (A) the ability to predict
Y H using BH and S or (B) the ability to predict Y using B and (D − p(Z))(S − E(S)) under the
weight w(Z) (as in the first type of strategies we developed earlier). To be specific, we can solve
either of the following problems:
(A) minimize the errors in the prediction of Y H on BH and S:
X
(B, S) = arg min
[Yi Hi − B(Zi )Hi − S(Zi )]2 ,
B∈B,S∈S
i∈A
where B and S are parameter spaces for z 7→ B(z) and z 7→ S(z); or
(B) minimize the errors in the weighted prediction of Y on B and (D − p(Z))(S − E(S)):
X
(B, S) = arg min
w(Zi )[Yi − B(Zi ) − (Di − p(Zi )){S(Zi ) − S̄(Zi )}]2 ,
B∈B,S∈S
where S̄(Zi ) = |A|−1
z 7→ S(z).
i∈A
P
i∈A S(Zi )
and B and S are parameter spaces for z 7→ B(z) and
This idea improves over simple but inefficient strategy of predicting Y H just using S, which have
been suggested before for causal inference. It also improves over the simple strategy that predicts
Y using B and DS (which chooses the best predictor for E[Y | D, Z] in a given class but not necessarily the best predictor for CATE s0 (Z)). Note that this idea is new and is of major independent
interest.
2. Choosing the Best ML Method BLP Targeting CATE in Stage 2. The best ML method can
also be chosen in the main sample by maximizing
Λ := |β2 |2 Var(S(Z)) = Corr2 (s0 (Z), S(Z))Var(s0 (Z)).
(4.1)
Maximizing Λ is equivalent to maximizing the correlation between the ML proxy predictor S(Z)
and the true score s0 (Z), or equivalent to maximizing the R2 in the regression of s0 (Z) on S(Z).
3. Choosing the Best ML Method GATES Targeting CATE in Stage 2. Analogously, for GATES
the best ML method can also be chosen in the main sample by maximizing
Λ̄ = E
K
X
k=1
!2
γk 1(S ∈ Ik )
=
K
X
γk2 P(S ∈ Ik ).
(4.2)
k=1
P
This is the part of variation Es20 (Z) of s0 (z) explained by S̄(Z) = K
k=1 γk 1(S(Z) ∈ Ik ). Hence
choosing the ML proxy S(Z) to maximize Λ̄ is equivalent to maximizing the R2 in the regression
20
V. CHERNOZHUKOV, M. DEMIRER, E. DUFLO, I. FERNANDEZ-VAL
of s0 (Z) on S̄(Z) (without a constant). If the groups Gk = {S ∈ Ik } have equal size, namely
P(S(Z) ∈ Ik ) = 1/K for each k = 1, ..., K, then
Λ̄ =
K
1 X 2
γk .
K
k=1
4. Stratified Splitting. The idea is to balance the proportions of treated and untreated in both
A and M samples, so that the proportion of treated is equal to the experiment’s propensity scores
across strata. This formally requires us to replace the i.i.d. assumption by the i.n.i.d. assumption
(independent but not identically distributed observations) when accounting for estimation uncertainty, conditional on the auxiliary sample. This makes the notation more complicated, but the
results in Lemma B.1 still go through with notational modifications.
5. When Proxies have Little Variation. The analysis may generate proxy predictors S that have
little variation, so we can think of them as “weak”, which makes the parameter β2 weakly identified.
We can either add small noise to the proxies, which is called jittering, so that inference results go
through, or we may switch to testing rather than estimation. For practical reasons, we prefer the
jittering approach.
5. Further Potential Applications to Prediction and Causal Inference Problems
Our inference approach generalizes to any problem of the following sort.
Generalization. Suppose we can construct an unbiased signal Ỹ such that
E[Ỹ | Z] = s0 (Z),
where s0 (Z) is now a generic target function. Let S(Z) denote an ML proxy for s0 (Z). Then,
using previous arguments, we immediately can generate the following conclusions:
(1)
(2)
(3)
(4)
(5)
The projection of Ỹ on the ML proxy S(Z) identifies the BLP of s0 (Z) using S(Z).
The grouped averages of the target (GAT) E[s0 (Z) | Gk ] are identified by E[Ỹ | Gk ].
Using ML tools we can train proxy predictors S(Z) to predict Ỹ in auxiliary samples.
We post-process S(Z) in the main sample, by estimating the BLP and GATs.
We apply variational inference on functionals of the BLP and GATs.
The noise reduction strategies, like the ones we used on the context of H-transformed outcomes,
can be useful in these cases, but their construction could depend on the context.
Example 1. Forecasting or Predicting Regression Functions using ML proxies. This is the most
common type of the problem arising in forecasting. Here the target is the best predictor of Y using
Z, namely s0 (Z) = E[Y | Z], and Ỹ = Y trivially serves as the unbiased signal. The interesting part
GENERIC ML FOR FEATURES OF HETEROGENOUS TREATMENT EFFECTS
21
here is the use of variational inference tools developed in this paper for constructing confidence
intervals for the predicted values produced by the estimated BLP of s0 (Z) using S(Z).
Example 2. Predicting Structural Derivatives using ML proxies. Suppose we are interested in
best predicting the partial derivative s0 (z), where s0 (z) = ∂x g(x, z), where g(x, z) = E[Y | X =
x, Z = z]. In the context of demand analysis, Y is the log of individual demand, X is the log-price
of a product, and Z includes prices of other products and characteristics of individuals. Then the
unbiased signal is given by Ỹ = Y [∂x log p(X | Z)], where p(x | z) is the conditional density
function of x given z. That is, E[Ỹ | Z] = s0 (Z) under mild conditions on the density using the
integration by parts formula.
6. Empirical Applications and Implementation Algorithms
We consider two empirical applications. The first application is an RCT conducted in Morocco,
which investigates the effects of microfinance access on several outcomes. The second application
is an observational study, which analyzes the gender wage gap using the U.S. Current Population
Survey (CPS). While the results of the second study should not be interpreted as causal, we aim to
obtain the best approximation to the causal effects of gender-based discrimination on wages using
observational data, by flexibly conditioning on many controls using ML methods. We conclude
this section by providing the implementation algorithms for both examples.
6.1. Heterogeneity in the Effect of Microcredit Availability. We analyze a randomized experiment designed to evaluate the impact of microcredit availability on borrowing and self-employment
activities, which was previously studied in [24]. The experiment was conducted in 162 villages
in Morocco, divided into 81 pairs of villages with similar observable characteristics (number of
households, accessibility to the center of the community, existing infrastructure, type of activities
carried out by the households, and type of agriculture activities). One of the villages in each pair
was randomly assigned to treatment and the other to control. Between 2006 and 2007 a microfinance institution started operating in the treated villages. Two years after the intervention an
endline household survey was conducted with 5,551 households, which constitute our sample.
There was no other microcredit penetration in these villages, before and for the duration of the
study. Therefore, we interpret the treatment as the availability of microcredit.
Recent randomized evaluations of access to microcredit at the community level have found limited impacts of microcredit9. Despite evidence that access to microfinance leads to an increase in
borrowing ([4], [10], [48]) and business creation or expansion ([4], [7], [10], [48]), most studies have
found that this does not translate into an increase in economic outcomes such as profit, income,
labor supply and consumption ([4], [10], [24]). Moreover, there is also no evidence of substantial
gains in human development outcomes, such as education and health ([10],[48]). Studies which
9See [11] for a summary of the recent literature
22
V. CHERNOZHUKOV, M. DEMIRER, E. DUFLO, I. FERNANDEZ-VAL
estimate the impact of microfinance by randomizing microcredit at the individual level confirm
these findings ([8], [36], [37]).
One question that remains elusive is whether the lack of evidence on the average effects masks
heterogeneity, in which there are potential winners and losers of the microcredit expansion. Understanding this heterogeneity can have important implications for evaluating the welfare effects
of microcredit, designing policies and targeting the groups that would benefit from microfinance.
Indeed, the idea that there might be heterogeneity in the impact of microcredit has been a common theme among RCTs evaluating microfinance programs. Having found mostly positive but
insignificant coefficients, the papers cited above attempt to explore heterogeneous treatment effects, mostly using quantile treatment effects. For profits, most studies seem to find positive impact at the higher quantiles (and in the data set we study here, [24] actually find negative impacts at
lower level). Using Bayesian hierarchical methods to aggregate the evidence across studies, Meager (2017) cautions that these results on quantiles may not be generalizable: the profit variables
seems to have too much noise to lend itself to quantile estimation.
A number of recent papers also consider heterogeneous treatment effects by studying the effect
of microfinance on a subpopulation. In a follow-up study of [10], [9] investigates whether the heterogeneity is persistent six years after the microfinance was introduced. They find that credit has a
much bigger impact on the business outcomes of those who started a business before microfinance
entered than of those without prior businesses. Using the same dataset as in this application [24]
classify households into three categories in term of their probability to borrow before the intervention and find that microcredit access has a significant impact on investment and profit, but still no
impact on income and consumption among those who are most likely to borrow. It is worth noting
that the original strategy for this study was to construct groups which, ex ante had different probability to borrow, in order to separately estimate direct effect of microcredit on those most likely
to borrow, and indirect on those very unlikely to borrow. The researchers had initially collected a
short survey on the entire village, and had then tried to predict the probability to borrow using a
model fitted in a first group of villages. But the model proved to have low predictive power in the
other villages, and in their paper then end up predicting the probability to borrow ex-post. In the
paper, they worry that this ex-post classification leads them to over-fit.
The identification strategy developed in this paper provides several advantages in studying heterogeneity in the treatment effects of microfinance. First, contrary to the literature, which relies on
ad hoc subgroup analysis across a few baseline characteristics, we are agnostic about the source of
heterogeneity. While the variable “had a prior business” has proven to be a robust and generalizable predictors of differences in treatment effect (Meager, 2017) and could therefore be pre-specified
in future pre-analysis plans, we have little idea about what else predict heterogeneity. Second, our
approach is valid in high dimensional settings, allowing us to include a rich set of characteristics
in an unspecified functional form. Finally, using the CLAN estimation we are able to identify the
GENERIC ML FOR FEATURES OF HETEROGENOUS TREATMENT EFFECTS
23
characteristics of the most and least affected subpopulations, which could be an important input
for a welfare analysis or targeting households who are likely to benefit from access to microfinance.
We focus on heterogeneity in treatment effects on four household outcome variables, Y : the
amount of money borrowed, the output from self-employment activities, profit from self-employment
activities, and monthly consumption. The treatment variable, D, is an indicator for the household
residing in a treated village. The covariates, Z, include some baseline household characteristics
such as number of members, number of adults, head age, indicators for households doing animal husbandry, doing other non-agricultural activity, having an outstanding loan over the past 12
months, household spouse responded to the survey, another household member (excluding the
HH head) responded to the survey, and 81 village pair fixed effects (these are the variables that
are available for all households). We also include indicators for missing observation at baseline as
controls. Table 6 shows some descriptive statistics for the variables used in the analysis (all monetary variables are expressed in Moroccan Dirams, or MAD). Treated and control households have
similar characteristics and the unconditional average treatment effect on loans, output, profit and
consumption are respectively 1,128, 5,237, 1,844 and -31.
Table 1. Descriptive Statistics of Households
All
Treated
Control
Outcome Variables
Total Amount of Loans
2,359
2,930
1,802
Total output from self-employment activities (past 12 months)
32,499
35,148
29,911
Total profit from self-employment activities (past 12 months)
10,102
11,035
9,191
Total monthly consumption
3,012
2,996
3,027
Number of Household Members
3.879
3.872
3.886
Number of Members 16 Years Old or Older
2.604
2.601
2.607
Head Age
35.976
35.937
36.014
Declared Animal Husbandry Self-employment Activity
0.415
0.426
0.404
Declared Non-agricultural Self-employment Activity
0.146
0.129
0.164
Borrowed from Any Source
0.210
0.224
0.196
Spouse of Head Responded to Self-employment Section
0.067
0.074
0.061
Member Responded to Self-employment Section
0.044
0.048
0.041
Baseline Covariates
We implement our methods using the algorithm described in Section 6.3. By design the propensity score p(Zi ) = 1/2 for all the households. Table 2 compares the four ML methods for producing
the proxy predictors S(Zi ) considered in Stage 1. We find that the Random Forest and Elastic Net
24
V. CHERNOZHUKOV, M. DEMIRER, E. DUFLO, I. FERNANDEZ-VAL
Table 2. Comparison of ML Methods: Microfinance Availability
Elastic Net
Boosting
Neural Network
Random Forest
2,808,960
2,086,256
2,464,276
2,706,767
875
421
630
1253
143,620,159
78,127,786
76,945,520
133,825,537
8,697
2,823
4,219
5,229
32,307,828
17,105,855
20,404,000
39,286,050
4,595
2,319
1,847
4,478
44,583
26,387
34,019
36,927
101
101
96
109
Amount of Loans
Best BLP (Λ)
Best GATES (Λ̄)
Output
Best BLP (Λ)
Best GATES (Λ̄)
Profit
Best BLP (Λ)
Best GATES (Λ̄)
Consumption
Best BLP (Λ)
Best GATES (Λ̄)
Notes: Medians over 100 splits in half.
outperform the Boosted Tree and Neural Network across all outcome variables for both metrics.
Accordingly, we focus on these two methods for the rest of the analysis.10
Table 3 presents results of the BLP of CATE using the ML proxies S(Z) for the four outcome
variables. We report estimates of the coefficients β1 and β2 , which correspond to the ATE and
heterogeneity loading (HET) parameters in the BLP, respectively. In parentheses, we report confidence intervals adjusted for variability across the sample splits using the median method; and
in brackets, we report adjusted p-values. The estimated ATEs of microfinance availability are consistent with the findings of [24] and are similar to the unconditional ATE, as expected by virtue
of the randomization. The ATE on the amount of loans and output are positive and statistically
significant at least at the 10% level with both ML methods. Microfinance availability does not have
a significant impact on profit and consumption.
Turning to the heterogeneity results, we reject the hypothesis that HET is zero at the 10% level
for the amount of loans, output and profit with the elastic net method, suggesting the presence
of heterogeneity in the effect of microfinance availability. The results are consistent across both
ML methods except for output, for which HET coefficient on the Random Forest proxy is not significantly different from zero at the 10%. Finally, the BLP analysis does not reveal any significant
heterogeneity in the effect on consumption. Overall, these results suggest that microfinance availability has heterogenous impacts on business-related outcomes that does not seem to translate into
10The results obtained using Boosted Tree and Neural Network are similar to the results reported, but they are slightly
less precise. These results are not reported but are available from the authors upon requests.
GENERIC ML FOR FEATURES OF HETEROGENOUS TREATMENT EFFECTS
25
Table 3. BLP of Microfinance Availability
Elastic Net
Amount of Loans
Output
Profit
Consumption
Random Forest
ATE (β1 )
HET (β2 )
ATE (β1 )
HET (β2 )
1,163
0.238
1,185
0.375
(544,1736)
(0.021,0.448)
(561,1771)
(0.028,0.774)
[0.000]
[0.060]
[0.000]
[0.069]
5,095
0.262
5,027
0.192
(232,10033)
(0.085,0.433)
(-89,10194)
(-0.100,0.508)
[0.079]
[0.008]
[0.109]
[0.391]
1,553
0.244
1,603
0.279
(-1344,4389)
(0.079,0.416)
(-1276,4536)
(0.046,0.518)
[0.584]
[0.008]
[0.521]
[0.039]
-59.1
0.157
-58.6
0.196
(-161.5,44.2)
(-0.058,0.385)
(-166.6, 43.3)
(-0.160,0.574)
[0.514]
[0.278]
[0.508]
[0.553]
Notes: Medians over 100 splits. 90% confidence interval in parenthesis.
P-values for the hypothesis that the parameter is equal to zero in brackets.
a detectable contemporaneous effect on the standard of living as represented by consumption, even
for the most positively affected households.
We next estimate the GATES. We divide the households into K = 5 groups based on the quintiles
of the ML proxy predictor S(Z) and estimate the average effect for each group. Figures 3-6 present
the estimated GATES coefficients γ1 − γ5 along with joint confidence bands. We also report the
ATE and its confidence interval that were obtained in the BLP analysis for comparison. The GATES
provide a richer understanding of the heterogeneity. In particular, the figures reveal that there are
groups of winners, the most affected groups, for which the GATES on amount of loans, output
and profit are significantly different from zero. These groups are likely to drive the heterogeneity
in the treatment effect that we find in the BLP analysis. We further investigate the GATES by
comparing the most and least affected groups in Table 4. Here we find that the difference of GATES
of these two groups is significantly different from zero at least at the 10% level on amount of loans,
level on output and profit, whereas we fail to reject the hypothesis that this difference is zero at
conventional levels on consumption. Looking at the least affected group, it is reassuring to see that
we have no evidence of negative impact on profit and income, mitigating the concerns that there are
adversely affected households. However, there is negative and insignificant effect on consumption
for the same group. A possible explanation for this result is that investment is lumpy and some
households cut back consumption to increase investment. All the results for the GATES are fairly
robust to the ML method.
26
V. CHERNOZHUKOV, M. DEMIRER, E. DUFLO, I. FERNANDEZ-VAL
Table 4. GATES of 20% Most and Least Affected Groups
Elastic Net
Amount of Loans
Output
Profit
Consumption
Random Forest
20% Most
(γ5 )
20% Least
(γ1 )
Difference
(γ5 − γ1 )
20% Most
(γ5
20% Least
(γ1 )
Difference
(γ5 − γ1 )
2,677
-197
2,995
2,870
94.707
2,814
(1298,4076)
(-1835,1307)
(945,5103)
(1149,4587)
(-1663,1723)
(503,5193)
[0.000]
[1.000]
[0.008]
[0.002]
[1.000]
[0.032]
22,367
-3,039
25,088
21,606
626
21,035
(7678,36920)
(-12546,6535)
(7028,42698)
(5862,38022)
(-11871,13529)
(125,43170)
[0.007]
[1.000]
[0.015]
[0.015]
[1.000]
[0.097]
10,644
-1,152.242
11,768
11,540
-2,031
14,037
(2146,19096)
(-7250,4952)
(1077,22422)
(2965,20955.576)
(-8721,4796)
(2459,25833)
[0.028]
[1.000]
[0.061]
[0.014]
[1.000]
[0.037]
66.4
-333
383
62
-300
332
(-166.2,289.8)
(-695.6,23.2)
(-38.0,805.6)
(-271,346)
(-683,66)
(-196,835)
[1.000]
[0.140]
[0.152]
[1.000]
[0.228]
[0.429]
Notes: Medians over 100 splits. 90% confidence interval in parenthesis.
P-values for the hypothesis that the parameter is equal to zero in brackets.
We conclude by looking at the average characteristics of the most and least affected groups to
understand what generates heterogeneity in the treatment effects. We omit the results for consumption as we do not detect heterogeneity for this outcome. We focus on three characteristics in
this analysis: Age of household head, non-agricultural self-employment activity and whether the
household borrowed from any source. Table 5 reports the CLAN for the 10% least and most affected
groups defined by the deciles of the CATE proxy S(Z) as well as the difference between the two.
We find households with young heads, non-agriculture self-employment and that borrowed less
from any source are likely to borrow more from the microfinance institution, suggesting that formal loans are substitutes rather than complements. For output only the average self-employment
sector indicator is found to be significantly different between the most and least affected groups. Finally, the estimates for profit are similar to the estimates of amount of loans. It is important to note
that the significance of some of these differences is sensitive to the ML method used to generate
the proxy predictors, while the sign of the differences is robust.
6.2. Gender Wage Gap in the U.S.. We consider an application to the gender wage gap using
data from the U.S. March Supplement of the Current Population Survey (CPS) in 2015. We select
white, non-hispanic individuals who are aged 25 to 64 years and work more than 35 hours per week
during at least 50 weeks of the year. We exclude self-employed workers; individuals living in group
quarters; individuals in the military, agricultural or private household sectors; individuals with
inconsistent reports on earnings and employment status; individuals with allocated or missing
GENERIC ML FOR FEATURES OF HETEROGENOUS TREATMENT EFFECTS
27
Table 5. CLAN of Microfinance Availability
Elastic Net
Random Forest
10% Most
(δ10 )
10% Least
(δ1 )
Difference
(δ10 − δ1 )
10% Most
(δ10 )
10% Least
(δ1 )
Difference
(δ10 − δ1 )
29.3
(26.3,32.4)
0.199
(0.159,0.238)
0.144
(0.099,0.189)
-
35.2
(32.2,38.2)
0.068
(0.030,0.108)
0.169
(0.124,0.212)
-
-6.6
(-10.9,-2.4)
[0.004]
0.123
(0.069,0.178)
[0.000]
-0.038
(-0.101,0.025)
[0.448]
23.0
(19.8,26.2)
0.134
(0.096,0.173)
0.109
(0.064,0.153)
-
33.8
(30.5,36.9)
0.118
(0.076,0.156)
0.217
(0.175,0.262)
-
-10.4
(-14.9,-6.0)
[0.000]
0.022
(-0.033,0.075)
[0.875]
-0.107
(-0.164,-0.050)
[0.001]
36.280
(33.4,39.1)
0.275
(0.233,0.315)
0.193
(0.142,0.241)
-
36.708
(33.6,39.6)
0.050
(0.007,0.093)
0.215
(0.167,0.262)
-
-0.896
(-5.242,3.432)
[1.000]
0.226
(0.169,0.285)
[0.000]
-0.033
(-0.102,0.034)
[0.687]
29.090
(25.8,32.3)
0.215
(0.172,0.257)
0.165
(0.121,0.208)
-
30.831
(27.5,34.1)
0.088
(0.045,0.129)
0.189
(0.146,0.234)
-
-1.925
(-6.648,2.799)
[0.849]
0.130
(0.070,0.190)
[0.000]
-0.024
(-0.086,0.039)
[0.895]
34.1
(31.2,37.0)
0.181
(0.140,0.222)
0.180
(0.130,0.230)
-
40.4
(37.5,43.4)
0.108
(0.068,0.149)
0.257
(0.207,0.307)
-
-6.5
(-10.7,-2.5)
[0.003]
0.082
(0.022,0.138)
[0.014]
-0.091
(-0.160,-0.022)
[0.020]
29.2
(25.7,32.6)
0.153
(0.113,0.192)
0.144
(0.098,0.190)
-
33.7
(30.390,37.108)
0.099
(0.058,0.139)
0.162
(0.122,0.206)
-
-5.8
(-10.566,-1.217)
[0.029]
0.051
(-0.003,0.105)
[0.129]
-0.032
(-0.095,0.029)
[0.578]
Amount of Loans
Head Age
Non-agricultural self-emp.
Borrowed from Any Source
Output
Head Age
Non-agricultural self-emp.
Borrowed from Any Source
Profit
Head Age
Non-agricultural self-emp.
Borrowed from Any Source
Notes: Medians over 100 splits. 90% confidence interval in parenthesis.
P-values for the hypothesis that the parameter is equal to zero in brackets.
information in any of the variables used in the analysis; and individuals with hourly wage rate
below $3. The resulting sample consists of 32, 523 workers including 18, 137 men and 14, 382 of
women.
We will estimate the BLP, GATES and CLAN of the conditional gender wage gap, i.e., the difference in the average wage between female and male workers with the same observable characteristics; see [18] for a recent survey on this topic. The outcome variable Y is the logarithm of
the hourly wage rate constructed as the ratio of the annual earnings to the total number of hours
worked, which is constructed in turn as the product of number of weeks worked and the usual
28
V. CHERNOZHUKOV, M. DEMIRER, E. DUFLO, I. FERNANDEZ-VAL
number of hours worked per week. The treatment D is an indicator for female worker, and the observable characteristics Z include 5 marital status indicators (widowed, divorced, separated, never
married, and married); 5 educational attainment indicators (less than high school graduate, high
school graduate, some college, college graduate, and advanced degree); 4 region indicators (midwest, south, west, and northeast); potential experience constructed as the maximum of age minus
years of schooling minus 7 and zero, i.e., experience = max(age − education − 7, 0); 5 occupation
indicators (management, professional and related; service; sales and office; natural resources, construction and maintenance; and production, transportation and material moving); and 12 industry
indicators (mining, quarrying, and oil and gas extraction; construction; manufacturing; wholesale
and retail trade; transportation and utilities; information; financial services; professional and business services; education and health services; leisure and hospitality; other services; and public
administration).11
Table 6. Descriptive Statistics of Workers
All
Women
Men
All
Women
Men
Log wage
3.16
3.02
3.26
O.manager
0.49
0.56
0.43
Female
0.44
1.00
0.00
O.service
0.09
0.10
0.09
MS.married
0.70
0.65
0.73
O.sales
0.22
0.30
0.16
MS.widowed
0.01
0.02
0.01
O.construction
0.09
0.01
0.15
MS.separated
0.02
0.02
0.01
O.production
0.11
0.04
0.17
MS.divorced
0.12
0.15
0.09
I.minery
0.03
0.01
0.04
MS.Nevermarried
0.16
0.16
0.16
I.construction
0.06
0.01
0.09
E.lhs
0.02
0.01
0.03
I.manufacture
0.13
0.08
0.18
E.hsg
0.25
0.21
0.28
I.retail
0.13
0.11
0.14
E.sc
0.28
0.30
0.27
I.transport
0.04
0.02
0.06
E.cg
0.28
0.29
0.27
I.information
0.02
0.02
0.03
E.ad
0.17
0.19
0.15
I.finance
0.08
0.10
0.07
R.northeast
0.26
0.26
0.26
I.professional
0.11
0.10
0.12
R.midwest
0.27
0.28
0.27
I.education
0.25
0.41
0.12
R.south
0.33
0.34
0.33
I.leisure
0.04
0.05
0.04
R.west
0.22
0.21
0.23
I.services
0.03
0.03
0.04
Experience
21.21
21.03
21.35
I.public
0.07
0.07
0.08
Source: March Supplement CPS 2015
Table 6 reports sample means of the variables used in the analysis. Working women are more
highly educated than working men, have about the same potential experience, and are less likely
to be married and more likely to be divorced. They work relatively more often in managerial and
sales occupations and in the industries providing education and health services. Working men
are relatively more likely to work in construction and production occupations within non-service
industries. The unconditional gender wage gap is 24%.
11The sample selection and variable construction is the same as in [20].
GENERIC ML FOR FEATURES OF HETEROGENOUS TREATMENT EFFECTS
29
In this application we do not observe the propensity scores. We estimate them from a large
sample of 129,983 workers from the U.S. March Supplement of the CPS pooling the years 2012 to
2017, excluding 2015, as described in Section 6.3. We ignore the sampling error in the estimated
propensity scores for the rest of the analysis because the sample size to estimate these scores is
much larger than the sample size to estimate the parameters of interest.
Table 7. Comparison of ML Methods
Elastic Net Boosting Neural Network Random Forest
Best BLP (Λ)
0.084
0.079
0.076
0.082
Best GATES (Λ̄)
0.060
0.058
0.058
0.059
Notes: Medians over 1,000 splits in half.
Table 7 compares the ML methods. In this case the elastic net comes out as the winner both
based on BLP and GATES targeting of CATE, followed closely by the random forest. As in the
previous section, we focus on these two ML methods for the rest of the analysis. Table 8 shows the
results for the BLP coefficients. The average conditional gender wage gap of −22% comes close to
the unconditional gap, but the slope of the BLP uncovers substantial heterogeneity across workers.
The estimates and joint confidence intervals for the GATES in Figure 7 confirm this finding. Here
we divide the sample in K = 5 groups defined by the quintiles of the CATE proxy S(Z) and show
that average conditional gender wage gap ranges from about −33% to −9% across the groups.
Table 9 compares the averages of the gender wage gap in the first (most affected) and fifth (least
affected) groups. We reject that the average gaps for the 20% most and least affected are equal at
any conventional level. The results for the BLP and GATES are robust to the ML method used in
Stage 1.
Table 8. BLP of Gender Wage Gap
Elastic Net
ATE (β1 )
HET (β2 )
Random Forest
ATE (β1 )
-0.229
0.726
-0.228
(-0.251,-0.207) (0.540,0.912) (-0.249,-0.207)
[0.000]
[0.000]
[0.000]
HET (β2 )
0.552
(0.409,0.694)
[0.000]
Notes: Medians over 1,000 splits. 90% confidence interval in parenthesis.
P-values for the hypothesis that the parameter is equal to zero in brackets.
Table 10 reports the results of a classification analysis where we divide the workers in K = 10
groups defined by the deciles of the CATE proxy S(Z) and compare the average characteristics of
30
V. CHERNOZHUKOV, M. DEMIRER, E. DUFLO, I. FERNANDEZ-VAL
Table 9. GATES of Gender Wage Gap
20% Least Affected 20% Most Affected Difference
Elastic Net
Random Forest
(γ5 )
(γ1 )
(γ5 − γ1 )
-0.088
-0.328
0.240
(-0.136,-0.040)
(-0.377,-0.279)
(0.171,0.308)
[0.001]
[0.000]
[0.000]
-0.095
-0.329
0.234
(-0.142,-0.048)
(-0.377,-0.280)
(0.166,0.301)
[0.000]
[0.000]
[0.000]
Notes: Medians over 1,000 splits. 90% confidence interval in parenthesis.
P-values for the hypothesis that the parameter is equal to zero in brackets.
the most and least affected group. This analysis reveals another dimension of the heterogeneity in
the gender wage gap by showing that the 10% most affected workers are more likely to have either
of the following characteristics relative to the 10% less affected workers on average: high wages,
high experience, not advanced degree, married, not divorced or never married. These differences
are robust to the two ML method. The elastic net and random forest, however, disagree in the
comparison of the averages of some of the education variables such as high school graduate and
some college. Due to this sensitivity, we recommend reporting results from at least the two best
ML methods. Overall, the heterogeneity patterns that we find are consistent with both glass ceiling
theories for the gender wage gap [3], and with heterogenous individual preferences where young,
single, and highly educated women are more career-oriented. [20] found similar patterns applying
semiparametric regression methods to the same data.
6.3. Implementation Algorithm. In this section we describe an algorithm based on the first identification strategy and provide some specific implementation details for the two empirical examples.
Algorithm 1 (Inference Algorithm). The inputs are given by the data on units i ∈ [N ] = {1, ..., N }.
Step 0. Fix the number of splits S and the significance level α, e.g. S = 100 and α = 0.05.
Step 1. Compute the propensity scores p(Zi ) for i ∈ [N ].
Step 2. Consider S splits in half of the indices i ∈ {1, ..., N } into the main sample, M , and the
auxiliary sample, A. Over each split s = 1, .., S, apply the following steps:
a. Tune and train each ML method separately to learn B(·) and S(·) using A. For each i ∈ M ,
compute the predicted baseline effect B(Zi ) and predicted treatment effect S(Zi ). If there is
zero variation in B(Zi ) and S(Zi ) add Gaussian noise with a variance of 0.1 to the proxies.
b. Estimate the BLP parameters by weighted OLS in M , i.e.,
Yi = α
b0 X1i + βb1 (Di − p(Zi )) + βb2 (Di − p(Zi ))(Si − EN,M Si ) + b
i , i ∈ M
GENERIC ML FOR FEATURES OF HETEROGENOUS TREATMENT EFFECTS
31
Table 10. CLAN of Gender Wage Gap
Elastic Net
Log Wage
Experience
Random Forest
10% Least
10% Most
Difference
10% Least
10% Most
Difference
(δ10 )
(δ1 )
(δ10 − δ1 )
(δ10 )
( δ1 )
(δ10 − δ1 )
2.949
(2.918,2.981)
-
3.436
(3.404,3.467)
-
-0.484
(-0.528,-0.440)
[0.000]
3.074
(3.043,3.106)
-
3.233
(3.201,3.264)
-
-0.157
(-0.201,-0.113)
[0.000]
12.902
25.664
-12.778
14.176
25.109
-10.893
(12.386,13.419) (25.14,26.187) (-13.513,-12.055) (13.666,14.687) (24.602,25.622) (-11.615,-10.176)
[0.000]
[0.000]
Less than H. School
0.039
(0.030,0.048)
-
0.023
(0.014,0.032)
-
0.017
(0.004,0.028)
[0.016]
0.025
(0.016,0.034)
-
0.039
(0.030,0.047)
-
-0.013
(-0.025,-0.001)
[0.078]
High School
0.246
(0.226,0.266)
-
0.167
(0.147,0.187)
-
0.080
(0.052,0.109)
[0.000]
0.162
(0.141,0.182)
-
0.268
(0.248,0.288)
-
-0.106
(-0.134,-0.078)
[0.000]
Some College
0.184
(0.166,0.201)
-
0.094
(0.076,0.110)
-
0.089
(0.066,0.112)
[0.000]
0.186
(0.166,0.206)
-
0.238
(0.217,0.258)
-
-0.050
(-0.079,-0.021)
[0.001]
College Graduate
0.326
(0.303,0.35)
-
0.570
(0.546,0.594)
-
-0.235
(-0.269,-0.202)
[0.000]
0.361
(0.337,0.384)
-
0.354
(0.33,0.377)
-
0.010
(-0.023,0.043)
[1.000]
Advanced Degree
0.201
(0.182,0.22)
-
0.135
(0.116,0.154)
-
0.066
(0.04,0.091)
[0.000]
0.259
(0.241,0.278)
-
0.096
(0.078,0.115)
-
0.164
(0.137,0.19)
[0.000]
Married
0.101
(0.088,0.114)
-
0.953
(0.94,0.966)
-
-0.851
(-0.869,-0.832)
[0.000]
0.359
(0.338,0.38)
-
0.861
(0.84,0.881)
-
-0.499
(-0.529,-0.47)
[0.000]
Widowed
0.010
(0.005,0.015)
-
0.008
(0.003,0.012)
-
0.003
(-0.004,0.009)
[0.728]
0.008
(0.004,0.013)
-
0.011
(0.006,0.016)
-
-0.002
(-0.009,0.005)
[0.981]
Divorced
0.092
(0.08,0.103)
-
0.019
(0.008,0.03)
-
0.072
(0.056,0.088)
[0.000]
0.095
(0.081,0.109)
-
0.083
(0.069,0.097)
-
0.012
(-0.008,0.031)
[0.478]
Separated
0.028
(0.021,0.035)
-
0.010
(0.003,0.017)
-
0.017
(0.008,0.027)
[0.001]
0.013
(0.006,0.019)
-
0.021
(0.014,0.027)
-
-0.008
(-0.017,0.001)
[0.170]
Nevermarried
0.764
(0.749,0.779)
-
0.003
(-0.011,0.018)
-
0.76
(0.738,0.781)
[0.000]
0.523
(0.505,0.541)
-
0.022
(0.004,0.04)
-
0.500
(0.474,0.526)
[0.000]
Notes: Medians over 1,000 splits. 90% confidence interval in parenthesis.
P-values for the hypothesis that the parameter is equal to zero in brackets.
0 , D − p(Z ), (D − p(Z ))(S − E
0
such that EN,M [w(Zi )b
i Xi ] = 0 for Xi = [X1i
i
i
i
i
i
N,M Si )] , where
w(Zi ) = {p(Zi )(1 − p(Zi ))}−1 and X1i includes a constant, B(Zi ) and S(Zi ).
32
V. CHERNOZHUKOV, M. DEMIRER, E. DUFLO, I. FERNANDEZ-VAL
c. Estimate the GATES parameters by weighted OLS in M , i.e.,
0
Yi = α
b X1i +
K
X
γ
bk · (Di − p(Zi )) · 1(Si ∈ Ik ) + νbi , i ∈ M,
k=1
0 , {(D − p(Z ))1(S ∈ I )}K ]0 , where w(Z ) =
such that EN,M [w(Zi )b
νi Wi ] = 0 for Wi = [Xi1
i
i
i
i
k k=1
{p(Zi )(1 − p(Zi ))}−1 , X1i includes a constant, B(Zi ) and S(Zi ), Ik = [`k−1 , `k ), and `k is the
(k/K)-quantile of {Si }i∈M .
d. Estimate the CLAN parameters in M by
δb1 = EN,M [g(Yi , Zi ) | Si ∈ I1 ]
and
δbK = EN,M [g(Yi , Zi ) | Si ∈ IK ],
where Ik = [`k−1 , `k ) and `k is the (k/K)-quantile of {Si }i∈M .
e. Compute the two performance measures for the ML methods
b = |βb2 |2 Var(S(Z))
d
Λ
K
X
b̄ = 1
γ
bk2 .
Λ
K
k=1
b̄ over the splits.
b and Λ
Step 3: Choose the best ML methods based on the medians of Λ
Step 4: Compute the estimates, (1 − α)-level conditional confidence intervals and conditional
p-values for all the parameters of interest. Monotonize the confidence intervals if needed. For
example, construct a (1 − α) joint confidence interval for the GATES as
{b
γk ± b
c(1 − α)b
σk , k = 1, . . . , K},
(6.1)
where b
c(1 − α) is a consistent estimator of the (1 − α)-quantile of maxk∈1,...,K |b
γk − γk |/b
σk and σ
bk
is the standard error of γ
bk conditional on the data split. Monotonize the band (6.1) with respect to
k using the rearrangement method of [19].
Step 5: Compute the adjusted (1 − 2α)-confidence intervals and adjusted p-values using the
VEIN methods described in Section 3.
Comment 6.1 (ML Methods). We consider four ML methods to estimate the proxy predictors:
elastic net, boosted trees, neural network with feature extraction, and random forest. The ML
methods are implemented in R using the package caret [39]. The names of the elastic net, boosted
tree, neural network with feature extraction, and random forest methods in caret are glmnet, gbm,
pcaNNet and rf, respectively. For each split of the data, we choose the tuning parameters separately
for B(z) and S(z) based on mean squared error estimates of repeated 2-fold cross-validation, except
for random forest, for which we use the default tuning parameters to reduce the computational
time.12 In tuning and training the ML methods we use only the auxiliary sample. In all the methods
we rescale the outcomes and covariates to be between 0 and 1 before training.
12We have the following tuning parameters for each method: Elastic Net: alpha (Mixing Percentage), lambda (Reg-
ularization Parameter), Boosted trees: n.trees (Number of Boosting Iterations), interaction.depth (Max Tree Depth),
shrinkage (Shrinkage), n.minobsinnode (Min. Terminal Node Size), size (Number of Hidden Units) , decay (Weight
Decay), mtry (Number of Randomly Selected Predictors).
GENERIC ML FOR FEATURES OF HETEROGENOUS TREATMENT EFFECTS
33
Comment 6.2 (Microfinance Application). We adopt two strategies to improve precision. First,
the linear projections of the BLP and GATES control for village pair fixed effects along with the
predicted baseline effect, B(z) and predicted treatment effect, S(z). Second, as suggested in Section
4, we use stratified sample splitting where the strata are village pairs. We cluster the standard errors
at the village level to account for potential correlated shocks within each village. All reported
results are medians over S = 100 splits and α = 0.05.
Comment 6.3 (Gender Wage Gap Application). We estimate the propensity scores using a neural
network with feature extraction from a large sample of 129,983 workers from the U.S. March Supplement of the CPS pooling the years 2012 to 2017, excluding 2015. We select the neural network
among elastic net, boosted tree, neural network, and random forest, and the tuning parameters by
repeated 2-fold cross validation on the mean squared error. To avoid tuning ML methods for each
data split separately, we tune ML methods by using 20% random extract from the 2012-2017 pooled
sample and use those tuning parameters for all splits. This allows us to use S = 1, 000 splits in this
empirical application. Finally, to reduce the disproportionate impact of extreme propensity score
weights we trimmed the predicted propensity scores between 0.01 and 0.99 in the main sample.
These dropped observations make up approximately 4% of the sample.
7. Concluding Remarks
We propose to focus inference on key features of heterogeneous effects in randomized experiments, and develop the corresponding methods. These key features include best linear predictors
of the effects and average effects sorted by groups, as well as average characteristics of most and
least affected units. Our new approach is valid in high dimensional settings, where the effects are
estimated by machine learning methods. The main advantage of our approach is its credibility: the
approach is agnostic about the properties of the machine learning estimators, and does not rely on
incredible or hard-to-verify assumptions. Estimation and inference relies on data splitting, where
the latter allows us to avoid overfitting and all kinds of non-regularities. Our inference quantifies uncertainty coming from both parameter estimation and the data splitting, and could be of
independent interest. Empirical applications illustrate the practical uses of the approach.
Appendix A. Proofs
Proof of Theorem 2.1. The subset of the the normal equations, which correspond to β1 and β2 , are
given by E[w(Z)(Y − α0 X1 − β 0 X2 )X2 ] = 0. Substituting Y = b0 (Z) + s0 (Z)D + U , and using the
definition X2 = X2 (Z, D) = [D − p(Z), (D − p(Z)(S − ES)]0 , that X1 = X1 (Z), and the law of
34
V. CHERNOZHUKOV, M. DEMIRER, E. DUFLO, I. FERNANDEZ-VAL
iterated expectations, we notice that:
E[w(Z)b0 (Z)X2 ] = E[w(Z)b0 (Z) E[X2 | Z]] = 0,
=0
E[w(Z)U X2 ] = E[w(Z) E[U | Z, D] X2 (Z, D)] = 0,
0
E[w(Z)X1 X2 ] = E[w(Z)X1 (Z) E[X2 (Z, D) | Z]] = 0.
=0
Hence the normal equations simplify to: E[w(Z)(s0 (Z)D − β 0 X2 )X2 ] = 0. Since
E[{D − p(Z)}{D − p(Z)} | Z] = p(Z)(1 − p(Z)) = w−1 (Z),
and S = S(Z), the components of X2 are orthogonal by the law of iterated expectations:
Ew(Z)(D − p(Z))(D − p(Z))(S − ES) = E(S − ES) = 0.
Hence the normal equations above further simplify to
E[w(Z){s0 (Z)D − β1 (D − p(Z))}(D − p(Z))] = 0,
E[w(Z){s0 (Z)D − β2 (D − p(Z))(S − ES)}(D − p(Z))(S − ES)] = 0.
Solving these equations and using the law of iterated expectations, we obtain
β1 =
Ew(Z)s0 (Z)w−1 (Z)
Ew(Z){s0 (Z)D(D − p(Z))}
=
= Es0 (Z),
Ew(Z)(D − p(Z))2
Ew(Z)w−1 (Z)
Ew(Z){s0 (Z)D(D − p(Z))(S − ES)}
Ew(Z)(D − p(Z))2 (S − ES)2
Ew(Z)s0 (Z)w−1 (Z)(S − ES)
=
= Cov(s0 (Z), S)/Var(S).
Ew(Z)w−1 (Z)(S − ES)2
The conclusion follows by noting that these coefficients also solve the normal equations
β2 =
E{[s0 (Z) − β1 − β2 (S − ES)][1, (S − ES)]0 } = 0,
which characterize the optimum in the problem of best linear approximation/prediction of s0 (Z)
using S.
Proof of Theorem 2.2. The normal equations defining β = (β10 , β20 ) are given by E[(Y H − µ0 X1 H −
β 0 X̃2 )X̃2 ] = 0. Substituting Y = b0 (Z) + s0 (Z)D + U , and using the definition X̃2 = X̃2 (Z) =
[1, (S(Z) − ES(Z))]0 , that X1 = X1 (Z), and the law of iterated expectations, we notice that:
E[b0 (Z)H X̃2 (Z)] = E[b0 (Z) E[H | Z] X̃2 (Z)] = 0,
=0
E[U H X̃2 (Z)] = E[E[U | Z, D] H(D, Z)X̃2 (Z)] = 0,
0
E[X1 (Z)H X̃2 (Z)] = E[X1 (Z) E[H | Z] X̃2 (Z)] = 0.
=0
Hence the normal equations simplify to:
E[(s0 (Z)DH − β 0 X̃2 )X̃2 ] = 0.
GENERIC ML FOR FEATURES OF HETEROGENOUS TREATMENT EFFECTS
35
Since 1 and S − ES are orthogonal, the normal equations above further simplify to
E{s0 (Z)DH − β1 } = 0,
E[{s0 (Z)DH − β2 (S − ES)}(S − ES)] = 0.
Using that
E[DH | Z] = [p(Z)(1 − p(Z))]/[p(Z)(1 − p(Z))] = 1,
S = S(Z), and the law of iterated expectations, the equations simplify to
E{s0 (Z) − β1 } = 0,
E{s0 (Z) − β2 (S − ES)}(S − ES) = 0.
These are normal equations that characterize the optimum in the problem of best linear approximation/prediction of s0 (Z) using S. Solving these equations gives the expressions for β1 and β2
stated in the theorem.
Proof of Theorem 2.3. The proof is similar to the proof of Theorem 2.1- 2.2. Moreover, since the
proofs for the two strategies are similar, we will only demonstrate the proof for the second strategy.
The subset of the normal equations, which correspond to γ = (γk )K
k=1 , are given by E[(Y H −
0
0
µ W̃1 − β W̃2 )W̃2 ] = 0. Substituting Y = b0 (Z) + s0 (Z)D + U , and using the definition W̃2 =
0
W̃2 (Z) = [1(S ∈ Ik )K
k=1 ] , that W̃1 = X1 (Z)H, and the law of iterated expectations, we notice that:
E[b0 (Z)H W̃2 (Z)] = E[b0 (Z) E[H | Z] W̃2 (Z)] = 0,
=0
E[U H W̃2 (Z)] = E[E[U | Z, D] H(D, Z)W̃2 (Z)] = 0,
0
E[W̃1 W̃2 (Z)] = E[X1 (Z) E[H | Z] W̃2 (Z)] = 0.
=0
Hence the normal equations simplify to:
E[{s0 (Z)DH − β 0 W̃2 }W̃2 ] = 0.
0
Since components of W̃2 = W̃2 (Z) = [1(Gk )K
k=1 ] are orthogonal, the normal equations above further simplify to
E[{s0 (Z)DH − γk 1(Gk )}1(Gk )] = 0.
Using that
E[DH | Z] = [p(Z){1 − p(Z)}]/[p(Z){1 − p(Z)}] = 1,
that S = S(Z), and the law of iterated expectations, the equations simplify to
E[{s0 (Z) − γk 1(Gk )}1(Gk )] = 0 ⇐⇒
γk = Es0 (Z)1(Gk )/E[1(Gk )] = E[s0 (Z) | Gk ].
36
V. CHERNOZHUKOV, M. DEMIRER, E. DUFLO, I. FERNANDEZ-VAL
Proof of Theorem 3.1. We have that p.5 6 α/2 is equivalent to EP [1(pA 6 α/2) | Data] > 1/2. So
PP [p.5 6 α/2] = EP 1{EP [1(pA 6 α/2) | Data] > 1/2}.
By Markov inequality,
EP 1{EP [1(pA 6 α/2) | Data] > 1/2} 6 2PP [pA 6 α/2]
Moreover,
PP (pA 6 α/2) 6 EP [PP [pA 6 α/2 | DataA ∈ A] + γ] 6 α/2 + δ + γ.
Proof of Theorem 3.2. To show the second claim, we note that
PP (θA 6∈ CI) = PP (pl (θA ) 6 α/2) + PP (pu (θA ) 6 α/2)
6 α + δ + γ + α + δ + γ,
where the inequality holds by Theorem 3.1 on the p-values. The last bound is upper bounded by
2α + o(1) by the regularity condition PV for the p-values, uniformly in P ∈ P.
To show the first claim, we need to show the following inequalities:
sup{θ ∈ R : pu (θ) > α/2} 6 u,
inf{θ ∈ R : pl (θ) > α/2} > l.
We demonstrate the first inequality, and the second follows similarly.
We have that
−1 b
(θA − θ)} | Data] > α/2}
σA
{θ ∈ R : pu (θ) > α/2} = {θ ∈ R : Med[Φ{b
−1 b
= {θ ∈ R : Φ{Med[b
(θA − θ) | Data]} > α/2}
σA
−1 b
= {θ ∈ R : Med[b
(θA − θ) | Data] > Φ−1 (α/2)}
σA
−1
(θ − θbA ) | Data] < Φ−1 (1 − α/2)}
= {θ ∈ R : Med[b
σA
(
"
#
)
θ − θbA
−1
=
θ ∈ R : Med
− Φ (1 − α/2) | Data < 0 ,
σ
bA
where we have used the equivariance of Med and Med to monotone transformations, implied from
their definition. We claim that by the definition of
u := Med[θbA + σ
bA Φ−1 (1 − α/2) | Data],
we have
"
#
u − θbA
−1
Med
− Φ (1 − α/2) | Data > 0.
σ
bA
Indeed, by the definition of u we have that
E 1(u − θbA − σ
bA Φ−1 (1 − α/2) > 0) | Data > 1/2.
GENERIC ML FOR FEATURES OF HETEROGENOUS TREATMENT EFFECTS
37
Since σ
bA > 0 by assumption we have
1(u − θbA − σ
bA Φ
−1
(1 − α/2) > 0) = 1
!
u − θbA
−1
− Φ (1 − α/2) > 0 ,
σ
bA
and it follows that
P
u − θb
A
σ
bA
− Φ−1 (1 − α/2) > 0 | Data > 1/2.
The claimed inequality sup{θ ∈ R : pu (θ) > α/2} 6 u follows.
Appendix B. A Lemma on Uniform in P Conditional Inference
Lemma B.1. Fix positive constants c and C, and a small constant δ > 0. Let Ỹ and X denote generic
outcome and generic d-vector of regressors, whose use and definition may differ in different places of the
paper. Assume that for each P ∈ P, EP |Ỹ |4+δ < C and let 0 < w 6 w(Z) 6 w < ∞ denote the generic
weights, and that {(Ỹi , Zi , Di )}N
i=1 are i.i.d. copies of (Ỹ , Z, D). Let {DataA ∈ AN } be the event such
that the ML algorithm, operating only on DataA , produces a vector XA = X(Z, D; DataA ) that obeys, for
A = Ỹ − X 0 βA defined by: EP [A w(Z)XA | DataA ] = 0, the following inequalities, uniformly in P ∈ P
0
0
EP [kXA k4+δ | DataA ] 6 C, mineig EP [XA XA
| DataA ] > c, mineig EP [2A XA XA
| DataA ] > c.
Suppose that PP {DataA ∈ AN } > 1 − γ → 1 uniformly in P ∈ P, as N → ∞. Let βbA be defined by:
EN,M [w(Z)XAb
A ] = 0,
b
A = YA − X 0 βbA .
0 −1 be an estimator of
0 (E
0 )−1 E
2A XA XA
Let VbN,A := (EN,M XA XA
N,M XA XA )
N,M b
0
0
0
VN,A = (EP [XA XA
| DataA ])−1 EP [2A XA XA
| DataA ](EP [XA XA
| DataA ])−1 .
Then for any convex set R in Rd , we have that uniformly in P ∈ P:
−1/2
PP [VbN,A (βbA − βA ) ∈ R | DataA ] →P P(N (0, I) ∈ R),
−1/2
PP [VbN,A (βbA − βA ) ∈ R | {DataA ∈ AN }] → P(N (0, I) ∈ R),
and the same results hold with VbN,A replaced by VN,A .
Proof. It suffices to demonstrate the argument for an arbitrary sequence {Pn } in P. Let z 7→
X̃A,N (z) be a deterministic map such that the following inequalities hold, for ẽA defined by
EPn [ẽA w(Z)X̃A,N (Z)] = 0
and X̃A = X̃A (Z):
0
0
EPn [kX̃A,N k4 ] < C, mineig EPn [X̃A,N X̃A,N
] > c, mineig EPn [ẽ2A X̃A,N X̃A,N
] > c.
Let d := dim βA . Then we have that (abusing notation):
BN := sup
sup
X̃A,N h∈BL1
(Rd )
−1/2
|EPn h(ṼN,A (βbA − βA ) | X̃A,N ) − Eh(N (0, I))| → 0,
38
V. CHERNOZHUKOV, M. DEMIRER, E. DUFLO, I. FERNANDEZ-VAL
by the standard argument for asymptotic normality of the least squares estimator, which utilizes
the Lindeberg-Feller Central Limit Theorem. Here
0 −1
0
0 −1
) ,
(EX̃A X̃A
) E˜
2A X̃A X̃A
ṼN,A := (EX̃A X̃A
and BL1 (Rd ) denotes the set of Lipschitz maps h : Rd → [0, 1] with the Lipschitz coefficient
bounded by 1.
Then, for the stochastic sequence XA,N = XA,N (DataA ), we have
sup
h∈BL1
(Rd )
−1/2
|EPn [h(VN,A (βbA − βA )) | XA,N ] − E[h(N (0, I))]| 6 BN + 2(1 − 1{DataA ∈ AN }) →Pn 0.
1/2 −1/2
Since under the stated bounds on moments, VbN,A VN,A →Pn I by the standard argument for consistency of the Eicker-Huber-White sandwich, we further notice that
sup
h∈BL1 (Rd )
−1/2
−1/2
|EPn [h(VbN,A (βbA − βA )) | XA,N ] − EPn [h(VN,A (βbA − βA )) | XA,N ]|
−1/2 1/2
−1/2
6 EPn [kVbN,A VN,A − Ik ∧ 1 · kVN,A (βbA − βA )k ∧ 1 | XA,N ] →Pn E[0 ∧ 1 · kN (0, I)k ∧ 1] = 0,
in order to conclude that
sup
h∈BL1
(Rd )
−1/2
EPn [h(VbN,A (βbA − βA )) | XA,N ] − E[h(N (0, I))] →P 0.
−1/2
−1/2
Moreover, since EPn [h(VbN,A (βbA − βA )) | XA,N ] = EPn [h(VbN,A (βbA − βA )) | DataA ], the first
−1/2
conclusion follows: PPn [VbN,A (βbA − βA ) ∈ R | DataA ] →Pn P(N (0, I) ∈ R), by the conventional
smoothing argument (where we approximate the indicator of a convex region by a smooth map
with finite Lipschitz coefficient). The second conclusion
−1/2
PPn [VbN,A (βbA − βA ) ∈ R | DataA ∈ AN ] → P(N (0, I) ∈ R)
follows from the first by
−1/2
PPn [VbN,A (βbA − βA ) ∈ R | DataA ∈ AN ] =
−1/2
= EPn [PPn [VbN,A (βbA − βA ) ∈ R | DataA ]1({DataA ∈ AN })/PPn {DataA ∈ AN }]
→ E[P(N (0, I) ∈ R) · 1],
using the definition of the weak convergence, implied by the convergence to the constants in probability.
GENERIC ML FOR FEATURES OF HETEROGENOUS TREATMENT EFFECTS
39
References
[1] Alberto Abadie. Semiparametric difference-in-differences estimators. The Review of Economic Studies, 72(1):1–19,
2005.
[2] Alberto Abadie, Matthew M Chingos, and Martin R West. Endogenous stratification in randomized experiments.
Technical report, National Bureau of Economic Research, 2017.
[3] James Albrecht, Anders Bjorklund, and Susan Vroman. Is there a glass ceiling in sweden? Journal of Labor Economics,
21(1):145–177, 2003.
[4] Manuela Angelucci, Dean Karlan, and Jonathan Zinman. Microcredit impacts: Evidence from a randomized microcredit program placement experiment by compartamos banco. American Economic Journal: Applied Economics,
7(1):151–182, 2015.
[5] Susan Athey and Guido Imbens. Recursive partitioning for heterogeneous causal effects. Proceedings of the National
Academy of Sciences, 113(27):7353–7360, 2016.
[6] Susan Athey and Guido W Imbens. The econometrics of randomized experiments. Handbook of Economic Field Experiments, 1:73–140, 2017.
[7] Orazio Attanasio, Britta Augsburg, Ralph De Haas, Emla Fitzsimons, and Heike Harmgart. The impacts of microfinance: Evidence from joint-liability lending in mongolia. American Economic Journal: Applied Economics, 7(1):90–122,
2015.
[8] Britta Augsburg, Ralph De Haas, Heike Harmgart, and Costas Meghir. Microfinance, poverty and education. 2012.
[9] Abhijit Banerjee, Emily Breza, Esther Duflo, and Cynthia Kinnan. Do credit constraints limit entrepreneurship?
heterogeneity in the returns to microfinance. Evanston, USA: Department of Economics Northwestern University, 2015.
[10] Abhijit Banerjee, Esther Duflo, Rachel Glennerster, and Cynthia Kinnan. The miracle of microfinance? evidence
from a randomized evaluation. American Economic Journal: Applied Economics, 7(1):22–53, 2015.
[11] Abhijit Vinayak Banerjee. Microcredit under the microscope: what have we learned in the past two decades, and
what do we need to know? Annu. Rev. Econ., 5(1):487–519, 2013.
[12] G. Barnard. Discussion of “Cross-validatory choice and assessment of statistical predictions” by Stone. Journal of
the Royal Statistical Society. Series B (Methodological), page 133?135, 1974.
[13] A. Belloni, V. Chernozhukov, and C. Hansen. Inference on treatment effects after selection amongst highdimensional controls. Review of Economic Studies, 81:608–650, 2014.
[14] Alexandre Belloni, Victor Chernozhukov, and Kengo Kato. Uniform post selection inference for lad regression
models. arXiv preprint arXiv:1304.0282, 2013.
[15] Alexandre Belloni, Victor Chernozhukov, and Lie Wang. Pivotal estimation of nonparametric functions via squareroot lasso. arXiv preprint arXiv:1105.1475, 2011.
[16] Yoav Benjamini and Yosef Hochberg. Controlling the false discovery rate: a practical and powerful approach to
multiple testing. Journal of the royal statistical society. Series B (Methodological), pages 289–300, 1995.
[17] P. J. Bickel, Y. Ritov, and A. B. Tsybakov. Simultaneous analysis of Lasso and Dantzig selector. Annals of Statistics,
37(4):1705–1732, 2009.
[18] Francine D. Blau and Lawrence M. Kahn. The gender wage gap: Extent, trends, and explanations. Journal of Economic
Literature, 55(3):789–865, September 2017.
[19] V. Chernozhukov, I. Fernández-Val, and A. Galichon. Improving point and interval estimators of monotone functions by rearrangement. Biometrika, 96(3):559–575, 2009.
[20] V. Chernozhukov, I. Fernandez-Val, and Y. Luo. The Sorted Effects Method: Discovering Heterogeneous Effects
Beyond Their Averages. ArXiv e-prints, December 2015.
[21] Victor Chernozhukov, Denis Chetverikov, Mert Demirer, Esther Duflo, Christian Hansen, Whitney Newey, and
James Robins. Double/debiased machine learning for treatment and structural parameters. The Econometrics Journal, 2017.
40
V. CHERNOZHUKOV, M. DEMIRER, E. DUFLO, I. FERNANDEZ-VAL
[22] Victor Chernozhukov, Denis Chetverikov, and Kengo Kato. Anti-concentration and honest, adaptive confidence
bands. The Annals of Statistics, 42(5):1787–1818, 2014.
[23] DR Cox. A note on data-splitting for the evaluation of significance levels. Biometrika, 62(2):441–444, 1975.
[24] Bruno Crépon, Florencia Devoto, Esther Duflo, and William Parienté. Estimating the impact of microcredit on those
who take it up: Evidence from a randomized experiment in morocco. American Economic Journal: Applied Economics,
7(1):123–150, 2015.
[25] Jonathan Davis and Sara B Heller. Rethinking the benefits of youth employment programs: The heterogeneous
effects of summer jobs. Technical report, National Bureau of Economic Research, 2017.
[26] Ruben Dezeure, Peter Bühlmann, and Cun-Hui Zhang. High-dimensional simultaneous inference with the bootstrap. arXiv preprint arXiv:1606.03940, 2016.
[27] Esther Duflo, Rachel Glennerster, and Michael Kremer. Using randomization in development economics research:
A toolkit. Handbook of development economics, 4:3895–3962, 2007.
[28] Jerome Friedman, Trevor Hastie, and Robert Tibshirani. The elements of statistical learning, volume 1. Springer series
in statistics New York, 2001.
[29] Christopher Genovese and Larry Wasserman. Adaptive confidence bands. The Annals of Statistics, pages 875–905,
2008.
[30] Evarist Giné and Richard Nickl. Confidence bands in density estimation. The Annals of Statistics, 38(2):1122–1170,
2010.
[31] Christian Hansen, Damian Kozbur, and Sanjog Misra. Targeted undersmoothing. arXiv preprint arXiv:1706.07328,
2017.
[32] John A Hartigan. Using subsample values as typical values. Journal of the American Statistical Association,
64(328):1303–1317, 1969.
[33] Keisuke Hirano, Guido W. Imbens, and Geert Ridder. Efficient estimation of average treatment effects using the
estimated propensity score. Econometrica, 71(4):1161–1189, 2003.
[34] Kosuke Imai and Marc Ratkovic. Estimating treatment effect heterogeneity in randomized program evaluation. The
Annals of Applied Statistics, 7(1):443–470, 2013.
[35] Guido W Imbens and Donald B Rubin. Causal inference in statistics, social, and biomedical sciences. Cambridge University Press, 2015.
[36] Dean Karlan and Jonathan Zinman. Expanding credit access: Using randomized supply decisions to estimate the
impacts. The Review of Financial Studies, 23(1):433–464, 2009.
[37] Dean Karlan and Jonathan Zinman. Microcredit in theory and practice: Using randomized credit scoring for impact
evaluation. Science, 332(6035):1278–1284, 2011.
[38] Leslie Kish and Martin Richard Frankel. Inference from complex samples. Journal of the Royal Statistical Society. Series
B (Methodological), pages 1–37, 1974.
[39] Max Kuhn. Caret package. Journal of Statistical Software, 28(5):1–26, 2008.
[40] Guillaume Lecué and Charles Mitchell. Oracle inequalities for cross-validation type procedures. Electronic Journal
of Statistics, 6:1803–1837, 2012.
[41] Mark G Low et al. On nonparametric confidence intervals. The Annals of Statistics, 25(6):2547–2554, 1997.
[42] Nicolai Meinshausen, Lukas Meier, and Peter Bühlmann. P-values for high-dimensional regression. Journal of the
American Statistical Association, 104(488):1671–1681, 2009.
[43] Frederick Mosteller and John Wilder Tukey. Data analysis and regression: a second course in statistics. AddisonWesley Series in Behavioral Science: Quantitative Methods, 1977.
[44] Natalia Rigol, Reshmaan Hussam, and Benjamin Roth. Targeting high ability entrepreneurs using community information: Mechanism design in the field, 2016.
GENERIC ML FOR FEATURES OF HETEROGENOUS TREATMENT EFFECTS
41
[45] Alessandro Rinaldo, Larry Wasserman, Max G’Sell, Jing Lei, and Ryan Tibshirani. Bootstrapping and sample splitting for high-dimensional, assumption-free inference. arXiv preprint arXiv:1611.05401, 2016.
[46] Donald B Rubin. Estimating causal effects of treatments in randomized and nonrandomized studies. Journal of
educational Psychology, 66(5):688, 1974.
[47] Charles J. Stone. Optimal global rates of convergence for nonparametric regression. Ann. Statist., 10(4):1040–1053,
1982.
[48] Alessandro Tarozzi, Jaikishan Desai, and Kristin Johnson. The impacts of microcredit: Evidence from ethiopia.
American Economic Journal: Applied Economics, 7(1):54–89, 2015.
[49] Stefan Wager and Susan Athey. Estimation and inference of heterogeneous treatment effects using random forests.
Journal of the American Statistical Association, (just-accepted), 2017.
[50] Larry Wasserman. Machine learning overview. In Becker-Friedman Institute, Conference on ML in Economics, 2016.
[51] Larry Wasserman and Kathryn Roeder. High dimensional variable selection. Annals of statistics, 37(5A):2178, 2009.
[52] Marten Wegkamp et al. Model selection in nonparametric regression. The Annals of Statistics, 31(1):252–273, 2003.
[53] Qingyuan Zhao, Dylan S Small, and Ashkan Ertefaie. Selective inference for effect modification via the lasso. arXiv
preprint arXiv:1705.08020, 2017.
42
V. CHERNOZHUKOV, M. DEMIRER, E. DUFLO, I. FERNANDEZ-VAL
Elastic Net
Random Forest
ATE
90% CB(ATE)
ATE
90% CB(ATE)
GATES
90% CB(GATES)
GATES
90% CB(GATES)
1
2
4000
Treatment Effect
Treatment Effect
4000
2000
2000
0
0
−2000
−2000
1
2
3
4
5
Group by Het Score
3
4
5
Group by Het Score
Figure 3. GATES of Microfinance Availability: Amount of Loans. Point estimates
and 90% adjusted confidence intervals uniform across groups based on 100 random
splits in half
Elastic Net
40000
ATE
90% CB(ATE)
GATES
90% CB(GATES)
Random Forest
40000
90% CB(ATE)
GATES
90% CB(GATES)
1
2
Treatment Effect
20000
Treatment Effect
20000
ATE
0
0
−20000
−20000
1
2
3
Group by Het Score
4
5
3
4
Group by Het Score
Figure 4. GATES of Microfinance Availability: Output. Point estimates and 90%
adjusted confidence intervals uniform across groups based on 100 random splits in
half
5
GENERIC ML FOR FEATURES OF HETEROGENOUS TREATMENT EFFECTS
Elastic Net
ATE
90% CB(ATE)
GATES
90% CB(GATES)
Random Forest
20000
10000
Treatment Effect
Treatment Effect
20000
43
0
−10000
ATE
90% CB(ATE)
GATES
90% CB(GATES)
1
2
10000
0
−10000
1
2
3
4
5
3
Group by Het Score
4
5
Group by Het Score
Figure 5. GATES of Microfinance Availability: Profit. Point estimates and 90% adjusted confidence intervals uniform across groups based on 100 random splits in
half
Elastic Net
ATE
90% CB(ATE)
GATES
90% CB(GATES)
500
Treatment Effect
Treatment Effect
500
Random Forest
0
−500
ATE
90% CB(ATE)
GATES
90% CB(GATES)
1
2
0
−500
1
2
3
Group by Het Score
4
5
3
4
Group by Het Score
Figure 6. GATES of Microfinance Availability: Consumption. Point estimates and
90% adjusted confidence intervals uniform across groups based on 100 random
splits in half
5
44
V. CHERNOZHUKOV, M. DEMIRER, E. DUFLO, I. FERNANDEZ-VAL
Elastic Net
Random Forest
ATE
90% CB(ATE)
ATE
90% CB(ATE)
GATES
90% CB(GATES)
GATES
90% CB(GATES)
−0.1
Treatment Effect
Treatment Effect
−0.1
−0.2
−0.3
−0.2
−0.3
−0.4
−0.4
1
2
3
Group by Het Score
4
5
1
2
3
4
Group by Het Score
Figure 7. GATES of gender wage gap for K = 5 groups defined by the quintiles of
S(Z). Point estimates and 90% adjusted confidence intervals uniform across groups
based on 1,000 random splits in half
5
| 10math.ST
|
NUMERICAL STUDIES OF THOMPSON’S GROUP F AND RELATED
GROUPS
arXiv:1706.07571v1 [math.GR] 23 Jun 2017
ANDREW ELVEY PRICE AND ANTHONY J GUTTMANN
Abstract. We have developed polynomial-time algorithms to generate terms of the
cogrowth series for groups Z o Z, the lamplighter group, (Z o Z) o Z and the Navas-Brin
group B. We have also given an improved algorithm for the coefficients of Thompson’s
group F, giving 32 terms of the cogrowth series. We develop numerical techniques to
extract the asymptotics of these various cogrowth series. We present improved rigorous
lower bounds on the growth-rate of the cogrowth series for Thompson’s group F using
the method from [18] applied to our extended series. We also generalise their method by
showing that it applies to loops on any locally finite graph. Unfortunately, lower bounds
less than 16 do not help in determining amenability.
Again for Thompson’s group F we prove that, if the group is amenable, there cannot be
a sub-dominant stretched exponential term in the asymptotics1. Yet the numerical data
provides compelling evidence for the presence of such a term. This observation suggests
a potential path to a proof of non-amenability: If the universality class of the cogrowth
sequence can be determined rigorously, it will likely prove non-amenability.
We estimate the asymptotics of the cogrowth coefficients of F to be
cn ∼ c · µn · κn
σ
logδ n
· ng ,
where µ ≈ 15, κ ≈ 1/e, σ ≈ 1/2, δ ≈ 1/2, and g ≈ −1. The growth constant µ must
be 16 for amenability. These two approaches, plus a third based on extrapolating lower
bounds, support the conjecture [7, 18] that the group is not amenable.
1. Introduction
In an attempt to find compelling evidence for the amenability or otherwise of Thompson’s
group F , we have studied, numerically, the co-growth sequence of a number of infinite,
finitely generated amenable groups whose asymptotics are, in most cases, partially or fully
known. We have chosen a number of examples with increasingly complex asymptotics.
Using the experience and insights gained from these examples, we turn to a study of
Thompson’s group F , having first developed an improved algorithm for the generation of
the co-growth sequence, which we evaluate to O(x32 ).
The cogrowth series of a group G with finite, inverse closed, generating set S is
X
CG =
cn xn ,
n≥0
where cn is the number of words w of length 2n over the alphabet S, which satisfy w =G 1
i.e. w is the identity in the group G. There are many equivalent definitions of amenability.
A standard one is that a group G is amenable if it admits a left-invariant finitely additive
1
2
ANDREW ELVEY PRICE AND ANTHONY J GUTTMANN
probability measure µ. A consequence of the Grigorchuk-Cohen [11, 5] theorem is that G is
amenable if and only if the radius of convergence of CG is 1/|S|2 . In particular, Thompson’s
group F amenable if and only if its cogrowth sequence has exponential growth rate 16.
We have developed new, polynomial-time algorithms to generate coefficients for the
lamplighter group, and for general wreath product groups, Wd = Z od Z. We also give a
polynomial time algorithm for the cogrowth coefficients of the Navas-Brin group, and an
improved algorithm to generate the coefficients of Thompson’s group F, generating the
cogrowth sequences to O(x128 ) and O(x32 ) for B and F respectively.
The amenable group introduced independently by Navas [19] and Brin [4], which we call
the Navas-Brin group B, is a subgroup of Thompson’s group F , and is defined as an infinite
wreath product, with an extra generator which commutes each generator of the infinite
wreath product to the next one. It has 2 generators, so the growth rate of the cogrowth
sequence is 16. It also has a sub-exponential growth term that is very close to exponential,
and so makes the growth rate difficult to estimate accurately with the number of terms at
our disposal.
Using results of Pittet and Sallof-Coste [20, 21], we prove that the cogrowth coefficients
cn of Thompson’s group F satisfy
cn < 16n · λ−n
κ
for any real numbers κ < 1, and λ > 1. That is to say, if Thompson’s group F is amenable,
then its asymptotics cannot contain a stretched-exponential term1. Such a term is present
in the asymptotics of the lamplighter group L and the family of groups Wd . Furthermore,
our numerical study reveals compelling evidence for the presence of such a term in the
asymptotics of the coefficients of F. This is our first strong evidence that Thompson’s
group F is not amenable. Our second piece of evidence is the estimation of the growth
constant. For amenability, the growth constant must be 16. We find that it is very close
to 15.0 (we do not suggest it is exactly 15, but that is certainly a possibility).
Our numerical analysis relies on a number of methods that are well-known in the statistical mechanics and enumerative combinatorics community. Many are reviewed in [13] and
[16]. For studies of the cogrowth asymptotics we primarily rely on the behaviour of the
ratio of successive coefficients, as irrespective of the sub-dominant asymptotics, this ratio
must go to the growth constant in the limit as the order of the coefficients goes to infinity.
One new technique that we make use of in our study of the groups B and F is that of
series extension [15]. In the case of group B, we have 128 exact coefficients, but predict a
further 590 ratios (and terms) with an estimated accuracy of, at worst, 1 part in 5 × 10−7 .
Having these extra (approximate) terms greatly improves the quality of the analysis we
can perform. Similarly, for group F, we use 32 exact terms to predict a further 200 ratios
1We define stretched exponential more broadly than usual. It normally refers to a term of the form e−tβ ,
β
δ
with t > 0 and 0 < β < 1. We allow behaviour such as e−t ·log t , or indeed any appropriate logarithmic
δ
term. We do not have a name for sub-exponential growth of the form e−t/ log t , with δ > 0 (or appropriate
logarithmic function) which is the type of term that must be present in the cogrowth series of the Navas-Brin
group, and indeed in Thompson’s group F if it were amenable.
NUMERICAL STUDIES OF THOMPSON’S GROUP F AND RELATED GROUPS
3
(and terms) with an estimated accuracy of 1 part in 4 × 10−5 . This level of accuracy is
more than sufficient for the graphical techniques we use to extract the asymptotics.
Another approach to estimating the growth rate was introduced by Haagerup, Haagerup
and Ramirez-Solano in [18] who proved that the cogrowth sequence of Thompson’s group
F is given by the moments of a probability measure. We extend this to prove that this
observation applies to the cogrowth sequence of any Cayley graph. In this way a sequence
of rigorous lower bounds to the growth constant of the cogrowth series can be constructed.
This approach also gives some stronger, non-rigorous, pseudo-bounds. Further details of
this method, and some results, are given in section 4.
The simplest examples of groups we have chosen have asymptotics of the form
cn ∼ c · µn · ng ,
where c is a constant, µ is the growth constant and g is an exponent.
The first example of such a group is Z2 , which is a particularly simple case as both
2
the coefficients and generating function
are exactly known. In fact cn = 2n
n , and the
√
generating function CZ2 = 2K 4 π x , where K is the complete elliptic integral of the first
kind.
The second example is the Heisenberg group, for which the asymptotic form of the
coefficents is known [10] to be cn ∼ 0.5 · 16n · n−2 , corresponding to a generating function
1
CHeisenberg ∼ (1 − 16x) log(1 − 16x).
2
We have calculated 90 terms of the generating function, and show that this is sufficient to
get a very precise asymptotic representation of the coefficients.
The next level of asymptotic complexity arises when there is an additional stretchedexponential term, so that the coefficients of the generating function behave as
σ
cn ∼ c · µn · κn · ng ,
where 0 < κ < 1, and 0 < σ < 1. There is no known simple expression for the corresponding
generating function in such cases2. The lamplighter group L is the wreath product of the
group of order two with the integers, L = Z2 o Z. The growth rate is known, µ = 9, and
from Theorem 3.5 of [21] it follows that σ = 1/3, and from [22] we know that the exponent
1/3
g = 1/6. So for the lamplighter group, cn ∼ c · 9n · κn · n1/6 . Methods to extract the
asymptotics from the coefficients have been developed, and are described in [14]. We give
a polynomial time algorithm to generate the coefficients, and use it to determine the first
201 coefficients, from which we are able to estimate the correct values of the parameters
µ, σ and g.
We next consider wreath products Wd = Z od Z. In that case the exponent of the
stretched-exponential term also includes a fractional power of a logarithm. Coefficients
of the generating function behave as given by Theorem 3.11 in [21], so that
σ
cn ∼ c · µn · κn
logδ n
· ng ,
2See, for example [14] for a discussion of this point, and further examples of such generating functions.
4
ANDREW ELVEY PRICE AND ANTHONY J GUTTMANN
where 0 < κ < 1, and 0 < σ, δ < 1.
For d = 1, one has µ = 16, σ = 1/3, δ = 2/3 and g is not known. For d = 2, one has,
again by Theorem 3.11 in [21], µ = 36, σ = 1/2 and δ = 1/2. For general d, µ = (2d)2 ,
σ = d/(d + 2), and δ = 2/(d + 2).
Note that this dimensional dependence of the exponent σ of the stretched-exponential
term appears to be a common feature among a broad class of problems. For example, if one
considers the problem of a self-avoiding walk attached to a surface at its origin (or a Dyck
path or a Motzkin path) and pushed toward the surface at its end-point (or its highest
vertex), then, as shown in [1] there is a stretched-exponential term in the asymptotics of
the coefficients, with exponent σ = 1/(1 + df ), where df is the fractal dimension of the
walk/path. Whether this dimensional dependence is in fact a ubiquitous feature of such
stretched-exponential terms remains an open question.
We have studied two examples, W1 = Z o Z and W2 = (Z o Z) o Z, based on the series we
have generated of 276 and 133 terms respectively. We find that the presence of the confluent
logarithmic term in the exponent makes the analysis significantly more difficult, but we
can nevertheless accurately estimate the growth constant µ and less precisely estimate the
sub-dominant growth rate κ and the exponents σ and δ. Our estimates of the exponent g
are not precise enough to be useful.
We then turn to a contrived example, a constructed series with the asymptotics of Wd =
Z od Z, with d = 98. As d increases, the exponent in the stretched-exponential term gets
closer to 1, and so this term behaves more and more like the dominant exponential growth
term µn . We show that estimating the correct growth constant even approximately requires
careful analysis, and appropriate techniques. This serves as a caution, and underlies that
our conclusions regarding the non-amenability of Thompson’s group F assumes the absence
of some unknown functional pathology.
Finally we study two groups whose behaviour is not fully known. The first is the NavasBrin group B. We give a polynomial-time algorithm to generate the coefficients, and in
this way generate the first 128 terms, then use these to estimate the next 590 ratios. This
group has a sub-exponential growth term that is very close to exponential, and so makes the
growth rate difficult to estimate accurately with the number of terms at our disposal. The
second is Thompson’s group F where we have 32 exactly known terms, and 200 estimated
ratios of terms.
The makeup of the paper is as follows. In Section 2 we describe the algorithms developed
for the cogrowth series of the lamplighter group L, W1 , W2 , B and Thompson’s group F.
In Section 3 we discuss the possible asymptotic form of the cogrowth series for Thompson’s
group F, and prove the absence of a stretched-exponential term. In Section 4 we develop
the idea that the cogrowth coefficients can be represented as the sequence of moments of
a probability measure. With this identification we establish rigorous lower-bounds on the
growth constant for Thompson’s group F. In Section 5 we analyse the series expansions
for the cogrowth series of all the groups we have mentioned above, apart from B and F.
Section 6 is devoted to a description of the method of series extension that we employ,
and in Sections 7 and 8 we use this method and the techniques discussed in the previous
NUMERICAL STUDIES OF THOMPSON’S GROUP F AND RELATED GROUPS
5
section to analyse the Navas-Brin group B and Thompson’s group F. Section 9 comprises
a discussion and conclusion.
2. Series generation
In this section we describe the algorithms we have used to compute the terms of the
cogrowth sequence of various groups. We start by describing polynomial time algorithms
which we have found and used for the groups L, W1 , W2 , and B. Finally we describe the
algorithm which we have used for Thompson’s group F . The first 50 coefficients for the
group B are given in Table 1, while the coefficients of the cogrowth series of F are given
in Table 2.
2.1. Wreath Products G o Z. Let G be a group with finite generating set S. We will
describe a polynomial time algorithm for computing the cogrowth series of G o Z, with
respect to the generating set {a} ∪ S, where a generates Z, given the corresponding series
for G. In particular, this give a polynomial time algorithm to compute the cogrowth of the
lamplighter group Z2 o Z as well as groups such as Z o Z and (Z o Z) o Z.
Let ak be the number of loops of length k in G. For example, if G = Z, then a2k = 2k
k
and a2k+1 = 0 for all k ∈ Z≥0 . Then for each positive integer n, define the generating
function Pn (x) by
∞
X
j+n−1
Pn (x) =
aj xj .
n−1
j=0
This is the generating function for n-tuples of words w1 , w2 , . . . , wn ∈ S ∗ such that w1 . . . wn =
1, counted by the length of the word w1 . . . wn .
Given a loop l in G o Z, we define the base loop l0 of l to be the loop in Z made up of
only the terms a and a−1 in l. For each positive integer i, let ci be the number of steps in
the baseloop l0 from ai−1 to ai (which is the same as the number of steps from ai to ai−1 )
and let di be the number of steps from a−i+1 to a−i . Let m and n be maximal such that
cm , dn > 0. Then the length of l0 is equal to
m
n
X
X
2ci +
2dj .
i=1
j=1
l0
Let = a1 a2 . . . a|l0 | and l = w1 a1 w2 . . . a|l0 | w|l0 |+1 , where each wi is a word in (S ∪ S −1 )∗ .
We say that the height of one of the subwords wi is equal to the integer p which satisfies
ap = a1 . . . ai . Then l is a loop if and only if for any height h, concatening all of the words
wi at height h creates a loop in G. Hence the generating function for the sections at height
h is Pr (x) where r is the number of these sections. If h > 0 then r = ch + ch+1 , if h < 0
then r = d−h + d−h+1 and if h = 0 then r = c1 + d1 + 1. Hence, by considering the sections
of l at each height separately, we see that the generating function for loops l with base loop
l0 is equal to
(1)
0
x|l | Pdn (x)Pcm (x)Pc1 +d1 +1 (x)
m−1
Y
i=1
Pci +ci+1 (x)
n−1
Y
j=1
Pdj +dj+1 (x),
6
ANDREW ELVEY PRICE AND ANTHONY J GUTTMANN
assuming that m, n ≥ 1. Similarly, if m = 0 and n ≥ 1, the generating function is
|l0 |
x Pdn (x)Pd1 +1 (x)
n−1
Y
Pdj +dj+1 (x).
j=1
If n = 0 and m ≥ 1, the generating function is
0
x|l | Pcm (x)Pc1 +1 (x)
m−1
Y
Pci +ci+1 (x).
i=1
Finally, if m = 0 and n = 0, then the generating function is P1 (x). So we now need to sum
this over all possible base loops l0 .
For a given pair of sequences c1 , . . . , cm , d1 , . . . , dn , the number of such base loops is
equal to
(2)
m−1
n−1
c1 + d1 Y ci + ci+1 − 1 Y dj + dj+1 − 1
.
c1
ci − 1
dj − 1
i=1
j=1
This is because from each vertex i > 0 we can choose the order of the outgoing steps, except
that the last one must be a left step, and there are ci − 1 other left steps and ci+1 right
i+1 −1
steps. Hence there are ci +c
possible orders of the steps leaving any vertex i > 0, and
ci −1
dj +dj+1 −1
similarly
possible orders of the steps leaving any vertex −j for j > 0. Finally,
dj −1
c1 +d1
there are c1
possible orders of the steps leaving the vertex 0. It is easy to see that for
any possible choice of these orders there is exactly one corresponding base loop l0 .
Now using (1) and (7) it follows that for any pair of sequences c1 , . . . , cm , d1 , . . . , dn ,
with m, n ≥ 1, the generating function for the corresponding loops l in G o Z is equal to
(3)
x2c1 +2d1
m−1
n−1
c + d
c + c
d + d
Y
Y
1
1
i
i+1 − 1
j
j+1 − 1
Pdn Pcm Pc1 +d1 +1
x2ci+1
x2dj+1
Pci +ci+1
Pdj +dj+1 .
c1
ci − 1
dj − 1
i=1
j=1
If m = 0 and n ≥ 1, the generating function is
(4)
x
2d1
Pdn Pd1 +1
n−1
Y
x
2dj+1
j=1
dj + dj+1 − 1
Pdj +dj+1 .
dj − 1
If m ≥ 1 and n = 0 we get a similar generating function, and if m = n = 0 we get P1 (x).
To calculate these we define some new power series Ωd (x) by
Ωd (x) =
X
Pdn
n−1
Y
j=1
x
2dj+1
dj + dj+1 − 1
Pdj +dj+1 (x),
dj − 1
where the sum is over all sequences n, d1 , d2 , . . . , dn with d1 = d. Then it follows immediately from (3) and (4) that the generating function F for the cogrowth series series of G o Z
NUMERICAL STUDIES OF THOMPSON’S GROUP F AND RELATED GROUPS
is given by
(5)
F (x) =
∞
X
c,d=1
7
!
∞
X
2c+2d c + d
2d
Pc+d+1 (x)Ωd (x)Ωc (x) + 2
x
x Pd (x)Ωd (x) + P1 (x).
c
d=1
So now we just need to calculate Ωd (x) for each positive integer d. First, the contribution
to Ωd from the case where n = 1 is Pdn = Pd1 = Pd . The contribution from the case where
n = 1 and d2 = b for some fixed positive integer b is
d+b−1
x2b
Pd+b (x)Ωb (x).
d−1
Hence, we have the equation
(6)
Ωd (x) = Pd (x) +
∞
X
b=1
b+d−1
x
Pb+d (x)Ωb (x).
d−1
2b
Using this equation we can calculate the coefficient of xk in Ωd of x in terms of coefficients
of xj in Ωb (x) where we only need to consider j, b satisfying 2b + j ≤ k (hence j ≤ k − 2).
This takes polynomial time using a simple dynamic program.
2.2. The Navas-Brin group B. In this section we adapt the previous algorithm to calculate the cogrowth series for the Navas-Brin group B. Again this is a polynomial time
algorithm, however the polynomial has higher degree than the one for the previous section.
The group B is defined as the semi-direct product
(. . . o Z o Z o Z o Z o . . .) o Z,
where the copies of Z in the wreath product are generated by . . . , a2 , a1 , a0 , a−1 , a−2 , . . .
and the generator t of the other copy of Z satisfies tai t−1 = ai+1 for each i. Note that
the group B is generated by the two elements t and a = a0 . The group B was described
independently in [19] and on page 638 in [4], where Brin showed that is an amenable
supgroup of Thompson’s group F . In that paper it is the group generated by f and h.
We define the t-height of a word over the generating set {a, t, a−1 , t−1 } to be the sum
of the powers of t. Before counting the total number of loops, we will count the number
of loops where any initial subword has non-negative height. Let G(x, y) be the generating
function for these, where x counts the total length and y counts the number of steps of
the loop which end at height 0. For each positive integer n, let Hn (x, y) be the generating
function for n-tuples w1 , w2 , . . . , wn of words in {a, a−1 , t, t−1 }∗ which each end at height 0
and which have no a or a−1 steps at height 0, such that w1 . . . wn = 1. In this generating
function, x counts the total length of w1 . . . wn and y counts the total number of steps
which end at height 0. Given such a loop l, let the baseloop l0 be the subword consisting
of all a and a−1 steps at t-height 0. Similarly to the previous algorithm, we let ci be the
number of steps in l0 from ai−1 to ai , and di be the number of steps in l0 from a−i+1 to
8
ANDREW ELVEY PRICE AND ANTHONY J GUTTMANN
a−i . Then the length |l0 | of l0 is equal to
m
X
2ci +
i=1
n
X
2dj .
j=1
As in the previous subsection, for a given pair of sequences c1 , . . . , cm , d1 , . . . , dn , the number of such base loops is equal to
m−1
n−1
c1 + d1 Y ci + ci+1 − 1 Y dj + dj+1 − 1
(7)
.
c1
ci − 1
dj − 1
i=1
j=1
Let l0 = a1 a2 . . . a|l0 | , where each ai ∈ {a, a−1 }, and let l = w1 a1 w2 . . . a|l0 | w|l0 |+1 be the
decomposition where each step ai is at t-height 0. We say that the a-height of one of the
subwords wi is equal to the integer p which satisfies ap = a1 . . . ai . Then l is a loop if and
only if for any height h, concatenating all of the words wi at a-height h creates a loop.
Note that each word wi must have height 0 and have no a or a−1 steps at height 0. As in
the previous section we define another generating function Λd (x, y) by
n−1
Y
X
2dj+1 2dj+1 dj + dj+1 − 1
Λd (x, y) =
Hdn
x
y
Hdj +dj+1 (x),
dj − 1
j=1
where the sum is over all sequences n, d1 , d2 , . . . , dn with d1 = d. In the same way as in
the previous section we get the following equations, which are essentially the same as (5)
and (6).
G(x, y) =
∞
X
c,d=1
∞
X
+2
2c+2d 2c+2d
x
y
c+d
Hc+d+1 (x, y)Λd (x, y)Λc (x, y)
c
x2d y 2d Hd (x, y)Λd (x, y)
d=1
(8)
(9)
+H1 (x, y).
Λd (x) = Hd (x, y) +
∞
X
b=1
2b 2b
x y
b+d−1
Hb+d (x, y)Λb (x).
d−1
So now to calculate G(x, y), we just need to calculate the generating functions Hn (x, y).
For each k ∈ Z≥0 , let Jk (x) be the generating function for loops in B which have exactly
k steps which end at t-height 0, none of which are a or a−1 steps, and which never go
below height 0. For each such word w, the number of ways of breaking it into n words
w1 , w2 , . . . , wn where each ends at height 0, such that w1 . . . wn = w is equal to
k+n−1
.
n−1
NUMERICAL STUDIES OF THOMPSON’S GROUP F AND RELATED GROUPS
9
Therefore, we can calculate each generating function Hn (x, y) in terms of the generating
functions Jk (x) as follows:
∞
X
k k+n−1
(10)
Hn (x, y) =
Jk (x).
y
n−1
k=0
Finally, we will calculate the generating functions Jk (x). Trivially we have J0 (x) = 1.
For k > 0, let l be a loop counted by Jk (x). Then l must contain exactly k steps which end
at height 0, which are not a or a−1 steps. Hence they must all be t−1 steps. Therefore, l
decomposes as
l = tu1 t−1 tu2 t−1 . . . tuk t−1 ,
where each word uk ends at height 0 and never goes below height 0. Moreover, since l
is a loop, we must have u1 . . . uk = 1. Hence the word u = u1 . . . uk is counted by the
generating function G(x, y). Moreover, if u contains m steps which end at height 0, then
there are exactly
m+k−1
k−1
ways to decompose u into subwords u1 , . . . , uk which each end at height 0. Hence we get
the equation
∞
X
2k m + k − 1
(11)
Jk (x) =
x
[y m ]G(x, y).
k−1
m=0
Now using equations (8), (9), (10) and (11) as well as the base case J0 (x) = 1, we can
calculate the coefficients of G(x, y) in polynomial time using a dynamic program. Finally
we need to relate these coefficients to the total number of loops in B. We claim that for
each n, the number of loops bn of length n in B over the generating set {a, t, a−1 , t−1 } is
equal to
∞
X
n m n
[y ][x ]G(x, y).
bn =
m
m=0
The reason for this is that the contribution to both sides of the equation from any set
of n loops which are cyclic permutations of each other is the same. That is, if we take
n loops xi . . . xn x1 . . . xi−1 for 1 ≤ i ≤ n, and m of these are counted by G(x, y), then
they will each contribute xn y m to G(x, y), so altogether these will contribute n to both
sides of the equation. If two or more of these loops are identical, then we must have
x1 . . . xn = (x1 . . . xp )q for some p, q satisfying pq = n. In this case, assuming that q is
maximal, the contribution to each side is n/q instead of n, since we overcounted by a
factor of q.
Using the last equation we can quickly calculate the coefficients of the cogrowth generating function CB (x) using those of G(x, y). In Table 1 we give the first 50 coefficients of
this generating function. In fact we have 128 terms.
10
ANDREW ELVEY PRICE AND ANTHONY J GUTTMANN
1
4
28
232
2092
19864
195352
1970896
20275692
211825600
2240855128
23952786400
258287602744
2806152315048
30686462795856
337490492639512
3730522624066540
41422293291178872
461802091590831904
5167329622166765872
58012358366319158872
653272479274904359312
7376993667962247094112
83518163933592420945440
947797532286760923097848
10779770914124700529470264
122856228305621394118000520
1402877847412263986004347872
16048147989560391552043686160
183892883412730524613883088808
2110556326150834244975990231512
24259510831181186885644198829344
279244563297679787781517160899820
3218641495385722409923501191862264
37146337262307758446419466115479416
429227600058421313330040967935014416
4965493663308539362541734301378311648
57506535582014868288482236767840209688
666700108804771886996957763509359246064
7737176908622194648339548498436658811432
89878279784970230837678375953110478795352
1045033044367535197025078407316665177933928
12161645115366917947524997117208173413019632
141653302005285175865456465524239660635389712
1651274058730064356309776255817393993665780288
19264448513399180870635082273788105896265150480
224919270246185854430934219198103161122414157760
2627954546552385827255336138747466100454012242528
30726935577139566309665785537931570627782996384120
359517978960007312327796870699755173605904761839752
Table 1. The first 50 coefficients of the cogrowth series for the Navas-Brin
group B.
NUMERICAL STUDIES OF THOMPSON’S GROUP F AND RELATED GROUPS
11
2.3. A General Algorithm. Before we describe the algorithm which we use for Thompson’s group F , we will describe a general algorithm which can be applied to any group
admitting certain functions which can be computed very quickly. In the next subsection
we will describe how we apply this algorithm to F . This algorithm could also be applied to
any of the other groups which we have discussed, however it would be much less efficient
than the specific algorithms described previously in this section.
Our algorithm can be seen as a significantly more memory efficient version of the algorithm in [6]. First we describe that algorithm. Given a loop γ = a0 a1 . . . a2n , where each
ai ∈ V (Γ) and a2n = a0 = e, we define the midpoint of γ to be the vertex an . Then γ is
made up of a walk of length n from e to its midpoint followed by a walk of length n from
its midpoint to 1. Hence, the number of loops in Γ of length 2n with midpoint m is the
square of the number of walks of length n from 1 to m.
Using a simple dynamic program, the algorithm calculates the number of walks to each
vertex in B(e, n), the ball of radius n in Γ. Then one sums the squares of these numbers
to calculate the number of loops of length 2n. Note also that for each walk from e to m,
there is a corresponding walk from e to m−1 , so it is only necessary to calculate the number
of walks to either m or m−1 . The problem with this algorithm is that it is necessary to
store a large proportion of the ball of radius n in memory at the same time. As a result
it is essentially impossible to get any more than 24 coefficients of the cogrowth series for
Thompson’s group F using this algorithm. Our algorithm is very similar except that we
only store the ball of radius k in memory, where k ≈ n/2. Importantly, we do this without
significantly increasing the running time of the program.
Let G be a group with inverse closed generating set S. Let Γ(G, S) denote the Cayley
graph of G with respect to the generating set S. We will often refer to this as simply Γ.
We will assume that every loop has even length, however this algorithm could easily be
altered to apply when this is not the case.
Let O be an object in the program which represents an element of G. We require the
following functions to be implemented:
• init(). This returns an object O which represents the identity in G.
• val(O). This returns a value which is uniquely determined by the element of G
which the object O represents. In other words, val(O1 ) = val(O2 ) if and only if O1
and O2 represent the same element of G.
• For each generator λ ∈ S, we have an operation O.doλ . If O initially represents the
element g ∈ G, this changes O to an object which represents gλ.
• For each generator λ ∈ S, we have a function lλ (O), defined by lλ (O) = |gλ| − |g|,
where g is the element of G which O represents. That is, lλ (O) = 1 if applying λ
moves g away from the identity.
The speed of our algorithm depends entirely on the efficiency of these functions. For
Thompson’s group our implementations of these all take constant time. Importantly, we
do not require an inverse of val to be implemented.
Given these functions, the algorithm proceeds as follows:
Step 1: Assign an arbitrary order to the generating set S and set k = d n2 e.
12
ANDREW ELVEY PRICE AND ANTHONY J GUTTMANN
Step 2: Using a simple dynamic program, construct an associative array An−k , implemented as a hash table, with a key value pair (kg , ag ) for each element g ∈ G within the
ball of radius n − k. The key kg is given by val(O) where O is any object which represents
g and the value ag is equal to the number of walks of length n − k in Γ from e to g. We
will write ag = A[kg ]. For a number x which is not a key in An−k , we set A[x] = 0.
Step 3: Construct a tree Tk which contains one vertex vg for each element g of G within
the ball of radius k, such that each vertex vg , apart from ve , is connected to exactly one
vertex vh satisfying |h| = |g| − 1, and g = hλ for some λ ∈ S. If there are multiple possible
choices of h, we choose the element h which minimises λ, according to the order we assigned
in step 1. The edge (h, g) is then labelled with λ. Each vertex vg is also labelled with the
number p(vg ) of paths of length k in Γ from e to g.
Step 4: We now create a function numpaths(O, d) whose input is an object O and a
positive integer d, which, assuming that d = |g|, outputs the number of paths of length n
in Γ from e to g, where g is the group element represented by O. During the calculation
of numpaths the object O may change, but at the end it must represent the same group
element g. Each path of length n from e to g −1 in Γ can be written in a unique way as a
path of length k from e to some vertex h in Γ followed by a path of length n − k from h to
g −1 . For a given h, the number of these paths is equal to p(vh )A[kh−1 g−1 ] = p(vh )A[kgh ].
Hence, the number which we need to return is
X
p(vh )A[kgh ].
h∈G
Note also that the summand is 0 unless |h| ≤ k and |gh| ≤ n − k, so we only need to sum
over values of h which satisfy these two inequalities. To do this we perform a depth first
search of the tree Tk , skipping any sections where we can be sure that there are no vertices
vh such that h satisfies the two inequalities. We start the search at the root vertex ve of Tk
and initialise r = 0 and total = 0. Whenever we move from a vertex vh to vhλ we change
d to d + lλ (O) and then apply the operation O.doλ . That way whenever we are at a vertex
vh , the object O represents gh and d = |gh|. We also increase x by 1 whenever we move
to a child vertex and decrease x by 1 when we backtrack so that we always have x = |h|.
Then we add p(vh )A[kgh ] = p(vh )A[val(O)] to the sum total if and only if d ≤ n − k, since
x = |h| ≤ k for every vertex vh in Tk . Since d decreases by at most 1 when we move to a
child vertex, and x always increases by 1, the value x + d never decreases when we move
to a child vertex. So if x + d > n when we are at a vertex vh , then we do not traverse the
children of vh . At the end of the search we return to the root vertex so that O is back to
its original value and then return the value total.
Step 5: For the last step we just need to add up the value of numpaths for every
vertex g in the ball of radius n such that |g| has the same parity as n. To accomplish this
we perform a depth first search of the tree Tn , which is defined in the same way as Tk .
However, we do not explicitly construct Tn as doing so would use too much memory. In
order to perform the depth first search, we just need a function isedgeλ (O) for each λ ∈ S
which returns 1 if and only if there is an outward edge from vg to vgλ in Tn , where g is
the group element that O represents. This will be the case if and only if |gλ| = |g| + 1
NUMERICAL STUDIES OF THOMPSON’S GROUP F AND RELATED GROUPS
13
and |gλµ| = |gλ| + 1 for each µ ∈ S with µ < λ−1 . We test this using the functions lλ ,
doλ and lµ . During the depth first search, we keep track of the distance d = |g|, where g is
the group element represented by O. Now, to calculate the number numloops of loops of
length 2n, we first set numloops = 0, then run the depth first search, and when we visit
each vertex of Tn , add numpaths(O, d)2 to numloops. At the end of this process numloops
is equal to the number of loops of length 2n, so we return numloops and terminate the
algorithm.
The advantage of this algorithm is that it only stores Tk and An−k in memory, rather
than all of Tn . This also allows us to parallelise step 5.
2.4. Thompson’s group F . In this section we describe how the object O, the operation
doλ and the functions val and lλ are implemented for Thompson’s group F . We use the
standard generating set S = {a, b, a−1 , b−1 }, which yields the presentation
F = ha, b|a2 ba−2 = baba−1 b−1 , a3 ba−3 = ba2 ba−2 b−1 i.
For O we use the forest representation given by Belk and Brown in [2]. We simultaneously
store the forest diagram as a graph P as well as a pair of binary strings a, b. A forest
diagram is defined as a pair of sequences of binary trees, with one tree highlighted in each
sequence. A single binary tree with m leaves corresponds to a unique binary string s of
length 2m − 2 with the property that s has an equal number of 1’s and 0’s and the number
of 1’s in any initial substring is at least equal to the number of 0’s in that substring. This
is defined by doing a depth first search of the tree and writing a 1 whenever we move
down an edge from a vertex to its left subtree and writing a 0 whenever we backtrack
along such an edge. Now to convert a sequence of binary trees to a binary string, we first
convert each individual tree to a binary string, insert the string 01 before each such string,
then concatenate the results. We then change the 01 before the string corresponding to
the highlighted tree to 00. This is how the strings a and b are defined. We also store
the numbers pa and pb in O, which define the positions of the 00 before the highlighted
tree in each of a and b. The strings a and b each have length at most 2n, so they can be
represented as 64 bit numbers as long as n ≤ 32. The operation doλ is defined easily for the
effect on the graph P . The effect on the binary strings a and b is a bit more complicated
and requires some bit shifting. The entire length of an element of Thompson’s group F
can be determined by its forest diagram, as shown in [2], so we could use this to determine
lλ by using the graph P and simply subtracting the calculated length |g| from the length
we calculate for |gλ|. In fact we do it more efficiently than this, as the difference |gλ| − |g|
is determined entirely by the highlighted tree and the surrounding trees. Finally, val(O)
simply returns the pair (a, b).
In Table 2 we give the first 32 coefficients of the cogrowth generating function for Thompson’s group F. This is 7 further terms than given in [18].
14
ANDREW ELVEY PRICE AND ANTHONY J GUTTMANN
Coefficients
1
4
28
232
2092
19884
196096
1988452
20612364
217561120
2331456068
25311956784
277937245744
3082543843552
34493827011868
389093033592912
4420986174041164
50566377945667804
581894842848487960
6733830314028209908
78331435477025276852
915607264080561034564
10750847942401254987096
126768974481834814357308
1500753741925909645997904
17833339046478612301547884
212663448005862463186139032
2544535423071442709522261116
30542557512715560857221200908
367718694478039302564802454628
4439941127401928226610731571976
53756708216952135677787623701460
Table 2. Terms in the cogrowth sequence of Thompson’s group F .
3. Possible cogrowth of Thompson’s Group
In this section we will show that if a0 , a1 , . . . is the cogrowth sequence for Thompson’s
group F , then for any real numbers a < 1 and λ > 1, the inequality
a
an < 16n λ−n
NUMERICAL STUDIES OF THOMPSON’S GROUP F AND RELATED GROUPS
15
holds for all sufficiently large integers n. As a result, if Thompson’s group is amenable,
then the sequence cannot grow at the rate
a
16n λ−n ,
For any fixed a < 1. This result follows quite readily from results in [21] and [20], however
we will need some definitions before we can see how they apply. Let G be a group with
finite generating set S. Then we define the function φS : Z>0 → R>0 by setting φS (n)
to be the probability that a random walk in (G, S) of length 2n finishes at the origin. In
other words, |S|2n φS (n) is the number of loops of length 2n in the Cayley graph Γ(G, S).
Now, for two different (non-increasing) functions φ1 and φ2 , we say that φ1 φ2 , if there
is some C ∈ R>0 such that φ1 (n) ≤ Cφ2 (n/C), where each φi is extended to the reals by
linear interpolation. Finally we say that φ1 ≈ φ2 if both φ1 φ2 and φ2 φ1 . We recall
Theorem 3.1 from [20]:
Theorem 3.1. Let G be a group with finite, symmetric generating set S and let H be a
subgroup of G and let T be a finite symmetric generating set of H. Then
φS φT .
The other result we need concerns wreath products with Z. In [21], Pittet and SaloffCoste show (in a remark just below Theorem 8.11) that for a finite generating set T of
Z od Z, we have
φT (n) ≈ exp −nd/(d+2) (log n)2/(d+2) .
Now, since Z od Z is a subgroup of Thompson’s group F , we must have
φS (n) φT (n) ≈ exp −nd/(d+2) (log n)2/(d+2) ,
where S is the standard generating set of F . Hence, for any positive integer d, there is a
positive real number C such that
φS (n) ≤ C exp −(n/C)d/(d+2) (log(n/C))2/(d+2) .
Now we are ready to prove our theorem.
Theorem 3.2. Let an be the number of loops of length 2n in the standard Cayley graph
for Thompson’s group. Then for any real numbers a < 1 and λ > 1, the inequality
a
an < 16n λ−n
holds for all sufficiently large integers n.
d
> a. Then there is some C ∈ R>0 such
Proof. Let d be a positive integer such that d+2
that
φS (n) ≤ C exp −(n/C)d/(d+2) log(n/C)2/(d+2)
16
ANDREW ELVEY PRICE AND ANTHONY J GUTTMANN
for all n ∈ Z>0 . For n sufficiently large, we have log(n/C) > 0, so
C exp −(n/C)d/(d+2) log(n/C)2/(d+2) <C exp −(n/C)d/(d+2)
= exp log(C) − C −d/(d+2) nd/(d+2) ,
Hence, for all n sufficiently large we have
φS (n) < exp(−nα ).
Therefore,
an = 16n φS (n) < 16n exp(−nα )
Note that the same result holds if we replace Thompson’s group F with the Navas-Brin
group B, since it also contains every wreath product Z od Z as a subgroup.
4. Moments
In [18], Haagerup, Haagerup and Ramirez-Solano prove that the cogrowth sequence
a0 , a1 , . . . for Thomson’s group F is the sequence of moments of some probability measure
µ on [0, ∞), in other words, the sequence is a Stieltjes moment sequence. In fact, their
proof applies to the cogrowth series of any (locally finite) Cayley graph Γ. In this section,
we generalise the result further, to any locally finite graph. First we give some background
on the Stieltjes and Hamburger moment problems.
4.1. Stieltjes and Hamburger moment sequences. In the following, for the sequence
(n)
a = a0 , a1 , . . ., and n ≥ 0, we define the matrix H∞ (a) by
an an+1 an+2 . . .
an+1 an+2 an+3 . . .
(n)
H∞
(a) = an+2 an+3 an+4 . . .
..
..
..
..
.
.
.
.
Theorem 4.1. (Stieltjes [23], GantmakherKrein [9] ) For a sequence a = a0 , a1 , . . ., the
following are equivalent:
• There exists a positive measure µ on [0, ∞) such that
Z
an = xn dµ(x).
(0)
(1)
• The matrices H∞ (a) and H∞ (a) are both positive semidefinite.
• There exists a sequence of real numbers α0 , α1 , . . . ≥ 0 such that the gnerating
function A(t) for the sequence a0 , a1 , . . . satisfies
∞
X
α0
A(t) =
an t n =
α1 t
1−
n=0
α2 t
1−
1 − ...
NUMERICAL STUDIES OF THOMPSON’S GROUP F AND RELATED GROUPS
17
A sequence which satisfies the conditions of the theorem above is called a Stieltjes
moment sequence.
Theorem 4.2. For a sequence a = a0 , a1 , . . ., the following are equivalent:
• There exists a positive measure µ on (−∞, ∞) such that
Z
an = xn dµ(x).
(0)
• The matrix H∞ (a) is positive semidefinite.
A sequence which satisfies the conditions of the theorem above is called a Hamburger
moment sequence. From either definition of Hamburger moment sequence, it follows immediately that any Stieltjes moment sequence is a Hamburger moment sequence. Carleman’s
condition states that the measure µ is unique if
∞
X
−
1
a2n2n = +∞,
n=0
This is certainly true when the sequence grows at most exponentially, as is the case for all
of our examples. For Stieltjes moment sequences, the following weaker condition implies
that the measure µ is unique:
∞
X
− 1
an 2n = +∞.
n=0
For a Hamburger moment sequence a, which grows at most exponentially, the radius of
convergence of A(t) = a0 + a1 t + a2 t2 + . . . is equal to
1
.
|µ|
In particular, this means that if a is a Stieltjes moment sequence, the exponential growth
rate of the sequence is equal to the minimum value in the support of µ.
One benefit of proving that a sequence a is a Stieltjes moment sequence is that it allows
us to compute good lower bounds for the exponential growth rate of the sequence using
only finitely many terms. This method was described in [18], but we repeat the description
here, using the continued fraction form of a. We consider the generating function
∞
X
α0
.
α1 t
1−
n=0
α2 t
1−
1 − ...
Using the terms a0 , . . . , an , we calculate the terms α0 , . . . , αn . It is easy to see that A(t)
is nondecreasing in each αj . Hence, the minimum possible value An (t) is achieved by
setting αn+1 , αn+2 , . . . to 0. Therefore, the radius of convergence tc of A(t) is bounded
above by the radius of convergence tn of An (t). Therefore, bn = 1/tn is a lower bound
for the exponential growth rate of a. It is easy to check that the sequence b1 , b2 , . . . is
A(t) =
an tn =
18
ANDREW ELVEY PRICE AND ANTHONY J GUTTMANN
nondecreasing, and bnn > an /a0 . It follows that this sequence of lower bounds converges to
the exponential growth rate of a.
If we assume further that the sequences α0 , α2 , α4 , . . . and α1 , α3 , . . . are non-decreasing,
as seems to be true for many of the cases we consider, we can get stronger lower bounds
for the growth rate by setting αn+1 , αn+3 , . . . to αn−1 and αn+2 , αn+4 , . . . to αn . For this
√
√
sequence the exponential growth rate of corresponding sequence a is ( αn + αn−1 )2 .
4.2. Applications of moments to the cogrowth series. Here we describe how to
compute lower bounds for the growth rate of the cogrowth sequence of Thompson’s group
F.
Theorem 4.3. Let Γ be a locally finite graph with a fixed base vertex v0 . For each n ∈ Z≥0 ,
let tn be the number of loops of length n in Γ which start and end at v0 . Then there exists
a probability measure µ on R such that for each n ∈ Z≥0 , the nth moment of µ is given by
Z ∞
xn dµ = tn .
−∞
In other words, t0 , t1 , . . . is a Hamburger moment sequence.
Proof. The sequence t = t0 , t1 , . . . is a Hamburger
matrix
t0 t1 t2
t1 t2 t3
(0)
H∞
(t) = t2 t3 t4
.. .. ..
. . .
moment sequence if and only if the
...
. . .
. . .
..
.
is positive semidefinite. To prove this, we will show that this is the matrix representation
of a positive definite bilinear form.
Let M be the inner product space over R defined by the orthonormal basis {bv |v ∈ V (Γ)}.
For each n ∈ Z we let xn ∈ M be the element defined by
X
xn =
pv bv ,
v∈V (Γ)
where pv is the number of paths of length n in Γ from v0 to v. Then it is easy to see that
for any non-negative integers m and n, the value hxn , xm i is equal to the number tm+n of
paths of length m + n in Γ from v0 to itself. Now let X be the subspace of M spanned by
{x0 , x1 , . . .}. Then A is the matrix representation of the inner product h, i, restricted to X,
(0)
with respect to the spanning set {x0 , x1 , . . .}. Therefore, H∞ (t) is positive semidefinite.
(0)
Note that if {x0 , x1 , . . .} are linearly independent, then H∞ (t) is positive definite.
Theorem 4.4. Let C ∈ Z>0 and let Γ be a graph with a fixed base vertex v0 , such that
each vertex in Γ has degree at most C. For each n ∈ Z≥0 , let tn be the number of loops of
length n in Γ which start and end at v0 . There exists a probability measure µ on R>0 such
that for each n ∈ Z≥0 , the nth moment of µ is equal to t2n . In other words, t0 , t2 , t4 , . . . is
a Stieltjes moment sequence.
Moreover, µ is unique and its support is contained in the interval [0, C 2 ].
NUMERICAL STUDIES OF THOMPSON’S GROUP F AND RELATED GROUPS
Proof. In order to show that the sequence s = t0 , t2 , t4 , . . . is a
it suffices to prove that the two matrices
t0 t2 . . .
t2
t2 t4 . . .
t4
(0)
(1)
H∞ (s) =
and H∞ (s) =
.. .. . .
..
.
. .
.
are positive semidefinite. From the previous theorem,
t0 t1 t2
t1 t2 t3
(0)
H∞
(t) = t2 t3 t4
.. .. ..
. . .
19
Stieltjes moment sequence,
t4 . . .
t6 . . .
.. . .
.
.
we know that the matrix
...
. . .
. . .
..
.
(0)
is positive semidefinite. Hence any principal submatrix of H∞ (t) (using the same rows
(0)
(1)
and columns) is also positive semidefinite. Since both the matrices H∞ (s) and H∞ (s)
(0)
are such principal submatrices of H∞ (t), each of these matrices is positive semidefinite.
Therefore, the sequence t0 , t2 , t4 , . . . is a Stieltjes moment sequence. Now, since each vertex
of the graph has degree at most C, the number of paths of length n is at most C n . Hence
we have the inequality
Z
∞
xn dµ = t2n ≤ C 2n .
0
Therefore, the support of µ must be contained in the interval [0, C 2 ]. This also implies
that µ is unique.
In particular, if we let G be a finitely generated group, with inverse closed generating
set S, and Γ be the corresponding Cayley graph, then the even terms of the cogrowth
sequence for Γ form a Stieltjes moment sequence. Moreover, each vertex has degree |S| so
the support of the corresponding measure µ is contained in the interval [0, |S|]. As described
in the previous subsection, we can compute lower bounds bn for the exponential growth rate
of any such sequence. Turning our attention to Thompson’s group, using 31 terms of the
cogrowth sequence, we have computed the corresponding terms α0 , α1 , . . . , α31 . Using these
we have computed the rigorous lower bound b31 ≈ 13.269 for the exponential growth rate
of the cogrowth sequence of Thompson’s group. If we assume that the sequences α0 , α2 , . . .
√
√
and α1 , α3 , . . . are increasing, we get the stronger lower bound ( α30 + α31 )2 ≈ 13.706.
In Section 8 below we extrapolate the sequence of bounds {bn } to estimate the growth
constant µ, and find µ ≈ 15.0.
5. Series Analysis
We have series for six groups, which we will consider in order. Firstly, the group Z2 ,
then the Heisenberg group, the lamplighter group L = Z2 o Z, the two groups Z o Z and
(Z o Z) o Z, the Navas-Brin group B [19, 4] and finally Thompson’s group F . We will analyse
each of these in turn.
20
ANDREW ELVEY PRICE AND ANTHONY J GUTTMANN
In all cases our initial analysis is based on the behaviour of the ratio of successive terms,
with other methods deployed as appropriate. In the simplest situation we consider, which
is when the asymptotic form of the coefficients is cn ∼ c · µn · ng , one has that the ratio of
successive coefficients is asymptotically linear when plotted against 1/n, as
g
1
cn
=µ 1+ +o
.
(12)
rn =
cn−1
n
n
It is therefore natural to plot the ratios rn against 1/n. If the correction term o n1 can be
ignored3, such a plot will be linear, with gradient µ · g, and intercept µ at 1/n = 0. If the
growth constant µ is known, or can be guessed, better estimates of the exponent g can be
made by extrapolating the sequence
gn = (rn /µ − 1) · n = g + o(1).
More complicated asymptotic forms for the coefficients can give rise to different expressions for the ratios, as we show below.
5.1. The group Z2 . For the group Z2 , the coefficients of the cogrowth series are known
2
exactly, cn = 2n
n , and so the ratio of successive terms is
1
cn
1
rn =
= 16 1 − + 2 .
cn−1
n 4n
A plot of the ratios against 1/n is shown in Figure 1, based on the first 50 coefficients.
It is clearly going to the expected limit of 16. The exponent g should be −1, and we plot
estimators gn against 1/n in Figure 2, which is also clearly going to the expected limit −1.
This corresponds to a logarithmic singularity of the generating function,
CZ2 (x) ∼ c · log(1 − 16x).
For this simple example one can do much better by using the package gfun, available
in Maple, and asking for the underlying ordinary differential equation for the generating
function, given the first 20 or so coefficients. In this way one immediately obtains the result
for the generating function
√
X
4 x
n
cn x = 2K
,
CZ2 (x) =
π
where K is the complete elliptic integral of the first kind.
5.2. The Heisenberg group. We have calculated 90 terms of the generating function,
and show that this is sufficient to obtain a very precise asymptotic representation of the
coefficients. The leading order asymptotics of the coefficients is known [10] to be cn ∼
16n /(2n2 ), corresponding to a generating function
1
CHeisenberg ∼ (1 − 16x) log(1 − 16x).
2
We have analysed this series in the same way as described above for the group Z2 .
3In the simplest cases, such as the present one, the correction term will be O
1
n2
.
NUMERICAL STUDIES OF THOMPSON’S GROUP F AND RELATED GROUPS
21
Figure 1. Plot of Z2 ratios against 1/n.
Figure 2. Estimators of exponent g for Z2
vs. 1/n.
Figure 3. Plot of Heisenberg group ratios
against 1/n.
Figure 4. Estimators of exponent g for
the Heisenberg group vs. 1/n.
A plot of the ratios against 1/n is shown in Figure 3. It is clearly going to the expected
limit of 16. The exponent g should be −2, and we plot estimators gn against 1/n in Figure
4, which are also clearly going to the expected limit −2.
22
ANDREW ELVEY PRICE AND ANTHONY J GUTTMANN
In order to obtain higher-order asymptotic terms, we subtract the known leading-order
term from the coefficients, forming the sequence
c(1) (n) = cn − 16n /(2n2 ).
A ratio analysis of this sequence strongly suggests that c(1) (n) ∼ const/n, implying that
cn ∼ 16n /(2n2 )+const./n3 . Such behaviour is consistent with a simple algebraic singularity
of the generating function. Accordingly, we attempted a linear fit to the assumed form
cn /16n = 1/(2n2 ) + k1 /n3 + k2 /n4 + k3 /n5 . We did this by solving the linear system given
by setting n = m − 1, n = m, n = m + 1 in the preceding equation, and solving for
k1 , k2 , k3 , with m ranging from 20 to the maximum possible value 89. We obtain an
m-dependent sequence of estimates of the amplitudes k1 , k2 , k3 , which we extrapolated
against appropriate powers of 1/m.
In this way we estimate k1 = 0.93341, k2 = 1.530, and k3 = 3.30, where we expect errors
in these estimates to be confined to the last quoted digit.
To summarise, we find the asymptotics of the coefficients of the cogrowth series of the
Heisenberg group to be
1
0.93341 1.530 3.30
1
n
.
+
+
+ 5 +O
cn = 16
2
3
4
2n
n
n
n
n6
5.3. The lamplighter group. The lamplighter group L is the wreath product of the
group of order two with the integers, L = Z2 o Z. From [22] we know that for this group,
(13)
cn ∼ c · 9n · κn
1/3
· n1/6 .
1/3
So in this example we see the presence of a stretched-exponential term, κn , which
makes the analysis more difficult. As remarked above, we have generated 201 terms of
the cogrowth series, and show how these terms can be used to estimate the asymptotic
behaviour of the coefficients.
If the coefficients of a series include a stretched-exponential term, so that
σ
an ∼ c · µn · κn · ng ,
with 0 < σ, κ < 1, then the ratio of successive terms behaves as
σ log κ g
an
rn =
∼ µ 1 + 1−σ + + · · · .
an−1
n
n
Experimentally, the presence of such a stretched-exponential term is signalled by the fact
that the ratio plots against 1/n exhibit curvature, and that this curvature can be eliminated,
or at least substantially reduced, by plotting the ratios against 1/n1−σ , where σ is roughly
estimated by choosing its value so as to maximise linearity. This theory is developed in
greater detail, along with several examples, in [14].
Because of the presence of two terms in the ratio plots, one of order O(nσ−1 ) the other
of order O(1/n), there is some competition between these two terms, which can make it
NUMERICAL STUDIES OF THOMPSON’S GROUP F AND RELATED GROUPS
23
difficult to estimate the value of σ just from the linearity of the ratio plots. So we first
eliminate the O(1/n) term by calculating the modified ratios
1
σ 2 log κ
(1)
.
(14)
rn = n · rn − (n − 1) · rn−1 = µ 1 + 1−σ + o
n
n
In Figure 5 we show the modified ratios plotted against 1/n2/3 , which is seen to be linear,
and extrapolating to the known
√ growth constant of 9. While not shown, we also plotted
the modified ratios against 1/ n and against 1/n3/4 . These were visibly convex upward
and concave downward, respectively. One would conclude that 1/2 < σ < 3/4, and bearing
in mind that in all known such behaviour, σ is a simple rational fraction (arguably simply
related to dimensionality), one would conjecture that κ = 2/3. However, we can also
estimate the value of σ by other means.
Figure 5. Modified lamplighter group ratios vs. n−2/3 .
(1)
If we assume µ = 9, then from (14) it follows that a plot of ln = log |1 − rn /µ| against
log(n) should be linear with gradient σ − 1. This plot (not shown) is indeed visually linear.
To calculate the gradient, which will vary slightly with n, we calculate the local gradient
(ln − ln−1 )/(log(n) − log(n − 1)), and show this plotted against 1/n4/3 in Figure 6. This
plot is clearly going to a limit very close to −2/3, as expected.
One can also find estimators for the exponent σ without assuming or knowing the value
of the growth constant µ. Taking the ratio of the modified ratios eliminates the growth
constant µ, so that
(1)
rn(2) =
rn
(1)
rn−1
=1−
σ 2 (1 − σ) log κ
+ o(nσ−2 ).
n2−σ
24
ANDREW ELVEY PRICE AND ANTHONY J GUTTMANN
Figure 6. Estimates of σ − 1 vs. n−4/3 .
Figure 7. Estimates of σ − 2 vs. n−2/3 .
(2)
So a plot of log |rn − 1| against log n should be linear with gradient σ − 2. As above,
we don’t show this uninteresting linear plot, but instead show the local gradient, plotted
against 1/n2/3 , in Figure 7, which appears to be going to a value around −1.67, consistent
with the known exact value −5/3.
Assuming the values µ = 9, and σ = 1/3, we estimate the remaining parameters in
the asymptotic expression by direct fitting to the logarithm of the coefficients. From
1/3
cn ∼ c · 9n · κn · ng we get
log cn − n · log 9 ∼ n1/3 · log κ + g · log n + log c.
As in the preceding analysis of the Heisenberg group coefficients, we fit successive triples
of coefficients to get estimates of the three unknowns, log κ, g and log c. The results are
shown in Figures 8, 9, and 10 respectively.
From these plots, we estimate log κ ≈ −2.78, g ≈ 0.17, and log c ≈ −0.6. If we use the
fact that we know that the exponent g = 1/6, we can get refined estimates of the remaining
parameters, giving log κ ≈ −2.775, and log c ≈ −0.55, so that κ ≈ 0.0623, and c ≈ 0.58.
As far as we are aware, these two constants have not previously been estimated.
5.4. Analysis of group Z o Z. As discussed in the introduction, for the groups Z od Z,
there is an additional logarithmic factor associated with the stretched-exponential term.
For d = 1 the group Z o Z has coefficients that behave as
an ∼ const · µn · κn
σ
logδ n
· ng , with σ = 1/3 and δ = 2/3.
NUMERICAL STUDIES OF THOMPSON’S GROUP F AND RELATED GROUPS
25
Figure 9. Estimates of
Figure 8. Estimates of log κ exponent g vs. 1/n. The Figure 10. Estimates
vs. 1/n.
log c vs. n−2/3 .
exact value is 1/6.
of
It follows that the ratio of successive coefficients behaves as
(15)
an
σ · log κ · logδ n δ · log κ · logδ−1 n g
rn =
∼µ 1+
+
+ + ···
an−1
n1−σ
n1−σ
n
!
.
We have generated series to order x276 for this group. A simple ratio plot against 1/n is
strongly concave downwards. Plotting the ratios against 1/n2/3 gives a plot which is√much
closer to linear, but still displays a slight concavity. A simple ratio plot against 1/ n by
contrast, displays slight convexity.
As we noted in our analysis of the lamplighter group, the term g/n in eqn. (15) also
makes a contribution (as does the logarithmic term logδ n), so a clearer picture emerges if
this term is eliminated, which we do by forming the modified ratios (14), which behave in
this case as
log κ 2/3
−1/3
−4/3
−5/3+
(1)
n − 2 log
n + o(n
) .
(16)
rn = µ 1 + 2/3 log n + 4 log
9n
√
Plots of the modified ratios are shown in Figures 11, 12, and 13, against 1/ n, 1/n2/3
and 1/n3/4 respectively. It is clear that the plot against 1/n2/3 is the closest to linear,
corresponding to κ = 1/3. However, there is still some downward concavity, due to the associated logarithmic terms.
To see this even more clearly, weshow in Figure 14 a plot of the
modified ratios against log2/3 n + 4 log−1/3 n − 2 log−4/3 n /n2/3 , which is the expected
asymptotic behaviour, see (16). This is indistinguishable from linearity.
To date we haven’t tried to estimate µ, known to be exactly 16. One way to do this is
from the modified ratio plots shown above. All are seen to be tracking towards a value
very close to 16.
It is also possible to estimate the exponent σ directly from the ratios, even without
knowing the dominant exponential growth constant µ. One first forms the ratio of successive
26
ANDREW ELVEY PRICE AND ANTHONY J GUTTMANN
Figure
11. Modified ratios for Z o Z vs.
√
1/ n.
Figure 12. Modified ratios for Z o Z vs.
n−2/3 .
Figure 13. Modified ratios for Z o Z vs.
n−3/4 .
Figure
14. Modified ratios for Zo Z vs.
2/3
log n + 4 log−1/3 n − 2 log−4/3 n n−2/3 .
ratios, so that
(17)
rrn(1)
=
rn
rn−1
log κ · logδ n
= 1+
n2−σ
δ(2σ − 1) δ(δ − 1)
g
σ(σ − 1) +
+
− 2 + o(1/n2 ).
2
log n
n
log n
NUMERICAL STUDIES OF THOMPSON’S GROUP F AND RELATED GROUPS
27
As we did above with the ratios, we eliminate the O(1/n2 ) term by constructing a
modified ratio-of-ratios,
(1)
(18)
rrn(2) =
(1)
n2 rrn − (n − 1)2 rrn−1
c log δ n
= 1 + 2−σ (1 + O(1/ log n)) ,
2n − 1
n
where the constant c = (σ 2 (σ − 1) log κ)/2.
(2)
Then a plot of log |rrn − 1| against log n should be close to linear, as the logarithmic
term will vary very slowly over the range of n-values at our disposal, with gradient σ − 2.
Such a plot (not shown) is visually linear, but in order to calculate the gradient we find
(2)
(2)
the (local) gradient of the segment joining rrn and rrn−1 , which should approach the
“correct” value as n increases. This is shown, plotted against 1/n in Figure 15. It appears
to be going to a limit around −1.62 to − 1.61, which would imply σ ≈ 0.38 or 0.39, rather
than the known value of 1/3.
Figure 15. Estimators of exponent σ − 2 vs. 1/n.
However, if we assume we know that δ = 2/3, and include the confluent logarithmic
term log2/3 n in the exponent of the stretched-exponential term, plotting instead
!
(2)
rn − 1
log
log2/3 n
against log n, the plot is again visually linear. However the corresponding plot of the local
gradient, shown in Figure 16, is clearly going to a limit around −5/3, consistent with the
known value σ = 1/3.
28
ANDREW ELVEY PRICE AND ANTHONY J GUTTMANN
Figure 16. Estimators of exponent σ − 2
vs. 1/n, assuming a confluent logarithmic
term.
Figure 17. Estimates of log κ vs. 1/n.
Assuming the values µ = 16, and σ = 1/3 and κ = 2/3, we can estimate the remaining
parameters in the asymptotic expression by direct fitting to the logarithm of the coefficients.
2/3
1/3
From cn ∼ c · 16n · κn log n · ng we get
log cn − n · log 16 ∼ n1/3 · log2/3 n · log κ + g · log n + log c.
As in the preceding analysis of the lamplighter group coefficients, we fit successive triples
of coefficients to get n−dependant estimates of the three unknowns, log κ, g and log c. The
results are shown in Figures 17, 18, and 19 respectively.
From these plots, we estimate log κ ≈ −1.64, but it is difficult to estimate g. It appears
to be quite small, close to zero, and could even be negative. It is even more difficult to
extrapolate the plot for log c, though one might conclude the bound log c ≥ −2. These
estimates correspond to κ ≈ 0.194, g ≈ 0, and c > 0.13. As far as we are aware, these three
constants have not previously been studied.
In anticipation of our analysis of Thompson’s group F, where the growth constant µ
is not known, we attempt to estimate both the exponents σ and δ without knowing the
value of µ. Forming the ratios (15) eliminates the constant c in the asymptotic form of the
coefficients, and the ratio of ratios (17) eliminates µ. If we now form the sequence
(1)
(19)
tn =
rrn − 1
(1)
rrn−1 − 1
NUMERICAL STUDIES OF THOMPSON’S GROUP F AND RELATED GROUPS
Figure 18. Estimates of exponent g vs.
n−1/3 .
29
Figure 19. Estimates of log c vs. n−1/3 .
this eliminates the base κ of the stretched-exponential term, and in fact
n(tn − 1) ∼ σ − 2 +
δ
.
n log n
So plotting n(tn − 1) against 1/(n log n) should give an estimate of σ − 2. To estimate δ,
we form the sequence
n log2 n(n(tn − 1) − (n − 1)(tn−1 − 1)) ∼ −δ + O(1/ log n).
We show these plots in Figures 20 and 21 respectively. The estimate of σ − 2 appears to
be going to a limit of around -1.6 or below, c.f. the known exact value of −5/3, while the
estimate of δ is harder to estimate, but the plot is certainly consistent with the known
value 2/3. As can be seen, this exponent is difficult to estimate without many more terms
than we currently have.
5.5. Analysis of group (Z o Z) o Z. For this group we have 132 terms in the cogrowth
series, just less than half the number we have for Z o Z, so the results are not quite as
precise. We analysed this series the same way as for the group Z o Z. For this group it is
known that the coefficients grow exponentially, and that the dominant term is 36n . The
1/2
1/2
sub-dominant term is κn log n , which again follows from Theorem 3.11 in [21]. Again,
there is presumably a sub-sub dominant term ng .
In this case we have for the ratio of successive terms:
!
an
log κ log1/2 n
log κ
g
(20)
rn =
∼µ 1+
+
+ + ··· .
an−1
2n1/2
2n1/2 log1/2 n n
30
ANDREW ELVEY PRICE AND ANTHONY J GUTTMANN
Figure 20. Estimates of σ − 2 vs.
1/(n log n)
Figure 21. Estimates of exponent −δ vs.
1/ log n.
We eliminate the O(1/n) term by forming the modified ratios (14) which behave as
(21)
rn(1)
log κ p
−1/2
−3/2
−3/2+
log n + 2 log
n − log
n + o(n
) .
=µ 1+ √
4 n
First, we remark that extrapolating the ratios against 1/n gives a plot with considerable
curvature (not shown). We plotted the modified ratios, defined above, against 1/nσ for
several values of σ. We show the results for σ = 1/2 and σ = 1/3 in Figures 22 and 23
respectively. Surprisingly, the latter is closer to linear, however it extrapolates to a value
of µ rather larger than the actual value, µ = 36. However if we include the effect of the
logarithmic
term in the exponent, and plot (see equation (21)) the modified ratios against
q
log n
n ,
the modified ratio plot, shown in Figure 24, is indistinguishable from linearity and
extrapolates to the correct value of µ.
Repeating the analysis of the previous section, we attempted to estimate the exponent σ
(2)
without assuming the value of the growth constant µ. A plot of log |rrn − 1| (18) against
log n should be close to linear, (as the logarithmic term will vary only slowly over the range
of n-values at our disposal), with gradient σ − 2. Such a plot (not shown) is visually linear,
but in order to calculate the gradient we find the (local) gradient of the segment joining
(2)
(2)
rrn and rrn−1 , which should approach the “correct” value as n increases. This is shown,
plotted against 1/n in Figure 25. It appears to be going to a limit below −1.42 which
would imply σ < 0.58, compared to the known value of 1/2.
NUMERICAL STUDIES OF THOMPSON’S GROUP F AND RELATED GROUPS
31
√
Figure 22. Modified ratios for (Z o Z) o Z vs. 1/ n.
Figure 23. Modified ratios for (Z o Z) o Z
vs. n−1/3 .
Figure
p 24. Modified ratios for (Z o Z) o Z
vs. log n/n.
However, if we assume we know that δ = 1/2, and include the confluent logarithmic
term log1/2 n in the exponent of the stretched-exponential term, plotting instead
!
(2)
rn − 1
log
log1/2 n
32
ANDREW ELVEY PRICE AND ANTHONY J GUTTMANN
Figure 25. Estimators of exponent σ − 2
vs. 1/n.
Figure 26. Estimators of exponent σ − 2
vs. 1/n, assuming a confluent logarithmic
term.
against log n, the plot is again visually linear. Moreover the corresponding plot of the local
gradient, shown in Figure 26, is going to a limit around −3/2, consistent with the known
value σ = 1/2.
Assuming the values µ = 16, σ = 1/2 and κ = 1/2, we can estimate the remaining
parameters in the asymptotic expression by direct fitting to the logarithm of the coefficients.
1/2
1/2
From cn ∼ c · 36n · κn log n · ng we get
log cn − n · log 36 ∼ n1/2 · log1/2 n · log κ + g · log n + log c.
As in the preceding analysis of Z o Z, we fit successive triples of coefficients to get estimates
of the three unknowns, log κ, g and log c. The results for the first two are shown in Figures
27 and 28 respectively. From this, and further analysis with an additonal term in the
assumed asymptotic form, we estimate log κ ≈ −2.3 and g ≈ 3.3.
Again repeating the analysis of the previous section, we tried to estimate σ and δ directly
without knowing µ or κ. Plotting n(tn − 1) (19) against 1/(n log n) should give an estimate
of σ − 2, and plotting the sequence n log2 n(n(tn − 1) − (n − 1)(tn−1 − 1)) against 1/ log n
should give estimates of −δ. We show these plots in Figures 29 and 30 respectively. The
estimate of σ − 2 appears to be going to a limit of below -1.39 or so, c.f. the known exact
value of −1.5, while it is not possible to estimate δ from this plot, but it is not inconsistent
with the known value 1/2.
5.6. The group Z od Z. In the previous sections we have considered the analysis of the
groups Z od Z for d = 1 and d = 2. We have shown how the stretched-exponential term
slows the rate of convergence of the ratios, but that appropriate analysis can still reveal
NUMERICAL STUDIES OF THOMPSON’S GROUP F AND RELATED GROUPS
33
√
Figure 27. Estimates of log κ vs. 1/ n.
Figure
28. Estimates of exponent g vs.
√
1/ n.
Figure 29. Estimates of σ −2 for (ZoZ)oZ
vs. 1/(n log n)
Figure 30. Estimates of exponent δ for
(Z o Z) o Z vs. 1/ log n.
much asymptotic information. However as d increases, it becomes increasingly difficult to
extract the asymptotics from a hundred or so terms of the cogrowth series. To see this, we
34
ANDREW ELVEY PRICE AND ANTHONY J GUTTMANN
consider the case d = 98. Then we know the asymptotic form of the coefficients is
σ
cn ∼ c · µn · κn
logδ n
· ng ,
where σ = 49/50 and δ = 1/50 [21].
While we could have generated 100 or so terms of this series from the algorithms described above, it will be more instructive to generate a test series with the given asymptotic
behaviour, as then we can generate thousands of terms essentially immediately.
δ
σ
So we have generated coefficients defined by cn = c · µn · κn log n · ng with c = 1, µ = 4,
κ = 0.7, g = 0.5, σ = 49/50 and δ = 1/50. The ratio of successive terms must go to 4.0,
the value of the growth constant4. Using 128 terms of this test series, we show a plot of
the ratios against 1/n in Figure 31. It is not possible to assert that, as n → ∞ the ratios
will go to 4.0. In Figure 32 we show the same plot with 1280 terms. While this curve
is steeply increasing, it is still not possible to assert that the limiting value is 4.0. Using
10000 terms, and plotting the ratios against 1/n1/50 (not shown), we finally see evidence
that the extrapolated limit is around 3.8 or 3.9.
Figure 31. The first 128 ratios for Z o98 Z
vs. 1/n.
Figure 32. The first 1280 ratios for Z o98 Z
vs. 1/n.
For this series the asymptotic form of the ratios is
49 log κ
0.5
rn = µ 1 +
+
+ o(1/n) ,
n
50 · n1/50
so we might expect more informative results if we eliminate the term O(1/n), which we
can do by forming the modified ratios. These are shown, plotted against 1/n1/50 in Figures
4The growth constant is actually 4(d + 1)2 , but for this exercise the actual value is irrelevant, so we have
chosen a much smaller value.
NUMERICAL STUDIES OF THOMPSON’S GROUP F AND RELATED GROUPS
35
33 and 34, based on the first 128 terms and the first 10000 terms. Extrapolating these to
n → ∞ again gives a limit around 3.9.
Figure 33. The first 128 modified ratios
for Z o98 Z vs. n−1/50 .
Figure 34. The first 10000 modified ratios
for Z o98 Z vs. n−1/50 .
It is possible to estimate the exponent σ without knowing µ, as we showed in previous
examples above. In particular, using the method based on equation (17), and described
immediately below that equation, we show in Figure 35 a plot of estimators of σ −2 against
1/n, based on a 10000 term series, and it is persuasively going to the known value −1.02.
Unfortunately, for no interesting problem is it realistic to get 10000 terms, so this example, and the next, must remain as a cautionary tale, to the extent that there can and
do exist groups whose cogrowth series exhibit asymptotic behaviour that is difficult to estimate by numerical methods of the type we have considered. Another example of similar
difficulty is given by the Navas-Brin group B, discussed in the next section.
6. Series extension
In this section we develop one further tool that will be extremely useful in our analysis
of the series for Thompson’s group F, where we have only 32 terms, rather than a hundred
or more as in the examples we have been considering. It will also be very helpful in our
analysis of the Navas-Brin group B, discussed in the next section.
Recall that our analysis of the more complex asymptotic forms that include stretchedexponential terms is based on ratios of successive terms, whereas for simpler groups, with
simpler asymptotics, we used the method of differential approximants (DAs). It is obviously
highly desirable to have further terms (in particular, further ratios), for all series with nonsimple asymptotics, and particularly in those cases where we have comparatively short
36
ANDREW ELVEY PRICE AND ANTHONY J GUTTMANN
Figure 35. Estimators of σ − 2 for Z o98 Z against 1/n for n ≤ 10000.
series, such as the 32 term series we have for Thompson’s group F. In order to obtain further
ratios (or terms), we use the method of differential approximants to predict subsequent
ratios/terms. The detailed description as to how this is done is given in [15].
We will give two demonstrations of the effectiveness of this method. In the first, we take
the first 32 terms of the series for Z o Z discussed above, (we have more than 200 terms for
this series), and use these to predict the next 89 ratios, from 5th order DAs. As well as
the mean ratio, we calculate the standard deviation. We show, in Table 3, a comparison
between the actual error in the predicted ratios and the standard deviation of the estimated
ratios. It can be seen that the true error lies between 1 and 1.5 standard deviations, which
provides some confidence that the predicted ratios are accurate to within an error of 1.5
standard deviations.
For the series simulating the coefficients of the group Zo98 Z, we showed the importance of
long series to reveal the asymptotic behaviour with some precision. In this second example,
we take the first 100 terms of this series, and use them to predict the next 315 ratios. That
is, we estimate cn /cn−1 for n = 101 · · · 415.
To see how precisely these ratios can be predicted, we plot the difference between the
actual ratios and those calculated by 4th order differential approximants in Figure 36.
It can be seen that the error is less than 2 parts in 1020 for all n < 416. Just to make
this perfectly clear, given 100 coefficients, we have predicted the next 315 ratios with an
accuracy of some 20 significant digits.
In a similar fashion, using 4th order DAs, we were able to get 200 extra ratios for the
32-term series for Thompson group F. The maximum error (as estimated by 1.5 s.d. of the
NUMERICAL STUDIES OF THOMPSON’S GROUP F AND RELATED GROUPS
Figure 36. Absolute error in predicted ratios of Z o98 Z for 100 < n < 416.
k
1
5
10
20
30
40
50
60
70
80
89
37
Figure 37. The first 128 modified ratios
of the Navas-Brin group B vs. 1/n.
Actual error 1 standard deviation
2.69 × 10−17
2.02 × 10−17
−13
1.14 × 10
7.85 × 10−14
−11
3.37 × 10
2.08 × 10−11
2.22 × 10−8
1.23 × 10−8
−7
9.63 × 10
5.39 × 10−7
−5
1.22 × 10
6.88 × 10−6
−5
7.59 × 10
4.73 × 10−5
3.13 × 10−4
2.23 × 10−4
−4
9.39 × 10
8.11 × 10−4
−3
2.44 × 10
2.44 × 10−3
−3
4.63 × 10
5.38 × 10−3
Table 3. Actual error in coefficient O(z 31+k ) and 1 standard deviation
from the mean of the estimated coefficient.
DAs) is 1 part in 4 × 10−5 , which is graphically imperceptible. In the Appendix we give
the (predicted) next 200 ratios, and their standard deviations.
7. Analysis of the Navas-Brin group B.
This is an amenable group introduced independently by Navas [19] and Brin [4], so we
call it the Navas-Brin group B, and is defined in subsection 2.2. It has 2 generators, so
38
ANDREW ELVEY PRICE AND ANTHONY J GUTTMANN
the growth rate of the cogrowth sequence is 16. We gave a polynomial-time algorithm to
generate the coefficients above, and have used this to generate 128 terms of the co-growth
series. We then used the method of series extension, described above, to give a further 590
ratios, the last of which we expect to be accurate to 1 part in 5 × 10−7 , while all earlier
ratios will have a lower associated error. We first show a plot of the modified ratios (14)
against 1/n in Figure 37. Even if we knew nothing about the asymptotics of this group,
the curvature of this plot provides strong evidence for a sub-exponential term, and we have
proved that it cannot be a regular stretched-exponential term.
That is to say, the asymptotics for this series must grow more slowly than
σ
cn ∼ c · µn · κn · ng ,
where µ = 16, 0 < σ < 1, and 0 < κ < 1. Possible behaviour might be
cn ∼ c · µn · κn/ log n · ng ,
corresponding to a numerical value σ = 1, which of course hides the logarithmic component.
In that case the ratios will be
constant g
cn
+ + ··· .
∼µ 1+
rn =
cn−1
log n
n
Note that we do not insist the the first correction term is O(1/ log n), it could be a power
of a logarithm, or some other weakly decreasing function, but it cannot have a power-law
increase. For our purposes it suffices to take this term to be O(1/ log n). We show the
modified ratios (this gets rid of the O(1/n) term in the asymptotics) in Figures 38 and 39
which are the same plot, but the first uses only the 128 exact coefficients, while the second
uses the exact plus predicted ratios. From the first plot, it is clear that it would be an
article of faith that the locus is going to 16 as n → ∞. By contrast, the second plot makes
this conclusion far more plausible.
We next try and estimate the exponent σ, which should be 1, without assuming µ =
16. We use the method described below equation (17). With the 128 known terms, the
estimators of σ−2 are shown in Figure 40 and show no evidence of approaching the expected
value of −1. If however we use twice as many terms, so using the next 128 predicted ratios,
we get the plot shown in Figure 41, which is plausibly approaching −1.
This highlights the value of numerically predicting further terms wherever possible.
8. Analysis of Thompson’s group F
For Thompson’s group F it is known that the series grows exponentially like µn . If
µ = 16, the group is amenable. If it is amenable, there cannot be a sub-dominant term of
σ
the form κn with 0 < σ < 1, because the group contains the wreath products ZoZoZo· · ·oZ
as subgroups. This is a consequence of Theorem 1.3 in [20] and results in [21], and is proved
as Theorem 3.2 in Section 3.
We first study the modified ratios, defined by (14). The modified ratio plot against
1/n is shown in figure 42 and displays considerable curvature. By contrast, the same data
plotted against n−1/5 , and shown in figure 43 shows curvature in the opposite direction.
NUMERICAL STUDIES OF THOMPSON’S GROUP F AND RELATED GROUPS
39
Figure 38. The first 128 modified ratios
for the Navas-Brin group B vs. 1/ log n.
Figure 39. The first 718 modified ratios
for the Navas-Brin group B vs. 1/ log n.
Figure 40. Estimates of σ − 2 from 128
terms of the Navas-Brin group B.
Figure 41. Estimates of σ − 2 from 256
terms of the Navas-Brin group B.
This is strong evidence for the presence of a conventional stretched-exponential term of the
sort we have seen in our study of the lamplighter group and the family Wd . As mentioned
above, the presence of such a term is incompatible with amenability. This is our first piece
40
ANDREW ELVEY PRICE AND ANTHONY J GUTTMANN
of evidence that the group is not amenable. Note too that this is quite different to the
behaviour observed for the coefficients of the Navas-Brin group B.
Figure 42. Modified ratios vs.
Thompson’s group F.
1/n for
Figure 43. Modified ratios vs. n−1/5 for
Thompson’s group F.
In our subsequent analysis, we use both the exact coefficients and the extrapolated
coefficients. While all extrapolated terms can be used in calculating the ratios, once one
calculates first and second differences, errors are amplified, and so fewer terms can be used.
That is why we quote the number of terms used for different calculations, as it is only to the
quoted order that we are confident that the calculated quantities are accurate to graphical
accuracy.
To estimate the exponents in the stretched-exponential term we use the procedure described in Section 5.4, given by eqn. (19) and subsequent equations. This procedure allows
for the presence of a confluent power of a logarithm, so that the stretched-exponential
δ
σ
term is κn log n . In this way, based on a series of length 80, we show plots of estimators of
2 − σ and −δ in Figures 44 and 45, plotted against 1/n. Extrapolating these, we estimate
σ ≈ 1/2, and δ ≈ 1/2. Recall that this is exactly the stretched-exponential behaviour of
(Z o Z) o Z.
√
Reverting to the modified ratios, briefly discussed above, we plot these against 1/ n in
figure 46, using 186 terms. One observes that the plot still p
displays a little curvature, but
in Figure 47 the plot of these same modified ratios against log n/n, is essentially linear.
This is the appropriate power to extrapolate against, given our estimates of the stretchedexponential exponents. Extrapolating this to n → ∞ we estimate the limit, which gives
the growth constant, to be 14.8 − 15.1. This is well away from 16, which would be required
for amenability.
NUMERICAL STUDIES OF THOMPSON’S GROUP F AND RELATED GROUPS
41
Figure 44. Estimators of σ−2 for Thompson’s group F vs. 1/n.
Figure 45. Estimators of −δ for Thompson’s group F vs. 1/n.
Figure 46. The first 186 modified
ratios
√
for Thompson’s group F vs. 1/ n.
Figure 47. The first 186 modified
ratios
p
for Thompson’s group F vs. log n/n.
One simple test for amenability uses the fact that the ratio of successive coefficients
asymptotes to the growth constant µ. For the lamplighter group, this ratio behaves as
c
1
(L)
rn = 9 1 + 2/3 + o
.
n
n2/3
42
ANDREW ELVEY PRICE AND ANTHONY J GUTTMANN
For Z o Z one has
rn(2)
c · log2/3 n
+o
= 16 1 +
n2/3
log2/3 n
n2/3
!!
,
and for the triple wreath product, W2 , the corresponding result is
√
√
c log n
log n
(3)
+o
,
rn = 36 1 +
n1/2
n1/2
while for Thompson’s group F all we know is
rn = µ (1 + lower order terms) ,
where we suspect that the correction term is similar to that of the triple wreath product
of Z.
So, a simple test for amenability is to look at the three quotients
9rn
rn
4rn
, (2) , and
.
(L)
(3)
16rn
rn
9rn
If Thompson’s group F is amenable, these
p quotients should all go to 1. In Figures 48, 49,
50 we show these ratios plotted against log n/n, which is the appropriate power, though
this choice is not critical. The ratios do not appear to be going to 1 in any of the three
cases. For all cases we have used 200 ratios. To do this, we used the extended ratios
for Thompson’s group F and also extended the ratios for W2 from the known 132 ratios.
Indeed, all three cases are consistent with a limit around 0.93 ± 0.02, corresponding to
µ = 14.9 ± 0.3. This is entirely consistent with our previous estimate of µ ≈ 15.0.
Figure
48. Quotient
of Thompson group and
lamplighter group ratios
using 200 terms.
Figure 49. Quotient of
Thompson group and Z o Z
ratios using 200 terms.
Figure 50. Quotient of
Thompson group and (Z o
Z) o Z ratios using 200
terms.
Finally, we take the approach of extrapolating the lower bounds produced in Section 4.
√
Note that the sequence of bounds {bn } are bounds on µ. We have no expectation as to
NUMERICAL STUDIES OF THOMPSON’S GROUP F AND RELATED GROUPS
43
how this sequence should approach its limit, so we first plot the bounds against 1/n in
figure 51. Some curvature is seen, which, as we have shown above, is evidence that the
locus behaves as
c2
c1
+ ··· .
bn ∼ b∞ 1 + α +
n
n
(1)
We remove the term O(1/n) in this case by forming the sequence bn = (n · bn − (n − 2) ·
bn−2 )/2 where we have shifted n by 2 to remove the effect of a small odd-even oscillation
√
(1)
if one shifts only by 1. We found that plotting bn against 1/ n gave a visually linear
plot, and this is shown in figure 52. Linearly extrapolating the last two entries gives the
estimate b∞ ≈ 3.875, so that µ ≈ 15.02, in agreement with previous estimates above.
Figure 51. Plot of bounds bn for Thompson’s group F against 1/n.
(1)
Figure 52. Plot of modified bounds
√ bn
for Thompson’s group F against 1/ n.
9. Conclusion
We have have given polynomial-time algorithms to generate terms of the cogrowth series
for several groups. In particular, we have given the first series for the Navas-Brin group B.
We have also given an improved algorithm for the coefficients of Thompson’s group F, giving
32 terms of the cogrowth series, extending previous enumerations by 7 terms. We analysed
these various series to develop numerical techniques to extract the asymptotics, and gave
improved asymptotics for the Heisenberg group. We gave an improved lower bound on the
growth-rate of the cogrowth series for Thompson’s group F, µ ≥ 13.2693 using the method
in [18]. We generalised their method, showing that the cogrowth sequences for all these
groups can be represented as the moments of a distribution. Extrapolation of the sequence
of bounds suggests the limit is around 15.0, which is incompatible with amenability.
44
ANDREW ELVEY PRICE AND ANTHONY J GUTTMANN
For Thompson’s group F we proved that, if the group is amenable, there cannot be a
sub-dominant stretched exponential term in the asymptotics. The numerical data however
provides compelling evidence for the presence of such a term. This observation suggests a
potential path to a proof of non-amenability.
We have extended the sequence of 32 terms for group F by a further 200 terms (or, as
appropriate, 200 ratios of successive terms), which we demonstrate are sufficiently accurate
for the graphical approaches to analysis that we have taken.
A numerical study of the cogrowth sequence cn gives
σ
cn ∼ c · µn · κn
logδ n
· ng ,
where µ ≈ 15, κ ≈ 1/e, σ ≈ 1/2, δ ≈ 1/2, and g ≈ −1. The growth constant µ must be 16
for amenability. This estimate of the growth constant is the same as that obtained from
the extrapolated bounds. These three approaches to the study of amenabilty lead us to
the strong belief that Thompson’s group F is not amenable.
The difficulties we encountered in analysing Z o98 Z and the Navas-Brin group B does
imply that there do exist groups whose cogrowth series are difficult to analyse. Nevertheless, in both those cases we were able to extract the correct asymptotics. Furthermore, the
cogrowth series for Thompson’s group F did not behave like either of these two “difficult”
groups, and indeed appeared to have a stretched exponential term with exponent values
that were readily estimable. While we cannot rule out the presence of some previously
unsuspected pathology in the asymptotic form, we believe that we have presented strong
evidence for the belief that Thompson’s group F is not amenable
10. Appendix
Here are the (predicted) next 200 ratios for Thompson’s group F . That is, the first
ratio here is the coefficient of z 32 divided by the coefficient of z 31 . One standard deviation is 1.6 × 10−21 for the first ratio, 8.4 × 10−16 for the tenth ratio in this list, then
2.2 × 10−13 , 3.8 × 10−11 , 8.3 × 10−10 , 7.5 × 10−9 , 3.1 × 10−8 , 3.5 × 10−7 , 1.2 × 10−6 , 5.3 ×
10−6 , 3.3 × 10−5 , 9.0 × 10−5 , 1.3 × 10−4 , for the twentieth, thirtieth, fourtieth, fiftieth,
seventieth, ninetieth and hunderd and tenthth, hundred and thirtieth, hundred and fiftieth,
hundred and seventy-fifth and two hundredth ratios, respectively.
NUMERICAL STUDIES OF THOMPSON’S GROUP F AND RELATED GROUPS
12.139382519134640546100910550116506
12.227584513675824849745149961326117
12.306364858371755791208652657890394
12.377372393555580912478863352420963
12.441869014094574198504147444796094
12.500840543278316369259845344418039
12.555070835196117213101528584412301
12.605192754131413602669204643768679
12.651724136967118435759923721500215
12.695093725180061251425934047225685
12.735660229810914461533323666877360
12.773726591097905739200796016562265
12.809550810208112073629601806420114
12.843354291696056209817237940576090
12.875328347113943574400714300355914
12.905639332151085077301331779253254
12.934432723922797241056261010730083
12.961836439248190289410424756818502
12.987963464694516602362349323441444
13.012914070454692135046857458367114
13.036777659579423368614400305996310
13.059634066593784780607389266957567
13.081555222866179498657087709047136
13.102605564520384538741633073251136
13.122843467661052218534876988958406
13.142322234451185942341571946995161
13.161089481701929123360329350075889
13.179189107961895176661932566775513
13.196660991623399487925223492990383
13.213542543992015500848473483969209
13.229866114857320555465055797943269
13.245661794080940364573430988057957
13.260959939896671980546840767426691
13.275786005549024172548265823401768
13.290161972217217703156676577608563
13.304113073325880062519253728849004
13.317658188282116335265357329472658
13.330818453996063928243407490059108
13.343606937084326659382677923429016
13.356041865699128533066777923821716
13.368138079655518061737105379768840
13.379909230285796422796584282677189
13.391391013985309598551994527199420
13.402540990852287889254736126437580
13.413411407143425386912606665853825
13.424062672750839568072161252780645
13.434394074827496721484051571897707
13.444482843412927251038029918715121
13.454316759036914691255964338022543
13.463903116875215568913679808238264
13.473213802552343969176414720413487
13.482346421441562120101495301037430
13.491179584354353752611550171676095
13.499895368095523512785232116864023
13.508333602964302346321586079889387
13.516654351365134683610700727371316
13.525000203908312007517604856476096
13.532917871456062697723758553984577
13.540554273647847830847507251037425
13.548063007209007082860967768914526
13.555319528240038802193441194513629
13.562641374331046546303564833879801
13.569777875695742862069575716786180
13.576510610487748479571836167835301
13.584419560999735066923148194498099
13.590831265318841752277570171711095
13.596998211959713327539754998388164
12.169952350800835818835333877031972
12.254800541517346423861272221078461
12.330828666879163731631451465102197
12.399541172868336566805611620482939
12.462097792906309126366784632966479
12.519410149156226556638850314986873
12.572206972475257876321270606856264
12.621079365262119276409607772782102
12.666512975937091192133384667614540
12.708911355958942268539084708497350
12.748613234321123627064424451294341
12.785905507056272163479082083260714
12.821033151370240355220794516217934
12.854206894770548244369354384398327
12.885609214745162856554802222623966
12.915399101706732471897030527017181
12.943715839380256116094239676192280
12.970682107319771206377319240620875
12.996406405676872159827925022024219
13.020985259779764800684267751152161
13.044504679013068113321447729698093
13.067041693422999439936815568787524
13.088665732145507263332155324286416
13.109439117936998695729698444879843
13.129418244175823190427250023546405
13.148654712658935599802876138058446
13.167195007769142327138772890144629
13.185080837993801098011934614407469
13.202352151456208348963284966653968
13.219044110867187297414288617379158
13.235188321357468124261384585429120
13.250815166741899371063964386311321
13.265952758167346821144011231194731
13.280627056720430964223829034834261
13.294858653114477361638435828704210
13.308670446314943572746000301996392
13.322086115777917425146418299128619
13.335121539230967797838900373066820
13.347786320277756923575569080786819
13.360110874363270214471235529540315
13.372097273034426235102779701961991
13.383762909644345312962700551534152
13.395144666969365978147066024081715
13.406196253710405879515140382321201
13.416988156570367066227724319777381
13.427535999385894978339537743097391
13.437779418859588380431049420003005
13.447782268650965022269207427038709
13.457544856354882926610701767183908
13.467042454042638170007261022024409
13.476302647287223508754966768268084
13.485293318045282335887952362450478
13.494084747058831414056697557041621
13.502701722883121030342927584362952
13.511107842566379075799459233305947
13.519431847277609941232036080607544
13.527641315577516333811095751023520
13.535493461803957879581733368101521
13.543084323366200838300039176315332
13.550504412576211288095020257342519
13.557762668158072770433170818766971
13.564958044304722734009028672257896
13.572043884450805383578987603438786
13.578837748814414710933467280925295
13.586612599432547359359203779080153
13.592959911744010496809257658001969
13.599059952154497874738089781219857
12.199326127345853916009149880943422
12.281040527431431456883217428846113
12.354482413853570301131793493786704
12.421027974747801610713466511114207
12.481745360450139667192011174605863
12.537479148348791828180725386201064
12.588907920692053314139061768312908
12.636584558849435543137582196072181
12.680965096098118923436248549296051
12.722429798828036178804146087289492
12.761298847540600696316471357098745
12.797844188914176808112395397996995
12.832298623805456848288841282862554
12.864862864837654839427475941273709
12.895711085169493589386718357886965
12.924995323677800300649200885376963
12.952849018349319276368496909220240
12.979389881806587929393146535001536
13.004722173676474514325001997839461
13.028938801180381908385125175110548
13.052122569524550318903068986491322
13.074347966865955839456185038291272
13.095681797656212049861838152969811
13.116184350936469838871049112592397
13.135910414942072482775413880736439
13.154910018341609905494554223902216
13.173227515058212755159290331997399
13.190904563910270596599158822879997
13.207979050670762502542808795553103
13.224484921862603128812749940479344
13.240453522986667992419868738673504
13.255914147651533345355162750305551
13.270895130906341393601998277628536
13.285419125190171039873138415974114
13.299508767603123209430266638744025
13.313185140342015149024233508130128
13.326471695739198888194127423197993
13.339384163779883682357243658284554
13.351930748190988263794674502771721
13.364142777237566574247813605863778
13.376020835131593723786616298972917
13.387582311376027194727073026599142
13.398865377039202234681959848510147
13.409819665483104102788219559926390
13.420539883769483957581690933051480
13.430979699159296367928654845659964
13.441136013513055381428134566110019
13.451072044972393249466607491105591
13.460737144623883340126835494564910
13.470155360061132928954773338423225
13.479337389227819997111748990692973
13.488249148435842618350149753783486
13.497011084300140602722763616549800
13.505547791585498408392624616902183
13.513936036377083173562688008219201
13.522232264247358404187723455476999
13.530300873952004160088528545275672
13.538046382601181802194312557622836
13.545599058351387123157120673148797
13.552923260697021481475229482726246
13.560302341521164494357743132135167
13.567252292374466826596567631465810
13.574288148599622255870938533612831
13.581263278311749328511560181131020
13.588785775454742632035040598882148
13.594915982519419341022644469998104
45
46
ANDREW ELVEY PRICE AND ANTHONY J GUTTMANN
11. Acknowledgements
We wish to thank Andrew Rechnitzer for many stimulating discussions on this topic, and
Murray Elder for helpful comments on the manuscript. AJG wishes to thank Nathan Clisby
for his vastly superior version of the program to use differential approximants to predict
further terms and ratios. AEP wishes to thank ACEMS for financial support through a
PhD top-up scholarship.
References
[1] N Beaton, A J Guttmann, I Jensen and G Lawler, Compressed self-avoiding walks, bridges and polygons, J. Phys A: Math. Theor. 48 454001 (27pp) (2015).
[2] J Belk and K S Brown, Forest diagrams for elements of Thompson’s group F , Int. J. Alg. Comp. 15
815-850 (2005).
[3] S Blake Fordham, Minimal length elements of Thompsons group F. Geom. Dedicata 99 179-220 (2003).
[4] M G Brin, Elementary amenable subgroups of R. Thompson’s group F, Intl. J. Alg. and Comp. 15
619-642 (2005).
[5] J M Cohen, Cogrowth and amenability of discrete groups, J. Funct. Anal, 48 301-309 (1982).
[6] M Elder, E Fusy and A R Rechnitzer, Counting elements and geodesics in Thompson’s group F , J.
Alg. 324 102-121 (2010).
[7] M Elder, A Rechnitzer and E J Janse van Rensburg, Random Sampling of Trivial Words in Finitely
Presented Groups, Expr Math 24 391-409 (2015).
[8] M Elder, A R Rechnitzer and T Wong, On the cogrowth of Thompson’s group F , Groups - Complexity
- Cryptology, 4 301-320 (2012).
[9] F Gantmakher and M Krein, Sur les matrices completement non-négatives et oscillatoires, Compositio
Mathematica 4 445-476 (1937).
[10] D Gretete, Random walks on a discrete Heisenberg group, Rend. Circ. Mat. Palermo 60 329-335 (2011).
[11] R I Grigorchuk, Symmetric random walks on discrete groups, in Multicomponent random systems (eds.
R L Dobrushin and Ya. G Sinai), Nauka, Moscow (1978).
[12] V S Guba, On the properties of the Cayley graph of Richard Thompson’s group F, Internat. J. Alg.
Comp. 14 (56) 677-702, International Conference on Semigroups and Groups in honor of the 65th
birthday of Prof. John Rhodes (2004).
[13] A J Guttmann, in Phase Transitions and Critical Phenomena, vol 13, eds. C Domb and J Lebowitz,
Academic Press, London and New York, (1989).
[14] A J Guttmann, Analysis of series expansions for non-algebraic singularities, J. Phys A: Math. Theor.
48 045209 (33pp) (2015).
[15] A J Guttmann, Series extension: Predicting approximate series coefficients from a finite number of
exact coefficients, J. Phys A: Math. Theor. 49 415002 (27pp) (2016).
[16] A J Guttmann and I Jensen, Series Analysis. Chapter 8 of Polygons, Polyominoes and Polycubes
Lecture Notes in Physics 775, ed. A J Guttmann, Springer, (Heidelberg), (2009).
[17] A J Guttmann and G S Joyce, A new method of series analysis in lattice statistics, J Phys A, 5 L81–
84, (1972).
[18] S Haagerup, U Haagerup and M Ramirez-Solano, A computational approach to the Thompson group
F , Int. J. Alg. and Comp. 25 381-432 (2015).
[19] A Navas, Quelques groupes moyennables de difféomorphismes de l’intervalle, Bol. Soc. Mat. Mexicana
10 219-244 (2004).
[20] C. Pittet and L Saloff-Coste, On the stability of the behavior of random walks on groups, J. Geom.
Anal. 10 No 4 713-737 (2000).
[21] C. Pittet and L Saloff-Coste, On random walks on wreath products, Ann. of Probab. 30 No.2 948-977
(2002).
NUMERICAL STUDIES OF THOMPSON’S GROUP F AND RELATED GROUPS
47
[22] D Revelle, Heat kernel asymptotics on the lamplighter group, Elect. Comm. in Probab. 8 142-154
(2003).
[23] T-J Stieltjes, Recherches sur les fractions continues, Annales de la Faculté des sciences de Toulouse:
Mathématiques. 8 No. 4. J1-J122 (1894).
| 4math.GR
|
Full-Frame Scene Coordinate Regression for
Image-Based Localization
Xiaotian Li, Juha Ylioinas and Juho Kannala
arXiv:1802.03237v1 [cs.CV] 9 Feb 2018
Aalto University
[email protected]
Abstract—Image-based localization, or camera relocalization,
is a fundamental problem in computer vision and robotics, and it
refers to estimating camera pose from an image. Recent state-ofthe-art approaches use learning based methods, such as Random
Forests (RFs) and Convolutional Neural Networks (CNNs), to
regress for each pixel in the image its corresponding position
in the scene’s world coordinate frame, and solve the final pose
via a RANSAC-based optimization scheme using the predicted
correspondences. In this paper, instead of in a patch-based
manner, we propose to perform the scene coordinate regression
in a full-frame manner to make the computation efficient at
test time and, more importantly, to add more global context
to the regression process to improve the robustness. To do so,
we adopt a fully convolutional encoder-decoder neural network
architecture which accepts a whole image as input and produces
scene coordinate predictions for all pixels in the image. However,
using more global context is prone to overfitting. To alleviate this
issue, we propose to use data augmentation to generate more
data for training. In addition to the data augmentation in 2D
image space, we also augment the data in 3D space. We evaluate
our approach on the publicly available 7-Scenes dataset, and
experiments show that it has better scene coordinate predictions
and achieves state-of-the-art results in localization with improved
robustness on the hardest frames (e.g., frames with repeated
structures).
I. I NTRODUCTION
Image-based localization is an important problem in computer vision and robotics. It addresses the problem of estimating the 6 DoF camera pose in an environment from an image.
It is a key component of many computer vision applications
such as navigating autonomous vehicles and mobile robotics
[7], simultaneous localization and mapping (SLAM) [8], and
augmented reality [4, 18].
Currently, there are plenty of image-based localization
methods proposed in the literature. Many state-of-the-art approaches [25, 26] are based on local features, such as SIFT,
ORB, or SURF [17, 23, 1], and efficient 2D-to-3D matching.
Given a 3D scene model, where each 3D point is associated
with the image features from which it was triangulated,
localizing a new query image against the model is solved
by first finding a large set of matches between 2D image
features and 3D points in the model via descriptor matching,
and then using RANSAC [9] to reject outlier matches and
estimate the camera pose on inliers. Although these local
feature based methods have been proven to be very accurate
and robust in many situations, due to the limitations of the
hand-crafted feature detector and descriptor, extremely large
viewpoint changes, repetitive structures and textureless scenes
often produce a large number of false matchings which will
lead to localization failure.
Recently, some promising neural network based localization
approaches have been proposed. Approaches such as PoseNet
[13] formulate 6 DoF pose estimation as a regression problem,
and thus no traditional feature extraction, feature description,
or feature matching processes are required. It has been shown
that these approaches overcome the limitations of the local
feature based approaches, i.e., they are able to recover the camera pose in very challenging indoor environments where the
traditional methods fail. However, their localization accuracy is
still far below traditional approaches in other situations where
local features perform well. Unlike PoseNet, approaches such
as DSAC [3] obtain the 6 DoF pose by a two-stage pipeline:
first, regressing a 3D point position for each pixel in an image,
and then determining the camera pose using RANSAC based
on these correspondences as in the conventional localization
pipeline. Results have shown that these methods are the current
state-of-the-art on the standard 7-Scenes benchmark [28].
In this paper, we follow the two-stage RGB-only localization pipeline and present a full-frame Coordinate CNN for
the scene coordinate regression in the first stage. This fullframe Coordinate CNN is trained to generate dense scene
coordinate predictions from a given RGB image. Compared
to the patch-based Coordinate CNN adopted in the DSAC
pipeline [3], which is trained to generate a single scene
coordinate prediction from an image patch centered around
a pixel, our network considers more global information and
can be evaluated efficiently at test time. Nevertheless, encoding more global context during regression is more prone to
overfitting than using local patches since local patches are
more invariant to viewpoint changes. Therefore, we propose
to use data augmentation to mitigate the problem. We show
with experiments on the widely used 7-Scenes dataset that
our approach has improved scene coordinate predictions and
achieves state-of-the-art results in localization with strong
robustness.
The contributions of this paper can be summarized as
follows:
• We adopt a fully convolutional encoder-decoder network
for the scene coordinate regression in the two-stage
image-based localization pipeline to encode more global
information.
• We do data augmentation in both 2D and 3D space for
the scene coordinate regression, and we show that data
RANSACBased
Optimization
6 DoF
Pose
RGB Image
Convolution
Scene Coordinate Prediction
Upconvolution
Fig. 1. Overview of our system. In this two-stage pipeline, the encoder-decoder full-frame Coordinate CNN accepts a whole RGB image as input and
produces scene coordinate predictions for all pixels in the image, and then the final pose is solved via a RANSAC-based optimization scheme using the
predicted correspondences.
•
augmentation is necessary for training the full-frame Coordinate CNN to achieve good localization performance.
Our approach achieves state-of-the-art results and shows
improved robustness on the hardest frames.
II. R ELATED W ORK
Solving the image-based localization problem consists of
estimating the 6 DoF camera pose of a query image in an
arbitrary scene. This is also known as camera relocalization.
More specifically, the localization system takes only one image
as input, and then outputs camera pose according to a given
representation of the scene. The representation of the scene
depends on the approach used. It can be a database of images,
a reconstructed 3D model, or a trained deep neural network.
Here we only consider one image as input, although the imagebased localization task can be extended by using a sequence
of images as input.
In the earliest stages, image-based localization was solved
by treating it as a location recognition problem [34]. In these
approaches, image retrieval techniques are often applied to
determine the location of the query image by matching it to
a database of images and finding the most similar images to
it. The locations of the database images are known. Thus, the
location of the query image can be estimated according to the
known locations. Initially, these methods worked on databases
consisting of tens of thousands of images and then they were
improved to deal with more than a million images. However,
the localization performance provided by these approaches is
Convolution
limited by the accuracy of the known locations of the database
Upconvolution
images [24] and the density of the key-frames.
To obtain better localization performance, more recent techniques [11] are based on more detailed and structured information, i.e., they use a reconstructed 3D point cloud model,
usually obtained from Structure-from-Motion, to represent the
scene. This is enabled by some powerful SfM approaches such
as Bundler [29]. It is even possible to construct huge models
with millions of points [30]. Thus, image-based localization
systems are enabled to work on a city-scale level. Instead
of matching the query image to the database images, these
keypoint based methods solve the localization task by finding
correspondences between the query image and the 3D model.
This is achieved by the use of the conventional hand-crafted
features, e.g., SIFT [17]. The features of the 3D points are
computed during the 3D reconstruction, and the features of the
query image are detected and extracted at test time. Therefore,
the correspondence search is formulated as a descriptor matching problem. After establishing the 2D-3D correspondences,
the camera pose is determined by a Perspective-n-Point [14]
solver inside a RANSAC [9] loop.
It is obvious that the pose estimation step can only succeed
if the quality of the established correspondences is good
enough. When the 3D model is too big in size or too complex,
an efficient and effective descriptor matching step is essential.
There are several techniques in the literature to handle this
problem, such as 2D-to-2D-to-3D matching [11], 3D-to-2Dmatching [15], prioritized matching [24] and co-visibility
filtering [25]. However, even if the matching process is enough
effective and efficient, limitations of the hand-crated features
will still cause these keypoint based localization systems to
fail.
Recently, it has been shown that machine learning methods
have great potential to tackle the problem of image-based
localization. PoseNet [13] demonstrates the feasibility of formulating 6 DoF pose estimation as a regression problem.
The pose of a query image is directly regressed by a deep
CNN with GoogLeNet [31] architecture pre-trained on largescale image classification data. However, its performance is
still below the state-of-the-art keypoint based methods and
far from ideal for practical camera relocalization. In order
to improve the accuracy of PoseNet, several variants have
been proposed in recent papers. For example, LSTM-Pose
[33] makes use of LSTM units [10] on the CNN output to
exploit the structured feature correlation. The LSTM units
play the role of a structured dimensionality reduction on the
feature vector and lead to drastic improvements in localization
performance. Another variant, Hourglass-Pose [21], is based
on hourglass architecture which consists of a chain of convolution and upconvolution layers followed by a regression
part. The upconvolution layers are introduced to preserve
the fine-grained information of the input image and this
mechanism has been proven to be able to further improve
the accuracy of image-based localization using CNN based
architectures. Besides, it has been shown that the use of a
novel loss function based on scene reprojection error can also
significantly improve PoseNet’s performance [12].
Unlike PoseNet, the scene coordinate regression forests
(SCoRF) approach [28] adopts a regression forest [6] to
generate 2D-3D matches from an RGB-D input image instead
of directly regressing the camera pose. The final camera
pose is then determined via a RANSAC-based solver. This
whole pipeline is similar to the keypoint based localization
approaches, but no traditional feature extraction, feature description, or feature matching processes are required. The
original SCoRF pipeline is further improved by exploiting
uncertainty in the model [32]. Training the random forest to
predict multimodal distributions of scene coordinates results
in increased pose accuracy.
In order to localize RGB-only images as well, the original
SCoRF is extended by utilizing the increased predictive power
of an auto-context random forest [2]. In the most recent
DSAC paper [3], a neural network based SCoRF pipeline
for RGB-only images is proposed. In contrast to previous
SCoRF pipelines, two CNNs are adopted for predicting scene
coordinates and for scoring hypotheses respectively. Moreover,
the conventional RANSAC is replaced by a new differentiable
RANSAC, which enables the whole pipeline to be trained endto-end. In [19], Massiceti et al. further explore efficient versus
non-efficient and RF- versus non-RF-derived NN architectures
for camera localization and propose a new fully-differentiable
robust averaging technique for regression ensembles.
III. M ETHOD
Our CNN based approach presented in this paper is inspired
by the state-of-the-art RGB-only DSAC pipeline [3], and it
consists of two stages. In the first stage, a Coordinate CNN
is adopted to generate 2D-3D correspondences from a given
RGB-only image. In the second stage, a RANSAC-based
scheme is performed to determine the final pose estimate. The
overall pipeline is illustrated in Figure 1.
The Coordinate CNN used in the original DSAC pipeline
[3] is trained and evaluated in a patch-based manner. Similar
to the patch-based approaches for semantic segmentation,
patches need to be sampled during both training and test
time. The patch-based Coordinate CNN is trained using image
patches of fixed size (42 × 42) centered around pixels and the
corresponding world coordinates of these pixels. At test time,
patches of the same size are used as inputs of the Coordinate
CNN to generate 2D-3D correspondences. However, obtaining
a set of 2D-3D correspondences in such a way is very
inefficient. In the DSAC pipeline [3], 1600 correspondences
are needed for pose estimation. Thus 1600 patches should
be extracted and fed into the deep neural network. This is
obviously time-consuming and also requires much memory.
Moreover, the fixed patch size limits the size of the receptive
field, and thus limits the information that can be processed by
the network. This makes it difficult for the Coordinate CNN
to predict accurate 2D-3D correspondences when the scene
exhibits ambiguities (e.g., repeated structures), since the global
context cannot be used by the network.
To overcome such limitations, we propose to use a encoderdecoder CNN which accepts a whole image as input and
produces scene coordinate predictions for all pixels in the
image. This is inspired by recently presented architectures
for solving per-pixel tasks, such as semantic segmentation,
depth estimation, and disparity estimation. Performing scene
coordinate regression in this way, patches are not required to
be sampled and the 2D-3D correspondences can be generated efficiently at test time. Since the receptive field of the
encoder-decoder architecture covers almost the entire input
image, more global context is added to the regression process and more overall information is considered. However,
the global image appearance may change a lot due to only
small viewpoint changes. That is, it is not as invariant to
viewpoint changes as local appearance. Therefore, regressing
the scene coordinates using more global information is prone
to overfitting. We propose to use data augmentation to mitigate
the problem. We call our network full-frame Coordinate CNN.
A. Network Architecture
Our full-frame Coordinate CNN is based on the architecture
of DispNet [20]. It is fully convolutional [16] such that
dense per-pixel scene coordinate predictions can be generated
from arbitrary-sized input images. We call the outputs scene
coordinate images. The network consists of a contractive part
and an expanding part. The input image is first spatially
compressed via the contractive part and then refined via the
expanding part. Moreover, shortcut connections are added in
between to overcome the data bottleneck. Unlike DispNet [20],
there is only one final output layer at the end of the network
and no multi-scale side predictions are used. Instead of ReLU
[22], we use ELU [5] for the nonlinearity between layers. The
details of our network architecture are described in Table I.
Layers start with upconv are upconvolutional layers and all
other layers are convolutional. Also for each layer, the size of
the kernel, the stride, the number of input channels, the number
of output channels, and the input (+ is a concatenation) are
given.
B. Training Loss
Similar to the patch-based Coordinate CNN used in the
original DSAC pipeline, we train our full-frame Coordinate
CNN by minimizing the Euclidean distance between the scene
coordinate ground truth and the prediction as given in Equation
1. Unlike training in a patch-based manner where patches and
single predictions are used and only patches centered at pixels
with valid depth values are sampled for training, our network
uses pairs of color image and scene coordinate image (dense
scene coordinate values) as training samples where the ground
truth scene coordinates can be missing for some pixels. Here
we simply ignore the pixels without the ground truth scene
coordinates and mask out their contributions to the final loss.
TABLE I
O UR NETWORK ARCHITECTURE .
Name
conv1a
conv1b
conv2a
conv2b
conv3a
conv3b
conv4a
conv4b
conv5a
conv5b
conv6a
conv6b
conv7a
conv7b
upconv6
iconv6
upconv5
iconv5
upconv4
iconv4
upconv3
iconv3
upconv2
iconv2
upconv1
iconv1
upconv0
iconv0
coord pred
Kernel
7×7
7×7
5×5
5×5
3×3
3×3
3×3
3×3
3×3
3×3
3×3
3×3
3×3
3×3
3×3
3×3
3×3
3×3
3×3
3×3
3×3
3×3
3×3
3×3
3×3
3×3
3×3
3×3
3×3
Str.
2
1
2
1
2
1
2
1
2
1
2
1
2
1
2
1
2
1
2
1
2
1
2
1
2
1
2
1
1
Ch I/O
3/32
32/32
32/64
64/64
64/128
128/128
128/256
256/256
256/512
512/512
512/512
512/512
512/512
512/512
512/512
1024/512
512/512
1024/512
512/256
512/256
256/128
256/128
128/64
128/64
64/32
64/32
32/16
16/16
16/3
Input
image
conv1a
conv1b
conv2a
conv2b
conv3a
conv3b
conv4a
conv4b
conv5a
conv5b
conv6a
conv6b
conv7a
conv7b
upconv6+conv6b
iconv6
upconv5+conv5b
iconv5
upconv4+conv4b
iconv4
upconv3+conv3b
iconv3
upconv2+conv2b
iconv2
upconv1+conv1b
iconv1
upconv0
iconv0
More formally, loss for a training sample can be written as:
X
loss =
Mij kŶij − Yij k
(1)
i,j
where Y and Ŷ are ground truth scene coordinate image and
scene coordinate image prediction respectively, M is a mask
and (i, j) is a 2D pixel coordinate. The mask M has the same
resolution as the color image and the scene coordinate image.
A pixel of M is set to 1 if the corresponding scene coordinate
ground truth exists and 0 otherwise.
C. Data Augmentation
While our network has larger receptive field and can encode
more global context information for better understanding of
the scene, it is more prone to overfitting compared to a network
trained and tested in a patch-based manner. This is because
local patches are more invariant to viewpoint changes and we
can usually sample sufficiently enough patches for training.
However, in our case, we need more training images taken
from a lot of different viewpoints to regularize the network,
since global image appearance is more sensitive to viewpoint
changes. Unfortunately, a common problem for image-based
localization is that the training poses in the whole pose space
is not complete enough to regularize such a network. Also,
image-based localization is typically performed scene-wise,
which means that only the images belonging to a particular
scene can be used during training. It does not make sense
to use data belonging to other scenes, and unlike for other
computer vision tasks such as semantic segmentation, it is not
Fig. 2. Data augmentation. Left: original RGB and sence coordinate images.
Middle: 2D transformation. Right: 3D transformation.
straightforward to apply transfer learning technique for imagebased localization. Hence, overfitting can be a serious problem
in training our full-frame Coordinate CNN for solving imagebased localization.
To alleviate the overfitting problem, we propose to use data
augmentation to generate more data for training. A simple
and common way of doing data augmentation in the context
of solving per-pixel tasks is to apply 2D affine geometric
transformations to the training images. In our case, we apply
2D transformations to both the input RGB images and the
ground truth scene coordinate images. The transformations we
perform include translation, rotation, and scaling.
However, these 2D affine transformations do not always
generate correct input RGB images which are consistent with
3D scenes (although they are always consistent with their
transformed ground truth scene coordinate images). Since the
camera is in 3D space and 3D points are projected onto
the image plane according to a camera model, if camera
pose is changed, the transformation between the old and new
2D coordinates of 3D points is much more complex than
the combination of 2D transformations in the image plane.
Therefore, we propose to augment data also in 3D space. For
each training sample, since we already have the ground truth
scene coordinate image, we can generate a local 3D point
cloud from that. We then add a small random transformation
to the ground truth pose to synthesize a new camera pose.
Finally, using the new camera pose, the local 3D point cloud
and the known camera model, we project the points to the new
camera plane to generate a new RGB image and its ground
truth scene coordinate image.
D. Camera Pose Optimization
In the second stage of the two-stage pipeline, a RANSAC
algorithm is used in combination with a PnP algorithm to
determine the final pose estimation from the 2D-3D correspondences generated in the first stage. Here the RANSAC
pose optimization algorithm we use is similar to the one used
in the DSAC pipeline [3]. The only differences are that firstly
we simply score the hypotheses by counting inliers instead of
using a Score CNN [3] to regress the scores of hypotheses
from their reprojection error images, and secondly we use
the conventional argmax hypothesis selection instead of the
probabilistic selection. We believe the Score CNN used in [3]
is prone to overfitting.
The detailed steps of the RANSAC-based pose optimization
algorithm used in this paper are described in Algorithm 1.
Here, score(Hi ) is the number of inliers, i.e., the number of
correspondences with reprojection errors less than a threshold
τ , and the final pose Hf is the one with highest inlier count.
Following [3], 40 × 40 correspondences are sampled (N =
1600), 256 hypotheses are sampled per image (K = 256), the
inlier threshold τ is set to 10 pixels, 8 refinement steps are
performed (R = 8), in each refinement step at most 100 inliers
are chosen (P = 100), and the refinement is stopped in case
less than 50 inliers have been found (Q = 50).
Algorithm 1 Pseudocode for RANSAC optimization
01: evaluate the Coordinate CNN to obtain N correspondences
02: i ← 0
03: while i < K do
04:
sample 4 2D-3D correspondences
05:
generate a pose hypothesis h using PnP
06:
if all the 4 correspondences are inliers of h then
07:
Hi ← h
08:
Si ← score(Hi )
09:
i←i+1
10: select the final pose Hf according to the scores
11: j ← 0
12: while j < R do
13:
sample at most P inliers
14:
if less than Q inliers are found then
15:
break
16:
recalculate the pose Hf from the inliers
17: return pose Hf
IV. E XPERIMENTS
In this section, we evaluate the performance of our system,
and compare it with other state-of-the-art methods. We use the
7-Scenes dataset [28] for benchmarking.
A. Evaluation Dataset
For the experiments, we use the 7-Scenes dataset [28]
provided by Microsoft Research. The 7-Scenes dataset is a
widely used RGB-D dataset which consists of seven different
indoor environments. The RGB-D images are captured using a
handheld Kinect camera at 640×480 resolution and associated
with 6 DoF ground truth camera poses obtained via the
KinectFusion system. A dense 3D model is also available for
each scene. Each scene contains multiple sequences of tracked
RGB-D camera frames and these sequences are split into training and testing data. The dataset exhibits several challenges,
namely motion blur, illumination changes, textureless surfaces,
repeated structures (e.g., in the Stairs dataset), reflections (e.g.,
in the Redkitchen dataset), and sensor noise. Following [3],
we use the depth images to generate the ground truth scene
coordinates. At test time, we only use RGB images to estimate
poses.
B. Implementation Details
We train our network from scratch for 800 epochs with a
batch size of 16 (i.e., 200k updates for Chess) using the Adam
optimizer where β1 = 0.9, β2 = 0.999, and = 10−8 . The
loss is computed as described in Section III-B. The initial
learning rate is set to 0.0001 and is halved every 200 epochs
until the end.
As mentioned in Section III-C, we perform data augmentation online during network training. We perform the 2D
affine transformation with a 40% chance, perform the 3D
transformation with a 50% chance, and use the original image
with a 10% chance. For the 2D transformation, we uniformly
sample translation from the range [−20%, 20%] of the image
width and height for x and y respectively, sample rotation from
[−45◦ , 45◦ ] and sample scaling from [0.7, 1.5]. All pixels
without valid RGB values are padded with the same random
value. For the 3D transformation, we uniformly sample the
rotational axis and the rotational angle is uniformly sampled
from [0◦ , 60◦ ]. The direction of the translation vector is again
uniformly sampled, and its magnitude in mm is sampled from
[0, 200]. All pixels without valid RGB values are padded with
different random values. Figure 2 shows an example of the data
augmentation.
At test time, although our full-frame Coordinate CNN can
generate 640 × 480 scene coordinate predictions, we only
sample 40×40 of the predictions for the pose estimation stage
to make it consistent with the DSAC pipeline [3].
C. Results
We report both median error of camera pose estimations
and accuracy measured as the percentage of query images
for which the camera pose error is below 5◦ and 5cm. The
results of our method on the 7-Scenes dataset together with
two current state-of-the-art methods are shown in Table II.
Following [3], Complete denotes the combined set of frames
(17000) of all scenes. We also plot the cumulative histograms
of localization errors for a more detailed comparison and
report the results of [25] and DSAC* (i.e., DSAC [3] patchbased scene coordinate regression + conventional RANSAC).
Note that for the DSAC pipeline [3], only the accuracy is
reported in the original paper, and we obtain the additional
results using the publicly available source code and trained
models provided by the authors. For [25], we use Colmap
[27] to construct models from scratch and register the models
against the ground truth poses of the training images, and again
we use the publicly available implementation of [25].
As we can see, the overall performance of DSAC* is
better than the original DSAC [3]. While achieving almost
the same results on the easy frames, DSAC* has superior
performance on the harder ones, i.e., DSAC* provides better
0.95 quantiles, especially for scenes that have fewer training
images (Fire, Heads). More importantly, DSAC* is able to
produce reasonable median localization error for Stairs, though
TABLE II
R ESULTS OF OUR APPROACH ON THE 7-S CENES DATASET. O UR APPROACH OUTPERFORMS TWO STATE - OF - THE - ART METHODS AND HAS SIGNIFICANTLY
IMPROVED PERFORMANCE ON S TAIRS . T RAINING THE FULL - FRAME C OORDINATE CNN WITHOUT OUR PROPOSED DATA AUGMENTATION
DRAMATICALLY DEGENERATES THE LOCALIZATION PERFORMANCE .
Scene
Chess
Fire
Heads
Office
Pumpkin
Red Kitchen
Stairs
Average
Complete
Brachmann
et al. [2]
94.9%
73.5%
48.1%
53.2%
54.5%
42.2%
20.1%
55.2%
55.2%
5◦ , 5cm
Brachmann
et al. [3]
94.6%
74.3%
71.7%
71.2%
53.6%
51.2%
4.5%
60.1%
62.5%
Ours
noaug
43.2%
10.7%
14.1%
30.6%
18.5%
38.8%
0.2%
22.3%
28.0%
Ours
88.5%
62.3%
75.1%
73.1%
51.4%
60.4%
29.5%
62.9%
64.9%
the accuracy on the hardest frames of Stairs is still terrible.
The results of DSAC* suggest that the use of the Score CNN
[3] could make the entire localization pipeline less robust.
According to the results, our proposed method outperforms
the two state-of-the-art methods [2, 3] and the traditional
keypoint based method [25], and its overall localization performance is more robust. To be specific, our method significantly
improves the performance on the hardest frames. We find that
while DSAC [3] (as well as DSAC*) and [25] often have
extreme localization errors, i.e., rotational errors close to 180◦
and rotational errors larger than 2-5m, the maximum errors
of our methods are always reasonable. As shown in Figure
3, the Ours curves always reach 1 very quickly compared to
others. The results suggest that the global information could
help the system to perform better in challenging scenarios.
Remarkably, our method is able to provide significantly better
localization performance for Stairs. Even the hardest frames
can be localized with the errors less than 0.41m and 13◦ .
It shows that the full-frame Coordinate CNN with enlarged
receptive field can better cope with the repetitive structures,
while the patch-based Coordinate CNN [3] and the local
keypoint based method [25] are limited due to their local
nature. Our method is also on-par with [19]. However, in [19],
only the overall accuracy is reported and this prevents us from
carrying out a more detailed comparison.
To show that our full-frame Coordinate CNN is more
efficient at test time, we present the runtimes of the CNNs
in Table III. We see that our full-frame Coordinate CNN is
one order of magnitude faster than the patch-based one [3].
And this comparison is even not fair since our full-frame
Coordinate CNN produces 640 × 480 predictions while only
40 × 40 are generated by the patch-based one [3]. In addition,
our full-frame Coordinate CNN has a relatively small model
size compared to the regression forest based model [19] as
shown in Table IV.
Following [19], in addition to the direct measure of localization performance, we present the accuracy of the intermediate
scene coordinate predictions on the test images. In Table V,
we report the percentage of scene coordinate inliers and the
mean Euclidean distance between the inliers and their ground
truth scene coordinate labels. A prediction is considered as
Brachmann
et al. [2]
1.5cm, 1.3◦
3.0cm, 1.4◦
5.9cm, 3.4◦
4.7cm, 1.7◦
4.3cm, 2.1◦
5.8cm, 2.2◦
17.4cm, 7.0◦
6.1cm, 2.7◦
-
Median Error
Brachmann
Ours
et al. [3]
noaug
2.1cm, 0.7◦
5.9cm, 1.9◦
2.8cm, 1.0◦
13.2cm, 4.5◦
2.0cm, 1.3◦
12.6cm, 9.4◦
3.4cm, 1.0◦
7.0cm, 2.0◦
4.7cm, 1.3◦
10.5cm, 2.7◦
5.0cm, 1.5◦
6.1cm, 1.7◦
1.9m, 49.4◦
43.4cm, 10.1◦
30cm, 8.0◦
14.1cm, 4.6◦
3.9cm, 1.6◦
8.0cm, 2.3◦
Ours
2.4cm,
3.7cm,
2.4cm,
3.5cm,
4.9cm,
4.2cm,
7.9cm,
4.1cm,
3.8cm,
0.8◦
1.4◦
1.7◦
1.0◦
1.3◦
1.2◦
2.1◦
1.4◦
1.2◦
TABLE III
T HE RUNTIMES OF THE FULL - FRAME AND PATCH - BASED C OORDINATE
CNN S .
GPU
NVIDIA GeForce GT 750M
NVIDIA GeForce GTX 1080
Full-frame
∼0.3s
∼0.02s
Patch-based
∼5s
∼0.3s
TABLE IV
T HE MEMORY CONSUMPTION OF OUR MODIFIED D ISP N ET COMPARED TO
THE REGRESSION FOREST BASED MODEL FROM [19].
Ours
∼120MB
Most compact from [19]
∼250MB
an inlier if its Euclidean distance to its ground truth label
is less than 10mm [19]. The normalized histograms of scene
coordinate errors are illustrated in Figure 4. As we can see,
our full-frame Coordinate CNN is able to produce significantly
better scene coordinate predictions. This shows why it is
more robust than the patch-based one. However, this does not
directly lead to equally better localization accuracy. This is
because the RANSAC-based optimizer is highly robust and
non-deterministic [19].
To evaluate the effectiveness of data augmentation, we also
report the performance of our method without the proposed
data augmentation. According to the results, training the fullframe Coordinate CNN without data augmentation dramatically degenerates the localization performance on all the
scenes. Without data augmentation, the full-frame Coordinate
CNN is unable to generalize well to unseen images. This
proves the importance of data augmentation which is used for
regularizing our full-frame Coordinate CNN during training.
TABLE V
T HE PERCENTAGES OF THE SCENE COORDINATE PREDICTION INLIERS
AND THE MEAN ERRORS OF THE INLIERS . O UR PREDICTIONS ARE
CLEARLY THE MOST ACCURATE .
DSAC [3]
59.4%, 41mm
Best from [19]
45.3%, 47mm
Ours
90.3%, 28mm
Fig. 3. Localization performance presented by cumulative histograms (normalized) of errors. Compared to other methods, our method is more robust, i.e.,
it has better performance on the hardest frames, since the curves always reach 1 very quickly.
V. C ONCLUSION
R EFERENCES
In this paper, we present a image-based localization approach using fully convolutional encoder-decoder network to
predict scene coordinates of RGB image pixels in a full-frame
manner. The proposed full-frame Coordinate CNN can process
more global information to better understand the scene. It
takes a whole image as input and produces scene coordinate
predictions for all pixels in the image and can be efficiently
evaluated at test time. The proposed data augmentation is
crucial for our approach to achieve good localization performance. The results show that our method provides more
accurate scene coordinate predictions, achieves state-of-theart localization performance and has improved robustness in
challenging scenarios.
[1] Herbert Bay, Tinne Tuytelaars, and Luc Van Gool. Surf:
Speeded up robust features. In ECCV, 2006.
[2] Eric Brachmann, Frank Michel, Alexander Krull,
Michael Ying Yang, Stefan Gumhold, and Carsten
Rother. Uncertainty-driven 6d pose estimation of objects
and scenes from a single RGB image. In CVPR, 2016.
[3] Eric Brachmann, Alexander Krull, Sebastian Nowozin,
Jamie Shotton, Frank Michel, Stefan Gumhold, and
Carsten Rother. Dsac - differentiable ransac for camera
localization. In CVPR, 2017.
[4] Robert Oliver Castle, Georg Klein, and David W. Murray.
Video-rate localization in multiple maps for wearable
augmented reality. In ISWC, 2008.
[5] Djork-Arné Clevert, Thomas Unterthiner, and Sepp
Hochreiter. Fast and accurate deep network learning by
Fig. 4.
Histograms (normalized) of scene coordinate errors. Our method provides better scene coordinate predictions.
exponential linear units (elus). In ICLR, 2016.
[6] Antonio Criminisi and Jamie Shotton. Decision Forests
for Computer Vision and Medical Image Analysis.
Springer Publishing Company, Incorporated, 2013. ISBN
1447149289, 9781447149286.
[7] Mark Cummins and Paul Newman. Fab-map: Probabilistic localization and mapping in the space of appearance.
The International Journal of Robotics Research, 27(6):
647–665, 2008.
[8] Ethan Eade and Tom Drummond. Scalable monocular
slam. In CVPR, 2006.
[9] Martin A. Fischler and Robert C. Bolles. Random sample
consensus: A paradigm for model fitting with applications to image analysis and automated cartography.
Communications of the ACM, 24(6):381–395, 1981.
[10] Sepp Hochreiter and Juergen Schmidhuber. Long ShortTerm Memory. 9(8):1735–1780, 1997.
[11] Arnold Irschara, Christopher Zach, Jan-Michael Frahm,
and Horst Bischof. From structure-from-motion point
clouds to fast location recognition. In CVPR, 2009.
[12] Alex Kendall and Roberto Cipolla. Geometric loss
functions for camera pose regression with deep learning.
In CVPR, 2017.
[13] Alex Kendall, Matthew Grimes, and Roberto Cipolla.
Posenet: A convolutional network for real-time 6-dof
camera relocalization. In ICCV, 2015.
[14] Laurent Kneip, Davide Scaramuzza, and Roland Siegwart. A novel parametrization of the perspective-threepoint problem for a direct computation of absolute camera position and orientation. In CVPR, 2011.
[15] Yunpeng Li, Noah Snavely, and Daniel P. Huttenlocher.
Location recognition using prioritized feature matching.
In ECCV, 2010.
[16] Jonathan Long, Evan Shelhamer, and Trevor Darrell.
Fully convolutional networks for semantic segmentation.
In CVPR, 2015.
[17] David G. Lowe. Distinctive image features from scaleinvariant keypoints. International Journal of Computer
Vision, 60(2):91–110, 2004.
[18] Simon Lynen, Torsten Sattler, Michael Bosse, Joel A.
Hesch, Marc Pollefeys, and Roland Siegwart. Get out of
my lab: Large-scale, real-time visual-inertial localization.
In RSS, 2015.
[19] Daniela Massiceti, Alexander Krull, Eric Brachmann,
Carsten Rother, and Philip H. S. Torr. Random forests
versus neural networks - what’s best for camera relocalization? In ICRA, 2017.
[20] Nikolaus Mayer, Eddy Ilg, Philip Häusser, Philipp Fischer, Daniel Cremers, Alexey Dosovitskiy, and Thomas
Brox. A large dataset to train convolutional networks
for disparity, optical flow, and scene flow estimation. In
CVPR, 2016.
[21] Iaroslav Melekhov, Juha Ylioinas, Juho Kannala, and
Esa Rahtu. Image-based localization using hourglass
networks. In ICCVW, 2017.
[22] Vinod Nair and Geoffrey E. Hinton. Rectified linear units
improve restricted boltzmann machines. In ICML, 2010.
[23] Ethan Rublee, Vincent Rabaud, Kurt Konolige, and
Gary R. Bradski. ORB: an efficient alternative to SIFT
or SURF. In ICCV, 2011.
[24] Torsten Sattler, Bastian Leibe, and Leif Kobbelt. Fast
image-based localization using direct 2d-to-3d matching.
In ICCV, 2011.
[25] Torsten Sattler, Bastian Leibe, and Leif Kobbelt. Improving image-based localization by active correspondence
search. In ECCV, 2012.
[26] Torsten Sattler, Bastian Leibe, and Leif Kobbelt. Efficient
effective prioritized matching for large-scale image-based
localization. IEEE Transactions on Pattern Analysis and
Machine Intelligence, 39(9):1744–1756, 2017.
[27] Johannes L. Schönberger and Jan-Michael Frahm.
Structure-from-motion revisited. In CVPR, 2016.
[28] Jamie Shotton, Ben Glocker, Christopher Zach, Shahram
Izadi, Antonio Criminisi, and Andrew W. Fitzgibbon.
Scene coordinate regression forests for camera relocalization in rgb-d images. In ICCV, 2013.
[29] Noah Snavely, Steven M. Seitz, and Richard Szeliski.
Modeling the world from internet photo collections.
International Journal of Computer Vision, 80(2):189–
210, 2008.
[30] Christoph Strecha, Timo Pylvninen, and Pascal Fua.
Dynamic and scalable large scale image reconstruction.
In CVPR, 2010.
[31] Christian Szegedy, Wei Liu, Yangqing Jia, Pierre Sermanet, Scott E. Reed, Dragomir Anguelov, Dumitru Erhan, Vincent Vanhoucke, and Andrew Rabinovich. Going
deeper with convolutions. In CVPR, 2015.
[32] Julien P. C. Valentin, Matthias Nießner, Jamie Shotton,
Andrew W. Fitzgibbon, Shahram Izadi, and Philip H. S.
Torr. Exploiting uncertainty in regression forests for
accurate camera relocalization. In CVPR, 2015.
[33] Florian Walch, Caner Hazirbas, Laura Leal-Taixe,
Torsten Sattler, Sebastian Hilsenbeck, and Daniel Cremers. Image-based localization using lstms for structured
feature correlation. In ICCV, 2017.
[34] Wei Zhang and Jana Kosecka. Image based localization
in urban environments. In 3DPVT, 2006.
| 1cs.CV
|
Improved Adaptive Resolution Molecular Dynamics
Simulation
Iuliana Marin1, Virgil Tudose2, Anton Hadar2, Nicolae Goga1,3, Andrei Doncescu4
Affiliation 1: Faculty of Engineering in Foreign Languages
University POLITEHNICA of Bucharest, Bucharest, Romania, [email protected]
Affiliation 2: Department of Strength of Materials, University POLITEHNICA of Bucharest, Bucharest, Romania
Affiliation 3: Molecular Dynamics Group, University of Groningen, Groningen, Netherlands
Affiliation 4: Laboratoire d'analyse et d'architecture des systemes, Université Paul Sabatier de Toulouse, Toulouse, France
Abstract—Molecular simulations allow the study of properties
and interactions of molecular systems. This article presents an
improved version of the Adaptive Resolution Scheme that links two
systems having atomistic (also called fine-grained) and coarsegrained resolutions using a force interpolation scheme. Interactions
forces are obtained based on the Hamiltonian derivation for a given
molecular system. The new algorithm was implemented in
GROMACS molecular dynamics software package and tested on a
butane system. The MARTINI coarse-grained force field is applied
between the coarse-grained particles of the butane system. The
molecular dynamics package GROMACS and the Message Passing
Interface allow the simulation of such a system in a reasonable
amount of time.
Keywords—adaptive resolution scheme; molecular dynamics;
MPI; stochastic dynamics; coarse-grained; fine-grained.
INTRODUCTION
The traditional computational molecular modeling
indicates the general process of describing complex chemical
systems in terms of a realistic atomic model, with the goal of
understanding and predicting macroscopic properties based on
detailed knowledge at an atomic scale [1]. In literature, the
study of a system at atomistic level can be defined as finegrained (FG) modeling [2].
I.
Coarse-graining is a systematic way of reducing the
number of degrees of freedom for a system of interest.
Typically whole groups of atoms are represented by single
beads and the coarse-grained (CG) force fields describe their
effective interactions. Coarse-grained models are designed to
reproduce certain properties of a reference system. This can be
either a full atomistic model or a set of experimental data. The
coarse-grained potentials are state dependent and should be reparameterized depending on the system of interest and the
simulation conditions [1].
The main disadvantage of a coarse-grained model is that
the precise atomistic details are lost. In many applications it is
important to preserve atomistic details for some region of
special interest [2]. To combine the two systems, fine-grained
and coarse-grained, it was developed a so-called multiscale
simulation technique [3, 4, 5, 6, 7]. This method combines the
two resolutions by coupling them with a mixing parameter .
The multiscale interaction forces are computed as a weighted
sum of the interactions on fine-grained and coarse-grained
levels [2].
The adaptive resolution scheme (AdResS) couples two
systems with different resolutions by a force interpolation
scheme. The two resolutions are called atomistic and coarsegrained [3, 4]. The atomistic representation of system
describes the phenomena produced at the atomic level (noted
fine-grained or FG) and the other one, coarse-grained,
describes the system at molecular level (noted coarse-grained
or CG).
The AdResS scheme works in the following conditions:
•
the forces between molecules are scaled and the
potential energy is not scaled. Consequently, the Hamiltonian
cannot be used to obtain the energies;
•
just non-bonded interactions between molecules are
scaled. In this way, some computational resources are saved;
•
particles are kept together via bonded atomistic
forces that are computed everywhere, including the coarsegrained part (no pure coarse-grained in that part);
•
in the transition regions there is a potential which is
added (that takes into account the difference in chemical
potentials between the two representations). In this paper it is
denoted by .
In the current paper, it is proposed a method for obtaining
the interaction forces by applying the Hamiltonian derivation,
where potentials can be scaled. The advantage of this method
is that, derivation is based on the sound Hamiltonian model and
energies can be reported correctly. The improved algorithm
was implemented in GROMACS, a molecular dynamics
software, that runs in parallel using the Message Passing
Interface (MPI). Simulations have been done on butane. The
MARTINI coarse-grained force field which was implemented
by the Molecular Dynamics Group from the University of
Groningen was also applied.
The paper is organized as follows. In the next section the
improved AdResS multiscaling resolution scheme is presented.
Section 3 describes the implementation of AdResS in
GROMACS using MPI and its testing on a butane molecular
system. Section 4 outlines the obtained results. The last section
presents the final conclusions.
II. RELATION TO EXISTING THEORIES AND WORK
In this section it is presented the relevant theory for the
algorithm implemented in GROMACS – the improved
AdResS multiscaling resolution scheme [3,4].
A convention is made: for a coarse-grained molecule are
used capital letters for coordinates and for a fine-grained
molecule, small letters. For simplifying the presentation, it is
considered that the space factor is function only on the
coordinate of the reference system. On the and coordinate
axis, is constant.
It is denoted by
the
coordinate of a fine-grained
particle with the number
in the coarse-grained molecule
with number . The coarse-grained molecule is centered in
the center of mass ( ) of the ensemble of corresponding finegrained particles .
The relation between the two parameters is:
∑
(1)
∑
Fig. 2. The coordinates
is
for a coarse-grained particle
A. Multiscaling force
Starting from the Hamiltonian that scales the non-bonded
forces, it is added an extra potential in the transition region
that adjusts for the difference in chemical potentials between
the fine-grained and coarse-grained regions.
As explained above, fine-grained bonded interactions are
computed everywhere, including the coarse-grained region.
The potential energy in the multiscaling model
is a
function of coordinates only and it is chosen as: The
multiscaling factor is defined as follows:
"/
-.
4,
(2)
where
is the mass of the fine-grained particle and
the mass of the coarse-grained particle.
and
"∙
.
+,
-.
+,
/
.
4,
/ 01 2
" /
"3 ∙
(4)
The multiscaling factor is defined as follows:
#
!" $
In Figure 1 more coarse-grained molecules with
corresponding fine-grained particles and the parameters
and are represented.
%
∙ (
'
(5)
Using (4) in (5), it is obtained:
25
6
6
89
:7
∙
/
/
89
57
6 957
6
Because is function of
variable. Then
Fig. 1. The coordinates
and
<=
In AdResS, the space factor is function of the coordinate
of a coarse-grained particle ( ):
#
!" $
%
∙ (
'
(3)
where
is the coordinate in the reference system for the
center of fine-grained region, ) is half of the length of the
fine-grained region and * is the length of transition (hybrid
fine-grained - coarse-grained) region. In Figure 2 are
displayed these parameters.
6 89
57
6
6 9:7
6
/ 12
/
6 ;
6
∙
6 89
:7
6
2
6
6
∙
(6)
, it is necessary to change the
<=
<
for a coarse-grained particle
/
∙
<
∙
<
<
(7)
According to (1), it is obtained
<
<
(8)
Using (8) in (7), results
<=
<
∙ ′
where ′ is the derivative of (3) with respect
computed at the end of section (see formula (18)).
(9)
which is
Taking that into account
BC
<?@A
<
25 -.
(10)
25 .
(11)
C
<?@A
<
are the non-bonded, respectively bonded, forces in the atom
and
BC
<?DA
<
,
25 -.
(12)
25 .
(13)
C
<?DA
<
are the non-bonded, respectively bonded, force in the coarsegrained molecule , formula (6) becomes:
6
6
25
2
∙ ′∙
89
:7
∙
∙
′
89
57
2
6 9:7
2 59 /
6
By making the notation
∙
6
6
∙ 589 / 1 2
/
∙
6 ;
6
6 89
:7
6
The implementation of the new algorithm is based on MPI
parallelization (see Figure 3). MPI is used by dividing the
simulation box into several boxes. The number of processors
involved in computation is equal to the number of the smaller
simulation boxes. Data is passed between the neighboring
simulation boxes through the use of messages which is
constant. The MARTINI coarse-grained force field which is
applied on the particles of the system lowers the initial energy
of atoms until the reference temperature is reached and it is
maintained at that state [8].
The parallelization and the improved AdResS algorithm are
depicted in Figure 3.
∙
(14)
25
<?E
<
III. TECHNOLOGY APPROACH
The implementation of the improved AdResS is done in
GROMACS, a package specialized for running molecular
dynamics simulations. GROMACS was firstly developed at the
University of Groningen. Because the simulation time might
last for a long time, even in terms of months, the Message
Passing Interface (MPI) is used for parallelizing the
computations within the molecular system. The thermostat that
was used is stochastic dynamics.
(15)
it is obtained:
25
2
∙
′
∙
89
:7
∙
′
∙
89
57
2 59 2 59 ∙
2
∙ 589 2 1 2
2 5;
∙ 589 ∙
(16)
Then it results:
5
5
89
:7
2
/ 12
I ′∙
89
:7
∙
′
∙ 589 ∙
G2
/ 12
∙
89
57
∙
′
<=
K
'
%
∙ cos O
P
!
P
!
/ 59 ∙
89
57
/
/ 5;
%
# $
∙ Q ∙ sin O
'
∙
′
⇒
∙ 589 / 59 H /
with respect
!
#
∙ 589 / 59 /
∙ 589 / 59 J / 5;
Finally, the derivative of
formula (3):
<
∙
/
∙
(17)
is obtained from
P
!
%
# $
∙ Q∙
'
(18)
Fig. 3. The simulation box and its processes
Parallelization is done through MPI. The computation is
divided between the involved processors. Each processor will
follow the algorithm that starts by firstly computing the bonded
.
.
fine-grained and coarse-grained interactions +,
, 4,
. The next
step is the computation of the non-bounded fine-grained and
-.
-.
, 4,
. The multiscaling forces
coarse-grained interactions +,
are computed according to formula (17). The velocities and the
positions of the particles get after that updated.
IV.
FINDINGS
The simulation was done on an Asus ZenBook Pro
UX501VW computer having an Intel Core i7-6700HQ
processor with 8 threads and a frequency of 2.6 GHz. The
RAM has a capacity of 16 GB. The simulation box comprises
butane with 36900 atoms. The dimension of an atom is equal to
10 nm on each direction (x, y, z). The reference temperature is
set at 323 K. The system of atoms has been simulated on a
different number of processors for 10,000 simulation steps. For
each processor, a number of eight executions were made, each
of the reported values being an average of the eight execution
times.
The execution time expressed in ns/day and in hour/ns are
presented in Table 1.
TABLE I.
EXECUTION TIMES AND TEMPERATURE FOR A DIFFERENT
NUMBER OF PROCESSORS
Performance
Temperature
Test
No.
[ns/day]
[hour/ns]
[K]
1
7.421
3.234
326.487
2
15.326
1.566
326.497
3
20.146
1.191
326.440
4
26.127
0.919
326.481
5
19.328
1.242
326.543
6
28.193
0.851
326.498
7
23.697
1.013
326.525
8
35.591
0.674
326.466
In the table above the standard deviations are no larger than
0.036 for the execution time and 0.110 for the temperature.
Execution time [hour/ns]
A different number of processors was used to analyze how
parallelization evolves at run time for the butane system. The
execution time according to the number of processors is
presented in Fig. 4.
4
1.566 1.191
0
1
The reference temperature for the system was of 323 K.
The obtained value with a difference of around ± 3K is within
the statistical accepted errors for such simulations.
V. CONCLUSIONS
The article presents the improved AdResS through the MPI
parallelization implemented in the GROMACS molecular
dynamics software and its testing on a butane molecular
system, along with the experimental results. Usually the
simulation time is large. For this reason parallelization is used
for obtaining the results in a shorter period of time.
The algorithm depends on the hardware used and on the
number of processors on which it is run. There is a significant
difference in time for the simulation where only one processor
is involved as compared to the case when several processors
interact through the use of MPI - a speedup of about four times
more was obtained when six processors were used as compared
with the case of one processor. The temperature is kept within
the accepted statistical ranges for such simulations.
Further work include the testing of this implementation on
more systems, generalizing the theory for cylinder coordinates,
further improvements for AdResS algorithm.
3
2
3.234
1
Fig. 5. Temperature variation in time
2
3
0.919 1.242 0.851 1.013 0.674
4
5
6
7
REFERENCES
[1]
8
Processor No
Fig. 4. Execution time expressed in hour/ns as a function of the processor
number used
It can be observed that as the number of processors
increased, the execution time linearly decreased, after which a
plateau was obtained for the considered butane system with
36900 atoms.
There is a significant difference in time for the simulation
where only one processor is involved compared to the case
when several processors interact through the use of MPI - a
speedup of about four times more was obtained when six
processors were used as compared with the case of one
processor.
In Figure 5 is represented the variation of temperature in
time. By using the stochastic dynamics thermostat and the
improved AdResS, the temperature of the system is kept
around the value of 326 K as it can be observed in Table 1.
[2]
[3]
[4]
[5]
[6]
[7]
[8]
M. J. Abraham, D. Van Der Spoel, E. Lindahl, B. Hess and the Gromacs
Development Team, “GROMACS User Manual version 4.6.7”,
www.gromacs.org, p. 110, 2014.
N. Goga et al., "Benchmark of Schemes for Multiscale Molecular
Dynamics Simulations", J. Chem. Theory Comp., vol. 11, 2015, pp.
1389-1398.
M. Praprotnik, L. Delle Site, K. Kremer, "Adaptive resolution
molecular-dynamics simulation: Changing the degrees of freedom on the
fly", J. Chem. Phys. 2005.
M. Praprotnik, L. Delle Site, K. Kremer, "Multiscale simulation of soft
matter: From scale bridging to adaptive resolution", Annu. Rev. Phys.
Chem., vol. 59, 2008, pp.545-571.
M. Christen, W. F. van Gunsteren, "Multigraining: An algorithm for
simultaneous fine-grained and coarse-grained simulation of molecular
systems", J. Chem. Phys., vol. 124, 2006.
B. Ensing, S. O. Nielsen, P. B. Moore, M. L. Klein, M. J. Parrinello,
"Energy conservation in adaptive hybrid atomistic/coarse-grain
molecular dynamics", J. Chem. Theory Comp., vol. 3, 2007, pp. 11001105.
L. Delle Site, "What is a Multiscale Problem in Molecular Dynamics?",
Entropy, vol. 15, 2014, pp. 23-40.
S. J. Marrink, H.J. Risselada, S. Yefimov, D. P. Tieleman, A. H. de
Vries, “The MARTINI Force Field: Coarse Grained Model for
Biomolecular Simulations”, J. Phys. Chem., 111, pp. 7812-7824, 2007.
| 5cs.CE
|
Estimation under group actions: recovering orbits from invariants
arXiv:1712.10163v1 [math.ST] 29 Dec 2017
Afonso S. Bandeira∗1,2 , Ben Blum-Smith†1 , Amelia Perry‡3 , Jonathan Weed§3 , and
Alexander S. Wein¶k3
1
Department of Mathematics, Courant Institute of Mathematical Sciences, New York
University, New York NY, USA
2
Center for Data Science, New York University, New York NY, USA
3
Department of Mathematics, Massachusetts Institute of Technology, Cambridge MA, USA
January 1, 2018
Abstract
Motivated by geometric problems in signal processing, computer vision, and structural biology, we
study a class of orbit recovery problems where we observe noisy copies of an unknown signal, each acted
upon by a random element of some group (such as Z/p or SO(3)). The goal is to recover the orbit of the
signal under the group action. This generalizes problems of interest such as multi-reference alignment
(MRA) and the reconstruction problem in cryo-electron microscopy (cryo-EM). We obtain matching
lower and upper bounds on the sample complexity of these problems in high generality, showing that the
statistical difficulty is intricately determined by the invariant theory of the underlying symmetry group.
In particular, we determine that for cryo-EM with noise variance σ 2 and uniform viewing directions,
the number of samples required scales as σ 6 . We match this bound with a novel algorithm for ab initio
reconstruction in cryo-EM, based on invariant features of degree at most 3. We further discuss how to
recover multiple molecular structures from heterogeneous cryo-EM samples.
1
Introduction
Many computational problems throughout the sciences exhibit rich symmetry and geometry, especially in
fields such as signal and image processing, computer vision, and microscopy. This is exemplified in cryoelectron microscopy (cryo-EM) [ADLM84, SS11, Nog16], an imaging technique in structural biology that
was recently awarded the 2017 Nobel Prize in Chemistry. This technique seeks to estimate the structure
of a large biological molecule, such as a protein, from many noisy tomographic projections (2-dimensional
images) of the molecule from random unknown directions in 3-dimensional space.
In cryo-EM, our signal of interest is the density θ of the molecule, considered as an element of the
vector space of functions on R3 . We have access to observations of the following form: our microscopy
sample contains many rotated copies Ri θ of the molecule, where Ri ∈ SO(3) are random, unknown 3D
∗ E-mail address: [email protected]. Supported in part by NSF grant DMS-1712730 and NSF grant DMS-1719545.
Part of this work was done while ASB was visiting the Simons Institute for the Theory of Computing, this visit was partially
supported by the DIMACS/Simons Collaboration on Bridging Continuous and Discrete Optimization through NSF grant
#CCF-1740425.
† E-mail address: [email protected].
‡ E-mail address: [email protected]. Supported in part by NSF CAREER Award CCF-1453261 and a grant from the
MIT NEC Corporation.
§ E-mail address: [email protected]. Supported in part by NSF Graduate Research Fellowship DGE-1122374.
¶ E-mail address: [email protected].
k Authors are ordered alphabetically, please direct correspondence to [email protected].
1
rotations, and we observe the noisy projections Π(Ri θ) + ξi , where Π denotes tomographic projection (in a
fixed direction) and ξi is a large noise contribution, perhaps Gaussian. This specific problem motivates the
following general abstraction.
Fix a compact group G acting (by orthogonal transformations) on a vector space V . Throughout, the
vector space will be taken to be Rp and the group can be thought of as a subgroup of O(p), the orthogonal
group1 . Let θ ∈ V be the signal we want to estimate. We receive noisy measurements of its orbit as follows:
for i = 1, . . . , n we observe a sample of the form
yi = gi · θ + ξi
where gi is drawn randomly (in Haar measure2 ) from G and ξi ∼ N (0, σ 2 I) is noise. The goal is to recover
the orbit of θ under the action of G. We refer to this task as the orbit recovery problem.
This abstraction, already a rich object of study, neglects the tomographic projection in cryo-EM; we
will also study a generalization of the problem which allows such a projection. We will also consider the
additional extension of heterogeneity [Jon16, LS16, LS17, BBLS17], where mixtures of signals are allowed:
we have K signals θ1 , . . . , θK , and each sample yi = gi · θki + ξi comes from a random choice 1 ≤ ki ≤ K
of which signal is observed. This extension is of paramount importance for cryo-EM in practice, since the
laboratory samples often contain one protein in multiple conformations, and understanding the range of
conformations is key to understanding the function of the protein.
1.1
Prior work
Several special cases of the orbit recovery problem have been studied for their theoretical and practical
interest. Besides cryo-EM, another such problem is multi-reference alignment (MRA) [BCSZ14, BRW17,
PWB+ 17], a problem from signal processing [ZvdHGG03, PZAF05] with further relevance to structural
biology [Dia92, TS12]. In this problem, one observes noisy copies of a signal θ ∈ Rp , each with its coordinates
permuted by a random cyclic shift. This is an example of the orbit recovery problem when G is taken to be
the cyclic group Z/p acting by cyclic permutations of the coordinates. Since the cyclic group Z/p is simpler
than SO(3), understanding MRA has been seen as a useful stepping stone towards a full statistical analysis
of cryo-EM.
Many prior methods for orbit recovery problems employ the so-called synchronization approach where the
unknown group elements gi are estimated based on pairwise comparison of the samples yi . If the samples
were noiseless, one would have gi gj−1 yj = yi ; thus noisy samples still give some weak information about
gi gj−1 . Synchronization is the problem of using such pairwise information to recover all the group elements
gi (up to a global right-multiplication by some group element). Once the group elements gi are known, the
underlying signal can often be easily recovered.
The synchronization approach to cryo-EM can be summarized as follows [VG86, VH87, SS11]. By the
Fourier projection–slice theorem, the Fourier transforms of the tomographic projections are 2D slices of the
Fourier transform of the molecule density. Given a hypothesis as to the angles of two slices, we can predict a
1D line of intersection along which those slices should agree. By measuring correlation along that common
line, we obtain some weak information by which to confirm or refute our hypothesized angles. Indeed, this
test only depends on the relative angle of the slices, thus providing weak information about the value of
gi gj−1 . We then use a synchronization algorithm to recover the gi using this information.
Methods to solve the synchronization problem over various groups include spectral methods [Sin11, SS11],
semidefinite programming [Sin11, SS11, BCSZ14, BCS15, Ban15, BZS15], and approximate message passing
(AMP) [PWBM16a]. A general Gaussian model for synchronization problems over any compact group is
studied in [PWBM16b, PWBM16a]; ideas from statistical physics suggest that for this model, AMP is
1 We alert the reader to the fact that we will use O(p) to refer to the group of orthogonal matrices in dimension p and
O(g(n)) as the standard big-O notation: f (n) = O(g(n)) if and only if there exists a constant C such that f (n) ≤ Cg(n) for all
n sufficiently large. It will be clear from context which one is meant.
2 We note that any distribution of g can be reduced to Haar by left multiplying y by a Haar-distributed group element.
i
i
However, as illustrated in [ABL+ 17], it is sometimes possible to exploit deviations from Haar measure.
2
optimal among all efficient algorithms [PWBM16a]. However, the model does not capture the underlying
signal θ and instead assumes that for every pair i, j of samples, independent noisy measurements of the
relative group elements gi gj−1 are observed. This independence does not correctly capture problems like
MRA and cryo-EM, which have independent noise on each sample, rather than on each pairwise comparison
of samples.
The synchronization approach has proven to be effective both in theory and practice when the noise is
sufficiently small. However, once the noise level is large, no consistent estimation of the group elements
gi is possible [ADBS16]. Moreover, it is the high-noise regime that is the practically relevant one for
many applications, including cryo-EM, where the presence of large noise is a primary obstruction to current
techniques [Sig16]. As a result, recent work has focused on approaches to cryo-EM and MRA which provably
succeed even in the large-noise limit. One striking finding of this line of work is that the sample complexity
of the statistical estimation problem increases drastically as the noise level increases. For instance, for the
multi-reference alignment problem with noise variance σ 2 , consistent estimation of typical signals requires
Ω(σ 6 ) samples [BRW17, APS17], with significantly worse rates for atypical signals. By contrast, when σ 2
is smaller than some threshold, only O(σ 2 ) samples are required. Moreover, in contrast with the O(σ 2 )
rate—which would hold even in the absence of a group action—the Ω(σ 6 ) bound obtained in previous works
depends on particular properties of the cyclic group. In this work, we significantly extend this prior work by
determining the sample complexity of the estimation problem in the high-noise regime for general groups.
The leading theoretical framework for the high-noise regime is the invariant features approach [BRW17,
BBM+ 17, PWB+ 17, BBLS17, LBB+ 17]. This approach has a long history in the signal processing literature [Kam80, Sad89, SG92] and is analogous to the well known “method of moments” in statistics [vdV98].
In brief, the invariant features approach bypasses entirely the problem of estimating the group elements and
focuses instead on estimating features of the signal which are preserved by the action of the group. So long as
these invariant features uniquely specify the orbit of the original signal, the invariants are sufficient statistics
for the problem of recovering the orbit of the original signal. This simple approach yields optimal dependence
of the sample complexity on the noise level for the multi-reference alignment problem [BRW17, PWB+ 17].
The application of invariant features to cryo-EM dates back to 1980 with the work of Kam [Kam80], who
partially solved cryo-EM by means of degree-2 invariant features, reducing the unknown molecule structure
to a collection of unknown orthogonal matrices. Subsequent work has explored methods to estimate these
orthogonal matrices [BZS15], including recent work showing how two noiseless tomographic projections
suffice to recover these orthogonal matrices [LBB+ 17]. Our work can be viewed as a degree-3 extension of
Kam’s method that fully solves cryo-EM while circumventing the orthogonal retrieval issue, and without
requiring any noiseless projections. Our approach is ab initio, i.e. it does not require an initial guess of what
the molecule looks like and thus cannot suffer from model bias, which is a documented phenomenon [Coh13]
where the initial guess can have a significant effect on the result. Ab initio estimates are particularly useful
to serve as a model-free starting point for popular iterative refinement algorithms such as RELION [Sch12].
Throughout, we focus on the case where the group elements are Haar-distributed. In the basic orbit
recovery problem (projection), any distribution of gi can be reduced to Haar by left-multiplying each sample
yi by a Haar-distributed group element. However, as illustrated in [ABL+ 17], it is sometimes possible to
exploit deviations from Haar measure. The situation is different when we add projection to the problem
setup, as is the case with Cryo-EM; if the viewing direction is not distributed uniformly then there may exist
parts of the molecule that are systematically imaged less than others, which can cause serious difficulties in
reconstruction.
The present paper connects the orbit recovery problem to the invariant theory of groups, a classical
and well-developed branch of algebra (see for example [Kač94, Dol03, Stu08, DK15]). Invariant theory’s
traditional goal is to describe the ring of all polynomial functions on a vector space that are invariant under
the action of a group – the invariant algebra. Since the 19th century, culminating in the pioneering work of
David Hilbert [Hil90, Hil93], it has been known that the invariant algebra is finitely generated in many cases
of interest, and so a fundamental problem has been to bound the degrees of the generators. In 2002, Derksen
and Kemper [DK15] introduced the notion of a separating algebra – a subring of the invariant algebra that
separates all orbits of the group action which are separated by the full invariant algebra. Our connection
3
to orbit recovery motivates the question of bounding the degree required to generate a separating algebra
(see Section 4.4), a problem which has been recently studied [KK10, Dom16]. Our work also motivates the
question of bounding the degree at which the field of invariant rational functions is generated as a field (see
Section 4.3), which does not appear to have been the focus of research attention before.
1.2
Our contributions
In this paper we extend the results of [BRW17] and show that the method of moments yields optimal sample
complexity for orbit recovery problems over any compact group. Specifically, we show that optimal sample
complexity is achieved by an algorithm that estimates the moments from the samples and then solves a
polynomial system of equations in order to find a signal θ that would produce such moments. As the sample
complexity depends on the number of moments used, this gives rise to the algebraic question of how many
moments suffice to determine the orbit of θ. Using tools from invariant theory and algebraic geometry, we
investigate this question for various success criteria and obtain sharp results in a number of settings. Our
main focus is on the case where the signal is assumed to be generic and the goal is to output a finite list
of signals, one of which is the truth. In this case we give a simple efficient algorithm for determining the
number of moments required for any given orbit recovery problem. The main step of the algorithm is to
compute the rank of a particular Jacobian matrix.
We note that ours is an information-theoretic result rather than a computational one because even with
knowledge of the number of moments required, estimating the original signal still requires solving a particular
polynomial system of equations and we do not attempt to give a computationally-efficient method for this.
There are fast non-convex heuristic methods to solve these systems in practice [BBLS17] but we leave for
future work the question of analyzing such methods rigorously and exploring whether or not they reach the
information-theoretic limits determined in this paper. For the case of finite groups, another efficient method
for solving the polynomial system is via tensor decomposition, which has been analyzed for MRA [PWB+ 17].
Concrete results for problems such as MRA and cryo-EM are in Section 5.
1.3
Motivating examples
In addition to the examples of MRA and cryo-EM, it is helpful to have the following motivating examples
in mind:
1. Learning a “bag of numbers”: let G be the symmetric group Sp , acting on V = Rp by permutation
matrices. Thus we observe random rearrangements of the entries of a vector, plus noise.
2. Learning a rigid body: let G be the rotation group SO(p), acting on the matrix space V = Rp×m by
left-multiplication. We imagine the columns of our matrix as vertices defining a rigid body; thus we
observe random rotations of this rigid body (with vertices labeled) plus noise.
3. S 2 registration: Let S 2 ⊆ R3 be the unit sphere. Let V be the finite-dimensional vector space of
functions on S 2 → R that are band-limited, i.e. linear combinations of spherical harmonics up to some
fixed degree (spherical harmonics are the appropriate “Fourier basis” for functions on the sphere); let
θ ∈ V be such a function S 2 → R. Let G = SO(3), acting on the sphere by 3-dimensional rotation;
this induces an action on V via (g · θ)(x) = θ(g −1 · x). Thus we observe many noisy copies of a fixed
function on the sphere, each rotated randomly.
1.4
Problem statement
Throughout, we consider a compact (topological) group G acting linearly, continuously, and orthogonally
on a finite-dimensional real vector space V = Rp . In other words, G acts on V via a linear representation
ρ : G → O(V ), and ρ itself is a continuous function. Here O(V ) denotes the space of real orthogonal p × p
matrices. Let Haar(G) denote Haar measure (i.e., the “uniform distribution”) on G. We define the orbit
recovery problem as follows.
4
Problem 1.1 (orbit recovery). Let V = Rp and let θ ∈ V be the unknown signal. Let G be a compact group
that acts linearly, continuously, and orthogonally on V . For i ∈ [n] = {1, 2, . . . , n} we observe
yi = gi · θ + ξi
where gi ∼ Haar(G) and ξi ∼ N (0, σ 2 Ip×p ), all independently. The goal is to estimate θ. Note that we can
only hope to recover θ up to action by G; thus we aim to recover the orbit {g · θ : g ∈ G} of θ.
In practical applications, σ is often known in advance and, when it is not, it can generally be estimated
accurately on the basis of the samples. We therefore assume throughout that σ is known and do not pursue
the question of its estimation in this work.
Our primary goal is to study the sample complexity of the problem: how must the number of samples n
scale with the noise level σ (as σ → ∞ with G and V fixed) in order for orbit recovery to be statistically
possible? All of our results will furthermore apply to a generalized orbit recovery problem (Problem 2.3)
allowing for projection and heterogeneity (see Section 1.6).
Our work reveals that it is natural to consider several different settings in which to state the orbit recovery
problem. We consider the following two decisions:
1. Do we assume that θ is a generic signal, or do we allow for a worst-case signal? (Here generic means
that there is a measure-zero set of disallowed signals.)
2. Do we want to output a θ′ such that θ′ (approximately) lies in the orbit of θ (unique recovery), or
simply a finite list θ1 , . . . , θs of candidates such that one of them (approximately) lies in the orbit of θ
(list recovery)?
The terminology “list recovery” is borrowed from the idea of list decoding in the theory of error-correcting
codes [Eli57]. By taking all combinations of the two options above, there are four different recovery criteria.
Strikingly, these different recovery criteria can be very different in terms of sample complexity, as the following
examples show (see Section 5 for more details):
1. Multi-reference alignment (MRA): Recall that this is the case G = Z/p acting on V = Rp by cyclic
shifts. It is known [PWB+ 17] that if θ is generic then unique recovery is possible with O(σ 6 ) samples.
However, for a worst-case θ, many more samples are required (even for list recovery); as shown in
[BRW17], there are some very particular infinite families of signals that cannot be distinguished without
Ω(σ 2p ) samples. This illustrates a large gap in difficulty between the generic and worst-case problems.
2. Learning a rigid body: Let G be the rotation group SO(p) acting on the matrix space Rp×m by left
multiplication. We imagine the columns of our matrix as vertices defining a rigid body; thus we observe
random rotations of this rigid body (with vertices labeled) plus noise. With O(σ 4 ) samples it is possible
to recover the rigid body up to reflection, so that list recovery (with a list of size 2) is possible. However,
unique recovery (even for a generic signal) requires drastically more samples: Ω(σ 2p ).
We will address all four recovery criteria but our main focus will be on the case of generic list recovery,
as it is algebraically the most tractable to analyze. For the following reasons we also argue that it is perhaps
the most practically relevant case. Clearly real-world signals are generic. Also, unique recovery is actually
impossible in some practical applications; for instance, in cryo-EM it is impossible to determine the chirality
of the molecule. Furthermore, one could hope to use application-specific clues to pick the true signal out
from a finite list; for instance, in cryo-EM we might hope that the spurious solutions in our finite list do not
look like “reasonable” molecules and can be thrown out.
1.5
Method of moments
Our techniques rely on estimation of the following moments:
Definition 1.2 (moment tensor). The order-d moment tensor is Td (θ) := Eg [(g · θ)⊗d ] where g ∼ Haar(G).
5
Pn
We can estimate Td (θ) from the samples by computing n1 i=1 yi⊗d plus a correction term to cancel bias
from the noise terms (see Section 7 for details). The moments Td (θ) are related to polynomials that are
invariant under the group action, which brings us to the fundamental object in invariant theory:
Definition 1.3 (invariant ring). Let x = (x1 , . . . , xp ) be a set of coordinate functions on V = Rp , i.e. a basis
for the dual V ∗ , so that R[x] := R[x1 , . . . , xp ] is the ring of polynomial functions V → R. We have an action
of G on R[x] given by (g · f )(·) = f (g −1 (·)). (If we fix a basis for V , we can think of x as indeterminate
variables corresponding to the entries of θ ∈ V .) The invariant ring R[x]G ⊆ R[x] is the ring consisting of
polynomials f that satisfy g · f = f for all g ∈ G. An element of the invariant ring is called an invariant
polynomial (or simply an invariant ). Invariant polynomials can be equivalently characterized as polynomials
of the form Eg [g · f ] where f ∈ R[x] is any polynomial and g ∼ Haar(G).
The two objects above are equivalent in the following sense. The moment tensor Td (θ) contains the same
information as the set of evaluations f (θ) for all f ∈ R[x]G that are homogeneous of degree d. In particular,
for any such polynomial f , f (θ) is a linear combination of the entries of Td (θ).
The following algebraic question will be of central importance: when do the values of invariant polynomials
(of degree ≤ d) of θ determine the orbit of θ (in the appropriate sense)? As we see below, the sample
complexity of the statistical problem is completely characterized by the answer to this question.
1.5.1
Warm up: hypothesis testing
Consider for now the simple problem of distinguishing between two fixed hypotheses θ = τ1 and θ = τ2 ,
where τ1 and τ2 are two fixed vectors in V . One method is to find an invariant polynomial f for which
f (τ1 ) 6= f (τ2 ) and to estimate f (θ) using the samples. The sample complexity of this procedure depends
on the degree of f because if f has degree d, we need O(σ 2d ) samples to accurately estimate f (θ). We will
prove the following (see Section 3).
Theorem 1.4 (distinguishing upper bound). Fix τ1 , τ2 ∈ V . If there exists a degree-d invariant polynomial
f ∈ R[x]G with f (τ1 ) 6= f (τ2 ) then, using O(σ 2d ) samples, it is possible to distinguish between θ = τ1 and
θ = τ2 with type-I and type-II error probabilities each at most 1/3.
Here, O(· · · ) hides factors that depend on G (and its action on V ), τ1 , and τ2 , but not σ; we are most
interested in how the sample complexity scales as σ becomes large (with everything else held fixed). The
error probability 1/3 is arbitrary and can be boosted by taking more samples (see Theorem 3.2).
Furthermore, we have a matching lower bound to show that the method of moments is optimal: the
sample complexity is driven by the minimum degree of an invariant polynomial that separates τ1 and τ2 .
Theorem 1.5 (distinguishing lower bound). Fix τ1 , τ2 ∈ V . Let d∗ be the smallest positive integer d for
∗
which Td (τ1 ) 6= Td (τ2 ). Then Ω(σ 2d ) samples are required to distinguish between θ = τ1 and θ = τ2 with
type-I and type-II error probabilities each at most 1/3.
See Section 3 for more details.
1.5.2
Recovery
We now address the problem of recovering the signal θ from the samples. Our goal is to recover the orbit of
θ, defined as follows.
G
G
Definition 1.6. For θ1 , θ2 ∈ V , define an equivalence relation ∼ by letting θ1 ∼ θ2 if there exists g ∈ G
G
such that g · θ1 = θ2 . The orbit of θ (under the action of G) is the equivalence class of θ under ∼, i.e. the
set {g · θ : g ∈ G}. Denote by V /G the set of orbits of V , that is, the equivalence classes of V modulo the
G
relation ∼.
We need the following definitions to capture the notion of approximately recovering the orbit of θ.
6
Definition 1.7. For θ1 , θ2 ∈ V , let
dG (θ1 , θ2 ) = min kθ1 − g · θ2 k2 .
g∈G
This pseudometric induces a metric on the quotient space V /G in the obvious way, so we can write dG (o1 , o2 )
for o1 , o2 ∈ V /G. By slight abuse of notation, we write dG (θ1 , o2 ) for dG (o1 , o2 ), where o1 is the orbit of θ1 .
Theorem 1.5 already shows that if the orbit of θ is not determined by knowledge of the first d − 1 moment
tensors, then at least Ω(σ 2d ) samples are required to recover the orbit of θ. We are now ready to (informally)
state our main result on recovery (see Section 3 for more details), which provides a matching upper bound.
Theorem 1.8 (recovery upper bound, informal). Fix θ ∈ V . If the moments T1 (θ), · · · , Td (θ) uniquely
b ≤ε
determine the orbit of θ, then using O(σ 2d ) samples, we can produce an estimator θb such that dG (θ, θ)
with high probability.
The analogous result holds for list recovery (see Section 3): if the moments determine a finite number of
possibilities for the orbit of θ then we can output a finite list of estimators, one of which is close to the orbit
of θ.
Thus, we have reduced to the algebraic question of determining how many moments are necessary to
determine the orbit of θ (either uniquely or in the sense of list recovery). In Section 4 we will use tools from
invariant theory and algebraic geometry in order to address these questions.
1.6
Extensions: projection and heterogeneity
We now consider some extensions to the basic orbit recovery problem (Problem 1.1), motivated by the
application of cryo-EM:
1. Projection: In cryo-EM, we do not observe a noisy 3-dimensional model of the rotated molecule;
we only observe a 2-dimensional projection of it. We will model this projection by a linear map
Π : Rp → Rq that maps a 3-dimensional model to its 2-dimensional projection (from a fixed viewing
direction). The samples are then given by yi = Π(gi · θ) + ξi where ξi ∼ N (0, σ 2 I).
2. Heterogeneity: In cryo-EM we observe images of many different copies of the same molecule, each
rotated differently. However, if our sample is not pure, we may have a mixture of different molecules
and want to recover the structure of all of them. We will model this by taking K different unknown
signals θ1 , . . . , θK along with positive mixing weights w1 , . . . , wK which sum to 1. Each sample takes
the form yi = gi · θki + ξi where ki is chosen at random according to the mixing weights.
In Section 2 we will formally define a generalization of the orbit recovery problem that allows for either (or
both) of the above extensions. All of our methods will apply to this general case.
1.7
Organization of the remainder of the paper
In Section 2, we define a generalization of Problem 1.1 which encompasses projection and heterogeneity,
and specify the basic algebraic objects which relate to our generalized problem. In Section 3, we formally
state statistical upper and lower bounds for the generalized orbit recovery problem in terms of invariants. In
Section 4, we establish our basic algebraic results and specify the algebraic criteria that correspond to the
different recovery criteria defined in Section 1.4. We also give an efficient algorithm to decide the algebraic
criterion corresponding to generic list recovery. Finally, in Section 5, we apply our work to several examples
of the orbit recovery problem, including MRA and cryo-EM. We conclude in Section 6 with questions for
future work.
Sections 7–9 contain proofs of results from preceding sections. Appendix A contains an account of the
invariant theory of SO(3), and Appendix B contains a proof (using Galois theory) of generic unique recovery
in a particular special case of the orbit recovery problem (the regular representation of a finite Abelian
group).
7
2
General problem statement
Our results will apply not only to the basic orbit recovery problem (Problem 1.1) but to a generalization
(Problem 2.3 below) that captures the projection and heterogeneity extensions discussed in Section 1.6. We
first define mixing weights for heterogeneous problems.
PK
Definition 2.1 (mixing weights). Let w = (w1 , . . . , wK ) ∈ ∆K := {(z1 , . . . , zK ) : zk ≥ 0 ∀k, k=1 zk = 1}.
w
Let k ∼ [K] indicate that k is sampled from [K] = {1, . . . , K} such that k = ℓ with probability wℓ . We
will sometimes instead parametrize the mixing weights by w k = wk − 1/K so that w lies in the vector space
PK
∆ := {(z1 , . . . , zK ) :
k=1 zk = 0}.
In a heterogeneous problem with K different signals, we can only hope to recover the signals up to permutation. To formalize this, our compound signal will lie in a larger vector space V and we will seek to recover
its orbit under a larger group G.
Definition 2.2 (setup for heterogeneity). Let G̃ be a compact group acting linearly, continuously, and
orthogonally on Ṽ = Rp . Let V = Ṽ ⊕K ⊕ ∆K , so that θ ∈ V encodes K different signals along with mixing
weights: θ = (θ1 , . . . , θK , w). We let an element (g1 , . . . , gK , π) of the Cartesian product set G̃K × SK act on
V as follows: first, each gk acts on the corresponding θk , and then π permutes the θk and the coordinates of
w. Note that this action is linear and orthogonal (where ∆ uses the usual inner product inherited from RK ).
There is a natural group structure G on the set G̃K × SK such that the action just described is actually a
group action by G: the semidirect product G = G̃K ⋊ϕ SK , where ϕ denotes the action of SK on G̃K by
permutations of the factors. This is also called the wreath product of G̃ by SK and written G̃ ≀ SK . The
product topology on G̃K × SK makes G a topological group; it is compact with respect to this topology since
all the factors are compact, and the action described above is continuous.
Of course, by taking K = 1 we recover the basic setup (without heterogeneity) as a special case. We are
now ready to give the general problem statement.
Problem 2.3 (generalized orbit recovery). Let Ṽ = Rp and W = Rq . Let G̃ be a compact group acting
linearly, continuously, and orthogonally on Ṽ . Let Π : Ṽ → W be a linear map. Let θ = (θ1 , . . . , θK , w) ∈
V := Ṽ ⊕K ⊕ ∆K be an unknown collection of K signals with mixing weights w ∈ ∆K . For i ∈ [n] =
{1, 2, . . . , n} we observe
yi = Π(gi · θki ) + ξi
w
where gi ∼ Haar(G̃), ki ∼ [K], ξi ∼ N (0, σ 2 Iq×q ), all independently. The goal is to estimate the orbit of θ
under G := G̃K ⋊ SK .
Note that this serves as a reduction from the heterogeneous setup to the basic setup in the sense that we are
still only concerned with recovering the orbit of a vector θ under the action of some compact group.
As discussed previously, we apply the method of moments. The moments are now defined as follows.
Definition 2.4 (moment tensor). For the generalized orbit recovery problem (Problem 2.3), the order-d
w
moment tensor is Td (θ) := Eg,k [(Π(g · θk ))⊗d ] where g ∼ Haar(G̃) and k ∼ [K]. Equivalently, Td (θ) =
PK
⊗d
].
k=1 wk Eg [(Π(g · θk ))
The invariant ring is defined as in Definition 1.3 but now for the larger group G acting on the larger V :
Definition 2.5 (invariant ring). Note that dim(V ) = Kp + K − 1 and let x = (x1 , . . . , xdim(V ) ) be a basis
for V ∗ ; here the last K − 1 variables correspond to ∆, e.g. they can correspond to w 1 , . . . , w K−1 . We then
let R[x]G ⊆ R[x] be the polynomials in x that are invariant under the action of G (as in Definition 1.3).
Recall that in the basic orbit recovery problem, Td (θ) corresponds precisely to the homogeneous invariant
polynomials of degree d; now Td (θ) corresponds to a subspace of the homogeneous invariant polynomials of
degree d. Specifically, the method of moments gives us access to the following polynomials (evaluated at θ):
8
Definition 2.6. Let UdT be the subspace (over R) of the invariant ring R[x]G consisting of all R-linear
T
combinations of entries of Td (x). Let U≤d
= U1T ⊕ · · · ⊕ UdT ⊆ R[x]G . Here we write Td (x) for the collection
of polynomials (one for each entry of Td (θ)) that map θ to Td (θ).
T
We will be interested in whether the subspace U≤d
contains enough information to uniquely determine
the orbit of θ (or determine a finite list of possible orbits) in the following sense.
Definition 2.7. A subspace U ⊆ R[x]G resolves θ ∈ V if there exists a unique o ∈ V /G such that f (θ) = f (o)
for all f ∈ U . Similarly, U list-resolves θ if there are only finitely many orbits o1 , . . . , os such that f (θ) = f (oi )
for all f ∈ U .
Here we have abused notation by writing f (o) to denote the (constant) value that f takes on every θ ∈ o.
The following question is of central importance.
T
Question 2.8. Fix θ ∈ V . How large must d be in order for U≤d
to uniquely resolve θ? How large must d
T
be in order for U≤d to list-resolve θ?
The answer depends on G and V but also on whether θ is a generic or worst-case signal, and whether
we ask for unique recovery or list recovery. Our statistical results in Section 3 will show that the sample complexity of the generalized orbit recovery problem is Θ(σ 2d ) where d is the minimal d from Question 2.8. More specifically, the recovery procedure that obtains this bound is based on estimating the
moments T1 (θ), . . . , Td (θ) and solving a system of polynomial equations to (approximately) recover θ. Our
algebraic results in Section 4 will give general methods to answer Question 2.8 for any G and V .
3
Statistical results
In this section, we state upper and lower bounds on the performance of optimal estimators for the orbit
recovery problem. Proofs are deferred to Section 7. Our approach will be the method of moments introduced
in Section 1.5. We assume for normalization purposes that there exists a constant c ≥ 1 such that c−1 ≤
kθk ≤ c, so that σ captures entirely the signal-to-noise ratio of the problem. We denote by Θ the subset of
V consisting of vectors satisfying this requirement.
Denote by Pθ the distribution of a sample arising from the generalized orbit recovery problem (Problem 2.3) with parameter θ.
Definition 3.1. Given θ ∈ Θ, the order-d matching set for θ, Mθ,d, is the set consisting of all τ ∈ V such
T
.
that f (τ ) = f (θ) for all f ∈ U≤d
T
T
list-resolves θ when
resolves θ exactly when Mθ,d contains a single orbit, and U≤d
We note that U≤d
Mθ,d is the union of a finite number of orbits.
We are now ready to state a formal theorem justifying Theorems 1.4 and 1.8, above. The following
theorem establishes that we can approximately learn the order-d matching set for θ with probability at least
1 − δ on the basis of O(σ 2d log(1/δ)) samples. Denote by Mεθ,d the ε-fattening of Mθ,d, i.e., the set of all
φ ∈ Θ such that minτ ∈Mθ,d kφ − τ k ≤ ε.
Theorem 3.2. For any positive integer n, noise level σ ≥ maxθ∈Θ kθk, and accuracy parameter δ > 0, there
cn = M
cn (y1 , . . . , yn ) ⊆ V such that, for any positive constant ε, if y1 , . . . , yn ∼ Pθ i.i.d.
exists an estimator M
and n ≥ cθ,ε,d log(1/δ)σ 2d , then with probability at least 1 − δ,
cn ⊆ Mεθ,d .
Mθ,d ⊆ M
The constant cθ,ε,d in Theorem 3.2 can be replaced by cθ,d ε−2 in the unique recovery setting if θ is
suitably generic, but the dependence on ε can be worse in general. What is key is that cθ,ε,d does not depend
on σ, so that Theorem 3.2 captures the behavior of the sample complexity in the large σ limit.
9
Theorem 3.2 essentially follows from the observation that, since the variance of yi is O(σ 2 ), a degree-d
T
polynomial in the entries of yi has variance O(σ 2d ). This implies that for any f ∈ U≤d
, the evaluation f (θ)
2d
can be accurately estimated on the basis of O(σ ) samples. By inverting a suitable polynomial system, we
can thereby identify Mθ,d , at least approximately. A full proof of Theorem 3.2 appears in Section 7.
Theorem 3.2 captures the behavior described in both Theorem 1.4 and Theorem 1.8. Indeed, if τ1 and τ2
differ on some f ∈ UdT , then Mτ1 ,d is separated from Mτ2 ,d , and Theorem 3.2 implies that we can therefore
distinguish between the two distributions when ε is sufficiently small. Moreover, as the following corollary
cn allows us to recover or list-recover the orbit of θ.
shows, Theorem 3.2 implies that the confidence set M
Corollary 3.3. Suppose that Mθ,d is the union of M orbits o1 , . . . , oM , where M is finite. There exists an
εθ such that, for ε < εθ , if n ≥ cθ,ε,d log(1/δ)σ 2d , then on the basis of n i.i.d. samples from Pθ we can produce
M estimators θb1 , . . . θbM such that, with probability at least 1 − δ, there exists a permutation π : [M ] → [M ]
satisfying
dG (θbi , oπ(i) ) ≤ ε
for all i ∈ [N ].
Proof. Since G is a compact group acting continuously on V , the orbits are compact. By assumption Mθ,d ,
is a union of a finite number of orbits, so there exists an εθ such that dG (oi , oj ) ≥ 4εθ for any i 6= j. For
cn as in Theorem 3.2. Theorem 3.2 implies the
any ε < εθ , let N be an ε/2-net of V /G, and construct M
existence of a constant cθ,ε,d such that as long as n ≥ cθ,ε,d log(1/δ)σ 2d , with probability at least 1 − δ,
cn ⊆ Mε/2 .
Mθ,d ⊆ M
θ,d
cn ) ≤ ε/2. With probability 1 − δ, any element
Consider the set C consisting of o ∈ N such that dG (o, M
of C is within ε of oi for some i ∈ [M ], and for each oi there exists an o ∈ C that is at most ε away. By
assumption, distinct orbits in Mθ,d are separated by more than 4ε, so if any two elements of C are separated
by at most 2ε, then they are close to the same element of Mθ,d . As a result, it is possible to partition C
into M sets C1 , . . . , CM such that dG (o, o′ ) ≤ 2ε if o, o′ are in the same set, and dG (o, o′ ) > 2ε if o and o′
are in different sets. For i ∈ [M ], let θbi be any element of V such that the orbit of θbi lies in Ci . The claim
follows.
The constant εθ in the statement of Corollary 3.3 will not be known in general. However, a weaker
cn under the projection V 7→ V /G.
statement still holds when ε ≥ εθ . Indeed, consider the image of the set M
There exists a finite partition of the resulting set such that any two orbits in the same cluster are closer
than any two orbits in different clusters. (Note that the clustering into a single set always satisfies this
requirement.) If we are able to choose this partition such that the diameter of each set is at most ε′ , then
by choosing a representative from each cluster, we obtain a finite set of estimators, at least one of which is
guaranteed to be ε′ -close to θ with high probability. Corollary 3.3 implies that this partition can be taken
to consist of at most M clusters for ε′ arbitrarily small, as long as n ≥ Cε′ σ 2d .
We now prove a lower bound showing that the dependence on σ in Theorem 3.2 is tight. We show that
T
if U≤d−1
fails to resolve (or list-resolve) θ, then Ω(σ 2d ) samples are necessary to recover (or list-recover) the
orbit of θ. Together with Theorem 3.2, this lower bound implies that if d∗ is the smallest positive integer
∗
for which UdT∗ resolves (or list-resolve) θ, then Θ(σ 2d ) samples are required to recover (or list-recover) the
orbit of θ. We make this lower bound precise in Theorem 3.4.
Theorem 3.4. For any positive integer d, there exists a constant cd such that if τ1 and τ2 are elements
in Mθ,d−1 lying in different orbits, then no procedure can distinguish between Pnτ1 and Pnτ2 with probability
greater than 2/3 if n ≤ cd σ 2d .
Note that via Le Cam’s method [LeC73], Theorem 3.4 translates into lower bounds for the problem of
recovering θ. The proof of Theorem 3.4 relies on a tight bound for the Kullbeck-Leibler divergence between
the distributions Po1 and Po2 established in [BRW17]. More details appear in Section 7.
10
4
Algebraic results
In this section, we will consider the four recovery criteria defined in Section 1.4, and give algebraic characterizations of each case. The results of Section 3 imply that it suffices to focus our attention on deciding
when a subspace U resolves (or list-resolves) a parameter θ. We show below how to answer this question
by purely algebraic means. Moreover, for generic list recovery, we show how this question can be answered
algorithmically in polynomial time. For generic and worst-case unique recovery, we also give algorithms to
decide the corresponding algebraic condition; however, these algorithms are not efficient.
Throughout, we assume the setup defined in Section 2 for the generalized orbit recovery problem. In
particular, G is a compact group acting linearly and continuously on a finite-dimensional real vector space
V (although we do not require in this section that the action be orthogonal). We have the invariant ring
T
R[x]G corresponding to the action of G on V , and a subspace U ⊆ R[x]G (e.g. U≤d
) of invariants that we
have access to. We are interested in whether the values f (θ) for f ∈ U determine the orbit of θ ∈ V under
T
G. The specific structure of G and U≤d
(as defined in Section 2) will be largely unimportant and can be
abstracted away.
4.1
Invariant theory basics
We will often need the following basic operator that averages a polynomial over the group G.
Definition 4.1 (Reynolds operator). The Reynolds operator R : R[x] → R[x]G is defined by
R(f ) =
E
[g · f ].
g∼Haar(G)
Note that the Reynolds operator is a linear projection from R[x] to R[x]G that preserves the degree of
homogeneous polynomials (i.e. a homogeneous polynomial of degree d gets mapped either to a homogeneous
polynomial of degree d or to zero).
Observation 4.2. Let R[x]G
d denote the vector space consisting of homogeneous invariants of degree d. We
can obtain a basis for R[x]G
d by applying R to each monomial in R[x] of degree d. (This yields a spanning
set which can be pruned to a basis if desired.)
In our setting, we have the following basic fact from invariant theory.
Theorem 4.3 (e.g. [Kač94] Theorem 4.1-3). The invariant ring R[x]G is finitely generated as an R-algebra.
In other words, there exist generators f1 , . . . , fm ∈ R[x]G such that R[f1 , . . . , fm ] = R[x]G .
Furthermore, there is an algorithm to find a generating set; see Section 8.1. Another basic fact from invariant
theory implies that the entire invariant ring is sufficient to determine the orbit of θ. (This is not always true
for non-compact groups; see Example 2.3.1 in [DK15].)
Theorem 4.4 ([Kač94] Theorem 6-2.2). The full invariant ring R[x]G resolves every θ ∈ V .
Proof. Let o1 , o2 ∈ V /G be distinct (and therefore disjoint) orbits. Since G is compact and acts continuously,
o1 and o2 are compact subsets of V . Thus by Urysohn’s lemma there exists a continuous function f˜ : V → R
such that f˜(τ ) = 0 ∀τ ∈ o1 and f˜(τ ) = 1 ∀τ ∈ o2 . The Stone–Weierstrass theorem states that a continuous
function on a compact domain can be uniformly approximated to arbitrary accuracy by a polynomial. This
means there is a polynomial f ∈ R[x] with f (τ ) ≤ 1/3 ∀τ ∈ o1 and f (τ ) ≥ 2/3 ∀τ ∈ o2 . It follows that
h = R(f ) is an invariant polynomial that separates the two orbits: h(o1 ) ≤ 1/3 and h(o2 ) ≥ 2/3.
Thus, in order to determine the orbit of θ it is sufficient to determine the values of all invariant polynomials.
(This condition is clearly also necessary in the sense that if the orbit is uniquely determined then so are the
values of all invariants.)
11
Remark 4.5. In what follows we will be discussing algorithms that take the problem setup as input (includT
ing G̃ and its action on Ṽ , along with Π, K) and decide whether or not U≤d
(for some given d) is capable of a
particular recovery task (e.g. list recovery of a generic θ ∈ V ). We will always assume that these algorithms
have a procedure to compute a basis for UdT (for any d) in exact symbolic arithmetic. This is non-trivial
in some cases because Td (x) (and thus UdT ) involves integration over the group (and may involve irrational
values), but we will not worry about these details here. For the important case of SO(3), it is possible to
write down a basis for the invariants in closed form (see Appendix A).
Remark 4.6. We will draw from various references for algorithmic aspects of invariant theory. The case of
finite groups is treated by [Stu08]. Although the invariant ring is sometimes taken to be C[x]G instead of
R[x]G , this is unimportant in our setting because the two are essentially the same: since our group action
is real, a basis for R[x]G (over R) is a basis for C[x]G (over C). The case of infinite groups is covered by
[DK15]. Here the group is assumed to be a reductive group over C (or another algebraically-closed field).
This means in particular that the group is a subset of complex-valued matrices that is defined by polynomial
constraints. Although compact groups such as SO(3) do not satisfy this, the key property of a reductive
group is the existence of a Reynolds operator satisfying certain properties; since this exists for compact
groups (Definition 4.1), some (but not all) results still hold in our setting.
4.2
Generic list recovery
We will see that the case of list recovery of a generic signal is governed by the notion of algebraic independence.
Definition 4.7. Polynomials f1 , . . . , fm ∈ R[x] are algebraically dependent if there exists a nonzero polynomial P ∈ R[y1 , . . . , ym ] such that P (f1 , . . . , fm ) = 0 (i.e. P (f1 (x), . . . , fm (x)) is equal to the zero polynomial).
Otherwise, they are algebraically independent.
Definition 4.8. The transcendence degree of a subspace U ⊆ R[x], denoted trdeg(U ) is the maximum value
of m for which there exist algebraically independent f1 , . . . , fm ∈ U . A set of trdeg(U ) such polynomials is
called a transcendence basis of U .
We now present our algebraic characterization of the generic list recovery problem.
Theorem 4.9 (generic list recovery). Let U ⊆ R[x]G be a finite-dimensional subspace. If trdeg(U ) =
trdeg(R[x]G ) then there exists a set S ⊆ V of full measure such that if θ ∈ S then U list-resolves θ.
Conversely, if trdeg(U ) < trdeg(R[x]G ) then there exists a set S ⊆ V of full measure such that if θ ∈ S then
U does not list-resolve θ.
The proof is deferred to Sections 8.2 and 8.3. A set has full measure if its complement has measure zero.
The intuition behind Theorem 4.9 is that trdeg(R[x]G ) is the number of degrees of freedom that need to be
pinned down in order to learn the orbit of θ, and so we need this many algebraically independent constraints
(invariant polynomials). Note that we have not yet given any bound on how large the finite list might be;
we will address this in Section 4.3.
In order for Theorem 4.9 to be useful, we need a way to compute the transcendence degree of both
R[x]G and U . In what follows, we will discuss methods for both of these: in Section 4.2.1 we show how to
compute trdeg(R[x]G ) analytically, and in Section 4.2.2 we give an efficient algorithm to compute trdeg(U )
T
for a subspace U . By taking U = U≤d
this yields an efficient algorithm to determine the smallest degree d
T
at which U≤d list-resolves a generic θ (thereby answering Question 2.8 for the case of generic list recovery).
4.2.1
Computing the transcendence degree of R[x]G .
Intuitively, the transcendence degree of R[x]G is the number of parameters required to describe an orbit of
G. For finite groups, this is simply the dimension of V :
Proposition 4.10 ([Stu08] Proposition 2.1.1). If G is a finite group, trdeg(R[x]G ) = dim(V ).
12
For infinite groups, the situation may be slightly different. For instance, if SO(3) acts on V = R3 in
the standard way (rotations in 3 dimensions), then a generic orbit is a sphere, with dimension two. This
means there is only one parameter to learn, namely the 2-norm, and we expect R[x]G to have transcendence
degree 1 accordingly. On the other hand, if SO(3) acts on a rich class of functions S 2 → R (as in the S 2
registration problem; see Section 5.4) then each orbit resembles a copy of SO(3) which has dimension 3. This
is formalized in the following.
Proposition 4.11 ([Dol03] Corollary 6.2). If G is an algebraic group, then
trdeg(R[x]G ) = dim(V ) − dim(G) + min dim(Gv ),
v∈V
where Gv is the stabilizer at v of the action of G (that is, the subgroup of all g ∈ G fixing v).
An alternate approach to the transcendence degree of R[x]G uses a central object in invariant theory:
the Hilbert series (see e.g. [DK15]).
G
Definition 4.12. Let R[x]G
consisting of homogeneous invariants of
d be the subspace (over R) of R[x]
G
degree d. The Hilbert series of R[x] is the formal power series
H(t) :=
∞
X
d
dim(R[x]G
d )t .
d=0
For a given G acting on V , there is an explicit formula (Molien’s formula) for the Hilbert series:
Proposition 4.13 ([Kač94] Remark 3-1.8). Let ρ : G → GL(V ) be the representation by which G acts on
V . Then for |t| < 1, H(t) converges and we have
H(t) =
E
g∼Haar(G)
det(I − t ρ(g))−1 .
This formula is tractable to compute, even for complicated groups; see Section 5.4 for details in the case of
SO(3). Once we have the Hilbert series, it is easy to extract trdeg(R[x]G ) as follows.
Proposition 4.14. The order of the pole at t = 1 of H(t) is equal to trdeg(R[x]G ).
The proof comes from [DK15]; see Section 8.4 for more details.
For heterogeneous problems (K > 1), the transcendence degree can be computed easily from the transcendence degree of the corresponding homogeneous (K = 1) problem.
Proposition 4.15. Let G̃ be a compact group acting linearly and continuously on Ṽ , and let G = G̃K ⋊ SK
act on V = Ṽ ⊕K ⊕ ∆K as in Definition 2.2. Let R[x]G be the invariant ring corresponding to the action of
G on V , and let R[x̃]G̃ be the invariant ring corresponding to the action of G̃ on Ṽ (i.e. the K = 1 problem).
Then trdeg(R[x]G ) = K · trdeg(R[x̃]G̃ ) + K − 1.
The proof can be found in Section 8.5. Note, however, that the result is intuitively reasonable by counting
parameters. We know trdeg(R[x̃]G̃ ) is the number of parameters required to describe an orbit of G̃ acting
on Ṽ . Thus, in the heterogeneity problem we have trdeg(R[x̃]G̃ ) parameters for each of the K signals, plus
an additional K − 1 parameters for the K mixing weights (since they sum to 1).
4.2.2
Algorithm for transcendence basis of U .
In this section we prove the following.
Theorem 4.16. There is an efficient algorithm to perform the following task. Given a basis {u1 , . . . , us }
for a finite-dimensional subspace U ⊆ R[x], output a transcendence basis for U .
13
Our first ingredient is the following simple classical test for algebraic independence (see, e.g., [ER93,
BMS13] for a proof).
Definition 4.17 (Jacobian). Given polynomials f1 , . . . , fm ∈ R[x] = R[x1 , . . . , xp ], we define the Jacobian
matrix Jx (f1 , . . . , fm ) ∈ (R[x])m×p by (Jx (f1 , . . . , fm ))ij = ∂xj fi where ∂xj denotes formal partial derivative
with respect to xj .
Proposition 4.18 (Jacobian criterion for algebraic independence). Polynomials f = (f1 , . . . , fm ) are algebraically independent if and only if the Jacobian matrix Jx (f ) has full row rank (over the field R(x)).
It suffices to test the rank of the Jacobian at a generic point x.
Corollary 4.19. Fix f = (f1 , . . . , fm ). Let z ∼ N (0, Ip×p ). If f is algebraically dependent then Jx (f )|x=z
does not have full row rank. If f is algebraically independent then Jx (f )|x=z has full row rank with probability
1.
Proof. An m × p matrix has deficient row rank if and only if either m > p or every maximal square
submatrix has determinant zero. Every such determinant of Jx (f ) is a polynomial in x; if this polynomial is
not identically zero then plugging in generic values for x will not cause it to vanish.
Remark 4.20. In practice we may choose to plug in random rational values for x so that the rank computation can be done in exact symbolic arithmetic. The Jacobian test will still succeed with overwhelming
probability (provided we use a fine enough mesh of rational numbers). Also note that if we find any value
of x for which the Jacobian has full row rank, this constitutes a proof of algebraic independence.
Remark 4.21. In some cases (e.g. if the polynomials involve irrational values) it may be slow to compute the
Jacobian rank in exact symbolic arithmetic. We can alternatively compute the singular values numerically
and count how many are reasonably far from zero. This method works reliably in practice (i.e., it is
extremely clear how to separate the zero and nonzero singular values) but does not constitute a rigorous
proof of algebraic independence.
Curiously, although the Jacobian criterion gives an efficient test for algebraic dependence, it is much
harder (#P -hard) to actually find the algebraic dependence (i.e., the polynomial relation) when one exists
[Kay09].
The Jacobian criterion implies the well-known fact that the collection of algebraically independent subsets
of R[x] form a matroid ; this is called an algebraic matroid (see e.g. [Sch03]). In particular, we have the
following exchange property:
Proposition 4.22. Let I, J be finite subsets of R[x], each algebraically independent. If |I| < |J| then there
exists f ∈ J r I such that I ∪ {f } is algebraically independent.
We next note that in the task from Theorem 4.16, a transcendence basis can always be taken from the
basis {u1 , . . . , us } itself.
Lemma 4.23. Let U be a finite-dimensional subspace of R[x] with basis B = {u1 , . . . , us }. If U contains r
algebraically independent elements, then so does B.
Proof. Let B ′ ⊆ B be a maximal set of algebraically independent elements of B. If |B| < r then by the
exchange property
(Proposition 4.22) there exists v ∈ U r B ′ such that B ′ ∪ {v} is algebraically independent.
Ps
Write v = i=1 αi ui . Since B ′ is maximal, we have from the Jacobian criterion (Proposition 4.18) that
for all 1 P
≤ i ≤ s, the row vector Jx (ui ) lies in the R(x)-span of B := {Jx (b)}b∈B ′ . But this means that
Jx (v) = si=1 αi Jx (ui ) lies in the R(x)-span of B. By the Jacobian criterion this contradicts the fact that
B ′ ∪ {v} is algebraically independent.
Proof of Theorem 4.16.
Let {u1 , . . . , us } be a basis (or spanning set) for U . From above we have that the transcendence degree of U
14
is the row rank of the Jacobian Jx (u1 , . . . , us ) evaluated at a generic point x. A transcendence basis for U
is the set of ui corresponding to a maximal linearly independent set of rows
We can use the following simple greedy algorithm to construct a transcendence basis. As input, receive
a list of polynomials {u1 , . . . , us }. Initialize I = ∅. For i = 1, . . . , s, add {ui } to I if I ∪ {ui } is algebraically
independent, and do nothing otherwise. (Note that this condition can be efficiently tested by Corollary 4.19.)
Output the resulting set I.
We now show correctness. Let Ii be the set after item ui has been considered (and possibly added), and
set I0 = ∅. It suffices to show that for each i ∈ {0, . . . , s}, Ii is a maximal independent subset of {u1 , . . . , ui }.
We proceed by induction. The claim is vacuously true when i = 0. Assume it holds for i − 1. If Ii is not
a maximal independent subset of {u1 , . . . , ui }, then there exists an independent set J ⊆ {u1 , . . . , ui } with
|J| > |I|, so by the exchange property (Proposition 4.22) there exists a uj with j ≤ i such that uj ∈
/ Ii and
Ii ∪ {uj } is independent. In particular, the subset Ij−1 ∪ {uj } of Ii ∪ {uj } is independent. But the fact that
uj was not added at the (j − 1)th step implies that Ij−1 ∪ {uj } is not independent, a contradiction. So Ii is
indeed maximal.
We obtain that I = Is is a maximal independent subset of {u1 , . . . , us }, and hence by Lemma 4.23 a
transcendence basis of U .
4.3
Generic unique recovery
For list recovery problems, the following gives an explicit upper bound on the size of the list.
Theorem 4.24. Let U be a subspace of the invariant ring R[x]G . Let FG be the field of fractions of R[x]G .
If [FG : R(U )] = D < ∞ then there exists a set S ⊆ V of full measure such that for any θ ∈ S, U list-resolves
θ with a list of size ≤ D.
The proof is deferred to Section 8.2. Here R(U ) is the smallest subfield of FG containing both R and U , and
[FG : R(U )] denotes the degree of a field extension; see Section 8.2 for more details. Since [FG : R(U )] = 1
is equivalent to R(U ) = FG , we have the following criterion for unique recovery.
Corollary 4.25 (generic unique recovery). If R(U ) = FG then there exists a set S ⊆ V of full measure such
that if θ ∈ S then U resolves θ.
The intuition here is that we want to be able to learn every invariant polynomial by adding, multiplying,
and dividing polynomials from U (and scalars from R). We need θ to be generic so that we never divide by
zero in the process.
Theorem 4.26. For a finite-dimensional subspace U ⊆ R[x]G , there is an algorithm to compute the degree
of the field extension from Theorem 4.24. As input, the algorithm requires a basis for U and the ability to
compute the Reynolds operator (Definition 4.1).
We give the algorithm and the proof in Section 8.6. The algorithm uses Gröbner bases and is unfortunately
inefficient to run in practice.
Additionally, in Appendix B we present a method for proving field generation using Galois theory. There
we use it to show generic unique recovery in the case where G is a finite Abelian group and V is its regular
representation (over R). These ideas may be helpful for proving generic unique recovery in other settings.
4.4
Worst-case unique recovery
We give a sufficient algebraic condition for worst-case unique recovery:
Theorem 4.27 (worst-case unique recovery). Let U ⊆ R[x]G be a finite-dimensional subspace with basis
{f1 , . . . , fm }. If U generates R[x]G as an R-algebra (i.e. R[f1 , . . . , fm ] = R[x]G ) then U resolves every θ ∈ V .
Proof. Every element of R[x]G can be written as a polynomial in the fi (with coefficients in R). This means
the values f1 (θ), . . . , fm (θ) uniquely determine all the values f (θ) for f ∈ R[x]G and so the result follows
because R[x]G resolves every θ ∈ V (Theorem 4.4).
15
Theorem 4.28. There is an algorithm to test whether or not U generates R[x]G as an R-algebra. As input,
the algorithm requires a basis for U and the ability to compute the Reynolds operator (Definition 4.1).
We give the algorithm and the proof in Section 8.6. The algorithm uses Gröbner bases and is unfortunately
inefficient to run in practice.
If G is a finite group, it is known that R[x]G has a generating set for which all elements have degree at
most |G| (this is Noether’s degree bound ; see Theorem 2.1.4 in [Stu08]). It follows that R[x]G
≤|G| resolves
every θ ∈ V . Recall (from Section 1.4) that this is tight for MRA: degree |G| is necessary for worst-case
signals.
A precise characterization of when U resolves every θ ∈ V is (by definition) that U should be a separating
set or (equivalently) should generate a separating algebra (see [DK15] Section 2.4). The notions of generating and separating sets do not always coincide, as illustrated by Example 2.4.2 in [DK15]. Furthermore,
generating sets may require strictly higher maximum degree [Dom16].
4.5
Worst-case list recovery
We give a sufficient algebraic condition for worst-case list recovery:
Theorem 4.29 (worst-case list recovery). Let U ⊆ R[x]G be a subspace with finite basis {f1 , . . . , fm }. If
R[x]G is finitely generated as a R[f1 , . . . , fm ]-module, then U list-resolves every θ ∈ V .
In other words, this condition says that there exists a basis g1 , . . . , gs ∈ R[x]G such that every element of
R[x]G can be written as a linear combination of g1 , . . . , gs with coefficients from R[f1 , . . . , fm ]. It is sufficient
to take U to be a set of primary invariants from a Hironaka decomposition (see Section 8.4).
Proof. Since R[x]G finitely generated as an R-algebra (Theorem 4.3), if R[x]G is finitely generated as a
R[f1 , . . . , fm ]-module then it follows that (see [Sha94] Section 5.3) every h ∈ R[x]G satisfies a monic polynomial
hk + ck−1 hk−1 + · · · + c1 h + c0 = 0
with ci ∈ R[f1 , . . . , fm ]. Letting h1 , . . . , hs be generators for R[x]G (as an R-algebra), we have that the values
f1 (θ), . . . , fm (θ) determine a finite set of possible values for h1 (θ), . . . , hs (θ), each of which determines (at
most) one orbit for θ.
5
Examples
In this section we work out some specific examples, determining the degree at which generic list recovery is
possible using the methods of Section 4.2. (We focus on generic list recovery because our algorithms for the
other recovery criteria are unfortunately too slow even for quite small examples.) We obtain several recovery
theorems for problems such as MRA and cryo-EM within finite ranges of parameters where we have verified
the Jacobian criterion using a computer, and beyond these parameter ranges, we state conjectural patterns.
The following themes emerge in the examples studied in this section. First, we see that many problems
are possible at degree 3, which is promising from a practical standpoint. Second, we do not encounter any
unexpected algebraic dependencies, and so we are able to show that heuristic parameter-counting arguments
are correct. In particular, we see that if there are enough linearly independent invariants, there are also
enough algebraically independent invariants.
5.1
Learning a bag of numbers
Let G be the symmetric group Sp acting on V = Rp by permutation matrices. The invariant ring consists of
the symmetric polynomials, which are generated by the elementary symmetric polynomials e1 , . . . , ep where
ei has degree i. Worst-case unique recovery is possible at degree p since R[x]G
≤p generates the full invariant
ring. Furthermore, degree p is actually required, even for generic list recovery. This is because any invariant
16
of degree ≤ p − 1 can be expressed as a polynomial in e1 , . . . , ep−1 and thus trdeg(R[x]G
≤p−1 ) = p − 1. So
this problem has a steep sample complexity of order σ 2p .
5.2
Learning a rigid body
Let G be the rotation group SO(p) acting on the matrix space Rp×m by left multiplication. We imagine
the columns of our matrix as vertices defining a rigid body; thus we observe random rotations of this rigid
body (with vertices labeled) plus noise. Let U ∈ Rp×m be such a matrix signal. With O(σ 4 ) samples,
we can estimate the degree-2 Gram matrix U ⊤ U ; taking a Cholesky factorization, we recover U up to left
action by an element of the larger group O(p). Thus we recover the rigid body up to a reflection ambiguity,
demonstrating list recovery (with a list of size 2). Surprisingly, assuming m ≥ p, we do not uniquely resolve
a generic signal until degree p, where with O(σ 2p ) samples we can estimate a p × p minor of U , which is a
degree-p invariant that changes sign under reflection.
The impossibility of unique recovery until degree p is a consequence of the “first fundamental theorem”
for the special orthogonal group SO(p), which asserts that the invariant ring is generated by the entries of
the Gram matrix U ⊤ U together with the p × p minors of U (see for instance [Kač94]); thus the invariants of
degree 3, . . . , p − 1 carry no information in addition to the degree-2 invariants.
5.3
Multi-reference alignment (MRA)
Recall that this is the case of G = Z/p acting on V = Rp by cyclic shifts. It is already known that for the
basic MRA problem (without projection or heterogeneity), generic unique recovery is possible at degree 3 for
any p [BRW17]. The methods of Section 4.2 confirm the weaker result that generic list recovery is possible
at degree 3 (at least for the values of p that we tested). Note the stark contrast in difficulty from the case
of the full symmetric group G = Sp above.
Remark 5.1. This result for MRA is actually a special case of a more general phenomenon. Let G be any
finite group and let V be the regular representation i.e. the space of functions f : G → R with the action
(g · f )(h) = f (g −1 h). (Note that for G = Z/p this is precisely the MRA problem.) It is known [Kak09]
that for this setup, the triple correlation (a collection of degree-3 invariants) is sufficient to resolve a generic
signal, and thus generic unique recovery is possible at degree 3. In Appendix B we give a short proof for the
special case where the group is Abelian; our proof illustrates a method based on Galois theory which may
be useful to prove generic unique recovery in other settings.
We can also verify that for MRA with p ≥ 3, generic list recovery is impossible at degree 2. This follows
from Theorem 4.9 because trdeg(R[x]G ) = p (since G is finite) but the number of algebraically independent
invariants of degree ≤ 2 is at most ⌊p/2⌋+1. We can see this as follows. A basis for the invariants of degree ≤ 2
is {R(x1 ), R(x21 ), R(x1 x2 ), R(x1 x3 ), . . . , R(x1 xs )} with s = ⌊p/2⌋+1. Here R denotes the Reynolds operator,
which averages over cyclic shifts of the variables. For instance, R(x1 x2 ) = p1 (x1 x2 +x2 x3 +x3 x4 +· · ·+xp x1 ).
Note that the basis above has size ⌊p/2⌋ + 2 but there is an algebraic dependence within it because R(x1 )2
can be written in terms of the other basis elements. The claim now follows.
Generic list recovery is possible at degree 1 for p = 1 and at degree 2 for p = 2. (This is true even for
worst-case unique recovery; recall from Section 4.4 that degree |G| is always sufficient for this.)
We now move on to variants of the MRA problem.
5.3.1
MRA with projection
We now consider MRA with a projection step. We imagine that the coordinates of the signal are arranged
in a circle so that G acts by rotating the signal around the circle. We then observe a projection of the circle
onto a line so that each observation is the sum of the two entries lying “above” it on the circle. This is
intended to resemble the tomographic projection in cryo-EM. We formally define the setup as follows.
17
Problem 5.2 (MRA with projection). Let p ≥ 3 be odd. Let V = Rp and G = Z/p acting on V by cyclic
shifts. Let q = (p − 1)/2 and W = Rq . Let Π : V → W be defined by
Π(v1 , . . . , vp ) = (v1 + vp , v2 + vp−1 , . . . , v(p−1)/2 + v(p+3)/2 ).
We call the associated generalized orbit recovery problem (Problem 2.3) MRA with projection. (We consider
the homogeneous case K = 1.)
Note that since p is odd, there is one entry v(p+1)/2 which is discarded by Π. The reason we consider the
odd-p case rather than the seemingly more elegant even-p case is because generic list recovery is actually
impossible in the even-p case. This is because the signals θ and θ + (c, −c, c, −c, . . .) cannot be distinguished
from the samples, even if there is no noise.
Restricting now to odd p, note that we cannot hope for generic unique recovery because it is impossible to
tell whether the signal is wrapped clockwise or counterclockwise around the circle. In other words, reversing
the signal via (θ1 , . . . , θp ) 7→ (θp , . . . , θ1 ) does not change the distribution of samples. We can still hope for
generic list recovery, hopefully with a list of size exactly 2. This degeneracy is analogous to the chirality
issue in cryo-EM: it is impossible to determine the chirality of the molecule (i.e. if the molecule is reflected
about some 2-dimensional plane through the origin, this does not change the distribution of samples).
It appears that, as in the basic MRA problem, generic list recovery is possible at degree 3. We proved
this for p up to 21 by checking the Jacobian criterion (see Section 4.2) on a computer, and we conjecture
that this trend continues.
Conjecture 5.3. For MRA with projection, for any odd p ≥ 3, generic list recovery is possible at degree 3.
Note that generic list recovery is impossible at degree 2 because the addition of the projection step to basic
T
MRA can only make it harder for U≤d
to list-resolve θ.
5.3.2
Heterogeneous MRA
We now consider heterogeneous MRA, i.e. the generalized orbit recovery problem (Problem 2.3) with G̃ = Z/p
acting on Ṽ = Rp by cyclic shifts, K ≥ 2 heterogeneous components, and no projection (i.e., Π is the identity).
We will see that generic list recovery is possible at degree 3 provided that p is large enough compared
to K. First note that the number of degrees of freedom to be recovered is trdeg(R[x]G ) = Kp + K − 1 (see
Propositions 4.10 and 4.15). Let us now count the number of distinct entries of Td (x) for d ≤ 3. Note that
Td (x) is symmetric (under permutations of indices) but we also have additional symmetries given by cyclic
shifts, e.g. (T3 (x))i,j,k = (T3 (x))i+c,j+c,k+c where c is an integer and the sums i + c, j + c, k + c are computed
modulo p. One can compute that T1 (x) has 1 distinct entry, T2 (x) has ⌊p/2⌋ + 1 distinct entries, and T3 (x)
has p + ⌈(p − 1)(p − 2)/6⌉ distinct entries. The total number of distinct entries is
U := p + 2 + ⌊p/2⌋ + ⌈(p − 1)(p − 2)/6⌉.
By Theorem 4.9, list recovery is impossible when U < Kp + K − 1. By testing the Jacobian condition, we
observe that the converse also appears to hold. We tested this up to K = 15 and up to the corresponding
critical p value.
Conjecture 5.4. For heterogeneous (K ≥ 2) MRA, generic list recovery is possible at degree 3 precisely if
U ≥ Kp + K − 1. This condition on U can be stated more explicitly as follows:
• K = 2 requires p ≥ 1.
• K = 3 requires p ≥ 12.
• K = 4 requires p ≥ 18.
• Each K ≥ 5 requires p ≥ 6K − 5.
18
Recent work [BBLS17] also studies the heterogeneous MRA problem. Similarly to the present work, they
apply the method of moments and solve a polynomial system of equations in order to recover the signals.
To solve the system they use an efficient heuristic method that has no provable guarantees but appears to
work well in practice. Their experiments suggest that if the signals have i.i.d. Gaussian entries, this method
√
succeeds only when (roughly) K ≤ p instead of the condition (roughly) K ≤ p/6 that we see above (and
that [BBLS17] also identified based on parameter-counting). Exploring this discrepancy is an interesting
direction for future work.
One question of particular interest is whether this example evinces a statistical-computational gap,
√
whereby all polynomial-time methods fail to succeed once K exceeds p. Some evidence for why we might
expect this is as follows. Recent work on tensor decomposition [MSS16] gives a polynomial-time algorithm
PN
p
to decompose a third order tensor of the form i=1 a⊗3
i + E where ai ∈ R are i.i.d. from the unit sphere
1.5
and E is noise, provided N ≤ p (up to factors of log p). The heterogeneous MRA problem can be cast as
such a tensor decomposition problem with N = Kp components ai ; the components are the p cyclic shifts
of each of the K signals. Although these ai are not independent, we expect that if the signals are random
then the ai are “random enough” for the same tensor decomposition result to hold, which exactly yields the
√
condition K ≤ p (up to factors of log p).
5.4
S 2 registration
Recall that this is the case where the signal θ is a real-valued function defined on the unit sphere S 2 in R3 .
The formal setup is as follows.
Let G = SO(3). For each ℓ = 0, 1, 2, . . . there is an irreducible representation Vℓ of SO(3) of dimension
2ℓ + 1. These representations are of real type, i.e. they can be defined over the real numbers so that
Vℓ = R2ℓ+1 . Let F be a finite subset of {0, 1, 2, . . .} and consider the orbit recovery problem in which G acts
on V = ⊕ℓ∈F Vℓ .
As intuition for the above setup, Vℓ is a basis for the degree-ℓ spherical harmonic functions S 2 → R
defined on the surface of the unit sphere S 2 ⊆ R3 . The spherical harmonics are a complete set of orthogonal
functions on the sphere and can be used (like a “Fourier series”) to represent a function S 2 → R. Thus the
signal θ ∈ V can be thought of as a function on the sphere, with SO(3) acting on it by rotating the sphere.
See Appendix A for details on spherical harmonics.
The primary case of interest is F = {1, . . . , F } for some F (the number of “frequencies”). We will see
that generic list recovery is possible at degree 3 so long as F ≥ 10. We will see that it is convenient to not
include 0 ∈ F , but we now justify why this is without loss of generality. V0 is the trivial representation, i.e.
the 1-dimensional representation on which every group element acts as the identity. In the interpretation of
spherical harmonics, the V0 -component is the mean value of the function over the sphere. We claim that the
S 2 registration problem with 0 ∈ F can be easily reduced to the problem with F ′ = F r {0}. This is because
the V0 -component is itself a degree-1 invariant; given the value of this invariant, one can subtract it off and
reduce to the case without a V0 -component (i.e. the case where the function on the sphere is zero-mean).
Thus we have that e.g. generic list recovery is possible (at a given degree) for F if and only if it is possible
for F ′ .
Using Proposition 4.11 we compute that trdeg(R[x]G ) = p − p′ , where
X
p = dim(V ) =
(2ℓ + 1)
ℓ∈F
and
0 ℓmax = 0
2 ℓmax = 1
where ℓmax = max ℓ.
p′ =
ℓ∈F
3 ℓmax ≥ 2
After all, V0 is the trivial representation on the 1-dimensional vector space, with 3-dimensional stabilizer
SO(3), and V1 is the standard 3-dimension representation of SO(3) on R3 by rotations, which yields a onedimensional SO(2) stabilizer at each nonzero point. When ℓmax ≥ 2, the representation V is known to have
zero-dimensional stabilizer at some points (see e.g. [Ete96]).
19
In the following we restrict to the case 0 ∈
/ F for simplicity (but recall that this is without loss of
G
generality). There are therefore no degree-1 invariants, i.e. R[x]G
1 is empty. By Theorem 4.9, if dim(R[x]2 ) +
G
G
dim(R[x]3 ) < trdeg(R[x] ) then generic list recovery is impossible at degree 3; this rules out generic list
recovery for F = {1, 2, . . . , F } when F ≤ 9. (We will see below how to compute dim(R[x]G
d ).) Beyond this
threshold, the situation is more hopeful:
Theorem 5.5. If F = {1, 2, . . . , F } and 10 ≤ F ≤ 16 then the degree-3 method of moments achieves generic
list recovery.
This theorem is based on computer verification of the Jacobian criterion for 10 ≤ F ≤ 16 using exact
arithmetic in a finite extension of Q. This result lends credence to the following conjecture.
Conjecture 5.6. Consider the S 2 registration problem with 0 ∈
/ F . We conjecture the following.
G
G
• Generic list recovery is possible at degree 3 if and only if dim(R[x]G
2 ) + dim(R[x]3 ) ≥ trdeg(R[x] )
G
G
(where trdeg(R[x] ) is computed above and dim(R[x]d ) can be computed from Proposition 5.7 below).
• In particular, if F = {1, 2, . . . , F } then generic list recovery is possible at degree 3 if and only if F ≥ 10.
The reason it is convenient to exclude the trivial representation is because it simplifies the parametercounting: if we use the trivial representation then we have a degree-1 invariant f and so there is an algebraic
relation between the degree-2 invariant f 2 and the degree-3 invariant f 3 .
We now discuss how to compute dim(R[x]G
d ). Using the methods in Section 4.6 of [DK15], we can give a
formula for the Hilbert series of R[x]G ; see Section 9.1. However, if one wants to extract a specific coefficient
dim(R[x]G
d ) of the Hilbert series, we give an alternative (and somewhat simpler) formula:
Proposition 5.7. Consider S 2 registration with frequencies F . Let χd (φ) : R → R be defined recursively by
χ0 (φ) = 1,
χ1 (φ) =
X
ℓ∈F
"
1+2
ℓ
X
m=1
#
cos(m φ) , and
d
χd (φ) =
Then we have
dim(R[x]G
d) =
1X
χ1 (iφ)χd−i (φ).
d i=1
1
π
Z
π
0
(1 − cos φ)χd (φ) dφ.
We give the proof in Section 9.2. Additionally, in Appendix A.6 we give explicit formulas for the invariants
(up to degree 3), which yields a combinatorial analogue of Proposition 5.7 (up to degree 3).
5.5
Cryo-EM
We adapt the following simple model for the cryo-EM reconstruction problem. We will use properties of the
3-dimensional Fourier transform, including the projection-slice theorem; see e.g. [Osg07] for a reference.
The signal is a 3-dimensional molecule, which we can think of as encoded by a density function f : R3 → R.
The 3-dimensional Fourier transform of f is fb : R3 → C given by
Z ∞Z ∞Z ∞
b
f (kx , ky , kz ) =
e−2πi(xkx +yky +zkz ) f (x, y, z) dx dy dz.
(1)
−∞
−∞
−∞
It is sufficient to learn fb because we can then recover f using the inverse Fourier transform. SO(3) acts
on the molecule by rotating it in 3-dimensional space (keeping the origin fixed). When f is rotated in
20
(x, y, z) coordinates, fb is also rotated in (kx , ky , kz )-coordinates by the same rotation. Each observation is
a 2-dimensional image obtained by first rotating f by a random element of SO(3) and then projecting f
parallel to the z axis. Specifically, the projection of f is fproj : R2 → R given by
Z ∞
fproj(x, y) =
f (x, y, z) dz.
−∞
By the projection-slice theorem, the 2-dimensional Fourier transform of fproj is equal to the slice fbslice : R2 →
C given by
fbslice (kx , ky ) = fb(kx , ky , 0).
Thus we think of fb as our unknown signal with SO(3) acting by rotation, and with post-projection which
reveals only the slice of fb lying in the plane kz = 0.
This does not yet conform to our definition of a (generalized) orbit recovery problem because the signal
needs to lie in a finite-dimensional real vector space. Instead of thinking of fb as a function on R3 , we fix a
finite number S of nested spherical shells in R3 , each of different radius and all centered at the origin. We
consider only the restriction of fb to these shells. We fix a finite number F of frequencies and on each shell
we expand fb (restricted to that shell) in the basis of spherical harmonics, truncated to 1 ≤ ℓ ≤ F . (As in S 2
registration, we can discard the trivial representation ℓ = 0 without loss of generality, and it is convenient
to do so.) Being the Fourier transform of a real-valued function, fb satisfies
fb(−kx , −ky , −kz ) = fb(kx , ky , kz )
(2)
(see (1)) and so we can use a particular basis Hℓm of spherical harmonics for which the expansion coefficients
are real; see Appendix A. We have now parametrized our signal by a finite number of real values θsℓm with
1 ≤ s ≤ S, 1 ≤ ℓ ≤ F , and −ℓ ≤ m ≤ ℓ. In particular, the restriction of fb to shell s has expansion
X
X
θsℓm Hℓm .
1≤ℓ≤F −ℓ≤m≤ℓ
SO(3) acts on each shell by 3-dimensional rotation; see Section A for the details of how SO(3) acts on spherical
harmonics. The projection Π reveals only the values on the equator z = 0 (or in spherical coordinates,
θ = π/2) of each shell. Using again the property (2), the output of Π on each shell has an expansion with
real coefficients in a particular finite basis hm ; see Section A.4.
Remark 5.8. There are various other choices one could make for the basis in which to represent the
(Fourier transform of the) molecule. Each of our basis functions is the product of a spherical harmonic and
a radial delta function (i.e. a delta function applied to the radius, resulting in a spherical shell). Another
common basis is the Fourier–Bessel basis (used in e.g. [LBB+ 17]) where each basis function is the product
of a spherical harmonic and a radial Bessel function. More generally we can take the product of spherical
harmonics with any set of radial basis function. It turns out that the choice of radial basis is unimportant
because the resulting problem will be isomorphic to our case (spherical shells) and so the same results hold.
We now present our results on the above cryo-EM model. We focus on identifying the regime of parameters
for which generic list recovery is possible at degree 3. Again using Proposition 4.11, we have for F ≥ 2:
trdeg(R[x]G ) = dim(V ) − 3 = S
F
X
ℓ=1
(2ℓ + 1) − 3 = S(F 2 + 2F ) − 3
(3)
where again we have a zero-dimensional stabilizer.
T
In Appendix A we give an explicit construction of the invariant polynomials in U≤3
. By testing the
Jacobian criterion in exact arithmetic on small examples, we arrive at the following theorem:
Theorem 5.9. Consider the homogeneous (K = 1) cryo-EM problem with S shells and F frequencies.
21
• If S = 1 then for any F ≥ 2, generic list recovery is impossible at degree 3.
• If 2 ≤ S ≤ 4 and 2 ≤ F ≤ 6, the degree-3 method of moments achieves generic list recovery.
The first assertion results from a simple counting argument: there are fewer invariants at degree ≤ 3 than
degrees of freedom. The second part is by confirming that the Jacobian of the invariants has rank equal to
trdeg(R[x]G ), through computer-assisted exact arithmetic over an appropriate finite extension of Q.
In floating-point arithmetic, we have further verified that the Jacobian appears to have appropriate rank
for 2 ≤ S ≤ 10 and 2 ≤ F ≤ 10, leading us to conjecture the following:
Conjecture 5.10. If S ≥ 2 then the degree-3 method of moments achieves generic list recovery (regardless
of F ).
T
Intuitively, when there is a single shell (S = 1) there are simply not enough invariants in U≤3
. However,
when S ≥ 2, the number of invariants increases dramatically due to cross-terms that involve multiple shells.
5.5.1
Heterogeneous cryo-EM
We now consider heterogeneous cryo-EM (K ≥ 2). By combining (3) with Proposition 4.15 we can compute
trdeg(R[x]G ). Based on testing the Jacobian criterion on small examples, we conjecture that the degree-3
method of moments achieves generic list recovery if and only if dim(U2T ) + dim(U3T ) ≥ trdeg(R[x]G ). In
T
other words, we expect no unexpected algebraic dependencies among U≤3
. (Recall that there are no degree-1
invariants since we are not using the trivial representation ℓ = 0).
In Section A.6 we give a conjectured formula for the exact value of dim(U2T )+dim(U3T ) for all S ≥ 1, F ≥ 2.
As a result we can determine for any given S ≥ 1 and F ≥ 2, the exact condition on K for which we believe
generic list recovery is possible. For S and F large, this condition is approximately K ≤ S 2 /4.
6
Open questions
We leave the following as directions for future work.
1. Our methods require testing the rank of the Jacobian on a computer for each problem size. It would
be desirable to have analytic results for e.g. (variants of) MRA in any dimension p.
2. We have given an efficient test for whether generic list recovery is possible, but have not given a
similarly efficient test for generic unique recovery. In cases where unique recovery is impossible, it
would be nice to give a tight bound on the size of the list; for instance, for MRA with projection, we
conjecture that the list has size exactly 2 (due to “chirality”), but we lack a proof for this fact. Our
algorithms for testing generic unique recovery are based on Gröbner bases, the calculation of which is
known to be computationally hard in the worst case [Huỳ86]. Unfortunately, the algorithms we have
proposed are also extremely slow in practice, though a faster implementation may be possible.
3. Our procedure for recovering θ from the samples involves solving a polynomial system of equations.
While solving polynomial systems is NP-hard in general, the fact that the polynomials used in the orbit
recovery problem have special structure leaves open the possibility of finding an efficient (polynomial
time) method with rigorous guarantees. Possible methods include tensor decomposition [PWB+ 17]
and non-convex optimization [BBLS17].
4. We have addressed the statistical limits of orbit recovery problems. However, prior work has indicated
the presence of statistical-to-computational gaps in related synchronization problems [PWBM16a], and
we expect such gaps to appear in orbit recovery problems too. As discussed in Section 5.3.2, the results
of [BBLS17] suggest a possible gap of this kind for heterogeneous MRA.
22
7
Proofs for Section 3: statistical results
We first prove Theorem 3.2. This theorem in fact holds for more general mixture problems, not merely those
arising from the orbit recovery problems defined in Problem 2.3. For convenience, we will state and prove
the theorem in its general form.
Problem 7.1 (mixture recovery). Let V = Rp , and let Θ ⊂ V be compact. For θ ∈ Θ, let µθ be a measure
on Rp whose support is contained in the unit ball, and assume the map θ 7→ µθ is continuous with respect to
the weak topology. Let D be a known distribution on R with finite moments of all orders, and let σ ≥ 1. For
i ∈ [n] = {1, 2, . . . , n}, we observe
yi = xi + σξi ,
where xi ∼ µθ and the entries of ξi are independently drawn from D. The goal is to estimate θ.
Write Pθ for the distribution arising from the parameter θ, and let Eθ be expectation with respect to
this distribution. We denote by Enθ the expectation taken with respect to n i.i.d. samples from Pθ . Where
there is no confusion, we also write Eθ for expectation with respect to the distribution µθ .
We require that µθ have bounded support; the requirement that it be supported in the unit ball is
for normalization purposes only. We assume throughout that σ ≥ 1. The following definiton gives the
generalization of Definition 3.1 to the mixture recovery problem.
Definition 7.2. Given a positive integer d and θ ∈ V , the order-d matching set Mθ,d is the set consisting of
all φ ∈ V such Eθ [x⊗k ] = Eφ [x⊗k ] for k = 1, . . . , d, where Eζ represents expectation with respect to x ∼ µζ .
Problem 7.1 generalizes Problem 2.3 by allowing the random vector xi to arise from more general mixtures
than those arising from group actions. Note that when the mixtures do arise from a generalized orbit recovery
problem, i.e., when xi = Π(gi · θki ), where gi and ki are distributed as in Problem 2.3, then Definition 7.2
reduces to Definition 3.1.
Having made these definitions, our goal in this section is to show that Theorem 3.2 holds word-for-word
in the setting of mixture recovery. To do so, we show that entries of the moment tensors Eθ [x⊗k ] can be
estimated on the basis of O(σ 2k ) samples from Pθ .
7.1
Estimation of moments
Our estimators will be based on a system of orthogonal univariate polynomials under the measure corresponding to D. Let H0 (x) = 1, and for k ≥ 1, define
Hk (x) = xk −
k−1
X
Eξ∼D [ξ k Hj (ξ)]
j=0
Eξ∼D [Hj (ξ)2 ]
Hj (x) .
It is easy to check that these polynomials are orthogonal under the inner product given by hf, gi =
Eξ∼D [f (ξ)g(ξ)] and that the polynomials H0 , . . . , Hk form a basis for the space of polynomials of degree
at most k. We denote them by Hk because they coincide with the classic Hermite polynomials when D is
Gaussian.
Like the Hermite polynomials, they satisfy the identity
Eξ∼D [Hk (x + ξ)] = xk .
Indeed, we can expand Hk (x + ξ) in the basis of the orthogonal polynomials as
Hk (x + ξ) =
k
X
j=0
23
αj (x)Hj (ξ) ,
(4)
where αj (x) is a polynomial in x of degree at most k−j. Since Hj (ξ) has zero mean for j ≥ 1 by construction,
we obtain
E[Hk (x + ξ)] = α0 (x) ,
and since Hk is a monic polynomial of degree k, we must have α0 (x) = xk .
We briefly review multi-index notation.
Definition 7.3. Q
A p-dimensional multi-index is a tuple α = (α1 , . . . , αp ) of nonnegative integers. For
α
p
x ∈ Rp , let xα = j=1 xj j .
Pp
For any multi-index α, we write |α| = j=1 αj . Given independent samples y1 , . . . , yn from Pθ , consider
the estimate for Ex∼µθ [xα ] given by
n
α :=
xf
α is unbiased.
We first show that xf
p
1 X Y αj
σ Hαj (σ −1 yi ) .
n i=1 j=1
α ] = E [xα ].
Lemma 7.4. For all θ ∈ Θ, Enθ [xf
θ
α is a sum of i.i.d. terms, it suffices to prove the claim for a single sample. By (4),
Proof. Since xf
Eθ
p
hY
j=1
h
i
σ αj Hαj (σ −1 yi ) = E
x∼µθ
= E
x∼µθ
= E
x∼µθ
E
ξ1 ,...,ξp ∼D
p
hY
E
ξj ∼D
j=1
p
hY
p
Y
j=1
i
σ αj Hαj (σ −1 (xj + σξj )) x
i
σ αj Hαj (σ −1 xj + ξj ) x
i
σ αj (σ −1 xj )αj = Eθ [xα ] .
j=1
It remains to bound the variance.
α] ≤
Proposition 7.5. For any multi-index α, there exists a constant cα such that for all θ ∈ Θ, Varθ [xf
−1 2|α|
cα n σ .
α is a sum of i.i.d. terms, it suffices to prove the claim for n = 1. Given a multi-index α, let
Proof.QSince xf
p
cα = j=1 supxj ∈[−1,1] Eξj ∼D [Hαj (xj + ξj )2 ], and note that cα is independent of σ. We obtain
α] ≤
Varθ [xf
E
x∼µθ
≤
p
hY
sup
E
ξ ∼D
j=1 j
p
Y
E
x:kxk≤1 j=1 ξj ∼D
≤ cα σ 2|α| ,
i
σ 2αj Hαj (σ −1 xj + ξj )2 x
2αj
σ Hαj (σ −1 xj + ξj )2
as claimed.
Finally, we apply the “median-of-means” trick [NY83] to show that we can combine the estimators defined
above to obtain estimates for the moment tensors Eθ [x⊗k ] for k ≤ d which are close to their expectation
with high probability.
24
Proposition 7.6. Let y1 , . . . , yn be i.i.d. samples from Pθ . For any degree d and accuracy parameter δ,
α = x
α (y , . . . , y ) for all α with |α| ≤ d such that with probability at least 1 − δ,
c
there exist estimators xc
1
n
r
log(p/δ)
α
d
α
c
max |Eθ [x ] − x | ≤ cd σ
,
α:|α|≤d
n
for some constant cd .
Proof. Split the samples into m subsamples of equal size, for some m to be specified, and for each α construct
α, . . . , x
α on the basis of the m subsamples. (We assume for convenience that m divides
f
the m estimators xf
m
1
α, . . . , x
α
α.
c
f
n.) Let x be the median of xf
m
1
Chebyshev’s inequality together with Proposition 7.5 implies that there exists a constant cd such that,
for each j = 1, . . . , m and multi-index α,
r i
h
m
α
d
α
Pr |xf
≤ 1/4 ,
j − Eθ [x ]| > cd σ
n
α, . . . , x
α are independent, a standard concentration argument shows that
f
and since the estimators xf
m
1
r i
h
m
α − E [xα ]| > c σ d
≤ e−m/4 .
Pr |xc
θ
d
n
By a “stars-and-bars” counting argument [Fel68], there are p+d
multi-indices α satisfying |α| ≤ d, so taking
d
a union bound over all choices of α yields
r
m
cα | ≤ cd σ d
max |Eθ [xα ] − x
α:|α|≤d
n
−m/4
with probability at least 1 − p+d
. Choosing m = 4 log( p+d
d e
d /δ) and taking cd sufficiently large in
the statement of the theorem yields the claim.
Note that the constant cd in the statement of Proposition 7.6 can be made explicit, given knowledge of
the distribution D.
7.2
Robust solutions to polynomial systems
We now show that approximate knowledge of the moment tensors Eθ [x⊗k ] for k = 1, . . . , d suffices to
approximately recover θ.
Lemma 7.7. For all θ ∈ Θ and ε > 0, there exists a ε′ > 0 such that, if φ ∈ Θ satisfies maxk≤d kEθ [x⊗k ] −
Eφ [x⊗k ]k∞ < ε′ , then there exists a τ ∈ Mθ,d such that kφ − τ k < ε.
Proof. We employ a simple compactness argument. Consider the set F = {φ ∈ Θ : ∀ τ ∈ Mθ,d kφ − τ k ≥ ε}.
Since Θ is compact, so is F . Set
ε′ = min max kEθ [x⊗k ] − Eφ [x⊗k ]k∞ .
φ∈F k≤d
⊗k
⊗k
Clearly if maxk≤d kEθ [x ] − Eφ [x ]k∞ < ε′ for some φ ∈ Θ, then there exists a τ ∈ Mθ,d such that
kφ − τ k < ε, so it remains to check that ε′ > 0.
Since θ 7→ µθ is continuous with respect to the weak topology and µθ is supported on a compact set
for all θ ∈ Θ, the moment map θ 7→ Eθ [x⊗k ] is also continuous for all k ≤ d. If φ ∈ F , then in particular
φ∈
/ Mθ,d, so there exists a k ≤ d for which Eθ [x⊗k ] 6= Eφ [x⊗k ]. Therefore ε′ > 0, as desired.
Lemma 7.7 is simply stating that the function φ 7→ minτ ∈Mθ,d kφ − τ k is continuous at θ with respect to
the topology induced by the moment maps. Note that, for generic θ when µθ arises from an orbit recovery
problem, the moment map will be continuously differentiable with a nonsingular Jacobian, so the inverse
function theorem implies ε′ can be taken to be Ω(ε). In general, however, the dependence could be worse.
25
7.3
Proof of Theorem 3.2
cα as in Proposition 7.6, and let
Construct the estimators x
(
)
r
log(p/δ)
α | ≤ c σd
cn = φ ∈ Θ : max |Eφ [xα ] − xc
M
d
n
α:|α|≤d
cn and that, for all
Applying Proposiiton 7.6, we have with probability at least 1 − δ that Mθ,d ⊆ M
c
φ ∈ Mn ,
r
log(p/δ)
⊗k
⊗k
α
α
d
.
max kEφ [x ] − Eθ [x ]k = max |Eφ [x ] − Eθ [x ]| ≤ 2cd σ
k≤d
n
α:|α|≤d
q
By Lemma 7.7, there exists an ε′θ,ε such that, as long as 2cd σ d log(p/δ)
< ε′θ,ε , then with probability at
n
cn ⊆ Mε .
least 1 − δ, we have the desired inclusion M
θ,d
Therefore taking n > (2cd /ε′θ,ε )2 log(p/δ)σ 2d = cθ,ε,d log(1/δ)σ 2d suffices.
7.4
Information geometry of gaussian mixtures
In this section, we establish an upper bound on the Kullbeck-Leibler divergence between different gaussian
mixtures, which we denote by D(· k ·).
The proof follows the outline used in [BRW17], based off a technique developed in [LNS99, CL11].
Proposition 7.8. Let θ, φ ∈ Θ, let the distribution D be N (0, 1) for some σ ≥ 1, and let d be any positive
integer.
There exist universal constants C and c such that if Eθ [x⊗k ] = Eφ [x⊗k ] for k ≤ d − 1, then
D(Pθ k Pφ ) ≤ C
(cσ)−2d
.
d!
Proof. We first establish the claim when d = 1. Note that the condition on the moment tensors is vacuous
in this case. By the convexity of the divergence,
D(Pθ k Pφ ) ≤
2
′
2
E D(N (x, σ ), N (x , σ )) =
x∼µ
θ
x′ ∼µφ
E
x∼µ
θ
x′ ∼µφ
kx − x′ k2
≤ 2σ −2 ,
2σ 2
where in the last step we used the fact that x and x′ lie in the unit ball almost surely.
Now, assume d > 1, so in particular Eθ [x] = Eφ [x]. Denote their common mean by v. For ζ ∈ {θ, φ}
denote by µζ the distribution of x − v when x ∼ µζ , and let Pζ denote distribution of y when y = x + ξ
for x ∼ µζ and ξ ∼ N (0, σ 2 I). Since this transformation is a deterministic bijection, the data processing
inequality implies D(Pθ k Pφ ) = D(Pθ k Pφ ).
Note that Eµθ [x] = Eµθ [x] = 0 and Eµθ [x⊗k ] = Eµφ [x⊗k ] for k ≤ d − 1. Hence without loss of generality
we can reduce to the case where µθ and µφ are both centered and are supported in a ball of radius 2.
We bound the χ2 -divergence between Pθ and Pφ . Let f be the density of a standard p-dimensional
Gaussian and for ζ ∈ Θ, let fζ be the density of Pζ , which can be written explicitly as
1
fζ (y) = Ex∼µζ σ −p f (σ −1 (y − x)) = σ −p f (σ −1 y)Ex∼µζ e− 2σ2 (x
2
−2y ⊤ x)
.
Since kxk ≤ 2 almost surely with respect µζ , Jensen’s inequality implies that
1
fζ (y) ≥ σ −p f (σ −1 y)e− 2σ2 (4−2y
⊤
Eζ x)
Recall that the χ2 divergence is defined by
χ2 (Pθ , Pφ ) =
Z
(fθ (y) − fφ (y))2
dy .
fθ (y)
26
2
= σ −p f (σ −1 y)e− σ2 .
(5)
Applying (5) to the denominator, expanding the definitions of fθ and fφ , and applying a change of variables
yields
Z
2
⊤
2
⊤
1
1
2
χ2 (Pθ , Pφ ) ≤ e2/σ
(Eθ e− 2σ2 (x −2y x) − Eφ e− 2σ2 (x −2y x) )2 σ −p f (σ −1 y) dy
Z
⊤
−1
−1
2
⊤
−1
−1
2
1
1
2/σ2
=e
(Eθ ey (σ x)− 2 kσ xk − Eφ ey (σ x)− 2 kσ xk )2 f (y) dy
2
= e2/σ E(Eθ eg
⊤
(σ−1 x)− 12 kσ−1 xk2
− Eφ eg
⊤
(σ−1 x)− 12 kσ−1 xk2 2
g ∼ N (0, I) .
) ,
(6)
Given ζ, ζ ′ ∈ Θ, let x ∼ µζ and x′ ∼ µζ ′ be independent. Then interchanging the order of expectation
and using the expression for the moment generating function of a standard Gaussian random variable, we
obtain
x⊤ x′
⊤
−1
′
−1
2
−1 ′ 2
1
Eζ,ζ ′ Eg eg (σ (x+x ))− 2 (kσ xk +kσ x k ) = Eζ,ζ ′ e σ2 .
Applying this expression to (6) after expanding the square produces
2
χ2 (Pθ , Pφ ) ≤ e2/σ E e
x∼µ
x⊤ x′
σ2
θ
−2 E e
x∼µ
θ
x′ ∼µθ
x′ ∼µφ
x⊤ x′
σ2
+
E e
x⊤ x′
σ2
x∼µφ
x′ ∼µφ
,
where in each expectation the random variables x and x′ are independent. Since µθ and µφ are compactly
supported, Fubini’s theorem implies we can expand each term as a power series and interchange expectation
and summation to produce
∞
−2k
2 X σ
E (x⊤ x′ )k − 2 E (x⊤ x′ )k + E (x⊤ x′ )k
χ2 (Pθ , Pφ ) ≤ e2/σ
x∼µφ
x∼µθ
x∼µθ
k!
′
′
′
k=0
= e2/σ
= e2/σ
= e2/σ
2
2
2
∞
X
k=0
∞
X
k=0
∞
X
k=d
x ∼µφ
x ∼µθ
σ
−2k
k!
x ∼µp hi
hEθ x⊗k , Eθ x⊗k i − 2hEθ x⊗k , Exφ x⊗k i + hEφ x⊗k , Eφ x⊗k i
σ −2k
kEθ [x⊗k ] − Eφ [x⊗k ]k2HS
k!
σ −2k
kEθ [x⊗k ] − Eφ [x⊗k ]k2HS ,
k!
where h·, ·i denotes the Frobenius inner product between tensors and k · kHS denotes the Hilbert-Schmidt
norm. Since under both µθ and µφ , kxk ≤ 2 almost surely, we have for all k ≥ 2,
kEθ [x⊗k ] − Eφ [x⊗k ]k2HS ≤ 2kEθ [x⊗k ]k2HS + 2kEφ [x⊗k ]k2HS ≤ 4k+1 .
Therefore
χ2 (Pθ , Pφ ) ≤ 4e2/σ
2
2
∞
d −2d
X
2 4 σ
4k σ −2k
≤ 4e6/σ
,
k!
d!
k=d
and applying the inequality D(Pθ k Pφ ) ≤ χ (Pθ , Pφ ) [Tsy09] proves the claim.
7.5
Proof of Theorem 3.4
If τ1 and τ2 are both in Mθ,d−1, then by Proposition 7.8, the corresponding distributions Pτ1 and Pτ2 satisfy
D(Pτ1 k Pτ2 ) ≤ (cσ)C2d d! . By the Neyman-Pearson lemma, for any test ψ using n samples,
s
r
1
Cn
n
n
Pr(ψ = 2) + Pr(ψ = 1) ≥ 1 − dTV (Pτ1 , Pτ2 ) ≥ 1 −
D(Pnτ1 k Pnτ2 ) = 1 −
,
τ2
τ1
2
2(cσ)2d d!
27
where we have applied Pinsker’s inequality and the chain rule for divergence. Therefore, to achieve an error
probability of at most 1/3, we must have n ≥ 2(cσ)2d d!/(9C) = cd σ 2d , as claimed.
8
8.1
Proofs for Section 4: algebraic results
Algorithm for generators of R[x]G
We know that R[x]G is finitely generated as an R-algebra (Theorem 4.3). There are various algorithms to
compute a finite set of generators for R[x]G [Stu08, DK15]. However, some require the group to be finite or to
be reductive over an algebraically-closed field. One algorithm that certainly works in our context (compact
groups) is Algorithm 2.2.5 in [Stu08]. As input it requires the Hilbert series of R[x]G (which can be computed
by Proposition 4.13) and a procedure to compute a basis for R[x]G
d (which can be done with the Reynolds
operator by Observation 4.2). The idea is as follows. We keep a set of proposed generators f1 , . . . , fm .
At each step we compare the Hilbert series of R[x]G with the Hilbert series of R[f1 , . . . , fm ] (which can be
computed using Gröbner bases). If these series differ at the td term, this means we are missing an invariant
at degree d. To remedy this, we create a new homogeneous invariant of degree d using the Reynolds operator,
and add it to our set of proposed generators. We repeat until the Hilbert series match.
8.2
Bounding the list size for generic signals
In this section we prove Theorem 4.24 and the first part of Theorem 4.9 (see Section 8.3 for the second part).
Recall the following basic definitions and facts from field theory.
Definition 8.1. If F2 is a subfield of F1 , we write F1 /F2 and call this a field extension. The degree of the
extension, denoted [F1 : F2 ], is the dimension of F1 as a vector space over F2 .
Proposition 8.2. Let R ⊆ F2 ⊆ F1 with F1 finitely generated (as a field) over R. Let r be the transcendence
degree of F1 (over R). The field extension F1 /F2 has finite degree if and only if F1 contains r algebraically
independent elements.
Proof. This is a basic fact of field theory. If F1 contains r algebraically independent elements then the
extension F1 /F2 is algebraic and finitely generated, and therefore has finite degree. Otherwise, the extension
is transcendental and has infinite degree.
In light of the above (and using the fact that R[x]G is finitely generated), Theorem 4.24 implies the first
part of Theorem 4.9 and so it remains to prove Theorem 4.24 (i.e. list size is bounded by D := [FG : R(U )]).
Proof of Theorem 4.24.
Write FU := R(U ). In characteristic zero, every algebraic extension is separable, so by the primitive element
theorem, FG = FU (α) for some α ∈ FG . Since α generates a degree-D extension, α is the root of a degree-D
polynomial
αD + bD−1 αD−1 + · · · + b1 α + b0
(7)
with coefficients bi ∈ FU . Furthermore, every element of FG can be expressed as
c0 + c1 α + · · · + cD−1 αD−1
with ci ∈ FU . In particular, let g1 , . . . , gk be generators for R[x]G (as an R-algebra) and write
(i)
(i)
(i)
gi = c0 + c1 α + · · · + cD−1 αD−1 .
(8)
(i)
Let S ⊆ V be the subset for which α and all the (finitely-many) coefficients bi , cj have nonzero denominators;
S is a non-empty Zariski-open set and thus has full measure. Now fix θ ∈ S. Given the values f (θ) for all
f ∈ U , each bi takes a well-defined value in R and so from (7) there are at most D possible values that α(θ)
can take. From (8), each value of α(θ) uniquely determines all the values gi (θ) and thus uniquely determines
all the values f (θ) for f ∈ R[x]G . Since R[x]G resolves θ (Theorem 4.4), this completes the proof.
28
8.3
Generic list recovery converse
In this section we prove the second part of Theorem 4.9 (the converse).
Let p = dim(V ), trdeg(U ) = q, and trdeg(R[x]G ) = r so that q < r ≤ p. Let f = {f1 , . . . , fm } be a basis
for U , and let g = {g1 , . . . , gr } be a transcendence basis for R[x]G . Let S ⊆ V be the set of points θ for
which the Jacobian Jx (f )|x=θ has row rank q and the Jacobian Jx (g)|x=θ has row rank r; by the Jacobian
criterion (see Corollary 4.19), S is a non-empty Zariski-open set and thus has full measure.
Fix θ ∈ S. For a sufficiently small open neighborhood X ⊆ S containing θ we have the following. The
Jacobian criterion on f implies that {τ ∈ X : f (τ ) = f (θ)} has dimension p − q. The Jacobian criterion on
g implies that every z ∈ g(X) has a preimage g−1 (z) := {τ ∈ X : g(τ ) = z} of dimension p − r. Since
p − q > p − r it follows that there are infinitely many θ1 , θ2 , . . . ∈ X such that f (θi ) = f (θ) but the values
g(θ1 ), g(θ2 ), . . . are all distinct (and thus the θi belong to distinct orbits). Therefore U does not list-resolve
θ.
8.4
Hilbert series and Hironaka decomposition
In this section we prove Proposition 4.14 on extracting the transcendence degree from the Hilbert series
(as the pole order at t = 1). While this is a general property of finitely generated algebras over a field,
there is an easy proof for invariant rings stemming from a key structural property of such rings called the
Cohen-Macaulay property or Hironaka decomposition.
Theorem 8.3 ([DK15] Section 2.6). The invariant ring R[x]G has the following structure. There exist
homogeneous primary invariants f1 , . . . , fr ∈ R[x]G and homogeneous secondary invariants g1 , . . . , gs ∈
R[x]G such that
• {f1 , . . . , fr } are algebraically independent, and
• any element of R[x]G can be written uniquely as a linear combination of g1 , . . . , gs with coefficients
from R[f1 , . . . , fr ].
The proof can be found in Section 2.6 of [DK15]; note that the only property of the group that is used is
the existence of a Reynolds operator (and so the proof is valid for compact groups).
Proof of Proposition 4.14.
The Hironaka decomposition above implies that the Hilbert series takes the form
Ps
tdeg(gj )
Qr j=1 deg(f )
i )
i=1 (1 − t
(this is equation (2.7.3) in [DK15]). It is now clear that the order of the pole at t = 1 is precisely r. But
we can see as follows that f1 , . . . , fr is a transcendence basis for R[x]G and so r = trdeg(R[x]G ). As in the
proof of Theorem 4.29, since R[x]G is a finitely generated R[f1 , . . . , fr ]-module, every h ∈ R[x]G satisfies a
polynomial with coefficients in R[f1 , . . . , fr ], which is an algebraic dependence among {f1 , . . . , fr , h}.
8.5
Transcendence degree for heterogeneity
In this section we prove Proposition 4.15. To recall the setup, we have G̃ acting on Ṽ with associated
variables x̃. We also have G = G̃K ⋊ SK acting on V = Ṽ ⊕K ⊕ ∆K with associated variables x. Let us also
introduce an intermediate group: G′ = G̃K , acting on V (with associated variables x).
(k)
(k)
Partition the variables x as follows. For k = 1, . . . , K, let x(k) = (x1 , . . . , xp ) be the variables
corresponding to signal k. Let z = (z1 , . . . , zK−1 ) be the variables corresponding to the mixing weights
PK−1
w 1 , . . . , w K−1 . Whenever we refer to zK , this is just shorthand for − k=1 zk .
We first prove a simpler version of the result without the action of SK .
29
Lemma 8.4. Let r̃ = trdeg(R[x̃]G̃ ) and let r = K r̃ + K − 1. Then
′
trdeg(R[x]G ) = r.
′
Proof. To show ‘≥’ we need to exhibit r algebraically independent elements of R[x]G . Letting f1 , . . . , fr̃ be
a transcendence basis for R[x̃]G̃ , it suffices to take
I := {fi (x(k) )}1≤i≤r̃,1≤k≤K ∪ {z1 , . . . , zK−1 }.
′
To show ‘≤’ we first recall that we can obtain a spanning set for the subspace R[x]G
d by applying the
Reynolds operator R (for G′ ) to each degree-d monomial (in the variables x). Such a monomial takes the
form
K
Y
mk (x(k) )
m(x) = M (z)
k=1
where M, mk are monomials. Applying the Reynolds operator yields
R(m(x)) =
E
g1 ,...,gk ∼G̃
M (z)
K
Y
k=1
mk (gk · x(k) ) = M (z)
K
Y
(k)
E mk (gk · x ).
k=1 gk ∼G̃
Note that R(m(x)) is the product of pure invariants, i.e. invariants that only involve variables from a single
one of the blocks x(1) , . . . , x(K) , z. It is clear that I (from above) is a maximal set of algebraically independent
pure invariants. It is now easy to show using the Jacobian criterion (Proposition 4.18) that if any R(m(x))
is added to I, it will no longer be algebraically independent. The result now follows using basic properties
of algebraic independence (Proposition 4.22 and Lemma 4.23).
Proof of Proposition 4.15.
′
Since R[x]G ⊆ R[x]G , it is clear (in light of the above) that trdeg(R[x]G ) ≤ r. Thus we need only to show
trdeg(R[x]G ) ≥ r by demonstrating r algebraically independent invariants. Let e1 , . . . , eK be the elementary
symmetric functions in K variables. With fi as above, we take the invariants
{ek (fi (x(1) ), . . . , fi (x(K) ))}1≤i≤r̃,1≤k≤K ∪ {e2 (z1 , . . . , zK ), . . . , eK (z1 , . . . , zK )}.
Note that e1 (z1 , . . . , zK ) is not included because it is equal to 0. The fact that ek (fi (x(1) ), . . . , fi (x(K) )) are
algebraically independent can be seen because {e1 , . . . , eK } is algebraically independent and {fi (x(k) )}i,k
is algebraically independent. We can see that {ek (z1 , . . . , zK )}k≥2 are algebraically independent as follows.
An algebraic dependence would be a polynomial P such that P (e2 (z2 , . . . , zK ), . . . , eK (z1 , . . . , zK )) (now
P
treating zK as a separate variable) has a root zK = − K−1
k=1 zk and thus has e1 (z1 , . . . , zK ) as factor.
But this contradicts the fact that any symmetric polynomial has a unique representation in terms of the
elementary symmetric polynomials.
8.6
Gröbner bases
In this section we show how to use Gröbner bases to test various algebraic conditions. In particular, we
prove Theorems 4.26 and 4.28. The ideas from this section are mostly standard in the theory of Gröbner
bases; see e.g. [CLO07] for a reference.
Definition 8.5. A monomial order on R[x] is a well-ordering on the set M of all (monic) monomials,
satisfying M ≤ N ⇔ M P ≤ N P for all M, N, P ∈ M. We will say that a monomial order favors a variable
xi if the monomial xi is larger (with respect to the monomial order) than any monomial not involving xi .
We write LM(f ) to denote the leading monomial of a polynomial f , i.e. the monomial occurring in f that is
largest (with respect to the monomial order); LM(f ) does not include the coefficient.
30
Definition 8.6. A Gröbner basis of an ideal I ⊆ R[x] is a finite subset B ⊆ I such that for every f ∈ I
there exists b ∈ B such that LM(f ) is a multiple of LM(b). We call B a reduced Gröbner basis if all its
elements are monic and it has the additional property that for every pair of distinct b, b′ ∈ B, no monomial
occurring in b is a multiple of LM(b′ ).
The following basic facts about Gröbner bases are proved in [CLO07]. A Gröbner basis is indeed a basis, in
that it generates the ideal. Every ideal I ⊆ R[x] has a Gröbner basis, and has a unique reduced Gröbner
basis. Buchberger’s algorithm computes the reduced Gröbner basis of an ideal I = hf1 , . . . , fm i, given a list
of generators fi . (It is not a polynomial-time algorithm, however.)
Suppose we are interested in the relations between polynomials f1 , . . . , fm ∈ R[x]. Introduce additional
variables t = (t1 , . . . , tm ) and consider the ideal I := hf1 (x) − t1 , . . . , fm (x) − tm i ⊆ R[x, t]. Given f1 , . . . , fm
there is an algorithm to compute a Gröbner basis for the elimination ideal
J := hf1 (x) − t1 , . . . , fm (x) − tm i ∩ R[t].
In fact, the algorithm is simply to compute a Gröbner basis for I using a particular monomial order and then
keep only the elements that depend only on t (see Chapter 3 of [CLO07]). The elimination ideal consists
precisely of the polynomial relations among f1 , . . . , fm :
Lemma 8.7. For any polynomial P ∈ R[t] we have: P ∈ J if and only if P (f1 (x), . . . , fm (x)) ≡ 0.
Proof. The direction ‘⇒’ is clear because if we let ti = fi (x) for all i then the generators of I vanish and
so every element of I vanishes. To show the converse, it suffices to show that for any polynomial P ∈ R[t],
P (f1 (x), . . . , fm (x)) − P (t1 , . . . , tm ) ∈ I. This can be shown inductively using the following key idea:
x1 x2 − t1 t2 =
1
1
(x1 − t1 )(x2 + t2 ) + (x2 − t2 )(x1 + t1 )
2
2
and so x1 x2 − t1 t2 ∈ hx1 − t1 , x2 − t2 i.
Generation as an R-algebra. Suppose we want to know whether fm ∈ R[f1 , . . . , fm−1 ]. This is equivalent
to asking whether there exists P ∈ J of the form
P (t) = tm − Q(t1 , . . . , tm−1 )
(9)
for some Q ∈ R[t1 , . . . , tm−1 ]. Suppose that J contains an element P of the form (9). Compute a Gröbner
basis B for J with respect to a monomial order that favors tm . The leading monomial of P is tm so by the
definition of a Gröbner basis there must be an element b ∈ B whose leading monomial divides tm . Since
1 ∈
/ J (by Lemma 8.7), the leading monomial of b is exactly tm and so b takes the form (9). Therefore,
fm ∈ R[f1 , . . . , fm−1 ] if and only if B contains an element of the form (9).
We can now prove Theorem 4.28: to test whether R[f1 , . . . , fm ] = R[x]G , compute generators g1 , . . . , gs
for R[x]G (see Section 8.1) and use the above to test whether each gi is in R[f1 , . . . , fm ].
Generation as a field. Suppose we want to know whether fm ∈ R(f1 , . . . , fm−1 ). This is equivalent to
asking whether fm can be expressed as a rational function of f1 , . . . , fm−1 (with coefficients in R), which is
equivalent (by multiplying through by the denominator) to asking whether there exists P ∈ J of the form
P (t) = tm Q1 (t1 , . . . , tm−1 ) − Q2 (t1 , . . . , tm−1 ) with Q1 ∈
/ J.
(10)
Suppose that J contains an element P of the form (10). Compute a reduced Gröbner basis B for J with
respect to a monomial order that favors tm . It is a basic property of Gröbner bases that P can be written as
X
pi (t)bi (t)
P (t) =
i
where pi ∈ R[t] and bi ∈ B with LM(pi ) ≤ LM(P ) and LM(bi ) ≤ LM(P ). If no bi involves the variable
tm then Q1 ∈ J, a contradiction. Therefore some bj must have degree 1 in tm . Since B is a reduced
Gröbner basis it cannot contain any element of the form (10) with Q1 ∈ J. This completes the proof that
fm ∈ R(f1 , . . . , fm−1 ) if and only if B contains an element of the form (10).
31
Degree of field extension. Consider the setup from Theorem 4.24: given a finite set U = {f1 , . . . , fm } ⊆
R[x]G , we want to compute [FG : FU ] where FU = R(U ) and FG is the field of fractions of R[x]G . We can
assume [FG : FU ] is finite (since we can efficiently test whether this is the case using Proposition 8.2 and
the methods of Section 4.2). Let d be such that R[x]G
≤d generates FG as a field (over R). (It is sufficient
G
for R[x]G
to
generate
R[x]
as
an
R-algebra;
such
a
d
can be computed via Section 8.1. If G is finite then
≤d
d = |G| is sufficient; see Section 4.4.) A generic element of R[x]G
≤d will generate the field extension:
Lemma 8.8. For all but a measure-zero set of α ∈ R[x]G
≤d , FG = FU (α).
This fact is related to the primitive element theorem. We include a proof for completeness.
Proof. The field extension FG /FU is finite and separable (since we’re in characteristic zero), so by the
fundamental theorem of Galois theory, there are only finitely many intermediate fields. (Take the normal
closure of FG /FU ; then the intermediate fields are in bijection with a finite group, and only some of them
lie inside FG .) Let L be the collection of intermediate fields of FG /FU that are proper subfields of FG . We
know R[x]G
≤d is a subspace of FG that generates FG and therefore is not contained by any field in L. This
G
means each field L ∈ L intersects R[x]G
≤d at a proper subspace VL of R[x]≤d . The finite union ∪L∈L VL is a
measure-zero subset of R[x]G
≤d , and any α outside of it satisfies FG = FU (α).
Let α be a generic element of R[x]G
≤d . In light of the above, [FG : FU ] is equal to the smallest positive
integer D for which there exists a relation
QD (f1 , . . . , fm )αD + · · · + Q1 (f1 , . . . , fm )α + Q0 (f1 , . . . , fm ) ≡ 0
for polynomials Qi with QD (f1 , . . . , fm ) 6≡ 0. This can be tested similarly to field generation. Compute
a reduced Gröbner basis B for the elimination ideal J ⊆ R[t1 , . . . , tm , τ ] consisting of the relations among
f1 , . . . , fm , α; use a monomial order that favors τ . Then [FG : FU ] is equal to the smallest positive integer
D for which B contains an element of degree D in τ (or ∞ if B contains no element that involves τ ). This
proves Theorem 4.26.
Remark 8.9. An alternative to using Gröbner bases for the above tasks is to solve a (very large) linear
system in order to find the minimal relation among a set of polynomials. There are bounds on the maximum
possible degree of such a relation (if one exists) [Kay09].
9
Proofs for S 2 registration
9.1
Formula for Hilbert series of R[x]G
We can derive the Hilbert series of R[x]G for S 2 registration using the methods in Section 4.6 of [DK15].
Proposition 9.1. Consider S 2 registration with frequencies F . For |t| < 1, the Hilbert series of R[x]G is
given by
X
H(t) =
Res(f, z)
z∈P
where
f (z) =
z
1 − 21 (z + 1/z)
−z N −2(1 − z)2
hQ
i
= Q
Qℓ
Qℓ
ℓ
m
m
m
2 ℓ∈F
ℓ∈F
m=−ℓ (1 − tz )
m=0 (1 − tz )
m=1 (z − t)
Q
P
with N = 12 ℓ∈F ℓ(ℓ + 1). Here Res(f, z) denotes the residue (from complex analysis) of the function f at
the point z, and P is the set of poles of f (z) inside the unit circle (in C). Namely, P contains t1/m e2πik/m
for all m ∈ {1, 2, . . . , maxℓ∈F ℓ} and for all k ∈ {0, 1, . . . , m − 1}. If N ≤ 1, P also contains 0.
32
Proof. Recall Molien’s formula (Proposition 4.13):
H(t) =
E
g∼Haar(G)
det(I − t ρ(g))−1 .
Note that det(I − t ρ(g)) depends only on the conjugacy class of g. In SO(3), two elements are conjugate
if and only if they rotate by the same angle φ. When g ∼ Haar(SO(3)), the angle φ = φ(g) is distributed
with density function π1 (1 − cos φ) on [0, π] (see e.g. [Sal79]). If g has angle φ, the matrix ρℓ (g) by which
it acts on the irreducible representation Vℓ has eigenvalues e−iℓφ , e−i(ℓ−1)φ , . . . , eiℓφ (see e.g. [Vve01]). The
matrix ρ(g) by which g acts on V = ⊕ℓ∈F Vℓ is block diagonal with blocks ρℓ (g). Using the above we write
an expression for the Hilbert series:
H(t) =
1
π
Z
π
0
1
1 − cos φ
dφ =
Qℓ
imφ )
2π
ℓ∈F
m=−ℓ (1 − te
Q
Z
0
2π
1 − 21 (eiφ + e−iφ )
dφ.
Qℓ
imφ )
ℓ∈F
m=−ℓ (1 − te
Q
Now write this as a complex contour integral around the unit circle in C and apply the residue theorem from
complex analysis to arrive at the result.
9.2
Formula for dimension of R[x]G
d
The dimension of R[x]G can be extracted as the coefficient of td in the Hilbert series from the previous
section, but here we give a different formula based on character theory from representation theory. The
character of a representation ρ : G → GL(V ) (where V is a finite-dimensional real vector space) is the
function χV : G → R defined by χV (g) = tr(ρ(g)).
In our case, using the eigenvalues of ρℓ (g) from the previous section, we have
χVℓ (g) = 1 + 2
ℓ
X
cos(m φ(g))
m=1
P
where φ(g) is the angle of rotation of g. For V = ⊕ℓ∈F Vℓ we then have χV (g) = ℓ∈F χVℓ (g).
As a representation of G = SO(3), R[x]d is (isomorphic to) the dth symmetric power of V , denoted
S d (V ). (This is using the fact that a real representation is isomorphic to its dual.) There is a recursive
formula for the character of S d (V ):
d
χS d (V ) (g) =
1X
χV (g i )χS d−i (V ) (g).
d i=1
This comes from the Newton–Girard formula for expressing complete homogeneous symmetric polynomials
in terms of power sum polynomials.
The representation R[x]d = S d (V ) decomposes as the direct sum of irreducible representations Vℓ . The
subspace of R[x]d consisting of all copies of the trivial representation V0 (the 1-dimensional representation
G
on which every group element acts as the identity) is precisely R[x]G
d . Thus, dim(R[x]d ) is the number of
copies of the trivial representation in the decomposition of R[x]d . This can be computed using characters:
dim(R[x]G
d ) = hχS d (V ) , χV0 i = hχS d (V ) , 1i where hf1 , f2 i := Eg∼Haar(G) [f1 (g)f2 (g)]. Since characters are class
functions (i.e. they are constant on conjugacy classes), we can compute this inner product by integrating
over the angle φ (as in the previous section). This yields the formula stated in Proposition 5.7.
Acknowledgements
ASW is grateful for feedback given by several members of the audience when he presented a preliminary
version of these results at a workshop dedicated to multi-reference alignment, organized as part of the Simons
Collaboration on Algorithms & Geometry.
33
References
[ABL+ 17]
Emmanuel Abbe, Tamir Bendory, William Leeb, João Pereira, Nir Sharon, and Amit Singer.
Multireference alignment is easier with an aperiodic translation distribution. arXiv preprint
arXiv:1710.02793, 2017.
[ADBS16]
Cecilia Aguerrebere, Mauricio Delbracio, Alberto Bartesaghi, and Guillermo Sapiro. Fundamental limits in multi-image alignment. IEEE Trans. Signal Process., 64(21):5707–5722, 2016.
[ADLM84]
Marc Adrian, Jacques Dubochet, Jean Lepault, and Alasdair W McDowall. Cryo-electron
microscopy of viruses. Nature, 308(5954):32–36, 1984.
[APS17]
Emmanuel Abbe, Joao Pereira, and Amit Singer. Sample complexity of the boolean multireference alignment problem. arXiv preprint arXiv:1701.07540, 2017.
[Ban15]
Afonso S. Bandeira. Convex Relaxations for Certain Inverse Problems on Graphs. PhD thesis,
Princeton University, June 2015.
[BBLS17]
Nicolas Boumal, Tamir Bendory, Roy R. Lederman, and Amit Singer. Heterogeneous multireference alignment: a single pass approach. arXiv preprint arXiv:1710.02590, 2017.
[BBM+ 17]
Tamir Bendory, Nicolas Boumal, Chao Ma, Zhizhen Zhao, and Amit Singer. Bispectrum
inversion with application to multireference alignment. arXiv preprint arXiv:1705.00641, 2017.
[BCS15]
Afonso S. Bandeira, Yutong Chen, and Amit Singer. Non-unique games over compact groups
and orientation estimation in cryo-EM. arXiv preprint arXiv:1505.03840, 2015.
[BCSZ14]
Afonso S. Bandeira, Moses Charikar, Amit Singer, and Andy Zhu. Multireference alignment
using semidefinite programming. In Proceedings of the 5th conference on Innovations in theoretical computer science, pages 459–470. ACM, 2014.
[BFB97]
Miguel A Blanco, M Flórez, and M Bermejo. Evaluation of the rotation matrices in the basis
of real spherical harmonics. Journal of Molecular Structure: Theochem, 419(1):19–27, 1997.
[BMS13]
Malte Beecken, Johannes Mittmann, and Nitin Saxena. Algebraic independence and blackbox
identity testing. Information and Computation, 222:2–19, 2013.
[Böh13]
Arno Böhm. Quantum mechanics: foundations and applications. Springer Science & Business
Media, 2013.
[BRW17]
Afonso Bandeira, Philippe Rigollet, and Jonathan Weed. Optimal rates of estimation for
multi-reference alignment. arXiv preprint arXiv:1702.08546, 2017.
[BZS15]
Tejal Bhamre, Teng Zhang, and Amit Singer. Orthogonal matrix retrieval in cryo-electron
microscopy. In Biomedical Imaging (ISBI), 2015 IEEE 12th International Symposium on,
pages 1048–1052. IEEE, 2015.
[CL11]
T. Tony Cai and Mark G. Low. Testing composite hypotheses, Hermite polynomials and
optimal estimation of a nonsmooth functional. Ann. Statist., 39(2):1012–1041, 2011.
[CLO07]
David Cox, John Little, and Don O’Shea. Ideals, varieties, and algorithms: an introduction to
computational algebraic geometry and commutative algebra. Springer New York, 2007.
[Coh13]
J. Cohen. Is high-tech view of hiv too good to be true? Science, 6145(341):443–444, 2013.
[Dia92]
R. Diamond. On the multiple simultaneous superposition of molecular structures by rigid body
transformations. Protein Science, 1(10):1279–1287, October 1992.
34
[DK15]
Harm Derksen and Gregor Kemper. Computational invariant theory. Springer, 2015.
[Dol03]
Igor Dolgachev. Lectures on invariant theory, volume 296. Cambridge University Press, 2003.
[Dom16]
M. Domokos. Degree bounds for separating invariants of abelian groups. arXiv preprint
arXiv:1602.06597, 2016.
[Eli57]
Peter Elias. List decoding for noisy channels. Technical Report 335, Research Laboratory of
Electronics, Massachusetts Institute of Technology, 1957.
[ER93]
Richard Ehrenborg and Gian-Carlo Rota. Apolarity and canonical forms for homogeneous
polynomials. European Journal of Combinatorics, 14(3):157–181, 1993.
[Ete96]
Gábor Etesi. Spontaneous symmetry breaking in the SO(3) gauge theory to discrete subgroups.
Journal of Mathematical Physics, 37(4):1596–1601, 1996.
[Fel68]
W. Feller. An Introduction to Probability Theory and Its Applications, volume 1. Wiley, 1968.
[Hil90]
David Hilbert. Über die Theorie der algebraischen Formen. Mathematische Annalen, 36:473–
531, 1890.
[Hil93]
David Hilbert. Über die vollen Invariantensysteme. Mathematische Annalen, 42:313–370, 1893.
[Huỳ86]
Dũng T. Huỳnh. A superexponential lower bound for Gröbner bases and Church-Rosser commutative Thue systems. Inform. and Control, 68(1-3):196–206, 1986.
[Jon16]
Slavica Jonić. Cryo-electron microscopy analysis of structurally heterogeneous macromolecular
complexes. Computational and structural biotechnology journal, 14:385–390, 2016.
[Kač94]
Victor Kač. Invariant theory [lecture notes]. https://people.kth.se/~laksov/notes/invariant.pdf,
1994.
[Kak09]
Ramakrishna Kakarala. Completeness of bispectrum on compact groups. arXiv preprint
arXiv:0902.0196, 1, 2009.
[Kam80]
Zvi Kam. The reconstruction of structure from electron micrographs of randomly oriented
particles. Journal of Theoretical Biology, 82(1):15–39, 1980.
[Kay09]
Neeraj Kayal. The complexity of the annihilating polynomial. In 24th Annual IEEE Conference
on Computational Complexity (CCC’09), pages 184–193. IEEE, 2009.
[KK10]
Martin Kohls and Hanspeter Kraft. Degree bounds for separating invariants. arXiv preprint
arXiv:1001.5216, 2010.
[LBB+ 17]
Eitan Levin, Tamir Bendory, Nicolas Boumal, Joe Kileel, and Amit Singer. 3D ab initio
modeling in cryo-EM by autocorrelation analysis. arXiv preprint arXiv:1710.08076, 2017.
[LeC73]
L. LeCam. Convergence of estimates under dimensionality restrictions. Ann. Statist., 1:38–53,
1973.
[LNS99]
O. Lepski, A. Nemirovski, and V. Spokoiny. On estimation of the Lr norm of a regression
function. Probab. Theory Related Fields, 113(2):221–253, 1999.
[LS16]
Roy R. Lederman and Amit Singer. A representation theory perspective on simultaneous
alignment and classification. arXiv preprint arXiv:1607.03464, 2016.
[LS17]
Roy R Lederman and Amit Singer. Continuously heterogeneous hyper-objects in cryo-EM and
3-D movies of many temporal dimensions. arXiv preprint arXiv:1704.02899, 2017.
35
[MSS16]
Tengyu Ma, Jonathan Shi, and David Steurer. Polynomial-time tensor decompositions with
sum-of-squares. In Foundations of Computer Science (FOCS), 2016 IEEE 57th Annual Symposium on, pages 438–446. IEEE, 2016.
[Nog16]
Eva Nogales. The development of cryo-EM into a mainstream structural biology technique.
Nature methods, 13(1):24–27, 2016.
[NY83]
A. S. Nemirovsky and D. B. and Yudin. Problem complexity and method efficiency in optimization. A Wiley-Interscience Publication. John Wiley & Sons, Inc., New York, 1983. Translated
from the Russian and with a preface by E. R. Dawson, Wiley-Interscience Series in Discrete
Mathematics.
[Osg07]
Brad Osgood.
Chapter 8:
n-dimensional Fourier Transform.
Lecture Notes for EE 261:
The Fourier Transform and its Applications.
https://see.stanford.edu/materials/lsoftaee261/book-fall-07.pdf, 2007.
[PWB+ 17]
Amelia Perry, Jonathan Weed, Afonso Bandeira, Philippe Rigollet, and Amit Singer. The
sample complexity of multi-reference alignment. arXiv preprint arXiv:1707.00943, 2017.
[PWBM16a] Amelia Perry, Alexander S Wein, Afonso S. Bandeira, and Ankur Moitra. Message-passing algorithms for synchronization problems over compact groups. arXiv preprint arXiv:1610.04583,
2016.
[PWBM16b] Amelia Perry, Alexander S. Wein, Afonso S. Bandeira, and Ankur Moitra. Optimality and
sub-optimality of PCA for spiked random matrices and synchronization. arXiv:1609.05573,
2016.
[PZAF05]
R. G. Pita, M. R. Zurera, P. J. Amores, and F. L. Ferreras. Using multilayer perceptrons to
align high range resolution radar signals. In Artificial Neural Networks: Formal Models and
Their Applications - ICANN 2005, pages 911–916. Springer Berlin Heidelberg, 2005.
[Ros57]
Morris E Rose. Elementary theory of angular momentum. Physics Today, 10:30, 1957.
[Sad89]
B. M. Sadler. Shift and rotation invariant object reconstruction using the bispectrum. In
Workshop on Higher-Order Spectral Analysis, pages 106–111, Jun 1989.
[Sal79]
Eugene Salamin. Application of quaternions to computation with rotations. Technical report,
Working Paper, 1979.
[Sch03]
Alexander Schrijver. Combinatorial optimization: polyhedra and efficiency. Springer Science
& Business Media, 2003.
[Sch12]
S. H. W. Scheres. RELION: implementation of a bayesian approach to cryo-EM structure
determination. J. Struct. Biol., 180(3):519–530, 2012.
[SG92]
Brian M Sadler and Georgios B Giannakis. Shift-and rotation-invariant object reconstruction
using the bispectrum. JOSA A, 9(1):57–69, 1992.
[Sha94]
Igor R. Shafarevich. Basic algebraic geometry. Springer, 1994.
[Sig16]
Fred J. Sigworth. Principles of cryo-EM single-particle image processing. Microscopy, 65(1):57–
67, 2016.
[Sin11]
Amit Singer. Angular synchronization by eigenvectors and semidefinite programming. Applied
and computational harmonic analysis, 30(1):20–36, 2011.
36
[SS11]
Amit Singer and Yoel Shkolnisky. Three-dimensional structure determination from common
lines in cryo-EM by eigenvectors and semidefinite programming. SIAM Journal on Imaging
Sciences, 4(2):543–572, 2011.
[Stu08]
Bernd Sturmfels. Algorithms in invariant theory. Springer Science & Business Media, 2008.
[TS12]
D. L. Theobald and P. A. Steindel. Optimal simultaneous superpositioning of multiple structures with missing data. Bioinformatics, 28(15):1972–1979, 2012.
[Tsy09]
Alexandre B. Tsybakov. Introduction to nonparametric estimation. Springer Series in Statistics.
Springer, New York, 2009. Revised and extended from the 2004 French original, Translated
by Vladimir Zaiats.
[vdV98]
A. W. van der Vaart. Asymptotic statistics, volume 3 of Cambridge Series in Statistical and
Probabilistic Mathematics. Cambridge University Press, Cambridge, 1998.
[VG86]
BK Vainshtein and AB Goncharov. Determination of the spatial orientation of arbitrarily
arranged identical particles of unknown structure from their projections. In Soviet Physics
Doklady, volume 31, page 278, 1986.
[VH87]
Marin Van Heel. Angular reconstitution: a posteriori assignment of projection directions for
3D reconstruction. Ultramicroscopy, 21(2):111–123, 1987.
[Vve01]
Dimitri
Vvedensky.
Chapter
8:
Irreducible
Representations
of
SO(2)
and
SO(3).
Group
theory
course
[lecture
notes].
http://www.cmth.ph.ic.ac.uk/people/d.vvedensky/groups/Chapter8.pdf, 2001.
[ZvdHGG03] J. P. Zwart, R. van der Heiden, S. Gelsema, and F. Groen. Fast translation invariant classification of HRR range profiles in a zero phase representation. Radar, Sonar and Navigation,
IEE Proceedings, 150(6):411–418, 2003.
A
A.1
Spherical harmonics and SO(3) invariants
Spherical harmonics
We follow the conventions of [BFB97]. Parametrize the unit sphere by angular spherical coordinates (θ, φ)
with θ ∈ [0, π] and φ ∈ [0, 2π). (Here θ = 0 is the north pole and θ = π is the south pole.) For integers ℓ ≥ 0
and −ℓ ≤ m ≤ ℓ, define the complex spherical harmonic
Yℓm (θ, φ) = (−1)m Nℓm Pℓm (cos θ)eimφ
with normalization factor
Nℓm =
s
(2ℓ + 1)(ℓ − m)!
4π(ℓ + m)!
where Pℓm (x) are the associated Legendre polynomials
Pℓm (x) =
1
2ℓ ℓ!
(1 − x2 )m/2
dℓ+m 2
(x − 1)ℓ .
dxℓ+m
In the S 2 registration problem we are interested in representing a real-valued function on the sphere, in
which case we use an expansion (with real coefficients) in terms of the real spherical harmonics:
(−1)m
√
m
m > 0,
√2 (Yℓm (θ, φ) + Yℓm (θ, φ)) = 2Nℓm Pℓ (cos θ) cos(mφ)
Yℓ0 (θ, φ) = Nℓ0 Pℓ0 (cos θ)
m = 0,
Sℓm (θ, φ) =
√
m
|m|
(−1)
√ (Yℓ|m| (θ, φ) − Yℓ|m| (θ, φ)) =
2Nℓ|m| Pℓ (cos θ) sin(|m|φ) m < 0.
i 2
37
Here Yℓm is the complex conjugate of Yℓm , which satisfies the identity
Yℓm (θ, φ) = (−1)m Yℓ(−m) (θ, φ).
(11)
−m
m
= (−1)m Nℓm Pℓm .
Above we have also used the identity Pℓ−m = (−1)m (ℓ−m)!
(ℓ+m)! Pℓ , which implies Nℓ(−m) Pℓ
In the cryo-EM problem we are instead interested in representing the Fourier transform of a real-valued
function. Such a function f has the property that if ~r and −~r are antipodal points on the sphere, f (−~r) =
f (~r). For this type of function we use an expansion (with real coefficients) in terms of a new basis of spherical
harmonics:
1
ℓ+m
Yℓ(−m) (θ, φ))
m > 0,
√2 (Yℓm (θ, φ) + (−1)
ℓ
i Yℓ0 (θ, φ)
m = 0,
Hℓm (θ, φ) =
√i (Yℓ|m| (θ, φ) − (−1)ℓ+m Yℓ(−|m|) (θ, φ)) m < 0.
2
One can check that Hℓm (−~r) = Hℓm (~r) using (11) along with the fact Yℓm (−~r) = (−1)ℓ Yℓm (~r) which comes
from Pℓm (−x) = (−1)ℓ+m Pℓm (x).
A.2
Wigner D-matrices
We will mostly work in the basis of complex spherical harmonics Yℓm since the formulas are simpler. The
analogous results for the other bases can be worked out by applying the appropriate change of basis.
Let Vℓ ≃ C2ℓ+1 be the vector space consisting of degree-ℓ complex spherical
harmonics represented
P
in the basis {Yℓm }−ℓ≤m≤ℓ , i.e. v ∈ C2ℓ+1 encodes the spherical harmonic ℓm=−ℓ vm Yℓm . These Vℓ (for
ℓ = 0, 1, 2, . . .) are the irreducible representations of SO(3). Each can also be defined over the real numbers
by changing basis to the real spherical harmonics Sℓm .
A group element g ∈ SO(3) acts on a (spherical harmonic) function f : S 2 → R via (g · f )(x) = f (g −1 x).
The action of g on Vℓ is given by the Wigner D-matrix Dℓ (g) ∈ C(2ℓ+1)×(2ℓ+1) defined as in [BFB97].
We will need the following orthogonality properties of the Wigner D-matrices. First, the standard Schur
orthogonality relations from representation theory yield
′
ℓ (g)D ℓ
Dmk
m′ k′ (g) =
E
g∼Haar(SO(3))
1
1ℓ=ℓ′ 1m=m′ 1k=k′ .
2ℓ + 1
We also have [Ros57]
ℓ
ℓ′
Dmk
(g)Dm
′ k′ (g)
=
′
ℓ+ℓ
X
L
hℓ m ℓ′ m′ |L (m + m′ )ihℓ k ℓ′ k ′ |L (k + k ′ )iD(m+m
′ )(k+k′ ) (g)
L=|ℓ−ℓ′ |
where hℓ1 m1 ℓ2 m2 |ℓ mi is a Clebsch-Gordan coefficient. There is a closed-form expression for these coefficients [Böh13]:
s
(2ℓ + 1)(ℓ + ℓ1 − ℓ2 )!(ℓ − ℓ1 + ℓ2 )!(ℓ1 + ℓ2 − ℓ)!
hℓ1 m1 ℓ2 m2 |ℓ mi =1m=m1 +m2
×
(ℓ1 + ℓ2 + ℓ + 1)!
p
(ℓ + m)!(ℓ − m)!(ℓ1 − m1 )!(ℓ1 + m1 )!(ℓ2 − m2 )!(ℓ2 + m2 )! ×
X
(−1)k
k
k!(ℓ1 + ℓ2 − ℓ − k)!(ℓ1 − m1 − k)!(ℓ2 + m2 − k)!(ℓ − ℓ2 + m1 + k)!(ℓ − ℓ1 − m2 + k)!
where the sum is over all k for which the argument of every factorial is nonnegative.
38
A.3
Moment tensor
Let F be a multi-set of frequencies from {1, 2, . . .} and consider the action of G = SO(3) on V = ⊕ℓ∈F Vℓ .
Recall that we want an explicit formula for Td (x) = Eg [(Π(g · x))⊗d ] with g ∼ Haar(G) (where Π can be the
identity in the case of no projection). We have
Eg [(Π(g · x))⊗d ] = Π⊗d Eg [ρ(g)⊗d ]x⊗d
(where x⊗d is a column vector of length dim(V )d ) and so we need an explicit formula for the matrix
Eg [ρ(g)⊗d ]. Here ρ(g) is block diagonal with blocks Dℓ (g) for ℓ ∈ F . There are no degree-1 invariants
since we have excluded the trivial representation ℓ = 0. For the degree-2 invariants Eg [ρ(g)⊗2 ], consider a
particular block Eg [Dℓ1 (g) ⊗ Dℓ2 (g)] for some pair (ℓ1 , ℓ2 ). The entries in this block can be computed using
0
the above orthogonality relations (and using D00
(g) = 1):
Eg [(Dℓ1 (g))m1 k1 (Dℓ2 (g))m2 k2 ] = 1ℓ1 =ℓ2 1m1 =−m2 1k1 =−k2 hℓ1 m1 ℓ2 m2 |0 0ihℓ1 k1 ℓ2 k2 |0 0i
= 1ℓ1 =ℓ2 1m1 =−m2 1k1 =−k2
(−1)m1 +k1
2ℓ1 + 1
ℓ1 +m1
√
using the special case hℓ1 m1 ℓ2 m2 |0 0i = 1ℓ1 =ℓ2 1m1 =−m2 (−1)
.
2ℓ1 +1
Similarly, for degree 3 we have
Eg [(Dℓ1 (g))m1 k1 (Dℓ2 (g))m2 k2 (Dℓ3 (g))m3 k3 ] =
1|ℓ2 −ℓ3 |≤ℓ1 ≤ℓ2 +ℓ3 1m1 +m2 +m3 =0 1k1 +k2 +k3 =0
A.4
(−1)m1 +k1
hℓ2 m2 ℓ3 m3 |ℓ1 (m2 + m3 )ihℓ2 k2 ℓ3 k3 |ℓ1 (k2 + k3 )i.
2ℓ1 + 1
Projection
Let V = ⊕ℓ∈F Vℓ with F a subset of {1, 2, . . .}. Let Π : V → W be the projection that takes a complex
spherical harmonic function and reveals only its values on the equator θ = π/2. In cryo-EM this projection
is applied separately to each shell (see Section 5.5). Letting L = maxℓ∈F ℓ, the functions b−L , b−L+1 , . . . , bL
(from the circle S 1 to R) form a basis for W , where bm (φ) = eimφ . The projection Π takes the form
Π(Yℓm ) = (−1)m Nℓm Pℓm (0)bm
extended by linearity. By taking a binomial expansion of (x2 − 1)ℓ it can be shown that
(
0
(ℓ + m) odd,
m
Pℓ (0) =
(−1)(ℓ−m)/2
ℓ
(ℓ+m)/2 (ℓ + m)! (ℓ + m) even.
2ℓ ℓ!
(12)
For cryo-EM, if we use the basis Hℓm so that the expansion coefficients are real, the output of the
projection can be expressed (with real coefficients) in the basis
1
imφ
+ (−1)m e−imφ )
m > 0,
√2 (e
1
m = 0,
hm (φ) =
√i (ei|m|φ − (−1)m e−i|m|φ ) m < 0,
2
where the projection Π takes the form
|m|
Π(Hℓm ) = (−1)m Nℓ|m| Pℓ
extended by linearity.
39
(0)hm
A.5
Explicit construction of invariants
Consider the cryo-EM setup (see Section 5.5) with S shells and F frequencies. We will cover S 2 registration as
the special case S = 1 (without projection). Use the basis of complex spherical harmonics, with corresponding
variables xsℓm with 1 ≤ s ≤ S, 1 ≤ ℓ ≤ F , and −ℓ ≤ m ≤ ℓ. One can change variables to Sℓm or Hℓm but
for our purposes of testing the rank of the Jacobian it is sufficient to just work with Yℓm (since the change
of variables has no effect on the rank of the Jacobian).
Recall that in Section A.3 we computed expressions for the matrices Eg [Dℓ1 (g)⊗ Dℓ2 (g)] and Eg [Dℓ1 (g)⊗
ℓ2
D (g) ⊗ Dℓ3 (g)], and in particular they are rank-1. Using this we can explicitly compute the entries of Td (x)
and thus extract a basis for U2T and U3T . We present the results below.
A.5.1
Degree-2 invariants
Without projection, the degree-2 invariants are
I2 (s1 , s2 , ℓ) =
X
1
(−1)k xs1 ℓk xs2 ℓ(−k)
2ℓ + 1
|k|≤ℓ
for s1 , s2 ∈ {1, . . . , S} and ℓ ∈ {1, . . . , F }. Swapping s1 with s2 results in the same invariant, so take s1 ≤ s2
to remove redundancies.
With projection, the degree-2 invariants are
X
Nℓm Nℓ(−m) Pℓm (0)Pℓ−m (0)I2 (s1 , s2 , ℓ)
P2 (s1 , s2 , m) = (−1)m
ℓ≥|m|
with s1 , s2 ∈ {1, . . . , S} and m ∈ {−F, . . . , F }. Negating m or swapping s1 with s2 results in the same
invariant (up to sign) so take s1 ≤ s2 and m ≥ 0 to remove redundancies. Recall the expression (12) for
Pℓm (0).
A.5.2
Degree-3 invariants
Let ∆(ℓ1 , ℓ2 , ℓ3 ) denote the predicate |ℓ2 − ℓ3 | ≤ ℓ1 ≤ ℓ2 + ℓ3 (which captures whether ℓ1 , ℓ2 , ℓ3 can be the
side-lengths of a triangle). Without projection, the degree-3 invariants are
I3 (s1 , ℓ1 , s2 , ℓ2 , s3 , ℓ3 ) =
1
2ℓ1 + 1
X
(−1)k1 hℓ2 k2 ℓ3 k3 |ℓ1 (−k1 )ixs1 ℓ1 k1 xs2 ℓ2 k2 xs3 ℓ3 k3
k1 +k2 +k3 =0
|ki |≤ℓi
for si ∈ {1, . . . , S} and ℓi ∈ {1, . . . , F } satisfying ∆(ℓ1 , ℓ2 , ℓ3 ). There are some redundancies here. First,
permuting the three (si , ℓi ) pairs (while keeping each pair in tact) results in the same invariant (up to scalar
multiple). Also, some of the above invariants are actually zero; specifically, this occurs when (s1 , ℓ1 ) =
(s2 , ℓ2 ) = (s3 , ℓ3 ) with ℓ1 odd, or when (s1 , ℓ1 ) = (s2 , ℓ2 ) 6= (s3 , ℓ3 ) with ℓ3 odd (or some permutation of this
case).
With projection, the degree-3 invariants are
P3 (s1 , m1 , s2 , m2 , s3 , m3 ) =
X
1
2
3
(0)Pℓm
(0)Pℓm
(0)hℓ2 m2 ℓ3 m3 |ℓ1 (−m1 )iI3 (s1 , ℓ1 , s2 , ℓ2 , s3 , ℓ3 )
Nℓ1 m1 Nℓ2 m2 Nℓ3 m3 Pℓm
(−1)m1
1
2
3
ℓ1 ,ℓ2 ,ℓ3 : ∆(ℓ1 ,ℓ2 ,ℓ3 )
for si ∈ {1, . . . , S} and mi ∈ {−F, . . . , F } such that m1 + m2 + m3 = 0. There are again redundancies under
permutation: permuting the three (si , mi ) pairs results in the same invariant. Negating all three m’s also
results in the same invariant. There are additional non-trivial linear relations (see Section A.6 below).
40
A.6
A.6.1
Counting the number of invariants
S 2 registration
For the case of S 2 registration (S = 1) the above degree-2 and degree-3 invariants without projection (with
G
redundancies removed as discussed above) form a basis for R[x]G
2 ⊕ R[x]3 (although we have not made this
rigorous). Thus, counting these invariants gives a combinatorial analogue of Proposition 5.7.
A.6.2
Cryo-EM
T
In this section we give a formula for trdeg(U≤3
) for (heterogeneous) cryo-EM (with projection), valid for all
K ≥ 1, S ≥ 1 and F ≥ 2. The formula is conjectural but has been tested (via the Jacobian criterion) for
various small values of K, S, F .
The number of algebraically independent degree-2 invariants turns out to be the number of distinct I2
invariants (i.e. without projection), since the projected invariants P2 are linear combinations of these. The
number of such invariants is 21 S(S + 1)F .
For degree 3, things are more complicated because the projected invariants P3 have smaller dimension
than the I3 . We start by counting the number of distinct (up to scalar multiple) P3 invariants. To this
end, let X (S, F ) be the set of equivalence classes of tuples (s1 , m1 , s2 , m2 , s3 , m3 ) with si ∈ {1, . . . , S} and
mi ∈ {−F, . . . , F }, modulo the relations
(s1 , m1 , s2 , m2 , s3 , m3 ) ∼ (s2 , m2 , s1 , m1 , s3 , m3 ) ∼ (s1 , m1 , s3 , m3 , s2 , m2 )
(s1 , m1 , s2 , m2 , s3 , m3 ) ∼ (s1 , −m1 , s2 , −m2 , s3 , −m3 )
(permutation)
(negation).
There are some non-trivial linear relations among the distinct P3 invariants, which we must now account
for. The number of such relations is
E(S) := 2S + 4S(S − 1) + S(S − 1)(S − 2).
This can be broken down as follows. For each k ∈ {1, 2, 3} there are 2k relations for each size-3 multisubset {s1 , s2 , s3 } of {1, . . . , S} with exactly k distinct elements. (We do not currently have a thorough
understanding of what exactly the linear relations are, but we have observed that the above pattern holds.)
We can now put it all together and state our conjecture. We will also use the formula (3) for trdeg(R[x]G ),
extended to the heterogeneous case via Proposition 4.15.
Conjecture A.1. Consider cryo-EM with F ≥ 2 frequencies.
• trdeg(R[x]G ) = K[S(F 2 + 2F ) − 3] + K − 1,
• dim(U2T ) = 12 S(S + 1)F ,
• dim(U3T ) = |X (S, F )| − E(S),
• generic list recovery is possible at degree 3 if and only if dim(U2T ) + dim(U3T ) ≥ trdeg(R[x]G ).
When S and F are large, the dominant term in dim(U2T ) + dim(U3T ) is |X (S, F )| ≈ S 3 F 2 /4 and so generic
list recovery is possible when (roughly) K ≤ S 2 /4.
B
Unique recovery for the regular representation
Let G be a finite abelian group. Let V be the regular representation of G over R, i.e. V = R|G| with
basis indexed by the elements of G, and the action of G permutes the basis elements vg according to group
multiplication: h · vg = vhg . Note that for the cyclic group G = Z/p, this is precisely the MRA problem. We
will show that with this setup, generic unique recovery is possible at degree 3:
41
Theorem B.1. Let G be a finite abelian group and let V be the regular representation of G over R. Then
T
R(U≤3
) is equal to the field of fractions of R[x]G .
Recall that the equality of the two fields above implies generic unique recovery at degree 3 by Corollary 4.25.
Generic unique recovery at degree 3 is actually true in the more general setting where V is the regular
representation over R of any finite group [Kak09].
T
Proof. It is sufficient to show C(U≤3
) = C(R[x]G ). Let p = |G| = dim(V ). The polynomial algebra on V
gets an action of G in the usual way and the degree-1 component is isomorphic to the regular representation.
Over C, the regular representation decomposes as a direct sum of all the characters χ(1) , . . . , χ(p) of G
(each of which is a group homomorphism G → C× = C r {0}). (Here we have used the fact that G is finite
and abelian, and so its irreducible representations are 1-dimensional.)
b = {χ(1) , . . . , χ(p) } be the set of characters. For each χ ∈ G
b let yχ ∈ C[V ] be the associated
Let G
eigenvector (in the degree-1 component of the polynomial algebra) so that g · yχ = χ(g)yχ for all g ∈ G.
b forms an abelian group (the character group or Pontryagin dual of G) under pointwise multiplication:
G
(χ1 χ2 )(g) = χ1 (g)χ2 (g).
b yχ yχ−1 is a degree-2 invariant, and for any χ1 , χ2 ∈ G,
b yχ1 yχ2 y(χ χ )−1 is a
Observe that for any χ ∈ G,
1 2
b we have
degree-3 invariant. For each χ ∈ G
Y
Y
yχ′ yχ′−1 =
yχp
yχ yχ′ y(χχ′ )−1
b
χ′ ∈G
b
χ′ ∈G
and so yχp lies in the field generated by the invariants of degree ≤ 3.
The field extension C(yχ(1) , . . . , yχ(p) )/C(yχp (1) , . . . , yχp (p) ) is Galois with Galois group H = (Z/p)p ; the
generator of the ith copy of Z/p acts by multiplying yχ(i) by a fixed primitive pth root of unity. (Recall that
the Galois group is the automorphisms of the larger field that fix the smaller field pointwise.)
By the fundamental theorem of Galois theory, intermediate extensions of the above Galois extension are
in bijection with subgroups of H. The correspondence maps a field to the group that fixes it (pointwise) and
maps a group to the field that it fixes. The field C(R[x]G ) is an intermediate extension with corresponding
T
group G. The field C(U≤3
) is also an intermediate extension, and we will show that its corresponding group
T
is also G, thus proving C(U≤3
) = C(R[x]G ) as desired.
T
T
Clearly G fixes C(U≤3 ) (since U≤3
are invariants), so it remains to show that there are no other automorT
phisms of C(yχ(1) , . . . , yχ(p) ) that fix U≤3
. Let φ ∈ H. As an element of (Z/p)p , we can write φ = (φ1 , . . . , φp ).
If χ = χ(i) we will also write φχ for φi . If φ fixes the degree-2 invariant yχ yχ−1 , we must have φχ−1 = φ−1
χ . If
.
In
particular,
=
φ
φ also fixes the degree-3 invariant yχ1 yχ2 y(χ1 χ2 )−1 , we must have φχ1 φχ2 = φ−1
χ
χ
−1
1 2
(χ1 χ2 )
b → C× given by χ 7→ φχ is a group homomorphism. Thus, any φ fixing U T can be identified
the map G
≤3
b
b , which is isomorphic to G; in particular there are only p
with an element of the Pontryagin double dual G
such elements φ, which completes the proof.
42
| 10math.ST
|
Joint Uplink-Downlink Cell Associations for
Interference Networks with Local Connectivity
Manik Singhal and Aly El Gamal
arXiv:1701.07522v3 [cs.IT] 22 Feb 2018
ECE Department, Purdue University
Email: {msingha,elgamala}@purdue.edu
Abstract—We study information theoretic models of interference networks that consist of K Base Station (BS) Mobile Terminal (MT) pairs. Each BS is connected to the MT
carrying the same index as well as L following MTs, where the
connectivity parameter L ≥ 1. We fix the value of L and study
large networks as K goes to infinity. We assume that each
MT can be associated with Nc BSs, and these associations are
determined by a cloud-based controller that has a global view
of the network. An MT has to be associated with a BS, in
order for the BS to transmit its message in the downlink, or
decode its message in the uplink. In previous work, the cell
associations that maximize the average uplink-downlink per
user degrees of freedom (puDoF) were identified for the case
when L = 1. Further, when only the downlink is considered, the
problem was settled for all values of L when we are restricted to
use only zero-forcing interference cancellation schemes. In this
work, we first propose puDoF inner bounds for arbitrary values
of L when only the uplink is considered, and characterize
the uplink puDoF value when only zero-forcing schemes are
allowed. We then introduce new achievable average uplinkdownlink puDoF values. We show that the new scheme is
optimal for the range when Nc ≤ L2 when we restrict our
attention to zero forcing schemes. Additionally we conjecture
that the having unity puDoF during uplink is optimal when
Nc ≥ L.
I. I NTRODUCTION
The fifth generation of cellular networks is expected
to bring new paradigms to wireless communications, that
exploit recent technological advancements like cloud computing and cooperative communication (also known as Coordinated Multi-Point or CoMP). In particular, the rising
interest in Cloud Radio Access Networks (C-RAN) (see
e.g., [1]-[6]) holds a promise for such new paradigms. These
paradigms require new information theoretic frameworks to
identify fundamental limits and suggest insights that are
backed by rigorous analysis. The focus of this work is to
identify associations between cell edge mobile terminals
and base stations, that maximize the average rate across
both uplink and downlink sessions, while allowing for
associating one mobile terminal with more than one base
station and using cooperative transmission and reception
schemes between base stations in the downlink and uplink
sessions, respectively. With a cloud-based controller, optimal
decisions for these associations can take into account the
whole network topology, with the goal of maximizing a sum
rate function.
Cloud-based CoMP communication is a promising new
technology that could significantly enhance the rates of cell
edge users (see [7] for an overview of CoMP). In [8], an
information theoretic model was studied where cooperation
was allowed between transmitters, as well as between receivers (CoMP transmission and reception). CoMP transmission and reception in cellular networks are applicable in the
downlink and uplink, respectively. The model in [8] assumed
that each message can be available at Mt transmitters and
can be decoded through Mr received signals. It was shown
that full Degrees of Freedom (DoF) can be achieved if
Mt + Mr ≥ K + 1, where K is the number of transmitterreceiver paris (users) in the network.
Recently in [9], alternative frameworks for cooperation
in both downlink and uplink were introduced. The new
frameworks are based on the concept of message passing
between base stations. In the downlink, quantized versions
of the analog transmit signals are being shared between
base station transmitters. The supporting key idea is that
information about multiple messages can be shared from
one transmitter to another with the cost of sharing only
one whole message (of the order of log P , where P is
the transmit power), if we only share information needed
to cancel the interference caused by the messages at unintended receivers, through dirty paper coding (see [10]).
In the uplink, decoded messages are shared from one base
station receiver to another, where they are used to cancel
interference. It was shown in [9] that there is a duality
in this framework between schemes that are used in the
downlink and those that are used for the uplink, with the
clear advantage that the same backhaul infrastructure can
be used to support both scenarios.
In this work, we first characterize the puDoF of message passing decoding in the uplink of locally connected
interference networks when Nc < L2 . We then consider the
problem of jointly optimizing the assignment of messages
over the backhaul to maximize the average puDoF across
both downlink and uplink sessions. We assume that each
base station can be associated with Nc mobile terminals, and
that an association is needed whenever a mobile terminal’s
message is used by a base station in either the downlink
or the uplink. This usage of a message could be either for
delivering the message in downlink, decoding the message
in uplink, or for interference cancellation. This problem
was first considered in [13], where the average puDoF was
characterized for the case when L = 1. Here, we consider
general values of L, and first show how our new result
for the uplink settles the average puDoF problem when
Nc ≤ L2 . We then tackle this problem when Nc > L,
by fixing the uplink scheme to the optimal uplink-only
scheme, that associates each mobile terminal with the L + 1
base stations connected to it, and characterize the optimal
downlink scheme under this constraint. The intuition behind
this step is that full DoF is achieved in the uplink when
Nc > L through associating each mobile terminal with all
L + 1 base stations connected to it: any change in that cell
association is expected to decrease the uplink puDoF with
a factor greater than the gain achieved for the downlink
puDoF.
When considering this work, it is important to note that
the assumptions in a theoretical framework need not reflect
directly a practical setting, but are rather used to define a
tractable problem whose solution can lead to constructive
insights. For example, it was shown in [11] that imposing
a downlink backhaul constraint where each message can be
available at a specified maximum number of transmitters
(maximum transmit set size constraint), can lead to solutions
that are also useful to solve the more difficult and more
relevant to practice problem, where an average transmit
set size constraint is used instead of the maximum. Also,
in [12], it was shown that solutions obtained for the locally
connected network models, that are considered in this work,
can be used to obtain solutions for the more practical cellular
network models, by viewing the cellular network as a set
of interfering locally connected subnetworks and designing
a fractional reuse scheme that avoids interference across
subnetworks.
A. Prior Work
In [13], the considered problem was studied for Wyner’s
linear interference networks (channel model was introduced
in [14]). The optimal message assignment and puDoF value
were characterized. Linear networks form the special case
of our problem when L = 1. Here, all our results are
for general values of the connectivity parameter L. Also,
in [11], the downlink part of our problem was considered,
and the optimal message assignment (cell association) and
puDoF value were characterized for general values of the
connectivity parameter L, when we restrict our attention to
zero-forcing (or interference avoidance) scheme.
B. Document Organization
In Section II, we present the problem setup. In Section III,
we discuss previous work on zero-forcing CoMP transmission schemes for the downlink. We then present bounds
for the puDoF of the uplink in Section IV, and prove the
converse in Sections V and VI. In Section VII, we present
new achievable puDoF values when the average of the uplink
and downlink is considred. We finally present concluding
remarks in Section IX.
II. S YSTEM M ODEL AND N OTATION
For each of the downlink and uplink sessions, we use the
standard model for the K−user interference channel with
single-antenna transmitters and receivers,
Yi (t) =
K
X
Hi,j (t)Xj (t) + Zi (t),
(1)
j=1
where t is the time index, Xj (t) is the transmitted signal of
transmitter j, Yi (t) is the received signal at receiver i, Zi (t)
is the zero mean unit variance Gaussian noise at receiver i,
and Hi,j (t) is the channel coefficient from transmitter j to
receiver i over time slot t. We remove the time index in the
rest of the paper for brevity unless it is needed. The signals
Yi and Xi correspond to the receive and transmit signals
at the ith base station and mobile terminal in the uplink,
respectively, and the ith mobile terminal and base station in
the downlink, respectively. For consistency of notation, we
will always refer to Hi,j as the channel coefficient between
mobile terminal i and base station j.
A. Channel Model
We consider the following locally connected interference
network. The mobile terminal with index i is connected to
base stations {i, i − 1, · · · , i − L}, except the first L mobile
terminals, which are connected only to all the base stations
with a similar or lower index. More precisely,
Hi,j = 0 iff i ∈
/ {j, j + 1, · · · , j + L}, ∀i, j ∈ [K],
(2)
and all non-zero channel coefficients are drawn from a
continuous joint distribution. Finally, we assume that global
channel state information is available at all mobile terminals
and base stations.
B. Cell Association
For each i ∈ [K], let Ci ⊆ [K] be the set of base
stations, with which mobile terminal i is associated, i.e.,
those base stations that carry the terminal’s message in the
downlink and will have its decoded message for the uplink.
The transmitters in Ci cooperatively transmit the message
(word) Wi to mobile terminal i in the downlink. In the
uplink, one of the base station receivers in Ci will decode Wi
and pass it to the remaining receivers in the set. We consider
a cell association constraint that bounds the cardinality of
the set Ci by a number Nc ; this constraint is one way to
capture a limited backhaul capacity constraint where not all
messages can be exchanged over the backhaul.
|Ci | ≤ Nc , ∀i ∈ [K].
(3)
We would like to stress on the fact that we only allow full
messages to be shared over the backhaul. More specifically,
splitting messages into parts and sharing them as in [15], or
sharing of quantized signals as in [9] is not allowed.
C. Degrees of Freedom
Let P be the average transmit power constraint at each
transmitter, and let Wi denote the alphabet for message
Wi . Then the rates Ri (P ) = log n|Wi | are achievable if
the decoding error probabilities of all messages can be
simultaneously made arbitrarily small for a large enough
coding block length n, and this holds for almost all channel
realizations. The degrees of freedom di , i ∈ [K], are defined
i (P )
as di = limP →∞ Rlog
P . The DoF region D is the closure
of the set of all achievable DoF tuples. The total number of
degrees of freedom (η) is the maximum value ofPthe sum of
the achievable degrees of freedom, η = maxD i∈[K] di .
For a K-user locally connected with connectivity parameter L, we define η(K, L, Nc ) as the best achievable η on
average taken over both downlink and uplink sessions over
all choices of transmit sets satisfying the backhaul load
constraint in (3). In order to simplify our analysis, we define
the asymptotic per user DoF (puDoF) τ (L, Nc ) to measure
how η(K, L, Nc ) scales with K while all other parameters
are fixed,
η(K, L, Nc )
.
(4)
K→∞
K
We further define τD (L, Nc ) and τU (L, Nc ) as the puDoF
when we optimize only for the downlink and uplink session,
respectively.
τ (L, Nc ) = lim
IV. U PLINK -O NLY S CHEME
D. Interference Avoidance Schemes
We consider in this work the class of interference avoidance schemes, where every receiver is either active or
inactive. An active receiver can observe its desired signal
with no interference. In the downlink, we are considering
cooperative zero-forcing where a message’s interference is
cancelled over the air through cooperating transmitters. In
the uplink, we are considering message passing decoding
where a decoded message is passed through a cooperating
receiver to other receivers wishing to remove the message’s
interference.
We add the superscript zf to the puDoF symbol when
we impose the constraint that the coding scheme that can
be used has to be a zero-forcing scheme. For example,
τUzf (L, Nc ) denotes the puDoF value when considering
only the uplink and impose the restriction to zero-forcing
schemes.
III. P RIOR W ORK : D OWNLINK -O NLY S CHEME
In [11], the considered setting was studied for only downlink transmission. When restricting our choice of coding
scheme to zero-forcing schemes, the puDoF value was
characterized as,
zf
τD
(L, Nc ) =
2Nc
,
2Nc + L
transmitters in each subnetwork are inactive to avoid intersubnetwork interference. The zero-forcing scheme aims to
deliver 2Nc messages free of interference in each subnetwork, so that the acheived puDoF value is as in (5). In order
to do that with a cooperation constraint that limits each message to be available at Nc transmitters, we create two Multiple Input Single Output (MISO) Broadcast Channels (BC)
within each subnetwork; each with Nc transmitter-receiver
pairs, and ensure that interference across these channels is
eliminated. We now discuss the cell association in the first
subnetwork, noting that the remaining subnetworks follow
an analogous pattern. The first MISO BC consists of the first
Nc transmitter-receiver pairs. For each i ∈ {1, 2, · · · , Nc },
message Wi is associated with base stations with indices in
the following set, Ci = {i, i+1, · · · , Nc }. The second MISO
BC consists of the Nc transmitters with indices in the set
{Nc +1, Nc +2, · · · , 2Nc } and the Nc receivers with indices
in the set {Nc + L + 1, Nc + L + 2, · · · , 2Nc + L}. Note that
the middle L receivers in each subnetwork are deactivated
to eliminate interference between the two MISO BCs. For
each i ∈ {Nc + L + 1, Nc + L + 2, · · · , 2Nc + L}, message
Wi is associated with transmitters that have indices in the
set Ci = {i−L, i−L−1, · · · , Nc +1}. It was shown in [11]
that the puDoF value of (5) achieved by this scheme is that
best achievable value in the downlink using the imposed
cooperation constraint and zero-forcing schemes.
(5)
and the achieving cell association was found to be the
following. The network is split into subnetworks; each with
consecutive 2Nc + L transmitter-receiver pairs. The last L
We discuss in this section backhaul designs that optimize
only the uplink rate, and consider only zero-forcing coding schemes. More precisely, we show that the following
theorem holds.
Theorem 1: The asymptotic puDoF for the uplink when
considering message passing schemes is characterised by the
following equation:
L + 1 ≤ Nc ,
1
zf
Nc +1
L
(6)
τU (L, Nc ) =
L+2
2 ≤ Nc ≤ L,
2Nc
L
1 ≤ Nc ≤ 2 − 1.
2Nc +L
The cell association that is used to achieve the above
is as follows. When Nc ≥ L + 1, each mobile terminal
is associated with the L + 1 base stations connected to
it. The last base station, with index K, in the network
decodes the last message and then passes it on to the L
other base stations connected to the K th mobile terminal,
eliminating all interference caused by that mobile terminal.
Each preceding base station then decodes its message and
passes it on to the other base stations, eliminating the
interference caused by the message. Thus, one degree of
freedom is achieved for each user.
In the second range L2 ≤ Nc ≤ L, the cell association
c +1
that is used to achieve a puDoF value of NL+2
is as follows.
The network is split into subnetworks, each with consecutive
L + 2 transmitter-receiver pairs. In each subnetwork, the
last Nc + 1 words are decoded. For each i ∈ {L + 2, L +
1, · · · , L + 2 − Nc + 1}, message Wi is associated with base
stations {i, i−1, · · · , L+2−Nc +1} ⊆ Ci . Thus the last Nc
words are decoded. The base stations with indices in the set
{2, 3, · · · , L + 2 − Nc } are inactive as there is interference
from the last transmitter in the subnetwork which cannot
be eliminated. The first base station decodes WL+2−Nc . To
eliminate the interference caused by the transmitters in the
set S = {L + 2 − Nc + 1, L + 2 − Nc + 2, · · · , L + 1} at the
first base station of the subnetwork, we add the first base
station to each Ci , ∀i ∈ S. Now for messages with indices
in the set S, we have used βi = 2 + i − (L + 2 − Nc + 1)
associations up to this point; the factor of two comes from
the base station resolving Wi and the first base station of
the subnetwork. But each transmitter with indices in the
set S\{L + 1} also interferes with the subnetwork directly
preceding this subnetwork. ∀i ∈ S\{L + 1}, the message
Wi interferes with the bottom L + 1 − i base stations of
the preceding subnetwork, which is precisely the number
of associations left for the respective message i.e. Nc −
βi = L + 1 − i, thus inter-subnetwork interference can be
eliminated at those base stations.
In the third range 1 ≤ Nc ≤ L2 −1, the cell association that
c
is used to achieve the lower bound of 2N2N
is similar to the
c +L
one described in Section III for the downlink. The network is
split into disjoint subnetworks; each with consecutive 2Nc +
L transmitter-receiver pairs. For the uplink, we consider
two sets of indices for transmitters AT = {1, 2, · · · , Nc }
and BT = {Nc + L + 1, Nc + L + 2 · · · , 2Nc + L}, and
corresponding sets of receivers AR = {1, 2, · · · , Nc } and
BR = {Nc + 1, Nc + L + 2 · · · , 2Nc }. For each i ∈ AT ,
the message Wi is associated with the receivers receiving
it in AR . Receiver i decodes Wi and the other associations
in Ci exist for eliminating interference. Similarly For each
j ∈ BT , the message Wj is associated with the receivers
receiving it in BR , but now receiver j − L decodes Wj and
the other associations in Cj are for eliminating interference.
We observe that if we were not restricted to the zeroforcing coding scheme then for the third range, we could
achieve 12 puDoF using asymptotic interference alignment [16], which is higher than the value achieved by zeroforcing. The next sections complete the proof of Theorem
1
V. C ONVERSE P ROOF WHEN
L
2
≤ Nc ≤ L
In this section, we provide a converse proof for the second
range of (6). More precisely, we show that the following
holds.
τUzf (L, Nc ) =
Nc + 1
,
L+2
L
≤ Nc ≤ L.
2
(7)
We start by proving the case when Nc = L, The optimal
zero-forcing puDoF for the uplink can be characterised as:
τUzf (L, L) =
L+1
.
L+2
(8)
We begin by dividing the network into subnetworks of
L + 2 consecutive transmitters-receiver pairs. We observe
that in any subnetwork, if we have Nc + 1 = L + 1 consecutive active receivers (base stations), then the transmitter
connected to all these receivers must be inactive, because a
message’s interference cannot be canceled at Nc or more receivers. Let ΓBS be the set of subnetworks where all Nc +2
receivers are active, and ΦBS be the set of subnetworks with
at most Nc active receivers. Similarly, let ΓM T and ΦM T
be the subnetworks with Nc + 2 active transmitters and at
most Nc active transmitters, with respect to order. To be
able to achieve a higher puDoF than (8), it must be true that
both conditions hold: |ΓBS | > |ΦBS | and |ΓM T | > |ΦM T |.
Now note that for any subnetwork that belongs to ΓBS , at
most Nc transmitters will be active, because the interference
caused by any message cannot be canceled at Nc or more
receivers. Hence ΓBS ⊆ ΦM T . Further, the same logic
applies to conclude that for any subnetwork with Nc + 1
active receivers, the number of active transmitters is at
most Nc + 1, and hence ΓM T ⊆ ΦBS . It follows that
if |ΓBS | > |ΦBS |, then |ΓM T | < |ΦM T |, and hence the
statement in (8) is proved.
To aid in the next step we define MT-BS pairs (mi , bj ) as
decoding pairs if Wi is decoded at base station j. To prove
c +1
when L2 ≤ Nc < L, we use the
that τUzf (L, Nc ) = NL+2
following lemmas :
Lemma 1: For any zero-forcing scheme, one of the
following is true for any two decoding pairs (mi1 , bj1 )
and (mi2 , bj2 ): j2 ∈
/ {i1 , i1 − 1, · · · , i1 − L} or j1 ∈
/
{i2 , i2 − 1, · · · , i2 − L}.
Proof: If the claim were not true, i.e. j2 ∈ {i1 , i1 −
1, · · · , i1 − L} and j1 ∈ {i2 , i2 − 1, · · · , i2 − L} then
Wi1 and Wi2 would interfere with one another and could
not be decoded using the zero-forcing scheme. This is a
consequence of the work done in [17].
Lemma 2: For any set L ⊆ [K] of L + 1 consecutive
indices, a maximum of Nc mobile terminals with indices in
L can be decoded at base stations with indices in L for any
zero-forcing scheme.
Proof: We prove this claim by contradiction. If Nc + 1
or more mobile terminals with indices in L are decoded
at base stations with indices in L, then at least one of the
mobile terminals would be associated with more than Nc
base stations. This violates the constraint in (3).
From Lemma 1, we have the following corollary:
Corollary 1: For any two decoding pairs (mi1 , bj1 ) and
(mi2 , bj2 ) in a zero-forcing scheme, if i1 > i2 then j1 > j2
and vice versa.
Immediately from Lemma 2 we have that subnetwork only
decoding, i.e. transmissions from a subnetwork are decoded
in the same subnetwork, can only decode at most Nc + 1
words in each subnetwork of L+2 consecutive BS-MT pairs.
Our proof will be based on the concept that to break the
inner bound described in (6), at least one subnetwork of L+2
consecutive MT-BS pairs must have more than Nc +1 active
mobile terminals. And all such subnetworks must borrow
base stations from the subnetwork above it to decode words
corresponding to its own mobile terminals. This happens
because for a consecutive set of L + 2 mobile terminals, the
only base stations that can help decode their transmissions
are the corresponding base stations or the other L base
stations with preceding indices that are connected to the
set.
To aid in the writing we define : αk = (L + 2) × (k − 1),
here αk denotes the first index of each subnetwork Lk .
In this sense Lk is topologically below Lk−1 , i.e. mobile
terminals from Lk are connected to some base stations in
Lk−1 . Additionally M Ti denotes mobile terminal i, and
BSj denotes base station j
We use the above lemmas and definitions to define a best
case scenario for inter-subnetwork interference. A best case
scenario is where the interference from one subnetwork’s
(e.g., Lk ) mobile terminals to another subnetwork’s (e.g.,
Lk−1 ) base stations is focused on the bottom most base
stations. This is defined as the best case scenario because
from Lemma 1, we know that for Lk−1 ’s own mobile
terminals to be decoded in Lk−1 , we need base stations
that are indexed outside the range of the interference from
the mobile terminals of Lk . We also define that if there
exists decoding pairs (mi , bj ) such that i ≥ αk and j < αk ,
i.e. the mobile terminal is in Lk and the base station is in
Lk−1 , then Lk borrows a base station from Lk−1 . Similarly,
if there exists certain consecutive base stations in Lk−1
indexed by (αk − µ, αk − µ + 1, · · · αk − 1) such that no
words can be decoded here in the zero-forcing scheme due
to the cooperation constraint being met in Lk , we say that
Lk blocks µ base stations in Lk−1 .
We introduce two new variables x and δ. Here x defines
the number of extra mobile terminals (beyond Nc +1) active
in a subnetwork of L + 2 consecutive mobile terminals and
base stations, and δ defines the number of base stations
that Lk borrows from Lk−1 to help decode words from
Lk . When L2 ≤ Nc ≤ L it follows from the network
topology and the defined cooperation constraint that we have
1 ≤ x, δ ≤ Nc .
c +1
when L >
We want to show that τUzf (L, Nc ) ≤ NL+2
L
Nc ≥ 2 . It follows from the pigeonhole principle that to
break this bound, there must be at least one subnetwork (say
Lk ) where we have Nc +1+x mobile terminals active. Now
by Lemma 2, we have that Lk must borrow at least x base
stations from Lk−1 , thus x ≤ δ ≤ Nc . We now consider
possible cases for the value of δ.
When δ = 1, thus x = 1, so Lk has Nc + 2 active mobile
terminals. As Lk is borrowing one base station, say base
station j, Nc + 1 words must have been decoded in Lk . By
Lemma 2, there exists at least one decoding pair (mi , bn )
where i, n ≥ αk , such that bn is not connected to the highest
indexed active mobile terminal in Lk . Due to the size of the
subnetwork, this forces n = αk . Hence, mobile terminal i’s
transmission is decoded at the first base station of Lk . By
Lemma 1, this implies that j ∈
/ {i, i − 1, ...i − L}. It follows
that the best case scenario occurs when i = αk + (L + 2 −
(Nc + 1)), making j ≤ αk − Nc = αk−1 + L + 2 − Nc .
Let the number of available base stations left in Lk−1 be
θ. As Nc ≥ L2 , it follows that θ ≤ L + 2 − Nc ≤ Nc + 2.
Additionally, due to the borrowed base station, the number
of associations allowed for M Tαk−1 +L+1 (the last mobile
terminal in Lk−1 ) has effectively reduced by one. From
Lemma 2, we have that a maximum of Nc mobile terminals
can be decoded in Lk−1 . It follows that either the average
number of active mobile terminals over the two subnetworks
is still Nc + 1 per subnetwork, or Lk−1 will have to borrow
at least one base station from Lk−2 . We do not consider
the former case, as we just have to restart our argument
from Lk−2 because all subnetworks with higher indexes
will have an average of Nc + 1 active mobile terminals per
subnetwork. Hence, we only consider the latter case where
Lk−1 borrows at least one base station from Lk−2 . As base
station αk−1 is being used in Lk−1 , the lowest possible
indexed base station that Lk−1 borrows from Lk−2 is base
station αk−2 + (L + 2 − Nc ). Therefore the argument for
Lk−2 borrowing base stations from Lk−3 is exactly the same
as the argument shown for Lk−1 borrowing from Lk−2 . It
follows that this borrowing will continue till either we stop
borrowing at some subnetwork Li , where i < k, or L1
needs to borrow at least one more base station, which is
not possible. If Li does not borrow from Li−1 , we have
that Li and Lk have at most Nc and Nc + 1 + 1 active
mobile terminals, respectively, and all other subnetworks
between them have at most Nc + 1 active mobile terminals,
resulting in an average of Nc + 1 active mobile terminals
per subnetwork over these k − i subnetworks. Thus we can
discard them as they do not break the inner bound and
start the same argument over from Li−1 . If we continue
borrowing till L1 , we have that L1 and Lk have at most
Nc and Nc + 1 + 1 active mobile terminals respectively and
all other subnetworks have at most Nc + 1 active mobile
terminals, resulting that the average number of active mobile
terminals over the whole network is Nc + 1 per subnetwork
c +1
. This presents the
which implies that τUzf (L, Nc ) ≤ NL+2
simplest case for our iterative argument.
When δ > 1, we have a similar argument as described
in the previous paragraph. By Lemma 1, we have that
the borrowed base stations in Lk−1 will have to send the
associations downwards, i.e. the lowest indexed borrowed
base station in Lk−1 will have to be exclusively connected
to the lowest indexed active mobile terminal of Lk . As
the index of the lowest active mobile terminal in Lk is
at most αk + (L + 2 − (Nc + 1 + x)) − 1, we have
that the index of the lowest borrowed base station in
Lk−1 is αk−1 + (L + 3 − Nc − x). Therefore the number
of available base stations in Lk−1 can be expressed as
L + 3 − Nc − x. These available base stations must at least
decode Nc + 1 + (1 − x) mobile terminals’ transmissions
to have an average greater than Nc + 1 active mobile
terminals per subnetwork over Lk and Lk−1 without Lk−1
borrowing base stations from Lk−2 . This cannot happen
when L + 3 − Nc − x < Nc + 1 + 1 − x, which is only
L+1
possible when Nc > L+1
2 . Hence, the condition Nc > 2
implies that Lk−1 has to borrow at least one base station
from Lk−2 , which presents an iterative argument as the one
shown when δ = 1.
Now we consider the case when L2 ≤ Nc ≤ L+1
2 .
By Lemma 2, we also have that the maximum number of
mobile terminals from Lk−1 decoded in Lk−1 ’s available
base stations is Nc . As we only need Nc + 2 − x active
mobile terminals decoded to break the inner bound defined,
Lk−1 will not have to borrow from Lk−2 when x ≥ 2.
At least Nc + 2 − x mobile terminals’ transmissions must
be decoded in Lk−1 , but M Tαk−1 +L+1 has its associations
reduced by δ ≥ x. Using M Tαk−1 +L+1 , a maximum of
Nc − δ + 1 ≤ Nc + 1 − x transmitted words can be decoded
within Lk−1 , which will lead us to have Lk−1 borrowing
at least one base station from Lk−2 . This presents another
iterative argument, akin to the one shown above.
In order to achieve a case where Lk−1 does not have
to borrow base stations from Lk−2 , our best case scenario guides us to find the first mobile terminal in Lk−1 ,
which is connected to at most x − 2 base stations that
are being borrowed by Lk , but still connected to at least
Nc + 2 − x available base stations in Lk−1 . Assume that
the index of that mobile terminal is αk−1 + ν. Clearly,
ν ≤ (L+2−Nc −x)+(x−2) = L−Nc . So in Lk−1 we have
Nc + 2 − x active mobile terminals without borrowing from
Lk−2 , but mobile terminal αk−1 + ν has already used up all
its associations and it is connected to some base stations in
Lk−2 , specifically at least Nc base stations. Hence, Lk−2 has
a maximum L+2−Nc ≤ Nc +2 base stations available to decode more transmissions, and we need at least Nc +1 words
to be decoded here, which can be done, but this would imply
that at least two mobile terminals are associated with Nc
base stations. These two mobile terminals are indexed higher
than κ, where κ = αk−2 + L + 1 − (Nc + 1). Hence, Lk−2
blocks at least Nc of the bottom L base stations in Lk−3 , and
one can see that each further subnetwork blocks at least one
base station from the preceding subnetwork for the average
number of active mobile terminals per subnetwork to remain
above Nc + 1. If say Li does not block any base stations in
Li−1 , then Li can have at most Nc active mobile terminals
decoded in Li . It follows that either Li borrows from Li−1
or only has Nc active mobile terminals. If Li borrows from
Li−1 we have a similar iterative argument as shown above.
Otherwise, Li has only Nc active mobile terminals, making
the average number of active mobile terminals through
the considered k − i subnetworks Nc + 1 per subnetwork.
Hence, each subnetwork continues blocking base stations
in the preceding subnetwork and the extra active mobile
terminals in the whole network does not scale and is fixed
by the constant x, which shows that the average number of
active mobile terminals asymptotically approaches Nc + 1
for every subnetwork of size L + 2.
We have shown that if any subnetwork has more than
Nc + 1 active mobile terminals when L ≥ Nc ≥ L2 , either
the number of extra active mobile terminals do not scale
with size of the network, or the average over the whole
network remains bounded by Nc +1 active mobile terminals
per subnetwork. This forces that the average number of
decoded words per subnetwork is at most Nc + 1, implying
that the asymptotic puDoF during the uplink using zero
c +1
. We have shown in Section IV
forcing, τUzf (L, Nc ) ≤ NL+2
Nc +1
zf
c +1
that τU (L, Nc ) ≥ L+2 , implying that τUzf (L, Nc ) = NL+2
L
whenever 2 ≤ Nc ≤ L. The proof of (7) is thus complete.
VI. C ONVERSE P ROOF FOR UPLINK WHEN Nc <
L
2
In this section, we provide a converse proof for the third
range of (6). More precisely, we show that the following
holds.
L
2Nc
,
Nc < .
(9)
τUzf (L, Nc ) =
2Nc + L
2
Similar to Section V Our proof will be based on the
concept that to break the inner bound described in (6),
at least one subnetwork of 2Nc + L consecutive MT-BS
pairs must have more than 2Nc active mobile terminals.
And all such subnetworks must either borrow or block base
stations from the subnetwork above it to decode words
corresponding to its own mobile terminals.
This happens because for a consecutive set of 2Nc + L
mobile terminals, the only base stations that can help decode
their transmissions are the corresponding base stations or
the other L base stations with preceding indices that are
connected to the set.
Using the Lemmas and definitions from Section V we
start our proof. We present cases on x, and δ.
Firstly we notice as each subnetwork has 2Nc +L mobileterminals, base-stations pairs so there is a possibility of
decoding more then 2Nc transmissions using subnetworkonly-decoding (SO-decoding) in Lk . We first show that only
a maximum of 2Nc + 1 transmissions can be decoded using
SO-decoding.By Lemma 2, to decode 2Nc +2 transmissions
using SO-decoding you need a subnetwork of 2 ∗ L + 1
mobile-terminal and base stations pairs which is larger than
2Nc + L. Thus Lk can decode at most 2Nc + 1 using SOdecoding
Thus, our first case is x = 1 and δ = 0. In Lk we have
that the highest indexed base stations that can decode the
2Nc + 1 transmissions are the L + 1 + Nc + 1 = L + Nc + 2
highest indexed base stations. But to transmit and decode
2Nc + 1 transmissions in Lk there will be at least 3 mobile
terminals that achieve the maximum number of associations.
By topology, only the lowest indexed such terminal is the
one that blocks base stations in Lk−1 . Specifically it blocks
L − 2Nc + 3 base stations, thus only 4Nc − 3 base stations
are left to decode at least 2Nc + 1 − 1 base stations.
From these 4Nc − 3, Lk−1 needs at least L + 2 − (L −
2Nc + 3) base stations to decode Nc + 1 transmissions.
But at least 2 of the mobile terminals transmitting to these
base stations would meet its max constraint, and if you
utilize exactly L + 2 − (L − 2Nc + 3) base stations then
by Corollary 1 only 1 of the highest L − 2Nc + 3 can
be transmitting. Similar to above we only consider the
lower indexed mobile terminal which reaches its maximum
association constraint. This mobile terminal is indexed at
most αk−1 + 4Nc − 5, which results that including the
base stations which are decoding transmissions and those
which cant due association constraints at least L + 2 of
the 4Nc − 3 base stations are used up. We are left with
4Nc − 3 − (L + 2) = 4Nc − L − 5 ≤ 2Nc − 6 base
stations as Nc ≤ L−1
2 . Now these 2Nc − 6 base stations
must decode at least NC − 1 transmissions, thus at least
Nc − 2 of these transmissions must come from lowest
indexed 2Nc −7 mobile terminals, and the other transmission
is transmitted from at most the αk−1 + (2Nc + L − (L +
2)) − 1 = αk−1 + (2Nc − 3). Which forces that in Lk−2
the highest indexed L + 1 − (2Nc − 2) = L − 2Nc + 3
can decode at most 1 transmission and the highest indexed
L + 1 − (2Nc − 7) = L − 2Nc + 8 can decode at most 2
transmissions.
So in Lk−2 the remaining 2Nc + L − (L − 2Nc + 8) =
4Nc − 8 base stations must decode at least 2Nc − 2. Using
a similar argument as above L + 2 of these available base
stations are used to decode Nc + 1 transmissions. So in
Lk−2 , 4Nc − 8 − (L + 2) = 4Nc − L − 10 ≤ 2Nc − 11
of the lowest indexed base stations must decode at least
Nc − 3 transmissions. So compared to Lk−1 where the
lowest indexed 2Nc − 6 base stations had to decode Nc − 1
transmissions, in Lk−2 the lowest indexed 2Nc − 11 have
to decode at least Nc − 3 transmissions, so even though the
number of needed transmissions decreased by 2, the number
of available base stations decreased by 5. This propagation
of interference would continue through all preceding subnetworks and the number of available base stations would keep
decreasing faster than the number of transmissions to be
decoded. So either we reach L1 or we stop this propagation
of interference at some Li , where i < k. If the latter
happens, then in Li one could decode at most Nc +1, which
would bring the average number of decoded words between
c
the k − i subnetworks to less than 2N2N
, so we just restart
c +L
our argument from Li−1 . If the former happens then the
number of extra decoded transmissions did not scale with
the network size, and thus the asymptotic puDOF is still
2Nc
2Nc +L .
If x = 1, and δ = 1, one observes that the interference
from Lk to Lk−1 is actually worse than as described above.
This is due to the fact that the extra active mobile terminal’s
transmission will be either decoded at one of the highest
indexed L−2Nc +3 base stations of Lk−1 or a lower indexed
base station. This either causes the same interference as
described above or by Lemma 1 the effective max constraint
of some of the higher indexed mobile terminals is reduced,
which is worse than before. Thus a similar argument follows.
If x = 1, and δ > 1, then by Lemma 1, we have that
the borrowed base stations in Lk−1 would be lower indexed
than the highest indexed L − 2Nc + 3 base stations, thus the
interference is worse than the first argument, which leads
to the same conclusion that the asymptotic puDoF is still
2Nc
2Nc +L .
Now if x > 1, by Lemma 1, and the first argument we
have that either the highest indexed L−2Nc +3 base stations
are blocked in Lk−1 and some lower indexed base stations
are borrowed, or all borrowed base stations have a lower
index than the highest indexed L − 2Nc + 3 base stations,
which from above arguments leads us to the same conclusion
c
.
that the asymptotic puDoF is still 2N2N
c +L
So we have shown that We have shown that if any
subnetwork has more than 2Nc active mobile terminals when
Nc < L2 , either the number of extra active mobile terminals
do not scale with size of the network, or the average over
the whole network remains bounded by 2Nc active mobile
terminals per subnetwork. This forces that the average
number of decoded words per subnetwork is at most 2Nc ,
implying that the asymptotic puDoF during the uplink using
c
zero forcing, τUzf (L, Nc ) ≤ 2N2N
. We have shown that
c +L
2Nc
zf
c
τU (L, Nc ) ≥ 2Nc +L , implying that τUzf (L, Nc ) = 2N2N
c +L
L
whenever Nc < 2 .
VII. AVERAGE U PLINK -D OWNLINK D EGREES OF
F REEDOM
In [13], the puDoF value τ (L = 1, Nc ) was characterized.
Here, we present zero-forcing schemes, with the goal of
optimizing the average rate across both uplink and downlink
for arbitrary values of L ≥ 2. We propose the following
theorem
Theorem 2: The average uplink-downlink puDoF that can
be achieved utilizing the interference avoidance schemes
described in Section II is characterized by
(
1
(1 + γD (Nc , L)) L + 1 ≤ Nc ,
zf
τ (L, Nc ) ≥ 2 2Nc
(10)
1 ≤ Nc ≤ L,
2Nc +L
where γD (Nc , L) is the downlink component of the puDoF
when Nc ≥ L + 1, and is given by
γD (L, Nc ) =
2
L+1
L+2
+ Nc − (L + 1)
2L+1
.
+ Nc − (L + 1)
2
(11)
The coding scheme that achieves the inner bound for
the second range of (10) is essentially the union of the
scheme described in Section III and the scheme that achieves
the third range of (6). The network is split into disjoint
subnetworks; each with consecutive 2Nc + L transmitterreceiver pairs. We consider two sets of base stations ABS =
{1, 2, · · · , Nc } and BBS = {Nc + 1, Nc + 2 · · · , 2Nc }, and
two sets of mobile terminals AM T = {1, 2, · · · , Nc } and
BM T = {Nc +L+1, Nc +L+2 · · · , 2Nc +L}. Now for each
i ∈ AM T , Ci = ABS . Similarly for each j ∈ BM T , Cj =
BBS . Thus, for the downlink and uplink, we can get the optimal puDoF described in Sections III and IV when Nc < L2 .
For the case where Nc ≥ L + 1, the coding scheme that
achieves the inner bound in (10) is as follows. First, we
associate each mobile terminal with the L + 1 base stations
connected to it. This achieves the puDoF value of unity
during the uplink in the same way as the scheme that
achieves it in Section IV. Hence, we know so far that
Ci ⊇ {i, i − 1, i − 2, · · · , i − L} ∩ [K], ∀i ∈ [K]. When
sending messages from base stations to mobile terminals,
the cooperative zero-forcing scheme works in a ”downward”
fashion as shown in [13]. Due to the network topology,
the uplink message passing scheme that achieves the unity
puDoF works in an ”upward” manner as shown in Section
IV. So to maximize the downlink puDoF, we need to find a
coding scheme that optimizes these opposing trends.
We define CiD as the set of extra associations that the
downlink scheme requires for MT i. Thus, ∀i ∈ [K] we
have that Ci = CiD ∪ {i, i − 1, · · · , i − L}.
For the downlink, we divide the network
into disjoint sub-
+ Nc − (L + 1)
networks; each consists of L + 2 L+1
2
consecutive transmitter-receiver pairs. We define = d L+1
2 e,
and κ = +Nc −(L+1). The cell association has a repeated
pattern every 2κ + L BS-MT pairs, and hence, it suffices to
describe it for the first 2κ + L BS-MT pairs. We consider
two cases based on the parity of the connectivity parameter
L. If L is odd, we partition the indices of mobile terminals
in the subnetwork into three sets:
Fig. 1: Scheme for average uplink (green shade) and downlink (blue shade) communication when Nc ≤ L
(a) L odd
S1
= {, + 1, · · · , + κ − 1},
S2
= {2 + κ, 2 + κ + 1 · · · , 2 + 2κ − 1},
S3
= {1, 2, · · · , L + 2κ} \ (S1 ∪ S2 ).
(b) L even
Fig. 2: Scheme for downlink, with all the associations
needed for optimal uplink, that achieves the lower bound
defined in equation (10) when Nc ≥ L + 1
The mobile terminals indexed in S3 are kept inactive. The
cell associations for downlink are given by the following words during the downlink, and hence our average puDoF
description.
during the downlink is
(
{1,
2,
·
·
·
,
κ
−
1},
∀i
∈
S
,
1
2( L+1
2κ
CiD =
2 + (Nc − (L + 1)))
=
.
{ + κ, + κ + 1, · · · , + 2κ − 1},
∀i ∈ S2 .
L + 2κ
L + 2( L+1
2 + (Nc − (L + 1)))
If L is even, we partition the indices of mobile terminals
A similar argument follows for the case when L is even. We
in the subnetwork into three sets:
have that (10) is valid thus Theorem 2 holds.
Figures 1 and 2 serve as examples for the average uplinkS 0 1 = {, + 1, · · · , + κ − 1},
downlink inner bounds defined in this section .
0
S 2 = {2 + κ − 1, 2 + κ + 1 · · · , 2 + 2κ − 2},
In the case of L = 1, the optimal puDoF is characterized
S 0 3 = {1, 2, · · · , L + 2κ} \ (S1 ∪ S2 ).
in [13]. The findings there coincide with our findings, as
L = 1 we find that for Nc ≥ L + 1, it directly implies
The mobile terminals indexed in S30 are kept inactive. The that = 1, andκ = (N − L) = N − 1 which results in
c
c
2(Nc −1)
cell associations
are given by the following description.
(
.
γD (Nc , L) = 2(N
c −1)+1
{1, 2, · · · , κ − 1},
∀i ∈ S 0 1 ,
CiD =
{ + κ, + κ + 1, · · · , + 2κ − 1},
∀i ∈ S 0 2 . VIII. AVERAGE U PLINK -D OWNLINK D O F WITH F ULL
U PLINK D O F
So If L is odd we have a subnetwork of L+2κ transmitterWe show that the downlink puDoF as described in (11)
receiver pairs and we decode
is optimal when we have unity DoF for uplink, i.e., each
( + κ − 1 − + 1) + (2 + 2κ − 2 − (2 + κ) + 1) = 2κ mobile terminal is associated with all the base stations con-
nected to it. In other words, we are restricted in this section
to cell associations that satisfy the following definition.
Definition 1: We say that an association scheme is called
a Full coverage association if each mobile terminal is
associated with all the base stations connected to it. More
precisely, ∀i ∈ K, {i, i − 1, · · · i − L} ∈ Ci .
We then have the following theorem:
Theorem 3: Optimal downlink puDoF when we have a
full coverage association and Nc > L is characterized as
γD (L, Nc ) =
.
2(d L+1
2 e + (Nc − L + 1))
L + 2(d L+1
2 e + (Nc − L + 1))
To help in proving Theorem 3, we define the following:
= d L+1
2 e and κ = + Nc − (L + 1). In order to prove
Theorem 3, we first break up the network into subnetworks
of 2κ + L consecutive base station (transmitter) and mobile
terminal (receiver) pairs. Label each subnetwork Lk such
that the lowest index of a base station and mobile terminal
in Lk is k×(2κ+L). Our proof will be based on the concept
that to break the puDoF described in Theorem 3, at least one
subnetwork of 2κ + L consecutive MT-BS pairs must have
more than 2κ + 1 active mobile terminals.
First, we show that without borrowing base stations
from preceding subnetworks, surpassing the puDoF value in
Theorem 3 is impossible. To do so, we first define a special
class of downlink schemes and then formulate a lemma.
Definition 2: We say that a downlink scheme relies
on Subnetwork-only downlink decoding if transmissions
from a subnetwork can only be decoded in the same subnetwork.
Lemma 3: Utilizing subnetwork-only downlink when we
already have a full coverage association scheme, a subnetwork can decode a maximum of 2κ words. Furthermore, for
a subnetwork to decode 2κ words it must be that the last
receiver in the subnetwork is active.
Proof: We prove Lemma 3 by contradiction. Say 2κ+1
words are decoded, then at least 2κ + 1 transmitters are
active in the subnetwork. So there exists at least one active
transmitter, say BS i, indexed between the indices of two
sets of κ active transmitters. Let ν1 and ν2 be the sets of
indices of the active transmitters above and below i, with
respect to order. Also, let x = max ν1 , and y = min ν2 .
We first observe that the smallest possible value for x
is κ and similarly the largest possible value of y is κ + ,
so we have i ∈ ν3 = {κ + 1, κ + 2, · · · , κ + − 1}. For
there to be 2κ + 1 words decoded words in the subnetwork,
we also need 2κ + 1 active receivers, thus we can make
corresponding disjoint index sets ν10 , ν20 , and ν30 . Where
receivers with indices in ν10 receive the first κ words,
receivers with indices in ν20 receive the last κ words, and ν30
is the set of indices of receivers that can decode the extra
word, say Wj . Now, x0 = max ν10 and y 0 = min ν20 , so we
observe that the smallest possible value for x0 is κ + − 1
and the largest possible value of y 0 is κ+L. Hence, we have
j ∈ ν30 = {κ + , · · · κ + L − 1} ∩ {i, i + 1, · · · i + L}.
We then observe that at least +1 active receivers indexed
in the set ν 0 = ν10 ∪ ν20 observe the extra transmitted signal.
To aid in writing, we define µ0j as the index set of receivers
listening to transmitters which are transmitting Wj . Hence,
for every receiver indexed µ0j there must be a unique active
transmitter indexed in ν = ν1 ∪ ν3 such that the transmitter
is associated with Wj to deliver the message at MT j and
cancel interference at all other receivers indexed in ν 0 ; call
this set of indices µj . With just the full association scheme
there are at most − 1 such active transmitters, thus we
must activate more transmitters indexed in ν3 , or add more
active transmitters indexed in ν1 ∪ ν2 to Cj . Either of those
actions increases the size of µ0j thus we must then increase
the size of µj to cancel interference. So to cancel the
interference of the extra transmitter we will always introduce
more interference in the channel. So we cannot get more
than 2κ words decoded through Subnetwork-only decoding.
Additionally if the last receiver was not active we would
have that the largest possible value of y 0 is κ + L − 1 which
would imply that it would be observing transmissions from
BS x, and to erase that interference an extra transmitter
indexed in {κ + 1, · · · y 0 } must be activated during the
downlink and associated with everything that BS x is
associated with during the downlink. But this would mean
at least one of the messages associated with BS x during
the downlink would be associated with more than Nc base
stations overall (uplink and downlink), which is not possible,
thus the last active receiver must be active. This method of
reasoning validates Lemma 3
If Theorem 3 were not true then we would have that at
least one subnetwork in the entire network must decode at
least 2κ + x words. We present cases on x.
If x = 1, let the first subnetwork that decodes 2κ + 1
words be Lk . Lemma 3 would then imply that at least one
base station is active in Lk−1 such that this base station
is either canceling the interference induced from the extra
base stations active in Lk or is the extra base station that
is carrying the extra word for Lk , but this implies that in
Lk−1 at least the last mobile terminal cannot be active,
which using Lemma 3 implies that at most 2κ − 1 words
can be decoded in Lk−1 . Thus the average over the two
subnetworks is still 2κ words decoded per subnetwork.
When x > 1, one observes that the maximum number
of base stations that can help from Lk−1 when trying to
decode words in Lk is L−1. These extra L−1 base stations
are being used to cancel interference induced from extra
base stations in Lk . That would imply that the preceding
subnetwork would only help with decoding a maximum of
L + Nc − (L + 1) words, so the smallest index of an active
receiver in Lk that is being helped by transmitters in Lk−1 is
at most L + Nc − (L + 1), which implies that the next active
receiver must have an index that is at least 2L+Nc −L + 1,
which leaves at most κ + − L receivers to decode at least
2κ + 1 − (L + Nc − (L + 1)) = κ + − L + 1 words.
Thus, in order to decode 2κ + x words where x > 1 in
subnetwork Lk , we require that κ + − L receivers decode
at least κ + − L + 1 words. Clearly this is impossible.
Thus, only an average of 2κ words per subnetwork can be
2κ
words decoded per receiver,
decoded, which results in 2κ+L
which is exactly what Theorem 3 states.
IX. C ONCLUDING R EMARKS
In this work, we presented an effort to understand optimal
cell association decisions in locally connected interference
networks, focusing on optimizing for the average uplinkdownlink puDoF problem. We consider a backhaul constraint that allows for associating each mobile terminal with
Nc base stations (cells), and an interference network where
each base station is connected to a corresponding mobile
terminal as well as L mobile terminals with succeeding
indices. We characterized the optimal association and puDoF
for the uplink problem when zero-forcing schemes are
considered. We also found that the characterization of the
optimal association for the average uplink-downlink puDoF
problem when Nc < L2 follows from our uplink characterization and previous work for the downlink problem. We
also presented the optimal zero-forcing downlink scheme if
we fix the uplink scheme to the uplink-only-optimal scheme
when Nc ≥ L + 1. We conjecture that it is in fact optimal to
have full DoF in the uplink when Nc ≥ L + 1, and hence it
would follow that the presented cell association and average
puDoF are optimal in this case.
R EFERENCES
[1] S. Veetil, K. Kuchi and R. K. Ganti. (2015, Dec.). Performance of cloud radio access networks. [Online]. Available:
http://arxiv.org/pdf/1512.05904v1.pdf
[2] A. Checko, H. L. Christiansen, Y. Yan, L. Scolari, G. Kardaras,
M. S. Berger and L. Dittmann, “Cloud RAN for mobile networks
- a technology overview,” IEEE Communication Surveys Tutorials,
vol. 17, no. 1, pp. 405-426, First Quart. 2015.
[3] China Mobile, “Next generation fronthaul interface,” White Paper,
Oct. 2015.
[4] The 5G Infrastructure Public Private Partnership. (2015, Jan.). 5GXhaul Project. [Online]. Available: https://5g-ppp.eu/5g-xhaul/
[5] O. Simeone, A. Maeder, M. Peng, O. Sahin and W. Yu.
(2015, Dec.). Cloud radio access network: Virtualizing wireless access for dense heterogeneous systems. [Online]. Available:
http://arxiv.org/abs/1512.07743.
[6] S. -H. Park, O. Simeone and S. Shamai. (2016, Jan.). Joint optimization of cloud and edge processing for fog radio access networks.
[Online]. Available: http://arxiv.org/abs/1601.02460.
[7] P. Marsch and G. P. Fettweis, Coordinated Multi-Point in Mobile
Communications: From Theory to Practice, 1st ed. New York, NY:
Cambridge, 2011.
[8] V. S. Annapureddy, A. El Gamal, V. V. Veeravalli, “Degrees of
Freedom of Interference Channels with CoMP Transmission and
Reception,” IEEE Trans. Inf. Theory, vol. 58, no. 9, pp. 5740-5760,
Sep. 2012.
[9] V. Ntranos, M. Maddah-Ali, G. Caire. (2014, Jul.). On
uplink-downlink duality for cellular IA. [Online]. Available:
https://arxiv.org/abs/1407.3538.
[10] M. H. M. Costa, “Writing on dirty paper (corresp.),” IEEE Trans. Inf.
Theory, vol. 29, pp. 439-441, May 1983.
[11] A. El Gamal, V. S. Annapureddy, and V. V. Veeravalli, “Interference
channels with coordinated multi-point transmission: Degrees of freedom, message assignment, and fractional reuse”, IEEE Trans. Inf.
Theory, vol. 60, no. 6, pp. 3483-3498, Mar. 2014.
[12] M. Bande, A. El Gamal, V. V. Veeravalli. (2016, Oct.). Degrees
of Freedom in Wireless Interference Networks with Cooperative
Transmission and Backhaul Load Constraints. [Online]. Available:
https://arxiv.org/abs/1610.09453.
[13] A. El Gamal, “Cell associations that maximize the average uplinkdownlink degrees of freedom,” in Proc. IEEE International Symposium on Information Theory (ISIT), Barcelona, Spain, Jul. 2016.
[14] A. Wyner, “Shannon-theoretic approach to a Gaussian cellular
multiple-access channel,” IEEE Trans. Inf. Theory, vol. 40, no. 5,
pp. 1713-1727, Nov. 1994.
[15] M. Wigger, R. Timo and S. Shamai (2016, Mar.). Conferencing in
Wyner’s Asymmetric Interference Network: Effect of Number of
Rounds. [Online]. Available: http://arxiv.org/abs/1603.05540
[16] V. Cadambe and S. A. Jafar, “Interference alignment and degrees of
freedom of the K-user interference channel,” IEEE Trans. Inf. Theory,
vol. 54, no. 8, pp. 3425-3441, Aug. 2008.
[17] V. Ntranos, M. Maddah-Ali, G. Caire. (2014, Feb.). Cellular Interference Alignment [Online]. Available: https://arxiv.org/abs/1402.3119.
| 7cs.IT
|
High order exactly divergence-free Hybrid Discontinuous Galerkin Methods
for unsteady incompressible flows
Christoph Lehrenfelda , Joachim Schöberlb
a Institute
for Computational and Applied Mathematics, WWU Münster, Münster, Germany
for Analysis and Scientific Computing, TU Wien, Wien, Austria
arXiv:1508.04245v2 [math.NA] 26 Apr 2016
b Institute
Abstract
In this paper we present an efficient discretization method for the solution of the unsteady incompressible
Navier-Stokes equations based on a high order (Hybrid) Discontinuous Galerkin formulation. The crucial
component for the efficiency of the discretization method is the disctinction between stiff linear parts and
less stiff non-linear parts with respect to their temporal and spatial treatment.
Exploiting the flexibility of operator-splitting time integration schemes we combine two spatial discretizations which are tailored for two simpler sub-problems: a corresponding hyperbolic transport problem and
an unsteady Stokes problem.
For the hyperbolic transport problem a spatial discretization with an Upwind Discontinuous Galerkin
method and an explicit treatment in the time integration scheme is rather natural and allows for an efficient
implementation. The treatment of the Stokes part involves the solution of linear systems. In this case a discretization with Hybrid Discontinuous Galerkin methods is better suited. We consider such a discretization
for the Stokes part with two important features: H(div)-conforming finite elements to garantuee exactly
divergence-free velocity solutions and a projection operator which reduces the number of globally coupled
unknowns. We present the method, discuss implementational aspects and demonstrate the performance on
two and three dimensional benchmark problems.
Keywords: Navier-Stokes equations, Hybrid Discontinuous Galerkin Methods, H(div)-conforming Finite
Elements, exactly divergence-free, Operator-Splitting, reduced stabilization
1. Introduction
1.1. Problem statement
We consider the numerical solution of the unsteady incompressible Navier Stokes equations in a velocitypressure formulation:
∂
in Ω
∂t u + div(−ν∇u + u⊗u + pI) = f
(1)
div u = 0 in Ω
with boundary conditions u = uD on ΓD ⊂ ∂Ω and (ν∇u − pI) · n = 0 on Γout = ∂Ω \ ΓD . Here, ν = const
is the kinematic viscosity, u the velocity, p the pressure, and f is an external body force. We consider
a discretization to (1) with high order (Hybrid) Discontinuous Galerkin (DG) finite element methods for
complex geometries with underlying meshes consisting of possibly curved tetrahedra, hexahedra, prisms and
pyramids.
Email addresses: [email protected] (Christoph Lehrenfeld), [email protected]
(Joachim Schöberl)
Preprint submitted to Comp. Meth. Appl. Mech. Eng.
April 27, 2016
1.2. Literature
Since its introduction in the paper of Reed and Hill [1], DG methods have been developed and used
for hyperbolic problems [2, 3, 4, 5, 6] and later extended to second-order elliptic (and parabolic) problems
[7, 8, 9, 10]. DG methods are specifically popular for flow problems [11, 12]. For incompressible flows
different finite element methods have been discussed in the literature [13, 14, 15]. Among these methods
several DG formulations have been considered, e.g. [16, 17, 18, 19, 20].
DG methods provide a flexibility which can be utilized for different purposes. In our case, the motivation
to consider this type of discretizations is twofold. First, relevant flow problems that can be modeled with
the incompressible Navier-Stokes equations are often convection dominated. Using the Upwind mechanism
DG methods offer a natural way to devise stable discretizations of (dominating) convection. Secondly,
abandoning H 1 -conforming finite element spaces, DG methods allow to consider (only) H(div)-conforming
finite elements (see [21]) for (Navier-)Stokes problems. This is attractive as it facilitates the design of a
discretization with exactly solenoidal solution which in turn implies energy-stability of the discretization for
the Navier-Stokes problem, cf. [19, 20, 22].
Compared to Continuous Galerkin (CG) methods the number of degrees of freedom of Discontinuous
Galerkin methods increases significantly. This drawdack is often outwayed by the advantages of the method.
However, when it comes to solving linear systems Discontinuous Galerkin methods suffer most from drastically increased globally coupled degrees of freedom. An approach to compensate for this is the concept of
Hybridization where additional unknowns on element interfaces are introduced. This increases the number
of degrees of freedom, but introduces two advantages. First, the global couplings are reduced and secondly,
the structure of the couplings allows to apply static condensation for the element unknowns. The concept has originally been introduced in the context of mixed finite element methods, cf. [21]. In the last
decade Hybridization has also been applied to Discontinuous Galerkin method for a variety of problems,
cf. [23, 24, 25, 26, 27]. We also mention, that recently similar concepts are also known in the literature
under the name “Hybridized Weak Galerkin” methods [28] where a slightly different framework is used to
derive the methods. With the emphasis to treat general polyhedral meshes “Hybrid High-Order” (HHO)
methods [29, 30, 31] have recently been introduced where a combination of Hybrid (or hybridized) methods
and higher order spaces is considered.
Concerning HDG discretizations for incompressible flows, we also mention the papers [32, 26, 33]. Further, different approaches to implement exact incompressible finite element solutions to the Stokes problem
using Hybridization have been investigated in [34, 35, 36]. In [37] the Stokes-Brinkman problem, the Stokes
problem with an additional zero order term, has been discretized using a hybridized H(div)-conforming
finite element formulation.
An interesting and often praised aspect of Hybrid mixed finite element methods is the fact that a postprocessing step can be used to reconstruct interior unknowns of an increased higher order accuracy for
elliptic problems [21]. The same is also possible for HDG methods in mixed formulation which is another
advantage over conventional DG methods, see e.g. [25]. For elliptic problems an accuracy of order k + 2
in the volume can be achieved if polynomials of order k are used on the element interfaces. One main
contribution in this paper is the introduction of a projection operator which achieves the same effect. In
[22] we already discussed this operator which has recently also been addressed under the name “reduced
stabilization” in [38, 39, 40, 41]. In these papers the construction of the corresponding operator is only
possible in two dimensions using special integration rules. We explain how the operator can be implemented
in a more general setting.
The efficiency and practicability of HDG methods is rarely addressed in the literature. Interesting
exception are [42, 43] where the computational cost of the method is compared to CG and DG methods.
The nature of diffusive (viscous) and convective terms appearing in convection-diffusion-type problems
have a substantially different character. Discretizations of problems involving only one of the two mechanisms
would typically lead to different spatial and temporal discretizations. It is therefore often desirable to consider
operator-splitting time discretization schemes which allow for a separate treatment of the different operators
as in [44, 45, 46, 47, 48, 49]. In these papers the spatial discretization for the stiff (diffusion/Stokes) and the
non-stiff (convection) operators is typically the same. We consider a different treatment of the operators
with respect to their temporal and spatial discretization.
2
1.3. The concept: Efficiency through operator splitting
A crucial ingredient in the considered discretization is the fact that the convection and the Stokes
problem are separated by means of an operator-splitting method. The operator-splitting method is chosen
such that only operator evaluations of the convection operator are required so that the time integration
scheme is explicit in terms of the convection operator. This is often affordable as the time step restrictions
following from the convection operator are the least restrictive ones in the Navier-Stokes problem. Moreover,
the convection operator is non-linear, s.t. the set up of linear systems of equations and corresponding
preconditioners or solvers would have to take place every time step which renders implicit approaches for
the convection very expensive. The Stokes operator is dealt with implicitly, i.e. it appears in linear systems
in every time step. Due to the differential-algebraic structure of the Navier-Stokes equations this is necessary
w.r.t. the pressure and the incompressibility constraint. As completely explicit handling of the viscosity
terms would introduce severe time step restrictions it is also advisable to treat viscous forces implicit. Note
that the Stokes operator is time-independent such that the setup of linear systems and preconditioners or
solvers can be done once and re-used in every time step.
The spatial discretizations for the different operators are designed differently as the treatment of the
convection term can be optimized for operator evaluations while the discretization of the Stokes operator
has to provide an efficient handling of implicit solution steps, i.e. the solution of corresponding linear
systems. This different treatment reflects in the use of two different finite element spaces which are used:
An H(div)-conforming Hybrid DG space for the velocity-pressure-pair for solving Stokes problems and a
DG space for handling convection.
1.4. Main contributions and structure of this paper
In this paper we introduce a new discretization method for the incompressible Navier-Stokes equations.
The discretization is based on a decomposition of the problem into the (unsteady) Stokes problem and
a hyperbolic transport problem. This decomposition reflects in the use of appropriate operator splitting
methods in the time discretization and the use of different finite element spaces for the different spatial
operators.
While we use a rather standard DG formulation for the spatial discretization of the hyperbolic transport
problem, we consider a new HDG formulation for the spatial discretization of the Stokes-type problem. We
use H(div)-conforming functions of element-wise polynomials of degree k for the velocity and discontinuous
pressure functions of degree k − 1. Due to the introduction of additional unknowns of degree k − 1 on
the facets for the approximation of the tangential trace of the velocity static condensation allows to reduce
the unknowns and their couplings significantly. The resulting globally coupled unknowns correspond to the
approximation of the normal trace of the velocity on the facets by order k functions, the tangential trace of
the velocity by order k − 1 functions and the approximation of the pressure field by piecewise constants.
The main contributions of this paper are:
1. Introduction of a new H(div)-conforming high order accurate HDG method with a projected jumps
formulation (also known as reduced stabilization or reduced-order HDG) for the solution of Stokes-type
problems.
2. Presentation of a combined spatial discretization for the Navier-Stokes equations based on a standard
Upwind DG formulation for the hyperbolic transport problem with the new HDG method for StokesBrinkman problems.
3. Discussion of operator-splitting time integration schemes which restrict solutions of linear systems to
Stokes-Brinkman problems.
In section 2 we discuss the discretization of spatial operators. The discussion is divided into two parts, the
discretization of the Stokes-Brinkman problem, the problem which involves all relevant spatial operators
except for the convection and the discretization of the convection operator. For the former part we consider
an HDG discretization, for the latter part a standard DG discretization. In section 3 operator-splitting
time integration schemes are discussed which are tailored for such a situation. Finally, in section 4 we give
numerical examples which demonstrate the accuracy and the performance of the method.
3
1.5. Preliminaries
Before describing the methods, we introduce some basic notation and assumptions: Ω is an open bounded
domain in Rd with a Lipschitz boundary Γ. It is decomposed into a shape regular partition Th of Ω consisting
of elements T which are (curved) simplices, quadrilaterals, hexahedrals, prisms or pyramids. For ease of
presentation we assume that all elements are not curved and consider only homogeneous Dirichlet boundary
conditions. The element interfaces and element boundaries coinciding
boundary are called
S with the domain
S
facets. The set of those facets F is denoted by Fh and there holds T ∈Th ∂T = F ∈Fh F .
In the sequel we distinguish functions with support only on facets indicated by a subscript F and those
with support also on the volume elements which is indicated by a subscript T . Compositions of both types
are used for the HDG discretization of the velocity which is denoted by u = (uT , uF ).
For vector-valued functions the superscripts t denotes the application of the tangential projection: v t =
v − (v·n) · n ∈ Rd . The index k which describes the polynomial degree of the finite element approximation
at many places through out the paper is an arbitrary but fixed positive integer number.
We identify finite
functions u ∈ Xh with their representation in terms of coefficient vectors
PNelement
X
ui ϕi for a corresponding basis {ϕi } of Xh and NX = dim(Xh ). A (generic) bilinear
u ∈ RNX , s.t. u = i=1
Y
form Gh : Xh × Yh → R is identified with the matrix G ∈ RNY ×NX , s.t. Gi,j = Gh (ϕX
j , ϕi ).
2. DG/HDG spatial discretization
In this section we introduce the spatial discretization for the Stokes operator, the convection operator
and transfer operations between both. First, we introduce the H(div)-conforming Hybrid DG discretization
of the Stokes-Brinkman problem, i.e. the stationary Navier-Stokes problem without convection and an
additional zero order term in section in section 2.1. This discretization is improved significantly. Further
on, a modification of the discretization using the idea of projected jumps (also known as reduced stabilization
or reduced-order HDG) is presented in section 2.2 including an explanation of how the projection operator
can be realized. For the convection part of the Navier-Stokes problem we consider a DG discretization using
standard approaches. This is discussed in section 2.3. As the discretization spaces for the Stokes part and
the convection part are different, we present transfer operations between the spaces in section 2.4 which
allow us to finally formulate the semi-discrete problem in section 2.5.
2.1. H(div)-conforming HDG formulation of the Stokes-Brinkman problem
In this part we consider the discretization of the Stokes part of the Navier-Stokes problem. For simplicity
we restrict the discussion to homogeneous Dirichlet boundary conditions. We present the method and
elaborate on important properties. For an error analysis of the method we refer to [22]. The reaction
term τ −1 corresponding to an inertia term stemming from an implicit time integration scheme is further
incorporated. The resulting problem is known as the (stationary) Stokes-Brinkman problem:
−1
τ u + div(−ν∇u + pI) = f
in Ω
(2)
div u = 0
in Ω
We first introduce the finite element spaces, followed by the definition of the bilinear forms corresponding
to the involved operators.
2.1.1. H(div)-conforming Finite Elements for Stokes.
Following [19] a DG formulation for the incompressible Navier Stokes equations which is locally conservative and energy-stable at the same time has to provide discrete solutions which are exactly divergence-free.
This can be achieved with a suitable pair of finite element spaces. We consider the use of H(div)-conforming
Finite Element spaces for the velocity u. H(div)-conformity requires that every discrete function uh is in
H(div, Ω) = {u ∈ [L2 (Ω)]d : div u ∈ L2 (Ω)}
4
We use piecewise polynomials, so that on each element the functions are in H(div, T ). For global conformity,
continuity of the normal component is necessary, resulting in
Y
Wh := {uT ∈
[P k (T )]d , [[uT ·n]]F = 0 ∀ F ∈ Fh } ⊂ H(div, Ω), NW := dim(Wh ),
(3)
T ∈Th
with [[·]]F the usual jump operator and P k the space of polynomials up to degree k. We refer to [21] for
details on the construction of H(div)-conforming finite elements such as the Brezzi-Douglas-Marini finite
element.
The appropriate Finite Element space for the pressure is the space of piecewise polynomials which are
discontinuous and of one degree less:
Y
Qh :=
P k−1 (T ), NQ := dim(Qh ).
(4)
T ∈Th
This velocity-pressure pair Wh /Qh fulfills
div(Wh ) = Qh .
The crucial point of this choice of the velocity-pressure pair is the property:
If a velocity uT ∈ Wh is weakly incompressible, it is also strongly incompressible:
Z
div(uT )q dx = 0 ∀qh ∈ Qh ⇔ div(uT ) = 0 in Ω.
(5)
(6)
Ω
The benefit of (6) is twofold: First, it allows to show energy-stability for the incompressible Navier-Stokes
equations, cf. section 2.5. Secondly, error estimates for the velocity error can be derived which are independent of the pressure field, we comment on this in remark 5 below.
As solutions of the incompressible Navier Stokes equations are [H 1 (Ω)]d × L2 (Ω)-regular and tangential
continuity is not imposed as an essential condition on the finite element space the discrete formulation has
to incorporate the tangential continuity weakly. We do this with a corresponding (Hybrid) DG formulation
for the tangential components across element interfaces
Remark 1 (Reduced spaces). Due to (6) solutions of the discretized (Navier)-Stokes problem will be
exactly divergence-free velocity fields. This a priori knowledge can be exploited. The basis for the space Wh
can be constructed in such a way such that we can discard certain higher order basis functions (with non-zero
divergence) that will have no contribution. A corresponding basis is introduced in [50] in the context of a
set of higher order basis functions which fulfill an exact sequence property. The resulting space Whred has
div(Whred ) = Qred
h := {p|T = const : T ∈ Th } such that also most of the degrees of freedom of the pressure
space can be discarded. The reduction of basis functions for Wh and Qh is explained in more detail in [22,
Chapter 2.2].
2.1.2. The HDG space for the velocity.
To (weakly) enforce continuity we apply a discontinuous Galerkin (DG) formulation such as the Interior
Penalty method [51]. However, to avoid the full coupling of degrees of freedom of neighboring elements,
we introduce additional unknowns on the skeleton, the facet unknowns, which represent an approximation
of the tangential trace of the solution. The DG formulation is then replaced with a corresponding HDG
formulation, s.t. degrees of freedom of neighboring elements couple only through the facet unknowns. We
note that the resulting space is only “hybrid” in the sense of the tangential unknowns. Further, we do not
consider a hybridization with respect to the pressure, cf. also remark 7.
As normal continuity is already implemented in Wh we only need a DG enforcement of continuity in the
tangential direction and hence only introduce the facet unknown for the tangential direction of the trace:
Y
Fh := {uF ∈
[P k (F )]d , uF · n = 0 }, NF := dim(Fh ).
(7)
F ∈Fh
5
H 1 -conforming (CG)
DG
H(div)-conforming DG
HDG
H(div)-conforming HDG
Figure 1: Tangential and normal continuity for different finite element spaces for the velocity.
Functions in Fh have normal component zero. For the discretization of the velocity field we use the composite
space
Uh := Wh × Fh , NU := dim(Uh ).
(8)
Remark 2 (The role of the facet space). We note that the space Fh is only introduced to allow for a
more efficient handling of linear systems. In section 4.3 we consider a numerical example where a vectorvalued Poisson problem is considered for the HDG space Uh in comparison to other (H(div)-conforming) DG
spaces to illustrate the impact of Hybridization. In case that only explicit applications of discrete operators
are used, the introduction of the space Fh entails no advantages. In this paper, facet variables appear only in
the discretization of the viscous forces. Although the facet variable has no contribution in the discretization
of inertia and pressure forces or the incompressibilty constraint we define the corresponding operations for
u ∈ Uh instead of uT ∈ Wh to simplify the presentation.
2.1.3. Viscous forces.
For ease of presentation we consider a hybridized version of the Interior Penalty method for the discretization of the viscous term. In remark 3 we comment on alternatives. In the hybridized version of the
Interior Penalty method, the usual jump across element interfaces of the Interior Penalty method is replaced
with jumps between element interior and facet unknown (in tangential direction) [[ut ]] = utT − uF from both
sides of a facet. The bilinear form corresponding to the HDG discretization of viscous forces is
Z
X Z
∂uT t
Ah (u, v) :=
ν∇uT : ∇vT dx −
ν
[[v ]] ds
∂n
T
∂T
T ∈T
(9)
Zh
Z
∂vT t
α
−
ν
[[u ]] ds +
ν [[ut ]][[v t ]] ds, u = (uT ,uF ), v = (vT ,vF ) ∈ Uh
∂n
∂T
∂T h
In this bilinear form the four terms have different functions. While the first two terms ensure consistency
(in the sense of Galerkin orthogonality) the third and fourth term are tailored to ensure symmetry (adjoint
consistency) and stability, respectively. Due to continuity of the solution ([[·t ]] = 0) the latter terms also
preserve consistency. For a more detailed introduction we refer to [22, section 2.3.1]. With respect to the
discrete norm
)
(
2
X
∂u
1
T
|||u|||21 :=
k∇uT k2T + k[[ut ]]k2∂T + h
h
∂n ∂T
T ∈Th
which is an appropriately modified version of the discrete norm typically used in the analysis of Standard
Interior Penalty methods, the bilinearform Ah is (for a sufficiently large α) consistent, bounded and coercive.
The coupling through facet unknowns enforces the same kind of continuity as in the Interior Penalty
DG formulation while preserving the following structure in the sparsity pattern: element unknowns are only
coupled with unknowns associated with the same element or unknowns associated with aligned facets.
6
k
quadrilateral
triangle
4
8
16
32
0.305
0.167
0.313
0.190
0.315
0.201
0.315
0.205
Table 1: LBB constant in dependence of k for a single element.
Remark 3 (Interior Penalty and alternatives). A drawback of the (Hybrid) Interior Penalty method
is the fact that the stabilization parameter α depends on the shape regularity of the mesh. Often α is chosen
on the safe side, but as was pointed out in [52] the condition number of arising linear systems increases
with α. In the same paper a hybridized variant of the Bassi-Rebay stabilization method (cf. [4, 5, 53]) for
a scalar Poisson equation has been proposed, see also remark 12. Such a variant is used in the numerical
examples, but as it does not have any further consequences for the remainder of this work, we stick to the
well-known (Hybrid) Interior Penalty method for ease of presentation.
2.1.4. Mass bilinear form.
The HDG mass matrix is defined as
Z
uT vT dx,
MU
(u,
v)
:=
h
u = (uT , uF ), v = (vT , vF ) ∈ Uh .
Ω
(10)
Note that we defined the mass matrix for u ∈ Uh although uF has no contribution, cf. remark 2.
2.1.5. Pressure force and incompressibility constraint.
For the pressure force and the incompressibility constraint we define the bilinearform
X Z
Dh (u, p) :=
−
p div uT dx for u = (uT , uF ) ∈ Uh , p ∈ Qh
T ∈Th
for which the LBB-condition
sup
u∈Uh
(11)
T
Dh (u, p)
≥ cLBB kpkL2 ,
|||u|||1
∀ p ∈ Qh
(12)
holds true for a cLBB independent of the mesh size h, cf. [22, Proposition 2.3.5].
Remark 4 (Robustness in polynomial degree k). In numerical experiments we observed that the LBB
constant cLBB in (12) is also robust in k. To this
R end we computed the LBB constant of one element with
Dirichlet boundary conditions and the condition Ω p dx = 0 on the pressure. The results are shown in Table
1 for varying the polynomial degree k. From the boundedness of the LBB constant on one element and the
h-robustness in (12), the robustness in h and k on the global spaces follows. This will is in the forthcoming
master’s thesis of Philip Lederer.
2.1.6. Discretization of the Brinkman-Stokes problem
With the introduced discretizations of the spatial operators the discrete Brinkman-Stokes problem can
be written as:
Find u ∈ Uh and p ∈ Qh , s.t.
−1
τ Mh (u, v) + Ah (u, v) + Dh (v, p) = hf, vi ∀ v ∈ Uh ,
(13)
Dh (u, q) =
0 ∀ q ∈ Qh .
Due to coercivity of Ah (respectively τ −1 Mh +Ah ), the LBB-condition of Dh and consistency and continuity
of all bilinear forms Brezzi’s famous theorem (see [21]) can be applied to obtain optimal order a priori error
estimates. For a discussion of the coupling structure of this discretization we refer to Remark 7 below.
7
Remark 5 (Pressure-independence of velocity error). Classical error estimates for mixed problems
result in error estimates which are formulated in the compound norm of the velocity and pressure space.
This has the disadvantage that the discretization error in the velocity depends on the approximation error
in the pressure. As was pointed out in [54], ideally this should not be the case. Due to the fact that discrete
solutions to (13) are exactly divergence-free an error estimate for the velocity field which does not involve
the pressure can be derived, cf. [22, Lemma 2.3.13].
2.2. Projected jumps: An enhancement of the HDG Stokes discretization
The proposed HDG formulation for viscous forces in section 2.1.3 can also be derived as a hybrid mixed
method with a modified flux. This is done in detail in [25] (see also [22, section 1.2.2] or [33]). In that
setting the unknowns for the primal variable (uT ) are approximated with the same polynomial degree k as
the facet unknowns (uF ). Afterwards, in a postprocessing step approximations for the primal unknown, of
one degree higher, k + 1, are reconstructed in an element-by-element fashion. This approach ends up with
a higher order approximation than the previously introduced HDG method considering the use of the same
polynomial degree k for the facet unknowns. This sub-optimality can be overcome by means of a projection
operator which leads to the projected jumps formulation. We first introduce the method and explain how
the method can be implemented afterwards.
2.2.1. Projected jumps: The method.
The idea of the projected jumps formulation is to reduce the polynomial degree of the facet unknowns in
Fh to k − 1,
Y
[P k−1 (F )]d , uF · n = 0, ∀ F ∈ Fh },
(14)
Fh → F h := {uF ∈
F ∈Fh
while keeping the polynomial degree k in Wh . In order to do this in a consistent fashion we have to modify
the bilinearform Ah . First, we introduce the L2 projection Π for a fixed facet F ∈ Fh :
Z
Z
Π : [P k (F )]d → [P k−1 (F )]d ,
(Π f ) v dx =
f v dx ∀ v ∈ [P k−1 (F )]d
(15)
F
F
k−1
T
Due to the fact that ∂u
(F ) on affine linearly mapped elements, the test functions vT and vF in
∂n ∈ P
the first integral on the element boundary in (9) can be replaced by their L2 (F ) projections ΠvT and ΠvF .
If we additionally use Π[[ut ]] instead of [[ut ]] to symmetrize and stabilize the formulation in (9) we end up
with a modified version of the Hybrid Interior Penalty method:
Z
X Z
∂uT
Arh (u, v) :=
ν∇uT : ∇vT dx −
ν
Π[[v t ]] ds
∂n
T ∈T
(16)
Zh T
Z ∂T
∂vT
α
t
−
ν
Π[[u ]] ds +
ν Π[[ut ]]Π[[v t ]] ds, u, v ∈ Wh × F h
∂n
∂T
∂T h
Note that the first two boundary integrals are just reformulated while only the last integral is really changed.
This modification preserves the important properties of Ah : It is still consistent and bounded. Further, a
deeper look into the coercivity proof (see [22]) reveals that coercivity can easily be shown in the modified
(weaker) norm
(
)
2
X
1
∂uT
2
2
t 2
|||u|||1,∗ :=
k∇uT kT + k[[Π u ]]k∂T + h
.
(17)
h
∂n ∂T
T ∈Th
Notice that, as we do not modify Wh , the normal component of uT ∈ Wh is still a polynomial of degree k.
The idea of applying such a reduced stabilization is also discussed and analyzed in [39, 40]. However, only
for the two-dimensional case the realization of the projection Π is discussed (by means of Gauss quadrature,
cf. [39, section 3.4]). In the next section a simple way to implement this projection operator is presented.
8
Remark 6 (Interplay with operator-splitting). If a Hybrid DG formulation for a problem involving
diffusion (viscosity) and convection is applied, such a reduction of the facet unknowns is only appropriate if
diffusion is dominating. One premise of the operator-splitting in this paper is that convection is not involved
in implicit solution steps. Hence, the facet variable will never be involved in the discretization of convection,
s.t. even if the physical problem is convection dominated, the projected jumps modification can be applied
without loss of accuracy.
Remark 7 (Comparison to a fully hybridized formulation). We note that the formulation in (13)
(and the corresponding reduced formulation with Arh (·, ·)) is not a “hybridized” formulation in the usual
sense, see e.g. [25]. Only for the tangential component of the velocity a new unknown is introduced, such
that we only have a “tangentially hybridized” velocity discretization. The pressure is not hybridized. We
comment on the resulting coupling of this HDG method and compare it to a HDG formulation where only
Hybrid unknowns on the facet exist, for the velocity and the pressure. The velocity unknowns in Uh = Wh ×Fh
(or Wh × F h in the reduced case) can be reduced to unknowns on the skeleton by static condensation. The
remaining facet unknowns are the usual unknowns for the normal component of the H(div)-conforming
finite element space and the (tangential) unknowns in Fh (or F h ). Due to the pressure unknowns, static
condensation of the formulation in (13) does not yield a global system which only involves facet unknowns,
but also element unknowns for the pressure. However, except for the constant pressure all pressure unknowns
can be eliminated by static condensation. We summarize: The globally reduced system only involves velocity
unknowns on the facets and a constant pressure on each element. Alternatively one could formulate a
related HDG formulation which only involves facet unknowns for the velocity and the pressure. In such a
formulation the pressure plays the role of the lagrange multiplier for the normal continuity and only for
the (weak) tangential continuity velocity unknowns have to be added on the facet. To obtain an accurate
(and exactly divergencefree) order k approximation of the velocity and an order k − 1 approximation of the
pressure, the facet unknowns would be an order k approximation of the pressure and an order k (or order k−1
if projected jumps or corresponding postprocessing techniques are applied) approximation of the tangential
velocities. Overall the number of unknowns would be smaller compared to the formulation proposed before
by one (constant) pressure unknown per element. However, the price for this is the fact, that the Lagrange
multiplier space (the pressure unknowns on the facets) is much larger and hence the structure of the arising
linear system is different. It very much depends on the linear solver strategies which of the two Hybrid DG
formulations gives the better perfomance.
2.2.2. Projected jumps: Realization.
The following way to implement projected jumps needed for Arh in (16) relies on an L2 -orthogonal basis
for the facet functions in Fh . To obtain an L2 -orthogonal basis, we take a local coordinate system on
each facet (spanned by d − 1 aligned edges) and an L2 -orthogonal Dubiner basis (see [55]) for each vector
component. We consider the three dimensional case, and denote the vectors of the local coordinate system
by e1 and e2 . Translation to the two dimensional case is then obvious.
On each facet F ∈ Fh , the space of (vector-valued) polynomials up to degree k, span(e1 , e2 ) · P k (F ), can
be split into the orthogonal subspaces
Vk−1 := span{e1 , e2 } · P k−1 (F )
and
⊥
Vk−1
:= span{e1 , e2 } · [P k (F ) ∩ P k−1 (F )
⊥
].
(18)
⊥
On each facet F the facet unknown uF can thus be written as uF = ūF +λ with unique ūF ∈ Vk−1 , λ ∈ Vk−1
.
0
We now replace the highest order function λ with two copies λT and λT , each of these functions is associated
with one of the two neighbouring elements T and T 0 , the functions λT are only defined element-local. λT
can thus be eliminated after the computation of the element matrix and finally, only uT ∈ Wh and ūF ∈ F h
appear in the global system.
λT is only responsible for implicitly realising the projection operator. To see this we now consider one
facet F ∈ Fh and one of the neighboring elements T ∈ Th . We use the decomposition corresponding to (18)
for trial and test functions
uF = ūF + λT and vF = v̄F + µT ,
(19)
9
⊥
with ūF , v̄F ∈ Vk−1 and λT , µT ∈ Vk−1
where λT , µT are only supported on T . In (13) we choose the test
⊥
function v such that vT = v̄F = 0, µT ∈ Vk−1
on T and µT 0 = 0 on every other element T 0 . This yields
Z
Z
Z
∂uT
α
α
⊥
ν
µT ds +
.
(20)
ν (utT − ūF − λT )µT ds =
ν (utT − λT )µT ds = 0, ∀ µT ∈ Vk−1
∂n
F
F h
F h
Hence, there holds λT = (I − Π)utT and we have
[[ut ]] = utT − ūF − λT = Π(utT ) − ūF = Π(utT − ūF ) = Π[[ut ]]
(21)
We conclude that it is sufficient to consider the HDG bilinear form Ah as before, where the local element
matrices are computed according to Fh . For each element matrix the degrees of freedom corresponding to
⊥
Vk−1
are then eliminated forming a corresponding Schur complement. This yiels a final stiffness matrix
which is only set up with respect to space unknowns of Wh × F h .
2.3. DG formulation for the convection
For the discretization of the convection part we consider a standard DG finite element space:
Vh := {u : u ∈ [P k (T )]d ∀ T ∈ Th },
NV := dim(Vh ).
(22)
We define the mass bilinear form
MVh
Z
(w, z) :=
w z dx,
Ω
w, z ∈ Vh .
(23)
Using an L2 -orthogonal basis on each element renders the associated mass matrix MV : RNV → RNV
diagonal. A stable spatial discretization of (1) with respect to the convection part is achieved using a
Standard Upwind DG trilinearform. We assume that the convection velocity uT is exactly divergence-free.
Z
X Z
Ch (uT ; w, z) :=
− w ⊗ uT : ∇z dx +
uT ·n ŵ z ds, uT ∈ Wh , w, z ∈ Vh .
(24)
T
T
∂T
where ŵ denotes the upwind value ŵ = limε&0 w(x − εuT (x)). Standard Upwind DG formulations are stable
in the sense that with ∂Ωin := {x ∈ ∂Ω, uT (x) · n < 0} there holds
Z
1
|uT · n| w2 ds + Ch (uT ; w, w) ≥ 0,
∀ w ∈ Vh , u ∈ Uh , div(uT ) = 0.
(25)
2 ∂Ωin
2.4. Transfer operations and embeddings
The discrete convection and Stokes operators have been defined on different spaces. In order to combine
both we introduce transfer operations between the (finite element) spaces to make both discretizations
compatible. We restrict ourselves to two types of transfer operations which are based on embeddings:
I: With Wh ⊂ Vh we have a canonical embedding of Uh in Vh with the embedding operator I : (uT , uF ) ∈
Uh → uT ∈ Vh . Note that the corresponding operation in terms of coefficient vectors, denoted by
I : RNU → RNV , is not an identity.
IT : The embedding operator I implies the canonical embedding I 0 : Vh0 → Uh0 , which maps functionals
I 0 : f ∈ Vh0 → [(uT , uF ) ∈ Uh → f (uT )] ∈ Uh0 . The corresponding matrix representation is IT : RNV →
RNU .
To realize the operator I we consider the equivalent L2 problem for u ∈ Uh .
Z
Z
(Iu) v dx =
uT v dx ∀ v ∈ Vh .
Ω
Ω
10
(26)
In terms of coefficient vectors this reads as
MV (Iu) = MU,V u, ∀ u ∈ RNU
=⇒
with the mixed mass matrix
Z
U,V
V
Mi,j =
ϕW
j ϕi dx, i = 1, . . . , NV , j = 1, . . . , NW
Ω
I = (MV )−1 MU,V
(27)
and MU,V
i,j = 0, j > NW .
Note that MV is diagonal (for affine linear transformations) such that (MV )−1 can be evaluated very
efficiently. The overall cost of the transfer operator I is essentially that of one sparse matrix multiplication.
Let CV : RNU × RNV → RNV denote the discrete convection operator corresponding to the trilinearform
Ch in (25).
With the operator I we can formulate applications of the convection and the mass operations CV (u), MV :
NV
R
→ RNV with respect to functions in the HDG space Uh and denote the corresponding operators by
U
C (u), MU : RNU → RNU ,
CU (u) := IT CV (u)I,
MU := IT MV I.
(28)
Remark 8 (Restriction on time integration scheme). Note that the restriction to these two transfer
operations implies that we do not allow to apply any part of the Stokes operator to a function in Vh and that
no functional on Uh can be used in solution steps involving the convection operator. This is a restriction on
the time integration scheme.
Remark 9 (Curved elements). If curved elements are considered we no longer have Wh ⊂ Vh due to the
Piola transform usually applied to construct H(div)-conforming finite elements. In this case I : Uh → Vh
is not an embedding, but the L2 projection. Nevertheless, MV is block diagonal with blocks which are not
diagonal matrices only on curved elements. Hence, applications of (MV )−1 are still cheap.
2.5. The semidiscrete formulation
With the definitions of the bilinear forms in the previous sections we arrive at
discrete DAE problem: Find u(t) ∈ Uh and p(t) ∈ Qh , such that
∂
hf, vi
∀ v ∈ Uh ,
MU
h ( ∂t u, v) + Ah (u, v) + Ch (uT ; u, v)+ Dh (v, p) =
Dh (u, q) =
0
∀ q ∈ Qh ,
Mh (u, v) = Mh (u0 , v) ∀ v ∈ Uh ,
the following spatially
t ∈ [0, T ],
t ∈ [0, T ],
t = 0.
(29)
Here, we implicitly used the embedding I to define Ch (uT ; ·, ·) on Uh . Due to (25) we have with
(
∂
1 d
d
u, u)L2 =
kuk2L2 = kukL2 kukL2 = hf, ui − Ah (u, u) − Ch (uT ; u, u) − Dh (u, p) ≤ kf kL2 kukL2 (30)
| {z } |
{z
} | {z }
∂t
2 dt
dt
≥0
≥0
=0
the stability of the kinetic energy:
d
kukL2 ≤ kf (t)kL2
dt
In the next section we discuss operator splitting time integration methods to solve (29) efficiently.
(31)
3. Operator-splitting time integration
In this section we are faced with the problem of solving the semi-discrete Navier-Stokes problem with a
proper time integration scheme. For ease of presentation we neglect external forces (f = 0) in the following
11
and consider the problem in terms of discrete operators corresponding to the bilinear (trilinear) forms
introduced in the previous section: Find u(t) ∈ RNU and p(t) ∈ RNQ , such that
U
in [0, T ],
MU ∂u
∂t + Au + C (u) u +∆t D p = f
(32)
DT u = 0 in [0, T ],
u(t = 0) = u0 .
In the time integration scheme we want to explicitly exploit the properties of the spatial discretization,
i.e. the convection operator C should only be involved explicitly in terms of operator evaluation. Due
to the DAE-structure we require time integration schemes which are stiffly accurate. Hence, the solution
of a Stokes-Brinkman problem should conclude every time step so that the incompressibility constraint is
ensured. For operator splittings of this kind different approaches exist. We briefly discuss three approaches.
In section 3.1 we discuss additive decomposition methods, like the famous class of IMplicit EXplicit (IMEX)
schemes. Product decomposition methods, sometimes also called exponential factor splittings, are discussed
in section 3.2 in the framework of operator-integration-factor splittings introduced in [48]. We discuss the
advantages and disadvantages of both approaches and motivate the consideration of a different approach.
An operator-splitting modification of the famous fractional step method, cf. [56], which eliminates the
most important disadvantages of the additive and multiplicative decomposition methods is then introduced
and discussed in section 3.3. We want to stress that the considered operator splitting approaches are of
convection-diffusion type and should not be confused with projection methods like the Chorin splitting [57].
3.1. Additive decomposition using IMEX schemes
Additive decomposition methods distinguish spatial operators that are treated implicitly and those that
are treated explicitly. The decomposition is additive in the sense that every solution (sub-)step involves
both operators. This is used by IMplicit EXplicit (IMEX) schemes (see [44, 45, 46]). The simplest of these
schemes is the semi-implicit Euler method for which one time step of size ∆t reads as:
(MU + ∆tA)un+1 + ∆tDpn+1 = MU un − ∆tCU (un )un
(33)
DT un+1 = 0
Convection only appears on the r.h.s. so that only operator evaluations occur for the convection operator,
while the remainder appears fully implicit. This scheme is obviously only first order accurate and only conditionally stable. For higher order methods of this decomposition type (e.g. using Multistep or partitioned
Runge-Kutta schemes) we refer to [44, 45, 46].
The major drawback of this type of operator splitting methods is the fact that the time step size of the
explicit and the implicit part of the decomposition have to coincide. Thereby the stability restriction caused
by the explicit treatment of the convection part dictates not only the number of explicit evaluations but also
- which is typically more expensive - the number of solution steps for the implicit part. The decomposition
methods considered in the sections 3.2 and 3.3 overcome this issue.
3.2. Product decomposition with operator-integration-factor splitting
The disadvantage of IMEX methods can be avoided with product decomposition methods, where sequences of separated problems are solved successively. The separated problems then only involve the Stokes
or the convection operator at the same time. The major benefit of this is the fact, that the numerical solution of the sub-problems (e.g. the size of the time steps) can be chosen completely different. The derivation
of the so called operator-integration-factor splitting approach has been derived in [48, Section 2.1]. We use
this idea to obtain an operator decoupling for the DAE which allows to formally rewrite (32) as
∂ t→t∗
∗
u) + Qt→t M−1 (Au + Dp) = 0 in [0, T ],
∂t (Q
(34)
DT u = 0 in [0, T ],
∗
for some arbitrary t∗ ∈ R with the integration factor Qt→t , the propagation operator, specified later in
section 3.2.2.
12
Be aware that M−1 is to be understood only formally for now. We are able to apply any suitable (i.e.
implicit and stiffly accurate) time integration method for (34). We do this for a first order method here to
explain the procedure and refer to the literature [48] for higher order variants.
3.2.1. Implicit Euler.
We employ the implicit Euler method on (34) and arrive at
1
n
∗
n+1
∗
tn+1 →t∗ n+1
u
− Qt →t un ) + Qt →t M−1 (Aun+1 + Dpn+1 ) = 0,
∆t (Q
DT un+1 = 0.
After setting t∗ = tn+1 and multiplication with M this simplifies to
n
n+1
(M + ∆tA) un+1 + ∆tDpn+1 ) = MV,U Qt →t Iun ,
T n+1
D u
= 0,
(35)
(36)
which is the solution of a Stokes-Brinkman problem as in (33), but with a different right hand side.
3.2.2. The propagation operator.
1
2
1
2
The propagation operator Qt →t is defined as Qt →t w = v(t2 ) where v(s) solves
∂v
+ (MV )−1 CV (s)v(s) = 0,
∂s
∀ s ∈ (t1 , t2 ],
v(t1 ) = w.
(37)
Here CV (s) := CV (ú(s)) with ú(s) an extrapolation of divergence-free solutions of previous time steps.
Note, that the extrapolation of convection velocities renders the problem (37) linear hyperbolic and ensures
stability in the sense of (25). After replacing Q by a numerical time integrator Q∆t for (37), the time
integration method is completely specified. The order of accuracy of the extrapolation ú and the time
integrator Q∆t should coincide with the order of the time integration method applied on (34).
3.2.3. Properties of product decompositions.
At this point the advantage of product decomposition methods over IMEX schemes is evident: As the
time integration of (37) is independent of the one for (34) the (not necessarily) explicit time integrator can
deal with stability restrictions (typically using multiple time steps) without influencing the time step for
(34). This separation of the two problems also introduces the biggest disadvantage of product decomposition
methods: an additional consistency error. Even if the DAE (32) has a stable stationary solution, product
decomposition methods may not reach it. This is not the case for monolithic or additive decomposition
approaches. Nevertheless, this splitting error is controlled by the time discretization error.
Remark 10 ((Marchuk-)Yanenko splitting). If the implicit Euler discretization as in (36) is combined
with an Euler method for (37), the famous Yanenko splitting method is recovered.
3.3. A modified fractional-step-θ-scheme
In this section we introduce an approach to circumvent severe CFL-restrictions and splitting errors at
the same time. We no longer ask for sub-problems that only involve the Stokes or the convection operator
(as in section 3.2), but ask for sub-problems which only involve one of both implicitly. The method is based
on [49] where the well-known fractional-step-θ-scheme, cf. [56, Chapter II, section 10], is modified. The
resulting method is an additive decomposition method without the time step restrictions of IMEX schemes.
We start with formally writing down an operator-splitting version of the fractional-step-θ-scheme. The
scheme is divided into three steps, the first and the last step treat the Stokes part implicitly and the
13
convection part explicitly as in (33) while the second step treats convection implicitly and viscosity forces
explicitly.
(M + θ∆tA)un1 + θ∆t D pn1 = Mun0 − θ∆tCun0
Step 1(tn0 → tn1 ) :
(38a)
DT un1 = 0
= Mun1 − θ∗ ∆t(Aun1 + Dpn1 )
Step 2 (tn1 → tn2 ) : { (M + θ∗ ∆tC)un2
(M + θ∆tA)un3 + θ∆t D pn3 = Mun2 − θ∆tCun2
Step 3 (tn2 → tn3 ) :
DT un3 = 0
(38b)
(38c)
The time stages are labeled by the superscripts n0 , n1 , n2 , n3 , respectively, where n0 denotes initial data
∗
and n3 the final time stage. The time steps size
√ for the first and the last step is θ∆t and θ ∆t in the
∗
middle step with θ = 1 − 2θ. Here θ = 1 − 1/ 2. We note that specifications for M and C with respect
to the considered spaces and the convection velocity for C are still missing at this points. The scheme is
second order accurate. In contrast to the unsplit fractional-step-θ-scheme the stability analysis of this time
integration scheme is an open problem. In our experience, however, the stability restrictions are much less
restrictive than those of a comparable IMEX schemes.
3.3.1. Sub-steps in different spaces.
Initially, we stated that we want to avoid solving linear systems involving convection, for efficiency
reasons. This seems to be contradictory to what is formulated in (38b). Nevertheless, as only convection is
involved implicitly an efficient numerical solution is still possible. We apply a simple iterative scheme which
only involves explicit operator evaluations of the convection to do so. We explain this in section 3.3.2. To
do this efficiently, we want Step 2 to be formulated in the space Vh while Step 1 and 3 are to be formulated
in the space (Uh , Qh ). This poses problems the solution of which we discuss in this section.
In Step 1 and Step 3 the adjustments are obvious: Step 1 only depends on initial data in Uh . The
initial data for Step 3 is in Vh but appears only in terms of functionals (Mv and Cv) such that the transfer
operations are clear. Step 2 is more involved, cf. remark 8. Functionals in Uh0 (such as Au) are in general
not functionals in Vh0 . We use the first equation in (38a) to formally define a different representation of the
functionals required in Step 2:
θ∆t gn1 = −θ∆t(Aun1 + Dpn1 ) = M(un1 − un0 ) + θ∆tCun0
(39)
Now we replace M and C with operations suitable for a setting in Vh :
RNV 3 gn1 :=
1
MU,V (un1 − un0 ) + θ∆tCV (un0 )Iun0
θ∆t
We arrive at the modified fractional-step-θ-scheme:
(MU+ θ∆tA)un1 + θ∆tD pn1
Step 1 :
DT un1
Step 2 : (MV + θ∗ ∆tCV (tn2 )vn2
(MU+ θ∆tA)un3 + θ∆tD pn3
Step 3 :
DT un3
(40)
= MU un0 − θ∆t IT CV (un0 ) I un0
=0
(41a)
= MU,Vun1 − θ∗ ∆tgn1
(41b)
V,U
=M
=0
n2
T
V
n2
v − θ∆t I C (t )v
n2
(41c)
where we replaced the generic operators M, C with suitable ones. We recall the definition of the extrapolated
convection operator CV (tn2 ) := CV (ú(tn2 )) the convection velocity of which is (linearly) extrapolated from
exactly divergence-free velocities.
3.3.2. Iterative solution of the implicit convection problem.
In (41b) we need to solve a problem of the form
v + τ ∗ (MV )−1 CV v = g∗
14
(42)
for given τ ∗ , g∗ and constant convection CV . We do this by means of a pseudo time-stepping method, i.e.
we formulate (42) as the stationary solution to
∂
v(s) + v(s) + τ ∗ CV v(s) = g∗ ,
∂s
s ∈ [0, ∞).
(43)
Note that a stationary solution exists as Id + τ ∗ CV only has eigenvalues λ, with Re(λ) > 1. This stationary
solution is approximated with a few explicit Euler time step with an artificial time step size ∆s.
vi+1 = vi + ∆s(g∗ − vi + τ ∗ (MV )−1 CV vi ).
(44)
This procedure can be interpreted as a Richardson iteration applied to (42). With a time step size which is
tailored for stability (as in the numerical solution to (37)) we iterate (44) until the initial residual is reduced
by a prescribed factor. To solve the convection step, Step 2, we only require operator evaluations for the
convection. The time step size ∆s in this iteration is decoupled from the time step size ∆t used of the
overall scheme.
4. Numerical examples
In this section we consider different test problems which essentially purpose three different goals:
1. The validation of convergence properties of the HDG method with and without the projected jumps.
2. The investigation and quantification of the dependency of the sparsity pattern of arising linear systems
on the choice of the discrete velocity spaces.
3. The evaluation of the performance of the space and time discretization on benchmark problem.
The examples in section 4.1 and section 4.2 aim at goal 1 and are two-dimensional test cases with known
exact solutions for a stationary Stokes and Navier-Stokes problem, respectively. These cases allow for a
thorough investigation of the convergence history of the proposed spatial discretizations in the usual norms.
The test case in section 4.3 aims at goal 2 and is concerned with the impact of the choice of discretization
spaces on the complexity of linear systems. For this purpose, a three-dimensional vector-valued Poisson
problem is considered using different H(div)-conforming DG and HDG spaces. The impact of hybridization
and the improvement due to the projected jumps modification is compared to other DG methods. Finally,
we approach goal 3 by considering two challenging transient benchmark problems in sections 4.4 and 4.5.
The benchmark problems have been defined within the DFG Priority Research Programm ’Flow Simulation
on High Performance Computers’ and are formulated in [58]. In section 4.4 a two-dimensional benchmark
problem is considered to demonstrate the accuracy of our method for a demanding test case and to compare
the discussed time integration methods. Finally, in section 4.5 we discuss a three-dimensional, and hence
computationally demanding, benchmark problem from [58]. We compare accuracy and run-time performance
to the data of the studies in [58, 59, 60].
The methods discussed in this paper have been implemented in the add-on package ngsflow [61] for the
high order finite element library NGSolve [62]. The computations in this section have also been carried out
with this software. Throughout this section we only consider direct solvers and comment on linear solvers
below, in remark 12.
For the computations of the benchmark problem in sections 4.4 and 4.5 we used the reduced H(div)conforming space Whred , cf. remark 1 and the projected jumps modification, cf. section 2.2.
4.1. Stokes flow around obstacle
We consider the Stokes problem in the domain Ω = [−2, 2]2 \ Ω− with the circular obstacle Ω− :=
{kxk ≤ 1} and viscosity ν = 1. On the whole boundary except for the outflow boundary {x = 2} we
prescribe Dirichlet boundary conditions, on {x = 2} we prescribe Neumann-kind boundary conditions such
1
that the solution to the problem is given by u = (∂y Ψ, −∂x Ψ) with the potential Ψ = y(1 − x2 +y
2 ). Note
−
that Ψ|∂Ω− is constant so that u · n = ∇Ψ × n = 0. On ∂Ω we have u · n = 0, but u 6= 0, i.e. we have a
slip on the obstacle. Further we have that p = 0 in Ω.
15
k∇(u − uh )kL2 (Ω)
ku − uh kL2 (Ω)
kp − ph kL2 (Ω)
100
10−1
10−2
10−2
10−4
10−4
10−6
10
10−3
k=1
k=2
k=3
k=4
k=5
−8
10−10
1
2
10−6
O(h6 )
3
refinement level
10−8
4
5
10−5
k=1
k=2
k=3
k=4
k=5
1
2
k=1
k=2
k=3
k=4
k=5
10−7
O(h5 )
10
3
refinement level
4
5
−9
1
2
O(h5 )
3
4
5
refinement level
Figure 2: Convergence of divergence-conforming HDG method with (solid) and without (dotted) projected jumps in different
norms for the example in section 4.1. The dotted lines in gray correspond to the HDG method without projected jumps, the
solid lines in color correspond to the HDG method with projected jumps. Except for the error in the pressure the results are
hardly distinguishable.
On an initially coarse unstructured grid with only 72 triangles we obtain the results displayed in Figure
2 after succesive uniform mesh refinements. We compare the exact solution u, p and the computed solution
uh , ph and investigate the convergence of the error in the norms ku − uh kL2 (Ω) , k∇(u − uh )kL2 (Ω) and
kp − ph kL2 (Ω) . We consider the discretization with and without the projected jumps modification. In all
norms we observe optimal order convergence, i.e. ku − uh kL2 (Ω) = O(hk+1 ), k∇(u − uh )kL2 (Ω) = O(hk ) and
kp − ph kL2 (Ω) = O(hk ) where k is the order of the velocity field inside the elements. Note that after static
condensation the remaining degrees of freedoms are the unknowns corresponding to order k polynomials
for the tangential and order k polynomials for the normal component on the facets and one constant per
element for the pressure. For the projected jumps formulation the tangential unknowns are reduced by one
order. The difference between the error of both formulations — with and without projected jumps — is only
marginal in the velocity. In the pressure field we observe a difference between the methods, however both
converge with optimal order and the difference decreases for increasing polynomial degree k. For the impact
of the projected jumps modification concerning the computational effort, we refer to section 4.3 where this
aspect is discussed in more detail.
4.2. Kovasznay flow
As a test case for the stationary Navier-Stokes equations, we consider the famous example by [63]. On
the boundary of the domain Ω = [− 12 , 32 ] × [0, 2] we again prescribe inhomogeneous Dirichlet data, so that
the exact solution to the Navier-Stokes equations (with ν = 1) is
1
1 − eλx cos(2πy)
u(x, y) =
, p(x, y) = − e2λx + p̄ with p̄ ∈ R
λ λx
sin(2πy)
2
2π e
R
2
Here, λ = ν −1 +√−8π
and p̄ so that Ω p dx = 0.
ν −2 +64π 2
To approximate the stationary solution we initially solve the Stokes problem corresponding to the boundary data and use the simple IMEX scheme of first order, cf. (33), to progress to t = 1000 with 50 time steps
of size ∆t = 20. This choice of time discretization parameters gives stable solutions for all considered spatial
discretizations but at the same time provides time discretization errors which are neglegible compared to
the spatial errors. On an initally coarse unstructured grid with only 18 triangles we obtain the results
displayed in Figure 3 after succesive uniform mesh refinements. We observe that the errors converge optimal
in the considered norms for the pressure and the velocity. Further, we observe that the difference between
the results obtained with and without the projected jumps formulation, e.g. with and without a reduction
16
k∇(u − uh )kL2 (Ω)
ku − uh kL2 (Ω)
kp − ph kL2 (Ω)
100
101
101
10−2
10−1
10−1
10−4
10
10−3
k=1
k=2
k=3
k=4
k=5
k=6
−6
10−8
10−10
1
2
k=1
k=2
k=3
k=4
k=5
k=6
10−5
O(h7 )
10−7
3
refinement level
4
5
1
2
k=1
k=2
k=3
k=4
k=5
k=6
10−3
10−5
O(h6 )
10−7
3
4
5
refinement level
1
2
O(h6 )
3
4
5
refinement level
Figure 3: Convergence of divergence-conforming HDG method with (solid) and without (dotted) projected jumps in different
norms for the example in section 4.2. The results are almost identical.
of the degrees of freedoms at the facets, is again only marginal. In fact one only observes a (very small)
difference in the case k = 1.
4.3. Linear systems - A comparison between DG and HDG methods
We consider the comparably simple vector-valued Poisson problem
− ∆u = f in Ω,
u = 0 on ∂Ω,
(45)
discretized with four different methods. The three-dimensional domain Ω is the same as the one in section 4.5
with an unstructured tetrahedral mesh consisting of 3487 elements. The problem (45) leads to discretizations
with symmetric positive definite matrices A. Only the lower triangular part of the sparse matrix has to be
stored and a sparse Cholesky factorization algorithm can be used. In this comparison, we used the sparse
direct solver PARDISO, cf. [64, 65]. We are only concerned with the sparsity pattern of different methods
before and after static condensation and do not compare accuracy or conditioning of the discretizations.
Moreover, for the sake of simplicity we do not apply the reduction of the space Wh as discussed in remark 1.
The following quantities of interest for the linear systems arising from discretizations of (45) are displayed in
#dof[K] : number of unknowns (in thousands)
#cdof[K] : number of unknowns after static condensation (in thousands)
Table 2:
#nzeA[K] : number of non-zero entries in the system matrix A (lower triangle) (in thousands)
#nzeL[K] : number of non-zero entries in the Cholesky factor L (in thousands)
Four different methods are considered on Wh or Uh with varying polynomial degree between k = 1 and
k = 6:
1. HDG: The HDG method proposed in section 2 without projected jumps.
2. PHDG: The HDG method with projected jumps, cf. section 2.2.
3. Std.DG.: A standard DG method using the space Wh where the basis is constructed such that all
degrees of freedom from one element couple with all degrees of freedom from adjacent elements.
4. N.DG: A nodal DG method using the space Wh where basis functions are assumed to be constructed
such that degrees of freedom associated to one element couple only with degrees of freedom from
adjacent elements which have support on the shared facet. At the same time we assume that basis
functions are constructed such that the number of basis functions with support on a facets is minimized,
cf. [11]. In terms of the sparsity pattern this nodal DG method represents the best case for a DG
method without hybridization.
17
Std.DG
N.DG
HDG PHDG
Std.DG
k=1
#dof[K]
#cdof[K]
#nzeA[K]
#nzeL[K]
23
23
732
10 113
23
23
676
10 208
69
69
2 037
17 768
146
146
21 686
261 977
146
146
16 051
260 416
#dof[K]
#cdof[K]
#nzeA[K]
#nzeL[K]
453
453
184 035
2 099 690
453
411
101 473
1 741 072
298
229
22 443
194 524
38
38
637
5 569
67
67
5 073
64 463
PHDG
158
137
8 103
70 138
112
91
3 628
31 415
500
343
50 412
435 129
423
267
30 588
264 183
67
67
4 177
69 831
k=4
237
168
12 124
104 496
271
271
69 525
814 168
271
261
46 912
731 253
681
389
64 816
557 798
702
702
424 764
4 752 072
702
597
200 813
3 519 061
k=5
773
480
98 696
847 913
HDG
k=2
k=3
#dof[K]
#cdof[K]
#nzeA[K]
#nzeL[K]
N.DG
k=6
1 128
640
175 321
1 502 558
1 022
533
121 944
1 045 444
Table 2: Comparison of different DG methods for the vector-valued reaction Poisson problem (45).
In Table 2 we observe that for small polynomial degree k the amount of additional unknowns required for
the HDG formulation is quite large as are the nonzero entries in the system matrix. Nevertheless except
for k = 1, the number of nonzero entries in the Cholesky factor are comparable (k = 2) to the Standard
DG methods or less (k > 2). For high order, i.e. k ≥ 4 the HDG method performs significantly better as it
has less nonzero entries in A and L. The HDG space with the projected jumps modification improves the
situation dramatically. It essentially compensates the overhead of the HDG method for small k. But even
for k = 6 the effect is still significant. We note, that the difference between the first three methods increases
for increasing polynomial degree k whereas the difference between the last two method, PHDG and HDG,
decreases. In all cases the HDG method with projected jumps outperforms all alternatives.
4.4. A two-dimensional benchmark problem
In this section we consider the benchmark problem denoted as “2D-2Z” in [58] where a laminar flow
around a circle-shaped obstacle is considered. The Reynolds number is moderately high (Re = 100) and
results in a periodic vortex street behind the obstacle. We briefly introduce the problem (for more details
we refer to [58]) and the numerical setup to investigate spatial and temporal discretization errors. Finally,
we discuss the obtained results.
4.4.1. Geometrical setup and boundary conditions.
The domain is a rectangular channel without an almost vertically centered circular obstacle, cf. Figure
4,
Ω := [0, 2.2]×[0, 0.41] \ {kx − (0.2, 0.2)k2 ≤ 0.05}.
(46)
The boundary is decomposed into Γin := {x = 0}, the inflow boundary, Γout := {x = 2.2}, the outflow
boundary and ΓW := ∂Ω\(Γin ∪Γout ), the wall boundary. On Γout we prescribe natural boundary conditions
(−ν∇u + pI) · n = 0, on ΓW homogeneous Dirichlet boundary conditions for the velocity and on Γin the
inflow Dirichlet boundary conditions
u(0, y, t) = uD = (3/2 · ū) · 4 · y(dy − y)/d2y · (1, 0, 0).
Here, ū = 1 and the viscosity is fixed to ν = 10−3 which results in a Reynolds number Re = 100.
4.4.2. Drag and Lift.
The quantities of interest in this example are the (maximal and minimal) drag and lift forces cD , cL that
act on the disc. These are defined as
Z
Z
1
∂u
1
∂u
cD := 2
ν
− pn · ex ds,
cL := 2
ν
− pn · ey ds.
ū r Γ◦
∂n
ū r Γ◦
∂n
18
Here ex , ey denote the unit vectors in x and y direction, r = 0.05 is the radius of the obstacle, ū is the
average inflow velocity (ū = 1) and Γ◦ denotes the surface of the obstacle.
4.4.3. Numerical setup.
We use an unstructured triangular grid with an additional layer of quadrilaterals around the disk which
is anisotropically refined towards the disk once. In Figure 4 the geometry, the mesh and a typical solution
is depicted.
2
0
Figure 4: Sketch of the mesh and the solution (color coding corresponding to velocity magnitude kuk2 ) to the problem considered
in section 4.4 at a fixed time t (left) and zoom-in on the boundary layer mesh (right).
In order to be able to neglect time discretization errors, when investigating the spatial accuracy, we
consider the use of a well-known stiffly accurate second order Runge-Kutta-IMEX scheme, taken from [45,
section 2.6], with an extremely small time step size 3.125 · 10−5 which means that roughly 10000 time steps
are used to resolve one full period. The duration of one full cycle is roughly 1/3s. We also fix the mesh and
consider a pure p-refinement, i.e. variations of the polynomial degree k.
For the investigations of the temporal discretization error, we consider a fixed polynomial degree k = 6,
with the same mesh. For the considered example the stability restriction of the second order IMEX scheme is
severe. A time step of below 10−3 has to be considered. The intention of the discussion of operator-splitting
methods in section 3 has been to present strategies to circumvent or relax these severe conditions. We
compare the performance of a product decomposition method, a second order operator-integration-factor
splitting version of the BDF2 method, and the modified fractional-step-θ-scheme discussed in section 3.3.
Note that these methods allows to consider much larger time steps than the IMEX scheme. As references
we give the values from the literature [66] and from the IMEX scheme with ∆t = 10−3 (stability limit) and
the reference solution with ∆t = 3.125 · 10−5 .
4.4.4. Numerical results: spatial discretization.
In Table 3 the quantities of interest are shown for varying polynomial degree k. As a reference we also
show the result obtained by FEATFLOW [67] with a discretization using quadrilateral meshes and continuous
second order finite elements for the velocity with a discontinuous piecewise linear pressure (Q2 /P1disc ). These
results have been made accessible on [66]. We observe a rapid convergence for the p-refinement, i.e. the
#dof
k
k
k
k
k
k
=1
=2
=3
=4
=5
=6
ref. [66]
max cD
min cD
max cL
min cL
211
148
558
441
797
626
2.52594
3.22841
3.23184
3.22714
3.22759
3.22757
2.47871
3.16260
3.16842
3.16401
3.16432
3.16430
0.65728
1.00571
0.98822
0.98431
0.98578
0.98580
-0.81672
-1.03894
-1.02427
-1.01906
-1.02053
-1.02053
167 232
667 264
3.22662
3.22711
3.16351
3.16426
0.98620
0.98658
-1.02093
-1.02129
2
4
6
9
12
16
Table 3: Accuracy of the spatial discretization: results for different polynomial degrees.
increase of the polynomial degree. Compared to the results from the literature [66] the same order of
accuracy is achieved with a lot less degrees of freedoms.
19
4.4.5. Numerical results: temporal discretization.
The results for the temporal discretization are shown in Table 4. First of all, we observe that the second
order IMEX scheme is already very accurate at its stability limit. But the method does not allow to choose
larger time steps. This is in contrast to the alternative methods discussed here. For these methods we
can consider much large time steps and observe a second order convergence. In this example the product
decomposition method is more accurate than the modified fractional step method by one (time) level. We
note that one major concern with this method is however, that splitting errors appear also if a stationary to
the flow problem exists. This is not the case for additive decomposition methods or the proposed modified
fractional step method.
2nd order IMEX
operator-integrationfactor splitting
(BDF2)
modified fractionalstep-θ-scheme
1/∆t
max cD
min cD
max cL
min cL
<1 000
1 000
32 000
3.22754
3.22757
unstable
3.16437 0.98486
3.16431 0.98580
-1.01957
-1.02053
125
250
500
1 000
3.38456
3.25564
3.23239
3.22819
3.28279
3.18643
3.16836
3.16394
1.16052
1.01725
0.98864
0.98320
-1.19939
-1.05276
-1.02378
-1.02013
125
250
500
1 000
3.38272
3.28713
3.25036
3.23656
3.29673
3.21483
3.18127
3.17094
1.07667
1.00937
0.99172
0.98721
-1.12227
-1.04840
-1.02807
-1.02227
Table 4: Accuracy of operator-splitting time integration methods
4.5. A three-dimensional benchmark problem
Finally, we consider a three dimensional benchmark problem, the problem “3D-3Z” in [58]. In contrast
to the problem in section 4.4 the inflow velocity is varied over time and the observed time interval is fixed.
The maximal Reynolds number in this configuration is also Re = 100 as in the previous section. The focus
in this section is on the study of performance in the sense of computational effort over accuracy.
4.5.1. Geometrical setup and boundary conditions.
The geometrical setup is a generalization of the problem in the previous section. A cylindrical-shaped
obstacle is places in a cuboid-shaped channel slightly above the vertical center:
Ω := [0, 2.5]×[0, 0.41] ×[0, 0.41] \ {k(x1 , x2 ) − (0.5, 0.2)k2 ≤ 0.05}.
(47)
Boundary conditions are chosen as in the previous example except for a change to unsteady inflow boundary
conditions:
u(0, y, z, t) = uD (t) = (9/4 · ū(t)) · 16 · y(dy −y)/d2y · z(dz −z)/d2z · (1, 0, 0),
with ū(t) the average inflow velocity which is time-dependent, ū(t) = sin(πt/8). The considered time interval
is [0, 8s], the viscosity is set to ν = 10−3 s.t. the Reynolds number varies between Re = 0 and Re = 100.
4.5.2. Drag and Lift.
Again, the quantities of interest in this example are the (maximal and minimal) drag and lift forces cD ,
cL that act on the disc. These are defined as
Z
Z
∂u
1
∂u
1
ν
− pn · ex ds
cL := 2
ν
− pn · ey ds
cD := 2
ūmax rh Γ◦
∂n
ūmax rh Γ◦
∂n
with ūmax = maxt∈[0,8] ū(t) = 1, r = 0.05, h = 0.41 and Γ◦ the surface of the obstacle.
20
Figure 5: Used mesh (left) and solution at t = 0.4 (right) for the benchmark problem in section 4.5.
4.5.3. Numerical setup.
We use an unstructured tetrahedral mesh consisting of 5922 elements, cf. Figure 5. For the time
discretization we use the modified fractional-step-θ-scheme discussed in section 3.3. To compensate for the
increase in the spatial accuracy for increasing polynomial degree k, we adapt the number of time steps
accordingly. The computations were carried out on a shared-memory computer with 24 cores. We comment
on details of the computing times in remark 11.
k
k
k
k
=2
=3
=4
=5
#ndof [K]
max cD
max cL
min cL
169
343
595
939
3.43046
3.29331
3.29853
3.29798
0.00262
0.00277
0.00278
0.00278
-0.016289
-0.011099
-0.010762
-0.011054
0.0080
0.0080
0.0040
0.0040
0.0028
0.0028
-0.010992
-0.010999
0.01
0.005
ref. [59]
11 432
89 760
3.2963
3.2978
ref. [60]
7 036
3.2968
ref. [58]
[3.2,3.3]
∆t [s]
comp. time [s]
492
964
3 087
6 670
×
×
×
×
24
24
24
24
35 550 × 24
214 473 × 48
-0.011
[0.002,0.004]
Table 5: Numerical results for the benchmark problem “3D3Z” in [58]. Results obtained with different polynomial degrees and
reference values.
4.5.4. Numerical results.
In Table 5 the results obtained are compared with the literature in terms of accuracy and computing
time. We observe that we can achieve the same level of accuracy as the results in [59] (and [60]) with a
computing time which is dramatically smaller. We note that the computing time per degree of freedom is
actually worse than in [59]. Nevertheless, the same accuracy is achieved with much less degrees of freedoms
using the high order method (k > 2), s.t. our computations exceed the performance results in the literature.
In the study [59] one of the conclusions is that their third order method (Q2 /P1disc ) is much more efficient
compared to lower order methods. We extend this conclusion in the sense that the use of even higher order
discretizations, i.e. k > 2, increases efficiency even further. Moreover, high order discretizations can be
implemented efficiently. One important component for the efficient handling of the Navier-Stokes equations
with our high order discretization is the time integration using operator-splitting.
Remark 11 (Computation times). We remark on the computation for the case k = 5. In that computation approximately 65% of the computing time has been spend on the solution of linear systems for Stokes-type
problems, 30% on convection operator evaluations and 5% on the setup and remaining operations. To solve
the implicit convection problem (Step 2 in (41)) an average of 20 iterations has been applied.
Remark 12 (Linear systems). In the test cases in this section we only applied direct solvers which is
possible due to the (comparably) small size of the arising linear systems. For problems with increasing
21
complexity efficient linear solvers are mandatory. The development of suitable preconditioners of the Stokes
problem is based on efficient preconditioning of the bilinear form Ah . For the scalar problem we could
show poly-logarithmic bounds in k for the condition number of standard p-version domain decomposition
preconditioners, cf. [52]. We plan to investigate suitable generalizations of this preconditioner for the Stokes
problem in the future.
5. Conclusion
We presented and discussed a combined DG/HDG discretization tailored for efficiency. We summarize
the core components. We split the Navier-Stokes problem into linear Stokes-type problems and hyperbolic
transport problems by means of operator-splitting time integration. For the Stokes-type problem we use an
H(div)-conforming Hybrid DG formulation with a new modification: the projected jumps formulation. The
Hybrid DG formulation facilitates the efficient solution of linear systems compared to other DG methods.
The projected jumps formulation improves its efficiency even more. For the hyperbolic transport problem we
apply a standard DG formulation. In numerical test cases we demonstrated the performance of the method.
Acknowledgements
The authors greatly appreciate the contribution of Philip Lederer related to the calculation of LBBconstants, cf. remark 4.
References
[1] Reed WH, Hill T. Triangular mesh methods for the neutron transport equation. Los Alamos Report LA-UR-73-479 1973;
.
[2] Lesaint P, Raviart PA. On a finite element method for solving the neutron transport equation. Mathematical aspects of
finite elements in partial differential equations 1974; 33:89–123.
[3] Johnson C, Pitkäranta J. An analysis of the discontinuous Galerkin method for a scalar hyperbolic equation. Mathematics
of computation 1986; 46(173):1–26.
[4] Bassi F, Rebay S. High-order accurate discontinuous finite element solution of the 2D Euler equations. Journal of computational physics 1997; 138(2):251–285.
[5] Bassi F, Rebay S, Mariotti G, Pedinotti S, Savini M. A high-order accurate discontinuous finite element method for
inviscid and viscous turbomachinery flows. Proceedings of 2nd European Conference on Turbomachinery, Fluid Dynamics
and Thermodynamics, Technologisch Instituut, Antwerpen, Belgium, 1997; 99–108.
[6] Cockburn B, Shu CW. The Runge–Kutta discontinuous Galerkin method for conservation laws V: multidimensional
systems. Journal of Computational Physics 1998; 141(2):199–224.
[7] Arnold DN, Brezzi F, Cockburn B, Marini LD. Unified analysis of discontinuous Galerkin methods for elliptic problems.
SIAM journal on numerical analysis 2002; 39(5):1749–1779.
[8] Houston P, Schwab C, Süli E. Discontinuous hp-finite element methods for advection-diffusion-reaction problems. SIAM
Journal on Numerical Analysis 2002; 39(6):2133–2163.
[9] Rivière B. Discontinuous Galerkin methods for solving elliptic and parabolic equations: theory and implementation. Society
for Industrial and Applied Mathematics, 2008.
[10] Di Pietro DA, Ern A. Mathematical Aspects of Discontinuous Galerkin Methods, vol. 69. Springer Science & Business
Media, 2012.
[11] Hesthaven JS, Warburton T. Nodal discontinuous Galerkin methods: algorithms, analysis, and applications. Springer
Science & Business Media, 2007.
[12] Karniadakis G, Sherwin S. Spectral/hp element methods for computational fluid dynamics. Oxford University Press, 2013.
[13] Girault V, Raviart PA. Finite element methods for Navier-Stokes equations: theory and algorithms, vol. 5. Springer
Science & Business Media, 2012.
[14] Elman HC, Silvester DJ, Wathen AJ. Finite elements and fast iterative solvers: with applications in incompressible fluid
dynamics. Oxford University Press, 2014.
[15] Donea J, Huerta A. Finite element methods for flow problems. John Wiley & Sons, 2003.
[16] Toselli A. hp discontinuous Galerkin approximations for the Stokes problem. Mathematical Models and Methods in Applied
Sciences 2002; 12(11):1565–1597.
[17] Schötzau D, Schwab C, Toselli A. Mixed hp-DGFEM for incompressible flows. SIAM Journal on Numerical Analysis 2002;
40(6):2171–2194.
[18] Girault V, Rivière B, Wheeler M. A discontinuous Galerkin method with nonoverlapping domain decomposition for the
Stokes and Navier-Stokes problems. Mathematics of Computation 2005; 74(249):53–84.
22
[19] Cockburn B, Kanschat G, Schötzau D. A locally conservative LDG method for the incompressible Navier-Stokes equations.
Mathematics of Computation 2005; 74(251):1067–1095.
[20] Cockburn B, Kanschat G, Schötzau D. A note on discontinuous Galerkin divergence-free solutions of the Navier–Stokes
equations. Journal of Scientific Computing 2007; 31(1-2):61–73.
[21] Brezzi F, Fortin M. Mixed and hybrid finite element methods, vol. 15. Springer Science & Business Media, 2012.
[22] Lehrenfeld C. Hybrid discontinuous Galerkin methods for solving incompressible flow problems. Rheinisch-Westfalischen
Technischen Hochschule Aachen 2010; .
[23] Egger H, Schöberl J. A hybrid mixed discontinuous Galerkin method for convection–diffusion problems. J. Numer. Anal
2008; .
[24] Nguyen NC, Peraire J, Cockburn B. An implicit high-order hybridizable discontinuous Galerkin method for linear
convection–diffusion equations. Journal of Computational Physics 2009; 228(9):3232–3254.
[25] Cockburn B, Gopalakrishnan J, Lazarov R. Unified hybridization of discontinuous Galerkin, mixed, and continuous
Galerkin methods for second order elliptic problems. SIAM Journal on Numerical Analysis 2009; 47(2):1319–1365.
[26] Cockburn B, Gopalakrishnan J, Nguyen N, Peraire J, Sayas FJ. Analysis of HDG methods for Stokes flow. Mathematics
of Computation 2011; 80(274):723–760.
[27] Cesmelioglu A, Cockburn B, Nguyen NC, Peraire J. Analysis of HDG methods for Oseen equations. Journal of Scientific
Computing 2013; 55(2):392–431.
[28] Zhai Q, Zhang R, Wang X. A hybridized weak Galerkin finite element scheme for the Stokes equations. Science China
Mathematics 2015; :1–18.
[29] Pietro DAD, Ern A, Lemaire S. An arbitrary-order and compact-stencil discretization of diffusion on general meshes based
on local reconstruction operators. Comp. Meth. Appl. Math. 2014; 14(4):461–472.
[30] Di Pietro D, Ern A, Lemaire S. A review of hybrid high-order methods: formulations, computational aspects, comparison
with other methods. Technical Report HAL-01163569 September 2015.
[31] Cockburn B, Pietro DD, Ern A. Bridging the hybrid high-order and hybridizable discontinuous galerkin methods. Technical
Report HAL-01115318 July 2015.
[32] Egger H, Waluga C. hp analysis of a hybrid DG method for Stokes flow. IMA Journal of Numerical Analysis 2012; :drs018.
[33] Nguyen N, Peraire J, Cockburn B. A hybridizable discontinuous Galerkin method for Stokes flow. Computer Methods in
Applied Mechanics and Engineering 2010; 199(9):582–597.
[34] Carrero J, Cockburn B, Schötzau D. Hybridized globally divergence-free LDG methods. part i: The Stokes problem.
Mathematics of computation 2006; 75(254):533–563.
[35] Cockburn B, Gopalakrishnan J. Incompressible finite elements via hybridization. part i: The Stokes system in two space
dimensions. SIAM Journal on Numerical Analysis 2005; 43(4):1627–1650.
[36] Cockburn B, Gopalakrishnan J. Incompressible finite elements via hybridization. part ii: The Stokes system in three space
dimensions. SIAM Journal on Numerical Analysis 2005; 43(4):1651–1672.
[37] Könnö J, Stenberg R. Numerical computations with H(div)-finite elements for the Brinkman problem. Computational
Geosciences 2012; 16(1):139–158.
[38] Qiu W, Shi K. An HDG method for linear elasticity with strong symmetric stresses. arXiv preprint arXiv:1312.1407 2013;
.
[39] Oikawa I. A hybridized discontinuous Galerkin method with reduced stabilization. Journal of Scientific Computing 2014;
:1–14.
[40] Oikawa I. A reduced HDG method for the Stokes equations. arXiv preprint arXiv:1502.01833 2015; .
[41] Qiu W, Shi K. A superconvergent HDG method for the incompressible Navier-Stokes equations on general polyhedral
meshes. CoRR 2015; abs/1506.07543.
[42] Kirby RM, Sherwin SJ, Cockburn B. To CG or to HDG: a comparative study. Journal of Scientific Computing 2012;
51(1):183–212.
[43] Huerta A, Angeloski A, Roca X, Peraire J. Efficiency of high-order elements for continuous and discontinuous Galerkin
methods. International Journal for Numerical Methods in Engineering 2013; 96(9):529–560.
[44] Ascher UM, Ruuth SJ, Wetton BT. Implicit-explicit methods for time-dependent partial differential equations. SIAM
Journal on Numerical Analysis 1995; 32(3):797–823.
[45] Ascher UM, Ruuth SJ, Spiteri RJ. Implicit-explicit Runge-Kutta methods for time-dependent partial differential equations.
Applied Numerical Mathematics 1997; 25(2):151–167.
[46] Kanevsky A, Carpenter MH, Gottlieb D, Hesthaven JS. Application of implicit–explicit high order Runge–Kutta methods
to discontinuous-Galerkin schemes. Journal of Computational Physics 2007; 225(2):1753–1781.
[47] Strang G. On the construction and comparison of difference schemes. SIAM Journal on Numerical Analysis 1968; 5(3):506–
517.
[48] Maday Y, Patera AT, Rønquist EM. An operator-integration-factor splitting method for time-dependent problems: application to incompressible fluid flow. Journal of Scientific Computing 1990; 5(4):263–292.
[49] Chrispell J, Ervin V, Jenkins E. A fractional step θ-method for convection–diffusion problems. Journal of Mathematical
Analysis and Applications 2007; 333(1):204–218.
[50] Zaglmayr S. High order finite element methods for electromagnetic field computation. PhD Thesis, JKU Linz 2006.
[51] Arnold DN. An interior penalty finite element method with discontinuous elements. SIAM Journal on Numerical Analysis
1982; 19(4):742–760.
[52] Schöberl J, Lehrenfeld C. Domain decomposition preconditioning for high order hybrid discontinuous Galerkin methods
on tetrahedral meshes. Advanced finite element methods and applications. Springer, 2013; 27–56.
[53] Brezzi F, Manzini G, Marini D, Pietra P, Russo A. Discontinuous finite elements for diffusion problems. Atti Convegno in
23
onore di F. Brioschi (Milano 1997), Istituto Lombardo, Accademia di Scienze e Lettere 1999; :197–217.
[54] Linke A. On the role of the Helmholtz decomposition in mixed methods for incompressible flows and a new variational
crime. Computer Methods in Applied Mechanics and Engineering 2014; 268:782–800.
[55] Dubiner M. Spectral methods on triangles and other domains. Journal of Scientific Computing 1991; 6(4):345–390.
[56] Glowinski R. Finite element methods for incompressible viscous flow. Handbook of numerical analysis 2003; 9:3–1176.
[57] Chorin AJ. The numerical solution of the Navier-Stokes equations for an incompressible fluid. Bulletin of the American
Mathematical Society 1967; 73(6):928–931.
[58] Schäfer M, Turek S, Durst F, Krause E, Rannacher R. Benchmark computations of laminar flow around a cylinder. Flow
simulation with high-performance computers II 1996; :547–566.
[59] Bayraktar E, Mierka O, Turek S. Benchmark computations of 3D laminar flow around a cylinder with CFX, OpenFOAM
and FeatFlow. International Journal of Computational Science and Engineering 2012; 7(3):253–266.
[60] John V. On the efficiency of linearization schemes and coupled multigrid methods in the simulation of a 3d flow around a
cylinder. International Journal for Numerical Methods in Fluids 2006; 50(7):845–862.
[61] ngsflow: Flow solver package for NGSolve. www.sourceforge.net/projects/ngsflow/.
[62] Schöberl J. C++11 implementation of finite elements in NGSolve. Technical Report ASC-2014-30, Institute for Analysis and Scientific Computing September 2014. URL http://www.asc.tuwien.ac.at/~schoeberl/wiki/publications/
ngs-cpp11.pdf.
[63] Kovasznay L. Laminar flow behind a two-dimensional grid. Mathematical Proceedings of the Cambridge Philosophical
Society, vol. 44, Cambridge Univ Press, 1948; 58–62.
[64] PARDISO Solver project. www.pardiso-project.org.
[65] Schenk O, Gärtner K. Solving unsymmetric sparse systems of linear equations with PARDISO. J. of Future Generation
Computer Systems 2004; 20:475–487.
[66] FEATFLOW Finite element software for the incompressible Navier-Stokes equations. www.featflow.de.
[67] Turek S, Becker C. FEATFLOW: Finite element software for the incompressible Navier-Stokes equations, User Manual
Release 1.1. Preprint, Heidelberg 1998; 4.
24
| 5cs.CE
|
The Case for a Mixed-Initiative Collaborative Neuroevolution Approach
Sebastian Risi, Jinhong Zhang, Rasmus Taarnby, Peter Greve, Jan Piskur, Antonios Liapis, Julian Togelius
arXiv:1408.0998v1 [cs.NE] 5 Aug 2014
IT University Copenhagen, 2300 Copenhagen, Denmark
{sebr, jinh, reta, pgre, japi, anli, juto}@itu.dk
Abstract
It is clear that the current attempts at using algorithms to create artificial neural networks have had mixed success at best
when it comes to creating large networks and/or complex behavior. This should not be unexpected, as creating an artificial
brain is essentially a design problem. Human design ingenuity still surpasses computational design for most tasks in most
domains, including architecture, game design, and authoring
literary fiction. This leads us to ask which the best way is
to combine human and machine design capacities when it
comes to designing artificial brains. Both of them have their
strengths and weaknesses; for example, humans are much too
slow to manually specify thousands of neurons, let alone the
billions of neurons that go into a human brain, but on the other
hand they can rely on a vast repository of common-sense understanding and design heuristics that can help them perform
a much better guided search in design space than an algorithm. Therefore, in this paper we argue for a mixed-initiative
approach for collaborative online brain building and present
first results towards this goal.
With around 200 billion neurons and 125 trillion
synapses, the human brain is the most complex system
known to exist. The brain’s structural complexity, with intricate synaptic motifs that repeat throughout it, gives rise to
our unique mental abilities. Additionally, the brains plasticity allows us to learn new abilities throughout our life (e.g.
learning a new language) and to change our behavior based
on past experience.
Therefore, creating similar artificial structures by recapitulating the process that created intelligence on earth, is an
intriguing possibility. In this context, neuroevolution (i.e.
evolving artificial neural networks (ANNs) via evolutionary
algorithms) has shown promising results in a variety of different domains (Floreano et al., 2008; Stanley and Miikkulainen, 2004; Yao, 1999). However, these results still pale in
comparison to the capabilities of natural brains. The reasons
for this are manifold. Especially the problem of deceptive
fitness landscapes (i.e. mutations increase fitness but actually lead further away from the final objective) has limited
the scope of problems amenable to evolutionary algorithms.
Research in circumventing this problem has mainly focused on two different ideas. First, novelty search (Lehman
and Stanley, 2011), a method that rewards novel behaviors instead of rewarding objective performance, has shown
promise and significantly outperforms objective-based approaches in a variety of different domains. Other approaches
are based on interactive evolutionary computation (IEC)
methods, wherein the human user guides evolution by repeatedly choosing from a set of candidates. Woolley and
Stanley (2011) showed that interactive evolution can help to
discover artifacts which are very hard to evolve with traditional evolutionary approaches. Recently Woolley and Stanley (2014) combined IEC with novelty search, demonstrating that the approaches complement each other and together
address some of the challenges that each method struggles
with by itself (e.g. novelty search can get lost in large search
spaces, interactive evolution is limited by user fatigue). In
a related approach, Bongard and Hornby (2013) recently
demonstrated that human input and objective-based search
can also be combined synergistically to solve challenging
robotic domains.
While these human in the loop approaches have shown
promising results, we argue in this paper that they do not exploit the whole range of human intuition, ability to identify
promising stepping stones, or collaborative problem-solving
skills that could ultimately allow us to create more brain-like
artificial structures. For example, collaborative games like
Foldit hint at the power of crowdsourcing the human brain’s
natural abilities for specific tasks (e.g. pattern matching, spatial reasoning), which are hard to solve by computational approaches. However, in traditional IEC applications the role
of the user is often reduced to solely judging the created artifacts and only “nudging” evolution by deciding between a
discrete choice of candidates. In other words, only the computer creates content (e.g. images, ANNs, etc.) and the role
of the human is to guide evolution to content they prefer.
An approach that does require significantly more input
from the user is a mixed-initiative process (Liapis et al.,
2014), wherein both the computer and the human take turns
in creating content. Yet while mixed-initiative based approaches have shown promise in the context of procedurally
generated content for games (Liapis et al., 2013; Yannakakis
Figure 1: BrainCrafter Web Interface. Beta version online
at: braincrafter.dk
et al., 2014), they have not yet been applied to the evolution of large-scale ANNs for complex tasks. However, the
promise of such an approach is a system that can benefit
from the different skillsets of a human and a computational
creator. For example, while a human user might develop
an intuition about promising domain-dependent network topographies, a computational method is likely more effective
at fine-tuning specific synaptic weights. Therefore, we argue
for a collaborative mixed-initiative approach in which both
the computer and the collaborating human users can take initiative and propose changes to an evolving neural networks.
That is, at any point the human can revert to just doing selection and let the evolutionary algorithm serve up new content
to judge, or decide to jump in and have a more active role in
the design of the ANN.
Our recent work has taken steps towards this goal by focusing on two parallel lines of research. First, before introducing a mixed-initiative approach it is useful to determine
how good we as humans are at building complex ANNs for
certain tasks (without evolution) and if collaborating with
other users proves useful. Insights from this experiment
should in turn provide useful clues about the strengths of
human ANN design and most importantly, non-intuitive aspects of the design process we tend to struggle with (i.e.
aspects which would benefit most from an assisting computational creator). In this context we recently introduced
BrainCrafter (braincrafter.dk), which is an online application that allows the user to build ANNs for specific control programs (e.g. a robot that must traverse a maze) by
adding neurons and connections in a drag&drop like fashion (Figure 1). While building ANNs the users can observe
the resulting simulated robot behaviors in real-time, proving
insights into the effects of different network modifications.
BrainCrafter also allows users to collaborate by building on
high-scoring solutions created by other people.
While the ongoing BrainCrafter experiment should pro-
Figure 2: Picture CPPN-Compiler User Interface. Beta version online at: rasmustaarnby.dk/thesis
vide insights into our abilities to collaboratively construct
complex networks, more challenging domains will likely require the orchestrated effort of both human and computational creators. Therefore extending BrainCrafter to support the users’ collaborative engineering efforts through a
mixed-initiative approach is an important next goal. To allow seamlessly switching between interactive evolution and
manual ANN design will require an ANN representation that
(1) can be edited easily by the user on a local (e.g. individual
neurons) and global level (e.g. overall network topography
and topology), (2) is evolvable and compact, and (3) allows
the system to produce meaningful suggestions based on the
user’s input.
In this context we are building on the a generative encoding called compositional pattern producing networks
(CPPNs; Stanley (2007)) and the recently introduced concept of a CPPN-Compiler (Risi, 2013). CPPNs, which
are based on principles of how natural organisms develop,
allow the compact encoding of complex patterns, from
two-dimensional images (Secretan et al., 2011) and threedimensional forms (Clune and Lipson, 2011) to large-scale
ANNs (Stanley et al., 2009; Clune et al., 2011; Risi and
Stanley, 2012). The idea behind the CPPN-Compiler is to
allow the user to directly compile a high-level description
of the desired starting structure into the CPPN itself. We
are currently exploring the benefits of this approach through
the collaborative interactive evolution of images (Figure 2),
in which the user can draw a vector image and annotate
it with important regularities like symmetry. The CPPNCompiler then compiles this high-level description into the
CPPN itself. Since the compiled CPPN now directly embodies the annotated domain regularities (e.g. bilateral symmetric arms), the produced offspring show meaningful variations that nevertheless share common features. Considering the insight that CPPNs can also produce large-scale
ANNs (Stanley et al., 2009) and can be modified to create
Network
Editing
CPPN-Compiler
Synapse
Phenotype-toGenotype
Symmetry
x1 y1 x2
y2
CPPNRepresentation
ES-HyperNEAT
Neuron
GeneratehVariations
Floreano, D., Dürr, P., and Mattiussi, C. (2008). Neuroevolution:
from architectures to learning. Evol. Intelligence, 1(1):47–62.
Lehman, J. and Stanley, K. O. (2011). Abandoning objectives:
Evolution through the search for novelty alone. Evolutionary Computation, 19(2):189–223.
…
Liapis, A., Shaker, N., and Smith, G. (2014). Mixed-initiative approaches. In Shaker, N., Togelius, J., and Nelson, M. J., editors, Procedural Content Generation in Games: A Textbook
and an Overview of Current Research. Springer.
Task
Liapis, A., Yannakakis, G. N., and Togelius, J. (2013). Sentient sketchbook: Computer-aided game level authoring. In
Proceedings of ACM Conference on Foundations of Digital
Games (FDG).
InteractivehEvolution
Risi, S. (2013). A compiler for cppns: Transforming phenotypic
descriptions into genotypic representations. In 2013 AAAI
Fall Symposium Series.
Figure 3: Mixed-initiative Neuroevolution Framework
Risi, S. and Stanley, K. O. (2012). An enhanced hypercube-based
encoding for evolving the placement, density, and connectivity of neurons. Artificial Life, 18(4):331–363.
certain neural topologies (ES-HyperNEAT; Risi and Stanley (2012)), opens up the intriguing possibility of a neural
CPPN-Compiler. Our current efforts focus on such a compiler that will form the backbone for our mixed-initiative
BrainCrafter application.
The envisioned collaborative mixed-initiative system is
depicted in Figure 3. The users can collaboratively construct neural networks and annotate them with regularities
(e.g. symmetry, repetition, etc.), which are used by the computational creator to construct the internal CPPN model and
in turn propose meaningful variations to the user. At any
point in the process the human can revert to just doing selection or decide to directly edit the ANN, wherein phenotypic edits are directly compiled back into the genotype. The
promise of the proposed system is that it could allow a variety of tasks to be solved by many people online within a
mixed-initiative environment, which have heretofore proven
too difficult. We expect this project will profoundly impact
the fields of ANN research and potentially also deepen our
understanding of the way biological neural networks solve
certain problems.
Secretan, J., Beato, N., D’Ambrosio, D., Rodriguez, A., Campbell,
A., Folsom-Kovarik, J., and Stanley, K. (2011). Picbreeder: A
case study in collaborative evolutionary exploration of design
space. Evolutionary Computation, 19(3):373–403.
References
Bongard, J. C. and Hornby, G. S. (2013). Combining fitness-based
search and user modeling in evolutionary robotics. In Proceeding of the fifteenth annual conference on Genetic and
evolutionary computation conference, pages 159–166. ACM.
Clune, J. and Lipson, H. (2011). Evolving three-dimensional objects with a generative encoding inspired by developmental
biology. In Proceedings of the European Conference on Artificial Life, See http://EndlessForms. com.
Clune, J., Stanley, K. O., Pennock, R. T., and Ofria, C. (2011). On
the performance of indirect encoding across the continuum
of regularity. Evolutionary Computation, IEEE Transactions
on, 15(3):346–367.
Stanley, K. O. (2007). Compositional pattern producing networks:
A novel abstraction of development. Genetic Programming
and Evolvable Machines Special Issue on Developmental
Systems, 8(2):131–162.
Stanley, K. O., D’Ambrosio, D. B., and Gauci, J. (2009). A
hypercube-based indirect encoding for evolving large-scale
neural networks. Artificial Life, 15(2):185–212.
Stanley, K. O. and Miikkulainen, R. (2004). Competitive coevolution through evolutionary complexification. JAIR, 21:63–100.
Woolley, B. G. and Stanley, K. O. (2011). On the deleterious effects of a priori objectives on evolution and representation.
In Proceedings of the 13th annual conference on Genetic and
evolutionary computation, pages 957–964. ACM.
Woolley, B. G. and Stanley, K. O. (2014). A novel humancomputer collaboration: Combining novelty search with interactive evolution. In Proceedings of the Genetic and Evolutionary Computation Conference (GECCO-2014), New York,
NY, USA. ACM.
Yannakakis, G. N., Liapis, A., and Alexopoulos, C. (2014). Mixedinitiative co-creativity. In Proceedings of the 9th Conference
on the Foundations of Digital Games.
Yao, X. (1999). Evolving artificial neural networks. Proceedings
of the IEEE, 87(9).
| 9cs.NE
|
arXiv:1704.03767v1 [cs.DC] 12 Apr 2017
Parallelized Kendall’s Tau Coefficient Computation via
SIMD Vectorized Sorting On Many-Integrated-Core
Processors
Yongchao Liua,∗, Tony Pana , Oded Greena , Srinivas Alurua,∗
a School
of Computational Science & Engineering, Georgia Institute of Technology, Atlanta,
GA 30332, USA
Abstract
Pairwise association measure is an important operation in data analytics. Kendall’s
tau coefficient is one widely used correlation coefficient identifying non-linear relationships between ordinal variables. In this paper, we investigated a parallel
algorithm accelerating all-pairs Kendall’s tau coefficient computation via single
instruction multiple data (SIMD) vectorized sorting on Intel Xeon Phis by taking advantage of many processing cores and 512-bit SIMD vector instructions.
To facilitate workload balancing and overcome on-chip memory limitation, we
proposed a generic framework for symmetric all-pairs computation by building
provable bijective functions between job identifier and coordinate space. Performance evaluation demonstrated that our algorithm on one 5110P Phi achieves
two orders-of-magnitude speedups over 16-threaded MATLAB and three ordersof-magnitude speedups over sequential R, both running on high-end CPUs. Besides, our algorithm exhibited rather good distributed computing scalability
with respect to number of Phis. Source code and datasets are publicly available
at http://lightpcc.sourceforge.net.
Keywords: Pairwise correlation; Kendall’s tau coefficient; all-pairs
computation; many integrated core; Xeon Phi
1. Introduction
Identifying interesting pairwise association between variables is an important
operation in data analytics. In bioinformatics and computational biology, one
typical application is to mine gene co-expression relationship via gene expression
data, which can be realized by query-based gene expression database search [1]
∗ Corresponding
author
Email addresses: [email protected] (Yongchao Liu), [email protected] (Tony Pan),
[email protected] (Oded Green), [email protected] (Srinivas Aluru)
1 Preliminary work was presented in the 28th International Symposium on Computer Architecture and High Performance Computing, Los Angeles, USA, 2016
Preprint submitted to Journal of Parallel and Distributed Computing
April 13, 2017
or gene co-expression network analysis [2]. For gene expression database search,
it targets to select the subject genes in the database that are co-expressed
with the query gene. One approach is to first define some pairwise correlation/dependence measure over gene expression profiles across multiple samples
(gene expression profiles for short) and then rank query-subject gene pairs by
their scores. For gene co-expression networks, nodes usually correspond to genes
and edges represent significant gene interactions inferred from the association
of gene expression profiles. To construct a gene co-expression network, allpairs computation over gene expression profiles is frequently conducted based
on linear (e.g. [3] [4] [5]) or non-linear (e.g. [6] [7] [8]) co-expression measures.
A variety of correlation/dependence measures have been proposed in the literature and among them, Pearson’s product-moment correlation coefficient [9]
(or Pearson’s r correlation) is the most widely used correlation measure [10].
However, this correlation coefficient is only applicable to linear correlations. In
contrast, Spearman’s rank correlation coefficient [11] (or Spearman’s ρ coefficient) and Kendall’s rank correlation coefficient [12] (or Kendall’s τ coefficient)
are two commonly used measures for non-linear correlations [13]. Spearman’s
ρ coefficient is based on Pearson’s r coefficient but applies to ranked variables,
while Kendall’s τ coefficient tests the association between ordinal variables.
These two rank-based coefficients were shown to play complementary roles in
the cases when Pearson’s r is not effective [14]. Among other non-linear measures, mutual information [15] [16] [17], Euclidean distance correlation [18] [19],
Hilbert-Schmidt information criterion [20], and maximal information criterion
[21] are frequently used as well. In addition, some unified frameworks for pairwise dependence assessments were proposed in the literature (e.g. [22]).
Kendall’s τ coefficient (τ coefficient for short) measures the ordinal correlation between two vectors of ordinal variables. Given two ordinal vectors
u = {u1 , u2 , ..., un } and v = {v1 , v2 , ..., vn }, where variables ui and vi are both
ordinal (0 ≤ i < n), the τ coefficient computes the correlation by counting
the number of concordant pairs nc and the number of discordant pairs nd by
treating ui and vi as a joint ordinal variable (ui , vi ). For the τ coefficient, a
pair of observations (ui , vi ) and (uj , vj ), where i 6= j, is deemed as concordant
if ui > uj and vi > vj or ui < uj and vi < vj , and discordant if ui > uj and
vi < vj or ui < uj and vi > vj . Note that if ui = uj or vi = vj , this pair is
considered neither concordant nor discordant.
In our study, we will consider two categories of τ coefficient, namely Tau-a
(denoted as τA ) and Tau-b (denoted as τB ). τA does not take into account tied
elements in each vector and is defined as
τA =
nc − nd
n0
(1)
where n0 = n(n − 1)/2. If all elements in each vector are distinct, we have
nc + nd = n0 and can therefore re-write Equation (1) as
τA =
2nd
n0 − 2nd
= 1−
n0
n0
2
(2)
As opposed to τA , τB makes adjustments for ties and is computed as
nc − nd
τB = p
(3)
(n0 − n1 )(n0 − n2 )
P ′ ′
P ′ ′
′
′
where n1 =
i ui (ui − 1)/2 and n2 =
i vi (vi − 1)/2. ui (vi ) denotes the
cardinality of the i-th group of ties for vector u (v). Within a vector, each
distinct value defines one tie group and this value acts as the identifier of the
corresponding group. The cardinality of a tie group is equal to the number of
elements in the vector whose values are identical to the identifier of the tie group.
If all elements in either vector are distinct, τB will equal τA as n1 = n2 = 0.
This indicates τA is a special case of τB and an implementation of τB will cover
τA inherently. In addition, from the definitions of τA and τB , we can see that
the computation of the τ coefficient between u and v is commutable.
Besides the values of correlation coefficients, some applications need to calculate P -value statistics to infer statistical significance between variables. For this
purpose, one approach is permutation test [23]. However, a permutation test
may need a substantial number of pairwise τ coefficient computation [24] even
for moderately large n, thus resulting in prohibitively long times for sequential
execution. In the literature, parallelizing pairwise τ coefficient computation has
not yet been intensively explored. One recent work is from Wang et al. [25],
which accelerated the sequential τ coefficient computation in R [26] based on
Hadoop MapReduce [27] parallel programming model. In [25], the sequential
all-pairs τ coefficient implementation in R was shown extremely slow on largescale datasets. In our study, we further confirmed this observation through our
performance assessment (refer to section 5.2).
In this paper, we parallelized all-pairs τ coefficient computation on Intel
Xeon Phis based on Many-Integrated-Core (MIC) architecture, the first work
accelerating all-pairs τ coefficient computation on MIC processors to the best
of our knowledge. This work is a continuation from our previous parallelization of all-pairs Pearson’s r coefficient on Phi clusters [28] and further enriches
our LightPCC library (http://lightpcc.sourceforge.net) targeting parallel
pairwise association measures between variables in big data analytics. In this
work, we have investigated three variants, namely the naı̈ve variant, the generic
sorting-enabled (GSE) variant and the vectorized sorting-enabled (VSE) variant, built upon three pairwise τ coefficient kernels, i.e. the naı̈ve kernel, the GSE
kernel and the VSE kernel, respectively. Given two ordinal vectors u and v of n
elements each, the naı̈ve kernel enumerates all possible pairs of joint variables
(ui , vi ) (0 ≤ i < n) to obtain nc and nd , resulting in O(n2 ) time complexity. In
contrast, both the GSE and VSE kernels take sorting as the core and manage
to reduce the time complexity to O(n log n).
Given m vectors of n elements each, the overall time complexity would be
O(m2 n2 ) for the naı̈ve variant and O(m2 n log n) for the GSE and VSE variants. The VSE variant enhances the GSE one by exploiting 512-bit wide single
instruction multiple data (SIMD) vector instructions in MIC processors to implement fast SIMD vectorized pairwise merge of sorted subarrays. Furthermore,
3
to facilitate workload balancing and overcome on-chip memory limitation, we
investigated a generic framework for symmetric all-pairs computation by pioneering to build a provable, reversible and bijective relationship between job
identifier and coordinate space in a job matrix.
The performance of our algorithm was assessed using a collection of real
whole human genome gene expression datasets. Our experimental results demonstrates that the VSE variant performs best on both the multi-threaded CPU
and Phi systems, compared to the other two variants. We further compared
our algorithm with the all-pairs τ coefficient implementations in the widely
used MATLAB [29] and R [26], revealing that our algorithm on a single 5110P
Phi achieves up to 812 speedups over 16-threaded MATLAB and up to 1,166
speedups over sequential R, both of which were benchmarked on high-end CPUs.
In addition, our algorithm exhibited rather good distributed computing scalability with respect to number of Phis.
2. Intel Many-Integrated-Core (MIC) Architecture
Intel MIC architecture targets to combine many Intel processor cores onto
a single chip and has already led to the release of two generations of MIC processors. The first generation is code named as Knights Corner (KNC) and
the second generation code named as Knights Landing (KNL) [30]. KNC is
a PCI Express (PCIe) connected coprocessor that must be paired with Intel
Xeon CPUs. KNC is actually a shared-memory computer [31] with full cache
coherency over the entire chip and running a specialized Linux operating system over many cores. Each core adopts an in-order micro-architecture and has
four hardware threads offering four-way simultaneous multithreading. Besides
scalar processing, each core is capable of vectorized processing from a newly
designed vector processing unit (VPU) featuring 512-bit wide SIMD instruction
set architecture (ISA). For KNC, each core has only one VPU and this VPU is
shared by all active hardware threads running on the same core. Each 512-bit
vector register can be split to either 8 lanes with 64 bits each or 16 lanes with 32
bits each. Note that the VPU does not support legacy SIMD ISAs such as the
Streaming SIMD extensions (SSE) series. As for caches, each core has separate
L1 instruction and data caches of size 32 KB each, and a 512 KB L2 cache
interconnected via a bidirectional ring bus with the L2 caches of all other cores
to form a unified shared L2 cache over the chip. The cache line size is 64 bytes.
In addition, two usage models can be used to invoke KNC: offload model and
native model, where the former relies on compiler pragmas/directives to offload
highly-parallel parts of an application to KNC, while the latter treats KNC as
symmetric multiprocessing computers. While primarily focusing on KNC Phis
in this work, we note that our KNC-based implementations can be easily ported
onto KNL processors, as KNL implements a superset of KNC instruction sets.
We expect that our implementations will be portable to future Phis as well.
4
Table 1: A list of notions used
Notion
m
n
u
ui
nc
nd
n0
n1
n2
n3
τA
τB
SX
|SX |
vX
Description
number of vectors
number of elements per vector
vector u of n elements, likewise for v
i-th element of vector u, likewise for vi
number of concordant variable pairs
number of discordant variable pairs
n(n − 1)/2
P
′
′
′
Pi u′i (u′i − 1)/2, u′i is size of the i-th tie group in u
Pi vi (vi − 1)/2, vi is size of the i-th tie group in v
i wi (wi − 1)/2, wi is size of the i-th joint tie group for u and v
(nc − nd )/n
p0
(nc − nd )/ (n0 − n1 )(n0 − n2 )
a sorted subarray
length of the sorted subarray SX
a 512-bit SIMD vector with 16 32-bit integer lanes
3. Pairwise Correlation Coefficient Kernels
For the τ coefficient, we have investigated three pairwise τ coefficient kernels:
the naı̈ve kernel, the GSE kernel and the VSE kernel. From its definition,
it can be seen that the Kendall’s τ coefficient only depends on the order of
variable pairs. Hence, given two ordinal vectors, we can first order all elements
in each vector, then replace the original value of every element with its rank
in each vector, and finally conduct the τ coefficient computation on the rank
transformed new vectors. This rank transformation does not affect the resulting
coefficient value, but could streamline the computation, especially for ordinal
variables in complex forms of representation. Moreover, this transformation
needs to be done only once beforehand for each vector. Hence, we will assume
that all ordinal vectors have already been rank transformed in the following
discussions. For the convenience of discussion, Table 1 shows a list of notions
used across our study.
3.1. Naı̈ve Kernel
The naı̈ve kernel enumerates all possible combinations of joint variables
(ui , vi ) (0 ≤ i < n) and counts the number of concordant pairs nc as well
as the number of discordant pairs nd . As mentioned above, given two joint
variable pairs (ui , vi ) and (uj , vj ) (i 6= j), they are considered concordant if
ui > uj and vi > vj or ui < uj and vi < vj , discordant if ui > uj and vi < vj
or ui < uj and vi > vj , and neither concordant nor discordant if ui = uj or
vi = vj . Herein, we can observe that the two joint variables are concordant
if and only if the value of (ui − uj ) × (vi − vj ) is positive; discordant if and
only if the value of (ui − uj ) × (vi − vj ) is negative; and neither concordant nor
5
discordant if and only if the value of (ui − uj ) × (vi − vj ) is equal to zero. In this
case, in order to avoid branching in execution paths (particularly important for
processors without hardware branch prediction units), we compute the value of
nc − nd by examining the sign bit of the product of ui − uj and vi − vj (refer to
lines 2 and 11 in Algorithm 1).
Algorithm 1 Pseudocode of our naı̈ve kernel
1: function calc sign(v)
2:
return (v > 0) − (v < 0);
3: end function
⊲ return 1 if v > 0, -1 if v < 0 and 0, otherwise
4: function kendall tau a naı̈ve(u, v, n)
5:
norminator = 0;
6:
for i = 1; i < n; ++i do
7:
a = ui ; b = vi ;
8:
#pragma vector aligned
9:
#pragma simd reduction(+:nominator)
10:
for j = 0; j < i; ++j do
11:
nominator += calc sign((a − uj )) × (b − vj ));
12:
end for
13:
end for
;
14:
return nominator
n(n−1)/2
15: end function
⊲ norminator represents nc − nd
⊲ compute nc − nd
Algorithm 1 shows the pseudocode of the naı̈ve kernel. From the code, the
naı̈ve kernel has a quadratic time complexity in a function of n, but its runtime
is independent of the actual content of u and v, due to the use of function
calc sign. Meanwhile, the space complexity is O(1). Note that this naı̈ve
kernel is only used to compute τA .
3.2. Generic Sorting-enabled Kernel
Considering the close relationship between calculating τ and ordering a list of
variables, Knight [32] proposed a merge-sort-like divide-and-conquer approach
with O(n log n) time complexity, based on the assumption that no element tie
exists within any vector. As this assumption is not always the case, Knight did
mention this drawback and suggested an approximation method by averaging
counts, rather than propose an exact solution. In this subsection, we investigate
an exact sorting-enabled solution to address both cases: with or without element
ties within any vector, together in a unified manner.
Given two ordinal vectors u and v, this GSE kernel generally works in the
following five steps.
• Step1 sorts the list of joint variables (ui , vi ) (0 ≤ i < n) in ascending order,
where the joint variables are sorted first by the first element ui and secondarily by the second element vi . In this step, we used quicksort via the
standard qsort library routine, resulting in O(n log n) time complexity.
• Step2 performs a linear-time scan over the sorted list to compute n1 (refer
to Equation (3)) by counting the number of groups consisting of tied
values as well as the number of tied values in each group. Meanwhile, we
compute a new value n3 for joint ties, with respect to the pair (ui , vi ), as
6
P
i wi (wi − 1)/2, where wi represents the number of jointly tied values in
the i-th group of joint ties for u and v.
• Step3 counts the number of discordant pairs nd by re-sorting the sorted
list obtained in Step1 in ascending order of all elements in v via a merge
sort procedure that can additionally accumulate the number of discordant
joint variable pairs each time two adjacent sorted subarrays are merged.
The rationale is as follows. Firstly, when merging two adjacent sorted
subarrays, we count the number of discordant pairs by only performing
pairwise comparison between joint variables from distinct subarrays. In
this way, we can ensure that every pair of joint variables will be enumerated once and only once during the whole Step3 execution. Secondly,
given two adjacent sorted subarrays to merge, it is guaranteed that the
first value (corresponding to u) of every joint variable in the left subarray
(with the smaller indices) is absolutely less than or equal to the first value
of every joint variable in the right subarray (with the larger indices), due
to the sort conducted in Step1. In particular, when the first value is identical for the two joint variables from distinct subarrays, the second value
(corresponding to v) of the joint variable from the left subarray is also absolutely less than or equal to the second value of the joint variable from the
left subarray. This means that discordance occurs only if the second value
of a joint variable from the right subarray is less than the second value of
a joint variable from the left subarray. Therefore, the value of nd can be
gained by accumulating the number of occurrences of the aforementioned
discordance in every pairwise merge of subarrays. Algorithm 2 shows the
pseudocode of counting discordant pairs with out-of-place pairwise merge
of adjacent sorted subarrays, where the time complexity is O(n log n) and
the space complexity is O(n).
• Step4 performs a linear-time scan over the sorted list obtained in Step3
to compute n2 (see Equation (3)) in a similar way to Step2. This works
because the sorted list actually corresponds to a sorted list of all elements
in v.
• Step 5 computes the numerator nc − nd in Equations (1) and (3) as n0 −
n1 − n2 + n3 − 2nd . Note that if there is no tie in each vector, n1 , n2 and
n3 will all be zero. In this case, nc − nd will be equal to n0 − 2nd as shown
in Equation (2).
From the above workflow, we can see that the GSE kernel takes into account
tied elements within each vector. Unlike the naı̈ve kernel that computes τA ,
the GSE kernel targets the computation of τB . As mentioned above, τA is
actually a special case of τB and an algorithm for τB will inherently cover τA .
Therefore, our GSE kernel is able to calculate both τA and τB in a unified
manner. In addition, the GSE kernel has O(n log n) time complexity, since the
time complexity is O(n log n) for both Step1 and Step3, O(n) for both Step2
and Step4, and O(1) for Step 5.
7
Algorithm 2 Pseudocode of Step3 of our GSE kernel
1: function gse merge(in, out, lef t, mid, right)
2:
l = p = lef t; r = mid; nd = 0;
3:
while l < mid && r < right do
4:
if in[r].v < in[l].v then
5:
nd + = mid − l;
6:
out[p++] = in[r++];
7:
else
8:
out[p++] = in[l++];
9:
end if
10:
end while
11:
return nd ;
12: end function
13: function kendall tau b step3 gse(pairs, buf f er, n)
14:
nd = 0; in = pairs; out = buf f er;
15:
for s = 1; s < n; s *= 2 do
16:
for l = 0; l < n; l += 2 * s do
17:
m = min(l + s, n);
18:
r = min(l + 2 ∗ s, n);
19:
nd += gse merge(in, out, l, m, r);
20:
end for
21:
swap(in, out);
22:
end for
23:
if pairs != in then
24:
memcpy(pairs, in, n * sizeof(*pairs));
25:
end if
26:
return nd ;
27: end function
⊲ merge two sorted subarrays
⊲ count discordant pairs
⊲ Perform out-of-place merge
⊲ swap in and out
3.3. Vectorized Sorting-enabled Kernel
The VSE kernel enhances the GSE kernel by employing 512-bit SIMD vector
instructions on MIC processors to implement vectorized pairwise merge of sorted
subarrays. In contrast with the GSE kernel, the VSE kernel has made the
following algorithmic changes. The first is packing a rank variable pair (ui , vi )
into a signed 32-bit integer. In this packed format, each variable is represented
by 15 bits in the 32-bit integer, with ui taking the most significant 16 bits and
vi the least significant 16 bits. In this case, the VSE kernel limits the maximum
allowable vector size n to 215 − 1 = 32, 767. The second is that due to packing,
we replace the generic variable pair quicksort in Step1 with an integer sorting
method, and re-implement the discordant pair counting algorithm in Step3 (see
Algorithm 2) based on integer representation. In Step1, sorting packed integers
is equivalent to sorting generic variable pairs (ui , vi ), since within any packed
integer ui sits in higher bits and vi in lower bits. In Step3, an additional
preprocessing procedure is needed to reset to zero the most significant 16 bits
of each packed integer (corresponding to u). In our implementation, we split a
512-bit SIMD vector into a 16-lane 32-bit-integer vector and then investigated
a vectorized merge sort for Step1 and a vectorized discordant pair counting
algorithm for Step3, both of which use the same pairwise merge method and
also follow a very similar procedure. Algorithm 3 shows the pseudocode of Step3
of our VSE kernel.
In the literature, some research has been done to accelerate sorting algorithms by means of SIMD vectorized pairwise merge of sorted subarrays. Hiroshi et al. [33] employed a SSE vectorized odd-even merge network [34] to
merge sorted subarrays in an out-of-core way. Chhugan et al. [35] adopted
8
Algorithm 3 Pseudocode of Step3 our VSE kernel
1: function vse merge(in, out, lef t, mid, right)
2:
l = lef t; r = mid; p = lef t; nd = 0;
3:
if mid − lef t < 16||right − mid < 16 then
4:
while l < mid && r < right do
5:
if input[r] < input[l] then
6:
nd + = mid − l; out[p++] = in[r++];
7:
else
8:
out[p + +] = in[l + +];
9:
end if
10:
end while
11:
else
12:
13:
14:
15:
16:
17:
18:
19:
20:
21:
22:
23:
24:
25:
26:
27:
28:
29:
30:
31:
32:
33:
34:
35:
36:
37:
38:
39:
40:
41:
42:
43:
44:
45:
46:
47:
48:
⊲ correspond to variable v
⊲ count discordant pairs
while l < mid && r < right do
if in[r] < in[l] then
nd + = mid − 1; r + +;
else
l + +;
end if
end while
⊲ correspond to variable v
⊲ merge two sorted subarrays
l = lef t; r = mid;
vMin = mm512 load epi32(in + l); vMax = mm512 load epi32(in + r);
l+ = 16; r+ = 16;
while true do
if mm512 reduce min epi32(vMin) ≥ mm512 reduce max epi32(vMax) then
mm512 store epi32(out + p, vMax); p+ = 16; vMax = vMin;
else if mm512 reduce min epi32(vMax) ≥ mm512 reduce max epi32(vMin) then
mm512 store epi32(out + p, vMin); p+ = 16;
else
⊲ invoke Algorithm 4
bitonic merge 16way(vMin, vMax);
mm512 store epi32(out + p, vMin); p+ = 16;
end if
if l + 16 ≥ mid||r + 16 ≥ right then
break;
end if
A = in[l]; B = in[r]; C = mm512 reduce max epi32(vMax);
if C ≤ A && C ≤ B then
mm512 store epi32(out + p, vMax); p+ = 16;
vMin = mm512 load epi32(in + l); l+ = 16;
vMax = mm512 load epi32(in + r); r+ = 16;
else if B < A then
vMin = mm512 load epi32(in + r); r+ = 16;
else
vMin = mm512 load epi32(in + l); l+ = 16;
end if
end while
end if
⊲ invoke Algorithm 5
bitonic merge 16way leftover(in, out, l, r, p, mid, right, vMax);
return nd ;
end function
49: function kendall tau b step3 vse(pairs, buf f er, n)
50:
nd = 0; in = pairs; out = buf f er;
51:
for s = 1; s < n; s *= 2 do
52:
for l = 0; l < n; l += 2 * s do
53:
m = min(l + s, n);
54:
r = min(l + 2 ∗ s, n);
55:
nd += vse merge(in, out, l, m, r);
56:
end for
57:
swap(in, out);
58:
end for
59:
if pairs != in then
60:
memcpy(pairs, in, n * sizeof(*pairs));
61:
end if
62:
return nd ;
63: end function
9
⊲ Perform out-of-place merge
⊲ swap in and out
u15
u14
u13
u12
u11
u10
u9
u8
u7
u6
u5
u4
u3
u2
u1
u0
v0
v1
v2
v3
v4
v5
v6
v7
v8
v9
v10
v11
v12
v13
v14
v15
L
H
L
H
L
H
L
H
L
H
L
H
L
H
L
H
L
H
L
H
L
H
L
H
L
H
L
H
L
H
L
H
a0
a1
a2
a3
a4
a5
a6
a7
a8
a9
a10
a11
a12
a13
a14
a15
b0
b1
b2
b3
b4
b5
b6
b7
b8
b9
b10
b11
b12
b13
b14
b15
L
H
L
H
L
H
L
H
L
H
L
H
L
H
L
H
L
H
L
H
L
H
L
H
L
H
L
H
L
H
L
H
a0
a1
a2
a3
a4
a5
a6
a7
a8
a9
a10
a11
a12
a13
a14
a15
b0
b1
b2
b3
b4
b5
b6
b7
b8
b9
b10
b11
b12
b13
b14
b15
L
H
L
H
L
H
L
H
L
H
L
H
L
H
L
H
L
H
L
H
L
H
L
H
L
H
L
H
L
H
L
H
a0
a1
a2
a3
a4
a5
a6
a7
a8
a9
a10
a11
a12
a13
a14
a15
b0
b1
b2
b3
b4
b5
b6
b7
b8
b9
b10
b11
b12
b13
b14
b15
L
H
L
H
L
H
L
H
L
H
L
H
L
H
L
H
L
H
L
H
L
H
L
H
L
H
L
H
L
H
L
H
a0
a1
a2
a3
a4
a5
a6
a7
a8
a9
a10
a11
a12
a13
a14
a15
b0
b1
b2
b3
b4
b5
b6
b7
b8
b9
b10
b11
b12
b13
b14
b15
L
H
L
H
L
H
L
H
L
H
L
H
L
H
L
H
L
H
L
H
L
H
L
H
L
H
L
H
L
H
L
H
a0
a1
a2
a3
a4
a5
a6
a7
a8
a9
a10
a11
a12
a13
a14
a15
b0
b1
b2
b3
b4
b5
b6
b7
b8
b9
b10
b11
b12
b13
b14
b15
Figure 1: 16-way bitonic merge network: (1) input data are stored in two 16-lane vectors and
(2) pipelining from left-to-right
similar ideas to [33], but combined a SSE vectorized in-register odd-even merge
sort [34] with an in-memory bitonic merge network. Chen et al. [36] absorbed
the merge-path idea of [37, 38] and extended the SSE vectorized work of [35]
to take advantage of 512-bit SIMD VPUs on KNC Phis and used a vectorized
in-register bitonic merge sort, instead of the in-register odd-even merge sort.
In our VSE kernel, we engineered a 512-bit SIMD vectorized in-register bitonic
merge network as the core of our pairwise merge procedure for sorted subarrays,
which is similar to [36], and further proposed a predict-and-skip mechanism to
reduce the number of comparisons during pairwise merge.
3.3.1. In-register bitonic merge network
The in-register bitonic merge network is the core of our vectorized pairwise
merge of sorted subarrays. In our algorithm, this network has 16 ways and
merges two sorted vectors vM in and vM ax (Figure 1 shows the computation
layout of the network), where all elements in each vector are placed in ascending
order from lane 0 to lane 15. In this case, to generate an input bitonic sequence
from the two vectors, we need to reverse the order of all elements in one and only
one vector (reverse vM ax in our case) and this order reversal is realized by one
permutation instruction, i.e. mm512 permutevar epi32(·). Having completed
the order reversal, we can complete the sorting of vectors vM in and vM ax in
log2 (32) = 5 steps. Algorithm 4 shows the pseudocode for our 16-way in-register
bitonic merge network. From the code, the function bitonic merge 16way is
10
composed of a fixed number of vector instructions and thus has a constant time
complexity.
Algorithm 4 Pseudocode of our 16-way in-register bitonic merge network
1: procedure bitonic merge 16way(vMin, vMax)
2:
3:
4:
5:
6:
7:
8:
9:
10:
11:
12:
13:
14:
15:
16:
17:
18:
19:
20:
21:
22:
23:
24:
25:
26:
27:
28:
29:
30:
31:
32:
33:
34:
⊲ constant vector variables and reused
//vReverse = mm512 set epi32(0, 1, 2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15);
//vP ermIndex16 = mm512 set epi32(7, 6, 5, 4, 3, 2, 1, 0, 15, 14, 13, 12, 11, 10, 9, 8)
//vP ermIndex8 = mm512 set epi32(11, 10, 9, 8, 15, 14, 13, 12, 3, 2, 1, 0, 7, 6, 5, 4);
//vP ermIndex4 = mm512 set epi32(13, 12, 15, 14, 9, 8, 11, 10, 5, 4, 7, 6, 1, 0, 3, 2);
//vP ermIndex2 = mm512 set epi32(14, 15, 12, 13, 10, 11, 8, 9, 6, 7, 4, 5, 2, 3, 0, 1);
⊲ Reserve vector vMax
vMax = mm512 permutevar epi32(vReverse, vMax);
⊲ Level 1
vL1 = mm512 min epi32(vMin, vMax);
vH1 = mm512 max epi32(vMin, vMax);
⊲ Level 2
vT mp = mm512 permutevar epi32(vP ermIndex16, vL1);
vT mp2 = mm512 permutevar epi32(vP ermIndex16, vH1);
vL2 = mm512 mask min epi32(vL2, 0x00ff, vT mp, vL1);
vH2 = mm512 mask min epi32(vH2, 0x00ff, vT mp2, vH1);
vL2 = mm512 mask max epi32(vL2, 0xff00, vT mp, vL1);
vH2 = mm512 mask max epi32(vH2, 0xff00, vT mp2, vH1);
⊲ Level 3
vT mp = mm512 permutevar epi32(vP ermIndex8, vL2);
vT mp2 = mm512 permutevar epi32(vP ermIndex8, vH2);
vL3 = mm512 mask min epi32(vL3, 0x0f0f, vT mp, vL2);
vH3 = mm512 mask min epi32(vH3, 0x0f0f, vT mp2, vH2);
vL3 = mm512 mask max epi32(vL3, 0xf0f0, vT mp, vL2);
vH3 = mm512 mask max epi32(vH3, 0xf0f0, vT mp2, vH2);
⊲ Level 4
vT mp = mm512 permutevar epi32(vP ermIndex4, vL3);
vT mp2 = mm512 permutevar epi32(vP ermIndex4, vH3);
vL4 = mm512 mask min epi32(vL4, 0x3333, vT mp, vL3);
vH4 = mm512 mask min epi32(vH4, 0x3333, vT mp2, vH3);
vL4 = mm512 mask max epi32(vL4, 0xcccc, vT mp, vL3);
vH4 = mm512 mask max epi32(vH4, 0xcccc, vT mp2, vH3);
⊲ Level 5: vMin and vMax store the sorted sequence
vT mp = mm512 permutevar epi32(vP ermIndex2, vL4);
vT mp2 = mm512 permutevar epi32(vP ermIndex2, vH4);
vMin = mm512 mask min epi32(vMin, 0x5555, vT mp, vL4);
vMax = mm512 mask min epi32(vMax, 0x5555, vT mp2, vH4);
vMin = mm512 mask max epi32(vMin, 0xaaaa, vT mp, vL4);
vMax = mm512 mask max epi32(vMax, 0xaaaa, vT mp2, vH4);
end procedure
3.3.2. Vectorized pairwise merge of sorted subarrays
Our vectorized pairwise merge of sorted subarrays relies on the aforementioned 16-way in-register bitonic merge network and adopted a very similar
procedure to [33]. Given two sorted subarrays SA and SB , we assume that they
are aligned to 64 bytes and their lengths |SA | and |SB | are multiples of 16, for
the convenience of discussion. In this way, the vectorized pairwise merge works
as follows.
1. loads the smallest 16 elements of SA and SB to vM in and vM ax, respectively, and advances the pointer of each subarray.
2. invokes bitonic merge 16way(·) to sort vectors vM in and vM ax, and
then stores the content of vM in, the smallest 16 elements, to the resulting
output array.
11
Algorithm 5 Pseudocode of processing the leftovers in both subarrays
1: procedure bitonic merge 16way leftover(in, out, l, r, p, mid, right, vMax)
2:
vIndexInc = mm512 set epi32(15, 14, 13, 12, 11, 10, 9, 8, 7, 6, 5, 4, 3, 2, 1, 0);
⊲ maximum signed integer value
3:
vMaxInt = mm512 set1 epi32(0x7fffffff)
4:
vMid = mm512 set1 epi32(mid);
5:
vRight = mm512 set1 epi32(right);
6:
7:
8:
9:
10:
11:
12:
13:
14:
15:
16:
17:
18:
19:
20:
21:
22:
23:
24:
25:
26:
27:
28:
29:
30:
31:
32:
33:
34:
35:
36:
37:
38:
39:
40:
41:
42:
43:
44:
45:
46:
47:
48:
49:
50:
51:
52:
⊲ initialize the vector mask for vMax
maskMax = 0xffff;
while l < mid||r < right do
if l < mid && r < right then
if in[r] < in[l] then
vT mp = mm512 add epi32( mm512 set1 epi32(r), vIndexInc)
maskMin = mm512 cmplt epi32 mask(vT mp, vRight);
vMin = mm512 mask load epi32(vMaxInt, maskMin, in + r); r+ = 16;
else
vT mp = mm512 add epi32( mm512 set1 epi32(l), vIndexInc)
maskMin = mm512 cmplt epi32 mask(vT mp, vMid);
vMin = mm512 mask load epi32(vMaxInt, maskMin, in + l); l+ = 16;
end if
else if l < mid then
vT mp = mm512 add epi32( mm512 set1 epi32(l), vIndexInc);
maskMin = mm512 cmplt epi32 mask(vT mp, vMid);
vMin = mm512 mask load epi32(vMaxInt, maskMin, in + l);
tmp = mm512 mask reduce max epi32(maskMax, vMax);
if tmp ≤ mm512 reduce min epi32(vMin) then
break;
end if
l+ = 16;
else if r < right then
vT mp = mm512 add epi32( mm512 set1 epi32(r), vIndexInc);
maskMin = mm512 cmplt epi32 mask(vT mp, vRight);
vMin = mm512 mask load epi32(vMaxInt, maskMin, in + r);
tmp = mm512 mask reduce max epi32(maskMax, vMax);
if tmp ≤ mm512 reduce min epi32(vMin) then
break;
end if
r+ = 16;
end if
⊲ invoke Algorithm 4
bitonic merge 16way(vMin, vMax);
⊲ calculate new vector masks
nb = mm countbits 32(maskMin) + mm countbits 32(maskMax);
maskMin = nb > 15? 0x0ffff : (1 << nb) − 1;
maskMax = nb < 17? 0 : (1 << (nb − 16)) − 1;
mm512 mask store epi32(out + p, maskMin, vMin);
p += mm countbits 32(maskMin);
end while
⊲ write out vMax
mm512 mask packstorelo epi32(out + p, maskMax, vMax);
mm512 mask packstorehi epi32(out + p + 16, maskMax, vMax);
p += mm countbits 32(maskMax);
⊲ copy out the rest
if l < mid then
memcpy(out + p, in + l, (mid − l)∗ sizeof(int));
else if r < right then
memcpy(out + p, in + r, (right − r)∗ sizeof(int));
end if
end procedure
12
3. compares the next element of SA and SB and loads 16 elements into vM in
from the subarray whose next element is the smaller, followed by pointer
advancing for the subarray.
4. jumps back to the second step and repeats the procedure until all elements
in both subarrays have been processed.
5. completes the merge of SA and SB by writing the content of vM ax to the
output array.
Note that if |SA | or |SB | is not a multiple of 16, we will have to implement
some special treatment to deal with the leftovers in SA and SB . This special
treatment is implemented as Algorithm 5 and invoked by Algorithm 3 (see line
46). From the above procedure, we can see that the time complexity of merging
SA and SB is linear and thus the VSE kernel has a time complexity of O(n log n).
As assumed that both SA and SB are aligned to 64 bytes, we can therefore
use only one mm512 load epi32(·) instruction to load 16 integer elements from
memory to a vector and only one mm512 store epi32(·) instruction to store 16
elements in a vector to memory. This is because memory address is guaranteed
to keep aligned to 64 bytes during pairwise merge. Defining Trd to denote
the latency of memory load (in clock cycles) and Twt to denote the latency of
memory store, the number of clock cycles per element load from memory can be
estimated as (Trd + 16)/16 = Trd/16 + 1 clock cycles and the number of clocks
cycles per element store to memory as (Twt + 16)/16 = Twt /16 + 1 clock cycles.
Moreover, bitonic merge 16way(·) is composed of 27 vector instructions (see
lines 7∼33 in Algorithm 4) and each of its invocations leads to the output of 16
elements. In these regards, the average number of instructions per element can
be estimated as 27/16 ≈ 1.69. Considering that we only used simple integer
and single-source permutation instructions, each of which has a two clock cycle
latency according to the Intel Xeon Phi processor software optimization manual
[39], the average computational cost per element can be estimated as ⌈2 ×
27/16⌉ = 4 clock cycles in the worst cases where consecutive instructions always
have data dependency. In order to reduce inter-instruction latency caused by
data dependency, we have manually tuned the order of instructions by means
of interleaving. Since each instruction has a latency of two clock cycles, this
interleaving could enable to execute one instruction in only one clock cycle,
thus further reducing the cost per element to ⌈1 × 27/16⌉ = 2 clock cycles
optimistically. In sum, the overall cost per element can be favorably estimated
to be (Trd + Twr )/16 + 4 clock cycles.
We have proposed a predict-and-skip scheme to determine (i) whether we
need to invoke the 16-way bitonic merge network and (ii) whether we should
load two vectors of new elements from SA and SB , respectively. For cases (i),
the rationale is if the minimum value in vM in (vM ax) is ≥ the maximum value
in vM ax (vM in), every value in vM in (vM ax) will be ≥ to all values in vM in
(vM ax). In this case, there is no need of invoking the bitonic merge network
(lines 23∼26 in Algorithm 3), since the order of all elements in both vectors
is already deterministic. For cases (ii), we compare the maximum value C in
vM ax with both the smallest element A in the rest of SA and the one B in
13
the rest of SB (lines 34∼38 in Algorithm 3). If C ≤ A and C ≤ B, none
of the elements in vM ax will be greater than any element in the rest of SA
and SB , indicating that the absolute order of all vM ax elements has already
been determined. In this case, we write vM ax to the resulting output array
and load two vectors of new elements from SA and SB to vM in and vM ax,
respectively. The updates in vM in and vM ax will be used for the next iteration
of comparison.
It is worth mentioning that we also developed a 32-way bitonic merge network to implement the VSE kernel. Unfortunately, this new kernel based on
32-way merge network yielded slightly inferior performance to the kernel with
the 16-way network through our tests. In this regard, we adopted the 16-way
merge network in our VSE kernel.
4. Parallel All-Pairs Computation
4.1. All-Pairs Computation Framework
We consider the m × m job matrix to be a 2-dimensional coordinate space
on the Cartesian plane, and define the left-top corner to be the origin, the
horizontal x-axis (corresponding to columns) in left-to-right direction and the
vertical y-axis (corresponding to rows) in top-to-bottom direction. For nonsymmetric all-pairs computation (non-commutative pairwise computation), the
workload distribution over processing elements (PEs), e.g. threads, processes,
cores and etc., would be relatively straightforward. This is because coordinates
in the 2-dimensional matrix corresponds to distinct jobs. Unlike non-symmetric
all-pairs computation, it suffices by only computing the upper-triangle (or lowertriangle) of the job matrix for symmetric all-pairs computation (commutative
pairwise computation). In this case, balanced workload distribution could be
more complex than non-symmetric all-pairs computation.
In this paper, we propose a generic framework for workload balancing in
symmetric all-pairs computation, since the computation of the τ coefficient between any u and v is commutable as mentioned above. This framework works
by assigning each job a unique identifier and then building a bijective relationship between a job identifier Jm (y, x) and its corresponding coordinate (y, x).
We refer to this as direct bijective mapping. While facilitating balanced
workload distribution, this mapping merely relies on bijective functions, which
is a prominent feature distinguished from existing methods. To the best of our
knowledge, in the literature bijective functions have not ever been proposed for
workload balancing in symmetric all-pairs computation. In [40], the authors
used a very similar job numbering approach to ours (shown in this study), but
did not derive a bijective function for symmetric all-pairs computation. Our
framework can be applied to cases with identical (e.g. using static workload
distribution) or varied workload per job (e.g. using a shared integer counter
to realize dynamic workload distribution via remote memory access operations
in MPI [41] and Unified Parallel C (UPC) programming models [42] [43]) and
is also particularly useful for parallel computing architectures with hardware
14
*"& (
"
0
1
2
3
8
9
10 11 12 13 14
4
5
6
7
! " # 0.5
15 16 17 18 19 20
21 22 23 24 25
26 27 28 29
30 31 32
!
)
!
! " # 0.5 #
"$ % " % 0.25 # 2&' % 1(
)
! " # 0.5 %
"$ % " % 0.25 # 2&' % 1(
33 34
35
(a)
(b)
(c)
Figure 2: (a) an example direct bijective mapping between job identifier and coordinate space,
(b) solution region for Equation (7), and (c) solution region for Equation (8)
schedulers such as GPUs and FPGAs. In the following, without loss of generality, we will interpret our framework relative to the upper triangle of the job
matrix by counting in the major diagonal. Nonetheless, this framework can be
easily adapted to the cases excluding the major diagonal.
Direct bijective mapping. Given a job (y, x) in the upper triangle, we compute
its integer job identifier Jm (y, x) as
Jm (y, x) = Fm (y) + x − y, 0 ≤ y ≤ x < m
(4)
for dimension size m. In this equation, Fm (y) is the total number of cells
preceding row y in the upper triangle and is computed as
Fm (y) =
y(2m − y + 1)
2
(5)
where y varies in [0, m]. In this way, we have defined Equation (4) based on our
job numbering policy, i.e. all job identifiers vary in [0, m(m + 1)/2) and jobs
are sequentially numbered left-to-right and top-to-bottom in the upper triangle
(see Fig. 2a for an example).
Reversely, given a job identifier J = Jm (y, x) (0 ≤ J < m(m+1)/2), we need
to compute the coordinate (y, x) in order to locate the corresponding variable
pair. As per our definition, we have
J ≥ Fm (y) ⇔ y 2 − (2m + 1)y + 2J ≥ 0
(6)
J ≤ Fm (y + 1) − 1 ⇔ y 2 − (2m − 1)y + 2(J + 1) − 2m ≤ 0
By solving J ≥ Fm (y) (see Figure 2b), we get
p
y ≤ m + 0.5 − m2 + m + 0.25 − 2J
(7)
while getting
y ≥ m − 0.5 −
p
m2 + m + 0.25 − 2(J + 1)
15
(8)
by
Figure 2c). In this case, by defining ∆ =
p solving J ≤ Fm (y + 1) − 1 (see
√
2 + m + 0.25 − 2(J + 1), ∆′ =
m
m2 + m + 0.25 − 2J and z = m − 0.5 −
p
m2 + m + 0.25 − 2(J + 1), we can reformulate Equations (7) and (8) to be
z ≤ y ≤ z + 1 + ∆ − ∆′ . Because ∆ < ∆′ , we know that [z, z + 1 + ∆ − ∆′ ]
is a sub-range of [z, z + 1) and thereby have z ≤ y < z + 1. Based on our job
numbering policy stated before, as a function of integer y, Equation (6) definitely
has y solutions, meaning that at least one integer exists in [z, z + 1 + ∆ − ∆′ ],
which satisfies Equation (6). Meanwhile, it is known that there always exists
one and only one integer in [z, z + 1) (can be easily proved) and this integer
equals ⌈z⌉, regardless of the value of z. Since [z, z + 1 + ∆ − ∆′ ] is a sub-range
of [z, z + 1), we can conclude that Equation (6) has a unique solution y that is
computed as
l
m
p
y = ⌈z⌉ = m − 0.5 − m2 + m + 0.25 − 2(J + 1)
(9)
Having got y, we can compute the coordinate x as
x = J + y − Fm (y)
(10)
based on Equation (4).
4.2. Tiled Computing
Based on the direct bijective mapping, we adopted tiled computing with
the intention to benefit from L1/L2 caches. The rationale behind the tiled
computing is loading into cache a small subset of the bigger dataset and reusing
this block of data in cache for multiple passes. This technique partitions a
matrix into a non-overlapping set of equal-sized q × q tiles. In our case, we
partition the job matrix and produce a tile matrix of size w × w tiles, where
w = ⌈m/q⌉. In this way, all jobs in the upper triangle of the job matrix are still
fully covered by the upper triangle of the tile matrix. By treating a tile as a
unit, we can assign a unique identifier to each tile in the upper triangle of the
tile matrix and then build bijective functions between tile identifiers and tile
coordinates in the tile matrix, similarly as we do for the job matrix.
Because the tile matrix has an identical structure to the original job matrix,
we can directly apply our bijective mapping to the tile matrix. In this case,
given a coordinate (yq , xq ) (0 ≤ yq ≤ xq < w) in the upper triangle of the tile
matrix, we can compute a unique tile identifier Jw (yq , xq ) as
Jw (yq , xq ) = Fw (yq ) + xq − yq , 0 ≤ yq ≤ xq < w
(11)
where Fw (yq ) is defined similar to Equation (5) as
Fw (yq ) =
yq (2w − yq + 1)
2
(12)
Likewise, given a tile identifier Jw , such that 0 ≤ Jw < w(w + 1)/2, we can
16
reversely compute its unique vertical coordinate yq as
l
m
p
yq = w − 0.5 − w2 + w + 0.25 − 2(Jw + 1)
(13)
and subsequently its unique horizontal coordinate xq as
xq = Jw + yq − Fw (yq )
(14)
As title size is subject to cache sizes and input data, tuning tile size is
believed to be important for gaining high performance. This tuning process,
however, is tedious and has to be conducted case-by-case. For convenience, we
empirically set q to 8 for CPUs and to 4 for Phis. Nevertheless, users can feel
free to tune tile sizes to meet their needs.
4.3. Multithreading
4.3.1. Asynchronous kernel execution
When m is large, we may not have sufficient memory to reside the resulting
m × m correlation matrix Mτ entirely in memory. To overcome memory limitation, we adopted a multi-pass kernel execution model which partitions the tile
identifier range [0, w(w + 1)/2) into a set of non-overlapping sub-ranges (equalsized in our case) and finishes the computation one sub-range after another. In
this way, we do not need to allocate the whole memory for matrix Mτ . Instead,
we only need to allocate a small amount of memory to store the computing
results of one sub-range, thus considerably reducing memory footprint.
When using the KNC Phi, we need to transfer the newly computed results
from the Phi to the host after having completed each pass of kernel execution.
If kernel execution and data transfer is conducted in sequential, the Phi will
be kept idle during the interim of device-to-host data transfer. In this regard,
a more preferable solution would be to employ asynchronous kernel execution
by enabling concurrent execution of host-side tasks and accelerator-side kernel
execution. Fortunately, KNC Phis enable such a kind of asynchronous data
transfer and kernel execution associated with the offload model. This asynchronous execution can be realized by coupling the signal and wait clauses,
both of which are associated with each other via a unique identifier. That is,
a signal clause initiates an asynchronous operation such as data transfer and
kernel execution, while a wait clause blocks the current execution until the associated asynchronous operation is completed. Refer to our previous work [28]
for more details about the host-side asynchronous execution workflow proposed.
4.3.2. Workload balancing
For the variant using the naı̈ve kernel, all jobs have the same amount of
computation (refer to Algorithm 1). Thus, given a fixed number of threads, we
evenly distribute jobs over the set of threads by assigning a thread to process
one tile at a time. In contrast, for the two variants using the sorting-enabled
kernels, different jobs may have different amount of computation because of
17
the two rounds of sort used in Step1 and Step3. Typically, an OpenMP dynamic scheduling policy is supposed to be in favor to address workload irregularity, albeit having relatively heavier workload distribution overhead than static
scheduling. However, it is observed that dynamic scheduling produces slightly
inferior performance to static scheduling through our tests. In this regard, we
adopted static scheduling in our two sorting-enabled variants and assigned one
thread to process one tile at a time, same as the naı̈ve variant.
4.4. Distributed Computing
On KNC Phi clusters, we used MPI offload model which launches MPI
processes just as an ordinary CPU cluster does. In this model, one or more
Phis will be associated to a parental MPI process, which utilizes offload pragmas/directives to interact with the affiliated Phis, and inter-Phi communications
need to be explicitly managed by parental processes. In this sense, Phis may not
perceive the existence of remote inter-process communications. Our distributed
implementations require one-to-one correspondence between MPI processes and
Phis, and adopted a static workload distribution scheme based on tiled computation. This static distribution is inspired by our practice in multithreading
on single Phis. In our implementation, given p processes, we evenly distribute
tiles onto the p processes with the i-th (0 ≤ i < p) process assigned to compute
the tiles whose identifiers are in [i × ⌈ w(w+1)
⌉, (i + 1) × ⌈ w(w+1)
⌉). Within each
2p
2p
process, we adopted asynchronous execution workflow as well.
5. Performance Evaluation
We assessed the performance of our algorithm from four aspects: (i) comparison between our three variants, (ii) comparison with widely used counterparts:
MATLAB (version R2015b) and R (version 3.2.0), (iii) multithreading scalability on a single Phi, and (iv) distributed computing scalability on Phi clusters.
In these tests, we used four real whole human genome gene expression datasets
(refer to Table 2) produced by Affymetrix Human Genome U133 Plus 2.0 Array.
These datasets are publicly available in the GPL570 data collection of SEEK
[1], a query-based computational gene co-expression search engine over large
transcriptomic databases. In this study, unless otherwise specified, we compute
τ coefficients between genes, meaning that m is equal to the number of genes
and n equal to the number of samples for each dataset.
All tests are conducted on 8 compute nodes in CyEnce HPC Cluster (Iowa
State University), where each node has two high-end Intel E5-2650 8-core 2.0
GHz CPUs, two 5110P Phis (each has 60 cores and 8 GB memory) and 128 GB
memory. Our algorithm is compiled by Intel C++ compiler v15.0.1 with option
-fast enabled. In addition, for distributed computing scalability assessment,
when two processes are launched into the same node, we used the environment
variable I MPI PIN PROCESSOR LIST to guide Intel MPI runtime system to pin
the two processes within the node to distinct CPUs (recall that one node has
two CPUs).
18
Table 2: Information of whole human genome gene expression datasets used
Name
DS21050
DS19784
DS13070
DS3526
No. of Genes
17,941
17,941
17,941
17,941
No. of Samples
310
320
324
353
Platform
Affymetrix
Affymetrix
Affymetrix
Affymetrix
5.1. Assessment of Our Three Variants
All of the three variants work on CPUs, Phis and their clusters. For the
naı̈ve and GSE variants, they both used the same C++ core code for CPUand MIC-oriented instances. For the VSE variant, its 512-bit SIMD vectorization is only applicable to Phis. In this regard, to support CPUs, we further
developed a non-vectorized merge sort in Step1 and a non-vectorized discordant pair counting algorithm in Step3 instead, based on the aforementioned
packed integer representation. Considering that this non-vectorized version also
works on Phis, we have examined how much our 512-bit SIMD vectorization
contributes to speed improvement by comparing the vectorized version with the
non-vectorized one on the same 5110P Phi. Interestingly, by measuring the
correlation between genes using the datasets in Table 2, we observed that the
non-vectorized version is on a par with the vectorized one. This may be due to
the relatively small value of n, which is only 353 at maximum. Based on this
consideration, we further evaluated both versions by measuring the correlation
between samples, where m will be equal to the number of samples and n equal to
the number of genes. In this case, n becomes 17,941 for each dataset, more than
50× larger than before. In this context, our performance assessment exposed
that the vectorized version is consistently superior to the non-vectorized one,
yielding very stable speedups averaged to be 1.87 for all datasets. This result
was exciting, proving that our 512-bit SIMD vectorization did boost speed even
for moderately large n values. Hence, we have used the vectorized version of
the VSE variant for performance measurement all throughout our study.
5.1.1. On CPU
We first compared the performance of our three variants on multiple CPU
cores. Table 3 shows the performance of each variant on 16 CPU cores and
Figure 3 shows the speedup of the 16-threaded instance of each variant over its
single-threaded one.
For the naı̈ve variant, its 16-threaded instance achieves a roughly constant
speedup of 13.70 over its single-threaded one. This observation is consistent
with our expectation, as the runtime of the naı̈ve kernel is subject to the vector
size n but independent of actual vector content (refer to the implementation
shown in Algorithm 1). In contrast, the speed of the two sorting-enabled kernels
are sensitive to vector content to some degree. This can be explained by the
following three factors: variable pair sorting in Step1, discordant pair counting
based on pairwise merge of sorted subarrays in Step3, and linear-time scans
19
14.0
Naïve
GSE
VSE
13.9
Speedup
13.8
13.7
13.6
13.5
13.4
DS21050
DS19784
DS13070
DS3526
Figure 3: Speedups of 16-threaded instances over single-thread ones on multiple CPU cores
for determining tie groups in Step2 and Step4. Nevertheless, for both sortingenabled variants, their 16-threaded instances yield relatively consistent speedups
over their single-threaded ones, respectively. For the GSE (VSE) variant, its 16threaded instance runs 13.74× (13.79×) faster than its single-threaded one on
average, with a minimum speedup 13.63 (13.69) and a maximum speedup 13.90
(13.97). For each case, the two sorting-enabled variants both yield superior
performance to the naı̈ve variant, where the average speedup is 1.60 for the
GSE kernel and 2.72 for the VSE kernel.
Table 3: Performance comparison of three variants on multiple CPU cores
Instance
Single-threaded
16-threaded
Dataset
DS21050
DS19784
DS13070
DS3526
DS21050
DS19784
DS13070
DS3526
Naı̈ve
10,052
10,690
10,975
12,993
734
781
801
948
20
Time (s)
GSE
6,609
6,776
6,920
7,619
475
495
504
559
VSE
3,758
3,938
4,041
4,742
275
286
294
340
Speedup
GSE VSE
1.52 2.67
1.58 2.71
1.59 2.72
1.71 2.74
1.54 2.67
1.58 2.73
1.59 2.72
1.70 2.79
Table 4: Performance comparison of the three variants on Phi
Dataset
DS21050
DS19784
DS13070
DS3526
Naı̈ve
400
424
433
506
Time (s)
GSE
419
434
459
488
VSE
261
266
276
296
Speedup
GSE VSE
0.95 1.53
0.98 1.59
0.94 1.57
1.04 1.71
5.1.2. On Xeon Phi
Subsequently, we evaluated the three variants on a single 5110P Phi (see
Table 4). From Table 4, the VSE variant outperforms the naı̈ve variant for each
dataset by yielding an average speedup of 1.60 with the minimum speedup 1.53
and the maximum speedup 1.71. The GSE variant is superior to the naı̈ve one
on the DS3526 dataset, but inferior to the latter on the remaining three datasets.
Interestingly, by revisiting the CPU results shown in Table 3, we recalled that
the former actually performs consistently better than the latter for each dataset
on CPU. Since both the naı̈ve and the GSE variants use the same pairwise τ
coefficient kernel code for their corresponding CPU- and MIC-oriented implementations, this discordant performance ranking between the two variants could
owe to the architectural differences of the two types of processing unit (PU).
For instance, by enabling auto-vectorization, the naı̈ve kernel (see Algorithm
1) can concurrently process 16 integer elements by one 512-bit SIMD vector
instruction, in contrast with 4 integer elements by one 128-bit SSE instruction
on CPU. This fourfold increase in parallelism would enable the naı̈ve kernel to
further boost performance.
Figure 4 shows the speedups of each variant on the Phi over on multiple
CPU cores for each dataset. From Figure 4, it is observed that the Phi instance
of each variant outperforms its corresponding single-threaded and 16-threaded
CPU instances for each dataset. Specifically, the Phi instance of the naı̈ve
variant runs 25.34× faster on average than its single-threaded CPU instance,
with the maximum speedup 25.67, and 1.85× faster on average than the 16threaded CPU instance, with the maximum speedup 1.87. Compared to their
single-threaded CPU instances, the Phi instances of the GSE and VSE variants
produce the average speedups of 15.52 and 14.96 and the maximum speedups
of 15.77 and 16.00, respectively. Meanwhile, in comparison to their 16-threaded
CPU instances, their Phi instances performs 1.13× and 1.08× better on average
and 1.15× and 1.15× better at maximum, respectively.
5.2. Comparison With MATLAB and R
Secondly, we compared our algorithm with all-pairs τ coefficient implementations in the widely used MATLAB (version R2015b) and R (version 3.2.0).
MATLAB and R are executed in one 16-core compute node mentioned above,
where MATLAB runs 16 threads as it supports multithreading and R runs in
sequential. For fair comparison, both MATLAB and R merely compute all-pairs
21
Naïve
30
GSE
VSE
Naïve
2.0
GSE
VSE
1.8
25
1.6
1.4
Speedup
Speedup
20
15
10
1.2
1.0
0.8
0.6
0.4
5
0.2
0
0.0
DS21050
DS19784
DS13070
DS21050
DS3526
(a)
DS19784
DS13070
DS3526
(b)
Figure 4: Speedups of each variant on Phi over on CPU: (a) speedups over one CPU core and
(b) speedups over 16 CPU cores.
Table 5: Performance comparison with MATLAB and R
Dataset
DS21050
DS19784
DS13070
DS3526
Time (s)
MLAB R
182,343 266,001
205,181 284,215
205,063 287,635
240,778 345,668
Speedup over MLAB
Naı̈ve GSE VSE
456
435
699
484
473
772
473
446
743
476
494
812
Speedup over R
Naı̈ve GSE VSE
665
635
1,019
671
655
1,069
664
626
1,042
683
709
1,166
τ coefficient values, without conducting statistical tests, same as our algorithm
does. Table 5 shows the runtimes of the 16-threaded MATLAB and sequential
R instances as well as their comparison with our three variants that execute on
the 5110P Phi. From the table, each variant demonstrates excellent speedups,
i.e. two orders-of-magnitude over 16-threaded MATLAB and three orders-ofmagnitude over sequential R. Compared to 16-threaded MATLAB, the average
and maximum speedups are 472 and 484 for the naı̈ve variant, 462 and 494 for
the GSE variant and 756 and 812 for the VSE variant, respectively. In contrast,
the average and maximum speedups over sequential R are 671 and 683 for the
naı̈ve variant, 656 and 709 for the GSE variant and 1,074 and 1,166 for the VSE
variant, respectively.
5.3. Parallel Scalability Assessment
5.3.1. Multithreading
Thirdly, we evaluated the multithreading scalability of our variants on the
Phi with respect to number of threads. Figure 5 shows the parallel scalability
of the three variants. In this test, we used balanced thread affinity to ensure
that thread allocation is balanced over the cores and the threads allocated to
the same core have consecutive identifiers (i.e. neighbors of each other). This
22
59T
118T
177T
236T
1400
59T
118T
177T
1400
236T
1200
1200
1000
1000
1000
800
600
Time (s)
1200
Time (s)
Time (s)
1400
800
600
177T
236T
600
400
400
200
200
200
0
0
(a)
118T
800
400
DS21050 DS19784 DS13070 DS3526
59T
0
DS21050 DS19784 DS13070 DS3526
(b)
DS21050 DS19784 DS13070 DS3526
(c)
Figure 5: Multithreading scalability of different variants: (a) the naı̈ve variant, (b) the GSE
variant and (c) the VSE variant.
thread affinity configuration is attained by setting the environment variable
KMP AFFINITY to balanced.
From the figures, it is observed that each variant gets performance improved
as the number of active threads per core grows from 1, via 2 and 3, to 4 (corresponding to 59, 118, 177 and 236 threads, respectively). As each core is dual
issue and employs in-order execution, at least two threads per core are required
in order to saturate the compute capacity of each core. Meanwhile, when moving
from one thread per core to two threads per core, we expect that the speedup
could be close to 2. In this regard, we investigated the speedup of the instance
with two threads per core over the one with one thread per core for each variant, and found that the average speedups are 1.58, 1.61 and 1.56 for the naı̈ve,
GSE and VSE variants, respectively. This finding is close to our expectation
largely. Furthermore, since all threads per core share the dual in-order execution pipeline, deploying three or four threads per core may further improve
performance but normally with decreased parallel efficiency (with respect to
threads rather than cores). Note that for the 5110P Phi, only 59 out of 60 cores
are used for computing as one core is reserved for the operating system running
inside. Since each variant reaches peak performance at 236 threads, we used
this number of threads for performance evaluation in all tests, unless otherwise
stated.
5.3.2. Distributed computing
Finally, we measured the parallel scalability of our algorithm by varying the
number of Phis used in a distributed environment (see Figure 6). This test is
conducted in a cluster that consists of 16 Phis and is constituted by the aforementioned 8 compute nodes. Each variant used 236 threads, since this setting
leads to the best performance as mentioned above. From Figure 6, the naı̈ve
variant demonstrates nearly constant speedups for all datasets on a specific
number of Phis, while the two sorting-enabled variants exposed slight fluctuations under the same hardware configuration. This can be explained by the fact
that the runtime of our naı̈ve variant is independent of vector content, whereas
that of each sorting-enabled variant is sensitive to actual vector content to some
degree. Moreover, for each dataset, it is observed that every variant has demon23
18
18
DS21050
DS19784
DS13070
DS3526
14
Speedup
12
DS21050
DS19784
DS13070
DS3526
16
14
12
Speedup
16
10
8
10
8
6
6
4
4
2
2
0
0
2
4
8
Number of Phis
16
2
4
8
Number of Phis
(a)
(b)
DS21050
DS19784
DS13070
DS3526
12
GSE
VSE
500
400
Time (s)
14
Speedup
Naïve
600
18
16
16
10
8
300
200
6
4
100
2
0
0
2
4
8
Number of Phis
1
16
(c)
2
4
8
Number of Phis
16
(d)
Figure 6: Distributed computing scalability: (a) the naı̈ve variant, (b) the GSE variant and
(c) the VSE variant and (d) runtimes of each variant on the DS3526 dataset.
strated rather good scalability with respect to number of Phis. Concretely, the
naı̈ve variant achieves an average speedup of 2.00, 3.99, 7.96 and 15.81, the GSE
one yields an average speedup of 1.93, 3.82, 7.63 and 14.97, and the VSE one
produces an average speedup of 1.99, 3.94, 7.86 and 15.23, on 2, 4, 8 and 16
Phis, respectively.
6. Conclusion
Pairwise association measure is an important operation in searching for
meaningful insights within a dataset by examining potentially interesting relationships between data variables of the dataset. However, all-pairs association
computation are computationally demanding for a large volume of data and may
take a prohibitively long sequential runtime. This computational challenge for
big data motivated us to use parallel/high-performance computing architectures
to accelerate its execution.
In this paper, we have investigated the parallelization of all-pairs Kendall’s τ
coefficient computation using MIC processors as the accelerator. To the best of
our knowledge, this is for the first time that all-pairs τ coefficient computation
24
has been parallelized on MIC processors. For the τ coefficient, we have developed
three variants, namely the naı̈ve variant, the GSE variant and the VSE variant,
based on three pairwise τ coefficient kernels, i.e. the naı̈ve kernel, the GSE
kernel and the VSE kernel. The three variants all can execute on CPUs, Phis and
their clusters. The naı̈ve kernel has a time complexity of O(n2 ), while the other
two sorting-enabled kernels have an improved time complexity of O(n log n).
Furthermore, we have proposed a generic framework for workload balancing
in symmetric all-pairs computation and overcoming memory limitation on the
host or accelerator side. This framework assigns unique identifiers to jobs in the
upper triangle of the job matrix and builds provable bijective functions between
job identifier and coordinate space.
The performance of the three variants was evaluated using a collection of
real gene expression datasets produced from whole human genomes. Our experimental results demonstrated that on one 5110P Phi, the naı̈ve variant runs up
to 25.67× faster than its execution on a single CPU core, and up to 1.87× faster
than on 16 CPU cores. On the same Phi, the GSE and VSE variants run up to
15.77× and 16.00× faster than their executions on a single CPU core, and up
to 1.15× and 1.15× faster than on 16 CPU cores, respectively. Meanwhile, on
the same CPU/Phi hardware configuration, the VSE variant achieves superior
performance to the naı̈ve and GSE variants. Interestingly, the naı̈ve variant was
observed to be inferior to the GSE variant on CPUs for both single-threaded
and 16-threaded settings, but became superior to the latter on the 5110P Phi
for most benchmarking datasets used. As both variants use the same core
C++ code for their corresponding CPU- and MIC-oriented implementations as
mentioned above, this observation suggests that the architectural differences
between different types of PUs may make substantial impact on the resulting
performance. Subsequently, we compared our algorithm with the third-party
counterparts implemented in the popular MATLAB and R, observing that our
algorithm on a single 5110P Phi runs up to 812× faster than 16-threaded MATLAB and up to 1, 166× faster than sequential R, both of which are executed
on high-end Intel E5-2650 CPUs. We further assessed the parallel scalability
of our algorithm with respect to number of Phis in a distributed environment,
exposing that our algorithm demonstrated rather good distributed computing
scalability.
Finally, it is worth mentioning that the current version of our VSE kernel
constrains the largest n value to 215 − 1, due to 32-bit integer packing. One
solution to overcome this constraint is packing a variable pair (ui , vi ) into a
64-bit integer with each variable occupying 32 bits. In this case, we can split
a 512-bit vector into 8 lanes with each lane representing a 64-bit integer, and
then implement vectorized pairwise merge of sorted subarrays based on 64-bit
integers. Nonetheless, it should be noted that this 64-bit solution has twice less
parallelism than 32-bit. In the future, we plan to combine this non-linear measure with other linear or non-linear correlation/dependence measures to generate
fused co-expression networks for genome-wide gene expression data analysis at
population level. In addition, since R programming language is frequently used
in data analytics and the R implementation of all-pairs τ coefficient computation
25
is extremely slow for large-scale datasets, we also plan to release a R package
for public use based on our research in this study.
Acknowledgment
This research is supported in part by US National Science Foundation under
IIS-1416259 and an Intel Parallel Computing Center award. Conflict of interest :
none declared.
References
References
[1] Q. Zhu, A. K. Wong, A. Krishnan, M. R. Aure, A. Tadych, R. Zhang, D. C.
Corney, C. S. Greene, L. A. Bongo, V. N. Kristensen, et al., Targeted exploration and analysis of large cross-platform human transcriptomic compendia, Nature Methods 12 (3) (2015) 211–214.
[2] R. Steuer, J. Kurths, C. O. Daub, J. Weise, J. Selbig, The mutual information: detecting and evaluating dependencies between variables, Bioinformatics 18 (suppl 2) (2002) S231–S240.
[3] A. J. Butte, I. S. Kohane, Unsupervised knowledge discovery in medical
databases using relevance networks., in: Proceedings of the AMIA Symposium, American Medical Informatics Association, 1999, p. 711.
[4] M. Mutwil, S. Klie, T. Tohge, F. M. Giorgi, O. Wilkins, M. M. Campbell, A. R. Fernie, B. Usadel, Z. Nikoloski, S. Persson, Planet: combined
sequence and expression comparisons across plant networks derived from
seven species, The Plant Cell 23 (3) (2011) 895–910.
[5] A. Gobbi, G. Jurman, A null model for pearson coexpression networks,
PloS One 10 (6) (2015) e0128115.
[6] A. A. Margolin, I. Nemenman, K. Basso, C. Wiggins, G. Stolovitzky, R. D.
Favera, A. Califano, ARACNE: an algorithm for the reconstruction of gene
regulatory networks in a mammalian cellular context, BMC Bioinformatics
7 (Suppl 1) (2006) S7.
[7] M. Aluru, J. Zola, D. Nettleton, S. Aluru, Reverse engineering and analysis
of large genome-scale gene networks, Nucleic Acids Research 41 (1) (2013)
e24.
[8] A. Lachmann, F. M. Giorgi, G. Lopez, A. Califano, Aracne-ap: gene network reverse engineering through adaptive partitioning inference of mutual
information, Bioinformatics 32 (14) (2016) 2233–2235.
[9] J. Lee Rodgers, W. A. Nicewander, Thirteen ways to look at the correlation
coefficient, The American Statistician 42 (1) (1988) 59–66.
26
[10] L. Song, P. Langfelder, S. Horvath, Comparison of co-expression measures:
mutual information, correlation, and model based indices, BMC Bioinformatics 13 (1) (2012) 328.
[11] C. Spearman, Spearmans rank correlation coefficient, Amer J Psychol 15
(1904) 72–101.
[12] M. G. Kendall, Rank correlation methods, Griffin, 1948.
[13] Y. Wang, Y. Li, H. Cao, M. Xiong, Y. Y. Shugart, L. Jin, Efficient test
for nonlinear dependence of two continuous variables, BMC Bioinformatics
16 (1) (2015) 1.
[14] W. Xu, Y. Hou, Y. Hung, Y. Zou, A comparative analysis of spearman’s
rho and kendall’s tau in normal and contaminated normal models, Signal
Processing 93 (1) (2013) 261–276.
[15] G. A. Darbellay, I. Vajda, et al., Estimation of the information by an
adaptive partitioning of the observation space, IEEE Transactions on Information Theory 45 (4) (1999) 1315–1321.
[16] C. O. Daub, R. Steuer, J. Selbig, S. Kloska, Estimating mutual information
using b-spline functions–an improved similarity measure for analysing gene
expression data, BMC Bioinformatics 5 (1) (2004) 1.
[17] K.-C. Liang, X. Wang, Gene regulatory network reconstruction using conditional mutual information, EURASIP Journal on Bioinformatics and Systems Biology 2008 (1) (2008) 1–14.
[18] G. J. Székely, M. L. Rizzo, N. K. Bakirov, et al., Measuring and testing
dependence by correlation of distances, The Annals of Statistics 35 (6)
(2007) 2769–2794.
[19] M. R. Kosorok, On brownian distance covariance and high dimensional
data, The Annals of Applied Statistics 3 (4) (2009) 1266.
[20] A. Gretton, O. Bousquet, A. Smola, B. Schölkopf, Measuring statistical
dependence with hilbert-schmidt norms, in: International Conference on
Algorithmic Learning Theory, Springer, 2005, pp. 63–77.
[21] D. N. Reshef, Y. A. Reshef, H. K. Finucane, S. R. Grossman, G. McVean,
P. J. Turnbaugh, E. S. Lander, M. Mitzenmacher, P. C. Sabeti, Detecting
novel associations in large data sets, Science 334 (6062) (2011) 1518–1524.
[22] L. Song, A. Smola, A. Gretton, J. Bedo, K. Borgwardt, Feature selection via
dependence maximization, Journal of Machine Learning Research 13 (May)
(2012) 1393–1434.
[23] B. H. W. Chang, W. Tian, Gsa-lightning: ultra-fast permutation-based
gene set analysis, Bioinformatics 32 (19) (2016) 3029–3031.
27
[24] H. Abdi, The kendall rank correlation coefficient, Encyclopedia of Measurement and Statistics. Sage, Thousand Oaks, CA (2007) 508–510.
[25] S. Wang, I. Pandis, D. Johnson, I. Emam, F. Guitton, A. Oehmichen,
Y. Guo, Optimising parallel R correlation matrix calculations on gene expression data using mapreduce, BMC Bioinformatics 15 (1) (2014) 1.
[26] R. C. Team, et al., R: A language and environment for statistical computing, R Foundation for Statistical Computing, 2013.
[27] J. Dean, S. Ghemawat, Mapreduce: simplified data processing on large
clusters, Communications of the ACM 51 (1) (2008) 107–113.
[28] Y. Liu, T. Pan, S. Aluru, Parallel pairwise correlation computation on
intel xeon phi clusters, in: 28th International Symposium on Computer
Architecture and High Performance Computing, IEEE, 2016, pp. 141–149.
[29] Mathworks, https://www.mathworks.com/products/matlab.html (2015).
[30] A. Sodani, R. Gramunt, J. Corbal, H.-S. Kim, K. Vinod, S. Chinthamani,
S. Hutsell, R. Agarwal, Y.-C. Liu, Knights landing: Second-generation intel
xeon phi product, IEEE Micro 36 (2) (2016) 34–46.
[31] J. Jeffers, J. Reinders, Intel Xeon Phi coprocessor high-performance programming, Morgan Kaufmann, 2013.
[32] W. R. Knight, A computer method for calculating kendall’s tau with ungrouped data, Journal of the American Statistical Association 61 (314)
(1966) 436–439.
[33] H. Inoue, T. Moriyama, H. Komatsu, T. Nakatani, Aa-sort: A new parallel
sorting algorithm for multi-core simd processors, in: Proceedings of the
16th International Conference on Parallel Architecture and Compilation
Techniques, IEEE Computer Society, 2007, pp. 189–198.
[34] K. E. Batcher, Sorting networks and their applications, in: Proceedings of
the April 30–May 2, 1968, spring joint computer conference, ACM, 1968,
pp. 307–314.
[35] J. Chhugani, A. D. Nguyen, V. W. Lee, W. Macy, M. Hagog, Y.-K. Chen,
A. Baransi, S. Kumar, P. Dubey, Efficient implementation of sorting on
multi-core simd cpu architecture, Proceedings of the VLDB Endowment
1 (2) (2008) 1313–1324.
[36] T. Xiaochen, K. Rocki, R. Suda, Register level sort algorithm on multicore simd processors, in: Proceedings of the 3rd Workshop on Irregular
Applications: Architectures and Algorithms, ACM, 2013, p. 9.
[37] S. Odeh, O. Green, Z. Mwassi, O. Shmueli, Y. Birk, Merge path-cacheefficient parallel merge and sort, Tech. rep., Technical report, CCIT Report
(2012).
28
[38] O. Green, R. McColl, D. A. Bader, Gpu merge path: a gpu merging algorithm, in: Proceedings of the 26th ACM international conference on
Supercomputing, ACM, 2012, pp. 331–340.
[39] Intel, Intel xeon phi processor software optimization guide,
https://software.intel.com/en-us/articles/intel-xeon-phi-processorsoftware-optimization-guide (2016).
[40] T. Kiefer, P. B. Volk, W. Lehner, Pairwise element computation with
MapReduce, in: Proceedings of the 19th ACM International Symposium
on High Performance Distributed Computing, ACM, 2010, pp. 826–833.
[41] W. Gropp, T. Hoefler, R. Thakur, E. Lusk, Using advanced MPI: Modern
features of the message-passing interface, MIT Press, 2014.
[42] T. El-Ghazawi, L. Smith, Upc: unified parallel c, in: Proceedings of the
2006 ACM/IEEE conference on Supercomputing, ACM, 2006, p. 27.
[43] J. González-Domı́nguez, Y. Liu, B. Schmidt, Parallel and scalable shortread alignment on multi-core clusters using upc++, PLoS ONE 11 (1)
(2016) e0145490.
29
| 2cs.AI
|
A Scalable Stream-Oriented Framework for Cluster
Applications
Tassos S. Argyros
David R. Cheriton
Distributed Systems Group
Stanford University
arXiv:cs/0504051v1 [cs.DC] 13 Apr 2005
{Argyros, Cheriton}@DSG.Stanford.EDU
ABSTRACT
This paper presents a stream-oriented architecture for structuring cluster applications. Clusters that run applications
based on this architecture can scale to tenths of thousands
of nodes with significantly less performance loss or reliability problems. Our architecture exploits the stream nature
of the data flow and reduces congestion through load balancing, hides latency behind data pushes and transparently
handles node failures. In our ongoing work, we are developing an implementation for this architecture and we are able
to run simple data mining applications on a cluster simulator.
1.
INTRODUCTION
One of the main characteristics of computing these days is
the data explosion; in fact, data nowadays grows at an exponential rate. What is really surprising, however, is that the
growth of the acquired data surpasses the increase rate of
the processing speed of today’s processors. As an example,
the amount of data in GenBank (a genomics database) doubles every 9 months, a much higher rate than the 18-month
doubling period of processors (as dictated by Moore’s law).
On the other hand, the processing of data is of imminent
value, since we continuously discover new ways to mine and
process large amounts of data to extract useful information.
Fields such as biology, physics, earth sciences and even marketing depend more and more on mining huge amounts of
data to break new ground and advance forward.
Where all this leads to is that we need to find a way to process ever-larger amounts of data with systems of reasonable
cost. A possible solution to this problem could be clusters of
commodity machines; after all, the cost of PC and network
hardware keeps falling at impressive rates. Thus, one would
argue, all we have to do to reach our goal is to buy more
PCs, larger switches, and just connect everything together.
follow this approach. First, there are severe scaling problems. Indeed, utilization of under 10% of peak performance
in large Linux clusters has been reported []. The problem
has only begin to show up in current systems, since the majority of today’s clusters has relatively small sizes between 10
and 100 nodes, with only a handful of systems being in the
range over 1000 nodes. However, in order to cope with the
rapidly increasing amounts of data, we should expect that
clusters with many thousands of nodes will become the rule
rather than the exception in a few years; moreover, clusters
with 10,000 nodes or more should start appearing soon. One
can only imagine how severe scaling problems will appear in
systems of such size.
Apart from performance problems, today’s cluster face a
number of other challenges. Node failures is one of them.
Basic probability theory dictates that the more nodes we
have in a cluster, the greater the chance that one of them will
fail within a small period of time. Identifying and correcting node failures is a hard task that today usually requires
human intervention. Moreover, writing an application to
run on a cluster, even a simple one, is much harder than it
seems. With today’s technology one has to use some sort
of message passing interface or start making remote procedure calls to transfer data. Such programming is difficult,
time consuming and hard to debug, especially in a parallel
environment.
The question that naturally follows is what can we do about
these problems. More specifically, how should the data be
send between the nodes so that congestion and latency problems do not arise? How do you deal with node and network
failures that are inevitable in a system of that size? What’s
the most effective way to interconnect such a big network?
And last but not least, how can one program and debug such
large scale applications? On a first thought, these questions
seem orthogonal to each other and inherent in every large
scale system.
Unfortunately, there are multiple problems when we try to
However, we believe that this is not true. We claim that the
problem lies in the conventional way that today’s systems
are engineered, and that an integrated solution to all of the
above questions do exist. Specifically, today’s systems are
build under the convention that the applications determine
data flow in an arbitrary way. What this means is that
a part of an application that runs on a cluster node can
potentially request data from any other node at any time;
and under this assumption, there is no systemic action that
can be taken to prevent scaling problems. Viewed from a
point outside of the application, data requests are random
accesses, and random access does not scale.
The solution that we propose is to build the whole system
based on streams. More specifically, we propose to structure
the applications in a way that they read and write streams
and build an underlying framework that handles all the data
flow issues. There are numerous advantages that result from
this approach. By infusing the stream model into the applications, we can build a framework that has enough knowledge of how the data flows within the cluster to circumvent
the scaling problems. Instead of using data requests to send
data from one node to the other (a latency-prone approach),
data can now be pushed to its destination beforehand.
Moreover, this model significantly simplifies applications programming. Issues that before needed to be handled by the
application, such as data flow and node failures, are now
handled transparently to the application by our framework.
Since all data exchange takes place using structures similar
to files, there are no complicated message-passing code that
is hard to write, prone to errors and sensitive to changes
(e.g. in the size of the cluster).
Finally, node failures become manageable since the framework has enough information to figure out what part of the
data is lost and proceed to corrective action. This way, every application that is written using streams is robust to
failures, at no expense to the programmer.
Figure 1:
In this example we have three
stages. Stage 1 outputs streams “streamA.str” and
“streamB.str”. Stage 2 inputs “streamA.str” and
stage 3 inputs “streamB.str”. Note that all details
of how stream data is delivered to nodes are handled
by the framework.
provided by previous stages),
In the rest of this paper, we present our on-going work which
can be separated to two main tasks. The first is to define the
computational model of streams: their programming representation and their semantics. The second task is the implementation of the programming framework that includes
functions such as stream operations and node failures handling. We begin by presenting the streams model.
2.
2. the declaration of the operations that should be applied on the input streams, and
3. the declaration of the output streams.
Additionally, a stage definition includes the actual function
that operates on the data units that a stream carries.
THE STREAMS MODEL
The goal of our system is to perform efficient processing
on large amounts of data. We refer to an independent and
complete processing application as a task.
An interesting observation is that in most cases a task can
be broken down to a number of independent operations that
apply on data as it flows through them. More specifically, we
define a computational stage to be a logical processing unit:
each stage receives as input a number of streams, and it has
the option to apply some specific operations to the incoming
streams. As an example, a stage could specify that it needs
to receive a particular stream sorted in some sense (we will
define exactly what this means in the next sections). The
stage then can perform any computation on the data units
of a stream, and it can output the results of the computation
as another set of streams, for the next stages to process. For
an illustration of this concept see figure 1
An important point here is to distinguish between the declaration and the definition of a stage. More specifically, a
stage declaration is comprised by:
1. the declaration of the input streams (which must be
The reason why this distinction is important has to do with
the fact that the flow of data depends on the declaration
of a stage solely. In other words, we can determine with
which other stages a stage will exchange data. Thus, the
layout of the data flow is now known before the execution
of the application, just by examining the declarations of the
stages.
A question that naturally arises is how are stages related to
nodes? This issue will be examined in the implementation
section, but as a simplification one can imagine that each
stage is assigned to a set of nodes with each node in the
set running the same piece of code (specifically the stage
function that operates on the stream data units).
2.1 Definition of Streams
“Streams” of data have been around since the first days of
computing. Usually, when one refers to a stream, she implies
a data flow with two main properties: sequentiality and uniformity. That is, a stream can be abstracted as a sequence
of data units with the restriction that these data units are
of the same kind (i.e. they share a common low-level data
representation). As an example, one could naturally define
“a stream of integers” to mean a data sequence with data
units being 32-bit integers.
that end in “.str”, but essentially any unique string is adequate. Having all streams under a unique namespace is an
important simplification, since if a stage outputs a stream
named “sorted.str”, then another stage that is interested
in processing this stream just needs to “ask” for the stream
named “sorted.str” (more details on the programming interface are provided in section 3).
2.2 Stream Windows
Figure 2: Three nodes send data to three other
nodes using a stream of data. Note that this is
a high-level representation. Implementation-wise,
nodes use TCP pair-connections to transfer data.
In our model, we have expanded this classic definition of
streams. We raise the restriction of sequentiality, in the
sense that in some cases the exact order of data is of little
importance. For example, we may have three nodes sending
data to another three nodes using a single stream (see figure
2); because the three sending nodes are not synchronized,
order is difficult to be determined here. The other extension
to the streams definition is that our model requires each data
unit to be associated with a key. We can describe the key
to be just a constant-length additional field to each stream
unit. Thus, each unit of a stream can be abstractly described
as a C struct:
Streams have infinite length in theory, and usually unknown
length in practice. Since most applications simply need results before the end of the stream, we need to find a way
to start producing results while a data stream still flows.
As a solution to this, we propose using stream windows as
computational units, upon which we can perform operations
and produce results. There are many ways to define such a
window; what we have used, and seems to make sense for a
large number of applications, is to define a window based on
a timestamp. This timestamp is defined as a non-negative
integer and it is set by the programmer in the stage where
the data is produced. It has the additional requirement that
it should be increasing; that is, stream data units that are
outputted first (at a stage’s output stream) are expected to
have smaller timestamps than the data units that follow.
More formally, a window of width T is defined to be all the
data units of a stream that have timestamps more or equal
to nT and less than (n + 1)T − 1, for n ∈ ℵ. As an example, the first window will be all the stream data units with
timestamps 0 to T − 1 and the second will have data units
with timestamp from T to 2T − 1.
Having defined the notion of window, we now proceed in
defining the stream operations.
2.3 Operations on Streams
As mentioned before, each stage can apply some operations
on the incoming streams. One could see these operations as
a kind of “queries” on streaming data. The reason why our
framework provides these operations (instead of having the
applications programmer providing them) has to do with
the need of the framework being in control of how the data
flows. In a conventional approach, the application programmer would need to program both the data flow operations
(e.g. using a message passing interface) and the operations
that apply on the data units. Our approach, in contrast,
struct StreamDataUnit {
is to distinguish these two programming tasks, provide the
KeyType key;
data flow operations by the framework and leave up to the
DataType data;
programmer the simpler but more important task of pro};
gramming the data operations. In this way, we achieve both
to give the framework full knowledge and control of the data
flow and to relieve the application programmer from the
Although the data field could change depending on the DataType hard task of programming how the data should move from
that a stream is associated to (i.e. the type representation
one node to the other.
of a stream’s data units), the type of the key, KeyType is
the same for all streams. Intuitively, key is a numeric field
In deciding which operations should be provided by the
that in some way acts as a representative for the respecframework, we wanted to select a relatively small operations
tive data in the various stream operations. In our current
set that would cover the majority of our target applications.
implementation, KeyType is a fixed-size 64-bit integer.
These operations act on windows of data, as defined in the
previous section. More specifically, these operations and
Additionally, one soon realizes the need to uniquely identheir semantics when applied to a stream are:
tify every stream. Towards this purpose, we define a global
stream namespace where each stream is associated with a
unique name. We conventionally refer to streams with names
Sort For each window, the data units of the operated stream
will arrive at each node at a sorted order (either descending or ascending) based on the key value.
Group For each window, the data of the operated stream
will arrive at each node grouped by the key value, i.e.
all stream data units of the same window that have the
same key value will arrive together at each receiving
node.
Figure 3 shows an example of the Group operation. There
we have packets of a stream flowing from the left three nodes
to the right three nodes. The stream has the Group operation applied to it, and thus packets with the same key end
up at the same node.
a boolean formula). In order to implement this for
a stream, we just add some code at the stage that
outputs the stream that only allows a data unit to be
outputted when it satisfies the mentioned criterion.
• Aggregations. Assume that we have a stream and
we want to perform some aggregation operation on it,
e.g. if the stream carries integers we may want to sum
all integers in each window. One way to implement
this is to define a stage that takes the stream to be
aggregated as an input, defines another output stream
that carries the aggregations and have that stream end
up in the same node (by giving each aggregation the
same key and applying the Group operator) where all
the aggregations would sum up to produce the final
number for each window.
One could argue whether these functions should be classified as stream operations or simple applications. The point,
however, is that the Group and Sort operations with data
units computations is a much more powerful combination
that what it seems.
2.4 Load Balancing using Failure Management
There are two reasons why a node may get overwhelmed
with data:
• The node may have lower performance compared to
the other nodes due to a hardware/software problem.
This is the classic definition of “node failure”.
Figure 3: An example of the Group operator in action. Here we have two stages, with stage 1 sending
data to stage 2 using a Grouped stream. Note how
all packets with key 10 end up in the same node.
• The actual amount of data send to the node may be
much greater than the amount send to other nodes;
thus although the node functions properly, it can not
process all the incoming data as fast as the other nodes.
We argue that these two simple operators suffice for a surprising large number of applications. Indeed, in many data
processing applications data is exchanged between the nodes
of a cluster in order to be grouped, to be sorted or to perform a seemingly different operation that on a hindsight it
is again based on sorting or grouping.
In our approach we do not distinguish between these two
cases, although they may seem initially as two totally different problems. We argue that by using the failure recovery
mechanism for both cases is the more appropriate tactic for
the following reasons.
There is a large number of operations that can be implemented using our two basic operations combined with some
in-stage computation. Here are some examples:
• Join. We can perform window-oriented joins between
streams of data. By join we mean that we output a
concatenation of data units from the joined streams
if all these data units share the same key value. The
way that this can be implemented is that we create
a stage with input the streams that we would like to
be joined with the Group operation applied. Then all
the data units with the same key value will end up at
the same node. All we have to do then is to see which
of these key values span across all streams and output
the respective data units.
• Select. A select operation can also be implemented.
By select we mean that we want a stream to contain
only key values that satisfy a specific criterion (perhaps
• In many situations it is hard to distinguish between the
two cases; thus by treating data overloads and failures
differently, there is the risk of making a wrong decision
and make the problem worse instead of fixing it.
• On an afterthought, the two problems are very similar in nature; indeed, the result of both is that a node
is not able to finish a task that it has been assigned;
thus the appropriate corrective action in both situations should be also very similar.
• Some load balancing mechanisms are anyway implemented into the failure management subsystem since
after a failure occurs, the failure must be handled in a
way that will not result in making other (non-failed)
nodes overloaded.
• The design of the system is overall simpler and more
effective when we can solve two important problems
under a single mechanism.
• Under our approach, load balancing takes into consideration all possible causes of load unbalance, such
as failures, bad data partitioning, non-uniformities in
hardware or network and corrects them in run-time.
We thus believe that the above are significant advantages
of our approach compared to other conventional load balancing mechanisms. Note that the definition of failure that
we use, i.e. a node that does not make adequate progress,
means that our load balancing mechanism can handle not
only problems of data partitioning and overloading, but also
hardware and network problems (since e.g. a bad network
link would also cause slow node progress). More details on
the implementation of the above mechanisms are given in
section 4.7.
3.
PROGRAMMING FRAMEWORK
In this section we present the programming framework that
provides the applications with the streams functionality. The
approach that we have taken is to implement the framework
as a C++ library, that is compiled along with the application
code.
processingStage->newOutputStream( dataStream );
or
processingStage->newInputStream(dataStream,SORT);
where in the second case, the second argument is the operation to be applied to the input stream.
3.2 Stage function definition
In our approach streams share many characteristics with
files. In order to read or write data from a stream, one
has to call the getStreamHandle() method that takes as an
argument the string name of the stream and whether it is
an input or an output stream. Here are some examples:
StreamHandle distrStr =
getStreamHandle("distr.str",INPUT);
StreamHandle mergeStr =
getStreamHandle("merge.str",OUTPUT);
Using the StreamHandle objects one can get or send packets
from/to the respective streams. For instance, the expression
More specifically, the programmer needs to perform two
main tasks in order to build a cluster application:
data = getPacket( distrStr );
1. The high level stage and stream declarations must be
given. That is, the stages and the streams must be created and then each stage must specify which are the
input and the output streams that it uses and what operations should be applied into the incoming streams.
2. For each stage, the programmer must provide the actual function that performs the computation on the
data units, that is reads the data from the incoming
streams, modifies it and outputs the results to the outgoing streams.
3.1 Stage and streams declarations
Our aim is to declare stages and streams in a single point
within the code. In our current implementation, the programmer needs to create a function where stages and streams
are declared as in the following example:
Ptr<Stage> processingStage =
stageManager->newStage( 10 );
would get the next packet from the queue of the stream
“distr.str”. Similarly, in order to send a packet to the
stream “merge.str” one simply has to issue the command
sendPacket(mergeStr, data);
In both these examples, data is of type DataUnit, which is
the class representation of a stream packet.
Note that in our implementation there is also a notification
mechanism for signaling the stage function when new packets arrive.
4. IMPLEMENTATION
We are currently implementing a framework that will support cluster applications that use the stream model. To
test and evaluate this framework we are also developing a
simulator of a cluster. In the next sections we present the
details of the framework implementation and the simulation
environment.
4.1 Simulation Environment
where the number 10 declares the nodes to be assigned to
this stage. Also, a stream is declared similarly as
Ptr<Stream> dataStream =
streamManager->newStream( "data.str" );
where the name of the stream is declared. After both a stage
and a stream is declared, the fact that the stage is associated
with a stream should be declared as well:
As mentioned before, we have developed a simulation environment to test and develop our framework.
The lower layer of the simulator is the network, where nodes
and their interconnect are simulated and a basic mechanism
to exchange packets exists. Packet traffic is implemented
using queues for each node and event notifications.
We are currently progressing towards implementing the full
functionality of the framework as described in this paper.
As a future work, we plan to deploy it in a small-size real
cluster for further development and testing.
4.2 Data flow
As mentioned before, an important advantage of the stream
model is that data can be pushed to its destination, instead
of having to be requested in advance. In order to do this,
we are using TCP connections; actually, TCP fits our needs
pretty well since it is stream-oriented in nature.
There is the issue of how we create and manage the connections from the application point of view. The case in most
of today’s systems is that the programmer needs to explicitly identify which connections must be created and between
which nodes specifically (e.g. one may need to specify the
IP’s of the nodes). However, in our implementation after
the declaration of stages and streams is done, a connection
is created automatically by the framework for every pair of
nodes that exchange data using a specific stream. The ID’s
of the connecting nodes and all the other network details
are hidden behind the simple specifications of stages and
streams.
To analyze this in more detail, when a stage is declared,
the number of nodes it is assigned to is also declared. Each
of the assigned nodes receive an initialization packet that
includes the streams that it inputs and outputs along with
the IP’s of the nodes that it should be connected through
these streams. Then the node opens a TCP connection with
each node that is connected through a input stream and
listens for a connection from each node that is connected
through an output stream.
When a node has made all the connections for its input and
output streams, it can start its computation. As soon as
there is some results from a stage, the nodes of that stage
push the data to its destination; for flow management we use
the standard TCP flow control mechanisms. Consecutively,
as soon as the next stages receive the first data packets, they
start processing data and producing results.
4.3 The Control Process
As soon as one tries to implement some control features,
such as failure management and load balance mechanisms,
it becomes evident that we need to synchronize the cluster
nodes on some decisions. As an example, in order to classify
a specific node of a stage as failed, all nodes of the previous
stage must agree on that fact; otherwise we may end up
in the unfortunate situation where some part of the data
still goes to the failed node (by the nodes that do not see
it as failed) while other nodes (that consider it failed) send
related data elsewhere.
In order to implement such features, a node is automatically
chosen to host a control process and it is called the control
node. This process communicates with the nodes of each
stage, receives data and feedback from them and makes decisions such as whether a node should be considered failed
or not (failure management) or how the data should be partitioned to be send to the receiving nodes (load balancing).
Note that we can have one control node per stage or one
control node for all stages or something in between. In other
words, a physical node can run as many control processes
as it can manage; we expect that the control tasks will not
be demanding in terms of processing power and bandwidth
Figure 4: Here we have three stages (1,2, and 3) and
two streams (A and B). The thin lines represent network connections, while thick lines show the logical
flow of the data. Note that we only have one control node that runs two control processes for the two
streams of the cluster.
requirements and thus a single node can act as a control
process for many stages. For an example of this fact, see
figure
4.4 Windows-based Computation and Implicit
State
In section 2.2 we argued on the need to have windows as
a computation unit. Implementation-wise, what this means
is that our total computation task is actually a sequence of
small window computations. Under this model, state is directly related to windows: the framework assumes that the
data of a window are its implicit state. Therefore, during a
window computation the only data (state) that needs to be
preserved is the data of the current window. This model enables us to perform load balancing and failure management
transparently, since the application does not have to declare
explicitly what state should be recovered in case of a failure.
4.5 GROUP Operation
In the Group operation three entities are involved: the sending stage, the receiving stage and the Group’ed stream. Remember that the semantics of the Group operation is that
we need all stream data units with the same key to end up
at the same node.
The main challenge in implementing the Group operation is
how to partition the keys in a way that no node gets either
overloaded (by receiving too much data) or stays idle (by receiving too little data). Related work in this field proposes
to make a pass over the data before deciding on how to distribute it. However, in our case this is too expensive and
often impossible since we do not have the luxury to store
the (possible endless) incoming stream data in order to determine the distribution; let alone the fact that determining
the actual distribution would require sorting the data, which
brings us back to our initial problem of how to split the data.
To tackle this problem we implement the following strategy.
As soon as some data is produced in the sending nodes, instead of streaming it to the next stage we buffer it and measure its distribution. The sending nodes use this information
to determine how the data should be split among the nodes.
After we begin sending data, we consider any overloaded
nodes as failed and use our failure handling mechanism to
redistribute the data of these nodes.
Let’s see the above procedure with some more detail. First,
we partition the data units using a hash function. Note that
we partition based on the keys of the data units, and thus
we ensure that data units with identical keys end up in the
same node. A problem that arises is that we do not know
the size of each partition in advance; nor we can assume
that all partitions have equal sizes. The way we solve this
issue is by making the number of partitions a multiple of the
number of nodes of the receiving stage; in other words, we
hash the data to a number of buckets that is many times
the number of the nodes that these buckets will end up to.
By carefully assigning many buckets per node we are able
to circumvent the problem of buckets having different sizes.
However, we can not make a proper assignment of buckets to nodes if we do not know the size of each bucket. In
order to get an estimate of this, we do not start sending
data as soon as it is available; instead, we partition the data
locally until a predetermined amount of data has been partitioned1 Explain how this is determined.. Then, the sending nodes communicate the partition sizes to the respective
stage control process (see section 4.3). The control process
executes an algorithm that figures out the optimal split of
the data (see Appendix A) and returns this information to
the nodes that immediately start sending the data to the
next stage.
What we achieve with this process is a very good starting
point in the computation of the first window. Moreover,
before we begin computing the next window we repeat a
similar process; but now we can use the actual distribution
of the data send in the previous window to best determine
how we should split the data in the next window.
However, what if in the middle of a window computation
the distribution changes unexpectedly? For example, if we
are dealing with a stock trading processing system, a sudden
increase in the trading of a specific set of stocks that end
up in the same node may overload that node and hold back
the whole computation. As mentioned, our solution in this
case is to handle overloads as failures. We examine this
mechanism in detail in section 4.7.
4.6 SORT operation
The Sort operation share many details with the Group operation. We will describe here in which ways they are similar
and we will focus on the points that they differ.
What is traditionally used for sorting data using a cluster
of machines is to partition the data into key ranges and
assign each range of keys to a specific machine. We argue
that under our stream model we can sort in a much more
efficient way. More specifically, there are two ways to sort
data using a distributed system:
1. We must ensure that each node receives keys that belong to a particular range, e.g. [min value, max value).
After each node receives all data with keys in that
range, it sorts them. Then, whenever some other process needs sorted data that fall into that range, it
queries that node. This is the conventional way of
sorting data in a cluster.
2. An alternative way is to have the sending nodes sort
whatever piece of data they have and then stream out
in sorted order the data to the next stage. Each node
of the next stage will simply need to merge the incoming data; in other words, if the data is send in descending order, the nodes of the next stage simply need to
read each time the data with the highest key from all
the incoming connections. This concept is illustrated
in figure 5.
We argue that the alternative approach has significant advantages, especially in a streaming environment like ours.
As an example, imagine an application that is only interested in the top 10% of the data. With the conventional
approach, we need to send all data through the network
since we do not know in advance which part of the data will
belong in the top 10% (and should be send out) and which
not. In contrast, with our approach the nodes will sort the
data and they will only stream it out until the next stage is
no more interested in reading more data. In other words, no
more data is going to be send over the network than what
is essential for the computation.
4.7 Failure Detection and Handling
The first step in handling a failure is to detect it. However,
since we are building a distributed system, we must make
sure that a node must be considered either as failed or not
failed by every other node that directly communicate with
it. Note that since we have partitioned our computation task
into stages, the only subset of nodes that are concerned with
a failure are these of a previous stage that send data through
a stream to the failed node. Therefore our model achieves
to restrict the impact of a failure to only a small subset of
the total nodes of the cluster.
Our approach to detecting a failure is that each stage independently decides on whether a node of a next stage is
failed or not. The nodes of a stage send periodic progress
reports to the stage control process for all nodes where they
send data. If there is a node failure then the progress report of all nodes will report that the failed node does not
seem to make enough progress; the control process will then
characterize this node as failed and it will trigger the failure
recovery mechanism.
The recovery mechanism is streams-oriented. This means
that the failure will be handled separately for each stream
that sends data to this node. The exact actions depend on
whether this stream has a Group or Sort operation assigned
to it. We begin by looking how to recover a stream with a
Group operation.
Assume that we have the stream “data.str” that is distributed Grouped from stage A to stage B. Node n that receives data in stage B fails, and stage A detects that. There
Figure 5: Sorting by merging sorted streams. In order to receive a data unit from the incoming stream, the
node in stage 2 chooses the packet with the highest key from all the incoming connections of the specific
stream.
will be a set of key buckets that stage A has associated with
node n. In implemented a failure recovery mechanism, the
following issues need to be solved:
stage after B can check these sequence numbers to simply
ignore results that were send to them before by node n.
5. RELATED WORK
1. The key partition that was assigned to the failed node
must be itself partitioned and redistributed to the other
nodes without causing any other overloads.
2. The data of the current window that was send to node
n must have been stored somewhere (apart from node
n).
3. There must be a mechanism to detect which results
n outputted before it failed, so that either stage B
doesn’t output duplicates or the stage that receives
data from stage B can recognize and ignore duplicates.
As soon as the control process decides to declare a node as
failed, it also makes a decision of how to repartition the key
space. In doing this, it assigns bigger part of the data of
the failed node to the those nodes that make the greatest
progress. In this way, a node failure actually results in a
more even load across the nodes of stage B. The algorithm
to do that is similar with the one for the initial partition
(see Appendix A) and it is not presented in detail in this
paper.
The data is redundantly stored in the sending nodes. That
is, as the nodes stream out data they also buffer it as a
back up in case of failures. After the control process has
declared a node failed, it determines the new data partition
and informs the nodes of stage A that immediately start
re-sending the buffered data following the new partition.
We moreover need to detect which results were outputted
by node n before it failed, and which not. Since we can not
count on the failed node n to give us this data, we should not
assign this task in the nodes of stage B to determine this.
Instead, with each data unit that we output we include a
sequence number that depends on the input data units that
were used to produce the specific result. The nodes of the
An other class of related work are database systems for
streams. Recently, several stream database systems have
been build [?, ?, ?]. However, most of them focus on singlenode environments and do not give any insight for implementing such systems in a distributed environment. Moreover, they are focused more on executing pre-determined
queries on data rather than acting as a framework for generic
cluster applications.
The only database projets that is deals with distributed systems issues in streams databases, to the extend of our knowledge, are the Aurora* and Medusa projects [?, ?]. Note
however that these systems are distributed in the sense that
two queries can execute in two different nodes – there is no
possibility of executing a single query using multiple nodes,
something that we attempt to do in our work. Concerning the above systems, in [?], fault recovery is examined
in distributed stream database systems. The paper follows
a replication-based approach, in contrast to our work. In
[?] several approaches on failure recovery are presented and
they are evaluated in a simulated environment.
MapReduce [?] is a programming model for writing cluster applications using two functions: the Map function produces some key/value pairs and the Reduce function merges
the pairs that share the same key. There are several points
where this work differs than ours. First, the streams programming model that we introduce is much more general
than simply using a Map/Reduce function pair, since it also
includes the notion of windows and operations. Moreover,
our system has load balancing mechanisms that are absent
from the MapReduce implementation. Finally, MapReduce
writes intermediate results to secondary storage (hard disks
on nodes) in order to be robust to failures. However, this approach has significant impact on performance. Our aim, in
contrast, is to handle failures on-the-fly and use only memory to store intermediate data.
River [?] is a system that uses streams for load balancing.
However, load balancing with River can only take place at
specific points of the computation; namely, at points where
each data unit from one stage can be send to an arbitrarily chosen node of the next stage under no restrictions (this
excludes the Group and Sort operations for instance). Our
system implements a similar mechanism for load balancing
when there are no restrictions in the flow of data; but we also
achieve to have load balancing at all stages of our computation, a much more general result. Also, like the River paper,
our load balancing mechanism can balance non-uniformities
either in data distribution, in hardware or in the network.
As part of the NOW Berkeley project [?], there has been
some work on how can one use a cluster to sort efficiently
[?]. The approach used is to split the data in ranges, that
(as we argued in section 4.6) we believe that it is not the
best direction to perform a sort operation, at least in our
application model. Also, the authors make the explicit assumption that the data follows a uniform distribution; in
our work, we do not make this assumption but rather we
use data pre-processing to approximate the actual distribution and load balance mechanisms to cope with changes or
bad approximations of the actual distribution. Also, our
algorithms are position to cope with the case that not all
source nodes carry the same amount of data, while this is
an essential assumption in the NOW-Sort paper.
There has also been some work on using streams in building faster microprocessors. Specifically, the Imagine stream
processor [?] uses a stream model to bypass the memory
bandwidth bottleneck. Based on the Imagine stream processor, there is an effort by the Merrimac project to build
a full supercomputer that is composed of stream processors
[?]. We believe that this work differs in goals, assumptions
and potential applications from our work. More specifically, Merrimac aim is to achieve an order of magnitude
more TFLOPS than conventional supercomputers. However, this greater computing capability requires pure scientific applications that perform a large number of numerical
computations and access relatively small amounts of data;
our framework, in contrast, enables generic applications that
process vast amounts of data to achieve theoretical peak performance in commodity hardware.
APPENDIX
A. SKETCH OF BUCKET DISTRIBUTION
ALGORITHM
Consider the following problem: we have a set of buckets, {b1 , b2 , . . . , bk }, each containing a number of items. Let
these numbers of items to be n1 , n2 , . . . , nk respectively. We
also have l nodes. We want to continuously group these
buckets into the l nodes, meaning that each node will get
a group of buckets in the form {bi , bi+1 , . . . , bj−1 , bj }. Our
goal is to find the bucket grouping that minimizes the variance of the number of items that each nodes receives (in
other words, it minimizes the square of the distance of the
number of items of each bucket from the average).
In order to try all possible combinations, we would need exponential time, since by applying some basic combinatorics
we find that the number of all possible instances of the prob-
lem is k+1
. However, there exists a dynamic algorithm
l−1
solution that solves the problem in polynomial time.
The basic idea of the algorithm is that if we have an optimal
distribution of k buckets into l nodes, and the i-th node
contains up to the j-th bucket, then the allocation of the
first j buckets into the first i nodes is also optimal. This is
true since if it was not optimal, the overall bucket allocation
would not be optimal as well.
Based on this observation, we construct a matrix T of dimensions l · k. A matrix cell T [i, j] contains the variance of
the optimal allocation for the first j buckets into the first i
nodes. Also, we have calculated the average number of items
per node, µ. From the mentioned optimality property, we
can calculate the T [i, j] element using values only from the
previous column using the following formula:
(
)
j
X
2
T [i, j] = min
T [i − 1, k] + (
nt − µ)
(1)
k=1...j−1
t=k+1
The variation of the optimal solution is T [l, k]. In order to
find the actual optimal bucket distribution, we construct a
second matrix D of the same dimensions as T and in each
position we write the minimum decision that we make from
expression 1. Then we can reconstruct the optimal distribution by going “backwards” from point D[l, k] to D[1, 1].
The asymptotic running time of the algorithm is O(lk) to for
the outer matrix loop and O(k) for calculating expression
12 Instead of caclculating the sum in 1 each time, we can
initially build an array and cache the sums there. This way,
the amortized time to calculate the sum is O(1).. Thus
the total running time is O(lk2 ). We have implemented the
algorithm and we have find out that it executes in reasonable
time for values of l, k near 1000 (e.g. 1000 nodes and 1000
buckets).
| 6cs.PL
|
Efficient Algorithms for Checking Fast
arXiv:1708.09253v1 [cs.LO] 29 Aug 2017
Termination in VASS
Tomáš Brázdil
Krishnendu Chatterjee
Faculty of Informatics, Masaryk University
IST Austria
[email protected]
[email protected]
Antonín Kučera
Petr Novotný
Faculty of Informatics, Masaryk University
IST Austria
[email protected]
[email protected]
Dominik Velan
Faculty of Informatics, Masaryk University
[email protected]
Abstract
Vector Addition Systems with States (VASS) consists of a finite state space equipped with
d counters (d is called the dimension), where in each transition every counter is incremented,
decremented, or left unchanged. VASS provide a fundamental model for analysis of concurrent
processes, parametrized systems, and they are also used as abstract models for programs for
bounds analysis. While termination is the basic liveness property that asks the qualitative
question of whether a given model always terminates or not, the more general quantitative
question asks for bounds on the number of steps to termination. In the realm of quantitative
bounds a fundamental problem is to obtain asymptotic bounds on termination time. Large
asymptotic bounds such as exponential or higher already suggest that either there is some error
in modeling, or the model is not useful in practice. Hence we focus on polynomial asymptotic
bounds for VASS. While some well-known approaches (e.g., lexicographic ranking functions)
are neither sound nor complete with respect to polynomial bounds, other approaches only
present sound methods for upper bounds. The existing approaches neither provide complete
methods nor provide analysis of precise complexity bounds. In this work our main contributions
are as follows: First, for linear asymptotic bounds we present a sound and complete method
for VASS, and moreover, our algorithm runs in polynomial time. Second, we classify VASS
according the normals of the vectors of the cycles. We show that singularities in the normal
are the key reason for asymptotic bounds such as exponential (even in three dimensions) and
non-elementary (even in four dimensions) for VASS. In absence of singularities, we show
that the asymptotic complexity bound is always polynomial and of the form Θ(nk ), for some
integer k ≤ d. We present an algorithm, with time complexity polynomial in the size of the
VASS and exponential in dimension d, to compute the optimal k. In other words, in absence of
1
singularities, we present an efficient sound and complete method to obtain precise (not only
upper, but matching upper and lower) asymptotic complexity bounds for VASS.
1
Introduction
Static analysis for quantitative bounds. Static analysis of programs reasons about programs without
running them. The most basic and important problem about liveness properties studied in program
analysis is the termination problem that given a program asks whether it always terminates. The
above problem seeks a qualitative or Boolean answer. However, given the recent interest in analysis
of resource-constrained systems, such as embedded systems, as well as for performance analysis, it
is vital to obtain quantitative performance characteristics. In contrast to the qualitative termination,
the quantitative termination problem asks to obtain bounds on the number of steps to termination.
The quantitative problem, which is more challenging than the qualitative one, is of great interest
in program analysis in various domains, e.g., (a) in applications domains such as hard real-time
systems, worst-case guarantees are required; and (b) the bounds are useful in early detection of
egregious performance problems in large code bases [34].
Approaches for quantitative bounds. Given the importance of the quantitative termination problem significant research effort has been devoted, including important projects such as SPEED,
COSTA [34, 35, 1]. Some prominent approaches are the following:
• The worst-case execution time (WCET) analysis is an active field of research on its own
(with primary focus on sequential loop-free code and hardware aspects) [69].
• Advanced program-analysis techniques have also been developed for asymptotic bounds,
such as resource analysis using abstract interpretation and type systems [35, 1, 45, 36, 37],
e.g., linear invariant generation to obtain disjunctive and non-linear upper bounds [19], or
potential-based methods [36, 37].
• Ranking functions based approach provides sound and complete approach for the qualitative
termination problem, and for the quantitative problem it provides a sound approach to obtain
asymptotic upper bounds [7, 9, 20, 59, 67, 21, 70, 63].
In summary, the WCET approach does not consider asymptotic bounds, while the other approaches
consider asymptotic bounds, and present sound but not complete methods for upper bounds.
VASS and their modeling power. Vector Addition Systems (VASs) [50] or equivalently Petri Nets
are fundamental models for analysis of parallel processes [25]. Enriching VASs with an underlying
finite-state transition structure gives rise to Vector Addition Systems with States (VASS). Intuitively,
a VASS consists of a finite set of control states and transitions between the control states, and and
a set of d counters that hold non-negative integer values, where at every transition between the
control states each counter is either incremented or decremented. VASS are a fundamental model
2
for concurrent processes [25], and thus are often used for performing analysis of such processes [22,
30, 48, 49]. Besides that, VASS have been used as models of parametrized systems [6], as abstract
models for programs for bounds and amortized analysis [66], as well as models of interactions
between components of an API in component-based synthesis [27]. Thus VASS provide a rich
modeling framework for a wide class of problems in program analysis.
Previous results for VASS. For a VASS, a configuration is a control state along with the values of
counters. The termination problem for VASS can be defined as follows: (a) counter termination
where the VASS terminates when one of the counters reaches value 0; (b) control-state termination
where given a set of terminating control states the VASS terminates when one of the terminating
states is reached. The termination question for VASS, given an initial configuration, asks whether
all paths from the configuration terminate. The counter-termination problem is known to be
EXPSPACE-complete: the EXPSPACE-hardness is shown in [56, 23] and the upper bound
follows from [71, 5, 26].
Asymptotic bounds analysis for VASS. While the qualitative termination problem has been studied
extensively for VASS, the problem of quantitative bounds for the termination problem has received
much less attention. In general, even for VASS whose termination can be guaranteed, the number
of steps required to terminate can be non-elementary (tower of exponentials) in the magnitude of
the initial configuration (i.e. in the maximal counter value appearing in the configuration). For
practical purposes, bounds such as non-elementary or even exponential are too high as asymptotic
complexity bounds, and the relevant complexity bounds are the polynomial ones. In this work we
study the problem of computing asymptotic bounds for VASS, focusing on polynomial asymptotic
bounds. Given a VASS and a configuration c, let nc denote the maximum value of the counters in
c. If for all configurations c all paths starting from c terminate, then let Tc denote the worst-case
termination time from configuration c (i.e., the maximum number of steps till termination among
all paths starting from c). The quantitative termination problem with polynomial asymptotic bound
given a VASS and an integer k asks whether the asymptotic worst-case termination time is at
most a polynomial of degree k, i.e., whether there exists a constant α such that for all c we have
Tc ≤ α · nkc . Note that with k = 1 (resp., k = 2, 3) the problem asks for asymptotic linear (resp.,
quadratic, cubic) bounds on the worst-case termination time. The asymptotic bound problem is
rather different from the qualitative termination problem for VASS, and even the decidability of
this problem is not obvious.
Limitations of the previous approaches for polynomial bounds for VASS. In the analysis of asymptotic bounds there are three key aspects, namely, (a) soundness, (b) completeness, and (c) precise (or
tight complexity) bounds. For asymptotic bounds, previous approaches (such as ranking functions,
potential-based methods etc) are sound (but not complete) for upper bounds. In other words, if
the approaches obtain linear, or quadratic, or cubic bounds, then such bounds are guaranteed as
asymptotic upper bounds (i.e., soundness is guaranteed), however, even if the asymptotic bound
is linear or quadratic, the approaches may fail to obtain any asymptotic upper bound (i.e., com-
3
pleteness is not guaranteed). Another approach that has been considered for complexity analysis of
programs are lexicographic ranking functions [4]. We show that with respect to polynomial bounds
lexicographic ranking functions are not sound, i.e., there exists VASS for which lexicographic
ranking function exists but the asymptotic complexity is exponential (see Example 4.11). Finally,
none of the existing approaches are applicable for tight complexity bounds, i.e., the approaches
consider O(·) bounds and are not applicable for Θ(·) bounds. In summary, previous approaches do
not provide sound and complete method for polynomial asymptotic complexity of VASS; and no
approach provide techniques for precise complexity analysis.
Our contributions. Our main contributions are related to the complexity of the quantitative termination with polynomial asymptotic bounds for VASS and our results are applicable to counter
termination.
1. We start with the important special case of linear asymptotic bounds. We present the
first sound and complete algorithm that can decide linear asymptotic bounds for all VASS.
Moreover, our algorithm is an efficient one that has polynomial time complexity. This contrast
sharply with EXPSPACE-hardness of the qualitative termination problem and shows that
deciding fast (linear) termination, which seems even more relevant for practical purposes, is
computationally easier than deciding qualitative termination.
2. Next, we turn our attention to polynomial asymptotic bounds. For simplicity, we restrict
ourselves to VASS where the underlying finite-state transition structure is strongly connected
(see Section 7 for more comments). Given such a VASS A, for every short1 cycle C of
the A, the effect of executing the short cycle once can be represented as a d-dimensional
vector, an analogue of loop summary (ignoring any nested sub-loops) for classical programs.
Let Inc denote the set of all increments, i.e., short cycle effects in A. We investigate the
geometric properties of Inc to derive complexity bounds on A. The property playing a key
role is whether all cycle effects in Inc lie on one side of some hyperplane in Rd . Formally,
each hyperplane is uniquely determined by its normal vector n (a vector perpendicular to the
hyperplane), and a hyperplane defined by n covers a vector effects v if v · n ≤ 0, where “·”
is the dot product of vectors. Geometrically, the hyperplane defined by n splits the whole
d-dimensional space into two halves such that the normal n points into one of the halves,
and its negative −n points into the other half. The hyperplane then “covers” vector v if v
points into the same half as the vector −n. We denote by Normals(A) the set of all normals
such that each n ∈ Normals(A) covers all cycle effects in A. Depending on the properties
of Normals(A), we can distinguish the following cases:
(A) No normal: if Normals(A) = ∅ (Fig. 1a);
(B) Negative normal: if all n ∈ Normals(A) have a negative component (Fig. 1b);
(C) Positive normal: if there exists n ∈ Normals(A) whose all components are positive
(Fig. 1c);
1
A cycle C is short if its length is bounded by the number of control states of a given VASS.
4
y
y
x
x
(b) All normals are negative (normal (−1.5, −1)
pictured).
(a) No normal.
y
y
x
x
(d) Singular normal (0, 1).
(c) Positive normal (1.5, 1).
Figure 1: Classification of VASS into 4 sub-classes according to the geometric properties of vectors
of cycle effects, pictured on 2D examples. Each figure pictures (as red arrows) vectors of simple
cycle effects in some VASS (it is easy, for each figure, to construct a VASS whose simple cycle
effects are exactly those pictured). The green dashed line, if present, represents the hyperplane (in
2D it is a line) covering the set of cycle effects. The thick blue arrow represents the normal defining
the covering hyperplane. The pink shaded area represents the cone generated by cycle effects (see
Section 2.3). Intuitively, we seek hyperplanes that do not intersect the interior of the cone (but can
touch its boundary).
(D) Singular normal: if (C) does not hold, but there exists n ∈ Normals(A) such that all
components of n are non-negative (in which some component of n is zero, Fig. 1d);
First, we observe that given a VASS, we can decide to which of the above category it belongs,
in time which is polynomial in the number of control states of a given VASS for every fixed
dimension (i.e., the algorithm is exponential only in the dimension d; see Section 2.2 for more
comments). Second, we also show that if a VASS belongs to one of the first two categories,
then there exist configurations with non-terminating runs from them (see Theorem 4.2).
Hence asymptotic bounds are not applicable for the first two categories and we focus on the
last two categories for polynomial asymptotic bounds.
3. For the positive normal category (C) we show that either there exist non-terminating runs
or else the worst-case termination time is of the form Θ(nk ), where k is an integer and
5
k ≤ d. We show that given a VASS in this category, we can first decide whether all runs
are terminating, and if yes, then we can compute the optimal asymptotic polynomial degree
k such that the worst-case termination time is Θ(nk ) (see Theorem 4.8). Again, this is
achievable in time polynomial in the number of control states of a given VASS for every
fixed dimension. In other words, for this class of VASS we present an efficient approach
that is sound, complete, and obtains precise polynomial complexity bounds. To the best of
our knowledge, no previous work presents a complete approach for asymptotic complexity
bounds for VASS, and the existing techniques only consider O(·) bounds, and not precise
Θ(·) bounds.
4. We show that singularities in the normal are the key reason for complex asymptotic bounds in
VASS. More precisely, for VASS falling into the singular normal category (D), in general the
asymptotic bounds are not polynomial, and we show that (a) by slightly adapting the results of
[58], it follows that termination complexity of a VASS A in category (D) cannot be bounded
by any primitive recursive function in the size of A; (b) even with three dimensions, the
asymptotic bound is exponential in general (see Example 4.9), (c) even with four dimensions,
the asymptotic bound is non-elementary in general (see Example 4.10).
The main technical contribution of this paper is a novel geometric approach, based on hyperplane
separation techniques, for asymptotic time complexity analysis of VASS. Our methods are sound
for arbitrary VASS and complete for a non-trivial subclass.
2
2.1
Preliminaries
Basic Notation
We use N, Q, and R to denote the sets of non-negative integers, rational numbers, and real numbers.
The subsets of all positive elements of N, Q, and R are denoted by N+ , Q+ , and R+ . Further, we
use N∞ to denote the set N ∪ {∞} where ∞ is treated according to the standard conventions. The
cardinality of a given set M is denoted by |M |. When no confusion arises, we also use |c| to denote
the absolute value of a given c ∈ R.
Given a function f : N → N, we use O(f (n)) and Ω(f (n)) to denote the sets of all g : N → N
such that g(n) ≤ a · f (n) and g(n) ≥ b · f (n) for all sufficiently large n ∈ N, where a, b ∈ R+
are some constants. If h(n) ∈ O(f (n)) and h(n) ∈ Ω(f (n)), we write h(n) ∈ Θ(f (n)).
Let d ≥ 1. The elements of Rd are denoted by bold letters such as u, v, z, . . .. The i-th component
of v is denoted by v(i), i.e., v = (v(1), . . . , v(d)). For every n ∈ N, we use ~n to denote the
constant vector where all components are equal to n. The scalar product of v, u ∈ Rd is denoted
P
by v · u, i.e., v · u = di=1 v(i) · u(i). The other standard operations and relations on R such as +,
≤, or < are extended to Rd in the component-wise way. In particular, v is positive if v > ~0, i.e., all
p
components of v are positive. The norm of v is defined by norm(v) = v(1)2 + · · · + v(d)2 .
6
(0,0)
q1
(-1,1)
(0,0)
q2
(1,-1)
(-1,0)
q1
q2
(-1,0)
(-1,1)
(a) Quadratic complexity.
(b) Non-terminating VASS.
(1,-1)
(-1,0)
q1
(-1,1)
(0,0)
q2
(1,-1)
(c) Linear complexity.
Figure 2: An example of 2-dimensional VASS of varying complexity.
Half-spaces and Cones. An open half-space of Rd determined by a normal vector n ∈ Rd ,
where n 6= ~0, is the set Hn of all x ∈ Rd such that x · n < 0. A closed half-space Ĥn is defined in
the same way but the above inequality is non-strict. Given a finite set of vectors U ⊆ Rd , we use
P
cone(U ) to denote the set of all vectors of the form u∈U cu u, where cu is a non-negative real
constant for every u ∈ U .
Example 2.1. In Fig. 1, the cone, or more precisely its part that intersects the displayed area
of R2 , generated by the cycle effects (i.e., by the “red” vectors) is the pink-shaded area. As
for the half spaces, e.g., in Fig. 1d, the closed half-space defined by the normal vector (0, 1) is
the set {(x, y) | y ≤ 0}, while the open half-space determined by the same normal is the set
{(x, y) | y < 0}. Intuitively, each normal vector n determines a hyperplane (pictured by dashed
lines in Fig. 1) that cuts Rd in two halves, and Hn is the half which does not contain n: depending
on whether we are interested in closed or open half-space, we include the separating hyperplane
into Hn or not, respectively.
2.2
Syntax and semantics of VASS
In this subsection we present a syntax of VASS, represented as finite state graphs with transitions
labelled by vectors of counter changes.
Definition 2.2. Let d ∈ N+ . A d-dimensional vector addition system with states (VASS) is a
pair A = (Q, T ), where Q 6= ∅ is a finite set of states and T ⊆ Q × {−1, 0, 1}d × Q is a set of
transitions.
Example 2.3. Fig. 2 shows examples of three small 2-dimensional VASS. The VASS in Fig. 2a
has two states q1 , q2 and four transitions (q1 , (−1, 1), q2 ), (q1 , (0, 0), q2 ), (q2 , (−1, 0), q1 ),
(q2 , (1, −1), q2 ).
In some cases, we design algorithms where the time complexity is not polynomial in ||A|| (i.e., the
size of A), but polynomial in |Q| and exponential just in d. Then, we say that the running time is
polynomial in |Q| for a fixed d.
7
We use simple operational semantics for VASS based on the view of VASS as finite-state machines
augmented with non-negative integer-valued counters.
A configuration of A is a pair pv, where p ∈ Q and v ∈ Nd . The set of all configurations of A is
denoted by C (A). The size of pv ∈ C (A) is defined as ||pv|| = max{v(i) | 1 ≤ i ≤ d}.
A finite path in A of length n is a finite sequence π of the form p0 , u1 , p1 , u2 , p2 , . . . , un , pn where
n ≥ 1 and (pi , ui+1 , pi+1 ) ∈ T for all 0 ≤ i < n. If p0 = pn , then π is a cycle. A cycle is short
if n ≤ |Q|. The effect of π, denoted by eff (π), is the sum u1 + · · · + un . Given two finite paths
α = p0 , u1 , . . . , pn and β = q0 , v1 , . . . , qm such that pn = q0 , we use α
β to denote the finite
path p0 , u1 , . . . , pn , v1 , . . . , qm .
Let π be a finite path in A. A decomposition of π into short2 cycles, denoted by Decomp(π), is a
finite list of short cycles (repetitions allowed) defined recursively as follows:
• If π does not contain any short cycle, then Decomp(π) = [], where [] is the empty list.
• If π = α
γ
β where γ is the first short cycle occurring in π, then Decomp(π) =
Concat([γ], Decomp(α
β)), where Concat is the list concatenation operator.
Observe that if Decomp(π) = [], then the length of π is at most |Q| − 1. Since the length of every
short cycle is bounded by |Q|, the length of π is asymptotically the same as the number of elements
in Decomp(π), assuming a fixed VASS A.
Given a path π = p0 , u1 , p1 , u2 , p2 , . . . , un , pn and an initial configuration p0 v0 , the execution of
π in p0 v0 is a finite sequence p0 v0 , . . . , pn vn of configurations where vi = v0 + u1 + · · · + ui
for all 0 ≤ i ≤ n. If vi ≥ ~0 for all 0 ≤ i ≤ n, we say that π is executable in p0 v0 .
2.3
Termination Complexity of VASS
A zero-avoiding computation of length n initiated in a configuration pv is a finite sequence of
configurations α = q0 z0 , . . . , qn zn initiated in pv such that zi > ~0 for all 0 ≤ i ≤ n, and for
each 0 ≤ i < n there is a transition (qi , u, qi+1 ) ∈ T where zi+1 = zi + u. Every zero-avoiding
computation α initiated in q0 z0 determines a unique finite path πα in A such that α is the execution
of πα in q0 z0 .
Definition 2.4. Let A = (Q, T ) be a d-dimensional VASS. For every configuration pv of A, let
L(pv) be the least ` ∈ N∞ such that the length of every zero-avoiding finite computation initiated
in pv is bounded by `. The termination complexity of A is a function L : N → N defined by
L(n) = max {L(pv) | pv ∈ C (A) where ||pv|| = n} .
If L(n) = ∞ for some n ∈ N, we say that A is non-terminating, otherwise it is terminating.
2
A standard technique for analysing paths in VASS are decompositions into simple cycles, where all states except for
p0 and pn are pairwise different. The reason why we use short cycles instead of simple ones is clarified in Lemma 2.5.
8
Observe that if A is non-terminating, then L(n) = ∞ for all sufficiently large n ∈ N. Further, if A
is terminating, then L(n) ∈ Ω(n). In particular, if L(n) ∈ O(n), we also have L(n) ∈ Θ(n).
Given a path π = p0 , u1 , p1 , u2 , p2 , . . . , un , pn and an initial configuration p0 v0 , the execution of
π in p0 v0 is a finite sequence p0 v0 , . . . , pn vn where vi = v0 + u1 + · · · + ui for all 0 ≤ i ≤ n.
If vi ≥ ~0 for all 0 ≤ i ≤ n, we say that π is executable in p0 v0 .
Let Inc = {eff (π) | π is a short cycle of A} . The elements of Inc are called increments. Note
that if u ∈ Inc, then −|Q| ≤ u(i) ≤ |Q| for all 1 ≤ i ≤ d. Hence, |Inc| is polynomial in |Q|,
assuming d is a fixed constant. Although the total number of all short cycles can be exponential
in |Q|, the set Inc is computable efficiently.3
Lemma 2.5. Let A = (Q, T ) be a d-dimensional VASS, and let p ∈ Q. The set Inc is computable
in time O(||A||d ), i.e., polynomial in |Q| assuming d is a fixed constant.
Proof. The set Inc is computable by the following standard algorithm: For all q, q 0 ∈ Q and
k be the set of all effects of paths from q to q 0 of length exactly k. Observe that
1 ≤ k ≤ n, let Eq,q
0
1 = {u | (q, u, q 0 ) ∈ T } for all q, q 0 ∈ Q;
• Eq,q
0
S
k−1
k =
00
0
• for every 1 < k ≤ |Q|, we have that Eq,q
0
q 00 ∈Q {v+u | v ∈ Eq,q 00 and (q , u, q ) ∈ T }.
S
S
k , and the sets E k
Obviously, Inc = q∈Q nk=1 Eq,q
q,q 0 for k ≤ |Q| are computable in time
polynomial in |Q|, assuming d is a fixed constant.
A strongly connected component (SCC) of A is maximal R ⊆ Q such that for all p, q ∈ R where
p 6= q there is a finite path from p to q. Given a SCC R of Q, we define the VASS AR by restricting
the set of control states to R and the set of transitions to T ∩ (R × {−1, 0, 1}d × R). We say that
A is strongly connected if Q is a SCC of A.
3
Linear Termination Time
In this section, we give a complete and effective characterization of all VASS with linear termination
complexity.
More precisely, we first provide a precise mathematical characterization of VASS with linear
complexity: we show that if A is a d-dimensional VASS, then L(n) ∈ O(n) iff there is an open
half-space Hn of Rd such that n > ~0 and Inc ⊆ H.
Next we show that the mathematical characterization of VASS of linear complexity is equivalent to
the existence of a ranking function of a special form for this VASS. We also show that existence
of such a function for a given VASS A can be decided (and the function, if it exists, synthesized)
3
Note that Lemma 2.5 would not hold if we used simple cycles instead of short cycles, because the problem
whether a given vector v is an effect of a simple cycle is NP-complete, even if d = 1 (NP-hardness follows, e.g., by a
straightforward reduction of the Hamiltonian path problem).
9
in time polynomial in the size of A. Hence, we obtain a sound and complete polynomial-time
procedure for deciding whether a given VASS has linear termination complexity.
We start with the mathematical characterization. Due to the next lemma, we can safely restrict
ourselves to strongly connected VASS. A proof is trivial.
Lemma 3.1. Let d ∈ N, and let A = (Q, T ) be a d-dimensional VASS. Then L(n) ∈ O(n) iff
LR (n) ∈ O(n) for every SCC R of Q, where LR (n) is the termination complexity of AR .
Now we show that if there is no open half-space Hn such that n > ~0 and Inc ⊆ Hn , then there
P
exist short cycles γ1 , . . . , γk and coefficients b1 , . . . , bk ∈ N+ such that the sum ki=1 bi · eff (γi )
is non-negative. Note that this does not yet mean that A is non-terminating—it may happen that
the cycles π1 , . . . , πk pass through disjoint subsets of control states and cannot be concatenated
without including auxiliary finite paths decreasing the counters.
Lemma 3.2. Let A = (Q, T ) be a d-dimensional VASS. If there is no open half-space Hn of Rd
such that n > ~0 and Inc ⊆ Hn , then there exist v1 , . . . , vk ∈ Inc and b1 , . . . , bk ∈ N+ such that
P
k ≥ 1 and ki=1 bi vi ≥ ~0.
Proof. We distinguish two possibilities.
(a) There exists a closed half-space Ĥn of Rd such that n > ~0 and Inc ⊆ Ĥn .
(b) There is no closed half-space Ĥn of Rd such that n > ~0 and Inc ⊆ Ĥn .
Case (a). We show that there exists u ∈ Inc such that u 6= ~0 and −u ∈ cone(Inc). Note that this
immediately implies the claim of our lemma—since −u ∈ cone(Inc), there are v1 , . . . , vk ∈ Inc
P
and c1 , . . . , ck ∈ R+ such that −u = ki=1 ci vi . Since all elements of Inc are vectors of nonnegative integers, we can safely assume ci ∈ Q+ for all 1 ≤ i ≤ k. Let b be the least common
multiple of c1 , . . . , ck . Then bu + (b · c1 )v1 + · · · + (b · ck )vk = ~0 and we are done.
It remains to prove the existence of u. Let us fix a normal vector n > ~0 such that Inc ⊆ Ĥn and
the set Inc n = {v ∈ Inc | v · n < 0} is maximal (i.e., there is no n0 > ~0 satisfying Inc ⊆ Ĥn0
and Inc n ⊂ Inc n0 ). Further, we fix u ∈ Inc such that u · n = 0. Note that such u ∈ Inc
must exist, because otherwise Inc n = Inc which contradicts the assumption of our lemma. We
show −u ∈ cone(Inc). Suppose the converse. Then by Farkas’ lemma there exists a separating
hyperplane for cone(Inc) and −u with normal vector n0 , i.e., v · n0 ≤ 0 for all v ∈ Inc and
−u · n0 > 0. Since n > ~0, we can fix a sufficiently small ε > 0 such that the following conditions
are satisfied:
• n + εn0 > ~0,
• for all v ∈ Inc such that v · n < 0 we have that v · (n + εn0 ) < ~0.
Let w = n + εn0 . Then w > 0, v · w < 0 for all v ∈ Inc n , and u · w = u · n + ε(u · n0 ) =
ε(u · n0 ) < 0. This contradicts the maximality of Inc n .
10
Case (b). Let B = {v ∈ Rd | v ≥ ~0 and 1 ≤
Pd
i=1 v(i)
≤ 2}. We prove cone(Inc) ∩ B 6= ∅,
which implies the claim of our lemma (there are v1 , . . . , vk ∈ Inc and c1 , . . . , ck ∈ Q+ such that
Pk
i=1 ci vi ∈ B). Suppose the converse, i.e., cone(Inc) ∩ B = ∅. Since both cone(Inc) and B are
closed and convex and B is also compact, we can apply the “strict” variant of hyperplane separation
theorem. Thus, we obtain a vector n ∈ Rd and a constant c ∈ R such that x · n < c and y · n > c
for all x ∈ cone(Inc) and y ∈ B. Since ~0 ∈ cone(Inc), we have that c > 0. Further, n ≥ ~0 (to
see this, realize that if n(i) < 0 for some 1 ≤ i ≤ d, then y · n < 0 where y(i) = 1 and y(j) = 0
for all j 6= i; since y ∈ B and c > 0, we have a contradiction). Now we show x · n ≤ 0 for
all x ∈ cone(Inc), which contradicts the assumption of Case (b). Suppose x · n > 0 for some
x ∈ cone(Inc). Then (m · x) · n > c for a sufficiently large m ∈ N. Since m · x ∈ cone(Inc), we
have a contradiction.
Now we give the promised characterization of all VASS with linear termination complexity. Our
theorem also reveals that the VASS termination complexity is either linear or at least quadratic (for
example, it cannot be that L(n) ∈ Θ(n log n)).
Theorem 3.3. Let A = (Q, T ) be a d-dimensional VASS. We have the following:
(a) If there is an open half-space Hn of Rd such that n > ~0 and Inc ⊆ Hn , then L(n) ∈ O(n).
(b) If there is no open half-space Hn of Rd such that n > ~0 and Inc ⊆ Hn , then L(n) ∈ Ω(n2 ).
Proof. We start with (a). Let Hn be an open half-space of Rd such that n > ~0 and Inc ⊆ Hn , and
let qu be a configuration of A. Note that dn · ue ∈ O(||qu)||) because n does not depend on qu.
Let δ = minv∈Inc |v · n|. Each short cycle decreases the scalar product of the normal n and vector
of counters by at least δ. Therefore, for every zero-avoiding computation α initiated in qu we have
that Decomp(α) contains at most O(||qu||) elements, so the length of α is O(||qu||).
Now suppose there is no open half-space Hn of Rd such that n > ~0 and Inc ⊆ Hn . We show
that L(n) ∈ Ω(n2 ), i.e., there exist p ∈ Q and a constant a ∈ R+ such that for all configurations
p~n, where n ∈ N is sufficiently large, there is a zero-avoiding computation initiated in p~n whose
length is at least a · n2 . Due to Lemma 3.1, we can safely assume that A is strongly connected. By
Lemma 3.3, there are v1 , . . . , vk ∈ Inc and b1 , . . . , bk ∈ N+ such that k ≥ 1 and
k
X
bi vi ≥ ~0.
(1)
i=1
As the individual short cycles with effects v1 , . . . , vk may proceed through disjoint sets of states,
they cannot be trivially concatenated into one large cycle with non-negative effect. Instead, we fix
a control state p ∈ Q and a cycle π initiated in p visiting all states of Q (here we need that A is
strongly connected). Further, for every 1 ≤ i ≤ k we fix a short cycle γi such that eff (γi ) = vi .
For every t ∈ N, let πt be a cycle obtained from π by inserting precisely t · bi copies of every γi ,
where 1 ≤ i ≤ k. Observe that the inequality (1) implies
eff (πt ) = eff (π) + t ·
k
X
bi vi ≥ eff (π)
i=1
11
for every t ∈ N.
(2)
For every configuration pu, let t(u) be the largest t ∈ N such that πt is executable in pu and results
in a zero-avoiding computation. If such a t(u) does not exist, i.e. πt is executable in pu for all
t ∈ N, then A is non-terminating (since, e.g. v1 must be non-negative in such a case), and the
proof is finished. Hence, we can assume that t(u) is well-defined for each u. Since the cycles
π and γ1 , . . . , γk have fixed effects, there is b ∈ R+ such that for all configurations pu where
all components of u (and thus also ||pu||) are above some sufficiently large threshold ξ we have
that t(u) ≥ b · ||pu||, i.e. t(u) grows asymptotically at least linearly with the minimal component
of u. Now, for every n ∈ N, consider a zero-avoiding computation α(n) initiated in p~n defined
inductively as follows: Initially, α(n) consists just of pu0 = p~n; if the prefix of α(n) constructed
so far ends in a configuration pui such that t(ui ) ≥ 1 and ui ≥ ξ~ (an event we call a successful hit),
then the prefix is prolonged by executing the cycle πt(ui ) (otherwise, the construction of α(n) stops).
Thus, α(n) is obtained from p~n by applying the inductive rule I(n) times, where I(n) ∈ N∞ is the
number of successful hits before the construction of α(n) stops. Denote by pui the configuration
visited by α(n) at i-th successful hit. Now the inequality (2) implies that ui ≥ ~n + i · eff (π), so
there exists a constant e such that ||pui || ≥ n − i · e. In particular the decrease of all components
of ui is at most linear in i. This means that I(n) ≥ c · n for all sufficiently large n ∈ N, where
~ so
c ∈ R+ is a suitable constant. But at the same time, upon each successful hit we have ui ≥ ξ,
length of the segment beginning with i-th successful hit and ending with the (i + 1)-th hit or with
the last configuration of α(n) is at least b · ||pui || ≥ b · (n − i · e). Hence, the length of α(n) is at
P
least c·n
i=1 b · (n − i · e), i.e. quadratic.
Example 3.4. Consider the VASS in Figure 2c. It consists of two strongly connected components,
{q1 } and {q2 }. In A{q1 } we have Inc = {(−1, 1)}. For n = (1, 21 ) the open half-space Ĥn
contains Inc. Similarly, in A{q2 } we have Inc = {(−1, 0), (1, −1)}. For n = (1, 2) we again have
that Inc is contained in open half-space Ĥn . Hence, the VASS has linear termination complexity.
It is strongly connected and Inc
Now consider the VASS in Figure 2a.
=
{(−1, 1), (−2, 2), (1, −1), (2, −2), (−1, 0)}. But there cannot be an open 2-dimensional halfspace (i.e. an open half-plane) containing two opposite vectors, e.g. (−1, 1) and (1, −1), because
for any line going through the origin such that (−1, 1) does not lie on the line it holds that (1, −1)
lies on the “other side” of the line than (−1, 1). Hence, the VASS in Figure 2a has at least quadratic
termination complexity. The same argument applies to VASS in Figure 2b.
A straightforward way of checking the condition of Theorem 3.3 is to construct the corresponding
linear constraints and check their feasibility by linear programming. This would yield an algorithm
polynomial in |Inc|, i.e., polynomial in |Q| for every fixed dimension d. Now we show that the
condition can actually be checked in time polynomial in the size of A. We do this by showing that
the mathematical condition stated in Theorem 3.3 is equivalent to the existence of a ranking function
of a special type for a given VASS. Formally, a weighted linear map for a VASS A = (Q, T )
is defined by a vector of coefficients c and by a set of weights {hq | q ∈ Q}, one constant for
each state of A. The weighted linear map µ = (c, {hq | q ∈ Q}) defines a function (which we,
slightly abusing the notation, also denote by µ) assigning numbers to configurations as follows:
12
µ(pv) = c · v + hp . A weighted linear map µ is a weighted linear ranking (WLR) function for A
if c ≥ ~0 and there exists > 0 such that for each configuration pv and each transition (p, u, q) it
holds µ(pv) ≥ µ(q(v + u)) + , which is equivalent, due to linearity, to
hp − hq ≥ c · u +
(3)
We show that weighted linear ranking functions provide a sound and complete method for proving
linear termination complexity of VASS.
Theorem 3.5. Let d ∈ N. The problem whether the termination complexity of a given d-dimensional
VASS is linear is solvable in time polynomial in the size of A. More precisely, the termination
complexity of a VASS A is linear if and only if there exists a weighted linear ranking function for
A. Moreover, the existence of a weighted linear ranking function for A can be decided in time
polynomial in ||A||.
Proof Sketch. In the course of the proof we describe a polynomial time-algorithm for deciding
whether given VASS has linear termination complexity. Once the algorithm is described, we will
show that what it really does is checking the existence of a weighted linear ranking function for A.
Let us start by sketching the underlying intuition. Our goal is to decide, in polynomial time, whether
there is an open half-space Hn of Rd such that n > ~0 and Inc ⊆ Hn . Note that this is equivalent to
deciding whether there is an open half-space Hn of Rd such that n ≥ ~0 and Inc ⊆ Hn (since we
demand Hn to be open and the scalar product is continuous, n ≥ ~0 can be slightly tilted by adding
a small ~δ > 0 to obtain a positive vector with the desired property).
Given a vector n ∈ Rd and a configuration qv, we say that v · n is the n-value of qv. Observe
that if there is an open half-space Hn such that n ≥ ~0 and Inc ⊆ Hn , then there is ε > 0 such
that the effect of every short cycle decreases the n-value of a configuration by at least ε. As every
path can be decomposed into short cycles, every path steadily decreases the n-value of visited
configurations. It follows that the mean change (per transition) of the n-value along an infinite path
is bounded from above by −ε/|Q|. On the other hand, if the maximum mean change in n-values
(over all infinite paths) is bounded from above by some negative constant, then every short cycle
must decrease the n-value by at least this constant. So, it suffices to decide whether there is n ≥ ~0
such that for all infinite paths the mean change of the n-value is negative. Thus, we reduce our
problem to the classical problem of maximizing the mean payoff over a decision process with
rewards. Using standard results (see, e.g., [60]), the latter problem polynomially reduces to the
problem of solving a linear program that is (essentially) equivalent to the inequality (3). Finally,
the linear program can be solved in polynomial time using e.g. [51].
Remark 3.6. The weighted linear ranking functions can be seen as a special case of well-known
linear ranking functions for linear-arithmetic programs [20, 59], in particular state-based linear
ranking functions, where a linear function of program variables is assigned to each state of the
control flow graph. WLR ranking functions are indeed a special case, since the linear functions
assigned to various state are almost identical, and they differ only in the constant coefficient hq .
13
Also, as the proof of the previous theorem shows, WLR functions in VASS can be computed directly
by linear programming, without the need for any “supporting invariants,” since effect of a transition
in VASS is independent of the current values of the counters. Also, well-foundedness (i.e. the fact
that the function is bounded from below) is guaranteed by the fact that n ≥ 0 and counter values in
VASS are always non-negative. It is a common knowledge that the existence of a state-based linear
ranking function for a linear arithmetic program implies that the running time of the program is
linear in the initial valuation of program variables. Hence, our main result can be interpreted
as proving that for VASS, state-based linear ranking functions are both sound and complete for
proving linear termination complexity.
4
Polynomial termination time
In this section we concentrate on VASS with polynomial termination complexity. For simplicity,
we restrict ourselves to strongly connected VASS. As we already indicated in Section 1, our analysis
proceeds by considering properties of normal vectors perpendicular to hyperplanes covering the
vectors of Inc.
Definition 4.1. Let A = (Q, T ) be a d-dimensional VASS. The set Normals(A) consists of all
n ∈ Rd such that n 6= ~0 and Inc ⊆ Ĥn (i.e., v · n ≤ 0 for all v ∈ Inc).
Let A be a strongly connected VASS. We distinguish four possibilities.
(A) Normals(A) = ∅.
(B) Normals(A) 6= ∅ and all n ∈ Normals(A) have a negative component.
(C) There exists n ∈ Normals(A) such that n > ~0.
(D) There exists n ∈ Normals(A) such that n ≥ ~0 and (C) does not hold.
Note that one can easily decide which of the four conditions holds by linear programming. Due to
Lemma 2.5, the decision algorithm is polynomial in the number of control states of A (assuming d
is a fixed constant).
We start by showing that a VASS satisfying (A) or (B) is non-terminating. A proof is given in
Section 5.2.
Theorem 4.2. Let A = (Q, T ) be a d-dimensional strongly connected VASS such that (A) or (B)
holds. Then A is non-terminating.
4.1
VASS satisfying condition (C)
Assume A is a d-dimensional VASS satisfying (C). We prove that if A is terminating, then
L(n) ∈ Θ(n` ) for some ` ∈ {1, . . . , d}. Further, there is a polynomial-time algorithm deciding
whether A is terminating and computing the constant ` if it exists (assuming d is a fixed constant).
14
A crucial tool for our analysis is a good normal, introduced in the next definition.
Definition 4.3. Let A be a VASS. We say that a normal n ∈ Normals(A) is good if n > ~0 and for
every v ∈ cone(Inc) we have that −v ∈ cone(Inc) iff v · n = 0.
Example 4.4. Consider the VASS of Fig. 2a. Here, a good normal is, e.g., the vector n = (1, 1).
Observe that the effects of both self-loops (on q1 and q2 ) belong to the hyperplane defined by (1, 1).
Note that these loops compensate each other’s effects so long as we stay in the hyperplane (this is
the defining property of the good normal). This allows us to zig-zag in the plane without "paying"
with decrements in the n-value except when we need to switch between the loops (recall that the
n-value of a configuration qv is the product v · n). This produces a path of quadratic length, which
is asymptotically the worst case.
The next lemma says that a good normal always exists and it is computable efficiently. A proof can
be found in Section 5.3.
Lemma 4.5. Let A be a d-dimensional VASS satisfying (C). Then there exists a good normal
computable in time polynomial in |Q|, assuming d is a fixed constant.
The next theorem is the key result of this section. It allows to reduce the analysis of termination
complexity of a given VASS to the analysis of several smaller instances of the problem, which can
be then solved recursively.
Theorem 4.6. Let A be a VASS satisfying (C), and let n ∈ Normals(A) be a good normal.
Consider a VASS An = (Q, Tn ) where
Tn = {t ∈ T | there is a short cycle γ of A containing t such that eff (γ) · n = 0} .
Further, let C1 , . . . , Ck be all SCC of An with at least one transition. We have the following:
(1) If k = 0 (i.e., if there is no SCC of An with at least one transition), then LA (n) ∈ Θ(n).
(2) If k > 0, all AnC1 , . . . , AnCk are terminating, and the termination complexity of every AnCi is Θ(fi (n)), then A is terminating and LA (n) ∈ Θ(n · max[f1 , . . . , fk ](n)),
where max[f1 , . . . , fk ] : N → N is a function defined by max[f1 , . . . , fk ](n) =
max{f1 (n), . . . , fk (n)}.
To get some intuiting behind the proof of Theorem 4.6, consider the following example.
Example 4.7. Consider the VASS of Fig. 2a. As mentioned in Example 4.4, there is a good normal
n = (1, 1), which gives Tn = {(−1, 1), (1, −1)}. Then Case (2) of Theorem 4.6 gives us two
simpler VASS AnC1 , AnC2 where AnC1 has a single state q1 and a single transition (q1 , (−1, 1), q1 ),
and AnC2 has a single state q2 and a single transition (q2 , (1, −1), q2 ). Observe that both AnC1
and AnC2 can now be considered individually, and both of them have linear complexity. Also, as
mentioned in Example 4.4, the good normal makes sure that the effect of the worst case behavior
in AnC1 can be compensated by a path in AnC2 , and vice versa. Moreover, following the worst
case path in AnC1 and its compensation in AnC2 decreases the final n-value of configurations only
by a constant (caused by the switch between AnC1 and AnC2 ). So, we can follow such “almost
compensating” loop Ω(n) times, and obtain a path of quadratic length.
15
Note that in the general case the situation is more complicated since the compensating path may
need to be composed using paths in several VASS of AnC1 , . . . , AnCk . So, we need to be careful about
the number of switches and about geometry of the compensating path.
Proof sketch for Theorem 4.6. Claim (1) follows easily. It suffices to realize that if there is no SCC
of An with at least one transition, then there is no v ∈ Inc satisfying v · n = 0. Hence, v · n < 0
for all v ∈ Inc, and we can apply Theorem 3.3.
Now we prove Claim (2). Let α be a zero-avoiding computation of A initiated in a configuration
qu. Since the last configuration pv of α satisfies v ≥ ~0, we have that v · n ≥ 0. Hence,
v·n
=
(u + eff (πα )) · n
=
u · n + eff (πα ) · n
≥
0.
Let Decomp(πα ) by a decomposition of πα into short cycles. For every short cycle γ of A we have
that eff (γ) · n ≤ 0. Since πα can contain at most |Q| transitions which are not contained in any
cycle, we have that u · n ≤ v · n + c, where c ∈ N is some fixed constant. This means that ||pv|| is
O(||qu||). Consequently, the same holds also for all intermediate configurations visited by α.
A short cycle γ of A such that eff (γ) · n < 0 is called n-decreasing, otherwise it is n-neutral.
Clearly, the total number of n-decreasing short cycles in Decomp(πα ) is O(||qu||), because each of
them decreases the scalar product with n by a fixed constant bounded away from zero, and u · n is
O(||qu||). This means that the total number of transitions in πα which are not in Tn is O(||qu||) (as
we already noted, πα can also contain transitions which are not contained in any short cycle, but
their total number is bounded by |Q|). Let % be a subpath of πα with maximal length containing only
transitions of Tn . Note that % is a concatenation of at most |Q| subpaths which contain transitions
of the same SCC Ci of An . Each of these subpaths is initiated in a configuration of size O(||qu||),
and hence its length is O(fi (||qu||)). Hence, the length of % is O(||qu|| · max[f1 , . . . , fk ](||qu||)).
It remains to prove that LA (n) ∈ Ω(n · max[f1 , . . . , fk ](n)). Let us fix some i ≤ k. We prove that
there exists a constant a ∈ R+ such that for all sufficiently large n there exists a zero-avoiding
computation αn of length at least a · n · fi (n) initiated in a configuration of size n. The construction
of αn is technically non-trivial, so we first explain the underlying idea informally. A formal proof
is given in Section 5.4.
To achieve the length Ω(n · fi (n)), the computation αn needs to execute Ω(n) paths of length
Θ(fi (n)) “borrowed” from AnCi . The problem is that even after executing just one path π of length
Θ(fi (n)), some counters can have very small values, which prevents the executing of another
path of length Θ(fi (n)). Therefore, we need to “compensate” the effect of π and increase the
counters. This is where we use the properties of a good normal. We can choose π so that it forms
a cycle in AnCi (not necessarily a short one), and we prove that all cycles in AnCi are n-neutral.
From this we get − eff (π) ∈ cone(Inc), and hence the effect of π can be compensated by an
appropriate combination of short cycles of An . So, after executing π, we execute the corresponding
“compensating” path, and this is repeated Ω(n) times. Note that we need to ensure that the
compensating paths do not decrease the counters too much in intermediate configurations, and the
16
compensation ends in a configuration which is sufficiently close to the original configuration where
we started executing π.
Now we can formulate and prove the main result of this section.
Theorem 4.8. Let A be a d-dimensional VASS satisfying (C). The problem whether A is terminating
is decidable in time polynomial in |Q|, assuming d is a fixed constant. Further, if A is terminating,
then L(n) ∈ Θ(nk ), where k ∈ {1, . . . , d} is a constant computable in time polynomial in |Q|,
assuming d is a fixed constant.
Proof. For a given a A, the algorithm starts by computing a good normal n (see Lemma 4.5) and
constructing the VASS An = (Q, Tn ) of Theorem 4.6. Here, the set Tn is computed as follows.
Note that A can be seen as a directed multigraph where the nodes are the states and the edges
correspond to transitions. To every transition (q, u, q 0 ) we assign its weight −u · n. Note that the
multigraph does not contain any negative cycles (a negative cycle in the multigraph would induce a
cycle in A increasing the n-value; however, such a cycle cannot exist with a good normal n). To
decide whether a given transition (q, u, q 0 ) belongs to Tn , it suffices to find a path with the least
accumulated weight from q 0 to q (which can be done using, e.g., Bellman-Ford algorithm [64])
and check whether the accumulated weight is equal to u · n. Hence, Tn is computable in time
polynomial in the size of A (for a given good normal n).
Then, the algorithm proceeds by constructing the SCC C1 , . . . , Ck of An . If k = 0, then L(n) ∈
Θ(n) (see Theorem 4.6 (1)). If k = 1 and AnC1 = A, then A is non-terminating (this is a
consequence of Theorem 4.6 (2); if AnC1 was terminating with termination complexity Θ(f1 (n)),
then by Theorem 4.6 (2), the termination complexity of A = AnC1 is Θ(n · f1 (n)), which is
impossible). Otherwise, the algorithm proceeds by analyzing AnC1 , . . . , AnCk recursively. If some
of them is non-terminating, then A is also non-terminating. Otherwise, the termination complexity
of A is derived from the termination complexity of AnC1 , . . . , AnCk as in Theorem 4.6 (2). Clearly,
we obtain L(n) ∈ Θ(nk ) for some k ∈ {1, . . . , d}. It is easy to verify that the total the number of
recursive calls is polynomial in the size of A.
4.2
VASS satisfying condition (D)
Condition (D) is not sufficiently strong to guarantee polynomial termination time for terminating
VASS. In fact, as d increases, the termination complexity can grow very fast. Even for d = 3, one
can easily construct a terminating VASS satisfying (C) such that L(n) ∈ Ω(2n ).
Example 4.9. Consider the strongly connected 3-dimensional VASS A in Fig. 3. Let n ∈ N
be arbitrary. We construct a zero-avoiding computation α(n) starting in q1~n whose length is
exponential in n. For better readability, denote by x, y, and z the variables representing the first,
second, and third counter, respectively.
17
(1,0,0)
q1
q2
(1,-1,0)
(0,0,-1)
(0,0,0)
(-1,1,0)
q3
q4
(0,1,0)
Figure 3: A 3-dimensional VASS satisfying condition (D) which has an exponential termination
complexity.
The construction consist of iterating several phases.
In Phase (a) we iterate the short
cycle q1 , (1, 0, 0), q2 , (1, −1, 0), q1 as long as y
2.
≥
Then we perform the path
q1 , (1, 0, 0), q2 , (0, 0, 0), q4 to q4 . From there we continue with Phase (b), where we iterate
the short cycle q4 , (0, 1, 0), q3 , (−1, 1, 0), q4 as long as x ≥ 2. After this we perform the path
q4 , (0, 1, 0), q3 , (0, 0, −1), q1 to q1 . There we again switch to Phase (a), repeating the process until
one of the counters hits zero.
One can straightforwardly check that the total effect of performing Phase (a) once is setting y to 1
while setting x to xa +2ya , where xa , ya are the values of x, y before the start of the phase. Similarly,
The total effect of performing Phase (b) once is setting x to 1 while setting y to yb + 2xb , where
xb , yb are the values of x, y before the start of the phase. Hence, the total effect of consecutively
performing Phases (a) and (b) once can be bounded from below as follows: setting x to 1 and
multiplying y by 4. Hence, the total effect of performing N consecutive iterations of Phases (a) and
(b) is setting x to 1, multiplying y by 4N and decreasing z by N . Since z decreases exactly during
the witch from Phase (b) to Phase (a), we can perform exactly n consecutive iterations of (a) and
(b). But increasing y from n to 4n requires at least 4n − n steps in VASS, hence the termination
complexity of A is at least exponential. The matching asymptotic upper bound is easy to get.
The key idea of the previous example can be used as building block for showing that higherdimensional terminating VASS satisfying (D) can have even larger termination complexity than
exponential. Already in dimension 4, the complexity can be non-elementary.
Example 4.10. Consider the 4-dimensional strongly connected VASS in Fig. 4. As before, we
denote by x, y, z, w the individual counters.
For n ∈ N we construct a zero-avoiding computation α(n) started in q1~n whose length in nonelementary. The construction again proceeds by switching between various phases and the phases
we consider are the following: in Phase (a) we iterate cycle q1 , (−1, 1, 0, 0), q2 , (0, 1, 0, 0), q1 from
q1 as long as x ≥ 2. The effect of a single execution of (a) is setting x to 1 and y to ya + 2xa
(as before vp denotes the value of counter v at the start of phase (p)). In Phase (b) we iterate
the self-loop on q3 as long as y ≥ 2, the effect of the phase is setting y to 1 and x to xb + yb .
18
(0,0,-1,0)
(1,-1,0,0)
(-1,1,0,0)
q3
q1
q2
(0,0,0,0)
(0,1,0,0)
(0,0,0,-1)
(0,0,0,0)
q4
(1,-1,1,0)
Figure 4: A 4-dimensional VASS satisfying condition (D) which has a non-elementary termination
complexity.
Phase (c) consists of iterating the self-loop on q4 as long as y ≥ 2 and the effect is setting y to 1
and x and z to xc + yc and zc + yc , respectively. Switching from (b) to (a) or (c) decreases z by 1,
while switching from (c) to (a) or (b) decreases w by 1. Now the construction of α(n) proceeds as
follows: we switch between Phases (a) and (b) as long as z ≥ 2, after which we perform Phase
(a) once more. We call this a Phase (d) and the total effect of (d) is setting x and z to 1, and y
to a number at least 4zd · xd . After Phase (d) we go to q4 and execute Phase (c), after which we
go to q1 and start (d) again, repeating the process until a configuration with a zero counter is hit.
The total effect of a single consecutive execution of (d) and (c) is setting y to 1 and x and z to
a number at least 2zd · xd . Since w is only decremented when switching from (d) to (c), we can
repeat this consecutive execution at least n times. An easy induction shows that after i repeats of
the consecutive executions of (d) and (c) the value of x is at least
n
22
··· 2
ξn := n · 2 | {z } .
n times
Hence, the length of α(n) is at least ξn , i.e. non-elementary.
Figure 3 also provides an example showing that lexicographic ranking functions are not sound
for polynomial bounds on termination complexity. We first define the notion of lexicographic
ranking function for VASS: we specialize the standard definition of a lexicographic ranking
functions for affine automata [4] (a generalization of VASS which models general linear arithmetic
programs). Formally, an m-dimensional lexicographic map for a VASS A = (Q, T ) is a collection
{fqj | q ∈ Q, 1 ≤ j ≤ m} of linear functions of counter values, one function per state and
1 ≤ j ≤ m (we allow m to be different from the dimension d of A). A lexicographic map
{fqj | q ∈ Q, 1 ≤ j ≤ m} is a lexicographic -ranking function for A if each fqj is bounded
from below on N and for each transition (q, u, q 0 ) of A there exists 1 ≤ j ≤ m such that
0
0
f j0 (u) ≤ fqj (~0) − and for all 1 ≤ j 0 < j it holds f j0 (u) ≤ fqj (~0). A standard argument shows
q
q
that if A has a lexicographic -ranking function for, then it is terminating. However, lexicographic
ranking functions are not sound for polynomial complexity bounds.
Example 4.11. Consider the VASS A in Figure 3. Then, denoting the first, second, and third counter
as x, y, z, respectively, there is the following 3-dimensional lexicographic 12 -ranking function for
19
A (we denote fq = (fq1 , . . . , fqm )): fq1 = (z, y, x), fq2 = (z, y − 12 , x), fq4 = (z − 12 , x, y),
fq3 = (z − 12 , x − 12 , y). But as shown in Example 4.9, the VASS has exponential termination
complexity.
5
5.1
Technical Proofs
Proof of Theorem 3.5
We describe a polynomial time-algorithm for deciding whether a given VASS has linear termination
complexity. Recall from the proof sketch that it suffices to solve an equivalent problem whether
there is an open half-space Hn of Rd such that n ≥ ~0 and Inc ⊆ Hn .
Let us formalize our intuition presented in the proof sketch. We need to introduce some additional
notation: An infinite path π is an infinite sequence of the form p0 , u1 , p1 , u2 , p2 , . . . where for
each n ≥ 1 the finite subsequence p0 , u1 , p1 , u2 , p2 , . . . , un , pn is a finite path. We denote by π↓n
the finite prefix p0 , u1 , p1 , u2 , p2 , . . . , un , pn of π. Given an infinite path π, we define the mean
change of n-value as
eff (π↓n ) · n
.
n→∞
n
Consider the following linear program L obtained from [60], Section 8.8, by substituting the reward
MC n (π) = lim inf
r(s, a) with u · n where u is an effect of a transition:
Minimize g with respect to the following constraints:
For all (q, u, q 0 ) ∈ T
g + h(q) − h(q 0 ) ≥ u · n
and
n ≥ ~0.
Here, the variables are g, all h(q), q ∈ Q, and all components of n. By applying the results of [60],
for every optimal solution g, h, n we have that
g = sup MC n (π).
π
Moreover, there is at least one feasible solution.
We prove that there is n ≥ ~0 such that the open half-space Hn contains Inc iff an optimal solution
g, h, n of the above program satisfies g < 0.
Consider an optimal solution g, h, n of the above program. Assume that g < 0. We show that
Inc ⊆ Hn . For the sake of contradiction, assume that there is a short cycle π such that eff (π)·n ≥ 0.
Following the cycle π ad infinitum determines an infinite path π with MC n (π) ≥ 0. However, this
contradicts the fact that 0 > g = supπ MC n (π).
20
Now assume there is n ≥ ~0 such that Inc ⊆ Hn . Let π be an infinite path. Let us fix n ≥ 1
and consider Decomp(π↓n ), the decomposition of π↓n into short cycles. Let Rest(π↓n ) be the
remaining path obtained after removing all short cycles of Decomp(π↓n ) from π↓n . Note that the
~ · n.
length of Rest(π↓n ) is at most |Q|, and hence eff (Rest(π↓n )) · n ≤ |Q|
Now let m be the length (i.e., the number of elements) of the list Decomp(π↓n ). Note that
m ≥ n/|Q| − 1. Consider ε > 0 such that for all short cycles α we have that eff (α) · n ≤ −ε.
Then
eff (π↓n )
≤
~
m·(−ε)+|Q|·n
≤
~
(n/|Q|−1)·(−ε)+|Q|·n
=
~
(n·(−ε)/|Q|)+(|Q|·n+ε)
and thus
eff (π↓n )
n
≤
~ · n + ε)
(n · (−ε)/|Q|) + (|Q|
n
=
~ · n + ε)
−ε (|Q|
+
.
|Q|
n
~ · n + ε)/n = 0, we obtain that MC n (π) ≤ (−ε)/|Q|. As π was chosen
Since limn→∞ (|Q|
arbitrarily, we have that
−ε
< 0.
|Q|
π
Hence, there is a solution g, h, n of the above linear program with g < 0.
sup MC n (π)
≤
In order to decide whether there is an open half-space Hn of Rd such that n ≥ ~0 and Inc ⊆ Hn , it
suffices to compute an optimal solution g, h, n of the above linear program, which can be done in
polynomial time (see, e.g., [51]), and check whether g < 0.
Now we get back to weighted linear ranking functions. Note that each solution g, h, n of the linear
program L in which g < 0 yields a weighted linear ranking function (c, {hq | q ∈ Q}) by putting
c := n and hq := h(q) for each q. Conversely, each weighted linear ranking function yields a
solution of L where g < 0, (we need to put g := −, where is from the definition of a weighted
lin. ranking function). Hence, a VASS A has linear termination complexity if and only if it has a
weighted linear ranking function and this can be decided in polynomial time in size of A.
5.2
Proof of Theorem 4.2
If condition (A) or (B) holds, there is no n ≥ ~0 such that Inc ⊆ Ĥn . We show that then there exists
u ∈ cone(Inc) such that u > ~0. Suppose there is no such u. Let B be the set of all v > ~0. Since
cone(Inc) and B are convex and disjoint, there is a separating hyperplane with normal n ≥ ~0 for
cone(Inc) and B. Since cone(Inc) ⊆ Ĥn , we have a contradiction.
P
So, let u > ~0 such that u = ki=1 ai · vi , where ai ∈ Q+ and vi ∈ Inc for all 1 ≤ i ≤ k. Hence,
P
there also exist b1 , . . . , bk ∈ N+ such that w = k bi · vi > ~0. Let us fix a cycle π in A visiting
i=1
all control states (here we need that A is strongly connected). Clearly, there exists c ∈ N such that
eff (π) + c · w > 0. Let % be a cycle obtained from π by inserting c · bi copies of a short cycle γi ,
where eff (γi ) = vi . Then, eff (%) > ~0, and hence there exists an infinite computation initiated in
p~n for a sufficiently large n ∈ N (the control state p can be chosen arbitrarily).
21
5.3
Proof of Lemma 4.5
Due to condition (C), there exists at least one positive normal. Hence, we can fix a positive
n ∈ Normals(A) such that the set {u ∈ Inc | u · n = 0} is minimal. We show that for every
v ∈ cone(Inc) we have that −v ∈ cone(Inc) iff v · n = 0, i.e., n is a good normal. The “⇒”
direction immediate—if v, −v ∈ cone(Inc), then v · n ≤ 0 and −v · n ≤ 0, which implies
v · n = 0. For the other direction, suppose there exists v ∈ cone(Inc) such that v · n = 0 and
−v 6∈ cone(Inc). Then there also exists u ∈ Inc such that u · n = 0 and −u 6∈ cone(Inc). For
the rest of this proof, we fix such u. By Farkas’ lemma, there exists a separating hyperplane for
cone(Inc) and −u with normal vector n0 , i.e., −u · n0 > 0 and v · n0 ≤ 0 for every v ∈ cone(Inc).
Let us fix a sufficiently small ε > 0 such that n + εn0 > ~0 and v · (n + εn0 ) < 0 for all v ∈ Inc
where v · n < 0. Clearly, n + εn0 is a positive normal. Further, for all v ∈ cone(Inc) such that
v · n < 0 we have that v · (n + εn0 ) < 0. Since u · (n + εn0 ) < 0, we obtain a contradiction with
the minimality of n.
To compute a good normal, first observe that the condition of Definition 4.3 can be safely relaxed
just to the vectors of Inc, i.e., if n ∈ Normals(A) such that n > ~0 and −v ∈ cone(Inc) iff
v · n = 0 for every v ∈ Inc, then n is a good normal. To see this, fix some n with this property,
P
and let u = ki=1 ai · vi , where ai ∈ R+ and vi ∈ Inc for all 1 ≤ i ≤ k. We need to show that
P 0
−u ∈ cone(Inc) iff u · n = 0. If −u ∈ cone(Inc), then −u = ki=1 a0j · vi0 where a0i ∈ R+ and
vi0 ∈ Inc for all 1 ≤ i ≤ k 0 . Hence,
~0 = u + (−u) =
k
X
0
ai · vi +
i=1
k
X
a0i · vi0 .
i=1
Hence,
0 = (u + (−u)) · n =
k
X
0
a i · vi · n +
i=1
k
X
a0i · vi0 · n.
i=1
· n ≤ 0 for all 1 ≤ i ≤ k and all 1 ≤ i0 ≤ k 0 , we obtain vi · n = 0 for all
P
1 ≤ i ≤ k, hence u · n = 0. On the other hand, if u · n = 0, then ki=1 ai · vi · n = 0. Since ai > 0
Since vi · n ≤ 0 and
vi0
and vi · n ≤ 0 for all 1 ≤ i ≤ k, we have that vi · n = 0 for all 1 ≤ i ≤ k. Hence −vi ∈ cone(Inc)
P
for every 1 ≤ i ≤ k (by our assumption), and −u = ki=1 ai · (−vi ) ∈ cone(Inc).
Using the above observation, we can compute a good normal using linear programming as follows:
First, compute the set I = {v ∈ Inc | −v ∈ cone(Inc)}. Note that I can be computed easily by
checking feasibility of the following linear constraints:
−v =
X
au · u
and
au ≥ 0.
u∈Inc
Here, the variables are au . A good normal can be computed using the following linear program:
22
Maximize ε with respect to the following constraints:
u · n = 0 for all u ∈ I
v · n ≤ −ε for all v ∈ Inc r I
n ≥ ~ε.
Here, the variables are ε and all components of n.
Note that there is a good normal iff there is an optimal solution with ε > 0. Moreover, every
optimal solution ε, n with ε > 0 gives a good normal n.
5.4
Proof of Theorem 4.6
Now start by formulating an auxiliary technical lemma which is needed in the proof of Theorem 4.6.
Lemma 5.1. Let A be a VASS satisfying (C), and let n be a good normal. Then there is a constant
κ ∈ R+ such that for every w ∈ cone(Inc), where w · n = 0 and norm(w) = 1, there exist
P
k ∈ N, a1 , . . . , ak ∈ R+ , and v1 , . . . , vk ∈ Inc such that w = kj=1 aj · vj , vj · n = 0 for all
P 0
1 ≤ j ≤ k, and for all k 0 ≤ k, the absolute values of all components of the vector kj=1 aj · vj are
bounded by κ.
Proof. Let w =
Clearly, w · n =
Pk
Pj=1
k
aj · vj where aj ∈ R+ , vj ∈ Inc for all 1 ≤ j ≤ k, and k is minimal.
j=1 aj
· (vj · n) = 0, which implies vj · n = 0 for all 1 ≤ j ≤ k (recall
that vj · n ≤ 0 because n ∈ Normals(A)). First, we show that for every j ≤ k, the vector
−vj does not belong to cone({v1 , . . . , vj−1 , vj+1 , . . . , vk }). Assume the converse, i.e., −v1 ∈
P
cone({v2 , . . . , vk }). Then −v1 = kj=2 bj · vj , where bj ∈ R+ for all 2 ≤ j ≤ k. Further,
w
=
(a1 − c) · v1 + (a2 − cb2 ) · v2 + · · · + (ak − cbk )vk
for every c > 0. Clearly, there exists c > 0 such that at least one of the coefficients (a1 − c),
(a2 − cb2 ), . . . , (ak − cbk ) is zero and the other remain positive, which contradicts the minimality of k. Since {v1 , . . . , vk } ⊆ Ĥn , there must exist n0 > ~0 such that {v1 , . . . , vk } ⊆ Hn0
(otherwise, we can use the same argument as in the proof of Case (a) of Lemma 3.2 to show
that −vj ∈ cone({v1 , . . . , vj−1 , vj+1 , . . . , vk }) for some 1 ≤ j ≤ k). Since vj · n0 < 0 for
all 1 ≤ j ≤ k, each vj moves in the direction of −n by some fixed positive distance. Since
norm(w) = 1, there is a bound δv1 ,...,vk ∈ R+ such that aj ≤ δv1 ,...,vk for all 1 ≤ j ≤ k, because
no aj · vj can go in the direction of −n by more than a unit distance.
The above claim applies to every w ∈ cone(Inc) where w · n = 0. Since Inc is finite, there
are only finitely many candidates for the set of vectors {v1 , . . . , vk } used to express w, and
hence there exists a fixed upper bound δ ∈ R+ for all δv1 ,...,vk . This means that, for every
w ∈ cone(Inc) where w · n = 0, there exist k ∈ N, a1 , . . . , ak ∈ R+ , and v1 , . . . , vk ∈ Inc such
P
that w = kj=1 aj · vj , vj · n = 0, and aj ≤ δ for all 1 ≤ j ≤ k. This immediately implies the
existence of κ.
23
Now can formalize the proof of Theorem 4.6.
All cycles of AnCi are n-neutral. First, realize that for every cycle η of A (not necessarily short)
P
we have that eff (η) · n = γ∈Decomp(η) eff (γ) · n ≤ 0. Now let β = p0 , u1 , p1 , u2 , p2 , . . . , un , pk
be a cycle of AnCi (not necessarily short). Then each transition (pj , uj+1 , pj+1 ) of β is contained in
some n-neutral short cycle γi of A. Let %i be the (unique) path from pj+1 to pj determined by γj ,
P
and let % = %k−1 · · · %0 . Then eff (β)+eff (%) = k−1
j=0 eff (γj ). Hence, eff (β)·n+eff (%)·n =
Pk−1
j=0 eff (γj ) · n = 0. Thus, we obtain eff (β) · n = − eff (%) · n. Since both β and % are cycles
of A, we have that eff (β) · n ≤ 0 and eff (%) · n ≤ 0, which implies eff (β) · n = 0.
Constructing the paths of length Θ(fi (n)). Since the termination complexity of AnCi is Θ(fi (n)),
there is b ∈ R+ such that for all sufficiently large n ∈ N there exist a configuration pn~n and a
zero-avoiding computation βn of length at least b · fi (n) initiated in pn~n. Since πβn inevitably
contains a cycle whose length is at least b0 · fi (n) (for some fixed b0 ∈ R+ independent of βn ), we
can safely assume that πβn is actually a cycle, which implies eff (πβn ) ∈ cone(Inc).
Constructing the compensating path.
Since πβn is n-neutral and eff (πβn ) ∈ cone(Inc), we
have that − eff (πβn ) ∈ cone(Inc). This is where we use the defining property of a good normal.
P
+
Since − eff (πβn ) = m
j=1 aj · vj , where m ∈ N, aj ∈ Q , and vj ∈ Inc for all 1 ≤ j ≤ m, a
straightforward idea is to define the compensating path by “concatenating” baj c copies of γj , where
eff (γj ) = vj , for all 1 ≤ j ≤ m. This would produce the desired effect on the counters, but there
is no bound on the counter decrease in intermediate configurations visited when executing this path.
To overcome this problem, we construct the compensating path for πβn more carefully. Let w be
the normalized eff (πβn ), i.e., w has the same direction as eff (πβn ) but its norm is equal to 1. By
P
+
Lemma 5.1, −w is expressible as −w = m
j=1 aj · vj , where m ∈ N, aj ∈ Q , and vj ∈ Inc, so
that vj · n = 0 for all 1 ≤ j ≤ m, and for all m0 ≤ m, the absolute values of all components of the
P 0
vector m
j=1 aj · vj are bounded by κ, where κ is a constant independent of w. Let us fix some
cycle η of AnCi visiting all of its states (recall that AnCi is strongly connected). The compensating
path for πβn is obtained from η by inserting bnorm(eff (πβn )) · aj c copies of a short cycle with
effect vj , for every 1 ≤ j ≤ m. Observe that the difference between the effect of this compensating
path and − eff (πβn ) is bounded by a constant vector independent of n. Further, when executing
the compensating path, the counters are never decreased by more that κ · norm(eff (πβn )).
Constructing a zero-avoiding computation αn of length Ω(n · fi (n)).
Now we are ready to put
the above ingredients together, which still requires some effort. Let us fix a sufficiently large n ∈ N
and a configuration pv where ||pv|| = n and p is a control state of AnCi . Let q be the first state of
πβn . If we started αn in pv by executing a finite path which changes the control state from p to the
first control state of πβn (which takes at most |Q| transitions) and continued by executing πβn , the
counters could potentially reach values arbitrarily close to zero (it might even happen that πβn is
not executable). Instead, we fix a suitable n0 ≤ n satisfying n − n0 ≥ κ · norm(eff (πβn0 )) + |Q|.
√
√
Since norm(eff (πβn0 )) ≤ d · n0 , we can safely put n0 = (n − |Q|)/(1 + κ d). Now, we can
initiate αn by a short finite path which changes the control state from p to the first control state
24
√
of πβn0 , and continue by executing πβn0 . Note that (1 + κ d) is a constant, so decreasing n to
n0 has no influence in the asymptotic length of the constructed computation. Then, we can safely
execute the compensating path for πβn0 , and thus reach a configuration qu where we continue in
the same way as in pv, i.e., execute another finite path of length Θ(fi (n)) and its corresponding
compensating path. Since the v − u is bounded by a constant vector, this can be repeated Ω(n)
times before reaching a configuration where some counter value is not sufficiently large to perform
another “round”. Hence, the length of the resulting αn is Ω(n · fi (n)).
6
Related Work
In this section we discuss the related work.
Resource analysis. Our work is most closely related to automatic amortized analysis [38, 39, 40, 41,
42, 46, 45, 36, 31], as well as the SPEED project [34, 35, 33]. All these works focus on worst-case
asymptotic bounds for programs, and present sound methods but not complete methods for upper
bounds, i.e., even though the asymptotic bound is linear or quadratic, the approaches may still fail
to provide any upper bound. However, all these works consider general programs rather than the
model of VASS. In contrast, we consider VASS and present sound and complete method to derive
tight (upper and matching lower) polynomial complexity bounds.
Recurrence relations. Other approaches for bounds analysis involve recurrence relations, such
as [32, 29, 1, 2, 3]. Even for relatively simple programs the recurrence are quite complex, and
cannot be obtained automatically. In contrast, we present a polynomial-time approach for optimal
asymptotic bounds for VASS.
Ranking functions and extensions. Ranking functions for intraprocedural analysis have been widely
studied [7, 9, 20, 59, 67, 21, 70, 63]. Most works have focussed on linear or polynomial ranking
functions [20, 59, 67, 21, 70, 63], as well as non-polynomial bounds [14]. Again, these approaches
are sound, but not complete even to derive upper bounds for VASS. The notion of ranking functions
have been also extended to ranking supermartingales [10, 28, 15, 13, 16] for expected termination
time of probabilistic programs, but such approaches do not present polynomial asymptotic bounds.
Results on VASS. The model of VASS [50] or equivalently Petri nets are a fundamental model
for parallel programs [25, 50] as well as parameterized systems [6]. The termination problems
(counter-termination, control-state termination) as well as the related problems of boundedness
and coverability have been a rich source of theoretical problems that have been widely studied [56,
61, 23, 24, 8]. The complexity of the termination problem with fixed initial configuration is
EXPSPACE-complete [56, 71, 5]. Recent work such as [66, 6] shows how VASS and subclass of
VASS (such as lossy VASS) provide a natural model for abstraction and analysis of programs as well
as parametrized systems. The work of [66] also considers lexicographic ranking functions to obtain
sound asymptotic upper bounds for lossy VASS. However, this approach is not complete, and also
25
do not consider tight complexity bounds (but only upper bounds). Besides the termination problem,
the more general reachability problem where given a VASS, an initial and a final configuration,
whether there exists a path between them has also been studied [57, 53, 55]. The reachability
problem is decidable [57, 53, 55], and EXPSPACE-hard [56], and the current best-known upper
bound is cubic Ackermannian [54], a complexity class belonging to the third level of a fast-growing
complexity hierarchy introduced in [62].
Other related approaches are sized types [17, 43, 44], and polynomial resource bounds [65]. Again
none of these approaches are complete for VASS nor they can yield tight asymptotic complexity
bounds.
Hyperplane-separation technique and existence of infinite computation. The problem of existence
of infinite computations in VASS has been studied in the literature. Polynomial-time algorithms
have been presented in [11, 68] using results of [52]. In the more general context of games
played on VASS, even deciding the existence of infinite computation is coNP-complete [11,
68], and various algorithmic approaches based on hyperplane-separation technique have been
studied [12, 47, 18]. In this work we also consider normals of effects of cycles in VASS, which is
related to hyperplane-separation technique. However all previous works consider hyperplane-based
techniques to determine the existence of infinite computations on games played on VASS, and do
not consider asymptotic time of termination. In contrast, we present the first approach to show
that hyperplane-based techniques can be used to derive tight asymptotic complexity bounds on
termination time for VASS.
7
Conclusion
In this paper, we studied the problem of obtaining precise polynomial asymptotic bounds for VASS.
We obtained a full end efficient characterization of all VASS with linear termination complexity.
Then we considered polynomial termination for strongly connected VASS, dividing them into four
disjoint classes (A)–(D). For the first two classes, we proved that the VASS are non-terminating.
For VASS in (C), we obtained a full and effective characterization of termination complexity. For
the last class (D), we have shown that the termination complexity can be exponential even for
dimension three. The results are applicable also to general (i.e., non-strongly connected VASS), by
analyzing the individual SCCs. Some extra effort is needed in (C), because here a possible increase
in the size of configurations accumulated in a given SCC before moving into another SCC must be
taken into account. To keep our proofs reasonably simple, we considered just strongly connected
VASS.
Our result gives rise to a number of interesting directions for future work. First, whether our precise
complexity analysis or the complete method can be extended to other models in program analysis
(such as affine programs with loops) is an interesting theoretical direction to pursue. Second, in the
practical direction, using our result for developing a scalable tool for sound and complete analysis
26
of asymptotic bounds for VASS and their applications in program analysis is also an interesting
subject for future work.
References
[1] Elvira Albert, Puri Arenas, Samir Genaim, Miguel Gómez-Zamalloa, German Puebla, Diana V.
Ramírez-Deantes, Guillermo Román-Díez, and Damiano Zanardini. Termination and cost
analysis with COSTA and its user interfaces. ENTCS, 258(1):109–121, 2009.
[2] Elvira Albert, Puri Arenas, Samir Genaim, and Germán Puebla. Automatic inference of
upper bounds for recurrence relations in cost analysis. In SAS, volume 5079 of LNCS, pages
221–237. Springer, 2008.
[3] Elvira Albert, Puri Arenas, Samir Genaim, Germán Puebla, and Damiano Zanardini. Cost
analysis of java bytecode. In ESOP, volume 4421 of LNCS, pages 157–172. Springer, 2007.
[4] Christophe Alias, Alain Darte, Paul Feautrier, and Laure Gonnord. Multi-dimensional
rankings, program termination, and complexity bounds of flowchart programs. In SAS, pages
117–133. Springer-Verlag, 2010.
[5] Mohamed Faouzi Atig and Peter Habermehl. On yen’s path logic for petri nets. IJFCS,
22(04):783–799, 2011.
[6] Roderick Bloem, Swen Jacobs, Ayrat Khalimov, Igor Konnov, Sasha Rubin, Helmut Veith,
and Josef Widder. Decidability in parameterized verification. SIGACT News, 47(2):53–64,
2016.
[7] Olivier Bournez and Florent Garnier. Proving positive almost-sure termination. In RTA, pages
323–337, 2005.
[8] Laura Bozzelli and Pierre Ganty. Complexity Analysis of the Backward Coverability Algorithm
for VASS. In RP, pages 96–109. Springer, 2011.
[9] Aaron R. Bradley, Zohar Manna, and Henny B. Sipma. Linear ranking with reachability. In
CAV, volume 3576 of LNCS, pages 491–504. Springer, 2005.
[10] Aleksandar Chakarov and Sriram Sankaranarayanan. Probabilistic program analysis with
martingales. In CAV, volume 8044 of LNCS, pages 511–526. Springer, 2013.
[11] Krishnendu Chatterjee, Laurent Doyen, Thomas A. Henzinger, and Jean-Francois Raskin.
Generalized mean-payoff and energy games. In FSTTCS, pages 505–516, 2010.
[12] Krishnendu Chatterjee and Yaron Velner. Hyperplane separation technique for multidimensional mean-payoff games. In CONCUR, pages 500–515. LNCS 8052, Springer, 2013.
27
[13] Krishnendu Chatterjee, Hongfei Fu, and Amir Kafshdar Goharshady. Termination analysis of
probabilistic programs through positivstellensatz’s. In CAV (I), pages 3–22, 2016.
[14] Krishnendu Chatterjee, Hongfei Fu, and Amir Kafshdar Goharshady. Non-polynomial worstcase analysis of recursive programs. In CAV, pages 41–63, 2017.
[15] Krishnendu Chatterjee, Hongfei Fu, Petr Novotný, and Rouzbeh Hasheminezhad. Algorithmic
analysis of qualitative and quantitative termination problems for affine probabilistic programs.
In POPL, pages 327–342. ACM, 2016.
[16] Krishnendu Chatterjee, Petr Novotný, and Dorde Zikelic. Stochastic invariants for probabilistic
termination. In POPL, pages 145–160, 2017.
[17] Wei-Ngan Chin and Siau-Cheng Khoo. Calculating sized types. In Higher-Order and Symbolic
Computation, 14(2-3):261–300, 2001.
[18] Thomas Colcombet, Marcin Jurdzinski, Ranko Lazic, and Sylvain Schmitz. Perfect half space
games. In CoRR, 2017.
[19] Michael Colón, Sriram Sankaranarayanan, and Henny Sipma. Linear invariant generation
using non-linear constraint solving. In CAV, volume 2725 of LNCS, pages 420–432. Springer,
2003.
[20] Michael Colón and Henny Sipma. Synthesis of linear ranking functions. In TACAS, volume
2031 of LNCS, pages 67–81. Springer, 2001.
[21] Patrick Cousot. Proving program invariance and termination by parametric abstraction,
Lagrangian relaxation and semidefinite programming. In VMCAI, volume 3385 of LNCS,
pages 1–24. Springer, 2005.
[22] Emanuele D’Osualdo, Jonathan Kochems, and C. H. Luke Ong. Automatic Verification of
Erlang-Style Concurrency. In SAS, pages 454–476. Springer 2013.
[23] Javier Esparza. Decidability and complexity of petri net problems—an introduction. Petri
nets, pages 374–428, 1996.
[24] Javier Esparza, Ruslán Ledesma-Garza, Rupak Majumdar, Philipp Meyer, and Filip Niksic.
An SMT-Based Approach to Coverability Analysis. In CAV, pages 603–619, Springer, 2014.
[25] Javier Esparza and Mogens Nielsen. Decidability issues for petri nets - a survey. In Bulletin
of the EATCS, 52:245–262, 1994.
[26] Uli Fahrenberg, Line Juhl, Kim G. Larsen, Jiří Srba. Energy Games in Multiweighted
Automata. In Theoretical Aspects of Computing – ICTAC 2011, volume 6916 of LNCS, pages
95–115. Springer, 2011.
[27] Yu Feng, Ruben Martins, Yuepeng Wang, Isil Dillig, and Thomas W. Reps. Component-based
synthesis for complex apis. In POPL, pages 599–612, ACM, 2017.
28
[28] Luis María Ferrer Fioriti and Holger Hermanns. Probabilistic termination: Soundness,
completeness, and compositionality. In POPL, pages 489–501. ACM, 2015.
[29] Philippe Flajolet, Bruno Salvy, and Paul Zimmermann. Automatic average-case analysis of
algorithm. TCS, 79(1):37–109, 1991.
[30] Pierre Ganty and Rupak Majumdar. Algorithmic verification of asynchronous programs.
TOPLAS, 34(1):6:1–6:48, May 2012.
[31] Stéphane Gimenez and Georg Moser. The complexity of interaction. In POPL, pages 243–255.
ACM, 2016.
[32] Bernd Grobauer. Cost recurrences for DML programs. In ICFP, pages 253–264. ACM, 2001.
[33] Bhargav S. Gulavani and Sumit Gulwani. A numerical abstract domain based on expression
abstraction and max operator with application in timing analysis. In CAV, volume 5123 of
LNCS, pages 370–384. Springer, 2008.
[34] Sumit Gulwani. SPEED: symbolic complexity bound analysis. In CAV, volume 5643 of
LNCS, pages 51–62. Springer, 2009.
[35] Sumit Gulwani, Krishna K. Mehra, and Trishul M. Chilimbi. SPEED: precise and efficient
static estimation of program computational complexity. In POPL, pages 127–139. ACM,
2009.
[36] Jan Hoffmann, Klaus Aehlig, and Martin Hofmann. Multivariate amortized resource analysis.
TOPLAS, 34(3):14, 2012.
[37] Jan Hoffmann, Klaus Aehlig, and Martin Hofmann. Resource aware ML. In CAV, volume
7358 of LNCS, pages 781–786. Springer, 2012.
[38] Jan Hoffmann and Martin Hofmann. Amortized resource analysis with polymorphic recursion
and partial big-step operational semantics. In APLAS, volume 6461 of LNCS, pages 172–187.
Springer, 2010.
[39] Jan Hoffmann and Martin Hofmann. Amortized resource analysis with polynomial potential.
In ESOP, volume 6012 of LNCS, pages 287–306. Springer, 2010.
[40] Martin Hofmann and Steffen Jost. Static prediction of heap space usage for first-order
functional programs. In POPL, pages 185–197. ACM, 2003.
[41] Martin Hofmann and Steffen Jost. Type-based amortised heap-space analysis. In ESOP,
volume 3924 of LNCS, pages 22–37. Springer, 2006.
[42] Martin Hofmann and Dulma Rodriguez. Efficient type-checking for amortised heap-space
analysis. In CSL, volume 5771 of LNCS, pages 317–331. Springer, 2009.
[43] John Hughes and Lars Pareto. Recursion and dynamic data-structures in bounded space:
Towards embedded ML programming. In ICFP, pages 70–81. ACM, 1999.
29
[44] John Hughes, Lars Pareto, and Amr Sabry. Proving the correctness of reactive systems using
sized types. In POPL, pages 410–423. ACM Press, 1996.
[45] Steffen Jost, Kevin Hammond, Hans-Wolfgang Loidl, and Martin Hofmann. Static determination of quantitative resource usage for higher-order programs. In POPL, pages 223–236.
ACM, 2010.
[46] Steffen Jost, Hans-Wolfgang Loidl, Kevin Hammond, Norman Scaife, and Martin Hofmann.
"carbon credits" for resource-bounded computations using amortised analysis. In FM, volume
5850 of LNCS, pages 354–369. Springer, 2009.
[47] Marcin Jurdzinski, Ranko Lazic, and Sylvain Schmitz. Fixed-dimensional energy games are
in pseudo-polynomial time. In ICALP pages 260–272, 2015.
[48] Alexander Kaiser, Daniel Kroening, and Thomas Wahl. Dynamic Cutoff Detection in Parameterized Concurrent Programs. In CAV, volume 6174 of LNCS, pages 645–659. Springer,
2010.
[49] Alexander Kaiser, Daniel Kroening, and Thomas Wahl. Efficient Coverability Analysis by
Proof Minimization. IN CONCUR, pages 500–515. Springer, 2012.
[50] Richard M. Karp and Raymond E. Miller. Parallel program schemata. JCSS, 3(2):147–195,
1969.
[51] Leonid Genrikhovich Khachiyan. A polynomial algorithm in linear programming. Doklady
Akademii Nauk SSSR, 244:1093–1096, 1979.
[52] S. Rao Kosaraju and Gregory F. Sullivan. Detecting cycles in dynamic graphs in polynomial
time. In STOC, pages 398–406, 1988.
[53] S. Rao Kosaraju. Decidability of reachability in vector addition systems (preliminary version).
In STOC, pages 267–281. ACM, 1982.
[54] Jérôme Leroux and Sylvain Schmitz. Demystifying reachability in vector addition systems.
In LICS, pages 56–67. ACM/IEEE 2015.
[55] Jérôme Leroux. Vector addition system reachability problem: A short self-contained proof.
In POPL, pages 307–316. ACM, 2011.
[56] Richard J. Lipton. The reachability problem requires exponential space. Technical report 62,
1976.
[57] Ernst W. Mayr. An Algorithm for the General Petri Net Reachability Problem. In SIAM,
13:441–460, 1984.
[58] Ernst W. Mayr and Albert R. Meyer. The complexity of the finite conainment problem for
Petri nets. Journal of the ACM, pages 561–576, 1981.
30
[59] Andreas Podelski and Andrey Rybalchenko. A complete method for the synthesis of linear
ranking functions. In VMCAI, volume 2937 of LNCS, pages 239–251. Springer, 2004.
[60] Martin L. Puterman. Markov Decision Processes. Wiley, 1994.
[61] Charles Rackoff. The Covering and Boundedness Problems for Vector Addition Systems.
TCS, 6:223–231, 1978.
[62] Sylvain Schmitz. Complexity hierarchies beyond elementary. TOTC, 8(1):3:1–3:36, February
2016.
[63] Liyong Shen, Min Wu, Zhengfeng Yang, and Zhenbing Zeng. Generating exact nonlinear
ranking functions by symbolic-numeric hybrid method. J. Systems Science & Complexity,
26(2):291–301, 2013.
[64] Alfonso Shimbel. Applications of matrix algebra to communication nets. The bull. math.
biophysics, 13(3):165–178, Sep 1951.
[65] Olha Shkaravska, Ron van Kesteren, and Marko C. J. D. van Eekelen. Polynomial size
analysis of first-order functions. In TLCA, volume 4583 of LNCS, pages 351–365. Springer,
2007.
[66] Moritz Sinn, Florian Zuleger, and Helmut Veith. A simple and scalable static analysis for
bound analysis and amortized complexity analysis. In CAV, pages 745–761, 2014.
[67] Kirack Sohn and Allen Van Gelder. Termination detection in logic programs using argument
sizes. In PODS, pages 216–226. ACM Press, 1991.
[68] Yaron Velner, Krishnendu Chatterjee, Laurent Doyen, Thomas A. Henzinger, Alexander
Rabinovich, and Jean-Francois Raskin. The complexity of multi-mean-payoff and multienergy games. Inf. Comput., 241:177–196, 2015.
[69] Reinhard Wilhelm. The worst-case execution-time problem - overview of methods and survey
of tools. TECS, 7(3), 2008.
[70] Lu Yang, Chaochen Zhou, Naijun Zhan, and Bican Xia. Recent advances in program
verification through computer algebra. FCS, 4(1):1–16, 2010.
[71] Hsu-Chun Yen. A unified approach for deciding the existence of certain petri net paths.
Information and Computation, 96(1):119–137, 1992.
31
| 8cs.DS
|
The IQ of Neural Networks
Dokhyam Hoshen and Michael Werman
arXiv:1710.01692v1 [cs.LG] 29 Sep 2017
School of Computer Science and Engineering
The Hebrew University of Jerusalem
Jerusalem, Israel
Abstract
IQ tests are an accepted method for assessing human intelligence. The tests consist of several parts that must be solved
under a time constraint. Of all the tested abilities, pattern
recognition has been found to have the highest correlation
with general intelligence. This is primarily because pattern
recognition is the ability to find order in a noisy environment, a necessary skill for intelligent agents. In this paper,
we propose a convolutional neural network (CNN) model for
solving geometric pattern recognition problems. The CNN receives as input multiple ordered input images and outputs the
next image according to the pattern. Our CNN is able to solve
problems involving rotation, reflection, color, size and shape
patterns and score within the top 5% of human performance.
Evaluating machine learning methods against human performance has served as a useful benchmark for artificial intelligence. Deep learning methods have recently achieved
super-human level performance on several important tasks
such as face recognition (Taigman et al. ) and Large Vocabulary Continuous Speech Recognition (LVCSR) (Xiong et
al. ). Although the above tasks might have some correlation
with human intelligence, they are not testing intelligence directly. In this paper, we take a more direct route and evaluate
neural networks directly on tasks designed to test human intelligence.
Intelligence Quotient (IQ) tests are one of the most common methods of defining and testing human computation
and comprehension abilities (Stern 1914). IQ tests are only
estimates of intelligence (as opposed to actual measurements) and their effectiveness is in active debate (Flynn
1987; Siegel 1989). Despite the controversy, IQ tests are
used in practice to make critical decisions, such as school
and workplace placement, and assessment of mental disabilities. IQ scores have also been shown to correlate with
morbidity and mortality, socioeconomic background and
parental IQ.
IQ tests measure different skills: verbal intelligence,
mathematical abilities, spatial reasoning, classification
skills, logical reasoning and pattern recognition. In this paper, we focus on the pattern recognition section. In these
problems, the test-taker is presented with a series of shapes
with geometric transformations between them. As in most
Copyright c 2018, Association for the Advancement of Artificial
Intelligence (www.aaai.org). All rights reserved.
IQ tests, the problem is presented with multiple choices for
answer. One of these answers is the (most) correct one. A
limited number of possible transformations are used to produce the questions, thus it is possible to gain experience and
learn to solve them easily and quickly. Nevertheless, pattern
recognition problems have added benefits in comparison to
the other types of questions, as they rely less on a standard
educational background (as in the verbal or mathematical)
and therefore (arguably) are less biased towards upbringing
and formal education. Pattern recognition problems are also
related to real life problems and are therefore assumed to
have a high correlation with the actual intelligence.
In this paper, we solve IQ-test style pattern recognition
questions with a deep network. We train our network on
computer generated pattern recognition problems. The input
to each example consists of two images, where the second
image is a transformed version of the first image. The models infer the transformation and output the prediction of the
next image in two different forms (evaluated separately):
1. Multiple choice: The model is presented with a number of
possible images and choses the most probable one.
2. Regression: The model draws the most likely next image.
Simply by showing the model sequences of images we were
able to grasp geometric concepts such as shape and rotation.
We trained the network on series of images exhibiting the
following transformations (see Fig. 2 for examples):
• Rotation: Each shape is rotated by a constant angle with
respect to the previous shape.
• Size: Each shape is expanded or shrunk by a fixed scaling
factor with respect to the previous shape.
• Reflection: Each shape is transformed by a combination
of a rotation (as before) and a reflection.
• Number: Each image contains one more polygon than in
the previous one i.e if the image contains two triangles
the second and third images will contain three and four
triangles, respectively.
• Color: The model is presented with a series of objects in
different colors and must decide the color of the next object.
• Addition: The model is presented with a series of shapes
that have another shape added to them. The model must
Figure 1: Example of Ravens test style questions. Given
eight shapes the subject must identify the missing piece.
decide what a combination of these previous images looks
like.
We performed extensive experiments investigating the
performance of CNNs at IQ tests. We trained the networks
on a dataset containing all the transformation options. In this
experiment, the operations were also used simultaneously,
i.e there can be two shapes in the image: one rotating and
one expanding. In a different set of experiments, for each
operation, we trained a specialized network on a dataset containing only the specific operation, for analysis purposes.
This research brings us a step closer to comparing deep
learning intelligence to human intelligence. It is also important for evaluating the difficulty of IQ tasks. We can also use
this model in adapting tests to the level of the individual and
so improve the current methods of evaluation. Additionally,
probabilities give an indication to how confusing different
choices were, thus allowing a more accurate evaluation.
Related Work
Psychologists have tried to estimate the effectiveness of different questions in intelligence tests (Crawford et al. 2001).
A commonly used and well validated test for pattern recognition assessment is Ravens Progressive Matrices, the test
taker is typically presented with 60 non-verbal multiple
choice questions (as shown in Figure 1). Such tests are popular mainly due to their independence from language and
writing skills.
One of the advantages of visual pattern recognition problems in IQ tests is that they requires a minimal amount of
prior knowledge. Therefore, such tests can also be used to
quantify the intelligence of very young children who have
not yet learned basic mathematical and verbal concepts. This
measure is thus less polluted by environmental factors. Work
was done on the relationship between the scores that children obtained in these problems in infancy and their results
in later years, in IQ tests in general as well as specifically the
pattern recognition section (DiLalla et al. 1990). The score
was found to be a good predictor for later years, but adding
birth order and parental education resulted in improved predictions.
The subject of solving Raven’s Progressive Matrices
problems computationally was studied by (Kunda, McGreggor, and Goel 2009). The focus of this work was finding a
feature representation for solving Raven’s Progressive Ma-
trices with simple classifiers. While their research was the
first to address these problems as a computational problem,
they did not publish enough experimental results to validate
their method. Our approach is different and more general,
we use deep neural networks to automatically learn the representation jointly with the classifier, rather than handcrafting the feature representation.
Work was done by (Wang et al. 2015) on automatic solution of the verbal reasoning part of IQ tests. Machine learning methods using hand-crafted features were able to automatically solve verbal reasoning questions featuring synonyms and antonyms as well as word analogies. This line of
work is related to our research as it solves ”analogy” problems, where the subject needs to grasp the transformation
rules between words and generalize them. It deals linguistic
transformations rather than visual ones.
(Hoshen and Peleg 2016) analyzed the capability of
DNNs learning arithmetic operations. In this work, the network learned the concept of addition of numbers based on
end-to-end visual learning. This shows the possibility of
learning arithmetic transformations without prior knowledge
of basic concepts such as ”number” or ”addition”.
Much research has been done on Frame Prediction, predicting the next frame given one or more frames. Mathieu et
al. (Mathieu, Couprie, and LeCun 2015) presented a video
next frame prediction network. Due to uncertainty is the output of real video, a GAN loss function was used and shown
to improve over the standard euclidean loss. A CNN system was presented by Oh et al. for frame prediction in Atari
games (Oh et al. 2015). This is simpler than natural video
due to both having simpler images and more deterministic
transformations. Some work been done on object and action
prediction from video frames by (Vondrick, Pirsiavash, and
Torralba 2016), in which the agent learned to predict the FC7
features and used it to classify future actions. In this paper,
we deal with data that uses pre-specified transformations and
simple shapes and is, therefore, more amenable to detailed
analysis than previous research.
Our architecture uses Convolutional Neural Networks
(CNNs) (LeCun et al. 1990). For multiple choice type
problems, we use a classification architecture containing a
discriminator (see e.g. (Krizhevsky, Sutskever, and Hinton
2012)). For open questions, in order to generate an image we
use an autoencoder type architecture (see e.g. (Hinton and
Salakhutdinov 2006)). The hyper-parameters of our CNN architecture, are inspired by the architecture used in DCGAN
(Radford, Metz, and Chintala 2015). We optimized the network parameters using backpropogation (Rumelhart et al. )
(LeCun et al. 2012), with the ADAM (Kingma and Ba 2014)
gradient descent algorithm.
Creating the Dataset
In this paper, we evaluate two types of IQ test scenarios:
solving multiple choice pattern recognition problems and
producing the next image.
Multiple choice questions: This scenario is used in most
IQ tests. The model receives six input images: 2 input images and 4 options for the next image. At train time, it receives an index corresponding to the correct answer. The
Figure 2: Multiple choice question problem types. In this figure each example corresponds to a different problem type. For each
problem, there are 4 possible answers and only 1 is correct (shown in full only for (a), for space considerations). (a) Polygon
rotation: A polygon is rotated by a constant angle θ, between consecutive frames. The correct answer is: Option 1. (b) Squiggle
Rotation: Six random points are sampled and rotated by a constant angle, θ. (c) Size: A polygon is dilated by a constant scale
factor, µ. (d) Reflection: A shape is rotated by a constant angle θ and then reflected around the y-axis. (e) Counting: Each frame
shows one more polygon than in the previous one. (f) Color: The third frame shows one more polygon than the second frame in
the color of the second image (green).(g) Image Addition: The second image adds a line to the first image and the fourth image
adds that same line to the third image.
model outputs the predicted probability for each of the presented options. The most probable option is picked as the
model’s answer.
We form the questions in the following way: for each sample question, we randomly choose a transformation T from
the following: rotation, size, reflection, number, color and
addition. We then randomly produce a 64x64 image containing a shape S. The shape is randomly selected out of
triangles, squares, circles or random squiggles. We apply the
chosen transformation on the first image resulting in the second frame T S. We produce the correct answer, T T S, and
the 3 wrong answers (the other options) using other transformations.
wrong answers are created using different operations. See
Fig. 2(d).
• Number: Between 1 and 4 shapes are selected. For each
successive image we add one further exemplar of the
shape (this shape has the same number of vertices as the
previous shape but will most likely not be a replica of the
previous shape) i.e if the first frame contains a triangle, the
next image will contain two triangles. The wrong images
will show a different number of shapes than the correct
one or it will show the correct number of shapes but of
the wrong shape. See Fig. 2(e).
• Size: We randomly select a scale parameter µ ∈ [0.5..2].
The wrong answers are created by sampling a different
resizing ratio or a different operation. See Fig. 2(c).
• Color: Two colors and a shape are selected at random.
The first image is the shape with the first color and the
second with two shapes with the second color. The solution should be the three copies of the shape with the
second color. In the example in Fig. 2(f) the correct image has three green triangles. The wrong answers will include different colors, shapes and transformations. This is
in essence a combination of the ”number” questions with
color elements.
• Reflection: we randomly select an angle for rotation and
rotate the shape after reflecting it at each stage. The
• Addition: Three shapes are randomly selected.The first
image contains one of these shapes.The second contains
• Rotation: we randomly select an angle θ ∈ [0..2π] and
rotate the shape by θ. The wrong answers are created by
sampling different angles for rotation or a different operation. See Fig. 2(a)(b).
Figure 3: Model architectures: In this figure, we show the architectures of both models, the open questions and the multiple
choice questions. In blue we have the CNN that is used by both models, the encoder network. The inputs of the models are
different: the multiple answer questions require four extra images from which to choose the answer. Thus, the input for the
multiple-choice problems consists of 6 images while the input for the open questions consists of 2 images. After the code
generation, the models split: the autoencoder runs the decoder (green) and outputs an image. The CNN classifier (used for the
multiple-choice problems) has one more affine layer (orange) and outputs four probabilities, one for each option. Note that the
two models are trained separately and do not share features.
both the first and second shapes. The third contains just
the third image. The correct answer is the union of images two and three but not including the part of image
2 that was inherited from image 1. Formally, im4 =
im3∪im2\im1. This problem is a combination of image
addition and subtraction. See Fig. 2(g).
Open questions: In this scenario, the model is required to
predict the next frame. At training time we do not provide
the model with four options to choose from, as the model
generates the next frame on its own. Since it is difficult to
evaluate the correctness of the predicted frame for the ”number” transformation, we did not include it in the open questions dataset. Furthermore, the ”color” transformation in the
this scenario is defined differently. For each sample two colors and shapes are selected at random. The first image shows
the first shape in the first color, the second shows the second shape in the second color. The third image (the solution)
should show the first shape in the second color.
We automatically generated 100K images for training and
1000 images for testing, according to the rules described
above. The data was normalized to have a normal mean and
standard deviation at each pixel.
We will publicly release the dataset generation Python
code.
Model Architecture
For multiple choice problems we used a standard CNN and
for open questions, we used an autoencoder. Both models
were implemented in PyTorch.
Multiple choice questions: We used a CNN architecture
with 4 convolutional layers, each followed by batch normalization and ReLU activation layers. We found this (shallow)
depth to work the best. The input layer receives six images,
the first two frames of the sequence and the four options
that the model must choose the most likely answer from.
The output layer is a linear layer with Softmax activation,
it outputs the probability of each of the 4 optional images
to be the correct answer. The model architecture is sketched
in Fig. 3. We can additionally use the probabilities to infer
which questions were challenging for the model (e.g. by the
probability vector entropy).
Open questions: In this scenario, we generated the answer
image rather than simply selecting from a set of option images. This required a network architecture containing both
an encoder and a decoder (an autoencoder). The choice of
hyper-parameters used in our architecture borrows heavily
from the one used in DC-GAN (Radford, Metz, and Chintala
2015). The encoder consists of 5 convolutional layers, each
with 4x4 convolution kernels with a stride of 2 (no pooling
layers, this is implicitly done by the convolution operation’s
stride). Each convolution is followed by leakyReLU activation layers with a leakage coefficient of 0.2. The input of
the decoder is the first two RGB input frames (total size:
64x64x6). The output of the encoder is a code vector z of
dimension 32. The decoder receives the code z as input and
outputs a full image (size: 64x64x3). The decoder is comprised of 5 deconvolution layers (Transposed Convolution
layers) with 4x4 convolution kernels and stride 2, this effectively upsamples by a factor of 2 with each deconvolution
layer. Each deconvolution layer is followed by an ELU activation layer. See Figure 3 for a diagram of our architecture.
For both scenarios, the same optimization settings were
used. We optimized the model using Adam (Kingma and Ba
2014). The learning rate was annealed by a factor of 0.1 every 100 epochs. We trained the model using mini-batches of
size 64. The loss is calculated by the cross-entropy loss.
The number of training epochs required for convergence
was different for each problem as was their convergence
rate. The number of epochs to convergence ranged between
30 and 100 depending on the problem.
Transformation
Rotation Polygon
Rotation Squiggle
Size
Reflection
Color
Number
Addition
All-Transformation Network
Success rate
98.4%
94%
100%
100%
95.6%
91.4%
100%
92.8%
Table 1: Accuracies for multiple-choice questions: We can
see that the all-transformation network accuracy was lower
than most of the individual scores. This is most likely due
to additional errors in classification of the transformation, a
problem that does not exist in individual trainings. Out of all
the transformations, the the number transformation had the
highest error rate.
Results
In this paper, we set to investigate if neural networks are
able to solve geometric pattern recognition problem as used
in IQ tests. In this section, we evaluate the performance of
our CNN models on learning the transformations to the geometric shapes (rotation, size, reflection etc). For both models, the results convincingly show that the networks have
grasped the basic concepts.
We present quantitative evaluations of model performance.
Multiple-answer questions: As this is a classification
problem, a quantitative evaluation is simple for this scenario.
The accuracy rates of our model on the different tasks are
presented in Tab. 1. We can see that the overall score was
significantly smaller than most of the individual scores. This
is most likely due to error of classification of the transformation, a problem that does not exist in individual trainings.
Out of all the transformations, the one with the highest error
rate was the number transformation. E.g. one failure case
had two similar options, with squares (wrong answer) having two vertices that were illegibly close to one another that
looking very similar to triangles (correct answer).
In Fig. 4 we show an example of the questions where the
network classified the wrong option as the correct answer.
We added the probabilities that the model assigned to these
options as well since this is indicative of the network’s error
rate.
It visually apparent that in this failure case, the options
were very close to one another, and that the network’s output
probabilities were also very close for these options (however
the wrong option had a slightly higher probability). This in-
Figure 4: Wrong Prediction on a rotation problem. True answer: 3 Prediction: 2 Probabilities: Option 1 ≈ 0. Option 2
≈ 0.9. Option 3 ≈ 0.09. Option 4 ≈ 0. We can see that the
network was confused by the thin shape and had difficulty
deciding which direction the shape was rotating.
dicates that the failure does not signify the network’s failure to learn these transformations and the actual error rate is
smaller.
Open questions: We trained and tested the autoencoder
network on the following problems: rotation, size, color, and
reflection. We also tested the capabilities of the agent on
tasks where the transformation was a combination of two
of the basic transformations. Some questions included two
shapes, each simultaneously changing according to a different transformation. In Fig. 5 we show examples from the
different types of questions that were used for evaluation.
It is apparent that while the network has managed to grasp
the concepts of the transformations in all cases, there is some
blurring as the finer details in the image are lost in the encoding (downsampling) stage of the autoencoder. We measure
prediction accuracy by mean squared error (MSE) between
the ground truth and predicted image.
In Tab. 2 we present the average MSEs for each problem
type. We can see from the results that reflection and rotation tasks were the hardest to learn (as shown by the rela-
Figure 5: Open questions Scenario. We present output examples for the following tasks: (a) Rotation (b) Size (c) ”Squiggle”
Rotation (d) Color (e) Reflection (f) Combination of Rotation + Size
Transformation
Rotation Polygon
Rotation Squiggle
Size
Reflection
Color
Overall
Average MSE
4.1E-4
5.7E-4
2.4E-4
4.1E-4
2.1E-4
3.5E-4
Table 2: The results show that the reflection and rotation
transformations are more difficult to learn. Empirical tests
also show that these transformations are the most difficult
for humans to solve.
tively high error). A possible theoretical explanation for the
relative difficulty of learning the rotation transformation is
that more parameters need to be inferred to define the rotation matrix: the center point coordinates and the angle.
As our reflection problems also include a rotation, the same
number of parameters much be inferred. In comparison, for
color problems only a single parameter must be inferred, as
it leaves one image unchanged but multiplies its values by
an identical constant that multiplied the other image. Only
one parameter is also needed for the scale factor in the size
questions. Inferring more parameters can result in a more
challenging task. Furthermore, empirical research has found
that rotation questions are significantly more difficult for humans to solve in IQ tests (Jaarsveld et al. 2010).
Performance on Noisy Images
As pattern recognition is often required in noisy environments, we tested the model’s performance on noisy images.
The setup is identical to the noiseless dataset, but with IID
Gaussian noise of σ = 99 added to all input and output images.
The model performed well in the noisy setting. In the
multiple-choice scenario, the average model error rate was
87% compared to 91% in the noiseless case. In the open
question scenario, the result images were generated correctly without the added noise, as noise cannot be predicted.
Performance on Real Questions
One of the main objectives of this paper is to compare neural network performance on benchmarks used to evaluate
human intelligence. When constructing the dataset, we analyzed IQ tests used in practice in the aim of building a realistic dataset. The rules used for dataset construction are
similar as those used for creating human IQ tests.
We tested our model on a test set of 40 questions taken
from IQ tests used by the National Institute for Testing and
Evaluation in Israel. The questions mostly consisted of reflection and addition problems, which are prominent in human IQ tests. Our model scored 38 correct answers out of 40
(5% error rate). This lies within the top 5% of human performance for all ages in the range between 20 and 70 according to the Institute’s measurements and similar performance
thresholds are given by (Raven 2000). This performance percentile corresponds to an IQ of above 127 (Hunt 2010). The
Figure 6: Sample Question from the Test Set. Answer: 3
true IQ is potentially higher, as the test does not discriminate
between the top IQ percentages.
One difference between our dataset and IQ tests used in
practice is the complexity of the shapes (more edges, more
types of shapes etc.) and the number of options to choose
from. While the number of options can easily be dealt with
by small modification to the architectures, the complexity of
the shapes pose an obstacle for our model. It was not able to
successfully generate crisp pictures in the Open Questions
format. We believe that by making our dataset more picturerealistic we can improve transfer learning in this scenario.
Conclusion and Future Work
We presented an effective neural network model for solving
geometric pattern recognition problems as used in IQ tests.
We also presented a model that is capable of generating the
images of the answers, giving more insight into the patterns
that our model is able to learn.
More research can be done on the types of questions that
CNNs can solve, or more importantly, the types of problems
that they fail at. In the future, we would like to explore more
challenging patterns that capture the limit of CNN learning capacity. Subjects with high scores are typically tested
on questions of ”Advanced Progressive Matrices”, but these
questions were not compatible with the current architecture
of our network. We would like to adjust our model to all
types of questions that appear in Raven’s Progressive Matrices test.
References
[Crawford et al. 2001] Crawford, J. R.; Deary, I. J.; Starr, J.;
and Whalley, L. J. 2001. The nart as an index of prior intellectual functioning: a retrospective validity study covering a
66-year interval. Psychological medicine 31(3):451–458.
[DiLalla et al. 1990] DiLalla, L. F.; Thompson, L.; Plomin,
R.; Phillips, K.; Fagan III, J. F.; Haith, M. M.; Cyphers,
L. H.; and Fulker, D. W. 1990. Infant predictors of preschool
and adult iq: A study of infant twins and their parents. Developmental Psychology 26(5):759.
[Flynn 1987] Flynn, J. R. 1987. Massive iq gains in 14 nations: What iq tests really measure. Psychological bulletin
101(2):171.
[Hinton and Salakhutdinov 2006] Hinton, G. E., and
Salakhutdinov, R. R. 2006. Reducing the dimensionality of
data with neural networks. science 313(5786):504–507.
[Hoshen and Peleg 2016] Hoshen, Y., and Peleg, S. 2016.
Visual learning of arithmetic operation. In AAAI, 3733–
3739.
[Hunt 2010] Hunt, E. 2010. Human intelligence. Cambridge
University Press.
[Jaarsveld et al. 2010] Jaarsveld, S.; Lachmann, T.; Hamel,
R.; and Leeuwen, C. v. 2010. Solving and creating raven
progressive matrices: Reasoning in well-and ill-defined
problem spaces. Creativity Research Journal 22(3):304–
319.
[Kingma and Ba 2014] Kingma, D., and Ba, J. 2014. Adam:
A method for stochastic optimization. arXiv preprint
arXiv:1412.6980.
[Krizhevsky, Sutskever, and Hinton 2012] Krizhevsky, A.;
Sutskever, I.; and Hinton, G. E. 2012. Imagenet classification with deep convolutional neural networks. In Advances
in neural information processing systems, 1097–1105.
[Kunda, McGreggor, and Goel 2009] Kunda, M.; McGreggor, K.; and Goel, A. K. 2009. Addressing the raven’s
progressive matrices test of” general” intelligence. In AAAI
Fall Symposium: Multi-Representational Architectures for
Human-Level Intelligence.
[LeCun et al. 1990] LeCun, Y.; Boser, B. E.; Denker, J. S.;
Henderson, D.; Howard, R. E.; Hubbard, W. E.; and Jackel,
L. D. 1990. Handwritten digit recognition with a backpropagation network. In Advances in neural information
processing systems, 396–404.
[LeCun et al. 2012] LeCun, Y. A.; Bottou, L.; Orr, G. B.; and
Müller, K.-R. 2012. Efficient backprop. In Neural networks:
Tricks of the trade. Springer. 9–48.
[Mathieu, Couprie, and LeCun 2015] Mathieu, M.; Couprie,
C.; and LeCun, Y.
2015.
Deep multi-scale video
prediction beyond mean square error.
arXiv preprint
arXiv:1511.05440.
[Oh et al. 2015] Oh, J.; Guo, X.; Lee, H.; Lewis, R. L.; and
Singh, S. 2015. Action-conditional video prediction using
deep networks in atari games. In Advances in Neural Information Processing Systems, 2863–2871.
[Radford, Metz, and Chintala 2015] Radford, A.; Metz, L.;
and Chintala, S. 2015. Unsupervised representation learning with deep convolutional generative adversarial networks.
arXiv preprint arXiv:1511.06434.
[Raven 2000] Raven, J. 2000. The raven’s progressive matrices: change and stability over culture and time. Cognitive
psychology 41(1):1–48.
[Rumelhart et al. ] Rumelhart, D. E.; Hinton, G. E.;
Williams, R. J.; et al.
Learning representations by
back-propagating errors. Cognitive modeling 5(3):1.
[Siegel 1989] Siegel, L. S. 1989. Iq is irrelevant to the definition of learning disabilities. Journal of learning disabilities
22(8):469–478.
[Stern 1914] Stern, W. 1914. The psychological methods of
testing intelligence. Number 13. Warwick & York.
[Taigman et al. ] Taigman, Y.; Yang, M.; Ranzato, M.; and
Wolf, L. Deepface: Closing the gap to human-level performance in face verification. In CVPR’14.
[Vondrick, Pirsiavash, and Torralba 2016] Vondrick, C.; Pirsiavash, H.; and Torralba, A. 2016. Anticipating visual representations from unlabeled video. In Proceedings of the
IEEE Conference on Computer Vision and Pattern Recognition, 98–106.
[Wang et al. 2015] Wang, H.; Tian, F.; Gao, B.; Bian, J.; and
Liu, T.-Y. 2015. Solving verbal comprehension questions
in iq test by knowledge-powered word embedding. arXiv
preprint arXiv:1505.07909.
[Xiong et al. ] Xiong, W.; Droppo, J.; Huang, X.; Seide, F.;
Seltzer, M.; Stolcke, A.; Yu, D.; and Zweig, G. The microsoft 2016 conversational speech recognition system. In
ICASSP’17.
| 1cs.CV
|
arXiv:1501.01346v4 [math.NT] 16 Sep 2016
CONSTRUCTION OF UNIPOTENT GALOIS EXTENSIONS AND MASSEY
PRODUCTS
JÁN MINÁČ AND NGUYỄN DUY TÂN
Dedicated to Alexander Merkurjev
A BSTRACT. For all primes p and for all fields, we find a sufficient and necessary condition of the existence of a unipotent Galois extension of degree p6. The main goal of
this paper is to describe an explicit construction of such a Galois extension over fields
admitting such a Galois extension. This construction is surprising in its simplicity and
generality. The problem of finding such a construction has been left open since 2003.
Recently a possible solution of this problem gained urgency because of an effort to extend new advances in Galois theory and its relations with Massey products in Galois
cohomology.
1. I NTRODUCTION
From the very beginning of the invention of Galois theory, one problem has emerged.
For a given finite group G, find a Galois extension K/Q such that Gal(K/Q ) ≃ G. This
is still an open problem in spite of the great efforts of a number of mathematicians and
substantial progress having been made with specific groups G. (See [Se3].) A more general problem is to ask the same question over other base fields F. This is a challenging
and difficult problem even for groups G of prime power order.
In this paper we make progress on this classical problem in Galois theory. Moreover this progress fits together well with a new development relating Massey products in Galois cohomology to basic problems in Galois theory. For all primes p and all
fields in the key test case of n = 4, we construct Galois extensions with the unipotent
Galois group U n (F p ) assuming only the existence of some Galois extensions of order
p3 . This fits into a program outlined in [MT1] and [MT2], for the systematic construction of Galois p-closed extensions of general fields, assuming only knowledge of Galois
extensions of degree less than or equal to p3 and the structure of pth power roots of
unity in the base field. Thus both the methods and the results in this paper pave the
way to a program for obtaining the structure of maximal pro-p-quotients of absolute
Galois groups for all fields. We shall now describe some previous work of a number of
mathematicians which has influenced our work, as well as its significance for further
developments and applications.
JM is partially supported by the Natural Sciences and Engineering Research Council of Canada
(NSERC) grant R0370A01. NDT is partially supported by the National Foundation for Science and Technology Development (NAFOSTED) grant 101.04-2014.34.
1
2
JÁN MINÁČ AND NGUYỄN DUY TÂN
Recently there has been substantial progress in Galois cohomology which has changed
our perspective on Galois p-extensions over general fields. In some remarkable work,
M. Rost and V. Voevodsky proved the Bloch-Kato conjecture on the structure of Galois
cohomology of general fields. (See [Voe1, Voe2].) From this work it follows that there
must be enough Galois extensions to make higher degree Galois cohomology decomposable. However the explicit construction of such Galois extensions is completely
mysterious. In [MT1], [MT2] and [MT5], two new conjectures, the Vanishing n-Massey
Conjecture and the Kernel n-Unipotent Conjecture were proposed. These conjectures
in [MT1] and [MT2], and the results in this paper, lead to a program of constructing these previously mysterious Galois extensions in a systematic way. In these papers it is shown that the truth of these conjectures has some significant implications
on the structure of absolute Galois groups. These conjectures are based on a number of previous considerations. One motivation comes from topological considerations. (See [DGMS] and [HW].) Another motivation is a program to describe various
n-central series of absolute Galois groups as kernels of simple Galois representations.
(See [CEM, Ef, EM1, EM2, MSp, NQD, Vi].) If the Vanishing n-Massey Conjecture is
true, then by a result in [Dwy], we obtain a program of building up n-unipotent Galois
representations of absolute Galois groups by induction on n. This is an attractive program because we obtain a procedure of constructing larger Galois p-extensions from
smaller ones, efficiently using the fact that certain a priori natural cohomological obstructions to this procedure always vanish.
Recall that for each natural number n, U n (F p ) is the group of upper triangular n × nmatrices with entries in F p and diagonal entries 1. Then U3 (F2 ) is isomorphic to the
dihedral group of order 8, and if p is odd, then U3 (F p ) is isomorphic to the Heisenberg group H p3 of order p3 . For all n ≥ 4 and all primes p, we can think of U n (F p ) as
"higher Heisenberg groups" of order pn(n−1)/2 . It is now recognized that these groups
play a very special role in current Galois theory. Because U n (F p ) is a Sylow p-subgroup
of GLn (F p ), and every finite p-group has a faithful linear n-dimensional representation
over F p , for some n, we see that every finite p-group can be embedded into U n (F p )
for some n. Besides, the Vanishing n-Massey Conjecture and the Kernel n-Unipotent
Conjecture also indicate some deeper reasons why U n (F p ) is of special interest. The
constructions of Galois extensions with the Galois group U3 (F p ) over fields which admit them, are well-known in the case when the base field is of characteristic not p. They
are an important basic tool in the Galois theory of p-extensions. (See for example [JLY,
Sections 6.5 and 6.6]. Some early papers related to these topics like [MNg] and [M] now
belong to classical work on Galois theory.)
In [GLMS, Section 4], a construction of Galois extensions K/F, char( F) 6= 2, with
Gal(K/F) ≃ U4 (F2 ), was discovered. Already at that time, one reason for searching for this construction was the motivation to find ideas to extend deep results on
the characterization of the fixed field of the third 2-Zassenhaus filtration of an absolute Galois group GF as the compositum of Galois extensions of degree at most 8 (see
CONSTRUCTION OF UNIPOTENT GALOIS EXTENSIONS AND MASSEY PRODUCTS
3
[Ef, EM2, MSp, Vi]), to a similar characterization of the fixed field of the fourth 2Zassenhaus filtration of GF . In retrospect, looking at this construction, one recognizes
some elements of the basic theory of Massey products. However at that time the authors of [GLMS] were not familiar with Massey products. It was realized that such a
construction would also be desirable for U4 (F p ) for all p rather than U4 (F2 ), but none
has been found until now.
In [GLMS], in the construction of a Galois field extension K/F with Gal(K/F) ≃
U4 (F2 ), a simple criteria was used for an element in F to be a norm from a bicyclic
extension of degree 4 modulo non-zero squares in the base field F. However in [Me],
A. Merkurjev showed that a straightforward generalization of this criteria for p odd
instead of p = 2, is not true in general. Therefore it was not clear whether such an
analogous construction of Galois extensions K/F with Gal(K/F) ≃ U4 (F p ) was possible for p odd.
On the other hand, a new consideration in [HW], [MT1] and [MT2] led us to formulate the Vanishing n-Massey Conjecture, and the most natural way to prove this conjecture for n = 3 in the key non-degenerate case would be through constructing explicit
Galois U4 (F p )-extensions. In fact we pursued both cohomological variants of proving the Vanishing 3-Massey Conjecture and the Galois theoretic construction of Galois
U4 (F p )-extensions.
The story of proving this conjecture and finally constructing Galois U4 (F p )-extensions
over all fields which admit them, is interesting. First M. J. Hopkins and K. G. Wickelgren
in [HW] proved a result which implies that the Vanishing 3-Massey Conjecture with respect to prime 2, is true for all global fields of characteristic not 2. In [MT1] we proved
that the result of [HW] is valid for any field F. At the same time, in [MT1] the Vanishing n-Massey Conjecture was formulated, and applications on the structure of the
quotients of absolute Galois groups were deduced. In [MT3] we proved that the Vanishing 3-Massey Conjecture with respect to any prime p is true for any global field F
containing a primitive p-th root of unity. In [EMa1], I. Efrat and E. Matzri provided
alternative proofs for the above-mentioned results in [MT1] and [MT3]. In [Ma], E.
Matzri proved that for any prime p and for any field F containing a primitive p-th root
of unity, every defined triple Massey product contains 0. This established the Vanishing
3-Massey Conjecture in the form formulated in [MT1]. Shortly after [Ma] appeared on
the arXiv, two new preprints, [EMa2] and [MT5], appeared nearly simultaneously and
independently on the arXiv as well. In [EMa2], I. Efrat and E. Matzri replace [Ma] and
provide a cohomological approach to the proof of the main result in [Ma]. In [MT5] we
also provide a cohomological method of proving the same result. We also extend the
vanishing of triple Massey products to all fields, and thus remove the restriction that
the base field contains a primitive p-th root of unity. We further provide applications on
the structure of some canonical quotients of absolute Galois groups, and also show that
some special higher n-fold Massey products vanish. Finally in this paper we are able to
provide a construction of the Galois U4 (F p )-extension M/F for any field F which admits such an extension. We use this construction to provide a natural new proof, which
4
JÁN MINÁČ AND NGUYỄN DUY TÂN
we were seeking from the beginning of our search for a Galois theoretic proof, of the
vanishing of triple Massey products over all fields.
Some interesting cases of "automatic" realizations of Galois groups are known. These
are cases when the existence of one Galois group over a given field forces the existence
of some other Galois groups over this field. (See for example [Je, MS2, MSS, MZ, Wh].)
However, nontrivial cases of automatic realizations coming from an actual construction
of embedding smaller Galois extensions to larger ones, are relatively rare, and they are
difficult to produce. In our construction we are able, from knowledge of the existence
of two Heisenberg Galois extensions of degree p3 over a given base field F as above, to
find possibly another pair of Heisenberg Galois extensions whose compositum can be
automatically embedded in a Galois U4 (F p )-extension. (See also Remark 3.3.) Observe
that in all proofs of the Vanishing 3-Massey Conjecture we currently have, constructing
Heisenberg Galois extensions of degree p3 has played an important role. For the sake of
a possible inductive proof of the Vanishing n-Massey Conjecture, it seems important to
be able to inductively construct Galois U n (F p )-extensions. This has now been achieved
for the induction step from n = 3 to n = 4, and it opens up a way to approach the
Vanishing 4-Massey Conjecture.
Another motivation for this work which combines well with the motivation described
above, comes from anabelian birational considerations. Very roughly in various generality and precision, it was observed that small canonical quotients of absolute Galois
groups determine surprisingly precise information about base fields, in some cases entire base fields up to isomorphisms. (See [BT1, BT2, CEM, EM1, EM2, MSp, Pop].) But
these results suggest that some small canonical quotients of an absolute Galois group
together with knowledge of the roots of unity in the base field should determine larger
canonical quotients of this absolute Galois group. The Vanishing n-Massey Conjecture
and the Kernel n-Unipotent Conjecture, together with the program of explicit constructions of Galois U n (F p )-extensions, make this project more precise. Thus our main results, Theorems 3.7, 3.9, 4.3 and 5.5, contribute to this project.
A further potentially important application for this work is the theory of Galois pextensions of global fields with restricted ramification and questions surrounding the
Fontaine-Mazur conjecture. (See [Ko], [La], [McL], [Ga],[Se2].) For example in [McL,
Section 3], there is a criterion for infinite Hilbert p-class field towers over quadratic
imaginary number fields relying on the vanishing of certain triple Massey products.
The explicit constructions in this paper should be useful for approaching these classical
number theoretic problems.
Only relatively recently, the investigations of the Galois realizability of some larger
p-groups among families of small p-groups, appeared. (See the very interesting papers
[Mi1], [Mi2], [GS].) In these papers the main concern is understanding cohomological
and Brauer group obstructions for the realizability of Galois field extensions with prescribed Galois groups. In our paper the main concern is the explicit constructions and
their connections with Massey products. In other recent papers [CMS] and [Sch], the
CONSTRUCTION OF UNIPOTENT GALOIS EXTENSIONS AND MASSEY PRODUCTS
5
authors succeeded to treat the cases of characteristic equal to p or not equal to p, nearly
uniformly. This is also the case with our paper.
Our paper is organized as follows. In Section 2 we recall basic notions about norm
residue symbols and Heisenberg extensions of degree p3 . (For convenience we think
of the dihedral group of order 8 as the Heisenberg group of order 8.) In Section 3 we
provide a detailed construction of Galois U4 (F p )-extensions beginning with two "compatible" Heisenberg extensions of degree p3 . Section 3 is divided into two subsections.
In Subsection 3.1 we provide a construction of the required Galois extension M/F over
any field F which contains a primitive p-th root of unity. In Subsection 3.2 we provide
such a construction for all fields of characteristic not p, building on the results and methods in Subsection 3.1. In Example 3.8 we illustrate our method on a surprisingly simple
construction of Galois U4 (F2 )-extensions over any field F with char( F) 6= 2. In Section
4 we provide a required construction for all fields of characteristic p. After the original
and classical papers of E. Artin and O. Schreier [ASch] and E. Witt [Wi], these constructions seem to add new results on the construction of basic Galois extensions M/F with
Galois groups U n (F p ), n = 3 and n = 4. These are aesthetically pleasing constructions
with remarkable simplicity. They follow constructions in characteristic not p, but they
are simpler. See also [JLY, Section 5.6 and Appendix A1] for another procedure to obtain
these Galois extensions. In Section 5 we provide a new natural Galois theoretic proof of
the vanishing of triple Massey products over all fields in the key non-degenerate case.
We also complete the new proof of the vanishing of triple Massey products in the case
when a primitive p-th root of unity is contained in the base field. Finally we formulate a
necessary and sufficient condition for the existence of a Galois U4 (F p )-extension M/F
which contains an elementary p-extension of any field F (described by three linearly
independent characters), and we summarize the main results in Theorem 5.5.
Acknowledgements: We would like to thank M. Ataei, L. Bary-Soroker, S. K. Chebolu,
I. Efrat, H. Ésnault, E. Frenkel, S. Gille, J. Gärtner, P. Guillot, D. Harbater, M. J. Hopkins, Ch. Kapulkin, I. Kříž, J. Labute, T.-Y. Lam, Ch. Maire, E. Matzri, C. McLeman,
D. Neftin, J. Nekovář, R. Parimala, C. Quadrelli, M. Rogelstad, A. Schultz, R. Sujatha,
Ng. Q. Thắng, A. Topaz, K. G. Wickelgren and O. Wittenberg for having been able to
share our enthusiasm for this relatively new subject of Massey products in Galois cohomology, and for their encouragement, support, and inspiring discussions. We are
very grateful to the anonymous referee for his/her careful reading of our paper, and
for providing us with insightful comments and valuable suggestions which we used to
improve our exposition.
Notation: If G is a group and x, y ∈ G, then [ x, y] denotes the commutator xyx −1 y−1 . For
any element σ of finite order n in G, we denote Nσ to be the element 1 + σ + · · · + σn−1
in the integral group ring Z [ G ] of G.
For a field F, we denote Fs (respectively GF ) to be its separable closure (respectively its
absolute Galois group Gal( Fs /F)). We denote F× to be the set of non-zero elements of
6
JÁN MINÁČ AND NGUYỄN DUY TÂN
F. For a given profinite group G, we call a Galois extension E/F, a (Galois) G-extension
if the Galois group Gal(E/F) is isomorphic to G.
For a unital commutative ring R and an integer n ≥ 2, we denote U n ( R) as the group
of all upper-triangular unipotent n × n-matrices with entries in R. For any (continuous)
representation ρ : G → U n ( R) from a (profinite) group G to U n ( R) (equipped with
discrete topology ), and 1 ≤ i < j ≤ n, let ρij : G → R be the composition of ρ with the
projection from U n ( R) to its (i, j)-coordinate.
2. H EISENBERG
EXTENSIONS
The materials in this section have been taken from [MT5, Section 3].
2.1. Norm residue symbols. Let F be a field containing a primitive p-th root of unity ξ.
For any element a in F× , we shall write χ a for the character corresponding to a via the
Kummer map F× → H 1 (GF , Z/pZ )√= Hom(GF , Z/pZ). From now on we assume that
p
a is not in ( F× ) p . The extension F( √
a)/F is√a Galois extension with the Galois group
hσa i ≃ Z/pZ, where σa satisfies σa ( p a) = ξ p a.
The character χ a defines a homomorphism χ a ∈ Hom(GF , 1p Z/Z ) ⊆ Hom(GF , Q/Z )
by the formula
χa =
1
χa .
p
Let b be any element in F× . Then the norm residue symbol may be defined as
(a, b) := (χa , b) := b ∪ δχa .
Here δ is the coboundary homomorphism δ : H 1 (G, Q/Z ) → H 2 (G, Z ) associated to
the short exact sequence of trivial G-modules
0 → Z → Q → Q/Z → 0.
The cup product χ a ∪ χb ∈ H 2 (GF , Z/pZ ) can be interpreted as the norm residue
symbol (a, b). More precisely, we consider the exact sequence
x 7→ x p
0 −→ Z/pZ −→ Fs× −→ Fs× −→ 1,
where Z/pZ has been identified with the group of p-th roots of unity µ p via the choice
of ξ. As H 1 (GF , Fs× ) = 0, we obtain
i
×p
0−→ H 2 (GF , Z/pZ ) −→ H 2 (GF , Fs× ) −→ H 2 (GF , Fs× ).
Then one has i (χ a ∪ χb ) = (a, b) ∈ H 2 (GF , Fs× ). (See [Se1, Chapter XIV, Proposition 5].)
CONSTRUCTION OF UNIPOTENT GALOIS EXTENSIONS AND MASSEY PRODUCTS
7
2.2. Heisenberg extensions. In this subsection we recall some basic facts about Heisenberg extensions. (See [Sha, Chapter 2, Section 2.4] and [JLY, Sections 6.5 and 6.6 ].)
Assume that a,
b are elements in F× , which are linearly independent modulo ( F× ) p .
√
√
p
Let K = F( p a, b). Then
K/F
is a Galois extension whose Galois √
group is√
generated
√
√
√
√
√
√
p
p
p
p
p
p
p
p
by σa and σb . Here σa ( b) = b, σa ( a) = ξ a; σb ( a) = a, σb ( b) = ξ b.
1 x z
2
We consider a map U3 (Z/pZ ) → (Z/pZ ) which sends 0 1 y to ( x, y). Then
0 0 1
we have the following embedding problem
GF
ρ̄
0
/
Z/pZ
/
U3 (Z/pZ )
/
(Z/pZ)2
/
1,
where ρ̄ is the map (χ a , χb ) : GF → Gal(K/F) ≃ (Z/pZ )2 . (The last isomorphism
Gal(K/F) ≃ (Z/pZ )2 is the one which sends σa to (1, 0) and σb to (0, 1).)
Assume that
√ χa ∪ χb = 0. Then the norm residue symbol (a, b) is trivial. Hence there
exists α in F( p a) such that NF ( √
p a ) /F (α ) = b (see [Se1, Chapter XIV, Proposition 4 (iii)]).
We set
p−2
√
p−2
p−1
p−2
A0 = α σa (α
) · · · σa (α) = ∏ σai (α p−i −1 ) ∈ F( p a).
i =0
Lemma 2.1. Let f a be an element in F× . Let A = f a A0 . Then we have
NF ( √
p a ) /F (α )
b
σa ( A)
=
= p.
p
A
α
α
σa ( A)
σa ( A0 )
Proof. Observe that
=
. The lemma then follows from the identity
A
A0
( s − 1)
p−2
∑ ( p − i − 1) s
i =0
i
=
p−1
∑ si − ps0 .
i =0
Proposition 2.2. Assume that χ a ∪ χb = 0. Let f a be an element in F× . Let A = f a A0 be
defined as above. Then the homomorphism ρ̄ := (χ a , χb ) : GF → Z/pZ × Z/pZ lifts to a
Heisenberg extension ρ : GF → U3 (Z/pZ ).
√
p
Sketch of Proof. Let L := K ( A)/F. Then L/F is Galois extension. Let σ̃a ∈ Gal( L/F)
(resp.
σ̃b ∈ Gal
( L/F)) be an extension of σa (resp.
σb ).
Since σb ( A) = A, we have
√
√
√
p √
p
p
p
p
j
σ̃b ( A ) = ξ A, for some j ∈ Z. Hence σ̃b ( A ) = A. This implies that σ̃b is of
order p.
√
p
√
√
√
b
b
p
p
p
p
i
On the other hand, we have σ̃a ( A ) = σa ( A) = A p . Hence σ̃a ( A ) = ξ A
,
α
α
√
p √
p
p
for some i ∈ Z. Then σ̃a ( A ) = A. Thus σ̃a is of order p.
JÁN MINÁČ AND NGUYỄN DUY TÂN
8
√
√
p
p
If we set σA := [σ̃a , σ̃b ], then σA ( A) = ξ −1 A. This implies that σA is of order p.
Also one can check that
[σ̃a , σA ] = [σ̃b , σA ] = 1.
We can define an isomorphism ϕ : Gal( L/F)
1 1 0
1 0
0
1
0
σa 7→
, σb 7→ 0 1
0 0 1
0 0
ϕ
→ U3 (Z/pZ) by letting
0
1 0 1
1 , σA 7→ 0 1 0 .
1
0 0 1
Then the composition ρ : GF → Gal( L/F) → U3 (Z/pZ ) is the desired lifting of ρ̄.
Note that [ L : F] = p3 . Hence there are exactly p extensions of σa ∈ Gal(E/F) to the
automorphisms in Gal( L/F) since [ L : E] = p3 /p2 = p. Therefore for later use, we can
choose an extension,√still denoted by σa ∈ Gal( L/F), of σa ∈ Gal(K/F) in such a way
p
√
√
b
p
p
that σa ( A) = A
.
α
3. T HE
CONSTRUCTION OF
U4 (F p )- EXTENSIONS :
THE CASE OF CHARACTERISTIC
6= p
3.1. Fields containing primitive p-th roots of unity. In this subsection we assume that
F is a field containing a primitive p-th root ξ of unity. The following result can be
deduced from Theorem 5.5, but for the convenience of the reader we include a proof
here.
Proposition 3.1. Assume that there exists a Galois extension M/F such that Gal( M/F) ≃
U4 (F p ). Then there exist a, b, c ∈ F× such that a, b, c are linearly independent modulo ( F× ) p
√
√ √
p
and (a, b) = (b, c) = 0. Moreover M contains F( p a, b, p c).
Proof. Let ρ be the composite ρ : GF ։ Gal( M/F) ≃ U4 (F p ). Then ρ12 , ρ23 and ρ34 are
elements in Hom(GF , F p ). Hence there are a, b and c in F× such that χ a = ρ12 , χb = ρ23
and χc = ρ34 . Since ρ is a group homomorphism, by looking at the coboundaries of ρ13
and ρ24 , we see that
χ a ∪ χ b = χ b ∪ χ c = 0 ∈ H 2 ( G F , F p ).
This implies that (a, b) = (b, c) = 0 by [Se1, Chapter XIV, Proposition 5].
Let ϕ := (χ a , χb , χc ) : GF → (F p )3 . Then ϕ is surjective. By Galois correspondence,
we have
√ √
√
p
Gal( Fs /F( p a, b, p c)) = ker χ a ∩ ker χb ∩ ker χc = ker ϕ.
√
√ √
p
This implies that Gal( F( p a, b, p c)/F) ≃ (F p )3 . Hence by Kummer theory, we see
√ √
√
p
that a, b and c are linearly independent modulo ( F× ) p . Clearly, M contains F( p a, b, p c).
Conversely we shall see in this section that given these necessary conditions for the
existence of U4 (F p )-Galois extensions over F, as in Proposition 3.1, we can construct a
Galois extension M/F with the Galois group isomorphic to U4 (F p ).
CONSTRUCTION OF UNIPOTENT GALOIS EXTENSIONS AND MASSEY PRODUCTS
9
From now on we assume that we are given elements a, b and c in F× such that a, b and
c are linearly independent modulo ( F× ) p and that (a, b) = (b, √
c) = 0. We shall construct
√
√
p
p
a Galois U4 (F p )-extension M/F such that M contains F( a, b, p c).
√ √
√
√ √
√
p
p
First we note that F( p a, b, p c)/F is a Galois extension with Gal( F( p a, b, p c)/F)
generated by σa , σb , σc . Here
√
√
√
√
√
√
p
p
σa ( p a) = ξ p a, σa ( b) = b, σa ( p c) = p c;
√
√
√
√
√
√
p
p
σb ( p a) = p a, σb ( b) = ξ b, σb ( p c) = p c;
√
√
√
√
√
√
p
p
σc ( p a) = p a, σc ( b) = b, σc ( p c) = ξ p c.
√
√
√ √
Let E = F( p a, p c). Since (a, b) = (b, c) = 0, there are α in F( p a) and γ in F( p c)
(see [Se1, Chapter XIV, Proposition 4 (iii)]) such that
√
NF ( √
p a ) /F (α ) = b = NF ( p c) /F (γ ).
Let G be the Galois group Gal(E/F). Then G = h√
σa , σc i, where σa ∈ G (respec√
√
p
p
tively σc ∈√G) is the restriction of σa ∈ Gal( F( a, b, p c )/F) (respectively σc ∈
√ p √
Gal( F( p a, b, p c)/F)).
√
p
Our next goal is to find an element δ in E× such that the Galois closure of E( δ) is
our desired U4 (F p )-extension of F. We define
C0 =
p−2
√
∏ σci (γ p−i−1 ) ∈ F( p a),
i =0
and define B := γ/α. Then we have the following result, which follows from Lemma 2.1
(see [Ma, Proposition 3.2] and/or [MT5, Lemma 4.2]).
Lemma 3.2. We have
σa ( A0 )
(1)
= Nσc ( B).
A0
σc (C0 )
(2)
= Nσa ( B)−1 .
C0
Remark 3.3. We would like to informally explain the meaning of the next lemma. From
our hypothesis (a, b) = 0 = (b, c) and from
Subsection 2.2, we√see that we can obtain
√
√
√ √
√
p
p
p
p
F( b, p c, p C0 ) of F. Here
two Heisenberg extensions L1 = F( a, b,√ A0 ) and L2 = √
we have chosen specific elements A0 ∈ F( p a) and C0 ∈ F( p c). However we may not
be able to embed the compositum of L1 and L2 into our desired Galois extension M/F
with Gal( M/F) ≃ U4 (F p ). We know that we can modify the element A0 by any element
f a ∈ F× and the element C0 by any element f c ∈ F× obtaining elements A = f a A0 and
C = f c C0 instead of A0 and C0 . This new choice of elements may change the √
fields L1
√
p
p
and
L2 but the new fields will still be Heisenberg extensions containing F( a, b) and
√
√
p
F( b, p c) respectively. The next lemma will provide us with a suitable modification
of A0 and C0 . From the proof of Theorem 3.7 we shall see that the compositum of
JÁN MINÁČ AND NGUYỄN DUY TÂN
10
these modified Heisenberg extensions can indeed be embedded into a Galois extension
M/F with Gal( M/F) ≃ U4 (F p ). This explains our comment in the introduction in the
paragraph related to the "automatic realization of Galois groups".
Lemma 3.4. Assume that there exist C1 , C2 ∈ E× such that
B=
σa (C1 ) C2
.
C1 σc (C2 )
Then Nσc (C1 )/A0 and √
Nσa (C2 )/C0 are in F× . Moreover, if we let A = Nσc (C1 ) ∈ F(
and C = Nσa (C2 ) ∈ F( p c)× , then there exists δ ∈ E× such that
σc (δ)
−p
= AC1 ,
δ
σa (δ)
−p
= CC2 .
δ
Proof. By Lemma 3.2, we have
σa ( A0 )
= Nσc ( B) = Nσc
A0
σa (C1 )
C1
Nσc
Nσc (C1 )
= σa
A0
Nσc (C1 )
A0
C2
σc (C2 )
=
σa ( Nσc (C1 ))
.
Nσc (C1 )
This implies that
Hence
.
√
√
Nσc (C1 )
∈ F ( p c )× ∩ F ( p a )× = F × .
A0
By Lemma 3.2, we have
σc (C0 )
= Nσa ( B−1 ) = Nσa
C0
C1
σa (C1 )
Nσa
σc (C2 )
C2
This implies that
Nσa (C2 )
= σc
C0
Hence
Nσa (C2 )
C0
.
√
√
Nσa (C2 )
∈ F ( p a )× ∩ F ( p c )× = F × .
C0
Clearly, one has
−p
Nσa (CC2 ) = 1,
−p
Nσc ( AC1 ) = 1.
=
σc ( Nσa (C2 ))
.
Nσa (C2 )
√
p
a )×
CONSTRUCTION OF UNIPOTENT GALOIS EXTENSIONS AND MASSEY PRODUCTS
11
We also have
−p
σa ( AC1 )
−p
AC1
−p
− p
C2
σa ( A) σa (C1 ) − p C
−p =
A
C1
σc (C) σc (C2 )
σc (CC2 )
p
b γ
= p B− p
α b
= 1.
CC2
Hence, we have
−p
σa ( AC1 )
−p
AC1
=
−p
σc (CC2 )
−p
CC2
.
From [Co, page 756] we see that there exists δ ∈ E× such that
σc (δ)
−p
= AC1 ,
δ
σa (δ)
−p
= CC2 ,
δ
as desired.
Remark 3.5. The result of I. G. Connell which we use in the above proof, is a variant of
Hilbert’s Theorem 90. This result was independently discovered by S. Amitsur and D.
Saltman in [AS, Lemma 2.4]. (See also [DMSS, Theorem 2] for the case p = 2.)
Lemma 3.6. There exists e ∈ E× such that B =
the following statements are true.
σa σc (e)
. Furthermore, for such an element e
e
(1) If we set C1 := σc (e) ∈ E× , C2 := e−1 ∈ E× , then B =
p−2
(2) If we set C1 := e ∈ E× , C2 := (eB)σc (eB) · · · σc
σa (C1 ) C2
.
C1 σc (C2 )
(eB) ∈ E× , then B =
Proof. We have
Nσa σc ( B) =
Nσa (α)
b
Nσa σc (α)
=
= = 1.
Nσa σc (γ)
Nσc (γ)
b
Hence by Hilbert’s Theorem 90, there exists e ∈ E× such that B =
σa σc (e)
.
e
(1) Clearly, we have
σa (C1 ) C2
σa σc (e)
σa (σc (e)) e−1
=
=
= B.
−
1
C1 σc (C2 )
σc (e) σc (e )
e
σa (C1 ) C2
.
C1 σc (C2 )
12
JÁN MINÁČ AND NGUYỄN DUY TÂN
σa σc (e)
p−1
, we see that eB = σa σc (e). Hence σc (eB) = σa (e). Therefore
e
eB
σa (e)
σa (C1 ) C2
.
B=
=
p
−
1
e σc (eB)
C1 σc (C2 )
√
√
√
√
p
p
p
p
Theorem 3.7. Let the notation and assumption be as in
Lemma
3.4.
Let
M
:
=
E
(
δ,
A,
C,
b ).
√
√
√
p
p
p
Then M/F is a Galois extension, M contains F( a, b, c), and Gal( M/F) ≃ U4 (F p ).
(2) From B =
Proof. Let W ∗ be the F p -vector space in E× /(E× ) p generated by [b] E , [ A] E , [C] E and [δ] E .
Here for any 0 6= x in a field L, we denote [ x ] L the image of x in L× /( L× ) p . Since
(1)
σc (δ) = δAC1
−p
(by Lemma 3.4),
(2)
σa (δ) = δCC2
b
σa ( A) = A p
α
b
σc (C) = C p
γ
−p
(by Lemma 3.4),
(3)
(4)
(by Lemma 2.1),
(by Lemma 2.1),
we see that W ∗ is in fact an F p [ G ]-module. Hence M/F is a Galois extension by Kummer theory.
Claim: dimF p (W ∗ ) = 4. Hence [ L : F] = [ L : E][ E : F] = p4 p2 = p6 .
Proof of Claim: From our hypothesis that dimF p h[ a] F , [b] F , [c] F i = 3, we see that h[b] E i ≃
F p.
Clearly, h[b] E i ⊆ (W ∗ )G . From (3) one gets the relation
[σa ( A)] E = [ A] E [b] E .
This implies that [ A] E is not in (W ∗ )G . Hence dimF p h[b] E , [ A] E i = 2.
From (4) one gets the relation
[σc (C)] E = [C] E [b] E .
This implies that [C] E is not in (W ∗ )σc . But we have h[b] E , [ A] E i ⊆ (W ∗ )σc . Hence
dimF p h[b] E , [ A] E , [C] E i = 3.
Observe that the element (σa − 1)(σc − 1) annihilates the F p [ G ]-module h[b] E , [ A] E , [C] E i,
while by (1) and (3) one has
(σa − 1)(σc − 1)[δ] E =
σa ([ A] E )
= [b] E .
[ A] E
Therefore one has
dimF p W ∗ = dimF p h[b] E , [ A] E , [C] E , [δ] E i = 4.
CONSTRUCTION OF UNIPOTENT GALOIS EXTENSIONS AND MASSEY PRODUCTS
13
√
√
√ √ √
√
p
p
p
p
a, A, b) and H b,c = F( p c, p C, b). Let
√
√
√
√
√
√ √ √
p
p
p
p
p
p
N := H a,b H b,c = F( p a, p c, b, A, C ) = E( b, A, C).
Let H a,b = F(
Then N/F is a Galois extension of degree p5 . This is because Gal( N/E) is dual to the
F p [ G ]-submodule h[b] E , [ A] E , [C] E i via Kummer theory, and the proof of the claim above
shows that dimF p h[b] E , [ A] E , [C] E i = 3. We have the following commutative diagram
Gal( N/F)
//
Gal( H a,b /F)
Gal( H b,c /F)
//
Gal( F(
√
p
b)/F).
So we have a homomorphism η from Gal( N/F) to the pull-back Gal( H b,c /F) ×Gal ( F ( √
p
b)/F )
Gal( H a,b /F):
η : Gal( N/F) −→ Gal( H b,c /F) ×Gal( F ( √
p
Gal( H a,b /F),
b)/F )
which make the obvious diagram commute. We claim that η is injective. Indeed, let σ
be an element in ker η. Then σ | H a,b = 1 in Gal( H a,b /F), and σ | H b,c = 1 in Gal( H b,c /F).
Since N is the compositum of H a,b and H b,c , this implies that σ = 1, as desired.
Gal( H a,b /F)| = p5 = |Gal( N/F)|, we see that η
Since |Gal( H b,c /F) ×Gal( F ( √
p
b )/F )
is actually an isomorphism. As in the proof of
Proposition 2.2, we can choose an ex√
√
p
a,b
p
√
tension σa ∈ Gal( H /F) of σa ∈ Gal( F( a, b)/F) (more precisely, of σa | F ( √
p a, p b) ∈
√
√
p
Gal( F( p a, b)/F)) in such a way that
√
p
√
√
b
p
p
σa ( A ) = A
.
α
Since the square commutative diagram above is a pull-back, we can choose an extension
σa ∈ Gal( N/F) of σa ∈ Gal( H a,b /F) in such a way that
σa | H b,c = 1.
Now we can choose any extension σa ∈ Gal( M/F) of σa ∈ Gal( N/F). Then we have
√
p
√
√
b
p
p
σa ( A ) = A
and σa | H b,c = 1.
α
√
√
p
Similarly, we can choose an extension σc ∈ Gal( M/F) of σc ∈ Gal( F( b, p c)/F) in
such a way that
√
p
√
√
b
p
p
σc ( C) = C
, and σc | H a,b = 1.
γ
14
JÁN MINÁČ AND NGUYỄN DUY TÂN
We define σb ∈ Gal( M/E) to be the element which is dual to [b] E via Kummer theory.
In other words, we require that
√
√
p
p
σb ( b) = ξ b,
√ √
√
p
and σb acts trivially on p A, p C and δ. We consider√σb as an element in Gal( M/F),
√ p √
then it is clear that σb is an extension of σb ∈ Gal( F( p a, b, p c )/F). Let W = Gal( M/E),
and let H = Gal( M/F), then we have the following exact sequence
1 → W → H → G → 1.
By Kummer theory, it follows that W is dual to W ∗ , and hence W ≃ (Z/pZ )4 . In
particular, we have | H | = p6 .
Recall that from [BD, Theorem 1], we know that the group U4 (F p ) has a presentation
with generators s1 , s2 , s3 subject to the following relations
p
p
p
s1 = s2 = s3 = 1,
(R)
[s1 , s3 ] = 1,
[s1 , [s1 , s2 ]] = [s2 , [s1 , s2 ]] = 1,
[s2 , [s2 , s3 ]] = [s3 , [s2 , s3 ]] = 1,
[[s1 , s2 ], [s2 , s3 ]] = 1.
Note that |Gal( M/F)| = p6 . So in order to show that Gal( M/F) ≃ U4 (F p ), we shall
show that σa , σb and σc generate Gal( M/F) and that they satisfy these above relations.
Claim: The elements σa , σb and σc generate Gal( M/F).
Proof of Claim: Let K be the maximal p-elementary subextension of M. Note that Gal( M/F)
is a p-group. So in order to show that σa , σb and σc generate Gal( M/F), we only need to
show that (the restrictions of) these elements generate Gal(K/F) by the Burnside basis
theorem. (See e.g. [Ha, Theorem 12.2.1] or
[Ko, Theorem 4.10].) We shall now determine
√
p
p
the field K. By Kummer theory, K = F( ∆), where ∆ = ( F× ∩ M× )/( F× ) p . Let [ f ] F
be any element in ∆, where f ∈ F× ∩ ( M× ) p ⊆ E× ∩ ( M× ) p . By Kummer theory, one
has W ∗ = (E× ∩ ( M× ) p )/(E× ) p . Hence we can write
[ f ] E = [δ]ǫEδ [ A]ǫEA [C]ǫEC [b]ǫEb ,
ǫ
where ǫδ , ǫ A , ǫC , ǫb ∈ Z. By applying (σa − 1)(σc − 1) on [ f ] E we get [1] E = [b] Eδ . (See
the proof of the first claim of this proof.) Thus ǫδ is divisible by p, and one has
[ f ] E = [ A]ǫEA [C]ǫEC [b]ǫEb .
ǫ
By applying σa − 1 on both sides of this equation, we get [1] E = [b] EA . Thus ǫ A is divisible
by p. Similarly, ǫC is also divisible by p. Hence f = bǫb e p for some e ∈ E. Since b and f
are in F, e p is in F× ∩ (E× ) p and [e p ] F is in h[ a] F , [c] F i. Therefore [ f ] F is in h[ a] F , [b] F , [c] F i
and
∆ = h[ a] F , [b] F , [c] F i.
CONSTRUCTION OF UNIPOTENT GALOIS EXTENSIONS AND MASSEY PRODUCTS
15
√
√ √
p
So K = F( p a, b, p c). Then it is clear that σa , σb and σc generate Gal(K/F) and the
claim follows.
Claim: The order of σa is p.
√
p √
p
p
Proof of Claim: As in the proof of Proposition 2.2, we
see
that
σ
(
A
)
=
A.
a
√
√
√
−p
p
p
p
−1
i
Since σa (δ) = δCC2 (equation (2)), one has σa ( δ ) = ξ δ CC2 for some i ∈ Z.
This implies that
√
√
√
p
p
p
σa2 ( δ) = ξ i σa ( δ)σa ( C)σa (C2 )−1
√
√
p
p
= ξ 2i δ( C)2 C2−1 σa (C2 )−1 .
Inductively, we obtain
√
√
p
p √
p
p
σa ( δ) = ξ pi δ( C ) p Nσa (C2 )−1
√
p
= δ(C) Nσa (C2 )−1
√
p
= δ.
p
Therefore, we can conclude that σa = 1, and σa is of order p.
Claim: The order of σb is p.
√
√
√
√
p
p
p
Proof of Claim: This is clear because σb acts trivially on A, p C, δ, E and σb ( b) = ξ b.
Claim: The order of σc is p.
√
p √
p
p
Proof of Claim: As in the proof of Proposition 2.2, we
see
that
σ
(
C
)
=
C.
c
√
√
√
−p
p
p
p
−1
j
Since σc (δ) = δAC1 (equation (1)), one has σc ( δ) = ξ δ AC1 for some j ∈ Z.
This implies that
√
√
√
p
p
p
σc2 ( δ) = ξ j σc ( δ)σc ( A )σc (C1 )−1
√
√
p
p
= ξ 2j δ( A)2 C1−1 σc (C1 )−1 .
Inductively, we obtain
√
√
p
p
p √
p
σc ( δ) = ξ pj δ( A) p Nσc (C1 )−1
√
p
= δ( A) Nσc (C1 )−1
√
p
= δ.
p
Therefore, we can conclude that σc = 1, and σc is of order p.
Claim: [σa , σc ] = 1.
√
√
Proof of Claim: It is enough to check that σa σc ( p δ) = σc σa ( p δ).
JÁN MINÁČ AND NGUYỄN DUY TÂN
16
We have
√
√
√
p
p
p
σa σc ( δ) = σa (ξ j δ AC1−1 )
√
√
p
p
= ξ j σa ( δ)σa ( A)σa (C1 )−1
√
√ pb
√ √
p
j i p
−1 p
= ξ ξ δ CC2
A
σa (C1 )−1
α
√
p
√
√ √
b
p
p
i+ j p
δ C A
=ξ
(σa (C1 )C2 )−1
α
√
p
√
√ √
b (C1 σc (C2 ))−1
p
p
i+ j p
δ C A
=ξ
α
B
√
p
√
√
√
b
p
p
p
= ξ i+ j δ C A
(C1 σc (C2 ))−1 .
γ
On the other hand, we have
√
√
√
p
p
p
σc σa ( δ) = σc (ξ i δ CC2−1 )
√
√
p
p
= ξ i σc ( δ)σc ( C)σc (C2 )−1
√
p
√
√
√
b
p
p
p
i j
−1
σc (C2 )−1
= ξ ξ δ AC1
C
γ
√
p
√ √
√
b
p
p
i+ j p
=ξ
(C1 σc (C2 ))−1 .
δ A C
γ
√
√
Therefore, σa σc ( p δ ) = σc σa ( p δ), as desired.
Claim: [σa , [σa , σb ]] = [σb , [σa , σb ]] = 1.
Proof of Claim: Since G is abelian, it follows that [σa , σb ] is in W. Now both σb and [σa , σb ]
are in W. Hence [σb , [σa , σb ]] = 1 because W is abelian.
Now we show that [σa , [σa , σb ]] = 1. Since the Heisenberg group U3 (F p ) is a nilpotent
group of nilpotent length √
2, we see
that [σa , [σa , σb ]] = 1 on H a,b and H b,c . So it is enough
√
p
p
to check that [σa , [σa , σb ]]( δ) = δ.
From the choice of σb , we see that
√
√
√
p
p
p
σb σa ( δ) = σa ( δ) = σa σb ( δ ).
√
√
√
p
p
Hence, [σa , σb ]( δ) = δ. Since σa and σb act trivially on p C, and σb acts trivially on E,
we see that
√
√
p
p
[σa , σb ]( C ) = C, and [σa , σb ](C2−1 ) = C2−1 .
CONSTRUCTION OF UNIPOTENT GALOIS EXTENSIONS AND MASSEY PRODUCTS
17
We have
√
√
√
p
p
p
[σa , σb ]σa ( δ) = [σa , σb ](ξ i δ CC2−1 )
√
√
p
p
= [σa , σb ](ξ i )[σa , σb ]( δ)[σa , σb ]( C )[σa , σb ](C2−1 )
√
√
p
p
= ξ i δ CC2−1
√
p
= σa ( δ)
√
p
= σa [σa , σb ]( δ).
√
√
p
p
Thus [σa , [σa , σb ]]( δ) = δ, as desired.
Claim: [σb , [σb , σc ]] = [σc , [σb , σc ]] = 1.
Proof of Claim: Since G is abelian, it follows that [σb , σc ] is in W. Now both σb and [σb , σc ]
are in W. Hence [σb , [σb , σc ]] = 1 because W is abelian.
Now we show that [σc , [σb , σc ]] = 1. Since the Heisenberg group U3 (F p ) is a nilpotent
group of nilpotent length √
2, we see
that [σc , [σb , σc ]] = 1 on H a,b and H b,c . So it is enough
√
p
p
to check that [σc , [σb , σc ]]( δ) = δ.
From the choice of σb , we see that
√
√
√
p
p
p
σb σc ( δ) = σc ( δ) = σc σb ( δ).
√
√
√
p
p
p
Hence, [σb , σc ]( δ) = δ. Since σb and σc act trivially on A, and σb acts trivially on E,
we see that
√
√
p
p
[σb , σc ]( A) = A, and [σb , σc ](C1−1 ) = C1−1 .
We have
√
√
√
p
p
p
[σb , σc ]σc ( δ) = [σb , σc ](ξ j δ AC1−1 )
√
√
p
p
= [σb , σc ](ξ j )[σb , σc ]( δ)[σb , σc ]( A)[σb , σc ](C1−1 )
√
√
p
p
= ξ j δ AC1−1
√
p
= σc ( δ )
√
p
= σc [σa , σb ]( δ).
√
√
p
p
Thus [σc , [σb , σc ]]( δ) = δ, as desired.
Claim: [[σa , σb ], [σb , σc ]] = 1.
Proof of Claim: Since G is abelian, [σa , σb ] and [σb , σc ] are in W. Hence [[σa , σb ], [σb , σc ]] = 1
because W is abelian.
An explicit isomorphism ϕ : Gal( M/F) → U4 (F p ) may be defined as
1 0 0 0
1 0 0 0
1 1 0 0
0 1 0 0
, σb 7→ 0 1 1 0 , σc 7→ 0 1 0 0 .
σa 7→
0 0 1 1
0 0 1 0
0 0 1 0
0 0 0 1
0 0 0 1
0 0 0 1
JÁN MINÁČ AND NGUYỄN DUY TÂN
18
Example 3.8. Let the notation and assumption be as in Lemma 3.4. Let us consider the
α
. (Observe that α + γ 6= 0.) In fact,
case p = 2. In Lemma 3.6, we can choose e =
α+γ
one can easily check that
α
γ α
σa σc (
)=
.
α+γ
αα+γ
(1) If we choose C1 = σc (e) and C2 = e−1 as in Lemma 3.6 part (1), then we have
α2 γ
,
(α + γ)(αγ + b)
(α + γ)(αγ + b)
.
C = Nσa (C2 ) = Nσa (e−1 ) =
bα
α+γ
. In fact, we have
In Lemma 3.4, we can choose δ = e−1 =
α
σc (δ)
= σc (e)−1 e = σc (e)−2 eσc (e) = C1−2 Nσc (e) = AC1−2 ,
δ
σa (δ)
= σa (e−1 )e = e−1 σa (e−1 )e2 = Nσa (e−1 )C2−2 = CC2−2 .
δ
Therefore
s
r
r
√ √ √ √
√
α2 γ
(α + γ)(αγ + b)
α+γ
M = F( b, A, C, δ) = F( b,
,
,
)
(α + γ)(αγ + b)
bα
α
r
√
√
α+γ p
= F( b,
, αγ + b, αγ).
α
A = Nσc (C1 ) = Nσc (e) =
(2) If we choose C1 = e =
then we have
α
γ
and C2 = eB =
as in Lemma 3.6 part (2),
α+γ
α+γ
A = Nσc (C1 ) = Nσc (e) =
α2 γ
,
(α + γ)(αγ + b)
γ2 α
C = Nσa (C2 ) = Nσa (eB) =
.
(α + γ)(αγ + b)
In Lemma 3.4, we can choose δ = (α + γ)−1 . In fact, we have
γ(α + γ)
σc (δ)
=
= AC1−2 ,
δ
αγ + b
σa (δ)
α (α + γ)
=
= CC2−2 .
δ
αγ + b
CONSTRUCTION OF UNIPOTENT GALOIS EXTENSIONS AND MASSEY PRODUCTS
19
Therefore
s
s
α2 γ
αγ2 √
,
, α + γ ).
αγ + b
αγ + b
√
√ √ √
Observe also that M is the Galois closure of E( δ) = F( a, c, α + γ ).
√
√ √ √ √
M = F( b, A, C, δ) = F( b,
3.2. Fields of characteristic not p. Let F0 be an arbitrary field of characteristic 6= p. We
fix a primitive p-th root of unity ξ, and let F = F0 (ξ ). Then F/F0 is a cyclic extension
of degree d = [ F : F0 ]. Observe that d divides p − 1. We choose an integer ℓ such
that dℓ ≡ 1 mod p. Let σ0 be a generator of H := Gal( F/F0 ). Then σ0 (ξ ) = ξ e for an
e ∈ Z \ pZ.
Let χ1 , χ2 , χ3 be elements in Hom(GF0 , F p ) = H 1 (GF0 , F p ). We assume that χ1 , χ2 , χ3
are F p -linearly independent and χ1 ∪ χ2 = χ2 ∪ χ3 = 0. By [MT4, Lemma 2.6], the
homomorphism (χ1 , χ2 , χ3 ) : GF0 → (F p )3 is surjective. Let L0 be the fixed field of ( F0 )s
under the kernel of the surjection (χ1 , χ2 , χ3 ) : GF0 → (F p )3 . Then L0 /F0 is Galois
with Gal( L0 /F0 ) ≃ (F p )3 . We shall construct a Galois extension M0 /F0 such that
Gal( M0 /F0 ) ≃ U4 (F p ) and M0 contains L0 .
The restrictions res GF (χ1 ), res GF (χ2 ), res GF (χ3 ) are elements in Hom(GF , F p ). They
are F p -linearly independent and res GF (χ1 ) ∪ res GF (χ2 ) = res GF (χ2 ) ∪ res GF (χ3 ) = 0.
By Kummer theory there exist a, b, c in F× such that res GF (χ1 ) = χ a , res GF (χ2 ) = χb ,
res GF (χ3 ) = χc . Then we have (a, b) = (b, c) = 0 in H 2 (GF , F p ).
√
√ √
p
Let L = L0 (ξ ). Then L = F( p a, b, p c), and L/F is Galois with Gal( L/F) ≃
Gal( L0 /F0 ) ≃ (F p )3 .
Claim 1: L/F0 is Galois with Gal( L/F0 ) ≃ Gal( F/F0 ) × Gal( L/F).
Proof of Claim: Since L0 /F0 and F/F0 are Galois extensions of relatively prime degrees,
the claim follows.
d−1
We define Φ := ℓ[ ∑ ei σ0−i ] ∈ Z [ H ]. The group ring Z [ H ] acts on F in the obvious
i =0
way, and if we let H act trivially on L0 we get an action on L also. Then Φ determines a
map
Φ : L → L, x 7→ Φ( x ).
For convenience, we shall denote x̃ := Φ( x ).
The claim above implies that Φσ = σΦ for every σ ∈ Gal( L/F).
× )p.
Claim 2: We have ã = a modulo ( F× ) p ; b̃ = b modulo ( F× ) p , c̃ = c modulo ( F√
p
Proof of Claim: A similar
argument as√in the proof of Claim 1 shows that F( a)/F0 √
is
√
p
p
p
Galois with Gal( F( a)/F0 ) = Gal( F( a)/F) × Gal ( F/F0 ). Since both groups Gal
√( F( a )/F)
and Gal( F/F0 ) are cyclic and of coprime orders, we see that the extension F( p a)/F0
is cyclic. By Albert’s result (see [Alb, pages 209-211] and [Wat, Section 5]), we have
JÁN MINÁČ AND NGUYỄN DUY TÂN
20
i
i
σ0 a = ae modulo ( F× ) p . Hence for all integers i, σ0i (a) = ae mod ( F× ) p . Thus σ0−i (ae ) =
a mod ( F× ) p . Therefore, we have
#ℓ
#ℓ "
"
ã = Φ(a) =
d−1
i
∏ σ0−i (ae )
i =0
=
d−1
∏a
= adℓ = a mod ( F× ) p .
i =0
Similarly, we have b̃ = b modulo ( F× ) p , c̃ = c modulo ( F× ) p .
σ0 x̃
d
= σ0 ( x ℓ(1−e )/p ) p ∈ L p .
e
x̃
Proof of Claim: This follows from the following identity in the group ring Z [ H ],
Claim 3: For every x ∈ L, we have
d−1
(σ0 − e)( ∑ ei σ0−i ) = σ0 (1 − ed ) ≡ 0 mod p.
i =0
By our construction of Galois U4 (F p )-extensions over fields containing a primitive pth root of unity (see Subsection 3.1), we have α, γ, B, ..., A, C, δ such that if
we √
let M
:=
√
√
√
√
√
p
p
p
p
p
p
L( A, C, δ), then M/F is a Galois U4 (F p )-extension. We set M̃ := L( Ã, C̃, δ̃).
Claim 4: M̃/F is Galois with Gal( M̃/F) ≃ U4 (F p ).
Proof of Claim: Since Φ commutes with every σ ∈ Gal( L/F), this implies that M̃/F
is Galois. This, together with Claim 2, also implies that Gal( M̃/F) ≃ U4 (F p ) because the construction of M̃ over F is obtained in the same way as in the construction
of M, except that we replace the data { a, b, c, α, γ, B, ...} by their "tilde" counterparts
{ã, b̃, c̃, α̃, γ̃, B̃, ...}.
Claim 5: M̃/F0 is Galois with Gal( M̃/F0 ) ≃ Gal( M̃/F) × Gal( F/F0 ).
Proof of Claim: By Claim 3, we see that σ0 x̃ = x̃ e modulo ( L× ) p for every x̃ in the F p vector subspace W̃ ∗ of L× /( L× ) p generated by Ã, C̃, and δ̃. Hence W̃ ∗ is an F p [Gal( L/F0 )]module. Therefore M̃/F0 is Galois by Kummer theory.
We also have the following exact sequence of groups
1 → Gal( M̃/F) → Gal( M̃/F0 ) → Gal( F/F0 ) → 1.
Since |Gal( M̃/F)| and |Gal( F/F0 )| are coprime, the above sequence is split by SchurZassenhaus’s theorem. (See [Za, IV.7,Theorem 25].) The Galois group Gal( M̃/F0 ) is
the semidirect product of Gal( M̃/F) and H = Gal( F/F0 ), with H acting on Gal( M̃/F)
by conjugation. We need to show that this product is in fact direct, i.e., that the action of H on Gal( M̃/F) is trivial. Note that H has an order coprime to p, and H acts
trivially on Gal( L/F) (see Claim 1) which is the quotient of Gal( M̃/F) by its Frattini
subgroup. Then a result of P. Hall (see [Ha, Theorem 12.2.2]) implies that H acts trivially on Gal( M̃/F).
From the discussion above we obtain the following result.
CONSTRUCTION OF UNIPOTENT GALOIS EXTENSIONS AND MASSEY PRODUCTS
21
Theorem 3.9. Let the notation be as above. Let M0 be the fixed field of M̃ under the subgroup
of Gal( M̃/F0 ) which is isomorphic to Gal( F/F0 ). Then M0 /F0 is Galois with Gal( M0 /F0 ) ≃
Gal( M̃/F) ≃ U4 (F p ), and M0 contains L0 .
Proof. Claim 5 above implies that M0 /F0 is Galois with Gal( M0 /F0 ) ≃ Gal( M̃/F) ≃
U4 (F p ). Since H ≃ Gal( M̃/M0 ) acts trivially on L0 , we see that M0 contains L0 .
Let σ1 := σa | M0 , σ2 := σb | M0 and σ3 := σc | M0 . Then σ1 , σ2 and σ3 generate Gal( M0 /F0 ) ≃
U4 ( Fp ). We also have
χ1 (σ1 ) = 1, χ1 (σ2 ) = 0, χ1 (σ3 ) = 0;
χ2 (σ1 ) = 0, χ2 (σ2 ) = 1, χ2 (σ3 ) = 0;
χ3 (σ1 ) = 0, χ3 (σ2 ) = 0, χ3 (σ3 ) = 1.
(Note that for each i = 1, 2, 3, χi is trivial on Gal( M/M0 ), hence χi (σj ) makes sense for
every j = 1, 2, 3.) An explicit isomorphism ϕ : Gal( M0 /F0 ) → U4 (F p ) may be defined
as
1 0 0 0
1 0 0 0
1 1 0 0
0 1 0 0
, σ2 7→ 0 1 1 0 , σ3 7→ 0 1 0 0 .
σ1 7→
0 0 1 1
0 0 1 0
0 0 1 0
0 0 0 1
0 0 0 1
0 0 0 1
4. T HE
CONSTRUCTION OF
U4 (F p )- EXTENSIONS : T HE
CASE OF CHARACTERISTIC
p
In this section we assume that F is of characteristic p > 0. Although by a theorem of
Witt (see [Wi] and [Ko, Chapter 9, Section 9.1]), we know that the Galois group of the
maximal p-extension of F is a free pro-p- group, finding specific constructions of Galois
p-extensions over F can still be challenging. The following construction of an explicit
Galois extension M/F with Galois group U4 (F p ) is an analogue of the construction in
Subsection 3.1 when we assumed that a p-th root of unity is in F. However we find
the details interesting, and therefore for the convenience of the reader, we are including
them here. Observe that even the case of the explicit construction of Heisenberg extensions of degree p3 in characteristic p is of interest. In the case when F has characteristic
not p, the constructions of Heisenberg extensions of degree p3 are now classical, important tools in Galois theory. We did not find any such constructions in the literature in
the case of characteristic p. Nevertheless the construction in Subsection 4.2 seems to be
simple, useful and aesthetically pleasing. What is even more surprising is that the field
construction of Galois U4 (F p )-extensions over a field F of characteristic p in Subsection
4.3 is almost equally simple. We have to check more details to confirm the validity of this
construction, but the construction of the required Galois extension M itself, is remarkably simple. The possibility of choosing generators in such a straightforward manner
(as described in Theorem 4.3) is striking. It is interesting that the main construction in
Section 3 carries over with necessary modifications in the case of characteristic p.
22
JÁN MINÁČ AND NGUYỄN DUY TÂN
4.1. A brief review of Artin-Schreier theory. (For more details and the origin of this
beautiful theory, see [ASch].) Let F be a field of characteristic p > 0. Let ℘(X ) = X p − X
be the Artin-Schreier polynomial. For each a in F of characteristic p, we let θa be a root
of ℘(X ) = a. We also denote [ a] F to be the image of a in F/℘( F). For each subgroup
U of F/℘( F), let FU := F(θu : [u] F ∈ U ). Then the map U 7→ FU is a bijection between
subgroups of F/℘( F) and abelian extensions of F of exponent dividing p. There is a
pairing
Gal( FU /F) × U → F p ,
defined by hσ, ai = σ(θa ) − θa , which is independent of the choice of root θa . ArtinSchreier theory says that this pairing is non-degenerate.
Now assume that F/k is a finite Galois extension. The Galois group Gal( F/k) acts naturally on F/℘( F). As an easy exercise, one can show that such an extension FU , where
U is a subgroup of F/℘( F), is Galois over k if and only if U is actually an F p [Gal( F/k)]module.
4.2. Heisenberg extensions in characteristic p > 0. For each a ∈ F, let χ a ∈ Hom(GF , F p )
be the corresponding element associated with a via Artin-Schreier theory. Explicitly, χ a
is defined by
χ a (σ ) = σ (θ a ) − θ a .
Assume that a, b are elements in F, which are linearly independent modulo ℘( F). Let
K = F(θa , θb ). Then K/F is a Galois extension whose Galois group is generated by σa
and σb . Here σa (θb ) = θb , σa (θa ) = θa + 1; σb (θa ) = θa , σb (θb ) = θb + 1.
We set A = bθa . Then
σa ( A) = A + b, and σb ( A) = A.
Proposition 4.1. Let the notation be as above. Let L = K (θ A ). Then L/F is Galois whose
Galois group is isomorphic to U3 (F p ).
Proof. From σa ( A) − A = b ∈ ℘(K ), and σb ( A) = A, we see that σ( A) − A ∈ ℘(K )
for every σ ∈ Gal(K/F). This implies that the extension L := K (θ A )/F is Galois. Let
σ̃a ∈ Gal( L/F) (resp. σ̃b ∈ Gal( L/F)) be an extension of σa (resp. σb ). Since σb ( A) = A,
p
we have σ̃b (θ A ) = θ A + j, for some j ∈ F p . Hence σ̃b (θ A ) = θ A . This implies that σ̃b is
of order p.
On the other hand, we have
℘(σ̃a (θ A )) = σa ( A) = A + b.
Hence σ̃a (θ A ) = θ A + θb + i, for some i ∈ F p . Then
p
σ̃a (θ A ) = θ A + pθb + pi = θ A .
This implies that σ̃a is also of order p. We have
σ̃a σ̃b (θ A ) = σ̃a ( j + θ A ) = i + j + θ A + θb ,
σ̃b σ̃a (θ A ) = σ̃b (i + θ A + θb ) = i + j + θ A + 1 + θb .
CONSTRUCTION OF UNIPOTENT GALOIS EXTENSIONS AND MASSEY PRODUCTS
23
We set σ̃A := σ̃a σ̃b σ̃a−1 σ̃b−1 . Then
σ̃A (θ A ) = θ A − 1.
This implies that σ̃A is of order p and that Gal( L/F) is generated by σ̃a and σ̃b . We also
have
σ̃a σ̃A = σ̃A σ̃a , and σ̃b σ̃A = σ̃A σ̃b .
We can define an isomorphism ϕ : Gal( L/F)
1 1 0
1
σ̃a 7→ 0 1 0 , σ̃b 7→ 0
0 0 1
0
→ U3 (Z/pZ) by letting
0 0
1 0 1
1 1 , σ̃A 7→ 0 1 0 .
0 1
0 0 1
Note that [ L : F] = p3 . Hence there are exactly p extensions of σa ∈ Gal(K/F) to the
automorphisms in Gal( L/F) since [ L : K ] = p3 /p2 = p. Therefore for later use, we can
choose an extension of σa ∈ Gal(K/F), which we shall denote σa ∈ Gal( L/F) with a
slight abuse of notation, in such a way that σa (θ A ) = θ A + θb .
Remark 4.2. It is interesting to compare our choices of generators A of Heisenberg extensions over given bicyclic extensions in the case of characteristic p and the case when
the base field in fact contains a primitive p-th root of unity. See the proofs of Proposition 2.2 and the proposition above. Although the form of A in Proposition 2.2 is more
complicated than the strikingly simple choice above, the basic principle for the search
of a suitable A is the same in both cases. We
need to guarantee that σa ( A)/A ∈ (K × ) p
√
and σa ( A) − A ∈ ℘(K ) in order that K ( p A) and K (θ A ) are Galois over F. Further,
in order to guarantee that σa and σb will not commute, we want σa ( A)/A = bk p , for
some k ∈ K × , where σb acts trivially on k. Similarly in the characteristic p case we want
σa ( A) − A = b + ℘(k), where σb (k) = k. If char( F) = p, then this is always possible in a
simple way above with k even being 0. (See also [JLY, Appendix A.1, Example], where
the authors discuss a construction of quaternion Q8 -extensions over fields of characteristic 2.) In the case when F contains a primitive p-th root of unity, the search for a
suitable A leads to the norm condition NF ( √
p a ) /F (α ) = b. For some related considerations see [MS1, Section 2].
4.3. Construction of Galois U4 (F p )-extensions. We assume that we are given elements
a, b and c in F such that a, b and c are linearly independent modulo ℘( F). We shall construct a Galois U4 (F p )-extension M/F such that M contains F(θa , θb , θc ).
First we note that F(θa , θb , θc )/F is a Galois extension with Gal( F(θa , θb , θc )/F) generated by σa , σb , σc . Here
σa (θa ) = 1 + θa , σa (θb ) = θb , σa (θc ) = θc ;
σb (θa ) = θa , σb (θb ) = 1 + θb , σb (θc ) = θc ;
σc (θa ) = θa , σc (θb ) = θb , σc (θc ) = 1 + θc .
JÁN MINÁČ AND NGUYỄN DUY TÂN
24
Recall that A = bθa . We set C := bθc . We set δ := ( AC)/b = bθa θc ∈ E := F(θa , θc ).
Then we have
σa (δ) − δ = bσa (θa )σa (θc ) − bθa θc = b[σa (θa ) − θa ]θc = bθc = C,
σc (δ) − δ = bσc (θa )σc (θc ) − bθa θc = bθa [σc (θc ) − θc ] = bθa = A.
Finally set G := Gal(E/F).
Theorem 4.3. Let M := E(θδ , θ A , θC , θb ). Then M/F is a Galois extension, M contains
F(θa , θb , θc ), and Gal( M/F) ≃ U4 (F p ).
Proof. Let W ∗ be the F p -vector space in E/℘(E) generated by [b] E , [ A] E , [C] E and [δ] E .
Since
σc (δ) = δ + A,
σa (δ) = δ + C,
σa ( A) = A + b,
σc (C) = C + b,
we see that W ∗ is in fact an F p [ G ]-module. Hence M/F is a Galois extension by ArtinSchreier theory.
Claim: dimF p (W ∗ ) = 4. Hence [ L : F] = [ L : E][ E : F] = p4 p2 = p6 .
Proof of Claim: From our hypothesis that dimF p h[ a] F , [b] F , [c] F i = 3, we see that h[b] E i ≃
F p.
Clearly, h[b] E i ⊆ (W ∗ )G . From the relation
[σa ( A)] E = [ A] E + [b] E ,
we see that [ A] E is not in (W ∗ )G . Hence dimF p h[b] E , [ A] E i = 2.
From the relation
[σc (C)] E = [C] E + [b] E ,
we see that [C] E is not in (W ∗ )σc . But we have h[b] E , [ A] E i ⊆ (W ∗ )σc . Hence
dimF p h[b] E , [ A] E , [C] E i = 3.
Observe that the element (σa − 1)(σc − 1) annihilates the F p [ G ]-module h[b] E , [ A] E , [C] E i,
while
(σa − 1)(σc − 1)[δ] E = σa ([ A] E ) − [ A] E = [b] E ,
we see that
dimF p W ∗ = dimF p h[b] E , [ A] E , [C] E , [δ] E i = 4.
Let H a,b = F(θa , θ A , θb ) and H b,c = F(θc , θC , θb ). Let
N := H a,b H b,c = F(θa , θc , θb , θ A , θC ) = E(θb , θ A , θC ).
CONSTRUCTION OF UNIPOTENT GALOIS EXTENSIONS AND MASSEY PRODUCTS
25
Then N/F is a Galois extension of degree p5 . This is because Gal( N/E) is dual to the
F p [ G ]-submodule h[b] E , [ A] E , [C] E i via Artin-Schreier theory, and the proof of the claim
above shows that dimF p h[b] E , [ A] E , [C] E i = 3. We have the following commutative diagram
Gal( N/F)
//
Gal( H a,b /F)
Gal( H b,c /F)
//
Gal( F(θb )/F).
So we have a homomorphism η from Gal( N/F) to the pull-back Gal( H b,c /F) ×Gal ( F (θb )/F )
Gal( H a,b /F):
η : Gal( N/F) −→ Gal( H b,c /F) ×Gal( F (θb )/F ) Gal( H a,b /F),
which make the obvious diagram commute. We claim that η is injective. Indeed, let σ
be an element in ker η. Then σ | H a,b = 1 in Gal( H a,b /F), and σ | H b,c = 1 in Gal( H b,c /F).
Since N is the compositum of H a,b and H b,c , this implies that σ = 1, as desired.
Since |Gal( H b,c /F) ×Gal( F (θb )/F ) Gal( H a,b /F)| = p5 = |Gal( N/F)|, we see that η is
actually an isomorphism. As in the proof of Proposition 4.1, we can choose an extension
σa ∈ Gal( H a,b /F) of σa ∈ Gal( F(θa , θb )/F) in such a way that
σa (θ A ) = θ A + θb .
Since the square commutative diagram above is a pull-back, we can choose an extension
σa ∈ Gal( N/F) of σa ∈ Gal( H a,b /F) in such a way that
σa | H b,c = 1.
Now we can choose any extension σa ∈ Gal( M/F) of σa ∈ Gal( N/F). Then we have
σa (θ A ) = θ A + θb and σa | H b,c = 1.
Similarly, we can choose an extension σc ∈ Gal( M/F) of σc ∈ Gal( F(θb , θc )/F) in
such a way that
σc (θC ) = θC + θb , and σc | H a,b = 1.
We define σb ∈ Gal( M/E) to be the element which is dual to [b] E via Artin-Schreier
theory. In other words, we require that
σb (θb ) = 1 + θb ,
and σb acts trivially on θ A , θC and θδ . We consider σb as an element in Gal( M/F), then
it is clear that σb is an extension of σb ∈ Gal( F(θa , θb , θc )/F). Let W = Gal( M/E), and
let H = Gal( M/F), then we have the following exact sequence
1 → W → H → G → 1.
By Artin-Schreier theory, it follows that W is dual to W ∗ , and hence W ≃ (Z/pZ )4 . In
particular, we have | H | = p6 .
JÁN MINÁČ AND NGUYỄN DUY TÂN
26
Recall that from [BD, Theorem 1], we know that the group U4 (F p ) has a presentation with generators s1 , s2 , s3 subject to the relations (R) displayed in the proof of Theorem 3.7. Note that |Gal( M/F)| = p6 . So in order to show that Gal( M/F) ≃ U4 (F p ),
we shall show that σa , σb and σc generate Gal( M/F) and they satisfy these relations (R).
The proofs of the following claims are similar to the proofs of analogous claims in the
proof of Theorem 3.7. Therefore we shall omit them.
Claim:
Claim:
Claim:
Claim:
Claim:
Claim:
Claim:
Claim:
The elements σa , σb and σc generate Gal( M/F).
The order of σa is p.
The order of σb is p.
The order of σc is p.
[σa , σc ] = 1.
[σa , [σa , σb ]] = [σb , [σa , σb ]] = 1.
[σb , [σb , σc ]] = [σc , [σb , σc ]] = 1.
[[σa , σb ], [σb , σc ]] = 1.
An explicit isomorphism ϕ : Gal( M/F) → U4 (F p ) may be defined as
1
0
σa 7→
0
0
1
1
0
0
0
0
1
0
0
0
, σb 7→
0
1
1
0
0
0
0
1
0
0
0
1
1
0
5. T RIPLE M ASSEY
0
0
, σc 7→
0
1
1
0
0
0
0
1
0
0
0
0
1
0
0
0
.
1
1
PRODUCTS
Let G be a profinite group and p a prime number. We consider the finite field F p
as a trivial discrete G-module. Let C • = (C• (G, F p ), ∂, ∪) be the differential graded
algebra of inhomogeneous continuous cochains of G with coefficients in F p (see [NSW,
Ch. I, §2] and [MT1, Section 3]). For each i = 0, 1, 2, . . ., we write H i (G, F p ) for the
corresponding cohomology group. We denote by Z1 (G, F p ) the subgroup of C1 (G, F p )
consisting of all 1-cocycles. Because we use trivial action on the coefficients F p , we have
Z1 (G, F p ) = H 1 (G, F p ) = Hom(G, F p ). Let x, y, z be elements in H 1 (G, F p ). Assume
that
x ∪ y = y ∪ z = 0 ∈ H 2 (G, F p ).
In this case we say that the triple Massey product h x, y, zi is defined. Then there exist
cochains a12 and a23 in C1 (G, F p ) such that
∂a12 = x ∪ y and ∂a23 = y ∪ z,
CONSTRUCTION OF UNIPOTENT GALOIS EXTENSIONS AND MASSEY PRODUCTS
27
in C2 (G, F p ). Then we say that D := { x, y, z, a12 , a23 } is a defining system for the triple
Massey product h x, y, zi. Observe that
∂( x ∪ a23 + a12 ∪ z) = ∂x ∪ a23 − x ∪ ∂a23 + ∂a12 ∪ z − a12 ∪ ∂z
= 0 ∪ a23 − x ∪ (y ∪ z) + ( x ∪ y) ∪ z − a12 ∪ 0
= 0 ∈ C2 (G, F p ).
Therefore x ∪ a23 + a12 ∪ z is a 2-cocycle. We define the value h x, y, ziD of the triple
Massey product h x, y, zi with respect to the defining system D to be the cohomology
class [ x ∪ a23 + a12 ∪ z] in H 2 (G, F p ). The set of all values h x, y, ziD when D runs over
the set of all defining systems, is called the triple Massey product h x, y, zi ⊆ H 2 (G, F p ).
Note that we always have
h x, y, zi = h x, y, ziD + x ∪ H 1 (G, F p ) + H 1 (G, F p ) ∪ z.
We also have the following result.
Lemma 5.1. If the triple Massey products h x, y, zi and h x, y′ , zi are defined, then the triple
Massey product h x, y + y′ , zi is defined, and
h x, y + y′ , zi = h x, y, zi + h x, y′ , zi.
′ , a′ }) be a defining system for h x, y, zi
Proof. Let { x, y, z, a12 , a23 } (respectively { x, y′ , z, a12
23
′ , a + a′ } is a defining system for
(respectively h x, y′ , zi). Then{ x, y + y′ , z, a12 + a12
23
23
′
h x, y + y , zi. We also have
h x, y, zi + h x, y′ , zi =[ x ∪ a23 + a12 ∪ z] + x ∪ H 1 (G, F p ) + H 1 (G, F p ) ∪ z
′
′
+ [ x ∪ a23
+ a12
∪ z] + x ∪ H 1 (G, F p ) + H 1 (G, F p ) ∪ z
′
′
=[ x ∪ (a23 + a23
) + (a12 + a12
) ∪ z] + x ∪ H 1 (G, F p ) + H 1 (G, F p ) ∪ z
as desired.
=h x, y + y′ , zi,
The following lemma is a special case of a well-known fact (see [Fe, Lemma 6.2.4 (ii)])
but for the sake of convenience we provide its proof.
Lemma 5.2. If the triple Massey product h x, y, ziis defined, then for any λ ∈ F p the triple
Massey product h x, λy, zi is defined, and
h x, λy, zi ⊇ λh x, y, zi.
Proof. Let D = { x, y, z, a12 , a23 } be any defining system for h x, y, zi. Clearly D ′ :=
{ x, λy, z, λa12 , λa23 } is a defining system for h x, λy, zi, and
λh x, y, ziD = λ[ x ∪ a23 + a12 ∪ z] = [ x ∪ (λa23 ) + (λa12 ) ∪ z] = h x, λy, ziD′ .
Therefore λh x, y, zi ⊆ h x, λy, zi.
28
JÁN MINÁČ AND NGUYỄN DUY TÂN
A direct consequence of Theorems 3.7, 3.9 and 4.3, is the following result which
roughly says that every "non-degenerate" triple Massey product vanishes whenever it
is defined.
Proposition 5.3. Let F be an arbitrary field. Let χ1 , χ2 , χ3 be elements in Hom(GF , F p ). We
assume that χ1 , χ2 , χ3 are F p -linearly independent. If the triple Massey product hχ1 , χ2 , χ3 i is
defined, then it contains 0.
Proof. Let L be the fixed field of ( F)s under the kernel of the surjection (χ1 , χ2 , χ3 ) : GF →
(F p )3 . Then Theorems 3.7, 3.9 and 4.3 imply that L/F can be embedded in a Galois
U4 (F p )-extension M/F. Moreover there exist σ1 , σ2 , σ3 in Gal( M/F) such that they generate Gal( M/F), and
χ1 (σ1 ) = 1, χ1 (σ2 ) = 0, χ1 (σ3 ) = 0;
χ2 (σ1 ) = 0, χ2 (σ2 ) = 1, χ2 (σ3 ) = 0;
χ3 (σ1 ) = 0, χ3 (σ2 ) = 0, χ3 (σ3 ) = 1.
(Note that for each i = 1, 2, 3, χi is trivial on Gal( M/M0 ), hence χi (σj ) makes sense for
every j = 1, 2, 3.) An explicit isomorphism ϕ : Gal( M/F) → U4 (F p ) can be defined as
1 0 0 0
1 0 0 0
1 1 0 0
0 1 0 0
, σ2 7→ 0 1 1 0 , σ3 7→ 0 1 0 0 .
σ1 7→
0 0 1 1
0 0 1 0
0 0 1 0
0 0 0 1
0 0 0 1
0 0 0 1
ϕ
Let ρ be the composite homomorphism ρ : Gal F → Gal( M/F) ≃ U4 (F p ). Then one can
check that
ρ12 = χ1 , ρ23 = χ2 , ρ34 = χ3 .
(Since all the maps ρ, χ1 , χ2 , χ3 factor through Gal( M/F), it is enough to check these
equalities on elements σ1 , σ2 , σ3 .) This implies that h−χ1 , −χ2 , −χ3 i contains 0 by [Dwy,
Theorem 2.4]. Hence hχ1 , χ2 , χ3 i also contains 0.
For the sake of completeness we include the following proposition, which together
with Proposition 5.3, immediately yields a full new proof for a result which was first
proved by E. Matzri [Ma]. Matzri’s result says that defined triple Massey products vanish over all fields containing a primitive p-th root of unity. Alternative cohomological
proofs for Matzri’s result are in [EMa2] and [MT5]. Our new proof given in this section
of the crucial "non-degenerate" part of this result (see Proposition 5.3), which relies on
explicit constructions of U4 (F p )-extensions, is a very natural proof because of Dwyer’s
result [Dwy, Theorem 2.4]. Observe that in [MT5] we extended this result to all fields.
Proposition 5.4. Assume that dimF p h[ a] F , [b] F , [c] F i ≤ 2. Then if the triple Massey product
hχa , χb , χc i is defined, then it contains 0.
Proof. We can also assume that a, b and c are not in ( F× ) p . The case that p = 2, was
treated in [MT1]. So we shall assume that p > 2.
CONSTRUCTION OF UNIPOTENT GALOIS EXTENSIONS AND MASSEY PRODUCTS
29
Case 1: Assume that a and c are linearly dependent modulo ( F× ) p . This case is considered in [MT5, Proof of Theorem 4.10]. We include a proof here for the convenience of
the reader. Let ϕ = { ϕ ab , ϕbc } be a defining system for hχ a , χb , χc i. We have
resker χ a (hχ a , χb , χc i ϕ ) = res ker χ a (χ a ∪ ϕbc + ϕ ab ∪ χc )
= res ker χa (χa ) ∪ res ker χa ( ϕbc ) + res ker χa ( ϕ ab ) ∪ res ker χa (χc )
= 0 ∪ res ker χa ( ϕbc ) + res ker χa ( ϕ ab ) ∪ 0
= 0.
Then [Se1, Chapter XIV, Proposition 2], hχ a , χb , χc i ϕ = χ a ∪ χ x for some x ∈ F× . This
implies that hχ a , χb , χc i contains 0.
Case 2: Assume that a and c are linearly independent. Then [b] F is in h[ a] F , [c] F i. Hence
there exist λ, µ ∈ F p such that
χb = λχ a + µχc .
Then we have
hχa , χb , χc i = hχa , λχa , χc i + hχa , µχc , χc i ⊇ λhχa , χa , χc i + µhχa , χc , χc i.
(The equality follows from Lemma 5.1 and the inequality follows from Lemma 5.2.) By
[MT5, Theorem 5.9] (see also [MT5, Proof of Theorem 4.10, Case 2]), hχ a , χ a , χc i and
hχa , χc , χc i both contain 0. Hence hχa , χb , χc i also contains 0.
Theorem 5.5. Let p be an arbitrary prime and F any field. Then the following statements are
equivalent.
(1) There exist χ1 , χ2 , χ3 in Hom(GF , F p ) such that they are F p -linearly independent, and
if charF 6= p then χ1 ∪ χ2 = χ2 ∪ χ3 = 0.
(2) There exists a Galois extension M/F such that Gal( M/F) ≃ U4 (F p ).
Moreover, assume that (1) holds, and let L be the fixed field of ( F)s under the kernel of the
surjection (χ1 , χ2 , χ3 ) : GF → (F p )3 . Then in (2) we can construct M/F explicitly such that
L is embedded in M.
If F contains a primitive p-th root of unity, then the two above conditions are also equivalent
to the following condition.
√ √
√
p
(3) There exist a, b, c ∈ F× such that [ F( p a, b, p c) : F] = p3 and (a, b) = (b, c) = 0.
If F of characteristic p, then the two above conditions (1)-(2) are also equivalent to the following
condition.
(3’) There exist a, b, c ∈ F× such that [ F(θa , θb , θc ) : F] = p3 .
Proof. The implication that (1) implies (2), follows from Theorems 3.7, 3.9 and 4.3.
Now assume that (2) holds. Let ρ be the composite ρ : GF ։ Gal( M/F) ≃ U4 (F p ).
Let χ1 := ρ12 , χ2 := ρ23 and χ3 := ρ34 . Then χ1 , χ2 , χ3 are elements in Hom(GF , F p ),
JÁN MINÁČ AND NGUYỄN DUY TÂN
30
and (χ1 , χ2 , χ3 ) : GF → (F p )3 is surjective. This implies that χ1 , χ2 , χ3 are F p -linearly
independent by [MT4, Lemma 2.6].
On the other hand, since ρ is a group homomorphism, we see that
Therefore (1) holds.
χ1 ∪ χ2 = χ2 ∪ χ3 = 0.
Now we assume that F contains a primitive p-th root of unity. Note that for any a, b ∈
F× , χ a ∪ χb = 0, if and only if (a, b) = 0 (see Subsection 2.1). Then (1)
is equivalent to (3)
√
√
√
p
p
by Kummer theory in conjunction with an observation that [ F( a, b, p c) : F] = p3 , if
and only if χ a , χb , χc are F p -linearly independent.
Now we assume that F of characteristic p > 0. Then (1) is equivalent to (3’) by ArtinSchreier theory in conjunction with an observation that [ F(θa , θb , θc ) : F] = p3 , if and
only if χ a , χb , χc are F p -linearly independent.
R EFERENCES
[Alb]
[AS]
[ASch]
[BD]
[BT1]
[BT2]
[Co]
[CEM]
[CMS]
[DGMS]
[DMSS]
[Dwy]
[Ef]
[EMa1]
A. A. Albert, Modern Higher Algebra, University of Chicago Press, Chicago, 1937.
S. A. Amitsur and D. Saltman, Generic abelian crossed products and p-algebras, J. Algebra 51 (1)
(1978), 76-87.
E. Artin and O. Schreier, Eine Kennzeichnung der reell abgeschlossenen K orper, Abh. Math. Sem.
Univ. Hamburg 5 (1927) pp. 225-231. Reprinted in: Artin’s Collected Papers (Eds. S. Lang
and J. Tate), Springer-Verlag, New York, 1965, pp. 289-295.
D. K. Biss and S. Dasgupta, A presentation for the unipotent group over rings with identity, J.
Algebra 237 (2001), 691-707.
F. Bogomolov and Y. Tschinkel, Reconstruction of higher-dimensional function fields, Moscow
Math. Journal 11, no. 2 (2011), 185-204.
F. Bogomolov and Y. Tschinkel, Introduction to birational anabelian geometry, Current developments in algebraic geometry, 17-63, Math. Sci. Res. Inst. Publ., 59, Cambridge Univ. Press,
Cambridge, 2012.
I. G. Connell, Elementary generalizations of Hilbert’s theorem 90, Canad. Math. Bull. 8 (1965),
749-757.
S. K. Chebolu, I. Efrat and J. Mináč, Quotients of absolute Galois groups which determine the entire
Galois cohomology, Math. Ann. 352 (2012), no. 1, 205-221.
S. K. Chebolu, J. Mináč and A. Schultz, Galois p-groups and Galois modules, to appear in Rocky
Mountain J. Math., arXiv:1411.6495.
P. Deligne, P. Griffiths, J. Morgan and D. Sullivan, Real homotopy theory of Kähler manifolds,
Invent. Math. 29 (1975), 245-274.
R. Dwilewicz, J. Mináč, A. Schultz and J. Swallow, Hilbert 90 for biquadratic extensions, American Mathematical Monthly 114 (7) (2007), 577-587.
W. G. Dwyer, Homology, Massey products and maps between groups, J. Pure Appl. Algebra 6
(1975), no. 2, 177-190.
I. Efrat, The Zassenhaus filtration, Massey products, and representations of profinite groups, Adv.
Math. 263 (2014), 389-411.
I. Efrat and E. Matzri, Vanishing of Massey products and Brauer groups, Can. Math. Bull. 58
(2015), 730-740.
CONSTRUCTION OF UNIPOTENT GALOIS EXTENSIONS AND MASSEY PRODUCTS
[EMa2]
[EM1]
[EM2]
[Fe]
[Ga]
[GLMS]
[GS]
[Ha]
[HW]
[Je]
[JLY]
[Ko]
[La]
[M]
[MNg]
[Ma]
[McL]
[Me]
[Mi1]
[Mi2]
[MZ]
[MSp]
[MS1]
[MS2]
[MSS]
[MT1]
31
I. Efrat and E. Matzri, Triple Massey products and absolute Galois groups, to appear in J. Eur.
Math. Soc., arXiv:1412.7265.
I. Efrat and J. Mináč, On the descending central sequence of absolute Galois groups, Amer. J. Math.
133 (2011), no. 6, 1503-1532.
I. Efrat and J. Mináč, Galois groups and cohomological functors, to appear in Trans. Amer. Math.
Soc., DOI:http://dx.doi.org/10.1090/tran/6724, arXiv:1103.1508v1.
R. Fenn, Techniques of Geometric Topology, London Math. Soc. Lect. Notes 57, Cambridge 1983.
J. Gärtner, Higher Massey products in the cohomology of mild pro-p-groups J. Algebra 422 (2015),
788-820.
W. Gao, D. Leep, J. Mináč and T. L. Smith, Galois groups over nonrigid fields, Proceedings of
the International Conference on Valuation Theory and its Applications, Vol. II (Saskatoon,
SK, 1999), 61-77, Fields Inst. Commun., 33, Amer. Math. Soc., Providence, RI, 2003.
H. G. Grundman and T. L. Smith, Galois realizability of groups of order 64, Cent. Eur. J. Math.
8(5) (2010), 846-854.
M. Hall, The Theory of Groups, The Macmillan Company, New York, 1963.
M. Hopkins and K. Wickelgren, Splitting varieties for triple Massey products, J. Pure Appl.
Algebra 219 (2015), 1304-1319.
C. U. Jensen, Finite groups as Galois groups over arbitrary fields, Proceedings of the International
Conference on Algebra, Part 2 (Novosibirsk, 1989) Contemp. Math., vol. 131, Amer. Math.
Soc., Providence, RI, 1992, pp. 435-448.
C. U. Jensen, A. Ledet and N. Yui, Generic Polynomials: Constructive Aspects of the Inverse Galois
Problem, MSRI Publications Volume 45, Cambridge University Press, 2002.
H. Koch, Galois theory of p-extensions, Springer Monographs in Mathematics (2001).
J. Labute, Linking Numbers and the Tame Fontaine-Mazur Conjecture, Ann. Math. Québec (2014),
38: 61-71.
R. Massy, Construction de p-extensions galoisiennes d’un corps de caractéristique différente de p, J.
Algebra 109 (1987), no. 2, 508-535.
R. Massy, and T. Nguyen-Quang-Do, Plongement d’une extension de degré p2 dans une surextension non abélienne de degré p3 : étude locale-globale, J. Reine Angew. Math. 291 (1977), 149-161.
E. Matzri, Triple Massey products in Galois cohomology, preprint (2014), arXiv:1411.4146.
C. McLeman, p-tower groups over quadratic imaginary number fields, Ann. Sci. Math. Québec 32
(2008), no. 2, 199-209.
A. S. Merkurjev, Certain K-cohomology groups of Severi-Brauer varieties, Proc. Symp. Pure Math.
58.2 (1995), 319-331.
I. M. Michailov, Four non-abelian groups of order p4 as Galois groups, J. Algebra 307 (2007),
287-299.
I. M. Michailov, Galois realizability of groups of orders p5 and p6 , Cent. Eur. J. Math. 11(5) (2013),
910-923
I. M. Michailov and N. P. Ziapkov, On realizability of p-groups as Galois groups, Serdica Math.
J. 37 (2011), 173-210.
J. Mináč and M. Spira, Witt rings and Galois groups, Ann. of Math. (2) 144 (1996), no. 1, 35-60.
J. Mináč and J. Swallow, Galois module structure of pth-power classes of extensions of degree p,
Israel J. Math. 138 (2003), 29-42.
J. Mináč and J. Swallow, Galois embedding problems with cyclic quotient of order p, Israel J. Math.
145 (2005), 93-112.
J. Mináč, A. Schultz and J. Swallow, Automatic realizations of Galois groups with cyclic quotient
of order pn , J. Théor. Nombres Bordeaux 20 (2008), no. 2, 419-430.
J. Mináč and N. D. Tân, Triple Massey products and Galois theory, to appear in J. Eur. Math.
Soc., arXiv:1307.6624.
JÁN MINÁČ AND NGUYỄN DUY TÂN
32
[MT2]
[MT3]
[MT4]
[MT5]
[NSW]
[NQD]
[Pop]
[Sch]
[Se1]
[Se2]
[Se3]
[Sha]
[Vi]
[Voe1]
[Voe2]
[Wat]
[Wh]
[Wi]
[Za]
J. Mináč and N. D. Tân, The Kernel Unipotent Conjecture and Massey products on an odd rigid
field (with an appendix by I. Efrat, J. Mináč and N. D. Tân), Adv. Math. 273 (2015), 242-270.
J. Mináč and N. D. Tân, Triple Massey products over global fields, Doc. Math 20 (2015) 1467-1480.
J. Mináč and N. D. Tân, Counting Galois U4 (F p )-extensions using Massey products,
preprint(2014), arXiv:1408.2586.
J. Mináč and N. D. Tân, Triple Massey products vanish over all fields, to appear in J. London
Math. Soc, arXiv:1412.7611.
J. Neukirch, A. Schmidt and K. Wingberg, Cohomology of number fields, Grundlehren der
Mathematischen Wissenschaften [Fundamental Principles of Mathematical Sciences], 323,
Springer-Verlag, Berlin, 2000.
T. Nguyen Quang Do, Étude Kummerienne de la q-suite centrale descendante d’un group de Galois,
Publ. Math. Besançon. Algèbre et théorie des nombres, vol. 2012/2, Presses Univ. FrancheComté, Besançon, 2012, 123-139.
F. Pop, On the birational anabelian program initiated by Bogomolov I, Invent. Math. 187 (2012),
no. 3, 511-533.
A. Schultz, Parameterizing solutions to any Galois embedding problem over Z/pn Z with elementary p-abelian kernel, J. Algebra 411 (2014), 50-91.
J.-P. Serre, Local fields, translated from the French by M. J. Greenberg, Graduate Texts in
Mathematics, 67, Springer-Verlag, New York-Berlin, 1979.
J.-P. Serre, Galois cohomology, translated from the French by P. Ion and revised by the author, corrected reprint of the 1997 English edition, Springer Monographs in Mathematics,
Springer-Verlag, Berlin, 2002.
J.-P. Serre, Topics in Galois Theory, Second edition, Research Notes in Mathematics, vol. 1, A
K Peters Ltd., Wellesley, MA, 2008. With notes by Henri Darmon.
R. Sharifi, Twisted Heisenberg representations and local conductors, Ph.D. thesis, The University
of Chicago (1999).
F. R. Villegas, Relations between quadratic forms and certain Galois extensions, a manuscript, Ohio
State University, 1988, http://www.math.utexas.edu/users/villegas/osu.pdf.
V. Voevodsky, Motivic cohomology with Z/2-coefficients, Publ. Math. Inst. Hautes Études Sci.
No. 98 (2003), 59-104.
V. Voevodsky, On motivic cohomology with Z/l-coefficients, Ann. of Math. (2) 174 (2011), no. 1,
401-438.
W. C. Waterhouse, The normal closures of certain Kummer extensions, Canad. Math. Bull. 37
(1994), no. 1, 133-139.
G. Whaples, Algebraic extensions of arbitrary fields, Duke Math. J. 24 (1957), 201- 204.
E. Witt, Konstruktion von galoisschen Körpern der Charakteristik p zu vorgegebener Gruppe der
Ordnung p f , J. Reine Angew. Math. 174 (1936), 237-245.
H. Zassenhaus, The Theory of Groups, Chelsea Publishing Company, 1949.
D EPARTMENT OF M ATHEMATICS , W ESTERN U NIVERSITY, L ONDON , O NTARIO , C ANADA N6A 5B7
E-mail address: [email protected]
D EPARTMENT OF M ATHEMATICS , W ESTERN U NIVERSITY,
AND I NSTITUTE OF M ATHEMATICS , V IETNAM A CADEMY OF
Q UOC V IET, 10307, H ANOI - V IETNAM
E-mail address: [email protected]
L ONDON , O NTARIO , C ANADA N6A 5B7
S CIENCE AND T ECHNOLOGY, 18 H OANG
| 4math.GR
|
F -SINGULARITIES IN FAMILIES
arXiv:1305.1646v3 [math.AG] 3 Oct 2017
ZSOLT PATAKFALVI, KARL SCHWEDE, AND WENLIANG ZHANG
Abstract. We study the behavior of test ideals and F -singularities in families. In particular, we
obtain generic (and non-generic) restriction theorems for test ideals and non-F -pure ideals, which
imply for example openness of most of the F -singularity classes when the relative canonical sheaf is
Q-Cartier. Additionally, we study the global behavior of certain canonical linear systems (induced
by Frobenius) associated to adjoint line bundles, in families. As a consequence, we obtain some
positivity results for pushforwards of some adjoint line bundles and for certain subsheaves of these.
Contents
1. Introduction
1.1. Organization
1.2. Acknowledgements
2. Notation and setup
2.13. Composing maps
2.16. Base change of ϕ
2.23. Passing to V ∞ and other perfect points
3. Relative non-F-pure ideals
3.11. Iterated non-F -pure ideals versus the absolute non-F -pure ideal
3.25. Application to sharply F -pure singularities and HSL numbers in families
4. Relative test ideals
4.10. Relative test ideals vs absolute test ideals
4.16. Applications to strong F -regularity and divisor pairs
5. Relative test submodules, F -rationality and F -injectivity
5.1. The definition and basic properties of σn (X/V, ωX/V )
5.6. The definition and basic properties of τn (X/V, ωX/V )
5.12. Applications to families of F -injective and F -rational singularities
6. Global applications
6.1. Basic definitions
6.2. Auxiliary definition and stabilization
6.3. Base-change
6.4. Uniform stabilization
6.5. Global generation and semi-positivity
6.6. Relation to global canonical systems
Appendix A. Relative Serre’s condition
References
2
5
5
5
9
11
14
14
19
27
28
32
33
35
35
37
38
39
39
41
45
47
50
52
56
58
2000 Mathematics Subject Classification. 14B05, 13A35, 14D05, 14F18, 13B40.
Key words and phrases. non-F -pure ideal, test ideal, F -pure, strongly F -regular, F -singularities, flat families.
The second author was partially supported by a Fellowship from the Sloan Foundation as well as NSF grant DMS
#1064485, NSF FRG Grant DMS #1265261/1501115 and NSF CAREER Grant DMS #1252860/1501102.
The third author was partially supported by the NSF grants DMS #1068946/#1247354 and #1606414.
The material is based upon work supported by the National Science Foundation under Grant No. 0932078 000,
while the second and third authors were in residence at the Mathematical Science Research Institute (MSRI) in
Berkeley, California, during the spring semester 2013.
1
2
ZSOLT PATAKFALVI, KARL SCHWEDE, AND WENLIANG ZHANG
1. Introduction
In [Kun69] Kunz proved that a scheme over a field of characteristic p > 0 is regular if and only if
the Frobenius (endo)morphism is flat, which initiated the study of singularities using the Frobenius
morphism. Classes of singularities defined via the Frobenius morphism are referred to usually as
F -singularities. Since Kunz’s work, the study of F -singularities has become an active research area,
cf. [HR76, GW77, Fed83, MR85, RR85, Sri91, Smi97, Har98, MS97, HY03, Tak04]. However, the
methods of F -singularities have been widely applied to global geometry over a field of positive
characteristic only recently [Sch11a, Mus11, Hac11, MS12, Zha12, CHMS12, Pat12, HX13, Tan13],
at least outside of special classes of varieties [MR85, BK05]. A large field within global geometry is
moduli theory, which requires understanding how varieties behave in flat families. In this direction,
there have not been any positive results on the behavior of test ideals in families. We fill this gap.
Previously F -rational, Cohen-Macaulay F -injective and (Gorenstein) F -pure singularities have
been studied in such a context [Has01, SZ09, Has10]. Additionally, [MY09, Example 4.7] showed
that the test ideal τ does not satisfy the generic restriction theorem, at least as stated for multiplier
ideals [Laz04b, Theorem 9.5.35]. We develop tools tackling this issue, obtaining generic (and nongeneric) restriction theorems for test ideals, see Theorem A below.
In a flat family f : X −
→ V the absolute Frobenius on X does not restrict to the Frobenius
→
morphism on each fiber. Thus we systematically study the relative Frobenius morphism1 X ′ −
X ×V V ′ where X ′ −
→ X and V ′ −
→ V are the Frobenius morphisms of X and V , respectively. Its
fibers over V are morphisms between thickenings of the fibers of f . However, its fibers over V ′ are
exactly Frobenius morphisms of fibers of f (at least over points with perfect residue field).
We begin by stating our main result in the local setting. We denote by X n and V n the domains
of n-iterated Frobenii of X and V respectively. Let τ and σ denote the test ideal2 [HH94] and
non-sharply-F -pure ideal [FST11, BB11], respectively. These ideals play key roles in the theory of
F -singularities, the test ideal τ being the unique smallest non-zero ideal fixed by p−e -linear maps
and σ being the unique largest. We define relative versions of these two ideals by using the relative
instead of absolute Frobenius. The iterated relative Frobenius targets different spaces X ×V V n ,
and so we actually define a sequence ideals, one on each of these spaces. We explain the setup.
Suppose that f : X −
→ V is a finite-type flat, equidimensional, reduced and S2 and G1 morphism of Noetherian F -finite schemes with V integral. Additionally suppose ∆ is a Q-divisor on X
satisfying suitable conditions which allow it to be restricted to fibers and such that KX/V + ∆ is
Q-Cartier with index not divisible by p > 0 so that (pe −1) KX/V + ∆ is Cartier (see Remark 2.11
for a precise statement). Then for each integer n > 0, divisible by e, we define ideals σn (X/V, ∆)
and τn (X/V, ∆) ⊆ OX×V V n called the relative non F -pure and relative test ideals (respectively).
Our main local theorem is that these ideals restrict to absolute non-F -pure and absolute test
ideals on all of the geometric fibers, and can be used to prove generic restriction theorems for the
usual absolute test ideals on X ×V V n at least if V is regular.
Theorem A. (Corollary 3.10, Theorem 3.23, Corollary 4.8, Corollary 4.15) With notation as above,
there exists an N > 0 such that for every perfect point3 s ∈ V , and every n ≥ N
σne (X/V, ∆) · OXsne = σ(Xs , ∆|Xs )
and
τne (X/V, ∆) · OXsne = τ (Xs , ∆|Xs )
where Xsne is the fiber of X ×V V ne −→ V ne over sne ∈ V ne , which is isomorphic to Xs since k(s)
is perfect. Additionally, both σn and τne map surjectively onto their arbitrary base changes.
1Also called the Radu-André morphism, especially in commutative algebra.
2Technically, we are working with what has recently become known as the big test ideal [Hoc07].
3By definition, a morphism Spec K −
→ V from a perfect field K, see Definition 2.2.
F -SINGULARITIES IN FAMILIES
3
Furthermore, if V is regular and N is sufficiently large, then for all perfect points s ∈ V we have
that the absolute non-F -pure ideal restricts to all of the fibers for n ≥ N
σ(X ×V V ne , ∆ ×V V ne ) · OXsne = σ(Xs , ∆|Xs )
and at least for an open dense set of the base U ⊆ V that the same holds for the absolute test ideal
τ (X ×V V ne , ∆ ×V V ne ) · OXsne = τ (Xs , ∆|Xs )
for all perfect points s ∈ U .
Additionally, we show that over a dense open subset U of V with W = f −1 (U ), τne (X/V, ∆)|W
coincides with the absolute test ideal τ (X ×V V ne , ∆ ×V V ne )|W and likewise σne (X/V, ∆)|W =
σ(X ×V V ne , ∆ ×V V ne )|W in Theorem 4.13 and Theorem 3.14 respectively.
The key method that allows to prove this result
(at least stated for σn ) is that if m > n, then
→ OX×V me ⊇ σme (X/V, ∆) and there is a dense open set
Im σne (X/V, ∆) ⊗OX×V ne OX×V me −
of the base V over which equality holds for all sufficiently large n, this is Proposition 3.3. This
stabilization result should be viewed as a relative version of [HS77, Proposition 1.11], [Lyu97,
Proposition 4.4], and [Gab04, Remark 13.6].
Remark 1.1. If one replaces the divisor ∆ with the language of principal Cartier algebras, then the
previous result still holds without the technical assumptions about divisors from Remark 2.11.
Remark 1.2. There are a number of subtle issues in the statement above that we are suppressing.
In particular, τn (X/V, ∆) depends on the choice of some ideal I contained within the test ideal of
every fiber, and shown to exist in Proposition 4.7.
A particularly important related question is that of deformation of sharply F -pure singularities
in flat families with Q-Cartier relative canonical divisors. This would be important for a positive
characteristic construction of the moduli of stable varieties, also known as the KSBA compactification. In characteristic zero, this is the moduli space given by the log-minimal model program. It
classifies log-canonical models, hence birational equivalence classes of varieties of general type, and
furthermore it contains some nodal varieties for the compactification. There is a conjectural framework of constructing this moduli space [Kol90]. One of the main ingredients in this framework is
to prove that log-canonical singularity deforms in flat families with Q-Cartier relative log-canonical
divisor. An important step in this direction in positive characteristic is the corresponding statement
for sharply F -pure singularities. It is also an important ingredient in an upcoming paper of the
first author where he is planning to address the question of the existence of an algebraic space
structure on the space of sharply F -pure stable varieties. In this paper, we handle the deformation
of F -pure and F -regular singularities. Indeed, openness of F -pure and F -regular singularities is a
direct consequence of Theorem A above.
Theorem B. (Deformation of F -pure and F -regular singularities: Corollary 3.31, Corollary 4.21)
Suppose f : X −→ V and ∆ is as in Theorem A and additionally assume that f is proper. If s ∈ V is
a perfect point and (Xs , ∆|Xs ) is sharply F -pure (respectively, strongly F -regular4) then there exists
an open set U ⊆ V such that for all u ∈ U that (Xu , ∆|Xu ) is also sharply F -pure (respectively,
strongly F -regular).
We also build relative test submodules and non-F -injective submodules of ωX×V V ne /V ne and
prove restriction theorems like Theorem A for them Corollary 5.5 and Corollary 5.10. As a consequence in Theorem 5.16 we reprove a result of M. Hashimoto [Has01], deformation for CohenMacaulay F -injectivity and F -rationality.
Furthermore we apply our setup to global questions. One of the reasons for the recent global
applications of F -singularity theorem is the lifting theorem shown by the second author in [Sch11a,
4In which case, you can even remove the index not divisible by p assumption from K
X/V + ∆, see Corollary 4.22.
4
ZSOLT PATAKFALVI, KARL SCHWEDE, AND WENLIANG ZHANG
Proposition 5.3]. This theorem can be used to replace some of the lifting arguments that use Kodaira
vanishing in characteristic zero. One of the fundamental ideas in [Sch11a] is to try to lift only a big
enough set of sections of adjoint bundles instead of all the sections. This canonical set of sections
for a pair (X, ∆) with (1 − pe )(KX + ∆) Cartier and for a line bundle M is defined as [Sch11a,
Definition 4.1]
\
S 0 X, σ(X, ∆) ⊗ M :=
im H 0 X, F∗me OX ((1 − pme )(KX + ∆)) ⊗ M −
→ H 0 X, M .
m>0
First, we investigate questions about how this canonical space of sections behaves in families:
semicontinuity, stabilization of the intersection, etc.
Theorem C. Let f : X −→ V and ∆ be as in Theorem A, with f projective and V regular. Further,
suppose that M is a line bundle on X such that M − KX/V − ∆ is f -ample (where by M we actually
mean the Cartier divisor corresponding to M ). Then the following statements hold.
(a) [Corollary 6.19, Example 6.22, Example 6.23, Example 6.25], cf. [Har98, Example 5.5], [Tan13,
Theorem 8.3]. The function
(1.2.1)
s 7→ dimk(s) S 0 (Xs , σ(Xs , ∆s ) ⊗ Ms )
is not semicontinuous (here s ∈ V is a perfect point) in either direction, however, there is a
dense open subset U ∈ V , such that the function (1.2.1) is constant on U .
(b) [Theorem 6.18]. There exists n > 0 so that for all integers m ≥ n and perfect points s ∈ V ,
im H 0 (Xs , F∗me OXs ((1 − pme )(KXs + ∆s )) ⊗ Ms ) −→ H 0 (Xs , Ms )
= S 0 (Xs , σ(Xs , ∆s ) ⊗ Ms ).
(c) [Theorem 6.20]. If there is a perfect point s0 ∈ V such that
H 0 (Xs0 , Ms0 ) = S 0 (Xs0 , σ(Xs0 , ∆s0 ) ⊗ Ms0 ),
then there is an open neighborhood U of s0 , such that f∗ M |U is locally free and compatible
with base change and
H 0 (Xs , Ms ) = S 0 (Xs , σ(Xs , ∆s ) ⊗ Ms )
for every perfect point s ∈ U . In particular, the function (1.2.1) is constant for s ∈ U .
We would like to also mention the following natural question left open by Theorem C.
Question 1. Can one remove the f -ampleness assumption from the statements of Theorem C?
By Theorem C, it does make sense to talk about general value of dimk(s) S 0 (Xs , σ(Xs , ∆s ) ⊗ Ms )
in the following theorem.
Theorem D. With assumptions as in Theorem C such that V is projective over a perfect field and
0
(pe − 1)(KX + ∆) is Cartier. Then for every n ≫ 0 there is a subsheaf S∆,ne
f∗ (M ) of (FVne )∗ (f∗ M ),
for which the following holds.
0
f∗ (M ) is the general value of dimk(s) S 0 (Xs , σ(Xs , ∆s ) ⊗
(a) [Corollary 6.19]. The rank of S∆,ne
Ms ).
0
f∗ (M ) is globally generated for
(b) [Proposition 6.26]. If M − KX/V − ∆ is ample, then S∆,ne
every n ≫ 0.
0
(c) [Theorem 6.31]. If M − KX/V − ∆ is nef, then S∆,ne
f∗ (M ) is weakly-positive for n ≫ 0.
l
(d) [Corollary 6.14]. If M = Q ⊗ P where Q is f -ample, then for all l ≫ 0 and nef line bundle
0
P , we have that S∆,ne
f∗ (M ) is contained in (fV ne )∗ (σne (X/V, ∆) ⊗ MV ne ) as subsheaves of
(fV ne )∗ MV ne , and furthermore, these two subsheaves are generically equal.
In fact points (a) and (d) are true without the projectivity assumption on V .
F -SINGULARITIES IN FAMILIES
5
Further, note that if V in Theorem D is a curve, M − KX/V − ∆ is f -ample and nef and there
is a s ∈ V , such that H 0 (Xs , Ms ) = S 0 (Xs , σ(Xs , ∆s )), then points Question 1 and Question 1
of Theorem D with point (1) of Theorem C imply that f∗ OX (M ) is a nef vector bundle. This
strengthens [Pat12, Proposition 3.6], it removes the cohomology vanishing assumption made there.
Of course our statements are considerably stronger. For example with the same assumptions except
replacing H 0 (Xs , Ms ) = S 0 (Xs , σ(Xs , ∆s )) with rk f∗ (σ(X, ∆) ⊗ M ) equals the general value of
S 0 (Xs , σ(Xs , ∆s )), we obtain that f∗ (σ(X, ∆) ⊗ M ) being nef. In fact, the following even stronger
statement can be made.
Theorem E. [Corollary 6.39] With assumptions as in Theorem C such that V is projective over
a prefect field, assume that M − KX/V − ∆ is nef and f -ample and that rk S 0 f∗ (σ(X, ∆) ⊗ M )
equals the general value of H 0 (Xs , σ(Xs , ∆s ) ⊗ Ms ). Then S 0 f∗ (σ(X, ∆) ⊗ M ) is weakly positive.
In particular, if V is a smooth curve then it is a nef vector bundle.
0
Further, we show how S∆,ne
f∗ (M ) relates to the other similar notion S 0 f∗ (σ(X, ∆) ⊗ M ) introduced in [HX13, Definition 2.14]. In particular we obtain that S 0 f∗ (σ(X, ∆) ⊗ M ) does not restrict
to S 0 (Xs , σ(Xs , ∆s ) ⊗ Ms ) in general for general s ∈ S. Intuitively, though S 0 f∗ (σ(X, ∆) ⊗ M ) is
a pushforward, it captures the global geometry of (X, ∆) rather then the geometry of the fibers.
In positive characteristic these two can differ considerably, essentially because the function field of
V is not perfect. Of course the relative and absolute S 0 f∗ are related. We study these similarities
and differences in Section 6.6.
1.1. Organization. In Section 2, we set up notation that we will follow throughout the paper,
explain the interplay between p−e -linear maps and Q-Cartier divisors, and discuss the behaviors of
such maps and divisors under base changes. In Sections 3, 4, and 5, we introduce the relative nonF -pure ideals, the relative test ideals and the relative test submodules, respectively. Applications
to F -singularities in families are discussed in these 3 sections. Section 6 is devoted to the behaviors
of S 0 (introduced in [Sch11a, Definition 4.1]) under base changes. Some semi-positivity results are
also proved in this section. Finally, in the Appendix, we collect some statements that we can not
find proper references for their generality but are needed in our paper.
1.2. Acknowledgements. The authors began working on this project while attending a workshop at the American Institute of Mathematics (AIM) titled “ACC for minimal log discrepancies
and termination of flips”, May 14th – 18th 2012, organized by Tommaso de Fernex and Christopher Hacon. We would like to thank the organizers and the American Institute of Mathematics.
Part of the work was done when the third author visited the Department of Mathematics at
Pennsylvania State University; he would like to thank them for their hospitality. Additionally,
the authors would like to thank Lawrence Ein, Christopher Hacon, János Kollár, Joseph Lipman,
Mircea Mustaţă, and Kevin Tucker for useful discussions. Especially, we would like to thank Brian
Conrad for pointing out compatibility of trace with base change. We would also like to thank
Hiromu Tanaka for comments on a previous draft. Additionally, the authors of the paper would
like to thank Leo Alonso, Damian Rössler, Graham Leuschke and Blup for providing answers
and commentary to the following questions http://mathoverflow.net/questions/120982/ and
http://mathoverflow.net/questions/120625/.
2. Notation and setup
Throughout this paper, all schemes are Noetherian and all maps of schemes are separated. We
fix the following notation, which is in effect for the entire paper. In particular, for simplicity we do
not state it in every statement even though it is assumed.
6
ZSOLT PATAKFALVI, KARL SCHWEDE, AND WENLIANG ZHANG
Notation 2.1. Suppose that f : X −
→ V is a flat, equidimensional and geometrically reduced
map5 of finite type from a scheme X to an excellent integral scheme V of equal characteristic p > 0
with a dualizing complex. We write F e = FVe : V = V e −
→ V as the absolute e-iterated Frobenius
e
on V , form the base change fV e : XV e = X ×V V −
→ V e and define FXe e /V e : X e −
→ XV e to be
the e-iterated relative Frobenius. Furthermore, we often assume that V is F -finite in which case we
q
automatically assume that Frobenius FV : V −
→ V satisfies the following identity6, (FV )! ωV ≃qis
q
ωV . If we say that V is a variety, it is always of finite type over a perfect field k.
Because we will be considering numerous different sheaves on the same topological space X =
X e = X ×V V e = etc., but with respect to different schemes, we will adopt the
followingsomeand
what nonstandard notation. We use these because otherwise writing numerous FXe e /V e
∗
−1
operations, which do nothing to the underlying space, is confusing. We would need
FXe e /V e
notations for projections of the form X e ×V e V e+d −
→ V e+d , X e in as well as more general relative
e
Frobenii F(X
: (X e )V e+d := X e ×V e V e+d −
→ XV e+d , and maps X e ×V e+d+c −
→ X e ×V e+d .
e)
/V e+d
V e+d
By using simply modules, this becomes more transparent.
(1) We will use R to denote OX .
(2) We will use A to denote f −1 OV .
e
(3) We will use A1/p to denote f −1 (FVe )∗ OV . We note that this is not an abuse of notation
since V is integral.
e
(4) We will use R1/p to denote (FXe )∗ R. This is a slight abuse of notation if X is not reduced.
e
(5) We will use RA1/pe to denote R ⊗A A1/p .
d
e+d
d
(6) We will use (RA1/pe )1/p to denote R1/p ⊗A1/pd A1/p . This may be a slight abuse of
notation if XV e is not reduced.
e
(7) Given R-module M , we will use M 1/p to denote F∗e M . This will generally not cause any
confusion because typically M will be locally free or even a line bundle.
(8) We use ωR to denote ωX and ωA to denote f −1 ωV .
(9) Etc.
Some of the main results of the paper concern restriction to fibers. These statements pertain only
to a special set of fibers of f , the fibers over perfect points (see definition below). For example, if
V is a curve over an algebraically closed field, then often we restrict to fibers over all closed points
and the perfect closure of the generic point of V , but not the generic point itself.
Definition 2.2 (Perfect points). A perfect point of V , s ∈ V is a morphism from the spectrum of
a perfect field k(s) to V , s = Spec k(s) −
→ V . It can also be viewed as a choice of a point v ∈ V
and a field extension k(s) = K ⊇ k(v) such that K is perfect. Finally, a neighborhood of a perfect
point s ∈ V is simply a neighborhood of the image v of s.
The fact that f : X −
→ V is of finite type implies that the relative Frobenius is a finite map. In
some cases, this will allow us to avoid assuming that V is F -finite.
Lemma 2.3. With notation as above, since f : X −→ V is of finite type, the relative Frobenius
map f : X e −→ XV e is a finite map.
e
Proof. We work locally on V and X. It is sufficient to show that R1/p is a finite RA1/pe -module.
e
→ S 1/p is a finite map.
Write S = A[x1 , . . . , xn ] and R = S/I. We first observe that SA1/pe −
e
However, xi11 · · · xinn for 0 ≤ ij < pe clearly form a generating set for S 1/p over SA1/pe .
5Meaning X = X × T is reduced for all T −
→ V with T integral.
T
V
6For some discussion of this identity, which always holds for varieties or schemes of essentially finite type over a
local ring with a dualizing complex, see [BSTZ10, Section 2].
F -SINGULARITIES IN FAMILIES
7
e
→ S 1/p with ⊗S (S/I) = ⊗S R. We obtain
Now, tensor the map SA1/pe −
e
e
e
e
→ (S/I) ⊗S S 1/p = (S/I [p ] )1/p −
→ (S/I)1/p
RA1/pe = R ⊗A A1/p = (S/I) ⊗S SA1/pe −
e
where the final map is the canonical surjection of rings. The map is finite since each part is.
We also recall the result of Radu and André.
Theorem 2.4. [Rad92, And93] Suppose that f : X −→ V is a flat map of Noetherian schemes. Then
e
e
f has geometrically regular fibers if and only if the relative Frobenius RA1/pe ∼
= A1/p ⊗A R −→ R1/p
is flat.
We immediately obtain the following corollary which will also be useful.
Corollary 2.5. Suppose that f : X −→ V is as in Notation 2.1 and additionally has geometrically
regular fibers. Then for any RA1/pe -module M , the natural evaluation-at-1 map below surjects
e
H omR
e
A1/p
(R1/p , M ) −→ M
e
Proof. R1/p is a locally free RA1/pe -module, and the result follows.
Now we state the object which we will study for the majority of the paper.
Definition 2.6 (ϕ). From here on, we will fix a line bundle L on X ∼
= X e and we will also fix a
e
1/p
−
→ RA1/pe .
(possibly zero) RA1/pe -linear map ϕ : L
Remark 2.7 (Reflexive sheaves for G1 and S2 Morphisms). Suppose that f : X −
→ V is G1 + S2.
Note that there exists an open set ι : U ֒→ X such that X \ U has codimension ≥ 2 along each
fiber and that f |U is a Gorenstein morphism.
Finally, suppose that M is any rank-1 reflexive R-module which is locally free on a set U as
e
e
above. Then M 1/p is not only reflexive as an R1/p -module, we claim it is also reflexive as an
RA1/pe -module. Since i∗ M |U = M already by Proposition A.7 because M is reflexive, it is sufficient
to replace X by U . Thus ωX/V and M are both locally free as R-modules and ωXV e is locally free
as an RA1/pe -module. We work locally so as to trivialize all these modules. Then
M 1/p
e
∼
=
=
∼
=
∼
=
1/pe
ωX/V
(FXe e /V e )∗ ωX/V
H omOXV e ((FXe e /V e )∗ OX , ωXVe /V e )
e
H omR 1/pe (R1/p , RA1/pe )
A
which is clearly reflexive (the second isomorphism follows from Grothendieck duality for the finite
relative Frobenius map).
Conversely, if M is any R-module which is locally free on a set U and reflexive as an RA1/pe e
module, then it is also reflexive as an R1/p -module. To see this, note that M |U is reflexive as an
R-module, and because M is reflexive as an RA1/pe -module it satisfies i∗ M |U = M .
8
ZSOLT PATAKFALVI, KARL SCHWEDE, AND WENLIANG ZHANG
Definition 2.8 (ϕ versus divisors). Observe the following identifications:
e
H omR 1/pe L1/p , RA1/pe
A
∗∗
e
∼
H omR 1/pe L1/p ⊗R 1/pe (ωR 1/pe /A1/pe ), ωR 1/pe /A1/pe
=
A
A
A
|
{z A
}
This
clearly
holds
on
U
,
note
both
sheaves
are
reflexive
and
use
Corollary
A.8.
∗∗
=
H omOXV e (FXe e /V e )∗ L ⊗ ((FXe e /V e )∗ ωXV e /V e ) , ωXV e /V e
{z
}
|
(2.8.1)
This just rewrites the
previous line using different notation. ∗∗
∼
(FXe e /V e )∗ H omOX e L ⊗ ((FXe e /V e )∗ ωXV e /V e ), ωX e /V e
=
|
{z
}
Grothendieck duality for a finite map
∗∗
−1
∼
(FXe e /V e )∗ L−1 ⊗ ωX e /V e ⊗ (FXe e /V e )∗ ωX
=
e
V e /V
|
{z
}
e
By Remark 2.7 and Corollary A.8 we may take reflexive hull as (FX
e /V e )∗ OX e -modules.
Now, observe that ωX/V is compatible with base change up to reflexification. In particular, if our
→ X as the
base change is the Frobenius FVe : V e −
→ V , then writing πV e : XV e = X ×V V e −
∗
∼
projection, we have ωXV e /V e = (πV e ωX/V )∗∗ since both sheaves are reflexive and they certainly
agree outside the non-relatively Cohen-Macaulay locus (which is of relative codimension at least 2)
by Corollary A.8. In particular
∗∗
∗∗
∗∗
e
∼
= (F e )∗ ωX/V )∗∗ = ω p
(F e e e )∗ ωX e /V e
.
= (F e e e )∗ π ∗ e ωX/V )
X /V
V
X /V
V
X
X/V
Plugging this into (2.8.1) we obtain
e
L1/p , RA1/pe
∗∗
1−pe
∼
= (FXe e /V e )∗ L−1 ⊗ ωX e /V e
H omR
e
A1/p
(2.8.2)
If additionally X is absolutely (instead of relatively) G1 and S2 (for example, if V is regular),
7
ϕ induces a non-zero, effective Weil divisorial sheaf Dϕ such that
then any choice
∗∗
of nondegenerate
e
1−p
−1
∼ L ⊗ω e e
by [Har94]. We would like to generalize this to the case that X −
OX (Dϕ ) =
→V
X /V
is relatively G1 and S2.
Definition 2.9. We say that ϕ is relatively divisorial if ϕ locally generates H omR
e
e
A1/p
e
(L1/p , RA1/pe )
as an R1/p -module at
(a) the generic points of each fiber and
(b) at the generic point of every codimension-1 singular point of every geometric fiber.
In this case, by removing a set of relative codimension 2 so that f is relatively Gorenstein, we
e
e
e
see that ϕ · R1/p ⊆ H omR 1/pe (L1/p , RA1/pe ) is a rank-1 free submodule of an invertible R1/p A
module. To be able to associate a divisor to this submodule in a sensible way, we should show that
it is the trivial (full) submodule at every singular codimension one point. Indeed, let ξ be a singular
codimension 1 point. Then one of the following cases hold.
◦ f (ξ) is a codimension 1 point. In this case, ξ is a general point of the fibers over f (ξ), hence
assumption (a) guarantees that ϕ generates a full submodule at ξ.
◦ f (ξ) is the general point of V . In this case ξ is a codimension 1 point of the fiber over
f (ξ), and it is not in the smooth locus of f . Therefore, assumption (b) shows that again ϕ
generates a full submodule at ξ.
e
Therefore, the submodule ϕ · R1/p determines a Cartier divisor and also an honest Weil divisor on
the original X. We denote this divisor Dϕ as well.
7Nonzero on any irreducible component.
F -SINGULARITIES IN FAMILIES
9
Definition 2.10 (ϕ as a divisor). If ϕ is relatively divisorial, we set ∆ϕ to be the Q-divisor pe1−1 Dϕ .
This makes sense because Dϕ is trivial along the codimension-1 components of the singular locus
of X and so we avoid the pathological issues which occur for Q-divisors on non-normal spaces.
We now explain how to recover ϕ from a Q-divisor.
Remark 2.11 (Obtaining ϕ from divisors). We work under the conventions of Definition 2.10. Untangling Definition 2.8 yields a method to obtain ϕ from a divisor ∆ ≥ 0 (which then coincides
with ∆ϕ ) under the following assumptions:
1
D for some Weil divisor D where p 6 | m.
(a) ∆ = m
(b) D is a Weil divisor on X which is Cartier in relative codimension 1.
(c) Supp D does not contain any general point or any singular codimension one point of any
geometric fiber.
∗∗
1−pe
= L is a line bundle.
⊗ OX ((1 − pe )∆)
(d) (pe − 1)/m ∈ Z and ωX/V
In such a case, the integral divisor (pe − 1)∆ (which is well defined since Supp ∆ does not contain
the codimension-1 components of the non-regular locus of X, cf. [Kc92, Pages 171–173] or [MS12,
Section 2.2]) induces an inclusion
1−pe ∗∗
) .
(FXe e /V e )∗ L ֒→ (FXe e /V e )∗ (ωX/V
This composed with the natural Grothendieck trace map
1−pe ∗∗
)
−
→ OXV e
(FXe e /V e )∗ (ωX/V
yields a map ϕ. It is easy to see that conditions (a)–(d) above guarantee that ϕ is relatively
divisorial. Furthermore, we also have that ∆ = ∆ϕ .
For future reference we make the following definition.
Definition 2.12. In the situation of Notation 2.1, (X, ∆) is a pair, if f is G1 + S2 and ∆ satisfies
the assumptions of Remark 2.11.
e
→ RA1/pe with
2.13. Composing maps. Given ϕ as in Definition 2.8, we can compose ϕ : L1/p −
itself (after twisting) similar to [BS13, Section 4] or [Sch09] and thus obtain new maps
1/p2e
2
(pe +1)
, RA1/p2e
ϕ ∈ HomR 1/p2e
L
A
and more generally
n
ϕ ∈ HomR
ne
A1/p
L
pne −1
pe −1
1/pne
, RA1/pne
!
.
We explain this construction.
Begin by tensoring ϕ by L over R, and then taking 1/pe th roots we obtain:
1/pe
1/pe
2e
e
e
e 1/p2e
e
= L1/p ⊗A1/pe A1/p
−
→ (R ⊗A A1/p ) ⊗R L
(2.13.1)
L1+p
= L1/p ⊗R L
On the other hand, we can also tensor ϕ by A1/p
(2.13.2)
e
2e
L1/p ⊗A1/pe A1/p
e
over A1/p to obtain:
2e
−
→ RA1/p2e
By composing (2.13.1) and (2.13.2) we obtain the desired map ϕ2 . We now define ϕn inductively
(n−1)e 1/p(n−1)e
p
−1
n−1
−
→ RA1/p(n−1)e tensor with L over R and then take
as follows. Given ϕ
: L pe −1
10
ZSOLT PATAKFALVI, KARL SCHWEDE, AND WENLIANG ZHANG
pe th roots which yields
=
L
pne −1
pe −1
L
1/pne
p(n−1)e −1
+p(n−1)e
pe −1
=
L ⊗R L
p(n−1)e −1
pe −1
1/p(n−1)e !1/pe
1/p(n−1)e !1/pe
1/pe
L ⊗R RA1/p(n−1)e
−
→
ne
e
= L1/p ⊗A1/pe A1/p .
We then apply ϕ to the first term in the final tensor product to obtain:
ne 1/pne
p −1
ne
ne ϕ⊗...
e
e
−
→ L1/p ⊗A1/pe A1/p −−−→ R ⊗A A1/p ⊗A1/pe A1/p ∼
L pe −1
= RA1/pne
which we take as the official definition of ϕn . On the other hand, for every 0 < m < n one can look
at the following composition of ϕm and ϕn−m
(2.13.3)
1
! (n−m)e
1
1
1
ne ne
me
ne
me me
p
p
p
p
p −1
p
−1
pne −pme
p
−1
p(n−m)e −1
∼
∼
γ : L pe −1
L pe −1
⊗R L pe −1
= L pe −1 ⊗R L pe −1
=
(ϕm ⊗idL··· )
−−−−−−−→
1
p(n−m)e
1
1
(n−m)e
(n−m)e (n−m)e
p(n−m)e −1
p
−1
1
p
p
me
e
e
∼
R ⊗A A p
⊗R L p −1
⊗
= L p −1
ϕn−m ⊗A··· A···
−−−−−−−−−→
R ⊗A A
1
p(n−m)e
1
⊗
A
1
p(n−m)e
1
A
1
p(n−m)e
A pne
1
A pne ∼
= R ⊗A A pne
In particular, taking m = 1 gives an a priori different map which we could also define as ϕn . We
now explain why this map is actually equal to the official ϕn .
Lemma 2.14. With notation as above, γ = ϕn .
Proof. The statement is local, and so we may suppose that L = R. With the (obscuring) powers of
L removed, ϕn is described as the following composition:
R1/p
ϕ1/p
(n−1)e
ne
(n−1)e
ne
⊗A1/p(n−1)e A1/p
−−−−−−−→ R1/p
(n−2)e
ne
(n−1)e
(n−2)e
ϕ1/p
⊗...
⊗A1/p(n−1)e A1/p
⊗A1/p(n−2)e A1/p
−−−−−−−−−→
R1/p
ϕ1/p
(n−3)e
⊗...
−−−−−−−−−→ · · ·
··· ···
e
ϕ1/p ⊗...
e
−−−−−−→ R1/p ⊗A1/pe . . . ⊗A1/p(n−1)e A1/p
ϕ⊗...
ne
−−−→ R ⊗A . . . ⊗A1/p(n−1)e A1/p .
ne
F -SINGULARITIES IN FAMILIES
11
1
The first m entries in the composition make up (ϕm ⊗ . . .) p(n−m)e in (2.13.3) and the last n − m
n
entries clearly yield ϕn−m ⊗A1/p(n−m)e A1/p as desired. The result is then obvious.
Lemma 2.15. With notation as in Definition 2.8 and additionally that ϕ is relatively divisorial,
then ϕn is relatively divisorial and ∆ϕ = ∆ϕn for every integer n ≥ 1.
Proof. For showing any of the two statements we may remove the non relatively Gorenstein locus.
That is, by possibly further restricting R we may assume that R is relatively Gorenstein over V
and that L is trivial (since our map f : X −
→ V is geometrically G1+S2). Hence by Remark 2.7,
HomR⊗
ie
AA
1/pie
ie
ie
(R1/p , R ⊗A A1/p ) ∼
= R1/p for all i.
From [Kun86, Appendix F], [Sch09, Lemma 3.9], or composition of Grothendieck trace, we have
ne !
e
ne
HomR1/pe ⊗ 1/pe A1/pne R1/p , R1/p ⊗A1/pe A1/p
A
(2.15.1)
ne
e
⊗R1/pe ⊗ 1/pe A1/pne HomR 1/pne R1/p ⊗A1/pe A1/p , RA1/pne
A
A
ne
∼
= HomR 1/pne R1/p , RA1/pne
A
via the homomorphism induced by composition. Let ϑe be the R
HomR⊗A A1/pe (R
1/pe
1/pe
, R ⊗A A
1/pe
-module generator of
)
for each e and let ϑne be defined as ϕn , but ϕ replaced by ϑ. Then by using (2.15.1) iteratively,
ϑne = ϑne up to multiplication by a unit.
e
Further let r ∈ R such that ϕ(−) = ϑe r 1/p · − . Then it is easy to verify that
ne 1/pne !
p −1
n
(2.15.2)
ϕ = ϑie
r pe −1
·
Then we see that if ϕ was generating at a point P ∈ X, or equivalently r is a unit at P , then so is
ϕn . This shows that ϕn is relatively divisorial. Furthermore (2.15.2) shows that ∆ϕi = ∆ϕ .
2.16. Base change of ϕ. Suppose that we are given g : T −
→ V any morphism of schemes such
that T is also excellent, integral and has a dualizing complex. For example, we could set T to be
a closed point of V and let g be the inclusion. Alternately, we could let g be a regular alteration
over some closed subscheme of V . We list the following maps:
(2.16.3)
p1
i
1/p
)
: X ×V T
−
→X
i
i
−
→ Xi
: X ×V i T
(p1
i
qi : X ×V T
−
→ X ×V V i
p1 = q 0 : X × V T
−
→ X.
(the projection).
(the projection for any i).
(base change)
These are pictured below.
1/pi
Xi
×V i
Ti
p1
/ Xi
Fi
(XT )i /T i
Fi
X i /V i
X ×V T i
qi
/ X ×V V i
e
→ RA1/pe = OXV e , we can form (qe )∗ ϕ which we denote by
Notice that given ϕ : L1/p −
1/pe
ϕT : LT
e
∼
→ qe∗ OXV e = OXT e .
= qe∗ L1/p −
12
ZSOLT PATAKFALVI, KARL SCHWEDE, AND WENLIANG ZHANG
e
e
1/p
We explain the isomorphism LT ∼
= qe∗ L1/p briefly. Working locally, let V = Spec A, T = Spec B
and X = Spec R. Then the map ϕT is identified with the map:
e
L1/p ⊗R
e
A1/p
e
e
e
e
e
→ ((R ⊗A A1/p ) ⊗A1/pe B 1/p ) ∼
RB 1/pe ∼
= R ⊗A B 1/p .
= L1/p ⊗A1/pe B 1/p −
The isomorphism in the definition of ϕT is now immediate.
The next lemma shows that base change of ϕ commutes with the self-composition defined in
Section 2.13.
Lemma 2.17. Suppose that g : T −→ V is as above. Then (ϕn )T = (ϕT )n .
Proof. It is sufficient to prove this in the affine case assuming our isomorphism is sufficiently
canonical (which will be clear). We notice that (ϕT )2 is the composition:
e
e
(Lp +1 )1/p
⊗A1/pe
e 1/pe
B 1/p
(ϕT ⊗R
B 1/p
e
LT )1/p
e
e
2e
e
−−−−−−−−−−−−−→ L1/p ⊗A1/pe B 1/p ⊗B 1/pe B 1/p
2e
ϕT ⊗ 1/pe B 1/p
2e
e
e
−−−−B−−−−−−−→
(R ⊗A A1/p ) ⊗A1/pe B 1/p ⊗B 1/pe B 1/p
Now unraveling the definitions we obtain
1/pe
2e
◦ (ϕT ⊗B 1/pe B 1/p )
(ϕT )2 =
ϕT ⊗R 1/pe LT
B
2e
e
e 1/pe
e
◦ (ϕ ⊗A1/pe B 1/p ⊗B 1/pe B 1/p )
=
(ϕ ⊗A1/pe B 1/p ) ⊗R 1/pe (L ⊗A1/pe B 1/p )
B
2e
e 1/pe
◦ (ϕ ⊗A1/pe B 1/p )
=
ϕ ⊗R 1/pe L ⊗A1/pe B 1/p
A
1/pe
2e
2e
2e
◦ (ϕ ⊗A1/pe A1/p ) ⊗A1/p2e B 1/p
=
⊗A1/p2e B 1/p
ϕ ⊗R 1/pe L
A
1/pe
2e
2e
=
◦ (ϕ ⊗A1/pe A1/p ) ⊗A1/p2e B 1/p
ϕ ⊗R 1/pe L
A
= (ϕ2 )T
as desired. The general nth self composition is similar.
Our next goal is to describe how divisors, corresponding to maps ϕ, fare under base change. We
thank Brian Conrad for pointing us in the right direction – [Con00, Theorem 3.61].
Lemma 2.18. Suppose that f : X −→ V is a finite type Cohen-Macaulay morphism over V an
excellent scheme of characteristic p > 0 and that g : T −→ V is as above. Then the Grothendiecktrace map
(FX e /V e )∗ ωX e /V e ∼
= H omOXV e ((FX e /V e )∗ OX e , ωXV e /V e ) −→ ωXV e /V e
is compatible with base change.
Proof. We clearly have a commutative diagram:
qe∗ H omOXV e ((FX e /V e )∗ OX e , ωXV e /V e )
/ q ∗ ωX e /V e
e
V
α
β
H omOXT e ((F(XT )e /T e )∗ O(XT )e , ωXT e /T e )
/ ωω
X
T e /T
e
and by [Con00, Theorem 3.6.1] the map β is an isomorphism. It is sufficient to verify that α
is an isomorphism as well. We work locally on some affine chart on X and hence assume that
XV ⊆ AN
V =: PV embeds as a closed subscheme since f is of finite type. The map α can then be
identified with
Q∗e E xtjOP
Ve
((FX e /V e )∗ OX e , ωPV e /V e ) −
→ E xtjOP e ((F(XT )e /T e )∗ O(XT )e , ωPT e /T e )
T
F -SINGULARITIES IN FAMILIES
13
where Qe : PT e −
→ PV e is the induced map and j = N − dim(X/V ) (we leave off the pushforward
for the inclusion i : XV −
→ PV above). This in turn can be identified with
Q∗e E xtjO(P
e
V)
→ E xtjO(P
(OX e , ω(PV )e /V e ) −
T)
e
(O(XT )e , ω(PT )e /T e )
This last map is exactly the bottom row of [Con00, Diagram (3.6.1) in Theorem 3.6.1], which is an
isomorphism, and hence the proof is complete.
Lemma 2.18 above allows us to show if the divisor Dϕ or ∆ϕ is trivial, then it stays trivial after
base change.
Lemma 2.19 (Divisors which are zero stay zero). Suppose that f : X −→ V is a G1 and S2
e
morphism and that ϕ : L1/p −→ RA1/pe is as above. Additionally suppose that g : T −→ V is any
base change. Finally suppose that the natural map
∗∗
e
e
1−pe
ϕ · R1/p −→ H omR 1/pe L1/p , RA1/pe ∼
= (FXe e /V e )∗ L−1 ⊗ ωX e /V e
A
e
1/pe
e
is an isomorphism of R -modules (here we define ϕ · R1/p to be the R1/p -submodule of the set
e
H omR 1/pe L1/p , RA1/pe generated by ϕ). Then
A
∗∗
e
1/pe
1−pe
−1
e
⊗
ω
L
)
ϕT · (RT )1/p −→ H omR 1/pe LT , RT 1/pe ∼
= (F(X
e
e
∗
T
(XT )e /T e
T ) /T
T
is also an isomorphism.
In particular, if ϕ is relatively divisorial (see Definition 2.9), then the following holds: If Dϕ is
zero, then so is DϕT .
Proof. The statement about divisors is trivial since it is easy to see that a divisor being zero
corresponds to the map above being an isomorphism. Thus we merely need to prove the assertion.
However, since f and all the sheaves involved are relatively S2, it suffices to prove the statement off
a set of relative codimension 2 by Corollary A.8. Therefore, by removing a set of codimension 2, we
can assume that f is a Gorenstein morphism. Thus, working locally if needed, ϕ can be identified
e
→ ωXV e /V e .
(up to multiplication by a unit in R1/p ) with the Grothendieck trace (FXe e /V e )∗ ωX e /V e −
Hence by Lemma 2.18, so can ϕT . The proof is complete.
We now move on to a discussion of base change with respect to divisors. First we observe that
by Lemma 2.19 if ϕ is relatively divisorial, then so is ϕT for every base change g : T −
→V.
Definition 2.20. Suppose that for some relatively divisorial ϕ we have ∆ϕ is as above and that
g :T −
→ V is a base change. Then we write ∆ϕ 8XT (respectively Dϕ 8XT ) to denote the divisor
∆ϕT (respectively DϕT ).
Lemma 2.21 (Pulling back ∆ϕ ). Suppose that f : X −→ V is G1 and S2 and that ϕ is relatively
1/pe
1/pe
divisorial. Then for any g : T −→ V we have ∆ϕ 8XT = (p1 )∗ ∆ϕ (recall p1 : X e ×V i T i −→ Xi
from (2.16.3)).
1/pe
Here, even though ∆ϕ is not necessarily Q-Cartier, (p1 )∗ ∆ϕ can be defined after removing a
set of relative codimension 2 outside of which it is Q-Cartier (since Dϕ is Cartier on such a set).
Proof. The statement is local on X and can be checked after removing a relative codimension
2 set and so we may assume that Dϕ is a Cartier divisor. Thus we assume that L is trivial on
the affine scheme X = Spec R and that f is a Gorenstein morphism. However then shrinking the
e
e
→ RA1/pe can be identified with s1/p · Tr
neighborhood further if necessary, the map ϕ : R1/p −
where Tr : (FXe e /V e ) ∗ ωX e /V e −
→ ωXV e /V e is the Grothendieck trace. The divisor Dϕ is then easily
seen to be the divisor divX (s). On the other hand, it is clear by Lemma 2.18 that then ϕT is trace
1/pe
on XT multiplied by s as well. In particular, it equals (p1 )∗ Dϕ as desired.
14
ZSOLT PATAKFALVI, KARL SCHWEDE, AND WENLIANG ZHANG
Corollary 2.22. Suppose that g : z −→ V is inclusion of a point. Suppose that ϕ is relatively
divisorial and corresponds to ∆ϕ . Then ∆ϕ |Xz = ∆ϕz .
Proof. The divisor ∆ϕz is determined in codimension 1 where ∆ϕ |Xz and ∆ϕz agree.
2.23. Passing to V ∞ and other perfect points. Suppose first that V is the spectrum of a
e
e
→ R since RA1/pe ∼
→ RA1/pe is also a map L1/p −
perfect field A. Then the map L1/p −
= R. In
such a case, we often also typically write the map as ψ to help distinguish how we are thinking
e
→ R can be composed with themselves as in [BS13,
about it. We note that maps such as ψ : L1/p −
Section 4.1] and furthermore this composition ψ n coincides with ϕn . For the rest of the subsection,
we discuss base change to perfect points. We first consider the perfection of the generic point of V .
1/p∞
Set V ∞ to denote the not-necessarily-Noetherian scheme Spec OV
and we set η∞ to be the
generic point of V ∞ with perfect fraction field k(V ∞ ) (note that this is a perfect point). We obtain
a map fk(V ∞ ) : Xk(V ∞ ) = X ×V Spec k(V ∞ ) −
→ Spec k(V ∞ ) now a scheme of finite type over a
perfect field.
As in Section 2.16, the map ϕ then induces a map
∞
e
.
→ Rk(V ∞ ) := R ⊗A k A1/p
ϕ∞ : L1/p ⊗k(V e ) k(V ∞ ) −
which can be identified with
ψ∞ : Lk(V ∞ )
1/pe
−
→ Rk(V ∞ )
since (FXe e /V e )∗ OX e ⊗V e k(V ∞ ) ∼
= F∗e OXk(V ∞ ) .
More generally, if s ∈ V is any perfect point, we can induce
e
e
e
e
ϕs : L1/p
→ R ⊗A k(s)1/p .
:= L1/p ⊗A1/pe k(s)1/p −
s
e
Since k(s) = k(s)1/p is perfect, we can identify this with a p−e -linear map:
e
ψs : L1/p
−
→ Rs .
s
As above, we see that the composition of ψs in the sense of [BS13, Section 4.1] coincides with the
composition ϕ as in Section 2.13. Finally, we study this process with respect to divisors.
Lemma 2.24. With notation as above, ∆ϕ |Xs = ∆ψs where ∆ϕ is as in Definition 2.10 and ∆ψs
is as in [BS13, Section 4.].
Proof. By Lemma 2.21, we simply must show that ∆ϕs coincides with ∆ψs . Working locally, and
e
removing a set of relative codimension 2, we may assume that Φ ∈ HomR 1/pe ((Rs )1/p , Rs1/pe )
e
e
s
generates the Hom as an (Rs )1/p -module and that ϕ( ) = Φ(z 1/p · ). Thus ∆ϕ = pe1−1 divX (z).
We then identify Rs1/pe with Rs and hence ϕ with ψ. Likewise, we can identify Φ with Ψ which
e
e
e
now generates HomRs ((Rs )1/p , Rs ) as an (Rs )1/p -module. Hence ψ( ) = Ψ(z 1/p · ) and so
∆ψ = pe1−1 divX (z) as desired.
3. Relative non-F-pure ideals
With notation as above, by the Hartshorne-Speiser-Lyubeznik-Gabber (HSLG-)Theorem [Gab04,
Lemma 13.1] cf. [HS77, Lyu97, Bli13], we know that the chain
Rk(V ∞ ) ⊇ ψ∞ (Lk(V ∞ ) )1/p
e
e
2
⊇ ψ∞
(Lpk(V+1∞ ) )1/p
eventually stabilizes. Say that it stabilizes at
(3.0.1)
2e
pne −1
e
p −1
1/p
n
⊇ · · · ⊇ ψ∞
(Lk(V
∞))
ne
n ≥ n0 .
For the rest of this section, we fix this integer n0 , and make the following definition.
⊇ ···
F -SINGULARITIES IN FAMILIES
15
Definition 3.1. With notation as above, we define the integer n0 to be the uniform integer for σ
over the generic point of V , and in general, it will be denoted by nσ(ϕ),k(V ) . We notice that for any
point η ∈ V , we can base change Spec k(η) −
→ V and form a corresponding integer nσ(ϕη ),k(η) .
On the other hand, without the passing to k(V ∞ ). We
e
a1 := ϕ1 L1/p
e
2e
a2 := ϕ2 (L(p +1) )1/p
...
pne −1
ne
an := ϕn (L pe −1 )1/p
...
have the images
⊆ RA1/pe ,
⊆ RA1/p2e ,
⊆ RA1/pne ,
These are ideals of different rings. However, we do have the following relation for any i > j
i
→ RA1/pi ⊇ ai .
Im aj ⊗A1/pj A1/p −
This is straightforward so we leave it to the reader to check (note that the image of (2.13.2) contains
e
the image of ϕ2 ). Additionally, observe that if A was regular, A1/p would be flat over A by [Kun69],
i
and so we could identify the tensor product aj ⊗A1/pj A1/p with its image in RA1/pi . Therefore, for
any integer n ≥ i, we set
n
→ RA1/pn
ai,n = Im ai ⊗A1/pi A1/p −
and consider the chain of ideals:
RA1/pne ⊇ a1,n ⊇ a2,n ⊇ · · · ⊇ an−1,n ⊇ an,n .
Definition 3.2 (nth relative non-F -pure ideal). For every integer n ≥ n0 = nσ(ϕ),k(V ) , we define
the nth limiting relative non-F -pure ideal to be an,n = an . It is denoted by σn (X/V, ϕ).
We now obtain a relative version of the Hartshorne-Speiser-Lyubeznik-Gabber theorem.
Proposition 3.3. Fix notation as above. Then there exists a nonempty open subset U ⊆ V of the
base scheme V satisfying the following for every integer m ≥ n ≥ n0
me
.
(3.3.1)
σm (X/V, ϕ)|f −1 (U ) = Im σn (X/V, ϕ) ⊗A1/pne A1/p −→ RA1/pme
−1
f
(U )
Proof. For any m ≥ n, we consider the containment:
an,m ⊇ am,m .
Fix k(V ) to be the residue field of the generic point η ∈ V and consider the induced containment:
m
m
an,m ⊗A k(V ) = an,m ⊗A1/pm k(V )1/p ⊇ am,m ⊗A1/pm k(V )1/p = am,m ⊗A k(V ).
since inverting an element is the same as inverting its pth power. We notice two identifications
pne −1 1/pne !
∞
pe −1
n
Lk(V
an,m ⊗A1/pm k(V )1/p = an,m ⊗A1/pm k(V ∞ ) = ψ∞
,
∞)
!
me 1/pme
am,m ⊗A1/pm k(V )1/p
Thus
∞
p
m
= am,m ⊗A1/pm k(V ∞ ) = ψ∞
∞
an,m ⊗A k(V )1/p = am,m ⊗A k(V )1/p
since m > n ≥ n0 . It immediately follows that
m
∞
−1
.
∞
an,m ⊗A1/pm k(V )1/p = am,m ⊗A1/pm k(V )1/p
m
e
p −1
Lk(V
∞)
m
since k(V )1/p ⊆ k(V )1/p is a faithfully flat extension. But now by generic freeness [Eis95, Theorem 14.4], for a fixed m, (3.3.1) follows for some open set Un,m (in the case that V is affine, which
we can certainly reduce to, we can invert a single element of A to form Un,m ).
16
ZSOLT PATAKFALVI, KARL SCHWEDE, AND WENLIANG ZHANG
We now vary m. Choose U = Un,n+1 that works for m = n + 1 and consider the diagram:
L
p(n+1)e −1
pe −1
L
p(n+2)e −1
pe −1
1
p(n+1)e
1
p(n+2)e
⊗A1/p(n+1)e A1/p
(n+2)e
e
ϕn+2
L
pne −1
pe −1
1
pne
(ϕn+1 )1/p ⊗...
⊗A1/pne A1/p
(n+2)e
e
(ϕn )1/p ⊗...
ϕn+1
···
ϕn
u t
e
L1/p ⊗A1/pe A1/p
(n+2)e
ϕ⊗...
* ))
RA1/p(n+2)e
e
e
where the maps labeled (ϕn )1/p ⊗ . . . and (ϕn+1 )1/p ⊗ . . . are induced as in (2.13.1). We know
e
e
that over U , ϕn+1 and ϕn have the same image. Therefore, so do (ϕn )1/p ⊗ . . . and (ϕn+1 )1/p ⊗ . . .
again over U (since tensor is right exact). But then, composing with (ϕ ⊗ . . .) one more time, we
e
e
know ϕn+1 = (ϕ ⊗ . . .) ◦ ((ϕn )1/p ⊗ . . .) and ϕn+2 = (ϕ ⊗ . . .) ◦ ((ϕn+1 )1/p ⊗ . . .) also have the same
image over U . Thus they also share the image with ϕn over U . Hence, if an,n+1 |U = an+1,n+1 |U ,
then an,n+2 |U = an+2,n+2 |U . We use this iteratedly to obtain that an,m |U = am,m |U , which is exactly
the statement of the proposition.
We give three examples of these σn and Un . In the first example, we show that it is possible that
the images σn (X/V, ϕ) never stabilize in the sense of Proposition 3.3 on all of V but only over an
open set. We do the same in the second example, but with respect to a more interesting choice of
X and ϕ. Finally, we give an example where stabilization occurs at n = 2 (instead of at n = 1).
Example 3.4. Fix k to be an algebraically closed field of characteristic p > 2, set A = k[t] and
set R = k[x, t] with the obvious map X −
→ V . Let ϕ : R1/p = k[x1/p , t1/p ] −
→ RA1/p = k[x, t1/p ]
be the composition of the local generator β ∈ HomR 1/p (R1/p , RA1/p ) with pre-multiplication by
A
1
t p (note since ϕ is k[t1/p ]-linear, this is also post-multiplication by t1/p , and it corresponds to the
1
{t = 0}). It easily follows that the image of ϕ is ht1/p i ⊆ k[x, t1/p ]. By tensoring
divisor ∆ϕ = p−1
2
2
with ⊗k[t1/p ] k[t1/p ], we obtain that a1,2 = ht1/p i = t1/p · k[x, t1/p ]. More generally, we see that
n
a1,b = t1/p · k[x, t1/p ]. Now we compute a2,2 as the image:
2
2
ϕ1/p
2
ϕ⊗...
2
k[x1/p , t1/p ] −−−→ k[x1/p , t1/p ] −−−→ k[x, t1/p ].
2
2
The image of ϕ1/p is t1/p and since the map ϕ ⊗ . . . is k[t1/p ]-linear, we see that the composition
2
2
has image ht1/p · t1/p i = ht(1+p)/p i = a2,2 . In general, we see that
an = an,n = ht(1+p+···+p
n−1 )/pn
i
F -SINGULARITIES IN FAMILIES
17
In particular, while we may take Ui = A1 \ {0} = Spec A \ hti, we see that an = σn (X/V, ϕ) never
stabilizes over all of V .
−
→ V := Spec(k[t]). Let the standard
Example 3.5. Let f be the morphism X := Spec (yk[x,y,t]
2 +x3 +t)
→ OXV 1 , for which ∆ϕ = 0. This map can be identified with the
trace map ϕ : (FX 1 /V 1 )∗ ωX 1 /V 1 −
descent of the following map to the quotient
k[x, y, t]
·(y 2 +x3 +t)p−1
/ k[x, y, t]
where Tr is a k-linear map, such that
( i+1−p j+1−p
p
y p tl
i j l
Tr(x y t ) = x
0
Tr
/ k[x, y, t]
if p|i + 1 and p|j + 1 .
otherwise
Then ϕn is given by
k[x, y, t]
·(y 2 +x3 +t)p
n −1
/ k[x, y, t]
where Trn is a k-linear map, such that
(
i+1−pn
j+1−pn
pn
pn
i j l
x
y
tl
(3.5.1)
Trn (x y t ) =
0
Trn
/ k[x, y, t]
if pn |i + 1 and pn |j + 1 .
otherwise
Assume that p is a prime such that p ≡ 1(mod 6) so that 2, 3|pn − 1 for all n > 0. Let us try to
compute now the following number.
d := min{c|tc ∈ im ϕn }
n
To have tc ∈ im ϕn it is necessary to have a polynomial in the ideal generated by (y 2 +x3 +t)p −1 one
n
n
n
of the non-zero monomials of which is xp −1 y p −1 tc . Therefore, (y 2 + x3 + t)p −1 itself has to have
n
n
n
a non-zero monomial which divides xp −1 y p −1 tc . That is, there have to be integers 0 ≤ a ≤ p 2−1
n
and 0 ≤ b ≤ p 3−1 , such that c = pn − 1 − a − b. So, we see that
d ≥ pn − 1 −
pn − 1 pn − 1
pn − 1
−
=
2
3
6
On the other hand we claim that Trn (y 2 + x3 + t)p
n −1
=t
pn −1
6
pn −1
, which will show that d =
pn −1
3
pn −1
6
pn −1
6
and
t
is the only monomial in
also that σn (X/V, ϕ) does not stabilize. First, note that x 2 y
n −1
2
3
p
the expansion of (y + x + t)
the image of which via Trn is not zero. Indeed, the expansion
n
can contain only monomials of the form y 2a x3b tp −1−a−b , where a, b ≥ 0 are integers. Hence, higher
powers (2pn − 1, 3pn − 1, etc) of x and y that do not go to zero by Trn cannot be obtained. Hence,
pn −1
pn −1
pn −1
as we stated x 2 y 3 t 6 is the only interesting monomial that can show up in the expansion.
Lastly we have to verify that the monomial it has non-zero coefficient in the expansion. That is,
(pn − 1)!
pn −1 pn −1 pn −1 6= 0
2 ! 3 ! 6 !
Equivalently, we have to show that the power of p in the prime factorization of the numerator is
the same as in the denominator. For an arbitrary number m this number for m! is
∞
X
m
.
pi
i=1
18
ZSOLT PATAKFALVI, KARL SCHWEDE, AND WENLIANG ZHANG
Now assume that m =
pn −1
r ,
where r|p − 1. Then the times p divides m! is
n−1
n−1
n−1
∞
X
X
X pn − 1 n−1
X
X p − 1
X
n−1
p
−
1
m
j−i
j
=
p
p
=
=
i
i
i
p
rp
rp
r
i=1
i=1
=
i=1
n−1
n−1
XX
pj−i
i=1 j=i
=
n−1
X
pi
i=0
i=1
j=0
j=0
n−1
n−1
n−1
i=1
i=1
i=1
p − 1 X pn−i − 1 p − 1 X pn−i − 1 X pi − 1
=
=
=
r
p−1
r
r
r
−1
=
r
pn
−1
r
Therefore, we see that p divides pn − 1 times both (pn − 1)! and
pn −1
6
pn −1 pn −1 pn −1
2 ! 3 ! 6 !,
as claimed earlier.
is the smallest power of t that is in σn (X/V, ϕ). Hence there is no stabilization
Summarizing, t
over all of V .
Based on this example, one might ask:
Question 3.6. Is there a relation between the asymptotics of the σn over the non-stable locus, and
the singularities of those fibers (for example, the F -pure threshold)?
We now give an example that stabilizes at the second step (over the entire base).
Example 3.7. (cf. [MY09, Example 4.7]) Fix k to be an algebraically closed field of characteristic
p > 2, set A = k[t] and set R = k[x, t] with the obvious map X −
→ V . Let ϕ : R1/p = k[x1/p , t1/p ] −
→
1/p
1/p
RA1/p = k[x, t ] be the composition of the local generator β ∈ HomR 1/p (R , RA1/p ) with
pre-multiplication by
p2
p−1 {x
=
2
λ1/p }
2
(xp
+ t)
1
p
= f
1
p
A
(which corresponds to ∆ϕ =
on the fiber over t = λ). Note that in RA1/p or
R1/p ,
f
1
p
1
p2
p−1 {x
= t} restricting to
can be written as xp + t1/p .
1
In particular, f p is already an element of RA1/p . Therefore, since ϕ is RA1/p -linear and β is clearly
surjective, the image of ϕ is just hf 1/p i = σ1 (X/V, ϕ) = xp + t1/p .
2
→
On the other hand, we now compose ϕ with itself as described above. In this case, ϕ2 : R1/p −
p+1
2
→ RA1/p2 and pre-multiplying by f p2 . Now,
RA1/p2 is induced by taking the generator β 2 : R1/p −
p+1
p+1
2
. This again is already an element of RA1/p2 , and so by the same argument
f p2 = x1 + t1/p
as above, we see that
E
E 1+p
D
D
2 p+1
2
σ2 (X/V, ϕ) = x + t1/p
= σ1 (X/V, ϕ) · x + t1/p = f p2 .
3
→ RA1/p3 and preNext we form ϕ3 . In this case, it is obtained by taking a generator R1/p −
1+p+p2
p3
1+p+p2
p3
. However, this time f
is not contained in RA1/p3 , and so we cannot
multiplying by f
argue as above. However, f still has a 1/p2 -root in RA1/p3 , and so
1+p+p2
E
E
D
D
1+p
3
3
3
ϕ
f p3
= f p2 ϕ3 f 1/p
.
= ϕ3 f p(1+p) f 1/p
3
3
3
3
→ k[x, t1/p ] we may take as the
So we must only compute ϕ3 (hf 1/p i). Now, ϕ3 : k[x1/p , t1/p ] −
p3 −1
p3
to 1 and other monomials
monomials form a basis for R1/p
map which sends x
Ein x to 0 (those
D
3
3
= k[x, t1/p ] = RA1/p3 . In particular,
over RA1/p3 ). It is thus obvious that ϕ3 f 1/p
1+p
3
σ3 (X/V, ϕ) = f p2 = σ2 (X/V, ϕ) ⊗A1/p2 A1/p .
3
F -SINGULARITIES IN FAMILIES
19
We now obtain a surprising base change statement.
Proposition 3.8. Suppose that T −→ V is a map from an excellent integral scheme with a dualizing
complex, then using the notation of Section 2.16
Im ((qne )∗ σn (X/V, ϕ) → OXT ne ) = σn (X/V, ϕ) · OXT ne = σn (XT /T, ϕT ).
Furthermore, if U satisfies condition (3.3.1) from Proposition 3.3, then
W = g−1 (U ) ⊆ T
satisfies the same condition for σn (XT /T, ϕT ).
Proof. Indeed, images of maps are compatible with arbitrary base change by the right exactness of
tensor. Thus the first statement follows immediately. The second statement follows from the first
since if the two images an,n and an−1,n are equal, they are also equal after base change.
Theorem 3.9 (Base change for σn ). There exists an integer N ≥ 0, such that for all points s ∈ V ,
N ≥ nσ(ϕs ),k(s) . In other words, we have both that σn (X/V, ϕ)·OXsne = σn (Xs /s, ϕs ) (which always
holds) and also that for all m ≥ n ≥ N that
m
σn (X/V, ϕ) ⊗V n k(s)1/p = σm (Xs /s, ϕs ).
Proof. Of course, the statement already holds on U with respect to some integer N0 . Set V1′ := V \U
to be the complement with reduced scheme structure and let
i1 : V1 = (V1′ )reg ֒→ V1′
be the regular locus. We notice that V1 has dimension strictly smaller than dim V . We consider the
base change XV1 −
→ V1 . Each fiber of XV1 −
→ V1 is isomorphic to a fiber of X −
→ V . Then choose
an open set U1 ⊆ V1 for which the statement holds for some integer N1 .
Now fix V2′ = V1′ \ U1 and i2 : V2 = (V2′ )reg ֒→ V2′ to be the regular locus and repeat. This process
terminates by Noetherian induction.
Setting N = max{N0 , N1 , N2 , . . . } completes the proof.
Suppose now that s ∈ V is a perfect point, see Definition 2.2. It follows that Xs /s is a variety
1/pe
over a perfect field and so since se ∼
ϕs : Ls
−
→ Rs e
= s, we have Xse ∼
= Xs . Thus we can identify
T
with a p−e -linear map ψs as in Section 2.23. Thus under these identifications n≥0 σn (Xs /s, ϕ) =
me
σ(Xs , ψs ). However, if we have the stabilization σn (Xs /s, ϕ) ∼
=
= σn (Xs /s, ϕ) ⊗k(s)1/pne k(s)1/p ∼
σm (Xs /s, ϕ) for every m ≥ n, the equality σn (Xs /s, ϕ) = σ(Xs , ψ) holds. Combining this with our
previous work we obtain the following corollary.
Corollary 3.10. With notation as above, there exists an integer N ≥ 0 such that
σn (X/V, ϕ) · OXsne = σ(Xs , ψs )
for all perfect points s ∈ V and n ≥ N .
3.11. Iterated non-F -pure ideals versus the absolute non-F -pure ideal. We now compare
the iterated non-F -pure ideal with the absolute non-F -pure ideal. First however, we make the
following assumption.
Convention 3.12. In this subsection, Section 3.11, we always assume that our base V is an F -pure
quasi-Gorenstein (i.e., ωV is a line bundle) F -finite integral scheme.
→ OV be a map generating H omV (F∗e OV ((1 − pe )KV ), OV ) as
Let ΨeV : F∗e OV ((1 − pe )KV ) −
ne
e
an F∗ OV -module. By taking p th roots, applying f −1 , and then writing the A-module M :=
f −1 (OV ((1 − pe )KV )), we obtain:
(ΦeA )1/p
ne
: M 1/p
(n+1)e
(n+1)e
= f −1 F∗
ne
(OV ((1 − pe )KV )) −
→ f −1 F∗ne OV = A1/p .
20
ZSOLT PATAKFALVI, KARL SCHWEDE, AND WENLIANG ZHANG
e
We tensor with L1/p ⊗A1/pe
and so obtain:
e
Φ′ : L1/p ⊗A1/pe M 1/p
(3.12.1)
(n+1)e
ne
e
−
→ L1/p ⊗A1/pe A1/p .
ne
Set N = L ⊗A M 1/p . We observe that N is a line bundle on XV ne . In fact, if q1 : XV ne =
X ×V V ne −
→ X is the first projection and q2 : XV ne −
→ V ne is the second projection, then
N = q1∗ L ⊗OXV ne q2∗ OV ne ((1 − pe )KV ne )
and so it follows for any integer l > 0 that
1/pne
∗ l
∗
e
l
∼
ne
ne
N = q1 L ⊗OXV ne q2 OV (l(1 − p )KV ) = L ⊗A M l
l
(3.12.2)
Finally, we compose (3.12.1) with ϕ′ := ϕ ⊗A1/pe A1/p
γ:
ne
to construct:
1/pe
N
(n+1)e
e
= L1/p ⊗A1/pe M 1/p
Φ′
e
−→ L1/p ⊗A1/pe A1/p
(3.12.3)
ϕ′
ne
−→ RA1/pe ⊗A1/pe A1/p
ne
= R ⊗A A1/p
= RA1/pne .
ne
This is a map from an invertible sheaf on XVe (n+1)e = (XV ne )e to the structure sheaf on XV ne . In
particular, it is a map such as one studied in [BS13, Section 4].
Let us point out an alternate way to construct γ. Indeed, take
ϕ′′ := ϕ ⊗A1/pe M 1/p
(n+1)e
e
: L1/p ⊗A1/pe M 1/p
(n+1)e
−
→ RA1/pe ⊗A1/pe M 1/p
We can then compose this with RA1/pe ⊗A1/pe (ΦeA )1/p
e
e
N 1/p = L1/p ⊗A1/pe M 1/p
(n+1)e
ne
ϕ′′
−
−
→ RA1/pe ⊗A1/pe M 1/p
(n+1)e
(n+1)e
∼
.
= R ⊗A M 1/p
= (ΦeA )′ to obtain
(n+1)e
(Φe )′
A
−−−
→ RA1/pe ⊗A1/pe A1/p
ne
= RA1/pne .
This composition is easily seen to coincide with γ.
We can then compose γ with itself m-times as in [BS13, Section 4] or [Sch09]. We recall this
construction for the benefit of the reader. To construct γ 2 , we tensor the map
e
→ R ⊗A A1/p
γ : N 1/p −
with the line bundle ⊗R
ne
= RA1/pne
N , take pe th roots and then compose it with γ to obtain:
e 1/p2e
e γ
ne
γ 2 : N 1+p
−
→ N 1/p −
→ R ⊗A A1/p
ne
A1/p
Recursively, we can construct:
γm
pme −1 1/pme
N pe −1
pme −1 1/p(n+m)e
pme −1 1/pme
⊗A1/pme M pe −1
=
L pe −1
−
→ RA1/pne
:
We are now in a position to relate the absolute σ(XV 1/pne , γ)
First we observe that for each m ≤ n, Φm
A induces maps
pme −1 1/pme
µm :
N pe −1
pme −1 1/pme
⊗A1/pme
=
L pe −1
ne
pme −1 1/pme
...⊗(Φm )1/p
−−−−−A−−−−→
L pe −1
⊗A1/pme
with the relative σn (X/V, ϕ).
M
pme −1
pe −1
ne
A1/p .
1/p(n+m)e
F -SINGULARITIES IN FAMILIES
21
Furthermore these maps are surjective since Φm
A is.
Lemma 3.13. Assuming Convention 3.12, we have the following factorization of γ n and γ n−1 as
indicated by the diagram below
p(n−1)e −1 1/p(n−1)e
N pe −1
pne −1 1/pne
N pe −1
pne −1 1/pne
pne −1 1/p(n+n)e
L pe −1
⊗A1/pne M pe −1
γ′
µn
p(n−1)e −1 1/p(n−1)e
⊗
L pe −1
pne −1 1/pne
L pe −1
(n−1)e
A1/p
p(n−1)e −1 1/p(n+n−1)e
M pe −1
µn−1
p(n−1)e −1 1/p(n−1)e
⊗
L pe −1
A1/p
A1/p
(n−1)e
ne
γ n−1
ϕn−1 ⊗...
ϕn
RA1/pne
γn
ne
where the arrow γ ′ is induced by γ and ϕn−1 ⊗ . . . is simply ϕn−1 ⊗A1/p(n−1)e A1/p . Furthermore,
since µn−1 is surjective we have
ne
Im(γ n−1 ) = an−1,n = Im(ϕn−1 ⊗A1/p(n−1)e A1/p ).
Likewise since µn is surjective, we have
Im(γ n ) = an,n = an = Im(ϕn ).
Proof. The two equalities are immediate from the surjectivities of µn−1 and µn and the commune
(n+1)e
−
→ A1/p
tativity of our diagram. The surjectivities of µn−1 and µn are clear since M 1/p
is surjective and tensor is right-exact. It remains to prove the commutativity of our diagram. It
suffices to prove the commutativity of the square:
pme −1 1/pme
pme −1 1/p(n+m)e
L pe −1
⊗A1/pme M pe −1
γ′
/
p(m−1)e −1 1/p(m−1)e
L pe −1
⊗
(m−1)e
A1/p
µm−1
µm
pme −1 1/pme
ne
L pe −1
⊗A1/pme A1/p
p(m−1)e −1 1/p(n+m−1)e
pe −1
M
/
L
p(m−1)e −1
pe −1
1/p(m−1)e
⊗
A1/p
(m−1)e
A1/p
ne
and we will prove it by induction on m. It is clear that, if the above square is commutative for
(n+1)e
and taking pe th roots, we will have the
m, then, by tensoring it with L ⊗R (−) ⊗A1/pne M 1/p
commutativity for m + 1. Hence it remains to prove the commutativity when m = 2. To this end,
ne
(n+1)e
−
→ A1/p by α. Then α induces a map
we will denote the map M 1/p
e
p2e −1 1/p(n+2)e
(n+1)e 1/p
ne
e
= M 1/p ⊗A1/pne M 1/p
α′ = (id ⊗ α)1/p : M pe −1
−
→ M 1/p
e
ne
⊗A1/pne A1/p
ne
= M 1/p
(n+1)e
e
→ R ⊗A A1/p induces
It is clear that α ◦ α′ = α2 . Likewise, the map ϕ : L1/p −
p2e −1 1/p2e
e
2e
e
e
2e 1/p
e
−
→ L1/p ⊗A1/pe A1/p
ϕ′ = (id ⊗ ϕ)1/p : L pe −1
= L1/p ⊗R1/pe L1/p
We will analyze the 4 maps involved in the square. The left vertical map
p2e −1 1/p2e
p2e −1 1/p(n+2)e
p2e −1 1/p2e
⊗A1/p2e M pe −1
−
→ L pe −1
µ2 : L pe −1
22
ZSOLT PATAKFALVI, KARL SCHWEDE, AND WENLIANG ZHANG
is given by id ⊗ (α ◦ α′ ); similarly the right vertical map µ1 is id ⊗ α. The top horizontal map is
given by
p2e −1 1/p(n+2)e ϕ′ ⊗α′
p2e −1 1/p2e
(n+1)e
2e
e
⊗A1/p2e M pe −1
−−−−→ L1/p ⊗A1/pe A1/p ⊗A1/p2e M 1/p
L pe −1
∼
e
−
→ L1/p ⊗A1/pe M 1/p
(n+1)e
And the bottom horizontal map is give by
p2e −1 1/p2e
ne
2e
ne ϕ′ ⊗id
e
L pe −1
⊗A1/p2e A1/p −−−→ L1/p ⊗A1/pe A1/p ⊗A1/p2e A1/p
∼
ne
e
−
→ L1/p ⊗A1/pe A1/p .
p2e −1 1/p2e
p2e −1 1/p(n+2)e
P
Now given an arbitrary x ⊗ z ∈ L pe −1
⊗A1/p2e M pe −1
, write ϕ′ (x) = i xi ⊗ yi
2e
e
with xi ∈ L1/p and yi ∈ A1/p . Then, on one hand, if we follow the top horizontal map and then
the right vertical map, we will have
X
X
X
X
x ⊗ z 7→ (
xi ⊗ yi ) ⊗ α′ (z) 7→
xi ⊗ yi α′ (z) 7→
xi α(yi α′ (z)) =
xi ⊗ yi α(α′ (z)),
i
i
i
i
2e
ne
where the last equality holds since α is A1/p -linear and hence A1/p -linear.
On the other hand, if we follow the other path (i.e. the left vertical map first and then the
bottom horizontal map), we will have
X
X
x ⊗ z 7→ x ⊗ α′ (z) 7→ x ⊗ α(α′ (z)) 7→ (
xi ⊗ yi ) ⊗ α(α′ (z)) 7→
xi ⊗ yi α(α′ (z)).
i
i
This proves that the square is indeed commutative when m = 2 and concludes the proof of our
Lemma.
Theorem 3.14. With notation as in Convention 3.12 and below, choose n > n0 = nσ(ϕ),k(V ) . Then
there exists a dense open set U ⊆ V ∼
= V e with W = f −1 (U ) ⊆ X such that
σ(XV 1/pne , γ)|W = σn (X/V, ϕ)|W .
Furthermore, shrinking U further if necessary we can require for all perfect points u ∈ U , that
σ(XV 1/pne , γ) · OXu = σn (Xu /u, ϕu ) = σ(Xu , ψu )
where ψu is ϕu viewed as an absolute p−e -linear map.
Proof. The second statement is immediate from the first by Proposition 3.8, so we need only prove
the first statement. By the diagram in Lemma 3.13 and applying Proposition 3.3, we see that
Im(γ n )|W = an,n |W = an−1,n |W = Im(γ n−1 )|W
for all n > n0 . Hence Im(γ n )|W = σ(XV 1/pne , γ)|W and the result follows.
Convention 3.15. Assuming everything in Convention 3.12, we additionally assume that ϕ is relatively divisorial.
Before we proceed, we prove a lemma about interpreting maps as divisors in the relative vs
absolute setting.
Lemma 3.16. With notation as in Convention 3.15, if ∆ϕ is the divisor corresponding to ϕ as in
Definition 2.8. Then ∆γ , the divisor on XV ne corresponding to γ as in [BS13, Section 4], is equal
to h∗ ∆ where h : XV ne = X ×V V ne −→ X is the projection.
F -SINGULARITIES IN FAMILIES
23
Proof. Working off a set of relative codimension 2, and then working locally on X and V , we
e
can assume that L and M are trivial, and further assume that ϕ( ) = Φ(z 1/p · ) where Φ
e
e
generates H omR 1/pe (R1/p , RA1/pe ) as an R1/p -module. Then ∆ϕ is the divisor corresponding to
A
1
div
(z).
On
the other hand, since the map Γ corresponding to Φ is a composition of generating
e
X
p −1
maps, Γ generates H omR
ne
A1/p
(R
1/pe
A1/p
(n+1)e
, RA1/pne ), see for example [Kun86, Appendix F], and
e
so corresponds to the zero divisor. Furthermore, we see that γ( ) = Γ(z̄ 1/p · ) where z̄ is the
element corresponding to z ⊗ 1 ∈ RA1/pne . Hence ∆γ = pe1−1 divXV ne (z̄) and the claim follows.
We now need a Lemma which says roughly that in an F -pure F -finite ring A with maximal ideal
e
→ A such that the closed point V (m) is
m, then at least locally, one can always choose a α : A1/p −
an F -pure center of ∆α . To this end, we introduce the following.
e
e
Me,A := {ϕ ∈ HomA (A1/p , A)|ϕ(m1/p ) ⊆ m}
and
e
e
Ne,A := {ϕ ∈ HomA (A1/p , A)|ϕ(A1/p ) ⊆ m}.
e
e
It is straightforward to check that both Me,A and Ne,A are A1/p -submodules of HomA (A1/p , A)
and that Ne,A ⊆ Me,A . We now observe that:
Lemma 3.17. For any F -finite reduced G1 and S2 ring A with maximal ideal m, the formation of
Me,A and Ne,A commute with localization and completion completion, i.e. if W is a multiplicative
system and ˆ denotes completion along m then
W −1 Me,A ∼
= (W −1 M )e,W −1 A and W −1 Ne,A ∼
= (W −1 N )e,W −1A and
Me,A ⊗A Â ∼
and Ne,A ⊗A Â ∼
=M
=N
e,Â
e,Â
The following proof was suggested to us by Manuel Blickle and Kevin Tucker. We believe there
are more general proofs that work without the G1 and S2 hypothesis (but this proof is short).
e
e
e
Proof. We have a natural injective map HomA (m1/p , m) ֒→ HomA (m1/p , A), but HomA (m1/p , A) ∼
=
e
HomA (A1/p , A) since both modules are S2 (since a reflexive module is S2 in a G1 and S2 ring,
e
e
[Har94]). Thus we have HomA (m1/p , m) ֒→ HomA (A1/p , A), the image of which is Me,A . Therefore Me,A clearly commutes with localization and completion since the formation of both Hom
sets commutes with localization and completion. Similarly, the formation of Ne,A commutes with
localization and completion.
Lemma 3.18. Suppose that A is an F -pure F -finite G1 and S2 ring with maximal ideal m. Then
e
e
there exists an A-linear map αA : A1/p −→ A such that αA is surjective and αA (m1/p ) ⊆ m.
Proof. We first assume that A is a local ring. In this case, it suffices to show that Ne,A 6= Me,A .
By Lemma 3.17, we may assume that A is complete since  is faithfully flat over A. By the Cohen
Structure Theorem, there is a ring of formal power series S = kJx1 , . . . , xn K over a coefficient field k
e
e
of A with surjection S−
→
→A. Write A = S/I. Recall that HomS (S 1/p , S) is generated (as an S 1/p e
pe −1
→ S that sends (x1 · · · xn ) pe to 1 and other basis monomials (including
module) by g : S 1/p −
e
1) to zero. By Fedder’s lemma [Fed83, Lemma 1.6], each element of HomA (A1/p , A) has the form
e
e
e
e
f (u1/p −) with u ∈ (I [p ] : I). Since A is F -pure, (I [p ] : I) 6⊂ n[p ] where n = (x1 , . . . , xn ). Let
e
e
u be an element of (I [p ] : I)\n[p ] . Then u must have a monomial term cxa11 · · · xann with c ∈ k
and ai < pe for each i. Choose such a monomial appearing in u with the least degree and still
e
e
e
e
denote it by cxa11 · · · xann . Then it is clear that (xp1 −1−a1 · · · xpn −1−an )u − c(x1 · · · xn )p −1 ∈ n[p ] .
e
e
e
e
→ A by α(−) = g((x1p −1−a1 · · · xpn −1−an u)1/p −). Then α is in Me,A \Ne,A .
Now define α : A1/p −
This completes the local case by Lemma 3.17.
24
ZSOLT PATAKFALVI, KARL SCHWEDE, AND WENLIANG ZHANG
For the non-local case, we have the map Me,A −
→ A which is evaluation at 1. Since the formation
of Me,A commutes with localization, this map is surjective if and only if it is surjective locally. The
e
above work proves the result after localizing at m. However, clearly (Me,A )n = HomA (A1/p , A) n
for prime ideals not equal to m. The result follows.
For the moment, we work sufficiently locally so that X = Spec R and V = Spec A are affine
and that L and M are isomorphic to R and A respectively. Continue to assume that A is F pure and quasi-Gorenstein, and fix a point s ∈ Spec A. Shrinking V if necessary, choose a map
e
1/pe
αs ∈ HomA (A1/p , A) which is surjective and which satisfies α(ms ) ⊆ ms (whose existence is
e
guaranteed by Lemma 3.18). We write αs ( ) = ΦeA (z 1/p · ) for some z ∈ A. Note we have an
e
induced map αs : (A/ms )1/p −
→ A/ms .
e
→ RA1/pne defined by the rule β( ) =
We thus induce the following map β : (RA1/pne )1/p −
(n+1)e
1/p
· ). Certainly using the notation of (3.12.3),
γ(z
1/p(n+1)e
β(ms
=
·R
1/pe
(n+1)e
A1/p
(n+1)e
1/p(n+1)e
ms
γ(z 1/p
·R
)
1/pe
(n+1)e )
A1/p
(n+1)e
e
ne
1/p(n+1)e
1/pe
ms
· R 1/p(n+1)e
z 1/p
=
ϕ′ ◦ (ΦeA )1/p ⊗A1/pne R1/p
A
e
ne
1/p(n+1)e
1/pe
1/p
′
1/p
ne
ms
· R 1/p(n+1)e
⊗A1/p R
=
ϕ ◦ (αs )
1/pne
⊆ ϕ′ (ms
1/pne
⊆ ms
A
1/pe
· RA1/pne )
RA1/pne .
And hence we induce a map
β:R
1/pe
(A/ms )1/p
(n+1)e
−
→ R(A/ms )1/pne .
Lemma 3.19. With notation as above, ∆β = ∆γ |Xsne where the divisors are induced as in [BS13,
Section 4].
Proof. Since ϕ is relatively divisorial, by working in relative codimension 1, it suffices to show the
result in the case that ∆γ (and so ∆ϕ ) is trivial (since locally ϕ or ψ is a generator pre-multiplied
by the element which determines ∆ϕ or ∆ψ ). But now consider the composition constructing β.
R
1/pe
(n+1)e
A1/p
·z 1/p
(n+1)e
−−−−−−−→ R
Φ′
1/pe
(n+1)e
A1/p
The composition of the first two maps sends m1/p
(n+1)e
ϕ′
1/pe
−→ RA1/pne −→ RA1/pne
·R
1/pe
out by these ideals induces a generating map for HomR1/pe
ne
(A/m)1/p
1/p(n+1)e
1/pe
ne
(n+1)e
A1/p
(R
to m1/p · RA1/pne and modding
1/pe
1/pe
(n+1)e
(A/m)1/p
, R(A/m)1/pne ) via the
ne
−
→ (A/m)1/p is a generating map
fact that αs is surjective and so the induced map (A/m)
ne
′
as well. On the other hand, if ϕ is a generating map, so is ϕ ⊗A1/pne (A/m)1/p by Lemma 2.19.
Since the composition of two generating maps is a generating map, we are done.
We now explain how the absolute σ behaves when restricting to fibers. First we need two lemmas.
Lemma 3.20. With notation as above, and v ∈ V a closed point.
σ(XV ne , ∆γ ) · OXvne = σ(XV ne , γ) · OXvne ⊇ σ(Xvne , β) = σ(Xvne , ∆β ) = σ(Xvne , ∆γ |Xvne ).
Proof. Obviously σ(XV ne , γ) ⊇ σ(XV ne , β). On the other hand, it follows easily that σ(XV ne , β)
restricts to σ(Xvne , β) by F -adjunction, see for instance [FST11].
The next lemma is a generalization of the fact that for an ideal in a regular ring, I ⊆ (I [1/p] )[p]
using the •[1/p] notation from [BMS08].
F -SINGULARITIES IN FAMILIES
25
Lemma 3.21. Let B be an F -finite regular ring such that B 1/p is a free B-module and that
a
HomB (B 1/p , B) ∼
= B 1/p (for example this happens if B is local). Further suppose that Q is a B 1/p
a
submodule of B 1/p ⊗B P for some B-module P ,
a
Q ⊆ B 1/p ⊗B P.
a
a
Then Q ⊆ B 1/p ⊗B (ϑ ⊗ idP )(Q) where ϑ ∈ HomB (B 1/p , B) is the generator.
any element
Proof. The strategy is similar to [BMS08,
P Proposition 2.5]. By [Kun69, Theorem 2.1],
a
1/p
over B and
of Q can be written as a finite sum
λi ⊗ mi , where {λi } form a basis for B
a
mi ∈ P . Now since ϑ is a local generating map of HomB (B 1/p , B), the projection maps onto
a
the λi are multiples of ϑ. In other words, for each λi there exists a ui ∈ B 1/p such that both
ϑ(ui λi ) = 1 ∈ R and ϑ(ui λj ) = 0 ∈ R for j 6= i.
P
We observe that each mj is then in (ϑ ⊗ idP )(Q) since ϑ(uj λi ⊗ mi ) = mj . It follows then
P
a
that
λi ⊗ mi ∈ B 1/p ⊗B (ϑ ⊗ idP )(Q) .
Lemma 3.22. Suppose that A = k is an F -finite field and K ⊇ k is a field extension of k such that
K is perfect. Choose X = Spec R −→ V = Spec A = Spec k a flat map of finite type with X −→ V
e
possessing geometrically reduced, G1 and S2 fibers. Additionally suppose that γ : R1/p −→ R is any
e
R-linear map which is a local generator of HomR (R1/p , R) at the generic points of the codimension1 components of the non-smooth locus of X. Then, setting ∆γ as in [BS13, Section 4].
σ(X, ∆γ ) ⊗k K ⊇ σ(XK , (∆γ ) ×k K)
ne
ne
ne
Proof. First choose n > 0 such that σ(X, ∆γ ) = γ n (R1/p ). Since Homk (k1/p , k) is a free k1/p module of rank 1, by [Kun86, Appendix F] we can factor γ n as
R1/p
ne
β
/ R 1/pne
k
ϑ
/
: Rk
γn
with ϑ a local generator of H omRk (Rk1/pne , Rk ) and so that ∆β coincides with ∆γ . To see this last
ne
e
point, notice that if γ is a local generator of HomR (R1/p , R), then so is γ n of HomR (R1/p , R)
ne
and hence β is also a local generator of HomR 1/pne (R1/p , RA1/pne ). More generally then, if γ n
A
ne
ne
is a local generator pre-multiplied by some g1/p ∈ R1/p (working in codimension 1) then β is
ne
also a generator times g 1/p (possibly times a unit depending on our choice of ϑ). This proves that
∆β = ∆γ as asserted.
ne
ne
ne
ne
ne
We now observe that γ n (R1/p ) ⊗k k1/p = ϑ(β(R1/p ) ⊗k k1/p ⊇ β(R1/p ) by Lemma 3.21
ne
ne
(here B = k and P = β(R1/p )). After embedding k1/p ⊆ K we tensor β by K to obtain a map
βK : R1/p
ne
→ Rk1/pne ⊗k1/pne K.
⊗k1/pne K −
We see immediately that ∆βK = (∆γ ) ×k K (again by an argument about local generators). Then,
by Lemma 3.21,
ne
ne
ne
σ(X, γ) ⊗k K ∼
= γ n (R1/p ) ⊗k k1/p ⊗ 1/pne K ⊇ β(R1/p ) ⊗ 1/pne K ⊇ σ(X, βK ).
k
This completes the proof.
k
Theorem 3.23. With notation as in Convention 3.15, there exists an N > 0 such that for all
n > N we have σ(XV 1/pne , ∆γ ) · OXsne = σ(Xsne , (∆γ )|Xsne ) for all perfect points s ∈ V .
Proof. The statement is local, so we may assume X and V are affine and that L and M are trivial
just as above in Lemma 3.19. We know
σ(XV 1/pne , γ n ) ⊆ Im(γ n ) = σn (X/V, ϕ)
26
ZSOLT PATAKFALVI, KARL SCHWEDE, AND WENLIANG ZHANG
by Lemma 3.13. On the other hand, by Theorem 3.9, we have σn (X/V, ϕ) · OXs = σ(Xs , ϕs ).
Therefore, it is sufficient to show that σ(XV 1/pne , γ) · OXsne ⊇ σ(Xsne , ψsne ).
For this we may assume that V is the spectrum of an F -Finite F -pure local ring and that
Spec K = s 7→ V has image the closed point Spec k = v ∈ V . We first see that σ(XV ne , ∆γ )·OXvne ⊇
σ(Xvne , ∆β ) = σ(Xvne , ∆γ |Xvne ) by and using the notation of Lemma 3.20. On the other hand, by
Lemma 3.22
σ(Xvne , ∆γ |Xvne ) · OXsne = σ(Xvne , ∆β ) · OXsne ⊇ σ(Xsne , ∆β ×vne sne ) = σ(Xsne , ∆γ |Xsne ).
This completes the proof.
Using the same method as Lemma 3.20, we also obtain the following result which may also be
of independent interest.
Proposition 3.24. Assume that f : X −→ V is a flat finite type reduced G1 and S2 morphism
e
and that V is regular. Additionally assume that γ : R1/p −→ R is an R-linear map which is a local
generator at the generic points of the codimension-1 components of the non-smooth locus of f for
each fiber of f . Then for any a > 0 we have
a
σ(X, ∆γ ) ⊗A A1/p ⊇ σ(XV a , ∆γ ×V V a ).
e
Proof. The statement is local over the base and so we may assume that KV ∼ 0 and that A1/p is
a free A-module since V is regular [Kun69]. Note then that KX/V ∼
= KX . Choose ne ≥ a > 0 such
ne
a
ne
that σ(X, ∆γ ) = γ n (R1/p ). Since HomA (A1/p , A) is a free A1/p -module of rank 1, by [Kun86,
Appendix F] we can factor γ n as
R1/p
ne
β
/ R 1/pa
A
ϑ
/
;R
γn
ne
where ϑ is a local generator of H omR (RA1/pa , R). Note β ∈ HomR 1/pa (R1/p , RA1/pa ) which is
A
identified with
a
a
ne
H omR 1/pa R1/p ⊗R 1/pa (A1/p ⊗A ωR/A ), (A1/p ⊗A ωR/A )
A
A
ne
∼
= H omRA1/pa (OX (pne KX/V ))1/p , ωR 1/pa /A1/pa
A
ne
∼
= H omRA1/pa (OX (pne KX ))1/p , ωRA1/pa
∼ H om 1/pne (OX (pne KX ))1/pne , ω 1/pne
=
R
R
ne
∼
= (OX ((1 − pne )KX ))1/p .
Note that since the base is regular, all these sheaves are automatically reflexive and so there is no
need to double dualize as we did before in Definition 2.8. By dividing by (pne − 1) we see that β
coincides with a divisor ∆β such that (1 − pne )(KX + ∆β ) ∼ 0. Furthermore, it is easy to see that
∆β coincides with ∆γ just as in Lemma 3.20 since ϑ is a local generator.
ne
ne
R1/p ⊗
a 1/p
ne+a ...⊗(ΦA )
−−−−−−−−→
A1/p
By composing β with a local generating (and surjective) map
ne
ne
ne
−
→ RA1/pa satisfying the
R1/p we then obtain a map γ ′ : (RA1/pa )1/p ∼
= R1/p ⊗A1/pne A
a
′
′
condition ∆γ = ∆γ ×V V . We also notice that γ has the same image as β.
ne
A1/p
1/pne+a
F -SINGULARITIES IN FAMILIES
a
ne
a
ne
27
ne
Now, we observe that γ n (R1/p ) ⊗A A1/p = ϑ(β(R1/p )) ⊗A A1/p ⊇ β(R1/p ) by Lemma 3.21
ne
setting B = A and P = β(R1/p ). The remainder of the proof is easy since
a
=
⊇
=
⊇
=
σ(X, ∆γ ) ⊗A A1/p
a
ne
γ n (R1/p ) ⊗A A1/p
ne
β(R1/p )
ne
γ ′ (RA1/pa )1/p
σ(XV a , ∆γ ′ )
σ(XV a , ∆γ ×V V a ).
3.25. Application to sharply F -pure singularities and HSL numbers in families. We
e
observe that Corollary 3.10 has an immediate application. Recall that if γ : L1/p −
→ R is an Rn
n+1
linear map, then the HSL number is the first integer n such that Im(γ ) = Im(γ
) = σ(R, γ), cf.
[Sha07].
Corollary 3.26 (Uniform behavior of HSL numbers). Given a flat family f : X −→ V over a
e
excellent integral scheme V with a dualizing complex of characteristic p > 0 and ϕ : L1/p −→ OXV e
as before, there exists an integer N > 0 such that gives an upper bound on the HSL number of
1/pe
(Xs , ϕs : Ls
−→ OXs ) for every perfect point s ∈ V .
Proof. The statement immediately follows from Theorem 3.9 since clearly σm (Xs /s, ϕs ) agrees with
σ(Xs , γs = ϕs ) for m ≫ n.
Now we study the deformation of sharp F -purity, a question which has been studied before in
[SZ09, Has10]. We believe that the hypothesis that f is proper is necessary in Theorem 3.30.
e
→ OX = R) is called sharply F -pure if σ(X, ψ) =
Definition 3.27. Recall that a pair (X, ψ : L1/p −
e
→ RA1/pe ), we define (X/S, ϕ) to be relatively sharply F -pure if
OX . Given (X/S, ϕ : L1/p −
σn (X/S, ϕ) = RA1/pne for some n > 0, cf. [Has10].
Lemma 3.28. If σn (X/S, ϕ) = RA1/pne for some n > 0, then the same holds for all n > 0.
Proof. Suppose σn (X/S, ϕ) = RA1/pne for some n > 0. Choose m < n to start. Then we know
n
→ RA1/pn
am,n ⊇ an,n = σn (X/S, ϕ) and so am,n = RA1/pne . But am,n = Im am ⊗A1/pm A1/p −
which is just the extension of σm (X/S, ϕ) ⊆ RA1/pme to RA1/pne . Additionally, RA1/pme ⊆ RA1/pne
is an integral extension and hence we must have σm (X/S, ϕ) = RA1/pme as well.
We finish the proof by showing σ2n (X/S, ϕ) = RA1/p2ne . This follows quickly since σ2n (X/S, ϕ)
factors as a composition of two surjective maps (as ⊗ is right exact) as in (2.13.1) and (2.13.1).
Remark 3.29. If S is a point, then (X/S, ϕ) being relatively sharply F -pure is equivalent to (X/S, ϕ)
being geometrically sharply F -pure (i.e., that (Xt , γt ) is sharply F -pure for every geometric point
t−
→ S where γt is induced from ϕt as in Section 3.11). To see this, certainly observe that if (X/S, ϕ)
is relatively sharply F -pure then so is any base change (Xt /t, ϕt ). But then (Xt , γ) is sharply F -pure
by Theorem 3.14. Conversely, if (Xt , γt ) is sharply F -pure, then certainly (Xt /t, ϕt ) is relatively
sharply F -pure by Lemma 3.13. But then so is (X/S, ϕ) near that t by Nakayama.
Theorem 3.30 (Openness of sharp F -purity). With notation as before, assume that f : X −→ V
is proper. Assume that s ∈ V is a point and that (Xs /s, ϕs ) is relatively sharply F -pure (in other
words, geometrically F -pure). Then there exists a dense open set U ⊆ V containing s such that
(Xu /u, ϕu ) is relatively sharply F -pure for all u ∈ U (in particular, (Xu , ϕu ) is sharply F -pure for
all perfect points u ∈ U ).
28
ZSOLT PATAKFALVI, KARL SCHWEDE, AND WENLIANG ZHANG
Proof. Choose n ≫ 0 such that σn (Xs /s, ϕs ) = RO1/pne since (Xs /s, ϕs ) is sharply F -pure. By
s
Theorem 3.9, we know that σn (X/V, ϕ) = RA1/pne in a neighborhood W ⊆ X of Xs . Let Z =
X \ W ⊆ X be the complement of that neighborhood. Since f is proper, f (Z) is closed, and also
does not contain s. Set U = V \ f (Z). Then σn (XU /U, ϕU ) = RO1/pne . It follows from Theorem 3.9
U
that all the fibers (Xu /u, ϕu ) are relatively sharply F -pure for perfect u ∈ U as desired.
We now state the above theorem in the context of divisors.
Corollary 3.31 (Openness of sharp F -purity for divisor pairs). Suppose that f : X −→ V is a
proper G1 and S2 morphism as before and now additionally suppose that ∆ is a Q-divisor satisfying
conditions (a)–(d) from Remark 2.11. Additionally suppose that s ∈ V is a perfect point and that
(Xs , ∆|Xs ) is sharply F -pure (or more generally, if s is not perfect, that (Xse , ∆|Xse ) is sharply
F -pure for some/all e > 0). Then there exists an open set U ⊆ V containing s such that for all
u ∈ U we have (Xu , ∆|Xu ) is sharply F -pure (respectively, we have (Xue , ∆|Xue ) is sharply F -pure
for some/all e > 0 and all u ∈ U ).
e
→ RA1/pe as in Remark 2.11. The result then
Proof. Associate to ∆ a relatively divisorial ϕ : L1/p −
follows immediately from Theorem 3.30 and Corollary 2.22.
4. Relative test ideals
In this section we define a notion of a relative test ideal. We construct it using the following
method. We first find some ideal I which when restricted to every geometric fiber is contained in
ne
the test ideal of that fiber. We then sum up the image of I 1/p under ϕn (the same method is used
to construct the test ideal in the absolute case). This sounds simple enough, but it actually leads
to a somewhat disappointing construction. The problem is that the ideal we pick is in no sense
canonical and we do not see a way to make it both canonical and stable under base change. In the
case that ϕ corresponds to a trivial divisor, we can make our choices canonical by setting I to be
the Jacobian ideal (this is done later when we discuss relative F -rationality in Section 5), but for
more general ϕ we don’t know of an analogous choice.
e
→ RA1/pe ). We begin
We fix the notation of the previous sections (in particular, we fix ϕ : L1/p −
∞
by choosing an arbitrary ideal I ⊆ OX . After base change to k(V ) as before, setting I∞ = I · R∞ ,
we can form the following sum:
τ (Rk(V ∞ ) , ψ∞ I∞ ) :=
∞
X
i=0
i
ψ∞
(I∞ · L
pie −1
pe −1
k(V ∞ )
)1/p
ie
.
If it happens that I∞ is contained in the test ideal of (Rk(V ∞ ) , ϕ∞ ) and non-zero on any component
of X∞ , then we see that the absolute test ideal τ (Rk(V ∞ ) , ψ∞ (I∞ )) is equal to τ (Rk(V ∞ ) , ψ∞ ) for
example by [ST12, Section 7].
We can also describe this as follows, first essentially observed in [Kat08]. Fix ideals
b∞
0
b∞
1
1/pe
∞
:= b∞
1 + ψ∞ (b1 · Lk(V ∞ ) )
1/pe · L
1/pe
= b∞
k(V ∞ ) )
1 + ψ∞ (I∞ + ψ∞ (I∞ · Lk(V ∞ ) )
pie −1
P2
pe −1
i
1/pie
=
i=0 ψ∞ (I∞ · Lk(V ∞ ) )
... ...
pie −1
Pn
e
pe −1
1/pie
1/p
i
∞
∞
∞
= i=0 ψ∞ (I∞ · Lk(V
bn := bn−1 + ψ∞ (bn−1 · Lk(V ∞ ) )
∞))
b∞
2
(4.0.1)
0 (I )
:= I∞ = ψ∞
∞
1/pe
1/pe = I + ψ
:= b0 + ψ∞ (b∞
∞
∞ (I∞ · Lk(V ∞ ) )
0 · Lk(V ∞ ) )
F -SINGULARITIES IN FAMILIES
29
∞
And we notice that this ascending chain stabilizes say at t. Also note that the first time b∞
t = bt+1 ,
∞
∞
∞
we then have bt = bt+1 = bt+2 = . . .. We fix this integer t.
Definition 4.1. With notation as above, we define the integer t to be the uniform integer for τ
and I over the generic point of V , and in general, it will be denoted by nτ (ϕI),k(V ) . We notice that
for any point η ∈ V , by base change we can replace V by Spec k(η) and form a corresponding
integer nτ (ϕη Iη ),k(η) .
On the other hand, without the passing to k(V ∞ ), we have the images
e
e
→ RA1/pe + ϕ((I · L)1/p ) ⊆ RA1/pe ,
b1 := Im I ⊗A A1/p −
pie −1
P2
1/p2e −
i ((I · L pe −1 )1/pie ) ⊗
→
R
⊆ RA1/p2e ,
b2 :=
Im
ϕ
2e
ie A
1/p
1/p
i=0
A
A
...
pie −1
Pn
ie
i
1/pne −
pe −1 )1/p ) ⊗
bn :=
⊆ RA1/pne ,
→
R
ie A
1/pne
1/p
A
i=0 Im ϕ ((I · L
A
...
2e
→ RA1/p2e ⊆ b2 and more generally for j > i that Im bi ⊗A1/pie
Notice that Im b1 ⊗A1/pe A1/p −
je
→ RA1/pne ⊆ bj . Also observe that this is the opposite containment compared to what we
A1/p −
had in Section 3.
By the same argument as in Section 3, we know that there exists an open set U ⊆ V with
W = f −1 (U ) such that
Im(bt ⊗A1/pte A1/p
(4.1.1)
(t+1)e
−
→ RA1/p(t+1)e )|W = bt+1 |W .
As before in Proposition 3.3, we claim that:
Lemma 4.2. With notation as above, Im(bn ⊗A1/pne A1/p
n ≥ t.
(n+1)e
−→ RA1/p(n+1)e )|W = bn+1 |W for all
Proof. Replacing V by U and X by W , we may assume that
(t+1)e
bt+1 = Im bt ⊗A1/pte A1/p
−
→ RA1/p(t+1)e
By induction on n, it suffices to show that, if bn+1 = Im(bn ⊗A1/pne A1/p
bn+2 = Im(bn+1 ⊗A1/p(n+1)e
RA1/p(n+1)e ) if and only if
(n+2)e
A1/p
(n+1)e
−
→ RA1/p(n+1)e ), then
−
→ RA1/p(n+2)e ). Note that bn+1 = Im(bn ⊗A1/pne A1/p
p(n+1)e −1
(n+1)e
−
→
(n+1)e
)−
→ RA1/p(n+1)e )
Im(ϕn+1 ((I · L pe −1 )1/p
n
X
pie −1
(n+1)e
ie
Im ϕi ((I · L pe −1 )1/p ) ⊗A1/pie A1/p
−
→ RA1/p(n+1)e
⊆
i=0
Tensoring with ⊗R L, taking 1/pe th roots, and applying ϕ yields
Im(ϕn+2 ((I · L
⊆
n+1
X
i=1
Hence,
p(n+2)e −1
pe −1
)1/p
(n+2)e
)−
→ RA1/p(n+2)e )
pie −1
(n+2)e
ie
−
→ RA1/p(n+2)e
Im ϕi ((I · L pe −1 )1/p ) ⊗A1/pie A1/p
bn+2 = Im(bn+1 ⊗A1/p(n+1)e A1/p
This finishes the proof.
(n+2)e
−
→ RA1/p(n+2)e ).
30
ZSOLT PATAKFALVI, KARL SCHWEDE, AND WENLIANG ZHANG
As before, we define relative test ideals as follows.
Definition 4.3. The nth limiting relative test ideal with respect to I (of the pair (X/V, ϕ)) is
defined to be bn ⊆ RA1/pne and is denoted by τn (X/V, ϕI).
Before proceeding to various properties of relative test ideals, we give one example of relative
test ideals.
Example 4.4. (Example 3.7 revisited) Fix k to be an algebraically closed field of characteristic
p > 2, set A = k[t] and set R = k[x, t] with the obvious map X = Spec(R) −
→ V = Spec(A).
1/p
1/p
1/p
1/p
Let ϕ : R
= k[x , t ] −
→ RA1/p = k[x, t ] be the composition of the local generator β ∈
HomR
A1/p
2
1
1
(R1/p , RA1/p ) with pre-multiplication by (xp + t) p = f p . Set I = hxp + ti. Then
b1 = Im(I⊗A A1/p −
→ RA1/p )+ϕ(I 1/p ) = hxp +ti+h(xp +t1/p )(x+t1/p )i = hxp +t, (xp +t1/p )(x+t1/p )i.
2
2
To calculate b2 , it suffices to calculate Im(ϕ2 (I 1/p )) = Im(β 2 ((xp +t)
RA1/p2 , we can see that Im(ϕ2 (I
check that β 2 ((x
p2
+ t)
1+p
p2
x
1/p2
p2 −p−1
p2
)) ⊆ h(x
p2
1/p2
(xp + t)
+ t)
1+p
p2
) = (x
p2
1+p
p2
2
2
I 1/p )). Since (xp +t)
1+p
p2
∈
i. On the other hand, it is straightforward to
+ t)
1+p
p2
2
= (x + t1/p )(xp + t1/p ). Therefore,
2
b2 = hxp + t, (xp + t1/p )(x + t1/p ), (x + t1/p )(xp + t1/p )i.
1+p+···+pi
2
i+1
For each i ≥ 2, to calculate bi+1 , it suffices to calculate Im(β i+1 ((xp + t) pi+1 I 1/p )). It is
2
straightforward to check that it is contained in h(xp + t1/p )(x + t1/p )i and hence is contained in b2 .
Therefore, bi+1 = b2 as well. So we have
(
hxp + t, (xp + t1/p )(x + t1/p )i
when n = 1
bn =
2
p
1/p
p
p
1/p
1/p
1/p
)(x + t )i n ≥ 2.
b2 = hx + t, (x + t )(x + t ), (x + t
We now prove a base change statement for relative test ideals. Compare with Proposition 3.8.
As before, we fix qi : X ×V T i −
→ X ×V V i to be the natural map.
Theorem 4.5 (Relative test ideals and base change). Fix g : T −→ V to be any morphism with T
excellent, integral and admitting a dualizing complex. Then
Im ((qne )∗ τn (X/V, ϕI) ֒→ OXT ne ) := τn (X/V, ϕI) · OXT ne = τn (XT /T, ϕT IT ).
Furthermore, if U = Un satisfies the condition of Lemma 4.2, then W = g−1 (U ) ⊆ T satisfies the
same condition for τn (XT /T, ϕT IT ).
Proof. We write B = OT and work locally. By construction and right exactness of tensor:
τn (X/V, ϕ) · OXT ne = bn ⊗A1/pne B 1/p
ne
=
n
X
pie −1
ie
ϕi ((I · L pe −1 )1/p ) ⊗A1/pie B 1/p
i=0
But by Lemma 2.17, we have
n
X
pie −1
i=0
=
n
X
i=0
ϕiT ((IT
pie −1
pe −1
· LT
= τn (XT /T, ϕT IT )
which completes the proof.
ie
ϕi ((I · L pe −1 )1/p ) ⊗A1/pie B 1/p
ie
ne
)1/p ) ⊗B 1/pie B 1/p
ne
ne
⊆ RB 1/pne .
F -SINGULARITIES IN FAMILIES
31
Theorem 4.6 (Restriction of τn to fibers). With notation as above, there exists an integer N ≥ 0,
such that for all points s ∈ V , N ≥ nτ (ϕs I),k(s) . In other words, we have both that τn (X/V, ϕ) ·
OXsne = τn (Xs /s, ϕs ) (which always holds) and also that for all m ≥ n ≥ N that
m
τn (X/V, ϕI) ⊗V n k(s)1/p = τm (Xs /s, ϕs Is ).
Proof. The idea is the same as for Theorem 3.9 and we only sketch it here. We stratify V as follows.
The result holds on a dense open subset of U0 ⊆ V . Let V1′ be the complement and let V1 denote
the regular locus of V1′ . Base change to V1 , and then repeat. This procedure stops after finitely
many iterations by Noetherian induction and we choose an N that works for them all.
We now construct I ⊆ R whose restriction is contained in the test ideal of every geometric fiber.
Proposition 4.7 (The existence of relative test elements). With notation as above suppose additionally that f : X −→ V is relatively G1 and S2. Then there exists an ideal I ⊂ OX such that
for every point s ∈ V and every perfect extension K ⊇ k(s), we have that IK ⊆ τ (XK , ψK ) where
again ψK is simply ϕK interpreted as in [BS13]. Additionally, we can assume that I = OX at all
e
points of X such that both X/V is smooth and that ϕ locally generates H omOX (L1/p , RA1/pe ).
Furthermore, if V is strongly F -regular and quasi-Gorenstein, then I can additionally be chosen so
that IV e is within the absolute test ideal of (XV e , γ) (where γ is as in Section 3.11).
We caution the reader that it is possible that ψs (and thus ψK ) could be the zero-map, and
hence IK the zero ideal.
e
e
Proof. First let Z1 ⊆ X denote the locus where ϕR1/p ⊆ H omR 1/pe (L1/p , RA1/pe ) is not an
A
isomorphism. Additionally let Z2 denote the locus where X is not smooth over V . Set Z = Z1 ∪ Z2 .
Set W = X \ Z (and note that we can also view this as a subset of XV e for any e) and notice that
on W we know that ϕ can be identified with the trace map up to multiplication by a unit.
Since f |W is smooth, we observe that ϕ (which is identified with trace) is surjective when restricted to W by Corollary 2.5. Now choose an exponent m > 0 such that
IZm · RA1/pe ⊆ a1,1 = σ1 (X/S, ϕ)
Now choose an integer l > 0 such that IZml is locally generated by cubes of elements of IZm (this
only depends on the number of local generators of IZ ). Then the formation of IZml is obviously
compatible with base change (in that the extension of IZml to the base change will also satisfy the
same containment condition.). Thus set I = IZml . The first result follows immediately from [Hoc07,
Theorem on Page 90] or [Sch11b, Proof of Proposition 3.21].
e
For the second result, we notice that γ locally generates H omR 1/pe (N 1/p , RA1/pe ) and that IZm
A
is also in the image of γ. Therefore, I ml works by the above references.
Therefore we obtain:
Corollary 4.8. Using the notation of Theorem 4.6 assume further that I satisfies the condition of
Proposition 4.7. If s is a perfect point then for all n ≥ N as in Theorem 3.9
m
τn (X/V, ϕI) ⊗V n k(s)1/p = τ (Xs , ψs )
where ψs is ϕs interpreted as a p−e -linear map.
Proof. Simply observe that in general the ascending τj (Xs /s, ϕs Is ) ⊆ τj+1 (Xs /s, ϕs Is ) ⊆ . . . stabilize to τ (Xs , ψs ). Furthermore, by Theorem 4.6 this ascending chain stabilizes.
Corollary 4.9. Using the notation of Theorem 4.6 and assume further that I satisfies the condition
of Proposition 4.7. If the perfect closure of the generic fiber of f : X −→ V is strongly F -regular,
i.e. τ (Rk(V ∞ ) , ψ∞ I∞ ) = Rk(V ∞ ) , then there exists an open subset U ⊆ V such that (Xs , ψs ) is also
strongly F -regular for each perfect point s ∈ U .
Proof. It follows immediately from the proof of Proposition 3.3 and Corollary 4.8.
32
ZSOLT PATAKFALVI, KARL SCHWEDE, AND WENLIANG ZHANG
4.10. Relative test ideals vs absolute test ideals. We make the following assumption.
Convention 4.11. For the rest of Section 4.10, we assume that V is regular and F -finite.
It is natural to try to relate the relative test ideal τn (X/V, ϕI) with the absolute test ideal
τ (XV ne , γ n ) as in Section 3.11. Indeed, if we construct I as we did in the proof of Proposition 4.7
then it follows easily that I · RA1/pne ⊆ τ (XV ne , γ n ). Thus fix such an I.
We now recall the following diagram from Lemma 3.13
L
pne −1
pe −1
1/pne
⊗A1/pne
pne −1 1/p(n+n)e
M pe −1
γ′
µn
L
pne −1
pe −1
p(n−1)e −1 1/p(n−1)e
⊗
L pe −1
A1/pke
denote the extension of I 1/p
µj ’s domain) back onto I
We then observe that:
1/pje
M
p(n−1)e −1
pe −1
A1/p
(n−1)e
1/p(n+n−1)e
A1/p
ne
γ n−1
ϕn−1 ⊗...
RA1/pne
γn
We let I
µn−1
p(n−1)e −1 1/p(n−1)e
⊗
L pe −1
1/pne
ϕn
1/pje
(n−1)e
A1/p
je
to R
1/pje
A1/pke
. Then notice that µj sends I
1/pje
A1/p
(j+n)e
(times
since each µj is surjective.
Lemma 4.12. With notation as above and assuming Convention 4.11, then τn (X/V, ϕI) ⊆ τ (XV ne , γ).
Proof. We know τn (X/V, ϕI) is the sum
!
n
pje −1 1/pje
X
ne
1/pje
1/pne
j
1/p
e
· L p −1
I
ϕ ⊗A1/pje A
(4.12.1)
⊗A1/pje A
j=0
On the other hand, τ (X, γ) is the sum
∞
pje −1 1/p(j+n)e
pje −1 1/pje
X
1/pje
⊗A1/pje M pe −1
γ j I 1/p(j+n)e · L pe −1
(4.12.2)
j=0
A
By our above observations about the surjectivities of the µj above, the sum of the 0th through jth
terms of (4.12.2) is equal to the sum (4.12.1). The result follows.
Additionally, at least over an open subset of the base, we actually have that the relative test
ideal and absolute test ideal agree, cf. Theorem 3.14.
Theorem 4.13. With notation as above and assuming Convention 4.11, choose n > t = nτ (ϕI),k(V ) .
Then there exists a dense open set U ⊆ V ∼
= V e with W = f −1 (U ) ⊆ X such that τ (XV 1/pne , γ)|W =
τn (X/V, ϕI)|W . Furthermore, shrinking U further if necessary and possibly increasing n, we can
require for all perfect points u ∈ U , that
τ (XV 1/pne , γ) · OXu = τn (Xu /u, ϕu Iu ) = τ (Xu , ψu ).
where again ψu is ϕu viewed as a p−e -linear map.
Proof. First we observe that by taking U as in (4.1.1), we can assume that bn−1,n = bn,n . But by
the diagram above, we see that the n − 1st partial sum defining τ (XV 1/pne , γ) in (4.12.2) is equal
to bn−1,n . Likewise the nth partial sum is equal to bn,n . However, once two adjacent partial sums
defining τ (XV 1/pne , γ) coincide, the sum stabilizes for further powers by the computation we made
when defining the b∞
n in (4.0.1). The second statement follows from the first statement and from
Theorem 4.5, cf. the argument of Corollary 4.8.
When dealing with relatively non-F -pure ideals σ, we actually obtained the above restriction
theorem without shrinking X to U in Theorem 3.23. The difference is that for σ we have the easy
F -SINGULARITIES IN FAMILIES
33
containment σ(XV 1/pne , γ n ) ⊆ σn (X/V, ϕ) by Lemma 3.13. For τ however, the easy containment is
reversed. This leads us to the following question:
Question 4.14. Is it true that τ (XV 1/pne , γ) · OXsne = τ (Xs , ψs ) for all perfect points s ∈ V at least
when n ≫ 0?
Rephrasing Theorem 4.13 for divisors we obtain:
Corollary 4.15. Suppose that f : X −→ V is a flat finite map to an excellent regular scheme V .
Additionally suppose that f is relatively G1 and S2 and I is chosen as in Proposition 4.7. Choose
∆ satisfying conditions (a)–(d) of Remark 2.11. Then there exists an open dense set U ⊆ V such
that
τ (XV 1/pne , ∆) · OX 1/pne = τ (Xu , ∆|Xu )
u
for all perfect points u ∈ U .
e
→ RA1/pe .
Proof. Using Lemma 2.24 and Lemma 3.16, we see that ∆ corresponds to some ϕ : L1/p −
Thus we simply apply Corollary 2.22 and Theorem 4.13.
4.16. Applications to strong F -regularity and divisor pairs.
e
→ OX = R) is called strongly F -regular if
Definition 4.17. Recall that a pair (X, ψ : L1/p −
e
→ RA1/pe ) and some I ⊆ R satisfying the condition of
τ (X, ψ) = OX . Given (X/S, ϕ : L1/p −
Proposition 4.7, we say that (X/S, ϕI) is relatively strongly F -regular if we have τn (X/S, ϕI) =
RA1/pne for some n > 0 (equivalently, all n ≫ 0 since the τn ascend), cf. [Has10].
Remark 4.18. Suppose that S is a point and I is chosen as in Proposition 4.7, then (X/S, ϕI) is
relatively strongly F -regular if and only if it is geometrically strongly F -regular (i.e., (Xt , γt ) is
strongly F -regular for every point t −
→ S). The argument is the same as in Remark 3.29
The same ideas imply the strongly F -regular locus of a proper map is open.
Corollary 4.19 (Openness of the strongly F -regular locus). With notation as before, assume
additionally that f : X −→ V is proper and that I satisfies the condition of Proposition 4.7. Assume
that s ∈ V is a point and that (Xs /s, ϕs Is ) is relatively strongly F -regular (for example, if s is a
perfect point, this just means it is strongly F -regular and is independent of I). Then there exists a
dense open set U ⊆ V containing s such that (Xu /u, ϕu Iu ) is relatively strongly F -regular for all
u ∈ U (in particular, (Xu , ϕu ) is strongly F -regular for all perfect points u ∈ U ).
Proof. Choose n ≫ 0 such that τn (Xs /s, ϕs Is ) = RO1/pne since (Xs /s, ϕs Is ) is strongly F -regular.
s
By Theorem 4.6, we know that τn (X/V, ϕI) = RA1/pne in a neighborhood W ⊆ X of Xs . Let
Z = X \ W ⊆ X be the complement of that neighborhood. Since f is proper, f (Z) is closed,
and also doesn’t contain s. Set U = V \ f (Z). Then τn (XU /U, ϕU I|U ) = RO1/pne . It follows from
U
Theorem 4.6 that all the fibers (Xu /u, ϕu Iu ) are relatively strongly F -regular as desired.
At least for proper maps, we also obtain that the definition of relative strongly F -regularity
Definition 4.17 is independent of the choice of I.
Lemma 4.20. Suppose that f : X −→ V is proper and that (X/V, ϕI) is relatively strongly F regular for some I satisfying the condition of Proposition 4.7. Then for all J ⊆ R such that Js
is non-zero on every component of every fiber Xs , we have that τn (X/S, ϕJ) = RA1/pne for some
n > 0 (equivalently, all n ≫ 0).
In particular in Definition 4.17, it would be equivalent to require τn (X/S, ϕJ) = RA1/pne for all
such J and some n.
34
ZSOLT PATAKFALVI, KARL SCHWEDE, AND WENLIANG ZHANG
Proof. Choose a closed point s ∈ V and a perfect extension K ⊇ k(s). Then τm (XK /K, ϕK IK ) =
RK 1/pne for some m > 0 by Theorem 4.6. But since K is a perfect field extension, this implies that
τm (XK , ψK IK ) = RK 1/pme as well. On the other hand, since (XK , ψK ) is strongly F -regular, we
see that τn (XK /K, ϕK JK ) = RK 1/pne for some n > 0. Hence since k(s) ⊆ K is faithfully flat, we
see that τn (Xs /s, ϕs Js ) = Rk(s)1/pne . But then since τn (X/V, ϕJ) restricts to τn (Xs /s, ϕs Js ) we
observe that τn (X/V, ϕJ) = RA1/pne at least in a neighborhood of s using that f is proper and the
same argument we made in Corollary 4.19. But we can find such an n for every s ∈ V , and so the
lemma holds by the quasi-compactness of V .
We now state our result in the divisorial case.
Corollary 4.21. With notation as above, suppose that f : X −→ V is a proper map and that ∆
is a Q-divisor satisfying conditions (a)–(d)8 of Remark 2.11. Additionally suppose that for some
perfect point s ∈ V , the fiber (Xs , ∆|Xs ) is strongly F -regular. Then there exists a dense open set
U ⊆ V containing s such that (Xu , ∆|Xu ) is strongly F -regular for all perfect u ∈ U .
e
→ RA1/pe corresponding
Proof. Using Remark 2.11 we construct a relatively divisorial ϕ : L1/p −
to ∆. Choose now I satisfying the condition of Proposition 4.7. It follows that (Xs , ψs ) is strongly
F -regular and hence that (Xs /s, ϕs Is ) is relatively strongly F -regular since s is a perfect point.
Then Corollary 4.19 and Corollary 2.22 complete the proof.
By a perturbation trick we can also handle the case that the index of KX + ∆ is divisible by
p > 0, at least over curves.
Corollary 4.22. With notation as above, suppose that f : X −→ V is a projective map to a regular
1-dimensional base, and that ∆ is a Q-divisor satisfying the following 4 conditions:
1
D for some Weil divisor D.
(a′ ) ∆′ = m
(b) D is a Weil divisor on X which is Cartier in codimension 1 and Cartier at every codimension
1 point of every fiber.
(c) D is trivial along the codimension-1 components of the non-smooth locus of X −→ V and
the codimension-1 components of
∗∗the non-smooth locus of every fiber.
l
is a line bundle.
(d′ ) l/m ∈ Z and ωX/V
⊗ OX (l∆′ )
Additionally suppose that for some perfect point s ∈ V , the fiber (Xs , ∆|Xs ) is strongly F -regular.
Then there exists a dense open set U ⊆ V containing s such that (Xu , ∆|Xu ) is strongly F -regular
for all perfect u ∈ U .
Proof. We may certainly suppose that V is affine. Since the fiber Xs is normal, and hence geometrically normal, we may also assume that the nearby fibers satisfy the same condition (using that
f is proper). Thus we may assume that all the fibers are geometrically normal and in fact that
the map f : X −
→ V is geometrically integral. Without loss of generality, by base change we can
assume that V is normal and hence X is normal itself. Thus we may assume that X is normal.
Now, since the base is 1-dimensional, we claim that can assume that KX/V doesn’t contain any
fiber. The only fiber we must worry about is Xs (as the others can be handled by shrinking V ).
We argue as follows: note first that KX/V can be viewed as an honest Weil divisor since we already
assumed that X is normal. On the other hand, each fiber is a Cartier divisor. Hence, if KX/V is
non-trivial along the generic point of Xs , by twisting by the pullback of s, we can assume that
KX/V does not contain Xs .
Write l∆′ = cpe0 ∆′ where p does not divide c. Let E be an effective Cartier divisor on X not
containing any fiber such that KX/V + E is effective. We also observe that KX/V + E satisfies
8For example, these conditions hold if V is regular, f : X −
→ V is geometrically normal, KX + ∆ is Q-Cartier
with index not divisible by p and ∆ does not contain any fiber of f in its support.
F -SINGULARITIES IN FAMILIES
conditions (b) and (c) above. Let Γ =
E+KX/V +∆′
pe −1
35
for some e ≫ e0 . Then consider
∆ := ∆′ + Γ.
Note that
c(pe − 1)(KX/V + ∆)
= c(pe − 1)(KX/V + ∆′ + Γ)
= c(pe − 1)(KX/V + ∆′ ) + c(E + KX/V + ∆′ )
= cpe (KX/V + ∆′ ) + cE
which is certainly Cartier. Hence KX/V + ∆ satisfies conditions (a)–(d) from Remark 2.11. On the
other hand, since e ≫ 0, we know that (Xs , ∆|Xs ) = (Xs , ∆′ |Xs + Γ|Xs ) is still strongly F -regular
and so by Corollary 4.21 there exists an open set U such that (Xu , ∆|Xu ) is strongly F -regular for
all u ∈ U . But ∆ ≥ ∆′ and so the result follows for ∆′ as well.
Remark 4.23. In the case of a normal X and in the non-relative case, we know that τ (X; ∆) =
τ (ωX , KX + ∆). Furthermore, we then know that
Tre (F∗e τ (ωX , KX + ∆)) = τ (ωX ,
1
1
(KX + ∆)) = τ (X, e (KX + ∆) − KX ).
e
p
p
Reversing this process gives us a nice means to compute τ (X, ∆) when the index of KX + ∆ is
divisible by p. It would be natural try to prove a relative version of this, which may yield a suitable
definition of relative test ideals for KX + ∆ of any index. We won’t attempt this here.
5. Relative test submodules, F -rationality and F -injectivity
Our goal in this (somewhat shorter) section is to explore relative test submodules and non-F injective modules. Throughout this section, we assume that f : X −
→ V is a Cohen-Macaulay
morphism. This provides us with base change for relative canonical sheaves ωX/V [Con00].
We first define relative non-F -injective modules σn (X/V, ωX/V ) and relative test submodules
τn (X/V, ωX/V ). Recall the trace map, Lemma 2.18
n
ne
1/p
→ ωXV n /V n ∼
ΦX/V,n : ωX/V = ωX n /V n −
= ωX/V ⊗A A1/p .
Here the final isomorphism follows from [Con00, Theorem 3.6.1] since f is a Cohen-Macaulay
morphism. We will form σ and τ relative to these maps, instead of relative to the map ϕ discussed
previously. One key point to remember is that by Lemma 2.18, the map ΦX/V,n is compatible with
arbitrary base change (since in this section, f is a Cohen-Macaulay morphism). We also observe
that the composition of trace maps
1/pm−n
(5.0.1)
ΦX/V,m−n
ωX m /V m −−−−−−→ ω
XVn m /V m
ΦX/V,n ⊗A1/pn A1/p
m
m
−−−−−−−−−−−−−→ ωX/V ⊗A A1/p ∼
= ωXV m /V m .
can be identified with ΦX/V,m .
5.1. The definition and basic properties of σn (X/V, ωX/V ). For each integer n > 0, define
n
cn := Im(ΦX/V,n ) ⊆ ωXV n /V n ∼
= ωX/V ⊗A A1/p . Furthermore, for each m ≥ n, using the factorization in (5.0.1) it is easy to see that
m
→ ωR 1/pm
(5.1.2)
cm ⊆ Im cn ⊗A1/pn A1/p −
A
just as we observed in Section 3.
Definition 5.2. With notation as above, we define the nth relative non-F -injective submodule,
denoted σn (X/V, ωX/V ) to be cn ⊆ ωXV n /V n .
36
ZSOLT PATAKFALVI, KARL SCHWEDE, AND WENLIANG ZHANG
As before, we will prove a stabilization statement for cn and cm , in particular that the containment
(5.1.2) is an equality for all m > n ≫ 0. By base changing with k(V ∞ ), the perfection of the residue
field of the generic point of V , we can again find an integer n0 > 0 and an open set U ⊆ V such
that
n0 +1
cn0 +1 |f −1 U = Im cn0 ⊗A1/pn0 A1/p
−
→ ωR 1/pn0 +1 |f −1 U .
A
Again observe that for
U inside the regular locus of V , we can identify the image above with
n
n +1
m
cn0 ⊗A1/pn0 A1/p 0 |U by the flatness of A1/p over A1/p . We then obtain:
Proposition 5.3. Fix notation as above. For every integer n ≥ n0 , there exists a nonempty open
subset Un ⊆ V of the base scheme V satisfying the following condition. If one sets Xn = f −1 (Un ),
then we have that for every m ≥ n
m
(5.3.1)
σm (X/V, ωX/V )|Xn = Im σn (X/V, ωR/A ) · OXn ⊗A1/pn A1/p −→ ωR 1/pm .
A
Furthermore we may assume that Un0 ⊆ Un0 +1 ⊆ · · · ⊆ Un ⊆ Un+1 ⊆ · · · form an ascending chain
of open sets.
Proof. The proof is identical to that of Proposition 3.3 and so we omit it.
We now point out that relative non-F -injective modules behave well with respect to base change.
Recall that if g : T −
→ V is a map, then qn : XT n −
→ XV n is the induced map.
Proposition 5.4 (Base change for σn (X/V, ωX/V )). Suppose that g : T −→ V is a map from an
excellent scheme with a dualizing complex, then using the notation of Section 2.16
Im (qn )∗ σn (X/V, ωX/V ) → ωXT n /T n = σn (XT /T, ωXT /T ).
Furthermore, if U = Un satisfies condition (5.3.1) from Proposition 5.3, then W = g−1 (U ) ⊆ T
satisfies the same condition for σn (XT /T, ωXT /T ).
Proof. The first statement is an immediate consequence of base change relative canonical sheaves
n+1
and ΦX/V,n+1 have the same image
and trace Lemma 2.18. For the second, if ΦX/V,n ⊗A1/pn A1/p
in ωXV n /V n , then its easy to see that the base changed maps also have the same images.
Tre
Recall for any F -finite scheme Y with canonical module ωY , then σ(ωY ) is equal to ℑ(F∗e ωY −−→
ωY ) for any e ≫ 0.
Corollary 5.5 (Restriction theorem for σn (X/V, ωX/V )). With notation as above, there exists an
integer N > 0 such that for every perfect point s ∈ V , we have
ne
σ(ωXs ) = Im σn (X/V, ωX/V ) ⊗A1/pne k(s)1/p −→ ωXs /s .
for all n > N .
Proof. Taking g : s −
→ V in the previous theorem and so obtain that the image is equal to
σn (Xs /s, ωXs /s ). Furthermore, since k(s) is perfect, we have containments . . . ⊇ σn (Xs /s, ωXs /s ) ⊇
σn+1 (Xs /s, ωXs /s ) ⊇ . . . with a descending intersection that coincides with σ(ωXs ). Furthermore,
by Proposition 5.4, over a dense open set U ⊆ V and some N > 0 we have σn (Xs /s, ωXs /s ) =
σn+1 (Xs /s, ωXs /s ) and hence σn (Xs /s, ωXs /s ) = σ(ωXs ) by the construction of σ(ωXs ) for all n ≥
N0 . Let V1 = V \ U , base change with V1 and obtain the result over a dense open subset U1 of V1
(for some N1 ). By Noetherian induction, this process terminates.
F -SINGULARITIES IN FAMILIES
37
5.6. The definition and basic properties of τn (X/V, ωX/V ). The goal of this section is to
develop the basics of a relative theory of test submodules. We fix the notation of the previous
sections and additionally assume that X is geometrically normal over V which we now also assume
is regular. We let J = JX/V ⊆ R be the Jacobian ideal sheaf of X over V . We observe that the
formation of JX/V commutes with base change in the following sense: for any T −
→ V , we have
JX/V · OXT = JXT /T . To see this, just note that JX/V can be defined as a Fitting ideal of ΩX/V
([HS06, Discussion 4.4.7]) and that the formation of ΩX/V ([Eis95, Proposition 16.4]) and Fitting
ideals ([HS06, Discussion 4.4.7]) commutes with arbitrary base change. Note that J is nonzero at
any generic point of X since X is geometrically reduced. Furthermore, on every perfect fiber, the
Jacobian ideal is contained in the (big) test ideal [Hoc07, Theorem on Page 213].
We have the images
→ ωR 1/p /A1/p + ΦX/V,1 ((J · ωR )1/p ) ⊆ ωR 1/p ,
d1 := Im J · ωR 1/p /A1/p −
A
A
A
P2
2
i
1/p
1/p
−
→ ωR 1/p2 ⊆ ωR 1/p2 ,
) ⊗A1/pi A
d2 :=
i=0 Im (ΦX/V,i (J · ωR/A )
A
A
...
Pn
1/pn −
1/pi ) ⊗
→
ω
⊆ ωR 1/pn ,
dn :=
Im
(Φ
(J
·
ω
)
i A
R
n
1/p
X/V,i
R/A
i=0
1/p
A
A
A
...
2
→ ωR 1/p2 ⊆ d2 and more generally for j > i that
Notice that d1,2 := Im d1 ⊗A1/p A1/p −
A
j
1/p
−
→ ωR 1/pn ⊆ dj .
di,j := Im di ⊗A1/pi A
A
By the same argument as in Section 3, we know that there exists an open set U ⊆ V with
(t+1)e
−
→ ωR 1/pt+1 |W = dt+1 |W .
W = f −1 (U ) such that Im dt ⊗A1/pte A1/p
A
Lemma 5.7. With notation as above, Im dn ⊗A1/pne A1/p
all n > t.
(n+1)e
−→ ωR
(n+1)e
A1/p
|W = dn+1 |W for
Proof. The proof is the same as the proof of Lemma 4.2 and so we omit it.
Definition 5.8 (Relative test submodules). With notation as above (in particular, ωX/V is still
compatible with base change), we define the nth iterated relative test submodule to be dn and denote
it by τn (X/V, ωX/V ).
We now discuss base change for relative test ideals.
Proposition 5.9 (Base change for τn (X/V, ωX/V )). Suppose that g : T −→ V is a map from a
excellent scheme with a dualizing complex, then using the notation of Section 2.16
Im (qn )∗ τn (X/V, ωX/V ) → ωXT n /T n = τn (XT /T, ωX/T ).
Furthermore, if U = Un satisfies condition from Lemma 5.7, then Y = g −1 (U ) ⊆ T satisfies the
same condition for τn (XT /T, ωXT /T ).
Proof. It is just as before since ωX/V and J are compatible with arbitrary base change.
Corollary 5.10 (Restriction theorem for τn (X/V, ωX/V )). With notation as above, there exists an
integer N > 0 such that for every perfect point s ∈ V , we have
ne
Im τn (X/V, ωX/V ) ⊗A1/pne k(s)1/p −→ ωXs /s = τ (ωXs ).
for all n > N .
38
ZSOLT PATAKFALVI, KARL SCHWEDE, AND WENLIANG ZHANG
Proof. Taking g : s −
→ V in Proposition 5.9 and so obtain that the image is equal to τn (Xs /s, ωXs /s ).
Furthermore, since k(s) is perfect, we can make identifications so as to have containments . . . ⊆
τn (Xs /s, ωXs /s ) ⊆ τn+1 (Xs /s, ωXs /s ) ⊆ . . . with a ascending union that coincides with τ (ωXs ). Furthermore, by Proposition 5.4, over a dense open set U ⊆ V and some N > 0 we have τn (Xs /s, ωXs /s ) =
τn+1 (Xs /s, ωXs /s ) for all n ≥ N0 and hence τn (Xs /s, ωXs /s ) = τ (ωXs ) by the computation of (4.0.1).
Let V1 = V \ U , base change with V1 and obtain the result over a dense open subset U1 of V1 (for
some N1 ). By Noetherian induction, this process must terminate.
Remark 5.11 (Relative versus absolute τ (ω)). It would be natural to relate the relative σ(ω) and
τ (ω) with the absolute σ(ω) and τ (ω). While the authors believe that this is possible along the
lines of Section 3.11 or Section 4.10, we won’t work out the details here.
5.12. Applications to families of F -injective and F -rational singularities. In this section,
we obtain new proofs of results of M. Hashimoto [Has01], deformation of F -injectivity and F rationality in proper flat families. Note Hashimoto proved the local version of these results (and in
the F -rationality case, over a variety). However, the local results generalize to the non-local case
via straightforward computations. We begin with a definition essentially first made by Hashimoto.
Definition 5.13 (cf. [Has01, Has10]). We say that X/V (which is still assumed to be relatively
Cohen-Macaulay) is relatively F -injective if for some n > 0 we have σn (X/V, ωX/V ) = ωXV n /V n .
Likewise, X/V is relatively F -rational if for some n > 0 we have τn (X/V, ωX/V ) = ωXV n /V n .
Remark 5.14. If V is the spectrum of a perfect field k, it is easy to see that f : X −
→ V is
relatively F -injective (respectively relatively F -rational) if and only if X is F -injective (respectively
F -rational) in the usual sense [ST12, Section 8] via an identification of k ∼
= k1/p . Note we are
implicitly assuming that X is Cohen-Macaulay in this case.
Lemma 5.15. (cf. [Has01, Proposition 5.5]) With notation as above, if σn (X/V, ωX/V ) = ωXV n /V n
for some n > 0, then σm (X/V, ωX/V ) = ωXV m /V m for all m > 0 divisible by n. Furthermore, if V
is regular, then the result holds for all m ≥ n. Additionally, if τn (X/V, ωX/V ) = ωXV n /V n for some
n > 0, then τm (X/V, ωX/V ) = ωXV m /V m for all m ≫ 0.
Proof. We begin with σ. We notice that
2n
→ ωXV 2n /V 2n
σ2n (X/V, ωX/V ) = Im Im ωX n /V n −
→ ωXVn /V n ⊗A1/pn A1/p −
and our hypothesis σn (X/V, ωX/V ) = ωXV n /V n implies that the inner map is surjective. But then
the outer map is surjective too by right exactness of tensor and so σ2n (X/V, ωX/V ) = ωXV 2n /V 2n .
The general case repeats this process and so follows similarly.
Now we assume that V is regular for the second statement about σn . We fix an n > 0 such that
σn (X/V, ωX/V ) = ωXV n /V n . Then for all m ≤ n, we have
n
n
σm (X/V, ωX/V ) ⊗A1/pm A1/p ⊇ σn (X/V, ωX/V ) = ωXV n /V n ∼
= ωXV m /V m ⊗A1/pm A1/p
n
n
and so σm (X/V, ωX/V ) ⊗A1/pm A1/p = ωXV m /V m ⊗A1/pm A1/p . On the other hand, if we know
n
σm (X/V, ωX/V ) ( ωXV m /V m then the previous equality is impossible since A1/p faithfully flat over
A [Kun69] (since V is regular).
Handling τ is easy. Again use that ωX/V is compatible with base change, since
m
→ ωXVm /V m
ωXVm /V m = Im ωX/V ⊗A1/pn A1/p −
m
→ ωXVm /V m
= Im τn (X/V, ωX/V ) ⊗A1/pn A1/p −
= dn,m
⊆ dm
= τn (X/V, ωX/V )
⊆ ωXVm /V m
F -SINGULARITIES IN FAMILIES
39
Theorem 5.16. (Deformation of F -rationality and F -injectivity, cf. [Has01, Theorem 5.8, Remark
6.7]) Suppose that f : X −→ V is a proper flat finite type equidimensional reduced Cohen-Macaulay
morphism to an excellent integral scheme V with a dualizing complex. Suppose that for some point
s ∈ V , the fiber Xs /s is relatively F -injective (respectively, F -rational). Then there exists an open
neighborhood U ⊆ V containing s such that Xu −→ u is relatively F -injective (respectively, F rational) for all u ∈ U .
Proof. We first show that σn (ωX/V ) = ωXV ne /V ne at each point of the fiber Xs . Indeed, let z ∈ X
be a point on Xs and let I denote the ideal sheaf of Xs . We observe that for some n, the natural
map σn (ωX/V )/(I · σn (ωX/V )) −
→ ωX/V /(I · ωX/V ) = ωXs /Vs is surjective. This is preserved after
localizing at z, and so since I ⊆ mz , we see that the generators of the stalk (σn (ωX/V ))z generate
(ωX/V )z by Nakayama’s lemma. Hence (σn (ωX/V ))z = (ωX/V )z . Since this holds at every point
z ∈ Xs ⊆ X, it holds in a neighborhood of Xs .
As before, let Z denote the locus where σn (ωX/V ) 6= ωXV ne /V ne . This is closed and since f is
proper, its image f (Z) is closed too. But f (Z) is then a closed set not containing s. The result
follows for F -injectivity. The proof for F -rationality is the same.
6. Global applications
The purpose of this section is to develop a global theory of the previous sections for a projective
family f : X −
→ V . In the last few years, there has been a new push to use Frobenius and the
trace map to replace the Kodaira vanishing theorem. In this section we extend some of these ideas
to families. We study how the canonical linear subsystems S 0 (Xs , σ(Xs , ∆s ) ⊗ Ms ) ⊆ H 0 (Xs , Ms ),
introduced in [Sch11a], behave as we vary s ∈ V . Furthermore, as mentioned in the introduction
we also obtain some global generation and semi-positivity statements.
6.1. Basic definitions. We use the following setup throughout Section 6.
→ V is projective and
Notation 6.1. In the situation of Notation 2.1, assume also that f : X −
additionally that V is regular (which implies that FVe : V e −
→ V is flat). Furthermore, fix a line
bundle M on X. Sometimes we also assume the following (in which case we write Notation 6.1* ):
(*): there is an integer N ≥ 0, such that for every integer m ≥ N ,
σm (X/V, ϕ) = σN (X/V, ϕ) ⊗
1
A
1
pNe
A pme .
In this situation we denote σN (X/V, ϕ) by σN . We notice that this condition (*) always holds over
a dense open set of the base by Proposition 3.3.
Remark 6.2. Note that since X (resp. V ) is topologically isomorphic to XVneme (resp. V me ) for every
→ V me .
m ≥ n, f∗ can be identified with g∗ , where g is any of the induced morphisms XVneme −
ne
→ V me
Hence, we use only f∗ for all purposes, even when g∗ for one of the above maps g : XV me −
would be more natural. The downside of this notation is that it does not show if a sheaf has a
me
A1/p structure, and consequently its pushforward by f a OV me structure. We decided to still use
it, because it simplifies greatly the notations.
Summarizing: when reading the following arguments it is important to trace through the space
XVneme on which the adequate sheaves live. Then f∗ of these sheaves will live on V me .
Notation 6.3. When dealing with sheaves G on V ne , we will frequently pull them back to V me
1/pme
⊗O1/pne G, we will write
for m ≥ n. When doing this, instead of writing OV me ⊗OV ne G or OV
V
me
simply V
×V ne G or GV me . We trust this abuse of notation will cause no confusion, as it helps
compactify the notation substantially.
40
ZSOLT PATAKFALVI, KARL SCHWEDE, AND WENLIANG ZHANG
Our approach to understanding how the canonical linear systems of [Sch11a] behave in families
is to define a relative version of them, and then show certain base-change properties. These objects
will be relative versions of σ for global sections, and they play the same role for σn that T 0 and S 0
plays for τ and σ in [BST11] and [Sch11a] respectively.
Definition 6.4. In the situation of Notation 6.1, define
Sϕ0 n f∗ (M )
:= im f∗
L
pne −1
pe −1
1
pne
⊗R M
!
!
1
ne
.
−−−−−−−−−→ f∗ A p ⊗A M
f∗ (ϕn ⊗R idM )
Note that Sϕ0 n f∗ (M ) is a sheaf on V ne and it is a subsheaf of (f∗ (M ))V ne by flat base-change. In
0
case (X, ∆) is a pair we define S∆,ne
f∗ (M ) := Sϕ0 n f∗ (M ) (assuming (pne − 1)(KX + ∆) is Cartier
∆
0 f (M ) for S 0
and ϕ is the corresponding map). If ∆ = 0, then we write Sne
∗
∆,ne f∗ (M ).
Since the image of ϕn ⊗R idM in the above definition is σn (X/V, ϕ)⊗R M the following proposition
is immediate.
Proposition 6.5. In the situation of Notation 6.1,
Sϕ0 n f∗ (M ) ⊆ f∗ (σn (X/V, ϕ) ⊗R M ).
Our first goal is to show that the images in Definition 6.4 descend (up to appropriate base change
by Frobenius). Compare with the containments ai,n ⊇ ai+1,n ⊇ · · · ⊇ an,n of Section 3.
Proposition 6.6. For all integers m ≥ n ≥ 0,
(6.6.1)
V me ×V ne Sϕ0 n f∗ (M ) ⊇ Sϕ0 m f∗ (M )
as subsheaves of V me ×V f∗ (M ).
Remark 6.7. To be precise the left and right hand side of (6.6.1) are subsheaves of
1
1
V me ×V ne f∗ (A pne ⊗A M ) and of f∗ (A pme ⊗A M ),
1
1
respectively. However, both V me ×V ne f∗ (A pne ⊗A M ) and f∗ (A pme ⊗A M ) are canonically isomorphic
to V me ×V f∗ (M ) via flat base-change (since V is regular).
F -SINGULARITIES IN FAMILIES
41
Proof of Proposition 6.6. The following commutative diagram shows that f∗ (ϕm ⊗R idM ) factors
through V me ×V ne f∗ (ϕn ⊗R idM ).
V me ×V ne f∗
L
pne −1
pe −1
1
pne
⊗R M
!
V me ×V ne f∗ (ϕn ⊗R idM )
∼
=
1
f∗ A pme ⊗
A
1
pne
1
f∗ A pme ⊗
A
1
pne
(ϕn ⊗R idM )
1
1
/ f∗ A pme ⊗A M
R
A
1
p(m−n)e
⊗R L
O
pne −1
pe −1
1
pne
⊗R M
f∗ ϕm−n ⊗R id
!
pne −1
e
L p −1
/ f∗ A pme ⊗A M
O
!
1
pne
⊗R idM
1
! pne
1
(m−n)e (m−n)e
ne −1
p
p
−1
p
⊗R L pe −1
⊗R M
f∗
L pe −1
=
∼
=
f∗
flat basechange
∼
=
flat base-change [Har77,
Proposition III.9.3] of f∗
by V me −→ V ne
!
1
ne ne
p
p −1
L pe −1
⊗R M
1
/ V me ×V ne f∗ A pne ⊗A M
f∗ (ϕm ⊗R idM )
∼
=
projection formula
f∗
L
pme −1
pe −1
1
pme
⊗R M
!
BC
Hence, the statement of the proposition holds by the following computation.
Sϕ0 m f∗ (M ) = im (f∗ (ϕm ⊗R idM ))
⊆ im (V me ×V ne f∗ (ϕn ⊗R idM ))
= V me ×V ne im (f∗ (ϕn ⊗R idM )) .
|
{z
}
=V
V ne −→ V me is flat
me
×V ne Sϕ0 n f∗ (M )
6.2. Auxiliary definition and stabilization. We would now like to obtain a global result similar
to Proposition 3.3. In particular, we’d like the containments of Proposition 6.6 to be equality over
a dense open subset subset of the base V . There is a complicating factor however, while we can
still find an open set U of V such that
V (n+1)e ×V ne Sϕ0 n f∗ (M )
= Sϕ0 n+1 f∗ (M )
U
U
we do not see how to use this to show that we have the n + 1 to n + 2 equality without additional
assumptions. The issue is that in the proof of Proposition 3.3, twisting by line bundles is exact.
For Sϕ0 n however we also push forward. Therefore, in order to obtain our stabilization over a dense
open set of the base we need additional positivity assumptions on M and L.
42
ZSOLT PATAKFALVI, KARL SCHWEDE, AND WENLIANG ZHANG
Furthermore, we need an auxiliary version of Sϕ0 which involves the σN := σN (X/V, ϕ) from
pme −1
Notation 6.1*. To do this, first observe that since f is flat, the tensor product L pe −1 ⊗R σN is
pme −1
pme −1
Ne
naturally identified with a subsheaf of L pe −1 ⊗R RA1/pNe ∼
= L pe −1 ⊗A A1/p . In order to motivate
this auxiliary definition, we make the following observation:
Lemma 6.8. In the situation of Notation 6.1* , we have that the image of the natural map
1
1
me
me
me
me
(N+m)e
p
p
ϕm ⊗A1/pme A1/p
p
−1
p
−1
e −1
e −1
p
p
−−−−−−−−−−−−−−−→ RA1/p(N+m)e
⊗ R σN
⊗R RA1/pNe
֒→ L
αN +m : L
is equal to σN ⊗A1/pNe A1/p
(N+m)e
∼
= σm+N (X/V, ϕ).
pme −1
Proof. The first term is the image of the pme th root of L pe −1 ⊗R ϕN . Therefore the image of the
composition also equals σm+N (X/V, ϕ) by our construction of ϕj in Section 2.13.
This stabilization suggests it is reasonable to make the following definition.
Definition 6.9. In the situation of Notation 6.1* ,
!
1
me
me
1
p
p
−1
f∗ (αN+m ⊗R M )
pe −1 ⊗
p(n+N)e ⊗
Sϕ0 n ,σN f∗ (M ) := im
M
σ
f
⊗
M
L
−
−
−
−
−
−
−
−
−
−
→
f
A
A
R
N
∗
R
∗
where αN +m is as in Lemma 6.8.
Consider the following proposition relating the various S 0 f∗ objects so far described.
Proposition 6.10. In the situation of Notation 6.1* , for every integer m ≥ 0,
V (N +m)e ×V me Sϕ0 m f∗ (M ) ⊇ Sϕ0 m ,σN f∗ (M ) ⊇ Sϕ0 m+N f∗ (M )
(Here all sheaves are regarded as subsheaves of V (N +m)e ×V f∗ (M ) via flat base-change.)
Proof. This follows directly from the definitions. The first containment is trivial, and the second
follows from a factorization similar to the one from Proposition 6.6.
Proposition 6.11. In the situation of Notation 6.1* ,
(a) for all integers m ≥ n ≥ 0,
V (N +m)e ×V (N+n)e Sϕ0 n ,σN f∗ (M ) ⊇ Sϕ0 m ,σN f∗ (M ),
as subsheaves of V (N +m)e ×V f∗ (M ), and
e
(b) if furthermore L ⊗ M p −1 is f -ample, then there is an integer n > 0, such that for every
integer m ≥ n, the above inclusion is equality.
(c) if furthermore M = Ql ⊗ P , where Q is f -ample, then there is an integer l0 > 0, such that
for every integer l ≥ l0 , m ≥ n ≥ 0 and nef line bundle P the above inclusion is equality.
Proof. Define the coherent sheaf Bϕ on XV (N+1)e as the kernel of the top horizontal map in the
following commutative diagram.
(6.11.1)
Bϕ
1
/ (L ⊗R σN ) pe
OO
ϕ⊗
1
/ / A p(N+1)e ⊗ 1 σN
pNe
OO A
1
(idL ⊗R ϕN ) pe
1
1 ! pe
Ne Ne
p
−1
p
L ⊗ L pe −1
ϕN+1
∼
=
L
p(N+1)e −1
pe −1
1
p(N+1)e
F -SINGULARITIES IN FAMILIES
43
1
Note here we used that the image of ϕN +1 is A p(N+1)e ⊗
1
A pNe
σN by the assumptions made in
Notation 6.1* . Also, the horizontal arrow is surjective by either Lemma 6.8 or from the diagram
!
1
me
me
p
p
−1
(which is how we proved Lemma 6.8). Then one can apply f∗
L pe −1 ⊗R
⊗R M
to the top row of (6.11.1), which is shown in the following commutative diagram. We have also
included important isomorphisms to the different terms of the exact sequence.
f∗
L
pme −1
pe −1
⊗ R Bϕ
_
1
pme
⊗R M
f∗
L
pme −1
pe −1
⊗R (L ⊗ σN )
1
pe
1
pme
!
⊗R M
!
∼
=
f∗
L
p(m+1)e −1
pe −1
⊗ R σN
1
p(m+1)e
ν
f∗
L
pme −1
pe −1
⊗ R σN ⊗
1
A pNe
A
1
p(N+1)e
R1 f
f∗
L
pme −1
pe −1
∗
L
⊗ R σN
pme −1
pe −1
1
pme
⊗ R Bϕ
⊗
Ap
1
pme
1
(N+m)e
1
pme
k
⊗R M
A
⊗R M
!
!
1
p(N+m+1)e
∼
=
!s
⊗R M
!
∼
=
by flat base change
V
(N +m+1)e
×V (N+m)e f∗
V
(N +m+1)e
L
pme −1
pe −1
×V (N+m)e
⊗ R σN
1
pme
Sϕ0 m ,σN f∗ (M )
⊗R M
!
Sϕ0 m+1 ,σN f∗ (M )
o
Both V (N +m+1)e ×V (N+m)e Sϕ0 m ,σN f∗ (M ) and Sϕ0 m+1 ,σN f∗ (M ) can be regarded as subsheaves of
V (N +m+1)e ×V f∗ (M ) via flat base change. Furthermore, the bottom horizontal arrow becomes a
map of subsheaves, i.e., an injection, this way. This shows point (a).
e
To prove point (b), we are supposed to prove that whenever L ⊗ M p −1 is f -ample, this arrow
is also surjective for m ≫ 0. This would follow if the third vertical arrow (from above), labeled ν,
was surjective. Therefore, it is sufficient to show that for m ≫ 0,
0 = R 1 f∗
L
pme −1
pe −1
⊗ R Bϕ
1
pme
⊗R M
!
= R 1 f∗
= R 1 f∗
L
pme −1
pe −1
⊗ R Bϕ ⊗ R M
L⊗M
pe −1
−1
ppme
e −1
pme
1
pme
!
⊗ R Bϕ ⊗ R M
1
pme
!
.
⊗R M
!
44
ZSOLT PATAKFALVI, KARL SCHWEDE, AND WENLIANG ZHANG
1
Note that since applying ( ) pme does not change the sheaf of abelian groups structure, this is
equivalent to showing
pme −1
e
0 = R1 f∗ L ⊗ M p −1 pe −1 ⊗R Bϕ ⊗R M
−1
pme
e −1
1
p
e
⊗R
(Bϕ ⊗R M ) .
= R1 f∗ L ⊗ M p −1 ⊗A A pN+1
(N+1)e
A1/p
e
1
Furthermore, L ⊗ M p −1 ⊗A A pN+1 is a relatively ample line bundle by the assumption of point (b)
and Bϕ ⊗R M is a coherent sheaf on XV (N+1)e . Therefore, relative Serre vanishing concludes our
proof.
Point (c) follows immediately from the above argument. Indeed, if M = Ql ⊗ P , then by relative
Fujita vanishing [Kee03, Theorem 1.5] there is an integer l0 > 0, such that the above vanishing
holds for every m ≥ 0, l ≥ l0 and nef line bundle P .
e
Corollary 6.12. In the situation of Notation 6.1* , if L⊗M p −1 is f -ample, then there is an integer
n > 0, such that for every integer m ≥ n
= Sϕ0 m−N ,σN f∗ (M )
V me ×V ne Sϕ0 n f∗ (M ) = Sϕ0 m f∗ (M )
as subsheaves of V me ×V f∗ (M ). Furthermore in the situation of point (c) of Proposition 6.11 where
M = Ql ⊗ P = (ample)l ⊗(nef) with l ≫ 0, we can pick n = N .
Proof. By Proposition 6.10,
(6.12.1) V (m+2N )e ×V (m+N)e Sϕ0 m ,σN f∗ (M ) ⊇ V (m+2N )e ×V (m+N)e Sϕ0 m+N f∗ (M ) ⊇ Sϕ0 m+N ,σN f∗ (M ).
Furthermore, by Proposition 6.11.b, we know the statement holds when Sϕ0 m f∗ (M ) is replaced by
Sϕ0 m ,σN f∗ (M ). Hence the inclusion of the right end of (6.12.1) to the left end is an equality for m ≫ 0.
However, then all inclusions in (6.12.1) are equalities. In particular from the first equality of (6.12.1),
using that V (m+2N )e −
→ V (m+N )e is faithfully flat, we obtain that Sϕ0 m ,σN f∗ (M ) = Sϕm+N f∗ (M )
for m ≫ 0. Using Proposition 6.11.b once more concludes our proof of the main statement. The
final statement is similar.
We can now obtain our promised analog of Proposition 3.3.
e
Theorem 6.13. In the situation of Notation 6.1, if L ⊗ M p −1 is ample, there exists an integer
n0 and a dense open set U ⊆ V such that for all m ≥ n ≥ n0 we have that
V me ×V ne Sϕ0 n f∗ (M )
= Sϕ0 m f∗ (M )
.
U
U
Proof. By shrinking V and applying Proposition 3.3 we can reduce to the case of Notation 6.1* .
The result follows directly from Corollary 6.12.
Corollary 6.14. In the situation of Notation 6.1, there is a natural inclusion
Sϕ0 n f∗ (M ) ⊆ f∗ (σn (X/V, ϕ) ⊗R M ).
as subsheaves of V ne ×V f∗ (M ).
Further, in the situation of Notation 6.1* , if M = Ql ⊗ P where Q is f -ample, then there is
an integer l0 > 0, such that for every integer l ≥ l0 , n ≥ N and f -nef line bundle P , the above
inclusion is equality.
F -SINGULARITIES IN FAMILIES
45
Proof. Consider the surjection.
ξ:
L
pne −1
pe −1
1
pne
ϕn
/ / σn (X/V, ϕ)
Then Sϕ0 n f∗ (M ) = im f∗ (ξ ⊗R idM ), which is a subsheaf of f∗ (σn (X/V, ϕ) ⊗R M ).
We prove the addendum by induction on n. If n = N ,
Sϕ0 N f∗ (M ) = Sϕ0 0 ,σN f∗ (M ) = f∗ (σN ⊗R M ) .
{z
}
|
{z
} |
by Definition 6.9
by Corollary 6.12
Let us assume then that n > N . By flat base change and the assumption of Notation 6.1*
f∗ (σn (X/V ) ⊗R M ) = f∗ (σN (X/V ) ⊗R M ) ×V Ne V ne .
Hence, using the inductional hypothesis, it is enough to see that for every n ≥ N ,
Sϕ0 n f∗ (M ) = Sϕ0 n−1 f∗ (M ).
However, this follows from point (c) of Proposition 6.11 and Corollary 6.12
6.3. Base-change. We now prove base change for Sϕ0 n f∗ .
Notation 6.15. In the situation of Notation 6.1, choose
◦ T a regular integral excellent scheme with a dualizing complex.
◦ T −
→ V a morphism.
We indicate base-change via this morphism by T in subscript. Define the following sheaves on XT .
(a) B := (fT )−1 OT
(b) Q := OXT
1
→ X i.
Denote by (p1 ) pi the natural projection morphism X i ×V i T i −
e
Proposition 6.16. In the situation of Notation 6.15, if L ⊗ M p −1 is f -ample then for n ≫ 0 the
natural base change morphism
1
1
f∗ A pne ⊗A M ×V ne T ne −→ (fT )∗ B pne ⊗B MT
induces a surjective morphism on subsheaves
(6.16.1)
Sϕ0 n f∗ (M ) ×V ne T ne ։ Sϕ0 n (fT )∗ (MT ).
T
Furthermore,
(a) the lower bound on the n for which the above statement holds depends only on f and M . In
particular, it is independent of T .
(b) If M = Ql ⊗ P for some f -ample line bundle Q, nef line bundle P and integer l > 0, then
there is a uniform lower bound on n independent of l and P .
e
(c) Even if L ⊗ M p −1 is not assumed to be f -ample, (6.16.1) is an isomorphism if T −→ V is
flat.
(d) There is a dense open set U ⊆ V , such that if the image of T −→ V is contained in U , then
(6.16.1) is an isomorphism.
Proof of Proposition 6.16. First, note that
! ne 1
1
1 !
ne
∗ pne −1
∗ pne −1 pne
p −1
pne
p
1
1
ne
e
∼
⊗Q MT .
L pe −1 ⊗R M p
L pe −1
⊗R M ∼
(p1 ) pne
= (p1 ) pne
= LTp −1
46
ZSOLT PATAKFALVI, KARL SCHWEDE, AND WENLIANG ZHANG
Hence, there is a natural base-change morphism below in (6.16.2). We will show that it is an
isomorphism for n ≫ 0. Furthermore, this n can be chosen independently of T .
!
!!
1
1
ne ne
pne −1 pne
p
p −1
e −1
p
ne
e
(6.16.2)
f∗
L p −1
⊗Q MT
⊗R M
×V ne T −
→ (fT )∗
LT
Indeed by cohomology and base-change [Sta, Lemma 25.20.1] it is enough to show that for every
integer i > 0,
!
1
ne ne
p
p −1
i
e
R f∗
⊗R M = 0.
L p −1
Since V ne −
→ V is affine, this is equivalent to showing that for i > 0,
!
1
1 !
ne
ne
ne ne
p
p
p −1
p −1
ne
,
⊗R M = Ri (fV ne )∗
L pe −1 ⊗R M p
0 = Ri (fV ne )∗
L pe −1
which is further equivalent to showing that for i > 0,
ne
p −1
i
pne
e −1
p
(6.16.3)
0 = R f∗ L
⊗R M
.
However, the last vanishing holds for n ≫ 0 by relative Serre vanishing, independently of T . Hence
the base change homomorphism of (6.16.2) is isomorphism indeed for n ≫ 0, which can be chosen
independently of T . In particular, for n ≫ 0 there is a commutative base change diagram as follows,
which implies the statement of the proposition together with addendum (a).
(6.16.4)
f∗
L
pne −1
pe −1
1
pne
⊗R M
!
×V ne T ne
1
/ f∗ A pne ⊗A M
×V ne T ne
∼
=
(fT )∗
pne −1
pe −1
LT
1
pne
⊗Q MT
!
1
/ (fT ) B pne ⊗B MT
∗
→ V is flat, then both vertical morphisms in the above diagram
For addendum (c) note that if T −
e
are isomorphisms even if L ⊗ M p −1 is not assumed to be f -ample. Furthermore, images via flat
pullbacks are pullbacks of images, which concludes the proof of (c).
For addendum (b), note that if M = Ql ⊗ P for an f -ample line bundle Q and a nef line bundle
P , then (6.16.3) holds for every l > 0 uniformly, by relative Fujita vanishing [Kee03].
For addendum (d) note that by [Har77, Theorem 12.8 and Corollary 12.9] there is a dense open
set U ⊆ V (i.e., the open set where h0 (Xs , Ms ) is constant), such that if T maps into U then the
right vertical arrow in (6.16.4) is an isomorphism. In particular then the homomorphism (6.16.1)
is injective, because it is a homomorphism between subsheaves of the two sheaves involved in the
above vertical map. Therefore, by the already proven surjectivity (6.16.1) is an isomorphism. This
concludes addendum (d).
Remark 6.17. In particular if in Notation 6.15, T = s is a perfect point of V (that is, T = Spec (K)
for some perfect field K), then Sϕ0 n (fT )∗ (MT ) can be interpreted as follows. Since, the natural
i
T
→ XT is an isomorphism.
map K −
→ (K)1/p is an isomorphism, the natural projection XT i −
i
0
→ K 1/p . Thus
Furthermore (fT )∗ (MT i ) can be identified with (fT )∗ (MT ) = H (XT , MT ) via K −
F -SINGULARITIES IN FAMILIES
47
Sϕ0 n (fT )∗ (MT ) is identified with
T
(6.17.1)
pme −1
pe −1
0
Ss,m
:= im H 0 Xs , Ls
1
pme
⊗ Ms
!
!
−
→ H 0 (Xs , Ms ) ,
In particular, for m ≫ 0, (6.17.1) can be identified with S 0 (Xs , σ(Xs , ϕs ) ⊗ Ms ).
6.4. Uniform stabilization.
e
Theorem 6.18. In the situation of Notation 6.1, if L ⊗ M p −1 is f -ample, then there is an integer
n > 0, such that for all integers m ≥ n and perfect points s ∈ V ,
1
0
= S 0 (Xs , σ(Xs , ψs ) ⊗ Ms ).
im Sϕ0 m f∗ (M ) ⊗OV me k(s) pme −→ H 0 (Xs , Ms ) = Ss,m
0
(Note ψs is defined in Section 2.23 and Ss,m
in Remark 6.17.)
Proof. We show the statement by induction on the dimension of V . There is nothing to prove
if dim V = 0. Hence, we may proceed to the inductional step and assume that dim V > 0. By
Proposition 6.16, there is an n > 0 such that for every perfect point s ∈ V and every m ≥ n
1
0
im Sϕ0 m f∗ (M ) ⊗OV me k(s) pme −
→ H 0 (Xs , Ms ) = Ss,m
.
According to Lemma 2.17, by possibly increasing n, we may find a non-empty, dense open set U
such that for all m ≥ n,
σm (X/V, ϕ)|U = σn (X/V, ϕ) ×V ne V me |U .
Therefore, applying Corollary 6.12, yields (also by possibly increasing n) that for all m ≥ n,
V me ×V ne Sϕ0 n f∗ (M )
U
= Sϕ0 m f∗ (M )
U
.
It follows then that for every perfect point s ∈ U ,
1
→ H 0 (Xs , M )
im Sϕ0 m f∗ (M ) ⊗OV me k(s) pme −
0
is stabilized for all perfect s ∈ U for values of m ≥ n.
is the same for all m ≥ n. Therefore, Ss,m
0
Hence it is equal to S (Xs , σ(Xs , ψs ) ⊗ Ms ). This shows the statement of the proposition for all
perfect s ∈ U . We fix the n0 = n used above for future use.
`
On the other hand, consider the reduced scheme V1 = V \ U . Write V1 = V1,i as a disjoint
union of regular locally closed integral subschemes. Each V1,i has dimension smaller than V . In
particular, there exists an ni such that the statement holds for fi : XVi −
→ Vi . Letting n be the
maximum of n0 and the ni we obtain our result since every perfect point of X factors through a
point of U or of one of the Vi .
Corollary 6.19. In the situation of Notation 6.1, if L ⊗ M p
open set U ⊆ V , such that for every perfect point s ∈ U ,
e −1
is f -ample, then there is a dense
1
Sϕ0 m f∗ (M ) ⊗OV me k(s) pme = S 0 (Xs , σ(Xs , ψs ) ⊗ Ms ).
In particular, dimk(s) S 0 (Xs , σ(Xs , ψs ) ⊗ Ms ) is constant on an open set, and the rank of Sϕ0 m f∗ (m)
equals this dimension.
Proof. The main statement follows immediately from Theorem 6.18 and point (d) of Proposition 6.16.
The corollary follows from basic properties of coherent sheaves [Har77, Exercise II.5.8]
If there is a point s0 ∈ V , such that in Xs0 we have H 0 = S 0 , then we can say more than the
above corollary: it turns out that it can be assumed that s0 ∈ U , and further that U has other
useful properties. This is proved in the following theorem.
48
ZSOLT PATAKFALVI, KARL SCHWEDE, AND WENLIANG ZHANG
e
Theorem 6.20. In the situation of Notation 6.1, if L⊗M p −1 is f -ample and there is a perfect point
s0 ∈ V such that H 0 (Xs0 , Ms0 ) = S 0 (Xs0 , σ(Xs0 , ψs0 ) ⊗ Ms0 ), then there is an open neighborhood
U of s0 , such that
(a) f∗ M |U is locally free and compatible with base change and
(b) H 0 (Xv , Mv ) = S 0 (Xv , σ(Xv , ψv ) ⊗ Mv ) for every perfect point v ∈ U .
In particular, dim S 0 (Xv , σ(Xv , ψv ) ⊗ Mv ) is constant for v ∈ U .
Proof. By Theorem 6.18, there is an n, such that for every v ∈ V and integer m ≥ n, the natural
base-change homomorphism induces a surjection as follows
1
(6.20.1)
Sϕ0 m f∗ (M ) ⊗OV me k(v) pme
/ / S 0 (Xv , σ(Xv , ψv ) ⊗ Mv )
_
1
1
me
p
M
⊗
A
f∗
⊗OV me k(v) pme
A
/ H 0 (Xv , Mv ).
Furthermore, the right vertical arrow is surjective for v = s0 . It follows that so is the bottom
horizontal arrow then. Using [Har77, Corollary III.12.11] concludes (a).
To prove point (b), let us consider (6.20.1) for v = s0 again. Now we know that the bottom horizontal arrow is isomorphism. However, then the left vertical arrow is also surjective. By
Nakayama’s-lemma, there is an equality (Sϕ0 n f∗ (M ))v = (f∗ (M ))v of stalks, which means that by
possibly restricting U , for every v ∈ U , the left vertical arrow of (6.20.1) is surjective. However
then, since the bottom horizontal arrow is isomorphism for every v ∈ U , point (b) follows.
The surjection in Proposition 6.16 is not an isomorphism in general by the following two examples. In the first example the global geometry of the smooth fibers causes the anomaly, while in
the second, the degeneration of F -pure singularities to non F -pure singularities is the main culprit.
However, we first show a lemma.
Lemma 6.21. Let Y be a smooth curve over k and G an effective divisor on Y . Define BY1 as the
cokernel of OX −→ F∗ OX . Then
S 0 (Y, σ(X, 0) ⊗ ωY (G)) = H 0 (Y, ωY (G)) ⇔ H 0 (Y, BY1 (−pn G)) = 0
(∀n > 0).
Proof. Consider the following exact sequence.
0
/ OY
/ F∗ OY
/ B1
Y
/0
Twist this sequence by −G, apply cohomology and use that since G is effective, either
(a) G > 0 and hence H 0 (Y, (F∗ OY )(−G)) ∼
= H 0 (OY (−F ∗ G)) = 0, or
(b) G = 0 and then H 0 (Y, OY ) −
→ H 0 (Y, F∗ OY ) is an isomorphism.
In either case, we have another exact sequence:
0
/ H 0 (Y, B 1 (−G))
Y
/ H 1 (Y, OY (−G))
/ H 1 (Y, F∗ OY (−F ∗ G)) ,
where the last map is the Serre dual to H 0 (Y, (F∗ ωY )(G)) −
→ H 0 (Y, ωY (G)). Furthermore, observe
0
n
0
n+1
→ H (Y, (F∗ ωY )(G)) is harmlessly identified with the map
that the map H (Y, (F∗ ωY )(G)) −
H 0 (Y, (F∗ ωY )(pn G)) −
→ H 0 (Y, (ωY (pn G))). Therefore, combining the previous statements, we see
that H 0 (Y, (F∗n+1 ωY )(G)) −
→ H 0 (Y, (F∗n ωY )(G)) surjects if and only if H 0 (Y, BY1 (−pn G)) = 0.
Example 6.22. We choose two smooth projective curves C and D of genus 3 over an algebraically
closed field k of prime characteristic with two ample line bundles NC and ND (of degree 1), such
that S 0 (C, ωC ⊗NC ) 6= H 0 (C, ωC ⊗NC ), but S 0 (D, ωD ⊗ND ) = H 0 (D, ωD ⊗ND ). Since the relative
Picard scheme over the moduli stack of smooth curves of genus g is smooth and irreducible, there is
a (possibly reducible) curve connecting (C, NC ) and (D, ND ) in the above moduli space. However,
F -SINGULARITIES IN FAMILIES
49
then by possibly replacing (C, NC ) and (D, ND ) we may find also an irreducible curve connecting
them. Therefore, by passing to the normalization of this curve, we may assume that there is a family
f :X −
→ V , a line bundle N on X and two points c, d ∈ C, such that if we set (C, NC ) := (Xc , N |Xc )
and (C, NC ) := (Xc , N |Xc ), then
(a) V is a smooth curve,
(b) X is a family of smooth curves of genus 3,
(c) degX/V N = 1,
(d) S 0 (C, ωC ⊗ NC ) 6= H 0 (C, ωC ⊗ NC ) and
(e) S 0 (D, ωD ⊗ ND ) = H 0 (D, ωD ⊗ ND ).
1
1−p
p
−
→ OXV 1 the map with Dϕ = 0 (see Definition 2.8
and ϕ : ωX/V
Furthermore, fix e = 1, L := ωX/V
for the definition of Dϕ ). Note that by Lemma 2.24, Dϕs = 0 as well. Set M := ωX/V ⊗ N .
By assumption (c), for every v ∈ V and i > 0, H i (Xv , Nv ) = 0. Therefore, f∗ N is a vector
bundle of rank 3, and its formation is compatible with arbitrary base-change. In particular, by
Theorem 6.20 and assumption (e), Sϕn f∗ (ωX/V ⊗M ) ⊆ f∗ (ωX/V ⊗M ) is a subsheaf that is isomorphic
generically to f∗ (ωX/V ⊗ M ). Furthermore, by being a subsheaf of f∗ (ωX/V ⊗ M ) it is torsion free,
and by V being a curve, it is locally free of rank 3. Therefore,
dimk Sϕn f∗ (ωX/V ⊗ M ) ⊗ k(c) = 3
However,
dimk S 0 (C, ωC ⊗ MC ) < dimk H 0 (C, ωC ⊗ MC ) = 3
This shows that the base change morphism
→ S 0 (C, ωC ⊗ MC )
Sϕ0 n f∗ (ωX/V ⊗ M ) ⊗ k(c) −
cannot be isomorphism.
We are left to give the polarized curves (C, MC ) and (D, MD ). For that consider the situation
of Lemma 6.21. By [Tan72, Lemma 12], H 0 (Y, B 1 (−pn G)) = 0 if pn G ≥ n(Y ) where n(Y ) is a
numerical invariant of the curve, which is at most 1 for genus 3 curves [Tan72, Lemma 10]. Hence
H 0 (Y, B 1 (−pn G)) = 0 if deg G ≥ 1 and n > 1. In particular, in our special case (i.e., if Y is of
genus 3 and deg G ≥ 1) Lemma 6.21 states that
S 0 (Y, σ(Y, 0) ⊗ ωY (G)) = H 0 (Y, ωY (G)) ⇔ H 0 (Y, BY1 (−G)) = 0.
Finding a curve where H 0 (Y, BY1 (−G)) = 0 is quite easy, because again using [Tan72, Lemma 12]
yields that if n(Y ) = 1, then there is a degree one divisor G for which H 0 (Y, BY1 (−G)) 6= 0, and
then by passing to a linearly equivalent divisor we may also assume that G is effective. Further,
[Tan72, Example 1] gives a curve ( x3 y + y 3 z + z 3 x = 0) for which n(Y ) = 1. Therefore we have
found C and NC .
To find D and ND assume further that k = F3 . Then by [Mil72, Kob75] a general genus
three curve curve is ordinary, or equivalently S 0 (Y, σ(Y, 0) ⊗ ωY ) = H 0 (Y, ωY ). Therefore then
H 0 (Y, BY1 ) = 0 for such a Y . Take now an arbitrary effective degree 1 divisor G. Then BY1 (−G)
embeds into BY1 and hence H 0 (Y, BY1 (−G)) = 0 as well. In particular, we can choose D to be a
generic curve and ND to be an arbitrary degree one line bundle on D.
Example 6.23. In the following example for an f -ample line bundle Q the surjection
1
l
0
ne
p
k(s)
։ S 0 (Xs , σ(Xs , ϕs ) ⊗ Qls ).
f
(Q
)
⊗
(6.23.1)
S ϕn ∗
OV ne
is not an isomorphism for any integer n ≥ n0 and l > 0. Therefore, the isomorphism in Proposition 6.16
cannot be obtained by stronger positivity assumptions.
Let C be the projective cone over a supersingular elliptic curve, and let D be a non-singular
cubic surface. Then these can be put into a family f : X −
→ V as above. More precisely, we may
find a family f : X −
→ V , and a point c ∈ V , such that C := Xc , and hence the following hold
50
ZSOLT PATAKFALVI, KARL SCHWEDE, AND WENLIANG ZHANG
(a)
(b)
(c)
(d)
V is a smooth curve,
X is a a flat family of normal surfaces,
Xc is not sharply F -pure at on point P ∈ Xc and
Xs is sharply F -pure for every s ∈ V \ {c}.
1−p
and ϕ := ϕ0 as in the previous example. Then by Corollary 3.10 and Nakayama
Let L := ωX/V
lemma, for every n ≫ 0, σn (X/V, ϕ)|V \{c} ∼
= Of −1 (V \{c}) . Choose now an arbitrary sufficiently
f -ample line bundle M . By Corollary 6.14, for every n ≫ 0, Sϕ0 n f∗ (M l )|V \{c} ∼
= (f∗ (M ))V ne \{c} for
l
l
0
every integer l > 0. In particular the rk Sϕn f∗ (M ) = rk f∗ (M ) for every n ≫ 0 and l > 0 (where
n does not depend on l). Consequently,
(6.23.2)
dim Sϕ0 n f∗ (M l ) ⊗ k(c) ≥ rk f∗ (M l ) =
dimk H 0 (Xc , Mcl )
{z
}
|
M is relatively ample enough
On the other hand for all n ≫ 0 (independent of l)
(6.23.3)
Sϕ0 n f∗ (M l ) ⊗ k(c) ։
Sϕ0 nc (fc )∗ (Mcl )
=
{z
}
|
by point (b) of Proposition 6.16
H 0 (Xc , σ(Xc , 0) ⊗ Mcl )
|
{z
}
sine Mc is ample enough ([Pat12]) and Lemma 2.24
However, by the relative ampleness assumption, Mc is globally generated, hence dimk H 0 (Xc , σ(Xc , 0)⊗
Mcl ) < dimk H 0 (Xc , Mcl ) (because σ(Xc , 0) ( OXc ). Therefore, (6.23.2) and (6.23.3) implies that
indeed the surjection (6.23.1) is not an isomorphism for any l > 0 and any n ≫ 0 (independently
bounded of l).
Remark 6.24. The fundamental reason for the above example is that σn (X/V, ϕ) is NOT flat in
general.
The above two examples show that dimk (S 0 (Xv , σ(Xv , ϕv ) ⊗ Mv ) is not upper semicontinuous.
One might guess then it is lower semicontinuous. The next example shows that that is also not the
case (this can also be deduced from [Har98, Example 5.5] and [Tan13, Theorem 8.3] as pointed out
to us by Tanaka). So, dimk S 0 (Xv , σ(Xv , ϕv ) ⊗ Mv ) is not semicontinuous in either direction.
Example 6.25. Take a flat family f : X −
→ V of ordinary elliptic curves, and a line bundle M on
∼
X of relative degree 0, such that MXv0 = OXv0 for a special v0 ∈ V , and MXv ∼
6 OXv for generic
=
v ∈ V . Then, by the ordinarity of the fibers, for all v ∈ V ,
H 0 (Xv , Mv ) = S 0 (Xv , σ(Xv , 0) ⊗ Mv ).
However, dim H 0 (Xv , Mv ) = 1 for the special fiber and 0 for the generic one. So, dim S 0 (Xv , σ(Xv , 0)⊗
Mv ) is not lower semicontinuous in this example. One can also easily modify this example by taking
an M with higher relative degree to obtain higher values of dimension for the generic fiber.
6.5. Global generation and semi-positivity. Suppose now V is a projective variety over a
e
prefect field k. In this section, we explore global generation results if L ⊗ M p −1 is ample (instead
0
of just relatively ample). In particular, Sϕn f∗ (M ) is globally generated for all large n. This should
not be surprising since Sϕ0 n f∗ (M ) lives on V ne where ampleness is amplified.
Proposition 6.26. In the situation of Notation 6.1, if V is projective over a perfect field k and
e
L ⊗ M p −1 is ample, then Sϕ0 n f∗ (M ) is globally generated for every n ≫ 0.
Proof. Choose a globally generated ample divisor H on V and let d := dim V . Since Sϕ0 n f∗ (M ) is
defined as the image of
!
1
ne ne
p
p −1
⊗R M ,
f∗
L pe −1
F -SINGULARITIES IN FAMILIES
51
it is enough to show that this sheaf is globally generated as an OV ne -module. By Mumford’s criterion
[Laz04a, Theorem 1.8.5], it is enough to show that for every i > 0 and for the divisor Hne on V ne
identified with H via the isomorphism V ne ∼
=V,
!!
1
ne ne
p
p −1
ne
i
e
⊗R M
= 0.
(6.26.1)
H V , OV ne (−iHne ) ⊗OV ne f∗
L p −1
By relative Serre vanishing for i > 0,
i
R f∗
L
pne −1
pe −1
1
pne
⊗R M
!
= 0.
In particular, then to prove (6.26.1) it is enough to show
pne −1
i
pne
∗
e −1
p
H X, L
⊗ M (−if H) = 0.
However this is equivalent to showing that,
!
pne −1
∗
(pe −1) pe −1
i
⊗ M (−if H) = 0,
H X, L ⊗ M
which holds by Serre-vanishing for n ≫ 0 and i > 0.
We recall the following definition.
Definition 6.27 (Definition 2.11 of [Vie95]). Let F be a sheaf on a normal, quasi-projective (over
a perfect field k) variety V and U ⊆ V a dense open set. Let Ulf be the open locus of V where
F ′ := F /(torsion) is locally free. Then F is weakly positive over U , if for a fixed (or equivalently
every: [Vie95, Lemma 2.14.a]) ample line bundle H for every a > 0 there is a b > 0 such that
S habi (F )⊗H b is globally generated over U ∩Ulf (here S habi (F ) denotes the abth symmetric reflexive
power of F ). We say that F is weakly-positive if it is weakly-positive over some dense open set.
Lemma 6.28. If g : Y −→ Z is a finite morphism of normal varieties, quasi-projective over k,
U ⊆ Z a dense open set and F a sheaf on Z, then F is weakly positive over U if and only if g ∗ F
is weakly positive over g −1 (U ).
Proof. The only if direction is shown in [Vie95, Lemma 2.15.1]. For the other direction, according
to Definition 6.27 by throwing out codimension two subset we may assume that F is locally free
and Y is flat over Z. In particular then g ∗ F is also locally free. Choose a very ample divisor H
on Z, such that
(a) H om(g∗ OY , H ) is globally generated and
(b) g∗ OY ⊗ H is globally generated.
Fix then an a > 0. By the weak positivity of g∗ F , there is a b > 0, such that there is a homo→ S habi (g∗ F ) ⊗ g∗ H b surjective over g∗ U . Consider then for every choice of
morphism α : OY⊕N −
s ∈ Hom(g∗ OY , H ) and s′ ∈ H 0 (H b−1 ) the following composition.
γ:=g∗ α
/ g (S habi (g ∗ F ) ⊗ g ∗ H b ) ∼
(g∗ OY )⊕N ❳❳
= S habi (F ) ⊗ H b ⊗ g∗ OY
❳❳❳❳❳ ∗
❳❳❳
❳❳❳❳❳
❳❳❳❳❳
❳❳❳❳+
βs
δs,s′ :=idS habi (F )⊗H b ⊗s⊗s′
S habi (F ) ⊗ H 2b
Choose a point P ∈ U and an element f of the fiber S habi (F ) ⊗ k(P ) over P . Then by assumption
(b) for any preimage Q of P there is a section t′ ∈ OY⊕N , such that α(t′ )Q = g ∗ f × ”generator“.
The section t′ descends to a section t := g∗ (t′ ) ∈ (g∗ OY )⊕N , such that γ(t)P = f × ”generator“ × h
52
ZSOLT PATAKFALVI, KARL SCHWEDE, AND WENLIANG ZHANG
for some h ∈ (g∗ OY )P . However then by (a) and the very ampleness of H for a suitable choice of
s and s′ , δs,s′ (γ(t)))P = f × “generator” is not zero at P . Therefore, for every point P in U and
every element f in the fiber of S habi (F ) ⊗ H 2b at that point we find a section of S habi (F ) ⊗ H 2b
whose image in the fiber is f up to multiplication by unit. This finishes our proof.
Corollary 6.29. In the situation of Notation 6.1, let V be projective over a prefect field k, L ⊗
e
M p −1 ample and n > 0 be an integer such that there is an open set U ⊆ V for which
Sϕ0 n f∗ (M ) ×U ne U me = Sϕ0 m f∗ (M )|U me ,
for every integer m ≥ n. Then Sϕ0 n f∗ (M ) is weakly-positive. Note that an integer as above always
exists by Corollary 6.12 and Proposition 5.3.
Proof. By the assumption, there is an embedding
Sϕ0 m f∗ (M ) ֒→ Sϕ0 n f∗ (M ) ×V ne V me ,
which is generically isomorphism. Since the left sheaf is globally generated and hence weaklypositive, so is the right one. However then by Lemma 6.28, so is Sϕ0 n f∗ (M ).
Lemma 6.30. If F is a coherent sheaf on a normal variety V over a perfect field k, then F is
weakly-positive if and only if for every ample line bundle H and every integer p ∤ r > 0 there is a
finite morphism τ : T −→ V , such that τ ∗ H ∼
= (H ′ )r for some line bundle H ′ and τ ∗ F ⊗ H ′ is
weakly-positive.
Proof. The proof is identical to the (b) ⇒ (a) part of [Vie95, Lemma 2.15.1].
Theorem 6.31. In the situation of Notation 6.1, if V is projective and L ⊗ M p
f -ample, then Sϕ0 n f∗ (M ) is weakly positive for n ≫ 0.
e −1
is a nef and
Proof. Choose an integer n > 0, as in Corollary 6.29. Fix an ample line bundle H on V , an integer
p ∤ r > 0 and a finite morphism τ : T −
→ V , such that τ ∗ H ∼
= (H ′ )r for some line bundle H ′ .
Such a morphism exits by [Vie95, Lemma 2.1]. By Lemma 6.30, we are supposed to prove that
1
∗
1
τ pne Sϕn f∗ (M ) ⊗OV ne (H ′ ) pne is weakly positive. By disregarding codimension two closed sets,
we may assume that T is regular as well. Then by point (c) of Proposition 6.16, we see that n
satisfies also the assumptions of Corollary 6.29 but for f and M replaced by fT and MT ⊗ fT∗ HT′ ,
respectively. In particular, since MT ⊗ fT∗ HT′ is ample,
Sϕ0 nT (fT )∗ (MT ⊗ fT∗ HT′ ) ∼
= HT′ ⊗ Sϕ0 nT (fT )∗ (MT )
is weakly-positive over T ne .
6.6. Relation to global canonical systems. There has been another subsheaf S 0 f∗ (σ(X, ∆) ⊗
M ) of f∗ (M ) introduced in [HX13, Definition 2.14] with a definition similar to that of Sϕ0 n f∗ (M ). In
this section we show some of the similarities and differences between the two sheaves. The advantage
of S 0 f∗ (σ(X, ∆) ⊗ M ) over Sϕ0 n f∗ (M ) is that it lives on one V , there is no involvement of V ne at
all. On the other hand we show that contrary to Sϕ0 n f∗ (M ) it does not restrict even generically to
S 0 (Xs , σ(Xs , ∆s ) ⊗ Ms ).
Throughout the section we use the divisorial language since the presentation seems to be more
straightforward this way, hence ∆ satisfies the conditions of Remark 2.11. Recall that we defined
the notion of pair in our setting in Definition 2.12. Whenever we say pair, we mean everything
assumed there. In particular, all the assumptions on f : X −
→ V from Notation 2.1: flatness,
equidimensionality, etc.
First, we recall the definition of S 0 f∗ (M ).
F -SINGULARITIES IN FAMILIES
53
Definition 6.32. [HX13, Definition 2.14] Let ∆ be an effective Q-divisor, such that (X, ∆) is a
pair and assume that f : X −
→ V is projective. Let e be the smallest9 positive integer such that
(pe − 1)(KX + ∆) is Cartier. Then given a line bundle M on X, we define
\
S 0 f∗ (σ(X, ∆) ⊗ M ) :=
im (f∗ (F∗ne OX ((1 − pne )(KX + ∆)) ⊗ M ) −
→ f∗ (M )) .
n>0
S 0f
We say that
∗ (σ(X, ∆) ⊗ M ) stabilizes if the above intersection stabilizes. Note that in that
case S 0 f∗ (σ(X, ∆) ⊗ M ) is a coherent sheaf.
Recall that S 0 f∗ (σ(X, ∆)⊗M ) stabilizes if M −KX −∆ is relatively ample, see [HX13, Proposition
2.15] for a proof.
Proposition 6.33. Let ∆ be an effective Q-divisor, such that (X, ∆) is a pair and assume that
f : X −→ V is projective. Let M be a line bundle on X such that S 0 f∗ (σ(X, ∆) ⊗ M ) stabilizes.
Further assume that V is regular. Then for every n ≫ 0
0
S∆,ne
f∗ (M ) ⊆ (S 0 f∗ (σ(X, ∆) ⊗ M ))V ne
0
as subsheaves of (f∗ (M ))V ne , where S∆,ne
f∗ (M ) is defined in Definition 6.4.
Proof. The statement is local over the base hence we can assume that V is affine, KV ∼ 0, and
that H omOV (F∗i OV , OV ) ∼
= F∗i OV is a free OV -module for all i ≥ 0. Note then also we can identify
KX/V with KX . We introduce the notation
L := OX ((1 − pne )(KX + ∆)).
→ OV which we identify with
We have the evaluation-at-1 map F∗ne OV ∼
= H omOV (F∗ne OV , OV ) −
the trace of V based on our previous assumption ωV ∼
= OV . This map pulls back to X to provide
∗ ne
∼
us with a map which we also denote as Trne
→ OX ⊗OX f ∗ OV ∼
= OX .
FV : OXV ne = OX ⊗ f F∗ OV −
Then there is a diagram as follows, which is commutative up to multiplication by a unit cf. [Sch09,
Lemma 3.9].
F∗ne L
TrFX
/ F ne OX ((1 − pne )KX )
∗
/ OX
O
Trne
F
V
F∗ne OX ((1
−
pne )(KX/V
+ ∆))
/ F ne OX ((1 − pne )KX/V )
∗
TrF ne
/ OX ⊗O f ∗ F ne OV
∗
X
X/V
Applying the functor f∗ ( ⊗OX M ) to the above diagram, we obtain the following.
f∗ ((F∗ne L) ⊗OX M )
/ f∗ (M )
O
κ
f∗ ((F∗ne OX ((1
−
pne )(KX/V
+ ∆))) ⊗OX M )
/ f∗ (M ⊗O f ∗ F ne OV )
∗
X
Note that for every n ≫ 0 the image of the top horizontal row is S 0 f∗ (σ(X, ∆) ⊗ M ) and for every
0 f (M ). Hence for every n ≫ 0,
n > 0 the image of the bottom horizontal row is S∆,n
∗
0
0
S f∗ (σ(X, ∆) ⊗ M ) = im S∆,n f∗ (M ) −
→ f∗ (M ) ,
where the above map is induced by TrFV .
Since we want containment for subsheaves of (f∗ (M ))V ne , we localize at a point of V . By setting
ne (S 0 f (M )), we are in the following situation: if
B := Γ(V, OV ), P := f∗ (M ) and Q := FV,∗
∆,n ∗
ne
ne
Q is a B 1/p submodule of B 1/p ⊗B P for some B module P , we would like to show that
ne
ne
Q ⊆ ϑ(Q) ⊗B B 1/p where ϑ ∈ HomB (B 1/p , B) is the generator. This is simply Lemma 3.21.
9The intersection below is easily seen to be descending, hence if one chooses another e, the same object results.
54
ZSOLT PATAKFALVI, KARL SCHWEDE, AND WENLIANG ZHANG
Example 6.34. We provide an example where the two sheaves of Proposition 6.33 have different
ranks for every n ≫ 0. Fix an algebraically closed field k of characteristic p > 0. Let X := P1 × A1 ,
1
U = A1 × A1 = Spec k[y, x] ⊆ X and V := A1 := Spec k[x]. Define the divisor ∆ := p−1
V (y p − x)
which is a priori a divisor in U , but it happens to have support which is a closed subvariety of X
as well. Note that V (y p − x) is a subvariety of X isomorphic to A1 . In particular, (X, ∆) is sharply
F -pure. Choose now a line bundle N on X which is relatively ample over V and let M := N l for
some l ≫ 0. Then by [HX13, Lemma 2.19] S 0 f∗ (σ(X, ∆) ⊗ M ) = f∗ (M ). Therefore,
(S 0 f∗ (σ(X, ∆) ⊗ M ))V ne = (f∗ (M ))V ne
(6.34.1)
0 f (M ) ⊆ f (σ (X/V, ∆) ⊗ M ). By Corollary 3.10 and
On the other hand by Proposition 6.5, S∆,n
∗
∗ n
Lemma 2.24, for every n ≫ 0 and s ∈ V , σn (X/V, ∆)|Xs = σ(Xs , ∆). However, ∆|Xs is one point
p
, and hence not sharply F -pure. In particular, σ(Xs , ∆) 6= OXs for every
with multiplicity p−1
s ∈ S. Hence for every n ≫ 0, σn (X/V, ∆)|Xs ( OXs . It follows by the relative ampleness of M
0 f (M ) has also smaller rank
that f∗ (σn (X/V, ∆) ⊗ M ) has smaller rank than f∗ (M ). Then S∆,n
∗
than (S 0 f∗ (σ(X, ∆) ⊗ M ))V ne by (6.34.1).
The above example has an important corollary, which follows immediately from (d) of Proposition 6.16
and Theorem 6.18.
Corollary 6.35. In general S 0 f∗ (σ(X, ∆)⊗M )⊗k(s) is not isomorphic to S 0 (Xs , σ(Xs , ∆s )⊗Ms ).
In fact there are examples when the former has strictly bigger dimension than the latter for every
closed point s ∈ V .
Compare the following proposition with Proposition 3.24.
Proposition 6.36. Let ∆ be an effective Q-divisor, such that (X, ∆) is a pair and assume that
f : X −→ V is projective. Let M be a line bundle on X and assume that V is regular. Then for
every n ≥ m ≥ 0,
S 0 fV ne ,∗ (σ(XV ne , ∆V ne ) ⊗ MV ne ) ⊆ (S 0 fV me ,∗ (σ(XV me , ∆V me ) ⊗ MV me ))V ne
as subsheaves of (f∗ (M ))V ne . Furthermore, if the above two sheaves stabilize then
(n−m)e 0
S fV ne ,∗ (σ(XV ne , ∆V ne ) ⊗ f ∗ OV ((1 − p(n−m)e )KV ne )) ⊗ MV ne )
κ FV,∗
= S 0 fV me ,∗ (σ(XV me , ∆V me ) ⊗ MV me )
(n−m)e
where κ is induced by TrV
.
Proof. Note that by replacing f : X −
→ V by fV me : XV me −
→ V me , we may assume that m = 0,
and then by replacing e by (n − m)e that n = 1. As in the previous proof, let us assume that
V is affine, KV ∼ 0, and that H omOV (F∗e OV , OV ) ∼
= F∗e OV is a free OV -module. Consider the
following commutative diagram.
ν:=(FVe )X e
(XV e )e ❲❲❲
❲❲❲❲❲
/ X e ❱❱
❱❱❱❱
❱❱❱❱FXe
❲❲❲❲❲
❱❱❱❱
❲❲❲❲❲
❱❱❱❱
e
FX
❱❱❱❱
❲
❲
❲+
Ve
/+ X
e
XV
e
fV e
V
η:=(FV )X
e
FVe
f
/V
We fix the notations
L∆′ := OXV e ((1 − pe )(KXV e + η ∗ ∆)),
L∆ := OX ((1 − pe )(KX + ∆)).
F -SINGULARITIES IN FAMILIES
55
Then we have
(1 − pe )KXV e = (1 − pe )(η ∗ KX/V + fV∗ e KV e ), and (1 − pe )KX = (1 − pe )(KX/V + f ∗ KV ).
Therefore,
◦ applying pullback of TrFVe yields a homomorphism ν∗ L∆′ −
→ L∆ , which then induces a
e ν L′ −
e
homomorphism η∗ FXe V e ,∗ L∆′ ∼
= FX,∗
∗ ∆ → FX,∗ L∆ ,
◦ applying TrFXe e yields a homomorphism FXe V e ,∗ L∆′ −
→ OXV e ,
V
e L −
◦ applying TrFXe yields a homomorphism FX,∗
→
O
∆
X,
e O −
e
◦ by the assumption KV ∼ 0, TrFV corresponds to a homomorphism FV,∗
V → OV generating
e
HomOV (FV,∗ OV , OV ) and
◦ the previous homomorphism also induces a pullback homomorphism η∗ OXV e −
→ OX .
Furthermore, the above homomorphisms fit into the following diagram
η∗ FXe V e ,∗ L∆′
/ F e L∆
X,∗
❑❑
PPP
❑❑
PPP
❑❑
PPP
❑%
(
/ OX
η∗ OX e
V
The diagram is a composition of trace maps (restricted to smaller domains determined by ∆), hence
it is commutative. Applying now f∗ ( ⊗ M ) to the above diagram and using the projection formula
we obtain the following commutative diagram
f∗ η∗ (FXe V e ,∗ L∆′ ⊗ MV e )
/ f∗ (F e L∆ ⊗ M )
X,∗
❘❘❘
❱❱❱❱
❘❘❘
❱❱❱❱
❘❘❘
❱❱❱❱
❘(
❱❱*
/ f∗ (M ).
f∗ η∗ MV e
e f e yields another commutative diagram
Observing that f∗ η∗ = FV,∗
V ,∗
/ f∗ (F e L∆ ⊗ M )
X,∗
❱❱❱❱
◗◗◗
❱❱❱❱❱
◗◗◗
◗◗◗
❱❱❱❱
❱❱+
◗(
e
/ f∗ (M ).
F fV e ,∗ MV e
e f e (F e
′
FV,∗
V ,∗ XV e ,∗ L∆ ⊗ MV e )
V,∗
Note now that the top horizontal arrow is split, because it is induced from ν∗ L∆′ −
→ L∆ which is
split as well. Therefore, if we define P := f∗ (M ) and
e
S := im f∗ (FX,∗
L∆ ⊗ M ) −
→ f∗ (M )
Q := im fV e ,∗ (FXe V e ,∗ L∆′ ⊗ MV e ) −
→ fV e ,∗ MV e ,
e
then we have Q ⊆ P ⊗A A1/p , S ⊆ P and (idP ⊗ TrFVe )(Q) = S. Therefore, by Lemma 3.21,
e
Q ⊆ S ⊗A A1/p . Since this holds for any n, the statement of the proposition follows.
Proposition 6.37. Let ∆ be an effective Q-divisor, such that (X, ∆) is a pair and assume that
f : X −→ V is projective and V is regular. Let M be a line bundle on X. Then for every n ≫ 0,
0
S 0 fV ne ,∗ (σ(XV ne , ∆V ne ) ⊗ MV ne ) ⊆ S∆,ne
f∗ (M )
as subsheaves of (f∗ (M ))V ne .
Proof. As before, let us assume that V is affine, KV ∼ 0, and that H omOV (F∗i OV , OV ) ∼
= F∗i OV is
a free OV -module for all i ≥ 0. By Lemma 3.13 and Lemma 3.16 there is a commutative diagram
/ F nene ne OX (1 − pne ) K
FXneV ne ,∗ OXV ne ((1 − pne ) (KXV ne + ∆V ne ))
X/V + ∆
X /V ,∗
❨❨❨❨❨❨
❨❨❨❨❨❨
❨❨❨❨❨❨
❨❨❨❨❨❨
❨❨❨❨❨❨
,
OXV ne .
56
ZSOLT PATAKFALVI, KARL SCHWEDE, AND WENLIANG ZHANG
Furthermore, the top horizontal arrow in the above diagram is split surjective. Therefore, after
applying fV ne ,∗ ( ⊗ MV ne ) the image of the vertical map still agrees with the image of the diagonal
0 f (M ), while the latter contains S 0 f ne (σ(X, (∆) ne )⊗ M ), since
map. The former is exactly S∆,n
∗
V ,∗
V
it is one of the terms in the intersection defining S 0 fV ne ,∗ (σ(X, (∆)V ne ) ⊗ M ).
Remark 6.38. Assuming that f : X −
→ V is projective and M −KX −∆ is ample, it would be natural
0
to ask whether Im S fV ne ,∗ (σ(XV ne ,∆V ne ⊗MV ne )⊗MV ne ) −
→ fV ne ,∗ Ms equals S 0 (Xs , σ(Xs , ∆s )⊗
Ms ) for all perfect points s ∈ V , in analogy with Theorem 3.23. We suspect this is true but will
not try to prove it here.
Corollary 6.39. Let f : (X, ∆) −→ V be a projective morphism from a pair with V regular
and projective over a perfect field k. Further, suppose that M is a line bundle on X such that
M − KX/V − ∆ is nef and f -ample (here M denotes a Cartier divisor corresponding to M ) and that
rk S 0 f∗ (σ(X, ∆)⊗M ) equals the general value of H 0 (Xs , σ(Xs , ∆s )⊗Ms ). Then S 0 f∗ (σ(X, ∆)⊗M )
is weakly positive. In particular, if V is a smooth curve then it is a nef vector bundle.
Proof. From the assumption rk S 0 f∗ (σ(X, ∆) ⊗ M ) equals the general value of H 0 (Xs , σ(Xs , ∆s ) ⊗
Ms ) follows that the inclusion of Proposition 6.33 is generically an isomorphism for every n ≫ 0.
However, since Sϕ0 n f∗ (M ) is weakly-positive for every n ≫ 0 by Theorem 6.31, we obtain by the
above generically isomorphic inclusion that (S 0 f∗ (σ(X, ∆) ⊗ M ))V ne is also weakly positive. Then
weak-positivity of S 0 f∗ (σ(X, ∆) ⊗ M ) follows from Lemma 6.28.
Appendix A. Relative Serre’s condition
Here we collect the statements of [HK04] and other sources, that are important for the current
paper for ease of reference. In some cases, we also state them in the greater generality that we need.
All schemes are Noetherian, excellent and possess dualizing complexes and all maps are separable.
Definition A.1. Let r > 0 be an integer. A coherent sheaf E on a Noetherian scheme X is Sr , if
for every x ∈ X,
depthOX,x Ex ≥ min{r, dimOX,x Ex }.
The sheaf E is said to have full support, if Supp E = X. It is reflexive if the natural map E −
→
E ∗∗ := H omOX (H omOX (E , OX ), OX ) is an isomorphism.
Definition A.2. If f : X −
→ V is a morphism of Noetherian schemes and E is a coherent sheaf on
X flat over V , then E is Sr over V if E |Xv is Sr for every v ∈ V . That is, for every x ∈ X,
o
n
depthOX (E |Xf (x) )x ≥ min r, dimOX (E |Xf (x) )x
f (x)
f (x)
We now recall two results from EGA about how depth and dimension behave in families.
Proposition A.3. [Gro67, Proposition 6.3.1] Let ϕ : A −→ B be a local homomorphism of Noetherian local rings, k the residue field of A and M and N are finite A and B modules respectively.
If N is a flat non-zero A-module, then
depthB (M ⊗A N ) = depthA (M ) + depthB⊗A k (N ⊗A k).
Proposition A.4. [Gro67, Corollaire 6.1.2] Let ϕ : A −→ B be a local homomorphism of Noetherian
local rings, k the residue field of A and M and N are non-zero finite A and B modules respectively.
If N is a flat A-module, then
dimB (M ⊗A N ) = dimA (M ) + dimB⊗A k (N ⊗A k).
From these we obtain the following corollary.
F -SINGULARITIES IN FAMILIES
57
Corollary A.5. Let f : X −→ V be a morphism of Noetherian schemes and E a coherent sheaf on
X flat over V , then E is Sr over V if and only if for every x ∈ X,
min{i|Hxi (E ) 6= 0} ≥ depthOV,v OV,v + min{r, dim Ex − dim OV,v }
= depthOV,v OV,v + min {r, dim (E |Xv )x }
where v := f (x).
Proof. To say that E |Xv has depth equal to t at x is equivalent to asserting that depthx E =
(depthOV,v OV,v ) + t by Proposition A.3. The result follows.
The following vanishing allows us to extend sections over sets of relative codimension 2.
Proposition A.6. [HK04, Proposition 3.3] Let f : X −→ V be a morphism of Noetherian schemes
and E a coherent sheaf on X flat and Sr over V . Let Z ⊆ X be a closed subscheme of X such that
we have codimSupp Ev (Supp Ev ∩ Zv ) ≥ r for every v ∈ V . Then for each 0 ≤ i < r, HZi (E ) = 0.
Proof. We follow the proof in [HK04, Proposition 3.3]. First, we certainly have a spectral sequence
E2p,q := Hxp ◦ HZq ⇒ Hxp+q . We then induct on r, the base case of r = 0 being trivial. Now assume
that HZ0 (E ) = . . . = HZr−2 (E ) = 0 but HZr−1 (E ) 6= 0. Then for any x ∈ Z which is a generic
point10 of the support of HZr−1 (E ), we have that Hx0 (HZr−1 (E )) 6= 0 (note here that x is probably
not a closed point). Additionally, since x is a point of Z ∩ Supp(E ), we have that dim(E |Xv )x ≥ r.
On the other hand, for all i > 0 we have Hxi (HZr−1−i (E )) = 0, and so by the spectral sequence
Hxr−1 (E ) ∼
= Hx0 (HZr−1 (E )) 6= 0. This contradicts Corollary A.5.
We now obtain a relative version of Hartog’s phenomena, just as in [HK04].
Proposition A.7. [HK04, Proposition 3.5, 3.6.1] Let f : X −→ V be a morphism of Noetherian
schemes and that E a coherent sheaf on X which satisfies one of the following two conditions:
(i) E is reflexive and f is flat and relatively S2 , or
(ii) E is of full support, flat and S2 over V .
Let j : U ֒→ X be an open set such that for Z := X \ U , codimXv Zv ≥ 2 for every v ∈ V . Then
the following natural map is an isomorphism:
E −→ j∗ E |U .
Proof. First, assume that E is reflexive. Consider a presentation of E ∗ by locally free sheaves
E2
/ E∗
/ E1
/ 0 and the dual 0
/E
/ E∗
1
/ E∗
2
Then by applying Proposition A.6 to OX and the applying local cohomology to the above exact
sequence yields that
HZ1 (E ) = HZ0 (E ) = 0.
(A.7.1)
If instead, E is flat, S2 and has full support, then we still have the vanishing (A.7.1) by Proposition A.6.
Consider then the exact sequence
0
/ H 0 (E )
Z
/E
Applying (A.7.1) concludes our proof.
/ j∗ E
/ H 1 (E ).
Z
Corollary A.8. [HK04, Proposition 3.6.2] Let f : X −→ V be a flat, S2 morphism of Noetherian
schemes, E a coherent X satisfying either Proposition A.7(i) or (ii). Let F be another coherent
sheaf satisfying Proposition A.7(i) or (ii). Let j : U ֒→ X be an open set, such that for Z := X \ U ,
codimXv Zv ≥ 2 for every v ∈ V . Assume also that E |U ∼
= F |U . Then E ∼
= F.
10a minimal prime in the language of commutative algebra
58
ZSOLT PATAKFALVI, KARL SCHWEDE, AND WENLIANG ZHANG
Proof. In any case, j∗ E |U = E and j∗ F |U = F and so the result follows.
Proposition A.9. [HK04, Corollary 3.7] Let f : X −→ V be a flat, S2 morphism of Noetherian
schemes and j : U ֒→ X an open set, such that for Z := X \ U , codimXv Zv ≥ 2 for every v ∈ V .
Assume also that E is a reflexive, coherent sheaf on U . Then j∗ E is reflexive.
Proof. Choose a coherent subsheaf F ⊆ j∗ E such that F |U = E [Har77, Ex II.5.15]. Then j∗ E is
reflexive by the following computation.
F ∗∗ ∼
j∗ E
= j∗ (F ∗∗ |U ) ∼
=
= j∗ E ∗∗ ∼
|{z}
| {z }
| {z }
by Proposition A.7
E∼
=F |U
This completes the proof.
E is reflexive
Proposition A.10. If f : X −→ Y is a projective, flat, relatively S2 and G1, equidimensional
morphism, then ωX/Y is reflexive.
Proof. The proof given in [PS12, Lemma 4.8] works.
References
M. André: Homomorphismes réguliers en caractéristique p, C. R. Acad. Sci. Paris Sér. I Math. 316
(1993), no. 7, 643–646. 1214408 (94e:13026)
[Bli13]
M. Blickle: Test ideals via algebras of p−e -liner maps, J. Algebraic Geom. 22 (2013), no. 1, 49–83.
[BB11]
M. Blickle and G. Böckle: Cartier modules: finiteness results, J. Reine Angew. Math. 661 (2011),
85–123. 2863904
[BMS08] M. Blickle, M. Mustaţǎ, and K. E. Smith: Discreteness and rationality of F -thresholds, Michigan
Math. J. 57 (2008), 43–61, Special volume in honor of Melvin Hochster. 2492440 (2010c:13003)
[BS13]
M. Blickle and K. Schwede: p−1 -linear maps in algebra and geometry, Commutative Algebra: Expository Papers Dedicated to David Eisenbud on the Occasion of His 65th Birthday (I. Peeva, ed.), Springer,
Berlin, 2013, pp. 123–205.
[BSTZ10] M. Blickle, K. Schwede, S. Takagi, and W. Zhang: Discreteness and rationality of F -jumping
numbers on singular varieties, Math. Ann. 347 (2010), no. 4, 917–949. 2658149
[BST11]
M. Blickle, K. Schwede, and K. Tucker: F -singularities via alterations, arXiv:1107.3807.
[BK05]
M. Brion and S. Kumar: Frobenius splitting methods in geometry and representation theory, Progress
in Mathematics, vol. 231, Birkhäuser Boston Inc., Boston, MA, 2005. MR2107324 (2005k:14104)
[CHMS12] P. Cascini, C. Hacon, M. Mustaţă, and K. Schwede: On the numerical dimension of pseudo-effective
divisors in positive characteristic, arXiv:1206.6521, to appear in the American Journal of Mathematics.
[Con00]
B. Conrad: Grothendieck duality and base change, Lecture Notes in Mathematics, vol. 1750, SpringerVerlag, Berlin, 2000. MR1804902 (2002d:14025)
[Eis95]
D. Eisenbud: Commutative algebra, Graduate Texts in Mathematics, vol. 150, Springer-Verlag, New York,
1995, With a view toward algebraic geometry. 1322960 (97a:13001)
[Fed83]
R. Fedder: F -purity and rational singularity, Trans. Amer. Math. Soc. 278 (1983), no. 2, 461–480.
[And93]
MR701505 (84h:13031)
[FST11]
[Gab04]
[GW77]
[Gro67]
[Hac11]
[HX13]
[Har98]
[HY03]
O. Fujino, K. Schwede, and S. Takagi: Supplements to non-lc ideal sheaves, Higher Dimensional
Algebraic Geometry, RIMS Kôkyûroku Bessatsu, B24, Res. Inst. Math. Sci. (RIMS), Kyoto, 2011, pp. 1–
47.
O. Gabber: Notes on some t-structures, Geometric aspects of Dwork theory. Vol. I, II, Walter de Gruyter
GmbH & Co. KG, Berlin, 2004, pp. 711–734.
S. Goto and K. Watanabe: The structure of one-dimensional F -pure rings, J. Algebra 49 (1977), no. 2,
415–421. MR0453729 (56 #11989)
A. Grothendieck: Éléments de géométrie algébrique. IV. Étude locale des schémas et des morphismes
de schémas IV, Inst. Hautes Études Sci. Publ. Math. (1967), no. 32, 361. MR0238860 (39 #220)
C. D. Hacon: Singularities of pluri-theta divisors in char p > 0, arXiv:1112.2219.
C. D. Hacon and C. Xu: On the three dimensional minimal model program in positive characteristic,
arXiv:1302.0298.
N. Hara: A characterization of rational singularities in terms of injectivity of Frobenius maps, Amer. J.
Math. 120 (1998), no. 5, 981–996. MR1646049 (99h:13005)
N. Hara and K.-I. Yoshida: A generalization of tight closure and multiplier ideals, Trans. Amer. Math.
Soc. 355 (2003), no. 8, 3143–3174 (electronic). MR1974679 (2004i:13003)
F -SINGULARITIES IN FAMILIES
[Har77]
[Har94]
59
R. Hartshorne: Algebraic geometry, Springer-Verlag, New York, 1977, Graduate Texts in Mathematics,
No. 52. MR0463157 (57 #3116)
R. Hartshorne: Generalized divisors on Gorenstein schemes, Proceedings of Conference on Algebraic
Geometry and Ring Theory in honor of Michael Artin, Part III (Antwerp, 1992), vol. 8, 1994, pp. 287–339.
MR1291023 (95k:14008)
[HS77]
[Kat08]
R. Hartshorne and R. Speiser: Local cohomological dimension in characteristic p, Ann. of Math. (2)
105 (1977), no. 1, 45–79. MR0441962 (56 #353)
M. Hashimoto: Cohen-Macaulay F-injective homomorphisms, Geometric and combinatorial aspects of
commutative algebra (Messina, 1999), Lecture Notes in Pure and Appl. Math., vol. 217, Dekker, New
York, 2001, pp. 231–244. 1824233 (2002d:13007)
M. Hashimoto: F -pure homomorphisms, strong F -regularity, and F -injectivity, Comm. Algebra 38
(2010), no. 12, 4569–4596. 2764840 (2012a:13007)
B. Hassett and S. J. Kovács: Reflexive pull-backs and base extension, J. Algebraic Geom. 13 (2004),
no. 2, 233–247. MR2047697 (2005b:14028)
M. Hochster: Foundations of tight closure theory, lecture notes from a course taught on the University
of Michigan Fall 2007 (2007).
M. Hochster and C. Huneke: F -regularity, test elements, and smooth base change, Trans. Amer. Math.
Soc. 346 (1994), no. 1, 1–62. MR1273534 (95d:13007)
M. Hochster and J. L. Roberts: The purity of the Frobenius and local cohomology, Advances in Math.
21 (1976), no. 2, 117–172. MR0417172 (54 #5230)
C. Huneke and I. Swanson: Integral closure of ideals, rings, and modules, London Mathematical Society
Lecture Note Series, vol. 336, Cambridge University Press, Cambridge, 2006. MR2266432 (2008m:13013)
M. Katzman: Parameter-test-ideals of Cohen-Macaulay rings, Compos. Math. 144 (2008), no. 4, 933–948.
[Kee03]
D. S. Keeler: Ample filters of invertible sheaves, J. Algebra 259 (2003), no. 1, 243–283. 1953719
[Kob75]
N. Koblitz: p-adic variation of the zeta-function over families of varieties defined over finite fields,
Compositio Math. 31 (1975), no. 2, 119–218. 0414557 (54 #2658)
J. Kollár: Projectivity of complete moduli, J. Differential Geom. 32 (1990), no. 1, 235–268. 1064874
[Has01]
[Has10]
[HK04]
[Hoc07]
[HH94]
[HR76]
[HS06]
MR2441251 (2009d:13030)
(2003m:14026)
[Kol90]
(92e:14008)
[Kc92]
[Kun69]
J. Kollár and 14 coauthors: Flips and abundance for algebraic threefolds, Société Mathématique
de France, Paris, 1992, Papers from the Second Summer Seminar on Algebraic Geometry held at the
University of Utah, Salt Lake City, Utah, August 1991, Astérisque No. 211 (1992). MR1225842 (94f:14013)
E. Kunz: Characterizations of regular local rings for characteristic p, Amer. J. Math. 91 (1969), 772–784.
MR0252389 (40 #5609)
[Kun86]
[Laz04a]
[Laz04b]
[Lyu97]
[MR85]
[MS97]
[MS12]
[Mil72]
[Mus11]
[MS12]
[MY09]
E. Kunz: Kähler differentials, Advanced Lectures in Mathematics, Friedr. Vieweg & Sohn, Braunschweig,
1986. MR864975 (88e:14025)
R. Lazarsfeld: Positivity in algebraic geometry. I, Ergebnisse der Mathematik und ihrer Grenzgebiete. 3.
Folge. A Series of Modern Surveys in Mathematics [Results in Mathematics and Related Areas. 3rd Series.
A Series of Modern Surveys in Mathematics], vol. 48, Springer-Verlag, Berlin, 2004, Classical setting: line
bundles and linear series. MR2095471 (2005k:14001a)
R. Lazarsfeld: Positivity in algebraic geometry. II, Ergebnisse der Mathematik und ihrer Grenzgebiete.
3. Folge. A Series of Modern Surveys in Mathematics [Results in Mathematics and Related Areas. 3rd
Series. A Series of Modern Surveys in Mathematics], vol. 49, Springer-Verlag, Berlin, 2004, Positivity for
vector bundles, and multiplier ideals. MR2095472 (2005k:14001b)
G. Lyubeznik: F -modules: applications to local cohomology and D-modules in characteristic p > 0, J.
Reine Angew. Math. 491 (1997), 65–130. MR1476089 (99c:13005)
V. B. Mehta and A. Ramanathan: Frobenius splitting and cohomology vanishing for Schubert varieties,
Ann. of Math. (2) 122 (1985), no. 1, 27–40. MR799251 (86k:14038)
V. B. Mehta and V. Srinivas: A characterization of rational singularities, Asian J. Math. 1 (1997),
no. 2, 249–271. MR1491985 (99e:13009)
L. E. Miller and K. Schwede: Semi-log canonical vs F -pure singularities, J. Algebra 349 (2012),
150–164. 2853631
L. Miller: Curves with invertible Hasse-Witt-matrix, Math. Ann. 197 (1972), 123–127. 0314849 (47 #3399)
M. Mustaţǎ: The non-nef locus in positive characteristic, arXiv:1109.3825, to appear in the volume
dedicated to Joe Harris on the occasion of his 60th birthday.
M. Mustaţǎ and K. Schwede: A Frobenius variant of Seshadri constants, arXiv:1203.1081.
M. Mustaţă and K.-I. Yoshida: Test ideals vs. multiplier ideals, Nagoya Math. J. 193 (2009), 111–128.
MR2502910
60
ZSOLT PATAKFALVI, KARL SCHWEDE, AND WENLIANG ZHANG
[Pat12]
[PS12]
[Rad92]
Zs. Patakfalvi: Semi-positivity in positive characteristics, arXiv:1208.5391.
Zs. Patakfalvi and K. Schwede: Depth of F -singularities and base change of relative canonical sheaves,
arXiv:1207.1910, to appear in the Journal of the Institute of Mathematics of Jussieu.
N. Radu: Une classe d’anneaux noethériens, Rev. Roumaine Math. Pures Appl. 37 (1992), no. 1, 79–82.
1172271 (93g:13014)
[RR85]
[Sch09]
[Sch11a]
[Sch11b]
[ST12]
[Sha07]
[SZ09]
[Smi97]
S. Ramanan and A. Ramanathan: Projective normality of flag varieties and Schubert varieties, Invent.
Math. 79 (1985), no. 2, 217–224. MR778124 (86j:14051)
K. Schwede: F -adjunction, Algebra Number Theory 3 (2009), no. 8, 907–950. 2587408 (2011b:14006)
K. Schwede: A canonical linear system associated to adjoint divisors in characteristic p > 0,
arXiv:1107.3833, to appear in the Journal für die reine und angewandte Mathematik.
K. Schwede: Test ideals in non-Q-Gorenstein rings, Trans. Amer. Math. Soc. 363 (2011), no. 11, 5925–
5941.
K. Schwede and K. Tucker: A survey of test ideals, Progress in Commutative Algebra 2. Closures,
Finiteness and Factorization (C. Francisco, L. C. Klinger, S. M. Sather-Wagstaff, and J. C. Vassilev, eds.),
Walter de Gruyter GmbH & Co. KG, Berlin, 2012, pp. 39–99.
R. Y. Sharp: On the Hartshorne-Speiser-Lyubeznik theorem about Artinian modules with a Frobenius
action, Proc. Amer. Math. Soc. 135 (2007), no. 3, 665–670 (electronic). 2262861 (2007f:13008)
K. Shimomoto and W. Zhang: On the localization theorem for F -pure rings, J. Pure Appl. Algebra 213
(2009), no. 6, 1133–1139. 2498803 (2010d:13006)
K. E. Smith: F -rational rings have rational singularities, Amer. J. Math. 119 (1997), no. 1, 159–180.
MR1428062 (97k:13004)
[Sri91]
V. Srinivas: Normal surface singularities of F -pure type, J. Algebra 142 (1991), no. 2, 348–359. MR1127067
(93b:14060)
[Sta]
[Tak04]
[Tan13]
[Tan72]
[Vie95]
T. Stacks Project Authors: Stacks Project.
S. Takagi: An interpretation of multiplier ideals via tight closure, J. Algebraic Geom. 13 (2004), no. 2,
393–415. MR2047704 (2005c:13002)
H. Tanaka: The trace map of frobenius and extending sections for threefolds, arXiv:1302.3134.
H. Tango: On the behavior of extensions of vector bundles under the Frobenius map, Nagoya Math. J.
48 (1972), 73–89. 0314851 (47 #3401)
E. Viehweg: Quasi-projective moduli for polarized manifolds, Ergebnisse der Mathematik und ihrer Grenzgebiete (3) [Results in Mathematics and Related Areas (3)], vol. 30, Springer-Verlag, Berlin, 1995.
MR1368632 (97j:14001)
[Zha12]
Y. Zhang: Pluri-canonical map of varieties of maximal albanese dimension in positive characteristic,
arXiv:1203.1360.
EPFL, SB MATHGEOM CAG, MA B3 635 (Bâtiment MA), Station 8, CH-1015 Lausanne
E-mail address: [email protected]
Department of Mathematics, University of Utah, Salt Lake City, UT 84112
E-mail address: [email protected]
Department of Mathematics, University of Illinois at Chicago, Chicago, IL 60607
E-mail address: [email protected]
| 0math.AC
|
Understanding Boltzmann Machine and Deep Learning via
A Confident Information First Principle
Xiaozhao Zhao
[email protected]
School of Computer Science and Technology, Tianjin University
Tianjin, 300072, China
arXiv:1302.3931v7 [cs.NE] 9 Oct 2013
Yuexian Hou
[email protected]
School of Computer Science and Technology, Tianjin University
Tianjin, 300072, China
Qian Yu
[email protected]
School of Computer Software, Tianjin University
Tianjin, 300072, China
Dawei Song
[email protected]
School of Computer Science and Technology, Tianjin University
Tianjin, 300072, China
and Department of Computing, The Open University
Milton Keynes, MK7 6AA, UK
Wenjie Li
[email protected]
Department of Computing, The Hong Kong Polytechnic University
Hung Hom, Kowloon, Hong Kong, China
Editor:
Abstract
Typical dimensionality reduction methods focus on directly reducing the number of random variables while retaining maximal variations in the data. In this paper, we consider
the dimensionality reduction in parameter spaces of binary multivariate distributions. We
propose a general Confident-Information-First (CIF) principle to maximally preserve parameters with confident estimates and rule out unreliable or noisy parameters. Formally,
the confidence of a parameter can be assessed by its Fisher information, which establishes
a connection with the inverse variance of any unbiased estimate for the parameter via the
Cramér-Rao bound. We then revisit Boltzmann machines (BM) and theoretically show
that both single-layer BM without hidden units (SBM) and restricted BM (RBM) can be
solidly derived using the CIF principle. This can not only help us uncover and formalize
the essential parts of the target density that SBM and RBM capture, but also suggest
that the deep neural network consisting of several layers of RBM can be seen as the layerwise application of CIF. Guided by the theoretical analysis, we develop a sample-specific
CIF-based contrastive divergence (CD-CIF) algorithm for SBM and a CIF-based iterative
projection procedure (IP) for RBM. Both CD-CIF and IP are studied in a series of density
estimation experiments.
Keywords: Boltzmann Machine, Deep Learning, Information Geometry, Fisher Information, Parametric Reduction
1
1. Introduction
Recently, deep learning models (e.g., Deep Belief Networks (DBN)(Hinton and Salakhutdinov, 2006), Stacked Denoising Auto-encoder (Ranzato et al., 2006), Deep Boltzmann
Machine (DBM) (Salakhutdinov and Hinton, 2012) and etc.) have drawn increasing attention due to their impressive results in various application areas, such as computer vision
(Bengio et al., 2006; Ranzato et al., 2006; Osindero and Hinton, 2007), natural language processing (Collobert and Weston, 2008) and information retrieval (Salakhutdinov and Hinton,
2007a,b). Despite of these practical successes, there have been debates on the fundamental
principle of the design and training of those deep architectures. One important problem is
the unsupervised pre-training, which would fit the parameters to better capture the structure
in the input distribution (Erhan et al., 2010). From the probabilistic modeling perspective,
this process can be interpreted as an attempt to recover a set of model parameters for a
generative neural network that would well describe the distribution underlying the observed
high-dimensional data. In general, to sufficiently depict the original high-dimensional data
requires a high-dimensional parameter space. However, overfitting usually occur when the
model is excessively complex. On the other hand, Dauphin and Bengio (2013) empirically
shows the failure of some big neural networks in leveraging the added capacity to reduce
underfitting.
Hence it is important to uncover and understand what the first principle would be on
reducing the dimensionality of the parameter space concerning the sample size. This question is also recognized by Erhan et al. (2010). They empirically show that the unsupervised
pre-training acts as a regularization on parameters in a way that the parameters are set in a
region, from which better basins of attraction can be reached. The regularization on parameters could be seen as a kind of dimensionality reduction procedure on parameter spaces
by restricting those parameters in a desired region. However, the intrinsic mechanisms
behind the regularization process are still unclear. Thus, further theoretical justifications
are needed in order to formally analyze what the essential parts of the target density that
the neural networks can capture. An indepth investigation into this question will lead to
two significant results: 1) a formal explanation on what exactly the neural networks would
perform in the pre-training process; 2) some theoretical insights on how to do it better.
Duin and Peȩkalska (2006) empirically show that the sampling density of a given dataset
and the resulting complexity of a learning problem are closely interrelated. If the initial
sampling density is insufficient, this may result in a preferred model of a lower complexity,
so that we have a satisfactory sampling to estimate model parameters. On the other hand,
if the number of samples is originally abundant, the preferred model may become more
complex so that we could have represented the dataset in more details. Moreover, this
connection becomes more complicated if the observed samples contain noises. Now the
obstacle is how to incorporate this relationship between the dataset and the preferred model
into the learning process. In this paper, we mainly focus on analyzing the Boltzmann
machines, the main building blocks of many neural networks, from a novel information
geometry (IG)(Amari and Nagaoka, 1993) perspective.
Assuming there exists an ideal parametric model S that is general enough to represent
all system phenomena, our goal of the parametric reduction is to derive a lower-dimensional
sub-model M for a given dataset (usually insufficient or perturbed by noises) by reducing
2
the number of free parameters in S. In this paper, we propose a Confident-InformationFirst (CIF) principle to maximally preserve the parameters with highly confident estimates
and rule out the unreliable or noisy parameters with respect to the density estimation of
binary multivariate distributions. From the IG point of view, the confidence 1 of a parameter
can be assessed by its Fisher information (Amari and Nagaoka, 1993), which establishes a
connection with the inverse variance of any unbiased estimate for the considered parameter
via the Cramér-Rao bound (see Rao, 1945). It is worth emphasizing that the proposed CIF
as a principle of parametric reduction is fundamentally different from the traditional feature
reduction (or feature extraction) methods (Fodor, 2002; Lee and Verleysen, 2007). The
latter focus on directly reducing the dimensionality on feature space by retaining maximal
variations in the data, e.g., Principle Components Analysis (PCA) (Jolliffe, 2002), while CIF
offers a principled method to deal with high-dimensional data in the parameter spaces by
a strategy that is universally derived from the first principle, independent of the geometric
metric in the feature spaces.
The CIF takes an information-oriented viewpoint of statistical machine learning. The
information 2 is rooted on the variations (or fluctuations) in the imperfect observations
(due to insufficient sampling, noise and intrinsic limitations of the “observer”) and transmits throughout the whole learning process. This idea is also well recognized in modern
physics, as stated in Wheeler (1994): “All things physical are information-theoretic in origin and this is a participatory universe...Observer participancy gives rise to information;
and information gives rise to physics.”. Following this viewpoint, Frieden (2004) unifies
the derivation of physical laws in major fields of physics, from the Dirac equation to the
Maxwell-Boltzmann velocity dispersion law, using the extreme physical information principle (EPI). The information used in this unification is exactly the Fisher information (Rao,
1945), which measures the quality of any measurement(s).
In terms of statistical machine learning, the aim of this paper is of two folds: a) to
incorporate the Fisher information into the modelling of the intrinsic variations in the data
that give rise to the desired model, by using the IG framework (Amari and Nagaoka, 1993);
b) to show by examples that some existing probabilistic models, e.g., SBM and RBM,
comply with the CIF principle and can be derived from it. The main contributions are:
1. We propose a general CIF principle for parameter reduction to maximally preserve
the parameters of high confidence and eliminate the unreliable parameters of binary
multivariate distributions in the framework of IG. We also give a geometric interpretation of CIF by showing that it can maximally preserve the expected information
distance.
2. The implementation of CIF, that is, the derivation of probabilistic models, is illustrated by revisiting two widely used Boltzmann machines, i.e., Single layer BM without hidden units (SBM) and restricted BM (RBM). And the deep neural network
consisting of several layers of RBM can be seen as the layer-by-layer application of
CIF.
1. Note that, in this paper, the meaning of confidence is different from the common concept degree of
confidence in statistics.
2. There are many kinds of “information” defined for a probability distribution p(x), e.g., entropy, Fisher
information. The entropy is a global measure of smoothness in p(x). Fisher information is a local
measure that is sensitive to local rearrangement of points (x, p(x)).
3
3. Based on the above theoretical analysis, a CIF-based iterative projection procedure
(IP) inherent in the learning of RBM is uncovered. And traditional gradient-based
methods, e.g., maximum-likelihood (ML) and contrastive divergence (CD) (CarreiraPerpinan and Hinton, 2005), can be seen as approximations of IP. Experimental results
indicate that IP is more robust against sampling biases, due to its separation of the
positive sampling process and the gradient estimation.
4. Beyond the general CIF, we propose a sample-specific CIF and integrate it into the CD
algorithm for SBM to confine the parameter space to a confident parameter region
indicated by samples. It leads to a significant improvement in a series of density
estimation experiments, when the sampling is insufficient.
The rest of the paper is organized as follows: Section 2 introduces some preliminaries of
IG. Then the general CIF principle is proposed in Section 3. In Section 4, we analyze two
implementations of CIF using the BM with and without hidden units, i.e., SBM and RBM.
After that, a sample-specific CIF-based CD learning method (CD-CIF) for SBM and a CIFbased iterative projection procedure for RBM are proposed and experimentally studied in
Section 5. Finally, we draw conclusions and highlight some future research directions in
Section 6.
2. Theoretical Foundations of Information Geometry
In this section, we introduce and develop the theoretical foundations of Information Geometry (IG) (Amari and Nagaoka, 1993) for the manifold S of binary multivariate distributions
with a given number of variables n, i.e., the open simplex of all probability distributions
over binary vector x ∈ {0, 1}n . This will lay the foundation for our theoretical deviation of
the general CIF.
2.1 Notations for Manifold S
In IG, a family of probability distributions is considered as a differentiable manifold with
certain parametric coordinate systems. In the case of binary multivariate distributions,
four basic coordinate systems are often used: p-coordinates, η-coordinates, θ-coordinates
and mixed-coordinates (Amari and Nagaoka, 1993; Hou et al., 2013). Mixed-coordinates is
of vital importance for our analysis.
For the p-coordinates [p] with n binary variables, the probability distribution over 2n
states of x can be completely specified by any 2n − 1 positive numbers indicating the
probability of the corresponding exclusive states on n binary variables. For example, the
p-coordinates of n = 2 variables could be [p] = (p01 , p10 , p11 ). Note that IG requires all
probability terms to be positive.
For simplicity, we use the capital letters I, J, . . . to index the coordinate parameters
of probabilistic distribution. An index I can be regarded as a subset of {1, 2, . . . , n}.
And pI stands for the probability that all variables indicated by I equal to one and
the complemented variables are zero. For example, if I = {1, 2, 4} and n = 4, then
pI = p1101 = P rob(x1 = 1, x2 = 1, x3 = 0, x4 = 1). Note that the null set can also be
a legal index of the p-coordinates, which indicates the probability that all variables are
zero, denoted as p0...0 .
4
Another coordinate system often used in IG is η-coordinates, which is defined by:
Y
ηI = E[XI ] = P rob{ xi = 1}
(1)
i∈I
Q
where the value of XI is given by i∈I xi and the expectation is taken with respect to
the probability distribution over x. Grouping the coordinates by their orders, η-coordinate
2 , . . . , ηn
system is denoted as [η] = (ηi1 , ηij
1,2...n ), where the superscript indicates the order
2 denotes the set of all η parameters
number of the corresponding parameter. For example, ηij
with the order number 2.
The θ-coordinates (natural coordinates) is defined by:
X
θI XI − ψ
(2)
log p(x) =
I⊆{1,2,...,n},I6=N ullSet
where ψ = − log P rob{xi = 0, ∀i ∈ {1, 2, ..., n}}. The θ-coordinate is denoted as [θ] =
(θ1i , θ2ij , . . . , θn1,...,n ), where the subscript indicates the order number of the corresponding
parameter. Note that the order indices locate at different positions in [η] and [θ] following
the convention in Amari et al. (1992).
The relation between coordinate systems [η] and [θ] is bijective (Amari et al., 1992).
More formally, they are connected by the Legendre transformation:
θI =
∂φ(η)
∂ψ(θ)
, ηI =
∂ηI
∂θI
(3)
where ψ(θ) and φ(η) meet the following identity
X
ψ(θ) + φ(η) −
θI ηI = 0
(4)
The function ψ(θ) is introduced in Eq. (2):
X
X
ψ(θ) = log(
exp{
θI XI (x)})
(5)
x
I
and hence φ(η) is the negative of entropy:
X
φ(η) =
p(x; θ(η)) log p(x; θ(η))
(6)
x
Next we introduce mixed-coordinates, which is important for our derivation of CIF. In
general, the manifold S of probability distributions could be represented by the l-mixedcoordinates (Amari et al., 1992):
i,j,...,k
2
l
[ζ]l = (ηi1 , ηij
, . . . , ηi,j,...,k
, θl+1
, . . . , θn1,...,n )
(7)
where the first part consists of η-coordinates with order less or equal to l (denoted by [η l− ])
and the second part consists of θ-coordinates with order greater than l (denoted by [θl+ ]),
l ∈ {1, ..., n}.
5
2.2 Fisher Information Matrix for Parametric Coordinates
For a general coordinate system [ξ], the ith-row and jth-col element of the Fisher information matrix for [ξ] (denoted by Gξ ) is defined as the covariance of the scores of [ξi ] and [ξj ]
(Rao, 1945), i.e.,
∂ log p(x; ξ) ∂ log p(x; ξ)
gij = E[
·
]
∂ξi
∂ξj
The Fisher information measures the amount of information in the data that a statistic
carries about the unknown parameter (Kass, 1989). The Fisher information matrix is of
vital importance to our analysis because the inverse of Fisher information matrix gives an
asymptotically tight lower bound of the covariance matrix of any unbiased estimate for the
considered parameters (Rao, 1945). Moreover, the Fisher information matrix, as a distance
metric, is invariant to re-parameterization (Rao, 1945), and can be proved to be the unique
metric that is invariant to the map of random variables corresponding to a sufficient statistic
(Amari et al., 1992; Chentsov, 1982).
Another important concept related to our analysis is the orthogonality defined by Fisher
information. Two coordinate parameters ξi and ξj are called orthogonal if and only if their
Fisher information vanishes, i.e., gij = 0, meaning that their influences to the log likelihood
function are uncorrelated. A more technical meaning of orthogonality is that the maximum
likelihood estimates (MLE) of orthogonal parameters can be independently performed.
∂ 2 ψ(θ)
The Fisher information for [θ] can be rewritten as gIJ = ∂θ
I ∂θ J , and for [η] it is
2
∂ φ(η)
g IJ = ∂η
(Amari and Nagaoka, 1993). Let Gθ = (gIJ ) and Gη = (g IJ ) be the Fisher
I ∂ηJ
information matrices for [θ]
It can be shown that Gθ and Gη are mutuPand [η] respectively.
I , where δ I = 1 if I = K and 0 otherwise (Amari
ally inverse matrices, i.e., J g IJ gJK = δK
K
and Nagaoka, 1993).
In order to generally compute Gθ and Gη , we develop the following Proposition 1 and
2. Note that Proposition 1 is a generalization of Theorem 2 in Amari et al. (1992).
Proposition 1 The Fisher information between two parameters θI and θJ in [θ], is given
by
gIJ (θ) = ηI S J − ηI ηJ
(8)
Proof in Appendix A.1
Proposition 2 The Fisher information between two parameters ηI and ηJ in [η], is given
by
X
1
g IJ (η) =
(−1)|I−K|+|J−K| ·
(9)
pK
K⊆I∩J
where | · | denotes the cardinality operator.
Proof in Appendix A.2
For example, let [p] = (p001 , p010 , p011 , p100 , p101 , p110 , p111 ) be the p-coordinates of a probability distribution with three variables. Then, the Fisher information of ηI and ηJ can be
1
1
+ p010
, and if
calculated based on Equation (9): if I = {1, 2} and J = {2, 3}, g IJ = p000
1
1
1
1
IJ
I = {1, 2} and J = {1, 2, 3}, g = −( p000 + p010 + p100 + p110 ), etc.
6
3. The General CIF Principle For Parametric Reduction
As described in Section 2.1, the general manifold S of all probability distributions over
binary vector x ∈ {0, 1}n , could be exactly represented using the parametric coordinate
systems of dimensionality 2n − 1. However, given the limited samples generated from a target distribution, it is almost infeasible to determine its coordinates in such high-dimensional
parameter space with acceptable accuracy and in reasonable time. Given a target distribution q(x) on the general manifold S, we consider the problem of realizing it by a lowerdimensionality submanifold. This is defined as the problem of parametric reduction for
multivariate binary distributions.
3.1 The General CIF Principle
In this section, we will formally illuminate the general CIF for parametric reduction. Intuitively, if we can construct a coordinate system so that the confidences (measured by Fisher
information) of its parameters entail a natural hierarchy, in which high confident parameters can be significantly distinguished from low confident ones, then the general CIF can be
conveniently implemented by keeping the high confident parameters unchanging and setting
the lowly confident parameters to neutral values. However, the choice of coordinates (or
equivalently, parameters) in CIF is crucial to its usage. This strategy is infeasible in terms
of p-coordinates, η-coordinates or θ-coordinates, since it is easy to see that the hierarchies
of confidences in these coordinate systems are far from significant, as shown by an example
later in this section.
The following propositions show that mixed-coordinates meet the requirement realizing
the general CIF. Let [ζ]l be the mixed-coordinates defined in Section 2.1. Proposition 3
gives a closed form for calculating the Fisher information matrix Gζ .
Proposition 3 The Fisher information matrix of the l-mixed-coordinates [ζ]l is given by:
A 0
(10)
Gζ =
0 B
−1
−1
−1
where A = ((G−1
η )Iη ) , B = ((Gθ )Jθ ) , Gη and Gθ are the Fisher information matrices
of [θ] and [ζ]l , respectively, and Iη is the index of the parameters shared by [η] and [ζ]l ,
l }, and J is the index set of the parameters shared by [θ] and [ζ] , i.e.,
i.e., {ηi1 , ..., ηij
θ
l
i,j,...,k
{θl+1
, . . . , θn1,...,n }.
Proof in Appendix A.3.
Proposition 4 The diagonal of A are lower bounded by 1, and that of B are upper bounded
by 1.
Proof in Appendix A.4.
According to Proposition 3 and Proposition 4, the confidences of coordinate parameters
in [ζ]l entail a natural hierarchy: the first part of high confident parameters [η l− ] are separated from the second part of low confident parameters [θl+ ], which has a neutral value
(zero). Moreover, the parameters in [η l− ] is orthogonal to the ones in [θl+ ], indicating that
7
Figure 1: By projecting a point q(x) on S to a submanifold M , the l-tailored-mixedcoordinates [ζ]lt gives a desirable M that maximally preserve the expected Fisher
information distance when projecting a ε-neighborhood centered at q(x) onto M .
we could estimate these two parts independently (Hou et al., 2013). Hence we can implement the general CIF principle for parametric reduction in [ζ]l by replacing low confident
parameters with neutral value zeros and reconstructing the resulting distribution. It turns
l
, 0, . . . , 0). We call
out that the submanifold tailored by CIF becomes [ζ]lt = (ηi1 , ..., ηij...k
[ζ]lt the l-tailored-mixed-coordinates.
To grasp an intuitive picture for the general CIF strategy and its significance w.r.t
mixed-coordinates, let us consider an example with [p] = (p001 = 0.15, p010 = 0.1, p011 =
0.05, p100 = 0.2, p101 = 0.1, p110 = 0.05, p111 = 0.3). Then the confidences for coordinates
in [η], [θ] and [ζ]2 are given by the diagonal elements of the corresponding Fisher information matrices. Applying the 2-tailored CIF in mixed-coordinates, the loss ratios of Fisher
information is 0.001%, and the ratio of the Fisher information of the tailored parameter
(θ3123 ) to the remaining η parameter with the smallest Fisher information is 0.06%. On the
other hand, the above two ratios become 7.58% and 94.45% (in η-coordinates) or 12.94%
and 92.31% (in θ-coordinates), respectively.
Next, we will restate the CIF principle in terms of the geometric perspective of submanifold projection. Let M be a smooth submanifold in S. Given a point q(x) ∈ S, the
projection of q(x) to M is the point p(x) that belongs to M and is closest to q(x) in the
sense of the Kullback-Leibler divergence (K-L divergence) from the distribution q(x) to p(x)
(Amari et al., 1992):
X
q(x)
D(q(x), p(x)) =
q(x) log
(11)
p(x)
x
Alternatively, since K-L divergence is not symmetric, the projection of q(x) to M can also
be defined as the point p(x) ∈ M that minimizes the K-L divergence from M to q(x). In
the rest of this paper, the direction of the K-L divergence used in a particular projection is
explicitly specified when there is an ambiguity.
8
The CIF entails a submanifold of S via the l-tailored-mixed-coordinates [ζ]lt . However,
there exist many different submanifolds of S. Now our question is: does there exist a
general criterion to distinguish which projection is best? If such principle does exist, is CIF
the right one? The following proposition shows that the general CIF entails a geometric
interpretation illuminated in Figure 1, which would lead to an optimal submanifold M .3
Proposition 5 Given a statistical manifold S in l-mixed-coordinates [ζ]l , let the corresponding l-tailored-mixed-coordinates [ζ]lt has k free parameters. Then, among all k-dimensional
submanifolds of S, the submanifold determined by [ζ]lt can maximally preserve the expected
information distance induced by Fisher-Rao metric.
Proof in Appendix A.5.
4. Two Implementations of CIF using Boltzmann Machine
In previous section, a general CIF is uncovered in the [ζ]l coordinates for multivariate binary
distributions. Now we consider the implementations of CIF when l equals to 2 using the
Boltzmann machines (BM). More specifically, we show that two kinds of BMs, i.e., the
single layer BM without hidden units (SBM) and the restricted BM (RBM), are indeed
instances following the general CIF principle. For each case, the application of CIF can be
interpreted in two perspectives: an algebraic and geometric interpretation.
4.1 Neural Networks as Parametric Reduction Model
Many neural networks with fixed architecture, such as SBM, RBM, high-order BM (Albizuri
et al., 1995), deep belief networks (Hinton and Salakhutdinov, 2006), have been proposed to
approximately realize the underlying distributions in different application scenarios. Those
neural networks are designed to fulfill the parametric reduction for certain tasks by specifying the number of adjustable parameters, namely the number of connection weights and the
number of biases. We believe that there exists a general criterion to design the structure of
neural submanifolds for the particular application in hand, and the problem of parametric
reduction is equivalent to the choice of submanifolds. Next, we will briefly introduce the
general BM and the gradient-based learning algorithm.
4.1.1 Introduction To The Boltzmann Machines
In general, a BM (Ackley et al., 1985) is defined as a stochastic neural network consisting of
visible units x ∈ {0, 1}nx and hidden units h ∈ {0, 1}nh , where each unit fires stochastically
depending on the weighted sum of its inputs. The energy function is defined as follows:
1
1
EBM (x, h; ξ) = − xT U x − hT V h − xT W h − bT x − dT h
2
2
(12)
3. Note that the CIF is related to but fundamentally different from the m-projection in Amari et al. (1992).
Amari et al. (1992) focuses on the problem of projecting a point Q on S to the submanifold of BM and
shows that m-projection is the point on BM that is closest to Q. Actually, the m-projection is a special
case of our [ζ]lt -projection when l is 2. In the present paper, we focus on the problem of developing a
general criterion that could help us find the optimal submanifold to project on.
9
where ξ = {U, V, W, b, d} are the parameters: visible-visible interactions (U ), hidden-hidden
interactions (V ), visible-hidden interactions (W ), visible self-connections (b) and hidden selfconnections (d). The diagonals of U and V are set to zero. We can express the Boltzmann
distribution over the joint space of x and h as below:
p(x, h; ξ) =
1
exp{−EBM (x, h; ξ)}
Z
(13)
where Z is a normalization factor.
Let B be the set of Boltzmann distributions realized by BM. Actually, B is a submanifold
of the general manifold Sxh over {x, h}. From Equation (13) and (12), we can see that
ξ = {U, V, W, b, d} plays the role of B’s coordinates in θ-coordinates (Equation 2) as follows:
h
θ1 : θ1xi = bxi , θ1 j = dhj (∀xi ∈ x, hj ∈ h)
x xj
θ2 : θ2 i
x hj
= Uxi ,xj , θ2 i
x ...xj hu ...hv
θ2+ : θmi
h hj
= Wxi ,hj , θ2 i
= Vhi ,hj (∀xi , xj ∈ x; hi , hj ∈ h)
= 0, m > 2, (∀xi , . . . , xj ∈ x; hu , . . . , hv ∈ h)
(14)
So the θ-coordinates for BM is given by:
h
xh
xx
hh
[θ]BM = (θ1xi , θ1 j , θ2 i j , θ2 i j , θ2 i j , 0, . . . , 0).
{z
} | {z }
| {z } |
1−order
(15)
orders>2
2−order
The SBM and RBM are special cases of the general BM. Since SBM has nh = 0 and all
the visible units are connected to each other, the parameters of SBM are ξsbm = {U, b} and
{V, W, d} are all set to zero. For RBM, it has connections only between hidden and visible
units. Thus, the parameters of RBM are ξrbm = {W, b, d} and {U, V } are set to zero.
4.1.2 Formulation on the Gradient-based Learning of BM
Given the sample x that generated from the underlying distribution, the maximum-likelihood
(ML) is commonly used gradient ascent method for training BM in order to maximize the
log-likelihood log p(x; ξ) of the parameters ξ (Carreira-Perpinan and Hinton, 2005). Based
on Equation (13), the log-likelihood is given as follows:
X
X
0 0
log p(x; ξ) = log
e−E(x,h;ξ) − log
e−E(x ,h ;ξ)
x0 ,h0
h
Differentiating the log-likelihood, the gradient vector with respect to ξ is as follows:
∂ log p(x; ξ) X
∂[−E(x, h; ξ)] X
∂[−E(x0 , h0 ; ξ)]
p(h0 |x0 ; ξ)
=
p(h|x; ξ)
−
∂ξ
∂ξ
∂ξ
0 0
h
(16)
x ,h
The ∂E(x,h;ξ)
can be easily calculated from Equation (12). Then we can obtain the stochastic
∂ξ
gradient using Gibbs sampling (Gilks et al., 1996) in two phases: sample h given x for the
first term, called the positive phase, and sample (x0 , h0 ) from the stationary distribution
p(x0 , h0 ; ξ) for the second term, called the negative phase. Now with the resulting stochastic
gradient estimation, the learning rule is to adjust ξ by:
∆ξ = ε ·
∂ log p(x; ξ)
∂E(x, h; ξ)
∂E(x0 , h0 ; ξ)
= ε · (−h
i0 + h
i∞ )
∂ξ
∂ξ
∂ξ
10
(17)
where ε is the learning rate, h·i0 denotes the average using the sample data and h·i∞ denotes
the average with respect to the stationary distribution p(x, h; ξ) after the corresponding
Gibbs sampling phases.4
In following sections, we will revisit two special BM, namely SBM and RBM, and theoretically show that both SBM and RBM can be derived using the CIF principle. This helps
us formalize what essential parts of the target density the SBM and RBM capture.
4.2 The CIF-based Derivation of Boltzmann Machine without Hidden Units
Given any underlying probability distribution q(x) on the general manifold S over {x}, the
logarithm of q(x) can be represented by a linear decomposition of θ-coordinates as shown
in Equation (2). Since it is impractical to recognize all coordinates for the target distribution, we would like to only approximate part of them and end up with a k-dimensional
submanifold M of S, where k ( 2nx − 1) is the number of free parameters. Here, we set
k to be the same dimensionality as SBM, i.e., k = nx (n2x +1) , so that all candidate submanifolds are comparable to the submanifold endowed by SBM (denoted as Msbm ). Next, the
rationale underlying the design of Msbm can be illuminated using the general CIF from two
perspectives, algebraically and geometrically.
4.2.1 SBM as 2-tailored-mixed-coordinates
2 , θ i,j,k , . . . , θ 1,...,nx ). Applying
Let the 2-mixed-coordinates of q(x) on S be [ζ]2 = (ηi1 , ηij
nx
3
the general CIF on [ζ]2 , our parametric reduction rule is to preserve the high confident
part parameters [η 2− ] and replace low confident parameters [θ2+ ] with a fixed neutral value
2 , 0, . . . , 0), as the
zero. Thus we derive the 2-tailored-mixed-coordinates: [ζ]2t = (ηi1 , ηij
optimal approximation of q(x) by the k-dimensional submanifolds. On the other hand,
given the 2-mixed-coordinates of q(x), the projection p(x) ∈ Msbm of q(x) is proved to be
2 , 0, . . . , 0) (Amari et al., 1992). Thus, SBM defines a probabilistic parameter
[ζ]p = (ηi1 , ηij
space that is exactly derived from CIF.
4.2.2 SBM as Maximal Information Distance Projection
Next corollary, following Proposition 5, shows a geometric derivation of SBM. We make it
explicit that the projection on Msbm could maximally preserve the expected information
distance comparing to other tailored submanifolds of S with the same dimensionality k.
Corollary 6 Given the general manifold S in 2-mixed-coordinates [ζ]2 , SBM defines an kdimensional submanifold of S that can maximally preserve the expected information distance
induced by Fisher-Rao metric.
Proof in Appendix A.6.
From the CIF-based derivation, we can see that SBM confines the statistical manifold in
the parameter subspace spanned by those directions with high confidences, which is proved
to maximally preserve the expected information distance.
4. Both the two special BMs, i.e., SBM and RBM, can be trained using the ML method. Note that SBM
has no hidden units and hence no positive sampling is needed in training SBM.
11
4.2.3 The Relation Between [ζ]2t and the ML Learning of SBM
To learn such [ζ]2t , we need to learn the parameters ξ of SBM such that its stationary
distribution preserves the same coordinates [η 2− ] as target distribution q(x). Actually, this
is exactly what traditional gradient-based learning algorithms intend to do to train SBM.
Next proposition shows that the ML method for training SBM is equivalent to learn the
tailored 2-mixed coordinates [ζ]2t .
Proposition 7 Given the target distribution q(x) with 2-mixed coordinates:
2
[ζ]2 = (ηi1 , ηij
, θ2+ ),
the coordinates of the SBM with stationary distribution q(x; ξ), learnt by ML, are uniquely
2 ,θ
given by [ζ]2t = (ηi1 , ηij
2+ = 0)
Proof in Appendix A.7.
4.3 The CIF-based Derivation of Restricted Boltzmann Machine
In previous section, the general CIF uncovers why SBM uses the coordinates up to 2nd order, i.e., preserves the η-coordinates of the 1st -order and 2nd -order. In this section, we
will investigate the cases where hidden units are introduced. Particularly, one of the fundamental problem in neural network research is the unsupervised representation learning
(Bengio et al., 2013), which attempts to characterize the underlying distribution through
the discovery of a set of latent variables (or features). Many algorithmic models have been
proposed, such as restricted Boltzmann machine (RBM) (Hinton and Salakhutdinov, 2006)
and auto-encoders (Rifai et al., 2011; Vincent et al., 2010), for learning one level of feature
extraction. Then, in deep learning models, the representation learnt at one level is used as
input for learning the next level, etc. However, some important questions remain to be clarified: Do these algorithms implicitly learn about the whole density or only some aspects?
If they capture the essence of the target density, then can we formalize the link between the
essential part and omitted part? This section will try to answer these questions using CIF.
4.3.1 Two Necessary Conditions for Representation Learning
In terms of one level feature extraction, there are two main principles that guide a good
representation learning:
• Compactness of representation: minimize the redundancy between hidden variables
in the representation 5 .
• Completeness of reconstruction: the learnt representation captures sufficient information in the input, and could completely reconstruct input distribution, in a statistical
sense.
5. The concept of compactness in the neural network is of two-folds. 1) model-scale compactness: a
restriction on the number of hidden units in order to give a parsimonious representation w.r.t underlying
distribution; 2) structural compactness: a restriction on how hidden units are connected such that the
redundancy in the hidden representation is minimized. In this paper, we mainly focus on the latter case.
12
Let Sxh be the general manifold of probability distributions over the joint space of
visible units x and hidden units h, and Sx be the general manifold over visible units x.
Given any observation distribution q(x) ∈ Sx , our problem is to find the p(x, h) ∈ Sxh
with the marginal distribution p(x) that best approximates q(x), while p(x, h) is consistent
with the compactness and completeness conditions. Here, the K-L divergence, defined in
Equation (11), is used as the criterion of approximation.
First, we will investigate the submanifold of joint distributions p(x, h) ∈ Sxh that fulfill
the above two conditions. Let us denote this submanifold as Mcc . Extending Equation (2)
to manifold Sxh , p(x, h) has the θ-coordinates defined by:
X
θI XI − ψ
(18)
log p(x, h) =
I⊆{x,h}&I6=N ullSet
For the completeness requirement, it is easy to prove that the probability of any input
variable xi can be fully determined only by the given hidden representation and independent
with remainng input variables xj (j 6= i), if and only if θI = 0 for any I that contains two
or more input variables in Equation (18). Similarly, the compactness corresponds to the
extraction of statistically independent hidden variables given the input, i.e., θI = 0 for any
I that contains two or more hidden variables in Equation (18). Then Mcc is given by the
following coordinate system:
h
xh
xx
h hj
[θ]cc = (θ1xi , θ1 j , θ2 i j = 0, θ2 i j , θ2 i
| {z } |
{z
1−order
= 0, 0, . . . , 0).
} | {z }
(19)
orders>2
2−order
Then our problem is restated as to find the p(x, h) ∈ Mcc with the marginal distribution
p(x) that best approximates q(x).
4.3.2 The Equivalence between RBM and Mcc
RBM is a special kind of BM that restricts the interactions in Equation (12) only to those
between hidden and visible units, i.e., Uxi ,xj = 0, Vhi ,hj = 0 ∀xi , xj ∈ x; hi , hj ∈ h. Let
ξrbm = {W, b, d} denotes the set of parameters in RBM. Thus, the θ-coordinates for RBM
can be derived directly from Equation (15):
h
xx
xh
h hj
[θ]RBM = (θ1xi , θ1 j , θ2 i j = 0, θ2 i j , θ2 i
| {z } |
{z
1−order
2−order
= 0, 0, . . . , 0)
} | {z }
(20)
orders>2
Comparing Equation (19) to (20), the submanifold Mrbm defined by RBM is equivalent
with Mcc since they share exactly the same coordinate system. This indicates that the
compactness and completeness conditions is indeed realized by RBM. We use a simpler
notation B to denote Mrbm . Next, we will show how to use CIF to interpret the training
process of RBM.
4.3.3 The CIF-based Interpretation on the Learning of RBM
A RBM produces a stationary distribution p(x, h) ∈ Sxh over {x, h}. However, given the
target distribution q(x), only the marginal distribution of RBM over the visible units are
13
specified by q(x), leaving the distributions on hidden units vary freely. Let Hq be the
set of probability distributions q(x, h) ∈ Sxh that have the same marginal distribution
q(x) and the conditional distributions q(hj |x) of each hidden unit hj is realized by the
RBM’s activation function with parameter ξrbm (that is the logistic sigmoid activation:
1
f (hj |x; ξrbm ) = 1+exp{− P
Wij xi −dj } ):
i∈{1,...,nx }
Hq = {q(x, h) ∈ Sxh |∃ξrbm ,
X
q(x, h) = q(x), and q(h|x; ξrbm ) =
Y
f (hj |x; ξrbm )}
(21)
hj ∈h
h
Then our problem in Section 4.3.1 is restated with respect to Sxh : search for a RBM in B
that minimizes the divergence from Hq to B 6 .
Given p(x, h; ξp ), its best approximation on Hq is defined by the projection ΓH (p), which
gives the minimum K-L divergence from Hq to p(x, h; ξp ). Next proposition shows how the
projection ΓH (p) is obtained.
Proposition 8 Given a distribution p(x, h; ξp ) ∈ B, the projection ΓH (p) ∈ Hq that gives
the minimum divergence D(Hq , p(x, h; ξp )) from Hq to p(x, h; ξp ) is the q(x, h; ξq ) ∈ Hq that
satisfies ξq = ξp .
Proof in Appendix A.8.
On the other hand, given q(x, h; ξq ) ∈ Hq , the best approximation on B is the projection
ΓB (q) of q to B. In order to obtain an explicit expression of ΓB (q), we introduce the following
fractional mixed coordinates [ζ xh ] 7 for the general manifold Sxh :
hh
xx
[ζ xh ] = (ηx1i , ηh1j , θ2 i j , ηx2i hj , θ2 i j , θ2+ )
| {z } |
{z
} |{z}
1−order
2−order
(22)
orders>2
The [ζ xh ] is a valid coordinate system, that is, the relation between [θ] and [ζ xh ] is bijective.
This is shown in the next proposition.
Proposition 9 The relation between the two coordinate systems [θ] and [ζ xh ] is bijective.
Proof in Appendix A.9.
The next proposition gives an explicit expression of the coordinates for the projection
ΓB (q) learnt by RBM using the fractional mixed coordinates in Equation (22).
6. This restated problem directly follows from the fact that: the minimum divergence D(Hq , B) in the
whole manifold Sxh is equal to the minimum divergence D[q(x), Bx ] in the visible manifold Sx , shown
in Theorem 7 in Amari et al. (1992).
7. Note that both the fractional mixed coordinates [ζ xh ] and 2-mixed coordinates [ζ] are mixtures of ηcoordinates and θ-coordinates. In [ζ], coordinates of the same order are taken from either [η] or [θ].
h h
x x
However, in [ζ xh ], the 2nd -order coordinates consist of the {ηx2i hj } from [η] and {θ2 i j , θ2 i j } from [θ],
that is why the term “fractional” is used.
14
Figure 2: The iterative learning for RBM: in searching for the minimum divergence between
Hq and B, we first choose an initial RBM p0 and then perform projections ΓH (p)
and ΓB (q) iteratively, until the fixed points of the projections p∗ and q ∗ are
reached. With different initializations, the iterative projection algorithm may
end up with different local minima on Hq and B, respectively.
Proposition 10 Given q(x, h; ξq ) ∈ Hq with fractional mixed coordinates:
xx
hh
[ζ xh ]q = (ηx1i , ηh1j , θ2 i j , ηx2i hj , θ2 i j , θ2+ ),
the coordinates of the learnt projection ΓB (q) of q(x, h; ξq ) on the submanifold B are uniquely
given by:
hh
xx
(23)
[ζ xh ]ΓB (q) = (ηx1i , ηh1j , θ2 i j = 0, ηx2i hj , θ2 i j = 0, θ2+ = 0)
Proof This proof comes in three parts:
1. the projection ΓB (q) of q(x, h) on B is unique;
2. this unique projection ΓB (q) can be achieved by minimizing the divergence D[q(x, h), B]
using gradient descent method;
3. The fractional mixed coordinates of ΓB (q) is exactly the one given in Equation (23).
See Appendix A.10 for the detailed proof.
Back to the problem of obtaining the best approximation to the given target q(x), the
learning of RBM can be implemented by the following iterative projection process8 :
Let p0 (x, h; ξp0 ) be the initial RBM. For i = 0, 1, 2, . . . ,
1. Put qi+1 (x, h) = ΓH (pi (x, h; ξpi ))
8. Amari et al. (1992) proposed a similar iterative algorithm framework for the fully-connected BM. In
the present paper, we reformulate this iterative algorithm for the learning of RBM and give explicit
expressions of how the projections are achieved.
15
2. Put pi+1 (x, h; ξpi+1 ) = ΓB (qi+1 (x, h))
where ΓH (p) denotes the projection of p(x, h; ξp ) to Hq , and ΓB (q) denotes the projection
of q(x, h) to B. The iteration ends when we reach the fixed points of the projections p∗
and q ∗ , that is ΓH (p∗ ) = q ∗ and ΓB (q ∗ ) = p∗ . The iterative projection process of RBM is
illustrated in Figure 2. The convergence property of this iterative algorithm is guaranteed
using the following proposition:
Proposition 11 The monotonic relation holds in the iterative learning algorithm:
D[qi+1 , pi ] ≥ D[qi+1 , pi+1 ] ≥ D[qi+2 , pi+1 ], ∀i = {0, 1, 2, . . . }
(24)
where the equality holds only for the fixed points of the projections.
Proof in Appendix A.11.
The CIF-based iterative projection procedure (IP) for RBM gives us an alternative way
to investigate the learning process of RBM. The invariance in the learning of RBM is the
CIF: in the ith iteration, given qi ∈ Hq with fractional mixed coordinates:
hh
xx
[ζ xh ]qi = (ηx1i , ηh1j , θ2 i j , ηx2i hj , θ2 i j , θ2+ )
then the ordinates of the projection pi on B, i.e., ΓB (qi ), is given by Equation (23):
x xj
[ζ xh ]pi = (ηx1i , ηh1j , θ2 i
h hj
= 0, ηx2i hj , θ2 i
= 0, θ2+ = 0)
Now we will show that the process of the projection ΓB (qi ) can be derived from CIF, i.e.,
highly confident coordinates [ηx1i , ηh1j , ηx2i hj ] of qi are preserved while lowly confident coordinates [θ2+ ] are set to neutral value zero. For the fractional mix coordinates system
[ζ xh ], the closed form of its Fisher information matrix does not have the good expression
formula like Proposition 3 which are possessed by the mixed-coordinate system [ζ]. Next,
we will show that the fractional mix-coordinates of ΓB (qi ) can be derived in three steps by
jointly applying the CIF and the completeness and compactness conditions. Let the corresponding 2-mixed ζ-coordinates for qi be [ζ]2,qi = (ηx1i , ηh1j , ηx2i xj , ηx2i hj , ηh2i hj , θ2+ ). First,
we apply the general CIF for parametric reduction in [ζ]2,qi by replacing lowly confident
coordinates [θ2+ ] with neutral value zeros and preserving the remaining coordinates, resulting in the tailored mix-coordinates [ζ]2t ,qi = (ηx1i , ηh1j , ηx2i xj , ηx2i hj , ηh2i hj , θ2+ = 0), as
described in Section 3. Then, we transmit [ζ]2t ,qi into the fractional coordinate system, i.e.,
xx
hh
[ζ xh ]qi = (ηx1i , ηh1j , θ2 i j , ηx2i hj , θ2 i j , θ2+ = 0). Finally, the completeness and compactness
xx
hh
conditions require that the [θ2 i j , θ2 i j ] in [ζ xh ]qi are also set to neutral value zeros. Hence,
we can see that the coordinates of the projection ΓB (qi ) is exactly the one given by Equation
(23).
4.3.4 Comparison of The Iterative Projection and Gradient-based Methods
Given current parameters ξ i of RBM and samples x that generated from the underlying
distribution q(x), IP could be implemented in two phases:
16
1. In the first phase, we generate samples for the projection ΓH (pi ) of the stationary
distribution pi (x, h; ξ i ) on Hq . This is done by sampling h from RBM’s conditional
distribution pi (h|x; ξ i ) given x, and hence (x, h) ∼ ΓH (pi (x, h; ξ i ));
2. In the second phase, we train a new RBM with those generated samples (x, h), and
then update the RBM’s parameters to be the newly trained ones, denoted as ξ i+1 .
Note that in the second phase all hidden units in RBM are visible in samples (x, h). Thus
this sub-learning task is similar with training a BM without hidden units, which can be
implemented by traditional gradient-based methods.
Given current parameters ξ i of RBM (with stationary distribution pi ) and samples
x ∼ q(x), we can see that both ML and IP share the same sampling process, sampling
(x, h) in the ΓH (pi ) projection phase of IP and the positive phase of ML. In terms of the
quality of the sampling process, if x is sufficient and so is (x, h), both the ΓH (pi ) of IP and
positive phase of ML can achieve an accurate estimation of q(x, h; ξ i ). On the other hand,
if x is insufficient (it is usually true in real-world applications), sampling biases with respect
to q(x, h; ξ i ) may be introduced in the sampling process so that the accurate estimation can
not be guaranteed.
However, the updating rule is different: IP realizes the parameter updating by using a
sub-learning task (fitting a new RBM to the generated sample (x, h)), while ML adjusts the
parameters directly using Equation (17). Let qi+1 denote the distribution of (x, h), and pi+1
and p0i+1 denote the stationary distributions of RBM after the parameter updating using
IP and ML respectively. With a proper learning rate λ, the parameter updating phase of
ML would lead to the decrease of divergence, that is, D[qi+1 , pi ] ≥ D[qi+1 , p0i+1 ]. Since
pi+1 is the projection of qi+1 on B, then we have D[qi+1 , p0i+1 ] ≥ D[qi+1 , pi+1 ]. Therefore,
ML can be seen as an “unmature projection” of qi+1 on B, and it does not guarantee
that the theoretical projection ΓB (qi+1 ) is reached. To achieve the same projection point
ΓB (qi+1 ) as IP, ML needs multiple updating iterations, where each iteration moves the
current distribution towards ΓB (qi+1 ) in the gradient direction by some oracle step size
(controlled by the learning rate).
Another big difference is that IP separates the positive sampling process and the gradient
estimation in two phases: ΓH and ΓB , meaning that there is no positive sampling in the
sub-learning of ΓB . However, ML needs to constantly adjust the gradient direction with
respect to certain learning rate immediately after each sampling process. Later experiments
in Section 5.2 indicate that this may give IP the advantage of robustness against sampling
biases, especially when the gradient is too small to be distinguishable from these biases in
the learning process.
4.3.5 Discussions on deep Boltzmann machine
For deep Boltzmann machine (DBM) (Salakhutdinov and Hinton, 2012), several layers
of RBM compose a deep architecture in order to achieve a representation at a sufficient
abstraction level, where the hidden units are trained to capture the dependencies of units
at the lower layers, as shown in Figure 3. In this section, we give a discussion on some
theoretical insights on the deep architectures, in terms of the CIF principle.
In Section 4.3.2, we have shown that the structure of RBM implies the compactness and
completeness conditions, which could guide the learning of a good representation. Thus
17
Figure 3: A multi-layer BM with visible units x and hidden layers h(1) , h(2) and h(3) . The
greedy layer-wise training of deep architecture is to maximally preserve the confident information layer by layer. Note that the prohibition sign indicates that
the Fisher information on lowly confident coordinates is not preserved.
DBM can be seen as the composition of a series of representation learning stages. Then,
an immediate question is: what kind of representation of the data should be generated as
the output of each stage? From an information abstraction point of view, each stage of
the deep architecture could build up more abstract features by using the highly confident
information on parameters (or coordinates) that is transmitted from less abstract features in
lower layers. Those more abstract features would potentially have a greater representation
power (Bengio et al., 2013). The CIF principle describes how the information flows in those
representation transformations, as illustrated in Figure 3. We propose that each layer of
DBM determines a submanifold M of S, where M could maximally preserve the highly
confident information on parameters, as shown in Section 4.3.3. Then the whole DBM
can be seen as the process of repeatedly applying CIF in each layer, achieving the tradeoff
between the abstractness of representation features and the intrinsic information confidence
preserved on parameters.
Once a good representation has been found at each level by layer-wise application of
unsupervised greedy pre-training, it can be used to initialize and train the deep neural
networks through supervised learning (Hinton and Salakhutdinov, 2006; Erhan et al., 2010).
Recall that the straightforward application of gradient-based methods to train all layers of a
DBM simultaneously tends to fall into a poor local minima (Younes, 1998; Desjardins et al.,
2012). Now, our next question is: why can the layer-wise pre-training give a more reasonable
parameter initialisation? Empirically, Erhan et al. (2010) shows that the unsupervised pretraining acts as a regularization on parameters in a way that the parameters are set into a
region, from which better basins of attraction can be reached. Theoretically, by using the
fractional mixed coordinates, it can be shown that this regularized region is actually the
layer-wise restriction using CIF, i.e., the highly confident coordinates are preserved with
18
respect to the target density and all lowly confident coordinates are set to a neutral value of
zero, as illustrated in Figure 3. Effectively, the parameter space is regularized to fall into a
region where the parameters can be confidently estimated based on the given data. Under
this CIF-based regularization, the pre-training can be seen as searching for a reasonable
parameter setting, from which a good representation of the input data can be generated in
each layer.
5. Experimental Study
In this section, we will empirically investigate the CIF principle in density estimation tasks
on two types of Boltzmann machines, i.e., SBM and RBM. More specifically, for SBM, we
will investigate how to use CIF to take effect on the learning trajectory with respect to the
specific sample, and hence further confine the parameter space to the region corresponding to
the most confident information contained in given data. For RBM, it is inconvenient to use
a sample-specific strategy since the information of hidden variables is missed. Alternatively
we investigate the potential of the iterative projection procedure proposed previously. For
both SBM and RBM, two baseline learning methods, i.e., the contractive divergence (CD)
(Hinton, 2002; Carreira-Perpinan and Hinton, 2005) and maximum-likelihood (ML) (Ackley
et al., 1985), are adopted.
The ML learning is described in Section 4.1.2. The CD can be seen as an approximation
of ML. Let q(x) be the underlying probability distribution from which sample x are generated independently. Then our goal is to train a BM (with stationary probability p(x, h; ξ)
in Equation 13) based on x that realizes q(x) as faithfully as possible. Comparing to ML,
the CD learning realizes the gradient descend of a different objective function to avoid the
difficulty of computing the log-likelihood gradient in ML, shown as follows:
∆ξ = −ε ·
∂(D(q0 , p) − D(pm , p))
∂E(x, h; ξ)
∂E(x, h; ξ)
= ε · (−h
i0 + h
im )
∂ξ
∂ξ
∂ξ
(25)
where q0 is the sample distribution, pm is the distribution by starting the Markov chain
with the data and running m steps, h·i0 and h·im denote the averages with respect to the
distribution p0 and pm , and D(·, ·) denotes the K-L divergence.
In these experiments, two kinds of binary datasets are used:
1. The artificial binary dataset: we first randomly select the target distribution q(x),
which is chosen uniformly from the open probability simplex over the n random variables. Then, the dataset with N samples are generated from q(x).
2. The 20 News Groups binary dataset: 20 News Groups is a collection of approximately
20,000 newsgroup documents, partitioned evenly across 20 different newsgroups 9 . The
collection is preprocessed using porter stemmer and stop-word removal. We select top
100 terms with highest frequency in the collection. Each document is represented as
a 100-dimensional binary vector, where each element indicates whether certain term
occurs in current document or not.
9. The 20 News Group dataset is freely downloadable from http://qwone.com/∼jason/20Newsgroups/
19
5.1 Experiments with SBM
From the perspective of IG, we can see that ML/CD learning is to update parameters in
SBM so that its corresponding coordinates [η 2− ] are getting closer to the data distribution.
This is consistent with our theoretical analysis in Section 3 and Section 4.2 that SBM uses
the most confident information (i.e., [η 2− ]) for approximating an arbitrary distribution in
an expected sense. But, for the distribution with specific samples, can CIF further recognize
less-confident parameters in SBM and reduce them properly?
Our solution here is to apply CIF to take effect on the learning trajectory with respect to
specific samples, and hence further confine the parameter space to the region that indicated
by the most confident information contained in the samples. This experiment shows that
given specific samples we need to preserve the confident parameters to certain extend, and
there should exist some golden ratio that would produce best performance on average.
5.1.1 A Sample-specific CIF-based CD Learning
The main modification of our CIF-based CD algorithm (CD-CIF for short) is that we
generate the samples for pm (x) based on those parameters with confident information,
where the confident information carried by certain parameter is inherited from the sample
and could be assessed using its Fisher information computed in terms of the sample.
For CD-1 (i.e., m=1), the firing probability for the ith neuron after one-step transition
(0) (0)
(0)
from the initial state x(0) = {x1 , x2 , . . . , xn }) is:
(1)
p(m=1) (xi
1
= 1|x(0) ) =
1 + exp{−
(0)
j6=i Uij xj
P
(26)
− bi }
For CD-CIF, the firing probability in Equation 26 is modified as follows:
1
(1)
p0(m=1) (xi = 1|x(0) ) =
P
(0)
1 + exp{− (j6=i)&(F (Uij )>τ ) Uij xj − bi }
(27)
where τ is a pre-selected threshold, F (Uij ) = Eq0 [xi xj ]−Eq0 [xi xj ]2 is the Fisher information
of Uij (see Equation 8) and the expectations are estimated from the given sample x. We
can see that those weights whose Fisher information are less than τ are considered to be
unreliable w.r.t. x. In practice, we could setup τ by the ratio r to specify the remaining
proportion of the total Fisher information TF I of all parameters, i.e., τ = r ∗ TF I .
In summary, CD-CIF is realized in two phases. In the first phase, we initially “guess”
whether certain parameter could be faithfully estimated based on the finite sample. In the
second phase, we approximate the gradient using the CD scheme, except for the CIF-based
firing function is used.
5.1.2 Results and Discussions on Artificial Dataset
In this section, we empirically investigate our justifications for the CIF principle, especially
how the sample-specific CIF-based CD learning works in the context of density estimation.
Experimental Setup and Evaluation Metric: For computation simplicity, the artificial dataset is set to be 10-dimensional. Three learning algorithms are investigated: ML,
CD-1 and our CD-CIF. K-L divergence is used to evaluate the goodness-of-fit of the SBM
20
Density Estimation Performance for CD−CIF
Performance Change with varying amount of Confident Information (1200)
3
Performance Change with varying amount of Confident Information (100)
0.55
0.4
0.35
0.3
0.25
0.2
0
200
400
600
800
Number of samples N
(a)
1000
1200
CD−1
ML
CD−CIF
0.52
K−L Divergence (Background vs SBMs)
0.45
K−L Divergence (Background vs SBMs)
K−L Divergence (Background vs SBMs)
0.54
CD−1
ML
CD−CIF
0.5
0.5
0.48
0.46
0.44
0.42
0.4
0.38
0.1
0.2
0.3
0.4
0.5
0.6
0.7
0.8
0.9
Learning Trajectory using 400 samples
0.36
True Distribution
0.35
0.34
2
0.33
0.14
1.5
0.135
1
0.13
0.94
0.32
0.96
0.98
1
0.31
0.5
0
0.1
1
CD−1
ML
CD−CIF
2.5
Fixed Point
of CD−CIF
Fixed Point of CD−1
Fixed Point of ML
Training Start Point
0.3
0.2
0.3
0.4
0.5
0.6
r
r
(b)
(c)
0.7
0.8
0.9
1
0.29
0.93
0.94
0.95
0.96
0.97
0.98
0.99
(d)
Figure 4: (a): the performances of CD-CIF on different sample sizes; (b) and (c): the
performances of CD-CIF with various values of r on two typical sample sizes, i.e.,
100 and 1200; (d): learning trajectories of last 100 steps for ML (squares), CD-1
(triangles) and CD-CIF (circles).
trained by various algorithms. For sample size N , we run 100 instances (20 randomly generated distributions × 5 randomly running) and report the averaged K-L divergences. Note
that we focus on the case that the variable number is relatively small (n = 10) in order to
analytically evaluate the K-L divergence and give a detailed study on algorithms. Changing the number of variables only offers a trivial influence for experimental results since we
obtained qualitatively similar observations on various variable numbers (not reported here).
Automatically Adjusting r for Different Sample Sizes: The Fisher information
is additive for i.i.d. sampling. When sample size N changes, it is naturally to require that
the total amount of Fisher information contained in all tailored parameters is steady. Hence
we have α = (1 − r)N , where α indicates the amount of Fisher information and becomes a
constant when the learning model and the underlying distribution family are given. It turns
out that we can first identify α using the optimal r w.r.t. several distributions generated
from the underlying distribution family, and then determine the optimal r for various sample
sizes using: r = 1 − α/N . In our experiments, we set α = 35.
Density Estimation Performance: The averaged K-L divergences between SBM
(learned by ML, CD-1 and CD-CIF with the r automatically determined) and the underlying
distribution are shown in Figure 4(a). In the case of relatively small samples (N ≤ 500)
in Figure 4(a), our CD-CIF method shows significant improvements over ML (from 10.3%
to 16.0%) and CD-1(from 11.0% to 21.0%). This is because we could not expect to have
reliable identifications for all model parameters from insufficient samples, and hence CD-CIF
gains its advantages by using parameters that could be confidently estimated. This result is
consistent with our previous theoretical insight that Fisher information gives a reasonable
guidance for parametric reduction via the confidence criterion. As the sample size increases
(N ≥ 600), CD-CIF, ML and CD-1 tend to have similar performances. Since with relatively
large samples most model parameters can be reasonably estimated, and hence the effect of
parameter reduction using CIF gradually becomes marginal. In Figure 4(b), Figure 4(c), we
show how sample size affects the interval of r that achieves improvements over CD-1. For
N = 100, CD-CIF achieves significantly better performances for a wide range of r. While,
for N = 1200, CD-CIF can only marginally outperform baselines for a narrow range of r.
Effects on Learning Trajectories: We use the 2D visualizing technology SNE to
investigate learning trajectories and dynamical behaviors of three comparative algorithms
21
Density estimation performance on 20 News Groups
22
21.5
Hamming distance
21
20.5
CD−1
ML
CD−CIF
20
19.5
19
18.5
18
0.1
0.2
0.3
0.4
0.5
0.6
0.7
0.8
0.9
1
r
Figure 5: the performances of CD-CIF with various values of r on 20 news group dataset
(Carreira-Perpinan and Hinton, 2005). We start three methods with the same parameter initialization. Then each intermediate state is represented by a 55-dimensional vector
formed by its current parameter values. From Figure 4(d), we can see that: 1) In the final
100 steps, three methods seem to end up with staying in different regions of the parameter
space, and CD-CIF confines the parameter in a relatively thinner region compared to ML
and CD-1; 2) The true distribution is usually located on the side of CD-CIF, indicating its
potential for converging to the optimal solution. Note that the above claims are based on
general observations and Figure 4(d) is shown as an illustration. Hence we may conclude
that CD-CIF regularizes the learning trajectories in a desired region of the parameter space
using the sample-specific CIF principle.
5.1.3 Results and Discussions on Real Textual Dataset
In this section, we empirically investigate how the sample-specific CIF-based CD learning
works on real-world datasets in the context of density estimation. In particular, we use
the SBM to learn the underlying probability density over 100 terms of the 20 News Groups
binary dataset. The learning rate for CD-1, ML and CD-CIF are manually tuned in order to
converge properly and all set to 0.001. Since it is infeasible to compute the K-L devergence
due to the high dimensionality, the averaged Hamming distance between the samples in the
dataset and those generated from the SBM is used to evaluate the goodness-of-fit of the
SBM’s trained by various algorithms. Let D = {d1 , d2 , . . . , dN } denote the dataset of N
documents, where each document di is a 100-dimensional binary vector. To evaluate a SBM
with parameter ξsbm , we first randomly generate N samples from the stationary distribution
p(x; ξsbm ), denoted as V = {v1 , v2 , . . . , vN }. Then the averaged hamming distance Dham is
calculated as follows:
P
di (minvj (Ham[di , vj ])
Dham [D, V ] =
N
where Ham[di , vj ] is the number of positions at which the corresponding values are different.
22
The result is shown in Figure 5. Our CD-CIF method shows maximal improvements
over ML (12.15%) and CD-1(15.05%) at r = 0.92. We can also see that CD-CIF achieves
significantly better performances for a wide range of r ∈ [0.5, 0.96], which is consistent with
our observations with the experiments on artificial datasets when the samples is insufficient.
5.2 Experiments with RBM
The RBM is practically more interesting than SBM, since it has higher representational
power. In this section, we will compare three different learning algorithms for RBM: CD-1,
ML and IP. In Carreira-Perpinan and Hinton (2005), CD is shown to be biased with respect
to ML for almost all data distributions. In Section 4.3.4, we have compared ML and IP
theoretically. In this section, an empirical study on the three algorithms is conducted.
5.2.1 Results and Discussion on Artificial Datasets
Experimental Setup and Evaluation Metric: For computational simplicity, the artificial dataset is of 5 dimensionality, and the number of hidden units in RBM is set to
5. Three learning algorithms are investigated: ML, CD-1 and IP. K-L divergence is used
to evaluate the goodness-of-fit of the RBM’s trained by various algorithms. Six different
sample sizes N are tested, namely 50, 100, 200, 500, 5000 and 50000. For sample size N ,
the learning rates for CD-1 and ML are set to be ε = 0.5/N , and we observe that they
could converge properly. For the sub-learning phase ΓB of IP, we adopt the CD algorithm
for the training of BM without hidden units, whose learning rate is also set to ε = 0.5/N .
We need to scan the dataset multiple times in order to iteratively update parameters, and
each full scan of the whole dataset is called an epoch. In CD-1 and ML, we set the maximal
number of epoches to 8000. We run the IP for 40 iterations, and each iteration is a CD
sub-training with the maximal number of epoches setting to 200. We adopt CD-1 as the
baseline method.
Results and Analysis: The on-average performances of the three methods on dataset
of different scales are shown in Table 1 in the context of density estimation. In order to study
the behavior of IP, we plot the sequences of K-L divergence between target distribution and
RBM in each iteration along the whole learning trajectory, shown in Figure 6. Comparing
CD-1 with ML, we can see that the K-L divergences of both CD-1 and ML decrease in a
similar way, converging at the same rate, taking the same number of iterations to converge
to a given tolerance, which is consistent with the conclusion in Hinton (2002).
From the convergence behavior of IP shown in Figure 6, we can see that the general trend
is that the K-L divergence decreases steadily with small fluctuations. Since there are only
few iterations in IP, it is reasonable for us to select the best performance that IP has reached
in the whole learning process, called the best IP. Here the K-L divergence between the sample
distribution and RBM’s stationary distribution is adopted as the selection metric. Thus, in
addition to the converging performance, we also show the best performance selected among
all 40 iterations for IP in Table 1. Note that the best performances for CD-1 and ML are
not reported, since their converging performances are often approximately the best ones.
For small sample size (e.g., 50 and 100), we can see that the converging performance of
IP is comparable with respect to CD and ML. As the sample size increases, we can see that
IP gradually outperforms CD-1 and ML, and shows significant improvement on large sample
23
sample size = 50000
sample size = 100
1.4
1.4
ML
CD−1
IP
1.2
1.2
1
K−L divergence
1
K−L divergence
ML
CD−1
IP
0.8
0.6
epoch=200
epoch=2000
0.8
0.6
0.4
0.4
epoch=200
epoch=4000
epoch=4000
0.2
0.2
0
epoch=2000
0
0.5
1
1.5
2
2.5
3
3.5
0
4
0
0.5
1
1.5
2
Iteration 10x
Iteration 10x
(a)
(b)
2.5
3
3.5
4
Figure 6: (a) and (b) illustrate the averaged learning curves for CD-1, ML and IP for 30
randomly chosen data distributions, with sample size 100 and 50000 respectively.
The x-axis is in log10 scale. To compare the efficiency of different algorithms
along the time-line (the time unit is an epoch, that is, the time used for the
parameter updates in each full scan of the whole dataset), we plot three time
stamps (epoch=100, 1000 and 4000). Note that each iteration in IP contains a
sub-training task, which is trained using 200 epoch in this experiment.
size (e.g., 5000 and 50000). For the best IP, its performance is significantly better than CD1 and ML for all sample sizes, indicating that IP has the potential to further improve its
performance by using some suitable selection metric. Comparing to ML, IP takes much
shorter iterations as expected to achieve a performance threshold. Theoretically, IP can
converge to the local minimum of RBM based on our theoretical analysis in Section 4.3.4.
If a proper learning rate is selected, ML can also converge to a local minimum. However,
one interesting result is that sometimes there is a big difference between the convergence
points of IP and ML, even in cases that the sampling is sufficient (e.g., sample size equals
50000).
This can be explained as follows. In practice, ML needs to constantly do positive
and negative sampling in each updating, which may produce much sample biases. As the
gradient decreasing to a small value, the correct gradient direction may be fluctuated by
the sample biases. Thus, instead of converging to the local minimum, ML might fluctuate
around some sub-optimal region. Actually, the ΓH in IP is a sampling process that may also
introduce sample biases. That is why the IP is fluctuated when the sample is insufficient, as
shown in Figure 6(a). Given sufficient samples, the sampling biases in ΓH decreases and the
fluctuation of IP declines, as shown in Figure 6(b). For ML, though the sampling biases for
the whole dataset becomes small given sufficient samples, the gradient estimation for each
sample is still closely intergraded with the sample bias of certain sample, meaning that
this inseparable coupling relationship results in a biased gradient estimation. The main
advantage of the IP procedure over traditional gradient-based methods is the separation
24
Sample Size
50
100
200
500
5000
50000
CD-1
0.0970
0.0786
0.0672
0.0621
0.0532
0.0497
ML
0.0971
0.0793
0.0678
0.0621
0.0524
0.0475
Converge IP (-chg%)
0.0978 (+0.81%)
0.0787 (+0.08%)
0.0640 (-4.75%)
0.0594 (-4.25%)
0.0468 (-12.00%)
0.0411 (-17.37%)
Best IP (-chg%)
0.0774 (-20.21%)
0.0637 (-18.92%)
0.0575 (-14.45%)
0.0567 (-8.61%)
0.0437 (-17.81%)
0.0332 (-33.08%)
Table 1: Performance comparison of CD-1, ML and IP in the density estimation task. The
change of IP with respect to the baseline method (CD-1) is reported.
Density estimation performance for 20 News Groups
18
Hamming distance
17
CD−1
ML
IP
16
15
14
13
12
10
20
30
40
50
60
70
Number of hidden units
80
90
100
Figure 7: Performances of IP with various number of hidden units on 20 News Group
of the positive sampling process and the gradient estimation. We conjecture that this
independent design gives IP the potential to achieve optimal solutions that CD-1 and ML
can not reach.
5.2.2 Results and Discussion on Real Textual Dataset
In this section, we empirically investigate how the IP works for RBM on real-world datasets
in the context of density estimation. We use the RBM to learn the probability density
over 100 terms on the 20 News Groups binary dataset. The number of hidden units nh in
RBM is set to [10, 20, . . . , 100]. The learning rate for CD-1and ML are manually tuned in
order to converge properly and all set to 0.001. The learning rate for the CD sub-learning
task in IP is also set to 0.001. We run IP for 9 iterations for all settings of nh . Similar
with the experiments in Section 5.1.3, the averaged Hamming distance is used to evaluate
the goodness-of-fit of the RBM’s trained by various algorithms. The average Hamming
distances for ML, CD-1 and IP are shown in Figure 7. We can see that IP achieves better
25
performances on all settings of nh . And the hamming distance for IP drops dramatically
as nh increases. This trend can be explained as follows. As nh grows, the sampling biases
increases and the interference of sampling biases with respect to the gradient estimation
becomes more and more serious. This limits the actual performance of RBMs learnt by
CD-1 and ML, with respect to the growing modelling power gained by increasing nh . As
shown in Section 5.2.1, the IP procedure separates the positive sampling process and the
gradient estimation in two phases: ΓH and ΓB . This result shows that IP has the potential
to achieve optimal solutions that CD-1 and ML can not reach in real-world applications.
6. Conclusions
The CIF principle proposed in this paper tackles the problem of dimensionality reduction in
parameter space by preserving the parameters with highly confident estimates and tailoring the less confident parameters. It provides a strategy for the derivation of probabilistic
models. The SBM and RBM are specific examples in this regard. They have been theoretically shown to achieve a reliable representation in parameter spaces by exactly using the
general CIF principle. CIF gives us a principled and context-independent way to address
the questions on what we should do for parameter reduction (regularization) and how to do
it. Based on CIF, we also show that the deep neural networks consisting of several layers of
RBM can be seen as the layer-wise usage of CIF, leading to some theoretical interpretations
of the rationale behind deep learning models.
One interesting result shown in our experiments is that: although CD-CIF is a biased algorithm, it could significantly outperform ML when the sample is insufficient. This suggests
that CIF gives us a reasonable criterion for recognizing and utilizing confident information
from the underlying data while ML fails to do so. Another interesting observation is that
ML and the CIF-based IP lead to different convergence points in the training of RBM.
Our experimental results indicate that IP has the advantage of robustness against sampling
biases, due to the separation of the positive sampling process and the gradient estimation.
In the future, we will further develop the formal justification of CIF w.r.t various contexts
(e.g., distribution families or models). We will also conduct more extensive experiments on
real world applications, such as document classification and handwritten digit recognition,
to further justify the properties of IP. We will also extend the IP to train deep neural
networks.
Acknowledgments
This work is partially supported by the Chinese National Program on Key Basic Research
Project (973 Program, grant no. 2013CB329304 and 2014CB744604), the Natural Science
Foundation of China (grants no. 61070044, 61111130190, 61272265 and 61105072), and
the European Union Framework 7 Marie-Curie International Research Staff Exchange Programme (grant no. 247590).
26
Appendix A.
A.1 Proof of Proposition 1
Proof By definition, we have:
gIJ =
∂ 2 ψ(θ)
∂θI ∂θJ
where ψ(θ) is defined by Equation (4). Hence, we have:
gIJ
P
∂ 2 ( I θI ηI − φ(η))
∂ηI
= J
=
∂θI ∂θJ
∂θ
By differentiating ηI , defined by Equation (1), with respect to θJ , we have:
gIJ
P
P
∂ x XI (x)(exp{ I θI XI (x) − ψ(θ)})
∂ηI
=
=
∂θJ
∂θJ
X
=
XI (x)[XJ (x) − ηJ ]p(x; θ) = ηI S J − ηI ηJ
x
This completes the proof.
A.2 Proof of Proposition 2
Proof By definition, we have:
g IJ =
∂ 2 φ(η)
∂ηI ∂ηJ
where φ(η) is defined by Equation (4). Hence we have:
g
IJ
=
P
∂ 2 ( J θJ ηJ − ψ(θ))
∂θI
=
∂ηI ∂ηJ
∂ηJ
Based on Equation (2) and (1), the θI and pK could be calculated by solving a linear
equation system of [p] and [η] respectively. Hence we have:
θI =
X
X
(−1)|I−K| log(pK ); pK =
K⊆I
(−1)|J−K| ηJ
K⊆J
Therefore, the partial derivation of θI with respect to ηJ is:
g IJ =
∂θI
∂ηJ
=
X ∂θI ∂pK
X
1
(−1)|I−K|+|J−K| ·
·
=
∂pK ∂ηJ
pK
K
K⊆I∩J
This completes the proof.
27
A.3 Proof of Proposition 3
Proof
The
Fisher information matrix of [ζ] could be partitioned into four parts: Gζ =
A C
. It can be verified that in the mixed coordinate, the θ-coordinate of order k
D B
is orthogonal to any η-coordinate less than k-order, impling the corresponding element of
Fisher information matrix is zero (C = D = 0) (Nakahara and Amari, 2002). Hence, Gζ is
a block diagonal matrix.
According to Cramér-Rao bound (Rao, 1945), a parameter (or a pair of parameters)
has a unique asymptotically tight lower bound of the variance (or covariance) of unbiased
estimate, which is given by the corresponding element of the inverse of Fisher information
matrix involving this parameter (or this pair of parameters). Recall that Iη is the index
set of the parameters shared by [η] and [ζ]l and Jθ is the index set of the parameters
−1
−1
−1
−1
=
shared by [θ] and [ζ]l , we have (G−1
ζ )Iζ = (Gη )Iη and (Gζ )Jζ = (Gθ )Jθ , i.e., Gζ
−1
(Gη )Iη
0
. Since Gζ is a block tridiagonal matrix, the proposition follows.
0
(G−1
θ )Jθ
A.4 Proof of Proposition 4
U X
, which is parXT V
titioned based on Iη and Jθ . Based on Proposition 3, we have A = U −1 . Obviously, the
diagonal elements of U are all smaller than one. According to the succeeding Lemma 12,
we can see that the diagonal elements of A (i.e., U −1 ) are greater than 1.
Next we need to show that the diagonal elements of B are smaller than 1. Using the
−1
Schur complement of Gθ , the bottom-right block of G−1
θ , i.e., (Gθ )Jθ , equals to (V −
X T U −1 X)−1 . Thus the diagonal elements of B: Bjj = (V − X T U −1 X)jj < Vjj < 1. Hence
we complete the proof.
Proof Assume the Fisher information matrix of [θ] be Gθ =
Lemma 12 With a l × l positive definite matrix H, if Hii < 1, then (H −1 )ii > 1, ∀i ∈
{1, 2, . . . , l}.
Proof Since H is positive definite, it is a Gramian matrix of l linearly independent vectors
v1 , v2 , . . . , vl , i.e., Hij = hvi , vj i (h·, ·i denotes the inner product). Similarly, H −1 is the
Gramian matrix of l linearly independent vectors w1 , w2 , . . . , wl and (H −1 )ij = hwi , wj i.
It is easy to verify
that hwi , vi i = 1, ∀i ∈ {1, 2, . . . , l}. If Hii < 1, we can see that the
√
norm kvi k = Hii < 1. Since kwi k × kvi k ≥ hwi , vi i = 1, we have kwi k > 1. Hence,
(H −1 )ii = hwi , wi i = kwi k2 > 1.
A.5 Proof of Proposition 5
Proof Let Bq be a ε-ball surface centered at q(x) on manifold S, i.e., Bq = {ζ ∈ S|kζ −
ζq k2 = ε}, where k · k2 denotes the Euclid norm and ζq is the coordinates of q(x). Let
q(x) + dq be a neighbor of q(x) uniformly sampled on Bq and ζq(x)+dq be its corresponding
coordinates. For a small ε, we can calculate the expected information distance between
q(x) and q(x) + dq as follows:
Z
1
EBq = [(ζq(x)+dq − ζq )T Gζ (ζq(x)+dq − ζq )] 2 dBq
(28)
28
where Gζ is the Fisher information matrix at q(x).
Since Fisher information matrix Gζ is both positive definite and symmetric, there exists
a singular value decomposition Gζ = U T ΛU where U is an orthogonal matrix and Λ is a
diagonal matrix with diagonal entries equal to the eigenvalues of Gζ (all ≥ 0).
Apply the singular value decomposition into Equation (28), the distance becomes:
Z
1
EBq = [(ζq(x)+dq − ζq )T U T ΛU (ζq(x)+dq − ζq )] 2 dBq
(29)
Note that U is an orthogonal matrix, and the transformation U (ζq(x)+dq − ζq ) is a normpreserving rotation.
Now we need to show that among all tailored k-dimensional submanifolds of S, [ζ]lt is
the one that preserves maximum information distance. Assume IT = {i1 , i2 , . . . , ik } is the
index of k coordinates that we choose to form the tailored submanifold T in the mixedcoordinates [ζ]. Based on Equation (29), the expected information distance EBq for T is
proportional to the sum of eigenvalues of the sub-matrix (Gζ )IT , where the sum equals to
the trace of (Gζ )IT .
Next we show that the sub-matrix of Gζ specified by [ζ]lt gives maximum trace. Based
on Proposition 4, the elements on the main diagonal of the sub-matrix A are lower bounded
by one, and those of B upper bounded by one. Therefore, [ζ]lt gives maximum trace among
all sub-matrices of Gζ . This completes the proof.
A.6 Proof of Proposition 6
Proof Let Msbm be the set of all probability distributions realized by SBM. Amari
et al. (1992) proves that the mixed-coordinates of the resulting projection P on Msbm
2 , 0, . . . , 0), given the 2-mixed-coordinates of q(x). M
is [ζ]P = (ηi1 , ηij
sbm is equivalent to the
submanifold tailored by CIF, i.e. [ζ]2t . The corollary follows from Proposition 5.
A.7 Proof of Proposition 7
Proof Based on Equation 15, the coordinates [θ2+ ] for SBM is zero: θ2+ = 0. Next, we
2 ] with q(x).
show that the stationary distribution p(x; ξ) learnt by ML has the same [ηi1 , ηij
For SBM, the
∂E(x;ξ)
∂ξ
can be easily calculated from Equation (12):
∂E(x;ξ) = xi xj ,
∂Ux x
f or Uxi xj ∈ ξ;
∂E(x;ξ)
∂bxi
f or bxi ∈ ξ.
i j
= xi ,
Thus, based on Equation 17, the gradients for Uxi xj , bxi ∈ ξ are as follows:
∂ log p(x;ξ) = hxi xj i0 − hxi xj i∞ = η 2 (q(x)) − η 2 (p(x; ξ)), f or Uxi xj ∈ ξ;
ij
ij
∂Ux ,x
i
j
∂ log p(x;ξ) = hxi i0 − hxi i∞ = ηi1 (q(x)) − ηi1 (p(x; ξ)),
∂bx
i
f or bxi ∈ ξ.
where h·i0 denotes the average using the sample data and h·i∞ denotes the average with
respect to the stationary distribution p(x; ξ).
29
Since SBM defines an e-flat submanifold Msbm of S (Amari et al., 1992), then ML
converges to the unique solution that gives the best approximation p(x; ξ) ∈ Msbm of q(x).
p(x;ξ)
When ML converges, we have ∆ξ → 0 and hence ∂ log∂ξ
→ 0. Thus, we can see that ML
2 ] of q(x). This
converges to stationary distribution p(x; ξ) that preserves coordinates [ηi1 , ηij
completes the proof.
A.8 Proof of Proposition 8
Proof Based on the definition of divergence in Equation (11), the following relation holds:
D[q(x, h), p(x, h)] = D[q(x)q(h|x), p(x)p(h|x)]
q(x)
q(h|x)
= Eq(x,h) [log
+ log
]
p(x)
p(h|x)
= D[q(x), p(x)] + Eq(x) [D[q(h|x), p(h|x)]]
where Eq(x,h) [·] and Eq(x) [·] are the expectations taken over q(x, h) and q(x) respectively.
Therefore, the minimum divergence between p(x, h; ξp ) and Hq is given as:
D(Hq , p(x, h; ξp )) =
min
q(x,h;ξq )∈Hq
D[q(x, h; ξq ), p(x, h; ξp )]
= min{D[q(x), p(x)] + Eq (x)[D[q(h|x; ξq ), p(h|x; ξp )]]}
ξq
= D[q(x), p(x)] + min{Eq(x) [D[q(h|x; ξq ), p(h|x; ξp )]]}
ξq
= D[q(x), p(x)]
In the last equality, the expected divergence between q(h|x; ξq ) and p(h|x; ξp ) vanishes if
and only if ξq = ξp . This completes the proof.10
A.9 Proof of Proposition 9
Proof First, we show that [ζ xh ] is determined given [θ]. Since there is a one-to-one
correspondence between coordinates [θ] and [p], [ζ xh ] can be directly calculated from the
p-coordinates corresponding to [θ] based on Equation (1) and (2).
hh
xx
Second, [θ] is determined by knowing [ζ xh ]. The {θ2 i j , θ2 i j , θ2+ } part of [θ] are set to be
xx
hh
h
xh
equal to those in [ζ xh ]. By fixing {θ2 i j , θ2 i j , θ2+ } and setting {θ1xi , θ1 j , θ2 i j } free, we now
have an e-flat smooth submanifold R. Assume that there exist two different distributions
P1 and P2 with coordinates [θ]1 and [θ]2 that have the same mixed coordinates [ζ xh ]. Thus
both P1 and P2 belong to R and share the same value of {ηx1i , ηh1j , ηx2i hj }. Let Q ∈ Sxh be a
distribution whose projection on R is P1 . Based on the Projection Theorem in Amari and
Nagaoka (1993), P1 is the unique closest point on R to Q. Considering the minimization of
the divergence D[Q, PR ] between PR ∈ R and Q, the gradient vector of D[Q, PR ] over the
h
xh
free parameters {θ1xi , θ1 j , θ2 i j } at P1 , that is {ηx1i , ηh1j , ηx2i hj }PR −{ηx1i , ηh1j , ηx2i hj }Q , equals to
zero vector. Then, P2 also has a zero-gradient vector and hence is the projection point of Q,
since P2 has the same {ηx1i , ηh1j , ηx2i hj } with P1 . However, since R is e-flat 11 , the projection
10. Note that a similar path of proof is also used in Theorem 7 of Amari et al. (1992), which is for the
fully-connected BM. Here, Here, we reformulate the proof for RBM to derive the projection ΓH (p(x, h)).
11. For more information about the concept of flatness, please refer to the book Amari and Nagaoka (1993).
30
of Q on R is unique, meaning that P1 and P2 are the same point. Therefore, there does
not exist two different distributions P1 and P2 that have the same mixed coordinates [ζ xh ].
This completes the proof.
A.10 Proof of Proposition 10
Proof First, we prove the uniqueness of the projection ΓB (q). From the [θ] of RBM in
Equation (20), B is an e-flat smooth submanifold of Sxh . Thus the projection is unique.
Note that
Second, in order to find the p(x, h; ξp ) ∈ B with parameter ξp that minimizes the
divergence between q(x, h; ξq ) and B, the gradient descent method iteratively adjusts ξp
in the negative gradient direction that the divergence D[q, p(ξp )] decreases fastest:
4ξp = −λ
∂D[q, p(ξp )]
∂ξp
where D[q, p(ξp )] is treated as a function of RBM’s parameters ξp and λ is the learning rate.
As shown in Albizuri et al. (1995), the gradient descent method converges to the minimum
of the divergence with proper choices of λ, and hence achieves the projection point ΓB (q).
Last, we show that the fractional mixed coordinates [ζ xh ]ΓB (q) in Equation (23) is exactly
the convergence point of the learning for RBM . We calculate the first-order derivative of
D[q, p(ξp )], w.r.t ξp , where p(x, h; ξp ) = Z1 exp{−E(x, h; ξp )} is given in Equation (13).
For Wxi ,hj in ξp (denoted as Wij ), we have:
X q(x, h) ∂p(x, h; ξp )
∂D[q, p(ξp )]
=−
∂Wij
p(x, h; ξp )
∂Wij
(30)
x,h
where the
∂p(x,h)
∂Wij
is calculated as follows:
∂p(x, h; ξp )
∂Wij
= Z −1 exp{−E(x, h)}{
∂(−E(x, h)) X
∂(−E(x, h))
−
p(x, h)
}
∂Wij
∂Wij
x,h
∂(−E(x, h))
∂(−E(x, h))
− p(x, h)
p(x, h) ·
∂Wij
∂Wij
x,h
X
= p(x, h) · xi hj − p(x, h) ·
p(x, h)xi hj
X
= p(x, h) ·
(31)
x,h
Combining Equation (30) and (31), we have:
X
X
∂D[q, p(ξp )]
=−
q(x, h)xi hj +
p(x, h)xi hj = ηx2i hj (p) − ηx2i hj (q)
∂Wij
x,h
(32)
x,h
where ηx2i hj (p) and ηx2i hj (q) denotes the 2nd -order η-coordinates of p and q respectively.
Similarly, the first-order derivatives for biases bxi and dhj can be proved to be:
∂D[q, p(ξp )]
= ηx1i (p) − ηx1i (q)
∂bxi
31
(33)
∂D[q, p(ξp )]
= ηh1j (p) − ηh1j (q)
∂dhj
(34)
Summarizing Equation (32), (33) and (34), the first-order derivatives of ξpI , where the
indexing I = {xi } or {hj } or {xi , hj } (∀ xi ∈ x, hj ∈ h), can be calculated in the same
way, that is subtracting p’s and q’s corresponding η-coordinates ηI :
∂D[q, p(ξp )]
= ηI (p) − ηI (q)
∂ξpI
When converging, we have
∂D[q,p(ξp )]
∂ξpI
→ 0. Hence, the gradient descent method con-
verges to the projection point ΓB (q) with a stationary distribution p(x, h; ξp ) that preserves
coordinates [ηx1i , ηh1j , ηx2i hj ] of q(x, h; ξq ). This completes the proof.
A.11 Proof of Proposition 11
Proof Since pi ∈ B and pi+1 ∈ B is the projection of qi+1 , then D[qi+1 , pi ] ≥ D[qi+1 , pi+1 ].
Similarly, qi+1 ∈ Hq and qi+2 ∈ Hq is the projection of pi+1 , thus D[qi+1 , pi+1 ] ≥ D[qi+2 , pi+1 ].
This completes the proof.
References
D. H. Ackley, G. E. Hinton, and T. J. Sejnowski. A learning algorithm for Boltzmann
machines. Cognitive Science, 9:147–169, 1985.
F. X. Albizuri, A. d’Anjou, M. Grana, J. Torrealdea, and M. C. Hernandez. The highorder boltzmann machine: learned distribution and topology. Neural Networks, IEEE
Transactions on, 6(3):767–770, 1995.
S. Amari and H. Nagaoka. Methods of Information Geometry. Translations of Mathematical
Monographs. Oxford University Press, 1993.
S. Amari, K. Kurata, and H. Nagaoka. Information geometry of boltzmann machines. IEEE
Transactions on Neural Networks, 3(2):260–271, 1992.
Y. Bengio, P. Lamblin, D. Popovici, and H. Larochelle. Greedy layer-wise training of deep
networks. In NIPS’06, pages 153–160, Vancouver, British Columbia, Canada, 2006.
Y. Bengio, A. C. Courville, and P. Vincent. Representation learning: A review and new
perspectives. IEEE Trans. Pattern Anal. Mach. Intell., 35(8):1798–1828, 2013.
M. A. Carreira-Perpinan and G. E. Hinton. On contrastive divergence learning. Artificial
Intelligence and Statistics, pages 17–24, 2005.
N. N. Chentsov. Statistical Decision Rules and Optimal Inference. Translations of mathematical monographs, 53:477–493, 1982.
R. Collobert and J. Weston. A unified architecture for natural language processing: Deep
neural networks with multitask learning. In ICML’08, pages 160–167, 2008.
32
Y. Dauphin and Y. Bengio.
abs/1301.3583, 2013.
Big neural networks waste capacity.
arXiv CoRR,
G. Desjardins, A. C. Courville, and Y. Bengio. On training deep boltzmann machines.
CoRR, abs/1203.4416, 2012.
R. W. Duin and E. Peȩkalska. Object representation, sample size, and data set complexity.
In Data Complexity in Pattern Recognition, pages 25–58. Springer London, 2006.
D. Erhan, Y. Bengio, A. Courville, P-A. Manzagol, P. Vincent, and S. Bengio. Why does
unsupervised pre-training help deep learning? Journal of Machine Learning Research,
11:625–660, 2010.
I. Fodor. A survey of dimension reduction techniques. Technical report, Center for Applied
Scientic Computing, Lawrence Livermore National Laboratory, United States, 2002.
B. R. Frieden. Science from Fisher Information: A Unification. Cambridge University
Press, 2004.
W. R. Gilks, S. Richardson, and D.J. Spiegelhalter. Markov Chain Monte Carlo in Practice.
Chapman and Hall/CRC, 1996.
G. E. Hinton. Training products of experts by minimizing contrastive divergence. Neural
Comput., 14(8):1771–1800, 2002.
G. E. Hinton and R. R. Salakhutdinov. Reducing the dimensionality of data with neural
networks. Science, 313(5786):504–507, 2006.
Y. Hou, X. Zhao, D. Song, and W. Li. Mining pure high-order word associations via
information geometry for information retrieval. ACM TOIS, 31(3), 2013.
I. T. Jolliffe. Principal component analysis. Springer Series in Statistics, New York, US,
2002.
R. E. Kass. The geometry of asymptotic inference. Statistical Science, 4(3):188–219, 1989.
John A. Lee and Michel Verleysen, editors. Nonlinear Dimensionality Reduction. Springer,
New York, US, 2007.
H. Nakahara and S. Amari. Information geometric measure for neural spikes. Neural
Computation, 14:2269–2316, 2002.
S. Osindero and G. E. Hinton. Modeling image patches with a directed hierarchy of markov
random field. In NIPS’07, pages 1121–1128, 2007.
M. Ranzato, C. Poultney, S. Chopra, and Y. LeCun. Efficient learning of sparse representations with an energy-based model. In NIPS’06, pages 1137–1144, 2006.
C. R. Rao. Information and the accuracy attainable in the estimation of statistical parameters. Bulletin of calcutta mathematics society, 37:81–89, 1945.
33
S. Rifai, P. Vincent, X. Muller, X. Glorot, and Y. Bengio. Contractive auto-encoders:
Explicit invariance during feature extraction. In ICML’11, pages 833–840, 2011.
R. Salakhutdinov and G. E. Hinton. Using deep belief nets to learn covariance kernels for
gaussian processes. In NIPS’07, pages 1249–1256, 2007a.
R. Salakhutdinov and G. E. Hinton. Semantic hashing. In Workshop SIGIR’07, 2007b.
R. Salakhutdinov and G. E. Hinton. An efficient learning procedure for deep boltzmann
machines. Neural Computing, 24(8):1967–2006, 2012.
P. Vincent, H. Larochelle, I. Lajoie, Y. Bengio, and P-A. Manzagol. Stacked denoising
autoencoders: Learning useful representations in a deep network with a local denoising
criterion. J. Mach. Learn. Res., 11:3371–3408, 2010.
J. A. Wheeler. Time today. In Physical Origins of Time Asymmetry, pages 1–29. Cambridge
University Press, 1994.
L. Younes. On the convergence of markovian stochastic algorithms with rapidly decreasing
ergodicity rates. In Stochastics and Stochastics Models, pages 177–228, 1998.
34
| 9cs.NE
|
1
Resource Optimization with Load Coupling
in Multi-cell NOMA
Lei You∗ , Di Yuan∗ , Lei Lei† , Sumei Sun‡ , Symeon Chatzinotas† , and Björn Ottersten†
arXiv:1708.05281v3 [cs.IT] 7 Jan 2018
∗ Department of Information Technology, Uppsala University, Sweden
{lei.you; di.yuan}@it.uu.se
† Interdisciplinary Centre for Security, Reliability and Trust, Luxembourg University, Luxembourg
{lei.lei; symeon.chatzinotas; bjorn.ottersten}@uni.lu
‡ Institute for Infocomm Research, A*STAR, Singapore
[email protected]
Abstract—Optimizing non-orthogonal multiple access (NOMA)
in multi-cell scenarios is much more challenging than the singlecell case because inter-cell interference must be considered. Most
papers addressing NOMA consider a single cell. We take a
significant step of analyzing NOMA in multi-cell scenarios. We
explore the potential of NOMA networks in achieving optimal
resource utilization with arbitrary topologies. Towards this goal,
we investigate a broad class of problems consisting in optimizing
power allocation and user pairing for any cost function that is
monotonically increasing in time-frequency resource consumption. We propose an algorithm that achieves global optimality for
this problem class. The basic idea is to prove that solving the joint
optimization problem of power allocation, user pair selection,
and time-frequency resource allocation amounts to solving a
so-called iterated function without a closed form. We prove
that the algorithm approaches optimality with fast convergence.
Numerically, we evaluate and demonstrate the performance of
NOMA for multi-cell scenarios in terms of resource efficiency
and load balancing.
Index Terms—NOMA, multi-cell, resource allocation
I. I NTRODUCTION
N
ON-ORTHOGONAL multiple access (NOMA) is considered as a promising technique for enhancing resource
efficiency [2]–[13]. In two recent surveys [2], [3], the authors
pointed out that resource allocation in multi-cell NOMA
poses much more research challenges compared to the singlecell case, because optimizing NOMA with multiple cells
has to model the interplay between successive interference
cancellation (SIC) and inter-cell interference. As one step
forward, the investigations in [2], [3] have addressed two-cell
scenarios. In [6], the authors proposed two coordinated NOMA
beamforming methods for two-cell scenarios. Reference [8]
uses stochastic geometry to model the inter-cell interference in
NOMA. Hence the results do not apply for analyzing network
with specific given network topology. Reference [9] optimizes
energy efficiency in multi-cell NOMA with downlink power
control. However, the aspect of determining which users share
resource by SIC, i.e., user pairing, is not considered. To the
best of our knowledge, finding optimal power allocation and
user pairing simultaneously for enhancing network resource
efficiency in multi-cell NOMA without restrictions on network
topology has not been addressed yet.
Part of this paper has been presented at IEEE GLOBECOM, Singapore,
Dec. 2017 [1].
The crucial aspect of multi-cell NOMA consists of capturing the mutual interference among cells; This is a key
consideration in SIC of NOMA. Therefore, the cells cannot
be optimized independently. For orthogonal multiple access
(OMA) networks, a modeling approach had been proposed
that characterizes the inter-cell interference via capturing the
mutual influence among the cells’ resource allocations [14]–
[36]. The model, named load-coupling, refers to the timefrequency resource consumption in each cell is referred to
as the cell load. However, the model does not allow SIC. In
our recent work [1], we addressed resource optimization in
multi-cell NOMA. However, the system model is constrained
by fixed power allocation. How to model joint optimization
of power allocation and user pairing and how to solve the
resulting problems to optimality have remained open so far.
II. M AIN R ESULTS
We demonstrate how NOMA can be modeled in multi-cell
scenarios by significantly extending the approaches in [14]–
[36], with joint optimization of power allocation and user
pairing. One fundamental result under such type of models
in OMA is the existence of the equilibrium for resource allocation. However, this modeling approach in NOMA leads to
non-closed form formulation for cell load coupling, unlike the
case of OMA. The fact poses significant challenges in analysis
and problem solving. As one of our main results, we prove that
such an equilibrium for resource allocation in NOMA exists
as well and propose an efficient algorithm for obtaining the
equilibrium. Furthermore, we prove that the equilibrium is the
global optimum for resource optimization in multi-cell NOMA
and thus a wide class of resource optimization problems can be
optimally solved by our algorithm. Because of our analytical
results, previous works about OMA with load coupling is
a special case of ours, namely, the algorithmic notions and
mathematical tools being used in those works of classic multicell power control or OMA load coupling thus directly apply
to the analysis multi-cell NOMA, suggesting future works on
this topic.
To the best of our knowledge, this is the first work investigating how to optimally utilize power and time-frequency
resources jointly in multi-cell NOMA. As a key strength of
our modeling approach, it enables to formulate and optimize
an entire class of resource optimization problems. Namely,
2
III. C ELL L OAD M ODELING
Denote by C = {1, 2, . . . , n} and J = {1, 2, . . . , m} the sets
of cells and user equipments (UEs), respectively. Denote by
Ji the set of UEs served by cell i (i ∈ C). When using j to
refer to one UE in J, i by default indicates j’s serving cell,
unless stated otherwise. Downlink is considered in our model.
A. Resource Sharing in NOMA
The resource in time-frequency domain is divided into resource blocks (RBs). In OMA, one RB can be accessed by only
one UE. In NOMA, multiple UEs can be clustered together to
access the same RB by SIC. Increasing the number of UEs in
SIC, however, leads to fast growing decoding complexity [2],
[3]. In previous works, it has been demonstrated that most
of the possible performance improvement by SIC is reached
by pairing as few as two UEs [2]–[7]. Pairing two UEs for
resource sharing is illustrated in Figure 1. UEs within one
pair share the same RB and the RBs allocated to different
pairs do not overlap. We use u as a generic notation for a user
pair (referred to as “pair” for simplicity). For cell i (i ∈ C),
denote by Ui the set of candidate pairs. Suppose
there are in
total mi UEs in cell i. Then |Ui | is up to m2i . Denote
by Vj
S
(j ∈ J) the set of pairs
containing
UE
j.
Let
U
=
U
i∈C i (or
S
equivalently U = j∈J Vj ) be the set of candidate pairs of all
cells. Let s = |U|. If there is a need to differentiate between
pairs, we put indices on u, i.e., U = {u1 , u2 , u3 , . . . us }. Finally,
in our model, for UEs we allow for both OMA and NOMA
RB
b
9
b
b
4
1
10
b
b
8
5
b
7
b
b
b
b
3
Frequency
as long as the cost function is monotonically increasing in
the cells’ time-frequency resource consumption, our proposed
framework in multi-cell NOMA applies. Specifically, for solving this class of problems optimally, we derive a polynomialtime algorithm S-C ELL that gives the optimal power allocation
and user pairing, for any given input of inter-cell interference.
To address the dynamic coupling of inter-cell interference, we
derive a unified algorithmic framework M-C ELL that solves
the multi-cell resource optimization problems optimally. The
algorithm S-C ELL serves as a sub-routine and is iteratively
called by M-C ELL. We demonstrate theoretically the linear
convergence of this process.
The fundamental differences between our investigated problems and single-cell NOMA are summarized as follows. For
multiple cells, the resource allocation in one cell affects the
interference that the cell generates to other cells. The amounts
of required resource to meet the demand for all cells are
coupled together, rather than being independent to each other.
Optimizing resource allocation within one cell leads to a chain
reaction among all other cells. Individual optimization for the
cells results in sub-optimality and very inaccurate performance
analysis. For multi-cell NOMA, not only the time-frequency
resource allocation but also the power splits and user pairings
in all cells are coupled together for the same reason. Therefore,
joint optimization in NOMA leads to a rather complex problem
for analysis.
By numerical experiments, optimizing resource utilization
by our algorithm enlightens how much we can gain from
NOMA in terms of resource efficiency and load balancing.
2
6
Time
User Pairing
Resource Allocation
Figure 1. This figure illustrates user pairing and time-frequency resource
sharing. There are 10 UEs in one cell. Eight form four user pairs {1, 5},
{2, 7}, {3, 6}, {8, 9}, and the other two UEs 4 and 10 are unpaired. The
UEs within one pair share the same time-frequency resource as indicated by
the colors.
with SIC. For each UE, that which mode is used (or both can
be used) is determined by optimization. In the following, we
refer to these two modes as orthogonal RB allocation and nonorthogonal RB allocation, respectively. In general NOMA, we
include both modes.
B. NOMA Downlink
We first consider orthogonal RB allocation in NOMA. Let
pi be the transmission power per RB in cell i (i ∈ C). Denote
by gij the channel coefficient from cell i to UE j. The signalto-interference-and-noise ratio (SINR) is:
pi gij
.
(1)
γj = P
2
k∈C\{i} Ikj + σ
The term Ikj denotes the inter-cell interference from cell k to
UE j, and is possibly zero. This generic notation is used for the
sake of presentation. Later, we use the load-coupling model,
where the cell load that reflects the usage of RBs governs the
amount of interference. The term σ2 is the noise power.
We then consider non-orthogonal RB allocation in NOMA.
In [37] (Chapter 6.2.2, pp. 238) it is shown that, with superposition coding, one UE of pair u (u ∈ U) can decode the other
by SIC. When there is need to consider the decoding order
in u, to be intuitive, we use ⊕ to denote the UE that applies
interference cancellation, followed by decoding its own signal.
And denotes the UE that only decodes its own signal. Note
that both ⊕ and are generic notations and refer to the two
different users in any pair u (u ∈ U) in consideration. For any
pair u, pi is divided to q⊕u and q u (q⊕u + q u = pi ), with
q⊕u and q u being allocated to ⊕ and , respectively. (The
generic notation qju (j ∈ u) denotes the power allocated to UE
j.) We remark that ⊕ decodes ’s signal first and hence ’s
signal does not compose the interference for ⊕. The SINR of
⊕ is computed by (2).
q⊕u gi⊕
.
(2)
γ⊕u = P
2
k∈C\{i} Ik⊕ + σ
The UE
is subject to intra-cell interference from ⊕, i.e.,
q u gi
X
γ u=
.
(3)
q⊕u gi +
Ik +σ2
| {z }
k∈C\{i}
intra-cell
| {z }
inter-cell
3
Denote by q the power allocation of all candidate pairs:
q
q⊕u2 · · · q⊕us
q = ⊕u1
.
q u1 q u2 · · · q us
We use qu to represent the column of pair u (u ∈ U) in q,
named power split for u. We remark that it is not necessary to
use all the pairs in U for resource sharing. Whether or not a
pair would be put in use and allocated with RBs is determined
by optimization, discussed later in Section III-E. In addition,
we remark that the decoding order is not constrained by the
power split [37], even though by our numerical results, more
power is always allocated to in optimal solutions. The issue
of the influence of inter-cell interference on the decoding order
is addressed later in Section III-D.
C. Inter-cell Interference Modeling
The basic idea is to use the cells’ RB consumption levels to
characterize respectively the cell’s likelihood of interfering to
the others. The approach is specified as follows. Denote by ρk
the proportion of RBs allocated for serving UEs in cell k. The
intuition behind the model is partially explained by the two
extreme cases ρk = 1 and ρk = 0. If cell k is fully loaded,
meaning that all RBs are allocated, then ρk = 1. In the other
extreme case, cell k is idle and accordingly ρk = 0. Consider
any UE j served by cell i. The interference j receives from
cell k is Ikj = pk gkj or Ikj = 0 in the two cases, respectively.
In general, ρk serves as a scaling parameter for interference,
see (4). By the interference modeling approach, the cell load
directly translates to the scaling effect of interference and
therefore the same notation is used for both.
Ikj = pk gkj ρk .
(4)
Intuitively, ρk reflects the likelihood that a UE outside cell
k receives interference from k. Note that ρk in fact is the
amount of time-frequency resource consumption of cell k and
hence is referred to as the load of cell k.
We remark that this type of interference modeling approach
is a suitable approximation for network-level performance
analysis, which enables study of inter-cell interference in
large-scale multi-cell networks without having to modeling
micro-level interference. Detailed system-level simulations
(e.g. [24] and [32]) have shown that this type of modeling has
sufficient accuracy for cell-level interference characterization.
This approach has been widely used and is getting increasingly
popular [14]–[36], which however, to our best knowledge, are
limited to OMA. We provide analytical results in order to
extend the modeling approach to NOMA.
for h, followed by decoding its own signal, and, user h does
not apply SIC. That is, the decoding order ⊕ = j and = h
always hold for pair independent of interference.
Proof. Denote by γhj and γhh respectively in (5) and (6) the
SINRs at users j and h for the downlink signal of h.
q g
P hu ij
.
(5)
γhj =
qju gij + k∈C\{i} pk gkj ρk + σ2
γhh =
qju gih +
Lemma 1. For u = {j, h} (gij > gih ) in cell i, if gij /gih >
gkj /gkh (k ∈ C\{i}), then SIC at j decodes first the signal
qhu gih
.
2
k∈C\{i} pk gkh ρk + σ
(6)
With superposition coding, j cancels the interference from h if
j can decode any data that h can decode [37], i.e. γhj > γhh ,
which reads:
X
qju gij gih + gij
pk gkh ρk + gij σ2
k∈C\{i}
> qju gij gih + gih
X
pk gkj ρk + gih σ2 .
k∈C\{i}
Further, γhj > γhh if and only if:
X pk ρk
(gih gkj − gij gkh ) 6 (gij − gih ).
σ2
(7)
k∈C\{i}
Recall that gij > gih , and therefore the right-hand side of (7)
is non-negative. Because of the condition gij /gih > gkj /gkh
for all k ∈ C\{i} in the statement of the lemma, the left-hand
side is non-positive. Hence Lemma 1.
The result of Lemma 1 is coherent with the previous
observations that two UEs with large difference in channel
conditions are preferred to be paired [4], [7]. If gij gih ,
then most likely the condition in Lemma 1 holds, as the large
scale path-loss from other cells, tends not to differ as much
as from the serving cell i in this case. Besides, the large scale
path-loss is a practically reasonable factor for ranking the
decoding order [38], [39]. In Section VII, numerical results
further show that considering the UE pairs as defined by
Lemma 1 virtually does not lead to any loss of performance.
Lemma 1 is used to filter the candidate pairs set U (i.e. to drop
some candidate pairs from U) so as to reduce computational
complexity. From now on, we let Ui be composed of pairs
satisfying Lemma 1.
E. RB Allocation
If UE j (j ∈ J) is using orthogonal RB allocation, then the
achievable capacity1 of j is (8), with γj being (1).
cj = log(1 + γj ).
D. Determining Decoding Order
Inter-cell interference affects the decoding order in NOMA,
and thus how to model the load-coupling in NOMA is significantly more challenging than OMA. Lemma 1 below resolves
this issue by identifying pairs for which the decoding order
can be determined independently of interference. As another
benefit, it significantly reduces the set of candidate pairs.
P
(8)
For non-orthogonal RB allocation, the achievable capacity
for j and u (j ∈ u) is computed by cju = MB log (1 + γju )
with γju being (2) or (3). Therefore,
cju =
log (1 + γju )
0
j∈u
.
j∈
/u
(9)
1 For the sake of presentation, we use the natural logarithm throughout the
paper. We remark that all conclusions hold for the logarithm to base 2.
4
For UE j (j ∈ J), we use xj to denote the proportion of RBs
with orthogonal RB allocation to j. For any pair u (u ∈ U),
denote by xu the non-orthogonal RB allocation for the two UEs
in pair u. We use the vector x to represent the RB allocation
for all the UEs, i.e.,
x = [ x1 , x2 , . . . , xm ,
|
{z
}
xu , xu , . . . , xus ].
| 1 2{z
}
one can observe that increasing xu (or xj ) for some pair u
(or some UE j) may enhance the throughput of the UEs of u
(or UE j). However, since xu (or xj ) appears in the inter-cell
interference term (see (4) and (10)), the increase of xu (or xj )
results in less available resources for other UEs and leads to
more interference. The user pairing selection is not given a
priori but is determined by optimization.
Orthogonal RB allocation Non-orthogonal RB allocation
For any UE j, xj = 0 means that UE j does not use orthogonal
RB allocation. Similarly, for any pair u, xu = 0 means that
pair u is not put in use. For any UE j, if xu = 0 for all
u ∈ Vj , then it means that UE j only uses orthogonal RB
allocation. Resources used by different pairs are orthogonal
such that there is no interference among pairs. Denote by ρ̄
the cell load limit. By constraining that the sum of them which
equals to the load of cell i does not exceed ρ̄, the amounts
represented by xj (j ∈ Ji ) and xu (u ∈ Ui ) do not overlap.
Orthogonal RB allocation is considered among the pairs in
one cell, meaning that the pairs do not have interference with
each other.
X
X
xu 6 ρ̄.
(10)
ρi =
xj +
↑
↑
u∈Ui
j∈Ji
| {z }
| {z }
Cell
Load
load
Orthogonal
RB proportion
Non-orthogonal
RB proportion
ρ = [ρ1 , ρ2 , . . . , ρn ].
Similarly, we use vector ρ̄ to denote the load limits of all cells.
The term cj xj computes the bits delivered to UE j with
orthogonal RB allocation, because cj is the achievable capacity
of UE j on all RBs and xj is the proportion of RBs with
orthogonal RB allocation. Similarly, the term cju xu is the bits
delivered to UE j by non-orthogonal RB allocation for pair u.
Denote by dj the bits demand of UE j. The quality-of-service
(QoS) requirement is:
X
cj xj +
cju xu > dj .
(11)
|{z}
u∈V
↑
j
Bits delivered
| {z }
by orthogonal
Bits
Bits delivered by
non-orthogonal
RB allocation
The models proposed for OMA in [14]–[20] are inherently
a special case of our NOMA model. The former is obtained by
setting U = φ. Then, the terms for non-orthogonal RB allocation disappear in (10) and (11) and x is therefore eliminated
in (8)–(11). Also, there is no power split in OMA. Hence (8)–
(11) form a non-linear system only in terms of ρ. This system
falls into the analytical framework of standard interference
function (SIF) [40], which enables the computation of the
optimal network load settings via fixed-point iterations [17].
However, for the general NOMA case, the resource allocation
is not at UE-level. One needs to split a UE’s demand between
orthogonal and non-orthogonal RB allocations, which results
in a new dimension of complexity.
limit
We use ρ to represent the vector of network load, i.e.,
RB allocation
F. Comparison to OMA Modeling
IV. P ROBLEM F ORMULATION
By successively plugging (1) and (4) into (8), we obtain a
function cj in load ρ, i.e., cj (ρ). Similarly, we obtain cju (q, ρ)
from (2), (3), (4), and (9). For pair u (u ∈ U), we use a binary
variable yu to indicate whether or not the pair u is selected.
Define y as
y = [yu1 , yu2 , . . . , yus ].
We minimize a generic cost function F(ρ) that is monotonically (but not necessarily strictly monotonically) increasing in
each element of ρ. M IN F is given below.
[M IN F]
s.t.
min F(ρ)
ρi 6 ρ̄, i ∈ C
X
X
ρi =
xj +
xu , i ∈ C
demand
We remark that dj is normalized by the RB spectral bandwidth
and the total number of RBs, for the sake of presentation. Note
that a user can use orthogonal RB allocation individually, or
non-orthogonal RB allocation with the other user in the pair, or
both, which is subject to optimization. The amount of allocated
RBs to a user in OMA or a pair adopting NOMA, is subject
to optimization, under the constraint that the overall allocated
resource does not exceed limit.
We remark that there is an implicit pair selection problem
in the above expressions. Note that |U| increases fast with |J|.
It is therefore impractical to simultaneously use all pairs in U.
To deal with this issue, each UE is allowed to use up to one
pair in U for optimization, as formulated later in Section IV,
though our system model is not limited by this. The problem
of pairing and resource allocation is challenging: First, UEs
of the same pair are coupled in resource allocation. Second,
(12a)
ρ,q,x,y
j∈Ji
cj (ρ)xj +
X
X
(12b)
(12c)
u∈Ui
cju (q, ρ)xu > dj , j ∈ J
(12d)
u∈Vj
qju = pi , u ∈ Ui , i ∈ C
(12e)
j∈u
xu 6 yu , u ∈ U
X
yu 6 1, j ∈ J
(12f)
(12g)
u∈Vj
ρ, q, x > 0
(12h)
yu ∈ {0, 1}, u ∈ U
(12i)
Constraints (12b) guarantee that the cell load complies
to the load limit ρ̄. Constraints (12c) state the relationship
between RB allocation and cell load. Constraints (12d) and
(12e) are for QoS and power, respectively. Constraints (12f)
guarantee that RB allocation occurs only for selected pairs.
By constraints (12g), each UE belongs up to one pair such
5
that the selected pairs are mutually exclusive. The variables
are cell load ρ, power allocation q, RB allocation x, and
pair selection y. The variable domains are imposed by (12h)
and (12i). Throughout this paper, we use 0 to represent zero
vector/matrix. For simplicity, the dimension(s) of 0 is not
explicitly stated.
V. O PTIMIZATION WITHIN A C ELL
In multi-cell NOMA, due to the interference among cells,
one cell’s pair selection may affect the other cells’ power
splits, and vice versa. Let us consider a simple case in this
section. Suppose we optimize the load of one cell i, and the
cell load levels of C\{i} are temporarily fixed. This optimization step is a module for solving M IN F later in Section VI.
We respectively use qi , xi , yi to denote the corresponding
variable elements for power allocation, RB allocation, and pair
selection. Vector ρ−i is composed of all elements but ρi of
ρ. We minimize ρi under fixed ρ−i , as formulated below.
min
ρi ,qi ,xi ,yi
ρi s.t. (12c)–(12i) of cell i, with fixed ρ−i . (13)
Since ρ−i is fixed, cj is a constant and cju is a function in qi
only.
The optimization is not straightforward even under fixed
inter-cell interference. The optimal power split for one pair
is up to how much time-frequency resource is allocated to
this pair. In other words, for one pair u, if the amount of
RBs allocated to u changes, the optimal power split for u
before this change loses its optimality. So the power split q
and the resource allocation x are coupled together. In addition,
the pair selection is a combinatorial problem. Therefore, the
power split q, the time-frequency resource allocation x, and
the user pair selection y, must be optimized jointly.
Lemma 2. All constraints of (12d) in (13) hold as equalities
at any optimum.
Proof. Denote the optimal objective value of (13) by ρi0 and
the optimal orthogonal RB allocation of j (j ∈ Ji ) by xj0 .
Suppose strict inequality holds for some j. If xj0 > 0, by fixing
all other variables except for xj in (13), one can verify that
the solution xj0 − ( > 0) is still feasible to (13) as long
as is sufficiently small. In addition, xj0 − leads to a lower
objective value ρi0 − , which contradicts our assumption that
ρi0 is the optimal objective value. If xj0 = 0, then j’s demand
has to be satisfied by non-orthogonal RB allocation and the
same argument applies to variable xu (j ∈ u).
The first analytical result is that, the optimal power split is
independent of pair selection, in Theorem 1. Denote by Yu the
set of all possible pairing solutions of (13) that includes pair
u, i.e.,
X
Yu = {yi |yu = 1,
yu 6 1, j ∈ Ji }.
u∈Vj
^ i (y
^ i ∈ Yu ), the optimal
Definition 1. Given a pair selection y
^ u , is the column
power split for pair u (u ∈ Ui ), denoted by q
^ i , where q
^ i is obtained by optimally solving
for pair u in q
^ i.
(13) for y
Theorem 1. Consider u (u ∈ Ui ). The optimal power split
^ i (y
^ i ∈ Yu ) is also optimal for y
^ i0 (y
^ i0 ∈ Yu ).
for any y
^ u and q
^ u0 the optimal power splits for
Proof. Denote by q
0
^ i and y
^ i , respectively. Suppose q
^ u is not optimal for y
^ i0 .
y
0
^ u ) = cju (q
^ u ) (j ∈ u); 2)
There are two possibilities: 1) cju (q
^ u ) 6= cju (q
^ u0 ) for at least one j in u.
cju (q
^ u and q
^ u0 result in the same xj and xu for
For 1), q
satisfying (12d) and are equally good for (13), which conflicts
^ u is optimal for y
^ i0 . We then consider
our assumption. Thus q
0
^ u ) > cju (q
^ u ). By Lemma 2, q
^ u0 makes
2) and assume cju (q
0
0
^ i . Replacing q
^ u by q
^ u leads to
(12d) become equality under y
some slack in (12d) and hence the objective can be improved.
^ u0 is optimal for yi0 . The same proof
This contradicts that q
^ u ) < cju (q
^ u0 ). Hence the conclusion.
applies to cju (q
By Theorem 1, the optimal power split is decoupled from
pair selection. Next we analytically prove how to find the
optimal power split for any pair.
A. Finding Optimal Power Split
Under fixed yi (yi ∈ Yu , u ∈ Ui ), constraints (12g)
are removed. Constraints (12f), and (12i) of (13) for all u
with yu = 0 in yi are removed. Therefore, for each pair
u = {⊕, }, we can formulate a problem in (14). Solving this
problem yields the optimal power split. In (14), x⊕ and x
are the orthogonal RB allocation for ⊕ and , respectively.
The variable xu denotes the amount of non-orthogonal RB
allocation for u.
x⊕ + x + xu
(14a)
c⊕ (ρ−i )x⊕ + c⊕u (qu , ρ−i )xu > d⊕
(14b)
min
x⊕ ,x ,xu >0
qu >0
s.t.
c (ρ−i )x + c
q⊕u + q
u
u (qu , ρ−i )xu
>d
= pi
(14c)
(14d)
For deriving solution method for (14), define function wj
(j = ⊕ or j = ) of ρ−i as follows.
,
X
wj (ρ−i ) =
pk gkj ρk + σ2 gij .
(15)
k∈C\{i}
For q⊕u , one can derive from (2) and (9):
q⊕u = (ec⊕u − 1)w⊕ (ρ−i ).
(16)
Combining (16) with (14d), q⊕u and q u can be eliminated,
giving (17) below. Formulation (17) is equivalent to (14).
Given c⊕u and c u , the corresponding q⊕u and q u can be
obtained from c⊕u and c u by (14d) and (16).
min
x⊕ ,x ,xu >0
c⊕u ,c u >0
x⊕ + x + xu
s.t. c⊕ (ρ−i )x⊕ + c⊕u xu > d⊕
c (ρ−i )x + c
Cvu (c⊕u , c
u xu > d
u , ρ−i )
60
(17a)
(17b)
(17c)
(17d)
6
In (17), the function Cvu is defined in (32) in the Appendix.
One can easily verify that Cvu is convex in c⊕u and c u (with
gi⊕ > gi ). The difficulty of (17) is on the two bi-linear
constraints (17b) and (17c). However, they become linear with
fixed xu . To ease the presentation, we define the function
below.
Zu (xu , ρ−i ) = xu +
min
x⊕ ,x >0
c⊕u ,c u >0
x⊕ + x
c⊖u
K
K= [cK
⊕u , c⊖u ]
s.t. (17b)–(17d). (18)
Solving (17) (and equivalently (14)) is to find the minimum
of Zu (xu , ρ−i ). The following theorem shows the uniqueness
of the minimum of Zu (xu , ρ−i ).
[0, 0]
Theorem 2. Zu (xu , ρ−i ) has unique minimum in xu .
Proof. Since the first term xu in Zu (xu , ρ−i ) is strictly monotonically increasing, to prove that Zu (xu , ρ−i ) has unique
minimum, we only need to prove that the remaining part
of Zu (xu , ρ−i ) is monotonically (but not necessarily strictly
monotonically) decreasing in xu . For this part, at the optimum (17b) and (17c) hold as equalities because of Lemma 2.
Hence, reformulating the problem by replacing the inequalities
in (17b) and (17c) with equalities does not lose optimality.
With equalities, the variables x⊕ and x can be represented
by c⊕u and c u :
(d − c u xu )
(d⊕ − c⊕u xu )
, x =
.
x⊕ =
c⊕ (ρ−i )
c (ρ−i )
(19)
Therefore x⊕ and x can be eliminated from the objective
function. The minimization is thus equivalent to maximizing
c⊕u /c⊕ (ρ−i ) + c u /c (ρ−i ). We formulate this maximization problem below.
c⊕u
c u
max
+
(20a)
c⊕u ,c u >0 c⊕ (ρ−i )
c (ρ−i )
s.t. c⊕u xu 6 d⊕
(20b)
c
u xu
6d
Cvu (c⊕u , c
(20c)
u , ρ−i )
60
(20d)
Constraints (20b) and (20c) originate from the nonnegativity requirement of x⊕ and x . Note that (20) is convex.
In addition, the feasible region shrinks with the increase of xu .
Then the optimum of (20) monotonically decreases with xu .
Hence the theorem.
Because of Theorem 2, bi-section search of xu reaches the
minimum of Zu (xu , ρ−i ). Note that for any xu , computing
Zu (xu , ρ−i ) needs to solve (20). In the following, we prove
how this can be done much more efficiently than employing
standard convex optimization.
We remark that (20) is a two-dimensional optimization
problem with respect to c⊕u and c u . Constraints (20b)
and (20c) are defined by two hyperplanes c⊕u = d⊕ /xu and
c u = d /xu , respectively. Due to the convexity of the function Cvu in c⊕u and c u , the curve Cvu (c⊕u , c u , ρ−i ) = 0
in (20d) along with c⊕u = 0 and c u = 0 forms a convex
set of [c⊕u , c u ]. The optimum of (20) depends on whether
the two hyperplanes intersect with the curve and how they
intersect. This leads to three possible cases to be considered,
h
1
1
c⊕ (ρ−i ) , c⊖ (ρ−i )
i
c⊕u
Figure 2. This figure shows the feasible region of (20) of c⊕u and c u
for different xu . The shadowed area below the curve is (20d). The vertical
and horizontal dashed lines are the hyperplanes defined by (20b) and (20c),
respectively. The hyperplanes are shown by red, blue, and green dashed lines
for Case 1, Case 2, and Case 3, respectively. The point K is optimal for Case
1. The blue and green circles represent the optimal solutions for Case 2 and
Case 3, respectively. The black dot is the point on the curve where the two
hyperplanes intersect with each other (see footnote 3 for the existence of this
point.).
named Case 1, Case 2, and Case 3, respectively. In Case 1,
constraints (20b) and (20c) are redundant, and the optimum is
determined by the coefficients 1/c⊕ (ρ−i ) and 1/c (ρ−i ) in
the objective function and the curve Cvu (c⊕u , c u , ρ−i ) = 0.
In Case 2, the optimum is defined by one of the hyperplanes
and the curve. In Case 3, constraint (20d) is redundant, and
the optimum is determined by the two hyperplanes. With xu
increasing from 0 to ∞, Case 1, Case 2, and Case 3 happen
sequentially, and all happen eventually. The three cases are
illustrated in Figure 2 with colors. Below we respectively show
how to compute the optimum for each case.
In the following, we first compute the optimum in Case 1,
K
represented by K = [cK
⊕u , c u ], which is the intersection of the
vector [1/c⊕ (ρ−i ), 1/c (ρ−i )] and the curve. The point also
leads to a closed-form solution for the optima of all the three
cases. Mathematically, point K is solved by applying bi-section
search to (21) below.
Cvu (c⊕u , c u , ρ−i ) = 0
c⊕u c⊕ (ρ−i ) = c u c (ρ−i ).
(21)
For solving (21), we can first eliminate c⊕u or c u in the first
equation. This can be done by representing one of c⊕u and
c u with the other by the second equation. Since there is only
one variable in the first equation, one can use bi-section search
to find its solution2 . Then, we compute the value of xu when
at least one hyperplane goes through K, denoted by xK
u in (22).
K
K
xK
u = min{d⊕ /c⊕u , d /c u }.
(22)
The three cases, indicated by colors in Figure 2, are as follows.
2 The solution is guaranteed to be unique and hence bi-section search
applies. This is because, by representing one of c⊕u and c u by the other by
function Cvu , one variable is monotonically decreasing in the other, resulting
in a unique zero point.
7
Case 1 (xu 6 minj∈u dj /cK
ju ): Point K is the optimum of
(20), because (20b) and (20c) are redundant. This happens
when xu is sufficiently small (or 0), as shown in Figure 2.
Case 2 (xu > minj∈u dj /cK
ju and Cvu (d⊕ /xu , d /xu ) > 0):
There exists one point on the curve where both two hyperplanes intersect3 . We represent this point by the black dot
on the curve in Figure 2. In Case 2, one hyperplane intersects
with the curve at some point between K and the black dot, and
intersects with the other hyperplane on some point above the
curve, see Figure 2. The intersection point of the curve and the
hyperplane is the optimum of (20). Without loss of generality,
we assume K violates (20c), meaning that the hyperplane of
(20c) goes through the optimum, as shown by Figure 2. By
plugging the equation of the hyperplane into that of the curve,
the optimal c⊕u is a function of xu . Similarly, if K violates
(20c) instead, then c⊕u = d⊕ /xu and the optimal c u is
a function of xu . To know which hyperplane goes through
K
the optimum, one only needs to check which of cK
ju xju > dj
(j = ⊕ or j = ) holds. Note that exactly one of the two holds
in Case 2. The optimal c⊕u and c u are computed respectively
by (33) and (34) defined in the Appendix.
Case 3 (xu > minj∈u dj /cK
ju and Cvu (d⊕ /xu , d /xu ) 6 0):
Constraint (20d) is redundant, as shown in Figure 2. The
optimum is the intersection point of the two hyperplanes,
computed by cju = dj /xu (j = ⊕ or j = ).
In summary, the optimal solution of (20) is computed by
(23) below (j = ⊕ or j = ) in closed form, with Hju
being (33) or (34) in the Appendix.
K
Case 1
cju
Cju (xu , ρ−i ) =
(23)
H (x , ρ ) Case 2
ju u −i
dj /xu
Case 3
The function Zu (xu , ρ−i ) computes the amount of resource
used for both orthogonal and non-orthogonal RB allocations
for the UEs in u. It is optimal to serve the two UEs only
by orthogonal RB allocation, if the minimum of Zu (xu , ρ−i )
occurs at xu = 0. In all other cases, minxu Zu (xu , ρ−i ) yields
the optimal power split for non-orthogonal RB allocations. The
algorithm optimally solving (14), named S PLIT, is as follows.
S PLIT(u, ρ−i )
1 x∗u = arg minxu Zu (xu , ρ−i ) // Bi-section search
2 Compute hc∗⊕u , c∗ u i by (23) // With x∗u , ρ−i
3 Compute hx∗⊕ , x∗ i by (19) // With c∗⊕u , c∗ u , ρ−i
4 Convert hc∗⊕u , c∗ u i to hq∗⊕u , q∗ u i // By (14d), (16)
5 return hq∗⊕u , q∗ u , x∗⊕ , x∗ , x∗u i
B. Optimal Pairing
Denote by Yi the set of all candidate pair selections:
Yi = (∪u∈Ui Yu ) ∪ {0}.
3 The existence of this point is guaranteed: With the increase of x , both
u
hyperplanes will eventually intersect with the curve with two intersection
points. By increasing xu , the distance between the two intersections keeps
being smaller. The two intersections will eventually overlap.
0.18
1
0.02
∆
0.14
0.14
0.16 3
2
0.07
0.06
0.40
4
5
0.12
Figure 3. The figure shows an example of one cell i with five UEs,
i.e., Ji = {1, 2, 3, 4, 5}. Assume the candidate pair set is Ui =
{{1, 2}, {2, 4}, {4, 5}, {3, 5}}. The blue edges are type-1. The red edges
are type-2. A matching is a set of edges without common vertices (also called
independent edge set) and is a pair selection solution. The maximum matching,
as highlighted in the figure, is {{1, 2}, {3, 5}, {4, ∆}}.
By obtaining minxu Zu (xu , ρ−i ) for all u ∈ Ui as shown
earlier in Section V-A, enumerating all yi in Yi gives the
optimal solution to (13). This exhaustive search however does
not scale, as |Yi | is exponential in the number of UEs. By
the following derivation, we are able to obtain the optimum
of (13) in polynomial time.
Theorem 3. The optimum of (13) is computed by finding the
maximum weighted matching in an undirected graph.
Proof. To prove the conclusion, an undirected weighted graph
Gi is constructed and explained below.
Gi =
hJi , Ui , wi
hJi ∪ {∆}, Ui ∪ {{j, ∆}|j ∈ Ji }, wi
|Ji | even
|Ji | odd.
(24)
In (24), the graph is represented by a 3-tuple, with the first
element being the vertex set, the second element being the
edge set, and the third element being the weight vector.
Parameter ∆ is an auxiliary vertex for odd |Ji |. Without loss
of generality, below we focus on odd |Ji |. (All conclusions
naturally hold for |Ji | being even.) By the definition in (24),
each UE is corresponding to a vertex. For each pair u in Ui ,
there is one edge connecting the two UEs in u, associated
with weight wu . We name these as type-1 edges. Besides, for
each UE j in Ji , there is one extra edge connecting j and the
auxiliary vertex ∆, associated with weight wj . We name these
as type-2 edges. An illustration is given in Figure 3.
The weight w is defined as follows, where T is a positive
value keeping all weights being positive.
Type-1 edge
Type-2 edge
wu = T − minxu Zu (xu , ρ−i ) (u ∈ Ui )
wj = T − dj /cj (ρ−i ) (j ∈ Ji )
First, we remark that any yi is feasible to (13) if and only
if all the pairs u with yu = 1 (u ∈ Ui ) form a matching (or
an
P empty edge set) in Gi . Otherwise, there exists j such that
u∈Vj yu > 2, and (12g) would be violated. Then, by the
definition of weights, minimizing the load ρi becomes finding
a maximum weighted matching.
The algorithm S-C ELL solving (13) exactly is as follows.
Lines 1–8 compute the edge weights of the graph to be
8
S-C ELL(ρ−i )
1 for u ∈ Ui
2
hq⊕u , q u , x⊕ , x , xu i = S PLIT(u, ρ−i )
3
wu = T − (x⊕ + x + xu ) // wu > 0
4 end for
5 if |Ji | is odd
6
for j ∈ Ji
7
xj = dj /cj (ρ−i )
8
wj = T − xj // wj > 0
9
end for
10 end if
11 Construct Gi by (24)
12 U∗i = M AXIMUM -W EIGHTED -M ATCHING(Gi )
13 x∗i = 0, q∗i = 0, y∗i = 0
14 for u ∈ U∗i ∩ Ui
15
x∗u = xu , y∗u = 1
16
for j ∈ u
17
q∗ju = qju , x∗j = xj
18
end for
19 end for
20 if |Ji | is odd
21
Find the {j, ∆} in U∗i and let x∗j = xj
22 end ifP
P
23 ρi = j∈Ji x∗j + u∈Ui x∗u
24 return hρi , q∗i , x∗i , y∗i i
To prove (13) is feasible, we prove the remaining problem is
always feasible. Note that, with yi and qu being fixed, (13)
becomes a linear programming (LP) problem, which is stated
below (the equalities are by Lemma 2).
X
X
X
min
xj +
xu , s.t. cj xj +
cju xu = dj . (25)
x>0
u∈Ui
j∈Ji
u∈Vj
By Farkas’ lemma, a group of linear constraints in standard
form, i.e. Ax = b (b > 0), is feasible with x > 0 if and only
if there does not exist v such that v> A > 0> and v> b < 0.
Obviously, there is no v with d > 0 satisfying (26).
X
vj > 0 (j ∈ Ji ) and
v j dj < 0
(26)
j∈Ji
Hence (25) is feasible, and the conclusion holds.
Let λi = |Yi |. For each yi in Yi , we use an integer in
[1, λi ] to uniquely index yi . We refer to all the pair selection
solutions in Yi as pairing 1, pairing 2, . . . , pairing λi . Denote
by fik (ρ−i ) the optimum of (13) under pairing k (1 6 k 6
λi ), i.e.,
fik (ρ−i ) =
min ρi s.t. (12c)–(12f) and (12h) of cell i.
ρi ,qi ,xi
Let fi (ρ−i ) be the optimum5 of (13). Then we have:
fi (ρ−i ) =
min
k=1,2,...,λi
fik (ρ−i ).
Network-wisely, we have:
f(ρ) = [f1 (ρ−1 ), f2 (ρ−2 ), . . . , fn (ρ−n )].
constructed. Then we construct the graph in Line 11 and
compute the maximum matching4 U∗i in Line 12, which by
Theorem 3 is the optimal pair selection in cell i. Lines 13–22
assign the obtained solutions to hq∗⊕u , q∗ u , x∗⊕ , x∗ , x∗u i for the
pairs in U∗i . The other pairs are not selected and hence their
values in x∗i , q∗i , and y∗i are zeros.
We remark that in the matching process, if the number
of nodes is odd, for the unpaired UE, it is allocated with
orthogonal RBs. For two UEs that are paired in the solution of
matching, they are not necessarily in non-orthogonal allocation
but is up to optimization.
VI. M ULTI - CELL L OAD O PTIMIZATION
This section proposes the algorithmic framework M-C ELL
for deriving the optimum of M IN F, by analyzing sufficientand-necessary conditions of optimality and feasibility.
A. Revisiting Single-cell Load Minimization
Recall that for single cell optimization, the optimum of (13)
of cell i (i ∈ C) is a function of the load of other cells ρ−i .
By Lemma 3 below, this function is well-defined for any nonnegative ρ−i .
best known algorithm
[41] runs on Gi in O((|Ui | + |Ji |)
p
(odd |Ji |) or O(|Ui | |Ji |) (even |Ji |).
4 The
Theorem 4. f(ρ) is an SIF, i.e. the following properties hold:
1) (Scalability) αf(ρ) > f(αρ), ρ > 0, α > 1.
2) (Monotonicity) f(ρ) > f(ρ 0 ), ρ > ρ 0 , ρ, ρ 0 > 0.
Proof. We first prove monotonicity and scalability for
fik (ρ−i ) (i ∈ C, k = 1, 2, . . . , λi ). For monotonicity, we
0
0
prove that fik (ρ−i
) 6 fik (ρ−i ) for ρ−i
6 ρ−i as follows.
0
Given any non-negative ρ−i , we replace ρ−i with ρ−i
. Note
0
that cju (ρ−i ) > cju (ρ−i ). Thus the replacement makes the
0
solution space of (12d) larger, and the optimum with ρ−i
is no
0
larger than that with ρ−i . Therefore fik (ρ−i ) 6 fik (ρ−i ). For
scalability, we prove that fik (αρ−i ) 6 αfik (ρ−i ) for α > 1
and non-negative ρ−i as follows. Denote the optimal solution
of fik (ρ−i ) by hρi00 , qi00 , xi00 i. We have fik (ρ−i ) = ρi00 . Due
to that 1/cju (qi , ρ−i ) and 1/cj (ρ−i ) are strictly concave in
ρ−i , the two inequalities
α
1
α
1
<
,
<
(29)
cj (αρ−i )
cj (ρ−i ) cju (qi , αρ−i )
cju (qi , ρ−i )
hold for α > 1. Consider the following minimization problem 30, with yi being fixed to pairing k.
min
ρi ,qi ,xi >0
p
|Ji |)
(28)
The following theorem reveals a key property of f(ρ).
Lemma 3. The problem in (13) is always feasible.
Proof. We select some yi in Yi and fix it in (13) (Yi 6= φ
by definition). For each pair u, we fix qu to [pi /2, pi /2]> .
(27)
s.t.
ρi
(30a)
(12c), (12e) and (12f) of cell i
(30b)
X
cj (ρ−i )xj +
cju (q, ρ−i )xu > αdj , j ∈ Ji (30c)
u∈Vj
5 Therefore,
fi (ρ−i ) equals the ρi obtained from S-C ELL(ρ−i ).
9
Note that hαρi00 , qi00 , αxi00 i is feasible to (30), with the objective
value being αfik (ρ−i ). Hence the optimum of (30) is no more
than αfik (ρ−i ). For fik (αρ−i ), note that the corresponding
optimization problem only differs with (30) in (30c). Instead
of (30c), in fik (αρ−i ) we have:
X
cj (αρ−i )xj +
cju (q, αρ−i ) > dj , j ∈ Ji
(31)
u∈Vj
By Lemma 2, (30c) is equality at the optimum. Then by (29),
for any solution of (30), using it for the optimization problem
associated with fik (αρ−i ) makes (31) an inequality. Therefore the problem for fik (αρ−i ) has a lower optimum than
(30). Further, the optimum is lower than αfik (ρ−i ). Hence
fik (αρ−i ) < αfik (ρ−i ).
We then allow k to be variable and consider fi (ρ−i ) (i ∈ C).
0
For ρ−i
6 ρ−i we have
0
0
fi (ρ−i
) = min fik (ρ−i
) 6 min fik (ρ−i ) = fi (ρ−i )
k
k
and for α > 1 we have
fi (αρ−i ) = min fik (αρ−i ) < α min fik (ρ−i ) = αfi (ρ−i )
k
k
Hence the conclusion.
Given ρ, denote by fk (k > 1) the function composition of
f(fk−1 (ρ)) (with f0 (ρ) = ρ). Lemma 4 holds by [40].
Lemma 4. If limk→∞ fk (ρ) exists, then it exists uniquely for
any ρ > 0.
B. Optimality and Feasibility
Based on Theorem 4, we derive sufficient-and-necessary
conditions for M IN F in terms of its feasibility and optimality.
For any load ρ, we say that a load ρ is achievable if and only
if there exist q, x, and y such that the solution hρ, q, x, yi is
feasible to M IN F.
Lemma 5. For any ρ > 0, if there exists i ∈ C such that
ρi < fi (ρ−i ), then ρ is not achievable in M IN F.
Proof. Let ρi0 = fi (ρ−i ). By the definition of fi , ρi0 is the
minimum value satisfying (12c)–(12i) under ρ−i . Therefore
any ρi with ρi < ρi0 is not achievable with constraints (12c)–
(12i). Hence the conclusion.
Theorem 5. In M IN F, ρ (ρ 6 ρ̄) is achievable if and only if
f(ρ) is achievable and ρ > f(ρ).
Proof. By the inverse proposition of Lemma 5, an achievable
ρ always satisfies ρ > f(ρ). The necessity is proved as
follows. Suppose ρ is achievable for M IN F. Consider using
f(ρ) as another solution (together with the hq, x, yi obtained
when computing f(ρ)). Then f(ρ) satisfies (12b). Also, f(ρ)
together with its hq, x, yi fulfills (12c)–(12i) by the definition
of f(ρ). Thus, f(ρ) is achievable.
For the sufficiency, note that the achievability of f(ρ)
implies that ρ along with hq, x, yi obtained by solving f(ρ)
satisfies (12c)–(12i). Combined with the precondition ρi 6 ρ̄
(i ∈ C), the load ρ is feasible to (12b)–(12i) (and thus
achievable in M IN F). Hence the conclusion.
Theorem 5 provides an effective method for improving any
sub-optimal solution to M IN F. For any achievable ρ, evaluating f(ρ) always yields a better solution6 . This conclusion
is based on Theorem 5: Suppose ρ (ρ > 0) is the current
cell load, and let ρ 0 be the function value evaluated at ρ, i.e.
ρ 0 = f(ρ). By Theorem 5, we always have ρ 0 6 ρ.
Recall that F(ρ) is the objective function of the problem
M IN F. Theorem 6 below states that, the fixed point of f(ρ)
(along with hq, x, yi obtained when computing f(ρ)) is optimal to M IN F.
Theorem 6. Load ρ∗ is the optimum of M IN F if (and only if
when F(ρ) is strictly monotonic) ρ∗ = f(ρ∗ ) 6 ρ̄.
Proof. (Necessity) If ρ∗ is optimal (and thus feasible), then
obviously we have ρ∗ 6 ρ̄. By Theorem 5, f(ρ∗ ) is also
feasible and f(ρ∗ ) 6 ρ∗ . By successively applying Theorem 5,
fk (ρ∗ ) for any k > 1 is a feasible solution and fk (ρ∗ ) 6
fk−1 (ρ∗ ). Let ρ 0 = limk→∞ fk (ρ∗ ). Then ρ 0 6 ρ∗ holds by
the above derivation. In addition, note that ρ 0 is a feasible
solution as well. By that ρ∗ is optimal for M IN F, we have
ρ 0 = ρ∗ , otherwise ρ 0 would lead to a better objective value in
M IN F than ρ∗ . Hence ρ∗ = limk→∞ fk (ρ∗ ), i.e. ρ∗ = f(ρ∗ ).
(Sufficiency) By Theorem 5, for any feasible ρ,
limk→∞ fk (ρ) is feasible and limk→∞ fk (ρ) 6 ρ holds.
By Lemma 4, the limit remains for any ρ > 0, and thus
limk→∞ fk (ρ) = limk→∞ fk (ρ∗ ). Since ρ∗ = f(ρ∗ ), we
have ρ∗ = limk→∞ fk (ρ∗ ). Thus ρ∗ 6 ρ for any feasible
ρ, meaning that ρ∗ is optimal for M IN F.
Hence the conclusion.
C. The Algorithmic Framework
Starting from any non-negative ρ(0) , we compute
limk→∞ fk (ρ) iteratively. During each iteration, n problems
in (13) for i ∈ C are solved. The convergence is guaranteed by
Lemma 4. At the convergence, by Theorem 6, the optimum is
reached. Note that once ρ(k) is feasible for any k > 0, then by
Theorem 5, all ρ(k+1) , ρ(k+2) , . . . are feasible as well. One
can terminate prematurely to obtain a sub-optimal solution
with less computation. M-C ELL is outlined below.
M-C ELL(ρ(0) , )
1 k=0
2 repeat
3
k = k+1
4
for i ∈ C
(k)
(k) (k)
(k)
(k−1)
5
hρi , qi , xi , yi i = S-C ELL(ρ−i )
6
end for
7 until kρ(k) − ρ(k−1) k∞ 6
(k)
8 if ρi > ρ̄ for some i (i ∈ C)
9
M IN F is infeasible
10 return hρ(k) , q(k) , x(k) , y(k) i
M-C ELL applies fixed point iterations using f(ρ). The
convergence of fixed point iterations on f(ρ) is linear [42]. The
6 Rigorously, Theorem 5 implies that the new solution is not worse. In fact
it is guaranteed to be strictly better (with strictly monotonic F(ρ)) unless the
old one is already optimal. A proof can be easily derived based on Theorem 6.
10
Total load
15
called “asynchronous fixed-point iterations” [40] can be used.
The asynchronous fixed-point iterations converge to the fixed
point that is the same as obtained by its synchronized version.
Intuitively, the fixed point is unique, regardless of how we
reach it.
OMA(Opt)
SP(Uni)
SP(FTPC)
NOMA(Opt)
10
VII. P ERFORMANCE E VALUATION
5
0
0.2
0.4
0.6
0.8
1
Normalized demand d
Max load
1
OMA(Opt)
SP(Uni)
SP(FTPC)
NOMA(Opt)
We use a cellular network of 19 cells. To eliminate edge
effects, wrap-around technique [43] is applied. Inside each
cell, 30 UEs are randomly and uniformly distributed. In each
cell, there are in total 30
= 435 possible choices for user
2
pairing in NOMA. User demands are set to be a uniform
value d. In the simulations, d is normalized by M × B in (8)
and (9), and belongs to (0, 1]. The network in OMA reaches
the resource limit at d = 1.0, i.e., any d > 1.0 leads to at
least one cell being overload in OMA. Other parameters are
given in Table I.
Table I
S IMULATION PARAMETERS .
0.5
0
0.2
0.4
0.6
0.8
1
Normalized demand d
Figure 4. This figure illustrates the total and maximum load in function of
normalized demand. At d = 1.0, the network reaches its resource limit
such that any larger demand cannot be satisfied by OMA(Opt) . SP(Uni) and
SP(FTPC) are two sub-optimal NOMA power allocation schemes, for which,
pair selections are optimally computed.
feasibility check is done by Lines 8 and 9. The infeasibility
of M IN F implies that at least one cell will be overloaded for
meeting user demands. If this happens, we know for sure
that the user demands cannot be satisfied. We remark that
all the conclusions derived in this section are independent
of the implementation of S-C ELL in Line 5. As long as the
sub-routine S-C ELL yields the optimal solution to (13), MC ELL achieves the optimum of M IN F7 . Besides, M-C ELL
possesses the optimality for M IN F with any objective function
that is monotonically (but not necessarily strictly monotonic)
increasing in each element of ρ. These two properties make
M-C ELL an algorithmic framework. To our knowledge, the
most efficient S-C ELL is what we derived in Section V.
For a cell i (i ∈ C), given the information of other cells’ load
ρ−i , solving fi (ρ) is based on local information, making MC ELL suitable to run in a distributed manner. A cell can maintain the information of a subset of cells (e.g., the surrounding
cells) having major significance in terms of interference, and
exchange the information with other cells periodically, which
can be implemented via the LTE X2 interface. The technique
7 With filtered U, the proposed M-C ELL is proved to converge to the global
optimum of M IN F. Without filtered U (or for any possible candidate pairs
set U), M-C ELL is still applicable to M IN F though there is no theoretical
guarantee of convergence or optimality, as the decoding order for each pair
may change in the iteration process.
Parameter
Cell radius
Carrier frequency
Total bandwidth
Cell load limit ρ̄
Path loss model
Shadowing (Log-normal)
Fading
Noise power spectral density
RB power pi (i ∈ C)
Convergence tolerance ()
Value
500 m
2 GHz
20 MHz
1.0
COST-231-HATA
6 dB standard deviation
Rayleigh flat fading
−173 dBm/Hz
800 mW
10−4
We consider two objectives for performance evaluation:
resource efficiency and load balancing.
P For resource efficiency,
the objective function is F(ρ) = i∈C ρi , i.e., to minimize
the total network time-frequency resource consumption (or
cells’ average resource consumption if divided by n). For load
balancing, we adopt min-max fairness and the objective function is F(ρ) = maxi∈C ρi . Section VII-A and Section VII-B
provide results for power allocation and user pairing, respectively. The optimal OMA, named OMA(Opt) , is obtained by
fixing y to 0 in M IN F and solving the remaining problem to
optimality8 . The proposed optimal NOMA solution is named
NOMA(Opt) in the remaining context.
A. Power Allocation
We use OMA(Opt) as baseline. As for NOMA, the pairing
candidate set U initially covers all pairs of UEs in each cell.
Then, those pairs not fulfilling Lemma 1 are dropped from
U. We then use M-C ELL to compute NOMA(Opt) . Besides the
optimal NOMA, we implement two other sub-optimal NOMA
power split schemes for comparison. One is named “SP(Uni) ”,
in which the power pi splits equally between q⊕u and q u for
any pair u = {⊕, } (u ∈ U). The other is “fractional transmit
power control” (FTPC), named SP(FTPC) , using a parameter
8 With y being fixed to 0 in M IN F, the variables q and x disappear. Then
P
(k)
we modify Line 5 of M-C ELL to be “ρi =
j∈Ji dj /cj (ρ−i )” and
Line 10 to be “return ρ(k) ”. The modified M-C ELL gives the optimal load
for OMA (see [17] for further details).
11
Best
Best
(a) PA(B-W)
Best
Best
(c) Optimal pairing in filtered U
(b) PA(B-SB)
(d) Pairing in non-filtered U
Figure 5. This figure illustrates pair selection in a typical cell of 30 UEs. The UEs are represented by the vertices on a circle. The UE marked “Best” at the
top position has the best channel condition. The UEs are arranged clock-wisely in the descending order of channel conditions. The edges are selected pairs.
Each subfigure represents one pairing method. Figure 5(a) and Figure 5(b) show PA(B-W) and PA(B-SB) , respectively. Figure 5(c) shows optimal pairing after
filtered U. Figure 5(d) shows the pairing solution obtained with non-filtered U.
Cell load
0.7
0.6
|U| =
30
2 × 19
= 8265
|U| = 5779 (U filtered by Lemma 1)
0.5
0.4
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
Cell index
Figure 6. This figure shows the optimized
load levels of all 19 cells. The cells are numbered in an ascending order of loads. The blue bars show the computed
cell load under U composed of all 30
2 × 19 pairs. The red bars show the minimum cell load with pairs satisfying Lemma 1.
0.6
0.4
0.8
OMA(Opt)
PA(B-W) -SP(Uni)
PA(B-W) -SP(FTPC)
PA(B-W) -SP(Opt)
NOMA(Opt)
Average load
Average load
0.8
0.2
0.6
0.4
OMA(Opt)
PA(B-SB) -SP(Uni)
PA(B-SB) -SP(FTPC)
PA(B-SB) -SP(Opt)
NOMA(Opt)
0.2
0
0
0.2
0.4
0.6
0.8
1.0
Normalized demand d
0.2
0.4
0.6
0.8
1.0
Normalized demand d
Figure 7. This figure evaluates PA(B-W) , combined with three power split
schemes, SP(Uni) , SP(FTPC) , and SP(Opt) . In SP(Opt) , the power split is optimal
for each pair. OMA(Opt) and NOMA(Opt) are baselines.
Figure 8. This figure evaluates PA(B-SB) , combined with three power split
schemes, SP(Uni) , SP(FTPC) , and SP(Opt) . In SP(Opt) , the power split is optimal
for each pair. OMA(Opt) and NOMA(Opt) are baselines.
to control the fairness for power split. We set this parameter
to be 0.4 as recommended in [44]. Under both SP(Uni) and
SP(FTPC) , we use the method in Section V-B to compute the
optimal pair selection. Both two power split schemes are easily
accommodated by M-C ELL.
Figure 4 shows the total load and the maximum load in
function of normalized demand. As expected, the cell load
levels monotonically increase with user demand. At high user
demand, NOMA(Opt) dramatically improves the load performance. For d = 1.0, it achieves 31% better performance
than OMA(Opt) for both total load and maximum load. The
two sub-optimal solutions SP(Uni) and SP(FTPC) also result in
load improvement than OMA(Opt) . Compared to the two suboptimal solutions, the improvement achieved by NOMA(Opt)
over OMA(Opt) is doubled or more. On average, by using the
same amount of time-frequency resource, NOMA(Opt) delivers
33% more bits demand than OMA(Opt) . Besides, SP(FTPC)
achieves better performance than SP(Uni) , as the former takes
into account the channel conditions in power split. Generally,
in SP(FTPC) , UE with worse channel is allocated with more
12
B. User Pairing
We study the influence of user pairing by considering
two sub-optimal ones [4], named “PA(B-W) ” and “PA(B-SB) ”,
respectively. Suppose we sort the UEs in descending order
of their channel conditions. In PA(B-W) , the UE with the best
channel condition is paired with the UE with the worst, and
the UE with the second best is paired with one with the
second worst, and so on. In PA(B-SB) , the UE with the best
channel condition is paired with the one with the second
best, and so on. See Figures 5(a) and 5(b) for an illustration.
In addition, we examine to what extend pair filtering (by
Lemma 1) affects performance. For filtered U, optimal pair
selection is done by Section V-B. For non-filtered U, we
apply M-C ELL even though there is no theoretical guarantee
on optimality. Convergence, however, is observed for all the
instances we considered. Figures 5(c) and 5(d) illustrated the
resulted selection patterns.
In Figure 6, we show the load levels of all 19 cells with
d = 1.0, under both filtered and non-filtered
U. In this
specific scenario, |U| is reduced from 30
2 × 19 = 8265 to
5779 after being filtered by Lemma 1. We choose d = 1.0
because the performance difference among the solutions is
the largest. There is very slight difference in cell load levels
between the two cases. Numerically, the differences between
them are only 0.1% and 0.5% for average and maximum cell
load, respectively. This result is coherent with Figure 5(c) and
Figure 5(d). One can see that the patterns of the two pair
selection solutions are almost identical. Thus, pair filtering by
Lemma 1 is effective in reducing the number of candidate
pairs, with virtually no impact on performance.
In Figure 7 and Figure 8, we respectively evaluate PA(B-W)
and PA(B-SB) , combined with three power split schemes SP(Uni) ,
SP(FTPC) , and SP(Opt) . In SP(Opt) , we use the algorithm S PLIT to
compute the optimal power split for each pair. All of SP(Uni) ,
SP(FTPC) , and SP(Opt) are put into the framework of M-C ELL
but with fixed pair selection PA(B-W) or PA(B-SB) . In addition,
OMA(Opt) and NOMA(Opt) are also included for comparison as
baselines.
One can see that all the NOMA schemes outperform
OMA(Opt) . In Figure 7, with PA(B-W) , SP(FTPC) outperforms
SP(Uni) . SP(Opt) beats the other two. On one hand, there
is non-negligible gap in load performance between SP(Opt)
and NOMA(Opt) , even though in SP(Opt) , the power split is
optimal for the PA(B-W) pairing. Hence pair selection plays an
important role for NOMA performance. On the other hand,
SP(Opt) yields significantly load improvement compared to
OMA(Opt) , and we conclude that PA(B-W) is a good sub-optimal
pair selection for NOMA. Indeed, PA(B-W) pairs the UEs in
a greedy way, aiming at maximizing the diversity of channel
conditions of paired UEs. As shown in Figure 5(c), the optimal
pair selection has a similar trend. The difference is that optimal
pairing has a more “global view” than PA(B-W) . In Figure 8,
under PA(B-SB) , SP(Uni) , SP(FTPC) , and SP(Opt) improve the load
very slightly. All of the three are far from the global optimum
and the gap is large under high user demands. We conclude
that PA(B-SB) is not as effective as PA(B-W) in terms of network
load optimization.
As the overall conclusion, jointly optimizing power allocation and user pairing is important for the performance of
NOMA.
C. Convergence Analysis
We show the convergence performance of M-C ELL in Figure 9, for demands 0.3, 0.5, 0.7, and 1.0, respectively. Initially,
(0)
ρi = 1 (i ∈ C). We observe that M-C ELL converges very
fast. With higher demand, the convergence becomes slightly
faster. High accuracy is reached after a very few iterations. For
all the demands consider in the figure, even if we terminate
M-C ELL after a very few iterations, the obtained solution is
close to the optimum.
10−1
kρ(k) − ρ(k−1) k∞
power.
In summary, power allocation has considerably large influence on NOMA. Even if the UE pairs are optimally selected,
sub-optimal power allocations in NOMA have significant
deviation from optimal NOMA.
d = 1.0
d = 0.7
d = 0.4
d = 0.1
10−5
10−9
10−13
2
3
4
5
6
7
8
9
10
Iteration k in M-C ELL
Figure 9. This figure shows the norm k·k∞ in function of iteration k in
M-C ELL, under the uniform demands 0.1, 0.4, 0.7, and 1.0, respectively.
VIII. C ONCLUSIONS
This paper has investigated optimal resource management
in multi-cell NOMA, with power allocation and user pairing
being considered simultaneously. Joint optimization of both is
shown to be very important for NOMA performance. The proposed system model admits a mixed use of OMA and NOMA
for the users. Therefore, network architectures that support
various multiple access techniques can be analyzed under this
model. Finally, as for future work, the paper suggests that
mathematical tools in SIF are useful for analyzing multi-cell
NOMA. In summary, NOMA is a promising technique for
spectrum efficiency enhancement and cell load balancing.
13
A PPENDIX
We remark that the function (32) is first referred to in Section V-A and is used in the formulation (17). The two functions (33)
and (34) are first referred to in Section V-A and are used in the algorithm S PLIT.
w⊕ (ρ−i )e(c⊕u +c u ) + (w (ρ−i ) − w⊕ (ρ−i ))ec u
Cvu (c⊕u , c u , ρ−i ) = log
.
(32)
pi + w (ρ−i )
K
d⊕ /x
cK
u
⊕u xu > d⊕
h
i
d
/x
u
H⊕u (xu , ρ−i ) =
(33)
(pi +w (ρ−i ))/e ⊕
+w⊕ (ρ−i )−w (ρ−i )
log
Otherwise
w⊕ (ρ−i )
K K
d /x
hu
i c u xu > d
H u (xu , ρ−i ) =
(34)
pi +w (ρ−i )
Otherwise
log
d /xu
w⊕ (ρ−i )e
R EFERENCES
[1] L. You, L. Lei, D. Yuan, S. Sun, S. Chatzinotas, and B. Ottersten, “A
framework for optimizing multi-cell NOMA: Delivering demand with
less resource,” in 2017 IEEE GLOBECOM, 2017.
[2] S. M. R. Islam, N. Avazov, O. A. Dobre, and K. S. Kwak, “Powerdomain non-orthogonal multiple access (NOMA) in 5G systems: Potentials and challenges,” IEEE Communications Surveys Tutorials, vol. 19,
no. 2, pp. 721–742, 2017.
[3] W. Shin, M. Vaezi, B. Lee, D. J. Love, J. Lee, and H. V.
Poor, “Non-orthogonal multiple access in multi-cell networks: Theory,
performance, and practical challenges,” arXiv.org, 2016. [Online].
Available: https://arxiv.org/pdf/1611.01607.pdf
[4] Z. Ding, P. Fan, and H. V. Poor, “Impact of user pairing on 5G
nonorthogonal multiple-access downlink transmissions,” IEEE Transactions on Vehicular Technology, vol. 65, no. 8, pp. 6010–6023, 2016.
[5] “Evaluation methodologies for downlink multiuser superposition transmissions,” 3GPP, Tech. Rep. R1-153332, 2014.
[6] W. Shin, M. Vaezi, B. Lee, D. J. Love, J. Lee, and H. V. Poor,
“Coordinated beamforming for multi-cell MIMO-NOMA,” IEEE Communications Letters, vol. 21, no. 1, pp. 84–87, 2017.
[7] J. Kim, J. Koh, J. Kang, K. Lee, and J. Kang, “Design of user clustering
and precoding for downlink non-orthogonal multiple access (NOMA),”
in 2015 IEEE MILCOM, 2015, pp. 1170–1175.
[8] H. Tabassum, E. Hossain, and M. J. Hossain, “Modeling and analysis of
uplink non-orthogonal multiple access (NOMA) in large-scale cellular
networks using poisson cluster processes,” arXiv.org, 2016. [Online].
Available: http://arxiv.org/abs/1610.06995.pdf
[9] Y. Fu, Y. Chen, and C. W. Sung, “Distributed power control for the
downlink of multi-cell NOMA systems,” IEEE Transactions on Wireless
Communications, to appear.
[10] L. P. Qian, Y. Wu, H. Zhou, and X. Shen, “Joint uplink base station association and power control for small-cell networks with nonorthogonal multiple access,” IEEE Transactions on Wireless Communications, vol. 16, no. 9, pp. 5567–5582, 2017.
[11] B. Di, L. Song, Y. Li, and G. Y. Li, “Non-orthogonal multiple access
for high-reliable and low-latency V2X communications in 5G systems,”
IEEE Journal on Selected Areas in Communications, vol. 35, no. 10,
pp. 2383–2397, 2017.
[12] L. P. Qian, Y. Wu, H. Zhou, and X. Shen, “Dynamic cell association
for non-orthogonal multiple-access V2S networks,” IEEE Journal on
Selected Areas in Communications, vol. 35, no. 10, pp. 2342–2356,
2017.
[13] J. Zhu, J. Wang, Y. Huang, S. He, X. You, and L. Yang, “On optimal
power allocation for downlink non-orthogonal multiple access systems,”
IEEE Journal on Selected Areas in Communications, to appear.
[14] L. You and D. Yuan, “Joint CoMP-cell selection and resource allocation
in fronthaul-constrained C-RAN,” in 2017 WiOpt Workshop, 2017, pp.
1–6.
[15] L. Lei, D. Yuan, C. K. Ho, and S. Sun, “Optimal cell clustering and
activation for energy saving in load-coupled wireless networks,” IEEE
Transactions on Wireless Communications, vol. 14, no. 11, pp. 6150–
6163, 2015.
[16] I. Viering, M. Dottling, and A. Lobinger, “A mathematical perspective
of self-optimizing wireless networks,” in 2009 IEEE ICC, 2009, pp. 1–6.
[17] I. Siomina and D. Yuan, “Analysis of cell load coupling for LTE
network planning and optimization,” IEEE Transactions on Wireless
Communications, vol. 11, no. 6, pp. 2287–2297, 2012.
+w (ρ−i )−w⊕ (ρ−i )
[18] A. J. Fehske, I. Viering, J. Voigt, C. Sartori, S. Redana, and G. P.
Fettweis, “Small-cell self-organizing wireless networks,” Proceedings
of the IEEE, vol. 102, no. 3, pp. 334–350, 2014.
[19] L. You, D. Yuan, N. Pappas, and P. Värbrand, “Energy-aware wireless
relay selection in load-coupled OFDMA cellular networks,” IEEE Communications Letters, vol. 21, no. 1, pp. 144–147, 2017.
[20] L. You and D. Yuan, “Load optimization with user association in
cooperative and load-coupled LTE networks,” IEEE Transactions on
Wireless Communications, vol. 16, no. 5, pp. 3218–3231, 2017.
[21] I. Siomina, A. Furuskr, and G. Fodor, “A mathematical framework for
statistical QoS and capacity studies in OFDM networks,” in 2009 IEEE
PIMRC, 2009, pp. 2772–2776.
[22] K. Majewski and M. Koonert, “Conservative cell load approximation
for radio networks with Shannon channels and its application to LTE
network planning,” in 2010 Sixth Advanced International Conference on
Telecommunications, 2010, pp. 219–225.
[23] E. Pollakis, R. L. G. Cavalcante, and S. Staczak, “Base station selection for energy efficient network operation with the majorizationminimization algorithm,” in 2012 IEEE SPAWC, 2012, pp. 219–223.
[24] A. J. Fehske and G. P. Fettweis, “Aggregation of variables in load models
for interference-coupled cellular data networks,” in 2012 IEEE ICC,
2012, pp. 5102–5107.
[25] A. J. Fehske, H. Klessig, J. Voigt, and G. P. Fettweis, “Concurrent loadaware adjustment of user association and antenna tilts in self-organizing
radio networks,” IEEE Transactions on Vehicular Technology, vol. 62,
no. 5, pp. 1974–1988, 2013.
[26] C. K. Ho, D. Yuan, and S. Sun, “Data offloading in load coupled
networks: A utility maximization framework,” IEEE Transactions on
Wireless Communications, vol. 13, no. 4, pp. 1921–1931, April 2014.
[27] R. L. G. Cavalcante, S. Stanczak, M. Schubert, A. Eisenblaetter, and
U. Tuerke, “Toward energy-efficient 5g wireless communications technologies: Tools for decoupling the scaling of networks from the growth
of operating power,” IEEE Signal Processing Magazine, vol. 31, no. 6,
pp. 24–34, 2014.
[28] S. Tombaz, S. w. Han, K. W. Sung, and J. Zander, “Energy efficient
network deployment with cell DTX,” IEEE Communications Letters,
vol. 18, no. 6, pp. 977–980, 2014.
[29] B. Baszczyszyn, M. Jovanovic, and M. K. Karray, “Performance laws
of large heterogeneous cellular networks,” in 2015 WiOpt, 2015, pp.
597–604.
[30] C. K. Ho, D. Yuan, L. Lei, and S. Sun, “Power and load coupling
in cellular networks for energy optimization,” IEEE Transactions on
Wireless Communications, vol. 14, no. 1, pp. 509–519, 2015.
[31] R. L. G. Cavalcante, S. Staczak, J. Zhang, and H. Zhuang, “Low
complexity iterative algorithms for power estimation in ultra-dense load
coupled networks,” IEEE Transactions on Signal Processing, vol. 64,
no. 22, pp. 6058–6070, 2016.
[32] H. Klessig, D. hmann, A. J. Fehske, and G. P. Fettweis, “A performance
evaluation framework for interference-coupled cellular data networks,”
IEEE Transactions on Wireless Communications, vol. 15, no. 2, pp. 938–
950, 2016.
[33] R. L. G. Cavalcante, Y. Shen, and S. Staczak, “Elementary properties of
positive concave mappings with applications to network planning and
optimization,” IEEE Transactions on Signal Processing, vol. 64, no. 7,
pp. 1774–1783, 2016.
[34] Q. Liao, “Dynamic uplink/downlink resource management in flexible
duplex-enabled wireless networks,” in 2017 ICC Workshops, 2017, pp.
625–631.
14
[35] R. L. G. Cavalcante, M. Kasparick, and S. Staczak, “Max-min utility
optimization in load coupled interference networks,” IEEE Transactions
on Wireless Communications, vol. 16, no. 2, pp. 705–716, 2017.
[36] D. A. Awan, R. L. G. Cavalcante, and S. Stanczak, “A robust machine
learning method for cell-load approximation in wireless networks,”
arXiv.org, 2017. [Online]. Available: http://arxiv.org/abs/1710.09318
[37] D. Tse and P. Viswanath, Fundamentals of Wireless Communication.
Cambridge university press, 2005.
[38] G. Geraci, M. Wildemeersch, and T. Q. S. Quek, “Energy efficiency
of distributed signal processing in wireless networks: A cross-layer
analysis,” IEEE Transactions on Signal Processing, vol. 64, no. 4, pp.
1034–1047, 2016.
[39] M. Wildemeersch, T. Q. S. Quek, M. Kountouris, A. Rabbachin, and
C. H. Slump, “Successive interference cancellation in heterogeneous
networks,” IEEE Transactions on Communications, vol. 62, no. 12, pp.
4440–4453, 2014.
[40] R. D. Yates, “A framework for uplink power control in cellular radio
systems,” IEEE Journal on Selected Areas in Communications, vol. 13,
no. 7, pp. 1341–1347, 1995.
√
[41] S. Micali and V. V. Vazirani, “An O( V · |E|) algoithm for finding
maximum matching in general graphs,” in 21st Annual Symposium on
Foundations of Computer Science, 1980, pp. 17–27.
[42] H. R. Feyzmahdavian, M. Johansson, and T. Charalambous, “Contractive
interference functions and rates of convergence of distributed power
control laws,” IEEE Transactions on Wireless Communications, vol. 11,
no. 12, pp. 4494–4502, 2012.
[43] D. Huo, “Clarification on the wrap-around hexagon network structure,”
IEEE, Tech. Rep. C802.20-05/15, 2005.
[44] Y. Saito, A. Benjebbour, Y. Kishiyama, and T. Nakamura, “System-level
performance evaluation of downlink non-orthogonal multiple access
(NOMA),” in 2013 IEEE PIMRC, 2013, pp. 611–615.
| 7cs.IT
|
arXiv:1802.10427v1 [math.GR] 28 Feb 2018
A few remarks on invariable generation in infinite groups
Gil Goffer
Gennady A.Noskov
The Weizmann Institute of Science
The Sobolev Institute of Mathematics
76100, Rehovot, Israel
644043, Omsk, Russia
∗
February 12, 2018
Abstract
A subset S of a group G invariably generates G if G is generated by {sg (s)|s ∈ S} for any choice
of g(s) ∈ G, s ∈ S. In case G is topological one defines similarly the notion of topological invariable
generation. A topological group G is said to be T IG if it is topologically invariably generated by
some subset S ⊆ G. In this paper we study the problem of (topological) invariable generation for
linear groups and for automorphism groups of trees. Our main results show that the Lie group SL2 (R)
and the automorphism group of a regular tree are T IG , and that the groups P SLm (K), m ≥ 2 are
not IG for certain countable fields of infinite transcendence degree over the prime field.
Contents
1 Introduction
2
2 Preliminary results
3
3 Parabolics and stabilizers as Wiegold subgroups
6
4 Borel versus Wiegold
9
5 Compact Lie groups and their generalizations
10
6 SL2 (R) is T IG
10
6.1
Conjugacy classes in SL2 (R) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
10
6.2
One-parameter subgroups of SL2 (R) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
11
6.3
One-dimensional Lie subgroups of SL2 (R) and their spectra . . . . . . . . . . . . . . . . .
12
∗ The
authors thank the support of Tsachik Gelander and Uri Bader
1
6.4
2-dimensional Lie subgroups of SL2 (R) and their spectra . . . . . . . . . . . . . . . . . . .
13
6.5
Main lemma and theorem 14 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
14
7 Aut(T ) is T IG
14
7.1
Elements classification . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
14
7.2
The local action by permutation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
15
7.3
Conjugacy classes in Aut(T ) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
16
7.3.1
Elements of type (n, P) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
16
7.3.2
Spherically-transitive elements . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
17
7.4
A set of generators for Aut(T ) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
17
7.5
Proof of theorem 20 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
19
8 Uncountably many countable non-IG -groups
19
8.1
Laws in groups . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
19
8.2
Rational points . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
21
8.3
Building up free tuples . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
21
8.4
When is PSLm (K) an IG ?
22
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
9 Open problems
1
23
Introduction
The notion of invariable generation of groups goes back at least as far as Jordan’s paper of 1872.
Theorem 1 ([Jo, Se]) . Assume that a finite group G acts transitively on a set X of cardinality at least
2. Then there exists g ∈ G displacing every element of X, i.e. g has no fixed point in X.
(We define g ∈ G to be active or fixed point free if it satisfies the conclusion of Jordan’s theorem.)
Independently, but more than hundred years later (in 1976), J.Wiegold introduced the class X of groups
G with the property that whenever G acts transitively on a set X of cardinality at least 2, there is an
active element g ∈ G, see [Wi76]. Thus Jordan’s theorem above says that every finite group belongs
to the class X. Not only Wiegold failed to mention Jordan, but also he claims indirectly that Jordan’s
theorem is obvious. “Observe that, in particular, finite groups and soluble groups have III – obvious
facts once noted, though I know of no reference to them in the literature” see [Wi76]. Wiegold gave two
more characterizations of class X. Namely, G ∈ X if and only if for every proper subgroup H ≤ G the
union ∪{H g : g ∈ G} does not cover the whole G. (Here, we use the common notation H g to denote
the conjugate g −1 Hg of H.) Secondly, G ∈ X if and only if
representative of every conjugacy class of G, generates G.
2
every subset, containing at least one
These characterizations lead naturally to the following definitions (of our own, though the concepts
implicitly occurred in above conversation). We call a proper subgroup W of a group G a Wiegold subgroup
of G if G is covered by conjugates of W , i.e. G = ∪g∈G W g . Alternative terms might be “parabolic
subgroup” or “Borel subgroup” but this could lead to confusion. Yet another alternative term might
be “abnormal subgroup” but again it could conflict with existing terminology. A subset S of a group
G is conjugation complete
(in G) if it meets every non-trivial conjugacy class in G. In these terms
it is easy to see that the class X consists of those groups that do not have Wiegold subgroups. Now
Jordan’s theorem becomes really “obvious” (but modulo Wiegold’s characterizations) for finite groups
by counting argument. Indeed, let G be finite and suppose H was a Weigold subgroup. For every g ∈ G
S
S
we have H g = H Hg , hence the union g∈G H g can be written as the union Hg∈H\G H Hg . There are
|G : H| members in the last union, each member is of cardinality |H| and all members contain the identity
element, hence the cardinality of the union is strictly less than |G : H| · |H| = |G|, contradicting the
definition of Wiegold’s subgroup.
Independently of Wiegold, but somewhat later, J.D.Dixon (1992) invented the notion of invariable
generation for finite groups. A subset S of a finite group G invariably generates G if G is generated by
{sg (s)|s ∈ S} for any choice of g(s) ∈ G, s ∈ S. This notion was motivated by Chebotarev’s Density
Theorem [Ch]. In case G is a (Hausdorff) topological group one defines similarly the notion of topological
invariable generation. A topological group G is said to be T IG if it is topologically invariably generated
by some subset S ⊆ G. In this paper we study the problem of (topological) invariable generation for
linear groups and for automorphism groups of trees. Our main results show that the Lie group SL2 (R)
and the group of tree automorphisms Aut(T ) are T IG , and that the groups P SLm (K), m ≥ 2 are not
IG for certain countable fields of infinite transcendence degree over the prime field.
2
Preliminary results
We shall formulate now the invariable generation problem in topological setup. The (left) action G y X
of a topological group G on a topological space X is continuous if the map (g, x) 7→ gx from G × X to
X is continuous. We call a proper subgroup W of a topological group G the Wiegold subgroup of G if G
is covered by conjugates of W i.e. G = ∪g∈G W g . A subset S of G is conjugation complete
(in G) if it
meets every non-trivial conjugacy class in G. A transitive action G y X of a group G on the set X has
fixed-point property (FP) if every g ∈ G has a fixed point.
Lemma 2 The following conditions on a topological group G are equivalent:
I.
Whenever an action G y X of G on a topological space X of cardinality at least 2 is continuous and
transitive, there is an active element g ∈ G (i.e. g has no fixed point in X).
3
II.
There is no closed Wiegold subgroup in G, i.e. G is not covered by the conjugates of every proper
closed subgroup H < G.
III. Every conjugation complete
subset S of G topologically generates G, i.e. the closure of subgroup
hSi generated by S equals G.
IY. There is a family (Ci ) of conjugacy classes of G (not necessarily distinct) invariably and topologically
generating G in the sense that each family (ci ) of elements ci ∈ Ci topologically generate G.
Proof.
I ⇒ II. Suppose that I holds. Arguing by contradiction suppose that there exists a closed Wiegold
−1
subgroup W in G. Fix g ∈ G. Since W is Wiegold we have g ∈ W h
for some h ∈ W which is
equivalent to the equality ghW = hW which in turn means that g has a fixed point hW in the
topological quotient G/W . The natural action G y (G/W ) is transitive and since W is proper,
the cardinality of G/W is at least 2. This contradicts the assumption that condition I holds with
X = G/W .
II ⇒ I. Suppose that II holds. Assume, to get a contradiction, that the action G y X is transitive,
|X| ≥ 2 and every g has a fixed point in X. It follows that for every x ∈ X we have a covering
∪g∈G Ggx = G, since every h ∈ G fixes some gx. But Ggx = gGx g −1 , thus G is covered by conjugates
gGx g −1 and hence Gx is Wiegold. This contradicts the assumption that II holds.
II ⇒ III. Suppose that II holds. Assume, to obtain a contradiction, that there is a conjugation complete subset S of G that S does not topologically generates G, i.e. the closure hSi is proper in G.
Each h ∈ G equals to some sg ∈ S, hence h ∈ S g ⊆ ∪g∈G S g . Then hSi is Wiegold, contradiction
with III.
III ⇒ II. Suppose that III holds. Again arguing by contradiction suppose that there is a conjugation
complete subset S that does not generate G topologically. It follows that hSi < G and S meets every
g
non-trivial conjugacy class, which yields ∪g∈G hSi = G hence W = hSi is an Wiegold subgroup,
contradicting to III.
III ⇒ IY. Suppose that III holds. Let (Ci ) be the family of all nontrivial conjugacy classes of G. Then
every family ci of elements ci ∈ Ci is conjugation complete and hence it topologically generate G.
IY ⇒ III. Suppose that IY holds. Let (Ci ) be a family of conjugacy classes of G that invariably and
topologically generate G in the sense that each family ci of elements ci ∈ Ci topologically generate
G. Let S be an arbitrary conjugation complete
subset of G. For each i there is si ∈ S such that
si ∈ Ci . Hence the family (si ) topologically generates G, and this is true all the more so for the set
S.
4
We say that the topological group G is topologically invariably generated (T IG ) if the equivalent
conditions I-IY are satisfied. In case G is discrete conditions I-III are introduced in [Wi76] and in case G
is finite condition IY is introduced in [Di]. We skip the adverb “topologically” in case the topology on G
is discrete and say about invariable generation property IG . Clearly, if G is IG then G is T IG relative
to every group topology on G. The converse is not true – for instance the free group F2 of rank 2 is
T IG relative to profinite topology but it is non non-IG ([Wi77]).
Example 3 If G is an abelian group then the conjugacy classes are just 1-element subsets of G. So the
conjugacy complete sets are those containing G − {1}. Thus every conjugacy complete set generate G.
Hence G has no Wiegold subgroup and G is IG .
Example 4 Consider the extreme case when G contains precisely two conjugacy classes: {1} and
G − {1}. Let us show that G is IG iff G ' Z/2. Clearly, G = Z/2 is IG . Conversely, suppose that G is
IG . Every 1-element set {g} ⊂ (G − {1}) is conjugacy complete, hence G is generated by g and therefore
G is cyclic. It is easily verified that the only cyclic group that has precisely two conjugacy classes is
Z/2. Thus G = Z/2. We conclude that every group G 6= Z/2 with a single non-trivial conjugacy class is
non-IG . It is proved by D.Osin that any countable torsion free group can be embedded into a finitely
generated group with exactly two conjugacy classes [Os10].
These examples suggest, that intuitively the group G is IG if it contains “many conjugacy classes”.
Lemma 5 ([Wi76, Wi77]) i The class IG is closed under extensions.
ii The class IG is closed under restricted direct products with arbitrarily many factors.
iii The class IG not closed under unrestricted direct products and not closed under passage to subgroups.
iv The class IG contains all finite groups and all solvable groups.
In [Wi77] an IG -group is presented, whose commutator subgroup is outside IG . In the present paper
it is shown that SL2 (R) is T IG , whereas it contains a discrete free group F2 , which is not IG .
Slightly modifying Wiegold’s arguments we obtain the following properties of the class T IG .
Lemma 6 The class T IG contains all profinite groups and all topological solvable groups.
Not so many classes of groups are known to be IG or T IG:
1. Virtually solvable groups (including finite groups) are T IG [Wi76].
5
2. The pro-finite completions of all arithmetic groups with the Congruence Subgroup Property are
T IG , see [KLS2].
This list is extended in the present paper by the group SL2 (R) which is shown to be in T IG .
The list of known non-IG groups is lengthy but rather chaotic:
1. Groups with one single non-trivial conjugacy class, except Z/2.
2. The finite index net subgroups in groups SO(Q, Z) where Q is a rational quadratic form of signature
(2, 2), see [GM].
3. SO(3), and, more generally, every nonabelian connected compact Lie group G since every maximal
abelian subgroup is Wiegold , see [Ge].
4. SLn (R) for n > 2, see [KLS2] .
5. Any non-virtually-solvable linear algebraic group over an algebraically closed field, for instance
SLn (C) for n ≥ 2, see [KLS2].
6. Non-elementary convergence groups (including Gromov hyperbolic groups) [Ge].
7. The Thompson groups T and V , see [GGJ].
3
Parabolics and stabilizers as Wiegold subgroups
Let GLn (K) be a general linear group of degree n ≥ 2 over the (topological) field K. Consider the
standard left action GLn (K) y K n of GLn (K) on K n . Let Gr(n, r) denote the Grassmannian of all
r-dimensional linear subspaces of K n . In the next proposition we give various conditions on the field and
the action of a group G on Grassmanian that provide the Wiegold property for certain stabilizers.
Proposition 7 Let G be a subgroup of GLn (K) and let X ⊆ Gr(n, r), n ≥ r > 1 be a G-invariant subset
with more than one element.
1. Suppose that the action G y X is transitive and satisfies fixed-point property FP. Then every
stabilizer GP (P ∈ X) is a Wiegold subgroup in G.
2. In case of algebraically closed K we can drop the fixed-point assumption at the expense of assuming
that X = Gr(n, r). Namely, let K be an algebraically closed field and suppose a subgroup G ≤
GLn (K) acts transitively on Gr(n, r) (1 ≤ r < n). Then for every r-dimensional linear subspace L
of K n the stabilizer GL is Wiegold. In particular GLn (K) and SLn (K) are not IG .
6
3. Suppose a subgroup G ≤ GLn (R) acts transitively on Grassmanian of planes Gr(n, 2) (n ≥ 3). Then
for every plane L of Rn the stabilizer GL is Wiegold. In particular GLn (R), SLn (R), On (R), SOn (R)
are not IG .
Proof. (1) is just a direct consequence of lemma 2 in terms of action of G on Grassmanian.
(2) Indeed, to apply assertion (1) it is sufficiently to check that every g ∈ GLn (K) fixes some rdimensional linear subspace L of K n . This is true for r = 1 since K is algebraically closed and for
arbitrary r an easy induction does the job.
(3) It is well known, via complexification, that every g ∈ GLn (R) fixes subspace of dimension 1 or 2,
see [Ax, p. 279],[KM, Prop.12.16]. Moreover, to each nonreal eigenvalue corresponds an invariant plane.
It follows that if n ≥ 2 then every g ∈ GLn (R) fixes subspace of dimension 2. Then for every plane L of
Rn the stabilizer GL is Wiegold. Thus GLn (R) is not IG
and moreover every subgroup G ≤ GLn (R)
which acts transitively on Gr(n, 2) turns out to be non-IG .
Symplectic groups. The symplectic group Sp2n (F ) is defined as the set of linear transformations
of a 2n-dimensional vector space F 2n over the field F that preserve a non-degenerate, skew-symmetric,
F -bilinear form ω on F 2n . A subspace L of a symplectic vector space is called Lagrangian if L = L⊥ where
L⊥ is an orthogonal complement of L relative to ω. A subspace L is Lagrangian if and only if dim L = n
and L is isotropic i.e. ω|L is identically zero. The set of Lagrangian subspaces of symplectic space
(F 2n , ω) is called the Lagrangian Grassmannian and denoted L(F 2n ). The group Sp2n (F ) acts transitively
on (F 2n ). Indeed by Witt’s theorem (1937) every linear isomorphism f : L → L0 of Lagrangian subspaces
can be extended to a symplectic automorphism of F 2n . Moreover, the following is true:
Theorem 8 ([Du], Theorem 3.4.3) Let (E, ω) be a symplectic vector space over a field k and let A
be a symplectic mapping f : (E, ω) → (E, ω) such that all its eigenvalues are contained in k. Then there
exists an f −invariant Lagrangian subspace L of (E, ω). Moreover, if k is algebraically closed then every
symplectic automorphism fixes some Lagrangian subspace.
It follows that Sp2n (F )L is Wiegold for every Lagrangian subspace L.
Wiegold subgroups over real closed fields. These fields have the same first-order properties as
R. A field K is said to be real if −1 is not a sum of squares in K, see [La, Corollary 9.3, Chapter VI][La].
A field K said to be real closed if it is real, and if any algebraic extension of K which is real must be
equal to K. By a real closure we shall mean a real closed field L which is algebraic over K. Every real
field admits a real closure. If K is real closed then every polynomial of odd degree in K[X] has a root in
√
K and K := K( −1) is the algebraic closure of K.
Proposition 9 Let K be a real closed field. Suppose a subgroup G ≤ GLn (K) acts transitively on
Grassmanian of planes Gr(n, 2) (n ≥ 3). Then for every plane L of K n the stabilizer GL is Wiegold. In
particular GLn (K), SLn (K), On (K), SOn (K) are not IG .
7
√
Proof. We assert that every g ∈ GLn (K)) (n ≥ 2) has invariant plane in column space K( −1)n . If all
eigenvalues of g are real, i.e. belong to K, then g is triangulizable over K and so has an invariant plane.
√
√
n
Now suppose that there is a non-real eigenvalue a + b −1 ∈ K, (a, b ∈ K)b 6= 0. Let w = u + −1v ∈ K
be an eigenvector corresponding to g. Then
gw = gu +
√
√
√
√
−1gv = (a + b −1)(u + −1v) = (au − bv) + −1(av + bu)
(1)
from which it follows that the space Ku + Kv is g-invariant. In fact this space is 2-dimensional. Indeed,
let say u = cv, 0 6= c ∈ K, then substituting u to equation 1 we obtain that c2 = −1 contradicting to
assumption that K is real. To complete the proof we apply now lemma 7 and obtain that the action
G y Gr(n, 2) satisfies F P and is transitive by assumption so GL is Wiegold.
In attempt to generalize proposition 1 to the subspaces of arbitrary dimension r we came to
Lemma 10 Let K be an algebraically closed field of degree d ≥ 2 over its subfield k and suppose that
the extension K|k is separable. Then every g ∈ GLn (k) fixes linear subspace in k n of dimension smaller
than or equal d.
Proof. By Primitive Element Theorem there exists a primitive element ζ ∈ K i.e. K = k(ζ). It follows
from finiteness assumption that ζ is algebraic over k. Then K = k(ζ) = k[ζ], and k(ζ)) is finite over
k [La, Proposition 1.4., Chapter V]. Moreover, the degree d = [k(ζ) : k] is equal to the degree of the
irreducible polynomial p(X) of ζ over k (loc.cit). The proof of [La, Proposition 1.4., Chapter V] shows
that the powers 1, ζ, . . . , ζ d−1 form a basis the space K over k. Let V = K ⊗k k n be an extension of
scalars from k to K. This is an n-dimensional space over K. The action of g ∈ GLn (k) on k n extends
naturally to the action on K ⊗k k n . Since K is algebraically closed there is an eigenvector v ∈ V with
P
P
eigenvalue λ ∈ K. Write uniquely λ = i li ζ i , v = j ζ j ⊗ vj , where li ∈ k, vi ∈ k n . We assert that g
P
fixes the space i kvi (whose dimension is clearly at most r). Since gv = λv we have
gv =
X
X
X
X
ζ j ⊗ gvj = λv = (
li ζ i )(
ζ j ⊗ vj ) =
li ζ i+j ⊗ vj .
j
i
j
i,j
Rewriting ζ i+j as a k-linear combinations of 1, ζ, . . . , ζ r−1 we obtain that
X
li ζ i+j ⊗ vj =
i,j
X
ζ k ⊗ vk0
k
where vk0 are k-linear combinations of vj . It follows from above that gvj = vj0 , and the lemma follows.
Unfortunately, the applicability of the above lemma is very much restricted by the Artin-Schreier
theorem which asserts that if a field K is algebraically closed with k a subfield such that 1 < [K : k] < ∞
then K = k(i) where i2 = −1, and k has characteristic 0 [La, Corollary 9.3, Chapter VI].
8
4
Borel versus Wiegold
The following is a slight variation on the result in [KLS2].
Theorem 11 Let G be a linear algebraic group over an algebraically closed field k and let B be its
Borel subgroup (=maximal connected closed solvable subgroup). 1) If G is not virtually solvable then the
normalizer NG (B) is a Wiegold subgroup of G. 2) If furthermore G is connected then B is itself Wiegold.
Proof. Firstly let us prove that NG (B) is a proper subgroup of G. Suppose to the contrary that
NG (B) = G, i.e. B is normal in G. Note that, being connected, B is contained in the connected
component G0 of G. Since B is normal in G, it also normal in G0 . Note that B is proper in G0 since
otherwise G would be a finite extension of B = G0 , i.e. virtually solvable. Finally by Chevalley result
[Bo2, theorem 11.16] B is self-normalizing in G0 , contradicting the normality of B. Hence NG (B) is a
proper subgroup of G.
By a theorem of Steinberg (see Theorem 7.2 of [St]), every automorphism of G fixes some Borel
subgroup of G. This implies that if g is any element of G, then g −1 B 0 g = B 0 for some Borel subgroup
B 0 of G. Thus the union of the normalizers NG (B 0 ) over the Borel subgroups B 0 of G equals G. Since
the Borel subgroups are all conjugate, it follows that ∪g (NG (B))g = G, thus NG (B) is Wiegold.
2) In this case we make use Grothendiecks Covering Theorem [Co, Theorem 4.11]: Let G be a
connected linear algebraic group over algebraically closed field k and let B ≤ G be a Borel subgroup then
[
G(k) =
g −1 B(k)g
g∈G
.
This immediately implies that B is Wiegold.
2-dimensional case. The standard Borel subgroup B of GL2 (K) is the group of all invertible up
per triangle matrices a0 db . For the Borel subgroup of SL2 (K) we require in addition that ad = 1.
The following exercise provides a supply of Wiegold subgroups in 2-dimensional case, cf. [La, Exercise
23,p.547].
Exercise 12 Let K be a field in which every quadratic polynomial has a root. Let B be the Borel subgroup
of GL2 (K) or of SL2 (K). Show that B is Wiegold.
Solution. We have to show that every matrix A = ac db ∈ GL2 (K) is conjugate to a matrix in
0 1
X
B. If b = 0 we conjugate A by −1
by the matrix X = ( x1 10 ) gives
0 . If b 6= 0 the conjugation A
(AX )2,1 = bx2 + (d − a)x − c which can be made zero by assumption. We conclude that B is a Wiegold
subgroup (and so GL2 (K) is not IG ).
An example of countable K satisfying condition of the above exercise is the ”quadratic closure” of Q
in C. How many such fields are there?
9
5
Compact Lie groups and their generalizations
As we mentioned above every nonabelian connected compact Lie group is not IG . Here we generalize
this remark to definably compact groups according to [Be].
We consider groups definable in an o-minimal expansion M = (R, <, +, . . .) of a real closed field
(R, <, +, . . .). Classical examples of such groups are the (real) algebraic subgroups of the general linear
group GLn (R), for instance the orthogonal group SOn (R). Less classical examples of definable groups
can be found in [PS] or in [Str].
Theorem 13 If G is a nonabelian definably connected definably compact group in an o-minimal expansion
R of a real closed field R, then for any maximal definable abelian subgroup T of G, G is the union of the
conjugates of T i.e. T is Wiegold subgroup in G. In particular, G is not IG .
This is immediately follows from the main result of [Be].
SL2 (R) is T IG
6
Theorem 14 The group SL2 (R) satisfies the topological invariable generation property relative to Euclidean topology.
Structure of the proof: The theorem will immediately follow from the key lemma 19 in which we prove
that if a closed subgroup G of SL2 (R) is conjugation complete then G = SL2 (R). To prove this lemma we
calculate the eigen-spectrum of SL2 (R) in section 6.1, relying on the description of conjugacy classes of
SL2 (R) given in [Co]. Then we describe the 1-parameter subgroups of SL2 (R) in section 6.2. In section 6.3
we describe spectra of 1-dimensional closed subgroups of SL2 (R) and show that their spectra are (much)
smaller than that of SL2 (R). In section 6.4 we do the same in case of 2-dimensional subgroups. In section
6.5 we prove the main lemma and theorem 14.
6.1
Conjugacy classes in SL2 (R)
Following to [Co] we remark that the conjugacy in SL2 (R) should not be confused with conjugacy in the
larger group GL2 (R).
Theorem 15 ([Co]) Let g ∈ SL2 (R).
1. If (Trg)2 > 4 then g is conjugate to a unique matrix of the form
λ
0
0 1/λ
with |λ| > 1.
10
2. If (Trg)2 = 4 then g is conjugate to exactly one of
1
± I2 , ±
0
1
1
,±
−1
0
1
.
−1
(2)
3. If (Trg)2 < 4 then g is conjugate to a unique matrix of the form
cos θ − sin θ
sin θ cos θ
other than ±I2 .
For a set of (complex) matrices M let Sp(M ) to denote the eigenvalue spectrum of M , i.e. the set
of all eigenvalues of all matrices in M (counting without multiplicity). The following is an immediate
consequence of the above result.
Corollary 16 Sp (SL2 (R)) = R× ∪ S, where R× = R − {0} and S = {z ∈ C : |z| = 1}.
6.2
One-parameter subgroups of SL2 (R)
Recall that a one-parameter subgroup in GLn (R) is a homomorphism R → GLn (R) and it is necessarily of
the form f (t) = eAt where A is the matrix f 0 (0). We describe here the conjugacy classes of one-parameter
subgroups in SL2 (R). For that we need to know the orbits of SL2 (R)-action on its Lie algebra. We set
b : a, b, c ∈ R}
sl2 (R) = {X ∈ M2 (R) | TrX = 0} = { ac −a
b ) ∈ sl (R)
to denote the Lie algebra of the Lie group SL2 (R). For a nonzero 2 × 2 real matrix X = ( ac −a
2
there are three cases:
1) X has nonzero real eigenvalues ±t.
0
Then X is conjugate by some g ∈ GL2 (R) to diagonal matrix ( 0t −t
.) To see that X is also conjugate
−1
t 0
det(g)
0
to ( 0 −t ) by the smaller group SL2 (R) we replace g by
g.
0
1
0
0
Matrices of the form ( 0t −t
) constitute a 1-dimensional Lie subalgebra a = R( 10 −1
) of sl2 (R) called
the split Cartan subalgebra. Exponentiating elements of a we obtain the split Cartan subgroup
et
0
:t∈R ,
A=
0 e−t
which is a 1-parameter subgroup of SL2 (R) corresponding to subalgebra a.
2) X has zero eigenvalue of multiplicity 2.
Then X is conjugate by some g ∈ GL2 (R) to nilpotent matrix of the form ( 00 d0 ), 0 6= d ∈ R. Again we
−1
0 .
can make g to be in SL2 (R) replacing g by matrix det(g)
0
1
11
Matrices of the form ( 00 0t ) constitute a 1-dimensional Lie subalgebra n = R( 00 10 ) of sl2 (R) called
nilpotent subalgebra n. Exponentiating elements of n we obtain the unipotent subgroup
1 R
U =
0 1
which is a 1-parameter subgroup of SL2 (R) corresponding to subalgebra n.
3) X has nonzero purely imaginary conjugate eigenvalues ±θi (θ > 0).
√
This happens if and only if a2 + bc < 0 and then easy calculation shows that θ = −a2 − bc. We
0 1
claim that X is conjugate to θ −1
by a matrix from SL2 (R). There are real linearly independent
0
column vectors u, v such that X(u + iv) = θi(u + iv) = θ(−v + iu) = Xu + iXv, from what we obtain
Xu = −θv, Xv = θu. It follows that a 2-by-2 matrix (u, v) ∈ M2 (R) with columns u, v is invertible. We
0 1
have X(u, v) = (Xu, Xv) = θ(−v, b) = θ(u, v) −1
0 .
It follows that
(u, v)−1 X(u, v) =
0
−1
1
.
0
(3)
We wish to modify g = (u, v) so that it became unimodular. For this purpose we first multiply g by
p
−1
|g|
– then 6.2 remains true; so we may as well assume det(u, v) = ±1. If det(u, v) = −1 then we
0
.
replace g by g 10 −1
0 t
0 t
Matrices of the form ( −t
0 ) constitute a 1-dimensional Lie subalgebra k = R( −t 0 ) of sl2 (R) called
non-split Cartan subalgebra. Exponentiating elements of k we obtain a 1-parameter subgroup K = SO2 (R)
of rotations called the non-split Cartan subgroup:
cos t sin t
:t∈R .
K=
− sin t cos t
Clearly SO2 (R) is a compact subgroup of SL2 (R). In fact, it is a maximal closed subgroup of SL2 (R)
[Gl, Ch.VI, section 1].
6.3
One-dimensional Lie subgroups of SL2 (R) and their spectra
Lemma 17 The eigen-spectrum of every closed 1-dimensional subgroup in SL2 (R) is a proper subset in
Sp(SL2 (R)).
Proof.
Suppose that G is a Lie subgroup of SL2 (R) such that its component G0 is 1-dimensional, so is a
1-parameter subgroup of one of the above types A, U, K.
12
1) In case G0 = A we have
A = G0 E G E N (A),
0 1
where N (A) is the normalizer of A in SL2 (R) and w = ( −1
0 ) is the Weyl element. By Bruhat
decomposition N (A) = A ∪ wA, see [La, p.539]. We conclude that
Sp (G) ≤ Sp (N (A)) = Sp(A) ∪ Sp(wA).
Note that (surprisingly but luckily) Sp(wA) equals
−t
0
e
, t ∈ R = {±i}
Sp
−et
0
and indeed Sp(G) = R0 ∪ {i} is a proper subset of Sp(SL2 (R)).
2) If G0 = U is unipotent, then as easy to see N (U ) = B, where B =
n t
± e0
s
e
−t
o
; t, s ∈ R . Hence
G0 E G E N (U ) = B and clearly Sp (G) ≤ Sp (B) = R0 .
3) Finally, in case G0 = K we have N (K) = K [Gl, Ch.VI, sec. 1] hence Sp (G) ≤ Sp (K) = S.
6.4
2-dimensional Lie subgroups of SL2 (R) and their spectra
Two-dimensional Lie algebra over R is either abelian or solvable. Furthermore a solvable Lie algebra s2
has generators e, f and defining relation [ef ] = e, see [Ja]. Using the above classification of 1-dimensional
subalgebras it is easy to conclude that there no two-dimensional abelian subalgebras in sl2 (R). On the
other hand there is only one (up to conjugacy) subalgebra isomorphic to s2 , namely the Borel subalgebra
o
n t s
; t, s ∈ R .
b=
0 −t
The (connected) component B 0 of the Borel subgroup
et
s
; t, s ∈ R .
B = ±
0 e−t
has b as its Lie algebra. It follows that B 0 is the only (up to conjugacy) 2-dimensional connected subgroup
of SL2 (R). We conclude with
Lemma 18 Let G be a Lie subgroup of SL2 (R) such that its component G0 is a component B 0 of the
Borel subgroup B. Then G ≤ B and Sp (G) = R0 .
13
6.5
Main lemma and theorem 14
Lemma 19 If a closed subgroup G of SL2 (R) is conjugation complete then G = SL2 (R).
Proof. Suppose, on the contrary, that there exists a proper closed and conjugacy complete subgroup G
in SL2 (R). It follows from conjugation completeness that Sp(G) = Sp(SL2 (R)).
By Cartan’s theorem any closed subgroup of GLn (R) is a Lie group. (A short elegant proof can be
found in [Ad], pages 17-19). Hence G is a Lie subgroup of SL2 (R). The connected component G0 of G is
a proper closed normal Lie subgroup of G. Since G is a proper subgroup of 3-dimensional connected Lie
group SL2 (R), we conclude that dim G0 = 0, 1 or 2.
If dim G0 = 0 then G is at most countable discrete subgroup of SL2 (R) and thus its spectrum is at
most countable, so Sp (G) is properly contained in R× ∪ S = Sp (SL2 (R)). Contradiction.
If dim G0 = 1 then G0 is a 1-parameter subgroup of SL2 (R) and by lemma 17 the eigen-spectrum of
G is a proper subset in Sp(SL2 (R)). Contradiction.
Finally if dim G0 = 2 then G0 is the connected component of the Borel subgroup and by lemma 18
the eigen-spectrum of G is a proper subset in Sp(SL2 (R)). Contradiction.
The lemma and thereby theorem 14 are proved.
7
Aut(T ) is T IG
A (simplicial) graph Γ consists of a set of vertices V and a family E of edges which are 2-element subsets
of V . A (simple) path from vertex x to vertex y is a sequence of vertices πx = x0 , x1 , . . . , . . . , xn = y such
that every subset xi , xi+1 is an edge and every two subsequent edges are distinct. The number n ≥ 0 is
the length of π. Define the distance d(x, y) between vertices x and y to be the minimum of the lengths of
simple paths joining them. A loop is a path of positive length such that x0 = xn . A tree is a (simplicial)
graph without loops. The valence or degree of a vertex in a tree T is the number of edges that contain
it. A regular m-tree is a tree where every vertex has fixed valence m. Consider the group Aut(T ) of
automorphisms (=isometries) of T , equipped with the standard pointwise convergence topology. then
Aut(T ) turns into a totally disconnected, locally compact, unimodular topological group. In this section
we prove the following theorem:
Theorem 20 The automorphism group Aut(T ) of an m-regular tree is T IG for every m ≥ 2.
7.1
Elements classification
Let us begin by classifying a single automorphism g of a m-regular tree T . According to [Ti] there are
three disjoint cases to consider:
14
• g is elliptic, i.e. g has a fixed point in V (T ),
• g is inversion, i.e. there is an edge which is flipped by g,
• g is hyperbolic with an axis Ag ; that is to say Ag is a subtree with all vertices of degree 2 and g acts
on Ag by translation by a positive amount |g|. The number |g| is called the translation length of G.
We will denote by E , I , H the classes of elliptics, inversions and hyperbolics, respectively. It is easy
to see that they are all nonempty and pairwise disjoint. Moreover each of these classes is invariant
under conjugation. A useful remark is that conjugation transfers the minimal displacement set, i.e. if
g, h ∈ Aut(T ) and h is hyperbolic with axis Ah then Ag−1 hg = g.Ah . If h is elliptic fixing v ∈ V (T ) then
g −1 hg fixes g.v, and if h is an inversion flipping the edge e ∈ E(T ) then g −1 hg flips g.e.
7.2
The local action by permutation
We denote the pointwise stabilizer in Aut(T ) of a subset M ⊂ T by StabAut(T ) (M ), or simply by Stab(M ).
When v ∈ V (T ), we may simply write Stab(v) to mean Stab({v}). When K ≤ Aut(T ) is a subgroup,
we denote by StabK (M ) the stabilizer of M inside K. For a vertex v ∈ V (T ) and n ≥ 0 we denote by
B(v, n), S(v, n) ⊂ T the ball and the sphere of radius n about v in T respectively.
Let T be a regular tree. Following Burger and Mozes (see [BM]), in order to be able to talk about the
action of Aut(T ) locally, we present the following maps, that take elements in Aut(T ) to permutations
in the groups Sd and Sd−1 , representing the local action of an element g on a given set of vertices
that is preserved by g. Fix a legal coloring c of the edges of T by d colors, that is, c is a function
c : E(T ) → {1, . . . , d} satisfying the condition that for every vertex v ∈ T the colors of the edges adjacent
to v are distinct. For every i ∈ {1 . . . d} fix an isomorphism ψi between the subgroup StabSd (i) ≤ Sd and
the group Sd−1 .
Let n = 1 and let v ∈ V (T ) be any vertex. We define ϕv,1 to be the homomorphism ϕv,1 : Stab(v) → Sd
sending an element g ∈ Stab(v) to the permutation it induces on the colors of the d edges adjacent to v.
Observe that ϕv,1 is onto, and that ker(ϕv,1 ) = Stab(B(v, 1)).
For n > 1, v ∈ V (T ) and u ∈ S(v, n − 1) we define ϕv,n,u : Stab(B(v, n − 1)) → Sd to be the
homomorphism sending g to the permutation it induces on the colors of the edges adjacent to u. Let
e be the edge connecting u to the sphere S(v, n − 2) and let i = c(e). Since e is stabilized by any g ∈
Stab(B(v, n − 1)), the image of ϕv,n,u is the subgroup StabSd (i) ≤ Sd . Composing with the isomorphism
ψi : StabSd (i) → Sd−1 , we can think of ϕv,n,u as a surjective map ϕv,n,u : Stab(B(v, n − 1)) → Sd−1 .
Q
Let ϕv,n : Stab(B(v, n − 1)) → S(v,n−1) Sd−1 be the map g 7→ (ϕv,n,u (g))u∈S(v,n−1) . Observe that
ϕv,n is onto, and that ker(ϕv,n ) = Stab(B(v, n)).
15
7.3
Conjugacy classes in Aut(T )
Let T be a d-regular tree. We follow [GNS] for the description of the conjugacy classes of Aut(T ). For
g ∈ Aut(T ) we define the orbital type of g to be the marked graph of orbits. That is: the orbits space
hgi\T together with a function on the vertices m : V (hgi\T ) → N∪{∞} giving to any orbit its cardinality.
For elliptic elements and inversions, the orbital type is always a marked tree. Two such orbital types are
called equivalent if they are isomorphic as marked trees.
Any automorphisms conjugate to an elliptic element (inversion, hyperbolic) is clearly elliptic (resp.
inversion, hyperbolic) as well. Therefore, conjugacy classes in Aut(T ) can be described separately in each
of these cases.
Lemma 21 Elliptic elements g, g 0 ∈ Aut(T ) are conjugate to each other iff their orbital types are equivalent;
Inversions i, i0 ∈ Aut(T ) are conjugate to each other iff their orbital types are equivalent;
Hyperbolic elements h, h0 ∈ Aut(T ) are conjugate to each other iff they have equal translation length
|h| = |h0 |.
For the full proof of this lemma see [GNS].
7.3.1
Elements of type (n, P)
A partition P is called non-trivial if it contains a set of size larger than 1. Let n = 1 and let P =
{P1 , . . . , Pk } be a non-trivial partition of {1, . . . , d}. We say an elliptic element g ∈ Aut(T ) has type
(1, P) about v ∈ V (T ) if g stabilizes v, and acts on the neighbors {u1 , . . . , ud } of v with orbits sizes
correspond to the partition P.
Let n > 1 and let P = {P1 , . . . , Pk } be a non-trivial partition of {1, . . . , d − 1}. We say an elliptic
element g ∈ Aut(T ) has type (n, P) about v ∈ V (T ) if g stabilizes v, and there exits a vertex u ∈ S(v, n−1)
with neighbors {u1 , . . . , ud−1 } ∈ S(v, n) such that:
• g stabilizes (pointwise) all vertices in B(v, n)\{u1 , . . . , ud−1 }
• g acts on {u1 , . . . , ud−1 } with orbits sizes correspond to the partition P.
An elliptic element g ∈ Aut(T ) is said to be of type (n, P) if it is of type (n, P) about v for some
vertex v ∈ V (T ).
In particular, being of type (n, P) is determined by the existence of a radius-n marked ball in the orbital
type, suitable for n and P. Therefore if type(g) = (n, P) and g, g 0 are conjugate, then type(g 0 ) = (n, P).
Notice further that for any choice of n ≥ 1 and a partition P of {1, . . . , d} (if n = 1) or {1, . . . d − 1} (if
n > 1) there exists an elliptic element g ∈ Aut(T ) of type (n, P).
16
Figure 1: (1, {1, 2, 2})-type element (left); (2, {1, 3})-type element (right)
We will denote by P1 , Pn the automorphisms of type (1, P) for any non-trivial partition P of
{1, . . . , d}, and, respectively, the automorphisms of type (n, P) for any n > 1 and any non-trivial partition
P of {1, . . . , d − 1}.
7.3.2
Spherically-transitive elements
Let s ∈ Aut(T ) be an elliptic element stabilizing a vertex v ∈ V (T ) and assume that the action of hsi
is transitive on all spheres about v. We call such an element v-spherically transitive. An elliptic element
s ∈ Aut(T ) is called spherically transitive if it is v-spherically transitive for some v.
For any v ∈ V (T ) there exists a v-spherically transitive element in Aut(T ). If s is v-spherically
transitive, it follows that the orbital type of s is an infinite ray (x0 , x1 , x2 , . . . ) with marks f (x0 ) = 1,
f (xn ) = d(d − 1)n−1 , n ≥ 1 (that is, the size of the nth -sphere about v). Hence, all spherically transitive
elements in Aut(T ) are conjugate. We will denote by T the set of all spherically transitive automorphisms
of T .
Corollary 22 The sets T , H , P1 , Pn , n ≥ 2 are pairwise disjoint and are invariant under conjugation
in Aut(T ). Let H ≤ Aut(T ) be a conjugation complete subgroup, then H meets each of the following sets
T , H , P1 , Pn . Moreover, H ∩ H contains at least one hyperbolic automorphism of displacement length
1.
7.4
A set of generators for Aut(T )
Lemma 23 Let h be a hyperbolic element of length |h| = 1 and let s be a spherically transitive element.
Then hh, si acts transitively on the vertices of T .
Proof. Let v ∈ V (T ) be a vertex such that s is v-spherically transitive. Denote by Ah the axis stabilized
2
by h, and let d = d(v, Ah ). The elements sh , sh are both spherically transitive. Let v1 , v2 ∈ V (T ) be
2
the fixed points of sh , sh respectively. Notice that v1 = h.v, v2 = h2 .v, hence d(v, v2 ) = 2d + 2 and
17
Figure 2: Vertex transitivity via spherical one.
d(v1 , v2 ) = 2d + 1. Denote by u the neighbor of v having d(u, v2 ) = 2d + 1, then since both u, v1 are of
2
same distance from v2 , there exists a power n such that (sh )n .v1 = u. Denote by s0 the conjugation of
2
s by (sh )n .
It follows that s0 ∈ hs, hi is u-spherically transitive. Let e = (v, u) and denote by Tv , Tu the connected
components in T \{e} of v, u respectively. Next, we show that hs, s0 , hi = hh, si acts transitively on the
vertices of T . Let x ∈ V (T ), it is enough to show that ∃g ∈ hs, s0 , hi such that g.v = x. Denote by
dx = d(x, v). Without loss of generality, can assume that dx is even, otherwise replace x by h.x. We
construct by induction a sequence {gn }n≥0 ∈ hs, hi such that gn .v ∈ Tv and d(v, gn .v) = 2n, see Figure
2. Clearly we need g0 = e. Given gn−1 , observe that d(u, gn−1 .v) = 2n − 1. Use u-sphere transitivity
of s0 to get a power m such that (s0 )m gn−1 .v is in Tu . Since d(u, (s0 )m gn−1 .v) = 2n − 1, we have that
d(v, (s0 )m gn−1 .v) = 2n. Now use v-sphere transitivity of s to get a power k such that sk (s0 )m gn−1 .v is
again in Tv . Notice sk didn’t change the distance of (s0 )m gn−1 .v from v, so we have d(v, sk (s0 )m gn−1 .v) =
2n. Set gn = sk (s0 )m gn−1 . In order to get g.v = x, choose n such that d(v, gn .v) = d(v, x), and use
v-sphere transitivity of s to find a power l such that sl gn .v = x.
Lemma 24 Let v ∈ V (T ) and let K ≤ Stab(v) be a closed subgroup. Suppose that K contains an
element gn,P of type (n, P) about v for every pair (n, P) ∈ {1} × {partitions of {1, . . . d − 1}} ∪ N>1 ×
{partitions of {1, . . . d}}. Then K = Stab(v).
Proof. Let k ∈ Stab(v), we use the fact that the finite permutation group Sd is IG
in order to
construct by induction a sequence kn ∈ H converging to k. Since K is closed, the result will follow. As
S
T = n B(v, n), it is enough to show that for all n kn B(v,n) = k B(v,n) .
Let n = 1, and denote by {v1 , . . . vd } the elements in S(v, 1) (that is, neighbors of v). Since K contains
g1,P for all partitions P of {1, . . . , d}, the subgroup Γ ≤ Sym{v1 , . . . vd } = Sd which is the image of K
under the map ϕv,1 is conjugation complete. As the permutations group Sd is finite, it is in particular
IG , therefore Γ = Sd , so K contains an element acting like k on S(v, 1). Take k1 to be this element.
18
Let n > 1. By induction hypothesis kn−1 ∈ K has that kn−1 B(v,n−1) = k B(v,n−1) .
Enumerate the vertices on the sphere S(v, n − 1) by u1 , . . . um (m = |S(v, n − 1)|). Recall that
each element gn,P of type (n, P) about v in K, stabilizes the entire sphere S(v, n) except the neighbors
{uj1 , . . . , ujd−1 } of some uj ∈ S(v, n − 1). Conjugating by powers of s, which is v-spherically transitive,
j
j
we can get elements gn,P
∈ K (j = 1, . . . m) such that gn,P
is of type (n, P), it stabilizes the entire
sphere S(v, n) except the neighbors of uj , and its orbits among the neighbors of uj have sizes according
j
to P. Let uj ∈ S(v, n − 1), since K contains an element gn,P
for every partition P of {1, . . . , d − 1},
we have that the subgroup Γ ≤ Sd−1 which is the image of K under the map ϕv,n,uj is conjugation
complete. Again, as the permutation group Sd−1 is finite, it is IG and therefore Γ = Sd−1 . In particular,
we can find {gj }j=1...m in K such that g j stabilizes the entire ball B(v, n) except the neighbors of uj ,
and g j {uj ...uj
1
d−1 }
−1
= kn−1
k {uj ...uj
1
d−1 }
. Observe that {g j } pairwise commute. Define kn be the product
kn = kn−1 g 1 g 2 . . . g m , then kn B(v,n) = k B(v,n) .
7.5
Proof of theorem 20
We prove the following rephrasement of theorem 20, based on lemma 23 and lemma 24
Theorem 25 Every closed conjugation complete
subgroup H of the automorphism group Aut(T ) of an
m-regular tree T , (m ≥ 2), coincides with Aut(T ).
Proof. Suppose the assertion of the theorem is false and let H < Aut(T ) be a closed Wiegold subgroup.
By corollary 22, H contains at least one hyperbolic element h of translation length |h| = 1, and at least
one elliptic element s which is v-spherically transitive element for a vertex v ∈ V (T ). Therefore by lemma
23 H is vertex-transitive. Using again corollary 22, we conclude that H contains elliptic elements gn,P of
all possible types (n, P). Using the transitivity of H, we can conjugate each element gn,P in H such that
it becomes of type (n, P) about v. We will denote StabH (v) ≤ StabAut (T )(v) briefly by K. The subgroup
K is closed, since it is equal to the intersection H ∩ StabAut(T ) (v). Hence K satisfies the assumptions of
lemma 24 and therefore K = StabAut(T ) (v). We have got that H is vertex transitive and contains the
full vertex-stabilizer group StabAut(T ) (v). It follows that H = Aut(T ).
8
8.1
Uncountably many countable non-IG -groups
Laws in groups
±1
A non-empty word w = w (x1 , . . . , xn ) (= string of symbols in alphabet x±1
1 , . . . , xn ) is reduced if it
does not contain adjacent symbols of the form xεi x−ε
i , ε = ±1. A non-empty word w = w (x1 , . . . , xn )
is reduced on the tuple of elements (g1 , . . . , gn ) of a group G if w is reduced and every word of the form
19
xm
i does not occur as a subword in w when |m| ≥ |gi |, where |gi | denotes the order of gi ( we of course
assume that |gi | = ∞ when giZ is infinite cyclic). A tuple of elements (g1 , . . . , gn ) of a group G is free
if the group hg1 , . . . , gn i generated by them is a free product of cyclics giZ , i.e. the group hg1 , . . . , gn i,
generated by g1 , . . . , gn , is isomorphic to the free product g1Z ∗ · · · ∗ gnZ under the natural homomorphism
from g1Z ∗ · · · ∗ gnZ to hg1 , . . . , gn i. A word w is said to be a law in a group G if w becomes trivial whatever
values the arguments xi are assigned from G; i.e. w (g1 , . . . , gn ) = 1 for all gi ∈ G.
The proof of the following lemma is routine and is left to the reader.
±1
Lemma 26 A tuple (g1 , . . . , gn ) over a group G is free iff every non-empty word w x±1
1 , . . . , xn , which
is reduced over the tuple (g1 , . . . , gn ), does not vanish on (g1 , . . . , gn ), i.e. w (g1 , . . . , gn ) 6= e. In other
words a tuple (g1 , . . . , gn ) is free iff there are no of non-trivial relations between the elements g1 , . . . , gn .
More generally, consider a free product G[x] = G ∗ xZ of G and the infinite cyclic group xZ . An
element w ∈ G[x] will be called a monomial in variable x over the group G. In case w 6∈ G we say that w is
non-constant. A monomial w induces a map w : G → G, where w(g) is the image of w under the natural
group homomorphism
G[x] → G,
taking x to g and fixing G pointwise.
The subset V (w) = {(g∈ G : w(g) = 1} is called the prin-
cipal algebraic set of G corresponding to w. Every monomial w ∈ G[x] can be written as a word
w = a0 xl1 a1 xl2 · · · am−1 xlm am with ai -s in G. We say that this word expression is reduced over G if
it does not contain a subword x±1 ax∓1 with a in the center of G. If a is central then replacing x±1 ax∓1
by a does not change the principal algebraic set V (w). After finitely many such replacements any word w
can be brought to reduced form (which, of course, could occur to be empty or constant). A (non-empty)
reduced non-constant word w (x) = a0 xl1 a1 xl2 · · · am−1 xlm am over G is said to be a generalized law in a
group G if w becomes trivial whatever values the arguments x are assigned from G; i.e. w (g) = 1 for all
g ∈ G.
The following is the simplified version of the result by Mikhalev and Golubchik, showing that there
is no generalized law in GLm (K) , (m ≥ 2) in case of infinite field K.
Theorem 27 ([GM]) Let K be an infinite field and w (x) = g0 xi0 g1 xi1 · · · gm xim gm+1 be a monomial
over the group GLm (K) , (m ≥ 2). If g1 , . . . , gm are all non-central in GLm (K) then the principal algebraic set V (w) = {g ∈ GLm (K) : w (g) = 1} is a proper subset of GLm (K).
The same result (with the same proof) is true for the groups SLm (K) and PSLm (K).
20
8.2
Rational points
As in [Bo1] we identify implicitly an algebraic group G with the group G (Ω) of its points in a ”universal
domain” Ω, i.e. an algebraically closed extension of infinite transcendence degree over a prime field
(recall that the prime field is either the rational number field Q, or a finite field of prime order Fp ).
Assume now that G is defined over a field K of infinite transcendence degree over a prime field k.
We shall need the following lemma which guaranties that, under some natural conditions, given a family
of proper algebraic subsets Vi (i ∈ N) of G, the set of K-rational points outside of a countable union
∪Vi (i ∈ N) is nonempty. (This is kind of an algebraic analog of Baire category theorem).
Lemma 28 ([Bo1], §2,Lemma 2) Let K be a field of infinite transcendence degree over a prime field.
Let X be an irreducible unirational K-variety. Let L be a finitely generated subfield of K containing a
field of definition of X, and Vi (i ∈ N) a family of proper algebraic subsets of X defined over an algebraic
closure L of L. Then X (K) is not contained in the union of the Vi (i ∈ N).
8.3
Building up free tuples
Lemma 29 (main) Let K be a field of infinite transcendence degree over a prime field k. Let C1 , . . . , Cn
be non-trivial distinct conjugacy classes in the group G = PSLm (K) , where n, m ≥ 2. Suppose that
c1 ∈ C1 , . . . , cn−1 ∈ Cn−1 are such that (c1 , . . . , cn−1 ) is a free tuple. Then there is a representative
cn ∈ Cn such that the tuple (c1 , . . . , cn ) is free.
Proof.
Suppose that c1 , . . . , cn−1 are given and we have to construct cn . Fix some c ∈ Cn . We
seek g ∈ PSLm (K) such that the n-tuple (c1 , . . . , cn ) is free with cn = g −1 cg. We will first find out g
in a larger group G (Ω) = PSLm (Ω) and then apply Borel’s lemma. Let W be the set of all non-empty
words w (x1 , . . . , xn ) which are reduced on the tuple (c1 , . . . , cn−1 , c). Thus W = {w = w (x1 , . . . , xn ) :
m
w is reduced, xm
i does not occur in w when |m| ≥ |ci | and xn does not occur in w when |m| ≥ |c| }.
Let w = w (x1 , . . . , xn ) ∈ W . The replacement x1 7→ c1 , . . . , xn−1 →
7 cn−1 , xn 7→ x−1 cx gives rise
to the monomial w c1 , . . . , cn−1 , x−1 cx over G in variable x, which is not necessarily reduced over G.
−1
Indeed, for every maximal occurrence of xm
cx contains a
n in w the result of substitution xn 7→ x
m
m
monomial x−1 cx
which is clearly not reduced. The replacement x−1 cx
by x−1 cm x is a non-empty
monomial w c1 , . . . , cn−1 , x−1 cx red with variable x over G and this monomial reduced over G. The set
G(w)
g ∈ G (Ω) : w c1 , . . . , cn−1 , g −1 cg = 1
=
g ∈ G (Ω) : w c1 , . . . , cn−1 , g −1 cg red = 1
=
(4)
(5)
is an algebraic subset of G (Ω) given by w c1 , . . . , cn−1 , x−1 cx red = 1. It is defined over the field L =
k (c1 , . . . , cn−1 , c) which is finitely generated over the prime subfield k and contains the field of definition
21
k of G. The irreducible components G (w)1 , . . . , G (w)nw of G (w) are defined over the separable closure
Ls [Bo1, §12.3]. Each G (w) is a proper subset of G (Ω) since otherwise w c1 , . . . , cn−1 , x−1 cx red = 1 is
a non-empty generalized law on G = PSLm (Ω), which contradicts Theorem 27. The family of algebraic
subsets {G (w)i : w ∈ W } is countable. Finally, the group G, being reductive, is unirational over k [Bo2,
section 18.2]. All above means that we can apply Borel’s lemma 28 with X = G, L = k (c1 , . . . , cn−1 , c)
and (Vi ) the family of all irreducible components of all G (w) , w ∈ W .
We conclude that G (K) is not contained in the union ∪w∈W G (w). The complement
G (Ω) − ∪ G(w)
w∈W
(6)
consists of g ∈ G (Ω) such that the n-tuple c1 , . . . , cn−1 , g −1 cg is free. Hence G (K) contains a point g
outside of union ∪w∈W G (w), so the corresponding tuple c1 , . . . , cn−1 , g −1 cg is free and K-rational.
8.4
When is PSLm (K) an IG ?
Theorem 30 If a field K is a countable and has infinite transcendence degree over the prime field, then
the group PSLm (K) is not IG for m ≥ 2.
Proof. The group G = PSLm (K) is countable. Then G − {e} = ∪Ci , (i ∈ N) , where Ci are all nontrivial distinct conjugacy classes. Inductively applying Lemma 29, we find out representatives ci so that
the subgroup hci : i ∈ Ni is isomorphic to the free product C = ∗ cZ
i : i ∈ N . By construction, C meets
all conjugacy classes and is non-trivial. The set S = {ci } is conjugacy complete. Moreover, hci : i ∈ Ni is
Q
N
a proper subgroup of G because its abelianization is C ab = i (Z/ |ci |) (where |ci | = 0 if ci is of infinite
order ) is non-trivial whereas G is a perfect group, even simple.
Theorem 31 There are uncountably many isomorphism types of non-IG groups of the form PSLm (K),
where m ≥ 2 and K is a countable field of infinite transcendence degree over Q.
Proof. Let P denote the set of all primes in N and let R ⊆ P be any subset. Consider the fields Q
√
R
generated by square roots of all the primes in R. Each of these fields is countable, and it’s not too hard to
√
see that they are pairwise non-isomorphic. Now adjoin to each Q
R countably many indeterminates
√
X = {Xi : i ∈ N} , i.e. consider the field of rational functions Q
R, X in indeterminates X. The fields
√
Q
R, X are all countable, pairwise non-isomorphic and have infinite transcendence degree over the
prime field Q.
By the result of Schreier and van der Waerden [SW] the groups PSLm (K) , PSLm0 (K 0 ) , (m, m0 ≥ 2)
can be isomorphic only when m = m0 , excluding the case of PSL2 (F7 ) ' PSL3 (F2 ). Furthermore,
if m = m0 > 2, the isomorphism is possible only when the fields K, K 0 are isomorphic. The same
22
is true when m = m0 = 2 , excluding the case {K, K 0 } = {F4 , F5 }. We conclude that the groups
√
R, X ,m ≥ 2, R ⊆ P , are pairwise non-isomorphic.
PSLm Q
Similar construction can be carried over when the prime field is finite.
9
Open problems
There are several open problems, concerning IG .
1. Conjecture: A real semi-simple Lie group G is T IG when it is of rank 1 and G is not T IG otherwise.
2. : Is an infinite compact group T IG if and only if it is connected abelian by profinite [KLS2]?
3. : Is SLn (Z), (n ≥ 3) IG [KLS2]?
4. : Is SLn (Q), (n ≥ 2) IG [KLS2]?
5. : Is SL2 (R) IG (T.Gelander)?
6. : Is every IG -linear group virtually solvable [KLS2]?
7. Is a finite index subgroup of an IG group necessarily IG (Wiegold)?
8. “I think it is worth noting that every group outside IG that I know satisfies no non-trivial law,
and it would be nice to have an example with a non-trivial law. For example, can a Tarski like
group of finite exponent be outside IG ?” [Wi77].
References
[Ad] J.F. Adams. Lectures on Lie groups. Benjamin, 1969. Also available as Midway reprint, University
of Chicago, 1982.
[Ax] Sheldon Axler, Linear Algebra Done Right, Springer, 2015.
[Be]
A.Berarducci, Zero-Groups And Maximal Tori, Logic Colloquium 2004, Lecture Notes in Logic 29,
pages 33–47, Edited By A. Andretta, K.Kearnes, and D. Zambella, Cambridge University Press
City: Year: 2008.
[BM] Mark Burger and Shahar Mozes, Groups acting on trees: from local to global structure, Publications
mathematiques de l’I.H.E.S, tome 92 (2000), p.113-150.
[Bo1] Borel A., On free subgroups of semisimple groups, Enseign. Math. (2) 29 (1983), 151–164.
23
[Bo2] Borel, Armand (1991) [1969], Linear algebraic groups, Graduate Texts in Mathematics, 126 (2nd
ed.), Berlin, New York: Springer-Verlag.
[Ch] N. Chebotarev, Die Bestimmung der Dichtigkeit einer Menge von Primzahlen, welche zu einer
gegebenen Substitutionsklasse gehören, Math. Ann. 95, 1926, 191 228.
[Co] Keith
Conrad,
Decomposing
SL2 (R),
http://www.math.uconn.edu/kconrad/blurbs/
grouptheory/SL(2,R).pdf.
[Co] Brian Conrad, Reductive groups over fields (version of august 11, 2017), Lectures by Brian Conrad,
notes by Tony Feng, http://math.stanford.edu/~conrad/249BW16Page/handouts/249B_2016.
pdf.
[Di]
J.D. Dixon, Random sets which invariably generate the symmetric group, Discrete Math. 105 (1992)
25–39.
[Du] J. J. Duistermaat, Fourier integral operators, Modern Birkhäuser Classics, Birkhäuser/Springer,
New York, 1996.
[Ge] T. Gelander, Convergence groups are not invariably generated, Int. Math. Res. Not. 2015, no. 19,
9806–9814.
[GM] T. Gelander, C. Meiri, The Congruence Subgroup Property does not imply Invariable Generation,
Int. Math. Res. Not., to appear arXiv:1505.06881.
[GGJ] Tsachik Gelander, Gili Golan, and Kate Ushchenko Invariable generation of Thompson groups,
arXiv:1611.08264v2 [math.GR], 28 Nov 2016.
[Gl]
Shmuel Glasner, Proximal flows, (Lecture notes in mathematics, 517) Springer, 1976.
[GNS] P. Gawron, V. V. Nekrashevich, and V. I. Sushchanskii, Mathematical Notes, Vol. 65, No. 6, 1999.
[GM] I. Z. Golubchik and A. V. Mikhalev, Generalized group identities in classical groups, Journal of
Soviet Mathematics, 1984, 27:4, 2904–2918.
[Ja]
Nathan Jacobson, Lie algebras, Interscience Tracts on Pure and. Applied Mathematics, no. 10.
Interscience Publishers, New York, 1962. 9+331 pp.
[Jo]
C. Jordan, Recherches sur les substitutions, J. Liouville 17 (1872), 351–367 (= Oe. I. 52).
[KLS21] William M.Kantor, Alexander Lubotzky and Aner Shalev, Invariable generation and the Chebotarev invariant of a finite group, Journal of Algebra, Volume 348, Issue 1, 15 December 2011,
Pages 302–314.
24
[KLS2] William M.Kantor, Alexander Lubotzky and Aner Shalev,
Invariable generation of infinite
groups. J. of Algebra 421(2015), 296–310.
[KM] Alexei I. Kostrikin, Yu. I. Manin, Linear Algebra and Geometry, (Algebra, Logic and Applications),
CRC Press, 1989.
[KZ] Emmanuel Kowalski and David Zywina, The Chebotarev Invariant of a Finite Group, Experimental
Mathematics, 21(1):38–56, 2012, DOI: 10.1080/10586458.2011.565261
[Lu]
A. Lucchini, The Chebotarev invariant of a finite group: A conjecture of Kowalski and Zywina,
arXiv:1509.05859v2.
[Lu]
Andrea Lucchini and Gareth Tracey, An upper bound on the Chebotarev invariant of a finite group
Israel Journal of Mathematics, April 2017, Volume 219, Issue 1, pp 449–467.
[La]
Serge Lang, Algebra, revised third edition, Springer, New York, 2002.
[Os10] Osin, Denis, Small cancellations over relatively hyperbolic groups and embedding theorems, Annals
of Mathematics, 172 (2010), 1–39.
[PS] Y. Peterzil and C. Steinhorn, Definable compactness and definable subgroups of O-minimal groups,
J. London Math. Soc 59 (1999), 769–786.
[Se]
Jean-Pierre Serre, On a Theorem Of Jordan, BULLETIN (New Series) Of The American Mathematical Society Volume 40, Number 4, Pages 429–440, (2003).
[SW] Schreier O., van der Waerden B. L., Die Automorphismen der projektiven Gruppen, Abh. Math.
Sem. Hamburg Univ., B (1928), 303–322.
[St]
R. Steinberg, Endomorphisms of Linear Algebraic Groups, Mem. Amer. Math. Soc., vol.80, Amer.
Math. Soc., Providence, RI, 1968.
[Str] A. Strzebonski, Euler characteristic in semialgebraic and other O-minimal structures, J. Pure and
Applked Algebra, 86 (1994), 173–201.
[Ti]
J. Tits, Sur le groupe d’automorphismes d’un arbre, in ”Essays on Topology and Related Topics“,
Springer Berlin Heidelberg (1970), 188211.
[Wi76] J. Wiegold, Transitive groups with fixed-point-free permutations, Arch. Math. (Basel), 27, (1976)
473–475.
[Wi77] J. Wiegold, Transitive groups with fixed-point-free permutations.II, Arch. Math. (Basel) 29 (1977)
571–573.
25
| 4math.GR
|
arXiv:1803.07177v1 [math.GR] 19 Mar 2018
Flat manifolds with homogeneous holonomy
representation
R. Lutowski
Abstract
We show that a rational holonomy representation of any flat manifold except torus must have at least two non-equivalent irreducible
subrepresentations.
1
Introduction
Let n ∈ N. Let Γ ⊂ Isom(Rn ) be a crystallographic group, i.e. a discrete and
co-compact subgroup if isometries of the n-dimensional euclidean space Rn .
By Bieberbach theorems Γ fits into the following short exact sequence
π
0 −→ M −→ Γ −→ G −→ 1
(1.1)
where G is a finite group and M is a maximal abelian normal subgroup of
Γ. Moreover, M is free abelian group of rank n and it admits a structure of
a faithful G-module, defined by the conjugations in Γ. The representation
ϕ : G → GL(M) which corresponds to this module is called the integral
holonomy representation of Γ.
If Γ is torsion-free we call it a Bieberbach group. In this case the orbit
space X = Rn /Γ is a closed Riemannian manifold with sectional curvature
equal to zero, a flat manifold for short. Moreover Γ, which is isomorphic to
the fundamental group of X, determines the manifold up to affine equivalence. It is worth to notice that the holonomy representation of X is equivalent to ϕ over the field of real numbers.
We will say that G-module M is homogeneous if QG-module Q ⊗Z M has
only one homogeneous component, i.e. all of its irreducible submodules are
isomorphic. In the case when Γ is torsion-free and M is homogeneous, we
will call X a homogeneous flat manifold.
In this paper we prove the following theorem:
Theorem. The only homogeneous flat manifolds are flat tori.
1
The theorem is a generalization of the result presented in [4] where the
authors consider the case of Q ⊗Z M being irreducible.
2
Lattices
Remark 2.1. Since we consider tensor product over integers only, we will
omit the subscript Z from now on.
Let G be a finite group. For the convenience of our further considerations
we introduce a notion of a G-lattice, i.e. a G-module which is a free Z-module
of finite rank. A G-submodule M ′ of M is called a sublattice if it is pure as Zsubmodule. As a consequence of this definition, we will call M an irreducible
lattice if its only submodule of lower rank is 0 or, equivalently, Q ⊗ M is a
simple QG-module. This approach allows us to build a descending chain
M = Mk ⊃ Mk−1 ⊃ . . . ⊃ M0 = 0
of G-modules such that Mi−1 is a maximal sublattice of Mi and hence
Mi /Mi−1 is an irreducible G-lattice, for i = 1, . . . , k. Hence we can speak
about composition series and composition factors for lattices (see [2, §73] for
more detailed description).
3
Reduction
As in the previous section, let G be a finite group. For any G-lattice M
denote by Irr(G, M) the set of irreducible characters arising from constituents
of C ⊗ M. Note that if M is a homogeneous G-lattice and S is a composition
factor of M then Irr(G, M) = Irr(G, S). We immediately get the following
generalization of [4, Lemma 2.1]:
Lemma 3.1. Let M be a homogeneous G-lattice. Let p be a prime and Zp
– the ring of p-adic integers. Suppose that Zp ⊗ M contains an indecomposable direct summand in the principal Zp G-block. Then every irreducible
constituent of C ⊗ M is in the principal p-block of G.
Let Γ be a crystallographic group which fits into the sequence (1.1) and
let α ∈ H 2 (G, M) be the cohomology class corresponding to this extension.
Then Γ is torsion-free if and only if α is special, i.e. the restriction of α to
every subgroup of G of prime order is non-zero (see [1, Theorem III.2.1] for
example).
Note that in the [4, Lemma 2.2] the irreducibility of a lattice was only
needed to use [4, Lemma 2.1]. Hence we can generalize it to the homogeneous
case:
2
Lemma 3.2. Let M be a homogeneous G-lattice such that H 2 (G, M) contains
a special element. Let S denote a simple component in the socle Soc(G) (the
product of minimal normal subgroups) of G. Then we have:
(a) If ϑ ∈ Irr(G, M), then ϑ is in the principal p-block for every prime p
dividing |G|.
(b) If ψ ∈ Irr(S, M), then ψ is in the principal p-block for every prime p
dividing |G|.
(c) Let p be a prime dividing |S| such that a Sylow p-subgroup of S is
cyclic. Then there is Θ ∈ Irr(S, M) which has the following position on
the oriented Brauer tree:
(3.1)
1S
Θ
Denote by S(G) the set of those complex irreducible characters χ of G
such that for every prime p dividing |G|:
(1) χ is in the principal p-block;
(2) If Sylow p-subgroup of G is cyclic, then χ has the position given by the
position of Θ on the Brauer tree (3.1) of the principal p-block.
The base finding of [4], giving its main result, may be stated as follows:
Proposition 3.3 ([4, Section 3]). Let S be a non-abelian finite simple group.
Then S(S) = ∅.
Since for every finite group its socle is a product of simple groups, we
immediately get the following corollary.
Corollary 3.4. Let M be a homogeneous G-lattice such that H 2 (G, M) contains a special element. Then Soc(G) is a product of elementary abelian
groups.
3
4
Proof of the Theorem
In the case of non p-groups of the proof we follow [4, Section 4].
Let n ∈ N, Γ ⊂ Isom(Rn ) be a Bieberbach group which fits into the short
exact sequence (1.1) and X = Rn /Γ be a homogeneous flat manifold, i.e. M
is a homogeneous G-lattice. Denote by χ its character.
Assume that G is a non-trivial group. Then Soc(G) is non-trivial. Now
take any prime p dividing | Soc(G)| and a Sylow p-subgroup N of Soc(G).
By Corollary 3.4 N is characteristic in the socle, hence it is normal in G.
If q 6= p is another prime dividing the order of G then, by Lemma 3.2,
every ϑ ∈ Irr(G, M) is in the principal q-block and so, by [3, Lemma IV.4.12],
has N ⊂ Oq′ (G) in its kernel. But if k is the composition length of M then
X
χ = k
ϑ
ϑ∈Irr(G,M )
has N in its kernel and M is not a faithful G-module.
On the other hand, if G is a p-group and C is a cyclic and normal subgroup
of G then, by the Clifford’s theorem (see [2, Theorem 49.2]), the restriction
χ′ of χ to C equals
χ′ = ϕ1 + ϕ2 + . . . + ϕl
where ϕ1 , . . . , ϕl are characters arising from irreducible components of the
QC-module Q ⊗ M. Moreover, they are pairwise conjugated, i.e.
∀1≤i,j≤l ∃g∈G ∀c∈C ϕi (c) = ϕj (gcg −1).
(4.1)
By [5, Theorem 7.1] if H 2 (C, M) 6= 0 then there exists 1 ≤ i ≤ l s.t. ϕi is
the trivial character. But then the formula (4.1) shows that ϕi is trivial for
every 1 ≤ i ≤ l. And again we get that M is not a faithful G-module.
The above considerations show that G must be the trivial group and
hence X is a flat n-dimensional torus.
Acknowledgement
The author would like to thank Gerhard Hiss and Andrzej Szczepański for
helpful discussions.
References
[1] L.S. Charlap. Bieberbach groups and flat manifolds.
Springer-Verlag, New York, 1986.
4
Universitext.
[2] C.W. Curtis and I. Reiner. Representation theory of finite groups and
associative algebras. Pure and Applied Mathematics, Vol. XI. Interscience
Publishers, a division of John Wiley & Sons, New York-London, 1962.
[3] Walter Feit. The representation theory of finite groups, volume 25 of
North-Holland Mathematical Library. North-Holland Publishing Co.,
Amsterdam-New York, 1982.
[4] Gerhard Hiss and Andrzej Szczepański. On torsion free crystallographic
groups. J. Pure Appl. Algebra, 74(1):39–56, 1991.
[5] Saunders MacLane. Homology. Classics in Mathematics. Springer-Verlag
Berlin Heidelberg, reprint of the 1975 edition, 1995.
5
| 4math.GR
|
On The Complexity of Bounded Time and
Precision Reachability for Piecewise Affine
Systems?
Hugo Bazille3 , Olivier Bournez1 , Walid Gomaa2,4 , and Amaury Pouly1
arXiv:1601.05353v3 [cs.CC] 17 Jan 2017
1
2
École Polytechnique, LIX, 91128 Palaiseau Cedex, France
Egypt Japan University of Science and Technology, CSE, Alexandria, Egypt
3
ENS Cachan/Bretagne et Université Rennes 1, France
4
Faculty of Engineering, Alexandria University, Alexandria, Egypt
Abstract. Reachability for piecewise affine systems is known to be undecidable, starting from dimension 2. In this paper we investigate the
exact complexity of several decidable variants of reachability and control questions for piecewise affine systems. We show in particular that
the region-to-region bounded time versions leads to NP-complete or coNP-complete problems, starting from dimension 2. We also prove that a
bounded precision version leads to P SP ACE-complete problems.
1
Introduction
A (discrete time) dynamical system H is given by some space X and a function f : X → X. A trajectory of the system starting from x0 is a sequence
x0 , x1 , x2 , . . . etc., with xi+1 = f (xi ) = f [i+1] (x0 ) where f [i] stands for ith iterate of f . A crucial problem in such systems is the reachability question: given a
system H and R0 , R ⊆ X, determine if there is a trajectory starting from a point
of R0 that falls in R. Reachabilty is known to be undecidable for very simple
functions f . Indeed, it is well-known that various types of dynamical systems,
such as hybrid systems, piecewise affine systems, or saturated linear systems,
can simulate Turing machines, see e.g., [12,9,14,15].
This question is at the heart of verification of systems. Indeed, a safety property corresponds to the determination if there is a trajectory starting from some
set R0 of possible initial states to the set R of bad states. The industrial and
economical impact of having efficient computer tools, that are able to guarantee that a given system does satisfy its specification, have indeed generated very
important literature. Particularly, many undecidability and complexity-theoretic
results about the hardness of verification of safety properties have been obtained
in the model checking community. However, as far as we know, the exact complexity of natural restrictions of the reachability question for systems as simple
as piecewise affine maps are not known, despite their practical interest.
Indeed, existing results mainly focus on the frontier between decidability
and undecidability. For example, it is known that reachability is undecidable
?
This work was partially supported by DGA Project CALCULS.
for piecewise constant derivative systems of dimension 3, whereas it is decidable
for dimension 2 [1]. It is known that piecewise affine maps of dimension 2 can
simulate Turing machines [13], whereas the question for dimension 1 is still open
and can be related to other natural problems [2,3,5]. Variations of such problems
over the integers have recently been investigated [6].
Some complexity facts follow immediately from these (un)computability results: for example, point-to-point bounded time reachability for piecewise affine
maps is P -complete as it corresponds to configuration to configuration reachability for Turing machines.
However, there remain many natural variants of reachability questions for
whose complexity have not yet been established.
For example, in the context of verification, proving the safety of a system can
often be reduced to a reachability question of the form point-to-region or regionto-region reachability. These variants are more general questions than point-topoint reachability. Their complexities do not follow from existing results.
In this paper we choose to restrict to the case of piecewise affine maps and
we consider the following natural variant of the problem.
BOUNDED TIME: we want to know if region R is reached in less than some
prescribed time T , with f assumed to be continuous.
FIXED PRECISION: given some precision ε = 2−n , we want to know if region
R is reached by f˜ε such that f˜ε (x) = b f (x)
ε cε. This corresponds to truncating f
at precision 2−n on each coordinate, or equivalently assuming that computations
happen at some precision not more that 2−n , for some given n. In other words,
one wants to know if R is reached by the dynamics where precision operation is
applied at each iteration.
Remark 1. We consider a version where everything is rounded downwards to a
multiple of epsilon. Variants could also be considered, with for example closest
or upper rounding. This would not change the complexity.
Remark 2. A variant could also be chain reachability: Deciding the existence of
sequence xn from initial region to target region such that at any intermediate
step i, ||xi+1 − f (xi )|| ≤ . We do not know the complexity of variants based on
this idea.
Remark 3. We consider piecewise affine maps over the domain [0, 1]d , The case
of integer domains has been studied in [6] and turns out to be quite different. We
also assume f to be continuous. This makes the hardness result more natural.
In an orthogonal way, control of systems or constructions of controllers for
systems often yield to dual questions. Instead of asking if some trajectory reaches
region R, one wants to know if all trajectories reach R. The questions of stability,
mortality, or nilpotence for piecewise affine maps and saturated linear systems
have been established in [7]. Still in this context, the complexity of the problem
when restricting to bounded time or fixed precision is not known.
This paper provides an exact characterization of the algorithmic complexity
of those two types of reachability for discrete time dynamical systems. Let P AFd
denote the set of piecewise-affine continuous functions over [0, 1]d . At the end
we get the following picture.
Remark 4. Notice that we expect in several statements time to be given in unary,
in order to get a completeness result. We do not know about the complexity of
the variants where time would be given in binary.
Problem: REACH-REGION
Inputs: a continuous P AFd f and two regions R0 and R in dom(f )
Output: ∃x0 ∈ R0 , t ∈ N, f [t] (x0 ) ∈ R?
Theorem 5 ([13]). Problem REACH-REGION is undecidable (and is recursively
enumerable-complete).
Problem: CONTROL-REGION
Inputs: a continuous P AFd f and two regions R0 and R in dom(f )
Output: ∀x0 ∈ R0 , ∃t ∈ N, f [t] (x0 ) ∈ R?
Theorem 6 ([7]). Problem CONTROL-REGION is undecidable (and is co-recursively
enumerable complete) for d > 2.
Problem: REACH-REGION-TIME
Inputs: a time T ∈ N in unary, a continuous P AFd f and two regions R0 and
R in dom(f )
Output: ∃x0 ∈ R0 , ∃t 6 T, f [t] (x0 ) ∈ R?
Theorem 7 (Theorems 31 and 36). REACH-REGION-TIME is NP-complete for
d > 2.
Problem: CONTROL-REGION-TIME
Inputs: a time T ∈ N in unary, a continuous P AFd f and two regions R0 and
R in dom(f )
Output: ∀x0 ∈ R0 , ∃t 6 T, f [t] (x0 ) ∈ R?
Theorem 8 (Theorems 37 and 38). CONTROL-REGION-TIME is coNP-complete
for d > 2.
Problem: REACH-REGION-PRECISION
Inputs: a continuous P AFd f , two regions R0 and R in dom(f ) and ε = 2−n ,
n given in unary
Output: ∃x0 ∈ R0 , t ∈ N, (f˜ε )[t] (x0 ) ∈ R?
Problem: CONTROL-REGION-PRECISION
Inputs: a continuous P AFd f , two regions R0 and R in dom(f ) and ε = 2−n ,
n given in unary
Output: ∀x0 ∈ R0 , ∃t ∈ N, (f˜ε )[t] (x0 ) ∈ R?
Theorem 9 (Theorems 40 and 40). REACH-REGION-PRECISION is P SP ACEcomplete for d > 2.
Theorem 10 (Theorems 40 and 40). CONTROL-REGION-PRECISION is P SP ACEcomplete for d > 2.
All our problems are region-to-region reachability questions, and requires
new proof techniques.
Indeed, classical tricks to simulate a Turing machine using a piecewise affine
maps encode a Turing machine configuration by a point, and assume that all
the points of the trajectories encode (possibly ultimately) valid Turing machines
configurations.
This is not a problem in the context of point-to-point reachability, but this
can not be extended to region-to-region reachability. Indeed, a (non-trivial) region consists mostly in invalid points: almost all points do not correspond to
encoding of Turing machines for all the encodings considered in [13,7].
In order to establish hardness results, the trajectories of all (valid and invalid)
points must be carefully controlled. This turns out not to be easily possible using
the classical encodings.
Let us insist on the fact that we restrict our results to continuous dynamics.
In this context, this is an additional source of difficulties: Dealing with points
and trajectories not corresponding to valid configurations or evolutions.
A short version of this paper has been presented at the conference “Reachability Problems 2014” [4]. The current journal version contains full proofs for all
statements, and is also providing new results: bounded precision variants (problems REACH-REGION-PRECISION and CONTROL-REGION-PRECISION) were not considered in short version [4].
2
2.1
Preliminaries
Notations
The set of non-negative integers is denoted N and the set of the first n naturals
is denoted Nn = {0, 1, . . . , n − 1}. For any finite set Σ, let Σ ∗ denote the set of
finite words over Σ. For any word w ∈ Σ ∗ , let |w| denote the length of w. Finally,
let λ denote the empty word. If w is a word, let w1 denote its first character,
w2 the second one and so on. For any i, j ∈ N, let wi...j denote the subword
wi wi+1 . . . wj . For any σ ∈ Σ, and k ∈ N, let σ k denote the word of length k
where all symbols are σ. For any function f , let f E denote the restriction of
f to E and let dom(f ) denote the domain of definition of f .
2.2
Piecewise affine functions
Let I denote the unit interval [0, 1]. Let d ∈ N. A convex closed polyhedron in
the space I d is the solution set of some linear system of inequalities:
Ax ≤ b
(1)
with coefficient matrix A and offset vector b. Let P AFd denote the set of
piecewise-affine continuous functions over I d : That is to say, any f : I d → I d
in P AFd , f satisfies:
• f is continuous,
• there exists a sequence (Pi )1≤i≤p of convex closed polyhedra with nonempty
Sp
interior such that fi = f Pi is affine, I d = i=1 Pi and P̊i ∩ P˚j = ∅ for
i 6= j, where P̊ denotes the interior of P .
In the following discussion we will always assume that any polyhedron P can
be defined by a finite set of linear inequalities, where all the elements of A and
b in (1) are all rationals. A polyhedron over which f is affine will also be called
a region.
2.3
Decision problems
In this paper, we will show hardness results by reduction from known hard
problems. We give the statement of these latter problems in the following.
Problem: SUBSET-SUM
Inputs: a goal B ∈ N andP
integers A1 , . . . , An ∈ N.
Output: ∃I ⊆ {1, . . . , n}, i∈I Ai = B?
Theorem 11 ([8]). SUBSET-SUM is NP-complete.
Problem: NOSUBSET-SUM
Inputs: a witness B ∈ N and
P integers A1 , . . . , An ∈ N.
Output: ∀I ⊆ {1, . . . , n}, i∈I Ai 6= B?
Theorem 12. NOSUBSET-SUM is coNP-complete.
Proof. Basically the same proof as Theorem 11 [8].
t
u
Problem: LINSPACE-WORD
Inputs: A Linear Bounded Automaton (i.e. a one-tape TM that does not use
any space besides the input) M and a word w ∈ Σ ∗ .
Output: does M accept w?
Theorem 13 (see e.g. [10]). LINSPACE-WORD is PSPACE-complete.
3
Hardness of Bounded Time Reachability
In this section, we will show that REACH-REGION-TIME is an NP-hard problem
by reducing SUBSET-SUM to it.
3.1
Solving SUBSET-SUM by iteration
We will now show how to solve the SUBSET-SUM problem by iterating a function. Consider an instance I = (B, A1 , . . . , An ) of SUBSET-SUM. We will need to
introduce some notions before defining our piecewise affine function. Our first
notion is that of configurations, representing partial summation of the number
for a given choice of I.
Remark 14. Without loss of generality, we will only consider instances where
Ai 6 B, for all i. Indeed, if Ai > B, it will never be an element of a solution to
the instance and so we can simply remove this variable from the problem. This
ensures that Ai < B + 1 in everything that follows.
Definition 15 (Configuration). A configuration of I is a tuple (i, σ, εi , . . . , εn )
where i ∈ {1, . . . , n + 1}, σ ∈ {0, . . . , B + 1}, εj ∈ {0, 1} for all i ≤ j. Let CI be
the set of all configurations of I.
The intuitive understanding of a configuration, made formal in the next definition, is the following: (i, σ, εi , . . . , εn ) represents a situation where after having
summed a subset of {A1 , . . . , Ai−1 }, we got a sum σ and εj is 1 if and only if we
are to pick Aj in the future.
Definition 16 (Transition function). The transition function TI : CI → CI ,
is defined as follows:
(
(i, σ)
if i = n + 1
TI (i, σ, εi , . . . , εn ) =
(i + 1, min (B + 1, σ + εi Ai ) , εi+1 , . . . , εn ) otherwise
It should be clear, by definition of a subset sum that we have the following
simulation result.
Lemma 17. For any configuration c = (i, σ, εi , . . . , εn ) and k ∈ {0, . . . , n + 1 −
i},
[k]
i+k−1
εj Aj , εi+k , . . . , εn )
TI (c) = (i + k, min B + 1, σ + Σj=i
t
u
Proof. By induction.
A consequence of this simulation is that we can reformulate satisfiability in
terms of reachability.
Lemma 18. I is a satisfiable instance ( i.e., admits a subset sum equal to the
target value) if and only if there exists a configuration c = (1, 0, ε1 , . . . , εn ) ∈ CI
[n]
such that TI (c) = (n + 1, B).
Proof. TheP
“only if” direction is the simplest: assume there exists I ⊆ {1, . . . , n}
such
that
i∈I Ai = B. Define εi = 1 if i ∈ I and 0 otherwise. We get that
Pn
ε
A
=
B. Apply Lemma 17 to get that:
i
i
i=1
!
n
X
[n]
TI (1, 0, ε1 , . . . , εn ) = (n + 1, min B + 1, 0 +
ε i Ai )
i=1
= (n + 1, min(B + 1, B)) = (n + 1, B)
The “if” direction is very similar: assume that there exists c = (1, 0, ε1 , . . . , εn )
[n]
such that TI (c) = (n + 1, B). Lemma 17 gives:
[n]
TI (1, 0, ε1 , . . . , εn )
= (n + 1, min B + 1, 0 +
n
X
!
εi Ai )
i=1
Pn
We can easily
Pconclude that i=1 εi Ai = B and thus by defining I = {i | εi =
1} we get that i∈I Ai = B. Hence, I is satisfiable.
t
u
3.2
Solving SUBSET-SUM with a piecewise affine function
In this section, we explain how to simulate the function TI using a piecewise affine function and some encoding of the configurations for a given I =
(B, A1 , . . . , An ). Since the reduction is quite technical, we start with some intuitions. In order to simulate the function TI , we first need to encode configurations
with real numbers. Let c = (i, σ, εi , . . . , εn ) be a configuration, we encode it using two real numbers in [0, 1]: the first one encodes i and σ and the second one
encodes εi , . . . , εn . A simple approach is to encode them as digits of dyadics
numbers, as depicted below:
hci =
i
.
0. 0 . . εi
0.
σ
. . . εn
!
i2−p + σ2−q
.
εi 2−1 + εi+1 2−2 + · · ·
=
In the above encoding, we allocate p bits to i and q − p bits to σ. We simply
need to choose them large enough to accomodate the largest possible value. The
rationale behind this encoding is that it is easy to implement the transition
function fI with a linear function. Note that for technical reasons explained
later, we need to encode the second coordinate in basis β = 5 instead of 2. We
now encode 0 as 0? = 1 and 1 as 1? = 4. Graphically, the action of f is very
simple:
?
if εi = 0 then fI
?
if εi = 1 then fI
0.
i
0. 0 . . . εi
σ
εi+1 . . . ε
n
!
i
.
0. 0 . . εi
σ
εi+1 . . . ε
n
!
0.
=
0.
i+1
0. 0 . . . 0
σ
εi+1 . . . ε
n
!
i+1
0. 0 . . . 0
σ + Ai
εi+1 . . . ε
n
!
0.
=
,
.
For technical reasons, we will in fact split the case εi = 1? into two, depending
on whether σ + Ai becomes greater then B + 1 or not. This is similar to what
we did in Definition 16 with min(B + 1, σ + Ai ):
if σ + Ai > B then fI
σ
i
?
0. 0 . . . 1 εi+1 . . . εn
0.
!
=
i+1
0. 0 . . . 0
0.
B+1
εi+1 . . . ε
n
!
.
We can formulate the “if εi = α” by using regions. Indeed, the set of encodings such that εi = α is
(
i
.
0. 0 . . α
0.
σ
εi+1 . . . ε
n
!
)
: σ ∈ N, εj ∈ {0, 1}
−p −p
i2 , i2 + 2−p−1
.
× αβ −i , (α + 1)β −i
⊂
It is crucial to note that the statement of the problems only allows for polyhedral
regions. This is why in the above equation, we had to overapproximate the
region by intervals on each coordinate. This overapproximation is the root of all
difficulties. Indeed, the region now contains many points that do not correspond
to encodings anymore. We now go to the details of the construction.
Definition 19 (Encoding). Define p = dlog2 (n + 2)e, ω = dlog2 (B + 2)e,
q = p + ω + 1 and β = 5. Also define 0? = 1 and 1? = 4. For any configuration
c = (i, σ, εi , . . . , εn ), define the encoding of c as follows:
hci = i2−p + σ2−q , 0? β −n−1 +
n
X
ε?j β −j
j=i
Also define the following regions for any i ∈ {1, . . . , n+1} and α ∈ {0, . . . , β −1}:
R0 = [0, 2−p−1 ] × [0, 1]
Ri = [i2−p , i2−p + 2−p−1 ] × [0, β −i+1 ]
Ri,α = i2−p , i2−p + 2−p−1 × αβ −i , (α + 1)β −i
−p −p
lin
Ri,1
, i2 + (B + 1 − Ai )2−q × 1? β −i , 5β −i
? = i2
(i > 1)
Ri = ∪α∈Nβ Ri,α
sat
lin
Ri,1
? = Ri,1? \ Ri,1?
As noted before, we use basis β = 5 on the second component to get some
“space” between consecutive encodings. The choice of the value 1 and 4 for the
encoding of 0 and 1, although not crucial, has been made to simplify the proof
as much as possible.
The region R0 is for initialization purposes and is defined differently from the
other Ri . The regions Ri correspond to the different values of i in the configuration (the current number). Each Ri is further divided into the Ri,α corresponding
to all the possible values of the next ε variable (recall that it is encoded in basis
β). In the special case of ε = 1, we cut the region Ri,1? into a linear part and a
saturated part. This is needed to emulate the min(σ +Ai , B +1) in Definition 16:
the linear part corresponds to σ + Ai and the saturated part to B + 1. Figure 1
and Figure 2 give a graphical representation of the regions.
Lemma 20. For any configuration c = (i, σ, εi , . . . , εn ), if i = n + 1 then hci ∈
Rn+1,0? , otherwise hci ∈ Ri,ε?i . Furthermore if εi = 1 and σ + Ai 6 B + 1, then
lin
sat
hci ∈ Ri,1
? , otherwise hci ∈ Ri,1? .
1
R0
R1
R2
0
0
1
Rn+1
B=2
n=2
p=2
ω=2
β=5
Fig. 1. Graphical representation of the regions
Proof. Recall that ω = dlog2 (B + 2)e so B + 1 < 2ω , and q = p + ω + 1. Since
σ 6 B + 1 by definition, (n + 1)2−p 6 hci1 6 (n + 1)2−p + (B + 1)2−p−1−ω 6
(n + 1)2−p + 2−p−1 . This shows the result for the first component. In the case
where σ + Ai 6 B + 1 then σ2−q 6 (B + 1 − Ai )2−q yielding the result for the
second part of the result for the first component.
If i = n + 1, then hci2 = 0? β −p−1 and it trivially belongs to [0? β −n−1 , (0? +
1)β −n−1 ]. Otherwise,
ε?i β −i 6 hci2 6 ε?i β −i +
n+1
X
1? β −j 6 ε?i β −i + 1? β −i−1
j=i+1
6 ε?i β −i + 4β −i−1
1 − β n−i
1 − β −1
β
6 ε?i β −i + β −i 6 (ε?i + 1)β −i .
β−1
This shows the result when i < n+1, for the second component of the result.
t
u
We can now define a piecewise affine function that will mimic the behavior
of T I . The region R0 is here to ensure that we start from a “clean” value on the
first coordinate.
Definition 21 (Piecewise affine simulation).
(2−p , b)
(a, b)
fI (a, b) = (a + 2−p , b − 0? β −i )
(a + 2−p + Ai 2−q , b − 1? β −i )
((i + 1)2−p + (B + 1)2−q , b − 1? β −i )
if
if
if
if
if
(a, b) ∈ R0
(a, b) ∈ Rn+1
(a, b) ∈ Ri,0?
lin
(a, b) ∈ Ri,1
?
sat
(a, b) ∈ Ri,1
?
Lemma 22 (Simulation is correct). For any configuration c ∈ CI , hTI (c)i =
fI (hci).
Proof. Let c = (i, σ, εi , . . . , εn ). There are several cases to consider: if i = n + 1
then TI (c) = c, also by Lemma 20, hci ∈ Rn+1,0? . Thus by definition of f ,
fI (hci) = hci = hT (c)i and this shows the result. If i < n + 1, we have three
more cases to consider: the case where we don’t take the value (εi = 0) and the
two cases where we take it (εi = 1) with and without saturation.
– If εi = 0 then TI (c) = (i + 1, P
σ, εi+1 , . . . , εn ). On the other hand, hci =
n
(a, b) = (i2−p + σ2−q , 0? β −i + j=i+1 εj β −j + 0? β −n−1 ). By Lemma 20,
hci ∈ Ri,0? so by definition of f :
fI (hci) = (a + 2−p , b − 0? β −i )
= ((i + 1)2−p + σ2−q ,
n
X
εj β −j + 0? β −n−1 )
j=i+1
= h(i + 1, σ, εi+1 , . . . , εn )i = hTI (c)i
– If εi = 1 and σ + Ai 6 B + 1 then TI (c) = (i + 1, σP
+ Ai , εi+1 , . . . , εn ). On the
n
other hand, hci = (a, b) = (i2−p + σ2−q , 1? β −i + j=i+1 εj β −j + 0? β −n−1 ).
lin
By Lemma 20, hci ∈ Ri,1? so by definition of f :
fI (hci) = (a + 2−p + Ai 2−q , b − 1? β −i )
n
X
= ((i + 1)2−p + (σ + Ai )2−q ,
εj β −j + 0? β −n−1 )
j=i+1
= h(i + 1, σ + Ai , εi+1 , . . . , εn )i = hTI (c)i
– If εi = 1 and σ + Ai > B + 1 then TI (c) = (i + 1, B + 1, εi+1 , . . . , εn ). By
sat
Lemma 20, hci ∈ Ri,1
? so by definition of f :
fI (hci) = ((i + 1)2−p + (B + 1)2−q , b − 1? β −i )
= h(i + 1, B + 1, εi+1 , . . . , εn )i = hTI (c)i
t
u
3.3
Making the simulation stable
In the previous section, that we have defined fI over a subset of the entire space
and it is clear that this subspace is not stable in any way5 . In order to match
the definition of a piecewise affine function, we need to define f over the entire
space or a stable subspace (containing the initial region). We follow this second
approach and extend the definition of f on some more regions. More precisely,
we need to define f over Ri = Ri,0 ∪ Ri,1 ∪ Ri,2 ∪ Ri,3 ∪ Ri,41 and at the moment
we have only defined f over Ri,1 = Ri,0? and Ri,4 = Ri,1? . Also note that
5
For example R1,1 ⊆ f (R0 ) but f is not defined over R1,1 .
lin
sat
Ri,4 = Ri,4
∪ Ri,4
and we define f separately on those two subregions. In order
to correctly and continuously extend f , we will need to further split the region
lin
sat
Ri,3 into linear and saturated parts Ri,3
and Ri,3
: see Figure 2.
Before jumping into the technical details of the extension, we start with the
intuition. First, it is crucial to understand that our main constraint is continutity:
since we already defined f over Ri,1 and Ri,4 , our extension need to agree with
f on the borders of those regions. Furthermore, f still needs to be affine, leaving
us with little flexibility. Second, the behaviour of f on those regions needs to
be carefully chosen. Indeed, as we mentioned before, we had to overapproximate
regions in several places and our simulation now includes extra points. We do not
want these extra points to have completely unpredictable trajectories, otherwise
they might reach the final region by chance and break the reduction. Therefore,
our strategy is to define f in such a way that its behaviour on those “wrong
points” still has a valid interpretation in the original SUBSET-SUM problem.
We detail this idea for the various region right after.
Let (a, b) ∈ Ri,0 ∪ Ri,2 ∪ Ri,3 : intuitively, this point corresponds to a configuration c = (i, σ, εi , . . . , ε) where εi ∈
/ {0? , 1? }. We know by construction that
this point does not correspond to a proper trajectory so it is tempting to simply
discard it. A very simple way of discarding point is to send them to a point x
that is (i) stable by f (f (x) = x) and (ii) not in the accepting region. That way
we trap the trajectory of invalid points into a useless region of the space. Let us
illustrate this on Ri,0 : let (a, b) ∈ Ri,0 and take fI (a, b) = (a, b). It is now trivial
that the point is stuck in Ri,0 . Unfortunately, fI is not continuous anymore.
Indeed, for (a, b) = (a, β −i ) ∈ Ri,0 ∩ Ri,1 we have a discontinuity on the first
coordinate. Indeed, f1 (a, b) = a on one side but f1 (a, b) = a + 2−p on the other.
A simple fix is to take f (a, b) = (a + 2−p , 0), this corresponds to:
!
!
σ
σ
i
0. i + 1
0.
=
.
if εi = 0 then fI
0. 0 . . . εi εi+1 . . . εn
0. 0 . . . 0 0 . . . 0
One can check that f is also continuous on the second coordinate. The reason
why this choice is clever is because f (Ri,0 ) ⊆ Ri+1,0 . Although the invalid points
are not stable, they are now stuck in the bottom regions Rj,0 for the rest of the
simulation.
Unfortunately, this trick now does not work on Ri,2 because of the continuity requirement on the second coordinate. Indeed, on Ri,1 ∩ Ri,2 we have that
f (a, b) = (a + 2−p , β −i ). To understand what it means, imagine a configuration
where εi = 2 and all the remaining εj are 0, then its image by f corresponds
to a configuration
were all the remaining εj are 4 = 1? plus an error. Indeed,
P∞
−n
−i
β = n=i+1 4β . In other words, we have:
!
!
σ
σ
i
0.
0. i + 1
if εi = 2 then fI
=
.
0. 0 . . . εi 0 . . . 0
0. 0 . . . 0 4 . . . 4 4 . . .
Furthermore, thinking about the future a bit, on Ri,3 ∩Ri,4 we have that f (a, b) =
(a + 2−p , 0). In other words, somewhere on Ri,2 ∪ Ri,3 , the second coordinate
has to go from β −i to 0 in a continuous fashion. This is where the clever tricks
comes in: we can continuously change the second coordinate from 1 to 0 such
that the action of f looks like all εj were “flipped”: 0 is exchange with 4 and 1
with 2. To visualise how this possible, simply think about the configuration as
having an infinite number of εj (although we use a finite amount of them) that
gets turned into an infinite number of µj where µj = 4 − εj :
!
!
σ
σ
0. i + 1
0. i + 1
=
.
fI
0. 0 . . . 2 εi+1 . . . εn εn+1. . .
0. 0 . . . 0 µi+1 . . . µn µn+1. . .
This might seem convoluted at first until one realises why this is helpful. Imagine
an extended SUBSET-SUM simulation where we now have three actions instead
of two:
– εi = 0: go to next number,
– εi = 1: add Ai and go to next number,
– εi = 2: flip all remaining εj and go to next number.
Our simulation corresponds to this extended problem, which is still NP-complete.
The remaining region Ri,3 follows the same principle as Ri,0 , with a slight complication because of the saturated sum. Figure 3 gives the interpretation of the
definition of f on each subregion.
Definition 23 (Extended region splitting). For i ∈ {1, . . . , n} and α ∈
{0, . . . , β − 1}, define:
2−p−1 + i2−p − a
lin
sat
lin
Ri,3
= Ri,3 ∩ (a, b) bβ i − 3 6 −p−1
Ri,3
= Ri,3 \Ri,3
2
− (B + 1 − Ai )2−q
sat
lin
sat
It should be clear by definition that Ri,3
= Ri,3
∪ Ri,3
and that the two
subregions are disjoint except on the border.
Definition 24 (Extended piecewise affine simulation).
(a + 2−p , 0)
(a + 2−p , 3β −i − b)
fI (a, b) =
(a + 2−p + Ai 2−q (bβ i − 3), 0)
((i + 23 )2−p − (bβ i − 3)(2−p−1 − (B + 1)2−q ), 0)
if
if
if
if
(a, b) ∈ Ri,0
(a, b) ∈ Ri,2
lin
(a, b) ∈ Ri,3
sat
(a, b) ∈ Ri,3
This extension was carefully chosen for its properties. In particular, we will
see that f is still continuous, Also, the domain of definition of f is f -stable (i.e.
f (dom f ) ⊆ dom f ). And finally, we will see that f is somehow “reversible”.
Lemma 25 (Simulation is continuous). For any i ∈ {1, . . . , n}, fI (Ri ) is
well-defined and continuous over Ri .
Proof. As outlined on Figure 2, we need to check that the definitions of f match
at the borders of each subregions of Ri . More precisely, we need to check that
Definition 21 and Definition 24 agree on all borders.
β −i+1
lin
−p
Ri,1
+ Ai 2−q , b − 1? β −i )
? : (a + 2
sat
Ri,1
? :
((i + 1)2−p + (B + 1)2−q ,
b − 1? β −i )
4β −i
sat
Ri,3
: (?)
lin
Ri,3
: (a + 2−p + Ai 2−q (bβ i − 3), 0)
3β −i
Ri,2 : (a + 2−p , 3β −i − b)
2β −i
Ri,0? : (a + 2−p , b − 0? β −i )
β −i
Ri,0 : (a + 2−p , 0)
0
i2−p
i2−p + (B + 1 − Ai )2−q
i2−p + 2−p−1
(?) : ((i + 1)2−p + 2−p−1 − (bβ i − 3)(2−p−1 − (B + 1)2−q ), 0)
Fig. 2. Zoom on one Ri with the subregions and formulas.
β −i+1
lin
Ri,1
? : add Ai
sat
Ri,1
? : set sum to B + 1
4β −i
lin
Ri,3
:
sat
Ri,3
: (?)
set all remaining εj to 0
add a funny amount†
3β −i
Ri,2 : flip all remaining εj
2β
−i
Ri,0? : go to next number
β −i
Ri,0 : set all remaining εj to 0
0
i2−p
i2−p + (B + 1 − Ai )2−q
(?) :
set all remaining εj to 0
add a funny amount†
i2−p + 2−p−1
†
The amount depends on (a, b) and
has no simple interpretation.
Fig. 3. Interpretation of the behaviour of f on each suregion. See also Figure 2 and
Section 3.2. All regions include an implicit “go to next number”.
– (a, b) ∈ Ri,0 ∩ Ri,0? : the first component is computed using the same formula
so is clearly continuous, the second component is always 0 on both side of
the border because b − 0? β −i = 0 for b = β −i
– (a, b) ∈ Ri,0? ∩ Ri,2 : the first component is computed using the same formula
so is clearly continuous, the second component is always β −i on both side of
the border because b − 0? β −i = 3β −i − b = β −i for b = 2β −i
lin
– (a, b) ∈ Ri,2 ∩ Ri,3
: the first component is a + 2−p and the second component
is 0 on both side of the border because 3β −i − b = bβ i − 3 = 0 for b = 3β −i
−p
lin
lin
+ Ai 2−q and the second
– (a, b) ∈ Ri,3
∩ Ri,1
? : the first component is a + 2
component is 0 on both side of the border because bβ i −3 = 1 and b−1? β −i =
0 for b = 4β −i
lin
sat
– (a, b) ∈ Ri,3
∩ Ri,3
: the second component is always 0 on both regions so is
Y
holds on
clearly continuous. From Definition 23 one can see that bβ i −3 = X
−p−1
−p
−p−1
the border where Y = 2
+ i2 − a and X = 2
− (B + 1 − Ai )2−q .
Consequently, if we compute the difference between the two expression at
the borders, we get:
(i + 1)2−p + 2−p−1 − (bβ i − 3)(2−p−1 − (B + 1)2−q )
− a + 2−p + Ai 2−q (bβ i − 3)
Y
= i2−p + 2−p−1 − a − (2−p−1 − (B + 1)2−q + Ai 2−q )
X
Y
=Y − X=0
X
this proves that they are equal.
sat
sat
−p
– (a, b) ∈ Ri,3
∩ Ri,1
+ (B + 1)2−q and the
? : the first component is (i + 1)2
second component is 0 on both side of the border because bβ i − 3 = 1 and
b − 1? β −i = 0 for β = 4β −i
lin
sat
−p
– (a, b) ∈ Ri,1
+ (B + 1)2−q on
? ∩ Ri,1? : the first component is (i + 1)2
−p
−q
both side of the border because a = i2 + (B + 1 − Ai )2 , and the second
component is computed using the same formula so is clearly continuous
t
u
Lemma 26 (Simulation is stable). For any i ∈ {1, . . . , n}, fI (Ri ) ⊆ Ri+1 .
Furthermore, f (R0 ) ⊆ R1 and f (Rn+1 ) ⊆ Rn+1 .
Proof. We need to examinate all possible cases for (a, b) ∈ Ri . Since Ri =
S4
lin
sat
α=0 Ri,α and that Ri,α = Ri,α ∪ Ri,α we indeed cover all cases.
– If (a, b) ∈ R0 : then fI (a, b) = (a+2−p , b) so fI (R0 ) = fI ([0, 2−p−1 ]×[0, 1]) =
[2−p , 2−p + 2−p−1 ] × [0, 1] = R1 .
– If (a, b) ∈ Rn+1 : then fI (a, b) = (a, b) so fI (Rn+1 ) = Rn+1 .
– If (a, b) ∈ Ri,0 : then fI (a, b) = (a + 2−p , 0) so fI (Ri,0 ) = fI ([i2−p , i2−p +
2−p−1 ] × [0, β −i ]) = [(i + 1)2−p , (i + 1)2−p + 2−p−1 ] × {0} ⊆ Ri+1 .
– If (a, b) ∈ Ri,1 = Ri,0? : then fI (a, b) = (a + 2−p , b − 0? β −i ) so fI (Ri,1 ) =
fI ([i2−p , i2−p + 2−p−1 ] × [β −i , 2β −i ]) = [(i + 1)2−p , (i + 1)2−p + 2−p−1 ] ×
[0, β −i ] = Ri+1 .
– If (a, b) ∈ Ri,2 : then fI (a, b) = (a+2−p , 3β −i −b) so fI (Ri,2 ) = fI ([i2−p , i2−p +
2−p−1 ] × [2β −i , 3β −i ]) = [(i + 1)2−p , (i + 1)2−p + 2−p−1 ] × [0, β −i ] = Ri+1 .
lin
: the image of the second component is always 0 so it’s
– If (a, b) ∈ Ri,3
easy for this one, also from Definition 23, bβ i − 3 6
2−p−1 +i2−p −a
Ai 2−q
−p−1
−p−1
−q
2−p−1 +i2−p −a
2−p−1 −(B+1−Ai )2−q
−q
ω −q
6
2−p−1 +i2−p −a
2−p−1 −(B+1−Ai )2−q
>
because 2
− (B + 1)2 > 0 since (B + 1)2 6 2 2 6
2
. Consequently, for the first coordinate we get that fI (a, b)1 6 a +
−p−1
−p
−a
2−p + Ai 2−q 2 A+i2
6 (i + 1)2−p + 2−p−1 . Also, since i2−p 6 a 6
−q
i2
−p
−p−1
lin
i2 + 2
, it is clear that fI (a, b)1 > (i + 1)2−p . So finally, fI (Ri,3
)⊆
[(i + 1)2−p , (i + 1)2−p + 2−p−1 ] × {0} ⊂ Ri+1 .
sat
– If (a, b) ∈ Ri,3
: the image of the second component is always 0 so it’s
easy for this one, also from Definition 23, bβ i − 3 >
2−p−1 +i2−p −a
2−p−1 −(B+1)2−q
because Ai > 0. Consequently, for the first coordinate we get
−p−1
−p
2
+i2 −a
that fI (a, b)1 6 (i + 1)2−p + 2−p−1 − (2−p−1 − (B + 1)2−q ) 2−p−1
−(B+1)2−q 6
−p
−p−1
−p
−p−1
−p
−p−1
(i + 1)2 + 2
+ i2 + 2
− a 6 (i + 1)2 + 2
since a 6
i2−p + 2−p−1 . Also since bβ i − 3 6 1 we get that fI (a, b)1 > (i + 1)2−p +
2−p−1 − (2−p−1 − (B + 1)2−q ) × 1 > (i + 1)2−p + (B + 1)2−q . So finally,
sat
fI (Ri,3
) ⊆ [(i + 1)2−p + (B + 1)2−q , (i + 1)2−p + 2−p−1 ] × {0} ⊂ Ri+1 .
lin
lin
−p
– If (a, b) ∈ Ri,4
= Ri,1
+ Ai 2−q , b − 1? β −i ) so
? : then fI (a, b) = (a + 2
lin
−p
−p
−q
−i
fI (Ri,4 ) = fI ([i2 , i2 + (B + 1 − Ai )2 ] × [4β , 5β −i ]) = [(i + 1)2−p +
Ai 2−q , (i+1)2−p +(B +1)2−q ]×[0, β −i ] ⊆ Ri+1 because (B +1)2−q 6 2−p−1 .
sat
sat
– If (a, b) ∈ Ri,4
: then fI (a, b) = ((i + 1)2−p + (B + 1)2−q , 0) so fI (Ri,4
)=
−p
−q
{(i + 1)2 + (B + 1)2 } × {0} ⊆ Ri+1 .
t
u
We now get to the core lemma of the simulation. Up to this point, we were
only interested in forward simulation: that is given a point, what are the iterates
of x. In order to prove the NP-hardness result, we need a backward result:
given a point, what are the possible preimages of it. To this end, we introduce
new subregions Riunsat of the Ri , that we call unsaturated. Intuitively, Riunsat
corresponds to the encodings where σ 6 B, that is the sum did not saturate at
B + 1. We also introduce the Rf in region, that will be the region to reach. We
will be interested in the preimages of Rf in .
Definition 27 (Unsaturated regions). For i ∈ {1, . . . , n + 1}, define
Riunsat = [i2−p , i2−p + B2−q ] × [β −n−1 , β −i+1 − β −n−1 ]
Rf in = [(n + 1)2−p + B2−q − 2−q−1 , (n + 1)2−p + B2−q ] × [β −n−1 , 2β −n−1 ]
Lemma 28 (Simulation is reversible). Let i ∈ {2, . . . , n} and (a, b) ∈ Riunsat
Then the only points x such that fI (x) = (a, b) are:
unsat
– x = (a − 2−p , b + 0? β −i+1 ) ∈ Ri−1,0? ∩ Ri−1
−p
i
? −i+1
unsat
– x = (a − 2 , β − b + 0 β
) ∈ Ri−1,2 ∩ Ri−1
lin
unsat
– x = (a − 2−p − Ai 2−q , b + 1? β −i+1 ) ∈ Ri−1,1
(only if a > 2−p +
? ∩ Ri−1
−q
Ai 2 )
Proof. First notice that since fI (Ri ) ⊆ Ri+1 for all i ∈ {0, . . . , n}, the only
candidates for x must belong to Ri−1 . Furthermore, on each affine region, there
can only be one candidate except if the function is trivial.
A close look at the proof of Lemma 26 reveals that:
– fI (Ri−1,0 ) ⊆ [(i + 1)2−p , (i + 1)2−p + 2−p−1 ] × {0} shareing no point with
Riunsat so there is no possible candidate
– fI (Ri−1,1 ) = Ri and there is only one possible candidate
– fI (Ri−1,2 ) = Ri and there is only one possible candidate
– fI (Ri−1,3 ) ⊆ [(i + 1)2−p , (i + 1)2−p + 2−p−1 ] × {0} so like Ri−1,0 there is no
possible candidate
lin
– fI (Ri−1,4
) ⊆ Ri and there is only one possible candidate
sat
– fI (Ri−1,4 ) ⊆ [(i + 1)2−p + (B + 1)2−q , (i + 1)2−p + 2−p−1 ] × [0, β −i ] sharing
no point with Riunsat so there is no possible candidate
It is then only a matter of checking that the claimed formulas work and they
lin
trivially do except for the case of Ri−1,4
where we need the potential candidate
to belong to the region.
t
u
The goal of those results is to show that if there is a point in Rf in that is
reachable from R0 then we can extract, from its trajectory, a configuration that
also reaches Rf in . Furthermore, we arranged so that Rf in contains the encoding
of only one configuration: (n + 1, B) (see Lemma 18).
Lemma 29 (Backward-forward identity). For any point x ∈ Rf in , if there
[k]
exists a point y ∈ R0 and an integer k such that fI (y) = x then there exists a
[k]
configuration c = (1, 0, ε1 , . . . , εn ) such that fI (hci) ∈ Rf in .
Proof. Define y0 = y and yi+1 = fI (yi ) for all i ∈ {0, k − 1}. Since y0 ∈ R0 ,
we immediately get that yi ∈ Ri using Lemma 26 and in particular, k > n + 1
because yk = x ∈ Rn+1,0? .
unsat
Now apply Lemma 28 starting from yn+1 ∈ Rn+1
: we conclude that for
lin
all i > 1, yi ∈ (Ri,1 ∪ Ri,2 ∪ Ri,4
) ∩ Rnunsat . Define εi = 0 if yi ∈ Ri,1 ∪ Ri,2
lin
and 1 if yi ∈ Ri,4
. Write yi = (ai , bi ). Again using Lemma 26 we get that
−p
ai−1 = ai −2 −εi Ai 2−q (just check all three cases). Also since x = yn+1 ∈ Rf in
then an+1 ∈ [(n + 1)2−p + B2−q − 2−q−1 , (n + 1)2−p + B2−q ]. Finally, y0 ∈ R0 so
fI (a0 , b0 ) = (2−p , 0) = (a1 , b1 ). We conclude that a1 = 2−p . Putting everything
together we get:
Pn
an+1 = (n + 1)2−p + 2−q i=1 εi Ai
an+1 ∈ [(n + 1)2−p + B2−q − 2−q−1 , (n + 1)2−p + B2−q ]
Since the Ai , B are integers and εi ∈ {0, 1}, we get that B =
Lemma 22 on the configuration to conclude.
Pn
i=1
Ai εi . Apply
t
u
Lemma 30 (Final region is accepting). For any configuration c, if hci ∈
Rf in then c = (n + 1, B).
Pn
Proof. Write c = (i, σ, εi , . . . , εn ), thenhci = i2−p + σ2−q , j=i ε?i β −i + 0? β −n−1 .
It implies that i2−p + σ2−q ∈ [(n + 1)2−p + B2−q − 2−q−1 , (n + 1)2−p + B2−q ]
and because i is an integer in range [0, n + 1] and σ an integer in range [0, B + 1],
necessarily i = n + 1 and σ = B.
t
u
3.4
Complexity result
We now have all the tools to show that REACH-REGION-TIME is an NP-hard
problem.
Theorem 31. REACH-REGION-TIME is NP-hard for d > 2.
Proof. Let I = (B, A1 , . . . , An ) be an instance of SUBSET-SUM. We consider the
instance J of REACH-REGION-TIME defined in the previous section with maximum number of iterations set to n (the number of Ai ), the initial region set
to R0 and the final region set to Rf in . One easily checks that this instance has
polynomial size in the size of I. The two directions of the proof are:
– If I is satisfiable then use Lemma 17 and Lemma 22 to conclude that there
[n]
is a point x ∈ R0 in the initial region such that fI (x) ∈ Rf in so J is
satisfiable.
[k]
– If J is satisfiable then there exists x ∈ R0 and k 6 n such that fI (x) ∈
Rf in . Use Lemma 29 and Lemma 22 to conclude that there exists a config[k]
[k]
uration c = (1, 0, ε1 , . . . , εn ) such that hTI (c)i = fI (hci) ∈ Rf in . Apply Lemma 30 and use the injectivity of the encoding to conclude that
[k]
TI (c) = (n + 1, B) and Lemma 18 to get that I is satisfiable.
t
u
4
Bounded Time Reachability is in NP
In the previous section we have shown that the REACH-REGION-TIME problem
is NP-hard. We now give a more precise characterization of the complexity of
this problem, by proving that it is NP-complete. Since we have shown its NPhardness, the only thing that remains to be shown is that REACH-REGION-TIME
belongs to NP. This is done in this section.
4.1
Notations and definitions
For any i ∈ {1, . . . , d}, let πid : Rd → R denote the ith projection function, that
is, π(x1 , . . . , xd ) = xi . Let gd : Rd+1 → Rd be defined by gd (x1 , . . . , xd+1 ) =
(x1 , . . . , xd ). For a square matrix A of size (d + 1) × (d + 1) define the following
pair of projection functions. The first function h1,d takes as input a square matrix
A of size (d + 1) × (d + 1) and returns a square matrix of size d × d that is the
upper-left block of A. The second function h2,d takes as input a square matrix A
of size (d+1)×(d+1) and returns the vector of size d given by [a1,d+1 · · · ad,d+1 ]T
(the last column of A minus the last element).
Let s denote the size function, its domain of objects will be overloaded and
understood from the context. For x ∈ Z, s(x) is the length of the encoding of
x in base 2. For x ∈ Q with x = pq with p and q coprime, we have s(x) =
max(s(p), s(q)). For an affine function f we define the size of f (x) = Ax + b
(where all entries of A and b are rationals) as: s(f ) = max(maxi,j (s(ai,j )), max(s(bi ))).
We define the size of a polyhedron r defined by Ax 6 b as: s(r) = max(s(A), s(b)).
We define the size of a piecewise affine function f as: s(f ) = maxi (s(fi ), s(ri ))
where fi denotes the restriction of f to ri the ith region.
We define the signature of a point x as the sequence of indices of the regions
traversed by the iterates of f on x (that is, the region trajectory).
4.2
REACH-REGION-TIME is in NP
In order to solve a reachability problem, we will formulate it with linear algebra.
However a crucial issue here is that of the size of the numbers, especially when
computing powers of matrices. Indeed, if taking the nth power of A yields a
representation of exponential size, no matter how fast our algorithm is, it will
run on exponentially large instances and thus be slow.
First off, we show how to move to homogeneous coordinates so that f becomes
piecewise linear instead of piecewise affine.
Lemma 32. Assume that f (x) = Ax
+ b with
A = (ai,j )16i,j6d and let y =
Ab
0
T
0
A (x, 1) where A is the block matrix
. Then f (x) = gd (A0 (x, 1)T ).
0 1
Remark 33. Notice that this lemma extends nicely to the composition of affine
functions: if f (x) = Ax + b and h(x) = Cx + d then h(f (x)) = gd (C 0 A0 (x, 1)T ).
We can now state the main lemma, namely that the size of the iterates of f
vary linearly in the number of iterates, assuming that f is piecewise affine.
Lemma 34. Let d > 2 and f ∈ P AFd . Assume that all the coefficients of f
on all regions are rationals. Then for all t ∈ N, s(f [t] ) 6 (d + 1)2 s(f )pt + (t −
1)dlog2 (d + 1)e where p is the number of regions of f . This inequality holds even
if all rationals are taken to have the same denominator.
Proof. Using Lemma 32, we get that f [t] (x) = gd (h[t] ([x 1]T )), where h is a
piecewise linear function in dimension d + 1 such that s(h) = s(f ). We show this
result by induction on t for h. The result then follows for f . In all cases we take
all rationals to have the same denominator.
In the case t = 1, it suffices to see that taking all rationals to have the same
denominator involves multiplying the numerator and denominators by at most
2
the lowest common multiple of all numbers, and hence is at most 2s(f )(p(d+1) ) .
Indeed the greatest number is 2s(h) by definition, and there are (d + 1)2 numbers
per region (the entries of the matrix).
Assume the result is true for t ∈ N. Let y ∈ Qd+1 . Then h[t+1] (y) =
Bt+1 · · · B1 y, where Bi ’s are the matrices corresponding to some regions of
h. In particular, s(Bi ) 6 s(h). From the induction hypothesis we can assume
that all rationals have the same denominator and we get that s(Bt · · · B1 ) 6
(d + 1)2 s(h)pt + (t − 1)dlog2 (d + 1)e. It follows6 that for any 1 6 i, j 6 d + 1:
s((Bt+1 · · · B1 )i,j ) = s
d+1
X
!
(Bt+1 )i,k (Bt · · · B1 )k,j
k=1
6 dlog2 (d + 1)e + s(Bt+1 ) + s(Bt · · · B1 )
6 dlog2 (d + 1)e + s(h) + (d + 1)2 s(h)pt + (t − 1)dlog2 (d + 1)e
6 (d + 1)2 s(h)p(t + 1) + tdlog2 (d + 1)e
This shows the result for the particular region where y belongs. Since the
bound does not depend on y and h[t+1] has finitely many regions, it is true for
all regions of h[t+1] .
t
u
Finally, we need some result about the size of solutions to systems of linear
inequalities. Indeed, if we are going to quantify over the existence of a solution
of polynomial size, we must ensure that the size constraints do not change the
satisfiability of the system.
Lemma 35 ([11]). Let A be a N × d integer matrix and b an integer vector.
If the Ax 6 b system admits a solution, then there exists a rational solution xs
such that s(xs ) 6 (d + 1)L + (2d + 1) log2 (2d + 1) where L = max(s(A), s(b)).
Proof. See Theorem 5 of [11]: s(xs ) 6 s (2d + 1)!2L(2d+1) .
t
u
Putting everything together, we obtain a fast nondeterministic algorithm to
solve REACH-REGION-TIME. The nondeterminism allows us to choose a signature
for the solution. Once the signature is fixed, we can write it as a linear program
of reasonable size using Lemma 34 and solve it. The remaining issue is the one
of the size of solution but fortunately Lemma 35 ensures us that there is a small
solution that can be found quickly.
Theorem 36. REACH-REGION-TIME is in NP.
Proof. The idea of the proof is to nondeterministically choose a signature for a
solution, that is a sequence of regions for the iterates of the solution. We then
build a system of linear inequalities stating that a point x belongs to the initial
region and that the iterates match the signature chosen and finally that the
iterates reach the final region. Using the results of the previous section, we can
build this system in polynomial time and solve it in non-deterministic polynomial
time. Here is an outline of the algorithm:
6
Use elementary properties of the size function: s(xy) 6 s(x)+s(y), s(x1 +· · ·+xk ) 6
s(k) + maxk s(xk )
–
–
–
–
–
Non-deterministically choose t 6 T
Non-deterministically choose regions r1 , . . . , rt−1 regions of f
Define r0 = R0 the initial region and rt = R the final region
Build (S) the system Ax 6 b stating that the signature of x matches r
Non-deterministically choose xs a rational of polynomial size in the size of
(S)
– Accept if Axs 6 b
We have two things to prove. First we need to show that this algorithm
indeed has non-deterministic polynomial running time. Second we need to show
that it is correct. Recall that T is a unary input of the problem.
The complexity of the algorithm is clear, assuming that (S) is of polynomial
size. Indeed verifying that a rational point satisfies a system of linear inequalities
with rationals coefficients can be done in polynomial time.
We build (S) this way: (S) = ∪ti=1 (Si ) where (Si ) states that f [i] (x) ∈
ri . Since we choose a signature of x we know that if x satisfies the system
then from Lemma 32 f [i] (x) = gd A0i−1 · · · A01 (x, 1)T where A0j is the matrix
corresponding to the region rj . Write Ci = A0i−1 · · · A01 and define (Si ) by the
system gd Ci (x, 1)T ∈ ri . Since ri is a polyhedron, (Si ) is indeed a system of
linear inequalities7 .
We can now see that S is of polynomial size using Lemma 34. Indeed,
s(Ci ) 6 s(f [i] ) 6 poly(s(f ), i), thus s((Si )) 6 s(Ci ) + s(ri ) 6 poly(s(f ), i)
because the description of the regions is part of the size of f . And finally
s((S)) 6 poly(s(f ), t).
The correctness follows from the construction of the system and Lemma 35.
More precisely we show that x ∈ (S) if and only if ∀i ∈ {0, . . . , t}, f [i] (x) ∈ ri .
Indeed, (S) ⇔ ∀i ∈ {0, . . . , t}, x ∈ (Si ) and by definition (Si ) ⇔ f [i] (x) ∈ ri
since gd (Ci (x, 1)T ) = f [i] (x). Then by Lemma 35, we get that ∃x ∈ (S) ⇔ ∃x ∈
(S) and s(x) 6 poly(s((S))).
t
u
5
Other Bounded Time Results
In this section, we give succinct proofs of the other result mentioned in the introduction about CONTROL-REGION-TIME. The proof is based on the same arguments
as before.
Theorem 37. Problem CONTROL-REGION-TIME is coNP-hard for d > 2.
Proof. The proof is exactly the same except for two details:
– we modify f over Rn+1 as follows: divide Rn+1 in three regions: Rlow that
is below Rf in , Rf in and Rhigh that is above Rf in . Then build f such that
f (Rlow ) ⊆ Rlow , f (Rf in ) ⊆ Rf in and f (Rhigh ) ⊆ Rlow .
– we choose a new final region Rf0 in = Rlow .
7
More precisely if ri is defined by Pi (x, 1)T 6 0 then (Si ) is the system Pi Ci (x, 1)T 6 0
Let I = (B, A1 , . . . , An ) be an instance of NOSUBSET-SUM, let J be the
corresponding instance of CONTROL-REGION-TIME we just built. We have
to show that I has no subset sum if and only if J is “controlled”. This is the
same as showing that I has a subset sum if and only if J has points never
reaching Rf0 in .
Now assume for a moment that the instance is in SUBSET-SUM (as opposed
to NOSUBSET-SUM), then by the same reasoning as the previous proof, there
will be a point that reaches the old Rf in region (and is disjoint from Rf0 in ). And
since Rf in is a f -stable region, this point will never reach Rf0 in .
And conversely, if the control problem is not satisfied, necessarily there is
a point whose trajectory went through the old Rf in (otherwise if would have
reached either Rlow = Rf0 in or Rhigh but f (Rhigh ) ⊆ Rlow ). Now we proceed as
in the proof of Theorem 31 to conclude that there is a subset that sums to B,
and thus I is satisfiable.
t
u
Theorem 38. Problem CONTROL-REGION-TIME is in coNP for d > 2.
Proof. Again the proof is very similar to that of Theorem 36: we have to build
a non-deterministic machine that accepts the “no” instances. The algorithm is
exactly the same except that we only choose signatures that avoid the final
region (as opposed to ending in the final region) and are of maximum length
(that is t = T as opposed to t 6 T ). Indeed, if there is a such a trajectory, the
problem is not satisfied. And for the same reasons as Theorem 36, it runs in
non-deterministic polynomial time.
t
u
6
Fixed Precision Results
Theorem 39. REACH-REGION-PRECISION and CONTROL-REGION-PRECISION are
P SP ACE-hard.
Proof. Consider a polynomial space Turing machine M = (Q, Σ, B, q0 , F, δ).
Without loss of generality, we can assume that F = {qf } ⊂ Q (there is a single
accepting state) and that the working alphabet is Σ = {0, 1, 2, . . . , β}, assuming
that B = 0 is the blank character, and δ : Q×Σ → Q×Σ ×{/, , .} is complete.
We also assume the set of internal states to be such that Q ⊆ Σ m for some m.
Let c be an instantaneous configuration (sometimes also called ID for Instataneous Description) of M. We write c = (x, σ, q, y) where x (resp. y) is encoding
the part of the tape on the left (resp. right) of the head, σ is the symbol under
the head, and q is the state of the machine. Specifically, if the non-blank part of
the tape is s−n . . . s−1 σs1 s2 . . . sm , with the head in front of σ, then x is encoded
as word s−1 s−2 . . . s−n , and y as word s1 s2 . . . sm .
Define the encoding of configuration c as hci = (hxi, hqσyi) where for any
P|w|
word w ∈ Σ ∗ , hwi = i=1 2wi (2γ )−i , where γ is such that 2β + 1 6 2γ . Define
regions Rα,q,σ = [hαi] × [hqσi] where [hwi] is a shortcut for [hwi] = [hwi, hwi +
(2γ )−|w| ]. Intuitively, Rα,q,σ contains all configurations in state q, with symbol σ
under the head and symbol α immediately at the left of the head. By construction
hci ∈ Rx1 ,q,σ with the above notations. Finally, for α, σ ∈ Σ, q ∈ Q, define f on
region Rα,q,σ by:
−γ
0
γ
0
a2 + hσ i, (b − hqσi)2 + hq i)
f (a, b) = (a, b − hqσi + hq 0 σ 0 i)
(a − hαi)2γ , (b − hqσi)2−γ + hq 0 ασ 0 i)
if δ(q, σ) = (q 0 , σ 0 , .)
if δ(q, σ) = (q 0 , σ 0 , )
if δ(q, σ) = (q 0 , σ 0 , /)
It is clear from the definition that f is piecewise affine over its domain of
definition. Let T be the function corresponding to one step of computation of M:
T is acting on configurations and maps any configuration c to the corresponding
next configuration according to the program of M. A simple case analysis shows
that for any configuration c, hT (c)i = f (hci), using the fact that the blank
character B was chosen to be 0.
Observe furthermore that by the choice of the encoding, all the regions Rα,q,σ
are closed and at positive distance from each other: Rα,q,σ ∩ Rα0 ,q0 ,σ0 = ∅ whenever (α, q, σ) 6= (α0 , q 0 , σ 0 ). It follows that f can be easily extended to a continuous piecewise linear function defined over the whole domain [0, 1] (similar
arguments are used in [12]). By construction it will still satisfy that for any
configuration c, hT (c)i = f (hci).
We can now state the reduction from problem LINSPACE-WORD: consider an
instance (M, w) of this decision problem. Define ε = (2γ )−(|w|+m+1) where the
choice of m was explained above. Then for any configuration c reachable from the
initial configuration c0 = (ε, q0 , w1 , w2 · · · w|w| ), we have the stronger property
that hci = b hci
ε cε. Indeed, by assumption the machine never uses more space
than the size of the input, thus the left and right part of tape are always smaller
than |w| at any point during the computation, and we simply need an extra m+1
space to store the current state of the machine. In other words, rounding to ε
does not perturbate the simulation. Consequently, we get that for any reachable
configuration c, hT (c)i = fε (hci).
Define R0 = {hc0 i} and R = [0, 1] × [hqf i] that are convex regions. Then the
instance (f, R0 , R, ε) of REACH-REGION-PRECISION is satisfiable if and only if
(M, w) belongs to problem LINSPACE-WORD. One easily checks that (f, R0 , R, ε)
has polynomial size in the size of (M, w).
The same instance also works for CONTROL-REGION-PRECISION. If we want to
make R0 a region with non-empty interior, just take a ball of radius smaller that
ε(2γ )−2 around hc0 i so that any input error is removed after the first application
of the function fε .
t
u
Theorem 40. REACH-REGION-PRECISION and CONTROL-REGION-PRECISION are
in P SP ACE.
Proof. Let N = bε−1 c and consider the graph G = (V, E) where
V = {0, . . . , N − 1}d
Cα =
d
Y
k=1
αk ε, (αk + 1)ε
(α ∈ V )
E = {(α, β) | f (Cα ) ∩ Cβ 6= ∅}
S = {α | f (R0 ) ∩ Cα 6= ∅}
T = {α | R ∩ Cα 6= ∅}
We can now restate our reachability problem in the graph G as an accessibility
problem from S to T . This can be done in space logarithmic in the size of the
graph, using the fact that accessibility in a graph with N vertices can be done
in non-deterministic space O(log N ), and using the fact that N SP ACE(N ) =
2
SP ACE(N
) (Savitch’s Theorem) [16,
Theorem 8.5].
Since the
graph is of size
d
O N , this requires space O log2 N = O − log2 ε = O n2 if ε = 2−n . Also
note that computing the transitions of the graph is fast since f is a piecewise
affine function. The same proof applies to CONTROL-REGION-PRECISION except
we now want to know if for every vertex in S there is a path to T .
t
u
References
1. Asarin, E., Maler, O., Pnueli, A.: Reachability analysis of dynamical systems having piecewise-constant derivatives. Theoretical Computer Science 138(1), 35–65
(Feb 1995)
2. Asarin, E., Schneider, G.: Widening the boundary between decidable and undecidable hybrid systems. In: Brim, L., Jancar, P., Kretı́nský, M., Kucera, A.
(eds.) CONCUR 2002 - Concurrency Theory, 13th International Conference, Brno,
Czech Republic, August 20-23, 2002, Proceedings. Lecture Notes in Computer Science, vol. 2421, pp. 193–208. Springer (2002), http://link.springer.de/link/
service/series/0558/bibs/2421/24210193.htm
3. Asarin, E., Schneider, G., Yovine, S.: On the decidability of the reachability
problem for planar differential inclusions. In: Benedetto, M.D.D., SangiovanniVincentelli, A.L. (eds.) Hybrid Systems: Computation and Control, 4th International Workshop, HSCC 2001, Rome, Italy, March 28-30, 2001, Proceedings. Lecture Notes in Computer Science, vol. 2034, pp. 89–104. Springer (2001), http:
//link.springer.de/link/service/series/0558/bibs/2034/20340089.htm
4. Bazille, H., Bournez, O., Gomaa, W., Pouly, A.: On the complexity of bounded
time reachability for piecewise affine systems. In: Ouaknine, J., Potapov, I., Worrell, J. (eds.) Reachability Problems, Lecture Notes in Computer Science, vol.
8762, pp. 20–31. Springer International Publishing (2014), http://dx.doi.org/
10.1007/978-3-319-11439-2_2
5. Bell, P., Chen, S.: Reachability problems for hierarchical piecewise constant derivative systems. In: Abdulla, P., Potapov, I. (eds.) Reachability Problems, Lecture
Notes in Computer Science, vol. 8169, pp. 46–58. Springer Berlin Heidelberg (2013),
http://dx.doi.org/10.1007/978-3-642-41036-9_6
6. Ben-Amram, A.M.: Mortality of iterated piecewise affine functions over the integers: Decidability and complexity. In: STACS. pp. 514–525 (2013)
7. Blondel, V.D., Bournez, O., Koiran, P., Tsitsiklis, J.: The stability of saturated
linear dynamical systems is undecidable. Journal of Computer and System Science
62(3), 442–462 (May 2001), http://dx.doi.org/10.1006/jcss.2000.1737
8. Garey, M.R., Johnson, D.S.: Computers and Intractability. W. H. Freeman and Co
(1979)
9. Henzinger, T.A., Kopke, P.W., Puri, A., Varaiya, P.: What’s decidable about hybrid automata? Journal of Computer and System Sciences 57(1), 94–124 (Aug
1998)
10. Karp, R.M.: Reducibility among combinatorial problems. Springer (1972)
11. Koiran, P.: Computing over the reals with addition and order. Theor. Comput.
Sci. 133(1), 35–47 (1994)
12. Koiran, P., Cosnard, M., Garzon, M.: Computability with low-dimensional dynamical systems. Theoretical Computer Science 132(1-2), 113–128 (Sep 1994)
13. Koiran, P., Cosnard, M., Garzon, M.: Computability with Low-Dimensional Dynamical Systems. Theoretical Computer Science 132, 113–128 (1994)
14. Moore, C.: Generalized shifts: unpredictability and undecidability in dynamical
systems. Nonlinearity 4(3), 199–230 (1991)
15. Siegelmann, H.T., Sontag, E.D.: On the computational power of neural nets. Journal of Computer and System Sciences 50(1), 132–150 (Feb 1995)
16. Sipser, M.: Introduction to the Theory of Computation. PWS Publishing Company
(1997)
| 3cs.SY
|
A New Optimization Approach Based on
Rotational Mutation and Crossover Operator
Masoumeh Vali
Department of Mathematics, Dolatabad Branch, Islamic Azad University, Isfahan, Iran
E-mail: [email protected]
Abstract
Evaluating a global optimal point in many global optimization problems in large space is required
to more calculations. In this paper, there is presented a new approach for the continuous functions
optimization with rotational mutation and crossover operator.
This proposed method (RMC) starts from the point which has best fitness value by elitism
mechanism and after that rotational mutation and crossover operator are used to reach optimal
point. RMC method is implemented by GA (Briefly RMCGA) and is compared with other wellknown algorithms such as: DE, PGA, Grefensstette and Eshelman[15,16] and numerical and
simulating results show that RMCGA achieve global optimal point with more decision by smaller
generations.
Keywords: genetic algorithm (GA), rotational mutation, crossover operator, optimal point.
1. Introduction
This paper concerned with the simple-bounded continuous optimization problem as follows:
f ( , , ..., ) where each is a real parameter so that ≤ ≤ for some constants and
and = 1, 2, … , .
This problem has widespread applications including optimization simulating models, fitting
nonlinear curve to data, solving system of nonlinear, engineering design and control problem, and
setting weights on neural networks.
Since GA provides a comprehensive search methodology for optimization, this problem is
implemented by GA for more optimal performance. In global optimization scenarios, GAs often
manifests their strengths: efficiency, parallelizable search; the ability to evolve solutions with
different dimension; and a characterized and controllable process of innovation.
1
In this paper is presented a new approach for simple-bounded continuous optimization problem
that is called RMC. In other words, RMC is a new approach for finding global optimal point
(max/min) by simple algebra, without derivation and based on search.
This method, at first, search the point has the best fitness in its search space and after that by using
rotational mutation and crossover operator finds the global optimal point.
This paper starts with the description of related work in section 2. Section 3 gives the model and
problem definition of RMC. In section 4, text problems of RMC method is implemented. In
section 5, Schemata Analysis for RMCGA is present. Evaluation by De Jong's functions and the
compression of RMCGA with the other methods (DE, PGA, Grefensstette and Eshelman) for De
Jong Functions are shown in sections 6. The discussion ends with a conclusion and future trend.
2. Related Work
In the early 1960s and 1970s, new search algorithms were initially proposed by Holland, his
colleagues and his students at the University of Michigan. These search algorithms which are
based on nature and mimic the mechanism of natural selection were known as Genetic
Algorithms (GAs) [1, 2, 3, 4, 5, 6, 7]. Holland in his book “Adaptation in Natural and Artificial
Systems” [1] initiated this area of study. Theoretical foundations besides exploring applications
were also presented.
As a matter of fact, “Genetic algorithms’ functionality is based upon Darwin's theory of evolution
through natural and sexual selection.” [6], they mimic biological organisms [3]. In GAs a solution
to the problem is represented as a genome (or chromosome) [1, 3, 4].
Pratibha Bajpal and Manojkumar [9] have proposed an approach to solve Global Optimization
Problems by GA and obtained that GA is applicable to both continuous and discrete optimization
problems.
Hayes and Gedeon [10] considered infinite population model for GA where the generation of the
algorithm corresponds to a generation of a map. They showed that for a typical mixing operator all
the fixed points are hyperbolic.
Gedeon et al. [11] showed that for an arbitrary selection mechanism and a typical mixing operator,
their composition has finitely many fixed points.
Qian et al.[12] proposed a GA to treat with such constrained integer programming problem for the
sake of efficiency. Then, the fixed-point evolved (E)-UTRA PRACH detector was presented,
which further underlines the feasibility and convenience of applying this methodology to practice.
Devis Karaboga and Selcuk. [15] is proposed new heuristic approach with deferential evaluation
(DE) for finding a true global minimum regardless of the initial parameter values, fast convergence
using similar operators crossover, mutation and selection.
2
3. Model and Problem Definition of RMC
In this section, at first, model of RMC is expressed.
Suppose f , , … . . , with constraint ≤ ≤ for i=1, 2,…, n. The serial algorithm
RMC is as follows:
Step 1: Draw the diagrams for = and = for i=1, 2,…, n.
Step 2: Consider the vertex of this polytope which has best fitness among other vertexes and call it
S.
Step 3: Put S = f(S) ,=(1,1,…,1),
(1,-1,1,…,1),…, or (-1,-1,…,-1) and
= ,
= 0.1" , n=1,2,…,10.
Step 4: Move the point ‘S’ with length of α in direction of vector (notice: the direction of
vector must be inside the search space, also the α measurement depends on problem precision).
The endpoint of vector is called P.
Step 5: If f (P) better than S , then put S=P and go to step 8 else go to step 6.
Step 6: Put # = 0.1, 0.25, …, % = 1,1, … ,1, 1, −1,1, … ,1, … , and −1, −1, … , −1,P = #% .
Step 7: If f (P) is better than S , then S=P else go to step 8.
Step 8: If P is in search space, go to step 9 else go to stop.
Step 9: Halve the adjacent sides of polytope. The result is the production of new points.
Step 10: Select point has best fitness among the new points produced from step 9 and point ‘S’.
Then, put S the point which has the best value and S' fitness of point S then go to step 3 and repeat
this trend.
4. Implementing Test problems by RMC
4.1.Test problem1:
The minimization problem is formulated as follows:
min fx = x + x − 18 cos x − 18 cos x
* ∈ℝ-
−1 ≤ 5 ≤ 1,
5
= 1,2
Its global minimum is equal to -2 and the minimum point is at (0,0).
The process of achieve to optimal global point by RMC is shown following figure.
3
1
S
Q
-1
Q''
S Q'
1
-1
Figure 1: The Performance RMC
Note that f(1,1) = f(-1,1) = f(1,-1) = f(-1,-1) so it's not important that from which side start. As you
can see, the first two mutations improve the fitness of problem- The fitness value of mutated
points are better than the fitness value of points produced by crossover - but the fitness of the third
mutation cannot improve the fitness of problem so use crossover operator and produce Q and Q'
points.Then among S, Q and Q' select S which has best fitness and after that rotational mutation
and crossover operator is used for achieve global optimal point.
4.2.Test problem2:
The Goldstein-Price function [GP71] is a global optimization test function.
function definition:
6789: , ;1 0 0 0 1 . 19 & 14 0 3 & 14 0 6 0 3 @.
;30 0 2 & 3 . 18 & 32 0 12 0 48 & 36 0 27 @
&2 2,
1,2
Global minimum:
6 ,
3; ,
0, &1
-2
Figure 2: Figure of the Goldstein-Price
4
2
Q
2
-2
Q'
-2
S
Figure 3: The Performance RMC
As regards the fitness value of points (2,-2) and (-2,-2) is equal and better than the fitness value of
points (2, 2) and (-2, 2) so we start from point (2,-2). As you can see, the first third mutations
improve the fitness of problem- The fitness value of mutated points are better than the fitness
value of points produced by crossover - but the fitness of the forth mutation cannot improve the
fitness of problem so use crossover operator and produce Q and Q' points and select Q' which has
the best fitness. After that use rotational mutation to achieve point which the improvement is better
but this point didn't find so point Q' is chosen as the global point optimal.
5. Schema Analysis RMCGA
This schema (Figure 4) starts from the vertex (offspring) which has best fitness value that is
called ‘S’. Then it sets initial point of
vector at ‘S’ and mutates offspring ‘S’ in direction
of
vector with length of mutation α. ( notice that the direction of vector must be inside
the search space, also the α measurment depends on problem precision.) . This mutated
offspring is calledP.
If fitness value of offspring P was better than the fitness value of offspring S we
would use crossover operator for adjacent edges of offspringP. Otherwise by using
rotational mutation by %
vector, we would search an offspring-with better fitness value in
comparison with‘S’. Then we make a crossover. After that we select an offspring with the
better fitness value –between the mutated offspring and offspring's which were generated
crossover operator. We mutate and make a crossover on it again. We repeat this action while
the mutated offspring doesn’t get out of search space. Eventually, we would select the last
5
new produced offspring- inside the search space- as the global optimization point which would
be fixed point of our question.
start
, ≤ ≤ C ,
…, ≤ ≤ D
E = , , F = , C ,
…,G = , D
S= vertex of the polytope which has
best fitness and put S’= f(S)
=(1,1,…,1),(1,-1,1,…,1),…,or
(-1,-1,…,-1)
Set initial point of
vector at H
=
, = 0.1"
n=1,2,…,10, So that be
in search
space Y
Put P=end of point of vector
# = 0.1, 0.25, …
% =(1,1,…,1),(1,-1,1,…,1),…, and
(-1,-1,…,-1)
= #%" ,p=end of point of
vector
Is fitness value of
No
I better than S’?
N
o
Is fitness value of p
better than S’?
S=p
Yes
N
e
Is p in search
space?
No
Yes
Acts Crossover operator on the
adjacent sides P
Put S’= best fitness of offsprings (vertexes)
among S and resulting offspring of
crossover operator
Print 'S' point
Figure 4: The improved GA
6
End
6. Evaluation
In this section, Definition of De Jong's Functions, Numerical results of RMCGA on De Jongs'
functions and finally simulating results and the compression of RMCGA with the other methods
such as DE, PGA, Grefensstette and Eshelman[15, 16] are shown.
6.1 De Jong's Functions
In this section, Definition of De Jong's Functions (F1 to F5) and initial population RMCGA which
depends on the dimensional space are shown in Table 1.
Table 1: De Jong's Functions
Function
Number
F1
F2
Function
F5
Dim.
&5.12 ≤ ≤ 5.12
Initial
Population
3
8
−2.048 ≤ ≤ 2.048
2
4
−5.12 ≤ ≤ 5.12
5
32
-1.28≤ ≤ 1.28
30
−65.536 ≤ ≤ 65.536
2
J
K
100. − + 1 −
O
F3
F4
Limits
30. + JLM N
K
J; C . +PQ 0,1@
K
0.002 +
1
∑C
K
D∑Y
TZ[;ST UVWT @
4
X
6.2. Numerical Results
In this section, the experimental results of RMCGA on the five problems of De Jong (F1 to F5)
[De Jong, 1975] in Table 2 are shown. Furthermore, results were saved for the best performance
(BP) which BP is the best fitness of the objective function obtained over all function evaluations.
At last, standard deviation (SD) is calculated and measured with final answer of De Jong function.
The following parameters were evaluated in the following table.
rotational mutation size (RMS), number of iterations rotational mutation (TRM), number of
iterations crossover operator (TC).
7
Table 2: The average number of generations.
Algorithm
De Jong’s
Function
F1
RMCGA
F2
RMCGA
F3
RMCGA
RMCGA
RMCGA
F4
F5
RMS
TRM
TC
Best Point
BP
SD
0.1
55
102
(0,0,0)
0
0
0.1
15
20
(1,1)
0
0
0.1
4
1
(-5.12,-5.12,-5.12, 5.12, -5.12)
0
0
0.1
15
21
0
30
Depend
on \
(-32,-32)
0
0
(0,0,…,0)
0.1
340
670
6.3. Simulating Results
Dervis Karaboga and Selcuk O^kdema15b introduced new method DE for finding global
optimization problems. They compared DE method with other methods: PGA, Grefensstette and
Eshelman [16] and showed that DE algorithm works much better than other methods[16].
In order to obtain the average results, PGA, Grefensstette and Eshelman algorithms were run 50
times; the DE algorithm was run 1000 times and RMCGA 200 times for each function.
Table 3: The average number of generations
Algorithms
F1
F2
F3
F4
F5
PGAc = d
1170
1235
3481
3194
1256
PGAc = e
1526
1671
3634
5243
2076
Grefensstette
2210
14229
2259
3070
4334
Eshelman
1538
9477
1740
4137
3004
DE(F: RandomValues)
260
670
125
2300
1200
RMCGA
157
35
5
36
1010
PNG
1.656
19.142
25
63.888
1.188
8
As you can see in Table 3, the convergence speed RMCGA achieves the optimal point with more
decision by smaller generation. Furthermore, the most significant improvement is with F4 since
the proportion of the number of generations (PNG) about f ≅ 64 times smaller than the
average of the number of generations DE algorithm.
7. Conclusion
RMCGA is a new method for finding the true optimal global optimization is based on rotational
mutation and crossover operator. In this work, the performance of the RMCGA has been compared
to that of some other well known GAs. From the simulation studies, it was observed that RMCGA
achieve the optimal point with more decision by smaller generation. Therefore, RMCGA seems to
be a promising approach for engineering optimization problems.
References
Holland J.H., "Adaptation in Natural and Artificial Systems: An Introductory Analysis with
Applications to Biology, Control, and Artificial Intelligence", University of Michigan Press,
Ann Arbor, Mich, USA, 1975.
[2]
J. H. Holland, Adaptation in Natural and Artificial Systems: An Introductory Analysis with
Applications to Biology, Control, and Artificial Intelligence, Cambridge, USA: The MIT
Press, 1992.
[3]
Y. Liao, and C.T. Sun, “An Educational Genetic Algorithms Learning Tool” ©2001 IEEE.
[4]
N. A. AL-Madi, A. T. Khader, “A SOCIAL-BASED MODEL FOR GENETIC
ALGORITHMS”. Proceedings of the third International Conference on Information
[5]
Technology (ICIT), AL- Zaytoonah Univ., Amman, Jordan, 2007.
[6]
J. Dalton, “Genetic Algorithms” Newcastle Engineering Design Centre,
http://www.edc.ncl.ac.uk. 2007.
[7]
E. Bagheri, H. Deldari, 2006. “ Dejong Function Optimization by means of a Parallel
Approach to Fuzzified Genetic Algorithm” Proceedings of the 11th IEEE Symposium on
Computers and Communications (ISCC'06) 0-7695-2588-1/06 $20.00 © 2006 IEEE.
[8]
T. Back. “Evolutionary Algorithms in theory and practice Evolution Strategies, Evolutionary
Programming, Genetic Algorithms”. Accessed 2008.
[9]
Pratibha Bajpal and Manojkumar, Genetic Algorithm – an Approach to Solve Global
Optimization Problems,Pratibha Bajpai et al. / Indian Journal of Computer Science and
Engineering Vol 1 No 3 199-206.
[10] Zhang J., Dong Y., Gao R., and Shang Y.," An Improve Genetic Algorithm Based on Fixed
Point Theory for Function Optimization", IEEE, International Conference on Computer
Engineering and Technology, pp. 481-484, 2009.
[11] Gedeon T., Hayes C., and Swanson R., " Genericity of the Fixed Point set for the Infinite
Population Genetic Algorithm" Foundations of Genetic Algorithms Lecture Notes in
Computer Science, Volume 4436, pp. 97-109,2007.
[1]
9
[12]
[13]
[14]
[15]
[16]
Qian R., Peng T., Qi Y., and Wang W. " Genetic Algorithm-Aided Fixed Point Design of
E-UtraPrach Detector on Multi-Core DSP",In the proceeding of 17th European Signal
Processing Conference ,Glasgow, Scotland, pp. 1007-1011, 2009.
Rainer Storn and Kenneth Price, Differential Evolution - A simple and efficient adaptive
scheme for global optimization over continuous spaces, TR-95-012March 1995.
H. M¨uhlenbein, M. Schomisch, J.Born, \The Parallel Genetic Algorithm as Function
Optimizer", Proceedings of the Fourth International Conference on Genetic Algorithms,
University of California, San diego, pp. 270-278, 1991.
Dervis Karaboga and Selcuk Okdem, A Simple and Global Optimization Algorithm for
Engineering Problems: Differential Evolution Algorithm, Turk J Elec Engin, VOL.12, NO.1
2004.
H. MQ^ hlenbein, M. Schomisch, J. Born, "The Parallel Genetic Algorithm as Function
Optimizer",Proceedings of The Fourth International Conference on Genetic Algorithms,
University of California, San diego, pp. 270-278, 1991.
10
| 9cs.NE
|
NIELSEN EQUIVALENCE IN A CLASS OF RANDOM GROUPS
arXiv:1309.7458v2 [math.GR] 12 Jan 2016
ILYA KAPOVICH AND RICHARD WEIDMANN
Abstract. We show that for every n ≥ 2 there exists a torsion-free one-ended
word-hyperbolic group G of rank n admitting generating n-tuples (a1 , . . . , an )
and (b1 , . . . , bn ) such that the (2n − 1)-tuples
(a1 , . . . , an , 1, . . . , 1 ) and (b1 , . . . , bn , 1, . . . , 1 )
| {z }
| {z }
n−1 times
n−1 times
are not Nielsen equivalent in G. The group G is produced via a probabilistic
construction.
Introduction
The notion of Nielsen equivalence goes back to the origins of geometric group
theory and the work of Jakob Nielsen in nineteen twenties [N1, N2]. If G is a group,
n ≥ 1 and τ = (g1 , . . . , gn ) is an n-tuple of elements of G, an elementary Nielsen
transformation on τ is one of the following three types of moves:
(1) For some i ∈ {1, . . . , n} replace gi in τ by gi−1 .
(2) For some i 6= j, i, j ∈ {1, . . . , n} interchange gi and gj in τ .
(3) For some i 6= j, i, j ∈ {1, . . . , n} replace gi by gi gj±1 in τ .
Two n-tuples τ = (g1 , . . . , gn ) and τ = (g10 , . . . , gn0 ) of elements of G are called
Nielsen equivalent, denoted τ ∼N E τ 0 , if there exists a finite chain of elementary
Nielsen transformations taking τ to τ 0 . Since elementary Nielsen transformations
are invertible it follows that Nielsen equivalence is an equivalence relation on the
set Gn of n-tuples of elements of G for every n ≥ 1.
Nielsen showed [N1, N2] that for the free group Fn := F (x1 , . . . , xn ) any generating n-tuple of Fn is Nielsen equivalent to the standard basis (x1 , . . . , xn ). This
fact implies, in particular, that the automorphism group of a finitely generated
free group is generated by so called “Nielsen automorphisms” that correspond to
the elementary equivalences discussed above. It follows that for any group G two
n-tuples τ = (g1 , . . . , gn ), τ 0 = (g10 , . . . , gn0 ) ∈ Gn are Nielsen equivalent in G if and
only if there exist ϕ ∈ Hom(Fn , G) and α ∈ Aut(Fn ) such that the following hold:
(1) gi = ϕ(xi ) for 1 ≤ i ≤ n.
(2) gi0 = ϕ ◦ α(xi ) for 1 ≤ i ≤ n.
Thus Nielsen equivalence classes of n-tuples in G correspond to orbits in Hom(Fn , G)
under the natural right action of Aut(Fn ). In the case of generating tuples these
are orbits in Epi(Fn , G) under the action of Aut(Fn ).
If hg1 , . . . , gn i = G then an arbitrary h ∈ G can be expressed as a product
of elements of {g1 , . . . , gn }±1 . Therefore the (n + 1)-tuples (g1 , . . . , gn , 1) and
(g1 , . . . , gn , h) are Nielsen-equivalent. For similar reasons, if k ≥ 1 and h1 , . . . , hk ∈
G are arbitrary, then (g1 , . . . , gn , 1, . . . , 1) ∼N E (g1 , . . . , gn , h1 , . . . , hk ). It follows
| {z }
k times
2000 Mathematics Subject Classification. Primary 20F65, Secondary 20F67, 57M07.
The first author was supported by he Collaboration Grant no. 279836 from the Simons Foundation, and by the National Science Foundation grant DMS-1405146.
1
2
ILYA KAPOVICH AND RICHARD WEIDMANN
that if (h1 , . . . , hn ) ∈ G is another generating tuple for G then
(g1 , . . . , gn , 1, . . . , 1) ∼N E (g1 , . . . , gn , h1 , . . . , hn ) ∼N E (h1 , . . . , hn , 1, . . . , 1)
| {z }
| {z }
n times
in G.
n times
Recall that for a finitely generated group G the rank of G, denoted rank(G), is
the smallest number of elements in a generating set of G. A generating n-tuple of
G is called minimal if n = rank(G).
The operation of transforming an n-tuple of elements of G into an (n + 1)tuple by appending the identity element as the (n + 1)-st entry is sometimes called
a stabilization move. As we observed above, any two generating n-tuples of a
group G become Nielsen equivalent after n stabilization moves. The main goal of
this paper is to show that there exist groups that have two generating n-tuples
that do not become Nielsen equivalent after n − 1 stabilizations. Evans previously
showed [E2, E3] that for any k there exists a metabelian group G and generating
n-tuples that do not become Nielsen equivalent after k stabilizations. However, in
these example n is much larger than k and the generating tuples are not minimal.
The main result of this paper is:
Theorem A. Let n ≥ 2 be an arbitrary integer. Then there exists a generic set R
of 2n-tuples
τ = (v1 , . . . , vn , u1 , . . . , un )
where for each τ ∈ R every vi is a freely reduced word in F (a1 , . . . , an ), every ui is
a freely reduced word in F (b1 , . . . , bn ), where |v1 | = · · · = |vn | = |u1 | = · · · = |un |
and such that for each τ = (v1 , . . . , vn , u1 , . . . , un ) ∈ R the following holds:
Let G be a group given by the presentation
(*)
G = ha1 , . . . , an , b1 , . . . , bn |ai = ui (b), bi = vi (a), for i = 1, . . . , ni.
Then G is a torsion-free one-ended word-hyperbolic group with rank(G) = n, and
the (2n − 1)-tuples (a1 , . . . , an , 1, . . . , 1 ) and (b1 , . . . , bn , 1, . . . , 1 ) are not Nielsen| {z }
| {z }
n−1 times
n−1 times
equivalent in G.
The precise meaning of R being generic is explained in Section 5. However, the
main point of Theorem A is to prove the existence of groups G with the above
properties. Genericity considerations are used as a tool for justifying existence
of tuples τ such that G given by presentation (*) satisfies the conclusion of Theorem A. In an earlier paper [KW3] we proved, using rather different arguments
from those deployed in the present article, a weaker related statement. Namely,
we proved that if G is given by presentation (*) corresponding to a generic tuple
τ = (v1 , . . . , vn , u1 , . . . , un ), then the (n+1)-tuples (a1 , . . . , an , 1) and (b1 , . . . , bn , 1)
are not Nielsen equivalent in G. In [KW3] we also conjectured that Theorem A
should hold.
It is in general quite difficult to distinguish Nielsen equivalence classes of tuples
of elements. Even in the algorithmically nice setting of torsion-free word-hyperbolic
groups the problem of deciding if two tuples are Nielsen equivalent is algorithmically
undecidable. Indeed, the subgroup membership problem is a special case of this
problem, as two tuples (g1 , . . . , gn , h) and (g1 , . . . , gn , 1) are Nielsen equivalent if and
only if h ∈ hg1 , . . . , gn i. Therefore Nielsen equivalence is not decidable for finitely
presented torsion-free small cancellation groups, since in general, by a result of
Rips [R], such groups have undecidable subgroup membership problem. Only in
the case of 2-tuples there is a test that works reasonably well for distinguishing
Nielsen equivalence: If two pairs (g1 , g2 ) and (h1 , h2 ) are Nielsen equivalent in a
group G, then, by a result of Nielsen [N1], the commutator [g1 , g2 ] is conjuate
NIELSEN EQUIVALENCE IN A CLASS OF RANDOM GROUPS
3
to [h1 , h2 ] or two [h1 , h2 ]−1 . Thus having a solution to the conjugacy problem
often gives a way to distinguish Nielsen classes of pairs. This test is particularly
important in the theory of finite groups.
As noted above, there are no general methods that allow us to distinguish Nielsen
classes. However, Lustig and Moriah [LM1, LM2, LM3] and Evans [E1, E2, E3]
produced algebraic methods that work in many special situations. While the methods of Lustig and Moriah only work in the context of minimal generating tuples,
the methods of Evans also work for non-minimal and stabilized generating tuples;
see the discussion before the statement of Theorem A. The methods of Moriah and
Lustig are K-theoretic in nature. The approach of Evans generalizes some linear
algebra considerations in the context of solvable groups. Our approach, sketched
in the next section, is essentially geometric. Negatively curved features of groups
G, given by presentation (∗) in Theorem A, play a crucial role in the proof of this
theorem.
We are grateful to the two referees of this paper for useful suggestions.
1. Outline of the proof
In this section we outline the idea of the proof of Theorem A. First, we pass
from presentation (*) of G to the presentation
G = ha1 , . . . , an |U1 , . . . , Un i
(**)
where Ui is obtained by freely and cyclically reducing the word ui (v1 , . . . , vn )a−1
in
i
F (A), where A = {a1 , . . . , an }. Genericity of (*) implies that presentation (**) satisfies an arbitrarily strong small cancellation condition C 0 (λ), where λ ∈ (0, 1) is an
arbitrarily small fixed number. Suppose that the (2n−1)-tuples (a1 , . . . , an , 1, . . . , 1 )
| {z }
n−1 times
and (b1 , . . . , bn , 1, . . . , 1 ) are Nielsen-equivalent in G. Then in the free group F (A)
| {z }
n−1 times
the (2n − 1)-tuple (a1 , . . . , an , 1, . . . , 1 ) is Nielsen equivalent to a tuple of freely
| {z }
n−1 times
reduced F (A)-words (x1 , . . . , x2n−1 ) such that xi =G bi for i = 1, . . . , n. Among
all such tuples (x1 , . . . , x2n−1 ) we choose one of minimal complexity, in the appropriate sense. We then consider the labelled graph Γ given by a wedge of 2n − 1
loops labelled by the words x1 , . . . , x2n−1 . The fact that (a1 , . . . , an , 1, . . . , 1 ) ∼N E
| {z }
n−1 times
(x1 , . . . , x2n−1 ) in F (A) implies that the graph Γ admits a finite sequence of Stallings
folds taking it to the graph Rn which is the wedge of n loop-edges labelled a1 , . . . , an .
In this folding sequence we look at the last term ∆ such that ∆ does not contain
a copy of Rn as a subgraph. Then Γ folds onto ∆ and ∆ contains a subgraph Ψ
consisting of ≤ n + 2 edges such that Ψ transforms into a graph containing Rn
by a single fold. By construction, the first Betti number of ∆ is ≤ 2n − 1, which
puts combinatorial constrains on the topology of ∆ which we later exploit. The
F (A)-words x1 , . . . xn are readable in Γ and therefore they are also readable in ∆.
In Section 3 and Section 4 we study how generic words can be read in labeled
graphs of Betti number at most 2n − 1, in particular we show that a path reading
such a word only travels few edges more than once unless the graph contains Rn or
a 2-sheeted cover of Rn , see Theorem 4.3. This gives us control over how generic
words are read in ∆.
Using genericity and small cancellation theory considerations and the fact that
xi =G bi for 1 ≤ i ≤ n, we conclude (see Section 5) that generically one of the
following holds:
4
ILYA KAPOVICH AND RICHARD WEIDMANN
Γ
x2n−1
∆
x1
x3
x2
Rn
Figure 1. ∆ is the last graph in the folding sequence that doesn’t
contain a copy of Rn . Ψ is the fat subgraph of ∆.
(1) xi = vi for 1 ≤ i ≤ n.
(2) For some i ∈ {1, . . . , n} the word xi contains a subword Z which is almost
all of a cyclic permutation U∗ of some Uj±1 .
In Section 7 we show that both cases yield a contradiction to either the genericity
of the presentation or the minimality assumption mentioned above.
In case (1), genericity implies that for each i the path γvi in ∆, that reads the
word vi , runs over a long (subdivided) segment of ∆\Ψ that is not visited by γvj
for j 6= i. Therefore the Betti number of ∆/Ψ ist at least n, which is impossible as
b(∆) ≤ 2n − 1 and b(Ψ) ≥ n.
In case (2), the subword Z in the label of the i-th petal of Γ projects to a path
sZ with label Z in ∆. Since words readable in Ψ are highly non-generic, we exploit
the genericity properties of the presentation to conclude that there is some ”long”
(comprising a definite portion of the length of Uj ) arc Q0 in ∆\Ψ with label W such
that sZ runs over Q0 exactly once. We then perform a surgery on ∆ by replacing
Q0 in ∆ by an arc labelled by the word complimentary to W in U∗ word V (so that
U∗ ≡ W V −1 in F (A)), to obtain a graph ∆0 . Genericity considerations allow us to
conclude that the full pre-image of Q0 in Γ consists of a disjoint collections of arcs
labelled W inside the petals of Γ. We replace each such arc by an arc labelled V to
obtain a graph Γ0 which is a wedge of 2n − 1 circles labeled z1 , . . . , z2n−1 . Let x0i be
the word obtained from zi by free reduction. By construction the graph Γ0 still folds
onto ∆0 . Since ∆0 still contains the subgraph Ψ, it follows that ∆0 folds onto Rn
and hence Γ0 folds onto Rn as well. Therefore (x01 , . . . , x02n−1 ) is Nielsen equivalent
in F (A) to (a1 , . . . , an , 1, . . . , 1 ). We then use results established in Section 6 to
| {z }
n−1 times
show that the tuple (x01 , . . . , x02n−1 ) has strictly smaller complexity than the tuple
(x1 , . . . , x2n−1 ), yielding a contradiction to the minimal choice of (x1 , . . . , x2n−1 ).
2. Preliminaries
2.1. Conventions regarding graphs. By a graph Γ we mean a 1-dimensional
cell complex, equipped with the weak topology. We refer to 0-cells of Γ as vertices
and to open 1-cells of Γ as topological edges. The set of all vertices of Γ is denoted
NIELSEN EQUIVALENCE IN A CLASS OF RANDOM GROUPS
5
V Γ and the set of topological edges of Γ is denoted Etop Γ. For each topological
edge e of Γ we fix a characteristic map τe : [0, 1] → Γ which is the attaching map
for e. Thus τe is a continuous map whose restriction to (0, 1) is a homeomorphism
between (0, 1) and the open 1-cell e, and the points τe (0), τe (1) are (not necessarily
distinct) vertices of Γ.
Each topological edge e is homeomorphic to (0, 1) and thus, being a connected
1-manifold, it admits exactly two possible orientations. An oriented edge or just
edge of Γ is a topological edge together with the choice of an orientation on it. We
denote by EΓ the set of all oriented edges of Γ. If e ∈ EΓ is an oriented edge,
we denote by e−1 ∈ EΓ the same topological edge with the opposite orientation.
Thus −1 : EΓ → EΓ is a fixed-point-free involution on EΓ. For every oriented edge
e ∈ EΓ the attaching map for the underlying topological edge naturally defines the
initial vertex α(e) ∈ V Γ and the terminal vertex ω(e) ∈ V Γ of Γ. Note that for
every e ∈ EΓ we have α(e) = ω(e−1 ) and ω(e) = α(e−1 ).
For a vertex v ∈ V Γ the degree deg(v) of v in Γ is the cardinality of the set
{e ∈ EΓ|α(e) = v}.
Let Γ and Γ0 be graphs. A morphism or a graph-map f : Γ → Γ0 is a continuous
map f such that f (V Γ) ⊆ V Γ0 and such that the restriction of f to any topological
edge (that is, an open 1-cell) e of Γ is a homeomorphism between e and some
topological edge e0 of Γ0 . Thus a morphism f : Γ → Γ naturally defines a function
(still denoted by f ) f : EΓ → EΓ0 . Moreover, for any e ∈ EΓ we have f (e−1 ) =
(f (e))−1 ∈ EΓ0 and α(f (e)) = f (α(e)), ω(f (e)) = f (ω(e)).
2.2. Paths, coverings and path-surjective maps. A combinatorial edge-path
or just an edge-path of length n ≥ 1 in a graph Γ is a sequence γ = e1 , . . . , en where
ei ∈ EΓ for i = 1, . . . , n and such that for all 1 ≤ i < n we have ω(ei ) = α(ei+1 ). We
denote the length n of γ as n = |γ| and also denote α(γ) := α(e1 ) and ω(γ) := ω(en ).
Also, for any vertex v ∈ V Γ we regard γ = v as an edge-path of length |γ| = 0 with
α(γ) = ω(γ) = v. An edge-path γ in Γ is called reduced if γ does not contain a
subpath of the form e, e−1 where e ∈ EΓ.
For a finite graph Γ (not necessarily connected), we denote by b(Γ) the first betti
number of Γ. If Γ is a graph and Γ0 ⊆ Γ is a subgraph, we denote by Γ/Γ0 the
graph obtained from Γ by collapsing every connected component of Γ0 to a vertex.
We will need the following elementary but useful lemma whose proof is left to
the reader:
Lemma 2.1. Let Γ be a finite graph and let Γ0 ⊆ Γ be a subgraph (not necessarily
connected). Then b(Γ) = b(Γ0 ) + b(Γ/Γ0 ).
If Γ is a connected non-contractible graph, the core of Γ, denoted by Core(Γ), is
the smallest connected subgraph Γ0 of Γ such that the inclusion map ι : Γ0 → Γ is a
homotopy equivalence. A connected graph Γ is called a core graph if Γ = Core(Γ).
Note that if Γ is a finite connected non-contractible graph then Γ is a core graph
if and only if for every v ∈ V Γ we have deg(v) ≥ 2. If Γ is a graph and v ∈ V Γ
a vertex then we call the pair (Γ, v) a core pair or a core graph with respect to v
if Γ contains no proper subgraph containing v such that the inclusion map is a
homotopy equivalence. Thus if (Γ, v) is a core graph then either Γ is a core graph
or Γ is obtained from a core graph Γ̄ by adding segment joining v and Γ̄.
Note that if f : ∆ → Γ is a morphism of graphs and if β = e1 , . . . , en is an
edge-path in ∆ of length n > 0 then f (β) := f (e1 ), . . . f (en ) is an edge-path in Γ
with |γ| = |β|. In this case we call β a lift of f (β) to ∆. Also, if u ∈ V ∆ and
v = f (u) ∈ V Γ then we call the length-0 path β = u a lift of the length-0 path
γ = v.
6
ILYA KAPOVICH AND RICHARD WEIDMANN
It is not hard to see that a graph morphism f : ∆ → Γ is a covering map (in
the standard topological sense) if and only if f is surjective and locally bijective.
It follows from the definitions that a surjective morphism f : ∆ → Γ is a covering
map if and only if for every vertex v ∈ V Γ, every edge-path γ in Γ with α(γ) = v
and every vertex u ∈ V ∆ with f (u) = v there exists a unique lift γ
e of γ such that
α(e
γ ) = u.
We will need to investigate the following weaker version of being a covering map:
Definition 2.2 (Path-surjective map). Let f : ∆ → Γ be a surjective morphism
of graphs. We say that f is path-surjective if for every reduced edge-path γ in Γ
there exists a lift γ
e of γ in ∆.
Let ∆ be a finite graph which contains at least one edge. A subgraph Λ of ∆
is an arc if ∆ is the image of a simple (possibly closed) edge-path γ = e1 , . . . , en ,
where n ≥ 1, such that for all 1 ≤ i < n the vertex ω(ei ) has degree 2 in ∆. If, in
addition, deg∆ (α(e1 )) 6= 2 and deg∆ (ω(en )) 6= 2, then Λ is called a maximal arc in
∆. An arc Λ in ∆ is semi-maximal if for the simple path γ = e1 , . . . , en defining Λ
either deg∆ (α(e1 )) 6= 2, deg∆ (ω(en )) = 2 or deg∆ (α(e1 )) = 2, deg∆ (ω(en )) 6= 2.
If ∆ is a finite connected graph with at least one edge and such that ∆ is
not a simplicially subdivided circle then every edge of ∆ is contained in a unique
maximal arc of ∆. Moreover in this case for every arc Λ of ∆ the simple edge-path
γ = e1 , . . . , en , whose image is equal to Λ, is unique up to inversion and the set of
its endpoints {α(e1 ), ω(en )} is uniquely determined by Λ.
3. A characterization of 2-sheeted covers of a rose
Definition 3.1 (Standard n-rose). For an integer n ≥ 1 we denote by Rn the
rose with n petals, i.e. the graph with a single vertex v0 and edge set ERn =
±1
{e±1
1 , . . . , en }. For 0 ≤ m < n we consider Rm as a subgraph of Rn in the obvious
way.
In this paper we will utilize some of the basic results about Stallings folds. We
refer the reader to [Sta, KM] for the relevant background information.
It is easy to explicitly characterize all the connected 2-fold covers of Rn . Namely,
a morphism p : Γ → Rn (where Γ is a connected graph) is a 2-fold cover if and only
if Γ has two distinct vertices v and w and for each i = 1, . . . , n there either exist
loop edges at v and w that map to ei or there exist two edges from v to w that
map to ei and e−1
i , respectively. The connectedness of Γ implies that for at least
one i the second option occurs.
e2
e1
e3
e1
e1
e3
p
e3
e2
e2
Figure 2. A 2-sheeted cover of R3
Note that if p : Γ → Rn is a morphism of graphs then p(V Γ) = {v0 } since Rn
is a graph with a single vertex v0 . Thus any such morphism p : Γ → Rn can be
NIELSEN EQUIVALENCE IN A CLASS OF RANDOM GROUPS
7
uniquely encoded by specifying for every edge e ∈ EΓ its “label” p(e) ∈ ERn =
±1
{e±1
1 , . . . , en }. Moreover, a labelling of EΓ by elements of ERn determines a
morphism if and only if this labeling respects edge inversion.
The main purpose of this section is to characterize 2-fold covers of Rn in terms
of path-surjective maps:
Theorem 3.2. Let Γ be a connected finite core graph, n ≥ 2 and p : Γ → Rn be a
path surjective morphism such that the following hold:
(1) Rn does not lift to Γ, i.e. there exists no morphism f : Rn → Γ such that
p ◦ f = idRn .
(2) b(Γ) ≤ 2n − 1.
Then p is a 2-sheeted covering map.
Note that it is easy to find a finite connected core graph Γ and a path-surjective
map p : Γ → Rn such that Γ does not contain a finite-sheeted cover of Rn . Indeed
taking Γ to be rose with (2n)(2n − 1) loops of length 2 and choosing f to be the
map that maps the (2n)(2n − 1) loops of Γ to the (2n)(2n − 1) distinct reduced
paths of length 2 in Rn does the trick. Thus the hypothesis on the Betti number
in Theorem 3.2 cannot be dropped. However, we do not know whether 2n − 1 is
the best possible lower bound.
Convention 3.3. For the remainder of this section we assume that n ≥ 2 and
p : Γ → Rn is as in Theorem 3.2. For any nonempty subset S ⊂ ERn let ΓS be the
subgraph of Γ formed by the edges that get mapped by p to some edge in S ∪ S −1 .
For S = {e} we will write Γe instead of Γ{e} . Note that for every e ∈ ERn we have
Γe = Γe−1 = Γ{e,e−1 } .
Lemma 3.4. The following hold:
(1) For every e ∈ {e1 , . . . , en } we have b(Γe ) ≥ 1.
(2) There exists e ∈ {e1 , . . . , en } such that b(Γe ) = 1.
Proof. To see that (1) holds let e ∈ ERn be arbitrary. Put k = |EΓ| + 1 and
consider the path γ := ek = e, . . . , e in Rn . Since p is path-surjective, there exists
| {z }
k times
a lift γ
e of γ to Γ, and, by definition of Γe , this path γ
e is contained in Γe . By the
choice of k the path γ
e contains at least two occurrences of the same oriented edge,
and hence γ
e contains a simple circuit embedded in Γe . Therefore b(Γe ) ≥ 1, as
claimed. Thus part (1) of the lemma is established.
Suppose now that part (2) fails. By part (1) this means that b(Γe ) ≥ 2 for every
e ∈ {e1 , . . . , en }. Since Γ = ∪ni=1 Γei , this implies that b(Γ) ≥ 2n, contrary to the
assumptions about Γ in Theorem 3.2. Thus part (2) of the lemma also holds.
In view of Lemma 3.4, after possibly permuting the indexing of the edges of Rn
we may assume that b(Γe1 ) = 1.
Lemma 3.5. There exists a permutation of {e1 , . . . , en } such that, after this permutation, for all k ∈ {1, . . . , n} we have
b(ΓSk ) ≤ 2k − 1
where Sk = {e1 , . . . , ek }.
Proof. The proof is by induction on k. As noted above, in view of Lemma 3.4 we
may assume that b(Γe1 ) = 1.
Suppose now that 2 ≤ k ≤ n and that we have already re-indexed the edges of
Rn so that b(ΓSi ) ≤ 2i − 1 for i = 1, . . . , k − 1. In particular, b(ΓSk−1 ) ≤ 2k − 3.
For 1 ≤ i < j ≤ n put Sij := {1, . . . , i} ∪ {j}.
8
ILYA KAPOVICH AND RICHARD WEIDMANN
Choose j ∈ {k, . . . , n} so that b(ΓS j
k−1
i
) = min{b(ΓSk−1
)|k ≤ i ≤ n}. Then re-
i
)
) ≤ b(ΓSk−1
index the edges ek , . . . , en so that j = k. Thus now b(ΓSk ) = b(ΓSk−1
k
for i = k, . . . , n.
By Lemma 2.1, we have
b(ΓSk ) − b(ΓSk−1 ) = b(ΓSk /ΓSk−1 ).
If b(ΓSk /ΓSk−1 ) ≤ 2 then b(Sk ) ≤ (2k − 3) + 2 = 2k − 1 and Sk has the properties
required by the lemma, completing the inductive step.
Thus suppose that b(ΓSk /ΓSk−1 ) ≥ 3. The minimality assumption in the choice
i
/ΓSk−1 ) ≥ 3. Thus for
of ek implies that for all i = k, . . . , n we have b(ΓSk−1
i = k, . . . , n the graph Γ/ΓSk−1 contains a graph of Betti number at least 3 all of
whose edges map to e±1
in Rn . Therefore
i
b(ΓSk /ΓSk−1 ) ≤ b(Γ/ΓSk−1 ) − 3(n − k).
Recall that by assumptions on Γ in Theorem 3.2 we have b(Γ) ≤ 2n − 1. Hence
b(ΓSk ) = b(ΓSk /ΓSk−1 ) + b(ΓSk−1 ) ≤ b(Γ/ΓSk−1 ) − 3(n − k) + b(ΓSk−1 ) =
= b(Γ) − 3(n − k) ≤ (2n − 1) − 3(n − k) ≤ 2k − 1,
as required. This completed the inductive step and the proof of the lemma.
Convention 3.6. For the remainder of the section we assume that the edges of
Rn are indexed so that b(Γe1 ) = 1 and that for every k = 1, . . . , n we have 1 ≤
b(ΓSk ) ≤ 2k − 1. Denote by Ce1 the unique embedded circuit in Γe1 and let Γ0e1 be
the component of Γe1 containing Ce1 .
For k = 1, . . . , n let ∆k be the core of the component of ΓSk containing Ce1 .
Thus b(∆k ) ≤ b(ΓSk ) ≤ 2k − 1.
Lemma 3.7. For every k = 1, . . . , n every reduced path γ in Rk lifts to a path in
∆k .
Proof. Let 1 ≤ k ≤ n and let γ be any reduced path in Rk . Choose , δ ∈ {−1, 1}
mδ
so that the path e1 γeδ1 is reduced. Put m = |EΓ| + 1. Thus γm = em
is a
1 γe1
reduced path in Rk . Since p : Γ → Rn is path-surjective, the path γm lifts to some
path γ
em in Γ. The choice of m implies that γ
em is contained in the component of
ΓSk containing Ce1 , that is, the component Y of ΓSk containing ∆k . Note that
∆k = core(Y ) and Ce1 ⊆ ∆k . Each of the two subpaths of γ
em corresponding to
mδ
the lifts of em
and
e
overlaps
C
and
hence
overlaps
core(Y
). Therefore the
e
1
1
1
portion of γ
em corresponding to the lift of γ is contained in core(Y ) = ∆k . Thus γ
lifts to ∆k , as claimed.
We now examine the properties of the graph ∆2 .
Proposition 3.8. One of the following holds:
(1) The restriction of p to ∆2 is a 2-sheeted cover onto R2 .
(2) R2 lifts to ∆2 .
Proof. Recall that Ce1 is the unique embedded circuit in Γe1 and that Γ0e1 is the
component of Γe1 containing Ce1 . Thus Ce1 is labelled by a power of e1 .
Note that there must exist a circuit Ce2 labeled by a power of e2 that lies in a
component Γ0e2 of Γe2 that intersects Γ0e1 in some (not necessarily unique) vertex v
as any path of type en1 en2 is assumed to lift to ΓS2 ⊂ Γ. We distinguish a number
of subcases, which cover all possibilities:
Subcase A: b(Γe2 ) = b(Γ0e2 ) = 2. In this case we have ∆2 ⊂ Γ0e1 ∪ Γ0e2 and
Γ0e1 ∩ Γ0e2 = {v} as ∆2 is a core graph with b(∆2 ) ≤ 3. It follows that R2 lifts to
NIELSEN EQUIVALENCE IN A CLASS OF RANDOM GROUPS
9
∆2 as by Lemma 3.7 the path e1 , e2 , e1 , e2 must have a lift which implies that for
i = 1, 2 there must be a loop edge based at v that is mapped to ei .
Subcase B: b(Γe2 ) = 2 and b(Γ0e2 ) = 1. Again we must have Γ0e1 ∩ Γ0e2 = {v} for
Betti number reasons. Moreover there exists a component Γ1e2 of Γe2 with Γ1e2 6= Γ0e2
and b(Γ1e2 ) = 1.
If Γ0e1 ∩ Γ1e2 = ∅ then any path of type en1 , en2 , en1 , en2 with n ≥ |EΓ| must lift to
∪ Γ0e2 as lifts are connected and any subpath eni must lift to a component of
Γei that contains a non-trivial circuit. Thus any path eni must lift to a closed path
in Γ0ei based at v for all n ≥ |EΓ|. As b(Γ0e1 ) = b(Γ0e2 ) = 1 this implies that Γ0ei
contains a loop edge based at v that is mapped to ei for i = 1, 2, thus R2 lifts to
∆2 .
If Γ0e1 ∩ Γ1e2 6= ∅ then Γ0e1 ∩ Γ1e2 must consist of a single vertex w for Betti
number reasons. Moreover we have ∆2 ⊂ Γ0e1 ∪ Γ0e2 ∪ Γ1e2 . By Lemma 3.7 the path
e1 , e2 , e1 , e2 , e1 , e2 , e1 lifts to ∆2 and the lifts of the occurrences of e2 must be loop
edges based at v or w. If the lifts of two consecutive occurrence of e2 are identical
then there must also be a loop edge mapped to e1 at the same base vertex and it
follows that R2 lifts. Otherwise there must be an edge from v to w and also an
edge from w to v that is mapped to e1 in which case the restriction of p to ∆2 is a
2-sheeted cover onto R2 .
Γ0e1
Subcase C: b(Γe2 ) = b(Γ0e2 ) = 1 and Γ0e1 ∩ Γ0e2 = {v}. In this case any path of
type en1 , en2 , en1 , en2 with n ≥ |EΓ| must lift to Γ0e1 ∪ Γ0e2 and we argue as in Subcase
B that R2 lifts.
Subcase D: b(Γe2 ) = b(Γ0e2 ) = 1 and Γ0e1 ∩ Γ0e2 = {v, w}.
If ∆2 contains no loop edge at v or w then there must be edges from v to w that
−1
−1 −1
map to e1 , e2 , e−1
1 and e2 as, by Lemma 3.7, the path e1 , e2 , e1 , e2 , e1 , e2 lifts
to ∆2 , and the lift must alternate between v and w. It follows that the restriction
of p to ∆2 is a 2-sheeted cover of R2 .
In the remaining case we assume by symmetry that Γ0e1 has a loop edge based
at v. We may assume that Γ0e2 does not have a loop edge based at v, otherwise
R2 lifts to ∆2 . Let now f be the unique edge of Γ0e1 ∩ ∆2 with α(f ) = w. Choose
ε ∈ {−1, 1} such that p(f ) = eε1 . It follows that any lift of eεn
1 for n ≥ |EΓ| to ∆2
terminates at v. As eεn
e
e
lifts
to
∆
and
as
there
is
no
loop
edge in Γ0e2 based
2
1 2 1
at v it follows that any lift of eεn
e
to
∆
must
terminate
at
w.
It
follows that the
2
1 2
−ε
path eεn
e
e
does
not
lift
to
∆
,
thus
this
case
does
not
occur.
2
1 2 1
Proof of Theorem 3.2. We claim that for 2 ≤ k ≤ n one of the following holds:
(1) The restriction of p to ∆k is a 2-sheeted cover onto Rk .
(2) Rk lifts to ∆k .
For k = n the above claim implies the statement of Theorem 3.2 since Γ =
core(Γ) = ∆n . Note that the claim above is false for k = 1.
We establish the claim by induction on k. The base case, k = 2, is exactly the
conclusion of Proposition 3.8.
Suppose now that 3 ≤ k ≤ n and that the claim has been verified for k − 1. Thus
we know that ∆k−1 is either a 2-sheeted cover of Rk−1 or that ∆k−1 contains a lift
of Rk−1 . In the first case we may moreover assume that there is an edge with label
e−1
1 and an edge with label e1 connecting the two vertices of ∆k−1 .
Subcase A: ∆k−1 contains a lift R̃k−1 of Rk−1 . If ∆k contains a loop edge at the
base vertex of R̃k−1 that is mapped to ek then ∆k contains a lift of Rk and there
is nothing to show. Thus we may assume that such a loop edge does not exist. We
will show that this yields a contradiction.
10
ILYA KAPOVICH AND RICHARD WEIDMANN
Let Γ1k be the core of the component of the subgraph Γ{e1 ,ek } containing the
unique loop edge mapped to e1 . Moreover let R1k be the subgraph of Rn consisting
±1
of the edge pairs e±1
1 and ek . By an argument similar to the proof of Lemma 3.7,
any path γ in R1k must lift to Γ1k . It now follows from the case k = 2 and the
fact that R1k does not lift to Γ that Γ1k is either a 2-sheeted cover of R1k or that
b(Γ1k ) ≥ 4. As Γ1k does not contain a second loop edge mapped to e1 it cannot be
a 2-sheeted cover, thus b(Γ1k ) ≥ 4. Let now Γ0 := Γ1k ∪ R̃k−1 . It follows that
b(Γ0 ) ≥ 4 + (k − 2) = k + 2.
Claim: For 2 ≤ i ≤ k − 1 either ∆k contains a circuit that maps to ei and that is
distinct from the loop in R̃k−1 or there exist two edges in E∆k − EΓ0 originating
at Γ0 that map to ei and e−1
i , respectively.
Proof of Claim: Suppose that no such circuit exists for some i ∈ {2, . . . k − 1}. We
need to show that for ε ∈ {−1, 1} there exists an edge in E∆k − EΓ0 originating
at Γ0 that maps to eεi . Suppose that ε ∈ {−1, 1} and that no such edge exists. It
ε·|EΓ|
follows that any lift of the path ei
must terminate at the base vertex v0 of R̃k−1
ε·|EΓ|
and any lift of ei
ek must terminate at a vertex distinct from v0 . This implies
ε·|EΓ|
that the path ei
ek eεi does not lift to ∆k , a contradiction. The claim follows.2
Now each additional circuit gives a contribution of at least 1 to the Betti number
and two edges originating at Γ0 do the same as we are looking at a core graph, thus
the loose ends must close up. It follows that
b(Γk ) ≥ b(Γ0 ) + (k − 2) = (k + 2) + (k − 2) = 2k
which gives the desired contradiction.
Subcase B: ∆k−1 is a 2-sheeted cover of Rk−1 and the edges with label e1 span
a circuit of length 2. It follows in particular that b(Γk−1 ) = 2k − 3.
Define Γ1k as in Subcase A, again we apply the case k = 2 to this graph. As Γ
contains no loop edge with label e1 and as for Betti number reasons b(Γ1k ) ≤ 3 it
follows that Γ1k is a 2-sheeted cover of R1k . It follows that Γ1k consists either of
a circuit of length two with label e1 , e1 and two loop edges with label ek or of two
circuits of length 2 with label e1 , e1 and ek , ek with common vertices. In both cases
it is immediate that ∆k−1 ∪ Γ1k is a 2-sheeted cover of Rk .
4. Lifting random paths in Rn
In this section all edges are geometric edges, i.e. edge pairs. Theorem 3.2 is only
used in this section, specifically in the proof of Theorem 4.3.
Definition 4.1. Let α ∈ [0, 1]. We say that a path γ in some graph Γ is α-injective
if γ crosses at least α · |γ| distinct topological edges. Thus γ is 1-injective if and
only if γ travels no topological edge twice. In other words, γ is α-injective if its
image is of volume at least α · |γ|.
Definition 4.2. Let Γ be a graph and let γ = e1 , . . . , ek be an edge-path in Γ.
We say that the edge ei is γ-injective if the topological edge of Γ corresponding
to ei is traversed by γ exactly once. Similarly, a subpath γ 0 = eq . . . er (where
1 ≤ q ≤ r ≤ k) of γ is γ-injective if for every i = q, . . . , r the edge ei is γ-injective.
Similarly, let Υ be a graph which is a topological segment subdivided into finitely
many edges, let Γ be a graph and let f : Υ → Γ be a graph map. We say that
an edge e of Υ is Υ-injective if for the edge-path γ determined by Υ the edge e is
γ-injective. An arc of Υ is Υ-injective if every edge of this arc is Υ-injective.
NIELSEN EQUIVALENCE IN A CLASS OF RANDOM GROUPS
11
In the following we denote the set of all reduced paths in Rn by Ω and the set
of all reduced paths of length N by ΩN . We further call a subset S ⊂ Ω generic if
N|
lim |S∩Ω
|ΩN | = 1. This definition of genericity agrees with the more detailed notions
N →∞
of genericity defined in Section 5 below.
Throughout this section we assume that n ≥ 2.
The purpose of this section is to establish the following theorem:
Theorem 4.3. Let α ∈ [0, 1). The set Ω of all reduced paths in Rn contains a
generic subset S such that the following holds:
Let s ∈ S and (Γ, v0 ) be a connected core graph with b(Γ) ≤ 2n − 1. Suppose
that f : Γ → Rn is a morphism such that Γ does not contain a finite subgraph Γ0
such that p|Γ0 : Γ0 → Rn is a covering (of degree 1 or 2). Then any lift s̃ of s is
α-injective.
Before we give the proof Theorem 4.3 we establish Proposition 4.4 and Proposition 4.8 which follow from elementary probabilistic considerations.
Proposition 4.4. For any ε > 0 there exists a constant L = L(ε, n) and a generic
subset S ⊂ Ω such that the following holds:
Suppose that s ∈ S and that γ is a path in Rn of length at least L such that γ
occurs as least twice as a subpath of s such that these two subpaths do not overlap.
Then the total length of any collection of non-overlapping subpaths of s that coincide
with γ is bounded from above by ε|s|.
For the remainder of this section, unless specified otherwise, we fix the following
conventions and notations.
Convention 4.5.
(1) Denote by ΩN the set of of all reduced paths of length N , endowed with the
uniform distribution. Let γ be a fixed path in Rn and put k := |γ|. Note that in
Rn there are exactly 2n(2n − 1)k−1 reduced paths of length k.
Now consider the random variable Y = Yγ,N : ΩN → R defined by
Yγ,N (s) := |γ| · max{l | s has l disjoint subpaths that coincide with γ}.
Thus Y assigns to any path s ∈ ΩN the total length of a maximal portion of s that
is covered by a collection of disjoint copies of γ. To prove Proposition 4.4 we will
need to estimate P (Y ≥ N ) from above. Our estimate will not depend on γ but
only on k = |γ|.
1
(2) Put p := (2n−1)
k . Note that for n ≥ 2 and k ≥ 1 we have 0 < 2p < 1. We
will also consider a random variable X = Xk that is binomially distributed with
parameters N and 2p.
In addition, let Ω0N = {0, 1}N with the distribution corresponding to performing
N independent tosses of a coin such that for a single toss the probability of the coin
landing ”heads” is 2p and of it landing ”tails” is 1 − 2p. Thus for a binary string
w ∈ Ω0N we have P (w) = (2p)t (1 − 2p)N −t where t is the number of 1’s in the string
w. Hence for every integer t ∈ [0, N ] P (Xk = t) is equal to the probability of the
event that a randomly chosen string w ∈ Ω0N contains exactly t entries 1.
(3) Consider the finite state Markov chain M generating freely reduced words in
Fn = F (a1 , . . . , an ). Thus the state set of M is Q = {a1 , . . . , an }±1 with transition
1
probabilities PM (a, b) = 2n−1
if a, b ∈ Q, b 6= a−1 and PM (a, b) = 0 if a, b ∈ Q
−1
and b = a . Note that M is an irreducible finite state Markov chain with the
stationary distribution being the uniform distribution on Q. Since n ≥ 2, whenever
a, b ∈ Q satisfy PM (a, b) > 0 then
1
4 1
3 1
(♣)
·
≤ PM (a, b) =
≤ ·
.
4 2n
2n − 1
3 2n
12
ILYA KAPOVICH AND RICHARD WEIDMANN
Lemma 4.6. There exists a constant C1 = C1 (n, ) ≥ 1 such that if k = |γ| ≥ C1
then for every N ≥ 1 and every integer t ∈ [0, N ] satisfying t ≥ N/k we have
(4/3)t pt ≤ (2p)t (1 − 2p)N .
Proof. Let n ≥ 2, N ≥ 1, k ≥ 1 be arbitrary integers and let > 0. Recall that
p = 1/(2n − 1)k and that 0 < 1 − 2p < 1.
Let t ∈ [0, N ] be an integer satisfying t ≥ N/k, clearly t ≥ 1. As t > 0 the
inequality (4/3)t pt ≤ (2p)t (1 − 2p)N is equivalent to (4/3)p ≤ 2p(1 − 2p)N/t which
in turn is equivalent to
(∗)
2/3 ≤ (1 − 2p)N/t .
Thus we need to show that (∗) holds provided k is sufficiently large. Since
t ≥ N/k, we have N/t ≤ k/. As 0 < 1 − 2p < 1, it follows that (1 − 2p)k/ ≤
(1 − 2p)N/t .
For fixed n and we have
k/
2
k→∞
(1 − 2p)k/ = 1 −
−−−−→ 1.
(2n − 1)k
Hence there exists a constant C1 = C1 (n, ) ≥ 1 such that for every k ≥ C1 we have
(1 − 2p)k/ ≥ 2/3. Then for any k ≥ C1
(1 − 2p)N/t ≥ (1 − 2p)k/ ≥ 2/3,
as required. Thus the lemma is proven.
Lemma 4.7. Let C1 = C1 (n, ) ≥ 1 be the constant provided by Lemma 4.6.
Suppose that k = |γ| ≥ C1 .
Then for every integer t ∈ [0, N ] such that t ≥ N/k we have
P (Yγ,N ≥ kt) ≤ P (Xk ≥ t).
Proof. For any integers 1 ≤ i1 < · · · < it ≤ N let V (i1 , . . . , it ) ⊆ ΩN be the event
that for s ∈ ΩN for each j = 1, . . . t the subpaths of s of length k starting in
positions i1 , . . . , it are equal to γ and that these subpaths do not overlap in s.
We first claim that for every tuple 1 ≤ i1 < · · · < it ≤ N we have
(♥)
P (V (i1 , . . . , it )) ≤ (4/3)t pt .
Note that the uniform distribution on ΩN is the same as the distribution on ΩN
obtained by taking the uniform distribution on Q, considered as giving the initial
letter of a word of length N , followed by applying the Markov chain M exactly
N − 1 times.
Choose a specific t-tuple 1 ≤ i1 < · · · < it ≤ N .
If N − it < k − 1, then the terminal segment of s starting with the letter in
position it has length < k and hence P (V (i1 , . . . , it )) = 0 ≤ (4/3)t pt . Similarly, if
there exists j such that ij − ij−1 ≤ k − 1 then the subpaths of s of length k starting
in positions ij−1 and ij overlap, and hence P (V (i1 , . . . , it )) = 0 ≤ (4/3)t pt . Thus
we assume that N − it ≥ k − 1 and that ij − ij−1 ≥ k. For similar reasons, we may
assume that whenever ij − ij−1 = k then the first letter of γ is not the inverse of
the last letter of γ since otherwise we again have P (V (i1 , . . . , it )) = 0.
By symmetry, the probability that the i1 -th letter of a random s ∈ ΩN is the
1
. Then, applying the Markov chain M defining
same as the first letter of γ is 2n
above we see that the probability of reading γ starting at letter number i1 in s is
1
1
1
equal to 2n(2n−1)
k−1 , so that P (V (i1 )) = 2n(2n−1)k−1 ≤ (2n−1)k = p.
Given that the event V (i1 ) occurred, consider the conditional distribution ν1 on
Q corresponding to the letter in s in the position i1 + k, i.e. the first letter in s
immediately after the last letter of the γ-subword that started in position i1 . By
NIELSEN EQUIVALENCE IN A CLASS OF RANDOM GROUPS
13
1
(♣) it follows that for every a ∈ Q we have ν1 (a) ≤ (4/3) 2n
. For each a ∈ Q let
Ha,i1 +k be the event that for an element of ΩN the letter in position i1 + k is a.
Let P (V (i2 )|Ha,i1 +k ) be the conditional probability of V (i2 ) given Ha,i1 +k . Then
the conditional probability of V (i1 , i2 ) given that V (i1 ) occurred can be computed
as
X
P (V (i1 , i2 )|V (i1 )) =
ν1 (a)P (V (i2 )|Ha,i1 +k ).
a∈Q
Also,
the unconditional probability P (V (i2 )) can be computed as P (V (i2 )) =
P
1
a∈Q 2n P (V (i2 )|Ha,i1 +k ). The same argument as the argument above for com1
1
puting P (V (i1 )) shows that P (V (i2 )) = 2n(2n−1)
k−1 ≤ (2n−1)k = p. Since for every
1
a ∈ Q we have ν1 (a) ≤ (4/3) 2n
, it follows that
X
P (V (i1 , i2 )|V (i1 )) =
ν1 (a)P (V (i2 )|Ha,i1 +k ) ≤
a∈Q
X 1
≤ (4/3)
P (V (i2 )|Ha,i1 +k ) = (4/3)P (V (i2 )) ≤ (4/3)p.
2n
a∈Q
Similarly, P (V (i1 , i2 , i3 )|V (i1 , i2 )) ≤ (4/3)p and, so on, up to
P (V (i1 , i2 , i3 , . . . , it )|V (i1 , i2 , . . . , it−1 )) ≤ (4/3)p.
Hence
P (V (i1 , . . . , it )) =
P (V (i1 ))P (V (i1 , i2 )|V (i1 )) . . . P (V (i1 , i2 , i3 , . . . , it )|V (i1 , i2 , . . . , it−1 ))
≤ (4/3)t−1 pt ≤ (4/3)t pt
as required. Thus (♥) is verified.
For 1 ≤ i1 < · · · < it ≤ N let W (i1 , . . . , it ) ⊆ Ω0N be the event that for a
binary string w ∈ Ω0N the digits in the positions i1 , . . . , it are equal to 1 and for
all j < it , j 6= i1 , . . . , it the digit in position j in w is 0. Then, by independence,
P (W (i1 , . . . , it )) = (2p)t (1 − 2p)it −t . Hence, by Lemma 4.6 and by (♥), we have
P (V (i1 , . . . , it )) ≤ (4/3)t pt ≤ (2p)t (1−2p)N ≤ (2p)t (1−2p)it −t = P (W (i1 , . . . , it )).
The event ”Yγ,N ≥ kt” is the (non-disjoint) union of events V (i1 , . . . , it ) taken
over all t-tuples 1 ≤ i1 < · · · < it ≤ N . Also, the event that w ∈ Ω0N has at
least t digits 1 is the disjoint union of W (i1 , . . . , it ), again taken over all t-tuples
1 ≤ i1 < · · · < it ≤ N . Therefore
X
P (Yγ,N ≥ kt) ≤
P (V (i1 , . . . , it )) ≤
1≤i1 <···<it ≤N
X
P (W (i1 , . . . , it )) = P (Xk ≥ t),
1≤i1 <···<it ≤N
as required. This completes the proof of Lemma 4.7.
Having established Lemma 4.6 and Lemma 4.7, we can now prove Proposition 4.4.
Proof of Proposition 4.4. Mean and variance for kXk are given by
2
µ(kXk ) = k · µ(Xk ) = k · N · 2p = k · N ·
(2n − 1)k
and
var(kXk ) = k 2 · var(Xk ) = k 2 · N · 2p · (1 − 2p) =
2
2
2
= k2 · N ·
· (1 −
) < k2 · N ·
.
k
k
(2n − 1)
(2n − 1)
(2n − 1)k
14
ILYA KAPOVICH AND RICHARD WEIDMANN
Choose L > C1 (n, ) such that µ(kXk ) ≤ 2 · N for all k ≥ L. It now follows
from Lemma 4.7 and the Chebyshev inequality (as N > 2 N ≥ µ(kXk )) that for
any reduced path γ with |γ| = k ≥ L we have
P (Yγ,N ≥ N ) ≤ P (Xk ≥
var(kXk )
N
≤
) = P (kXk ≥ N ) ≤
k
(N − µ(kXk ))2
8
k 2 · N · (2n−1)
k
4 · var(kXk )
var(kXk )
k2
8
=
≤
≤
=
.
·
(N − 2 N )2
(N )2
2 N 2
2 N (2n − 1)k
By Proposition 2.2 of [M] we know that we can assume that no path γ of length
11
occurs twice in a random word of length
greater than C0 ln(N ) with C0 = ln(2n−1)
N . Thus we only need to sum up the probabilities for all paths γ of length up to
C0 ln(N ). Thus, taking into account that for each k there are only 2n(2n − 1)k−1
words to consider, the probability that a path of length at least L and at most
C0 ln(N ) covers the portion · N of a path of ΩN is bounded from above by
C0 ln(N )
X
2n(2n − 1)k−1 ·
k=L
16n
8
k2
=
·
2
k
N (2n − 1)
(2n − 1)2 N
C0 ln(N )
X
k2 ≤
k=L
16n
· (C0 ln(N ))3 .
≤
(2n − 1)2 N
Now this number converges to 0 as N tends to infinity which proves the proposition.
Proposition 4.8. Let α ∈ (0, 1] and γ be a reduced path in Rn . There exists a
constant δ > 0 and a generic subset Sγ ⊂ Ω such that the following hold:
If s ∈ Sγ can be written as a reduced product s = s0 t1 s1 · . . . · tq sq such that
(1) ti does not contain γ as a subpath for 1 ≤ i ≤ q and
q
P
(2)
|ti | ≥ α · |s|.
i=1
Then q ≥ δ · |s|
Proof. The idea of the proof is simple: As an average subpath of a generic path
that doesn’t contain γ as a subpath must be short, i.e. bounded in terms of n and
γ, and as the ti cover a definite portion of s it follows that q must be large is |s| is
large.
We sketch a proof but omit some of the details for brevity. Suppose that γ is
1
a reduced path of length k in Rn . Let p = 2n(2n−1)
k−1 . For any j ∈ N≥1 let f (j)
be the probability that in a random semi-infinite reduced path in Rn , a subpath
between two consecutive non-overlapping occurrences of γ is of length j.
This defines a probability distribution f on N≥1 . This distribution is essentially
geometric as the probability f (l + k − 1) is approximately (1 − p)l . Note that this
calculation ignores the fact that the events that distinct subpaths are of type γ are
(slightly) correlated. It follows in particular that the probability distribution f has
∞
∞
P
P
finite mean, i.e that the series
j · f (j) converges. Put µ :=
j · f (j) and choose
j=1
j0 ∈ N with j0 > 100k such that
∞
X
j=j0
j=1
j · f (j) ≤
α
µ.
10
Let now s ∈ Ω. We consider the collection of subpaths that make up the complement of the union of all subpath of s that are of type γ; we call these subpaths γcomplementary. Then there exists a generic subset Ω0 ⊆ Ω such that for any s ∈ Ω0
the collection of γ-complementary subsets is non-empty. For each s ∈ Ω0 we obtain
NIELSEN EQUIVALENCE IN A CLASS OF RANDOM GROUPS
15
a probability distribution fs on N≥1 where fs (j) is the number of γ-complementary
subpaths of length j in s divided by the total number of γ-complementary subpaths
ns , i.e. fs is the relative frequency of γ-complementary subpaths of length j in s.
Then we have
∞
X
ns ·
j · fs (j) ≤ |s|
j=1
as the sum on the left is just the number of edges of s that lie in the γ-complementary
subpaths of s.
Claim: There exists some generic subset S ⊆ Ω0 ⊆ Ω such that for every s ∈ S we
have
∞
∞
X
α X
j · fs (j).
ns ·
j · fs (j) ≤ ns · ·
5 j=1
j=j
0
To verify the claim note first that it can be shown using the law of large numbers,
that there exists β ∈ [0, 1) such that for any > 0 there exists a generic set S such
that the following hold:
(1) For any s ∈ S
∞
X
(β − )|s| ≤ ns ·
j · fs (j) ≤ (β + )|s|.
j=1
(2) For any j ∈ {1, . . . j0 − 1} and s ∈ S we have
j · f (j)
j · f (j)
· |s| ≤ ns · j · fs (j) ≤ (β + ε) ·
· |s|.
µ
µ
Indeed, the first assertion states for a generic path s the γ-complementary paths
of s cover roughly a fixed portion β of s, i.e. their total length is roughly β|s|. The
second assertion states that out of this γ-complementary portion of total length β|s|,
the portion that consists of γ-complementary path of length j is roughly j·fµ(j) , i.e.
(β − ε) ·
that total length of the γ-complementary paths of length j is roughly
This conclusion follows from the definition of f and µ.
Using (2) we get that for any s ∈ S we have
|s| ·
jX
0 −1
(β − ε) ·
j=1
j·f (j)
µ
· |s|.
jX
jX
0 −1
0 −1
j · f (j)
j · f (j)
≤
ns · j · fs (j) ≤ |s| ·
(β + ε) ·
.
µ
µ
j=1
j=1
It follows that
ns ·
∞
X
j=j0
j · fs (j) = ns ·
∞
X
j=1
j · fs (j) − ns ·
jX
0 −1
j · fs (j) ≤
j=1
j0 −1
β− X
β−
α
≤ |s| · (β + ) − |s| ·
·
j · f (j) ≤ |s| β + −
(1 − ) · µ ≤
µ
µ
10
j=1
αβ
α
≤ |s| ·
+ 2−
.
10
10
For sufficiently small we further have
∞
X
αβ
α
α
α
|s| ·
+ 2−
≤ (β − ) · |s| ≤ · ns ·
j · fs (j)
10
10
5
5
j=1
which proves the claim.
Let now s ∈ S and suppose that s = s0 t1 s1 · . . . · tq sq is as in the formulation of
the lemma. Note that for 1 ≤ i ≤ q either |ti | ≤ 2k − 2 or ti contains a subpath
t0i of length at least |ti | − 2k + 2 such that t0i is contained in a γ-complementary
16
ILYA KAPOVICH AND RICHARD WEIDMANN
subpath of s. It follows from the claim that the total length of all γ-complementary
subpaths of s of length greater than j0 is bounded from above by
ns ·
∞
X
j=j0
j · fs (j) ≤ ns ·
∞
α X
α
·
j · fs (j) ≤ · |s|.
5 j=1
5
Thus the sum of the lengths of those ti that contain a subpath of a γ-complementary
subpath of length at least j0 is bounded by
102k α
α
j0 + 2k α
· · |s| ≤
· · |s| ≤ · |s|.
j0
5
100k 5
4
It follows the sum of the length of those ti that are of length at most j0 + 2k
must be at least 3α
4 · |s| thus there must be at least
1
3α
3α
·
· |s| =
· |s|
j0 + 2k 4
4j0 + 8k
such edges. Thus the conclusion of the lemma holds for δ :=
3α
4j0 +8k .
We can now give the proof of the main result of this section.
Proof of Theorem 4.3. Put β := 1 − α. Recall that in Subsection 2.2 we introduced
the notion of arcs, maximal arcs and semi-maximal arcs in a finite graph. Note
that it suffices to consider core pairs (Γ, v0 ) with b(Γ) = 2n − 1 as we can otherwise
embed (Γ, v0 ) into a core pair (Γ0 , v0 ) with b(Γ0 ) = 2n − 1 that still satisfies the
hypothesis of Theorem 4.3 and the conclusion for (Γ0 , v0 ) then implies the conclusion
for (Γ, v0 ).
Note that if ∆ is a finite connected core graph with first Betti number m ≥ 2,
then ∆ has no degree-1 vertices and ∆ is the union of at most 3m − 3 maximal
arcs (which are obtained but cutting ∆ open at all vertices of degree ≥ 3). Also, if
(∆, v0 ) is a finite connected core pair with first Betti number m ≥ 2, then ∆ is the
union of at most 3m − 1 maximal arcs.
Now let (Γ, v0 ) be as in Theorem 4.3 with b(Γ) = 2n−1 ≥ 3. As (Γ, v0 ) is a finite
connected core graph the above remark implies that Γ decomposes as the union of at
most 3(2n − 1) − 1 = 6n − 4 distinct maximal arcs. If γ is a non-degenerate reduced
edge-path in Γ then after possibly subdividing the maximal arcs of Γ containing
endpoints of γ along those endpoints, we obtain a decomposition of Γ as the union
of distinct pairwise non-overlapping arcs Λ1 , . . . Λt such that t ≤ 6n − 2 < 6n and
such that γ admits a unique decomposition as a concatenation of simple (and hence
reduced) edge-paths
γ = γ0 γ1 . . . γr
such that for each i = 0, . . . , r there exists y(i) ≤ t such that the image of γi is equal
to the arc Λy(i) . Note that since the arcs Λ1 , . . . Λt are non-overlapping, for every
i, j ∈ {0, . . . , r} either γi = γj±1 or the paths γi and γi have no to topological edges
in common. We call the above factorization of γ the canonical arc decomposition
of γ. We also call the arcs Λ1 , . . . Λt the arc components of Γ adapted to γ.
Claim A. We will show that there exist constants `0 , `1 , . . . , `2n and generic sets
S2n ⊆ S2n−1 · · · ⊆ S1 ⊆ S0 ⊆ Ω
that only depend on n and α such that the following hold:
If k ∈ {0, 1, . . . , 2n}, s ∈ Sk , (Γ, v0 ) and f : Γ → Rn as in the statement of
the theorem with b(Γ) = 2n − 1 then for any non-α-injective lift s̃ of s there exist
connected subgraphs Γ0 ⊂ Γ1 ⊂ . . . ⊂ Γk of Γ with the following properties:
(1) The volume of Γi is bounded by above by `i for 0 ≤ i ≤ k.
(2) b(Γi ) ≥ i for 0 ≤ i ≤ k.
NIELSEN EQUIVALENCE IN A CLASS OF RANDOM GROUPS
(3) If s̃ = e1 . . . eN then #{i|ei ∈ EΓ0 } ≥
β·N
6n
=
17
β·|s|
6n .
Note that for k = 2n this claim implies the theorem. Indeed it implies that the
generic set S := S2n has the property that for any s ∈ S any lift s̃ is α-injective as
a non-α-injective lift would imply the existence of a subgraphs of Γ of Betti number
2n which is impossible.
The proof of Claim A is by induction on k.
β
β
and let S and L = L(ε, n) = L( 6n
, n) be as in
The case k = 0. Let ε = 6n
the conclusion of Proposition 4.4. We will show that the claim holds for `0 := L
and S0 := S. Let s ∈ S0 , f : Γ → Rn as in the statement of Theorem 4.3, and let
s̃ a non-α-injective lift of s. As s̃ is not α-injective, it traverses fewer than α · |s|
distinct topological edges. This implies that there is a collection of subpaths of s̃
of total length at least β · |s| such that the image of these subpaths consists of all
the topological edges visited at least twice by s̃.
Since s is reduced and s̃ is a lift of s, the path s̃ is reduced as well. Let Λ1 , . . . , Λt ,
where t ≤ 6n, the the arc components of Γ adapted to s̃ and consider the canonical
arc decomposition of s̃. Then the union of topological edges visited at least twice by
s̃ is the union of some of the arcs Λi . Since t ≤ 6n, there exists i0 ≤ t such that the
subpaths of s̃ that map to Λi0 are of total length at least β·|s|
6n and that the number
of such subpaths is at least 2. It follows from the conclusion of Proposition 4.4 that
Λi0 has length at most L. Thus Claim A follows by choosing Γ0 = Λi0 and putting
`0 = L. Note that this choice of `0 is independent of the map f : Γ → Rn and s.
The case k ≥ 1. By induction we already have the constants `0 , . . . , `k−1 and
a generic set Sk−1 such that for any s ∈ Sk−1 and any non-α-injective lift s̃ of
s there exist subgraphs Γ0 ⊂ Γ1 ⊂ . . . ⊂ Γk−1 with the properties specified in
Claim A. Note that since the volume of Γk−1 is ≤ `k−1 , there are only finitely
many possibilities for Γk−1 and for the map f |Γk−1 : Γk−1 → Rn .
Claim B. We will now show that for any pair P := (Θ, pΘ ) consisting of a
graph Θ and a morphism pΘ : Θ → Rn there exists a constant `P and a generic set
SP ⊂ Sk−1 such that the following hold:
Suppose that f : Γ → Rn is as above, s ∈ SP , s̃ is a non-α-injective lift. Let Γk−1
be the subgraph of Γ whose existence is guaranteed by the induction hypothesis. If
P = (Γk−1 , f |Γk−1 ) then there exists a subgraph Γk of Γ containing Γk−1 such that
b(Γk ) > b(Γk−1 ) and that the volume of Γk is bounded by `P .
As there are only finitely many possibilities for P and as the intersection of
finitely many generic sets is generic, the conclusion of the inductive step for Claim A
follows from Claim B by taking `k to be the maximum of all occurring `P and taking
Sk to be the intersection of all SP .
To establish Claim B we need to show the existence of SP and `P for a fixed
pair P . Thus assume that f : Γ → Rn is as above, s ∈ Sk−1 , s̃ is a non-α-injective
lift and Γk−1 is as in the conclusion of the claim in the case k − 1 for s such that
P = (Γk−1 , f |Γk−1 ). By Theorem 3.2 there is a path γP in Rn that does not lift to
Γk−1 . Now write s̃ as a product
s0 t1 s1 · . . . · tq sq
where the ti are the path travelled in Γk−1 and where for 0 < i < q si is a nontrivial
(reduced) edge-path which does not pass through any edges of Γk−1 . Then the paths
ti do not contain a subpath that maps to γP as we assume that γP does not lift to
18
ILYA KAPOVICH AND RICHARD WEIDMANN
Γk−1 . The choice of Γ0 (see condition (3) above) implies that
q
X
i=1
|ti | ≥
β
· |s|.
6n
Proposition 4.8 implies that if s lies in the generic set SγP then q ≥ δ · |s| where
δ only depends on γP , n and α. By removing a finite subset from SγP (which
does not affect genericity of SγP ) we may assume that for every s ∈ SγP we have
δ|s| − 1 ≥ 1.
Then it follows that for the above decomposition of s̃ there exists i ∈ {1, . . . , q−1}
such that |si | ≤ |s|/(δ|s|−1). Indeed, if for all i = 1, . . . , q−1 |si | > |s|/(δ|s|−1) > 0
then
|s| ≥
q−1
X
|si | > (q − 1)|s|/(δ|s| − 1) ≥ (δ|s| − 1)|s|/(δ|s| − 1) = |s|
i=1
which is a contradiction.
Thus we can find i0 ∈ {1, . . . , q − 1} such that |si0 | ≤ |s|/(δ|s| − 1). Since
limN →∞ N/(δN − 1) = 1/δ > 0, by removing a finite set from SγP we may assume
that for every s ∈ SγP we have |s|/(δ|s|−1) ≤ 2/δ. Thus |si0 | ≤ |s|/(δ|s|−1) ≤ 2/δ.
By construction, the initial and terminal vertices of si0 are in Γk−1 = Θ, but
si0 does not traverse any edges of Γk−1 . Therefore for Γk := Γk−1 ∪ si0 we have
b(Γk ) ≥ b(Γk−1 ) + 1 ≥ (k − 1) + 1 = k. Thus the claim follows by taking `P :=
`k−1 + 2δ and SP = Sk−1 ∩ SγP . Thus Claim B is verified, which completes the
proof of Theorem 4.3.
5. Words representing bi .
Recall that we consider groups given by presentations of type
G = ha1 , . . . , an , b1 , . . . , bn |ai = ui (b), bi = vi (a)i
(*)
where n ≥ 2 and the ui and vi are freely reduced words of length N for some (large)
±1
by
N . If we now take the word/relator a−1
i ui (b) and replace all occurrences of bi
±1
vi (a) we obtain a relator in the ai . We denote by Ui the word obtained from this
word by free and cyclic cancellation. A simple application of Tietze transformations
shows that
G = ha1 , . . . , an | U1 , . . . , Un i.
(**)
We need an appropriate notion of genericity when working with groups given by
presentation (*). For A = {a1 , . . . , an }, with n ≥ 2, we think of F (A) as the set of
all freely reduced words over A±1 and we use the same convention for F (B) where
B = {b1 , . . . , bn }. Thus for N ≥ 1 there are exactly 2n(2n − 1)N −1 elements of
length N in F (A) (and same for F (B)). For N ≥ 1 we denote by T (A, N ) the set of
all n-tuples (v1 , . . . , vn ) ∈ F (A) such that |v1 | = · · · = |vn | = N . Similarly, T (B, N )
denotes the set of all n-tuples (u1 , . . . , un ) ∈ F (B) such that |u1 | = · · · = |un | = N .
Thus for every N ≥ 1 we have
n
#T (A, N ) = #T (B, N ) = 2n(2n − 1)N −1 = (2n)n (2n − 1)n(N −1) .
We denote by T (A, B, N ) the set of all 2n-tuples (v1 , . . . , vn , u1 , . . . , un ) such
that (v1 , . . . , vn ) ∈ T (A, N ) and (u1 , . . . , un ) ∈ T (B, N ). We also set T (A) =
∞
∞
∪∞
N =1 T (A, N ), T (B) = ∪N =1 T (B, N ) and T (A, B) = ∪N =1 T (A, B, N ).
Definition 5.1 (Generic sets). A subset S ⊆ F (A) is generic in F (A) if
lim
N →∞
#{v ∈ S : |v| = N }
#{v ∈ S : |v| = N }
= lim
=1
N
→∞
#{v ∈ F (A) : |v| = N }
2n(2n − 1)N −1
NIELSEN EQUIVALENCE IN A CLASS OF RANDOM GROUPS
19
A property of elements of F (A) is said to hold generically if the set of all v ∈ F (A)
satisfying this property is a generic subset of F (A).
A subset Y ⊆ T (A) is called generic in T (A) if
lim
N →∞
#(Y ∩ T (A, N ))
#(Y ∩ T (A, N ))
= lim
=1
N
→∞
#T (A, N )
(2n)n (2n − 1)n(N −1)
The notions of genericity for subsets of F (B) and of T (B) are defined similarly.
A subset T ⊆ T (A, B) is called generic if
#(T ∩ T (A, B, N ))
#(T ∩ T (A, B, N ))
= 1.
= lim
N →∞
N →∞ (2n)2n (2n − 1)2n(N −1)
#T (A, B, N )
lim
Definition 5.2 (Genericity for presentations).
We say that some property P for groups given by presentation (*) holds generically if the set TP of all (v1 , . . . , vn , u1 , . . . , un ) ∈ T (A, B), such that the group
G = ha1 , . . . , an , b1 , . . . , bn |ai = ui , bi = vi , for i = 1, . . . , ni satisfies P, is a generic
subset of T (A, B).
The following fact is a straightforward consequence of known results about genericity. Lemma 5.3 below is essentially a reformulation of the fact that a generic presentation with a fixed number of generators and a fixed number of defining relations
satisfies arbitrarily strong small C 0 (λ) cancellation condition, see [AO, A, KS, M].
Lemma 5.3. Let 0 < α < 1 be arbitrary. Then there is a generic subset T ⊆
T (A, B) such that for every τ = (v1 , . . . , vn , u1 , . . . , un ) ∈ T with |v1 | = · · · =
|vn | = |u1 | = · · · = |vn | = N the following hold:
For every freely reduced z ∈ F (A) with |z| ≥ αN there exists at most one i ∈
{1, . . . , n} and at most one ∈ {1, −1} such that z is a subword of vi . Moreover,
in this case there is at most one occurrence of z inside vi . Also, the same property
holds for every freely reduced z 0 ∈ F (B) with |z 0 | ≥ αN with respect to the words
u1 , . . . , un .
Lemma 5.3 implies in particular that generically there is very little cancellation
between the vi (a)±1 , and thus Ui is essentially just the concatenation of the vi (a)±1
introduced. The following statement is a straightforward consequence of standard
small cancellation arguments; see [AO, A, KS, M] for similar arguments.
Lemma 5.4. Generically the following hold:
1
(1) |Ui | ≥ N 2 (1 − 1010
n ) for 1 ≤ i ≤ n.
2ε1
1
(2) If W is a subword of length N 2 · 1010
and Uj2ε2 whose initial
n of both Ui
2ε1
2ε2
letter lies in the first half of Ui , respectively Uj , then i = j, ε1 = ε2
and the two occurrences of W in Uiε1 coincide, i.e. start at the same letter
of Uiε1 .
We refer the reader to [LS, O, Str] for basic results of small cancellation theory
and basic properties of small cancellation groups.
Lemma 5.3 implies that for any fixed L ≥ 1, generically, the above presentation
(*) is a C 0 ( L1 )-small cancellation presentation (note that the defining relations in
(*) are already cyclically reduced). This implies that for any α ∈ [0, 1) we may
assume that for any word in the a±1
and b±1
that represents the trivial element
i
i
in G there exists a subword R such that |R| ≥ α|RT −1 | where RT −1 is a cyclic
conjugate of a defining relator. In this case we call the process that replaces the
subword R by (its complementary word) T an α-small cancellation move (relative
to the relator RT −1 ). We will also consider α-small cancellation moves relative
to relators that are not cyclic conjugates of defining relators of (*); in particular
relative to the Ui , the defining relators of (**).
20
ILYA KAPOVICH AND RICHARD WEIDMANN
Lemma 5.5. Let α ∈ [0, 1). Let w be a reduced word in the a±1
such that w =G bi .
i
Then for generic G either w = vi or w admits a α-small cancellation move relative
to some cyclic conjugate of some Ui±1 .
In particular w can be transformed into vi by applying finitely many α-small
cancellation moves relative to cyclic conjugates of the relators Ui±1 and by free
cancellation.
Proof. This lemma can also be proven using the small cancellation properties of
(**); however we argue using the presentation (*).
The above discussion implies that the word b−1
i w can be transformed into the
trivial word by replacing subwords that are almost whole relators by the complementary word of the relator. If w 6= vi then this process can initially only involve
small cancellation moves relative to the relators b−1
i vi (a) as w is a word in the ai
and therefore b−1
w
does
not
contain
long
subwords
of the relators a−1
i
i ui (b).
±1
These initial moves introduce letters of type bj and possible remove the initial
±1
letter b−1
that were introi . Subsequent move of that type cannot remove the bj
duced as otherwise the original word w would have been non-reduced contradicting
the hypothesis.
We perform these moves as long as possible, in the end we must have a long word
in the bi with at most one ai in between that allows for a small cancellation move
with respect to some relation a−1
i ui (b) but then before the original moves almost
all of a cyclic conjugate of Ui must have occurred as a subword, indeed the origianl
subword can be obtainded by resubstituing the vi (a) for the bi , which gives almost
all of some Ui by definition of the Ui .
We also need to establish several basic algebraic properties of groups G given by
generic presentation (*). The proof of the following theorem follows the argument
of Arzhantseva and Ol’shanskii [AO, A] (see also [KS]).
Theorem 5.6. Let n ≥ 2. Then for the group G given by a generic presentation
(*) the following hold:
(1) Every subgroup of G, generated by ≤ n − 1 elements of G, is free.
(2) rank(G) = n.
(3) G is torsion-free, word-hyperbolic and one-ended.
Proof. By genericity of (*), given any 0 < λ < 1 we may assume that (∗) satisfies
the C 0 (λ) small cancellation condition.
(1) Choose a subgroup H ≤ G of rank ≤ n − 1. Thus H = hh1 , . . . , hk i ≤ G for
some h1 , . . . , hk ∈ G such that k ≤ n − 1.
Therefore there exists a finite connected graph Γ (e.g. a wedge of k circles labelled
by reduced words in A ∪ B representing h1 , . . . , hk ) with positively oriented edges
labelled by elements of A ∪ B such that the first Betti number of Γ is ≤ k and
such that for the natural “labeling homomorphism” µ : π1 (Γ) → G the subgroup
µ(π1 (Γ)) ≤ G is conjugate to H in G. Among all such graphs choose the graph Γ
with the smallest number of edges. Then, by minimality Γ is a folded core graph.
Since b(Γ) ≤ n − 1, Theorem 4.3 is applicable to Γ.
If µ : π1 (Γ) → G is injective, then H ∼
= π1 (Γ) is free, as required. Suppose
therefore that µ is non-injective. Then there exists a nontrivial closed circuit in Γ
whose label is a cyclically reduced word equal to 1 in G. Therefore there exists a
path γ̂ in Γ such that the label ẑ of γ̂ is a subword of some a cyclic permutation of
some defining relation r of (*) and that |ẑ| ≥ (1 − 3λ)|r| ≥ (1 − 3λ)N .
Without loss of generality, and up to a possible re-indexing, we may assume that
r is a cyclic permutation of b−1
1 v1 (a). Then ẑ contains a subword z such that z is
NIELSEN EQUIVALENCE IN A CLASS OF RANDOM GROUPS
21
also a subword of v1 and that |z| ≥ ( 12 − 32 λ)|r| − 1. Thus we may assume that
9
|z| ≥ 20
|r|.
Let γ be the subpath of γ̂ corresponding to the occurrence of z in ẑ. This implies
9
|r|, so that |r| ≤ 20
that |γ| = |z| ≥ 20
9 |γ|.
By genericity of (*) and by Theorem 4.3 we may assume, given an arbitrary
0 < α0 < 1, that γ̂ is α0 -injective. Since γ comprises almost a half of γ̂, it follows
that almost all edges of γ are γ̂-injective. Therefore, for any fixed 0 < α < 1,
no matter how close to 1, we may assume that the portion of γ corresponding to
γ̂-injective edges of γ covers the length ≥ α|γ|. We choose 0 < α < 1 and 0 < λ < 1
so that (9n − 12)λ 20
9 < α.
There are at most 3(n − 1) − 3 = 3n − 6 maximal arcs of Γ. These maximal
0
arcs subdivide γ as a concatenation of non-degenerate arcs γ = γ00 γ10 . . . γm
where
0
0
for i 6= 0, m γi is a maximal arc of Γ and for i = 0, m γi is either maximal or
0
semi-maximal arc in Γ. The paths γ00 and γm
may, a priori, overlap in Γ which
0
happens if the initial vertex of γ is contained in the interior of γm
and the terminal
0
0
0
vertex of γ is contained in the interior of γ0 . By subdividing γ0 and γm
along the
initial and terminal vertices of γ if needed, we obtain a decomposition of γ as a
concatenation of nondegenerate arcs of Γ
γ = γ 0 . . . γk
such that for 2 ≤ i ≤ k − 3 the path γi is a maximal arc of Γ and such that for i 6= j
either γi = γj±1 or γi and γj have no topological edges in common. Let τ1 , . . . , τq be
all the distinct arcs in Γ given by the paths γ0 . . . γk Since Γ has ≤ 3n − 6 maximal
arcs, we have q ≤ 3n − 4. Recall that the sum of the lengths of γi such that the arc
γi is γ̂-injective, is ≥ α|γ|.
Suppose first that there exists i0 such that γi0 is γ̂-injective and that |γi0 | > 3λ|r|.
Then we remove the arc corresponding to γi0 from Γ and add an arc τ from the
terminal vertex of γ̂ to the initial vertex of γ̂ with label ŷ such that ẑ ŷ is a cyclic
permutation of r. Thus |ŷ| = |τ | < 3λ|r|. Denote the new graph by Γ0 . Then the
image of the labelling homomorphism π1 (Γ0 ) → G is still conjugate to H, but the
number of edges in Γ0 is smaller than the number of edges in Γ. This contradicts
the minimal choice of Γ. Therefore no i0 as above exists.
Thus for every i such that γi is a γ̂-injective arc we have |γi | ≤ 3λ|r|. Hence the
total length covered by the γ̂-injective γi is
≤ (3n − 4) · 3λ|r| ≤ (9n − 12)λ
20
|γ| < α|γ|,
9
yielding a contradiction.
Therefore µ : π1 (Γ) → G is injective, and H ∼
= π1 (Γ) is free, as required.
(2) From presentation(*) we see that G = ha1 , . . . , an i. Thus rank(G) ≤ n.
Suppose that k := rank(G) < n. Then, by part (1), G is free of rank k < n.
Hence there exists a graph Γ with edges labelled by elements of A ∪ B such
that the first betti number of Γ is ≤ k and such that the image of the labelling
homomorphism µ : π1 (Γ) → G is equal to G. Among all such graphs choose Γ with
the smallest number of edges. By minimality, Γ is a folded core graph.
Since the first betti number of Γ is ≤ k < n, there exists a letter x ∈ A ∪ B
such that Γ has no loop-edge labelled by x. Without loss of generality we may
assume that x = a1 . Since the image of µ is equal to G, there exists a reduced
path γ̃ in Γ of length > 2 whose label z̃ is a freely reduced word equal to a1 in
−1
G. Thus z̃a−1
is freely reduced, it follows
1 =G 1. Whether or not the word z̃a1
that γ̃ contains a subpath γ with label z such that z is also a subpath of a cyclic
permutation of some defining relation r of (*) with |γ| = |z| ≥ (1 − 3λ)|r| − 1. Then
22
ILYA KAPOVICH AND RICHARD WEIDMANN
exactly the same argument as in the proof of (1) yields a contradiction with the
minimal choice of Γ.
Thus rank(G) < n is impossible, so that rank(G) ≥ n. Since we have already
seen that rank(G) ≤ n, it follows that rank(G) = n, as required.
(3) The group G is given by presentation (**) as a proper quotient of Fn . Since
Fn is Hopfian, it follows that G is not isomorphic to Fn . The fact that rank(G) = n
implies that G is not isomorphic to Fr for any 1 ≤ r ≤ n − 1. Thus G is not free.
Also, since (*) is a C 0 (1/6) small cancellation presentation for G where the
defining relators are not proper powers, basic small cancellation theory [LS] implies
that G is a torsion-free non-elementary word-hyperbolic group.
We claim that G is one-ended. Indeed, suppose not. Since G is torsion free and
not cyclic, Stalling’s theorem then implies that G is freely decomposable, that is G =
G1 ∗ G2 where both G1 and G2 are nontrivial. Therefore by Grushko’s Theorem,
n = rank(G) = rank(G1 ) + rank(G2 ) and hence 1 ≤ rank(G1 ), rank(G2 ) ≤ n − 1.
Part (1) of the theorem then implies that G1 and G2 are free. Hence G = G1 ∗ G2 is
also free, which contradicts part (2). Thus G is indeed one-ended, as claimed.
Remark 5.7. The proof of Theorem 5.6 can be elaborated further, following
a similar argument to that of [KS], to prove the following: For G given by a
generic presentation (*), if g1 , . . . , gn ∈ G are such that hg1 , . . . , gn i = G then
(g1 , . . . , gn ) ∼N E (a1 , . . . , an ) or (g1 , . . . , gn ) ∼N E (b1 , . . . , bn ) in G.
6. Reduction moves
Recall that for A = {a1 , . . . , an } we think of F (A) as the set of all freely reduced
words over A±1 .
We say that a word z ∈ F (A) is a U -word if z is a subword of of a power of some
Ui±1 (where Ui are the defining relators for the presentation (**)). Recall that by
1
Lemma 5.4 any U -word of length at least N 2 · 1010
n is a subword of a power of only
±1
one Ui . We say that a word V is U -complementary to a U -word W if W V −1 is a
power of a cyclic conjugate of some Ui±1 . Note that V is then also a U -word. Note
also that for a given U -word W , its U -complementary word is not uniquely defined.
Thus if W is an initial segment of U∗k , where k 6= 0 and U∗ is a cyclic permutation
of Ui±1 , and V is U -complimentary to W then for every integer m such that mk < 0
the word U∗m V is also U -complimentary to W .
We now introduce a partial order on F (A). First, for w ∈ F (A) we define c1 (w)
to be the minimum k such that w can be written as a reduced product of type
w1 · . . . · wk where each wi is a U -word. We call any such decomposition of w as
a product of c1 (w) U -words an admissible decomposition and we call the words
w1 , . . . , wk the U -factors of this admissible decomposition.
The number c1 (w) can be interpreted geometrically in the Cayley complex CC of
the presentation (**): If k = c1 (w), w1 · . . . · wk is as above and γw is a path reading
w then each wi is read by a subpath of γw that travels (possibly with multiplicity)
along the boundary of a 2-cell of CC.
Note that admissible decompositions are not unique. However the following
statement shows that the degree of non-uniqueness for admissible decompositions
can be controlled:
Lemma 6.1. Let w ∈ F (A), k = c1 (w) and let w = w1 · . . . · wk = w10 · . . . · wk0 be
admissible decompositions of w. Then the following hold:
(1) The subwords wi and wi0 overlap non-trivially in w for all i ∈ {1, . . . , k}.
NIELSEN EQUIVALENCE IN A CLASS OF RANDOM GROUPS
23
(2) If V is the minimal subword of w that contains both wi and wi0 then both
wi and wi0 contain the subword V 0 obtained from V by removing the initial
1
2
and terminal subword of length 1010
nN .
(3) If wi is subword of a power of Ujε of length at least 1015 n N 2 then wi0 is
also a subword of a power of Ujε and the common subword of wi and wi0
differs from wi and wi0 by at most an initial and terminal segment of length
1
2
1010 n N .
Proof. (1) Suppose that this does not hold, i.e. that for some i ∈ {1, . . . , k} the
words wi and wi0 do not overlap. Without loss of generality we assume that wi comes
0
before wi0 when reading w. Therefore wi0 wi+1
·. . . wk0 is a subword of wi+1 wi+2 ·. . .·wk ,
0 0
0
and, in particular, wi wi+1 · . . . wk is a product of k − i U -words. It then follows
that w is product of (i − 1) + (k − i) = k − 1 U -words, contradicting the definition
of c1 (w).
(2) Suppose that the conclusion of part (2) of the lemma does not hold. Without
loss of generality we may assume that w1 · . . . · wi−1 has a suffix w̄i of length at
1
2
0
least 1010
n N that is a prefix of wi . The subword w̄i is in fact a suffix of wi−1 as
0
otherwise wi−1 and wi−1 do not overlap, contradicting (1).
Thus wi−1 = uw̄i for some word u and wi0 = w̄i v for some word v. Now as
1
2
wi−1 and wi0 are U -words and w̄i is of length at least 1010
n N , it follows from
Lemma 5.4(2) that z = uw̄i v is a U -word. It follows that
0
w = w1 · . . . wi−2 zwi+1
· . . . wk0 ,
contradicting the assumption that k = c1 (w).
(3) This part follows immediately from the arguments used to prove (1) and (2)
together with Lemma 5.4(2).
Now let w be a freely reduced word over {a1 , . . . , an }±1 with c1 (w) = k. For
1 ≤ i ≤ k we will define a number `w (i) that essentially measures the length of the
i-th factor in an admissible decomposition of w, provided this factor is almost of
length N 2 . The precise definition of `w (i) is independent of the chosen admissible
decomposition of w and is more robust under certain modifications of w that we
will introduce later on.
Lemma 6.2. Let w ∈ F (A) and k = c1 (w). Fix i ∈ {1, . . . , k}. Choose an
admissible decomposition w = w1 · . . . · wk of w. Suppose that for some j 6= i the
subword wj is a maximal U -subword of w with |wj | ≥ 1013 n N 2 . Choose a word
w̄j that is U -complementary to wj that is also of length at least 1013 n N 2 and let
w̄ := w1 · . . . wj−1 w̄j wj+1 · . . . · wk .
Then the following hold:
(1) w̄ is freely reduced.
(2) w̄j is a maximal U -subword of w̄.
(3) c1 (w̄) = c1 (w).
Proof. (1) and (2) follow from the maximality of the U -subword wj and the fact
that w is reduced and that wj w̄j−1 is cyclically reduced. (3) follows from (1) and (2)
as the assumption on the length of wj and w̄j together with Lemma 6.1(3) imply
that we can find admissible decompositions of w and w̄ such that wj , respectively
w̄j , occur as factors.
For every k ≥ 1 denote by F (A; k) the set of all w ∈ F (A) with c1 (w) = k.
Definition 6.3 (i-equivalence). If w ∈ F (A; k), i ∈ {1, . . . , k} and w̄ is obtained
from w as in Lemma 6.2, we say that w̄ is elementary i-equivalent to w. Lemma 6.2
implies that w̄ ∈ F (A; k).
24
ILYA KAPOVICH AND RICHARD WEIDMANN
We further say that w ∈ F (A; k) is i-equivalent to a word w0 ∈ F (A) if w can be
transformed into w0 by applying finitely many elementary i-equivalences (note that
in this definition the value of the index i is fixed). Thus for every i ∈ {1, . . . , k}
i-equivalence is equivalence relation on F (A; k).
Lemma 6.4. Suppose that w, w0 ∈ F (A; k) are i-equvalent for some 1 ≤ i ≤
c1 (w) = c1 (w0 ) and that w = w1 · . . . · wk and w0 = w10 · . . . · wk0 are admissible
decompositions of w, respectively w0 . Then the following hold:
(1) There exists a word V ∈ F (A) such that wi = xV y and wi0 = x0 V y 0 where
x, y, x0 , y 0 are words of length at most 10110 · N 2 .
(2) The lengths of wi and wi0 differ at most by 10210 · N 2 .
Proof. This statement follows from the fact that an elementary i-equivalence that
modifies a wj only affects the adjacent factors and increases or decreases their length
1
2
by at most 1010
n N by Lemma 6.1, and that another such elementary i-equivalence
applied to the j-th factor reverses theses changes.
Definition 6.5 (Complexity of a word in F (A)). Let w ∈ F (A), k = c1 (w). For
each i ∈ {1, . . . , k} we define `ˆw (i) to be the maximum over all |wi | where wi is the
i-th factor in some admissible decomposition of a word w0 that is i-equivalent to w.
Note that part (2) of Lemma 6.4 implies that `ˆw (i) < ∞.
We further define `w (i) = 0 if `ˆw (i) < (1 − 1013 n )N 2 and `w (i) = `ˆw (i) otherwise.
Note that `w (i) = `w̄ (i) if w and w̄ are i-equivalent. We now define
c2 (w) := `w (1) + . . . + `w (c1 (w)).
For w ∈ F (A) we define the complexity of w as c(w) = (c1 (w), c2 (w)) and order
complexities lexicographically. This order is a well-ordering on F (A)
It is not hard to verify that an α-small cancellation move relative to Uj for α
close to 1 decreases the complexity. We will need the following generalization of
this fact:
Lemma 6.6. Let w ∈ F (A) be a reduced word and let W ∈ F (A) be a U -word of
1
N 2 . Suppose that w has (as a word) a reduced product decomposition of
length 100n
type
w = x0 W ε1 x1 W ε2 · . . . W εq xq
with εt ∈ {−1, 1} for 1 ≤ t ≤ q. Choose V such that W V −1 is a cyclic conjugate
of some Uj±1 and let w0 be the word obtained from the word x0 V ε1 x1 V ε2 · . . . V εq xq
by free reduction. Then the following hold:
(1) c(w0 ) ≤ c(w).
(2) If one of the subwords W εi is contained in a U -subword of w of length at
least (1 − 1014 n )N 2 , then c(w0 ) < c(w).
Proof. We will first observe that we may choose an admissible decomposition w =
w1 · . . . · wk (with k = c1 (w)) such that any subword W εt of w occurs inside some
factor wj of w. Indeed in any admissible decomposition of w the subword W εt can
overlap with at most 3 U -factors of w, as otherwise an admissible decomposition
of w with fewer U -factors can be found. Thus W εt overlaps with some factor in
1
N 2 . Because of Lemma 6.1, we can expand this
a subword of length at least 300n
εt
factor to contain W . The claim follows by making this modifications for all W εt .
Let now w = w1 · . . . · wk be an admissible decomposition such that any subword
W εi occurs inside some factor wj of w. Note that possibly several W εt occur inside
the same wj . Note also that if some W εt is contained in a U -subword x of length at
least (1 − 1014 n )N 2 then it is a subword of some wj of length at least (1 − 1024 n )N 2 .
NIELSEN EQUIVALENCE IN A CLASS OF RANDOM GROUPS
25
This conclusion can be established by first observing that by the argument before
another admissible decomposition w = z1 · . . . · zk (with U -factors zi ) can be chosen
such that x is contained in some zj , and then applying Lemma 6.1.
Replacing the W εt by the V εt inside each wj and performing free reduction
yields a new word wj0 , which is again a U -word. The word w0 is then obtained
from w10 · . . . · wk0 by free reduction. This construction implies, in particular, that
c1 (w0 ) ≤ c1 (w).
Thus we may assume that c1 (w) = c1 (w0 ) = k as there is nothing to show
otherwise. To prove the lemma it suffices to show that `w (i) ≥ `w0 (i) for all
1 ≤ i ≤ k and that `w (i) > `w0 (i) for some 1 ≤ i ≤ k if condition (2) is satisfied.
If condition (2) of the lemma is satisfied, there exists some factor wi of length
at least (1 − 1024 n )N 2 that contains one of the W εt . Therefore it is sufficient to
consider the following two cases:
Case 1: Suppose that wi contains at least one of the words W εt . Note that
`ˆw (i) = `w (i) ≥ N 2 if wi contains more than one such word.
Note first that `w0 (i) = 0 if `w (i) = 0, since the word obtained from wi be
replacing W ±1 with V ±1 followed by free cancellation is of length at most (1 −
2
1
2
2
100n )N and since i-equivalence cannot increase this length by more than 1010 n N
by Lemma 6.4.
If `w (i) 6= 0 then the replacements of W ±1 with V ±1 decrease the length of wi
2
2
0
by more than 1010
n N . Thus it follows from Lemma 6.4 that `w (i) < `w (i). This
holds in particular if wi is of length at least (1 − 1024 n )N 2 , which (by the above
discussion) is guaranteed to occur if condition (2) is satisfied.
Case 2:
Suppose that wi contains no subword W εt . To conclude the proof,
we need to show that `w (i) ≥ `w0 (i). Note that for any admissible decomposition
z1 · . . . · zk the words wi and zi have a non-trivial common subword that is not
touched by the replacement and free cancellations when going from w to w0 , since
otherwise c1 (w0 ) < k; this follows as in the proof of Lemma 6.1(1).
If w is i-equivalent to w0 then there is nothing to show as `w (i) = `w0 (i) by the
definition of `(i). However it may happen that w and w0 are not i-equivalent as
some of the U -words wj may be replaced by U -words that are too short for the
replacements to qualify as i-equivalences. This is the reason why the argument for
treating Case 2 is slightly more subtle.
Choose a word w00 that is i-equivalent to w0 such that w00 realizes `ˆw0 (i), i.e.
that w00 has an admissible decomposition w100 w200 · . . . · wk00 such that |wi00 | = `ˆw0 (i). It
suffices to establish:
Claim: The word w is i-equivalent to a word w̃ that has an admissible decomposition w̃1 w̃2 · . . . · w̃k such that |w̃i | = |wi00 |.
Indeed, the existence of such a word w̃ implies that
`ˆw (i) ≥ |w̃i | = |wi00 | = `ˆw0 (i)
which implies that `w (i) ≥ `w0 (i).
To verify the Claim, we first construct a word ẇ that is i-equivalent to w in the
following way: Start with w and perform the same replacements as when going from
w to w0 , but whenever one of the replacements results in a maximal U -subword v
of length less than 13 N 2 , multiply it with a cyclic conjugate of the appropriate Uj±1
to obtain a U -word longer than 13 N 2 that has v as both initial and terminal word
and such that the replacement is an elementary i-equivalence.
Call the resulting word ẇ. Note that ẇ is i-equivalent to w and all words that
occur as the i-th factors in any admissible decomposition of w0 also occur as i-th
factors in an admissible decomposition of ẇ. Now all elementary i-equivalences that
26
ILYA KAPOVICH AND RICHARD WEIDMANN
need to be applied to w0 to obtain w00 can be applied to ẇ. We obtain a word that
is i-equivalent to ẇ and that has wi00 as the i-th U -word. This proves the Claim
and completes the proof of the lemma.
7. Proof of the Main Theorem
In this section we establish Theorem A from the Introduction:
Theorem 7.1. Let n ≥ 2 be arbitrary. Then for the group G given by a generic presentation (*), the group G is torsion-free, word-hyperbolic, one-ended of rank(G) =
n, and the (2n−1)-tuples (a1 , . . . , an , 1, . . . 1) and (b1 , . . . , bn , 1, . . . 1) are not Nielsenequivalent in G.
Let G be given by a generic presentation (*). By Theorem 5.6 we know that G
is torsion-free, word-hyperbolic, one-ended and that rank(G) = n.
For a (2n − 1)-tuple τ = (w1 , . . . , w2n−1 ) of freely reduced words in F (A) define
the complexity c(τ ) of τ as
c(τ ) := (c(w1 ), . . . , c(wn )).
We order complexities lexicographically. Note that in this definition we completely
disregard the words wn+1 , . . . , w2n−1 .
We argue by contradiction. Suppose that the conclusion of Theorem 7.1 fails
for G, so that the (2n − 1)-tuples (a1 , . . . , an , 1, . . . 1) and (b1 , . . . , bn , 1, . . . 1) are
Nielsen-equivalent in G.
Then there exist elements x1 , . . . , x2n−1 in F (A) such that the (2n − 1)-tuple
(x1 , . . . , x2n−1 ) is Nielsen equivalent in F (A) to the (2n−1)-tuple (a1 , . . . , an , 1, . . . , 1)
and such that for some permutation σ ∈ Sn we have xi =G bσ(i) for 1 ≤ i ≤ n.
Minimality assumption: Among all (2n − 1)-tuples (x1 , . . . , x2n−1 ) of freely
reduced words in F (A) with the above property choose a tuple (x1 , . . . , x2n−1 ) of
minimal complexity.
This minimality assumption implies that c(xi ) ≤ c(xi+1 ) for i = 1, . . . , n − 1.
After a permutation of the bi we may moreover assume that σ = id. We fix
this minimal tuple (x1 , . . . , x2n−1 ) for the remainder of the proof. The minimality
assumption plays a crucial role in the argument and ultimately it will allow us to
derive a contradiction.
We choose k maximal such that xi = vi in F (A) for 1 ≤ i ≤ k. By convention if
x1 =
6 v1 , we set k = 0.
Note that if k < n (which we will show below) then it follows from Lemma 5.5
that xk+1 admits an α-small cancellation move relative to some Uj for α close to 1.
1
This implies in particular that we may assume that xk+1 is of length at least 99n
N 2.
Let now Γ be the wedge of 2n − 1 circles, wedged at a vertex pΓ , such that the
i-the circle is labeled by the word xi for 1 ≤ i ≤ 2n − 1. By assumption the xi form
a generating set of F (A), thus the natural morphism f from Γ to the rose Rn is
π1 -surjective as the loops of Γ map to a generating set of π1 (Rn ). It follows that Γ
folds onto Rn by a finite sequence of Stallings folds. Thus there exists a sequence
of graphs
Γ = Γ0 , Γ1 , . . . , Γl = Rn
and Stallings folds fi : Γi−1 → Γi for 1 ≤ i ≤ l such that f = fl ◦ . . . ◦ f1 . We may
choose this folding sequence such that we do not apply a fold that produces a lift
of Rn in Γi if another fold is possible. Choosing ∆ to be the last graph in such
a folding sequence that does not contain a lift of Rn it follows that there exists a
graph ∆ with the following properties:
(1) There exists a map f∆ : Γ → ∆ such that f : Γ → Rn factors through f∆ .
NIELSEN EQUIVALENCE IN A CLASS OF RANDOM GROUPS
27
(2) ∆ does not contain a lift of Rn .
(3) Any fold applicable to ∆ produces a lift of Rn , thus ∆ contains a connected
subgraph Ψ with at most n + 2 edges that folds onto Rn .
Put p∆ := f∆ (pΓ ). Thus the petal-circles of Γ get mapped to closed paths based
at p∆ .
As the Betti number of ∆ is bounded by 2n − 1 and as ∆ folds onto Rn it follows
that ∆ does not contain a 2-sheeted cover of Rn . Indeed such a 2-sheeted cover
would be of Betti number 2n − 1 and therefore be the core of ∆ which implies that
∆ does not fold onto Rn . It follows that the hypothesis of Theorem 4.3 is satisfied
for ∆. Thus for α arbitrarily close to 1 we may assume that any lift of of the path
γvi in Rn with label vi = vi (a) to ∆ is α-injective.
Lemma 7.2. We have k < n.
Proof. For i ∈ {1, . . . , k} the i-th loop of Γ maps to the path γvi in Rn . Thus the
i-th loop of Γ maps to a path in ∆ that is a lift of γvi , thus by Theorem 4.3 we can
assume that this image in ∆ is α-injective for α arbitrarily close to 1.
This implies that for 1 ≤ i ≤ k the image of the i-th loop of Γ in ∆ contains an
1
1
|vi | = 100n
N as the image of σi is the union of at
arc σi of ∆ of length at least 100n
most 6n arcs of ∆. By genericity these arcs are travelled only once by the first k
loops, in particular they are pairwise distinct. Moreover they are disjoint from Ψ.
It follows that there exists a connected subgraph Ψ̄ of ∆ containing Ψ such that
the arcs σi meet Ψ̄ only in their endpoints. As the Betti number of Ψ is at least n
it follows that the the subgraph of ∆ spanned by Ψ̄ and the σi has Betti number
n + k. As ∆ has Betti number at most 2n − 1 this implies that k ≤ n − 1 < n.
We now continue with the proof of Theorem 7.1.
Recall that Ui was obtained from the generic word a−1
i ui (b) by replacing each bj
by the respective vj (a). The genericity of the vj implies that there is very little cancellation in a freely reduced word in the vj , thus Ui is essentially the concatenations
of a−1
and the words vj that were introduced to replace the letters b1 , . . . , bn .
i
For each vj let vj0 be the subword of vj obtained by chopping-off small initial
and terminal segments of vi and such that for every occurrence of bj in a−1
i ui (b)
the word vj0 survives without cancellation when we replace b1 , .., bn by v1 , .., vn in
ai−1 ui (b) and then freely and cyclically reduce to obtain Ui .
As the cancellation is small relative to the length of the vj it follows that vj0
is almost all of vj . Moreover, we can choose vj0 so that |v10 | = · · · = |vn0 | = N 0 .
Choosing the vj from the appropriate generic set, we may assume that N ≥ N 0 ≥
N (1 − 0 ) for any fixed 0 < 0 < 1.
By Theorem 4.3 and by the genericity of the presentation (*), for any 0 < α0 < 1
we may assume that the conclusion of Theorem 4.3 holds for the words vj . It
follows that for any given 0 < α < 1 we may also assume that the words vj0
satisfy the conclusion of Theorem 4.3 as well. Indeed if we choose α0 = 12 (1 + α)
and 0 = 12 (1 − α) then any image of vj0 in some graph as in the hypothesis of
Theorem 4.3 contains at least α0 · N − 0 · N = α · N ≥ α · |vi0 | = αN 0 distinct
topological edges, so that the path corresponding to vj0 in the graph in question is
α-injective.
It follows from Lemma 5.5 that xk+1 , the label of the (k + 1)-st loop, admits an
α-small cancellation move with respect to some U
i with α close to 1. Thus xk+1
contains a subword Z of length at least 1 − 1014 n N 2 that is a subword of a cyclic
conjugate of some Ui . After dropping a short suffix and prefix we can assume that Z
is a reduced product of remnants of some vj±1 in Ui , and each such remnant contains
the corresponding (vj0 )±1 . We refer to the sub-words (vj0 )±1 of Z (understood both
28
ILYA KAPOVICH AND RICHARD WEIDMANN
as words and as positions in Z where they occur) arising in this way as v-syllables
of Z. Denote the arc in the (k + 1)-st loop of Γ that corresponds to Z by s̃Z . Note
that Z is readable in ∆ since Z is the label of the path sZ := f∆ (s̃Z ).
Convention 7.3. We fix the word Z, the arc s̃Z in Γ and its image sZ in ∆ for
the remainder of the proof of Theorem 7.1.
In the following two lemmas we will establish some important properties of the
word Z and of the path sZ .
Lemma 7.4. For 1 ≤ j ≤ n there exists a non-trivial distinguished subword ṽj of
vj0 (this means both the abstract word and the position in vj0 where it occurs) such
that the following hold:
(1) For any v-syllable (vj0 ) of Z with corresponding subword ṽj the subpath of
sZ corresponding to ṽj is contained in an arc of ∆\Ψ. (This means the
word ṽj is read on an arc of ∆\Ψ).
(2) If 1 ≤ j1 , j2 ≤ n, j1 6= j2 and (vj0 1 ) and (vj0 2 )δ are two v-syllables of Z,
then the subpaths of sZ corresponding to their distinguished subwords ṽj1
and ṽjδ2 have no topological edges in common.
(3) Similarly, if 1 ≤ j ≤ n and v 0 , v 00 are two distinct (i.e. appearing in
different positions in Z) v-syllables of Z both representing (vj0 ) and (vj0 )δ ,
then the subpath of sZ corresponding to the distinguished subword (ṽj ) ,
(ṽj )δ are either disjoint or coincide if = δ and are inverses if = −δ.
Proof. For a finite graph Λ let f (Λ) be the number of paths e1 , . . . , ek in Λ such
that {ei , e−1
6 {ej , e−1
6 {1, k}. Thus f (Λ) is
i } =
j } for i 6= j ∈ {1, . . . , k} and {i, j} =
the number of path that travel no topological edge twice except possibly that the
first and the last edges may agree. Let f (n) be the maximal f (Λ) where Λ is a
graph with the following properties:
(1) There exists a vertex v ∈ V Λ such that (Λ, v) is a core graph with respect
to v of Betti number at most 2n − 1.
(2) Λ has no valence-2 vertex.
Choose α = α(n) < 1 (close to 1) and d = d(n) > 0 (close to 0) such that
1
.
2
As noted above, by genericity we may assume that any path corresponding to vj0 is
α-injective. Moreover by Lemma 5.3 we may assume that vj0 does not contain any
word of length d(n) · |vj0 | twice. Let Ψ0 be the union of all maximal arcs of ∆ of
length less than d(n)|vj0 | = d(n)N 0 . Note that Ψ0 contains Ψ.
For j = 1, . . . , n we say that a reduced decomposition
f (n) · ((1 − α) + 6 · n · d(n)) ≤
(!)
is basic
hold:
(1)
(2)
(3)
vj0 = y0 p1 y1 . . . pm ym
if m ≥ 1 and there exists a way to read vj0 in ∆ such that the following
|pt | ≥ d(n) · |vj0 | = d(n)N 0 for 1 ≤ i ≤ m and pt is read on an arc of ∆ \ Ψ0 .
For 1 ≤ t ≤ m − 1 each yt is read Ψ0 .
y0 = y00 y000 where y000 is read in Ψ0 , y00 is read on an arc (possibly degenerate)
of ∆ \ Ψ0 and |y00 | < d(n)N 0 .
0 00
0
00
(4) ym = ym
ym where ym
is read in Ψ0 , ym
is read on an arc of ∆ \ Ψ0 and
00
0
|ym | < d(n)N .
For a basic decomposition (!) of vj0 , we say that a path β in ∆ corresponding to
reading vj0 in ∆ as in the above definition, is a basic path representing (!).
NIELSEN EQUIVALENCE IN A CLASS OF RANDOM GROUPS
29
Note that the yt may or may not be degenerate, i.e. may be single vertices of
∆. Note that whenever vj0 can be read in ∆ then the corresponding path is a basic
path corresponding to a basic decomposition. This implies that any subpath of sZ
corresponding to a subword of type vj0±1 is a basic path corresponding to a basic
decomposition.
Note that (2) implies that that the word pt is read along a maximal arc of ∆ \ Ψ0
if 2 ≤ t ≤ m − 1.
Moreover for any t1 6= t2 and {t1 , t2 } =
6 {1, m} the subpaths of β corresponding
to pt1 and pt2 have no topological edges in common by the choice of d(n). The
subpath corresponding to pm can overlap the subpath corresponding to p1 in a
subpath of length at most d(n)N 0 if they lie on the same arc of ∆ \ Ψ0 .
ˆ be the graph obtained from ∆ by collapsing all connected components
Let now ∆
of Ψ0 to points. If (!) is a basic decomposition of Vj0 and β is a basic path in ∆
00
ˆ is a path β̂ with label y 0 · p1 · . . . · pm · ym
representing (!), then the image of β in ∆
.
0
0
Moreover, the path β̂ is (d(n) · N )-almost edge-simple, that is, it travels at most
ˆ more than once. Note also that b1 (∆)
ˆ ≤ n − 1. Since
d(n) · N 0 topological edge of ∆
ˆ
ˆ
ˆ
(∆, p∆
ˆ ) is a core pair where p∆
ˆ is the image of p∆ in ∆, it now follows that ∆ has
at most 3n − 1 maximal arcs. Therefore for any basic decomposition (!) we have
m ≤ 3n as distinct pi lie on distinct maximal arcs, with the possible exception of
p1 and pm lying on the same maximal arc.
The number of tuples (p1 , . . . , pm ) (with each pt is understood as a subword
of vj0 occurring in a specific position in vj0 ) arising in basic decompositions of a
˜ be the
given vj0 , is bounded above by f (n). This can been as follows: Let ∆
ˆ
˜
graph obtained from ∆ by replacing maximal arcs by edges, ∆ has no vertex of
˜ where ei
valence 2. Now any tuple (p1 , . . . , pm ) gives rise to a path e1 , . . . , em in ∆
is the edge obtained from the arc on which pi was read by the basic path. This path
satisfies the condition given in the definition of f (n), and therefore there are at most
˜ ≤ f (n) different paths that occur. Each such path (e1 , . . . , em ) determines a
f (∆)
unique tuple (p1 , . . . , pm ): That pi is determined by ei is obvious for 2 ≤ i ≤ m − 1
as pi is simply the label of the maximal arc of ∆ corresponding to ei . For i = 1, m
this follows from the fact that subwords of length at least d(n)|vi0 | occur in only
one position of the word vi0 . This shows that at most f (n) tuples (p1 , . . . , pm ) can
occur.
We now show that the total length of all yt occurring in any fixed basic decompositions of vj0 is at most ((1 − α) + 6nd(n)) · |vj0 |.
Choose a fixed basic decomposition (!) of vj0 and let β be a basic path representing
(!). Each yt decomposes as a concatenation of arc subwords that are read along
00
maximal arcs in Ψ0 or the paths corresponding to y00 or ym
as β is read in ∆. Note
further that the sum of the lengths of y0 , . . . , ym exceeds the number of edges in
their image by at most (1 − α)|vj0 | as vj0 is α-injective. Each maximal arc in Ψ0
00
has length < d(n)|vj0 | and so do the paths corresponding to y00 and ym
. Thus the
number of edges in the image of the arcs corresponding to y0 , . . . , ym is bounded
00
from above by 6nd(n)|vj0 |, since ∆ has at most 6n − 1 maximal arcs and if y00 or ym
0
are non-degenerate then at most 6n − 2 of these arcs lie in Ψ . Therefore
m
X
|yt | ≤ ((1 − α) + 6nd(n)) · |vj0 |.
t=0
By definition of f (n), it follows that the total length of all yt occurring in all
possible basic decompositions of a given vj0 is at most
f (n) · ((1 − α) + 6nd(n)) · |vi0 | ≤
1 0
|v |.
2 j
30
ILYA KAPOVICH AND RICHARD WEIDMANN
Thus there exists a non-trivial subword ṽj of vj0 (we could actually choose ṽj
to be a 1-letter subword) such that in no basic decomposition of vj0 this subword
ṽj overlaps with any yt . Then the subwords ṽ1 , . . . , ṽn satisfy the requirements of
Lemma 7.4
Recall that in Definition 4.2 we defined the notions of an edge/arc of a graph
Υ being Υ-injective with respect to a graph map from Υ to another graph. Recall
also that in our situation the map f : Γ → Rn factors through f∆ : Γ → ∆. In the
following Υ-injectivity of some arc Υ in Γ refers to Υ-injectivity with respect to the
map f∆ . Recall that p∆ = f∆ (pΓ ) is the image of the base-vertex of Γ in ∆.
Recall that, as specified in Convention 7.3, the (k + 1)-st loop of Γ contains an
arc s̃Z labelled by a U -word Z of length at least (1 − 1014 n )N 2 , and that the path
sZ in ∆ is the image of s̃Z under p∆ .
1
Lemma 7.5. The arc s̃Z contains a s̃Z -injective subarc Q of length 100n
N 2 that
0
0
is mapped to an arc Q in ∆ such that Q does not contain the vertex p∆ in its
interior.
Proof. Let ṽ1 , . . . , ṽn be distinguished subwords of v10 , . . . vn0 provide by Lemma 7.4.
Let now Θ be the subgraph of ∆ consisting of the edges traversed by sZ .
We now construct a graph Θ̂ from Θ as follows:
First, collapse all edges of Θ that do not lie on the arcs that are images of the
subpaths of sZ corresponding to distinguished subwords ṽj of the v-syllables of Z.
The resulting graph Θ0 is the union of arcs labeled with the ṽj and two such arcs
intersect at most in the endpoints.
Now in Θ0 replace any such arc with label ṽj with an edge with label bj . We
±1
thus obtain a graph Θ̂ with edges labelled by letters of {b±1
1 , . . . , bn }. Note that Θ̂
has first Betti number at most n − 1, since all edges of Θ that lie in Ψ are collapsed
when constructing Θ0 .
Since Z is subword of length at least 1 − 1014 n N 2 of some cyclic permutation
of some Ui±1 , the word Z contains a subword Z 0 with the following properties:
49
(1) |Z 0 | ≥ 100
N 2.
0
(2) Z consists of the remnants of the vi after substituting the bi in ui .
Let sZ 0 be the subpath of sZ corresponding to the subword Z 0 of Z. Similarly
let s̃Z 0 be the subpath of s̃Z corresponding to Z 0 .
Now for j = 1, . . . , n replace in Z 0 any remnant of vjε by bεj . We thus obtain a
±1
±1
freely reduced word Ẑ in the {b±1
1 , . . . , bn } that is a subword of ui . Note that
49
|Ẑ| ≥ 100 N .
The word Ẑ is readable in Θ̂ by construction. Hence, by Theorem 4.3 and by
making the appropriate genericity assumptions on the ui , we may assume that the
corresponding path sẐ in Θ̂ is α-injective for some α > 1000n−1
1000n . It follows from
α-injectivity of sẐ that any subpath of sẐ of length
2(1 − α) · |Ẑ| + 1 ≤ (1 − α) · 3N
contains an sẐ -injective edge. This implies that any subpath of sZ 0 of length
1
1
((1 − α) · 3N + 1)N ≤ (1 − α) · 4N 2 =
N2 ≤
N2
250n
100n
contains an sZ 0 -injective edge.
Now write sZ 0 as the the product of 20n − 1 subpaths s1 , . . . , s20n−1 of length
1
49
greater or equal than 50n
N 2 . This can be done since |sZ 0 | ≥ 100
N 2 . By the
argument given above, it follows that every sj contains an sZ 0 -injective edge.
Since ∆ has at most 3(2n − 1) − 3 = 6n − 6 maximal arcs, it follows that the the
collection of all sZ 0 -injective edges in ∆ is the union of at most 6n − 5 sZ 0 -injective
NIELSEN EQUIVALENCE IN A CLASS OF RANDOM GROUPS
31
arcs of ∆. At most one of these sZ 0 -injective arcs of ∆ can contain p∆ in its interior.
After possibly subdividing this arc by p∆ in two, it follows that the collection of
all sZ 0 -injective edges in ∆ is the union of pairwise non-overlapping arcs t1 , . . . , tk ,
with k ≤ 6n and such that p∆ does not lie in the interior of any ti .
Since each subpath si of sZ 0 contains an sZ 0 -injective edge, it follows that each
si nontrivially overlaps some tj . We claim that there exist k0 and j such that
each of sk0 −1 , sk0 , sk0 +1 nontrivially overlaps tj . Otherwise each tj would overlap
at most two of the paths s1 , . . . , s20n−1 , and hence the paths t1 , . . . , tk overall at
most 2 · 6n = 12n < 20n − 1 of the paths s1 , . . . , s20n−1 . This contradicts the fact
that each si intersects some tj . Thus indeed there exist k0 and j such that each of
sk0 −1 , sk0 , sk0 +1 overlaps tj , so that tj contains sk0 . Note that sk0 does not contain
the vertex p∆ in its interior, since p∆ does not belong to the interior of tj .
1
N 2.
Thus sk0 is an arc of ∆ which is sZ 0 -injective and which has length ≥ 50n
By genericity of presentation (∗) we may assume that there is no word W of
1
N 2 such that W ±1 occurs more than once in Z. Since sk0 is an arc of
length 500n
1
length ≥ 50n N 2 and since Z is freely reduced, the path sZ cannot run over the
entire arc sk0 more than once. We also know that sk0 does occur as a subpath of
sZ , so that at some point the path sZ does run over the entire arc sk0 . It may also
happen that, in addition, the initial and/or terminal segment of sZ overlaps the
1
N 2 . Therefore
arc sk0 nontrivially; however such overlaps must have length ≤ 500n
1
sk0 contains a sub arc Q0 of length 100n
N 2 such that Q0 is sZ -injective.
1
0
We put Q be the lift of Q to Γ. Since |Q| = |Q0 | = 100n
N 2 , the conclusion of
0
Lemma 7.5 holds with these choices of Q and Q . Thus Lemma 7.5 is established.
Concluding the proof of Theorem 7.1. We now have all tools to conclude the proof
of the Theorem 7.1. Recall that we argue by contradiction and that we have
assumed that the 2n − 1-tuples (a1 , . . . , an , 1 . . . , 1) and (b1 , . . . , bn , 1 . . . , 1) are
Nielsen-equivalent in G.
We will see that we can apply Lemma 6.6 to reduce the complexity of xk+1 while
maintaining the complexity of xi for 1 ≤ i ≤ k and preserving the fact that xi =G bi
for 1 ≤ i ≤ n. This will yield is a contradiction to the minimality assumption about
(x1 , . . . , x2n−1 ) made at the beginning of the proof.
Recall that k was maximal such that xi = vi in F (A) for all 1 ≤ i ≤ k and that
by Lemma 7.2 we know that k ≤ n − 1. By convention if x1 6= v1 , we set k = 0.
Thus we always have 1 ≤ k + 1 ≤ n.
1
Let W be the word that is the label of the arc Q of length 100n
N 2 provided
1
2
by Lemma 7.5. Thus W is of length 100nN . Note that W is a subword of the
U -subword Z of length at least 1 − 1014 n N 2 . Recall that Q is a sub-arc of the
(k + 1)-st petal of Γ and that under the map Γ → ∆ the arc Q maps injectively to
an arc Q0 of ∆.
By Lemma 7.5 the base-vertex p∆ = f∆ (pΓ ) does not belong to the interior of
Q0 . Since the petals of Γ are labelled by freely reduced words, it now follows that
the full preimage of Q0 in Γ under f∆ is the union of a collection of pairwise nonoverlapping arcs Q1 , . . . , Qm in Γ such that Q = Q1 and such that each of the arcs
Q1 , . . . , Qm maps bijectively to Q0 .
For 1 ≤ i ≤ 2n − 1 write xi as a reduced product
(‡)
x0,i W ε1,i x1,i W ε2,i · . . . W εqi ,i xqi ,i
with εj,i ∈ {−1, 1} where the W εj,i are the occurrences of W ±1 in xi corresponding
to all those of the arcs Q1 , . . . , Qm that are contained in the i-th petal-loop of Γ.
32
ILYA KAPOVICH AND RICHARD WEIDMANN
Note that for 1 ≤ i ≤ k the length of xi = vi is too short to contain W as a
subword. Therefore for 1 ≤ i ≤ k we have xi = x0,i and qi = 0.
We now perform the change described in Lemma 6.6 simultaneously for all xi ,
i = 1, . . . , 2n − 1. That is, we pick a word V ∈ F (A) such that W V −1 is a cyclic
permutation of one of the defining relations Us±1 of presentation (**). Then for
each xi we replace each W j,i in the decomposition (‡) of xi by V j,i . Denote
the resulting word by zi and denote the freely reduced form of zi by x0i , where
i = 1, . . . , 2n − 1.
By construction, xi is unchanged for 1 ≤ i ≤ k, that is xi = x0i for 1 ≤ i ≤ k.
Moreover the complexity of xk+1 decreases as the presence of subword Z of xk+1
triggers clause (2) of Lemma 6.6. Thus we have c(xi ) = c(x0i ) for 1 ≤ i ≤ k and
c(x0k+1 ) < c(xk+1 ).
Since W =G V , we have xi =G x0i for 1 ≤ i ≤ 2n − 1. In particular we have
0
xi =G bi for 1 ≤ i ≤ n. Thus to get the desired contradition to the minimal choice
of (x1 , . . . , x2n−1 ) we only need to verify that the tuple (x01 , . . . , x02n−1 ) is Nielsenequivalent to (a1 , . . . , an , 1, . . . , 1) in F (A). This fact follows from the following
considerations:
In the graph ∆ we replace the arc Q0 by an arc Y with label V and call the
resulting graph ∆0 . The graph ∆0 still folds onto Rn , since ∆0 contains Ψ.
By Lemma 7.5 the vertex p∆ = f∆ (pΓ ) does not belong to the interior of Q0 .
Since the petals of Γ are labelled by freely reduced words, it now follows that the
full preimage of Q0 in Γ under f∆ is the union of a collection of pairwise nonoverlapping arcs Q1 , . . . , Qm in Γ such that Q = Q1 and such that each of the arcs
Q1 , . . . , Qm maps bijectively to Q0 . Note also that each of the arcs Q1 , . . . , Qm is
labelled by W amd that the base-vertex pΓ of Γ does not belong to the interior of
any of Q1 , . . . , Qm .
We obtain a new graph Γ0 from Γ by replacing each Qj by an arc Yj labelled
by V . Then there is a natural label-preserving graph map f∆0 : Γ0 → ∆0 which
sends each arc Qj bijectively to Y , and which agrees with f∆ on the complement
of Y1 ∪ · · · ∪ Ym in Γ0 . The map f∆ : Γ → ∆ arose from a sequence of folds and
therefore f∆ is π1 -surjective.
Topologically f∆0 can be viewed as the same as the map f∆ and hence the map
f∆0 is π1 -surjective. As we noted earlier, the graph ∆0 folds onto Rn , and hence
the map ∆0 → Rn is π1 -surjective. By composing this map with f∆0 , we conclude
that the canonical map Γ0 → Rn preserving edge-labels is π1 -surjective.
The graph Γ0 is a wedge of 2n−1 circles with labels z1 , . . . , z2n−1 . As noted above,
the canonical map Γ0 → Rn is π1 -surjective. Since π1 (Γ0 ) is generated by the looppetals with labels z1 , . . . , z2n−1 and since each zi freely reduces to x0i , it follows that
the elements x01 , . . . , x02n−1 of F (A) generate the entire group F (A) = F (a1 , . . . , an ).
Therefore the (2n − 1)-tuple (x01 , . . . , x02n−1 ) is Nielsen-equivalent in F (A) to the
(2n − 1)-tuple (a1 , . . . , an , 1, . . . , 1).
Recall that xi = vi = x0i for i = 1, . . . , k (where k < n) and that c(x0k+1 ) < c(xk ).
Therefore c(x01 , . . . , x02n−1 ) < c(x1 , . . . , x2n−1 ), which contradicts the minimality
assumption on (x1 , . . . , x2n−1 ).
Hence the 2n − 1-tuples (a1 , . . . , an , 1, . . . , 1) and (b1 , . . . , bn , 1, . . . , 1) are not
Nielsen-equivalent in G, and Theorem 7.1 is proved.
References
[A]
G. Arzhantseva, On groups in which subgroups with a fixed number of generators are
free, Fundam. Prikl. Mat. 3 (1997), no. 3, 675–683.
NIELSEN EQUIVALENCE IN A CLASS OF RANDOM GROUPS
[AO]
[D]
[E1]
[E2]
[E3]
[G]
[KM]
[KS]
[KW1]
[KW2]
[KW3]
[LGM]
[L]
[LP]
[LM1]
[LM2]
[LM3]
[LS]
[No]
[M]
[N1]
[N2]
[O]
[Pa]
[PRZ]
[R]
[Sta]
[Str]
[W]
33
G. Arzhantseva and A. Yu. Ol’shanskii, Generality of the class of groups in which
subgroups with a lesser number of generators are free. Mat. Zametki 59 (1996), no. 4,
489–496
T. Delzant Sous-groupes a deux generateurs des groupes hyperboliques. E. Ghys,
A. Haefliger and A. Verjovsky, (editors), Group theory from a geometrical viewpoint.
Proceedings of a workshop, held at the International Centre for Theoretical Physics in
Trieste, Italy, 26 March to 6 April 1990. Singapore, World Scientific, 1991, 177–189.
M.J. Evans Presentations of Groups involving more Generators than are neceessary,
Proc. London Math. Soc. 67 (1993), 106–126.
M.J. Evans Presentations of Groups involving more Generators than are neceessary
II, Cont. Math. 421(2006), 101–112.
M.J. Evans Nielsen equivalence classes and stability graphs of finitely generated groups,
Ischia Group theory 2006, World Scientific, 2007.
I. Grushko, On the bases of a free product of groups Mat. Sbornik 8 (1940), 169–182.
I. Kapovich, and A. Myasnikov, Stallings foldings and subgroups of free groups. J.
Algebra 248 (2002), no. 2, 608–668
I. Kapovich, and P. Schupp, Genericity, the Arzhantseva-Olshanskii method and the
isomorphism problem for one-relator groups. Math. Ann. 331 (2005), no. 1, 1–19
I. Kapovich and R. Weidmann, Freely indecomposable groups acting on hyperbolic
spaces, Internat. Jour. Algebra Comput. 14 (2004), 115–171
I. Kapovich and R. Weidmann, Kleinian groups and the rank problem, Geometry &
Topology 9 (2005), 375–402
I. Kapovich and R. Weidmann, Nielsen equivalence in small cancellation groups,
preprint, 2010; arXiv:1011.5862
C. Leedham-Green and S. Murray, Variants of product replacement. Computational
and statistical group theory (Las Vegas, NV/Hoboken, NJ, 2001), 97–104, Contemp.
Math., 298, Amer. Math. Soc., Providence, RI, 2002
L. Louder, Nielsen equivalence of generating sets for closed surface groups, preprint,
http://arxiv.org/abs/1009.0454
A. Lubotzky and I. Pak, The product replacement algorithm and Kazhdan’s property
(T). J. Amer. Math. Soc. 14 (2001), no. 2, 347–363
M. Lustig and Y. Moriah, Nielsen equivalence and simple homotopy type, Proc. London
Math. Soc. 62 (1991), 537–562
M. Lustig and Y. Moriah, Nielsen equivalence in Fuchsian groups and Seifert fibered
spaces, Topology 30 (1991) 191–204
M. Lustig and Y. Moriah, Generating systems of groups and Reidemeister-Whitehead
torsion, J. Algebra 157 (1993), 170–198
R. Lyndon and P. Schupp, Cominatorial Group Theory, Springer-Verlag, 1977
G.A. Noskov, Primitive elements in a free group, Math. Zametki 30 (1981), no. 4,
497–500
J. MacKay Conformal dimension and random groups, Geom. Funct. Anal. (GAFA),
22 (2012), 213–239
J. Nielsen Die Isomorphismen der allgemeinen, unendlichen Gruppe mit zwei Erzeugenden, Math. Ann. 78 (1917), no. 1, 385–397.
J. Nielsen Über die Isomorphismen unendlicher Gruppen ohne Relation, Math. Ann.
79 (1918), no. 3, 269–272.
A. Yu. Ol’shanskii, Geometry of defining relations in groups. Translated from the 1989
Russian original by Yu. A. Bakhturin. Mathematics and its Applications (Soviet Series),
70. Kluwer Academic Publishers Group, Dordrecht, 1991
I. Pak, What do we know about the product replacement algorithm?, Groups and computation, III (Columbus, OH, 1999), 301–347, Ohio State Univ. Math. Res. Inst. Publ.,
8, de Gruyter, Berlin, 2001
N. Peczynski, G. Rosenberger and H. Zieschang Über Erzeugende ebener diskontinuierlicher Gruppen Invent. Math. 29 (975), 161–180.
E. Rips, Subgroups of small cancellation groups, Bull. Lond. Math. Soc. 14 (1982),
45–47
J. R. Stallings Topology of Finite Graphs Invent. Math. 71 (1983), 551–565
Ralph Strebel, Small cancellation groups, in: “Sur les groupes hyperboliques d’apres
Mikhael Gromov.” Papers from the Swiss Seminar on Hyperbolic Groups held in Bern,
1988. Edited by E. Ghys and P. de la Harpe. Appendix, 227–273. Progress in Mathematics, 83. Birkhauser Boston, 1990
R. Weidmann, Generating tuples of free products, Bull. London Math. Soc., 39 (2007),
393–403.
34
[Z]
ILYA KAPOVICH AND RICHARD WEIDMANN
H. Zieschang, Über der Nielsensche Kürzungsmethode in freien Produkten mit Amalgam, Inventiones Math. 10 (1970), 4–37
Department of Mathematics, University of Illinois at Urbana-Champaign, 1409 West Green
Street, Urbana, IL 61801, USA
http://www.math.uiuc.edu/~kapovich/
E-mail address: [email protected]
Mathematisches Seminar, Christian-Albrechts-Universität zu Kiel, Ludewig-Meyn Str. 4,
24098 Kiel, Germany
E-mail address: [email protected]
| 4math.GR
|
Abstracting Event-Driven Systems with Lifestate Rules
Shawn Meier
Aleksandar Chakarov
Maxwell Russek
Sergio Mover
Bor-Yuh Evan Chang
arXiv:1701.00161v1 [cs.PL] 31 Dec 2016
University of Colorado Boulder
{shawn.meier, aleksandar.chakarov, maxwell.russek, sergio.mover, evan.chang}@colorado.edu
Abstract
We present lifestate rules—an approach for abstracting
event-driven object protocols. Developing applications
against event-driven software frameworks is notoriously
difficult. One reason why is that to create functioning
applications, developers must know about and understand the complex protocols that abstract the internal
behavior of the framework. Such protocols intertwine the
proper registering of callbacks to receive control from the
framework with appropriate application programming
interface (API) calls to delegate back to it. Lifestate rules
unify lifecycle and typestate constraints in one common
specification language. Our primary contribution is a
model of event-driven systems λlife from which lifestate
rules can be derived. We then apply specification mining
techniques to learn lifestate specifications for Android
framework types. In the end, our implementation is able
to find several rules that characterize actual behavior of
the Android framework.
1.
l.onClick(b)
b.onDraw()
b.enable()
b.enable()
b.disable()
b.disable()
l.onClick(b)
(a) Multi-object lifecycle
(b) Mixed lifecycle-typestate
b.disable()
b.enable()
b.disable()
b.onDraw()
b.enable()
b.disable()
b.onDraw()
b.enable()
b.disable()
b.enable()
l.onClick(b)
(c) Product of (a) and (b)
Figure 1. Event-driven object protocols are complex.
Introduction
complete. Because lifecycle constraints are so central
to implementing apps, they are typically discussed in
the framework documentation, but they are incomplete
enough that developers spend considerable manual effort
to derive more complete specifications [30].
To get a sense for the complexity of event-driven
object protocols, consider the automaton-based specifications shown in Figure 1.The meaning of such a
specification is that execution traces (projected on to
the actions of interest) must be words accepted by the
automaton. In Figure 1a, we describe a portion of a lifecycle specification for a protocol between a button object
b and its click-listener l. This automaton states that a
b.onDraw() callback notification happens before any
l.onClick(b) callback invocations. This specification
is a multi-object lifecycle constraint because it orders
callbacks on objects b and l.
In Figure 1b, we show another important property of
buttons and their click-listeners: a button can be enabled
or disabled via API calls b.enable() and b.disable(),
respectively. When button b is enabled (the upper state),
We consider the problem of specifying and mining the object protocols used by event-driven software frameworks.
Programming against event-driven frameworks is hard.
In such frameworks, programmers develop client applications (apps) against the framework by implementing callback interfaces that enable the application to be notified
when an event managed by the framework occurs (e.g.,
a user-interface (UI) button is pressed). The app may
then delegate back to the framework through method
calls to the application programming interface (API)
(e.g., to direct a change in the UI display). To develop
working apps, the application programmer must understand the complex object protocols implemented by the
event-driven framework. For example, the framework
may guarantee particular ordering constraints on callback invocations (known as lifecycle constraints), and
the application programmer may have to respect particular orderings of API calls (i.e., typestate constraints).
Unfortunately, such protocol specifications are complex to describe and maintain—and almost always in1
• We formalize a concrete semantics for event-driven
the click-listener l may receive the l.onClick(b) callback notification. Through an API call to b.disable(),
button b becomes disabled. When button b is disabled
(the lower state), the click-listener l can no longer receive
l.onClick(b) notifications. This specification mixes a
lifecycle (or callback-ordering) constraint with a typestate (or API call-ordering) constraint.
We call API calls into the framework, callins, to
clearly contrast them with callbacks that are calls back
from the framework. The specification in Figure 1b
mixes two kinds of invocations: (1) events labeled by
the callbacks they invoke to notify the app (written
slanted) and (2) callins that the app invokes to change
the state of the framework (written upright).
From just the examples in Figure 1, we see that the
specification space is rich and complex with multiple
interacting objects over callbacks and callins. Worse, the
composition of the onDraw-before-onClick specification
from (a) and the enable-disable-onClick specification
from (b) is the product automaton shown in (c). In this
product automaton, the left states are where button b
is enabled versus the right states where b is disabled,
and the upper states are where button b has yet to
be drawn versus the lower states are where b has been
drawn. While automata are descriptive and natural, the
key observation of this paper is that automata are more
precise than necessary or desired.
Thus, we take a departure from traditional automaton specifications and define a more abstract specification language consisting of lifestate rules that captures
the critical lifecycle and typestate constraints without
representing them as automata. We shall see that this
specification language is more compact than automata
and exposes lifecycle and typestate constraints as duals. At a high level, lifestate rules focus on changes in
the internal, hidden state of the event-driven framework.
For example, the enable-disable-onClick specification
from Figure 1b can be summarized as the following rules:
b.enable()
b.disable()
systems using an abstract machine model λlife that
captures an appropriate model of the internal, hidden
state of the framework (section 3). We introduce the
notion “allowedness” for API callins, which we shall
see is parallel to “enabledness” for events.
• We define a language for lifestate rules, which incorpo-
rates mixed lifecycle-typestate constraints (section 4).
• We introduce callback-driven trace slicing, a form
of trace slicing [14] adapted to events and callbacks
(section 5). The λlife model and this trace slicing
algorithm is the basis for our dynamic analysis tool,
DroidLife, that records events, callbacks, and callins
in running Android applications.
• We apply specification mining techniques to derive
lifestate specifications (section 6). In particular, we
apply unsupervised automata-based learning techniques based on probabilistic finite state automata
and hidden Markov models. We also develop a direct lifestate mining technique based on propositional
model counting (]SAT). The most significant challenge with lifestate mining is that the enables, disables,
allows, and disallows that explain callback and callin
invocations are not observable in concrete executions.
• We empirically evaluate our mining algorithms on 133
traces from a corpus of 1,909 Android apps (section 7).
Our results show that we can in fact learn several rules
corresponding to actual Android behavior and one of
which that was not in the Android documentation.
2.
Overview
In this section, we motivate the challenges in specifying
and mining event-driven object protocols and then
exhibit how our approach models event-driven systems
to mine lifestate rules about the Android framework.
We will show with our running example in Figure 2 that reasoning about the correctness of apps
requires a comprehensive understanding of the lifestate rules of various Android framework components.
In particular, the call marked with B can throw an
IllegalStateException. This code is correct, but understanding why requires a specification of subtle relationships between the various callins and the events
that trigger the callbacks. We will also see that a slight
change of this code makes it buggy.
enables l.onClick(b) for some l
disables l.onClick(b) for some l
The first rule says that whenever the invocation
b.enable() fires, the state of the framework changes
to enable the event that invokes the l.onClick(b) callback, and the second rule says when b.disable() fires,
the state changes to disable the event that invokes
l.onClick(b). These rules do not enumerate the explicit
invocation orders as in the automaton from Figure 1b.
Having defined lifestate rules for event-driven object
protocols, we investigate specification mining techniques
from dynamic traces of apps using a framework. To
address the technical challenges to this end, we make
the following contributions:
Lifestate Specification. Android is a prominent example of an event-driven framework that dispatches
a multitude of events (e.g., from user interaction or
sensors). An app gets notified about events by implementing callback interfaces that may then delegate back
to the framework through the framework’s callin interface. We consider an event-driven object protocol to be
the rules governing the use of an interface consisting of
2
callbacks and callins. Unfortunately, the protocol rules
are determined by the complex, internal behavior of the
framework, which becomes a major source of confusion
for app developers and thus of defects in apps.
To see this complexity, consider the code shown in
Figure 2. The app performs a time consuming operation (removing feeds) when the user clicks the button
b. The operation is performed asynchronously using
AsyncTask to not block the UI thread. Figure 2b shows
an execution trace of the app. Execution time flows
downwards. A box surrounds the callback and callin
invocations that happen as the result of processing of a
particular event. First event Create invokes the callback
(a:Activity).onCreate() for the object a. In this case,
object a has dynamic type MainActivity; for reasons we
will discuss below, we label the object with its most precise supertype that is a framework type. In the onCreate
callback, the code then invokes a callin for the AsyncTask
constructor (i.e., (t1:AsyncTask).<init>()) and then
the callin for setOnClickListener following the app
code at line 5. Then, the trace shows the execution of
other two events, Click, with the callback onClick, and
PostExecute, with the callback onPostExecute.
Figure 2b also depicts the back and forth flow of
control between framework and app code. The boxes
along the lines show the lifetime of activations. In
particular, we see that we can define a callback invocation
as the invocation that transfers control from framework
code to app code (arrows to the right), while a callin
is the reverse (i.e., an invocation that transfers control
from app code to framework). The difficulty in reasoning
about the code in Figure 2a is that framework behavior
that governs the possible control flow shown in Figure 2b
is obfuscated in the code.
Our running example is inspired by an actual issue in AntennaPod [1] a podcast manager for Android
with 100,000–500,000 installs from the Google Play
Store(a similar issue appears in the Facebook SDK
for Android [2]). The potential bug is that the callin
AsyncTask.execute, called via remover.execute() (line 7),
can throw an IllegalStateException.
In the example the execute call happens whenever
the user clicks button b, which in turn triggers the
event that dispatches to the OnClickListener.onClick
callback on the click-listener (set on line 5). This code
is indeed safe (i.e., does not throw the exception) because the developer enforces that the execute method
on FeedRemover is only called once. This property is
enforced by the disabling and enabling of button b
in onClick and in onPostExecute, respectively. Buttons in Android are disabled and enabled via calls to
setEnabled(false) and setEnabled(true), respectively
(corresponding to disable and enable in section 1).
3
class FeedRemover extends AsyncTask {
MainActivity a; Button b;
void doInBackground() { . . . remove feed . . . }
void onPostExecute() {
a.remover = new FeedRemover(a, b);
b.setEnabled(true);
}
1
2
}
class MainActivity extends Activity {
FeedRemover remover;
void onCreate() {
Button b = . . .;
remover = new FeedRemover(this, b);
b.setOnClickListener(new OnClickListener() {
void onClick(View v) {
b.setEnabled(false);
remover.execute();
B
}
});
}
3
4
5
6
7
}
(a) The call remover.execute() on line 7 (marked with B) can
throw an IllegalStateException if the remover task is already
running. This execute call happens whenever the user clicks button
b. This code is indeed safe because the developer enforces that
only one instance of FeedRemover is ever executing through the
disabling and enabling of the button on lines 6 and 2, respectively
(shown with dashed underline).
Framework
App
Create
(a:Activity).onCreate()
(t1:AsyncTask).<init>()
(b:Button).setOnClickListener(l:OnClickListener)
4
5
Click
(l:OnClickListener).onClick(b:Button)
(b:Button).setEnabled(false)
6
(t1:AsyncTask).execute()
7
PostExecute
(t1:AsyncTask).onPostExecute()
(t2:AsyncTask).<init>()
1
(b:Button).setEnabled(true)
2
(b) A DroidLife trace recorded dynamically. Each box is the
processing of an event. Callbacks are depicted as arrows to the
right from framework to app code; callins are arrows to the left,
which are labeled with the corresponding program location from
Figure 2a.
Figure 2. An example Android app whose safety depends on understanding the lifestate rules of two Android
framework components AsyncTask and Button.
(t:AsyncTask).execute()
small caps) and associate events with the callback(s)
they trigger (written EventonCallback()). Finally,
the last rule states that the asynchronous task constructor (t:AsyncTask).<init>() allows the t.execute()
callin. We define and discuss the formal semantics of
lifestate specifications in section 4.
We argue that specifications describing the enablingdisabling of events and the allowing-disallowing of callins
are central to event-driven object protocols. The specifications capture the relations that informally say, “When
a particular method invocation happens, the state of
the framework changes to enable or disable an event
or to allow or disallow a callin.” We unify the notions
of events and callins by introducing the term message.
To reason about lifestate specifications, we formalize an
abstraction of event-driven frameworks, called λlife , that
captures the internal state consisting of enabled and
allowed messages in section 3.
9 ci t.execute()
(b:Button).setEnabled(false)
9 evt Click(l:OnClickListener).onClick(b)
(t:AsyncTask).execute()
→ evt PostExecutet.onPostExecute()
(b:Button).setEnabled(true)
→ evt Click(l:OnClickListener).onClick(b)
(t:AsyncTask).<init>()
→ ci t.execute()
Figure 3. Some lifestate rules for AsyncTask and Button.
The first rule specifies a typestate property, while the
others are required to reason about the safety of the call
to remover.execute() in Figure 2a.
To see why this button disabling and enabling
enforces the single-executing-instance property, the
developer needs to know the interactions between
AsyncTasks, Buttons, and OnClickListeners in the Android
framework. Only with an understanding of the framework do we see that the call to b.setEnabled(false)
(line 6) disables the event that could trigger the
onClick callback (which calls the potentially problematic remover.execute()). Button b (and thus
the click event) can be enabled inside the callback
onPostExecute (line 2), but again with an understanding of the framework, we see that onPostExecute is
triggered by a post-execute event, which is in turn enabled by the call to remover.execute() (line 7). When
this happens, remover is set to a newly-allocated instance of FeedRemover (line 1), which allows for the
execute callin to be executed safely.
Without the calls to setEnabled that disables and
enables button b, (on lines 6 and 2, respectively), the app
is buggy because the user can click the button a second
time, causing a second call to remover.execute() on
the same instance of FeedRemover.
The “understanding” of the Android framework that
is necessary to reason about the code in Figure 2a
is precisely what we seek to capture with lifestate
specifications. In Figure 3, we sketch the lifestate rules
needed to reason about our running example. The first
rule, (t:AsyncTask).execute()9 ci t.execute() says
that when (t:AsyncTask).execute() is invoked for an
object t of type AsyncTask, the execute callin on t is
disallowed. We use the terms allowed and disallowed
to refer the state of callins; these terms are parallel to
enabled and disabled for the state of events. Overall, this
rule specifies that it is erroneous to call execute twice
(without something else that re-allows it).
The subsequent three rules specify disabling (written 9 evt) and enabling (written → evt) events (e.g.
setEnabled enables the onClick callback). To make
clear that the enabled-disabled state refers to events,
we give names to events, such as Click (written in
Callback-Driven Trace Slicing and Lifestate Mining. We cannot actually observe the abstraction of
the internal framework state of a running Android app.
Instead, we can only observe the sequence of method
invocations. We use the operational semantics of λlife
to derive an instrumented semantics that captures the
behavior that we can observe: messages classified into
event, callback, callin, or internal invocations. This instrumented semantics specifies the recording needed to
produce traces like the one shown in Figure 2b and is
implemented in a tool called DroidLife.
We are interested in rules about the interactions between events and callins on framework objects. To collect
traces across multiple executions, we apply the standard
type abstraction to concrete objects, resulting in an
abstract, signature message like AsyncTask.execute().
To obtain relevant lifestate rules and improve the
feasibility of mining, we slice recorded traces into subtraces that group together related method calls. Our
approach is roughly to slice a recorded trace into subtraces that collect method invocations whose arguments
share a particular concrete object, similar to Pradel
et al. [32]. However, we face the additional difficulty that
an event message is not directly a method invocation
and the relevant framework object of the event is
typically hidden in the internal state of the message.
Our insight for identifying relevant event messages
is that an event should eventually trigger a callback
where the relevant framework object is also argument
to the callback. Thus, our callback-driven trace slicing
approach determines the relevance of an event message
m based on the arguments to the callback(s) that m
eventually triggers. For example, in our trace slice
for the concrete object t1:AsyncTask, the slice includes
the PostExecute event because it eventually triggers
the callback t1.onPostExecute() and so the type4
e ∈ Expr ::= v | · · · | if v then e1 else e2
| bind v1 v2
| allow v | disallow v | invoke v1 v2
| enable v | disable v
| force m
| let x = e1 in e2
λ ::= fung x in e
g ::= app | fwk
v ∈ Val ::= x | me | · · · | λ | a | κ | h | ()
application. We also assume that there are some heap
operations of interest for manipulating a global store
ρ. Events occur non-deterministically and return to the
main event loop, so events must communicate through
the shared, global heap.
The subsequent two lines split the standard callby-value function application into multiple steps. The
bind v1 v2 expression creates a thunk κ by binding a
function value λ with an argument value v. A thunk may
be forced by direct invocation or indirect event dispatch.
Before a thunk may be forced, the allow v expression
allocates a handle h for a given thunk κ, which may
be viewed as a permission to force a particular thunk
instance or message. The permission to invoke may be
revoked by disallow v on a handle h. An invoke v1 v2 term
takes a handle-thunk pair h κ to construct a message m
where h must grant permission for forcing κ. A message
m is simply a handle-thunk pair (h, κ).
As an example, let λx be the execute method code
and let at be an address for an AsyncTask. The standard
function application (λx at ) would simply translate to
primitives
thunks
calls
events
forcing
binding
functions
packages
variables x ∈ Var
addresses a ∈ Addr
handles h ∈ Handle
thunks κ ∈ Thunk ::= λ[v]
messages m ∈ Msg ::= (h, κ)
stores
message stores
continuations
states
ρ ::= · | ρ[a 7→ v]
µ, ν ::= · | µ[(h, κ)]
k ::= • | let x = k in e | m | mk
σ ∈ State ::= he, ρ, µ, ν, ki | initial
Figure 4. The syntax and the semantic domains of
λlife , a core model of event-driven programs capturing
enabledness of events and allowedness of invocations.
abstracted sub-trace for object t1 from the recorded
trace in Figure 2b is as follows:
let k = bind
The reason to split function application into these steps
is that thunks and handles are now first-class values and
can be used in event dispatch.
The direct invocation expressions are mirrored with
expressions for event dispatch. An enable v expression
allocates a handle h for a given thunk κ and enables it
for the external event-processing system (i.e., gives the
event-processing system permission to force the message
(h, κ)), while the disable v expression disables the message named by a handle h. There is no expression directly
parallel to invoke v1 v2 . Instead, when an expression reduces to a value, control returns to the event-processing
loop to (non-deterministically) select another enabled
event. The force m expression is simply an intermediate
in evaluation that represents a message that is forceable
(i.e., has been permitted for forcing via allow or enable).
The remainder of the syntax is mostly standard, except that functions λ : fung x in e are tagged with a package g, which we discuss subsequently in subsection 3.3 regarding our instrumented semantics for recording traces.
The let expression is variable binding with the usual
semantics. Values v of this expression language are variables x, a variable used to bind the active event handle
me, whatever base values of interest · · · , closures λ, store
addresses a (which are the values of heap-allocated objects), thunks κ, handles h, and unit (). Messages m
do not need to be first class, as they are referred to
programmatically via their handles.
AsyncTask.<init>()
AsyncTask.execute()
PostExecuteAsyncTask.onPostExecute()
Once we have sets of sliced traces, we apply and
evaluate specification mining techniques to learn lifestate
rules. As alluded to above, the primary challenge for
mining lifestate specifications is that lifestate rules center
around event enabling-disabling and callin allowingdisallowing, which are not observable in recorded traces.
We present our mining approach in section 6 and we
evaluate them in section 7.
3.
Modeling Event-Driven Programs
In this section, we formalize a small-step operational
semantics for event-driven programs using an abstract
machine model (λlife ) that unifies enabledness for event
lifecycles and allowedness for callin typestates. Crucially,
this semantics motivates lifestate specifications, as the
concrete states of this semantics serves as the concrete
domain from which lifestate specifications abstract (section 4). This semantics also serves as a basis for describing our dynamic analysis for recording traces of events,
callbacks, and callins (section 5).
3.1
λx at in let h = allow k in invoke h k
Thunks, Handles, and Messages
The syntax of λlife is shown at the top of Figure 4, which
is a λ-calculus in a let-normal form. The first line of
expressions e are standard, including variables and values
v, control flow, and whatever base values and operations
of interest (e.g., integers, tuples) but excluding function
3.2
Semantics: Enabling Is Not Enqueuing
In contrast to the Android implementation, the state of a
λlife program does not have a queue. Rather, the external
5
Bind
Disable
Disallow
hbind λ v, ρ, µ, ν, ki −→ hλ[v], ρ, µ, ν, ki hdisable h, ρ, µ[(h, κ)], ν, ki −→ h(), ρ, µ, ν, ki hdisallow h, ρ, µ, ν[(h, κ)], ki −→ h(), ρ, µ, ν, ki
Enable
h∈
/ dom(µ)
Allow
Invoke
h∈
/ dom(ν)
(h, κ) ∈ ν
henable κ, ρ, µ, ν, ki −→ hh, ρ, µ[(h, κ)], ν, ki hallow κ, ρ, µ, ν, ki −→ hh, ρ, µ, ν[(h, κ)], ki hinvoke h κ, ρ, µ, ν, ki −→ hforce (h, κ), ρ, µ, ν, ki
Force
(h, (fung0 x0 in e0 )[v 0 ]) = m
InvokeDisallowed
m = (h, κ)
m∈
/ν
Event
(h, κ) ∈ µ
hforce m, ρ, µ, ν, ki −→ he0 [v 0 /x0 ][h/me], ρ, µ, ν, mki hinvoke h κ, ρ, µ, ν, ki −→ h(), ρ, µ, ν, •i hv, ρ, µ, ν, •i −→ hforce (h, κ), ρ, µ, ν, (h, κ)i
Figure 5. Semantics. Create thunks and allocate handles to disable, disallow, enable, and allow messages.
environment (e.g., user interactions) is modeled by the
non-deterministic selection of an enabled event. When
an event is processed, it begins execution in the current
state, so the effects of external events can be modeled
by effects on the global heap. This model eliminates the
complexity of a queue that is an implementation detail
for the purposes of lifestate specification.
We consider an abstract machine model with a store
and a continuation, and we enrich it with an enabled
events store µ, which is a finite map from handles to
thunks, and an allowed calls store ν, which is also a
map from handles to thunks. These stores can also
be seen as the set of enabled and allowed messages,
respectively. And thus a machine state σ : he, ρ, µ, ν, ki
consists of an expression e, a store ρ, enabled events
µ, allowed calls ν, and a continuation k (shown at
the bottom of Figure 4). The store ρ is a standard,
finite map from addresses a to values v. We explain the
special state initial while discussing the trace semantics
in subsection 3.3. A continuation k can be the top-level
continuation • or a continuation for returning to the
body of a let expression let x = k in e, which are standard.
Continuations are also used to record the active messages
via m and mk corresponding to the run-time stack of
activation records.
We define an operational semantics in terms of the
judgement form σ −→ σ 0 for a small-step transition relation. In Figure 5, we show the inference rules defining the
reduction steps related to creating, enabling-disabling,
allowing-disallowing, and finally forcing messages. The
Bind, Disable, Disallow, Enable, and Allow rules follow closely the informal semantics discussed previously
in subsection 3.1. Observe that Enable and Allow are
parallel in that they both allocate a fresh handle h, and
Disable and Disallow look up a message via its handle.
The only difference between Enable and Disable versus
Allow and Disallow is that the former pair manipulate
the enabled events µ, while the latter touches the allowed
calls ν. We write µ[(h, κ)] for the map that extends µ
with a mapping (h, κ) (i.e., is the same as µ except at
h) and similarly for other maps.
The Invoke and Event rules have similar parallels.
The Event rule says that when the expression is a value
v and the continuation is the top-level continuation •,
then a message is a non-deterministically chosen from the
enabled events µ to force. For instrumentation purposes
(see subsection 3.3), we overload continuations to record
the event message (h, κ) in the continuation. The Invoke
rule checks that the given handle-thunk pair is an allowed
message in ν before forcing.
The Force rule implements the “actual application”
that reduces to the function body e0 with the argument v 0
substituted for the formal x0 . So that the forced message
has ready access to its handle h, the h is substituted
for the me parameter. Observe that an enabled event
remains enabled after an Event reduction. A “dequeuing” event-processing semantics can be implemented by
an event disabling itself (via disable me) on execution.
To adequately model Android, it is important to be
able to model both events that are self-disabling (e.g.,
the event that invokes onCreate) and those that do
not self-disable (e.g., the event that invokes onClick).
Again for instrumentation purposes, we push the invocation message m on the continuation (via mk). The
InvokeDisallowed rule states that a disallowed message
invocation terminates the running program by dropping
the continuation. The Return and Finish rules simply
state that the recorded message m frames are popped
on return from a Force and Event, respectively. We
elide these rules and the remaining reduction rules, as
they are as expected.
3.3
Defining Callbacks and Observable Traces
We wish to record traces of “interesting” transitions from
which we mine lifestate specifications. Lifestate specifications abstract Enable, Disable, Allow, and Disallow
transitions, which are unfortunately unobservable or hidden. That is, they are transitions in λlife that are not
observable in an implementation like Android. Our challenge is to infer lifestate specifications from observable
transitions like, “An event message m was initiated.”
0
In Figure 6, we define the judgment form σ −→
τ σ ,
which instruments our small-step transition relation
6
transitions
observable kinds
initial state and a “dummy” init transition with an Init
rule. Any remaining rules defining the original transition
relation σ −→ σ 0 not discussed here are simply labeled
with the “don’t care” transition label ε.
We write JeK for the path semantics of λlife expressions
e that collects the finite (but unbounded) sequences of
alternating state-transition-state στ σ 0 triples according
0
to the instrumented transition relation σ −→
τ σ . From
paths, we derive traces $ in an expected manner by
keeping transitions but dropping intermediate states.
The design of the trace recording in DroidLife follows
0
this instrumented semantics σ −→
τ σ to obtain traces like
the one shown in Figure 2b. In particular, it maintains
a message stack corresponding to the continuation k to
emit callback cb and callin ci transitions.
τ ∈ T ⊆ Trans ::= oknd m | ε | init
oknd ::= evt | dis | cb | ci | ret
traces
$ ∈ Trans∗ ::= · | τ $
ForceCallback
(h, (funapp x0 in e0 )[v 0 ]) = m
fwk = pkg(k)
0 0
0
−→
hforce m, ρ, µ, ν, ki cb
m he [v /x ][h/me], ρ, µ, ν, mki
ForceCallin
(h, (funfwk x0 in e0 )[v 0 ]) = m
app = pkg(k)
0 0
0
−→
hforce m, ρ, µ, ν, ki ci
m he [v /x ][h/me], ρ, µ, ν, mki
def
msg(let x = k in e) = msg(k)
def
def
msg(m) = msg(mk) = m
def
pkg(k) = g if (h, (fung x in e)[v]) = msg(k)
Figure 6. Callbacks and callins are transitions between
framework and app code.
4.
Lifestate Specification: Abstracting
Enabledness and Allowedness
In this section, we define formally the meaning of lifestate
rules building on the λlife concrete model of event-driven
programs from section 3.
We consider the abstraction of messages to be a parameter of our approach. We call the message abstraction
ˆ and assume
of interest a message signature m
b ∈ Msg
it comes equipped with a standard concretization funcˆ → ℘(Msg) to give signatures meaning and
tion γ : Msg
ˆ
an element-wise abstraction function β : Msg → Msg
to lift a message to its signature satisfying the soundness and best-abstraction relationship. In the case of
an Android method call like (t: AsyncTask).execute()
(which corresponds to a message m : (ht , λx [at ]) for some
handle ht , function λx , and object address at ), the
message signature can be the Java method signature
AsyncTask.execute(). In DroidLife, we make a further
refinement on Java method signatures to split on values of primitive type, so Button.setEnabled(false) and
Button.setEnabled(true) are considered distinct message signatures. For the implementation, the elementwise abstraction function β is applied to recorded messages to produce message signatures for lifestate mining.
A lifestate specification R
b is a set of rules where
a rule b
r is an enable → evt, disable 9 evt, allow → ci,
or disallow 9 ci constraint. We define the meaning of
lifestate specifications by defining an abstraction of the
concrete transition relation σ −→ σ 0 for λlife .
To do so, we consider signature transitions b
τ and
a signature traces $.
b A signature transition b
τ are
simply analogous to concrete transitions τ , except over
signatures m
b instead of concrete messages m. As input
to specification mining, we are only concerned with the
event evt, callin ci, and disallowed dis transition kinds, so
we drop the callback cb and return ret kinds. A signature
trace $
b is simply a sequence of signature transitions. To
define the meaning of signature transitions and traces, we
from the previous subsection with transition labels τ .
Interesting observable transitions correspond primarily
to introduction and elimination operations on messages.
We instrument the Event rule to record that event
message m was initiated (via observable evt m). Similarly,
we instrument the InvokeDisallowed rule to record that
an invocation of a message was disallowed (via dis (h, κ)).
We use ε to instrument an uninteresting, “don’t care”
transition or an unobservable, “don’t know” transition.
The allowed invocation of a message with the Invoke
rule is an uninteresting transition, so it is simply labeled
with ε. These cases are simply adding a transition label
to the rules from Figure 5, so they are not shown here.
Recall from section 2 that we define a callback as an
invocation that transitions from framework to app code
and a callin as an invocation from app to framework
code. In λlife , this definition is captured crisply by the
context in which a message is forced. In particular,
we say that a message is a callback if the underlying
callee function is an app function (package app) and it
is called from a framework function (package fwk) as
shown in ForceCallback. The msg(·) function inspects
the continuation for the running, caller message. The
pkg(·) function gets the package of the running message.
Analogously, a message is a callin if the callee function
is in the fwk package, and the caller message is in the app
package (rule ForceCallin). There is a remaining rule
not shown here, force (ForceInternal), where there is
no switch in packages (i.e., g 0 = pkg(k) where g 0 is the
package of the callee message). It is not an interesting
transition, so it is labeled with ε.
These three cases for force replace the Force rule
from Figure 5. We also instrument the Return rule
to record returning via ret m to retain a call tree
structure in the sequence of transitions. Finally, to
simplify subsequent definitions, we introduce a “dummy”
7
νb according to the lifestate rules R.
b For example, the
Enabled rule checks if the current transition evt m
b can
happen by checking if m
b is in the enabled set µ
b. If so,
it updates the permitted state according to the rules R.
b
The helper function →evt (bı) gathers the set of messages
that is enabled by bı and similarly for disable, allow, and
disallow rules. For presentation cleanliness, we leave the
rules R
b implicit in the inference rules since it is constant.
Finally, the meaning of a lifestate specification JRK
b is
the set of signature traces that do not get stuck during
reduction (where −→∗ is the reflexive-transitive closure
R
b
of the single step relation). And this definition gives rise
to a natural description for when a trace is described by
or sound with respect to a specification:
R
b ∈ LifeSpec ::= · | R
b , br
lifestate specs
rules
br ::= bı 99K m
b
forcings bı ::= m
b | init
99K::= → evt | 9 evt | → ci | 9 ci
ˆ ::= oknd
b
τ ∈ Trans
[m
b | init
signature transitions
oknd
[ ::= evt | ci | dis
signature traces
∗
ˆ
$
b ∈Π
b ⊆ Trans
::= · | b
τ$
b
µ
b, b
ν ::= · | µ
b, m
b
ˆ ::= h$,
σ
b ∈ State
b µ
b, b
νi
signature stores
signature states
Enabled
m
b ∈b
µ
µb0 = b
µ ∪→evt (m
b)
νb0 = b
ν ∪→ci (m
b)
µb0 = b
µ ∪→evt (m
b)
νb0 = b
ν ∪→ci (m
b)
0
h(evt m
b )$
b,b
µ, b
ν i −→ h$
b , µb −9evt (m
b ), νb0 −9ci (m
b )i
Allowed
m
b ∈b
ν
0
b
Definition 1 (Trace Soundness). A signature trace $
is sound with respect to a lifestate specification R
b iff $
b
is described by R
b (i.e., $
b ∈ JRK).
b Or in other words, the
signature trace $
b can be reduced without getting stuck
(i.e., h$,
b ·, ·i −→∗ h·, µ
b, νbi for some µ
b, νb).
R
b
A specification is then sound with respect to a
λlife program if its signature traces abstract the set
of concrete traces of the program:
0
h(ci m
b )$
b,b
µ, b
ν i −→ h$
b , µb −9evt (m
b ), νb −9ci (m
b )i
Disallowed
Initialized
h(dis m
b )$
b,b
µ, b
ν i −→ h$
b,b
µ, b
νi
b
µ = →evt (init)
b
ν = →ci (init)
h(init)$
b , ·, ·i −→ h$
b,b
µ, b
νi
m
b ∈/ b
ν
def
b ∈R
b
b
m
b bı→ evt m
def
ı) = m
b bı→ ci m
b ∈R
b
→ci (b
→evt (ı) =
J·K
JR
bK
:
def
=
def
b ∈R
b
b
m
b bı9 evt m
def
ı) = m
b bı9 ci m
b ∈R
b
9ci (b
9evt (ı) =
Definition 2 (Specification Soundness). A lifestate
specification R
b is sound with respect to an expression e
iff for every trace $ of e, it is in the concretization of a
signature trace $
b of R
b (i.e., formally, JeK ⊆ γ(JRK)).
b
∗
LifeSpec → ℘(Trans )
n
o
$
b h$
b , ·, ·i −→∗ h·, b
µ, b
ν i for some b
µ, b
ν
R
b
ˆ
5.
Figure 7. Meaning of lifestate specifications. A lifestate
rule b
r is an abstraction of enabling enable v, disabling
disable v, allowing allow v, or disallowing disallow v
transitions.
Trace Slicing for Multi-Object
Event-Driven Protocols
As the specification mining problem is severely underconstrained, we wish to constrain the search space of
specifications as much as possible before applying the
learning algorithms. As a first step, we wish to slice a
trace into sub-traces that group together related messages or method invocations that (likely) correspond to
different protocols. A well-known issue is that related
method invocations may involve multiple objects. This issue is exacerbated in event-driven protocols where event
messages correspond to some internal data structures
of the framework rather than method calls per se. For
instance, in our running example, a call to the callin
(b:Button).setEnabled(. . .) that enables or disables a
button b should be associated with a Click event for b.
One reasonable and common assumption is that two
related messages should use some common values that
are readily accessible, such as arguments for method
invocations. We call this heuristic, the argument-sharing
strategy, and leave as a parameter of the strategy
a function args : Msg → ℘fin (Val) that specifies the
arguments of a message. This heuristic is similar to
the one employed by Pradel and Gross [31] for mining
multi-object API protocols. Following the argumentsharing strategy, we can slice observations so that they
lift the concretization on message signatures to signature
transitions b
τ and traces $
b in the expected way.
We can then define a signature store µ
b, νb as a set of
message signatures, which is an abstract analogue of
a message store. In a signature state σ
b : h$,
b µ
b, νbi, the
signature store µ
b is a set of enabled message signatures
(i.e., abstract messages) and νb is a set of allowed
message signatures. For convenience, we refer to the
union µ
b ∪ νb of enabled and allowed message signatures
in a state as the set of permitted signatures and all other
message signatures that are disabled or disallowed as
the prohibited signatures.
A signature state σ
b : h$,
b µ
b, νbi also includes a signature
trace $
b that controls the execution of a corresponding
abstract machine defined by the transition relation
σ
b −→R
b0 that is parametrized by a set of rules R
b and
bσ
defined in Figure 7. This transition relation is relatively
straightforward: it considers the signature transition b
τ
at the beginning of the $
b and determines whether b
τ is
permitted according to the set of permitted signatures.
If it is permitted, it updates the signature stores µ
b and
8
contain only observable transitions that share a common
argument (this strategy is essentially described as trace
slicing [14]).
However, one issue in trace slicing for event-driven
object protocols is that the messages of interest are the
event messages (in evt m) and the callin messages (in
ci m0 ). As noted above, the “argument” of interest for
the Click event message is the button b buried inside
internal implementation-specific data structures.
From the (b:Button).setEnabled(. . .) callin and
Click event example, we also see that regardless of how
b may be stored in the Click event message, the Click
event eventually invokes the callback l.onClick(b) on
some listener l where button b becomes an argument
(retrieving b in some implementation-specific manner).
Thus we extend the argument-sharing strategy to event
messages by defining the arguments of an event message
m as the arguments of any callbacks that it invokes
(instead of m’s own arguments). Once the traces have
been sliced for each object, we apply the message abstraction function β and partition the traces based on
the abstraction of the sliced object.
While our particular argument-sharing strategy focuses on associating callbacks with their initiating events,
this strategy is quite flexible in that other appropriate
context information (e.g., values reached through the
heap) could be incorporated into the trace slice.
6.
accuracy in modeling complex, often partially observable
processes. The challenge of learning a probabilistic model
of the interaction between the Android framework and
an app over the alphabet of signature messages is that
in general neither model has a direct interpretation.
For a state xi of an a HMM or PFSA A, we define the
set of permitted message signatures to be the labels of
all enabled outgoing transitions and the set of prohibited
message signatures as its complement.
For a state xi and an enabled outgoing transition
labeled m,
b we learn the lifestate enable (or resp. allow)
rules that m
b permits all message signatures prohibited
in xi but permitted in the target set of this transition.
Similarly, for the state xi and an enabled outgoing
transition labeled m,
b we learn disable (or disallow)
rules that m
b prohibits all messages permitted in xi
that become prohibited along the transition.
The final lifestate specification R
b is the union of
permit and prohibit rules of all states of the automaton.
To identify high probability rules, we associate with
each rule m
b i 99K m
bj ∈ R
b a weight that is the sum
the probabilities of all transition that define the rule
normalized by the number of permitted sets m
b i is in.
Symbolic Sampling via ]SAT. In contrast to the
two-phase probabilistic automata approaches, we propose an algorithm that directly learns a lifestate specification from the set of signature traces Π
b that is potentially
easier to interpret.
The learning algorithm proceeds by computing a
weight for each possible rule in RuleSet using the
traces in Π
b and then obtains a lifestate specification by
selecting the rules that meet a weight threshold. The
weight assigned to a rule is an average, among all the
traces in Π,
b of the fraction of the total executions that
are sound for that rule.
Intuitively, the ideal settings to compute the weight
is to observe the sequence of signature states and
transitions (a signature path). The main difficulty we
face is that the internal state of the permitted messages
(i.e., the signature state h$,
b µ
b, νbi) is not observable. To
address the problem, we propose an abstraction of the
signature paths, which we use in our learning algorithm.
We assume no prior knowledge on the internal behavior of the framework and define the most conservative
abstraction via the non-deterministic transition relation
σ
b −→n σ
b0 that, upon invoking a permitted enable or allow
signature transition b
τ , can non-deterministically change
the internal state of the system (i.e., permits or prohibits
any other message) but keeps the semantics of disallow
and disables as in Figure 7. This choice of abstraction
may produce a large number of spurious behaviors that
could affect the quality of rules we learn, but we make
the following observations: (i) the imprecision introduced
by the spurious transition may be reduced by observing
Mining Lifestate Specifications
In the previous sections, we formalized a model for eventdriven systems like Android centered around enabled
events and allowed callins. From this model, we derive
the notion of lifestate specifications. In this section, we
discuss an application of specification mining techniques
to learn lifestate specifications. For a set of signature
traces Π,
b let Σ be the set containing all the abstract
messages contained in the traces Π
b and init. We learn
specifications where the messages in the rules are elements of Σ, hence restricting our learning algorithms to
an abstraction of messages that we observed concretely.
We denote with RuleSet the set of all the possible rules
that can be learned from Σ.
The goal of the mining algorithms is to find a specification R
b ∈ ℘(RuleSet) and to this end we consider 3
different approaches. Two of these are applications of an
off-the-shelf machine learning tool Treba [23] learning
probabilistic models of the interaction between the app
and the Android framework, and a symbolic sampling
one based on model counting of propositional Boolean
formulas [20], implemented with pySMT [19] and the
solver sharpSAT [35].
Probabilistic Models. Hidden Markov Models (HMM) and Probabilistic Finite State Automata (PFSA) are
common statistical models famed for their simplicity and
9
a large number of traces; (ii) with a further knowledge
of the framework, we can reduce the non-determinism
(i.e. reducing the abstract paths), hence improving the
quality of the learned specification.
The main challenge with this approach is that enumerating all abstract paths for a signature trace is intractable. To overcome this problem, we represent the
set of possible abstract paths symbolically encoded as a
propositional logic formula, to leverage efficient model
counting solvers.
Research Questions. Given a candidate specification (i.e., a set of lifestate rules) obtained from a learning
method, we consider the following research questions.
Learn Specifications by Counting Paths. Given a signature trace $
b:b
τ1 ...b
τ n , let Paths($)
b denotes the set
of all the sequences of states and transitions (paths) under the non-deterministic semantics. For each rule kind
bı→ evt m
b (resp. 9 evt, → ci, 9 ci), we say that the rule is
“matched” in a state of the path if, in that state, the message m
b is enabled (resp. disabled, allowed, disallowed)
and the abstract transition executes the message bı.
We want to count all the paths of a trace such that
the ratio of the number of states of the path that match
the rule over the total number of times we seen bı in the
trace is greater than a weight w. For a signature trace
$,
b we call RulePaths($,b
b r) such set of paths.
Given a signature trace $
b and a rule b
r, the frequency
of b
r in $
b with weight w, is given by:
• RQ2 (Veracity): For each rule in a mined specifi-
def
Freq(w,b
r, $)
b =
• RQ1 (Sufficiency): Is a mined specification sound with
respect to previously unseen traces? We say that a
specification is sufficient for explaining a set of traces
if each trace is sound with respect to the specification
(according to Definition 1 in section 4). Foremost, we
seek specifications that are, in the limit, sufficient to
explain all actual Android behavior.
cation, does the rule correspond to actual Android
behavior? We say that a specification is veracious
if it captures when a message should be enabled or
allowed during the execution of an app and when it
should not. In the end, we want to find rules that in
fact describe the true enabling, disabling, allowing,
and disallowing behavior of Android.
Experimental Methodology. We consider the mining algorithms from section 6 based on probabilistic models (HMM and PFSA) and symbolic sampling (]SAT).
For the symbolic sampling approach, we use two weight
thresholds 0.6 and 0.8, corresponding intuitively to keeping only the rules that explain slightly more than half
the paths and those that explain most paths, respectively. This selection of parameters gives us four learning
methods to evaluate that we abbreviate as ]SAT-0.6,
]SAT-0.8, HMM, and PFSA.
Traces recorded by DroidLife are sliced for each object,
abstracted into message signatures, and grouped by the
framework type of the slicing object. Thus, we have a
corpus of sliced and abstracted traces for each framework
type of interest. To evaluate a learning method, we divide
a trace corpus into a training set and a testing set using
5-fold cross validation.
|RulePaths($,b
b r)|
.
|Paths($)|
b
The notion can naturally be lifted to a set of signature
traces Π
b by taking the geometric mean of the fractions
of the observed traces.
Let δ be a real constant. The final specification is
def
R
b = {b
r | Freq(w,b
r, Π)
b ≥ δ}. The threshold δ is needed
to select only the rules that, according to the frequency
value, more likely capture the framework behavior.
The number of paths in the sets Paths($)
b and
RulePaths($,b
b r) is exponential in the total number
of messages. Thus, it is not feasible to explicitly enumerate them. Our solution is to encode all the paths in
Paths($)
b as a propositional logic formula. The intuition
is that each (complete) model of this formula represents
a path in Paths($).
b Hence, we cast the problem of
counting the cardinality of Paths($)
b to the problem of
counting the number of models of the Boolean formula,
for which several efficient tools exist (e.g. [35]). The encoding is an adaptation of Bounded Model Checking [10],
a technique that encodes all the paths of length k of a
transition system.
7.
Corpus: Generating Sliced and Abstracted Traces
We begin with 133 traces of running Android applications recorded by DroidLife. These traces were generated
from a corpus of 1909 apps retrieved from Github.
We used two different methods for generating traces:
manual exercising of the app and automatic by means
of the UI Exerciser Monkey. We chose to generate some
traces using manual exercising because apps require user
logins, API keys, and other inputs that present problems
for automatic exploration tools (e.g., [5, 8, 27]). The
manual method resulted in 65 traces and the automatic
in 68. The process for manual trace generation was to
exercise the app in a normal manner for 10 minutes under
instrumentation. For the automatic Monkey, a script
loaded the application on an Android emulator, waited
3 minutes for any application initialization, and then
pulsed the UI exercising 40 times. Each time inputting
50 random events and delaying 30 seconds in between.
Empirical Evaluation: Mining
Here, we evaluate empirically whether our process finds
meaningful lifestate specifications, as well as compare
the quality of the specifications obtained from different
mining algorithms.
10
Table 1. The data set is partitioned by framework type
(f-type) on the sliced object. For each trace set, we
give the number of traces, the average length of the
traces (len), the total number of distinct event message
signatures (evts), callin signatures (cis), and the size of
the specification space (|LifeSpec|).
Table 2. Mined candidate specifications. For each trace
set for a framework type, we apply each method to learn
on a training set (using 5-fold cross validation). This
table shows the number of lifestate rules of each kind
on the first training set.
lifestate rules
traces
len
evts
cis
|LifeSpec|
(num)
(mean)
(num)
(num)
(num)
Fragment
FragmentV4
Button
AsyncTask
52
124
654
63
9.7
9.0
4.6
3.8
6
10
4
1
19
34
28
4
1275
3916
2080
55
summary
893
6.8
21
85
7326
f-type
→ evt
From the corpus of 133 recorded traces, we apply
callback-driven trace slicing from section 5 to get 6134
sliced traces over 184 framework types. Each framework
type corresponds to a partition of the 6134 sliced traces.
We selected four of these framework types, which had
trace sets of sufficient length and diversity of events
and callins, for evaluating our learning methods. In
Table 1, we list some statistics about the data set.
The specification space (|LifeSpec|) is the number of
possible lifestate rules as determined by the number of
observed events (evts) and callins (cis). The summary
line is the total number of traces, the mean of mean
length of traces, the total number of event and callin
signatures, the total specification space.
f-type
method
Fragment
Fragment
Fragment
Fragment
FragmentV4
FragmentV4
FragmentV4
FragmentV4
Button
Button
Button
Button
AsyncTask
AsyncTask
AsyncTask
AsyncTask
]SAT-0.6
]SAT-0.8
HMM
PFSA
]SAT-0.6
]SAT-0.8
HMM
PFSA
]SAT-0.6
]SAT-0.8
HMM
PFSA
]SAT-0.6
]SAT-0.8
HMM
PFSA
total
(num)
9 evt
(num)
→ ci
(num)
9 ci
(num)
2
0
7
12
2
0
39
27
7
2
29
20
1
0
2
1
0
0
12
14
0
0
24
45
1
1
22
25
0
0
4
2
17
3
48
39
24
2
235
145
30
7
87
87
2
1
6
5
5
0
32
41
2
0
209
213
7
4
89
90
0
0
8
5
151
150
738
705
Sound Traces (frac/on)
Sufficiency
Candidate Specifications. In Table 2, we show the
number of each rule kind learned using each method
on the first training set. Our first observation is that
the probabilistic model-based methods generate many
more candidate rules than the symbolic sampling-based
method. This observation is not unexpected, as the symbolic sampling-based method takes a more conservative
approach for generating rules: it generates rules based
on the frequency of explainable signature traces. Our
second observation is that event-disables are the least
frequently derived rules. This observation is also not
unexpected, as event-disables are the least constrained
rule kind. The total line is the total number of rules
of each kind. The magnitude is not meaningful, but it
shows the relative frequency of the rule kinds.
1
0.8
0.6
0.4
0.2
0
Fragment
Fragment v4
Bu;on
AsyncTask
Average
SAT-0.6
SAT-0.8
PFSA
HMM
Learning Method
Figure 8. Sufficiency measures the fraction of sound
traces of a given testing set for a given specification
(higher is better). For each training set for a framework
type, we measure sufficiency for each learned specification on the corresponding testing set. The y-axis shows
the average sufficiency measure over the testing sets
(from 5-fold cross validation) for each framework type
grouped by learning method. The rightmost bar in each
group shows the average over the four framework types.
RQ1: Measuring Sufficiency. Given a testing set
and a candidate specification, we measure sufficiency as
the ratio of traces that are sound with respect to the
specification to the number of traces in the testing set.
Figure 8 shows the sufficiency measure for each
learned specification, grouped by method. No one
method dominates the others by this measure. For
example, the PFSA method is the only one that gen-
erates rules that have soundness fraction over 0.5 for
Fragment but is worse than all other methods for AsyncTask.
The sufficiency measure for ]SAT-0.8 is generally high,
but recall from Table 2 that ]SAT-0.8 learns far fewer
rules than the other methods. It is quite conservative in
the rules it learns, but for the rules that it does learn,
11
each column. Since no single method dominated most
of the time, this row shows that the combination of
methods can learn a more complete specification than
any single method alone. In total we learned 75 unique
rules which model the behavior of the framework. Of
these, 55 directly correspond to the cause and effect that
a developer would attribute to the system.
The highest level point is that a number of actual
rules are learned for each framework type by both learning methods (the actual column) out of the thousands of
possible rules shown in Table 1 (7326) by only examining
the top 20 rated rules from each learning method. And
furthermore, most actual rules that are learned correspond to the real root cause in the Android framework
(the direct column). This observation provides supporting evidence for lifestate rules capturing event-driven
object protocols at an appropriate level of abstraction.
The only exception to the high fraction of actual rules
is the AsyncTask which can be fully specified by 7 rules as
we describe further below. This biases the fraction to be
low since we took the top 20 rated rules, and there were
only 7 rules to learn. And every specification needed for
AsyncTask was learned. Furthermore, most of the direct
rules are found even in the top 10.
One remaining question is how many rules are required to specify the protocol. Is it the case that the
number of rules for each framework type should be small
compared to the number of possible rules. To address
this question, we manually specified the full set of rules
for AsyncTask for the observed events and callins (since
this class is comparatively small with only 55 possible
rules compared to the thousands possible for the other
framework types, see Table 1).
Manual specification of AsyncTask resulted in 7 direct
rules. The result is that we are learning 3 out of the
7 direct rules with the ]SAT-0.6 method, 4 out of 7
with the PFSA method, and 6 out of 7 with the HMM
method. There were no rules in the manually created
set which were not learned by one of our algorithms.
Table 3. Veracity is a measure of precision in finding
actual rules by manually triaging the rules found by each
learning method. The actual column shows the number
of learned rules that correspond understood Android
behavior. The direct shows the number of actual rules
that also correspond to the root enable, disable, allow,
or disallow in Android.
rules
actual
direct
num
num
num (frac)
Fragment
Fragment
Fragment
Fragment
method
]SAT-0.6
PFSA
HMM
total unique
20
20
20
42
10
14
5
22
7
11
4
18
(0.7)
(0.8)
(0.8)
(0.8)
FragmentV4
FragmentV4
FragmentV4
FragmentV4
]SAT-0.6
PFSA
HMM
total unique
20
20
19
58
8
12
11
24
7
10
9
19
(0.9)
(0.8)
(0.8)
(0.8)
Button
Button
Button
Button
]SAT-0.6
PFSA
HMM
total unique
20
20
20
49
6
7
3
14
3
7
3
11
(0.5)
(1 )
(1 )
(0.8)
AsyncTask
AsyncTask
AsyncTask
AsyncTask
]SAT-0.6
PFSA
HMM
total unique
3
13
19
22
3
10
12
15
3
4
6
7
(1 )
(0.4)
(0.5)
(0.5)
all objects
total unique
171
75
f-type
55 (0.7)
they tend to generalize well. The ]SAT-0.6 and PFSA
methods appear to balance producing more candidate
rules and ones that generalize reasonably well. We thus
consider manual triage of the rules produced by these
two methods for evaluating veracity.
RQ2: Evaluating Veracity. To evaluate veracity,
we take a candidate lifestate specification and manually
triage the rules and categorize them with respect to
the correctness in capturing the true behavior of the
Android framework. We consider the following categories
of correctness: (actual) the rule abstracts understood
Android behavior from reading Android documentation
or the framework code; (direct) the rule is actual and
corresponds to the root cause in Android (e.g., a learned
enable rule corresponds to direct enabling in Android);
(false or unknown) the rule appears to contradict
understood Android rules. If we cannot be sure that
a learned rule corresponds to a actual rule, then we
conservatively classify it as false.
In Table 3, we show veracity results for the ]SAT-0.6,
PFSA, and HMM methods for each framework type. We
manually triaged the twenty rules with highest weight
(using the parsimony assumption that the number of
rules for each framework type should be small). We
then add a row for the total number of unique rules in
Threats to Validity. The rules that can be learned
are limited by the observations available in the traces.
For example, there was no opportunity to learn anything
about the AsyncTask.cancel() callin since our traces did
not include any observations of such an invocation. In
the end, we are limited by the extent by which framework
behavior can be explored through dynamic execution.
To try to mitigate this affect, we made traces with
as many applications as possible minimizing duplicate
traces. This exposes us to more possible ways developers
may use a given framework object. There is a potential
for bias in selecting the framework types on which to
mine specifications. To minimize this effect, we selected
by looking just at the number and length of traces and
diversity of events and callins (from Table 1).
12
Mined Specifications. From the veracity summary,
the ]SAT-0.6, PFSA, and HMM methods appear comparable, so we look more closely into the rules that
are learned. From our running example in section 2,
the most important rule that we would expect is that
(t:AsyncTask).execute() callin can only be called once.
It is indeed learned by all three methods. Another important rule is that the PostExecute event is enabled
by the (t:x AsyncTask).execute() callin. In this case,
the ]SAT-0.6 and HMM methods learned this rule but
the PFSA method did not.
The biggest source of false rules learned that we observed are rules that appear to come from common patterns in how developers use the framework. For example,
one rule learned by PFSA is that (b:Button).getWidth()
disallows itself, which perhaps corresponds to few traces
with repeated calls to getWidth.
A source of actual but not direct rules relates to
callbacks and super calls. We found that a common
pattern in Android is to require a call to the super
method. For example to implement onActivityCreated,
super.onActivityCreated would need to be called.
Thus in functioning applications, this super call is seen as
a callin that always happens with the event the triggers
the onActivityCreated callback. Thus, the left-hand–
side of a actual but not necessarily direct rule is where
the left-hand–side is either the event or the super callin.
One could reasonably consider removing required super
calls from our definition of callins.
In the end, we found a rule that captures an
undocumented behavior of Android in the official
Android documentation. The rule states that the
(f:Fragment).getResources() is allowed when the event
ActivityCreated that triggers the onActivityCreated
callback. The getResources callin will throw an exception if called before this ActivityCreated event.
8.
for lifecycle events in addition to their interaction with
typestate APIs for frameworks.
Other work also simplifies automata specifications
by considering simpler rule-based approaches (e.g., [18,
38]). Subsequently, Lo et al. [25] extend this kind
of specification to QBEC (quantified binary temporal
rules with equality constraints) specifications. However,
these rule-based approaches differ from lifestate rules
in that they express necessary causation (e.g for every
lock there must be a subsequent unlock). In contrast,
lifestate rules do not express such conditions, and these
conditions are actually undesirable, as most events in
event-driven systems enable other events but do not
cause them to occur.
Concerning static mining techniques, Alur et al. [4]
propose a technique to infer a typestate interface for
a given Java class. This technique could conceivably
be used to statically infer typestate specifications for
event-driven frameworks such as Android. However, their
technique does not account for the unique relationship
between typestate and lifecycle events in event-based
systems. Additionally, Shoham et al. [34] develop a technique for inferring the typestate of a certain API by analyzing presumably correct client programs. The order of
method invocations, determined statically, can produce
a multi-object typestate specification. Ramanathan et al.
[33] propose a similar technique, but one that can also
derive invariant-based preconditions. However, to our
knowledge these techniques also cannot be successfully
extended to event-based systems, where typestate and
lifecycle properties may interact.
Analysis of Event-Driven Systems. Recently,
more and more program analyses have focused on eventdriven systems. Both dynamic analyses, such as for race
detection [22, 29], and static analyses for information
flow [7] and safety properties [11] expect some specification of framework behavior with respect to callbacks.
There has also been a number of recent static analyses
targeting information flow concerns (e.g., [16, 21, 37])
where a significant concern is synthesizing models for
taint flow through the framework [9].
There are also some tools concerned with exposing
the implicit control flow from the framework to callbacks
by linking callback registration methods with their
callbacks [13, 28], modeling GUI components [41], and
explicating reflection [12]. This information is useful for
creating an over-approximation of the possible callbacks
but does not capture precise events that may enable or
disable a given event that then invokes the callback.
Related Work
Specification Mining. Our technique is broadly similar to mining typestate specifications for API interfaces
from traces (e.g., [3, 6, 15, 17, 31, 36, 39, 40]). Our contribution can be seen as an extension that, in addition
to inferring typestate properties, also infers the ordering constraints of lifecycle events that interleave and
interact with typestate properties. Ammons et al. [6]
presents one of the earliest attempts to infer temporal
specifications of programs by mining observed traces.
Notably, Yang et al. [40] extend the technique to scale to
larger data-sets with imperfect traces, and Pradel and
Gross [31] improve the technique to mining specifications
for collaborations involving multiple, interacting objects.
There is also work on combining automata mining with
value-based invariant mining [24, 26]. However, we are
unaware of any previous work that mines specifications
9.
Conclusion
We have presented lifestate rules, a language for specifying event-driven object protocols. The key idea underlying lifestate rules is a model of event-driven programs
13
in terms of enabled events and allowed callins unified
as suspended messages. As a result, lifestate rules are
able to capture mixed lifecycle and typestate constraints
at a higher level abstraction than automata. We then
instantiated this model in a dynamic analysis tool called
DroidLife that prepares Android traces for specification
mining using a notion of trace slicing adapted to events
and callbacks. Finally, we applied specification mining
techniques to infer lifestate specifications based on unsupervised automata-based learning techniques that have
been previously applied to typestate mining, as well as a
direct lifestate mining technique based on propositional
model counting. In the end, we were able to learn several actual lifestate rules that accurately capture the
behavior of Android in a compact way.
[11] S. Blackshear, B. E. Chang, and M. Sridharan. Selective
control-flow abstraction via jumping. In Object-Oriented
Programming Systems, Languages, and Applications
(OOPSLA), 2015.
[12] S. Blackshear, A. Gendreau, and B. E. Chang. Droidel:
A general approach to Android framework modeling. In
State of the Art in Program Analysis (SOAP), 2015.
[13] Y. Cao, Y. Fratantonio, A. Bianchi, M. Egele, C. Kruegel,
G. Vigna, and Y. Chen. Edgeminer: Automatically
detecting implicit control flow transitions through the
android framework. In Network and Distributed System
Security (NDSS), 2015.
[14] F. Chen and G. Rosu. Parametric trace slicing and monitoring. In Tools and Algorithms for the Construction
and Analysis of Systems (TACAS), 2009.
[15] V. Dallmeier, C. Lindig, A. Wasylkowski, and A. Zeller.
Mining object behavior with ADABU. In Dynamic
Systems Analysis (WODA), 2006.
References
[1] AntennaPod - FeedRemover bug report.
https:
//github.com/AntennaPod/AntennaPod/issues/1304.
Accessed: 2016-03-13.
[16] Y. Feng, S. Anand, I. Dillig, and A. Aiken. Apposcopy:
Semantics-based detection of Android malware through
static analysis. In Foundations of Software Engineering
(FSE), 2014.
[2] Facebook
SDK
for
Android
AsyncTask
bug report.
https://github.com/facebook/
facebook-android-sdk/pull/315. Accessed: 2016-0313.
[17] M. Gabel and Z. Su. Javert: Fully automatic mining
of general temporal properties from dynamic traces. In
Foundations of Software Engineering (FSE), 2008.
[3] M. Acharya, T. Xie, and J. Xu. Mining interface specifications for generating checkable robustness properties.
In Software Reliability Engineering (ISSRE), 2006.
[18] M. Gabel and Z. Su. Online inference and enforcement
of temporal properties. In International Conference on
Software Engineering (ICSE), 2010.
[4] R. Alur, P. Černý, P. Madhusudan, and W. Nam.
Synthesis of interface specifications for Java classes. In
Principles of Programming Languages (POPL), 2005.
[19] M. Gario and A. Micheli. pySMT: a solver-agnostic
library for fast prototyping of smt-based algorithms.
In Workshop on Satisfiability Modulo Theories (SMT),
2015.
[5] D. Amalfitano, A. R. Fasolino, P. Tramontana, S. D.
Carmine, and A. M. Memon. Using GUI ripping for
automated testing of Android applications. In Automated
Software Engineering (ASE), 2012.
[20] C. P. Gomes, A. Sabharwal, and B. Selman. Model
counting. In Handbook of Satisfiability. 2009.
[21] M. I. Gordon, D. Kim, J. Perkins, L. Gilham, N. Nguyen,
and M. Rinard. Information-flow analysis of Android
applications in DroidSafe. In Network and Distributed
System Security (NDSS), 2015.
[6] G. Ammons, R. Bodı́k, and J. R. Larus. Mining
specifications. In Principles of Programming Languages
(POPL), 2002.
[22] C.-H. Hsiao, J. Yu, S. Narayanasamy, Z. Kong, C. L.
Pereira, G. A. Pokam, P. M. Chen, and J. Flinn. Race
detection for event-driven mobile applications. In Programming Language Design and Implementation (PLDI),
2014.
[7] S. Arzt, S. Rasthofer, C. Fritz, E. Bodden, A. Bartel,
J. Klein, Y. L. Traon, D. Octeau, and P. McDaniel.
FlowDroid: Precise context, flow, field, object-sensitive
and lifecycle-aware taint analysis for Android apps.
In Programming Language Design and Implementation
(PLDI), 2014.
[23] M. Hulden. Treba: Efficient numerically stable EM for
PFA. In Grammatical Inference (ICGI), 2012.
[8] T. Azim and I. Neamtiu. Targeted and depth-first
exploration for systematic testing of Android apps. In
Object-Oriented Programming Systems, Languages, and
Applications (OOPSLA), 2013.
[24] D. Lo and S. Maoz. Scenario-based and value-based
specification mining: Better together. In Automated
Software Engineering (ASE), 2010.
[9] O. Bastani, S. Anand, and A. Aiken. Specification
inference using context-free language reachability. In
Principles of Programming Languages (POPL), 2015.
[25] D. Lo, G. Ramalingam, V.-P. Ranganath, and
K. Vaswani. Mining quantified temporal rules: Formalism, algorithms, and evaluation. Sci. Comput. Program.,
77(6), 2012.
[10] A. Biere, A. Cimatti, E. M. Clarke, and Y. Zhu. Symbolic
model checking without bdds. In Tools and Algorithms
for the Construction and Analysis of Systems (TACAS),
1999.
[26] D. Lorenzoli, L. Mariani, and M. PezzÃĺ. Automatic generation of software behavioral models. In International
Conference on Software Engineering (ICSE), 2008.
14
[27] A. Machiry, R. Tahiliani, and M. Naik. Dynodroid: an
input generation system for Android apps. In European
Software Engineering Conference and Foundations of
Software Engineering (ESEC/FSE), 2013.
[28] M. Madsen, F. Tip, and O. Lhoták. Static analysis of
event-driven node.js javascript applications. In ObjectOriented Programming Systems, Languages, and Applications (OOPSLA), 2015.
[29] P. Maiya, A. Kanade, and R. Majumdar. Race detection
for Android applications. In Programming Language
Design and Implementation (PLDI), 2014.
[30] S. Pomeroy.
Complete Android Fragment and
Activity lifecycle.
https://github.com/xxv/
android-lifecycle. Accessed: 2016-03-13.
[31] M. Pradel and T. R. Gross. Automatic generation of
object usage specifications from large method traces. In
Automated Software Engineering (ASE), 2009.
[32] M. Pradel, C. Jaspan, J. Aldrich, and T. R. Gross.
Statically checking API protocol conformance with
mined multi-object specifications. In International
Conference on Software Engineering (ICSE), 2012.
[33] M. K. Ramanathan, A. Grama, and S. Jagannathan.
Static specification inference using predicate mining.
In Programming Language Design and Implementation
(PLDI), 2007.
[34] S. Shoham, E. Yahav, S. Fink, and M. Pistoia. Static
specification mining using automata-based abstractions.
In Software Testing and Analysis (ISSTA), 2007.
[35] M. Thurley. sharpSAT - counting models with advanced
component caching and implicit BCP. In Theory and
Applications of Satisfiability Testing (SAT), 2006.
[36] N. Walkinshaw and K. Bogdanov. Inferring finitestate models with temporal constraints. In Automated
Software Engineering (ASE), 2008.
[37] F. Wei, S. Roy, X. Ou, and Robby. Amandroid: A
precise and general inter-component data flow analysis
framework for security vetting of Android apps. In
Computer and Communications Security (CCS), 2014.
[38] W. Weimer and G. C. Necula. Mining temporal specifications for error detection. In Tools and Algorithms
for the Construction and Analysis of Systems (TACAS),
2005.
[39] J. Whaley, M. C. Martin, and M. S. Lam. Automatic
extraction of object-oriented component interfaces. In
Software Testing and Analysis (ISSTA), 2002.
[40] J. Yang, D. Evans, D. Bhardwaj, T. Bhat, and M. Das.
Perracotta: Mining temporal API rules from imperfect
traces. In International Conference on Software Engineering (ICSE), 2006.
[41] S. Yang, D. Yan, H. Wu, Y. Wang, and A. Rountev.
Static control-flow analysis of user-driven callbacks in
Android applications. In International Conference on
Software Engineering (ICSE), 2015.
15
| 6cs.PL
|
On Structural Parameterizations of Firefighting
Bireswar Das, Murali Krishna Enduri? , Neeldhara Misra?? and I. Vinod Reddy
arXiv:1711.10227v1 [cs.DS] 28 Nov 2017
IIT Gandhinagar, India
{bireswar,endurimuralikrishna,neeldhara.m,reddy vinod}@iitgn.ac.in
Abstract. The Firefighting problem is defined as follows. At time
t = 0, a fire breaks out at a vertex of a graph. At each time step t > 0, a
firefighter permanently defends (protects) an unburned vertex, and the
fire then spread to all undefended neighbors from the vertices on fire.
This process stops when the fire cannot spread anymore. The goal is to
find a sequence of vertices for the firefighter that maximizes the number
of saved (non burned) vertices.
The Firefighting problem turns out to be NP-hard even when restricted to bipartite graphs or trees of maximum degree three. We study
the parameterized complexity of the Firefighting problem for various
structural parameterizations. All our parameters measure the distance to
a graph class (in terms of vertex deletion) on which the Firefighting
problem admits a polynomial time algorithm. Specifically, for a graph
class F and a graph G, a vertex subset S is called a modulator to F if
G \ S belongs to F. The parameters we consider are the sizes of modulators to graph classes such as threshold graphs, bounded diameter graphs,
disjoint unions of stars, and split graphs.
To begin with, we show that the problem is W[1]-hard when parameterized by the size of a modulator to diameter at most two graphs and
split graphs. In contrast to the above intractability results, we show that
Firefighting is fixed parameter tractable (FPT) when parameterized
by the size of a modulator to threshold graphs and disjoint unions of
stars, which are subclasses of diameter at most two graphs. We further
investigate the kernelization complexity of these problems to find that
Firefighting admits a polynomial kernel when parameterized by the
size of a modulator to a clique, while it is unlikely to admit a polynomial
kernel when parameterized by the size of a modulator to a disjoint union
of stars.
1
Introduction
The Firefighting problem was introduced by Hartnell [16] to model the spread
of diseases and computer viruses. It is a turn-based game between two players
(the “fire” and the “firefighter”), which is played on a graph G as follows. Initially,
at time t=0, a fire starts at a vertex s, at each following time step the following
happens. A firefighter defends one vertex which is not on fire, and the fire then
?
??
Supported by Tata Consultancy Services (TCS) research fellowship.
Supported by a DST-INSPIRE Fellowship.
spreads from each burning vertex to all its undefended neighbors. Once a vertex
is defended it remains so for all time intervals. The process stops when the
fire can no longer spread. The natural algorithmic question associated with this
game is to find a strategy that optimizes some desirable criteria, for instance,
maximizing the number of saved vertices [5], minimizing the number of rounds,
the number of firefighters per round [6], or the number of burned vertices [10,5],
and so on. These questions are well-studied in the literature, and while most
variants are NP-hard, approximation and parameterized algorithms have been
proposed for various scenarios. In this work, we will focus on the goal of finding a
sequence of defending vertices that maximizes the number of saved (not burned)
vertices and we refer to this as the Firefighting problem. We also use Saving
k-Vertices to refer to the decision version of this problem, where we are given
a demand k and the goal is to save at least k vertices.
We study the parameterized complexity of Firefighting with respect to
various structural parameters. In particular, our focus is on distance-to-triviality
parameterizations, wherein we identify classes of graphs on which the Firefighting problem is solvable in polynomial time, and understand the parameterized complexity of the problem parameterized by the distance of a graph to
these graph classes. In this paper, our notion of distance to a graph class in the
vertex deletion distance. More precisely, for a class F of graphs, we say that X is
an F-modulator of a graph G if there is a subset X ⊆ V(G) such that G \ X ∈ F. If
the size of a smallest modulator to F is k, we also say that the distance of G to
the class F is k. Throughout this paper, we will assume that a modulator is given
to us as a part of the input. This assumption is without loss of generality since
such modulators can be computed in FPT time. We are now ready to describe
our results.
Our Contributions. The Firefighting problem is FPT when parameterized by
the vertex cover and distance to a clique parameterizations. On the other hand,
it is para-NP-hard when parameterized by feedback vertex set, tree-width and
clique-width [11]. However, the parameter vertex cover is very restrictive and
significantly large for dense graphs. This motivates us to consider parameters
that are intermediate between vertex cover and clique-width. In this spirit, Ganian [15] studied the parameterized complexity of Firefighting problem for
parameter twin-cover which is a generalization of vertex cover and showed that
Firefighting is FPT with respect to twin-cover. Recently Chlebı́ková et al. [7]
showed that the problem is FPT parameterized by distance to cluster graphs
which is a generalization of twin-cover.
We study the parameterized complexity of the Firefighting problem with
respect to the distance from following graph classes: threshold graphs, disjoint
union of stars, disjoint union of graphs of diameter at most two, and split graphs.
Studying the parameterized complexity of Firefighting with respect to these
parameters improves the understanding of the boundary between tractable and
intractable parameterizations. For instance, the parameterization by distance to
cluster graphs (as studied by [7]) directly generalizes both vertex cover and distance to clique. Observe that cluster graphs are precisely the graphs whose con2
W[1]-hard
Para NP-hard
Distance to
Rank-width,
Clique-width
diameter ≤ 3 graphs*
Tree-width
Distance to
split graphs *
Feedback
vertex set
Distance to
diameter ≤ 2 graphs*
Distance
to cographs
Distance
to cluster
FPT
Distance
to stars*
Distance to
threshold graphs *
No Poly-kernel
Twin cover
Distance
to clique *
Vertex cover
Poly-kernel
Fig. 1 A schematic showing the parameterized complexity of Firefighting
with respect to various structural graph parameters. There is a line between two
parameters if the parameter below is larger than the parameter above. Results
shown in this paper are marked by an asterisk (*).
nected components have diameter one, and a natural generalization to consider
is the class of graphs whose connected components have diameter two. Here, we
show that there is a transition in complexity: the problem becomes W[1]-hard.
As a natural intermediate problem, we consider the subclass of graphs where
every connected component is a star. Here, using ideas similar to the ones that
lead to the FPT algorithm for the distance to cluster parameter, we obtain a FPT
algorithm. The case analysis here is more delicate because we have to distinguish
between the central vertex and the leaves.
1
On the other hand, the distance to threshold graphs parameter directly generalizes the distance to clique parameter, while the distance to stars parameter
is a generalization of vertex cover. For both of these parameters, we establish
that Firefighting is FPT. These being smaller parameters, our results improve
several known algorithms. Note that the next “natural” parameter to consider
after distance to stars hierarchy is the feedback vertex number, or the distance to
forests; however here the problem is already NP-hard on trees, leading to paraNP-hardness. Similarly, a natural next step from distance to threshold graphs is
the distance to split graphs, but here also we demonstrate W[1]-hardness. Finally,
a promising generalization from the distance to cluster graphs is the distance to
cographs, and here we leave the parameterized complexity of the problem open.
3
We also consider the kernelization complexity of the problem and make the
following advances: for the distance to clique parameterization, we demonstrate a
quadratic kernel, while for the distance to stars parameterization, we show that a
polynomial kernel is unlikely under standard complexity-theoretic assumptions.
The kernelization complexity of the problem relative to vertex cover, however,
remains an interesting open problem. We summarize our results below.
• We show that the problem is fixed parameter tractable (FPT) when param-
eterized by the size of a modulator to threshold graphs, cluster graphs and
disjoint unions of stars.
• We further investigate the kernelization complexity of these problems to find
that Firefighting admits a polynomial kernel when parameterized by the size
of a modulator to a clique, while it is unlikely to admit a polynomial kernel
when parameterized by the size of a modulator to a disjoint union of stars.
• Finally, in contrast to the tractability results, we show that Firefighting
is W[1]-hard when parameterized by the distance to split graphs. In fact,
the problem remains W[1]-hard with respect to the combined parameter
involving the size of the modulator and the number of vertices to be saved.
Methodology. By and large, we use a standard approach for the FPT algorithms:
we guess the behavior of the solution on the modulator and attempt to find a
solution consistent with the guessed behavior. The second part relies on exploiting the structural properties of G \ X, which is the part of the graph outside
the modulator. Usually one is able to group the vertices of G \ X based on the
structure of their neighborhoods in the modulator, and argue that all vertices
of the same “type” have a similar behavior, which leads to a controlled search
space. In the case of threshold graphs, we are able to prove that simple greedy
techniques work within a particular type. On the other hand, for disjoint unions
of stars, we have to account for several scenarios, and the classification of G \ X
is more intricate, and accordingly, we have to account for more cases in the
analysis. The hardness results follow from reductions using standard techniques,
while the kernelization algorithm uses the fact that when G \ X is a large clique,
several vertices behave in a similar fashion, and this observation allows us to
replace the large clique with a much smaller one — a careful argument is required, however, to demonstrate that the instance we constructed in this fashion
is indeed equivalent to the original.
Related Work. The Firefighting problem is known to be NP-hard even for
special classes of graphs, including bipartite graphs [19], trees of maximum degree three [11] and cubic graphs [17]. The firefighter problem can be solved in
linear time on split graphs and co-graphs [14]. From the parameterized complexity point of view, the firefighting problem is W[1]-hard when parameterized
by the number of saved vertices for bipartite graphs [1]. Cai et al. [5] propose
several FPT algorithms and polynomial kernels, and they consider the following
parameters: the number of saved vertices, the number of saved leaves, and the
number of protected vertices. Leung [18] use the random separation method to
4
give FPT algorithms on general graphs parameterized by the number of burnt
vertices and on degree bounded graphs and unicyclic graphs parameterized by
the number of protected vertices. We refer the reader to the survey [12], as well
as the references within, for more details.
2
Preliminaries
In this section, we introduce the notation and the terminology that we will need
to describe our algorithms. Most of our notation is standard. We use [k] to
denote the set {1, 2, . . . , k}. All graphs we consider in this paper are undirected,
connected, finite and simple. For a graph G = (V, E), let V(G) and E(G) denote
the vertex set and edge set of G respectively. An edge in E between vertices x
and y is denoted as xy for simplicity. For a subset X ⊆ V(G), the graph G[X]
denotes the subgraph of G induced by vertices of X. Also, we abuse notation
and use G \ X to refer to the graph obtained from G after removing the vertex
set X. For a vertex v ∈ V(G), N(v) denotes the set of vertices adjacent to v and
N[v] = N(v) ∪ {v} is the closed neighborhood of v.
Graph Classes. We now define the graph classes that we will encounter frequently.
• A graph is a split graph if its vertices can be partitioned into a clique and
an independent set. Split graphs are P5 -free [13].
• The class of P4 -free graphs are called co-graphs.
• A graph is a threshold graph if it can be constructed recursively by adding
an isolated vertex or a universal vertex.
• A cluster graph is a disjoint union of complete graphs. Cluster graphs are
also P3 -free graphs.
It is easy to see that a graph that is both split and co-graph is a threshold
graph. We denote threshold graph (or a split graph) with G = (C, I) where C
and I denote a partition of G into a clique and an independent set. For any two
vertices x, y in a threshold graph G we have either N(x) ⊆ N[y] or N(y) ⊆ N[x].
For a class of graphs F, the distance to F of a graph G is the minimum number
of vertices to be deleted from G to get a graph in F.
Parameterized Complexity. A parameterized problem is a pair Q ⊆ Σ∗ × N,
where Σ is fixed finite alphabet. For an instance (x, k) ∈ Σ∗ × N, k is called the
parameter. We say that a parameterized problem Q is fixed parameter tractable
(FPT) if there exists an algorithm and a computable function f : N → N such
that given (x, k) ∈ Σ∗ × N the algorithm correctly decides whether (x, k) ∈ Q in
f(k)|(x, k)|O(1) time. The function f is usually superpolynomial and only depends
on parameter k. The class XP contains the problems which are solvable in time
|(x, k)|f(k) , the exponent of the running time depends on the parameter k. A
problem is para-NP-hard if it is NP-hard for some fixed values of the parameter.
The complexity class of parameterized intractability is called W[1] (see [9] for
5
the definition). A kernelization algorithm is a polynomial time algorithm that
takes an instance (x, k) of a parameterized problem Q as input and outputs
an equivalent instance (x 0 , k 0 ) of P such that |x 0 | 6 h(k) for some computable
function h and k 0 6 k. If h is polynomial then we say that (x 0 , k 0 ) is a polynomial
kernel. Let P and Q be two parameterized problems. A parameterized reduction
from P to Q is a mapping g : Σ∗ → Σ∗ such that (i) for all x ∈ Σ∗ we have x
is a yes instance of P ⇔ g(x) is a yes instance of Q. (ii) g can be computed in
f(k)|x|O(1) time, where f is computable function and k is the parameter of x. (iii)
k 0 6 h(k) for some computable function h, where k and k 0 are parameters of x
and g(x) respectively. For more details on parameterized complexity the reader
is referred to [9,8].
We now briefly justify our assumption about the modulators being given as
a part of the input to our problems. Consider the following result.
Lemma 1. [4] Let F be a graph class characterized by the finite forbidden induced subgraphs H1 , · · · , Hl . Given a graph G and integer k, there is an FPT
algorithm that finds a subset X ⊆ V(G) of size at most k such that G \ X ∈ F in
O(dk nd ), where d is the size of largest forbidden subgraph.
The class of cluster graphs, threshold graphs and split graphs are P3 , P4 are
P5 free respectively. By using above lemma, Given a graph G and integer k, the
problem of deciding whether there exists a set X of vertices of size at most k
whose deletion results in a cluster graph, threshold graph and split graph is fixed
parameter tractable.
The Firefighting Problem. Finally, we formally define the problems that we consider in this paper, where F is a class of graphs or a graph property.
Firefighting[F]
Input: A graph G, a vertex s, a modulator X ⊆ V(G) such
that G \ X ∈ F.
Parameter: The size k := |X| of the modulator to F.
Question: Find a strategy that maximizes the number of saved
vertices when a fire starts at s?
Saving k-Vertices[F]
Input: A graph G, a vertex s, a modulator X ⊆ V(G) such
that G \ X ∈ F, and an integer k.
Parameter: The size ` := |X| of the modulator to F.
Question: Does there exists a strategy that saves at least k vertices when a fire starts at s?
Whenever F is clear from the context, we drop the explicit mention of it in
the name of the problem. We also abuse notation and use k differently in the
6
two definitions, to retain consistency with standard notation when we present
reductions in the context of Saving k-Vertices.
3
The Parameterized Complexity of Firefighting
Let (G, s) be an instance of Firefighting problem. The vertices that have
not been burned by the fire at the end of the process are called saved (including
defended vertices). A vertex is burned if it is on fire. A strategy for Firefighting
instance (G, s) is a sequence S of vertices {v1 , · · · , vl } where vi represents the
position of the firefighter at time step i. We say that sequence S is a valid
strategy for (G, s) if vertex vi is not burning at the start of time step i and the
process stops at time step l. A strategy S is called minimal if no subset of S
yields a strategy that saves same number of vertices as S. A strategy is optimal
if it is minimal and saves maximum number of vertices.
The following results from the literature will be useful for our algorithms.
Lemma 2. [14] Let G be a graph and s be a vertex of G. Given an ordered set S
of vertices of G, we can verify whether S is a valid strategy for the Firefighting
problem on (G, s) and count the number of vertices saved by S in O(n + m) time,
where n and m denote the number of vertices and edges in G respectively.
Proof. Let S = {v1 , · · · , vk } is strategy in this order. To verify whether the sequence S is a valid strategy, we do BFS on the graph G starting from s. Find the
distance d(s, v) from the source s to each vertex v of S on graph G[(V(G) \ S)∪ {v}].
For i = 1 to k, If S is a valid strategy then distance from source s to the vertex
vi , d(s, vi ) > i, otherwise vertex vi will be burned before time step i. Observe
that the number of vertices burned by S in G equal to the number of vertices
reachable from s in G \ S, which can be found by applying BFS on the graph
G \ S starting from s.
t
u
Corollary 1. Let S be an optimal strategy for the Firefighting problem on
(G, s) then the number of vertices burned by S in G is equal to the number of
vertices reachable from s in G \ S.
Lemma 3. [14] Let (G, s) be an instance of the Firefighting problem, and let
l be the length of a longest induced path in G starting from s. Then any optimal
strategy can defend at most l vertices.
Proof. Let S = {v1 , · · · , vt } be an optimal strategy defended in this order. Since
S is a valid strategy there is an induced path P from s to vt such that all the
vertices on P are burned except vt . Let P be a shortest such path, then P contains
at least t + 1 vertices: otherwise vt will be burned before time t. Since the length
of longest induced path in G starting from s is l, we have t + 1 6 l + 1 which
implies t 6 l.
t
u
Lemma 4. [14] The Firefighting problem can be solved in O(nl ) time on
graphs with length of longest induced path is at most l − 1.
7
Proof. Let (G, s) be an instance of firefighting problem. Since the length of the
longest induced path in G is at most l. From Lemma 3 any optimal strategy can
defend at most l vertices in G. We list out all possible subsets S of V(G) of size
at most l in O(nl ) time. For each such subset S using Lemma 2 test whether
S is valid strategy and count the number of vertices saved by S. The optimal
strategy is the one which saves maximum number of vertices.
t
u
3.1
Parameterization by Distance to Threshold Graphs
In this section we give an FPT algorithm for the Firefighting problem parameterized by the distance to threshold graphs. Without loss of generality, we assume
that threshold graph is connected, otherwise all the connected components that
do not contain the source vertex are trivially saved.
Corollary 2. Let (G, s) be an instance of Firefighting problem. Then any
optimal strategy can defend at most 2k + 2 vertices, where k is the distance to
threshold graphs.
Proof. We know that fire always spreads along an induced path in G. As the
length of the longest induced path in G is at most 2k + 2, from Lemma 3 any
optimal strategy can defend at most 2k + 2 vertices in G.
t
u
Let G be a graph and X ⊆ V(G) of size k such that G \ X = (C, I) is a threshold
graph. We partition the vertices of clique C and independent set I in G \ X
based on their neighborhoods in X. In particular, for every subset Y ⊆ X, let:
TYC := {x ∈ C | N(x) ∩ X = Y } and TYI := {x ∈ I | N(x) ∩ X = Y }.
Notice that in this way we can partition vertices of G \ X into at most 2k+1
subsets (called types), two for each Y ⊆ X. Observe that all vertices in a type
have same neighbors in X, where as they may have different neighbors inside
the threshold graph. The following result shows that when we need to choose
a defending vertex from a type the best strategy is to defend a highest degree
vertex in that type. For a strategy S, let sav(S) denote the number of vertices
saved by the strategy S.
Lemma 5. Let v1 , v2 be two vertices in a type T such that N(v2 ) ⊆ N[v1 ]. Let S
be a strategy containing v2 , which is defended at time step i. If v1 ∈
/ S and not
burning at the start of time step i then sav(S) 6 sav(S 0 ) where S 0 is obtained
from S by replacing v2 with v1 at time step i.
Proof. Using Corollary 1, the vertices burned by S in G are the vertices which
are reachable from s in G \ S. We show that every vertex u which is reachable
from s in G \ S 0 is also reachable from s in G \ S. Let P be a path between s
and u in G \ S 0 . If v2 ∈
/ P then P is a path in G \ S. If v2 ∈ P, then using the
facts that v1 is a burned vertex in strategy S and N(v2 ) ⊆ N[v1 ], we can see that
P 0 = P \ {v2 } ∪ {v1 } is a path between s and u in G \ S. Therefore the number
of vertices burned by S is at least the number of vertices burned by S 0 , which
implies sav(S) 6 sav(S 0 ).
8
Our FPT algorithm now follows by guessing, for each step in the defending
sequence, if the vertex is from the modulator or the type of the vertex from
G \ X. Then it simulates the sequence (by substituting for each guess of a type,
a greedily chosen vertex from that type) to check if it is a valid solution.
Theorem 1. The Firefighting problem can be solved in O((2k+1 +k)2k+2 (n+
m)) time when parameterized by size of modulator to threshold graphs.
Proof. Partition the vertices of G \ X into at most 2k+1 sets. Each time when we
want to defend a vertex we only choose from 2k+1 (types) +k (size of X). From
Lemma 5 we know which vertex has to be defended in a given type.
From Corollary 2 it is clear that we only need to defend at most 2k + 2 times,
therefore there are at most (2k+1 + k)2k+2 possible firefighting strategies. For
each such strategy S, using Lemma 2, test whether S is valid strategy and count
the number of vertices saved by S. The strategy which saves maximum number
of vertices is the optimal strategy. Therefore this procedure takes O((2k+1 +
k)2k+2 (n + m)) time.
t
u
3.2
Parameterization by Distance to Stars
In this section we design an FPT algorithm for the Firefighting problem parameterized by the distance to stars. Recall that this is the minimum number of
vertices to be deleted from G to get a disjoint union of stars. Let X be a k-sized
modulator to disjoint union of stars. Our first observation follows easily from
the bound on the length of the longest induced path.
Corollary 3. Let (G, s) be an instance of Firefighting problem. Any optimal
strategy can defend at most 4k + 2 vertices, where k is distance to disjoint union
of stars.
Proof. We know that fire always spreads along an induced path in G. As the
length of maximum induced path in G is at most 4k + 2, from Lemma 3 any
optimal strategy can defend at most 4k + 2 vertices in G.
t
u
We now define a notion of equivalent stars, which will lead us to partitioning of
the stars in G \ X into types as before. For a star S with center c in G \ X, we
use B(S) to denote the set of vertices in S that have a neighbor in X, and call
these the border vertices. Further, for a nonempty subset Y ⊆ X, we use BY (S) to
denote the set of vertices in S whose neighborhood in X is exactly Y .
Definition 1. Let X ⊆ V(G) such that G \ X is a disjoint union of stars. We
call two stars Si and Sj are equivalent if, (a) N(ci ) = N(cj ), where ci and cj are
the centers of stars Si and Sj respectively. (b) N(Si ) = N(Sj ), (c) |B(Si )| = |B(Sj )|
and (d) For every non-empty subset Y ⊆ X, we have that |BY (Si )| = |BY (Sj )|.
For an equivalence class T , we use bT to denote the size of the border for any
star in T . Our next result bounds the number of equivalence classes. The bound
9
follows roughly from the fact that one can associate a signature with an equivalence class based on condition (c) in Definition 1, which, in turn, can be put
in one-one correspondence with strings of length 2k over an alphabet of size `,
where ` is the maximum possible value of |B(S)| in G \ X.
Lemma 6. Let ` be defined as above and let X ⊆ V(G) be a modulator to disjoint
union of stars of size k. Then, the stars of G \ X can be partitioned into at
k
most O(22k `2 ) equivalence classes.
Proof. First, partition the stars in G \ X into at most 22k sets such that all stars
in each set satisfies conditions (a) and (b) of Definition 1. Now each set of the
partition can be further divided based on the value of |B(Si )| for each star Si
in that set. As 1 6 |B(Si )| 6 ` for all Si ∈ G \ X, each set can be partitioned
into at most ` sets. In order to satisfy condition (d) in Definition 1 each set
k
k
further partitioned into `2 −1 sets. Combining all, there are at most O(22k `2 )
equivalent star partitions of stars in G \ X.
t
u
Our FPT algorithm begins by guessing the behavior of the solution on the
modulator, and builds on the fact that there are a bounded number of equivalence
classes. We defer the details of this algorithm to a full version because of space
constraints, and note that it is similar — in spirit — to the approach used for
the cluster vertex deletion parameter in [7].
Theorem 2. The Firefighting problem is FPT when parameterized by the
distance from the class of the disjoint union of stars.
Proof. Without loss of generality, assume s ∈ X: If s ∈
/ X then G \ (X ∪ {s}) is
also a disjoint union of stars. As a first step, we guess the defended (Xd ), saved
(Xs ) (which are not in Xd ) and burned (Xb ) vertices from X in O(3k ) time. Since
the length of any optimal defending sequence is at most 4k + 2, we can guess
the set of defended vertices (Xd ) from X along with their positions in an optimal
defending sequence in O(kk (4k + 2)k ) time. The rest of this proof is divided into
two cases depending on whether Xs = ∅ or Xs 6= ∅.
Case 1: Xs = ∅. Since the fire starts at s, all the vertices in V(G)\Xd which are not
reachable from s in G[V(G) \ Xd ] are saved from fire. We begin by deleting them
from G and concentrate on the connected component Cs of G \ Xd containing
the vertex s. In particular, the instance of firefighting problem that we solve
from here is (G[Cs ], s, Xb ) where Xb is the modulator to disjoint union to stars.
Also, we note at this point that if Xb = ∅, then we are done by a straightforward
case analysis on the nature of N(s) and simulating the guessed defence sequence.
Therefore, we assume that Xb 6= ∅.
Partition the stars in Cs \ Xb into equivalence classes (with respect to Xb )
using Definition 1. We divide equivalence classes of stars in Cs \ Xb into two
categories: equivalence classes with bT 6 4k + 2 as one category and remaining
as the other. We combine all equivalence classes T , with bT > 4k + 2 to into
one new equivalence class Tnew . Therefore from Lemma 6 there are at most
10
k
O(k2k (4k + 2)2 ) equivalence classes of stars in Cs \ Xb . From Corollary 3, the
length of any optimal defending sequence S is at most 4k + 2, therefore we can
defend for at most 4k + 2 time steps. Since we have already guessed defending
vertices Xd from X, the remaining defending vertices in S has to be from Cs \ Xb .
At each time step when we want to choose a defending vertex from Cs \ Xb , we
k
choose from O(k2k (4k + 2)2 ) equivalence classes. Therefore there are at most
k
O((k2k (4k + 2)2 ))
4k+2
possible firefighting defending sequences. Let S be one
such possible defending sequence, then each position of S represents either a
vertex of Xd or an equivalence class in G \ Xb .
Now we describe the procedure to select a defending vertex from an equivalence class. Let T be an equivalence class such that bT 6 4k + 2. First, count
q, the number of times T appeared in strategy S. Since T can appear at most
4k + 2 times, q 6 4k + 2. In each star, we need to defend at least one vertex so
we can defend at most 4k + 2 stars. Order the stars in T in descending order of
size |Si \ B(Si )|. We choose defending vertices from set D = ∪4k+2
i=1 (B(Si ) ∪ {ci })
(i.e, union is over first 4k + 2 stars ordered according to |Si \ B(Si )|). The size of
D is at most (4k + 2)(4k + 3).
In equivalence class Tnew , we only need to defend center of stars in Tnew . First
count q number of times Tnew is appeared in sequence S, we can only defend
centers of q different stars. Since each star center is at different distance from
source s, so we can not greedily defend center of a star for which |Si \ B(Si )| is
maximum. The defending vertex set D is defined as follows. For each i ∈ [4k + 2],
find top i stars according to size of |Si \ B(Si )| whose center is at a distance i
from source s. Add the centers of these stars to set D. It is easy to see that
|D| 6 (4k + 2)2 .
Case 2: Xs 6= ∅. Let Xs1 , Xs2 , · · · , Xsm 0 and Xb1 , Xb2 , · · · , Xbm 00 be the connected components of G[Xs ] and G[Xb ] respectively. Recall that we are working in the connected component containing s in the graph G \ Xd . Let S be a star in G \ (Xb ∪Xs ).
We say that S is vulnerable if it has at least one vertex u that has a neighbor
in Xb and at least one vertex v that has a neighbor in Xs (potentially u = v).
For any vulnerable star S, note that any firefighting strategy that respects the
semantics of Xs , Xb and Xd must defend at least one vertex in S. Indeed, suppose
not, and let S be a firefighting strategy that violates this criteria. Then after S
is executed, S has at least one undefended vertex (say p) that is a neighbor of
some vertex in Xb (say x) and one undefended vertex (say q) that is a neighbor
of some vertex in Xd (say y). Then, note that the (x, p, q, y) is a path from Xb to
Xs in the graph after the S is executed, contradicting the semantics of Xs , Xb and
Xd . Observe that this argument works even if p = q. To discuss the consequence
of this observation further, we employ the following notation:
Bb (Si ) := {x ∈ Si | N(x) ∩ Xb 6= ∅} and Bs (Si ) := {x ∈ Si | N(x) ∩ Xs 6= ∅}.
Note now that since at least one vertex has to be defended from every vulnerable star, the total number of vulnerable stars ` is at most 4k + 2.
11
We place all the vulnerable stars in one equivalence class (call this T 0 ). Now
two cases remain: the first is that every border vertex of the star S has all its
neighbors in Xs or Bb (Si ) = ∅. We place all such stars also in one equivalence
class (call this T ? ). Observe that in this case, representative vertices for the
placement of firefighters may be chosen arbitrarily. This is because the entire
star is already safe with respect to any firefighting strategy that respects the
semantics of Xb , Xs and Xd . Now consider the stars that have all their neighbors
in Xb , and note that it is not possible to save vertices in Xs by defending vertices
in such stars. Therefore, we treat such equivalence classes just as we would in
the previous case. Overall, the guess of the template sequence S happens over
the equivalence classes determined according to Definition 1 with respect to Xb
and the two special equivalence classes that we just defined, namely T ? and
T 0 . In a valid sequence, the equivalence class T 0 must appear at least ` times.
Representatives here have to be chosen from a bounded border, so a brute force
approach suffices in this situation. Representatives from T ? are chosen arbitrarily
and for all other cases they are chosen according to the description in Case 1.
To summarize, we now have a strategy for identifying a representative vertex
from each equivalence class. For each possible defending sequence S, by using
Lemma 2, we check whether it is valid and count the number of vertices of saved
by S. We output the strategy which saves the maximum number of vertices.
3.3
Parameterization by Distance to Diameter Two Graphs
In this section, we show that Saving k-Vertices is W[1]-hard when parameterized by k and distance to diameter two graphs by giving a reduction from the
k-clique problem. The reduction is similar, in spirit, to the one used in [1].
Theorem 3. Saving k-Vertices is W[1]-hard parameterized by (k + l), where
l is the distance from the class of graphs with diameter two.
Proof. Let (G, k) be a instance of k-clique problem. We construct a graph G 0
from G as follows (see Fig. 2). For each vertex v in V(G) add vertex cv in G 0 :
this set of vertices is denoted by V . For each edge (u, v) in G add a vertex iuv
in G 0 : this set of vertices is denoted by E. Add an edge from vertex iuv in E to
both vertices cu and cv in V for each (u, v) in E(G). Add a root vertex s, and
add vertices dij (set of vertices denoted by D) for 1 6 i 6 k and 1 6 j 6 k + 1.
Add edges between dij to di 0 j 0 for all i, j, j 0 and i 0 = i + 1. Connect s to d1,j for
all j and connect dk,j to each vertex in V for all j. Add a vertex z adjacent to all
vertices of V ∪ E. The vertex set of G 0 is V(G 0 ) = {s, z} ∪ D ∪ V ∪ E. It is easy
to
see that G 0 is k(k + 1) + 1 distance to diameter two graphs. Set k 0 = k + k2 + 2
for saving vertices in G 0 .
We prove that Saving k-Vertices on (G 0 , s, k 0 ) is a yes instance if and only
if k-clique on (G, k) is a yes instance. Suppose that there is a clique K of size k in
G. Let S be a valid strategy described as follows: At each time step t = 1, · · · , k
S defends the vertices cv for all v ∈ K, at time step k + 1, S defends the vertex
z and at time step k + 2, S defends a vertex iuv , for some edge (u, v) 6∈ E(G[K]).
12
D
V
d11
d21
d31
d12
d22
d32
d13
d23
d33
E
c1
i12
3
c2
s
2
c3
i24
i34
4
c4
1
i23
5
d14
d24
i45
c5
d34
z
Fig. 2 Graph G (left) and Distance to diameter two graph G 0 (right). The vertex
z is adjacent to all vertices in V ∪ E, denoted with thick edges.
So the strategy S saves k + 1 + k2 + 1 vertices in G: k vertices in V and k2 + 1
vertices in E.
For other direction, suppose that S = {p1 , p2 , · · · , pl } is a valid strategy that
saves at least k 0 vertices in G 0 . It is easy to see that at any time step defending a
vertex dij for any i, j is not helpful, because there is at least one burning vertex
di,j 0 with same neighborhood as dij . Further defending vertices in E does not save
any vertices. Since the vertex z is universal, therefore it needs to be defended.
So the vertices in S ∩ V are responsible to save at least k2 many vertices, which
is possible only if the vertices defended in V induces k-clique in G.
t
u
We can obtain the hardness of Saving k-Vertices by a reduction from the
k-clique problem as well, in fact by making minor changes to the reduction used
to prove Theorem 3.
Corollary 4. Saving k-Vertices is W[1]-hard parameterized by (k + l), where
l is distance to split graphs.
Proof. The proof is similar to Theorem 3, except the following minor changes
in the construction of graph G 0 . Add an edge between every pair of vertices in
V and remove the universal vertex z. Add vertices dij for 1 6 i 6 k − 1 and
1 6 j 6 k. Add edges between dij to di 0 j 0 for all i, j, j 0 and i 0 = i + 1. Connects to
d1,j for all j and connect dk−1,j to each vertex in V for all j. Set k 0 = k + k2 + 1
for saving vertices in G 0 . The graph G 0 is k(k − 1) + 1 distance to a split graph.
It is easy to see that Saving k-Vertices on (G 0 , s, k 0 ) is a yes instance if and
only if k-clique on (G, k) is a yes instance.
t
u
13
4
4.1
Kernelization Complexity
Parameterization by Distance to Clique
In this section, we give a polynomial kernel for Saving k-Vertices when parameterized by distance to clique, as summarized in the following theorem.
Theorem 4. Saving k-Vertices admits a polynomial kernel of size at most
O(l2 ), where l is the distance to clique.
Let (G, s, k) be an instance of Saving k-Vertices and X ⊆ V(G) of size
l such that G \ X = C is a clique. With out loss of generality we assume that
s ∈ X, otherwise define X 0 = X ∪ {s} such that G \ X 0 is a clique with size of
modulator l + 1. Since the length of longest induced path in G is at most l + 1,
using Lemma 3 we get the following Corollary.
Corollary 5. Given an instance of Firefighting, then any optimal strategy
can defend at most l + 1 vertices, where l is size of the clique modulator X.
Let XL := {x ∈ X : |N(x) ∩ C| 6 l + 1}, XH = X \ XL . Let J := {y ∈ C | ∃x ∈
XL , y ∈ N(x)}, |J| 6 l(l + 1). Our kernelization algorithm is based on the following
observation. We show that replacing the clique G[C \ J] with another clique of
small size does not affect the solution.
Lemma 7. Let S be a valid strategy containing a vertex v ∈ C \ J, then all the
vertices of N(v) \ S are burned.
Proof. Since S is a valid strategy, there is an induced path P from s to v such
that all vertices on P are burned, except v. Let Xv := N(v) ∩ X and for every
x ∈ Xv \ S, we have |N(x) ∩ C| > l + 1: suppose there is x ∈ N(v) ∩ X such that
|N(x) ∩ C| 6 l + 1 then v ∈ J, contradiction to v ∈ C \ J.
Let u be a burned neighbor of v on P. If u ∈ C then C \ S is burned and for
every x ∈ Xv \ S, we have |N(x) ∩ C| > l + 1. From Corollary 5 we can only defend
at most l + 1 vertices, therefore all vertices of Xv \ S are burned.
If u ∈ Xv \ S then |N(u) ∩ C| > l + 1, therefore all vertices C \ S are burned.
From the first case we can see that all vertices of Xv \ S are also burned.
t
u
Reduction rules:
1. Delete vertices of C \ J from G. Add a clique K of size l + 2 and make each
vertex of K adjacent to all vertices in XH ∪ J.
2. Add another clique L of size min{l + 1, |C \ J|} and for each vertex u ∈ L, add
edges between u and J ∪ K.
Let H be the graph obtained after applying above reduction rules. It is easy
to see that X ⊆ V(H) such that H \ X is a clique. The size of the reduced instance
H is at most l2 + 4l + 3 and the reduction can be done in polynomial time.
Let C = G \ X and C 0 = H \ X. We may assume that |C \ J| > 2l + 3; otherwise,
trivially we get a kernel of size at most l2 + 4l + 3.
14
Remark 1. Let G be a graph and S be a valid strategy. If S defends a subset S1
of vertices in C \ J, then defending any subset S2 of vertices in L instead of S1 ,
with |S1 | = |S2 | is also a valid strategy S 0 for H.
Conversely let S 0 be a strategy on H. If S 0 defends a subset S1 of vertices
in K ∪ L, then defending any subset S2 of vertices in C \ J instead of S1 , with
|S1 | = |S2 | is also a valid strategy S for G.
Lemma 8. Let G and H be graphs as defined above and S, S 0 be corresponding
valid strategies as defined in the above remark. At least one vertex of C is burned
in G by strategy S iff at least one vertex of C 0 is burned in H by strategy S 0 .
Proof. Let u ∈ C 0 is burned by strategy S 0 in H. If u ∈ J, then u ∈ C will also
burned by S in G. If u ∈ K and no vertex of J burned by S 0 in H then, at least
one vertex x ∈ XH gets burned and |N(x)∩C| > l+1, therefore at least one vertex
in N(x) ∩ C gets burned by S in G.
Let u ∈ C is burned by strategy S in G. If u ∈ J then it will be burned by S 0
in H. If u ∈ C \ J and no vertex of J burned by S in G then there exists burned
vertex x ∈ XH . Since |N(x) ∩ C 0 | > l + 1, at least one vertex of K gets burned. t
u
Claim 1 If a strategy S saves at least 2l + 1 vertices in G then S saves entire
clique.
Proof. Let S be a valid strategy which saves at least 2l + 1 vertices in G. Suppose
assume that there exists a vertex v ∈ C burned by strategy S, then no vertex in
C is saved except the defended vertices. The strategy S can save at most l − 1
vertices in X and l + 1 vertices in C, total S saves at most 2l vertices which is a
contradiction to the fact that S saves at least 2l + 1 vertices.
t
u
Claim 2 Saving one undefended vertex in C is equivalent to saving entire clique.
Proof. Let v be an undefended saved vertex of C. If any vertex of C is burned
by S then v gets burned contradicting the fact that v is a saved vertex.
t
u
Lemma 9. Let G be a graph and H be the graph obtained after applying reduction rules. A strategy S saves at least k vertices in G if and only if there exists
a strategy S 0 that saves at least k 0 vertices in H.
Proof. Let S be any valid strategy on G then we can find a corresponding strategy
S 0 on H as follows. If S defends a vertex v in C \ J which is deleted in reduction
procedure, then by Remark 1 instead of v we can defend any other non-defended
vertex in L. Since S can defend at most l + 1 vertices in G and |L| = l + 1, we can
always replace vertices of C \ J in S by applying Remark 1.
Conversely, let S 0 be any valid strategy on H then we can find its corresponding strategy S on G as follows. If S 0 defends a vertex v in K ∪ L which is added
in reduction procedure, then by Remark 1 instead of v we can defend any other
non-defended vertex in C \ J. Since S 0 can defend at most l + 1 vertices in H and
|C \ J| > 2l + 3, we can always replace vertices of K ∪ J in S 0 by applying Remark 1.
The parameter k 0 is defined as follows.
15
1. If k ∈ [|C|, |C| + l − 1], then set k 0 = k − |C| + |J| + |K| + |L| 6 l2 + 4l + 3.
2. If k ∈ [2l + 1, |C| − 1], then set k 0 = 2l + 1.
3. If k ∈ [1, 2l], then set k 0 = k.
Using Lemma 8, Claims 1 and 2 we can see that the strategy S saves at least
k vertices in G if and only if the strategy S 0 saves at least k 0 vertices in H.
t
u
4.2
Parameterization by Distance to Stars
In this section, we show that Saving k-Vertices does not admit a polynomial
kernel parameterized by distance to stars unless NP ⊆ coNP/poly. First we
introduce a notion of polynomial time and parameter transformation, that under
the assumption NP * coNP/poly allows us to show non-existence of polynomial
kernels.
Definition 2. [3] Let P and Q be parameterized problems, we say that there is
a polynomial-parameter transformation from P to Q, denoted P 6ppt Q, if there
exists a polynomial time computable function f : {0, 1}∗ × N → {0, 1}∗ × N and
polynomial p : N → N, for all x ∈ {0, 1}∗ and k ∈ N, then following hold
1. (x, k) ∈ P if and only if (x 0 , k 0 ) = f(x, k) ∈ Q
2. k 0 6 p(k)
The function f is called a polynomial-parameter transformation from P to Q.
Theorem 5. [3] Let P and Q be parameterized problems, and suppose that Pc
and Qc are the derived classical problems. Suppose that Pc is NP-complete, and
Qc ∈ NP. Suppose that f is a polynomial time and parameter transformation from
P to Q. Then, if Q has a polynomial kernel, then P has a polynomial kernel.
Corollary 6. Let P and Q be parameterized problems whose unparameterized
versions Pc and Qc are NP-complete. If P 6ppt Q and P does not have a polynomial kernel, then Q does not have a polynomial kernel.
Clique [Vertex Cover]
Input: A graph G, a vertex cover X ⊆ V(G) and an integer
k.
Parameter: The size l := |X| of the vertex cover.
Question: Does there exists a clique of size k in G?
Theorem 6. [2] Clique [Vertex Cover] does not admit a polynomial kernel
unless NP ⊆ coNP/poly.
Theorem 7. Saving k-Vertices parameterized by the distance to disjoint union
of stars does not admit a polynomial kernel, unless NP ⊆ coNP/poly.
16
V
D
d11
X
d21
J
J24
2
J23
3
4
J34
2
4
1
5
s
d12
3
d22
J12
1
G
J45
d13
5
d23
H
I
Fig. 3 An instance of Clique [Vertex Cover] and the constructed graph H
represents Saving k-Vertices [Distance to stars] in the proof of Theorem 7 for
l = 2 and k = 3. In this example X = {2, 4} is a vertex cover of G and H\({s}∪D∪X)
is disjoint union of stars (graph induced by blue vertices).
Proof. We show that there is a polynomial-parameter transformation from Clique
[Vertex Cover] to Saving k-Vertices [Distance to stars]. Let (G, X, l, k) be
an instance of Clique [Vertex Cover]. We construct a graph H (see Fig. 3)
from G as follows. Initialize H as a copy of G, this set of vertices are denoted by
V = X ∪ I For each edge uv ∈ E(G) add a vertex Juv to H and make it adjacent
to both vertices u and v. we denote this set of vertices with J.
Add a root vertex s, and add vertices dij (set of vertices denoted by D) for
1 6 i 6 k − 1 and 1 6 j 6 k. Add edges between dij to di 0 j 0 for all i, j, j 0 and
i 0 = i + 1. Connect s to d1,j for all j and connect dk−1,j to each vertex of G
in H for all j. Vertex set of H is V(H) = {s} ∪ D ∪ V ∪ J. It is easy to see that
H \ ({s} ∪ D ∪ X) is a disjoint union of stars. Therefore H is k(k − 1) + l + 1 distance
to stars with X 0 = {s} ∪ D ∪ X as a modulator. Since k 6 l + 1, H is at most (l + 1)2
distance to stars. Let l 0 := |X 0 | is polynomially bounded in the input parameter
l and we can construct the graph H in polynomial time. Set k 0 = k + k2 + 1 for
saving vertices in H. Let (H, X 0 , l 0 , k 0 ) is an instance of the Saving k-Vertices
problem parameterized by a distance to stars.
We show that Saving k-Vertices on (H, X 0 , l 0 , k 0 ) is a yes instance if and
only if there is a k-clique on (G, X, l,1k) is a yes instance. Suppose that (G, X, l, k)
is a yes-instance of Clique [Vertex Cover] and C be a k-clique in G. We can
find a valid strategy S which saves at least k 0 vertices in H as follows: For first
k time steps S defends k vertices of C in H. At time step k + 1, S defends some
vertex Juv in H such that uv 6∈ E(C). The strategy S saves k vertices in C and
saves k2 vertices in H corresponding to clique edges in G and the vertex Juv .
Conversely, suppose that S is a valid strategy that saves at least k 0 vertices
in H. It is easy to see that at any time step, defending a vertex dij for any
i, j is not helpful, because there is at least one burning vertex di,j 0 with same
neighborhood as dij . Further protecting Juv vertices for some uv ∈ E(G) does
not
save any vertices. So the vertices in S ∩ V are responsible for saving at least
k
2 many vertices.
17
If |S ∩ I| = d > 2 then in the best case S can save at most k 00 = k + 1 + k−d
+
2
d(k − d) = k + 1 + (k − d)(k + d − 1)/2 vertices in H. Observe that k 00 is less than
k 0 for d > 2, contradiction to fact that the strategy S saves at least k 0 vertices
in H. Therefore |S ∩ I| 6 1. If S ∩ I = ∅ then the strategy S saves at least k 0
vertices if and only if the vertices defended in S ∩ X are forms a k-clique in G.
If |S ∩ I| = 1 then S defends one vertex v in I and k − 1 vertices in X. S saves at
least k 0 vertices if k − 1 vertices defended in X induces a (k − 1)-clique in G and v
is adjacent to k − 1 defended vertices. Combining both cases, S can save at least
k 0 vertices in H if the vertices defended in S ∩ V forms a k-clique in G.
t
u
5
Conclusion
In this paper, we studied the parameterized complexity of Firefighting problem for various structural parameters. We considered the size of a modulator
to threshold graphs, cluster graphs and disjoint unions of stars as parameters,
and showed FPT algorithms in all cases. We also established that Firefighting
admits a polynomial kernel when parameterized by the size of a modulator to a
clique, while it is unlikely to admit a polynomial kernel when parameterized by
the size of a modulator to a disjoint union of stars. In contrast to the tractability
results, we found that Firefighting is W[1]-hard when parameterized by the
distance to split graphs.
The following problems remain open. Does Saving k-Vertices admit a
polynomial kernel when parameterized by k and the size of a vertex cover? Also,
is the Firefighting problem FPT when parameterized by distance to cographs?
References
1. Bazgan, C., Chopin, M., Cygan, M., Fellows, M.R., Fomin, F.V., van Leeuwen,
E.J.: Parameterized complexity of firefighting. Journal of Computer and System
Sciences 80(7), 1285–1297 (2014)
2. Bodlaender, H.L., Jansen, B.M., Kratsch, S.: Kernelization lower bounds by crosscomposition. SIAM Journal on Discrete Mathematics 28(1), 277–305 (2014)
3. Bodlaender, H.L., Thomassé, S., Yeo, A.: Kernel bounds for disjoint cycles and
disjoint paths. Theoretical Computer Science 412(35), 4570–4578 (2011)
4. Cai, L.: Fixed-parameter tractability of graph modification problems for hereditary
properties. Information Processing Letters 58(4), 171–176 (1996)
5. Cai, L., Verbin, E., Yang, L.: Firefighting on trees:(1- 1/e)–approximation, fixed
parameter tractability and a subexponential algorithm. In: International Symposium on Algorithms and Computation. pp. 258–269. Springer (2008)
6. Chalermsook, P., Chuzhoy, J.: Resource minimization for fire containment. In: Proceedings of the twenty-first annual ACM-SIAM symposium on Discrete Algorithms.
pp. 1334–1349. Society for Industrial and Applied Mathematics (2010)
7. Chlebı́ková, J., Chopin, M.: The firefighter problem: Further steps in understanding
its complexity. Theoretical Computer Science 676, 42–51 (2017)
8. Cygan, M., Fomin, F.V., Kowalik, L., Lokshtanov, D., Marx, D., Pilipczuk, M.,
Pilipczuk, M., Saurabh, S.: Parameterized algorithms, vol. 4. Springer (2015)
18
9. Downey, R.G., Fellows, M.R.: Parameterized complexity, vol. 3. springer Heidelberg
(1999)
10. Finbow, S., Hartnell, B., Li, Q., Schmeisser, K.: On minimizing the effects of fire
or a virus on a network. Journal of Combinatorial Mathematics and Combinatorial
Computing 33, 311–322 (2000)
11. Finbow, S., King, A., MacGillivray, G., Rizzi, R.: The firefighter problem for graphs
of maximum degree three. Discrete Mathematics 307(16), 2094–2105 (2007)
12. Finbow, S., MacGillivray, G.: The firefighter problem: a survey of results, directions
and questions. The Australasian Journal of Combinatorics 43, 57–77 (2009)
13. Foldes, S., Hammer, P.L.: Split graphs. Universität Bonn. Institut für Ökonometrie
und Operations Research (1976)
14. Fomin, F.V., Heggernes, P., van Leeuwen, E.J.: The firefighter problem on graph
classes. Theoretical Computer Science 613, 38–50 (2016)
15. Ganian, R.: Improving vertex cover as a graph parameter. Discrete Mathematics
& Theoretical Computer Science 17(2), 77–100 (2015)
16. Hartnell, B.: Firefighter! an application of domination. In: 25th Manitoba Conference on Combinatorial Mathematics and Computing (1995)
17. King, A., MacGillivray, G.: The firefighter problem for cubic graphs. Discrete
Mathematics 310(3), 614–621 (2010)
18. Leung, M.L.: Fixed parameter tractable algorithm for firefighting problem. arXiv
preprint arXiv:1104.1044 (2011)
19. MacGillivray, G., Wang, P.: On the firefighter problem. Journal of Combinatorial
Mathematics and Combinatorial Computing 47, 83–96 (2003)
19
| 8cs.DS
|
1
Multi-platform Version of StarCraft: Brood War in
a Docker Container: Technical Report
arXiv:1801.02193v1 [cs.AI] 7 Jan 2018
Michal Šustr, Jan Malý and Michal Čertický
Abstract—We present a dockerized version of a real-time
strategy game StarCraft: Brood War, commonly used as a domain
for AI research, with a pre-installed collection of AI developement
tools supporting all the major types of StarCraft bots. This
provides a convenient way to deploy StarCraft AIs on numerous
hosts at once and across multiple platforms despite limited OS
support of StarCraft. In this technical report, we describe the
design of our Docker images and present a few use cases.
I. I NTRODUCTION
Games have traditionally been used as domains for Artificial Intelligence (AI) research, since they represent a welldefined challenges with various degrees of complexity. They
are also easy to understand and provide a way to compare
the performance of AI algorithms and that of human players.
After a recent success with popular games like Go [1] and
Poker [2], both of which can now be played by AIs at superhuman skill level, the attention of researchers has turned to
a more complex challenge represented by Real-Time Strategy
(RTS) games. In addition to numerous academic researchers,
commercial companies like Facebook and DeepMind have
recently expressed an interest in using the most popular RTS
game of all time, StarCraft1 , as a test environment for their
AI research [3].
Given the recent interest in StarCraft as a testbed for modern
AI techniques, the research community often needs to be
able to deploy multiple instances of the game at once and
combine it with various other tools across different platforms.
Currently, the research applicatons of StarCraft: Brood War
are limited by the fact that the game is only supported
on Microsoft Windows and Mac OS. Mass deployment of
multiple instances tends to run into licensing issues given the
proprietary nature of supported operating systems. There are
a few attempts to address some of these problems, such as
the TorchCraft ML framework [4], but we believe that simple self-contained Docker containers2 with no accompanying
requirements have a potential to provide a more versatile and
easy-to-use soltion. Our implementation is publicly available
at: https://github.com/Games-and-Simulations/sc-docker
Michal Čertický, Jan Malý and Michal Šustr are with the Games
& Simulations Research Group (http://gas.fel.cvut.cz/), Artificial Intelligence Center at Faculty of Electrical Engineering, Czech Technical University in Prague. Emails: [email protected],
[email protected], [email protected]
1 StarCraft and StarCraft: Brood War are trademarks of Blizzard Entertainment, Inc. in the U.S. and/or other countries.
2 https://www.docker.com
II. S TAR C RAFT: B ROOD WAR AS A TESTBED FOR AI
RESEARCH
In a typical RTS, a subgenre of strategy computer games,
players need to develop an economy by gathering resources,
building structures and researching technologies, train a military force and try to defeat their opponents with it. StarCraft
games, placed within a well-knon science-fiction universe,
represent a typical example of the RTS genre. Most successful
entry in the StarCraft series is StarCraft: Brood War, released
in 1998 by Blizzard Entertainment. Despite its considerable
age, the game is still immensely popular thanks to its mechanics, depth and exceptionally balanced set of rules.
RTS games like StarCraft put additional demands on modern AI techniques, compared to board game such as Go and
Chess. According to [5] most important differences are:
• In RTS, each player has a small amount of time to decide
the next action, before the game state changes.
• RTS games are simultaneous as players can issue actions
at the same time. On top of that, some actions are durative
and may not be instantaneous.
• RTS games are typically nondeterministic and partially
observable. Sometimes, there is a chance that an action
will fail or has unpredictable consequences. In most
cases, each player can only see a part of the game world.
• The complexity of RTS is estimated to be many orders
of magnitude larger than any of the board game such as
Go or Chess, both in terms of state-space size and in a
number of actions available at each decision cycle.
Additional reason for the popularity of StarCraft: Brood War
in the AI research community is the fact that the performance
of AI algorithms can be directly compared in three StarCraft
AI tournaments: SSCAIT, CIG and AIIDE. More information
about the competitions and their contestants can be found in
[6] and [7].
III. U SE CASES
In this section, we provide a few use cases for the dockerized version of StarCraft: Brood War. These should be taken as
a mere inspiration. The project has many different applications
in situations, where a user needs to programatically run many
StarCraft AI games, or when StarCraft needs to run on
unsupported operating systems.
• Testing against different bots locally: A bot developer
can easily test his own bot against many different bots
on a single machine with no need to solve their diverse
requirements. Dockerized version of StarCraft contains
pre-installed prerequisites of all the typical kinds of bots.
2
BWAPI related data. Slaves can also write to shared directories
(for logging or machine learning). Shared space is also used
as cache. For example, bots share map analysis cache files
created by BWTA2 library5 .
Fig. 1. A LAN game of four StarCraft AI bots running on one Linux OS
machine. Each bot runs in one Docker container.
•
•
User can even use provided scripts that automatically
download and start the newest version of any bot from
SSCAIT tournament using the tournament’s API.3
Testing with varying system resources: System resources
available to each Docker container are easily configurable
and can be distributed among the bots fairly. Test results
should therefore be reliable and replicable. Reliability and
replicability of bot’s results are especially important in
research. It can also help competition contestants, who
can test how their bots will perform on the hardware of
specific tournament.
Mass deployment for machine learning: Running thousands of games in parallel and as quickly as possible is
vital for training ML-based bots. For example, training a
bot using self-play helped master the game of Go [1].
IV. A RCHITECTURE
The ability to extend other docker images is what makes
Docker powerful. We used this feature for our containers as
well. First, we created Docker image with Wine4 (a compatibility layer allowing us to run MS Windows programs
under Unix-like OS). We extended this image to add StarCraft:
Brood War and a bot-coding API called BWAPI [8]. To
support Java bots, we built another container with a preinstalled Java environment. Finally, we made the last image
with a collection of useful scripts allowing users to run the
games easily.
Each docker container is connected to its host. One can
think of this setup in terms of master/slave communication
model, where docker instances are slaves and host is the
master.
This setup is depicted in Figure 2. The master contains
directories (entitled DIRS in the figure) with the data read
by the slaves. Directories are mapped through VOLUMES in
slaves. For example, each slave can read StarCraft maps and
Fig. 2. Communication between the Docker container and its host.
Our docker container supports two modes of running
StarCraft: Brood War. It is possible to run the game with
a bot in so-called headless mode, which can save some
computational resources by disabling GUI. This mode is useful
for example for self-play. The headful mode, with the GUI
enabled, is useful for debugging. In this case, the host can
connect with its VNC client to VNC server running in each
container as is shown in Figure 2.
V. C ONCLUSION
We introduced a self-contained dockerized AI research
environment consisting of StarCraft: Brood War game and a
collection of related AI-development tools. This provides a
convenient way of massive deployment of StarCraft AIs across
multiple platforms. Thanks to our scripts, it is much easier to
test, train and use custom StarCraft AIs. Researchers and AI
developers can benefit from the possibility to specify resources
for container making results more reliable and replicable. We
plan to add new features to our containers as well as support
for OpenBW6 and StarCraft: Remastered. We also consider
extending one of AI benchmark collections represented by
OpenAI Gym [9] with the StarCraft environment.
3 https://sscait.docs.apiary.io/
5 https://bitbucket.org/auriarte/bwta2
4 https://www.winehq.org
6 http://www.openbw.com
3
R EFERENCES
[1] D. Silver, A. Huang, C. J. Maddison, A. Guez, L. Sifre, G. Van
Den Driessche, J. Schrittwieser, I. Antonoglou, V. Panneershelvam,
M. Lanctot et al., “Mastering the game of go with deep neural networks
and tree search,” Nature, vol. 529, no. 7587, pp. 484–489, 2016.
[2] M. Moravčı́k, M. Schmid, N. Burch, V. Lisỳ, D. Morrill, N. Bard,
T. Davis, K. Waugh, M. Johanson, and M. Bowling, “Deepstack: Expertlevel artificial intelligence in heads-up no-limit poker,” Science, vol. 356,
no. 6337, pp. 508–513, 2017.
[3] E. Gibney, “What google’s winning go algorithm will do next.” Nature,
vol. 531, no. 7594, pp. 284–285, 2016.
[4] G. Synnaeve, N. Nardelli, A. Auvolat, S. Chintala, T. Lacroix, Z. Lin,
F. Richoux, and N. Usunier, “Torchcraft: a library for machine learning
research on real-time strategy games,” arXiv preprint arXiv:1611.00625,
2016.
[5] S. Ontanón, G. Synnaeve, A. Uriarte, F. Richoux, D. Churchill, and
M. Preuss, “A survey of real-time strategy game AI research and competition in StarCraft,” IEEE Transactions on Computational Intelligence
and AI in Games, vol. 5, pp. 293–311, 2013.
[6] M. Certicky and D. Churchill, “The Current State of StarCraft AI Competitions and Bots,” in AIIDE 2017 Workshop on Artificial Intelligence
for Strategy Games, 2017.
[7] D. Churchill, M. Preuss, F. Richoux, G. Synnaeve, A. Uriarte, S. Ontanón,
and M. Certicky, “Starcraft bots and competitions,” in Encyclopedia of
Computer Graphics and Games, 2016.
[8] A. Heinermann, “Broodwar API,” https://github.com/bwapi/bwapi, 2013.
[Online]. Available: https://github.com/bwapi/bwapi
[9] G. Brockman, V. Cheung, L. Pettersson, J. Schneider, J. Schulman,
J. Tang, and W. Zaremba, “Openai gym,” 2016.
| 2cs.AI
|
1
arXiv:1703.10049v2 [cs.RO] 12 Sep 2017
Autonomous Recharging and Flight Mission Planning for
Battery-operated Autonomous Drones
CHIEN-MING TSENG, Masdar Institute
CHI-KIN CHAU, Masdar Institute
KHALED ELBASSIONI, Masdar Institute
MAJID KHONJI, Masdar Institute
Autonomous drones (also known as unmanned aerial vehicles) are increasingly popular for diverse
applications of light-weight delivery and as substitutions of manned operations in remote locations. The
computing systems for drones are becoming a new venue for research in cyber-physical systems. Autonomous
drones require integrated intelligent decision systems to control and manage their flight missions in the
absence of human operators. One of the most crucial aspects of drone mission control and management is
related to the optimization of battery lifetime. Typical drones are powered by on-board batteries, with limited
capacity. But drones are expected to carry out long missions. Thus, a fully automated management system that
can optimize the operations of battery-operated autonomous drones to extend their operation time is highly
desirable. This paper presents several contributions to automated management systems for battery-operated
drones: (1) We conduct empirical studies to model the battery performance of drones, considering various
flight scenarios. (2) We study a joint problem of flight mission planning and recharging optimization for drones
with an objective to complete a tour mission for a set of sites of interest in the shortest time. This problem
captures diverse applications of delivery and remote operations by drones. (3) We present algorithms for
solving the problem of flight mission planning and recharging optimization. We implemented our algorithms
in a drone management system, which supports real-time flight path tracking and re-computation in dynamic
environments. We evaluated the results of our algorithms using data from empirical studies. (4) To allow fully
autonomous recharging of drones, we also develop a robotic charging system prototype that can recharge
drones autonomously by our drone management system. Overall, we present a comprehensive study on flight
mission planning of battery-operated autonomous drones, considering autonomous recharging.
CCS Concepts: •Computer systems organization →Embedded and cyber-physical systems; •Computing
methodologies →Robotic planning; •Theory of computation →Dynamic graph algorithms;
Additional Key Words and Phrases: Autonomous Drones, Flight Mission Planning, Recharging Optimization,
Automated Drone Management
ACM Reference format:
Chien-Ming Tseng, Chi-Kin Chau, Khaled Elbassioni, and Majid Khonji. 2017. Autonomous Recharging and
Flight Mission Planning for Battery-operated Autonomous Drones. 1, 1, Article 1 (January 2017), 25 pages.
DOI: xx.xxxx/xxxxxxx.xxxxxxx
1
INTRODUCTION
Aerial vehicles are becoming a novel means of logistics. Often referred as drones in popular
terminology, or unmanned aerial vehicles in technical terminology, they have several advantages
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee
provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and
the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored.
Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires
prior specific permission and/or a fee. Request permissions from [email protected].
© 2017 ACM. XXXX-XXXX/2017/1-ART1 $15.00
DOI: xx.xxxx/xxxxxxx.xxxxxxx
, Vol. 1, No. 1, Article 1. Publication date: January 2017.
1:2
Chien-Ming Tseng, Chi-Kin Chau, Khaled Elbassioni, and Majid Khonji
over ground based transportations. (1) Agility: There is little restriction in the sky, unlike on
the ground with obstacles. Drones can travel across space in straight paths. They are usually
small in size, with nimble navigating ability. (2) Swiftness: Aerial transportation is usually not
hampered by traffic congestions. The time to arrival is mostly reflected by the travelled distance.
Drones can also be rapidly launched by catapults, and drop off payloads by parachutes with short
response time. (3) Energy-efficiency: Drones are typically light-weight, which consume less energy.
They are particularly energy-efficient for transporting light-weight items in short trips, whereas
ground vehicles are useful for carrying heavier objects in long distance. (4) Safeness: There is no
on-board human operator or driver. Drones can keep a safe distance from human users. Unmanned
transportation missions are specially desirable in hazardous environments.
These advantages of drones enable diverse applications for light-weight goods transportation and
as substitutions of manned operations in remote locations. There are several notable applications of
drones. (1) Remote Surveillance: Aerial transportation can access far-away remote regions, and geographically dispersed offshore locations. Particularly, oil and gas companies and utility providers,
which rely on extensive surveillance, measurements, mapping and surveying, maintenance operations for dispersed facilities, will be major users of drones. (2) Search and Rescue: Drones can be
deployed in ad hoc manner. In emergency with damaged or unreliable infrastructure, drones can
overcome the difficulty of accessing in isolated regions, enabling fast transportation with great
convenience and flexibility. (3) Hazardous Missions: Drones are excellent solutions for unmanned
missions in risky or hazardous areas, in particular, for taking measurements in high-altitude, or
bio/chemical harmful environments. Human supervisors can remotely control the drones to carry
out dangerous operations. (4) Light-weight Items Delivery: Parcels, medical items, and mail require
speedy delivery. Drones are effective in solving the last-leg problem of the distribution chain from
depots to homes of end-users. A recent study by Amazon [13] reports that 44% of the US population
are within 20 miles from its depot facility. Hence, it is practical to employ drones for delivery.
Therefore, in the near future, fully autonomous drones are expected for extensive deployment,
giving rise to a new class of intelligent systems for logistics. Hence, the computing systems for
drones are becoming an exciting new venue for research in cyber-physical systems. Autonomous
drones require integrated intelligent decision systems to control and manage their flight missions
in the absence of human operators. Despite increasingly popular applications of drones in diverse
sectors, the operations of drones are plagued with several challenges:
• Limited Battery Lifetime: Typical drones are electric vehicles, powered by on-board batteries.
Hence, the performance of drones is critically constrained by limited battery lifetime. Many
drones are only suitable for short-range trips, which considerably limit their applicability.
To optimize the battery performance of drones, there requires an intelligent management
system to track the real-time state-of-charge, and optimize the operations accordingly.
• Dynamic Operating Environments: Drones are expected to travel in certain high altitude,
and hence are significantly susceptible by wind and weather conditions. These conditions
are highly dynamic, and should be accounted for in a real-time manner. Also, drones are
light-weight, and the impact by wind is even more substantial. Drone management system
should take explicit consideration of the dynamic uncertain operating environments.
These challenges present unique problems for battery-operated autonomous drones. Since drones
are expected to carry out long missions in dynamic environments, a fully automated management
system that can optimize the operations of battery-operated autonomous drones to extend their
operation time is highly desirable.
, Vol. 1, No. 1, Article 1. Publication date: January 2017.
Autonomous Recharging and Flight Mission Planning for Battery-operated Autonomous Drones
1:3
1.1
Our Contributions
To improve the practical usefulness of autonomous drones, this paper presents several contributions
to automated management systems for battery-operated drones:
(1) We conduct empirical studies to model the power consumption of drones, considering
various flight scenarios. Accurate model of battery performance in different scenarios
allows further flight mission planning and recharging optimization for drones.
(2) We study a joint problem of flight mission planning and recharging optimization for drones,
using the calibrated power consumption model of a drone, with an objective to complete a
tour mission for a set of sites of interest in the shortest time. We also consider uncertainty in
dynamic environments, such as wind conditions. This problem captures diverse applications
of delivery and remote operations by drones.
(3) We present algorithms for solving the problem of flight mission planning and recharging
optimization. We implemented our algorithms in a drone management system, which
supports real-time flight path tracking and re-computation in dynamic environments. We
evaluated the results of our algorithms using data from empirical studies.
(4) To allow fully autonomous recharging of drones, we also develop a robotic charging station
prototype that can recharge drones autonomously by our drone management system.
Autonomous recharging can significantly extend the battery lifetime of drones for longdistance missions.
2
RELATED WORK
There are diverse applications for drones, including delivery (e.g., for light-weight parcels, medical
items, mail) and remote operations (e.g., wildlife surveillance, environmental surveying, search and
rescue operations). Drones had been often studied for their flight and landing control mechanisms.
For example, see the books [18, 19] for a good overview of the recent results. There are two
aspects of literature about drones: 1) low-level transient control of flight operations, for example,
controlling propellers and balance using PID controllers [3, 4], and 2) high-level planning and
management of drone missions, for example, obstacle avoidance, localization and mapping and
path planning [20]. However, the high-level studies typically focus on a single short-distance flight
paths. Long-distance flight mission planning involving multiple trips and recharging optimization
has been considered to a lesser extent, to the best of our knowledge. Moreover, there is a lack of
prior work on flight mission optimization particularly considering battery-operated drones.
Most drones are aerial electric vehicles. The prior studies of logistic optimization mainly focus
on ground electric vehicles, not on aerial electric vehicles. Nonetheless, drones exhibit different
characteristics that create some unique challenges. For example, the impact of wind is more
substantial for drone flight. In [12], graph signal sampling and recovery techniques are used to plan
routes for autonomous aerial vehicles, and a method is proposed to plan an energy-efficient flight
trajectory by considering the influences of wind. Further, there appears limited empirical studies of
battery performance of drones, although the empirical studies of ground electric vehicles have been
explored in the literature. Modelling and predicting electric vehicle power consumption has been
the subject of a number of research papers. One method is the model-based whitebox approach,
based on specific vehicle dynamics model to understand the consumption behavior of electric
vehicles [16]. The power consumption estimation can also be obtained by a blackbox approach. For
example, a general statistical approach using regression model, without vehicle dynamics model,
can estimate the power consumption of vehicles [5]. Blackbox model is more tractable and more
convenient for trip optimization. Hence, we will employ a similar blackbox model for aerial electric
vehicles, but taking into account the flight conditions.
, Vol. 1, No. 1, Article 1. Publication date: January 2017.
1:4
Chien-Ming Tseng, Chi-Kin Chau, Khaled Elbassioni, and Majid Khonji
This work is related to the trip planning problem of electric vehicles [17]. There are recent
results for path planning of electric vehicles considering recharging operations [6]. We adopt the
solution proposed in [15] for the so-called tour gas station problem, for which efficient algorithms
are designed for obtaining a near-optimal solution under certain assumptions. A variant of the
classical algorithm [7] for the travelling salesman problem (TSP) was proposed in [15] for the
tour gas station problem. In this work, we extend those methods to solve the problem for drone
management by incorporating extensions to the settings of drone operations.
For fully autonomous drone management, drones should also be able to recharge themselves
without manual intervention. Inductive charging for drones has been proposed that can flexibly
recharge drones in an autonomous manner [2]. However, this work relies on a different solution,
with a combination of a robotic arm that can accommodate drone recharging in arbitrary positions.
To enable autonomous recharging of drones, an autonomous inductive charging system is initially
proposed in [14], which is integrated with the management system of this paper.
3
EMPIRICAL STUDIES OF BATTERY PERFORMANCE OF DRONES
In order to accurately optimize the power consumption and flight missions of drones, we first
conducted a series of empirical studies to determine the battery performance of drones, considering
various flight scenarios. In particular, we evaluate the power consumption using two commercial
drone models, 3DR Solo [1] and DJI Matrice 100 [8] (see Fig. 1 and their specifications in Table 1).
Both drones support developer kits, which allow us to extract data and program the flight paths.
After gathering sufficient measurement data, we can apply regression models to capture the power
consumption behavior of the drones.
Fig. 1. Left: 3DR Solo. Right: DJI Matrice 100.
Weight
Dimensions
Battery
Battery Weight
Motors
Max Speed
Max Altitude
Charging Duration
Software
3DR Solo
2 kg
25cm × 46cm
5200 mAh 14.8V
500 g
880 kV (×4)
20 km/h
122 ft (FAA Regulation)
90 mins
Python Developer Kit
DJI Matrice 100
2.8 kg
46cm × 46cm
5700 mAh 22.8V
600 g
350 kV (×4)
60 km/h
122 ft (FAA Regulation)
180 mins
DJI SDK & ROS
Table 1. Specifications of 3DR Solo and DJI Matrice 100 drones.
, Vol. 1, No. 1, Article 1. Publication date: January 2017.
Autonomous Recharging and Flight Mission Planning for Battery-operated Autonomous Drones
1:5
3.1
Settings of Empirical Studies
A typical drone is equipped with a number of sensors for two main purposes: (1) for self-stabilizing
the drone in the air, and (2) for remotely tracking the drone status (e.g., the battery state-ofcharge (SoC)). The stability of a drone is controlled by three essential sensors (i.e., gyroscopes,
accelerometers and barometers), with which it can maneuver itself in the air. The SoC is measured
by the voltage and current sensors. A major part of power consumption of a drone is due to
the powering of motors to lift itself in the air. Additional power consumption is required for the
movements of the drone. The movements can be decomposed into vertical and horizontal directions.
The barometer and GPS sensors can measure the 3-dimensional movements of a drone. The speed
and position of a drone can be tracked by GPS and IMU modules, which also enable automatic
navigation. The altitude of a drone can be tracked by barometer and GPS modules.
To understand the factors that determine the power consumption of a drone, we carried out the
following experiments for obtaining empirical data in the rural areas, where the drone can fly in a
straight path without obstacles:
(1) Impact of Motion: The motions of a drone can be divided into three types: hovering,
horizontal moving and vertical moving. We study the power consumption of a test drone
in each motion type.
(2) Impact of Weight: Typical drones can carry extra payloads, such as camera equipment or
parcels. We study the impact of different weights of payloads attached to a test drone.
(3) Impact of Wind: The major environmental factor that affects the drone is wind, including
wind direction and speed. Wind may benefit the power consumption in some cases, as well
as incurring resistance to the movement in other cases. We study the power consumption
of a test drone in various wind conditions.
The experimental results are described as follows.
12
10
8
6
4
2
00
Experiment 1
Experiment 2
Altitude
Speed
50
Experiment 3
Power
480
400
320
240
160
80
4500
Power(W)
Speed (km/h)
Altitude (m)
3.1.1 Impact of Motion. To study the power consumption of motions of a drone, we conducted
three experiments. The battery power, barometer and GPS location, and speed data were collected
in each experiment to analyze the performance of test drone 3DR Solo.
100
150
200
250
Time (sec)
300
350
400
Fig. 2. Motion and battery power consumption of test drone 3DR Solo.
Fig. 2 depicts the recorded data traces of the three experiments of test drone 3DR Solo. We
discuss several observations as follows:
• Experiment 1: The test drone hovered in the air without any movement in this experiment.
Note that the drone may slightly drift around the takeoff location due to deviation error of
GPS modules. We filter the speed data that is smaller than 0.5 m/s. This experiment shows
the baseline power consumption of a flying drone. From the recorded data, we observe that
the drone can maintain a sufficiently steady flying altitude with steady power consumption.
, Vol. 1, No. 1, Article 1. Publication date: January 2017.
1:6
Chien-Ming Tseng, Chi-Kin Chau, Khaled Elbassioni, and Majid Khonji
• Experiment 2: The test drone ascended and descended repeatedly in this experiment. The
barometer data shows the altitude of the drone. The time series data allow us to compute
the vertical acceleration and speed of the drone. We observe larger power fluctuations due
to repeatedly vertical movements. Power consumption increases slightly, when the drone
ascends steady.
• Experiment 3: The test drone moved horizontally without altering its altitude in this experiment. The GPS data comprises of speed and course angle of the drone. We also gathered
average wind speed and direction using a wind speed meter during the experiment. We
observe smaller power fluctuations due to horizontal movements. We also measure idle
power consumption of the drone between the two experiments.
25
20
15
10
5
00
Weight: 0g
Altitude
50
Weight: 250g
Speed
100
Weight: 500g
150
200
Time (sec)
500
400
300
200
100
0
Power(W)
Speed (km/h)
Altitude (m)
3.1.2 Impact of Weights. One of the practical purposes of drones is to deliver payloads, and
hence, the total weight of a drone varies as the payload it carries. We carried out several experiments
with different weights of payloads on the test drone 3DR Solo to obtain empirical data. Three
different weights were tested on the drone. The drone was set to hover in the air without any
movement to obtain the corresponding baseline power consumption.
250
300
Fig. 3. Battery power consumption of test drone 3DR Solo with different payload weights.
Fig. 3 depicts the battery power consumption of the test drone carrying three different weights.
We observe that power consumption increases almost linearly when the weight of payload increases.
The weight limit of payload depends on the thrusts that the motors can produce. Note that the
maximum payload weight is 500g for 3DR Solo.
3.1.3 Impact of Wind. Wind condition is a major environmental factor to affect the power
consumption of test drone 3DR Solo. We conducted several experiments under different wind
conditions: headwind by flying against the direction of wind, and tailwind by flying along the
direction of wind. The experiments were carried out at the same location but on different days with
different wind conditions. The wind directions and average speeds were measured using a wind
speed meter for each experiment. Once the wind direction was determined, the drone was set to fly
into a headwind or tailwind at maximum speed (18 km/h).
Fig. 4 depicts the battery power consumption of the drone under different wind conditions. We
observe smaller power consumption when flying into headwind, which is due to the increasing
thrust by translational lift, when the drone moves from hovering to forward flight. When flying
into a headwind, translational lift increases due to the relative airflow over the propellers increases,
resulting in less power consumption to hover the drone [11]. However, when the wind speed
exceeds a certain limit, the aerodynamic drag may outweigh the benefit of translational lift. In our
setting, the drone speed is relatively slow, even at maximum speed. Hence, flying into a headwind
is likely more energy-efficient.
, Vol. 1, No. 1, Article 1. Publication date: January 2017.
Autonomous Recharging and Flight Mission Planning for Battery-operated Autonomous Drones
1:7
Power (W)
300
Headwind
Tailwind
250
200
1500
10
20
30
Time (sec)
40
Wind: 14.4 km/h
Wind: 18.7 km/h
Wind: 22.0 km/h
Wind: 28.8 km/h
50
60
Fig. 4. Battery power consumption of test drone 3DR Solo under different wind conditions.
3.2
Regression Model of Power Consumption for Drone
Since drones are aerial electric vehicles, we can apply the methodology from the literature of
general electric vehicles to model the power consumption of a drone. There are two main types of
power consumption models of a drone:
• White-box Model: A straightforward approach is to employ a white-box microscopic
behavior model for each drone that comprehensively characterizes the motor performance,
aerodynamic environment, and battery systems. However, such a white-box model requires
a large amount of data for calibration and detailed knowledge specific to a particular drone.
For example, the aerodynamic parameters such as propeller efficiencies, motor efficiencies
and drag coefficients are difficult to obtain accurately without resorting to sophisticated
experimental setups like wind tunnel.
• Blackbox Model: A blackbox approach is more desirable, because it requires minimal
knowledge of vehicle model with only a small set of measurable variables and parameters of
the drone. In the subsequent sections, a blackbox model of power consumption of a drone
will be utilized for flight mission planning and recharging optimization. The advantage of
blackbox model is that it is obtained from simple data measurements without relying on
sophisticated experimental setups.
This section describes a general multivariate blackbox model of power consumption for a drone
that has been used extensively in the literature of electric vehicles [5, 9, 10, 21, 22], which will be
verified in the later empirical studies.
Let the estimated battery power consumption of a drone be P̂, which is estimated by a number
of measurement parameters in the following linear equation:
β 1 T
P̂ = β 2
β 3
kv®xy k β 4 T
ka®xy k + β 5
kv®xy k ka®xy k β 6
kv®z k β 7 T
ka®z k + β 8
kv®z k ka®z k β 9
m
v®xy · w® xy
1
(1)
where
• v®xy and a®xy are the speed and acceleration vectors describing the horizontal movement of
the drone.
• v®z and a®z are the speed and acceleration vectors describing the vertical movement of the
drone.
• m is the weight of payload.
• w® xy is the vector of wind movement in the horizontal surface.
• β 1 , ..., β 9 are the coefficients, and kv®k denotes the magnitude of a vector.
, Vol. 1, No. 1, Article 1. Publication date: January 2017.
1:8
Chien-Ming Tseng, Chi-Kin Chau, Khaled Elbassioni, and Majid Khonji
The coefficients β 1 , ..., β 9 can be estimated by the standard regression method, if sufficient measurement data is collected.
Assuming the uniform conditions (e.g., speed, wind) within a period of duration D, the total
energy consumption of the drone in duration D is estimated by P̂ · D.
3.3
Evaluation of Power Consumption Model
To evaluate the accuracy of the power consumption model, we conducted experiments to collect
extensive empirical data to estimate the corresponding coefficients. Two test drones (3DR Solo and
DJI Matrice 100) were used in two sets of experiments. A test drone was programmed to first fly
vertical movements, then flying into a headwind and a tailwind with different weights of payloads.
The drone maintained its altitude during the horizontal flight. We conducted experiments under
simple conditions, where the drone ascended from the source until reaching the desired altitude
and then flied directly to the destination without changing its altitude. But the experiments are
sufficiently representative of other conditions.
The following are the estimated coefficients of power consumption models for 3DR Solo and DJI
Matrice 100:
• 3DR Solo:
P̂solo
−1.526 T
= 3.934
0.968
kv®xy k 18.125 T
ka®xy k + 96.613
kv®xy k ka®xy k −1.085
kv®z k 0.220 T
ka®z k + 1.332
kv®z k ka®z k 433.9
m
v®xy · w® xy
1
(2)
• DJI Matrice 100:
P̂ dji
−2.595 T
= 0.116
0.824
kv®xy k 18.321 T
ka®xy k + 31.745
kv®xy k ka®xy k 13.282
kv®z k 0.197 T
ka®z k + 1.43
kv®z k ka®z k 251.7
m
v®xy · w® xy
1
(3)
We discussed the evaluation results of the test two drones using ground truth power consumption
data. Fig. 5-7 present the results for 3DR Solo, whereas Fig. 8-10 present the results for DJI Matrice
100. Fig. 5 and Fig. 8 depict the collected sensor data of our experiments for 3DR Solo and DJI
Matrice 100, respectively. We tested 3 different weights of payloads under similar flight paths
operations in each set of experiments. We obtain the estimated power consumption using the
respective regression model, and compare it to the ground truth power consumption data shown
in Fig. 6 and Fig. 9. We observe that the estimation is close to the actual measurement data. We
integrate power over time to obtain the power consumption of the drone in Fig. 7 and Fig. 10. The
errors of estimation of power consumption in the experiments are within 0.4%, showing relatively
good accuracy of our power consumption models for both test drones.
4
FLIGHT MISSION PLANNING AND RECHARGING OPTIMIZATION
In this section, we utilize the calibrated power consumption model of a drone from the last section
to study a joint problem of flight mission planning and recharging optimization for battery-operated
autonomous drones. The objective is to complete a flight tour mission for a set of sites of interest
in the shortest time. We consider a variable number of charging stations to allow recharging of
drones intermediately. This problem naturally captures diverse applications of delivery and remote
operations by drones. We provide efficient algorithms to determine the solutions, and implemented
our algorithms in an automated drone management system.
, Vol. 1, No. 1, Article 1. Publication date: January 2017.
25
20
15
10
5
00
Weight: 0
Altitude
Weight: 250g
Speed
Weight: 500g
500
400
300
200
100
6000
Power(W)
Speed (km/h)
Altitude (m)
Autonomous Recharging and Flight Mission Planning for Battery-operated Autonomous Drones
1:9
100
200
300
400
500
Power (W)
Fig. 5. Sensor data for the evaluation experiment of test drone 3DR Solo.
500
400
300
200
100
00
Measurement
100
Estimation
200
300
400
500
600
Energy
consumption (Wh)
Fig. 6. Measured and estimated power consumption of test drone 3DR Solo.
40
30
20
10
00
Measurement
100
Estimation
200
300
Time (sec)
400
500
600
25
20
15
10
5
00
Weight: 0
Altitude
Weight: 300g
Speed
Weight: 600g
800
600
400
200
6000
Power(W)
Speed (km/h)
Altitude (m)
Fig. 7. Measured and estimated energy consumption of test drone 3DR Solo.
100
200
300
400
500
Power (W)
Fig. 8. Sensor data for the evaluation experiment of test drone DJI Matrice 100.
800
700
600
500
400
300
200
100
00
Measurement
100
Estimation
200
300
400
500
600
Energy
consumption (Wh)
Fig. 9. Measured and estimated power consumption of test drone DJI Matrice 100.
80
60
40
20
00
Measurement
100
Estimation
200
300
Time (sec)
400
500
600
Fig. 10. Measured and estimated energy consumption of test drone DJI Matrice 100.
, Vol. 1, No. 1, Article 1. Publication date: January 2017.
1:10
4.1
Chien-Ming Tseng, Chi-Kin Chau, Khaled Elbassioni, and Majid Khonji
Model and Formulation
We denote a set of sites of interest by S that a drone needs to visit (e.g., drop-off locations of
parcels, or sites for measurements), and a set of charging station locations by C where a drone
can receive recharging. The base location of a drone is denoted by v 0 . Let V , S ∪ C ∪ {v 0 }. The
problem of drone flight mission planning with recharging is to find a flight mission plan (which is
a tour consisting of locations in S and C), such that the drone can visit all the sites in S, starting
and terminating at v 0 , with an objective of minimizing the total trip time, while maintaining the
state-of-charge (SoC) within the operational range. See an illustration of a flight mission plan with
recharging for a drone in Fig. 11.
Fig. 11. A flight mission plan with recharging for a drone.
Given a pair of locations (u, v), we denote the designated flight path by `(u, v), and the flight time
by τ (u, v). In this paper, we consider a simple flight path, such that the drone first ascends vertically
to a desired altitude, and then travels in a straight path, and finally descends to the destination
vertically. The model can
be generalized to consider non-straight paths.
Let E `(u, v), τ (u, v) be the required energy consumption for the drone flying along `(u, v)
within flight time τ (u, v). E(·, ·) is an increasing function that maps the combination of flight path
`(u, v) and flight time τ (u, v) to the required amount of energy. E(·, ·) can be estimated by a power
consumption model of a drone. We represent the charging strategy by a function b(·) : C 7→ R that
maps a charging station to an amount energy to be recharged. When recharging its battery at u,
let the incurred charging time be τc (b(u)). Let η c ≤ 1 and η d ≥ 1 be the charging and discharging
efficiency coefficients. If the drone flies to a charging station u ∈ C, it recharges its battery by an
amount of energy denoted by η cb(u). If the drone flies between two sites
u, v ∈ V , then it consumes
an amount of energy from the battery denoted by η d E `(u, v), τ (u, v) .
We denote a flight mission plan by F , which is a tour starting and terminating at v 0 , consisting
of a sequence of locations in S ∪ C ∪ {v 0 }. Denote k-th location by Fk . We require F1 = F| F | = v 0 .
The objective of flight mission planning is to find a flight mission plan F together with a charging
strategy b(·) that minimizes the total trip time, consisting of the flight time plus the charging time.
Let x k be the SoC when reaching the k-th location Fk in the flight mission plan. We require the
SoC to stay within feasible range [B, B]. The lower bound of SoC, B, ensures sufficient residual
energy for the drone to return to the base, in case of emergency. We set the initial SoC x 0 = B.
, Vol. 1, No. 1, Article 1. Publication date: January 2017.
Autonomous Recharging and Flight Mission Planning for Battery-operated Autonomous Drones
1:11
With the above notations, the drone flight mission planning with recharging problem (DFP) is
mathematically formulated as follows.
(DFP)
min
F,b(·),x
|Õ
F |−1
τ (Fk , Fk +1 ) +
k =1
|F|
Õ
τc (b(Fk ))
(4)
k=1:Fk ∈ C
subject to
F1 = F| F | = v 0
(5)
S ⊆ F ⊆ S ∪ C ∪ {v 0 }
x k−1 − η d E `(Fk , Fk +1 ), τ (Fk , Fk +1 ) , if Fk ∈ S
xk =
x k−1 + η cb(Fk+1 ) − η d E `(Fk , Fk +1 ), τ (Fk , Fk +1 ) , if Fk ∈ C
B ≤ x k ≤ B, x 0 = B
(6)
(7)
(8)
The difficulty of DFP is to balance the flight decisions and charging decisions. On one hand, a
flight mission plan needs to consider the requirement of completing the mission in minimal total
trip time. On the other hand, it needs to be able to reach a charging station, in case of insufficient
battery, as well as minimizing the charging time.
The formulation of DFP can be extended to incorporate a variety of further factors for practical
flight mission plan optimization, such as restrictions of no-fly zones and attitude, and wind speed
forecast information. Users can also specify further goals, such as deadline of completion and
maximum payload weight. An efficient optimization algorithm is required to compute an optimal
flight mission plan to meet the users’ specified goals.
4.2
Case with Uniform Drone Speed and Steady Wind Condition
To provide efficient algorithms for DFP, we first consider a basic setting under some realistic
assumptions. Suppose that the horizontal speed of the drone is a uniform constant under steady
wind condition, which will be relaxed in Sec. 4.3. Then, the flight time τ (u, v) between two sites
u, v ∈ v is proportional to the length of flight path `(u, v), denoted by d(u, v). Our regression
model
of energy consumption for drone in Sec. 3 implies that the function E `(u, v), τ (u, v) is linear in
the distance d(u, v), and the charging time τc (b(u)) is linear in the amount of recharged energy
b(u). Thus, we assume the following linear objective functions:
τ (u, v) = c a d(u, v),
τc (b(u)) = cb b(u),
E `(u, v), τ (u, v) = c f (u, v) · d(u, v),
(9)
(10)
for some constants c a , cb , c f (u, v) > 0. Note that we allow c f (u, v) to be edge-dependent. This can
model non-uniform environment for each `(u, v), for instance, a path experiencing stronger wind
is expected to have a larger constant c f (u, v).
Denote the lower and upper bounds of c f by c f , min(u,v) c f (u, v) and c f , max(u,v) c f (u, v).
In this paper, we consider mostly long-distance trips (e.g., 2-3 km), for which the vertical landing
and take-off operations usually constitute a small part of the whole flight, and consume only a
small percentage of the total energy (e.g., < 1%). For clarity of presentation, we assume that the
energy consumption of landing and take-off operations is implicitly captured by c f (u, v) · d(u, v),
though our results can be easily extended to consider that explicitly.
Í
For convenience of notation, for a flight mission plan (F , b(·)), we write τ (F ) , k| F=1|−1 τ (Fk , Fk +1 )
Í|F |
Í | F |−1
and b(F ) , k =1:F ∈ C τc (b(Fk )). Also, define d(F ) , k=1 d(Fk , Fk +1 ).
k
, Vol. 1, No. 1, Article 1. Publication date: January 2017.
1:12
Chien-Ming Tseng, Chi-Kin Chau, Khaled Elbassioni, and Majid Khonji
Under the aforementioned assumptions, the total charging time τc (b(F )), in an optimal flight
mission plan F , is proportional to the total flight time τ (F ), by the following lemma.
Lemma 4.1. In an optimal flight mission plan (F , b(·)), we have
c · d(F ) + c 0 ≤ τ (F ) + τc (b(F )) ≤ c · d(F ) + c 0
where either
1) c = c = c a and c 0 = 0, or
η
η
2) c = c a + c f cb ηdc , c = c a + c f cb ηdc , and c 0 =
cb
η c (B
− x 0 ).
Proof. See the Appendix.
Lemma 4.2. Given any feasible flight mission plan (F , b(·)), there is another feasible flight mission
plan (F , b 0(·)) such that
B − x0 c f ηd
τc (b(F )) ≤
+
· d(F )
ηc
ηc
Such a plan (F , b 0(·)) can be found in O(|V |) time.
Proof. See the Appendix.
Both Lemma 4.1 and Lemma 4.2 allow us to focus on minimizing the distance d(F ) instead of
total trip time. Hence, we simplify the problem DFP as a simplified formulation (SDFP), such that
its optimal solution is later shown to be within a constant factor with an optimal solution of DFP.
Simplified formulation (SDFP) is defined as follows.
(SDFP)
min
F,x
|Õ
F |−1
db Fk , Fk +1
(11)
k =1
subject to F1 = F| F | = v 0
S ⊆ F ⊆ S ∪ C ∪ {v 0 }
b k , Fk+1 ),
x
− η dd(F
x k = k −1
B, if Fk ∈ C
B ≤ x k ≤ B, x 0 = B
(12)
(13)
if Fk ∈ S
(14)
(15)
b ·), which is defined as follows. Recall
In SDFP, we consider a modified distance function d(·,
that V , S ∪ C ∪ {v 0 }. Consider a weighted undirected graph G 0 = (V , V2 ), whose edge lengths
b v)}u,v , which are the pairwise shortest
are defined by {c f (u, v) · d(u, v)}u,v . Then, obtain {d(u,
distances of each pair of nodes in G 0 . SDFP is related to the tour gas station problem in [15], which
optimizes a tour trip of a vehicle in minimal fuel cost, with options of refilling at given gas stations.
Note that we assume in the formulation of SDFP that the SoC is brought to its maximum at
each charging station. Once we obtain a tour under this assumption, it can be turned into a flight
mission plan with the minimal charging requirements using Lemma 4.2.
b v) be the distance to the nearest charging station from v, and
For u ∈ V , let dbu , minv ∈ C d(u,
b
su , argminv ∈ C d(u, v) be the nearest charging station from v.
B−B
Define U , ηd . Following [15], we make a mild assumption that for every u ∈ S \ {v 0 } there
is v ∈ C such that d(u, v) ≤ α U2 , where α ∈ [0, 1). This assumption can be justified (for α = 1) as
follows. For a location u ∈ S \ {v 0 }, if every v ∈ C is at distance greater than U2 , then it is infeasible
to visit u without incurring the battery level below B (as the SoC drops below B − η dU = B).
, Vol. 1, No. 1, Article 1. Publication date: January 2017.
Autonomous Recharging and Flight Mission Planning for Battery-operated Autonomous Drones
1:13
In the following,
we present an algorithm to SDFP and then DFP. The main algorithm is
Find-plan V , d , which is a variant of Christofides Algorithm [7] for finding a tour for travelling salesman problem, based on the results in [15]. It finds a minimum spanning tree T , and then
a minimum weight perfect matching M on the odd vertices of T . The edges of T and M define an
Eulerian graph, from which an Eulerian tour F0 can be obtained in linear time. The Eulerian tour
is passed to the procedure Fix-plan for converting it to a feasible flight mission plan F , which
might use a non-optimal charging function b(·). Then, the resulting plan (F , b(·)) is further passed
to procedure Fix-charge for finding the minimal charging requirements
with respect to the flight
mission plan F . Specifically, the three procedures in Find-plan V , d are:
b u, v : This provides a lower bound for an optimal solution. Namely,
• Init-distances V , d,
e v), and the
it finds for every pair of locations u, v ∈ V , the minimum possible distance d(u,
corresponding shortest path P(u, v) to go from u to v without going out of the operational
b v) ≤ U − dbu − dbv then the drone can always go directly
range of the battery. Note that if d(u,
1
from u to v . Otherwise, at best (in an optimal solution), the drone can reach u with SoC
at most B − η ddbu , then it can visits a sequence of charging stations (only if the distance
db between two successive such stations is at most U ), then, form the last station, it has
to reach v such that the SoC at v is at least B + η ddbv (so that there is sufficient battery to
reach sv ). In particular, the distance from u to the first charging station on this path should
be at most U − dbu . Similarly, the distance from the last station on the path to v should be
at most U − dbv . This explains the definition of the graph G in line 5 of the procedure.
• Fix-plan G, F0 : starting from the flight mission plan F0 obtained using the (modified)
e this procedure reconstructs a feasible
Christofides algorithm with respect to the weights d,
flight mission plan F for problem (SDFP). It first replaces each edge (u, v) in the flight
mission plan by the corresponding path P(u, v). Since the resulting flight mission plan
maybe still infeasible, the procedure adds to every site a round trip to the closest charging
station. Finally, the added stations are dropped one by one in a greedy way as long as
feasibility ismaintained.
• Fix-charge F , b(·) : Starting from the flight mission plan (F , b(·)) constructed after calling
procedure Fix-plan G, F0 , this procedure finds a minimal amount of recharging energy,
according to Lemma 4.2.
Let OPTDFP and OPTSDFP be the optimal solutions of problems (DFP) and (SDFP), respectively.
Lemma 4.3 ([15]). The flight mission plan F returned by algorithm Find-plan V , d] has cost
b ) ≤ 3 1+α OPTSDFP .
d(F
2 1−α
The following theorem establishes that algorithm Find-plan V , d] has an asymptotic constantfactor approximation guarantee for DFP.
Theorem 4.4. The flight mission plan (F , b 0(·)) returned by algorithm Find-plan V , d] has cost
τ (F ) + τc (b(F )) = O(OPTDFP ) + O(1).
Proof. See the Appendix.
is, starting with SoC= B at su , then the drone reaches u with SoC B − η d dbu , and then it flies directly from u to v
causing the SoC to drop to B − η d (dbu + db(u, v)) = B + η d (U − dbu − db(u, v)) ≥ B + η d dbv at v. Thus, there is sufficient
battery at v to reach sv .
1 That
, Vol. 1, No. 1, Article 1. Publication date: January 2017.
1:14
Chien-Ming Tseng, Chi-Kin Chau, Khaled Elbassioni, and Majid Khonji
Algorithm 1 Find-plan V , d
1:
2:
3:
4:
5:
6:
7:
8:
9:
10:
11:
12:
b v)}u,v on weighted undirected graph G 0 = (V ,
Compute pairwise shortest distances {d(u,
for each u, v ∈ V do
e v), P(u, v)) ← Init-distances V , d,
b u, v
(d(u,
end for
e where E = V
Consider the weighted undirected graph G = (V , E; d)
2
Find a minimum spanning tree T = (V , ET ) in G
V0 ← find the set of odd degree vertices in T
e
Find a minimum-weight perfect matching M = (V0 , E M ) in the graph (V0 , E; d)
F0 ← find an Eulerian tour in the graph (V , ET ∪ E M )
F ← Fix-plan[G, F0 ]
b 0(·) ← Fix-charge[F , b(·)]
return (F , b 0(·))
V
2 )
b u, v
Algorithm 2 Init-distances V , d,
1:
2:
3:
4:
5:
6:
7:
8:
9:
b v) ≤ U − dbu − dbv then
if d(u,
e v) ← d(u,
b v), P(u, v) ← {(u, v)}
d(u,
e v), P(u, v))
return (d(u,
else
Construct a weighted undirected graph G = (C ∪ {u, v}, E; w) where
b z) ≤ U − dbu Ð {v, z} : z ∈ C, d(v,
b z) ≤ U − dv0 Ð
E , {u, z} : z ∈ C, d(u,
b z 0) ≤ U
{z, z 0 } : z, z 0 ∈ C, d(z,
0
0
b z ) for all z, z 0 ∈ C ∪ {u, v}
and w(z, z ) , d(z,
P(u, v) ← shortest path between u and v in G (with a set of edge lengths {w(u, v)}u,v )
e v) ← length of P(u, v)
d(u,
e v), P(u, v))
return (d(u,
end if
Algorithm 3 Fix-plan G, F0
1:
2:
3:
4:
5:
6:
7:
8:
9:
10:
11:
F ←∅
for each (u, v) in F0 do
Add P(u, v) to F
end for
Add to F a set of sub-tours {{(u, su ), (su , u) : u ∈ V }
for u ∈ V do
if F \ {(u, su ), (su , u) is feasible then
F ← F \ {(u, su ), (su , u)}
end if
end for
return F
, Vol. 1, No. 1, Article 1. Publication date: January 2017.
Autonomous Recharging and Flight Mission Planning for Battery-operated Autonomous Drones
1:15
Algorithm 4 Fix-charge F , b(·)
Let Fi 1 , . . . , Fi r be the charging stations, in the order they appear on F
for j = 0, 1, . . . , r do
i j+1
Õ−1
3:
D j = ηd
c f (Fk , Fk +1 )d(Fk , Fk +1 )
1:
2:
k =i j
4:
5:
6:
7:
8:
9:
10:
11:
12:
13:
14:
4.3
end for
for j = 1, . . . , r do
Íj
B j , η c k=1
b(Fi k )
end for
for j = r downto 1 do
j−1
r
Õ
Õ
1
Dk −
Bk )}
b 0(Fi j ) = max{0, (B − x 0 +
ηc
k =0
k =1
if b 0(Fi j ) > 0 then
exit
end if
end for
return b 0(·)
Extensions
The preceding section presents a basic setting of DFP and its efficient algorithms. In reality, an
automated drone management system requires more sophisticated options. In this section, we
present two extensions to the preceding algorithms to obtain heuristics for more practical scenarios.
4.3.1 Wind Uncertainty. Under steady wind condition, we assume in the preceding algorithms
that c f (u, v) is a constant that depends on the designated path between sites u and v. In practice,
there is sometimes uncertainty in the wind condition. Often, the wind varies as the drone flies.
This also depends on the expected wind condition on this path. Thus, it should be more precisely
represented by c f (u, v, w), where w is the wind vector whose value is in an uncertain domain
w ∈ W . For example, W is defined by the predicted speed range [|w |, |w |] and the predicted
orientation range [θ w , θ w ]. We can modify the algorithms to account for the uncertainty of
W . We proceed conservatively in our algorithm by taking the worst-case, replacing c f (u, v) by
c f (u, v) = maxw ∈W c f (u, v, w).
4.3.2 Variable Drone Speed. We consider another scenario, in which the drone can vary its
speed uniformly at all designated paths in V . In this case, we run our algorithms sequentially in
multiple rounds, with an increasing drone speed at each round, until the algorithms can not return
a feasible solution (because that higher drone speed may result in insufficient battery to reach some
sites). Then we will enumerate all the optimal solutions in all the rounds to find the best solution
with the lowest total flight time. By enumerating the possibilities of different drone speeds, the
algorithms can identify an optimal flight mission plan.
5
CASE STUDIES
We implemented the algorithms in an automated drone management system. In particular, we
evaluated the results of flight mission planning and recharging optimization for the test drones in
several case studies, based on the data from empirical studies.
, Vol. 1, No. 1, Article 1. Publication date: January 2017.
1:16
5.1
Chien-Ming Tseng, Chi-Kin Chau, Khaled Elbassioni, and Majid Khonji
Setup
We consider a scenario with four sites of interest, and four charging stations. The drones are
programmed to begin its mission from the base. Fig. 12 depicts the geographical locations of the
sites (as black points), charging stations (as blue squares) and the base (as magenta triangle). The
choices of geographical locations and distances are based on some real locations of a suburban
community.
3.83
Case
1
2
3
2.3
8
4
5
6
3.40
Charging stations 7
8
1.7
1
Uint: km
Base
Sites
9
2.60
2.3
2.78
2.62
Fig. 12. Geographical locations of the sites, charging stations and base.
Drone Battery (Wh) kw® xy k (20 km/h)
Solo
70
South
Solo
70
North-East
Solo
140
South
Solo
140
North-East
DJI
130
South
DJI
130
North-East
DJI
260
South
DJI
260
North-East
m (g)
0
0
500
500
0
0
600
600
Fig. 13. Parameters of setup.
There are two major sets of studies conducted as follows.
(1) Study 1: We study eight sub-cases using the power consumption models of 3DR Solo and
DJI Matrice 100 under different wind and payload conditions. For each drone, we study
4 sub-cases as follows. We consider using one battery in the first two sub-cases of each
drone. Different wind conditions with average wind speed of 18 km/h are studied in the
sub-cases. Then we double the battery capacity with the same wind condition in another
two sub-cases. Since the battery capacity is doubled, extra weight is added to the drone.
The parameters of all the sub-cases are summarized in Table 13.
(2) Study 2: We consider uncertainty of wind conditions. The wind speed and orientation vary
within a certain range. The wind speed varies from 0 to 21 km/h in four discrete scales,
while the wind orientation varies from 0◦ to 360◦ in four discrete scales.
In Study 1, the cases of 3DR Solo are denoted by S1 C1 to S1 C4 , and the cases of DJI Matrice 100 are
denoted by S1 C5 to S1 C8 . Similarly, in Study 2, the cases of 3DR Solo are denoted by S2 C1 to S2 C4 ,
and the cases of DJI Matrice 100 are denoted by S2 C5 to S2 C8 .
5.2
Results and Discussion
For comparison, we also consider a benchmark algorithm, by which a drone flies to the nearest
unvisited site, or the SoC drops below a preset threshold, then the drone flies to a charging station
instead. We set the preset threshold to be the minimum SoC that can fly to a nearest charging
station from any site.
5.2.1 Study 1. The results of flight missions of Study 1 are visualized in Figs. 16-19. The numbers
indicate the path order of the drone. The colors represent the SoC of battery. The wind orientations
are displayed on the upper-left corners. We plot the trip time and energy consumption of Study 1
in Figs. 14-15. There are several interesting observations as follows:
• Our algorithm significantly outperforms the benchmark algorithm, in terms of trip time
and energy consumption. Hence, our algorithms are superior for flight mission planning.
, Vol. 1, No. 1, Article 1. Publication date: January 2017.
Autonomous Recharging and Flight Mission Planning for Battery-operated Autonomous Drones
1:17
• In the case study, the north-east wind affects flight missions to a larger extent, which causes
a higher energy consumption than that by south wind. Besides, there is a longer trip time
due to longer charging time.
• We observe that even the trip times in S1 C7 and S1 C8 are shorter, it consumes more energy
since the drone carrying extra battery, which results in heavier loads.
• Attaching one more battery does not help to reduce the trip time for 3DR Solo, while
attaching more battery helps to reduce trip time for DJI Matrice 100. The reason is because
attaching more battery enables DJI Matrice 100 to fly longer without recharging. The total
trip time is significantly decreased due to much shorter charging time (as the blue bars of
S1 C7 and S1 C8 are shorter). But the same path is not feasible for 3DR Solo. 3DR Solo will
require to charge at the left most charging station, and hence, the trip time increases. If we
slightly increase the battery capacity to 75 Wh, the results of 3DR Solo will be the same as
that of DJI Matrice 100.
400
300
300
200
200
100
0
100
S1 C1
S1 C2
S1 C3
S1 C4
0
Flight time
Benchmark time
Benchmark energy consumption
600
600
500
500
400
400
300
300
200
200
100
100
0
S1 C5
S1 C6
S1 C7
S1 C8
0
Energy consumption (Wh)
Trip time (mins)
400
Charging time
Energy consumption
Trip time (mins)
Flight time
Benchmark time
Benchmark energy consumption
Energy consumption (Wh)
Charging time
Energy consumption
Fig. 14. Trip time and energy consumption of Study 1 Fig. 15. Trip time and energy consumption of Study 1
using 3DR Solo.
using DJI Matrice 100.
5.2.2 Study 2. We study the results of flight mission planning considering uncertainty of wind
condition. We consider two sub-cases with the shortest trip time of two different drones from Study
1 (i.e., S1 C1 and S1 C7 ) and then increase uncertainty level for each case.
The results of flight missions of Study 2 are visualized in Figs. 20-21. We represent the ranges of
wind speeds and orientations as the shaded areas on the upper-left circles. We plot the trip time
and energy consumption of Study 2 in Figs. 22-23. There are several observations as follows:
• Recall that the energy consumption of S1 C1 does not have uncertain wind condition for 3DR
Solo with 70 Wh battery. In Study 2, we investigate if a feasible solution can be obtained in
the presence of uncertainty of wind condition. We gradually increase the uncertainty from
S2 C1 to S2 C4 . For example, in S2 C1 the wind speed varies from 9 to 12 km/h and orientation
varies from -45◦ to 45◦ . In this case, our algorithms always consider the worst-case setting
in the given range of wind conditions.
• We observe that the energy consumption in general increases as the uncertainty of wind
condition increases in Fig. 22. In partcular, the energy consumption of the worst uncertainty
is in S2 C4 , in which the drone may always fly into a tailwind. Thus, S2 C4 provides the most
conservative result.
• Similarly, recall that the energy consumption of S1 C7 does not have uncertain wind condition
for DJI Matrice 100 with 260 Wh battery (two batteries). We also observe similar trends when
the wind uncertainty is increased. In general, when uncertainty increases, the difference
of trip time/energy consumption between our approach and benchmark becomes smaller.
This is because of more frequent recharging when the uncertainty becomes larger.
, Vol. 1, No. 1, Article 1. Publication date: January 2017.
1:18
Chien-Ming Tseng, Chi-Kin Chau, Khaled Elbassioni, and Majid Khonji
1
Wind orientation
SoC Wind orientation
100
2
SoC
100
10
11
1
5
3
50
9
6
6
5
4
2
7
7
4
3
8
Base
Sites
10
9
0
Charging stations
0
(a) Case 1.
(b) Case 2.
Wind orientation
SoC Wind orientation
100
1
3
SoC
100
9
1
3
2
4
50
8
5
9
2
4
8
5
7
6
50
8
7
6
0
(c) Case 3.
50
0
(d) Case 4.
Fig. 16. Visualized flight missions for Study 1 using 3DR Solo by our algorithm.
Wind orientation
SoC Wind orientation
100
3
2
SoC
100
1
1
2
3
4
10
4
6
5
50
11
5
9
7
7
6
8
50
10
8
9
0
0
(a) Case 1 benchmark.
Wind orientation
(b) Case 2 benchmark.
SoC Wind orientation
100
3
2
10
4
5
6
7
SoC
100
3
1
50
9
4
9
5
8
1
2
6
50
8
7
0
(c) Case 3 benchmark.
0
(d) Case 4 benchmark.
Fig. 17. Visualized flight missions for Study 1 using 3DR Solo by benchmark algorithm.
, Vol. 1, No. 1, Article 1. Publication date: January 2017.
Autonomous Recharging and Flight Mission Planning for Battery-operated Autonomous Drones
1:19
1
Wind orientation
SoC Wind orientation
100
2
SoC
100
10
11
1
5
3
9
6
50
6
5
4
2
7
7
10
50
8
4
3
8
9
0
0
(a) Case 5.
(b) Case 6.
Wind orientation
SoC Wind orientation
100
SoC
100
1
1
2
2
7
50
3
4
50
4
6
5
7
3
6
5
0
(c) Case 7.
0
(d) Case 8.
Fig. 18. Visualized flight missions for Study 1 using DJI Matrice 100 by our algorithm.
Wind orientation
SoC Wind orientation
100
3
2
SoC
100
1
1
2
3
4
10
4
5
6
50
11
5
9
7
7
6
8
50
10
8
9
0
0
(a) Case 5 benchmark.
Wind orientation
(b) Case 6 benchmark.
SoC Wind orientation
100
SoC
100
3
1
1
2
8
6
50
7
2
5
9
4
3
4
5
6
50
8
7
0
(c) Case 7 benchmark.
0
(d) Case 8 benchmark.
Fig. 19. Visualized flight missions for Study 1 using Matrice 100 by benchmark algorithm.
, Vol. 1, No. 1, Article 1. Publication date: January 2017.
1:20
Chien-Ming Tseng, Chi-Kin Chau, Khaled Elbassioni, and Majid Khonji
Wind uncertainty
SoC Wind uncertainty
100
2
4
1
10
2
50
3
5
4
6
8
7
7
11
50
10
8
9
0
0
(a) Case 1.
(b) Case 2.
Wind uncertainty
SoC Wind uncertainty
100
3
4
2
1
2
1
12
50
5
6
11
9
3
4
50
5
8
SoC
100
12
6
7
1
3
5
9
6
SoC
100
11
7
10
8
9
10
0
0
(c) Case 3.
(d) Case 4.
Fig. 20. Visualized flight missions for Study 2 using 3DR Solo.
Wind uncertainty
SoC Wind uncertainty
100
9
1
3
3
0
(b) Case 6.
Wind uncertainty
SoC Wind uncertainty
100
2
4
7
6
0
(a) Case 5.
1
7
2
50
0
1
10
50
3
9
6
8
(c) Case 7.
4
5
9
6
SoC
100
10
3
5
8
5
7
6
50
2
4
8
5
9
1
50
2
4
SoC
100
7
8
(d) Case 8.
Fig. 21. Visualized flight missions for Study 2 using DJI Matrice 100.
, Vol. 1, No. 1, Article 1. Publication date: January 2017.
0
Autonomous Recharging and Flight Mission Planning for Battery-operated Autonomous Drones
1:21
400
300
300
200
200
100
0
100
S1 C1
S2 C1
S2 C2
S2 C3
S2 C4
0
Flight time
Benchmark time
Benchmark energy consumption
800
800
700
700
600
600
500
500
400
400
300
300
200
200
100
0
100
S1 C7
S2 C5
S2 C6
S2 C7
S2 C8
0
Energy consumption (Wh)
Trip time (mins)
400
Charging time
Energy consumption
Trip time (mins)
Flight time
Benchmark time
Benchmark energy consumption
Energy consumption (Wh)
Charging time
Energy consumption
Fig. 22. Trip time and energy consumption of Study Fig. 23. Trip time and energy consumption of Study
2 using 3DR Solo.
2 using DJI Matrice 100.
6
AUTOMATED DRONE MANAGEMENT SYSTEM
We implemented our algorithms in an automated drone management system. The user interface is
depicted in Fig 24. The user interface allows the users to specify individual goals and to visualize
the computed flight mission plan. The system connects to a cloud computing server, which uses
the input locations from the user and computes the optimal flight mission plan. Then the drone is
programmed to follow the flight mission plan computed by the server.
Furthermore, a dynamic tracking system of drone using on-board sensors, including GPS location,
video feed, SoC, and flight status, is utilized to monitor the real-time flight status of the drone. If
abnormal measurements are detected, for example, the reported sensor measurements deviate from
estimated value by flight mission planning, then real-time re-computation will be performed to
find the minimum adjustment to the previously computed flight mission plan. The user can abort
the mission anytime by clicking the button on the system. We remark that multiple drones can
also be tracked simultaneously.
Fig. 24. Interface of automated drone management
system.
7
Fig. 25. Robotic charging system.
AUTONOMOUS ROBOTIC CHARGING SYSTEM PROTOTYPE
In this section, we present a robotic charging system prototype that can recharge drones autonomously by our drone management system. More technical details can be found in [14].
, Vol. 1, No. 1, Article 1. Publication date: January 2017.
1:22
Chien-Ming Tseng, Chi-Kin Chau, Khaled Elbassioni, and Majid Khonji
There is a tethered rover capable of autonomous navigation, equipped with a robotic arm carrying
a charging pad that can adapt to different drone sizes and landing positions (see Fig. 25). Our
robotic rover uses 2D Light Detection and Ranging (LIDAR) sensors to navigate and detect a drone.
LIDAR sensors are more robust to environmental uncertainties and external lighting conditions
than computer vision sensors. The robotic charging system is comprised of three main components:
• Charging system: Since the goal of the charging system is to recharge drones in remote
areas, disconnected from the grid, it is vital to provide self-generating charging system, as
well as to protect the robotic rover from harsh environment conditions (i.e., rain, the wind,
etc.) when idle. So, our prototype can be powered by a solar panel. A landing zone with an
area of at least 3 × 3 m2 is designated for drone landing in front of the charging system.
• Robotic rover: To enable flexible deployment, a tethered rover is equipped with a robotic
arm that mounts a wireless inductive transmitter. Using autonomous drone detection and
navigation, the rover can cater for arbitrary landing position and orientation of a drone,
which is the case for most commercial drones that solely rely on inaccurate GPS and Inertial
Measurement Unit (IMU) for landing.
• Drones: Each drone is equipped with an inductive wireless receiver, compatible with that
of the robotic rover. In order to recharge a drone, the drone management system will send
a signal to the charging system to initiate the charging procedure.
We use Hokuyo UTM-30LX Scanning Laser Rangefinder to obtain 2D point cloud. The laser
rangefinder provides 30 meters detection range which allows the rover to detect far objects such as
drones or obstacles. The detection angle is 270◦ with 0.25◦ angular resolution. The rover odometry
is obtained based on wheel rotation using quadrature encoders.
A retractable arm is used to conduct inductive charging for the drones, which can flexibly
recharge drones in arbitrary positions. The inductive charging technology is based on resonant
inductive coupling, which can transfer energy without physical contact. It has been widely used
in wireless charging for smart phones. The use of inductive charging technology facilitates a
fully automated drone management system, without manually plugging to an external charger.
The current prototype uses six coils for inductive charging, giving a maximum charging speed of
6 × 700 = 3500 mA. We mounted six current sensors, on the robotic arm, to measure individual
coil charging rate. Our test drone is DJI Matrice 100 which is powered by two 5700 mA on-board
Li-Poly battery.
7.1
Recharging Process
We next describe the operations of recharging process. Once a drone is landed and a recharging
command is initiated, the robotic rover proceeds as follows:
(1) Finding the drone: From raw 2D LIDAR point cloud, we use a clustering technique to
separate the points of the drone from the background points.
(2) Classifying the drone and detecting its orientation: Based on supervised learning, drone
information (e.g., type, size, orientation, etc.) can be extracted from point cloud data. We
consider a single drone, and its orientation is detected using a rectangle boundary model.
The orientation of the drone is needed to instruct the rover to navigate to a position that
supports a better alignment for the charging pad with the receiver on the drone. This allows
more flexibility in the charging pad design (e.g., rectangular inductive charging pad instead
of a circular pad) to fit more inductive coils on the drone.
(3) Autonomously navigating towards the drone: the exact position of the navigation goal is
determined based on the allowable charging position.
, Vol. 1, No. 1, Article 1. Publication date: January 2017.
Autonomous Recharging and Flight Mission Planning for Battery-operated Autonomous Drones
1:23
(4) Recharging: Position the charging pad on the drone and adjust the positioning using current
sensors readings.
Once a drone is fully charged, a termination command is initiated to the charging system. Then
the rover returns to the charging system to resume its idle state. Also, the drone management
system actively communicates with the robotic charging system to track the charging status.
8
CONCLUSION
Automated drone management system is important for practical applications of drones. This paper
provides multiple contributions to automated management systems for battery-operated drones,
including empirical studies to model the battery performance of drones considering various flight
scenarios, a study of flight mission planning and recharging optimization for drones that captures
diverse applications of delivery and remote operations by drones, and a management system
implementation with a robotic charging station to support autonomous recharging of drones.
In future work, we will incorporate a variety of further features in our automated drone management system, such as restrictions of no-fly zones and attitude, and wind speed forecast. Users may
also be able to specify further goals, such as deadline of completion and maximum payload weight.
A
PROOFS
Lemma 4.1. In an optimal flight mission plan (F , b(·)), we have
c · d(F ) + c 0 ≤ τ (F ) + τc (b(F )) ≤ c · d(F ) + c 0
where either
1) c = c = c a and c 0 = 0, or
η
η
2) c = c a + c f cb ηdc , c = c a + c f cb ηdc , and c 0 =
cb
η c (B
− x 0 ).
Proof. Consider an optimal flight plan (F , b(·)) and assume that the charging stations, in the
order they appear on F , is Fi 1 , . . . , Fi r , where without loss of generality, we assume Fi 1 , v 0 .
For completeness, let i 0 , 1 and i r +1 , |F |. For j = 0, 1, . . . , r , let
D j , ηd
i jÕ
+1 −1
c f (Fk , Fk +1 ) · d(Fk , Fk +1 ),
k =i j
and for j = 1, . . . , r , let B j , η cb(Fi j ).
Then, the feasibility of the flight mission plan F implies
x0 −
j
Õ
k =0
Dk +
j
Õ
Bk ≥ B, for j = 0, . . . , r
(16)
k=1
Let us refer to Ineq. (16) for a particular j as I (j) ≥ B. Particularly, consider I (r ) ≥ B. Suppose
that this inequality is not tight, that is, the left-hand side is strictly larger than the right-hand
side. Note that the variable b(Fi r ) = Bηrc appears only in this inequality. Since b(Fi r ) appears in the
objective function τc (b(F )) with a positive coefficient (i.e., τc (b(u)) = cb b(u)), there are two cases:
(i) b(Fi r ) = 0 at optimality, if I (r ) > B, or (ii) b(Fi r ) > 0 at optimality, if I (r ) = B. Otherwise, it
will contradict to the optimality of b(Fi r ), by reducing the value of b(Fi r ). If it is case (i), then the
inequality I (r − 1) ≥ B becomes redundant (as I (r − 1) ≥ I (r ) > 0). Removing I (r − 1) ≥ B, we obtain
that the variable b(Fi r −1 ) appears only in I (r ) ≥ B. Similarly, we can conclude that b(Fi r −1 ) = 0 and
remove the (now) redundant inequality I (r − 2) ≥ B.
, Vol. 1, No. 1, Article 1. Publication date: January 2017.
1:24
Chien-Ming Tseng, Chi-Kin Chau, Khaled Elbassioni, and Majid Khonji
Continuing this argument, we conclude that there are two cases: (1) either all variables b(Fi j )
are set to zero in which case the value of the objective is τ (F ) = c a d(F ), or (2) we have
r
r
Õ
Õ
x0 −
Dk +
Bk = B,
k =0
k =1
In case (2), the value of the objective is
r
r
Õ
cb
cb Õ
Bk = τ (F ) + (B − x 0 +
Dk )
τ (F ) +
ηc
ηc
k =1
r
cb Õ
cb
= τ (F ) +
D k + (B − x 0 )
ηc
ηc
k =0
k =0
Therefore,
r
ηd
cb
cb Õ
cb
d(F ) + (B − x 0 ) ≤τ (F ) +
D k + (B − x 0 )
c a + c f cb
ηc
ηc
ηc
ηc
k =0
ηd
cb
≤ c a + c f cb
d(F ) + (B − x 0 ).
ηc
ηc
Lemma 4.2. Given any feasible flight mission plan (F , b(·)), there is another feasible flight mission
plan (F , b 0(·)) such that
B − x0 c f ηd
τc (b(F )) ≤
+
· d(F )
ηc
ηc
Such a plan (F , b 0(·)) can be found in O(|V |) time.
Proof. The proof follows from Lemma 4.1, which uses algorithm Fix-charge to implement the
argument used in Lemma 4.1 to find a feasible fight mission plan.
0
Theorem 4.4. The flight plan (F , b (·)) returned by algorithm Find-plan V , d] has cost
τ (F ) + τc (b(F )) = O(OPTDFP ) + O(1).
Proof. Let (F ∗ , b ∗ (·)) be an optimal flight plan for (DFP). Clearly, this plan can be trivially
turned into a feasible solution (F ∗ , x) for (SDFP) by setting x k = B for all Fk ∈ C. It follows that
b ∗ ).
OPTSDFP ≤ d(F
(17)
On the other hand, Lemma 4.3 implies that
3 1+α
b
d(F ) ≤
OPTSDFP .
2 1−α
(18)
OPTDFP ≥ c · d(F ∗ ) + c 0,
(19)
Lemma 4.1 also implies that
while Lemma 4.2 implies that
b(F ) ≤
B − x0 c f ηd
+
d(F ),
ηc
ηc
(20)
b ·) implies
and the definition of d(·,
b ) and d(F
b ∗ ) ≤ c f d(F ∗ ).
c f d(F ) ≤ d(F
, Vol. 1, No. 1, Article 1. Publication date: January 2017.
(21)
Autonomous Recharging and Flight Mission Planning for Battery-operated Autonomous Drones
1:25
Putting together (17), (18), (19), (20), and (21), we obtain
τ (F ) + τc (b(F )) = c a d(F ) + cb b(F )
B − x0
ηd
d(F ) + cb
≤ c a + c f cb
ηc
ηc
B − x0
η d OPTDFP − c 0
3 1 + α cf
+ cb
≤
.
c a + c f cb
2 1 − α cf
ηc
c
ηc
REFERENCES
[1] 3DR Solo. 2017. https://3dr.com/solo-drone/specs/. (2017). [Online; accessed 19-Sept-2017].
How wireless power charging could recharge a flying drone.
http://www.bbc.com/news/
[2] BBC. 2016.
technology-37821459
[3] S. Bouabdallah, A. Noth, and R. Siegwart. 2004. PID vs LQ control techniques applied to an indoor micro quadrotor. In
International Conference on Intelligent Robots and Systems (IROS).
[4] Endri Bregu, Nicola Casamassima, Luca Mottola, and Kamin Whitehouse. 2016. Reactive Control of Autonomous
Drones. In ACM Mobile Systems, Applications, and Services (Mobisys).
[5] Alesaandn Cappiello, Ismail Chabini, Edward K. Nam, Alessandro Lue, and Maya Abou Zed. 2002. A Statistical Model
of Vehicle Emissions and Fuel Consumption. In IEEE Intelligent Transportation Systems Conf.
[6] Chi-Kin Chau, Khaled Elbassioni, and Chien-Ming Tseng. 2017. Drive Mode Optimization and Tour Planning for
Plug-in Hybrid Electric Vehicles. to be published in IEEE Trans. Intell. Transp. Syst. (2017).
[7] Nicos Christofides. 1976. Worst-case analysis of a new heuristic for the travelling salesman problem. Technical Report.
CMU. Report 388, Graduate School of Industrial Administration.
[8] DJI Matrice 100. 2017. https://www.dji.com/matrice100/info. (2017). [Online; accessed 19-Sept-2017].
[9] Raghu K Ganti, Nam Pham, Hossein Ahmadi, Saurabh Nangia, and Tarek F Abdelzaher. 2010. GreenGPS: a participatory
sensing fuel-efficient maps application. In ACM Mobile Systems, Applications, and Services (Mobisys).
[10] Stefan Grubwinkler and Markus Lienkamp. 2013. A modular and dynamic approach to predict the energy consumption
of electric vehicles. In Conf. Future Automotive Technology.
[11] Helicopter Flying Handbook. 2012. . US Federal Aviation Administration.
[12] Tianxi Ji, Siheng Chen, Rohan Varma, and Jelena Kovacevic. 2015. Energy-efficient route planning for autonomous aerial
vehicles based on graph signal recovery. In Annual Allerton Conference on Communication, Control, and Computing.
[13] The Wall Street Journal. 2016. Amazon’s Newest Ambition: Competing Directly With UPS and FedEx. http://www.wsj.
com/articles/amazons-newest-ambitioncompeting-directly-with-ups-and-fedex-1474994758
[14] Majid Khonji, Mohammed Alshehhi, Chien-Ming Tseng, and Chi-Kin Chau. 2017. Autonomous Inductive Charging
System for Battery-operated Electric Drones. In ACM Workshop on Electric Vehicle Systems, Data and Applications
(EV-Sys).
[15] Samir Khuller, Azarakhsh Malekian, , and Julin Mestre. 2011. To fill or not to fill: The gas station problem. ACM
Transactions on Algorithm 7 (2011), 534–545.
[16] Eugene Kim, Jinkyu Lee, and Kang G. Shin. 2013. Real-time prediction of battery power requirements for electric
vehicles. In IEEE/ACM Intl. Conf. on Cyber-Physical Systems.
[17] Mingsong Lv, Nan Guan, Ye Ma, Dong Ji, Erwin Knippel, Xue Liu, and Wang Yi. 2016. Speed Planning for Solar-Powered
Electric Vehicles. In ACM Intl. Conf. on Future Energy Systems (e-Energy).
[18] Kenzo Nonami, Farid Kendoul, Satoshi Suzuki, Wei Wang, and Daisuke Nakazawa (Eds.). 2010. Autonomous Flying
Robots: Unmanned Aerial Vehicles and Micro Aerial Vehicles. Springer Publisher.
[19] Yasmina Bestaoui Sebbane (Ed.). 2015. Smart Autonomous Aircraft: Flight Control and Planning for UAV. CRC Press.
[20] Roland Siegwart, Illah Nourbakhsh, and Davide Scaramuzza. 2015. Introduction to Autonomous Mobile Robots. MIT
Press.
[21] Chien-Ming Tseng and Chi-Kin Chau. 2017. Personalized Prediction of Vehicle Energy Consumption based on
Participatory Sensing. to be published in IEEE Trans. Intell. Transp. Syst. (2017).
[22] Chien-Ming Tseng, Chi-Kin Chau, Sohan Dsouza, and Erik Wilhelm. 2015. A Participatory Sensing Approach for
Personalized Distance-to-Empty Prediction and Green Telematics. In ACM Intl. Conf. Future Energy Systems (e-Energy).
, Vol. 1, No. 1, Article 1. Publication date: January 2017.
| 8cs.DS
|
1
An Overview of Physical Layer Security with
Finite-Alphabet Signaling
February 20, 2018
arXiv:1802.06401v1 [cs.IT] 18 Feb 2018
Sina Rezaei Aghdam*, Alireza Nooraiepour** and Tolga M. Duman*
(*) Dept. of Electrical and Electronic Engineering, Bilkent University, Ankara, Turkey
(**) Electrical and Computer Engineering Dept., Rutgers University, New Brunswick, NJ, US
Email: {aghdam, duman}@ee.bilkent.edu.tr, [email protected]
Abstract
Providing secure communications over the physical layer has been receiving growing
attention within the past decade. The vast majority of the existing studies in the area of
physical layer security focus exclusively on the scenarios where the channel inputs are Gaussian
distributed. However, in practice, the signals employed for transmission are drawn from discrete
signal constellations such as phase shift keying and quadrature amplitude modulation. Hence,
understanding the impact of the finite-alphabet input constraints and designing secure transmission schemes under this assumption is a mandatory step towards a practical implementation
of physical layer security. With this motivation, this article reviews recent developments on
physical layer security with finite-alphabet inputs. We explore transmit signal design algorithms
for single-antenna as well as multi-antenna wiretap channels under different assumptions
on the channel state information at the transmitter. Moreover, we present a review of the
recent results on secure transmission with discrete signaling for various scenarios including
multi-carrier transmission systems, broadcast channels with confidential messages, cognitive
multiple access and relay networks. Throughout the article, we stress the important behavioral
differences of discrete and Gaussian inputs in the context of the physical layer security. We
also present an overview of the practical code construction over Gaussian and fading wiretap
channels, and we discuss some open problems and directions for future research.
February 20, 2018
DRAFT
2
I. I NTRODUCTION
Wireless communications has become an indispensable part of our everyday lives. As
more and more data is being transmitted over wireless links, along with the reliability of
the transmission, ensuring secrecy of the sensitive information has become a challenging
issue. Traditionally, this issue is addressed using higher (network) layer solutions and
via computation-based mechanisms such as encryption. On the other hand, the security
provided by these methods mainly relies on the conjecture that the encryption function
is difficult to invert, which is not provable from a mathematical point of view. With
the ever-increasing computing power, encryption may no longer prevent information
leakage to sophisticated adversaries. Moreover, implementation of key-based secure
communications requires complicated protocols for key distribution and management,
which is highly challenging to implement in the cases of decentralized wireless networks.
Securing transmission at the physical layer is an alternative or a complement to the
cryptographic solutions. The basic idea is to exploit the inherent randomness of the
channel for achieving secrecy. Dissimilar to encryption based methods, in the schemes
employing physical layer security, no constraint is placed on the computational capability
of the eavesdropper. Furthermore, no key distribution/management is required in its
implementation.
During the past decade there has been an extensive growth of interest in studying the
capabilities of physical layer for securing communication. Several surveys and overview
papers are available describing the state-of-the-art on this topic. Fundamentals of physical
layer security are comprehensively explained in [1]-[4]. A review of recent results ranging
from point-to-point communications to multiuser scenarios is given in [5]. A number of
hurdles facing physical layer security are summarized in [6]. The authors in [7] present
a review of the recent research results on physical layer security under channel state
information (CSI) uncertainty in different nodes. A comprehensive overview on various
February 20, 2018
DRAFT
3
multiple antenna techniques in physical layer security is provided in [8].
The objective of this survey is to shed light on two other important (and highly related)
practical aspects, namely, secure transmission with discrete signaling and practical code
construction. We present a detailed review of the related recent results, underline the
important behavioral differences between the Gaussian inputs and discrete signaling,
and study the transmit signal design problem for securing communications in a variety
of scenarios. We also provide a review of recent results on practical code design for
secrecy, and make connections with the information theoretic results with finite inputs.
The remainder of the paper is organized as follows. In Section II, we provide a description of the fundamental concepts in physical layer security including the wiretap channel
model and different secrecy metrics. In Section III, we discuss the differences between
the secrecy performance of constellation-constrained and Gaussian inputs over Gaussian
wiretap channels. An overview of the secure multi-antenna transmission schemes with
finite-alphabet inputs is provided in Section IV. Sections V and VI discuss the scenarios
with multi-carrier transmission and multiuser channels, respectively. An overview of the
practical code design approaches for secrecy is presented in VII, followed by concluding
remarks and future research directions in Section VIII.
Notation: Vectors and matrices are denoted with lowercase and uppercase bold letters.
Non-bold letters are used to denote scalar values and calligraphic letters denote sets. The
expectation and probability mass (or density) function of a random variable W is denoted
by EW {.} and PW (.), respectively. P r(.) is used to denote the probability of an event.
An stands for a sequence of length n, i.e., An = {A(1), A(2), . . . , A(n)}. The notation
CN (m, R) denotes a circularly symmetric complex Gaussian random vector with mean
vector m and covariance matrix R.
February 20, 2018
DRAFT
4
II. F UNDAMENTALS
The wiretap channel model, originally introduced by Wyner in [10], is the most basic
scenario in the study of physical layer security. In this model, while the sender Alice
wishes to transmit a message signal to a legitimate receiver Bob; a third party, Eve,
is present with the capability of eavesdropping on Alice’s signal. The channel between
Alice and Bob, and the channel between Alice and Eve are referred to as the main
channel and the eavesdropper’s channel, respectively. In physical layer security, one is
interested in transmitting in such a way to maximize the transmission rate over the main
channel while keeping the eavesdropper ignorant about the message. This leads to the
notion of secrecy capacity, which is defined as the maximum rate at which the transmitter
can use the main link so as to deliver its message to the legitimate receiver in a way that
the eavesdropper cannot successfully obtain any information about it. Characterization
of the secrecy capacity is one of the most fundamental problems in the literature of
physical layer security in that it can provide us with vital implications on how secure
transmission techniques can be designed.
A. Different Notions of Secrecy
Consider a transmitter who wishes to transmit a message M to a legitimate receiver
while trying to keep an eavesdropper ignorant about it. M is mapped to a codeword X n
using a stochastic encoder with n denoting the number of channel uses. Then, X n is
transmitted, and Y n and Z n are received at the legitimate receiver and the eavesdropper,
respectively. The eavesdropper’s level of uncertainty is quantified using the equivocation
rate which is given by
Re =
1
H(M ∣Z n ),
n
(1)
which is nothing but a measure of how unlikely it is that the eavesdropper can infer source
information from its received signal. According to this definition, large equivocation rates
February 20, 2018
DRAFT
5
are equivalent to higher secrecy levels.
There are different metrics for measuring the secrecy guaranteed by a specific scheme
among which the information-theoretic ones are recognized as the strongest. Perfect
secrecy is achievable in a system if the message M and its corresponding encoder
output X n are statistically independent [11]. This can be expressed as I(M ; X n ) = 0,
which means that the mutual information between the message and the encoded signal
is exactly zero. This is to say, the eavesdropper is not capable of recovering the message
via observation of the encoder output in view of the fact that this encoded signal does
not provide any information about it. For this form of secrecy to be guaranteed, a secret
key of the length at least equal to the length of the message should be used. However,
weaker requirements can be adopted for evaluation of the secrecy in practical scenarios.
One example of such notions is semantic secrecy, which is achieved if it is guaranteed
that Z n does not increase the probability of guessing an arbitrary function f of M (with
an arbitrary distribution PM ) more than > 0 if Adv(M ; Z n ) < , where advantage
Adv(M ; Z n ) is defined as
Adv(M ; Z n ) = max ( ∑ PZ n (z n ) max P r(f (M ) = fi ∣z n )− max P r(f (M ) = fi )),
f,PM
zn
fi ∈supp(f )
fi ∈supp(f )
(2)
where supp(.) stands for the support of the function in its argument.
Assuming a uniform distribution for the message M , a system is called to operate
with strong secrecy if limn→∞ I(M ; Z n ) = 0, which means that if we consider codewords
of n symbols being transmitted by Alice as X n , the information leaked by observation
of the received vector Z n shall go to zero as n goes to infinity. On the other hand,
the condition limn→∞ n1 I(M ; Z n ) = 0 is referred to as weak secrecy. In particular, weak
secrecy requires the asymptotic rate of information leakage to be sublinear in n. Different
notions of secrecy, which are used to measure the secrecy guaranteed by a specific
scheme are summarized in Table I.
February 20, 2018
DRAFT
6
TABLE I: Four notions of secrecy.
Notion
Requirement
Perfect Secrecy [11]
I(M ; X n ) = 0
Semantic Secrecy [9]
Adv(M ; Z n ) <
Strong Secrecy [12]
limn→∞ I(M ; Z n ) = 0
Weak Secrecy [10]
limn→∞ n1 I(M ; Z n ) = 0
B. Secrecy Capacity of Single-Antenna Wiretap Channels
The notion of secrecy capacity was originally introduced by Wyner in [10] for degraded wiretap channels. In the scenario studied in [10], the main channel and the
eavesdropper’s channel are assumed to be discrete memoryless channels (DMCs) where
Eve’s observation of the transmitted signal is a degraded version of the signal received by
Bob. Wyner showed that, the secrecy capacity for this scenario can be expressed as the
difference of the mutual information between Alice and Bob with that of Alice and Eve,
maximized over all input distributions. Generalization of the notion of secrecy capacity
to the case of additive white Gaussian noise (AWGN) channels has been accomplished
in [13]. It is shown that, for the case of a Gaussian wiretap channel, nonzero secrecy
capacity can be attained if Bob receives the signal through a less noisy channel.
While the scenarios considered in [10] and [13] put the eavesdropper at a disadvantage,
Csiszár and Körner have studied the problem of secrecy for non-degraded channels in
[14]. In this channel model, referred to as broadcast channel with confidential messages,
the message transmitted by Alice contains a common message intended to both Bob and
Eve as well as a secret message, which is intended for Bob only, and is needed to be
kept secret from Eve. It is shown that the secrecy capacity over a discrete memoryless
February 20, 2018
DRAFT
7
wiretap channel (DMWC) is given by
Cs = max I(U ; Y ) − I(U ; Z),
(3)
PX∣U ,PU
where U is an auxiliary random variable. With a given PY Z∣X (y, z∣x), the secrecy
capacity is achieved by maximizing the difference of the mutual information terms
corresponding to the main and the eavesdropper’s channels over all joint distributions
PU X (u, x) where U satisfies the Markov chain relationship U → X → Y Z.
In order to study the physical layer security in wireless communication scenarios, we
need to extend the wiretap channel model to a model, which takes into account the fading
phenomenon. Assuming a narrowband transmission, fading is modeled as multiplicative
gains over the main and eavesdropper’s channels, denoted by HB and HE , respectively.
The first characterization of the role of fading in providing physical layer security is
given in [15] where quasi-static fading channels are considered towards the legitimate
receiver and the eavesdropper. It is shown via analyzing the secrecy outage probability
that, in presence of fading, secure transmission is possible even in the scenarios where
the eavesdropper has a better SNR. The secrecy capacity over block fading channels has
been derived in [16] under the assumption that each coherence interval is long enough
to allow for invoking proper random coding arguments. Given that the transmitter knows
either the main CSI (MCSI) or both the main and the eavesdropper CSI (ECSI) perfectly,
an achievable secrecy rate can be formulated as [16]:
+
Rs = EHB ,HE {[I(X; Y ∣HB ) − I(X; Z∣HE )] },
(4)
where [a]+ = max{a, 0}. It has been shown in [16] that the secrecy capacity that is
achieved under the full CSI assumption serves as an upper bound on the secrecy capacity
when only MCSI is known at the transmitter. This is due to the fact that with the
knowledge of instantaneous ECSI, the transmitter is capable of realizing a more efficient
transmission, which provides additional gains in terms of secrecy rates. For instance,
February 20, 2018
DRAFT
8
when perfect knowledge of both channels are available, the transmitter can optimize the
transmit power according to the instantaneous values of the channel gains HB and HE ,
providing a higher secrecy rate with respect to the case where the optimization of the
transmit power is carried out according to the main channel only.
Under the assumption that the transmitter does not know the realizations of the
channels, and it only has their statistics, assuming that each receiver knows its own
channel, the secrecy capacity can be obtained with the aid of the results for the case of
DMWC [14] as
Cs = max I(U ; Y, HB ) − I(U ; Z, HE ),
(5)
PX∣U ,PU
where U satisfies the Markov chain relationship U → X → (Y, HB ), (Z, HE ). This is
obtained by treating HB and HE as channel outputs at the legitimate receiver and at the
eavesdropper, respectively [17], [18]. Using the chain rule of mutual information and
noting the fact that HB and HE are independent of X and U , the expression in (5) can
be modified as
Cs = max EHB I(U ; Y ∣HB ) − EHE I(U ; Z∣HE ).
PX∣U ,PU
(6)
Determining the optimal joint distribution PU X (u, x) and the resulting exact secrecy
capacity is an open problem, however, by ignoring the channel prefixing, the performance
can be quantified using an achievable ergodic secrecy rate as given by
+
Rs = [EHB I(X; Y ∣HB ) − EHE I(X; Z∣HE )] .
(7)
C. Secrecy Capacity of Multi-Antenna Wiretap Channels
Multiple-input multiple-output (MIMO) wiretap channel is an extension of the wiretap
channel to a scenario where all the nodes, namely, Alice, Bob and Eve, are equipped with
multiple antennas. The secrecy capacity for this setup has been determined independently
by Khisti and Wornell [19] and Oggier and Hassibi [20]. The results in [14] are employed
February 20, 2018
DRAFT
9
by Khisti and Wornell so as to develop a genie-aided upper bound on the secrecy capacity
in the general case of non-degraded MIMO wiretap channels. While their characterization
is through a saddlepoint, Oggier and Hassibi propose an alternative approach through a
single optimization process. It has been shown in both [19] and [20] that the achievable
secrecy rate is maximized when the channel input is Gaussian, and the secrecy capacity
of a MIMO wiretap channel is given by
Cs =
max
Kx ⪰0,T r(Kx )=P
H
log det(I + HB Kx HH
B ) − log det(I + HE Kx HE ),
(8)
where Kx = E{xxH }, and HB ∈ CNE ×Nt and HE ∈ CNE ×Nt are the channel matrices
corresponding to the legitimate receiver and the eavesdropper, respectively.
An alternative characterization of the secrecy capacity of the MIMO wiretap channel
is presented by Liu and Shamai in [21] where they consider a more general matrix
constraint on the channel input. We highlight that, while [19]–[21] prove that the optimal
input is Gaussian, the optimal input covariance matrix needs to be determined using
numerical optimization approaches (see, e.g., [22]–[23]).
D. Other Secrecy Metrics
Secrecy capacity is the most widely used measure for evaluation of the secrecy
performance. However, a complete characterization of the secrecy capacity region is
prohibitive in some scenarios. In such cases, alternative metrics can be adopted as
surveyed below.
1) Secrecy Outage Probability: Secrecy outage occurs when the instantaneous secrecy
capacity falls below a target secrecy rate Rs . In delay-critical applications and for
scenarios with quasi-static fading, encoding over multiple channel states is not possible.
In these cases, secure transmission schemes can be designed such that the probability of
occurrence of an outage event is minimized. Obviously, this serves as a weaker notion
February 20, 2018
DRAFT
10
than secrecy capacity. This is due to the fact that, with this formulation, secrecy is not
guaranteed for the entire transmission duration.
2) Error Probability Based Metrics: In a number of works on physical layer security,
secure transmission schemes are designed based on constraining the bit error rate at
the legitimate receiver and the eavesdropper to pre-specified threshold values. This
leads to definition of a parameter called “security gap,” which quantifies the minimum
required difference between the received SNR values at Bob and Eve to ensure that
the bit error rate (BER) at Bob is smaller than a threshold while that at the Eve’s
receiver is larger than another threshold [24]. One may note that imposing high BER
at the eavesdropper does not satisfy any of the requirements given in Table I. However,
security gap serves as a practical measure of secrecy in a number of applications such as
explicit and implementable code design for physical layer secrecy. Some studies (e.g.,
[25]) consider the difference in the signal-to-interference-plus-noise ratio (SINR) at the
legitimate receiver and the eavesdropper as the secrecy metric. This is also a very weak
notion, which does not guarantee secrecy in an information theoretic sense.
III. G AUSSIAN W IRETAP C HANNELS WITH F INITE -A LPHABET I NPUTS
The secrecy capacity achieving input distribution over a Gaussian MIMO wiretap
channel is proved to be Gaussian [13]. However, due to the high detection complexity,
Gaussian signaling is not used in practice, and instead the transmission is carried out
with the aid of discrete inputs drawn from standard constellations such as PSK or QAM.
Hence, it is important to study the implications of discrete signaling in the context of
physical layer security.
As a first step in studying physical layer security under the finite-alphabet input
assumption, the impacts of standard constellations on the achievable secrecy rates of
Gaussian wiretap channels are studied in [26] and [27]. In [26], the authors evaluate
the constellation-constrained secrecy capacity and highlight an important behavioral
February 20, 2018
DRAFT
11
9
8
Capacity (bits/complex dim.)
7
6
BPSK
QPSK
16−PSK
16−QAM
64QAM
Gaussian
5
4
3
2
1
0
−15
−10
−5
0
5
10
15
20
25
SNR (dB)
Fig. 1: Capacity of an AWGN channel with Gaussian and constellation-constrained
inputs.
difference between finite-alphabet (e.g., PSK and QAM) and Gaussian inputs, that is, for
a fixed noise variance at Eve, the secrecy rate curves for PSK or QAM plotted against the
SNR have global maxima at finite SNR values. Investigation of the secrecy capacity of
the pulse amplitude modulation (PAM) inputs over a degraded Gaussian wiretap channel
in [27] leads to a similar conclusion. In addition, the authors in [27] demonstrate that
when finite constellations are employed, using all the available power for the information
bearing signal transmission may not be optimal. The reason behind these observations
has its roots in the mutual information expressions. That is, the capacity under an average
power constraint over an AWGN channel is given by
C = log2 (1 + SN R),
(9)
in bits per complex dimension, and it is an increasing function of the SNR. On the other
hand, the capacity of the constellation-constrained AWGN channel can be calculated as
February 20, 2018
DRAFT
12
[28]
⎧
⎫
⎪
∑x′ ∈X pY ∣X ′ (y∣x′ ) ⎪
⎪
⎪
I(X; Y ) = log2 ∣X ∣ − EX,Y ⎨ log2
⎬,
(10)
⎪
⎪
pY ∣X (y∣x)
⎪
⎪
⎩
⎭
where X is a constellation set and ∣X ∣ denotes its cardinality. Dissimilar to the capacity
expression in (9), the mutual information term in (10) converges to log2 ∣X ∣ at high SNRs
(see Fig. 1). This means that by increasing the transmit power, the mutual information
terms I(X; Y ) and I(X; Z) (calculated using (10)) will reach the saturation value, and
the secrecy rate drops to zero. This is also verified in Fig. 2, where the secrecy rates
are obtained by evaluating the difference of the mutual information terms corresponding
to the main and eavesdropper’s channels, under the assumption that the SNR at the
eavesdropper (denoted by SNRe ) is lower than the legitimate reciever’s SNR (denoted
by SNRb ) by 1.5 dB. This also clarifies that using all the available transmit power for
information transmission in the high SNR regime is not optimal [27]. Furthermore, it
can be observed from Fig. 2 that higher secrecy rates are achieved over Gaussian wiretap
channels by increasing the modulation orders.
The impact of output quantization on the secrecy rate of the binary-input Gaussian
wiretap channel is investigated in [29]. It is shown through theoretical analysis that
when the legitimate receiver has unquantized inputs where the eavesdropper has (binary)
quantized outputs higher secrecy rates are achievable with respect to the case where both
receivers have binary quantized or unquantized outputs.
To conclude this section, we note that while it may be tempting to argue that, as in
the case of transmission over an AWGN channel with no security considerations, one
can design general transmission schemes using Gaussian codebooks and simply adopt
the ideas to the case of inputs from standard constellations (e.g., PSK, QAM, etc.),
this approach does not extend in a straightforward manner. The optimal transmit signal
design strategies under Gaussian input assumption lead to considerable losses when
applied to the inputs drawn from standard constellations. For instance, it is shown in
February 20, 2018
DRAFT
13
0.45
Secrecy Rates (bits/complex dim.)
0.4
0.35
BPSK
QPSK
16−QAM
64−QAM
0.3
0.25
0.2
0.15
0.1
0.05
0
−15
−10
−5
0
5
10
SNR at Bob (SNRB)
15
20
25
Fig. 2: Secrecy rates with PSK and QAM over a degraded Gaussian wiretap channel
(SNRE = SNRB − 1.5 dB).
[27] the optimal power allocation strategy with PAM inputs is in sharp contrast to that of
Gaussian inputs. This motivates development of new algorithms and ideas for practical
constellation-constrained channels.
IV. FADING AND M ULTI -A NTENNA W IRETAP C HANNELS D RIVEN BY
F INITE -A LPHABET I NPUTS
Fading introduces new potentials for securing communications at the physical layer.
Specifically, the randomness due to the channel fluctuations can be exploited opportunistically by a transmitter to guarantee secrecy even in the scenarios where the eavesdropper
possesses a higher SNR (on average) than the legitimate receiver. Dissimilar to the
Gaussian wiretap channel where Gaussian input is secrecy capacity achieving, in the
presence of fading, discrete signaling may achieve higher secrecy rates. For instance, it
has been shown in [30] that, when Bob’s channel gain is on average worse than that of
February 20, 2018
DRAFT
14
Fig. 3: MIMO wiretap channel.
Eve’s, QAM inputs achieve higher secrecy rates at low and moderate SNR regimes. This
is because the discrete nature of the QAM inputs limits the leakage at the eavesdropper
whose channel is unusually good. At sufficiently high SNRs, however, the secrecy rate
with QAM inputs drops to zero similar to what is observed for the case of Gaussian
wiretap channels.
Taking advantage of the spatial degrees of freedom introduced by multi-antenna transmission can serve as an efficient solution to prevent secrecy rate of standard constellations
from dropping to zero at high SNRs. In the remainder of this section, we focus on a
system model where Alice, Bob and Eve are equipped with Nt , NB and NE antennas,
February 20, 2018
DRAFT
15
as depicted in Fig. 3. The received signals are given by
y = HB x + ny ,
(11)
z = HE x + nz ,
(12)
where HB and HE are the channel matrices corresponding to the legitimate receiver
and the eavesdropper. ny and nz denote circularly symmetric complex AWGN vectors,
elements of which follow CN (0, σ 2ny ) and CN (0, σ 2nz ), respectively.
Transmit precoding and artificial noise injection serve as important approaches for
enhancing secrecy [5]. Via precoding, it is possible to strengthen (or weaken) the transmitted signals in certain directions. Accordingly, it can be used as an effective tool to
increase the quality difference between the signals received at the legitimate receiver
and the eavesdropper. Beamforming is a special case of precoding where the transmitter
is restricted to using rank-one signals. It has a lower complexity with respect to the
general transmit precoding solution, achieved at the price of some performance loss.
Furthermore, injection of artificial noise [31] can effectively degrade the reception at the
eavesdropper while having no (or minimal) effect on the signal received at the legitimate
receiver. We also note that, to take advantage of the potentials offered by the channel
fading, the transmitter needs a certain level of knowledge on the CSI of both channels.
In what follows, we review the existing solutions for secure transmission over MIMO
wiretap channels with finite-alphabet inputs under different CSIT assumptions.
A. Transmit Signal Design with Full CSI
The most optimistic assumption regarding the transmitter’s CSI knowledge is availability of perfect instantaneous realizations of the channel matrices HB and HE . This
assumption is justifiable in the scenarios where Eve is an authorized user in the network,
however, she should be kept ignorant about the confidential messages transmitted from
Alice to Bob. In this case, the transmitter can take advantage of the full CSI knowledge
February 20, 2018
DRAFT
16
to design a precoder, which results in the maximal quality difference between the signals
received at the legitimate receiver and the eavesdropper.
With the aid of the perfect CSI corresponding to both channels, a generalized singular
value decomposition (GSVD) precoding solution has been proposed in [32] using which
the MIMO multi-antenna eavesdropper (MIMOME) channel is converted into a bank
of parallel channels, and a power allocation strategy is formulated to maximize the
achievable secrecy rate.
The necessary conditions for optimum transmit precoding is derived in [33], and it
is demonstrated that the GSVD precoding [32] is suboptimal. Alternatively, a gradient
descent optimization is proposed in which the precoder matrices are updated with steps
proportional to the gradient of the instantaneous secrecy rate. Furthermore, it is shown
that transmission along the null-space of the eavesdropper’s channel is the optimal
secure transmission strategy at the high-SNR regime. This is because, with a precoder
matrix along the null-space of the eavesdropper’s channel, the achievable rate at the
eavesdropper is suppressed to zero, and when the SNR is sufficiently high, the rate at
the legitimate receiver approaches the maximum value that can be achieved with the use
of specific finite-alphabet inputs, which guarantees that the secrecy rate is maximized.
However, it should be noted that, when the number of transmit antennas is less than or
equal to the number of antennas at the eavesdropper, it is not possible to suppress her
information rate by transmitting along the null-space of HE . Therefore, for maximizing
secrecy rates, only part of the available power should be allocated to data transmission.
Given Nt > NB , the authors in [33] suggest to use the excess power for transmission of
an artificial noise signal along the null-space of HB so as to prevent the secrecy rates
from dropping to zero. Fig. 4 compares the achievable secrecy rates by the schemes
proposed in [32] and [33] for a wiretap channel with Nt = 2, NB = 1 and NE = 1, and
February 20, 2018
DRAFT
17
fixed channels given by1
hB = [0.5128 − 0.3239j −0.8903 − 0.0318j ] ,
(13)
hE = [0.3880 + 1.2024j −0.9825 + 0.5914j ] .
(14)
The precoding approach proposed in [33] outperforms the GSVD-based precoding [32].
This improved performance is attained at the price of increased computational complexity. Furthermore, comparing the results given in Fig. 4 with those of Fig. 2 for QPSK
inputs over the Gaussian wiretap channel reveals the advantages offered by fading and
CSI-based precoding approaches.
An important conclusion that can be drawn from the results in [32] and [33] is that,
as in the case of non-fading channels, the structure of the optimal precoders under
the finite-alphabet input assumption is different from that of the precoders, which are
optimal for Gaussian inputs. For example, over MISO multi-antenna eavesdropper (MISOME) channels, the optimal transmission strategy is beamforming along the eigenvector
corresponding to the largest generalized eigenvalue of (Hb , He ) [34]. However, these
precoders (which correspond to signaling with rank one covariance), when applied to
the finite-alphabet inputs, undergo a considerable loss with respect to the precoders
optimized with finite-alphabet inputs (see, e.g., Fig. 7 in [33]).
As an alternative method to design a suboptimal precoder, one may also replace
the secrecy capacity with practical metrics (as opposed to those ensuring secrecy in
an information-theoretic sense) such as SINR-based metrics. For instance, the authors
in [35] design artificial noise beamformers, which serve as constructive interference to
the legitimate receiver (improving Bob’s SINR) while disrupting the reception at the
eavesdropper (degrading Eve’s SINR). In Table II, we summarize the precoder design
approaches with full CSI.
1
This example has also been considered in [33] and [34].
February 20, 2018
DRAFT
18
10
9
Secrecy capacity [34] (Gaussian inputs)
Gradient Descent Opt. [33] − QPSK inputs
GSVD−based Precoding [32] − QPSK inputs
Secrecy Rates (bits/s/Hz)
8
7
6
5
4
3
2
1
0
−10
−5
0
5
10
SNR (dB)
15
20
25
30
Fig. 4: Secrecy rates with QPSK inputs over fixed channels given in (13) and (14).
TABLE II: Precoder design with full CSI
Authors
System Model
Contributions
S. Bashar et al. [32]
MIMOME
Propose a GSVD-based precoding algorithm.
Y. Wu et al. [33]
MIMOME
Derive the necessary conditions for optimality of the precoder matrix and
develop a gradient descent based precoder optimization algorithm.
M. R. A. Khandaker et al. [35]
MISO, multiple
Design artificial noise which is constructive to the legitimate receiver and
Eves
destructive to the eavesdroppers.
B. Perfect MCSI and Statistical ECSI
While availability of the perfect ECSI at the transmitter may be practical in some
limited scenarios, in general, it is highly challenging to obtain it instantaneously. A
more practical assumption regarding CSIT is the availability of perfect MCSI along
February 20, 2018
DRAFT
19
with the statistical ECSI at the transmitter. On the other hand, the precoder design in
this scenario is not as effective as those carried out with the perfect knowledge of both
channels. In other words, in the absence of the instantaneous ECSI, precoding is not
as forceful in suppressing the reception at the eavesdropper. For instance, transmission
along the null-space of the eavesdropper’s channel is not even possible in this scenario.
An example of secure transmission scheme under perfect MCSI and statistical ECSI
is given in [37] where the authors consider a MISOME channel and define a practical
secrecy metric (instead of an information theoretic one), which quantifies the symbol
error probability of the confidential data, and show that in the absence of artificial noise,
secrecy diversity (i.e., the high-SNR slope of their defined metric) vanishes. This result
underlines the importance of artificial noise injection in these scenarios.
Artificial noise-aided transmit precoding strategies with the objective of maximizing
the secrecy rate are proposed in [38]–[40]. In [38], the authors employ naive beamforming
along with the artificial noise injection while considering single-antenna receivers. The
strategy proposed in [33], on the other hand, relies on an iterative maximization of an
approximation to the instantaneous secrecy rate. In both of these studies, it has been
shown that the optimal schemes allocate only a fraction of the total power for signal
transmission at high SNRs. Hence, the remaining power is employed for artificial noise
injection. It is shown in [39] that jointly optimizing the precoder matrix and portion of the
power allocated to the artificial noise outperforms the solutions, which rely on optimizing
the precoder only. Moreover, inspired by the idea proposed in [41], a generalized artificial
noise aided transmission is introduced in [40], which guarantees high secrecy rates for
the scenarios with Nt < NE where injection of artificial noise along the null-space of
the main channel is not possible. A summary of the existing solutions for the scenarios
with perfect MCSI and statistical ECSI at the transmitter is given in Table III.
February 20, 2018
DRAFT
20
TABLE III: Precoder design with perfect MCSI and statistical ECSI.
Authors
System Model
Contributions
T. V. Nguyen et al. [37]
MISOME
Define a weak notion of secrecy based on symbol error probability and
quantify the impact of artificial noise injection with beamforming on
diversity order.
S. Bashar et al. [38]
MISOSE
Employ a naive beamforming with the aid of MCSI only along with a
power optimization using perfect MCSI and statistical ECSI. The excess
power is used for artificial noise injection in the null-space of HB .
Y. Wu et al. [33]
MIMOME
Develops an iterative algorithm for precoder design and allocate the
excess power to inject artificial noise along the null-space of HB .
S. Rezaei Aghdam and
T. M. Duman [40]
MIMOME
Propose a joint precoder and (generalized) artificial noise optimization
algorithm.
C. Perfect MCSI Only
In the scenarios with a passive eavesdropper, a realistic assumption is that the transmitter does not know anything about the eavesdropper’s channel. Under this assumption,
[42] and [43] propose a secure transmission strategy referred to as directional modulation,
in which the amplitude and the phase of the transmit signal are adjusted by varying the
length of the reflector antennas for each symbol. This scrambles the PSK symbols in
all the directions other than that of the legitimate receiver. Other strategies for securing
communications without the knowledge of the eavesdropper’s channel are proposed in
[44] and [45]. Zhang et al. develop a Tomlinson-Harashima precoding in [44] where
the transmitter allocates part of its power in order to achieve a target mean squared
error (MSE) at the legitimate receiver, and the remaining power is used to transmit
artificial noise to degrade the eavesdropper’s reception. In [45], a secure space-time block
coding (STBC) scheme is proposed in which enables the legitimate receiver to perform
separable decoding, while requiring an exhaustive maximum likelihood (ML) detection
February 20, 2018
DRAFT
21
at the eavesdropper. Furthermore, the authors combine this scheme with artificial noise
injection to ensure a high uncoded BER at Eve. Table IV summarizes the existing
transmit signal design approaches under perfect MCSI and no ECSI at the transmitter.
TABLE IV: Transmit signal design with perfect MCSI and no ECSI.
Authors
System Model
Contributions
A. Kalantari et al. [42],
MIMOME
Steer the array beam such that the phase of the PSK modulated signal
[43]
L. Zhang et al. [44]
is scrambled in directions other than Bob.
MIMOME
Propose a nonlinear Tomlinson-Harashima precoding along with along
with artificial noise injection.
S. A. A. Fakoorian et
MIMOME Nt =
Design a STBC which results in a high BER for Eve and a low BER
al. [45]
NB = 2, NE ≥ 1
for Bob.
D. Statistical MCSI and ECSI
While most of the existing physical layer security solutions rely on the assumption
that the transmitter is capable of estimating at least the instantaneous main CSI, in
some scenarios (e.g., for fast fading channels), it may be difficult for the transmitter
to track the rapidly varying channel coefficients. For these cases, the impact of the
discrete inputs on the achievable secrecy rates is analyzed in [46]. Under the assumption
that both channels are doubly correlated, using the knowledge of transmit and receive
correlation matrices, transmit signal design algorithms are proposed in [47] to maximize
the resulting achievable secrecy rates. The results in [47] reveal that jointly optimizing
the precoder matrix and artificial noise results in increased achievable secrecy rates with
respect to precoding without artificial noise injection. The existing studies on MIMO
wiretap channels with statistical CSI are summarized in Table V.
We now compare the secrecy rates achieved by different transmit signal design approaches under different CSIT assumptions. In particular, we overview the results for the
February 20, 2018
DRAFT
22
scenarios with perfect or statistical CSI at the transmitter. When perfect CSI is available,
each element of HB and HE are modeled as independent and identically distributed
(i.i.d.) with CN (0, σB2 ) and CN (0, σE2 ), respectively. When considering the statistical
CSI corresponding to the main channel or the eavesdropper’s channel, a commonly
adopted model in the literature employs doubly correlated channels with
1/2
1/2
HB = ΨrB ĤB ΨtB ,
1/2
1/2
HE = ΨrE ĤE ΨtE ,
(15)
where the elements of ĤB and ĤE are i.i.d., and the transmitter is capable of acquiring
the transmit and receive correlation matrices, i.e., Ψtb , Ψte , Ψrb and Ψre , from the longterm statistics of the channel. The perfect instantaneous CSI is available at the receivers,
including the legitimate receiver and the eavesdropper.
Fig. 5 demonstrates the achievable secrecy rates by different transmission schemes
over a MIMOME wiretap channel with Nt = 4 and NB = NE = 2. Correlation matrices
are assumed to have exponentially decaying entries as
[Ψt (ρ)]ij = ρt ∣i−j∣ ,
[Ψr (ρ)]mk = ρr ∣m−k∣ ,
i, j = 1, 2, . . . , Nt ,
(16)
m, k = 1, 2, . . . , NB (or, NE ).
(17)
It is demonstrated that the precoder design using a gradient descent optimization
approach [33], [40] is a promising strategy for maximizing the secrecy rates. Fig. 5 also
reveals the importance of CSIT. When perfect CSI corresponding to the eavesdropper is
TABLE V: Transmit signal design with statistical MCSI and ECSI.
Authors
System Model
Contributions
M. Girnyk et al. [46]
MIMOME
Derive large system approximation for secrecy rate under arbitrary
channel inputs and quantify it for Gaussian and finite-alphabet inputs.
S. Rezaei Aghdam and
T. M. Duman [47]
February 20, 2018
MIMOME
Propose precoding and artificial noise injection approaches with the aid
of the knowledge on correlation matrices.
DRAFT
23
4
Ergodic Secrecy Rates (bits/s/Hz)
3.5
3
2.5
2
1.5
1
0.5
Perfect MCSI and ECSI [33]
Perfect MCSI and statistical ECSI [39]- ρte = 0.8, ρre=0.8
Statistical MCSI and ECSI [47]- ρtb = 0.9, ρre=0.6, ρte = 0.8, ρre=0.8
0
-10
-5
0
5
10
SNR (dB)
15
20
25
Fig. 5: Secrecy rates with different transmit signal design algorithms under different
CSIT assumptions.
available at the transmitter, it is possible to construct precoders, which are aligned with
the null-space of the eavesdropper’s channel. By this means, the achievable rate of the
eavesdropper can be suppressed to zero. Furthermore, even when perfect CSI of the main
user is available along with the statistical CSI of the eavesdropper, high secrecy rates are
still achievable with the aid of appropriately designed artificial noise injection strategies.
However, in the absence of instantaneous CSI, the precoder matrices designed with the
knowledge of correlation matrices are not capable of preventing the ergodic secrecy
rates from dropping to zero at high SNRs. In other words, since statistical CSI does
not provide sufficient degrees of freedom to take advantage of the fading for improving
secrecy, the behavior is similar to that in AWGN channels described in Section III.
February 20, 2018
DRAFT
24
E. Transmit Signal Design Based on Channel Reciprocity
A group of transmission strategies in the literature of physical layer security rely on
the assumption of channel reciprocity, that is, the transmitter and the legitimate receiver
observe the same channel, simultaneously. For the systems working in time division
duplex (TDD) mode, this property can be used to allow the transmitter to obtain the MCSI
using the pilots transmitted from the legitimate receiver. In [48], a secure transmission
scheme is proposed over a MIMO wiretap channel under the assumption that no training
signals are transmitted by Alice, and hence, no CSI is available at Bob or Eve. Alice
realizes an orthogonal space-time block coded PSK transmission and uses the CSI she
obtains from the reverse channel estimation to design a phase shifting precoder, which
compensates the phase shift by the channel. Therefore, Bob can recover the transmitted
messages with no need to CSI. On the other hand, Eve who observes an independent
channel can only recover the information with non-coherent detection, ensuring that this
strategy provides positive secrecy rates over MIMO wiretap channels.
In the scenarios with channel reciprocity, when channel estimation is carried out both
in the forward (from Alice to Bob) and the reverse (from Bob to Alice) directions, the
channel between Alice and Bob can serve as a source of common randomness, which can
further improve the secrecy. This common randomness is used in [49] for generation of
a random phase sequence, which is then used to manipulate the transmitted symbols (by
simply multiplying them by the obtained random phase terms). Since the eavesdropper
is unable to find out these random phase values, an enhanced secrecy is attained.
F. Performance-Complexity Trade-off in Transmit Signal Design
The iterative algorithms proposed in [33] and [40] for optimizing the precoder matrix
are shown to provide promising results in terms of the achievable secrecy rates. However,
their implementation complexity may be too high for some practical applications. There
February 20, 2018
DRAFT
25
are two main reasons for this high computational complexity. First, both the mutual
information and its gradient lack closed-form expressions. Therefore, Monte Carlo simulations need to be utilized to evaluate both terms, which require averaging over a
large number of noise realizations in order to maintain a high level of accuracy. More
importantly, the evaluation of the mutual information and the minimum MSE (MMSE)
term involves additions over the modulation signal space, which grows exponentially
with the number of transmit antennas, resulting in a prohibitively high computational
complexity when the number of transmit antennas is large.
Different strategies are proposed for lowering the computational complexity associated
with the transmit signal design for secrecy under the finite-alphabet input assumption.
The authors in [33] and [39] derive closed-form approximations for the secrecy rate
expressions using bounds on mutual information. While the former employs the bounds
given in [50], the latter approximates the mutual information using the cut-off rate
expression. The authors in [51]-[52] derive asymptotic secrecy rates in a regime where
the numbers of antennas at the transmitter and both receivers grow infinitely large
with a constant ratio. Maximization of this expression is shown to yield a satisfactory
performance even in the cases of small number of antennas. The authors in [53] and
[40] propose per-group precoding strategies under perfect and partial CSIT assumptions,
respectively. In these works, the channels are diagonalized and the precoder matrices are
designed by grouping the transmit antennas and designing the precoder matrix for each
group, independently.
G. Secure Spatial Modulation
Spatial modulation and space shift keying (SSK) are relatively new MIMO transmission schemes, which rely on encoding information via active antenna indices. Similar
to the amplitude or phase modulation schemes, in spatial modulation and SSK, the
channel inputs are drawn from discrete and finite sets. More specifically, in spatial
February 20, 2018
DRAFT
26
modulation [54], the data bits are mapped into two information carrying blocks: 1) an
antenna index selected from the set of transmit antennas, 2) a symbol drawn from a
standard constellation. Space shift keying is a special case of spatial modulation where
no amplitude of phase modulation is employed, i.e., the transmit antenna index serves
as the only information carrying unit [55].
Different studies explore the advantages offered by spatial modulation over state-ofthe-art MIMO schemes (see [56] for a comprehensive overview). Along with different
application areas of spatial modulation and SSK, studying these transmission schemes
in the context of physical layer security has been of recent interest. Secrecy capacity
of spatial modulation for the scenarios with two transmit antennas is studied in [57],
and the results are extended to MISOSE and MIMOME scenarios in [58] and [59],
respectively.
Different secure spatial modulation transmission schemes are also proposed with the
aid of MCSI and ECSI at the transmitter and for systems with channel reciprocity. A
precoder optimization algorithm for maximizing secrecy rates with SSK transmission
using full CSI is proposed in [60]. The authors in [61] provide a precoder design and
artificial noise injection approach for securing spatial modulation for the scenarios with
passive eavesdroppers (with no ECSI at the transmitter). The secrecy rates of spatial
modulation with artificial noise injection are characterized in [62]. While the conventional
artificial noise injection (similar to what is considered in [62]) requires multiple antennas
to be activated, a novel secure artificial noise aided transmission is introduced in [63],
which requires only two antennas to be activated at each time instance. The secure
transmit signal design approaches for spatial modulation and SSK are summarized in
Table VI.
For the scenarios where channel reciprocity holds, a transmit preprocessing technique
is proposed in [64] under the assumption that the training sequences are transmitted from
February 20, 2018
DRAFT
27
TABLE VI: Transmit signal design for secure spatial modulation and SSK.
Paper
Model
Contributions
S. Sinanovic et al. [57]
Nt = 2, NB = NE = 1,
Characterize secrecy rates for spatial modulation and SSK
No CSI at the transmitter
transmission.
MISOSE
Evaluate the secrecy rates by deriving mutual information
X. Guan et al. [58]
terms and propose a precoding with the aid of full CSI.
S. Rezaei Aghdam and
MIMOME, No CSI at the
Derive expressions for achievable secrecy rates with spatial
T. M. Duman [59]
transmitter
modulation and SSK schemes.
S. Rezaei Aghdam and
MIMOME, Full CSI at the
Develop an iterative precoder design algorithm.
T. M. Duman [60]
transmitter
F. Wu et al. [61]
MIMOME, Nt > NB ,
Propose a precoder and artificial noise design.
MCSI at the transmitter
L. Wang et al. [62]
Z. Huang et al. [63]
MIMOME, Nt > NB ,
Characterize the secrecy rates of artificial noise aided spatial
MCSI at the transmitter
modulation.
MIMOME, MCSI at the
Propose an artificial noise aided secure quadrature spatial
transmitter.
modulation which requires low-complexity hardware.
Bob to Alice, and no CSI is available at the receiver nodes. The authors in [65] propose
a dynamic antenna index assignment based on the main channel when training is carried
out at both directions, which prevents an eavesdropper from obtaining the antenna index
assignment pattern.
V. OFDM W IRETAP C HANNEL WITH D ISCRETE I NPUTS
Orthogonal frequency-division multiplexing (OFDM) provides robustness against multipath channel fading and offers flexibility in resource allocation. These features have
made OFDM a widely used technique in recent wireless standards including 4G and 5G
wireless systems. In the literature of physical layer security, OFDM can be modeled as
February 20, 2018
DRAFT
28
a set of independent parallel channels2 . It is proved in [67] that the secrecy capacity of
K independent parallel channels is achieved when each channel achieves its individual
secrecy capacity. For parallel Gaussian wiretap channels, the optimal input is Gaussian
distributed [68]. However, a more practical study of OFDM wiretap channel is possible
via assuming that the data symbols belong to finite constellations.
An initial study on parallel Gaussian wiretap channel under finite-alphabet inputs is
reported in [27] where the authors have characterized the secrecy capacity with PAM
inputs. They also provided a Mercury-waterfilling interpretation of the optimal power
allocation strategy. It is observed in [27], that dissimilar to standard parallel Gaussian
channels (with no constraints on the input distribution), it may not be optimal to use
all available power for PAM inputs. In [69], the OFDM wiretap is studied with QAM
inputs. After quantifying the loss in the secrecy rates with respect to the scenarios with
Gaussian inputs, a bit loading strategy is proposed to minimize this loss by assigning
an appropriate number of bits to each subchannel.
The sensitivity of OFDM based transmissions to frequency synchronization errors can
be exploited to provide secure transmission as well. The authors in [70] propose a secure
OFDM transmission over reciprocal channels, which relies on inducing carrier frequency
offset that is pre-compensated (using the transmitter’s knowledge on the MCSI) in
such way that it is received without inter-carrier interference at the legitimate receiver,
while the reception at the eavesdropper who receives the signal through an independent
channel is considerably degraded. In [71], an eavesdropping resilient OFDM scheme is
developed over reciprocal channels where Alice performs a subcarrier interleaving using
her knowledge on the instantaneous MCSI. The legitimate receiver who is also capable
of acquiring the MCSI can obtain the interleaving pattern and de-interleave the received
signals. In contrast, the eavesdropper cannot derive the interleaving pattern initiated by
2
This is based on the assumption that both the legitimate receiver and the eavesdropper use OFDM receivers.
February 20, 2018
DRAFT
29
TABLE VII: OFDM wiretap channel with discrete inputs
Paper
Model
Contributions
M. R. D. Rodrigues et
Parallel Gaussian Wire-
Characterize secrecy rates with PAM inputs and derive optimal
al. [27]
tap Channels
power allocation strategy.
F. Renna et al. [69]
SISOSE
Evaluate the secrecy rates for OFDM systems with QAM input
constellations and provide a bit-loading strategy.
M. Yusuf et al. [70]
H. Li et al. [71]
H. Qin et al. [72]
SISOSE with reciprocal
Suggest inducing carrier frequency offset which is pre-
main channel
compensated in the legitimate receiver’s direction.
SISOSE with reciprocal
Propose subcarrier interleaving based on the MCSI which pre-
main channel
vents eavesdropper from de-interleaving the received signals.
SISOSE
Introduce a time-domain artificial noise injection approach and
propose a joint optimization of data power and artificial noise
covariance matrix.
T. Akitaya et al. [73]
MIMOME
Study application time-domain artificial noise injection approach
in multi-antenna scenarios.
the transmitter, and as a result, fails to acquire the transmitted information.
The temporal degrees of freedom offered by the cyclic prefix can be used for artificial
noise injection so as to improve secrecy over OFDM wiretap channels. In [72], a singleantenna OFDM wiretap channel is considered and an artificial noise signal is inserted
into the time-domain signal (over the cyclic prefix samples). A framework for joint
optimization of the power allocated to each subcarrier and artificial noise covariance
matrix is also proposed. In [73], Akitaya et al. study the application of time-domain
artificial noise injection in MIMOME OFDM systems. The results in [72] and [73]
demonstrate that this approach is efficient for improving the secrecy rates in OFDM
wiretap channels.
Table VII summarizes various results on the study of OFDM wiretap channels under
the finite-alphabet input assumption.
February 20, 2018
DRAFT
30
VI. C ONSTELLATION C ONSTRAINED M ULTIUSER AND C OOPERATIVE W IRETAP
C HANNELS
The concept of physical layer security has also been extended to multi-user and
cooperative networks in recent years. In addition to the numerous studies on the limits
of secure communications in the scenarios with more than two receivers, multiple
transmitters and presence of relays/jammers/helpers (see [5] for a survey), some recent
focus has been placed on the practical constellation-constrained secure transmission for
these scenarios.
A. Multiuser and Multi-Eve Networks
1) Broadcast Channel with Confidential Messages: The achievable rate region for
Gaussian broadcast channel with confidential messages is characterized for discrete
inputs in [74]. In this scenario, the transmitter’s objective is to send a common message
to two receivers as well as to deliver a confidential message to one of them. Dissimilar
to [27] and [26] where standard constellations are considered, in [74], the symbols are
allowed to be arbitrary, and the achievable secrecy rate region is enlarged by optimizing
the symbol positions and the probability distribution of the symbols. The shrinkage of
the rate region due to employing PAM inputs is quantified with respect to the optimal
Gaussian inputs, and a number of important behavioral differences between these cases
are highlighted.
2) Multiple Access Channels: The authors in [75] focus their attention on the multiple
access wiretap channels under the assumption that the users employ the Alamouti STBC
scheme. Specifically, they consider a case where multiple transmitters communicate with
one legitimate receiver in the presence of an eavesdropper. Under the assumption that
the transmitter has the knowledge of the legitimate channel and does not know the
eavesdropper’s channel gain, an artificial noise injection is proposed along the null-
February 20, 2018
DRAFT
31
space of the main channel, which is shown to give rise to considerable improvements
in the secrecy sum-rate.
3) Cognitive Radio Networks: The linear precoder design for the cognitive multipleaccess wiretap and the cognitive multi-antenna wiretap channels with finite-alphabet
inputs are studied in [76] and [77], respectively. In [76], the authors consider a setup
in which two secondary-user transmitters are communicating with a secondary-user
receiver in presence of an eavesdropper and under interference threshold constraints at
the primary users. A two-layer precoding algorithm is proposed using statistical CSI at
the transmitters to maximize the ergodic secrecy sum rate. In [77], on the other hand, the
authors study a scenario where a multi-antenna secondary-user transmitter communicates
with a multi-antenna secondary-user receiver and the communication is wiretapped by
a multi-antenna eavesdropper. In this work, the precoder matrix is optimized using an
iterative algorithm (assuming statistical CSI of all the channels) so that the secrecy rate
of the secondary user is maximized while power leakage to the primary user sharing the
same frequency spectrum is controlled.
4) Multi-Eavesdropper Scenarios: The authors in [78] study a setup comprised of a
source, a legitimate receiver and multiple multi-antenna eavesdroppers. They first obtain
an expression for an achievable secrecy rate, and then, under the full CSI assumption,
they optimize the transmit power and the beamforming vector. The problem of power
allocation for secrecy over MIMO wiretap channels with multiple eavesdroppers is
studied in [79]. Under the assumption that the transmitter has the perfect MCSI and
statistical ECSI, the proposed power allocation strategy gives non-zero secrecy rates at
high transmit powers. This is important because in the absence of this power control
strategy, secrecy rate decreases with increasing transmit power, and it drops to zero when
the eavesdroppers’ SNRs get higher than a certain value.
February 20, 2018
DRAFT
32
B. Relay Channels and Cooperative Communications
Cooperation serves as an efficient method for enhancing secrecy in wireless networks.
In this context, along with the studies conducted on secrecy capacity in various cooperative scenarios, a number of recent studies focus on finite-alphabet inputs as the
signaling scheme. In this context, the secrecy rates achieved with decode-and-forward
(DF) relay beamforming under finite-alphabet input assumption are characterized in [80].
It is shown that by optimizing the source power and also the relay weights using global
CSI, it is possible to prevent the secrecy rates from dropping to zero. The authors in
[81] consider a cooperative jamming network in presence of multiple eavesdroppers
and develop a secure transmission scheme with finite-alphabet inputs, which relies on a
joint optimization of the artificial noise (injected in the null-space of relay-destination
links) and power allocation among the source and the relays. The study in [82] considers
secure transmission over a MIMOME setup with the aid of a multi-antenna helper, which
transmits a jamming signal to degrade the signal received by the eavesdropper. Similar
to [81], a framework is provided for joint optimization of the precoder matrix and power
allocation between the transmitter and the helper. Furthermore, low-complexity transmit
signal design schemes are developed for both low and high SNR regimes.
Table VIII summarizes the recent research results of secure transmission over finiteinput multi-user, multi-eavesdropper and cooperative channels.
VII. P RACTICAL W IRETAP C ODE C ONSTRUCTIONS
The achievability of the secrecy rates described in the previous sections is proved with
the aid of random coding arguments, i.e., from an information theoretic point of view.
However, in practice, one needs to realize secure communications with the aid of practical
codes. In this regard, explicit and implementable code design for secrecy has also been
a topic of recent interest to researchers. In particular, error-correcting codes have found
a new role since the emergence of physical layer security. Aside from providing reliable
February 20, 2018
DRAFT
33
TABLE VIII: Multi-user, multi-eavesdropper and cooperative secure transmission with
discrete inputs.
Paper
Network
Contributions
Z. Mheich et al. [74]
Broadcast channel with
Characterize secrecy rate region with PAM inputs and enhance it by
confidential message
optimizing symbol positions and the joint probability distribution.
MAC Wiretap
Develop a secure Alamouti transmission with artificial noise injec-
T. Allen et al. [75]
tion with perfect MCSI and statistical ECSI.
J. Jin et al. [76]
Cognitive MAC Wiretap
A two-layer precoding is proposed using statistical CSI to maximize secrecy sum-rate.
W. Zeng et al. [77]
K. Cao et al. [78]
Cognitive Multi-Antenna
Propose an iterative precoder optimization algorithm with statistical
Wiretap
CSI.
MISO
Multiple
Wiretap
with
Multi-Antenna
Study joint optimization of beamforming vector and transmitting
power with full CSI.
Eavesdroppers
S. Vishwakarma et al.
MIMO Wiretap with Mul-
Employ a power allocation strategy with perfect MCSI and statis-
[79]
tiple Eavesdroppers
tical ECSI.
S. Vishwakarma et al.
DF Relaying in Presence
Optimize the source power and the relay weights with the aid of
[80]
of Multiple Eavesdroppers
full CSI such that the secrecy rate is maximized.
K. Cao et al. [81]
Cooperative
Provide a joint optimization of the artificial noise and the power
Jamming
Network in Presence of
allocated between the source and the relays.
Multiple Eavesdroppers
K. Cao et al. [82]
MIMOME and a Multi-
Propose a joint optimization of precoder and power allocation
Antenna Helper
between the source and the helper
transmission, carefully designed codes are also capable of securing the transmitted
messages against an eavesdropper. On the other hand, it seems intriguing to design
these codes because they are required to meet two conflicting requirements: 1) they tend
to add more redundancy to the codewords in order to counter the randomness of the
channel and provide reliable communication. 2) in order to offer a secure transmission,
they need to maximize the randomness perceived at the eavesdropper by reducing the
February 20, 2018
DRAFT
34
redundancy.
An important step towards designing codes for the wiretap channel is choosing a
metric for measuring security. In contrast to measuring reliability where probability
of error is being used as a universally accepted metric, there are multiple metrics for
quantifying secrecy for this scenario as listed in Table I. Computation of these metrics
for explicit finite length coding schemes, however, has been limited to some specific
channels3 . One example is [83] in which the authors apply semantic secrecy to a finite
Reed-Muller code used over a binary erasure channel (BEC). For AWGN channels, a
BER based metric called security gap (as mentioned in Section II-D2) is widely used
by the research community, which is easily applicable to all practical coding schemes,
however, its relation to the information theoretic metrics is not established in a rigorous
manner.
Security gap is defined as the difference between the qualities (SNRs) of the main
and the eavesdropper’s channels. For AWGN channels without feedback, this value must
be greater than zero in order to result in a positive secrecy capacity (which equals to
the difference between the capacities of the main and the eavesdropper’s channels [13]).
Small security gaps are desirable because they make physical layer security achievable
even with a small degradation of the eavesdropper’s channel with respect to the main
one. An analytical definition of the security gap can be given as follows. Let us fix
two threshold values for the maximum desired BER over the main channel (denoted by
PBmax ≤ 21 ) and and the minimum desired BER at the eavesdropper (denoted by PEmin > 0).
Then, the security gap equals the difference between the SNR values corresponding to
these two, i.e., SN RB − SN RE measured in dB.
The major shortcoming of the above BER-based analysis is that it assumes that if
3
The authors in [98] provide a coding scheme for an AWGN channel, which satisfy strong secrecy using capacity
approaching codes of infinite length and hash functions.
February 20, 2018
DRAFT
35
min ≈ 0.5, then Eve cannot extract any information about the secret message. However,
Peve
if there exist statistical correlations between the input bit errors and the output bit errors
or there exist correlations among the output bit errors, the amount of leaked information
will not be zero. The authors in [89] employ tools from cryptography literature to eliminate such correlations. Specifically, they propose the use of the substitution permutation
networks (SPNs) without any secret key to satisfy the strict avalanche criteria (SAC) and
the bit independence criterion (BIC). The required SPNs can be implemented efficiently
[89], hence, they can be applied to the message bits before the encoding stage. Therefore,
one can design practical coding schemes, which result in BER very close to 0.5 with
no (or, small) correlation at Eve.
The general coding scheme for physical layer security is the randomized encoding
proposed by Wyner in [10] to prove that there exists a code which achieves the secrecy
capacity of the degraded wiretap channel. This method is also known as coset-coding
studied further in the subsequent literature, e.g., in [84] and [85]. In this method, allzero message is mapped to a code C with generator matrix G, and a non-zero message
s = [s1 , s2 , ..., sk ] is mapped to the coset obtained by adding the n-tuple s1 h1 + s2 h2 +
... + sk hk to all the codewords in C where hi ’s are linearly independent n-tuples outside
C. Assuming hi ’s form a matrix H of size k × n, the transmitted codeword through the
channel is
⎡ ⎤
⎢H⎥
⎢ ⎥
c = [s v] ⎢⎢ ⎥⎥
(18)
⎢G⎥
⎢ ⎥
⎣ ⎦
where v = [v1 , v2 , ..., vr ] denotes the random bit vector used for choosing a codeword in
the corresponding coset uniformly randomly. Fig. 6 illustrates this method where small
code is denoted by C and cij denotes the ith codeword in the j th coset. We note that
in conventional encoding, the leakage of information about the secret message to Eve,
H(SK ∣Zn ), is equal to the leakage of the codewords H(cn ∣Zn ) [83] since there is a oneto-one mapping between the messages and the codewords. In the randomized encoding
February 20, 2018
DRAFT
36
Fig. 6: Illustration of the coset coding scheme.
scheme, however, this is not true anymore since different codewords may represent the
same message.
Application of lattice codes to the Gaussian wiretap channel is studied in [86] where
the authors define an alternative security metric (called secrecy gain), which is related
to the theta series of lattices and shows the amount of confusion at the eavesdropper.
Without introducing a decoding method, they evaluate the performance of different
lattices based on the secrecy gain. The confusion at the eavesdropper in [86] is the result
of using a random lattice in addition to the lattice that is responsible for transmitting
the original message. As a further development, the authors in [87] prove the existence
of lattices that are semantically secure in the Gaussian wiretap channel.
The authors in [96] and [97] provide a lower bound on the mutual information between
the secret message and Eve’s observation. They utilize this lower bound to quantify the
equivocation for finite length codes for Gaussian wiretap channels. Specifically, they use
finite length LDPC codes and demonstrate the achievable points in the equivocation-rate
February 20, 2018
DRAFT
37
TABLE IX: Practical coding schemes aiming at reducing the security gap over AWGN
channel.
Paper
Secure coding scheme
Contributions
D. Klinc et al. [88]
Punctured LDPC codes
Propose puncturing information bits in LDPC codes in
order to confuse Eve.
M. Baldi et al. [90]
Non-systematic codes
Make use of scrambling technique at encoding which
amplifies the resulting errors at decoding stage.
M. Baldi et al. [91]
Y. X. Zhang et al. [93]
Coding with scrambling, con-
Investigate different techniques to reduce the resulting
catenation, and HARQ
security gaps.
Polar-LDPC
Evaluate performance of a serially concatenated coding
concatenated
codes
scheme consists of polar and LDPC codes.
A. Nooraiepour and T. M.
Randomized convolutional and
Construct coset codes based on convolutional and turbo
Duman [92]
turbo codes
codes using dual codes.
region.
Several practical coding schemes aiming directly at reducing the security gap are also
proposed in the literature. Specifically, punctured LDPC codes are exploited for physical
layer security in [88]. Furthermore, [90] demonstrates how non-systematic codes can be
effective to reduce the resulting security gap, while [91] applies different techniques
including scrambling, concatenation, and hybrid automatic repeat-request to LDPC and
BCH codes in order to further reduce the security gap. Concatenation of polar and
LDPC codes are proposed in [93]. Coset codes based on convolutional and turbo codes
are constructed in [92] and [94] for physical layer security. Finally, application of serially
concatenated low density generator matrix (SCLDGM) codes to the randomized scheme
is studied in [95]. Table IX summarizes the existing practical coding schemes in the
literature along with their main contributions. Fig. 7 demonstrates the relation between
February 20, 2018
DRAFT
38
0.5
0.45
min
BER at the Eavesdropper (Peve
)
0.4
0.35
0.3
0.25
0.2
0.15
RC, n=2056, k=1020, r=252
Punctured LDPC, n=2364, k=1576
RSCCC, n=8004, k=r=2000
RSCLDGM, n=10004, k=2250, r=250
S RSCCC, n=10004, k=r=2500
S RSCLDGM, n=10004, k=2250, r=250
0.1
0.05
0
0
0.5
1
1.5
2
2.5
3
Security gap (dB)
3.5
4
4.5
5
Fig. 7: The resulting security gaps from practical coding schemes. n, k and r denote
length of a code, number of data bits and number of random bits, respectively. S means
scrambling has been applied. Taken from [92] and [95].
the resulting security gaps from some of these practical coding schemes4 and a specific
BER at Eve. One can see that when a BER of 0.5 is desired at Eve, security gaps as
small as 1 dB can be obtained using carefully designed codes of length 104 or longer.
Authors in [98] introduce a method, which provides strong secrecy for the Gaussian
wiretap channel by means of hash functions and capacity approaching channel codes
of infinite length. Using this scheme, it is also possible to quantify the level of leakage
obtained for a fixed block length. Finally, [99] provides the maximal secrecy rate over
4
RSCCC stands for randomized serially concatenated convolutional codes scheme, RC stands for randomized
convolutional codes scheme and RSCLDGM corresponds to the randomized SCLDGM codes.
February 20, 2018
DRAFT
39
a wiretap channel subject to reliability and secrecy constraints at a given block length.
In addition to the Gaussian wiretap channels, some efforts are also made to develop
practical coding schemes for fading wiretap channels. The authors in [100] and [101]
propose polar coding schemes for achieving secrecy over block fading wiretap channels.
In [100], the secure coding scheme is designed with the aid of instantaneous MCSI and
ECSI. However, the polar coding approach proposed in [101] relies on statistical CSI of
both channels. Application of algebraic lattice codes is also proposed over block fading
wiretap channels. For instance, a sequence of non-random lattice codes is developed in
[102] that achieve strong secrecy and semantic security over ergodic fading channels.
We emphasize that the easy-to-compute property of security gap makes it a widely
used metric in majority of the aforementioned code designs, which try to avoid potential
complexities associated with computing the original information-theoretic metrics for
finite-length scenarios. Despite some limited efforts such as [97] in providing a lower
bound for information-theoretic metrics (Table I), the literature of physical layer security
still lacks a comprehensive and satisfactory finite length analysis of different metrics
especially for AWGN and fading wiretap channels.
VIII. L ESSONS L EARNED AND THE C HALLENGES A HEAD
We now provide a number of important conclusions that can be drawn from the
existing results for different wiretap channels driven by finite-alphabet inputs. We also
discuss a number of challenges ahead and present some directions for future research
in this area.
A. Concluding Remarks
An obligatory step towards practical implementation of physical layer security is understanding the impacts of employing standard constellations on the secrecy performance.
The usual approaches for designing secure transmit signals with Gaussian inputs lead
February 20, 2018
DRAFT
40
to considerable losses when applied to the signals drawn from finite constellations. This
fact motivates the need for development of secure transmission schemes under the finitealphabet input assumption.
In single-antenna transmission with constellation constrained inputs, achieving secrecy
requires adoption of a proper power allocation strategy. This is because transmission with
full power may allow the eavesdropper to successfully detect the transmitted symbols.
Moreover, the increased dimensionality in multi-antenna transmissions can be employed
to enhance secrecy under finite-alphabet inputs. Precoding serves as a promising strategy
for maximizing the quality difference between the signals received at the legitimate
receiver and the eavesdropper. Artificial noise injection serves as a promising strategy
for enhancing secrecy and it well-suits the nature of secure transmission with finitealphabet inputs since the optimal power, which is allocated to the information bearing
signal is only a fraction of the total power, and the excess power can be used for artificial
noise injection. In many cases (especially, in the absence of instantaneous ECSI), without
artificial noise injection, secrecy rates drop to zero when the transmit power increases.
Therefore, injecting artificial noise is crucial for guaranteeing a good saturation behavior
at high SNRs.
The optimal secure transmission schemes are not known in closed-form in almost all
of the scenarios studied in this survey. This is due to the non-convexity of the objective
function (i.e., secrecy rate). Furthermore, the transmit signal design algorithms, which
rely on direct maximization of secrecy rates are computationally complex mainly due to
the fact that the mutual information expression under finite-alphabet inputs lacks closedform. Therefore, different studies focus their attention on proposing lower-complexity
alternatives to direct secrecy rate maximization. There is also an important trade-off
between the secrecy rates and the computational complexity of the existing solutions
in the literature of physical layer security with finite alphabet inputs. Moreover, it is
February 20, 2018
DRAFT
41
noteworthy that the transmit signal designs based on the metrics such as SINR or BER,
though simple and may be practical in some scenarios, do not ensure secrecy in an
information theoretic sense.
The amount of CSI at the transmitter plays a central role in determining the secrecy
performance of a particular transmission scheme. Transmission algorithms employing full
CSI typically have a high capability in simultaneously increasing the information rates
at the legitimate receiver and suppressing the reception at the eavesdropper, however,
acquiring a perfect instantaneous CSI of the eavesdropper may not be practically possible
in many scenarios. Although the achievable secrecy rates undergo considerable losses
in the absence of instantaneous ECSI, the existing approaches reveal that high secrecy
rates can still be attained with (or in some cases even without) it.
Practical coding schemes exploit different tools from coding theory and cryptography
in order to ensure a certain level of security and reliability (in terms of BERs) for Eve
and Bob, respectively. By combining coset coding and scrambling approaches along with
code concatenation, security gaps as small as 1 dB can be obtained using finite-length
explicit and implementable codes. However, finding specific (and implementable) finitelength codes, which can provide physical layer security from an information-theoretic
point of view, remains as a future challenge.
B. Challenges and Open Problems
Various studies have been carried out on physical layer security with discrete signaling
with the objective of bridging the gap between information theoretic limits of secrecy to
practical and implementable secure transmission schemes. However, there still are many
important open problems and future challenges to be addressed in this area.
Physical layer security with finite-alphabet inputs has been studied only for a limited
set of CSI scenarios including the cases with perfect and statistical MCSI and ECSI at
the transmitter. Some other important scenarios regarding the CSI uncertainty at different
February 20, 2018
DRAFT
42
nodes, e.g., noisy estimation of CSI, outdated CSI or limited CSI feedback, which are
well-investigated under the Gaussian input assumption [7], have not yet been considered
for cases with finite-alphabet inputs. It would be interesting and of significant practical
value to quantify the losses in the secrecy rates under these different imperfect CSI
scenarios in the context of finite-alphabet inputs.
While the majority of artificial noise injection strategies rely on transmitting Gaussian
distributed noise either by aligning it in the null-space of the main channel or by optimizing its covariance matrix, such artificial noise signals are not necessarily optimal. For
instance, it has been shown in [103] that the worst case noise for AWGN channels with
binary inputs has a discrete distribution. This motivates seeking interference distributions
(rather than merely optimizing covariance matrices of Gaussian distributed signals),
which maximize secrecy rates.
While some steps have been taken in studying physical layer security over finite-input
multiuser networks (as surveyed in Section VI), many important scenarios have not yet
been tackled. For example, no results have been reported for interference channels with
secrecy constraints under the finite-alphabet input assumption. Secrecy issues concerning
the networks with simultaneous wireless information and power transfer (SWIPT) is also
a topic of recent interest [104]. It is demonstrated that SWIPT networks are prone to
information leakage at the energy receivers, and hence, the main focus of the existing
articles is the characterization of the trade-off between the secrecy capacity/rate and the
harvested power in these networks [105]-[107]. Studying this trade-off under practical
discrete signaling assumption is an important subject for future research. Furthermore,
physical layer security in heterogeneous networks [108] and with full duplex transmitter
or receivers (see, e.g. [109]) are other hot topics in this area, and extending the existing results for these scenarios to the case of finite-alphabet inputs constitutes another
important direction for future research.
February 20, 2018
DRAFT
43
Massive MIMO [110] and millimeter wave (mmWave) communication systems [111]
have attracted significant interest from researchers in industry and academia. Exploiting
large antenna arrays and taking advantage of a spectrum from 30 GHz to 300 GHz
away from the almost fully occupied spectral band, have proven to provide various
benefits, which make these technologies promising candidates for the next generation
wireless systems and beyond. With this motivation, investigating the potentials of massive
MIMO and mmWave communications in providing physical layer security has been of
recent interest (see e.g., [112]-[114] and [115]-[117]). Besides opportunities offered,
many challenges arise in secure transmit signal designs with finite-alphabet inputs. For
instance, most of the existing precoder design approaches (such as the ones proposed
in [33] and [40]) are intractable when the number of antennas is high. Furthermore,
communicating at the mmWave spectrum considerably changes the channel model with
respect to the microwave communication systems, and introduces some new features
(e.g., high sensitivity to blockages and considerable differences between the line-of-sight
and non-line-of-sight receptions), which motivates development of new frameworks for
designing practical secure transmission schemes.
The main problem associated with designing practical coding schemes for physical
layer security is the following: Although security gap is proposed and used as an
alternative practical metric, the most widely accepted one (i.e., equivocation) relies on
information theoretic quantities, and computing these quantities for finite-length codes
over AWGN channels is a challenging problem, and can be a promising research direction
on physical layer security. As a final suggestion for future research, we recommend the
problem of precoder design in the scenarios where practical wiretap codes are employed,
which would be an important step towards designing implementable secure transmission
schemes.
February 20, 2018
DRAFT
44
ACKNOWLEDGMENT
This work was supported by the Scientific and Technical Research Council of Turkey
(TUBITAK) under grant #113E223.
R EFERENCES
[1] Y. Liang, H. V. Poor, and S. Shamai, Information theoretic security, Found. Trends Commun. Inf. Theory, vol.
5, no. 4-5, pp. 355-580, 2008.
[2] R. Liu and W. Trappe, Securing wireless communications at the physical layer, Springer, 2010.
[3] E. A. Jorswieck, A. Wolf, and S. Gerbracht, “Trends in telecommunications technologies,” in Secrecy on the
Physical Layer in Wireless Networks. Croatia, InTech, 2010.
[4] M. Bloch and J. Barros, Physical-layer security: from information theory to security engineering, Cambridge,
2011.
[5] A. Mukherjee, S. A. A. Fakoorian, J. Huang, and A. L. Swindlehurst, “Principles of physical layer security
in multiuser wireless networks: A survey,” IEEE Commun. Surveys Tuts., vol. 16, no. 3, pp. 1550–1573, Aug.
2014.
[6] W. Trappe, “The challenges facing physical layer security,” IEEE Commun. Mag., vol. 53, no. 6, pp. 16–20,
Jun. 2015.
[7] A. Hyadi, Z. Rezki and M. S. Alouini, “An overview of physical layer security in wireless communication
systems with CSIT uncertainty,” in IEEE Access, vol. 4, pp. 6121–6132, Oct. 2016.
[8] X. Chen, D. W. K. Ng, W. H. Gerstacker and H. H. Chen, “A survey on multiple-antenna techniques for
physical layer security,” in IEEE Commun. Surveys Tuts., vol. 19, no. 2, pp. 1027–1053, Second Quarter 2017.
[9] M. Bellare, S. Tessaro, and A. Vardy, “Semantic security for the wiretap channel,” in Proc. 32nd Annu. Cryptol.
Conf., vol. 7417. 2012, pp. 294–311.
[10] A. D. Wyner, “The wire-tap channel,” Bell Sys. Tech. J., vol. 54, pp. 1355–1387, 1975.
[11] C. E. Shannon, “Communication theory of secrecy systems,” Bell Sys. Tech. J., vol. 28, pp. 656–715, 1949.
[12] U. M. Maurer and S. Wolf, “From weak to strong information-theoretic key agreement,” in IEEE Int’l. Symp.
Info. Theory (ISIT), p. 18, Sorrento, Italy, Jun. 2000.
[13] S. L. Y. Cheong and M. Hellman, “The Gaussian wire-tap channel,” IEEE Trans. Inf. Theory, vol. 24, no. 4,
pp. 451–456, July 1978.
[14] I. Csiszar and J. Korner, “Broadcast channels with confidential messages,” IEEE Trans. Inf. Theory, vol. 24,
no. 3, pp. 339–348, May 1978.
[15] J. Barros and M. R. D. Rodrigues, “Secrecy Capacity of Wireless Channels,” IEEE Int’l. Symp. Info. Theory
(ISIT), July 2006, pp. 356–360.
February 20, 2018
DRAFT
45
[16] P. Gopala, L. Lai, and H. El Gamal, “On the secrecy capacity of fading channels”, IEEE Trans. Inf. Theory,
vol. 54, no. 10, pp. 4687–4698, Oct. 2008.
[17] J. Li and A. P. Petropulu, “On ergodic secrecy rate for Gaussian MISO wiretap channels,” IEEE Trans. Wireless
Commun., vol. 10, no. 4, pp. 1176-–1187, Apr. 2011.
[18] P.-H. Lin and E. Jorswieck, “On the fast fading Gaussian wiretap channel with statistical channel state
information at the transmitter,” IEEE Trans. Inf. Forensics Security, vol. 11, no. 1, pp. 46–58, Jan. 2016.
[19] A. Khisti and G. Wornell, “Secure transmission with multiple antennas II: the MIMOME wiretap channel,”
IEEE Trans. Inf. Theory, vol. 56, no. 11, pp. 5515–5532, Nov. 2010.
[20] F. Oggier, B. Hassibi, “The secrecy capacity of the MIMO wiretap channel,” IEEE Trans. Inf. Theory, vol. 57,
no. 8, pp. 4961–4972, 2011.
[21] T. Liu and S. Shamai, “A note on the secrecy capacity of the multiple antenna wiretap channel,” IEEE Trans.
Inf. Theory, vol. 55, no. 6, pp. 2547–2553, Jun. 2009.
[22] Q. Li, M. Hong, H. T. Wai, Y. F. Liu, W. K. Ma and Z. Q. Luo, “Transmit solutions for MIMO wiretap
channels using alternating optimization,” in IEEE J. Sel. Areas Commun., vol. 31, no. 9, pp. 1714-1727, Sep.
2013.
[23] S. Loyka and C. D. Charalambous, “An algorithm for global maximization of secrecy rates in Gaussian MIMO
wiretap channels,” in IEEE Trans. Commun., vol. 63, no. 6, pp. 2288-2299, Jun. 2015.
[24] D. Klinc, J. Ha, S. W. McLaughlin, J. Barros, and B.-J. Kwak, “LDPC codes for the Gaussian wiretap channel,”
IEEE Trans. Inf. Forensics Security, vol. 6, no. 3, pp. 532–540, Sep. 2011.
[25] W.-C. Liao, T.-H. Chang, W.-K. Ma, and C.-Y. Chi, “QoS-based transmit beamforming in the presence of
eavesdroppers: An optimized artificial-noise aided approach,” IEEE Trans. Signal Processing, vol. 59, no. 3,
pp. 1202–1216, Mar. 2011.
[26] G. D. Raghava and B. S. Rajan, “Secrecy capacity of the Gaussian wiretap channel with finite complex
constellation input,” [Online]. Available: http://arxiv.org/abs/1010.1163, Oct. 2010.
[27] M. R. D. Rodrigues, A. Somekh-Baruch, and M. Bloch, “On Gaussian wiretap channels with M-PAM inputs,”
in Proc. EWConf., Apr. 2010, pp. 774–781.
[28] E. Biglieri, Coding for wireless channels, Springer-Verlag New York, 2005.
[29] C. Qi, Y. Chen, and A. J. Vinck. “On the Binary Input Gaussian Wiretap Channel with/without Output
Quantization,” Entropy, vol. 19, no. 2, Feb. 2017.
[30] Z. Li, R. Yates and W. Trappe, “Achieving secret communication for fast Rayleigh fading channels,” in IEEE
Trans. Wireless Commun., vol. 9, no. 9, pp. 2792-2799, Sep. 2010.
[31] S. Goel and R. Negi, “Guaranteeing secrecy using artificial noise,” IEEE Trans. Wireless Commun., vol. 7, no.
6, pp. 2180–2189, Jun. 2008.
[32] S. Bashar, Z. Ding, and C. Xiao, “On secrecy rate analysis of MIMO wiretap channels driven by finite-alphabet
input,” IEEE Trans. Commun., vol. 60, no. 12, pp. 3816–3825, Dec. 2012.
February 20, 2018
DRAFT
46
[33] Y. Wu, C. Xiao, Z. Ding, X. Gao, and S. Jin, “Linear precoding for finite-alphabet signaling over MIMOME
wiretap channels,” IEEE Trans. Veh. Technol., vol. 61, no. 6, pp. 2599–2612, Jul. 2012.
[34] A. Khisti and G. W. Wornell, “Secure transmission with multiple antennas—Part I: The MISOME wiretap
channel,” IEEE Trans. Inf. Theory, vol. 56, no. 7, pp. 3088–3104, Jul. 2010.
[35] M. R. A. Khandaker, C. Masouros, K. Wong, “Constructive interference based secure precoding: a new
dimension in physical layer security,” [Online]. Available: arxiv.org/abs/1612.08465, Dec. 2016.
[36] H. Reboredo, J. Xavier, and M. R. D. Rodrigues, “Filter design with secrecy constrains: The MIMO Gaussian
wiretap channel,“IEEE Trans. Signal Process., vol. 61, pp. 3799–3814, Aug. 2013.
[37] T. V. Nguyen, T. Q. S. Quek, Y. H. Kim, and H. Shin, “Secrecy diversity in MISOME wiretap channels,” in
Proc. Global Commun. Conf. (Globecom’2012), Aneheim, USA, Dec. 2012, pp. 4840–4845.
[38] S. Bashar, Z. Ding, and C. Xiao, “On the secrecy rate of multi-antenna wiretap channel under finite-alphabet
input,” IEEE Commun. Lett., vol. 15, no. 5, pp. 527-–529, May 2011.
[39] S. Rezaei Aghdam and T. M. Duman, “Low complexity precoding for MIMOME wiretap channels based on
cut-off rate,” IEEE Int. Symp. Inf. Theory (ISIT 2016), Barcelona, Jul. 2016, pp. 2988–2992.
[40] S. Rezaei Aghdam, T. M. Duman, “Joint precoder and artificial noise design for MIMO wiretap channels with
finite-alphabet inputs based on the cut-off rate,” IEEE Trans. Wireless Commun., vol. 16, no. 6, pp. 3913–3923,
Jun. 2017.
[41] P.-H. Lin S.-H. Lai, S.-C. Lin, and H.-J. Su, “On secrecy rate of the generalized artificial-noise assisted secure
beamforming for wiretap channels,” IEEE J. Sel. Areas Commun., vol. 31, no. 9, pp. 1728–1740, Sep. 2013.
[42] A. Kalantari, M. Soltanalian, S. Maleki, S. Chatzinotas, and B. Ottersten, “Secure M-PSK communication via
directional modulation,” in Proc. IEEE ICASSP, Shanghai, China, Mar. 2016, pp. 3481—3485
[43] A. Kalantari, M. Soltanalian, S. Maleki, S. Chatzinotas and B. Ottersten, “Directional modulation via symbollevel precoding: A way to enhance security,” in IEEE J. Sel. Topics Signal Process., vol. 10, no. 8, pp.
1478-1493, Dec. 2016.
[44] L. Zhang, Y. Cai, B. Champagne, and M. Zhao, “Tomlinson-Harashima precoding design in MIMO wiretap
channels based on the MMSE criterion,” in Proc. IEEE ICC, pp. 470-474, Jun. 2015.
[45] S. A. A. Fakoorian, H. Jafarkhani, and A. L. Swindlehurst, “Secure space-time block coding via artificial
noise alignment,” in Proc. Conf. Rec. 45th ASILOMAR (ASILOMAR’2011), Pacific Grove, USA, Nov. 2011,
pp. 651–655.
[46] M. A. Girnyk, M. Vehkapera, J. Yuan, and L. K. Rasmussen, “On the ergodic secrecy capacity of MIMO wiretap
channels with statistical CSI,” in Proc. Int. Symp. Inf. Theory Appl. (ISITA), Melbourne, VIC, Australia, Oct.
2014, pp. 398–402.
[47] S. Rezaei Aghdam, T. M. Duman, “Transmit signal design for MIMO wiretap channels with statistical CSI
and arbitrary inputs,” accepted in IEEE PIMRC 2017.
February 20, 2018
DRAFT
47
[48] X. Li, R. Fan, X. Ma, J. An, and T. Jiang, “Secure space-time communications over Rayleigh flat fading
channels,” IEEE Trans. Wireless Commun., vol. 15, pp. 1491–1504, Feb. 2016.
[49] H. M. Furqan, J. M. Hamamreh and H. Arslan, “Secret key generation using channel quantization with SVD
for reciprocal MIMO channels,” ISWCS, Poznan, Sep. 2016, pp. 597–602.
[50] W. Zeng, C. Xiao, M. Wang, and J. Lu, “Linear precoding for finite-alphabet inputs over MIMO fading channels
with statistical CSI,” IEEE Trans. Signal Process., vol. 60, no. 7, Jul. 2012.
[51] M. A. Girnyk, F. Gabry, M. Vehkapera, L. K. Rasmussen, and M. Skoglund, “On the transmit beamforming for
MIMO wiretap channels: Large-system analysis,” in Proc. Int. Conf. Inf. Theoretic Secur. (ICITS), Singapore,
Nov. 2013, pp. 90–102.
[52] M. A. Girnyk, F. Gabry, M. Vehkapera, L. K. Rasmussen and M. Skoglund, “MIMO wiretap channels
with randomly located eavesdroppers: Large-system analysis,” 2015 IEEE International Conference on
Communication Workshop (ICCW), London, Jun. 2015, pp. 480-484.
[53] Y. Wu, J. Wang, J. Wang, R. Schober, and C. Xiao, “Large-scale MIMO secure transmission with finite alphabet
inputs,” [Online]. Available: https://arxiv.org/pdf/1612.08328.pdf, Dec. 2016.
[54] R. Mesleh, H. Haas, S. Sinanovic, C. W. Ahn, and S. Yun, “Spatial modulation,” IEEE Trans. on Vehic.
Technol., vol. 57, no. 4, pp. 2228–2241, 2008.
[55] J. Jeganathan, A. Ghrayeb, L. Szeczecinski, A. Ceron, “Space shift keying modulation for MIMO channels,”
IEEE Trans. Wireless Commun. vol. 8, no. 7, pp. 3692-3703, Jul. 2009.
[56] M. Di Renzo, H. Haas, A. Ghrayeb, S. Suguira and L. Hanzo “Spatial modulation for generalized MIMO:
challenges, opportunities and implementation,” Proc. IEEE, vol. 102, no. 1, pp. 56–103, 2014.
[57] S. Sinanovic, N. Serafimovski, M. Di Renzo, and H. Haas, “Secrecy capacity of space keying with two
antennas,” in 2012 IEEE Veh. Technol. Conf. (VTC Fall), Sep. 2012, pp. 1–5.
[58] X. Guan, Y. Cai, and W. Yang, “On the secrecy mutual information of spatial modulation with finite alphabet,”
in Proc. IEEE Int. Conf. Wireless Commun. Signal Process. (WCSP), Oct. 2012, pp. 1–4
[59] S. Rezaei Aghdam, T. M. Duman and M. Di Renzo, “On secrecy rate analysis of spatial modulation and space
shift keying,”, IEEE BlackSeaCom 2015, pp. 63–67, May 2015.
[60] S. Rezaei Aghdam and T. M. Duman, “Physical layer security for space shift keying transmission with
precoding,” IEEE Wireless Commun. Lett., vol. 5, no. 2, pp. 180-–183, Apr. 2016.
[61] F. Wu, L. L. Yang, W. Wang and Z. Kong, “Secret precoding-aided spatial modulation,” in IEEE Commun.
Lett., vol. 19, no. 9, pp. 1544–1547, Sep. 2015.
[62] L. Wang, S. Bashar, Y. Wei, and R. Li, “Secrecy enhancement analysis against unknown eavesdropping in
spatial modulation,” IEEE Commun. Lett., vol. 19, no. 8, pp. 1351—1354, Aug. 2015.
[63] Z. Huang, Z. Gao and L. Sun, “Anti-eavesdropping scheme based on quadrature spatial modulation,” in IEEE
Commun. Lett., vol. 21, no. 3, pp. 532-535, Mar. 2017.
February 20, 2018
DRAFT
48
[64] Q.-L. Li, “Information-guided randomization for wireless physical layer secure transmission,” in Proc. IEEE
Military Commun. Conf., Orlando, FL, USA, Nov. 2012, pp. 1–6.
[65] S. Rezaei Aghdam and T. M. Duman, “Secure space shift keying transmission using dynamic antenna index
assignment,” accepted in IEEE GLOBECOM 2017, Dec. 2017.
[66] Y. Wei, L. Wang and T. Svensson, “Analysis of secrecy rate against eavesdroppers in MIMO modulation
systems,” 2015 Int. Conf. Wireless Commun. Signal Process. (WCSP), Nanjing, Oct. 2015, pp. 1-5.
[67] Z. Li, R. D. Yates, and W. Trappe, “Secrecy capacity of independent parallel channels,” in 44th Annual Allerton
CCC, Sep. 2006.
[68] F. Renna, N. Laurenti, and H. V. Poor, “Physical-layer secrecy for OFDM transmissions over fading channels,”
IEEE Trans. Inf. Forens. Security, vol. 7, no. 4, pp. 1354–1367, Aug. 2012.
[69] F. Renna, N. Laurenti, and H. V. Poor, “Achievable secrecy rates for wiretap OFDM with QAM constellations,”
in Proc. 5th Int. ICST Conf. Perform. Eval. Method. VALUETOOLS, Paris, France, 2011, pp. 679—686.
[70] M. Yusuf and H. Arslan, “Controlled inter-carrier interference for physical layer security in OFDM systems,”
2016 IEEE Veh. Technol. Conf. (VTC Fall), Montreal, QC, 2016, pp. 1-5.
[71] H. Li, X. Wang and J. Y. Chouinard, ”Eavesdropping-resilient OFDM system using sorted subcarrier
interleaving,” in IEEE Trans. Wireless Commun., vol. 14, no. 2, pp. 1155-1165, Feb. 2015.
[72] H. Qin, Y. Sun, T. Chang, X. Chen,; C. Chi, M. Zhao, J. Wang, “Power allocation and time-domain artificial
noise design for wiretap OFDM with discrete inputs,” IEEE Trans. Wireless Commun., vol. 12, no. 6, pp.
2717—2729, Jun. 2013.
[73] T. Akitaya, S. Asano, and T. Saba, “Time-domain artificial noise generation technique using time-domain and
frequency-domain processing for physical layer security in MIMO-OFDM systems,” in Proc. IEEE Int. Conf.
Commun. Workshops (ICCW), Jun. 2014, pp. 807-–812.
[74] Z. Mheich, F. Alberge, and P. Duhamel, “Achievable secrecy rates for the broadcast channel with confidential
message and finite constellation inputs,” IEEE Trans. Commun., vol. 63, no. 1, pp. 195–205, Jan. 2015.
[75] T. Allen, A. Tajer and N. Al-Dhahir, “Secure Alamouti MAC transmissions,” in IEEE Trans. Wireless Commun.,
vol. 16, no. 6, pp. 3674-3687, Jun. 2017.
[76] J. Jin, C. Xiao, M. Tao and W. Chen, “Linear precoding for cognitive multiple access wiretap channel with
finite-alphabet inputs,” 2016 IEEE ICC, Kuala Lumpur, May 2016, pp. 1-6.
[77] W. Zeng, Y. R. Zheng and C. Xiao, “Multiantenna secure cognitive radio networks with finite-alphabet inputs:
a global optimization approach for precoder design,” in IEEE Trans. Wireless Commun., vol. 15, no. 4, pp.
3044-3057, Apr. 2016.
[78] K. Cao, Y. Cai, Y. Wu, W. Yang and X. Guan, “Secure communication for MISO secrecy channel with multiple
multiantenna eavesdroppers having finite alphabet inputs,” in IEEE Access, vol. PP, no. 99, pp. 1-1.
[79] S. Vishwakarma and A. Chockalingam, “Power allocation in MIMO wiretap channel with statistical CSI and
finite-alphabet input,” 2014 SPCOM, Bangalore, Jul. 2014, pp. 1-6.
February 20, 2018
DRAFT
49
[80] S. Vishwakarma and A. Chockalingam, “Decode-and-forward relay beamforming for secrecy with finitealphabet input,” in IEEE Commun. Lett., vol. 17, no. 5, pp. 912-915, May 2013.
[81] K. Cao, Y. Cai, Y. Wu and W. Yang, “Cooperative jamming for secure communication with finite alphabet
inputs,” in IEEE Commun. Lett., vol. 21, no. 9, pp. 2025-2028, Sep. 2017.
[82] K. Cao, Y. Wu, Y. Cai and W. Yang, ”Secure transmission with aid of a helper for MIMOME network having
finite alphabet inputs,” in IEEE Access, vol. 5, pp. 3698-3708, Feb. 2017.
[83] M. R. Bloch, M. Hayashi, and A. Thangaraj, “Error-control coding for physical-layer secrecy,” Proceedings of
IEEE, vol. 103, no. 10, pp. 1725–1746, Oct. 2015.
[84] L. H. Ozarow and A. D. Wyner, “Wire-tap channel II,” Bell Lab. Tech. J., vol. 63, no. 10, pp. 2135-2157, Dec.
1984.
[85] G. Cohen and G. Zemor, “Syndrome-coding for the wiretap channel revisited,” in Proc. IEEE Information
Theory Workshop, Chengdu, China, Oct. 2006, pp. 33–36.
[86] F. Oggier, P. Sole and J. Belfiore, “Lattice codes for the wiretap Gaussian channel: construction and analysis,”
IEEE Trans. Inf. Theory, vol. 62, no. 10, pp. 5690-5707, Oct. 2016.
[87] C. Ling, L. Luzzi, J.-C. Belfiore, and D. Stehlé, “Semantically secure lattice codes for the Gaussian wiretap
channel,” Computing Research Repository, Oct. 2012, pp. 1–19.
[88] D. Klinc, J. Ha, S. M. McLaughlin, J. Barros, and B.-J. Kwak, “LDPC codes for the Gaussian wiretap channel,”
IEEE Trans. Inf. Forensics Security, vol. 6, no. 3, pp. 532-540, Sep. 2011.
[89] I. M. Kim, B. H. Kim, and J. K. Ahn, “BER-based physical layer security with finite code length: Combining
strong converse and error amplification,” IEEE Trans. Commun., vol. 64, pp. 3844-3857, Sep. 2016.
[90] M. Baldi, M. Bianchi, and F. Chiaraluce, “Non-systematic codes for physical layer security,” in Proc. IEEE
Information Theory Workshop (ITW 2010), Dublin, Ireland, Aug. 2010.
[91] M. Baldi, F. Bambozzi, and F. Chiaraluce, “Coding with scrambling, concatenation, and HARQ for the AWGN
wire-tap channel: A security gap analysis,” IEEE Trans. Inf. Forensics Security, vol. 7, no. 3, pp. 883—894,
Jun. 2012.
[92] A. Nooraiepour and T. M. Duman, “Randomized convolutional codes for the wiretap channel,” in IEEE Trans.
Commun., vol. 65, no. 8, pp. 3442-3452, Aug. 2017.
[93] Y. X. Zhang, A. Liu, “Polar-LDPC concatenated coding for the AWGN wiretap channel,” IEEE Commun.
Lett., vol. 18, no. 10, pp. 1683-1686, Oct. 2014.
[94] A. Nooraiepour and T. M. Duman “Randomized turbo codes for the wiretap channel,” in IEEE GLOBECOM,
Singapore, Dec. 2017.
[95] A. Nooraiepour and Tolga M. Duman, “Randomized serially concatenated LDGM codes for the Gaussian
wiretap channel,” Accepted for publication in IEEE Commun. Lett., Dec. 2017.
[96] C. W. Wong, T. F. Wong, and J. M. Shea, “LDPC code design for the BPSK-constrained Gaussian wiretap
channel,” in Proc. IEEE GLOBECOM 2011 Workshops, Houston, TX, Dec. 2011, pp. 898–902.
February 20, 2018
DRAFT
50
[97] M. Baldi, G. Ricciutelli, N. Maturo, and F. Chiaraluce, “Performance assessment and design of finite length
LDPC codes for the gaussian wiretap channel,” IEEE ICC 2015 Workshop on Physical-Layer Security, Jun.
2015, pp. 435-440.
[98] H. Tyagi and A. Vardy, “Explicit capacity-achieving coding scheme for the Gaussian wire- tap channel,” in
IEEE Int. Symp. Inf. Theory, Jul. 2014, pp. 956—960.
[99] W. Yang, R. F. Schaefer, and H. V. Poor, “Finite-blocklength bounds for wiretap channels,” in IEEE Int. Symp.
Inf. Theory, Barcelona, Spain, pp. 3087—3091, Jul. 2016.
[100] M. Zheng, M. Tao, and W. Chen., “Polar coding for secure transmission in MISO fading wiretap channels.”
[Online]. Available: http://arxiv.org/abs/1411.2463, Nov. 2014.
[101] H. Si, O. O. Koyluoglu and S. Vishwanath, “Hierarchical Polar Coding for Achieving Secrecy Over StateDependent Wiretap Channels Without Any Instantaneous CSI,” in IEEE Trans. Commun., vol. 64, no. 9, pp.
3609-3623, Sep. 2016.
[102] L. Luzzi, C. Ling and R. Vehkalahti, “Almost universal codes for fading wiretap channels,” IEEE Int. Symp.
Inf. Theory (ISIT), Barcelona, Jul. 2016, pp. 3082-3086.
[103] S. Shamai and S. Verdu, “Worst-case power-constrained noise for binary input channels,” IEEE Trans. Inf.
Theory, vol. 38, no. 5, pp. 1494- 1511, Sep. 1992.
[104] X. Chen, D. W. K. Ng, and H.-H. Chen, “Secrecy wireless information and power transfer: challenges and
opportunities,” IEEE Commun. Mag., May 2016.
[105] R. Zhang and C. K. Ho, “MIMO broadcasting for simultaneous wireless information and power transfer,” IEEE
Trans. Wireless Commun., vol. 12, no. 5, pp. 1989-–2001, May 2013.
[106] J. Zhang, C. Yuen, C. K. Wen, S. Jin, K. K. Wong and H. Zhu, “Large system secrecy rate analysis for SWIPT
MIMO wiretap channels,” IEEE Trans. Inf. Forensics Security, vol. 11, no. 1, pp. 74–85, Jan. 2016.
[107] K. Banawan and S. Ulukus, “MIMO wiretap channel under receiver side power constraints with applications
to wireless information transfer and cognitive radio,” IEEE Trans. on Commun., vol. 64, no. 9, pp. 3872–3885,
Sep. 2016.
[108] H. M. Wang, T. X. Zheng, J. Yuan, D. Towsley and M. H. Lee, “Physical layer security in heterogeneous
cellular networks,” in IEEE Trans. Commun., vol. 64, no. 3, pp. 1204-1219, Mar. 2016.
[109] Y. Zhou, Z. Z. Xiang, Y. Zhu, and Z. Xue, “Application of full-duplex wireless technique into secure MIMO
communication: Achievable secrecy rate based optimization,” IEEE Signal Process. Lett., vol. 21, pp. 804–808,
Jul. 2014.
[110] E. Larsson et al., “Massive MIMO for next generation wireless systems,” IEEE Commun. Mag., vol. 52, no.
2, Feb. 2014, pp. 186–95.
[111] T. Rappaport et al., “Millimeter wave mobile communications for 5G cellular: It will work!,” IEEE Access,
vol. 1, May 2013, pp. 335–49.
February 20, 2018
DRAFT
51
[112] J. Wang, J. Lee, F. Wang, and T. Q. S. Quek, “Jamming-aided secure communication in massive MIMO Rician
channels,” IEEE Trans. Commun., vol. 64, pp. 6854–6868, Dec. 2015.
[113] K. Guo, Y. Guo, and G. Ascheid, “Security-constrained power allocation in mu-massive-MIMO with distributed
antennas,” IEEE Trans. Wireless Commun., vol. 15, pp. 8139–8153, Dec. 2016.
[114] J. Zhu, R. Schober, and V. K. Bhargava, “Linear precoding of data and artificial noise in secure massive MIMO
systems,” IEEE Trans. Wireless Commun., vol. 15, pp. 2245–2261, Mar. 2016.
[115] S. Vuppala, S. Biswas, and T. Ratnarajah, “An analysis on secure communication in millimeter/micro-wave
hybrid networks,” IEEE Trans. Commun., vol. 64, pp. 3507–3519, Aug. 2016.
[116] C. Wang and H.-M. Wang, “Physical layer security in millimeter wave cellular networks,” IEEE Trans. Wireless
Commun., vol. 15, pp. 5569–5585, Aug. 2016.
[117] Y. Zhu, L. Wang, K. K. Wong and R. W. Heath, “Secure Communications in Millimeter Wave Ad Hoc
Networks,” IEEE Trans. Wireless Commun., vol. 16, no. 5, pp. 3205-3217, May 2017.
February 20, 2018
DRAFT
| 7cs.IT
|
Consistent feature attribution for tree ensembles
Scott M. Lundberg
SLUND 1@ CS . WASHINGTON . EDU
Paul G. Allen School of Computer Science, University of Washington, Seattle, WA 98105 USA
arXiv:1706.06060v6 [cs.AI] 17 Feb 2018
Su-In Lee
SUINLEE @ CS . WASHINGTON . EDU
Paul G. Allen School of Computer Science and Department of Genome Sciences, University of Washington, Seattle, WA
98105 USA
Abstract
It is critical in many applications to understand
what features are important for a model, and why
individual predictions were made. For tree ensemble methods these questions are usually answered by attributing importance values to input
features, either globally or for a single prediction.
Here we show that current feature attribution
methods are inconsistent, which means changing the model to rely more on a given feature
can actually decrease the importance assigned
to that feature. To address this problem we develop fast exact solutions for SHAP (SHapley
Additive exPlanation) values, which were recently shown to be the unique additive feature
attribution method based on conditional expectations that is both consistent and locally accurate. We integrate these improvements into the
latest version of XGBoost, demonstrate the inconsistencies of current methods, and show how
using SHAP values results in significantly improved supervised clustering performance. Feature importance values are a key part of understanding widely used models such as gradient
boosting trees and random forests. We believe
our work improves on the state-of-the-art in important ways, and so impacts any current user of
tree ensemble methods.
1. Introduction
Understanding why a model made a prediction is important for trust, actionability, accountability, debugging, and
many other common tasks. To understand predictions from
tree ensemble methods, such as gradient boosting trees or
random forests, importance values are typically attributed
to each input feature. These importance values can be computed either for a single prediction, or an entire dataset to
explain a model’s overall behavior.
Concerningly, current feature attribution methods for tree
ensembles are inconsistent, meaning they can assign higher
importance to features with a lower impact on the model’s
output. This inconsistency effects a very large number of
users, since tree ensemble methods are widely applied in
research and industry.
Here we show that by connecting tree ensemble feature attribution methods with the recently defined class of additive feature attribution methods (Lundberg & Lee, 2017)
we can motivate the use of SHapley Additive exPlanation
(SHAP) values as the only possible consistent feature attribution method with desirable properties.
SHAP values are theoretically optimal but can be challenging to compute. To address this we derive exact algorithms
for tree ensemble methods that reduce the computational
complexity of computing SHAP values from exponential
to O(T LD2 ) where T is the number of trees, L is the maximum number of leaves in any tree, and D is the maximum
depth of any tree. By integrating this new algorithm into
XGBoost, a popular tree ensemble package, we demonstrate performance that enables predictions from models
with thousands of trees, and hundreds of inputs, to be explained in a fraction of a second.
In what follows we first discuss the inconsistencies of current feature attribution methods as implemented in popular
tree enemble software packages (Section 2). We then introduce SHAP values as the only possible consistent attributions (Section 3), and present Tree SHAP as a high speed
algorithm for estimating SHAP values of tree ensembles
(Section 4). Finally, we use a supervised clustering task
to compare SHAP values with previous feature attribution
methods (Section 5).
Consistent feature attribution for tree ensembles
(A)
(B)
(Fever = Yes, Cough = Yes)
(Fever = Yes, Cough = Yes)
Fever
Cough
No
Yes
Cough
No
Cough
Yes
Fever
Fever
No
Yes
No
Yes
No
Yes
No
Yes
0
0
0
100
0
0
10
110
output = [Cough & Fever]*100
output = [Cough & Fever]*100 + [Cough]*10
Attributions
Path (output)
SHAP (output)
Split count
Path (gain)
SHAP (gain)
Fever
25
37.5
1
33
50
Cough
50
37.5
2
67
50
Attributions
Inconsistency
Inconsistency
Fever
50
37.5
2
58
37
Cough
30
47.5
1
42
63
Figure 1. Two tree models meant to demonstrate the inconsistencies of current feature attribution methods. The Cough feature has a
larger impact on tree B, but is assigned less importance by all three standard methods. The “output” attributions explain the difference
between the expected value of the model output and the current output. The “gain” represents the change in the mean squared error over
the whole dataset between when no features are used and all features are used. All calculations assume a dataset (typically a training
dataset) perfectly matching the model and evenly spread among all leaves. Section 2 describes the standard “path” methods, while
Section 3 describes the SHAP values and their interpretation.
2. Current feature attributions are
inconsistent
Tree ensemble implementations in popular packages such
as XGBoost (Chen & Guestrin, 2016), scikit-learn (Pedregosa et al., 2011), and the gbm R package (Ridgeway,
2010), allow a user compute a measure of feature importance. These values are meant to summarize a complicated
ensemble model and provide insight into what features
drive the model’s prediction. Unfortunately the standard
feature importance values provided by all of these packages are inconsistent, this means that a model can change
such that it relies more on a given feature, yet the importance assigned to that feature decreases (Figure 1).
For the above packages, when feature importance values
are calculated for an entire dataset they are by default based
on the reduction of loss (termed “gain”) contributed by
each split in each tree of the ensemble. Feature importances are then defined as the sum of the gains of all splits
for a given feature as described in Friedman et al. (Breiman
et al., 1984; Friedman et al., 2001).
Methods computing feature importance values for a single prediction are less established, and of the above packages, only the most recent version of XGBoost supports
these calculations natively. The method used by XGBoost
(Saabas) is similar to the classical dataset level feature importance calculation, but instead of measuring the reduction of loss it measures the change in the model’s output.
Both current feature attribution methods described above
only consider the effect of splits along the decision path, so
we will term them path methods. Figure 1 shows the result
of applying both these methods to two simple regression
trees. For the gain calculations we assume equal coverage
of each of the four tree leaves, and perfect regression accuracy. In other words, an equal number of dataset points fall
in each leaf, and the label of those points is exactly equal
to the prediction of the leaf. The tree in Figure 1A represents a simple AND function, while the tree in Figure 1B
represents the same AND function but with an additional
increase in predicted value when Cough is “Yes”.
The point of Figure 1 is to compare feature attributions between A and B, where it is clear that Cough has a larger impact on the model in B than the model in A. As highlighted
below each tree, we can see that current path methods (as
well as the simple split count metric) are inconsistent because they allocate less importance to Cough in B, even
though Cough has a larger impact on the output of the tree
in B. The “output” task explains the change in model output from the expected value to the current predicted value
given Fever and Cough. The “gain” explains the reduction
in mean squared error contributed by each feature (assuming a dataset as described in the previous paragraph). In
contrast to current approaches, the SHAP values (described
below) are consistent, even when the order in which features appear in the tree changes.
Consistent feature attribution for tree ensembles
3. SHAP values are the only consistent feature
attributions
It was recently noted that many current methods for interpreting machine learning model predictions fall into the
class of additive feature attribution methods (Lundberg &
Lee, 2017). This class covers all methods that explain a
model’s output as a sum of real values attributed to each
input feature.
Definition 1 Additive feature attribution methods have
an explanation model that is a linear function of binary
variables:
M
X
g(z 0 ) = φ0 +
φi zi0 ,
(1)
i=1
where z 0 ∈ {0, 1}M , M is the number of input features,
and φi ∈ R.
The zi0 variables typically represent a feature being observed (zi0 = 1) or unknown (zi0 = 0), and the φi ’s are
the feature attribution values.
As previously described in Lundberg & Lee, an important
attribute of the class of additive feature attribution methods is that there is a single unique solution in this class
with three desirable properties: local accuracy, missingness, and consistency (Lundberg & Lee, 2017). Local accuracy states that the sum of the feature attributions is equal to
the output of the function we are seeking to explain. Missingness states that features that are already missing (such
that zi0 = 0) are attributed no importance. Consistency
states that changing a model so a feature has a larger impact
on the model, will never decrease the attribution assigned
to that feature.
In order to evaluate the effect missing features have on a
model f , it is necessary to define a mapping hx that maps
between the original function input space and the binary
pattern of missing features represented by z 0 . Given such a
0
mapping we can evaluate f (h−1
x (z )) and so calculate the
effect of observing or not observing a feature (by setting
zi0 = 1 or zi0 = 0).
0
SHAP values define fx (S) = f (h−1
x (z )) = E[f (x) | xS ]
where S is the set of non-zero indexes in z 0 (Figure 2), and
then use the classic Shapley values from game theory to
attribute φi values to each feature:
φi =
X
S⊆N \{i}
|S|!(M − |S|! − 1)
[fx (S ∪ {i}) − fx (S)]
M!
(2)
where N is the set of all input features.
The SHAP values are the only possible consistent, lo-
cally accurate method that obeys the missingness property
and uses conditional dependence to measure missingness
(Lundberg & Lee, 2017). This is strong motivation to use
SHAP values for tree ensemble feature attribution, particularly since current tree ensemble feature attribution methods already obey all of these properties except consistency.
This means that SHAP values provide a strict theoretical
improvement over existing approaches by eliminating the
unintuitive consistency problems shown in Figure 1.
4. Tree SHAP: Fast SHAP value computation
for decision trees
Despite the compelling theoretical advantages of SHAP
values, their practical use is hindered by two problems:
1. The challenge of estimating E[f (x) | xS ] efficiently.
2. The exponential complexity of Equation 2.
Here we focus on tree models and propose fast SHAP value
estimation methods specific to trees and ensembles of trees.
We start by defining a straightforward, but slow, algorithm
in Section 4.1, then present the much faster and more complex Tree SHAP algorithm in Section 4.2.
4.1. Estimating SHAP values directly in O(T L2M ) time
If we ignore computational complexity then we can compute the SHAP values for a decision tree by estimating
E[f (x) | xS ] and then using Equation 2 where fx (S) =
E[f (x) | xS ]. For a tree model E[f (x) | xS ] can be estimated recursively using Algorithm 1, where v is a vector
of node values, which takes the value internal for internal nodes. The vectors a and b represent the left and right
node indexes for each internal node. The vector t contains
the thresholds for each internal node, and d is a vector of
indexes of the features used for splitting in internal nodes.
The vector r represents the cover of each node (how many
data samples fall in that subtree).
4.2. Estimating SHAP values in O(T LD2 ) time
Here we propose a novel algorithm to calculate the same
values as in Section 4.1, but in polynomial time instead
of exponential time. Specifically, we propose an algorithm that runs in O(T L log2 L) for balanced trees, and
O(T LD2 ) for unbalanced trees.
The general idea of the polynomial time algorithm is to recursively keep track of what proportion of all possible subsets flow down into each of the leaves of the tree. This
is similar to running Algorithm 1 simultaneously for all
2M subsets S in Equation 2. It may seem reasonable to
simply keep track of how many subsets (weighted by the
Consistent feature attribution for tree ensembles
Figure 2. SHAP (SHapley Additive exPlanation) values explain the output of a function as a sum of the effects φi of each feature being
introduced into a conditional expectation. Importantly, for non-linear functions the order in which features are introduced matters, so
SHAP averages over all possible orderings. Proofs from game theory show this is the only possible consistent and locally accurate
approach. In contrast, standard path methods for tree ensembles (Section 2) are similar to using a single ordering defined by a tree’s
decision path.
Algorithm 1 Estimating E[f (x) | xS ]
procedure EXPVALUE(x, S, tree = {v, a, b, t, r, d})
procedure G(j, w)
if vj 6= internal then
return w · vj
else
if dj ∈ S then
return xdj ≤ tj ? G(aj , w) : G(bj , w)
else
return G(aj , wraj /rj ) + G(aj , wraj /rj )
end if
end if
end procedure
return G(1, 1)
end procedure
cover splitting of Algorithm 1) pass down each branch of
the tree. However, this combines subsets of different sizes
and so prevents the proper weighting of these subsets, since
the weights in Equation 2 depend on |S|. To address this
we keep track of each possible subset size during the recursion. The EXTEND method in Algorithm 2 grows all
these subsets according to given fraction of ones and zeros, while the UNWIND method reverses this process. The
EXTEND method is used as we descend the tree. The UNWIND method is used to undo previous extensions when
we split on the same feature twice, and to undo each extension of the path inside a leaf to correctly compute the
weights for each feature in the path.
In Algorithm 2, m is the path of unique features we have
split on so far, and contains four attributes: d the feature
index, z the fraction of “zero” paths (where this feature is
not in the set S) that flow through this branch, o the fraction of “one” paths (where this feature is in the set S) that
flow through this branch, and w which is used to hold the
proportion of sets of a given cardinally that are present. We
use the dot notation to access these members, and for the
whole vector m.d represents a vector of all the feature indexes. (For code see https://github.com/slundberg/shap)
5. Supervised clustering experiments
One intriguing use for prediction level feature attributions
is what we term “supervised clustering”, where instead of
using an unsupervised clustering method directly on the
data features, you run clustering on the feature attributions
(Lundberg & Lee, 2016).
Supervised clustering naturally handles one of the most
challenging problems in unsupervised clustering: determining feature weightings (or equivalently, determining a
distance metric). Many times we want to cluster data using features with very different units. Features may be in
dollars, meters, unit-less scores, etc. but whenever we use
them as dimensions in a single multidimensional space it
forces any distance metric to compare the relative importance of a change in different units (such as dollars vs. meters). Even if all our inputs are in the same units, often
some features are more important than others. Supervised
clustering uses feature attributions to naturally convert all
the input features into values with the same units as the
model output. This means that a unit change in any of the
feature attributions is comparable to a unit change in any
other feature attribution. It also means that fluctuations in
the feature values only effect the clustering if those fluctuations have an impact on the outcome of interest.
Here we compare feature attribution methods by applying
supervised clustering to disease sub-typing, an area where
unsupervised clustering has contributed to important discoveries. The goal of disease sub-typing is to identify subgroups of patients that have similar mechanisms of disease (similar reasons they are sick). Here we consider
Alzheimer’s disease where the predicted outcome is the
CERAD cognitive score (Mirra et al., 1991), and the features are gene expression modules (Celik et al., 2014).
By representing the positive feature attributions as red bars
and the negative feature attributions as blue bars (as in Figure 2), we can stack them against each other to visually
represent the model output as their sum. Figure 3 does
this vertically for each participant. The explanations for
each participant are then stacked horizontally according the
Consistent feature attribution for tree ensembles
Samples (patients) ordered by explanation similarity
Model output (Alzheimer’s score)
(A) Path explanations
Samples (patients) ordered by explanation similarity
Model output (Alzheimer’s score)
(B) SHAP explanations
Figure 3. SHAP feature attributions produce better clusters than standard path attributions for supervised clustering of 518 participants
in an Alzheimer’s research study. An XGBoost model with 300 trees of max depth six was trained on 200 gene expression module
features using a shrinkage factor of η = 0.01. This model was then used to predict the CERAD cognitive score of each participant. Each
prediction was explained, and then clustered using hierarchical agglomerative clustering (imagine a dendrogram joining the samples
above each plot). Red feature attributions push the score higher, while blue feature attributions push the score lower. A) The clusters
formed with standard “path” explanations from XGBoost. B) Clusters using our Tree SHAP XGBoost implementation.
Consistent feature attribution for tree ensembles
Algorithm 2 Tree SHAP
procedure TS(x, tree = {v, a, b, t, r, d})
φ = array of len(x) zeros
procedure RECURSE(j, m, pz , po , pi )
m = EXTEND(m, pz , po , pi )
if vj 6= internal then
for i ← 2 to len(m) do
w = sum(UNWIND(m, i).w)
φmi = φmi + w(mi .o − mi .z)vj
end for
else
h, c = xdj ≤ tj ? (aj , bj ) : (bj , aj )
iz = io = 1
k = FINDFIRST(m.d, dj )
if k 6= nothing then
iz , io = (mk .z, mk .o)
m = UNWIND(m, k)
end if
RECURSE(h, m, iz rh /rj , io , dj )
RECURSE(c, m, iz rc /rj , 0, dj )
end if
end procedure
procedure EXTEND(m, pz , po , pi )
l = len(m) + 1
m = copy(m)
ml+1 .(d, z, o, w) = (pi , pz , po , l = 0 ? 1 : 0)
for i ← l − 1 to 1 do
mi+1 .w = mi+1 .w + po mi .w(i/l)
mi .w = pz mi .w[(l − i)/l]
end for
return m
end procedure
procedure UNWIND(m, i)
l = len(m)
n = ml .w
m = copy(m1...l−1 )
for j ← l − 1 to 1 do
if mi .o 6= 0 then
t = mj .w
mj .w = n · l/(j · mi .o)
n = t − mj .w · mi .z((l − j)/l)
else
mj .w = (mj .w · l)/(mi .z(l − j))
end if
end for
for j ← i to l − 1 do
mj .(d, z, o) = mj+1 .(d, z, o)
end for
return m
end procedure
RECURSE(1, [], 1, 1, 0)
return φ
end procedure
Figure 4. A quantitative performance measure of the clusterings
shown in Figure 3. If all 518 samples are placed in their own
group, and each group predicts the mean value of the group, then
the R2 value (the proportion of outcome variance explained) will
be 1. If groups are then merged one-by-one the R2 will decline
until when there is only a single group it will be 0. Hierarchical clusterings that well separate the outcome value will retain a
high R2 longer during the merging process. Here unsupervised
clustering did no better than random, supervised clustering with
the XGBoost “path” method did significantly better, and SHAP
values significantly better still.
leaf order of a hierarchical clustering. This groups participants with similar predicted outcomes and similar reasons
for that predicted outcome together. The clearer structure
in Figure 3B indicates the SHAP values are better feature
attributions, not only theoretically, but also practically.
The improvement in clustering performance seen in Figure
3 can be quantified by examining how well each clustering
explains the variance of the CERAD score outcome. Since
hierarchical clusterings encode many possible groupings,
we plot in Figure 4 the change in the R2 value as the number of groups shrinks from one group per sample (R2 = 1),
to a single group (R2 = 0).
6. Conclusion
Here we have shown that classic feature attribution methods for tree ensembles are inconsistent, meaning they can
assign less importance to a feature when the true effect
of that feature increases. In contrast, SHAP values were
shown to be the unique way to consistently attribute feature importance. By deriving fast algorithms for SHAP values and integrating them with XGBoost, we make them a
practical replacement for previous methods. Future directions include deriving fast dataset-level SHAP algorithms
for gain (as opposed to the instance-level algorithm presented here), and integrating SHAP value algorithms into
the released versions of common packages.
Consistent feature attribution for tree ensembles
Acknowledgments
We would like to thank Gabriel Erion for suggestions that
lead to a simplified algorithm, as well as Jacob Schreiber
and Naozumi Hiranuma for providing helpful input.
References
Breiman, Leo, Friedman, Jerome, Stone, Charles J, and
Olshen, Richard A. Classification and regression trees.
CRC press, 1984.
Celik, Safiye, Logsdon, Benjamin, and Lee, Su-In. Efficient dimensionality reduction for high-dimensional network estimation. In International Conference on Machine Learning, pp. 1953–1961, 2014.
Chen, Tianqi and Guestrin, Carlos. Xgboost: A scalable
tree boosting system. In Proceedings of the 22Nd ACM
SIGKDD International Conference on Knowledge Discovery and Data Mining, pp. 785–794. ACM, 2016.
Friedman, Jerome, Hastie, Trevor, and Tibshirani, Robert.
The elements of statistical learning, volume 1. Springer
series in statistics Springer, Berlin, 2001.
Lundberg, Scott and Lee, Su-In. An unexpected unity
among methods for interpreting model predictions.
arXiv preprint arXiv:1611.07478, 2016.
Lundberg, Scott and Lee, Su-In. A unified approach
to interpreting model predictions.
arXiv preprint
arXiv:1705.07874, 2017.
Mirra, Suzanne S, Heyman, A, McKeel, D, Sumi, SM,
Crain, Barbara J, Brownlee, LM, Vogel, FS, Hughes,
JP, Van Belle, G, Berg, L, et al. The consortium to
establish a registry for alzheimer’s disease (cerad) part
ii. standardization of the neuropathologic assessment of
alzheimer’s disease. Neurology, 41(4):479–479, 1991.
Pedregosa, Fabian, Varoquaux, Gaël, Gramfort, Alexandre, Michel, Vincent, Thirion, Bertrand, Grisel, Olivier,
Blondel, Mathieu, Prettenhofer, Peter, Weiss, Ron,
Dubourg, Vincent, et al. Scikit-learn: Machine learning in python. Journal of Machine Learning Research,
12(Oct):2825–2830, 2011.
Ridgeway, Greg. Generalized boosted regression models. documentation on the r package gbm, version 1.6–3,
2010.
Saabas,
Ando.
Interpreting
random
forests.
http://blog.datadive.net/
interpreting-random-forests/. Accessed:
2017-06-15.
| 2cs.AI
|
Large-Scale Evolution of Image Classifiers
Esteban Real 1 Sherry Moore 1 Andrew Selle 1 Saurabh Saxena 1
Yutaka Leon Suematsu 2 Jie Tan 1 Quoc V. Le 1 Alexey Kurakin 1
arXiv:1703.01041v2 [cs.NE] 11 Jun 2017
Abstract
Neural networks have proven effective at solving difficult problems but designing their architectures can be challenging, even for image classification problems alone. Our goal is to minimize human participation, so we employ evolutionary algorithms to discover such networks
automatically. Despite significant computational
requirements, we show that it is now possible to
evolve models with accuracies within the range
of those published in the last year. Specifically, we employ simple evolutionary techniques
at unprecedented scales to discover models for
the CIFAR-10 and CIFAR-100 datasets, starting from trivial initial conditions and reaching
accuracies of 94.6% (95.6% for ensemble) and
77.0%, respectively. To do this, we use novel and
intuitive mutation operators that navigate large
search spaces; we stress that no human participation is required once evolution starts and that the
output is a fully-trained model. Throughout this
work, we place special emphasis on the repeatability of results, the variability in the outcomes
and the computational requirements.
1. Introduction
Neural networks can successfully perform difficult tasks
where large amounts of training data are available (He
et al., 2015; Weyand et al., 2016; Silver et al., 2016; Wu
et al., 2016). Discovering neural network architectures,
however, remains a laborious task. Even within the specific problem of image classification, the state of the art
was attained through many years of focused investigation
by hundreds of researchers (Krizhevsky et al. (2012); Simonyan & Zisserman (2014); Szegedy et al. (2015); He
et al. (2016); Huang et al. (2016a), among many others).
1
Google Brain, Mountain View, California, USA 2 Google Research, Mountain View, California, USA. Correspondence to: Esteban Real <[email protected]>.
Proceedings of the 34 th International Conference on Machine
Learning, Sydney, Australia, PMLR 70, 2017. Copyright 2017
by the author(s).
It is therefore not surprising that in recent years, techniques to automatically discover these architectures have
been gaining popularity (Bergstra & Bengio, 2012; Snoek
et al., 2012; Han et al., 2015; Baker et al., 2016; Zoph
& Le, 2016). One of the earliest such “neuro-discovery”
methods was neuro-evolution (Miller et al., 1989; Stanley
& Miikkulainen, 2002; Stanley, 2007; Bayer et al., 2009;
Stanley et al., 2009; Breuel & Shafait, 2010; Pugh & Stanley, 2013; Kim & Rigazio, 2015; Zaremba, 2015; Fernando
et al., 2016; Morse & Stanley, 2016). Despite the promising results, the deep learning community generally perceives evolutionary algorithms to be incapable of matching the accuracies of hand-designed models (Verbancsics &
Harguess, 2013; Baker et al., 2016; Zoph & Le, 2016). In
this paper, we show that it is possible to evolve such competitive models today, given enough computational power.
We used slightly-modified known evolutionary algorithms
and scaled up the computation to unprecedented levels, as
far as we know. This, together with a set of novel and
intuitive mutation operators, allowed us to reach competitive accuracies on the CIFAR-10 dataset. This dataset
was chosen because it requires large networks to reach
high accuracies, thus presenting a computational challenge.
We also took a small first step toward generalization and
evolved networks on the CIFAR-100 dataset. In transitioning from CIFAR-10 to CIFAR-100, we did not modify any aspect or parameter of our algorithm. Our typical
neuro-evolution outcome on CIFAR-10 had a test accuracy
with µ = 94.1%, σ = 0.4% @ 9 × 1019 FLOPs, and our
top model (by validation accuracy) had a test accuracy of
94.6% @ 4×1020 FLOPs. Ensembling the validation-top
2 models from each population reaches a test accuracy of
95.6%, at no additional training cost. On CIFAR-100, our
single experiment resulted in a test accuracy of 77.0% @
2 × 1020 FLOPs. As far as we know, these are the most
accurate results obtained on these datasets by automated
discovery methods that start from trivial initial conditions.
Throughout this study, we placed special emphasis on the
simplicity of the algorithm. In particular, it is a “oneshot” technique, producing a fully trained neural network
requiring no post-processing. It also has few impactful
meta-parameters (i.e. parameters not optimized by the algorithm). Starting out with poor-performing models with
Large-Scale Evolution
Table 1. Comparison with single-model hand-designed architectures. The “C10+” and “C100+” columns indicate the test accuracy on
the data-augmented CIFAR-10 and CIFAR-100 datasets, respectively. The “Reachable?” column denotes whether the given handdesigned model lies within our search space. An entry of “–” indicates that no value was reported. The † indicates a result reported by
Huang et al. (2016b) instead of the original author. Much of this table was based on that presented in Huang et al. (2016a).
S TUDY
M AXOUT (G OODFELLOW ET AL ., 2013)
N ETWORK IN N ETWORK (L IN ET AL ., 2013)
A LL -CNN (S PRINGENBERG ET AL ., 2014)
D EEPLY S UPERVISED (L EE ET AL ., 2015)
H IGHWAY (S RIVASTAVA ET AL ., 2015)
R ES N ET (H E ET AL ., 2016)
E VOLUTION ( OURS )
W IDE R ES N ET 28-10 (Z AGORUYKO & KOMODAKIS , 2016)
W IDE R ES N ET 40-10+ D / O (Z AGORUYKO & KOMODAKIS , 2016)
D ENSE N ET (H UANG ET AL ., 2016 A )
no convolutions, the algorithm must evolve complex convolutional neural networks while navigating a fairly unrestricted search space: no fixed depth, arbitrary skip connections, and numerical parameters that have few restrictions on the values they can take. We also paid close attention to result reporting. Namely, we present the variability in our results in addition to the top value, we account
for researcher degrees of freedom (Simmons et al., 2011),
we study the dependence on the meta-parameters, and we
disclose the amount of computation necessary to reach the
main results. We are hopeful that our explicit discussion of
computation cost could spark more study of efficient model
search and training. Studying model performance normalized by computational investment allows consideration of
economic concepts like opportunity cost.
2. Related Work
Neuro-evolution dates back many years (Miller et al.,
1989), originally being used only to evolve the weights
of a fixed architecture. Stanley & Miikkulainen (2002)
showed that it was advantageous to simultaneously evolve
the architecture using the NEAT algorithm. NEAT has
three kinds of mutations: (i) modify a weight, (ii) add a
connection between existing nodes, or (iii) insert a node
while splitting an existing connection. It also has a mechanism for recombining two models into one and a strategy
to promote diversity known as fitness sharing (Goldberg
et al., 1987). Evolutionary algorithms represent the models
using an encoding that is convenient for their purpose—
analogous to nature’s DNA. NEAT uses a direct encoding:
every node and every connection is stored in the DNA. The
alternative paradigm, indirect encoding, has been the subject of much neuro-evolution research (Gruau, 1993; Stanley et al., 2009; Pugh & Stanley, 2013; Kim & Rigazio,
PARAMS .
C10+
C100+
R EACHABLE ?
–
–
1.3 M
–
2.3 M
1.7 M
5.4 M
40.4 M
36.5 M
50.7 M
25.6 M
90.7%
91.2%
92.8%
92.0%
92.3%
93.4%
94.6%
61.4%
–
66.3%
65.4%
67.6%
72.8%†
NO
NO
Y ES
NO
NO
Y ES
96.0%
96.2%
96.7%
77.0%
80.0%
81.7%
82.8%
N/A
Y ES
NO
NO
2015; Fernando et al., 2016). For example, the CPPN
(Stanley, 2007; Stanley et al., 2009) allows for the evolution of repeating features at different scales. Also, Kim
& Rigazio (2015) use an indirect encoding to improve the
convolution filters in an initially highly-optimized fixed architecture.
Research on weight evolution is still ongoing (Morse &
Stanley, 2016) but the broader machine learning community defaults to back-propagation for optimizing neural network weights (Rumelhart et al., 1988). Back-propagation
and evolution can be combined as in Stanley et al. (2009),
where only the structure is evolved. Their algorithm follows an alternation of architectural mutations and weight
back-propagation. Similarly, Breuel & Shafait (2010) use
this approach for hyper-parameter search. Fernando et al.
(2016) also use back-propagation, allowing the trained
weights to be inherited through the structural modifications.
The above studies create neural networks that are small in
comparison to the typical modern architectures used for image classification (He et al., 2016; Huang et al., 2016a).
Their focus is on the encoding or the efficiency of the evolutionary process, but not on the scale. When it comes to
images, some neuro-evolution results reach the computational scale required to succeed on the MNIST dataset (LeCun et al., 1998). Yet, modern classifiers are often tested
on realistic images, such as those in the CIFAR datasets
(Krizhevsky & Hinton, 2009), which are much more challenging. These datasets require large models to achieve
high accuracy.
Non-evolutionary neuro-discovery methods have been
more successful at tackling realistic image data. Snoek
et al. (2012) used Bayesian optimization to tune 9
hyper-parameters for a fixed-depth architecture, reach-
Large-Scale Evolution
Table 2. Comparison with automatically discovered architectures. The “C10+” and “C100+” contain the test accuracy on the dataaugmented CIFAR-10 and CIFAR-100 datasets, respectively. An entry of “–” indicates that the information was not reported or is not
known to us. For Zoph & Le (2016), we quote the result with the most similar search space to ours, as well as their best result. Please
refer to Table 1 for hand-designed results, including the state of the art. “Discrete params.” means that the parameters can be picked
from a handful of values only (e.g. strides ∈ {1, 2, 4}).
S TUDY
S TARTING P OINT
C ONSTRAINTS
P OST-P ROCESSING
BAYESIAN
(S NOEK
ET AL ., 2012)
3 LAYERS
FIXED ARCHITECTURE , NO
SKIPS
NONE
DISCRETE PARAMS ., MAX .
NUM . LAYERS , NO SKIPS
TUNE , RETRAIN
DISCRETE PARAMS .,
EXACTLY 20 LAYERS
SMALL GRID
SEARCH , RETRAIN
LAYERS , 2 POOL
LAYERS AT 13 AND
26, 50% SKIPS
DISCRETE PARAMS .,
EXACTLY 39 LAYERS , 2
POOL LAYERS AT 13 AND
ADD MORE FILTERS ,
SMALL GRID
SEARCH , RETRAIN
SINGLE LAYER ,
ZERO CONVS .
POWER - OF -2 STRIDES
Q-L EARNING
(BAKER
ET AL ., 2016)
–
RL (Z OPH &
L E , 2016)
20
RL (Z OPH &
L E , 2016)
39
E VOLUTION
( OURS )
LAYERS ,
SKIPS
50%
ing a new state of the art at the time.
Zoph &
Le (2016) used reinforcement learning on a deeper
fixed-length architecture.
In their approach, a neural network—the “discoverer”—constructs a convolutional
neural network—the “discovered”—one layer at a time. In
addition to tuning layer parameters, they add and remove
skip connections. This, together with some manual postprocessing, gets them very close to the (current) state of
the art. (Additionally, they surpassed the state of the art on
a sequence-to-sequence problem.) Baker et al. (2016) use
Q-learning to also discover a network one layer at a time,
but in their approach, the number of layers is decided by
the discoverer. This is a desirable feature, as it would allow
a system to construct shallow or deep solutions, as may be
the requirements of the dataset at hand. Different datasets
would not require specially tuning the algorithm. Comparisons among these methods are difficult because they explore very different search spaces and have very different
initial conditions (Table 2).
Tangentially, there has also been neuro-evolution work on
LSTM structure (Bayer et al., 2009; Zaremba, 2015), but
this is beyond the scope of this paper. Also related to this
work is that of Saxena & Verbeek (2016), who embed convolutions with different parameters into a species of “supernetwork” with many parallel paths. Their algorithm then
selects and ensembles paths in the super-network. Finally,
canonical approaches to hyper-parameter search are grid
search (used in Zagoruyko & Komodakis (2016), for example) and random search, the latter being the better of the
26
PARAMS .
N ONE
–
C10+
90.5%
C100+
–
11.2 M
93.1%
72.9%
2.5 M
94.0%
–
37.0 M
96.4%
–
5.4 M
40.4 M
94.6%
ENSEMB .
95.6%
77.0%
two (Bergstra & Bengio, 2012).
Our approach builds on previous work, with some important differences. We explore large model-architecture
search spaces starting with basic initial conditions to avoid
priming the system with information about known good
strategies for the specific dataset at hand. Our encoding
is different from the neuro-evolution methods mentioned
above: we use a simplified graph as our DNA, which is
transformed to a full neural network graph for training and
evaluation (Section 3). Some of the mutations acting on
this DNA are reminiscent of NEAT. However, instead of
single nodes, one mutation can insert whole layers—i.e.
tens to hundreds of nodes at a time. We also allow for
these layers to be removed, so that the evolutionary process
can simplify an architecture in addition to complexifying it.
Layer parameters are also mutable, but we do not prescribe
a small set of possible values to choose from, to allow for
a larger search space. We do not use fitness sharing. We
report additional results using recombination, but for the
most part, we used mutation only. On the other hand, we
do use back-propagation to optimize the weights, which
can be inherited across mutations. Together with a learning rate mutation, this allows the exploration of the space
of learning rate schedules, yielding fully trained models
at the end of the evolutionary process (Section 3). Tables 1 and 2 compare our approach with hand-designed architectures and with other neuro-discovery techniques, respectively.
Large-Scale Evolution
3. Methods
3.1. Evolutionary Algorithm
To automatically search for high-performing neural network architectures, we evolve a population of models.
Each model—or individual—is a trained architecture. The
model’s accuracy on a separate validation dataset is a measure of the individual’s quality or fitness. During each evolutionary step, a computer—a worker—chooses two individuals at random from this population and compares their
fitnesses. The worst of the pair is immediately removed
from the population—it is killed. The best of the pair is
selected to be a parent, that is, to undergo reproduction.
By this we mean that the worker creates a copy of the parent and modifies this copy by applying a mutation, as described below. We will refer to this modified copy as the
child. After the worker creates the child, it trains this child,
evaluates it on the validation set, and puts it back into the
population. The child then becomes alive—i.e. free to act
as a parent. Our scheme, therefore, uses repeated pairwise
competitions of random individuals, which makes it an example of tournament selection (Goldberg & Deb, 1991).
Using pairwise comparisons instead of whole population
operations prevents workers from idling when they finish
early. Code and more detail about the methods described
below can be found in Supplementary Section S1.
Using this strategy to search large spaces of complex image models requires considerable computation. To achieve
scale, we developed a massively-parallel, lock-free infrastructure. Many workers operate asynchronously on different computers. They do not communicate directly with
each other. Instead, they use a shared file-system, where
the population is stored. The file-system contains directories that represent the individuals. Operations on these
individuals, such as the killing of one, are represented as
atomic renames on the directory2 . Occasionally, a worker
may concurrently modify the individual another worker is
operating on. In this case, the affected worker simply gives
up and tries again. The population size is 1000 individuals,
unless otherwise stated. The number of workers is always
1
4 of the population size. To allow for long run-times with
a limited amount of space, dead individuals’ directories are
frequently garbage-collected.
3.2. Encoding and Mutations
Individual architectures are encoded as a graph that we
refer to as the DNA. In this graph, the vertices represent
rank-3 tensors or activations. As is standard for a convo2
The use of the file-name string to contain key information
about the individual was inspired by Breuel & Shafait (2010), and
it speeds up disk access enormously. In our case, the file name
contains the state of the individual (alive, dead, training, etc.).
lutional network, two of the dimensions of the tensor represent the spatial coordinates of the image and the third is
a number of channels. Activation functions are applied at
the vertices and can be either (i) batch-normalization (Ioffe
& Szegedy, 2015) with rectified linear units (ReLUs) or (ii)
plain linear units. The graph’s edges represent identity connections or convolutions and contain the mutable numerical parameters defining the convolution’s properties. When
multiple edges are incident on a vertex, their spatial scales
or numbers of channels may not coincide. However, the
vertex must have a single size and number of channels for
its activations. The inconsistent inputs must be resolved.
Resolution is done by choosing one of the incoming edges
as the primary one. We pick this primary edge to be the
one that is not a skip connection. The activations coming
from the non-primary edges are reshaped through zerothorder interpolation in the case of the size and through truncation/padding in the case of the number of channels, as in
He et al. (2016). In addition to the graph, the learning-rate
value is also stored in the DNA.
A child is similar but not identical to the parent because of
the action of a mutation. In each reproduction event, the
worker picks a mutation at random from a predetermined
set. The set contains the following mutations:
• A LTER - LEARNING - RATE (sampling details below).
• I DENTITY (effectively means “keep training”).
• R ESET- WEIGHTS (sampled as in He et al. (2015), for
example).
• I NSERT- CONVOLUTION (inserts a convolution at a random location in the “convolutional backbone”, as in Figure 1. The inserted convolution has 3 × 3 filters, strides
of 1 or 2 at random, number of channels same as input.
May apply batch-normalization and ReLU activation or
none at random).
• R EMOVE - CONVOLUTION.
• A LTER - STRIDE (only powers of 2 are allowed).
• A LTER - NUMBER - OF - CHANNELS (of random conv.).
• F ILTER - SIZE (horizontal or vertical at random, on random convolution, odd values only).
• I NSERT- ONE - TO - ONE (inserts a one-to-one/identity
connection, analogous to insert-convolution mutation).
• A DD - SKIP (identity between random layers).
• R EMOVE - SKIP (removes random skip).
These specific mutations were chosen for their similarity
to the actions that a human designer may take when improving an architecture. This may clear the way for hybrid
evolutionary–hand-design methods in the future. The probabilities for the mutations were not tuned in any way.
A mutation that acts on a numerical parameter chooses the
new value at random around the existing value. All sampling is from uniform distributions. For example, a mutation acting on a convolution with 10 output channels will
Large-Scale Evolution
result in a convolution having between 5 and 20 output
channels (that is, half to twice the original value). All values within the range are possible. As a result, the models
are not constrained to a number of filters that is known to
work well. The same is true for all other parameters, yielding a “dense” search space. In the case of the strides, this
applies to the log-base-2 of the value, to allow for activation shapes to match more easily3 . In principle, there is also
no upper limit to any of the parameters. All model depths
are attainable, for example. Up to hardware constraints, the
search space is unbounded. The dense and unbounded nature of the parameters result in the exploration of a truly
large set of possible architectures.
3.3. Initial Conditions
Every evolution experiment begins with a population of
simple individuals, all with a learning rate of 0.1. They
are all very bad performers. Each initial individual constitutes just a single-layer model with no convolutions. This
conscious choice of poor initial conditions forces evolution
to make the discoveries by itself. The experimenter contributes mostly through the choice of mutations that demarcate a search space. Altogether, the use of poor initial conditions and a large search space limits the experimenter’s
impact. In other words, it prevents the experimenter from
“rigging” the experiment to succeed.
3.5. Computation cost
To estimate computation costs, we identified the basic
TensorFlow (TF) operations used by our model training
and validation, like convolutions, generic matrix multiplications, etc. For each of these TF operations, we estimated the theoretical number of floating-point operations
(FLOPs) required. This resulted in a map from TF operation to FLOPs, which is valid for all our experiments.
For each individual within an evolution experiment, we
compute the total FLOPs incurred by the TF operations in
its architecture over one batch of examples, both during its
training (Ft FLOPs) and during its validation (Fv FLOPs).
Then we assign to the individual the cost Ft Nt + Fv Nv ,
where Nt and Nv are the number of training and validation
batches, respectively. The cost of the experiment is then
the sum of the costs of all its individuals.
We intend our FLOPs measurement as a coarse estimate
only. We do not take into account input/output, data preprocessing, TF graph building or memory-copying operations.
Some of these unaccounted operations take place once per
training run or once per step and some have a component
that is constant in the model size (such as disk-access latency or input data cropping). We therefore expect the estimate to be more useful for large architectures (for example,
those with many convolutions).
3.4. Training and Validation
3.6. Weight Inheritance
Training and validation is done on the CIFAR-10 dataset.
This dataset consists of 50,000 training examples and
10,000 test examples, all of which are 32 x 32 color images
labeled with 1 of 10 common object classes (Krizhevsky &
Hinton, 2009). 5,000 of the training examples are held out
in a validation set. The remaining 45,000 examples constitute our actual training set. The training set is augmented
as in He et al. (2016). The CIFAR-100 dataset has the same
number of dimensions, colors and examples as CIFAR-10,
but uses 100 classes, making it much more challenging.
We need architectures that are trained to completion within
an evolution experiment. If this does not happen, we are
forced to retrain the best model at the end, possibly having to explore its hyper-parameters. Such extra exploration tends to depend on the details of the model being
retrained. On the other hand, 25,600 steps are not enough
to fully train each individual. Training a large model to
completion is prohibitively slow for evolution. To resolve
this dilemma, we allow the children to inherit the parents’ weights whenever possible. Namely, if a layer has
matching shapes, the weights are preserved. Consequently,
some mutations preserve all the weights (like the identity or
learning-rate mutations), some preserve none (the weightresetting mutation), and most preserve some but not all. An
example of the latter is the filter-size mutation: only the filters of the convolution being mutated will be discarded.
Training is done with TensorFlow (Abadi et al., 2016), using SGD with a momentum of 0.9 (Sutskever et al., 2013), a
batch size of 50, and a weight decay of 0.0001. Each training runs for 25,600 steps, a value chosen to be brief enough
so that each individual could be trained in a few seconds to
a few hours, depending on model size. The loss function is
the cross-entropy. Once training is complete, a single evaluation on the validation set provides the accuracy to use as
the individual’s fitness. Ensembling was done by majority
voting during the testing evaluation. The models used in
the ensemble were selected by validation accuracy.
3
For integer DNA parameters, we actually store and mutate a
floating-point value. This allows multiple small mutations to have
a cumulative effect in spite of integer round-off.
3.7. Reporting Methodology
To avoid over-fitting, neither the evolutionary algorithm nor
the neural network training ever see the testing set. Each
time we refer to “the best model”, we mean the model with
the highest validation accuracy. However, we always report
the test accuracy. This applies not only to the choice of the
best individual within an experiment, but also to the choice
Large-Scale Evolution
of the best experiment. Moreover, we only include experiments that we managed to reproduce, unless explicitly
noted. Any statistical analysis was fully decided upon before seeing the results of the experiment reported, to avoid
tailoring our analysis to our experimental data (Simmons
et al., 2011).
4. Experiments and Results
We want to answer the following questions:
• Can a simple one-shot evolutionary process start from
trivial initial conditions and yield fully trained models
that rival hand-designed architectures?
• What are the variability in outcomes, the parallelizability, and the computation cost of the method?
• Can an algorithm designed iterating on CIFAR-10 be applied, without any changes at all, to CIFAR-100 and still
produce competitive models?
We used the algorithm in Section 3 to perform several experiments. Each experiment evolves a population in a few
days, typified by the example in Figure 1. The figure also
contains examples of the architectures discovered, which
turn out to be surprisingly simple. Evolution attempts skip
connections but frequently rejects them.
To get a sense of the variability in outcomes, we repeated
the experiment 5 times. Across all 5 experiment runs, the
best model by validation accuracy has a testing accuracy of
94.6 %. Not all experiments reach the same accuracy, but
they get close (µ = 94.1%, σ = 0.4). Fine differences in the
experiment outcome may be somewhat distinguishable by
validation accuracy (correlation coefficient = 0.894). The
total amount of computation across all 5 experiments was
4×1020 FLOPs (or 9×1019 FLOPs on average per experiment). Each experiment was distributed over 250 parallel
workers (Section 3.1). Figure 2 shows the progress of the
experiments in detail.
As a control, we disabled the selection mechanism, thereby
reproducing and killing random individuals. This is the
form of random search that is most compatible with our
infrastructure. The probability distributions for the parameters are implicitly determined by the mutations. This
control only achieves an accuracy of 87.3 % in the same
amount of run time on the same hardware (Figure 2). The
total amount of computation was 2×1017 FLOPs. The low
FLOP count is a consequence of random search generating
many small, inadequate models that train quickly but consume roughly constant amounts of setup time (not included
in the FLOP count). We attempted to minimize this overhead by avoiding unnecessary disk access operations, to no
avail: too much overhead remains spent on a combination
of neural network setup, data augmentation, and training
step initialization.
We also ran a partial control where the weight-inheritance
mechanism is disabled. This run also results in a lower
accuracy (92.2 %) in the same amount of time (Figure 2),
using 9×1019 FLOPs. This shows that weight inheritance
is important in the process.
Finally, we applied our neuro-evolution algorithm, without any changes and with the same meta-parameters, to
CIFAR-100. Our only experiment reached an accuracy
of 77.0 %, using 2 × 1020 FLOPs. We did not attempt
other datasets. Table 1 shows that both the CIFAR-10
and CIFAR-100 results are competitive with modern handdesigned networks.
5. Analysis
Meta-parameters. We observe that populations evolve
until they plateau at some local optimum (Figure 2). The
fitness (i.e. validation accuracy) value at this optimum
varies between experiments (Figure 2, inset). Since not all
experiments reach the highest possible value, some populations are getting “trapped” at inferior local optima. This
entrapment is affected by two important meta-parameters
(i.e. parameters that are not optimized by the algorithm).
These are the population size and the number of training
steps per individual. Below we discuss them and consider
their relationship to local optima.
Effect of population size. Larger populations explore the
space of models more thoroughly, and this helps reach better optima (Figure 3, left). Note, in particular, that a population of size 2 can get trapped at very low fitness values.
Some intuition about this can be gained by considering the
fate of a super-fit individual, i.e. an individual such that any
one architectural mutation reduces its fitness (even though
a sequence of many mutations may improve it). In the case
of a population of size 2, if the super-fit individual wins
once, it will win every time. After the first win, it will produce a child that is one mutation away. By definition of
super-fit, therefore, this child is inferior4 . Consequently,
in the next round of tournament selection, the super-fit individual competes against its child and wins again. This
cycle repeats forever and the population is trapped. Even if
a sequence of two mutations would allow for an “escape”
from the local optimum, such a sequence can never take
place. This is only a rough argument to heuristically suggest why a population of size 2 is easily trapped. More
generally, Figure 3 (left) empirically demonstrates a benefit from an increase in population size. Theoretical analyses of this dependence are quite complex and assume very
specific models of population dynamics; often larger populations are better at handling local optima, at least beyond
a size threshold (Weinreich & Chao (2005) and references
4
Except after identity or learning rate mutations, but these produce a child with the same architecture as the parent.
Large-Scale Evolution
94.6
91.8
85.3
Input
test accuracy (%)
C
Input
Input
C
C
C
C + BN + R
C
C + BN + R + BN + R
BN + R
C + BN + R + BN + R + BN + R + BN + R
C + BN + R + BN + R + BN + R + BN + R
C + BN + R
C + BN + R
C + BN + R
C + BN + R
C
C + BN + R
Input
C
22.6
Global Pool
C + BN + R
Output
Global Pool
Output
C
BN + R
C + BN + R
C + BN + R
C + BN + R
C + BN + R + BN + R
C
C
C
C + BN + R + BN + R
C + BN + R
Global Pool
C + BN + R
Output
Global Pool
Output
0.9
28.1
70.2
wall time (hours)
256.2
Figure 1. Progress of an evolution experiment. Each dot represents an individual in the population. Blue dots (darker, top-right) are alive.
The rest have been killed. The four diagrams show examples of discovered architectures. These correspond to the best individual (rightmost) and three of its ancestors. The best individual was selected by its validation accuracy. Evolution sometimes stacks convolutions
without any nonlinearity in between (“C”, white background), which are mathematically equivalent to a single linear operation. Unlike
typical hand-designed architectures, some convolutions are followed by more than one nonlinear function (“C+BN +R+BN +R+...”,
orange background).
therein).
Effect of number of training steps. The other metaparameter is the number T of training steps for each individual. Accuracy increases with T (Figure 3, right). Larger
T means an individual needs to undergo fewer identity mutations to reach a given level of training.
Escaping local optima. While we might increase population size or number of steps to prevent a trapped population from forming, we can also free an already trapped
population. For example, increasing the mutation rate or
resetting all the weights of a population (Figure 4) work
well but are quite costly (more details in Supplementary
Section S3).
Recombination. None of the results presented so far
used recombination. However, we explored three forms of
recombination in additional experiments. Following Tuson
& Ross (1998), we attempted to evolve the mutation probability distribution too. On top of this, we employed a recombination strategy by which a child could inherit structure from one parent and mutation probabilities from another. The goal was to allow individuals that progressed
well due to good mutation choices to quickly propagate
such choices to others. In a separate experiment, we attempted recombining the trained weights from two parents
in the hope that each parent may have learned different
concepts from the training data. In a third experiment,
we recombined structures so that the child fused the architectures of both parents side-by-side, generating wide
models fast. While none of these approaches improved our
recombination-free results, further study seems warranted.
6. Conclusion
In this paper we have shown that (i) neuro-evolution is capable of constructing large, accurate networks for two challenging and popular image classification benchmarks; (ii)
neuro-evolution can do this starting from trivial initial conditions while searching a very large space; (iii) the process, once started, needs no experimenter participation; and
(iv) the process yields fully trained models. Completely
training models required weight inheritance (Sections 3.6).
In contrast to reinforcement learning, evolution provides a
natural framework for weight inheritance: mutations can
be constructed to guarantee a large degree of similarity be-
Large-Scale Evolution
100.0
94.6
250
Evolution
94
Evolution w/o
weight inheritance
Random search
92
20.0
0
wall-clock time (hours)
250
Figure 2. Repeatability of results and controls. In this plot, the
vertical axis at wall-time t is defined as the test accuracy of the
individual with the highest validation accuracy that became alive
at or before t. The inset magnifies a portion of the main graph.
The curves show the progress of various experiments, as follows.
The top line (solid, blue) shows the mean test accuracy across 5
large-scale evolution experiments. The shaded area around this
top line has a width of ±2σ (clearer in inset). The next line down
(dashed, orange, main graph and inset) represents a single experiment in which weight-inheritance was disabled, so every individual has to train from random weights. The lowest curve (dotteddashed) is a random-search control. All experiments occupied the
same amount and type of hardware. A small amount of noise in
the generalization from the validation to the test set explains why
the lines are not monotonically increasing. Note the narrow width
of the ±2σ area (main graph and inset), which shows that the high
accuracies obtained in evolution experiments are repeatable.
50
test accuracy (%)
150
100
test accuracy (%)
test accuracy (%)
100
2
10 43
1000
population size
75
256
2560
25600
training steps
Figure 3. Dependence on meta-parameters. In both graphs, each
circle represents the result of a full evolution experiment. Both
vertical axes show the test accuracy for the individual with the
highest validation accuracy at the end of the experiment. All populations evolved for the same total wall-clock time. There are 5
data points at each horizontal axis value. LEFT: effect of population size. To economize resources, in these experiments the
number of individual training steps is only 2560. Note how the accuracy increases with population size. RIGHT: effect of number
of training steps per individual. Note how the accuracy increases
with more steps.
tween the original and mutated models—as we did. Evolution also has fewer tunable meta-parameters with a fairly
predictable effect on the variance of the results, which can
be made small.
While we did not focus on reducing computation costs,
we hope that future algorithmic and hardware improvement
will allow more economical implementation. In that case,
evolution would become an appealing approach to neurodiscovery for reasons beyond the scope of this paper. For
example, it “hits the ground running”, improving on arbitrary initial models as soon as the experiment begins. The
mutations used can implement recent advances in the field
and can be introduced without having to restart an experiment. Furthermore, recombination can merge improvements developed by different individuals, even if they come
from other populations. Moreover, it may be possible to
combine neuro-evolution with other automatic architecture
discovery methods.
Figure 4. Escaping local optima in two experiments. We used
smaller populations and fewer training steps per individual (2560)
to make it more likely for a population to get trapped and to reduce resource usage. Each dot represents an individual. The vertical axis is the accuracy. TOP: example of a population of size 100
escaping a local optimum by using a period of increased mutation
rate in the middle (Section 5). BOTTOM: example of a population
of size 50 escaping a local optimum by means of three consecutive weight resetting events (Section 5). Details in Supplementary
Section S3.
Large-Scale Evolution
Acknowledgements
We wish to thank Vincent Vanhoucke, Megan Kacholia, Rajat Monga, and especially Jeff Dean for their support and valuable input; Geoffrey Hinton, Samy Bengio, Thomas Breuel, Mark DePristo, Vishy Tirumalashetty,
Martin Abadi, Noam Shazeer, Yoram Singer, Dumitru Erhan, Pierre Sermanet, Xiaoqiang Zheng, Shan Carter and
Vijay Vasudevan for helpful discussions; Thomas Breuel,
Xin Pan and Andy Davis for coding contributions; and the
larger Google Brain team for help with TensorFlow and
training vision models.
References
Abadi, Martı́n, Agarwal, Ashish, Barham, Paul, Brevdo,
Eugene, Chen, Zhifeng, Citro, Craig, Corrado, Greg S,
Davis, Andy, Dean, Jeffrey, Devin, Matthieu, et al. Tensorflow: Large-scale machine learning on heterogeneous
distributed systems. arXiv preprint arXiv:1603.04467,
2016.
Baker, Bowen, Gupta, Otkrist, Naik, Nikhil, and
Raskar, Ramesh. Designing neural network architectures using reinforcement learning. arXiv preprint
arXiv:1611.02167, 2016.
Bayer, Justin, Wierstra, Daan, Togelius, Julian, and
Schmidhuber, Jürgen. Evolving memory cell structures
for sequence learning. In International Conference on
Artificial Neural Networks, pp. 755–764. Springer, 2009.
Goodfellow, Ian J, Warde-Farley, David, Mirza, Mehdi,
Courville, Aaron C, and Bengio, Yoshua. Maxout networks. International Conference on Machine Learning,
28:1319–1327, 2013.
Gruau, Frederic. Genetic synthesis of modular neural networks. In Proceedings of the 5th International Conference on Genetic Algorithms, pp. 318–325. Morgan Kaufmann Publishers Inc., 1993.
Han, Song, Pool, Jeff, Tran, John, and Dally, William.
Learning both weights and connections for efficient neural network. In Advances in Neural Information Processing Systems, pp. 1135–1143, 2015.
He, Kaiming, Zhang, Xiangyu, Ren, Shaoqing, and Sun,
Jian. Delving deep into rectifiers: Surpassing humanlevel performance on imagenet classification. In Proceedings of the IEEE international conference on computer vision, pp. 1026–1034, 2015.
He, Kaiming, Zhang, Xiangyu, Ren, Shaoqing, and Sun,
Jian. Deep residual learning for image recognition. In
Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, pp. 770–778, 2016.
Huang, Gao, Liu, Zhuang, Weinberger, Kilian Q, and
van der Maaten, Laurens. Densely connected convolutional networks. arXiv preprint arXiv:1608.06993,
2016a.
Bergstra, James and Bengio, Yoshua. Random search
for hyper-parameter optimization. Journal of Machine
Learning Research, 13(Feb):281–305, 2012.
Huang, Gao, Sun, Yu, Liu, Zhuang, Sedra, Daniel, and
Weinberger, Kilian Q. Deep networks with stochastic
depth. In European Conference on Computer Vision, pp.
646–661. Springer, 2016b.
Breuel, Thomas and Shafait, Faisal. Automlp: Simple,
effective, fully automated learning rate and size adjustment. In The Learning Workshop. Utah, 2010.
Ioffe, Sergey and Szegedy, Christian. Batch normalization:
Accelerating deep network training by reducing internal
covariate shift. arXiv preprint arXiv:1502.03167, 2015.
Fernando, Chrisantha, Banarse, Dylan, Reynolds, Malcolm, Besse, Frederic, Pfau, David, Jaderberg, Max,
Lanctot, Marc, and Wierstra, Daan. Convolution by evolution: Differentiable pattern producing networks. In
Proceedings of the 2016 on Genetic and Evolutionary
Computation Conference, pp. 109–116. ACM, 2016.
Kim, Minyoung and Rigazio, Luca. Deep clustered convolutional kernels. arXiv preprint arXiv:1503.01824, 2015.
Goldberg, David E and Deb, Kalyanmoy. A comparative
analysis of selection schemes used in genetic algorithms.
Foundations of genetic algorithms, 1:69–93, 1991.
Goldberg, David E, Richardson, Jon, et al. Genetic algorithms with sharing for multimodal function optimization. In Genetic algorithms and their applications: Proceedings of the Second International Conference on Genetic Algorithms, pp. 41–49. Hillsdale, NJ: Lawrence
Erlbaum, 1987.
Krizhevsky, Alex and Hinton, Geoffrey. Learning multiple
layers of features from tiny images. 2009.
Krizhevsky, Alex, Sutskever, Ilya, and Hinton, Geoffrey E.
Imagenet classification with deep convolutional neural
networks. In Advances in Neural Information Processing
Systems, pp. 1097–1105, 2012.
LeCun, Yann, Cortes, Corinna, and Burges, Christopher JC. The mnist database of handwritten digits, 1998.
Lee, Chen-Yu, Xie, Saining, Gallagher, Patrick W, Zhang,
Zhengyou, and Tu, Zhuowen. Deeply-supervised nets.
In AISTATS, volume 2, pp. 5, 2015.
Large-Scale Evolution
Lin, Min, Chen, Qiang, and Yan, Shuicheng. Network in
network. arXiv preprint arXiv:1312.4400, 2013.
Miller, Geoffrey F, Todd, Peter M, and Hegde, Shailesh U.
Designing neural networks using genetic algorithms. In
Proceedings of the third international conference on Genetic algorithms, pp. 379–384. Morgan Kaufmann Publishers Inc., 1989.
Morse, Gregory and Stanley, Kenneth O. Simple evolutionary optimization can rival stochastic gradient descent in neural networks. In Proceedings of the 2016 on
Genetic and Evolutionary Computation Conference, pp.
477–484. ACM, 2016.
Pugh, Justin K and Stanley, Kenneth O. Evolving multimodal controllers with hyperneat. In Proceedings of
the 15th annual conference on Genetic and evolutionary
computation, pp. 735–742. ACM, 2013.
Rumelhart, David E, Hinton, Geoffrey E, and Williams,
Ronald J. Learning representations by back-propagating
errors. Cognitive Modeling, 5(3):1, 1988.
Saxena, Shreyas and Verbeek, Jakob. Convolutional neural
fabrics. In Advances In Neural Information Processing
Systems, pp. 4053–4061, 2016.
Silver, David, Huang, Aja, Maddison, Chris J, Guez,
Arthur, Sifre, Laurent, Van Den Driessche, George,
Schrittwieser, Julian, Antonoglou, Ioannis, Panneershelvam, Veda, Lanctot, Marc, et al. Mastering the game of
go with deep neural networks and tree search. Nature,
529(7587):484–489, 2016.
Simmons, Joseph P, Nelson, Leif D, and Simonsohn, Uri.
False-positive psychology: Undisclosed flexibility in
data collection and analysis allows presenting anything
as significant. Psychological Science, 22(11):1359–
1366, 2011.
Simonyan, Karen and Zisserman, Andrew. Very deep convolutional networks for large-scale image recognition.
arXiv preprint arXiv:1409.1556, 2014.
Snoek, Jasper, Larochelle, Hugo, and Adams, Ryan P.
Practical bayesian optimization of machine learning algorithms. In Advances in neural information processing
systems, pp. 2951–2959, 2012.
Springenberg, Jost Tobias, Dosovitskiy, Alexey, Brox,
Thomas, and Riedmiller, Martin. Striving for simplicity: The all convolutional net. arXiv preprint
arXiv:1412.6806, 2014.
Srivastava, Rupesh Kumar, Greff, Klaus, and Schmidhuber, Jürgen. Highway networks. arXiv preprint
arXiv:1505.00387, 2015.
Stanley, Kenneth O. Compositional pattern producing networks: A novel abstraction of development. Genetic programming and evolvable machines, 8(2):131–162, 2007.
Stanley, Kenneth O and Miikkulainen, Risto. Evolving
neural networks through augmenting topologies. Evolutionary Computation, 10(2):99–127, 2002.
Stanley, Kenneth O, D’Ambrosio, David B, and Gauci, Jason. A hypercube-based encoding for evolving largescale neural networks. Artificial Life, 15(2):185–212,
2009.
Sutskever, Ilya, Martens, James, Dahl, George E, and Hinton, Geoffrey E. On the importance of initialization and
momentum in deep learning. ICML (3), 28:1139–1147,
2013.
Szegedy, Christian, Liu, Wei, Jia, Yangqing, Sermanet,
Pierre, Reed, Scott, Anguelov, Dragomir, Erhan, Dumitru, Vanhoucke, Vincent, and Rabinovich, Andrew.
Going deeper with convolutions. In Proceedings of
the IEEE Conference on Computer Vision and Pattern
Recognition, pp. 1–9, 2015.
Tuson, Andrew and Ross, Peter. Adapting operator settings
in genetic algorithms. Evolutionary computation, 6(2):
161–184, 1998.
Verbancsics, Phillip and Harguess, Josh. Generative
neuroevolution for deep learning.
arXiv preprint
arXiv:1312.5355, 2013.
Weinreich, Daniel M and Chao, Lin. Rapid evolutionary
escape by large populations from local fitness peaks is
likely in nature. Evolution, 59(6):1175–1182, 2005.
Weyand, Tobias, Kostrikov, Ilya, and Philbin, James.
Planet-photo geolocation with convolutional neural networks. In European Conference on Computer Vision, pp.
37–55. Springer, 2016.
Wu, Yonghui, Schuster, Mike, Chen, Zhifeng, Le, Quoc V.,
Norouzi, Mohammad, et al. Google’s neural machine
translation system: Bridging the gap between human and
machine translation. arXiv preprint arXiv:1609.08144,
2016.
Zagoruyko, Sergey and Komodakis, Nikos. Wide residual
networks. arXiv preprint arXiv:1605.07146, 2016.
Zaremba, Wojciech. An empirical exploration of recurrent
network architectures. 2015.
Zoph, Barret and Le, Quoc V.
Neural architecture
search with reinforcement learning. arXiv preprint
arXiv:1611.01578, 2016.
Large-Scale Evolution of Image Classifiers
Supplementary Material
S1. Methods Details
This section contains additional implementation details, roughly following the order in Section 3. Short code snippets
illustrate the ideas. The code is not intended to run on its own and it has been highly edited for clarity.
In our implementation, each worker runs an outer loop that is responsible for selecting a pair of random individuals from
the population. The individual with the highest fitness usually becomes a parent and the one with the lowest fitness is
usually killed (Section 3.1). Occasionally, either of these two actions is not carried out in order to keep the population size
close to a set-point:
def evolve_population(self):
# Iterate indefinitely.
while True:
# Select two random individuals from the population.
valid_individuals = []
for individual in self.load_individuals(): # Only loads the IDs and states.
if individual.state in [TRAINING, ALIVE]:
valid_individuals.append(individual)
individual_pair = random.sample(valid_individuals, 2)
for individual in individual_pair:
# Sync changes from other workers from file-system. Loads everything else.
individual.update_if_necessary()
# Ensure the individual is fully trained.
if individual.state == TRAINING:
self._train(individual)
# Select by fitness (accuracy).
individual_pair.sort(key=lambda i: i.fitness, reverse=True)
better_individual = individual_pair[0]
worse_individual = individual_pair[1]
# If the population is not too small, kill the worst of the pair.
if self._population_size() >= self._population_size_setpoint:
self._kill_individual(worse_individual)
# If the population is not too large, reproduce the best of the pair.
if self._population_size() < self._population_size_setpoint:
self._reproduce_and_train_individual(better_individual)
Much of the code is wrapped in try-except blocks to handle various kinds of errors. These have been removed from the
code snippets for clarity. For example, the method above would be wrapped like this:
def evolve_population(self):
while True:
try:
# Select two random individuals from the population.
...
except:
except exceptions.PopulationTooSmallException:
self._create_new_individual()
continue
Large-Scale Evolution
except exceptions.ConcurrencyException:
# Another worker did something that interfered with the action of this worker.
# Abandon the current task and keep going.
continue
The encoding for an individual is represented by a serializable DNA class instance containing all information except for the
trained weights (Section 3.2). For all results in this paper, this encoding is a directed, acyclic graph where edges represent
convolutions and vertices represent nonlinearities. This is a sketch of the DNA class:
class DNA(object):
def __init__(self, dna_proto):
"""Initializes the ‘DNA‘ instance from a protocol buffer.
The ‘dna_proto‘ is a protocol buffer used to restore the DNA state from disk.
Together with the corresponding ‘to_proto‘ method, they allow for a
serialization-deserialization mechanism.
"""
# Allows evolving the learning rate, i.e. exploring the space of
# learning rate schedules.
self.learning_rate = dna_proto.learning_rate
self._vertices = {} # String vertex ID to ‘Vertex‘ instance.
for vertex_id in dna_proto.vertices:
vertices[vertex_id] = Vertex(vertex_proto=dna_sproto.vertices[vertex_id])
self._edges = {} # String edge ID to ‘Edge‘ instance.
for edge_id in dna_proto.edges:
mutable_edges[edge_id] = Edge(edge_proto=dna_proto.edges[edge_id])
...
def to_proto(self):
"""Returns this instance in protocol buffer form."""
dna_proto = dna_pb2.DnaProto(learning_rate=self.learning_rate)
for vertex_id, vertex in self._vertices.iteritems():
dna_proto.vertices[vertex_id].CopyFrom(vertex.to_proto())
for edge_id, edge in self._edges.iteritems():
dna_proto.edges[edge_id].CopyFrom(edge.to_proto())
...
return dna_proto
def add_edge(self, dna, from_vertex_id, to_vertex_id, edge_type, edge_id):
"""Adds an edge to the DNA graph, ensuring internal consistency."""
# ‘EdgeProto‘ defines defaults for other attributes.
edge = Edge(EdgeProto(
from_vertex=from_vertex_id, to_vertex=to_vertex_id, type=edge_type))
self._edges[edge_id] = edge
self._vertices[from_vertex_id].edges_out.add(edge_id)
self._vertices[to_vertex].edges_in.add(edge_id)
return edge
# Other methods like ‘add_edge‘ to manipulate the graph structure.
...
The DNA holds Vertex and Edge instances. The Vertex class looks like this:
class Vertex(object):
def __init__(self, vertex_proto):
# Relationship to the rest of the graph.
Large-Scale Evolution
self.edges_in = set(vertex_proto.edges_in) # Incoming edge IDs.
self.edges_out = set(vertex_proto.edges_out) # Outgoing edge IDs.
# The type of activations.
if vertex_proto.HasField(’linear’):
self.type = LINEAR # Linear activations.
elif vertex_proto.HasField(’bn_relu’):
self.type = BN_RELU # ReLU activations with batch-normalization.
else:
raise NotImplementedError()
# Some parts of the graph can be prevented from being acted upon by mutations.
# The following boolean flags control this.
self.inputs_mutable = vertex_proto.inputs_mutable
self.outputs_mutable = vertex_proto.outputs_mutable
self.properties_mutable = vertex_proto.properties_mutable
#
#
#
#
Each vertex represents a 2ˆs x 2ˆs x d block of nodes. s and d are positive
integers computed dynamically from the in-edges. s stands for "scale" so
that 2ˆx x 2ˆs is the spatial size of the activations. d stands for "depth",
the number of channels.
def to_proto(self):
...
The Edge class looks like this:
class Edge(object):
def __init__(self, edge_proto):
# Relationship to the rest of the graph.
self.from_vertex = edge_proto.from_vertex # Source vertex ID.
self.to_vertex = edge_proto.to_vertex # Destination vertex ID.
if edge_proto.HasField(’conv’):
# In this case, the edge represents a convolution.
self.type = CONV
# Controls the depth (i.e. number of channels) in the output, relative to the
# input. For example if there is only one input edge with a depth of 16 channels
# and ‘self._depth_factor‘ is 2, then this convolution will result in an output
# depth of 32 channels. Multiple-inputs with conflicting depth must undergo
# depth resolution first.
self.depth_factor = edge_proto.conv.depth_factor
# Control the shape of the convolution filters (i.e. transfer function).
# This parameterization ensures that the filter width and height are odd
# numbers: filter_width = 2 * filter_half_width + 1.
self.filter_half_width = edge_proto.conv.filter_half_width
self.filter_half_height = edge_proto.conv.filter_half_height
# Controls the strides of the convolution. It will be 2ˆstride_scale.
# Note that conflicting input scales must undergo scale resolution. This
# controls the spatial scale of the output activations relative to the
# spatial scale of the input activations.
self.stride_scale = edge_proto.conv.stride_scale
elif edge_spec.HasField(’identity’):
self.type = IDENTITY
else:
raise NotImplementedError()
# In case depth or scale resolution is necessary due to conflicts in inputs,
# These integer parameters determine which of the inputs takes precedence in
# deciding the resolved depth or scale.
self.depth_precedence = edge_proto.depth_precedence
Large-Scale Evolution
self.scale_precedence = edge_proto.scale_precedence
def to_proto(self):
...
Mutations act on DNA instances. The set of mutations restricts the space explored somewhat (Section 3.2). The following
are some example mutations. The AlterLearningRateMutation simply randomly modifies the attribute in the DNA:
class AlterLearningRateMutation(Mutation):
"""Mutation that modifies the learning rate."""
def mutate(self, dna):
mutated_dna = copy.deepcopy(dna)
# Mutate the learning rate by a random factor between 0.5 and 2.0,
# uniformly distributed in log scale.
factor = 2**random.uniform(-1.0, 1.0)
mutated_dna.learning_rate = dna.learning_rate * factor
return mutated_dna
Many mutations modify the structure. Mutations to insert and excise vertex-edge pairs build up a main convolutional
column, while mutations to add and remove edges can handle the skip connections. For example, the AddEdgeMutation
can add a skip connection between random vertices.
class AddEdgeMutation(Mutation):
"""Adds a single edge to the graph."""
def mutate(self, dna):
# Try the candidates in random order until one has the right connectivity.
for from_vertex_id, to_vertex_id in self._vertex_pair_candidates(dna):
mutated_dna = copy.deepcopy(dna)
if (self._mutate_structure(mutated_dna, from_vertex_id, to_vertex_id)):
return mutated_dna
raise exceptions.MutationException() # Try another mutation.
def _vertex_pair_candidates(self, dna):
"""Yields connectable vertex pairs."""
from_vertex_ids = _find_allowed_vertices(dna, self._to_regex, ...)
if not from_vertex_ids:
raise exceptions.MutationException() # Try another mutation.
random.shuffle(from_vertex_ids)
to_vertex_ids = _find_allowed_vertices(dna, self._from_regex, ...)
if not to_vertex_ids:
raise exceptions.MutationException() # Try another mutation.
random.shuffle(to_vertex_ids)
for to_vertex_id in to_vertex_ids:
# Avoid back-connections.
disallowed_from_vertex_ids, _ = topology.propagated_set(to_vertex_id)
for from_vertex_id in from_vertex_ids:
if from_vertex_id in disallowed_from_vertex_ids:
continue
# This pair does not generate a cycle, so we yield it.
yield from_vertex_id, to_vertex_id
def _mutate_structure(self, dna, from_vertex_id, to_vertex_id):
"""Adds the edge to the DNA instance."""
edge_id = _random_id()
edge_type = random.choice(self._edge_types)
if dna.has_edge(from_vertex_id, to_vertex_id):
return False
else:
new_edge = dna.add_edge(from_vertex_id, to_vertex_id, edge_type, edge_id)
Large-Scale Evolution
...
return True
For clarity, we omitted the details of a vertex ID targeting mechanism based on regular expressions, which is used to
constrain where the additional edges are placed. This mechanism ensured the skip connections only joined points in the
“main convolutional backbone” of the convnet. The precedence range is used to give the main backbone precedence over
the skip connections when resolving scale and depth conflicts in the presence of multiple incoming edges to a vertex. Also
omitted are details about the attributes of the edge to add.
To evaluate an individual’s fitness, its DNA is unfolded into a TensorFlow model by the Model class. This describes how
each Vertex and Edge should be interpreted. For example:
class Model(object):
...
def _compute_vertex_nonlinearity(self, tensor, vertex):
"""Applies the necessary vertex operations depending on the vertex type."""
if vertex.type == LINEAR:
pass
elif vertex.type == BN_RELU:
tensor = slim.batch_norm(
inputs=tensor, decay=0.9, center=True, scale=True,
epsilon=self._batch_norm_epsilon,
activation_fn=None, updates_collections=None,
is_training=self.is_training, scope=’batch_norm’)
tensor = tf.maximum(tensor, vertex.leakiness * tensor, name=’relu’)
else:
raise NotImplementedError()
return tensor
def _compute_edge_connection(self, tensor, edge, init_scale):
"""Applies the necessary edge connection ops depending on the edge type."""
scale, depth = self._get_scale_and_depth(tensor)
if edge.type == CONV:
scale_out = scale
depth_out = edge.depth_out(depth)
stride = 2**edge.stride_scale
# ‘init_scale‘ is used to normalize the initial weights in the case of
# multiple incoming edges.
weights_initializer = slim.variance_scaling_initializer(
factor=2.0 * init_scale**2, uniform=False)
weights_regularizer = slim.l2_regularizer(
weight=self._dna.weight_decay_rate)
tensor = slim.conv2d(
inputs=tensor, num_outputs=depth_out,
kernel_size=[edge.filter_width(), edge.filter_height()],
stride=stride, weights_initializer=weights_initializer,
weights_regularizer=weights_regularizer, biases_initializer=None,
activation_fn=None, scope=’conv’)
elif edge.type == IDENTITY:
pass
else:
raise NotImplementedError()
return tensor
The training and evaluation (Section 3.4) is done in a fairly standard way, similar to that in the tensorflow.org tutorials for
image models. The individual’s fitness is the accuracy on a held-out validation dataset, as described in the main text.
Parents are able to pass some of their learned weights to their children (Section 3.6). When a child is constructed from a
parent, it inherits IDs for the different sets of trainable weights (convolution filters, batch norm shifts, etc.). These IDs are
embedded in the TensorFlow variable names. When the child’s weights are initialized, those that have a matching ID in
the parent are inherited, provided they have the same shape:
graph = tf.Graph()
Large-Scale Evolution
with graph.as_default():
# Build the neural network using the ‘Model‘ class and the ‘DNA‘ instance.
...
tf.Session.reset(self._master)
with tf.Session(self._master, graph=graph) as sess:
# Initialize all variables
...
# Make sure we can inherit batch-norm variables properly.
# The TF-slim batch-norm variables must be handled separately here because some
# of them are not trainable (the moving averages).
batch_norm_extras = [x for x in tf.all_variables() if (
x.name.find(’moving_var’) != -1 or
x.name.find(’moving_mean’) != -1)]
# These are the variables that we will attempt to inherit from the parent.
vars_to_restore = tf.trainable_variables() + batch_norm_extras
# Copy as many of the weights as possible.
if mutated_weights:
assignments = []
for var in vars_to_restore:
stripped_name = var.name.split(’:’)[0]
if stripped_name in mutated_weights:
shape_mutated = mutated_weights[stripped_name].shape
shape_needed = var.get_shape()
if shape_mutated == shape_needed:
assignments.append(var.assign(mutated_weights[stripped_name]))
sess.run(assignments)
S2. FLOPs estimation
This section describes how we estimate the number of floating point operations (FLOPs) required for an entire evolution
experiment. To obtain the total FLOPs, we sum the FLOPs for each individual ever constructed. An individual’s FLOPs
are the sum of its training and validation FLOPs. Namely, the individual FLOPs are given by Ft Nt + Fv Nv , where Ft is
the FLOPs in one training step, Nt is the number of training steps, Fv is the FLOPs required to evaluate one validation
batch of examples and Nv is the number of validation batches.
The number of training steps and the number of validation batches are known in advance and are constant throughout the
experiment. Ft was obtained analytically as the sum of the FLOPs required to compute each operation executed during
training (that is, each node in the TensorFlow graph). Fv was found analogously.
Below is the code snippet that computes FLOPs for the training of one individual, for example.
import tensorflow as tf
tfprof_logger = tf.contrib.tfprof.python.tools.tfprof.tfprof_logger
def compute_flops():
"""Compute flops for one iteration of training."""
graph = tf.Graph()
with graph.as_default():
# Build model
...
# Run one iteration of training and collect run metadata.
# This metadata will be used to determine the nodes which were
# actually executed as well as their argument shapes.
run_meta = tf.RunMetadata()
with tf.Session(graph=graph) as sess:
feed_dict = {...}
_ = sess.run(
Large-Scale Evolution
[train_op],
feed_dict=feed_dict,
run_metadata=run_meta,
options=tf.RunOptions(trace_level=tf.RunOptions.FULL_TRACE))
# Compute analytical FLOPs for all nodes in the graph.
logged_ops = tfprof_logger._get_logged_ops(graph, run_meta=run_metadata)
# Determine which nodes were executed during one training step
# by looking at elapsed execution time of each node.
elapsed_us_for_ops = {}
for dev_stat in run_metadata.step_stats.dev_stats:
for node_stat in dev_stat.node_stats:
name = node_stat.node_name
elapsed_us = node_stat.op_end_rel_micros - node_stat.op_start_rel_micros
elapsed_us_for_ops[name] = elapsed_us
# Compute FLOPs of executed nodes.
total_flops = 0
for op in graph.get_operations():
name = op.name
if elapsed_us_for_ops.get(name, 0) > 0 and name in logged_ops:
total_flops += logged_ops[name].float_ops
return total_flops
Note that we also need to declare how to compute FLOPs for each operation type present (that is, for each node type in the
TensorFlow graph). We did this for the following operation types (and their gradients, where applicable):
• unary math operations: square, squre root, log, negation, element-wise inverse, softmax, L2 norm;
• binary element-wise operations: addition, subtraction, multiplication, division, minimum, maximum, power, squared
difference, comparison operations;
• reduction operations: mean, sum, argmax, argmin;
• convolution, average pooling, max pooling;
• matrix multiplication.
For example, for the element-wise addition operation type:
from tensorflow.python.framework import graph_util
from tensorflow.python.framework import ops
@ops.RegisterStatistics("Add", "flops")
def _add_flops(graph, node):
"""Compute flops for the Add operation."""
out_shape = graph_util.tensor_shape_from_node_def_name(graph, node.name)
out_shape.assert_is_fully_defined()
return ops.OpStats("flops", out_shape.num_elements())
S3. Escaping Local Optima Details
S3.1. Local optima and mutation rate
Entrapment at a local optimum may mean a general lack of exploration in our search algorithm. To encourage more
exploration, we increased the mutation rate (Section 5). In more detail, we carried out experiments in which we first
waited until the populations converged. Some reached higher fitnesses and others got trapped at poor local optima. At this
point, we modified the algorithm slightly: instead of performing 1 mutation at each reproduction event, we performed 5
mutations. We evolved with this increased mutation rate for a while and finally we switched back to the original singlemutation version. During the 5-mutation stage, some populations escape the local optimum, as in Figure 4 (top), and none
Large-Scale Evolution
get worse. Across populations, however, the escape was not frequent enough (8 out of 10) and took too long for us to
propose this as an efficient technique to escape optima. An interesting direction for future work would be to study more
elegant methods to manage the exploration vs. exploitation trade-off in large-scale neuro-evolution.
S3.2. Local optima and weight resetting
The identity mutation offers a mechanism for populations to get trapped in local optima. Some individuals may get
trained more than their peers just because they happen to have undergone more identity mutations. It may, therefore,
occur that a poor architecture may become more accurate than potentially better architectures that still need more training.
In the extreme case, the well-trained poor architecture may become a super-fit individual and take over the population.
Suspecting this scenario, we performed experiments in which we simultaneously reset all the weights in a population that
had plateaued (Section 5). The simultaneous reset should put all the individuals on the same footing, so individuals that
had accidentally trained more no longer have the unfair advantage. Indeed, the results matched our expectation. The
populations suffer a temporary degradation in fitness immediately after the reset, as the individuals need to retrain. Later,
however, the populations end up reaching higher optima (for example, Figure 4, bottom). Across 10 experiments, we find
that three successive resets tend to cause improvement (p < 0.001). We mention this effect merely as evidence of this
particular drawback of weight inheritance. In our main results, we circumvented the problem by using longer training
times and larger populations. Future work may explore more efficient solutions.
| 9cs.NE
|
1
Dispersion and Line Formation in Artificial Swarm
Intelligence
DONGHWA JEONG and KIJU LEE, Case Western Reserve University
1.
INTRODUCTION
One of the major motifs in collective or swarm intelligence is that, even though individuals follow
simple rules, the resulting global behavior can be complex and intelligent. In artificial swarm systems,
such as swarm robots, the goal is to use systems that are as simple and cheap as possible, deploy
many of them, and coordinate them to conduct complex tasks that each individual cannot accomplish
[Cao 1995; Simmons 2000; Sahin 2005]. The system may involve a group of artificially intelligent
agents with limited sensing, communication, and computing capabilities and can achieve a higher
level task by the agents locally or globally collaborating with each other. Local collaboration can be
established among the neighbors within a certain communication range or physical/social distance.
Global collaboration can be realized by centralized control possibly with a designated leader.
Global shape formation is one of the challenging problems in artificial swarm intelligence. In nature,
it is performed for various purposes, such as engergy saving and path optimization. For instance, a
flock of large birds fly together while forming a V shape in order to reduce the air resistance and
fatigue for physically weak birds [Weimerskirch 2001]. Ants form a line to optimize the path to a food
source by laying a trail of pheromone and regulate foraging activities without any central control or
spatial information [Prabhakar 2012; Gordon 2013]. This trail enables the ant colony find the shortest
path to the food source [Bonabeau 2000]. Shape formation in artificial intelligence systems is usually
required for specific task-oriented performance, including 1) forming sensing grids [Spears 2004], 2)
exploring and mapping in space, underwater, or hazardous environments [Nawaz 2010; Wang 2011],
and 3) forming a barricade for surveillance or protecting an area/person [Cheng 2005]. This paper
presents a dynamic model of an artificial swarm system based on a virtual spring damper model and
algorithms for dispersion without a leader and line formation with an interim leader using only the
distance estimation among the neighbors.
2.
DYNAMIC MODEL OF COLLECTIVE SYSTEMS
Our dynamic model of swarm systems involving multiple agents is based on a virtual spring damper
model. To realize attractive and repulsive forces in a stable manner, virtual damper is added to the
spring system to depress the oscillatory motion of the agents. Modeling dynamic multi-agent systems
frequently requires global optimization by designing objective functions. As the number of agents increases, the computational cost for optimization increases exponentially. To address this problem, we
used geometric conditions that guarantee global shape formation from geometric primitives based on
the attractive and repulsive forces between the agents as shown in Fig. 1. Each node and edge represent an agent and a communication/sensing/social connection respectively where the spring constant
and damping ratio may be differently defined depending on each application. The mass of each node
may indicate the weight or relative importance of that agent within the group.
Let A1 , A2 , · · · , An be the agents in two-dimensional space. For the ith agent, the two-dimensional
th
th
Cartesian coordinate is denoted by ~xi = [xi , yi ]T . Likewise,
p the vector from the i agent to the j
T
2
2
agent is given by ~xij = [xi − xj , yi − yj ] where ||~xij || = (xi − xj ) + (yi − yj ) Assuming that the
Collective Intelligence 2014.
1:2
•
D. Jeong and K. Lee
Fig. 1. Attractive and repulsive forces between the nodes are modeled with a spring and a damper.
ith agent has a mass, mi . Then it follows the Newton’s second law: f~im = mi ~x¨i where f~im is the force
at the ith node and ~xi is its position. The force exerted by the spring and damper is described by
f~ik = −kij d~ij and f~ib = −bij ~x˙ ij where kij is the spring constant, bij is the damping coefficient between
agent i and neighboring agent j, and d~ij is a displacement vector between the two. In this model, each
agent knows the distances to its neighbors only. However, d~ij is expressed as a vector since the sum
of multiple interactions to an agent will force the agent to a certain direction in the global coordinate
system. The net force acting on the ith agent in the global coordinate can be derived as
X
f~im = f~ik + f~ib = −
(kij d~ij + bij ~x˙ ij )
j∈Mi
th
where M
Pi is the ~number˙ of neighboring agents of the i agent. The acceleration is calculated as
¨
~xi = − j∈Mi (kij dij + bij ~xij )/mi . In practical control with a microprocessor, the above equation can
be rewritten in discrete time representation given by
X
~x˙ i [t + 1] − ~x˙ i [t] = −
(kij d~ij + bij ~x˙ ij [t])/mi .
j∈Mi
In case of mi = 1 for all i = 1, · · · , n, the anticipated velocity and position at t + 1 and t + 2 are given by
X
X
~x˙ i [t + 1] = ~x˙ [t] −
(kij d~ij + bij ~x˙ ij [t]); ~xi [t + 2] = 2~xi [t + 1] − ~xi [t] −
(kij d~ij + bij ~x˙ ij [t]).
j∈Mi
3.
j∈Mi
DISPERSION AND LINE FORMATION
Algorithms
Two algorithms are introduced here: 1) dispersion based on trigonal plannar elements without a leader
and 2) line formation using paired line elements using an interim leader.
Fig. 2. Elementary geometric shapes: (a) trigonal planar and (b) paired line.
Collective Intelligence 2014.
Dispersion and Line Formation in Artificial Swarm Intelligence
•
1:3
Dispersion using trigonal planar elements. Let N be a set of dynamic agents. For every O ∈ N , label
the closest three neighbor agents as A, B, and C. By using the proposed attractive and repulsive forces,
let LOA = LOB = LOC = Ld where Ld is the desired distance between the agents.
Lining using paired line elements. Let N be a set of dynamic agents. For every O ∈ N , label the
closest agent as A. Let LOA = and form a pair, (O, A). Find the nearest pair and label as (B, C). Let
LOB = LOC = LAB = LAC . Note that LOB = LOC for LOA = LBC = as → 0. When all rectangulars
are connected each other, two ends are designated as interim leaders of the connected chains in order
to stretch the line to opposite directions.
Simulation Results
MATLAB simulation is performed with 50 agents randomly spread in two-dimensional space. The
simple trigonal elements guarantee dispersion of the agents and paired line elements guarantees line
shape while maintaining connectivity as shown in Fig. 3 and 4. If each agent has a limited sensing/communication range, the system may result in multiple disc formation or outliers. Fig. 5 shows
the simulation results for two different communication ranges.
Fig. 3. Dispersion based on trigonal planar elements
Fig. 4. Line formation using paired line elements
Fig. 5. Separated discs and connected disc with different sensing range: (a) 40 inch, (b) 60 inch with 100 agents
Collective Intelligence 2014.
1:4
•
D. Jeong and K. Lee
REFERENCES
Y U. Cao, A S. Fukunaga, A B. Kahng, and, F. Meng. 1995. Cooperative mobile robotics: antecedents and directions. IEEE/RSJ
International Conference on Intelligent Robots and Systems 1, 226–234.
R. Simmons, D. Apfelbaum, W. Burgard, D. Fox, M. Moors, S. Thrun, and, H. Younes. 2000. Coordination for Multi-Robot
Exploration and Mapping. AAAI/IAAI .
E. Sahin. 2005. Swarm Robotics: From Sources of Inspiration to Domains of Application. Swarm Robotics, Lecture Notes in
Computer Science ,3342, 10–20.
H. Weimerskirch, J. Martin, Y. Clerquin, P. Alexandre, and, S. Jiraskova. 2001. Energy saving in flight formation. Nature ,413,
697–698.
S. Shen, N. Michael, Y. Mulgaonkar, and, V. Kumar. 2013. Vision-based State Estimation for Autonomous Rotorcraft MAVs in
Complex Environments. IEEE International conference on Robotics and Automation .
R. W. Beard, J. Lawton, and, F. Y Hadaegh. 2001. A coordination architecture for spacecraft formation control. IEEE Transactions on control Systems Technology ,9, 777–790.
E. Bonabeau, and, G. Theraulaz. 2000. Swarm Smarts. Scientific American ,282(3).
B. Prabhakar, N. Dektar. Katherine, and, D. Y. Gordon. 2012. The Regulation of Ant Colony Foraging Activity without Spatial
Information. PLoS Comput Biol ,8(8).
D. Y. Gordon. 2013. The rewards of restraint in the collective regulation of foraging by harvester ant colonies. Nature ,498.91–93
X. Li, and, X. Liang. 2011. A 3D Local Interaction Strategy for Swarm Robot. Journal of computers ,6(10).2237–2242.
C. M Breder. 1954. Equations descriptive of fish schools and other animal aggregations. Ecology ,35.361–370.
S. Sakai. 1973. A model for group structure and its behavior. Biophysics Japan ,13. 82–90.
H. S Niwa. 1994. Self-organizing dynamic model of fish schooling. J. Theor. Biol. ,171.123–136.
J. A Beecham, and, K. D Farnsworth. 1999. Animal group forces resulting from predator avoidance and competition minimization. J. Theor. Biol. ,198.533–548.
K. Warburton, and, J. Lazarus. 1991. Tendency-distance models of social cohesion in animal groups. J. Theor. Biol. ,150.473–488.
W. M Spears, D. F Spears, J. C Hamann, and, R. Heil. 2004. Distributed, Physics-Based Control of Swarms of Vehicles.
Autonomous Robots ,17.137–162.
S. Nawaz, M. Hussain, S. Watson, N. Trigoni, and, P. N Green. 2010. An Underwater Robotic Network for Monitoring Nuclear
Waste Storage Pools. Sensor Systems and Software ,24.236–255.
Y. Wang, A. Liang, and, H. Guan. 2011. Frontier-based multi-robot map exploration using Particle Swarm Optimization. Swarm
Intelligence , 1–6.
J. Cheng, W. Cheng, and, R. Nagpal. 2005. Robust and self-repairing formation control for swarms of mobile agents. AAAI ,
59–64.
Collective Intelligence 2014.
| 9cs.NE
|
arXiv:1508.07547v2 [cs.PL] 22 Mar 2016
Protocol Programming: A Connection
of the Digital World
Yanping Chen,1∗ Qinghua Zheng,1 Ping Chen2
1
2
Xi’an Jiaotong University, China
University of Massachusetts Boston, USA
E-mail: [email protected], [email protected], [email protected]
The current computer programmings encapsulate attributes and behaviours
into objects, but miss the mechanism to support the connection among objects.
A programming paradigm is presented to connect all objects. The connection
supports communications. Protocols are defined to coordinate the behaviours
between objects, which enable the interaction of objects across different platforms. The connection also provides an efficient mechanism to support the
concurrency, parallelism, distribution, pipeline and adaptability, etc. They
can be governed transparently, autonomously, even adaptively. In this paper,
an implementation is also discussed to show the effectiveness of protocol programming.
Connection is the norm
The connection between entities is an important aspect of the world. Large objects as celestial
bodies or small objects as biomolecules are connected, by gravity or conjugation, and organized
into a galaxy or an organism. The connection should not be treated as an attribute of an object.
It has a powerful influence on the connected objects. For example, gravity controls trajectories
of celestial bodies, chemical reactions determine the transformation between substances. And
relations, e.g., food chain, heredity, etc. judge the fittest and influence the evolution of species.
The connection condenses substances into the cosmos, synthesizes amino acid and brings the
life. All things are influenced or developed by connecting with others.
1
In this article, we define “connection” as the channel for interactions between objects. Usually interactions are not random, they show a clear pattern. The patterned interaction is referred
to as “communication” in this paper. The connection supports communications between objects. It is the core idea of our method, we give an example for easier understanding. Let’s
consider the ocean, the land and the sky as a platform for the the biological world. Animals
wander around the platform. It should be emphasized that the ability for an animal to ramble
is important, referred to as “autonomy”. It enables animals to change to fit its surroundings.
Strolling animals are connected by inhabiting or encountering with each others. In the wild,
passing each other does nothing about the communication. The communication between them
is established by giving birth to, feeding, preying, fighting, etc.
In the digital world, to imitate or encode a system under a programming paradigm, the modularity is an important issue, which supports structured programming. Modules (e.g., classes
or functions (1, 2)) are used to encapsulate objects and partition a system into different parts.
However, in practice, it is common that a complex problem can not be perfectly partitioned. For
example, to design a building, some parts of a building (e.g., the water supply or power system)
are difficult to be encapsulated. This is also known as the crosscutting issue (3). It makes the
code tangled and increases the cost of communication among developers when designing and
developing a system (4). Furthermore, in object-oriented programming, an object is merely
nested in another object as a member variable. The inner object is restricted by the holder that
difficult to be shared with others. It also sacrifices the autonomy of an object, making it difficult
to update independently.
Without a mechanism to support the connection appropriately, a hard partition hurts the
communications between objects. In the traditional programming paradigms, various approaches
are applied to support communications between objects. For example, objects can be used as
function parameters or member variables of other objects. Inheritance is used to represent relations between classes. It does nothing about the communication unless static members are
defined in the declaration (5). Then instantiated objects can share the same variables for communications. Others such as message passing, semaphore, shared memory, socket, etc. are
widely adopted to support communication. Because the lack of the connection between objects,
these approaches are used to support the communication weakened by separating a system into
discrete parts. Traditionally, the connection as a mechanism to support communications has received less attention. The communications between objects are temporary and irregular, mainly
used to exchange data or control resource competition if required. It is rarely formalized as a
2
connection mechanism to support communications.
Compared to the traditional paradigms, connection in protocol programming is developed
into a new territory. Under the protocol programming, programming is divided into two steps:
protocol implementation and domain implementation. Protocol implementation builds an infrastructure to support the communication between objects. Protocols are defined to control
the communication between them. By inheritance from a protocol implementation all instantiated objects are automatically connected into a network. Domain implementation is developed
by traditional programming paradigms, encapsulating attributes and behaviours into objects.
While supported by protocol implementation, partitioning a system into discrete models and
reorganizing them become easier and more effective.
Connection creates possible
Building a system is usually not a trivial matter. It is often partitioned into discrete modules
(e.g., procedures, functions, objects, agents, aspect, etc.), then a team is set up to implement
each module separately. It is generally accepted that a modular design is the key to successful
programming. All programming paradigms have mechanisms to support structured programming, where the modularity is guaranteed. Systems developed by structured programming have
good stability, efficiency, maintainability and expansibility. The main obstacle for structured
programming is that some problems are difficult to be partitioned. In some projects, design
decision is scattered throughout a system. A hard partition breaks the connections between
modules and hurts the communications between them.
In the digital world, to support the partition and connection between modules, many program paradigms are developed, e.g., agent-oriented programming (6), aspect-oriented programming (7). Based on message passing, mechanisms are proposed for communicating between
threads or processes (e.g., Message Passing Interface (8), Erlang (9), Hoare et al. (10)). The
communication across different systems are also designed (e.g., MapReduce (11), serviceoriented computing (12), CORBA (13)). In a program, mechanisms (e.g., semaphore, shared
memory, socket, message passing) are used to support the communication between partitioned
modules. Because implementation of these mechanisms is not transparent to programmers,
it may lead to many issues such as mutual exclusion, interrupts, data conflict, resource competition, etc. When building a system, these mechanisms increase the burden of design and
implementation, and make the code difficult to understand and maintain. Furthermore, when a
3
system is complex enough, partitioning it, defining the interfaces and integrating every part are
very challenging. The cost to design, develop and maintain such a system and the communication between developers are increased considerably (4).
To better illustrate our ideas, we analyse two systems (the Internet and the biosphere), which
show the motivation of protocol programming.
Since the invention of packet switching theory (14), for half a century, the Internet has expanded into a huge system with billions of access points and numerous applications (15). At
the dawn of computer communication (16), it is difficult to foresee that human society can build
such a complex system. Despite various techniques are developed to accelerate the growth of the
Internet, the most important technique is the Internet protocol deigned for the open-architecture
network environment. Under the internet protocols, every equipment is independently connected into the Internet and the information between them are routed automatically. The Internet protocol hides the underneath implementation of connected modules. By following the
Internet protocol, each part of the Internet can conveniently interact with each other across heterogeneous platforms or systems. Moreover, because the Internet protocol is a connectionless
service, each part can be updated independently.
The biosphere is a largely self-regulated system. The earth can be seen as a platform for life
to compete. Individual organisms of the earth encounter on the land, in the air or the water. The
connection (encounter) is an important aspect for life on the earth. After the connection was
constructed, the interaction between them is not random. They follow inherent patterns (e.g.,
foster, prey, competition, hereditary and variation) in the same way as the protocol. Life in the
biosphere is ruled by these patterns, referred to as laws in biology. Hereditary and variation are
two important laws determining the survival of a species and the evolution of the living nature.
Many factors can disturb the natural stability of the biosphere, e.g., the geographical or climatic
factor, the species diversity and the food chain, etc. They are the motive force for the species
variation. The variation enables that a species can adapt to the environmental change. “survival
of the fittest” ensures that the suitable change is inherited. Accumulated changes in individuals
or species give rise to the evolution of the species.
Designing or constructing a system like the Internet or the biosphere in one step is far beyond
human ability. They are not built, but evolved. Five characteristics can be induced from such
systems. Each system should consist of modules or individuals that are mutually independent,
which enables the separableness. Individuals can interact with each other and the connection
is guaranteed. The interactions between individuals are not random, they follow predefined
4
or evolved patterns. Then the communication between them is established. For a system that
supports evolution, individuals have the ability to change, which enables the fittest is reserved,
and the adaptability is possible.
A system is a set of interdependent and interacting modules (components or individuals),
which forms an integrated whole. If partitioned modules are unrelated, the system is static and
inactive, shows no interaction. In a dynamic, autonomous or adaptive system, the interconnectivity between modules is required. The separableness ensures that a system can be partitioned
into modules, so each module can be designed or developed independently. It is the premise
for concurrency, parallelism and distribution. Modules of a system can be connected by structural, functional, behavioural relationships. The connection bands partitioned modules together.
Then the interaction between modules would occur frequently. Many interactions are not random. They will show some kind of patterns (e.g., protocols and laws in the Internet and the
biosphere). These patterns are the manufactured products of the communication, which makes
them coordinate, compete, develop and struggle for existence. The connection supports communications. In traditional paradigms of the digital world, the communication is supported by
limited approaches, e.g., semaphore, shared memory. They are mainly designed for exchanging
data between partitioned modules in a system. No valid channel is provided for every object
that they can communicate without any constraints.
Motivated by issues discussed above, a protocol programming paradigm is presented for
designing and implementing a system. Protocols are predefined communicating patterns. They
are used to connect and coordinate each module in a system. In this paradigm, programming is
divided into two aspects: protocol implementation and domain implementation. Protocol implementation provides a platform for connecting or coordinating instantiated objects. Domain
implementation can use the traditional methods to encapsulate objects. But supported by a protocol implementation, when designing and encoding a system, the development process become
simple. Because the communication can be designed to be connectionless, modules can have
the ability to update itself without stopping the system.
In order to show the methodology of protocol programming, next, we give a simple discussion about the implementation developed in our work.
5
Protocol Implementation
Our protocol implementation has two layers: transmission layer and service layer. The transmission layer supports the connection, providing a channel for communication. In this layer, a
protocol is designed to establish a thread network, referred to as the connecting network. The
service layer supports the connected objects to register, require and execute a service according
to a defined protocol. The framework about the programming paradigm is shown in Figure 1.
Object
2
Working Thread
2
2
2
Domain Layer
Domain Imp.
2
Acting Thread
Service Layer
Connecting Thread
Configuring Thread
Connecting Network
Transmission Layer
Protocol Imp.
Executing Thread
Figure 1: Protocol Programming Architecture
The protocol implementation is divided into different layers. Each layer is implemented by
a class. If a class implements a non-bottom layer, this class should inherit from a parent class
that implements a lower layer. It is better that each layer is designed to be transparent, only the
interface is known by the upper layer the same as the OSI model (17). Every object instantiated from the transmission layer is connected into the connecting network, where all messages
between objects are transmitted automatically. In the service layer, the service configuration,
registration, request and execution are performed. In the domain layer, each object implements
specific work. Next, the paradigm is discussed.
In the protocol implementation, the connection and communication are done by transmitting
messages from one thread to another. Unlike transmitting an IP package through the Internet,
in a local environment, all messages share the same memory space. Therefore, only the address
of message is posted between threads. The structure of a message is given as follows, where
6
PMessage is a class. Every message is an instantiation of this class or its sub-class.
PMessage{
LAYER m Layer;
ACTION m Action;
ADD m Intend;
ADD m Creator;
bool m NeedEchoF lag;
size t m T imeT oLive;
TIME m CreateT ime;
vectorhADDi m Route v;
vectorhstringi m P aram v; }
The LAYER and ACTION are enumerated data types. The field m Layer is used to indicate
which layer a message should be delivered for further processing. Three types are defined, representing each layer respectively. Each layer supports a certain numbers of actions suggested
in the field m Action. The ADD represents the address (or identification) of an object. The
fields m Intend and m Creator are the destination and creator of a message. In the field
m NeedEchoF lag, a true value indicates that a response is required by m Creator. The
m T imeT oLive is a hop count used to limit a message’s lifetime. The m CreateT ime can
be used to line up arrived messages for avoiding problems such as data access violation when
accessing a critical resource. When a message is transmitted through the network, the field
m Route v can be used to record the route information. The field m P aram v stores parameters of message.
Transmission Layer
The main purpose of the transmission layer is to build an infrastructure for message transmission. We design a class named as PTrans to do this. Three threads are created in each
instantiated object of PTrans: configuring thread, connecting thread and acting thread, used for
configuration, connection and action respectively. They run concurrently.Five kinds of actions
are defined in the transmission layer: CONFIG, HELLO, ECHO, TICK and EXIT.
All messages are posted through the connecting thread. A connecting thread retrieves messages from its message queue. If a message’s destination matches itself, the message is taken
off. Otherwise, it is retransmitted according to a routing protocol. Because other messages in
its message queue may be waiting for transmitting, it is not reasonable to spend too much time
for processing a message in the connecting thread. The connecting thread pushes its message
7
into a transmitting message list and return immediately. All messages in the list are processed
by the acting thread. If the message list is empty, the acting thread is blocked. If a message is
added, the connecting thread sets a semaphore. Then the acting thread is waken up to process
the arrived message.
In protocol programming, the most important problem is how to make every object connected. The topology of connecting network determines the strategy to establish it. In our
implementation, we design a tree structure. The object in the structure also is referred to as
node. The Master is the root of the structure and a leaf node is an object without any child. In
our implementation, every object is identified by the connecting thread handle. The child object
(the child) is used as a member variable of a parent object (the parent). The child has its parent’s
connecting handle as a parameter for initialization. Then, after all objects are initialized, except
the root object, every object knows its parent’s connecting handle.
After a child is initialized, using parent’s connecting handle, the child reports its connecting
handle to its parent by posting a CONFIG message, then waits for a response. The parent
collects the child’s identification from the message and posts a message in return. After this
process, each pair of parent and child know the connecting threads between each other. All
configuring threads exist except that in the Master, which will be running until the system
terminates.
The configuring thread in Master broadcasts a HELLO message to all its children to start a
connecting process. The Master will wait until all responses of its children are returned. After
a HELLO is received from its parent, every object also broadcasts a HELLO to its children.
It responds an ECHO to its parent in two conditions: all feedbacks from children are returned
or it has not child at all. In a concurrent environment, some threads may be blocked or suspended, if a time-out error occurs,, the Master can restart a new connecting process. When
children’s ECHO arrive at the Master, it means that every object is instantiated successfully.
A connecting tree structure is established.
All messages are transmitted in the connecting network. If there is no message to process, a
connecting thread is blocked by calling a GetMessage(&msg, ...) function. A blocked connecting thread is aroused by arrived messages. Because all threads are running concurrently that
some threads may be jammed or blocked, the TICK message is used to check the state of an
object. The EXIT is used for system to exit. Every node retransmits this message to its children.
All nodes from the leaves to the root will release its resources and send a response to its parent.
It the arrived message does not belong to the transmission layer, the acting thread calls a
8
pure virtual function Trans Outlet to process it.
Interface
The connecting thread and the Trans Outlet are the interface between the transmission layer
and the service layer. In the service layer, a requirement is submitted by using the handle as
parameter to post messages, and the Trans Outlet is overridden to provide services.
Service Layer
In this paper, a domain service (or a service for short) is defined as a function that can be
executed to support a request in an application. It is provided in the domain layer. The service
layer doesn’t provide any domain service. The major function of the service layer is to supervise
the services provided in the domain layer.
The service layer is implemented by a PService class inherited from the PTrans. The pure
virtual function Trans Outlet in transmission layer is overridden in the PService class. Because the PTrans is inherited, any object instantiated from the PService class is automatically
connected into the connecting network. If a matched message cannot be processed in the transmission layer, the function Trans Outlet will be called. Three actions are defined in the service
layer: REG, REQ and ACK.
Because the implementation of service layer is transparent and independent from the domain
service. Therefore, the service layer should be given the information about a domain service.
A PServicedepict class is defined to contain this information, named as the service description. Each service must have a service description. The content of the service description is
introduced next.
The service register is started by the Master through broadcasting a REG message to its
children. The REG message is spread from the root node to all leaf nodes. Every node collects
service descriptions from its children and reports all services it knows to its parent. When the
service description transmits through the connecting network, routing information is collected.
With this protocol, every object contains service descriptions about it and its children. The
Master knows the all services in a system.
If a service is requested by an object, it is done by packaging a REQ message into the
connecting network, where the name of the service and possible parameters are filled. In our
implementation, a string matching strategy is used to match a service. When requesting a
9
service, the synchronization and asynchronization should be considered. In asynchronously
calling, the object keeps going after a requirement was posted. Otherwise, it is blocked to wait
an ACK message. The message is packaged by calling a requesting function defined in the
PService class, then transmitted from the requesting object towards the Master. If an object
has a service description matching this requirement, the message is retransmitted to the provider
directly by routing information in the service description.
If a REQ message arrives at its provider, the message is appended into a local message
list of the PService class, named as the service message list. An executing thread defined in
the class is always waiting for processing each message respectively. Two approaches can be
used to implement a service: a thread or a function. Their addresses are stored in the service
description. In the service description, two fields are declared to indicate which approach is
supported and whether or not the service is reenterable.
Many mechanisms can be designed to support the execution of a service. For example, for
a specific service, if the service is executed by a thread, then the service message can be posted
into the thread directly. If a service is declared in a class in the domain layer, then for each
arrived message, a new object of the class can be instantiated to handle this service. If the codes
are reenterable, it is possible to create a new thread to process each message separately and
concurrently. Furthermore, the dynamic scheduling can be designed to support the load balancing. These mechanisms are automatically supervised in the service layer. Only the service
descriptions are shared between the service layer and the domain layer.
After a REQ message is executed, if a response is required in the synchronously calling, it
will return an ACK message.
Interface
One interface of the service layer is the requesting function, where the REQ message is generated and posted into the connecting network. Another interface is a service description list. It is
a member variable of the PService class used by the domain layer to report its services.
Domain Implementation
In domain implementation, the traditional programming methods can be used to provide the
domain services. However, by inheriting a protocol implementation, all instantiated objects are
connected into the connecting network. Every connected object can communicate with each
10
other by predefined protocols. Therefore, the difficulty to partition a problem into discrete tasks
is reduced. Following the predefined protocol, every module can be developed independently.
Because the concurrency, distribution, or load balancing, etc. can be supported transparently by
the protocol implementation, it also reduces the burden to develop the domain implementation.
Evaluation
Three classes, inherited from the PService, are declared in the domain layer. Each provides
a toy service, named as Service1, Service2 and Service3. They separately execute 1 × 106 ,
2 × 106 and 1 × 106 Floating Multiply Instructions (FMI). Three objects are instantiated from
each class respectively. They are connected into a connecting network with a Master object
instantiated from the PService class.
In the first experiment, the monotone model runs every service in a single function without
transmitting message. In the sequence model, the Master orderly executes each service by
synchronously posting the REQ message to the three objects. In the pipeline model, the objects
are organized in a line and asynchronously called from one to another. They are executed
simultaneously. Because the computation complexity of the Service2 is doubled, it becomes
the bottleneck in the pipeline model. In the super pipeline, two objects are instantiated to
provide the Service2 service. Running time1 of the four models is shown in Figure 2(a).
5
16
14
105
104
103
4
10
Speedup
Time (sec.)
12
106
Monotone
Sequence
Pipeline
Super pipeline
8
6
3
2
4
1
2
100 200 300 400 500 600 700 800 900 1000
100 200 300 400 500 600 700 800 900 1000
Rounds
Rounds
(a) Time Consuming
(b) Speedup of Super Pipeline
Figure 2: Evaluation of Protocol Programming
In Figure 2(a), the performance of the monotone model can be seen as a benchmark. In the
1
The evaluation uses a Window 7 OS with Intel i5-2400 3.10GHz 4 Core CPU and a 8 GB memory.
11
sequence model, because synchronously calling is used, the time consuming is increased due to
message transmitting. In the pipeline model, the expense caused by transmitting messages can
be offset by allowing the services to be processed simultaneously. The super pipeline has a load
balancing mechanism, therefore, the highest performance is received.
In Figure 2(b), the speedup2 of the super pipeline model is compared using different numbers of FMI. When the number of FMI is decreased exponentially in each service, the speedup
is decreased accordingly. When the number of FMI is decreased to 103 , the cost of transmitting
message negated the superiority of the super pipeline. Therefore, the speedup is less than 1.
The implementation has a very high speedup, because, instead of a single thread, multi
threads are used to implement the services. The main advantage of protocol programming is
that the concurrency is managed automatically by the protocol implementation.
Discussion
In protocol programming, three types of objects exist: the Master object, the Server object
and the Router object. The Master is designed for governing a system. It is also helpful to
use multi-master objects in a system. Each performs a specific assignment. The Server refers
to the object who provides the service. A Router is a node, which only transmits messages and
no service or management is assigned. It can can be used to organize a system or partition the
message space. In a system, mixed objects can be used.
After a system is initialized, every object inherited from the PService class will have at
least three threads. All communications between them are performed by message transmitting.
Therefore, the concurrency is naturally supported. When a system is running, objects can be
added or erased from the connecting network dynamically, which can be used to support the
dynamic scheduling and the load balancing.
Because the connecting network provides a connectionless service to all objects, the service
provided by the program can be updated without stopping the system. Other methods developed in the Internet protocol can be introduced for the protocol implementation, e.g., domain
name service, error control, structured naming strategy, etc. In addition to keeping the program
and the service description locally, Both can be registered and stored in a remote server, then
accessed though the Internet. If a service is supported in a remote system, the message can be
transmitted across the Internet and executed in the remote system. If possible, the program can
2
It is computed by dividing the time consuming in the monotone model and the super pipeline model.
12
also be downloaded directly and run locally.
In summary, the advantages of the protocol programming include: (a) a novel paradigm for
programming is presented, which divides the process into two aspects: protocol implementation
and domain implementation. (b) the connection as a mechanism to support communication for
programming is emphasized and developed. (c) protocols are designed to control the communication between objects, which enables the communications across heterogeneous programs,
systems and the Internet. (d) Because one protocol implementation can be shared by different
applications, it ensures a broad range of code reuse. (e) mechanism such as concurrency, parallelism, distribution, pipeline and adaptability, etc. can be governed transparently, autonomously,
even adaptively. (g) it supports the autonomy of objects, which enables an object to update itself
when the system is running.
References
1. P. Hudak, ACM Computing Surveys 21, 359 (1989).
2. D. J. Armstrong, Communications of the ACM 49, 123 (2006).
3. T. Elrad, M. Aksit, G. Kiczales, K. J. Lieberherr, H. Ossher, Communications of the ACM
44, 33 (2001).
4. F. P. Brooks, The mythical man-month, vol. 1995 (Addison-Wesley Reading, MA, 1975).
5. R. J. Wirfs-Brock, R. E. Johnson, Communications of the ACM 33, 104 (1990).
6. Y. Shoham, Artificial intelligence 60, 51 (1993).
7. G. Kiczales, et al., Aspect-oriented programming (Springer, 1997).
8. W. Gropp, E. Lusk, N. Doss, A. Skjellum, Parallel computing 22, 789 (1996).
9. J. Armstrong, R. Virding, C. Wikström, M. Williams (1993).
10. C. A. R. Hoare, Communications of the ACM 21, 666 (1978).
11. J. Dean, S. Ghemawat, Communications of the ACM 51, 107 (2008).
12. M. P. Papazoglou, Proceedings of the WISE ’03 (IEEE, 2003), pp. 3–12.
13
13. J. Siegel, Communications of the ACM 41, 37 (1998).
14. L. Kleinrock, RLE Quarterly Progress Report 1 (1961).
15. B. M. Leiner, et al., ACM SIGCOMM Computer Communication Review 39, 22 (2009).
16. T. Marill, L. G. Roberts, Proceedings of the AFIPS ’66 (ACM, 1966), pp. 425–431.
17. H. Zimmermann, IEEE Transactions on Communications 28, 425 (1980).
14
| 6cs.PL
|
arXiv:1711.06504v1 [cs.CV] 17 Nov 2017
Detecting hip fractures with radiologist-level
performance using deep neural networks
William Gale∗, Gustavo Carneiro
School of Computer Science
The University of Adelaide
Adelaide, SA 5000
[email protected]
[email protected]
Luke Oakden-Rayner∗, Lyle J. Palmer
School of Public Health
The University of Adelaide
Adelaide, SA 5000
{luke.oakden-rayner,lyle.palmer}
@adelaide.edu.au
Andrew P. Bradley
Faculty of Science and Engineering
Queensland University of Technology
Brisbane, QLD 4001
[email protected]
Abstract
We developed an automated deep learning system to detect hip fractures from
frontal pelvic x-rays, an important and common radiological task. Our system
was trained on a decade of clinical x-rays (≈53,000 studies) and can be applied to
clinical data, automatically excluding inappropriate and technically unsatisfactory
studies. We demonstrate diagnostic performance equivalent to a human radiologist
and an area under the ROC curve of 0.994. Translated to clinical practice, such
a system has the potential to increase the efficiency of diagnosis, reduce the need
for expensive additional testing, expand access to “expert level” medical image
interpretation, and improve overall patient outcomes.
1 Introduction
Hip fractures represent a significant clinical and public health problem worldwide. They are among
the most common causes of hospitalisation, morbidity, and mortality1 in the elderly, with a lifetime
risk of 17.5% for women and 6% for men2 . The all-cause mortality rate is over 20% within one year,
and less than 50% of patients regain the ability to live independently3.
Diagnosis of a fracture is usually made with pelvic x-ray imaging, and such imaging accounts for 6%
of all imaging referrals from the emergency department at our institution, a tertiary public hospital.
To limit misdiagnosis, 5-10% of at-risk patients undergo further imaging, including additional xrays, nuclear medicine bone scans, computed tomography (CT), or magnetic resonance imaging
(MRI), of which only a third demonstrate a fracture4 . Not only does this increase diagnostic costs
and resource utilisation, but without access to these advanced imaging modalities (for example in
remote and under-serviced regions) delayed or missed diagnosis is likely to result in worse patient
outcomes including increased mortality rate5 , length of hospitalisation6 , and cost of care7 .
Recent advances in medical image analysis using deep learning8 have produced automated systems
that can perform as well as human experts in some medical tasks9,10 . Deep learning is a computer
science method that can be used to teach computers to recognise patterns that are useful in discriminating between groups of images, such as images with or without a certain disease8 .
* These authors contributed equally to the work
Highly sensitive and specific automation of hip fracture assessment using x-ray studies would lead
to earlier and more accurate diagnosis and hence improve patient outcomes. Such automation would
also reduce the need for expensive CT and MRI studies, which could improve service efficiency and
increase access to highly accurate detection of hip fractures in under-serviced regions. Automation
could also improve reproducibility, given the reported variation in diagnostic certainty among human
experts of different experience levels11 . Here we investigate the application of deep learning using
convolutional neural networks (CNNs) for the task of fracture detection, and present the first large
scale study where a deep learning system achieves human-level performance on a common and
important radiological task.
2 Dataset
2.1 Developing ground truth labels for hip fractures
Hip fractures are a promising target for machine learning approaches because of the availability of
near-perfect ground truth labels. Clinically, patients with hip fractures do not remain undetected.
Because of the weight bearing nature of the region, clinically ’silent’ fractures rapidly progress to
severe pain and immobility. As such, all patients with hip fractures that have imaging in a hospital
should be identified in the radiology reports, the orthopaedic operative records, or the mortality
records. While a small subset of patients may be lost to the records (due to hospital transfers, for
example), our clinical experience suggests that the ground-truth label accuracy will be >99%.
2.2 Obtaining and efficiently labelling our dataset
Data for this study were obtained from the clinical radiology archive at the The Royal Adelaide
Hospital (RAH), a large tertiary teaching hospital. Ethics approval was granted by the RAH human
research ethics committee. All pelvis x-rays between 2005 and 2015 were included in the study,
obtained with a wide variety of equipment used across the decade during normal clinical practice.
Initial fracture labels were obtained by combining the orthopaedic surgical unit records, and findings
from the radiology report archive (using regular expressions). This combination of sources resulted
in labelling accuracy of around 95%, evaluated on the hold out test set (described below) which was
labelled manually by a radiologist using all of the available sources of information. To improve this
further while avoiding the need for manual review of the entire dataset, a deep learning model was
trained on the original labels and the false positive cases that this model identified were reviewed
by a radiologist. As the "default" label for a case was negative (i.e., the case was not present in
the orthopaedic database, nor had matching keywords in the radiology report), the majority of label
errors were unrecognised fractures (which a well-trained model identifies as false positives). This
process was repeated several times, and finally a single review of the false negatives was performed.
This process improved the label accuracy on the hold-out test set from around 95% to >99.9%, while
only requiring 3371 cases to be labeled by an expert (7.4% of the dataset). All manual review of
cases was performed by a consultant radiologist (Dr Oakden-Rayner).
Each case provided two images, one from each hip, resulting in a total dataset of 53,278 images.
These were randomly divided into a training set (45,492 images), a validation set (4,432 images) for
model selection, and a held-out test set (3,354 images). There was no overlap of patients between
the sets. The test set included only images referred from the emergency department (ED), which was
considered the most clinically challenging setting, where lateral films and cross-sectional imaging
are often not immediately available and management is often required prior to a formal radiology
report. The prevalence of fractures among the patients in the test set was 19%, which is the clinical
prevalence in the ED at our centre. The prevalence of fractures among patients in the training and
validation sets was lower (≈12%) due to the presence of outpatient and inpatient cases.
To ensure an unbiased set of labels for model evaluation, the entire test set was reviewed manually.
2.3 Managing medical data heterogeneity
To deal with the variation inherent in clinical studies, the dataset was processed with a series of
artificial neural networks. Firstly, a small CNN (CNN-frontal) was trained to identify frontal pelvis
x-rays within each “case”, which often include other images like lateral hip films, chest, and spinal
x-rays, requiring the network to learn to discriminate between gross anatomical features. Secondly,
2
Model
Training set
Validation set
Precison
Recall
Accuracy
Parameters
CNN-frontal
CNN-bounding
CNN-metal
581 cases
300 cases
5330 cases
300 cases
440 cases
300 cases
>0.99
>0.99
>0.99
1.0
>0.99
0.97
>0.99
2,408
746,624
11,792
Table 1: Performance of pre-processing deep learning models. CNN-frontal: identifies frontal pelvic
x-rays, and excludes all other images. CNN-bounding: localises the neck of femur region for extraction. CNN-metal: excludes cases with metal in the region of interest. The CNN-metal training set
was identified using regular expressions to find appropriate keywords from the radiology reports.
a regression-based CNN (CNN-bounding) was trained to localise the neck of femur, which is the
only location where a relevant fracture could occur. This reduced the input size of the x-rays from
over 3000 x 3000 pixels to a much more manageable 1024 x 1024 pixels, while maintaining image resolution. This task is more challenging than that of CNN-frontal, as it requires the system
to localise fine-grained anatomical landmarks. Finally, a third CNN (CNN-metal) was trained to
exclude cases with implanted metal from hip fractures and other similar operations (which represent
a separate diagnostic challenge). Each network was trained on a small volume of data, requiring less
than one hour of annotation effort by a radiologist. In Table 1 we present the performance of these
models on unseen validation data. The accuracy of CNN-bounding is estimated by manual review
of a held out test set, where adequacy was defined as coverage including the femoral head, and the
greater and lesser trochanters.
3 Methods
3.1 Model selection
To analyse the pelvic x-rays, we applied a type of CNN known as a DenseNet12 . This architecture
utilises extensive feed-forward connections between the layers, which is thought to improve feature
propagation in these networks.
The validation set was used to determine the following hyper-parameters (using a grid search strategy): the layer width (number of units per layer), the choice of activation function and leak rate, the
use of a secondary loss function, the types and extent of data augmentation, the level of regularisation, and the learning rate.
The final network was 172 layers deep, with 12 features/units per layer (a total of 1,434,176 parameters). We used leaky relu13 non-linear activations with a leak rate of 0.5 and pre-activation batch
normalisation14. The model optimised two loss functions; a primary loss related to the presence
or absence of fractures, and a secondary loss to learn more specific fracture location information
(intra-capsular, extra-capsular, and no fracture). This was motivated by similar approaches which
improved performance in previous work9,10.
We applied extensive data augmentation, consisting of small translations, rotations, and shears, as
well as histogram matching to account for the residual variation in pixel values even after processing (a common issue with medical images). Each augmentation technique resulted in an absolute
improvment of around 0.01 AUC on the validation set.
The network was regularised with a dropout15 rate of 0.2 and a weight decay rate of 1e-5. The
network was trained via stochastic gradient descent using the Adam optimiser16 , with a learning rate
of 0.0001. The network was trained for 25 epochs, with a batch size of 14. The system was trained
using PyTorch17 on a on a workstation comprised of a hexa-core Intel i7-6850k processor, 64GB of
DDR4 RAM and two 12GB NVidia Titan X Pascal graphics cards, resulting in a wall-clock training
time of around 22 hours for the final model.
We also compared the performance of our model against a ten layer fully-convolutional CNN with
4,722,944 parameters, and pre-trained deep neural networks that required downsampling of the input
images. The DenseNet had significantly higher performance on the validation data (absolute AUC
improvement = 0.035 in both cases).
3
3.2 Evaluation
The algorithm was evaluated using a hold-out test set containing 3,354 images, with 348 fractures.
We compared the performance of the algorithm against recently published work on automated hip
fracture detection18, as well as against the original radiology reports to achieve an estimate of human
expert performance.
3.3 Estimating human performance
Our task of identifying hip fractures using only a frontal pelvic x-ray is a common clinical one, as
often the frontal film is the only test that is available to make this diagnosis. However, assessing human performance from radiology reports is confounded by the fact that other sources of information
can be available at the time of reporting, and the role that this information plays in the diagnosis is
usually unstated in the radiology report. Sources of such information could include discussions with
clinicians (including physical examination and surgical findings), or other imaging such as lateral xray images or follow-up films (such as repeat x-ray, CT or MRI). At our centre the x-ray reports are
often only finalised several hours after imaging, which allows radiologists to “peek” at any follow
up imaging.
To provide the strongest possible baseline we generate an estimate of the “upper bound” of human
performance. That is, we assume that no unstated information was used to report the films. A report
is only considered a human error if it provides the wrong diagnosis (later proven on follow-up), if
it clearly states that additional information was required to makle the diagnosis (i.e., a lateral film),
or it is unequivocal that further imaging will be necessary to make a diagnosis. When reports had
vague wording or it was unclear if the radiologist was recommending further imaging, we treated
the stated diagnosis as the result of the frontal x-ray only. For example, "there is a subtle fracture,
consider CT to confirm" would be treated as a finding of a fracture, but "equivocal appearance, CT
recommended" or "the fracture was only demonstrated on the lateral film" would both be considered
a failure to make the diagnosis with the frontal film alone.
4 Results
Figure 1 shows the receiver operator characteristic curve for our model on the hold-out test data.
The human upper bound performance is also presented as a point in ROC space.
Figure 1: ROC curve showing the performance of the model with AUC 0.994, with a point reflecting
the optimistic upper bound of human performance.
4
Model
Accuracy
Precision
Recall
F1
Our model
Kazi et al. (STN)
Kazi et al. (LBM)
Kazi et al. (UBM)
0.97
0.84 (-13)
0.81 (-16)
0.88 (-9)
0.99
0.74 (-27)
0.76 (-25)
0.91 (-8)
0.95
0.93 (-2)
0.84 (-11)
0.85 (-10)
0.97
0.82 (-15)
0.80 (-17)
0.88 (-9)
Table 2: Comparison against recent research. STN: spatial transformer network. LBM: lower bound
model. UBM: upper bound model. The upper bound model presented by Kazi et al. required human
localisation of the neck of femur region, our system performs this localisation automatically.
Model
Acc (CI95% )
Prec (CI95% )
Rec (CI95% )
F1 (CI95% )
Radiologist (estimate)
Our results (high prec)
Our results (high sens)
0.99 (99-100)
0.99 (99-100)
0.99 (99-100)
0.93 (90-95)
0.97 (95-99)
0.92 (89-94)
0.97 (95-99)
0.92 (89-95)
0.95 (92-97)
0.95 (93-97)
0.95 (93-97)
0.94 (92-97)
Table 3: Comparison against estimated human baseline. The upper bound of human performance is
estimated from the original (clinical) radiology reports for the test set cases. This reflects the upper
limit of human performance given the data as we assume the radiologists used no additional information other than the frontal pelvic x-rays for their diagnoses (which is unlikely). As demonstrated,
there is no significant difference between the human upper bound estimate and our model at either
operating point on this dataset.
In Table 2 we compare our model to recently published results on automated hip fracture detection18 .
Kazi et al. developed several models using a dataset of 669 frontal pelvic x-rays. They split these
cases into two separate hip images, resulting in 900 images for training and 270 for testing. Their
test data had a prevalence of 50% and they presented results at a single operating point for each
model. For consistency, we present results here with a similar data distribution (prevalence = 50%)
using all 348 fractures from our test set and 348 randomly selected non-fracture test cases. This
subset was selected so the performance metrics were comparable (given the use of precision in Kazi
et al., which varies with prevalence).
In Table 3 we present results for the entire larger test set (348 fractures and 2997 non-fractures),
comparing our results against the performance on the original radiology reports. Note that in these
tests the radiologists often had access to more information than our models, including any lateral
x-rays, clinical information and follow-up studies. We present the performance of our system at two
operating points, with high precision and high recall. Confidence intervals are calculated using exact
Clopper-Pearson intervals20 .
5 Discussion
We present a deep learning model that achieves human-level performance at the important radiology
task of hip fracture detection in a large-scale study, and demonstrate state of the art performance
compared to recently published work in this area by a large margin. The ROC AUC value of 0.994
is, to the best of our knowledge, the highest level ever reported for automated diagnosis in any largescale medical task, not just in radiology. Furthermore, unlike in previous work, our fully automated
pipeline can take in any frontal pelvis x-ray and exclude ineligible cases, localise the neck of femur,
and identify the presence of proximal femoral fractures automatically. Our research shows that
despite the challenges specific to radiological image data, the development of large, clean datasets
is sufficient to achieve high-level automated performance with deep-learning systems.
Our method of using small CNNs trained on small labeled datasets (300 cases for each model,
taking less than one hour for an expert to annotate each dataset) made processing clinical image
data practical. Many of these ’simple’ tasks such as anatomy localisation can be achieved with
very high accuracy with only a modest expert time commitment. Likewise, our process of iterative
labelling using partially trained neural networks (where an expert reviews the false positives and
false negatives rather than the entire dataset) allowed us to improve label accuracy from around 95%
to over 99.9% while only hand-labelling 7.4% of the dataset.
5
We also show several further new results; that high performance (AUC = 0.994) can be achieved
without pre-training of models (for example, on ImageNet data as demonstrated in Gulshan et al. and
Esteva et al.9,10 ), and that very deep networks are useful in this setting. While these results should
be expected given the results of CNNs in image analysis more generally, we have anecdotally seen
many discussions around these points and we hope our findings can help to answer these concerns.
Baseline human performance on this task is difficult to estimate due to the presence of unreported
external sources of information which can contribute to diagnostic decisions, and the use of inexact
language by radiologists. While we are confident that our upper bound estimate of human performance is optimistic, and our team is currently working to test our system against human experts
directly in a controlled environment.
References
[1] Brauer, C. A., Coca-Perraillon, M., Cutler, D. M. & Rosen, A. B. Incidence and mortality of hip fractures
in the United States. Jama 302, 1573-1579 (2009).
[2] Kannus, P. et al. Epidemiology of hip fractures. Bone 18, S57-S63 (1996).
[3] Morrison, R. S., Chassin, M. R. & Siu, A. L. The medical consultant’s role in caring for patients with hip
fracture. Annals of internal medicine 128, 1010-1020 (1998).
[4] Cannon, J., Silvestri, S. & Munro, M. Imaging choices in occult hip fracture. The Journal of emergency
medicine 37, 144-152 (2009).
[5] Shiga, T., Wajima, Z. i. & Ohe, Y. Is operative delay associated with increased mortality of hip fracture
patients? Systematic review, meta-analysis, and meta-regression. Canadian Journal of Anesthesia 55, 146
(2008).
[6] Simunovic, N., Devereaux, P. & Bhandari, M. Surgery for hip fractures: Does surgical delay affect outcomes? Indian journal of orthopaedics 45, 27 (2011).
[7] Shabat, S. et al. Economic consequences of operative delay for hip fractures in a non-profit institution.
Orthopedics 26, 1197-1199 (2003).
[8] LeCun, Y., Bengio, Y. & Hinton, G. Deep learning. Nature 521, 436-444 (2015).
[9] Gulshan, V. et al. Development and validation of a deep learning algorithm for detection of diabetic retinopathy in retinal fundus photographs. JAMA 316, 2402-2410 (2016).
[10] Esteva, A. et al. Dermatologist-level classification of skin cancer with deep neural networks. Nature 542,
115-118 (2017).
[11] Collin, D., Dunker, D., Göthlin, J. H. & Geijer, M. Observer variation for radiography, computed tomography, and magnetic resonance imaging of occult hip fractures. Acta Radiologica 52, 871-874 (2011).
[12] Huang, G., Liu, Z., Weinberger, K. Q. & van der Maaten, L. Densely connected convolutional networks.
arXiv preprint arXiv:1608.06993 (2016).
[13] Maas, A. L., Hannun, A. Y., and Ng, A. Y. (2013). Rectifier nonlinearities improve neural network acoustic
models. In Proc. ICML, volume 30.
[14] Ioffe, S. & Szegedy, C. in International Conference on Machine Learning. 448-456.
[15] Srivastava, N., Hinton, G. E., Krizhevsky, A., Sutskever, I. & Salakhutdinov, R. Dropout: a simple way to
prevent neural networks from overfitting. Journal of Machine Learning Research 15, 1929-1958 (2014).
[16] Kingma, D. & Ba, J. Adam: A method for stochastic optimization. arXiv preprint arXiv:1412.6980 (2014).
[17] Paszke, A., Gross, S. & Chintala, S. (2017).
[18] Kazi, A. et al. in International Workshop on Machine Learning in Medical Imaging. 70-78 (Springer).
6
| 1cs.CV
|
CLASSIFICATION OF PLETHORIES IN
CHARACTERISTIC ZERO
arXiv:1701.01314v1 [math.AC] 5 Jan 2017
MAGNUS CARLSON
Abstract. We classify plethories over fields of characteristic zero,
thus answering a question of Borger-Wieland and Bergman. All
plethories over characteristic zero fields are linear, in the sense that
they are free plethories on a bialgebra. For the proof we need some
facts from the theory of ring schemes where we extend previously
known results. We also classify plethories with trivial Verschiebung
over a perfect field of non-zero characteristic and indicate future
work.
Contents
1. Introduction
1
Notation and conventions
3
Acknowledgements
4
2. Ring schemes
4
3. Plethories and k − k-birings.
8
4. Classification of plethories over a field of characteristic zero. 11
5. Some classification results in characteristic p > 0.
13
References
17
1. Introduction
Plethories, first introduced by Tall-Wraith [13], and then studied by
Borger-Wieland [3], are precisely the objects which act on k-algebras,
for k a commutative ring. There are many fundamental questions regarding plethories which remain unanswered. One such question is,
given a ring k, whether one can classify plethories over k, in this paper
we will take a first step towards a classification.
For some motivation, let us start by looking at the category of modules Modk over a commutative ring k. If we consider the category of
representable functors Modk → Modk , there is a monoidal structure
given by composition of functors. Then one defines a k-algebra R as
a k-module R together with a comonad structure on the representable
endofunctor Modk (R, −) ∶ Modk → Modk with respect to composition
Date: January 6, 2017.
1
2
MAGNUS CARLSON
of functors. Heuristically, this says that a k-algebra is precisely the
kind of object which knows how to act on k-modules. This can be extended to a non-linear setting, so that instead of looking at k-modules
we look at k-algebras Algk and consider representable endofunctors
Algk → Algk . A comonoid with respect to composition of functors is
then called a plethory and analogously, a plethory is what knows how
to act on k-algebras. One particular important example of a plethory
is the Z-algebra Λ which consist of the ring of symmetric functions in
infinitely many variables with a certain biring structure. The functor
Algk (Λ, −) ∶ Algk → Algk represents the functor taking a ring R to its
ring of Witt vectors. Using plethories one gets a very conceptual view
of Witt vectors and in [2] James Borger develops the geometry of Witt
vectors using the plethystic perspective.
Let now k be a field. If we let P k denote the category of plethories over
k, there is a forgetful functor
F ∶ P k → Bialgk
into the category of cocommutative counital bialgebras over k. This
functor has a left adjoint S(−) ∶ Bialgk → P and we say that a plethory
P is linear if P ≅ S(Q) for some cocommutative, counital bialgebra Q.
Heuristically, a plethory P is linear if every action of P on an algebra
A comes from an action of a bialgebra on A. The main theorem of this
paper is:
Theorem 1.1. Let k be a field of characteristic zero. Then any kplethory is linear.
This answers a question of Bergman-Hausknecht [1, p.336] and BorgerWieland [3] in the positive. The theorem is proved by studying the
category of affine ring schemes. We have the following results, extending those of Greenberg [8] to arbitrary fields and not necesarily reduced
schemes:
Theorem 1.2. Let k be a field. Then any connected ring scheme of
finite type is unipotent.
Theorem 1.3. Let P be a connected ring scheme of finite type over
k. Then P is affine.
For the case of characteristic p > 0 our classification results on plethories
are not as complete and further work is needed to have a complete
classification. To explain our classification results here we need some
definitions. Let Fk be the Frobenius homomorphism of k and k⟨F ⟩
be the non-commutative ring which as underlying set is k[F ] and has
multiplication given by
F i F j = F i+j
CLASSIFICATION OF PLETHORIES IN CHARACTERISTIC ZERO
3
and
F a = Fk (a)F.
We define
to be the category of cocommutative, counital bialgebras over k which also are modules over k⟨F ⟩. Once again, for a
plethory over a perfect field k of char k > 0 there is a forgetful functor
Bialgkp
P k → Bialgkp
which has a left adjoint S[p] . Call a plethory P p-linear if P ≅ S[p] (Q)
for some Q ∈ Bialgkp . We have then the following classification result:
Theorem 1.4. Let k be a perfect field of characteristic p > 0. Assume
that P is a plethory over k such that the Verschiebung VP = 0. Then
P is p-linear.
The structure of this paper is as follows. In section 2 we study ring
schemes and prove some results which we will need for our classification theorem. The main theorems of this section that are needed for
later purposes are Theorem 2.6 and Theorem 2.7. In section 3 we introduce plethories and k − k-birings and provide some examples. This
section contains no new results and gives just a brief introduction to
the relevant objects as defined in Borger-Wieland [3]. In section 4 we
prove that all plethories over a field k of characteristic zero is linear
using the results from section 2. We also show that any k − k-biring
is connected. In section 5 we prove some initial classification results
regarding plethories in characteristic p > 0.
Notation and conventions
Ring
BRk,k
Pk
Bialgk
Bialgkp
⊙
Algk
+
∆A , ∆×A
ǫ+A , ǫ×A
βA
+
∆2 , ∆×2
category of commutative and unital rings.
category of k − k-birings.
category of k-plethories.
category of cocommutative k-bialgebras.
category of cocommutative k-p-bialgebras.
composition product of k − k-birings, Def. 3.2.
category of commutative algebras over the ring k.
coaddition resp. comultiplication map for a biring A.
counit for coaddition resp. comultiplication for a biring A.
co-k-algebra strucutre on a k − k-biring A.
abbreviation for the composite (1 ⊗ ∆+ ) ○ ∆+ resp. (1 ⊗ ∆× ) ○
∆× .
P primitive elements functor
OX structure sheaf of a scheme X.
Schk category of k-schemes for k a commutative ring.
Ga the affine line viewed as a group scheme, see Ex. 3.1
Gm the multiplicative group scheme, after Def. 2.5.
4
MAGNUS CARLSON
µp the p-th root of unity group scheme, Ex. 5.2
αp see Ex. 3.3
π0 (G) the group scheme of connected components of a group scheme
G over the field k, Def. 4.2
S free plethory functor on a cocommutative bialgebra. Def. 4.1
[p]
S
free plethory functor on a cocommutative p-bialgebra, after
Def. 5.1.
○
G the identity component of a group scheme G.
FG , VG the Frobenius resp. Verschiebung morphism of a group scheme
G over a perfect field of characteristic p > 0.
k⟨F ⟩ the twisted polynomial algebra.
For us, all rings are commutative and unital. We will use Sweedler
(1)
(2)
notation for coaddition ∆+ and ∆× , so that ∆+ (x) = ∑i xi ⊗ xi and
[1]
[2]
∆× (x) = ∑i xi ⊗ xi if x ∈ A where A is a biring. For concepts from
the theory of group schemes not introduced properly here, we refer to
[11] or [6] .
Acknowledgements. I am very grateful to James Borger who supplied me with the conjecture for characteristic zero and the idea of
”weakly linear” plethories. He has been more than generous with his
knowledge and many of the ideas in this paper come from conversations
with him. I also thank David Rydh and Lars Hesselholt for the many
useful comments they gave which helped improve the quality of this
article. I would also like to thank my advisor Tilman Bauer for his
support and for his many thoughtful suggestions on this article.
2. Ring schemes
Let k be a commutative ring. Recall that R is a ring scheme over k if
R is a scheme together with a lift of the functor
Schk (−, R) ∶ Schk → Set
to Ring. We say that a ring scheme is a k-algebra scheme if the lift
factors through the category of k-algebras. We will mostly be concerned
with affine ring schemes. Ring schemes were studied by Greenberg in [8]
and he showed that for connected, reduced ring schemes of finite type
over an algebraically closed field k, the underlying scheme is always
affine. Further, he shows that the underlying group variety is always
unipotent. We improve on these results by showing that any connected
ring schemes of finite type over an arbitrary field is affine, and that the
underlying group scheme is always unipotent. From now on, in this
section, k is always a field.
Definition 2.1. A k-scheme X is anti-affine if OX (X) = k. We say
that a group scheme is anti-affine if its underlying scheme is anti-affine
CLASSIFICATION OF PLETHORIES IN CHARACTERISTIC ZERO
5
For example, abelian varieties are all anti-affine group schemes. An
anti-affine group scheme has the property that any morphism from
it into an affine group scheme is trivial. Anti-affine groups are very
important for the structure of group schemes as the following theorem
shows:
Theorem 2.2 ([4, Theorem 1]). If G is a group scheme of finite type
over a field k there is an exact sequence of group schemes
0 → Gant → G → G/Gant → 0
such that Gant is anti-affine and G/Gant is affine.
We will now want to show that all connected finite type ring schemes
are affine, i.e that in the above exact sequence Gant = Spec k. For this,
we will need the following lemma.
Lemma 2.1. Let X, Y, Z be k-schemes with X quasi-compact and antiaffine and Y locally noetherian and irreducible.Suppose that f ∶ X ×Y →
Z is a morphism such that there exist k-rational points x0 ∈ X, y0 ∈ Y
such that f (x, y0 ) = f (x0 , y0 ) for all x. Then f (x, y) = f (x0 , y) for all
x, y.
Proof. see [4, Lemma 3.3.3.].
Theorem 2.3. Let R be a connected ring scheme of finite type over
k. Then R is affine.
Proof. We know by Theorem 2.2 that R sits in the middle of an extension of an affine group scheme by an anti-affine group. Let
0 → Rant → R → Raf f → 0
be the corresponding extension where Rant is anti-affine and Raf f the
affine quotient. Since R is of finite type, Raf f is a ring scheme. This
follows from the fact that if X, Y are quasi-compact k-schemes, then
the obvious map OX (X)⊗k OY (Y ) → OX×k Y (X ×k Y ) is an isomorphism
(see [4, Lemma 2.3.3.]). This implies that Rant defines an ideal scheme
in R, i.e for all rings S over k, Rant (S) is an ideal of R(S). Now, we will
apply the above lemma with Y = R (note that R is irreducible) and
X = Z = Rant . Taking x0 = eRant and y0 = eR to be the rational points
corresponding to the additive identity of Rant (k) and R(k) respectively,
we have that m(x, y0 ) = m(x0 , y0 ) is identically equal to zero. Thus, we
have that m(x, y) = m(x0 , y) is identically zero. But, letting 1R be the
rational point corresponding to the multiplicative identity of R(k) we
have that m(x, 1R ) is zero. But multiplication by 1 is always injective,
and thus, Rant is trivial and R is affine.
We don’t know if the condition for R to be of finite type is necessary in
2.3. Let us recall the following definition from the theory of algebraic
groups.
6
MAGNUS CARLSON
Definition 2.4. Let G be a commutative group scheme over k. We say
that G is unipotent if it is affine and if every non-zero closed subgroup
H of G admits a non-zero homomorphism H → Ga .
The data of a homomorphism G → Ga is the same as specifying an
element x ∈ AG in the underlying Hopf algebra of G that satisfies
∆G (x) = x⊗1 +1 ⊗x, i.e specifying a primitive element. If G = Spec AG
is an affine group scheme and AG the Hopf algebra associated to G,
then saying that G is unipotent is the same as saying that it is coconnected (or conilpotent). The following definition will be useful for the
proof of Theorem 2.6.
Definition 2.5. Let G be a commutative affine group scheme over a
field. We say that G is multiplicative if every homomorphism G → Ga
is zero.
An example of a multiplicative group is Gm = Spec k[x, x−1 ]. There
can in general be no homomorphism from a multiplicative group into
a unipotent group and no morphisms from a unipotent group to a
multiplicative group (for a proof, see [11, Corollary 15.19-15.20]).
The following theorem was shown for reduced ring varieties over an
algebraically closed fields by Greenberg, but the results carry over for
perfect fields without any modification. We improve on this by carrying
through the proof when R is not necesarily reduced and over any field
k. Further,the theorem can be extended to ring schemes not necesarily
of finite type if the ring scheme is already known to be affine.
Theorem 2.6. Over a field k, all connected ring schemes R of finite
type are unipotent.
Proof. By Theorem 2.3, a connected ring scheme is affine. We know
that R contains a greatest multiplicative subgroup Rm that has the
property that for all endomorphisms α of RS , (where RS is the base
change of R to S) for S a k-algebra, that α((Rm )S ) ⊂ (Rm )S ([11,
Theorem 17.16]). Thus, since any x ∈ R(k) defines an endomorphism
of R (as a group scheme) through multiplication by x, we have that Rm
is an ideal of R. It is known that any action of a connected algebraic
group on a multiplicative group must be trivial, i.e for G connected and
H multiplicative, a map G → Aut(H, H) must have image the identity.
We will need the following, which says that any map G → End(H, H)
where G is any connected group scheme and H is multiplicative is
trivial. This is basically just deduced, mutatis mutandis, from the
proof of [11, Theorem 14.28]. So, we see that 0 and 1 defines the same
endomorphisms on the ideal scheme Rm . But this is only the case if
Rm = 0.
To extend this to all connected ring schemes, we need the following:
Theorem 2.7. Let k be a field and R be an affine ring scheme over k.
Then R is a filtered limit of ring schemes of finite type.
CLASSIFICATION OF PLETHORIES IN CHARACTERISTIC ZERO
7
Proof. The following proof is inspired by the analogue theorem for Hopf
algebras over a field, as occurs in for example Milne [11, Prop. 11.32].
Write R = Spec AR . We know that AR is a bialgebra and we see that we
can reduce to proving that any a ∈ AR is contained in a sub-bialgebra of
finite type. Let ∆+ ∶ AR → AR ⊗ AR be the coaddition giving the additive group structure on R and ∆× ∶ AR → AR ⊗AR the comultiplication
defining the multiplication on R. Consider
∆+2 (a) = ∑ ci ⊗ xij ⊗ dj
i,j
with ci and dj linearly independent. Now, by the fundamental theorem
of coalgebras, we know that if we take X to be the subspace of AR
generated by {xij }, then this is a subcoalgebra, i.e that ∆+ (xij ) ⊂
X ⊗ X. Now, for each xij in this system, consider
∆×2 (xij ) = ∑ ei ⊗ ykl ⊗ fl
k,l
with ei and fl linearly independent. With the same arguments, one sees
that for the subspace Y generated by {ykl } we have ∆× (ykl ) ⊂ Y ⊗ Y.
Let now Z be subalgebra generated by the finite-dimensional subspace
spanned by {xij , ykl }. We claim that Z actually is closed under both
the operation ∆+ and ∆× . It is clear that
∆× (xij ) ⊂ Z ⊗ Z
and the same holds for coaddition. It is also easy to verify that
∆× (ykl ) ⊂ Z ⊗ Z. We will now prove that ∆+ (ykl ) ⊂ Z ⊗ Z and for
this, consider the following diagram which is easily verified if we reverse all arrows and think of it in terms of rings.
∆×
AR
AR ⊗ AR
∆+
AR ⊗ AR
AR ⊗ AR
∆× ⊗∆×
AR ⊗ AR ⊗ AR ⊗ AR
AR ⊗ AR
1⊗T ⊗1
AR ⊗ AR ⊗ AR ⊗ AR
AR ⊗ AR
∆× ⊗1⊗1⊗∆×
AR ⊗ (AR ⊗ AR ) ⊗ (AR ⊗ AR ) ⊗ AR
1⊗T ⊗T ⊗1
(AR ⊗ AR ) ⊗ AR ⊗ AR ⊗ (AR ⊗ AR )
M ⊗1⊗1⊗M
AR ⊗ AR ⊗ AR ⊗ AR
AR ⊗ AR
∆× ⊗1
(AR ⊗ AR ) ⊗ AR
1⊗∆+ ⊗1
AR ⊗ AR ⊗ AR ⊗ A
8
MAGNUS CARLSON
Here M is the multiplication map and T swithces the factors. What
the diagram is saying, is just relating different ways of forming
abd + acd
for a, b, c, d in a ring. So this says, that
(1 ⊗ ∆+ ⊗ 1)(∆×2 (xij ) = ∑ ek ⊗ ∆+ (ykl ) ⊗ fl ∈ Z ⊗ Z ⊗ Z ⊗ Z.
k,l
Now, since ek are independent, this means that
∑ ∆+ (ykl ) ⊗ fl ∈ Z ⊗ Z ⊗ Z
l
and by linear independence of each fl this means that
∆+ (ykl ) ∈ Z ⊗ Z.
Now, let W be the sub-algebra generated by Z ∪ S(Z) where S ∶ AR →
AR is the antipode. It is easily verified that
∆+ ○ S = (S ⊗ S) ○ ∆+
and that
∆× (S(Z)) ⊂ W
follows from the identity
∆× ○ S = (1 ⊗ S) ○ ∆× .
We thus see that W is a bialgebra and we are done.
Corollary 2.2. Any affine connected ring scheme over a field is unipotent.
Proof. Indeed, we know that we can write P = lim Pi where Pi ranges
←Ð
over ring schemes of finite type. Now, unipotence is stable under inverse
limits and this immediately gives that P is unipotent.
3. Plethories and k − k-birings.
Let k be an arbitrary commutative ring. In this section we will recall
the definition of a plethory as defined in [3].
Definition 3.1. A k-biring A is a coring object in the category of
k-algebras. Explicitly, A is a k-algebra together with maps
∆+ ∶ A → A ⊗k A,
∆× ∶ A → A ⊗k A,
S ∶ A → A,
ǫ+ ∶ A → k
and ǫ× ∶ A → k such that:
CLASSIFICATION OF PLETHORIES IN CHARACTERISTIC ZERO
9
● The triple (∆+ , ǫ+ , S) defines a cocommutative Hopf algebra
structure on A with S the antipode and ǫ+ the counit.
● ∆× is cocommutative coassociative and codistributes over ∆+
and ǫ× ∶ A → k is a counit for ∆× .
We say that A is a k − k-biring if, in addition to the above data, it has
a map
β ∶ k → Ringk (A, k)
of rings, where we endow Ringk (A, k) with the ring structure induced
from the coring structure on A.
Equivalently, a k − k-biring A is just an affine scheme together with a
lift of the functor Ringk (A, −) to the category of k-algebras, i.e it is an
affine k-algebra scheme.
Example 3.1. Let define the k-algebra scheme which we will call Ga .
Ga will represent the identity functor Ringk → Ringk . The underlying
scheme of Ga is Spec k[e]. The coaddition and comultiplication is given
by ∆+ (e) = e ⊗ 1 + e ⊗ 1, ∆× (e) = e ⊗ e, the additive resp. multiplicative
counit by ǫ+ (e) = 0, ǫ× (e) = 1 the antipode by S(e) = −e and the co-klinear structure by β(c)(e) = c for all c ∈ k.
Example 3.2. Consider Z[e, x]. On e, we define all the structure maps
as in the previous example. We then define
∆+ (x) = x ⊗ 1 + 1 ⊗ x,
∆× (x) = x ⊗ e + e ⊗ x
and ǫ× (x) = ǫ+ (x) = 0, S(x) = −x. This Z-ring scheme represents the
functor taking a ring R to R[ǫ]/(ǫ2 ) , the ring of dual numbers over
that ring.
Example 3.3. Let k = Fq be a finite field of characteristic p and consider
αp = Spec k[e]/(ep )
as a group scheme where the group structure is induced from Spec k[e].
Define a multiplication
αp × αp → αp
by saying that xy = 0 for any x, y ∈ αp (R) for R a k-algebra. Consider
now the constant group scheme
Fq = ∐ k.
x∈k
Then we can define a structure of a ring scheme on Fq × αp by defining
the multiplication to be (x, y)(z, w) = (xz, xw + yz) for (x, y), (z, w) ∈
(Fq × αp )(R). This is a non-reduced ring scheme.
10
MAGNUS CARLSON
A famous example is also that the functor taking a ring R to W (R),
its ring of big Witt vectors, is also representable by a ring scheme.
Let us note that we can form the category of k − k-birings, with morphisms between objects those morphism of k-algebras respecting the
biring structure. We let BRk,k be the category of k − k-birings. Let us
recall the following definition from [3].
Definition 3.2. Let A be a k − k-biring. Then the functor
Ringk (A, −) ∶ Algk → Algk
has a left adjoint,
A ⊙k − ∶ Algk → Algk .
Explicitly, for a k-algebra R, A ⊙ R is the k-algebra generated by all
symbols a ⊙ r subject to the conditions that:
●
●
●
●
●
●
∀a, a′ ∈ A, r ∈ R, aa′ ⊙ r = (a ⊙ r)(a′ ⊙ r).
∀a, a′ ∈ A, r ∈ R, (a + a′ ) ⊙ r = (a ⊙ r) + (a′ ⊙ r).
∀c ∈ k, c ⊙ r = c.
(1)
(2)
∀a ∈ A, r, r ′ ∈ R, a ⊙ (r + r ′ ) = ∑i (ai ⊙ r)(ai ⊙ r ′ ).
[1]
[2]
∀a ∈ A, r, r ′ ∈ R, a ⊙ rr ′ = ∑i (ai ⊙ r)(ai ⊙ r ′ ).
∀a ∈ A, c ∈ k, a ⊙ c = β(c)(a).
It is easy to see that (⊗i Ai ) ⊙ R ≅ ⊗i (Ai ⊙ R) and that A ⊙ (⊗i Ri ) ≅
⊗i (A⊙Ri ). If further, R is a k−k-bialgebra, we note that A⊙R is a k−kbialgebra. Indeed, we have that Ringk (A⊙R, S) ≅ Ringk (R, Ringk (A, S))
and since the latter set has a ring structure, so does the former. One
then verifies that ⊙k gives a monoidal structure to BRk,k . The unit
of this monoidal structure is k[e]. BRk,k is a monoidal category, but
it is not symmetric. Now, the Yoneda embedding sets up an equivalence of categories between the category of representable endofunctors
Algk → Algk and BRk,k and under this equivalence, ⊙ corresponds to
○, composition of representable endofunctors as given in the introduction. Denote the category of representable endofunctors Algk k → Algk
by Algkend .
Definition 3.3. A k-plethory is a comonoid in Algkend where the monoidal
structure is composition of endofunctors. Explicitly, on the level of representing objects, a k-plethory P is a monoid in BRk,k . This means that
P is a biring together with an associative map of birings P ⊙ P → P
and a unit k[e] → P.
Remark 3.4. For a plethory P one can define an action of P on a
k-ring R to be a map ○ ∶ P ⊙ R → R such that (p1 ⊙ p2 ) ○ r = p1 ⊙ (p2 ○ r)
and e ○ r = r, ∀p1 , p2 ∈ P, r ∈ R. A ring R together with an action of P
on R is called a P -ring.
Example 3.5. If k is a finite ring, then k k , the set of functions k → k
is a plethory where ○ is given by composition of functions.
CLASSIFICATION OF PLETHORIES IN CHARACTERISTIC ZERO
11
4. Classification of plethories over a field of
characteristic zero.
In this section we will prove that all plethories over a field of characteristic zero are linear. This question was asked by Bergman-Hausknecht
[1] and Borger-Wieland [3]. To understand what it means for a plethory
to be linear, we will introduce some terminology.
Definition 4.1. Let A be a cocommutative bialgebra (not necesarily
commutative) over k with comultiplication ∆. Then there is a free kplethory on A over k. The underlying algebra structure is S(A), the
symmetric algebra on A, and the coaddition
∆+ ∶ S(A) → S(A) ⊗ S(A)
is induced from the map
A → S(A) ⊗ S(A)
sending a to a ⊗ 1 + 1 ⊗ a. The comultiplication ∆× is similarily induced
from ∆. The plethysm
○ ∶ S(A) ⊙ S(A) → S(A)
is given by
S(m)
S(A) ⊙ S(A) ≅ S(A ⊗ A) ÐÐ→ S(A)
where m is the multiplication on A. Among the pairs consisting of a
plethory P and a morphism of bialgebras f ∶ A → P the pair S(A) and
j ∶ A → S(A) is initial with this property.
Call a plethory P linear if P ≅ S(A) for some bialgebra A. The reason
for calling it linear is that if P ≅ S(A) for some bialgebra A then
Ringk (S(A), −) = Modk (A, −).
Let us note now that by Theorem 2.6 any connected ring scheme of
finite type is unipotent. Over Q (or more generally any field of characteristic zero) all group schemes are reduced by a theorem of Cartier.
We say that a group scheme G is étale if G is a finite scheme and geometrically reduced. This is equivalent to asking for the underlying
Hopf algebra AG to be an étale algebra. Let us recall the following
definition from the theory of group schemes (see for example [6, II, §5,
Proposition 1.8] or [11, Definition 9.4])
Definition 4.2. Let G be a group scheme of finite type over k. Let
AG be the underlying Hopf algebra of G and consider the largest étale
k-subalgebra π0 (AG ) of AG . π0 (AG ) then has a Hopf algebra structure
induced from the one on AG and we let π0 (G) = Spec π0 (AG ) be the
group scheme associated to this Hopf algebra.
Note that there is a canonical map G → π0 (G). It is easy to see that
if π0 (G) = Spec k, then G is geometrically connected since in that case
AG has no nontrivial idempotents.
12
MAGNUS CARLSON
Lemma 4.1. Any k-algebra scheme R of finite type over any infinite
field k is geometrically connected.
Proof. Consider the connected-étale exact sequence
0 → R○ → R → π0 (R) → 0
of group schemes where R○ is the identity component of R. We will first
show that π0 (R) has a natural k-algebra scheme structure. Indeed, for
this it is enough to show that R○ is a k-ideal scheme in R. Let us start
by proving that m(R○ × R) ⊂ R○ . We know that the multiplication
m ∶ R○ × R → R
takes the additive identity e ∈ R(k) to itself, i.e m(e, x) = e for any
x ∈ R(k). Further, the k-algebra structure on R○ is induced from the kalgebra structure on R. This clearly implies that R○ is a k-ideal scheme.
Thus, the quotient R/R○ ≅ π0 (R) is a k-algebra scheme. Let us see that
π0 (R) is isomorphic to Spec k. One knows that the underlying algebra
of π0 (R) is a product of finite separable k-extensions. We consider
Schk (π0 (R), π0 (R)), this is a k-algebra (since π0 (R) is a ring scheme).
Because the underlying algebra of π0 (R) is a finite product of finite
separable field extensions, Schk (π0 (R), π0 (R)) is a finite set. However,
for a finite set to have a k-algebra structure it must just contain one
element, i.e it has to be the zero ring. This implies that π0 (R) = Spec k
so R is geometrically connected.
Now, let us consider a Hopf algebra H and denote the primitive elements of H by P(H). We say that a Hopf algebra is primitively generated if P(H) generates H as an algebra. Over characteristic zero
all unipotent affine group schemes are primitively generated. We then
have the classical Milnor-Moore theorem [12].
Theorem 4.3. For any commutative connected affine unipotent group
scheme H over a field of characteristic zero, the canonical map
Spec H → Spec S(P(H))
is an isomorphism of group schemes. In particular, the underlying
scheme is affine space.
Remark 4.2. Let us note that we can view P(H) as a Lie algebra
with trivial commutator. Then the construction S(P(H)) is the same
as the universal enveloping Lie algebra of P(H).
In [3] it is shown that if Q is a plethory over a field k, then P(Q). the
+
primitives with respect to δQ
, is a cocommutative k-bialgebra. Briefly,
the multiplication in P(Q) is given by the plethysm ○ and the maps
∆× ∶ Q → Q ⊗ Q,
ǫ× ∶ Q → k induces a comultiplication respectively a counit on P(Q)
making it a cocommutative counital bialgebra.
CLASSIFICATION OF PLETHORIES IN CHARACTERISTIC ZERO
13
Theorem 4.4. Let Q be a plethory over a field of characteristic zero
k. Then Q is linear, i.e
Q ≅ S(P(Q))
where S(P(Q)) has the plethory structure as given in Definition 3.1.
Proof. Suppose that Q is a plethory over k. P(Q) naturally has a
bialgebra structure as explained above. Given this, we can form the
free plethory on P(Q), S(P(Q)). We always have a natural map
v ∶ S(P(Q)) → Q
of Hopf algebras, and this is bijective by Milnor-Moore. Thus to show
that any plethory is linear, it suffices to show that this is actually a
morphism of plethories. But this is clear: the pair S(P(Q)) and
j ∶ P(Q) → S(P(Q))
is initial in the category of pairs consisting of a plethory P and a morphism f ∶ P(Q) → P of bialgebras. It is immediate that the canonical
map v is induced by this universal property, when we note that there
clearly is a map P(Q) → Q of bialgebras. We will of course need to
show that v is an isomorphism in the category of plethories. This follows easily from the fact that v is an isomorphism of affine schemes and
thus has an inverse in the category of affine schemes. What remains to
be checked is that this inverse is a morphism of plethories, but this is
immediate since v is.
Corollary 4.3. Let k be a field of characteristic zero. Then the category of plethories over k is equivalent to the category of cocommutative
k-bialgebras.
Proof. By the above theorem, the counit map is an isomorphism and
it is immediate to see that the unit map is an isomorphism as well.
Remark 4.4. If k is a field of characteristic zero and Q a plethory over
k, this shows that the category of Q-rings is equivalent to the category
of rings with an action of the bialgebra P (Q).
5. Some classification results in characteristic p > 0.
In this section we will start a classification for plethories over a perfect field k of characteristic p. Our classification results here only apply to a certain class of plethories. We state future research directions, as well as give some ”pathological” examples which a complete
classification must take into account. For any scheme X over k with
structure map f ∶ X → Spec k we let Gp be the pullback of f along
F ∶ Spec k → Spec k, the Frobenius.
14
MAGNUS CARLSON
Let us briefly recall that for perfect fields k, group schemes over k
have two especially important maps, the (relative) Frobenius
FG ∶ G → Gp ≅ G
and the Verschiebung
VG ∶ G ≅ Gp → G.
These satisfy the property that FG VG = VG FG = p. A ring scheme R is
called elementary unipotent if VR = 0, i.e the Verschiebung is zero. Call
a plethory Q weakly linear if there is a map of plethories f ∶ P → Q
where P is a linear plethory (as defined in the previous section) such
that f when viewed as a map of algebras is surjective. This will, in
particular, imply that Q is primitively generated and is a quotient of
P by a P − P -ideal as defined in [3]. Not all plethories over a perfect
field k are primitively generated, as the following example shows (built
on an example from [10], Remark 1.6.2).
Example 5.1. Let G be the group scheme
Ga ×f αp
which as a scheme, is just Ga × αp . We let the the group structure be
given by
(g1 , h1 )(g2 , h2 ) = (g1 g2 , h1 + h2 + f (g1 , g2 ))
for
g1 , g2 , h1 , h2 ∈ Ga (R) × αp (R)
where f (x, y) = ((x+y)p −xp −y p )/p. This is a p-torsion group scheme but
is not elementary unipotent. One can define a non-unital ring scheme
structure on G be definining the multiplication to be trivial and then,
when k is finte, i.e k ≅ Fq ”unitalize” this by taking the direct product
with
Fq = ∐ Fq
a∈Fq
to get a ring scheme, as we did in Example 3.3. The underlying group
scheme of this ring scheme is clearly not elementary unipotent, since the
Verschiebung acts on each factor separately. Taking the free plethory
on a biring (see [3] 2.1 ) will then give us a plethory with its underlying
group scheme not elementary unipotent.
Another feature which differs from the case over a field of characteristic
zero is that there are plethories which have a non-trivial multiplicative
subgroups. This stems from the fact that there are ring schemes with
non-trivial multiplicative subgroups.
Example 5.2. Consider µp = Spec k[x, x−1 ]/(x − 1)p with comultiplication ∆ ∶ x → x ⊗ x and counit ǫ(x) = 1. This is an example of a multiplicative group scheme which is p-torsion and we can as before define
a trivial multiplication on µp , making it a non-unital ring scheme. We
CLASSIFICATION OF PLETHORIES IN CHARACTERISTIC ZERO
15
can then as previously stated, for finite fields, unitalize it to get a ring
scheme by taking the direct product with
Fq
and after that we can form the free plethory to get a plethory Q with
a non-trivial multiplicative subgroup.The fact that it has a non-trivial
multiplicative subgroup comes from , for example, the fact that there
is a non-zero homomorphism of group schemes µp → Q.
These two examples are rather artificial, but they show that plethories
behave wildly different in characteristic p > 0 than in characteristic 0.
We know that for any group scheme G over a perfect field k of characteristic p > 0, the group P(G) of primitive elements has a natural action
of the Frobenius, taking x ∈ P(G) to xp . In fact, P(G) becomes a module over a certain ring. As we previously stated, P(G) = Hom(G, Ga ).
We thus have that P(G) is naturally a module over the endomorphism
ring End(Ga , Ga ).
Definition 5.1. Let k⟨F ⟩ be the non-commutative polynomial ring
over k in one variable F with multplication given by, for a ∈ k aF =
Fk (a)a where Fk is the Frobenius endomorphism of k.
It is a quick calculation to show that End(Ga , Ga ) ≅ k⟨F ⟩. We now see
that P(G) is a module over k⟨F ⟩. Let us denote the category of modules
over k⟨F ⟩ by Modk⟨F ⟩ . Given a k⟨F ⟩-module M one can construct an
elementary unipotent group scheme S[p] (M) as follows (for details we
refer the reader to [11]) . Form S(M), the symmetric algebra on M,
with its obvious Hopf algebra structure and consider the map j ∶ M →
S(M). We then quotient out by the ideal generated by the elements
j(F x) − j(x)p
to get S[p] (M). One notes that for any commutative algebraic group G
one always has a map G → S[p] (P(G)). We have the following classical
theorem (see [6, IV,§3, Proposition 6.6])
Theorem 5.2. Let G be an affine group scheme. The following are
equivalent:
(i) The Verschiebung VG is zero.
(ii) G is a closed subgroup of Gra for some r.
(iii) The canonical homomorphism G → S[p] (P(G)) is an isomorphism.
Remark 5.3. What we call S[p] (P(Q)) is the same as the enveloping
p-algebra (also called the restricted universal enveloping algebra) on
the p-Lie algebra P(Q) where P(Q) has trivial commutator.
Lemma 5.4. When Q is a plethory, then S[p] (P(Q)) has the structure
of a plethory.
16
MAGNUS CARLSON
Proof. We know that P(Q) has a k⟨F ⟩ module structure where the
action of F is just taking the pth power. Further, S[p] (P(Q)) is the
quotient of S(P(Q)), which we know is a plethory, by the ideal J
generated by j(x)p − j(xp ), where j ∶ P(Q) → S(P(Q)) is the inclusion
in degree 1. It now suffices to show that this is a Q−Q-ideal (see [3] 6.1)
for U [p] (P(Q)) to be a plethory. This is equivalent to showing that for
a generating set S of J that
∆+Q (S) ⊂ Q ⊗ J + J ⊗ Q,
∆×Q (X) ⊂ Q ⊗ J + J ⊗ Q,
and
βQ (c)(S) = 0
∀c ∈ k and that
P(Q) ⊙ X ⊙ Q ⊂ J.
The first is immediate, since taking S to be the set of all j(x)p − j(xp ),
we have
∆+ (j(x)p ) − ∆+ (j(xp )) = ∆+ (j(x))p − (j(xp ) ⊗ 1 + 1 ⊗ j(xp ))
which is equal to
j(x)p ⊗ 1 + 1 ⊗ j(x)p − j(xp ) ⊗ 1 − 1 ⊗ j(xp ) ⊂ J ⊗ Q + Q ⊗ J.
Further,
[1]
[2]
[1]
[2]
∆× (j(x)p )−∆× (j(xp )) = ∑ j(xi )p ⊗j(xi )p − ∑ j((xi )p )⊗j((xi )p )
i
i
and this is equal to
[1]
[2]
[2]
[1]
[1]
[2]
∑ j(xi )p ⊗(j(xi )p −j((xi )p ))+∑((j((xi )p )−j(xi )p )⊗j((xi )p ))
i
but this is in J ⊗ P + P ⊗ J. We also need to show that βQ (c)(S) = 0,
this is clear. The last containment is similarily easy to verify.
Theorem 5.3. When Q is a plethory over a perfect field such that
VQ = 0, then S[p] (P(Q)) ≅ Q. We then say that Q is a p-linear plethory.
Proof. All one has to verify is that the canonical map f ∶ Q → S[p] (P(Q))
is a map of plethories. But this is obvious since this map is just the
composition of the two plethory maps Q → S(P(Q)) and S(P(Q)) →
S[p] (P(Q)).
Remark 5.5. We have seen that plethories need not be elementary
unipotent and not purely unipotent either (i.e it can have a non-trivial
multiplicative subgroup) Let us note that there can be no non-trivial
finite plethories over an infinite perfect field k. Indeed, from what we
have seen all plethories Q are connected over an infinite field. By
classical Dieudonné theory we can then decompose Q as Q = Qloc,red ×
Qloc,loc . This would imply that the Frobenius is nilpotent, but this can
never happen: the Frobenius is always a map of ring schemes.
CLASSIFICATION OF PLETHORIES IN CHARACTERISTIC ZERO
17
It seems to us that to classify plethories over a perfect field one should
establish an extension of ordinary Dieudonné theory to account for ring
schemes, which has been done to some extent by Hedayatzadeh in [9]
and for Hopf rings by Goerss [7] and Buchstaber-Lazarev [5]. Note that
Hedayatzadeh work with finite / profinite group schemes and with local
group schemes, which limits their applications to ring schemes since we
have seen that there are no non-trivial finite connected ring schemes
over a perfect field.
References
[1] George M. Bergman and Adam O. Hausknecht. Co-groups and co-rings in categories of associative rings, volume 45 of Mathematical Surveys and Monographs.
American Mathematical Society, Providence, RI, 1996.
[2] James Borger. The basic geometry of Witt vectors, I: The affine case. Algebra
Number Theory, 5(2):231–285, 2011.
[3] James Borger and Ben Wieland. Plethystic algebra. Adv. Math., 194(2):246–
283, 2005.
[4] M. Brion. Some structure theorems for algebraic groups. 2015.
[5] Victor Buchstaber and Andrey Lazarev. Dieudonné modules and p-divisible
groups associated with Morava K-theory of Eilenberg-Mac Lane spaces. Algebr.
Geom. Topol., 7:529–564, 2007.
[6] Michel Demazure and Pierre Gabriel. Groupes algébriques. Tome I: Géométrie
algébrique, généralités, groupes commutatifs. Masson & Cie, Éditeur, Paris;
North-Holland Publishing Co., Amsterdam, 1970. Avec un appendice ıt Corps
de classes local par Michiel Hazewinkel.
[7] Paul G. Goerss. Hopf rings, Dieudonné modules, and E∗ Ω2 S 3 . In Homotopy
invariant algebraic structures (Baltimore, MD, 1998), volume 239 of Contemp.
Math., pages 115–174. Amer. Math. Soc., Providence, RI, 1999.
[8] Marvin J. Greenberg. Algebraic rings. Trans. Amer. Math. Soc., 111:472–481,
1964.
[9] Mohammad Hadi Hedayatzadeh. Exterior powers of Barsotti-Tate groups. PhD
thesis, ETH Zürich, 2010.
[10] Tatsuji Kambayashi, Masayoshi Miyanishi, and Mitsuhiro Takeuchi. Unipotent algebraic groups. Lecture Notes in Mathematics, Vol. 414. Springer-Verlag,
Berlin-New York, 1974.
[11] J. S Milne. Algebraic groups (algebraic group schemes over fields) v1.20. 2015.
[12] John W. Milnor and John C. Moore. On the structure of Hopf algebras. Ann.
of Math. (2), 81:211–264, 1965.
[13] D. O. Tall and G. C. Wraith. Representable functors and operations on rings.
Proc. London Math. Soc. (3), 20:619–643, 1970.
E-mail address: [email protected]
| 0math.AC
|
Canonical Representations for Circular-Arc Graphs
Using Flip Sets
Maurice Chandoo
Leibniz Universität Hannover, Theoretical Computer Science,
Appelstr. 4, 30167 Hannover, Germany
[email protected]
arXiv:1702.05763v2 [cs.DS] 20 Dec 2017
Abstract
We show that computing canonical representations for circular-arc (CA) graphs reduces to computing certain subsets of vertices called flip sets. For a broad class of CA graphs, which we call
uniform, it suffices to compute a CA representation to find such flip sets. As a consequence
canonical representations for uniform CA graphs can be obtained in polynomial-time. We then
investigate what kind of CA graphs pose a challenge to this approach. This leads us to introduce
the notion of restricted CA matrices and show that the canonical representation problem for CA
graphs is logspace-reducible to that of restricted CA matrices. As a byproduct, we obtain the
result that CA graphs without induced 4-cycles can be canonized in logspace.
1998 ACM Subject Classification G.2.2 Graph Theory
Keywords and phrases canonization, circular-arc graphs, isomorphism
Digital Object Identifier 10.4230/LIPIcs...
1
Introduction
We consider an arc to be a connected set of points on the unit circle including the endpoints.
A CA graph is a graph whose vertices can be assigned arcs such that two vertices are adjacent
iff their corresponding arcs intersect. More formally, given a graph G we call it a CA graph if
there exists a function ρ which maps every vertex u of G to an arc ρ(u) such that u and v are
adjacent iff their arcs ρ(u) and ρ(v) have non-empty intersection. We call such a mapping ρ
a CA representation of G. CA graphs are a form of geometrical intersection graphs. Let X
be a family of sets over some ground set. Any subset Y of X defines a graph GY which has
Y as its vertex set and two vertices are adjacent if they have non-empty intersection. The
graph GY is called intersection graph of Y . We say a (finite) graph G is an intersection graph
of X if it is isomorphic to the intersection graph of Y for some Y ⊆ X . In this language CA
graphs are intersection graphs of arcs. The intersection graphs of intervals on the real line
are called interval graphs. In this sense any set of geometrical objects defines a (geometrical
intersection) graph class. CA graphs are a generalization of interval graphs since every set of
intervals on the real line can be ‘bent’ into arcs while preserving the intersection relation.
Therefore every interval graph is a CA graph.
Being a generalization of interval graphs—the archetype of geometrical intersection
graphs—CA graphs are quite prominent as well and have been known for decades. Since
then structural properties and algorithmic problems for this class have been thoroughly
investigated with [5] and [16] being two of the earliest works in this regard. In particular,
finding characterizations of CA graphs and constructing a CA representation for a given
CA graph have received a great deal of attention. Remarkably, finding a forbidden induced
subgraph characterization of CA graphs is still an open problem. See [12] for a survey on this
line of research and [1] for one of the most recent results in that direction. It should also be
© Maurice Chandoo;
licensed under Creative Commons License CC-BY
Leibniz International Proceedings in Informatics
Schloss Dagstuhl – Leibniz-Zentrum für Informatik, Dagstuhl Publishing, Germany
2
Canonical Representations for Circular-Arc Graphs Using Flip Sets
mentioned that CA graphs are of practical relevance with applications arising in disciplines
such as genetics and operations research. An explanation of the connection between genetics
and interval graphs in layman’s terms can be found in [17]. For a specialized account on this
connection emphasizing circularity see [15]. An example of how CA graphs can be used to
model the problem of phasing traffic lights is given in [6].
In this work we consider the canonical representation problem for CA graphs. The
representation problem for CA graphs is as follows. Given a CA graph G as input
we want to output a CA representation ρG of G. The canonical variant of this problem imposes the additional requirement that for every pair of isomorphic CA graphs G
and H their representations ρG and ρH should have identical underlying sets of arcs,
i.e. {ρG (v) | v ∈ V (G)} = {ρH (v) | v ∈ V (H)}. Notice that solving the representation problem for CA graphs implies solving the recognition problem for CA graphs, i.e. the question
given a graph G is it a CA graph. Likewise, solving the canonical representation problem for
CA graphs implies solving the isomorphism problem for CA graphs, i.e. deciding whether
two given CA graphs are isomorphic.
Consider the following generalization of interval graphs: 2-interval graphs are intersection
graphs of two intervals on the real line. It is easy to see that this class contains CA graphs
because given a set of arcs one can cut the circle at some point and straighten the arcs.
The arcs which are cut can be modeled as two intervals. It is interesting to note that the
isomorphism problem for interval graphs is logspace-complete [9] while the one for 2-interval
graphs is already GI-complete and CA graphs lie inbetween these two classes. The GIcompleteness for 2-interval graphs follows from the fact that every line graph is a 2-interval
graph and line graphs are already GI-complete. To see why this inclusion holds consider a
graph G and its line graph L(G). Assign every vertex v of G an interval Iv on the real line
such that no two intervals Iu and Iv intersect for every pair of distinct vertices u and v of
G. The 2-interval model for L(G) is obtained by mapping every edge {u, v} of G to the two
intervals Iu and Iv .
While a polynomial-time algorithm for deciding isomorphism of interval graphs is known
since 1976 due to Booth and Lueker this question still remains open for CA graphs. There
have been two claimed polynomial-time algorithms for deciding isomorphism of CA graphs
in [18] and [7] which were shown to be incorrect in [4] and [3] respectively. For interval
graphs even a linear-time algorithm for isomorphism is known [13]. A more recent result
is that canonical interval representations for interval graphs can be computed in logspace
and that this is optimal in the sense that recognition and deciding isomorphism for interval
graphs is logspace-complete [9]. These two hardness results also carry over to the class of
CA graphs. Furthermore, the isomorphism problem for proper CA graphs [11] and Helly
CA graphs [10] have been shown to be decidable in logspace. It is also shown how to obtain
canonical representations for these subclasses in logspace.
In this article we explain how the method used in [10] to obtain canonical representation
for Helly CA graphs can be adapted to CA graphs in general. Following this approach,
canonical representations for CA graphs can be found by computing certain subsets of vertices
called flip sets in an isomorphism-invariant manner. We introduce the class of uniform CA
graphs for which this method yields canonical representations in polynomial-time. We then
aim to isolate the instances of CA graphs which are difficult to handle with this method.
We try to capture these hard instances by what we call restricted CA matrices and show
that the canonical representation problem for CA graphs is logspace-reducible to that of
restricted CA matrices. During this isolation process we find a subset of uniform CA graphs,
namely ∆-uniform CA graphs, for which canonical representations can be computed in
M. Chandoo
logspace. The ∆-uniform CA graphs contain Helly CA graphs and every CA graph without
an induced 4-cycle. This generalizes the canonization result for Helly CA graphs given in
[10]. A preliminary version of this work appeared in [2].
The paper is organized as follows. In the third section we formalize the idea of computing
invariant flip sets in order to obtain canonical representations for CA graphs. This leads to
the definition of invariant flip set functions. In the fourth section we investigate for what
CA graphs a particular invariant flip set function is easy to compute. This leads to the
class of uniform CA graphs. We also provide an alternative characterization of uniform
CA graphs in terms of whether certain triangles in a CA graph have an unambiguous
representation. The main result of this section is that the representation problem for uniform
CA graphs, the canonical representation problem for uniform CA graphs and the non-Helly
triangle representability problem (introduced in section 4) for uniform CA graphs are all
logspace-equivalent. In the fifth section we consider the structure of non-uniform CA graphs,
introduce restricted CA matrices and show how the canonical representation problem for
CA graphs can be reduced to that of restricted CA matrices. In the process of proving this
reduction the class of ∆-uniform CA graphs is defined and it is shown that this class can be
canonized in logspace.
2
Preliminaries
For a number n ∈ N we write [n] for {1, . . . , n}. Given two sets A, B we say A and B intersect
if A ∩ B 6= ∅. We say A and B overlap, in symbols A G B, if A ∩ B, A \ B and B \ A are
non-empty.
We consider graphs without self-loops which sometimes have colored vertices and colored
edges. They can be seen as relational structures with the vertex set as universe and vertex
colors encoded as unary relations and edge colors as binary relations. The standard notion
of isomorphism for relational structures applies. We describe a graph with vertex colors as
tuple (G, c) where c is a function that maps the vertices of G to the colors. We talk about
a graph with edge colors as a square matrix whose entries represent the edge colors and
identify the indices of the matrix and the vertices of the graph. Consequently, we identify a
square matrix with the graph that it represents and talk about it in graph-theoretical terms.
By a class of (relational) structures we mean a set of such structures which is closed under
isomorphism.
We call a bijective function τ which maps the vertices of a graph G to some set V 0
a relabeling of G and τ (G) denotes the graph obtained after relabeling the vertices of G
according to τ . Let G and H be two graphs and let X ⊆ V (G) and Y ⊆ V (H). We say X
and Y are in the same orbit, in symbols X ∼orb Y , if there exists an isomorphism π from G
to H such that π(X) = Y . Let f be a function which maps a graph along with a subset of its
vertex set to a binary string, i.e. f (G, X) ∈ {0, 1}∗ and X ⊆ V (G). We call f an invariant
for a graph class C if f (G, X) = f (H, Y ) whenever X ∼orb Y and G, H ∈ C. Let us call a
function f which maps a graph G to a family of subsets of its vertex set, i.e. f (G) ⊆ P(V (G)),
a vertex set selector. For example, the function that maps a graph to the set of its cliques is
a vertex set selector. The characteristic function χf of a vertex set selector f is defined as
χf (G, X) = 1 ⇔ X ∈ f (G). We say a vertex set selector f is invariant for a graph class C if
its characteristic function χf is an invariant for C. We call f globally invariant if χf is an
invariant for all graphs. Intuitively, a vertex set selector f is invariant for C if a graph G ∈ C
can be arbitrarily relabeled and f still returns the ‘same’ vertex sets as before w.r.t. ∼orb .
The following definitions are with respect to a graph G. Throughout the paper it will be
3
4
Canonical Representations for Circular-Arc Graphs Using Flip Sets
always clear from context with respect to what graph these expressions are to be interpreted.
For a vertex v we define its open neighborhood N (v) as the set of vertices which are adjacent
to v and its closed neighborhood N [v] = N (v) ∪ {v}. A vertex v is called universal if
N [v] = V (G). For two vertices u, v we say that u and v are twins if N [u] = N [v]. A graph G
is twin-free if for every pair of distinct vertices u =
6 v it holds that N [u] 6= N [v]. A twin class
is an inclusion-maximal set of vertices X such that for all u, v ∈ X it holds that u and v are
twins. For two subsets of vertices S, S 0 with S 0 ⊆ S we define the exclusive neighborhood
NS (S 0 ) as all vertices v ∈ V (G) \ S such that v is connected to all vertices in S 0 and to none
in S \ S 0 . Let A be a square matrix with entries from a set E. For a vertex u of A and x ∈ E
we define N x (u) = {v ∈ V | Au,v = x}.
Logspace Transducers and Reductions. We assume deterministic Turing machines as
default model of computation. A logspace transducer is a deterministic Turing machine M
with a read-only input tape, a work tape and a write-only output tape. The work tape is
only allowed to use at most O(log n) cells where n denotes the input length. To write onto
the output tape M has a designated state called output state with the following semantic. If
M enters the output state then the symbol in the current cell of the work tape is written to
the current cell of the output tape and the head on the output tape is moved one cell to the
right. Other than that, M cannot write or move the head on the output tape. This means
as soon as something is written to the output tape it cannot be modified afterwards. Let
Σ and Γ be the input and work alphabet of M respectively. Then M computes a function
fM : Σ∗ → Γ∗ . We say a (partial) function f is computed by a logspace transducer M if
f (x) = fM (x) whenever f (x) is defined. We call f logspace-computable if there exists a
logspace transducer M which computes f . The class of logspace-computable functions is
closed under composition. Let f be a function which maps words over some alphabet to words
over some other alphabet. We say that the length of f is polynomially bounded if |f (x)| is
polynomially bounded by |x|. Only functions whose length is polynomially bounded can be
logspace-computable since the runtime of a logspace transducer is polynomially bounded. A
language L ⊆ Σ∗ is in logspace if its characteristic function is logspace-computable.
Given two functions f and g we say f is logspace-reducible to g if there exists l ∈ N and
logspace-computable functions r1 , . . . , rl such that f can be expressed as composition of g
and r1 , . . . , rl . Intuitively, this means that an oracle which can compute g can be queried a
constant number of times when constructing a logspace transducer for f . For two functions f
and g we say that they are logspace-equivalent if f is logspace-reducible to g and vice versa.
Analogously, given three functions f, g1 , g2 we say f is logspace-reducible to g1 and g2 if
there exists l ∈ N and logspace-computable functions r1 , . . . , rl such that f can be expressed
as composition of g1 , g2 and r1 , . . . , rl .
Circular-Arc Graphs and Representations. A CA model is a set of arcs A = {A1 , . . . , An }
on the circle. Let p =
6 p0 be two points on the circle. Then the arc A specified by [p, p0 ]
is given by the part of the circle that is traversed when starting from p going in clockwise
direction until p0 is reached. We say that p is the left and p0 the right endpoint of A and
write l(·), r(·) to denote the left and right endpoint of an arc in general. If A = [p, p0 ] then
the arc obtained by swapping the endpoints A = [p0 , p] covers exactly the opposite part of
the circle plus the endpoints. We say A is obtained by flipping A. In our context, we are only
interested in the intersection structure of a CA model and thus only the relative position of
the endpoints to each other matter. All endpoints can w.l.o.g. be assumed to be pairwise
different and no arc covers the full circle. Under these assumptions, a CA model A with n
M. Chandoo
5
A1
2
ρ(i) = Ai
1
A2
ρ(G)
G
3
A5
5
4
A3
A4
Figure 1 A CA graph and a representation of it
arcs can be described as a unique string as follows. Pick an arbitrary arc A ∈ A and relabel
the arcs with 1, . . . , n in order of appearance of their left endpoints when traversing the circle
clockwise starting from the left endpoint of A. Then write down the endpoints in order of
appearance when traversing the circle clockwise starting from the left endpoint of A. Do
this for every arc and pick the lexicographically smallest resulting string as representation
for A. For example, the smallest such string for the CA model in Figure 1 would result
from choosing A1 : (l(1), r(1), l(2), r(5), l(3), r(2), . . . ). Let str(A) denote this smallest string
representation. For a CA model A let Ar be the CA model obtained after reversing the
order of its endpoints. Observe that reversing the endpoints does not affect the intersection
structure of a CA model. Therefore we consider two CA models A and B to be equal if
str(A) = str(B) or str(Ar ) = str(B).
Let G be a graph and ρ = (A, f ) consists of a CA model A and a bijective mapping f
from the vertices of G to the arcs in A. Then ρ is called a CA representation of G if for all
u=
6 v ∈ V (G) it holds that {u, v} ∈ E(G) ⇔ f (u) ∩ f (v) 6= ∅. We write ρ(x) to mean the arc
f (x) corresponding to the vertex x, ρ(G) for the CA model A and for a subset V 0 ⊆ V (G)
let ρ[V 0 ] = {ρ(v) | v ∈ V 0 }. A graph is a CA graph if it has a CA representation.
We say a CA model A has a hole if there exists a point on the circle which isn’t contained
by any arc in A. Every such CA model can be understood as interval model (a set of intervals
on the real line) by straightening the arcs. Conversely, every interval model can be seen as
CA model by bending the intervals. Therefore a graph is an interval graph iff it admits a
CA representation with a hole.
A family of sets F over some ground set is called Helly if for all subsets F 0 of F such that
all elements in F 0 intersect pairwise it holds that ∩A∈F 0 A is non-empty. A CA graph G is
called Helly (HCA graph) if it has a CA representation ρ with a Helly CA model ρ(G). This
is the case iff for all inclusion-maximal cliques C in G it holds that the overall intersection of
T
C in ρ is non-empty, i.e. v∈C ρ(v) 6= ∅. Every interval model has the Helly property and
therefore every interval graph is a Helly CA graph.
The intersection type of two circular arcs A and B can be one of the following five types:
di: A and B are disjoint — A ∩ B = ∅
cs: A contains B — B ⊂ A
cd: A is contained by B — A ⊂ B
cc: A and B jointly cover the circle (circle cover) — A G B and A ∪ B = whole circle
ov: A and B overlap — A G B and A ∪ B 6= whole circle
Using these types we can associate a matrix with every CA model. An intersection
matrix is a square matrix with entries {cc, cd, cs, di, ov}. Given a CA model A we define its
intersection matrix µA such that (µA )A,B ∈ {cc, cd, cs, di, ov} reflects the intersection type
of the arcs A =
6 B ∈ A. An intersection matrix µ is called a CA (interval) matrix if it is the
intersection matrix of some CA model (with a hole). See Figure 2 for an example of a CA
model and the CA matrix which it induces. Given an intersection matrix µ and two distinct
6
Canonical Representations for Circular-Arc Graphs Using Flip Sets
vertices u, v of µ we sometimes write u α v instead of µu,v = α if µ is clear from the context.
Also, we sometimes talk about an intersection matrix µ as if it were a graph. In that case we
consider two vertices u, v of µ to be adjacent if they do not have a di-entry in µ.
When trying to construct a CA representation for a CA graph G it is clear that whenever
two vertices are non-adjacent their corresponding arcs must be disjoint in every CA representation of G. For two adjacent vertices the intersection type of their corresponding arcs might
depend on the particular CA representation of G that one considers. Hsu has shown that
this ambiguity can be removed as follows [7].
We adopt the notation of [10].
I Definition 2.1. For a graph G we define its neighborhood matrix λG which is an intersection
matrix as
di , if {u, v} ∈
/ E(G)
cd , if N [u] ( N [v]
cs , if N [v] ( N [u]
(λG )u,v = cc , if N [u] G N [v] and N [u] ∪ N [v] = V (G)
and ∀w ∈ N [u] \ N [v] : N [w] ⊂ N [u]
and ∀w ∈ N [v] \ N [u] : N [w] ⊂ N [v]
ov , otherwise
for all u 6= v ∈ V (G).
Let µ be an intersection matrix with vertex set V and let ρ = (A, f ) where A is a CA
model and f is a bijective mapping from V to A. We say ρ is a CA representation of µ if f
is an isomorphism from µ to the intersection matrix µA of A. We denote the set of such CA
representations for µ with N (µ). The representation problem for CA matrices is to compute
a CA representation for a given CA matrix µ. The canonical representation problem for
CA matrices is defined analogously to the canonical representation problem for CA graphs.
We say ρ is a normalized CA representation for a graph G if ρ is a CA representation
for the neighborhood matrix λG of G. An example of a normalized representation can be
seen in Figure 3. Let us denote the set of all normalized CA representations for G with
N (G) = N (λG ).
I Lemma 2.2 (Corollary 2.3. [7]). Every twin-free CA graph G without a universal vertex
has a normalized CA representation, that is N (G) 6= ∅.
I Lemma 2.3. The canonical representation problem for CA graphs is logspace-reducible
to the canonical representation problem for vertex-colored twin-free CA graphs without a
universal vertex.
Proof. For a graph G let G0 denote the induced subgraph of G that is obtained by removing
all universal vertices from G and only taking one vertex from each twin-class and deleting
b
a
A
d
c
µA
a
b
c
d
a
cd
ov
cc
Figure 2 A CA model A and its intersection matrix µA
b
cs
di
di
c
ov
di
ov
d
cc
di
ov
-
M. Chandoo
7
the rest. Let c0 be a coloring of G0 which assigns each vertex the cardinality of its twin class
in G. It holds that (G0 , c0 ) and the number of universal vertices in G suffice to reconstruct
G. Let G be a CA graph. Compute the graph (G0 , c0 ). Since (G0 , c0 ) is twin-free and
without universal vertices we can compute a canonical representation ρ0 for it. For a vertex
v of G let v0 denote the twin of v that occurs in G0 . A canonical representation of G is
given by v 7→ ρ0 (v0 ) for every non-universal vertex v of G and every universal vertex of G is
represented by an arc which intersects with all other arcs.
J
Therefore for our purposes it suffices to consider only twin-free graphs without universal
vertices and a vertex-coloring.
I Proviso. From this point on we assume every graph to be twin-free and without a universal
vertex unless explicitly stated otherwise. As a consequence we view CA graphs as a set of
CA matrices in the sense that the neighborhood matrix of every CA graph is a CA matrix.
Flips in Intersection Matrices. McConnell [14] observed that the operation of flipping arcs
in CA models has a counterpart in intersection matrices. He called this counterpart operation
algebraic flips. Note that for two arcs A, B with intersection type α ∈ {cc, cd, cs, di, ov} the
intersection type of A and B is solely determined by α. More precisely, the intersection type
of A and B is Z10 (α) where Z10 is the function defined in Table 1. Similarly, the intersection
type of A and B is given by Z01 (α). Using the functions Zij we can define the operation of
flipping a set of vertices in an intersection matrix.
I Definition 2.4. Let µ be an intersection matrix with vertex set V and X ⊆ V . We define
the intersection matrix µ(X) obtained after flipping the vertices X in µ as
µ(X)
u,v = Zij (µu,v ) with i = 1 iff u ∈ X and j = 1 iff v ∈ X
for all u 6= v in V .
Since flipping the same set of arcs twice is an involution it follows that (µ(X) )(X) = µ.
I Definition 2.5. Let V be a set of vertices, let A be a set of arcs and let ρ be a function
that maps V to A. Then ρ(X) : V → A for X ⊆ V is defined as follows:
(
ρ(v) , if v ∈ X
(X)
ρ (v) =
ρ(v) , if v ∈
/X
Notice that flipping vertices in an intersection matrix is equivalent to flipping arcs in a
CA representation in the following sense. Given an intersection matrix λ and a subset of
its vertices X it holds that ρ ∈ N (λ) ⇔ ρ(X) ∈ N (λ(X) ). Also, it is not difficult to observe
that flipping is an isomorphism-invariant operation in the sense that flipping sets of vertices
which are in the same orbit lead to isomorphic intersection matrices.
4
4
5
cd/cs
1
cc
2
cd/cs
6
1
5
6
2
3
3
Figure 3 A CA graph and a normalized representation thereof. Every non-labeled edge corresponds
to an ov-entry in the neighborhood matrix.
8
Canonical Representations for Circular-Arc Graphs Using Flip Sets
3
Flip Trick
In this section we generalize the idea used by Köbler, Kuhnert and Verbitsky in [10] to
compute canonical representations for Helly CA graphs. They showed that finding canonical
representations for Helly CA graphs can be reduced to finding canonical representations for
vertex-colored interval matrices. We show that the idea behind this reduction also works for
CA matrices in general. Recall that CA graphs can be seen as special case of CA matrices
since the neighborhood matrix of every CA graph is a CA matrix. The converse does not
hold, i.e. there exist CA matrices which are not expressible as the neighborhood matrix of a
CA graph (for instance any CA matrix with only two vertices that are not disjoint). The key
result here, which is used in the subsequent sections, is that finding canonical representations
for CA matrices is logspace-reducible to the task of computing what we call an invariant flip
set function.
McConnell showed in [14] that CA representations for CA graphs can be computed as
follows. Given a CA graph G with neighborhood matrix λ one can compute a set of vertices
X of G such that λ(X) is an interval matrix. We call such a set X a flip set. Then by
computing an interval representation ρ for λ(X) and flipping back the arcs X in ρ one obtains
a CA representation for λ and therefore for G as well [14]. We essentially use the same
argument to obtain canonical CA representations.
I Definition 3.1. Let λ be a CA matrix. A subset of vertices X of λ is called a flip set if
there exists a representation ρ ∈ N (λ) and a point x on the circle such that v ∈ X iff ρ(v)
contains the point x.
The concept of flip sets has already been implicitly defined and used in both [14] and
[10]. They observed that λ(X) is an interval matrix whenever X is a flip set of a CA matrix
λ. In fact, the other direction holds as well leading to the following characterization.
I Lemma 3.2. Let λ be a CA matrix and X is a subset of vertices of λ. It holds that X is
a flip set iff λ(X) is an interval matrix.
Proof. “⇒”: Let X be a flip set of λ. Let ρ ∈ N (λ) be a witnessing representation of the
fact that X is a flip set, i.e. there exists a point x on the circle such that every arc ρ(v)
with v ∈ X contains x and every arc ρ(v) with v ∈
/ X does not contain x. Consider the
representation ρ(X) ∈ N (λ(X) ). It holds that no arc ρ(X) (v) with v ∈ V (λ) contains the
point x which implies that there is a hole in ρ(X) and thus λ(X) is an interval matrix.
“⇐”: Let X be a subset of vertices of λ such that λ(X) is an interval matrix. We argue
that X must be a flip set. Let ρ ∈ N (λ(X) ) be a CA representation of λ(X) containing a hole
at point x on the circle. Such a representation must exist since λ(X) is an interval matrix.
This means the arc ρ(v) does not contain the point x for every vertex v ∈ V (λ). Consider the
Table 1 Algebraic flip functions Zxy : {cc, cd, cs, di, ov} → {cc, cd, cs, di, ov}
Zxy (α)
Z00
Z01
Z10
Z11
cc
cc
cs
cd
di
cd
cd
di
cc
cs
cs
cs
cc
di
cd
di
di
cd
cs
cc
ov
ov
ov
ov
ov
M. Chandoo
9
(X)
representation ρ(X) ∈ N ((λ(X) ) ) = N (λ). Then it can be checked that ρ(X) (v) contains
the point x iff v is in X and therefore X is a flip set with respect to λ.
J
We already mentioned that the canonical representation problem for vertex-colored
interval matrices can be solved in logspace due to [10]. However, since the theorem that
we reference just states this result for uncolored interval matrices we shortly explain how
to modify the proof to incorporate the coloring, which is a straightforward task for anyone
familiar with the proof.
I Theorem 3.3 ([10, Thm. 5.5]). The canonical representation problem for vertex-colored
interval matrices can be solved in logspace.
Proof. In Theorem 5.5 of [10] it is stated that a canonical interval representation for an
interval matrix can be found in logspace. To prove this they convert the input interval
matrix λ into a colored tree T(λ) called ∆ tree which is a complete invariant for interval
matrices. The leafs of this tree correspond to the vertices of λ. By appending the color of a
vertex from our vertex-colored interval matrix λ to the existing color of its corresponding
leave node in the colored ∆ tree T(λ) one obtains a complete invariant for vertex-colored
interval matrices. Then by applying the same argument given in the proof of Theorem 5.5
one can also compute a canonical representation for a vertex-colored interval matrix using
this slightly modified colored ∆ tree.
J
A consequence of Lemma 3.2 and Theorem 3.3 is that flip sets can be recognized in
logspace. Given an intersection matrix λ and a subset of vertices X of λ it suffices to check
whether λ(X) is an interval matrix by trying to compute an interval representation.
I Definition 3.4. Let C be a class of CA matrices and f is a vertex set selector. The function
f is called an invariant flip set function for C if the following conditions hold:
1. For every λ ∈ C there exists an X ∈ f (λ) such that X is a flip set of λ
2. f is invariant for C
Recall that f is globally invariant if f is invariant for all intersection matrices.
I Theorem 3.5. Let C be a class of CA matrices. The canonical representation problem
for vertex-colored C is logspace-reducible to the problem of computing an invariant flip set
function for C.
Proof. Let f be an invariant flip set function for C. Given a vertex-colored CA matrix (λ, c)
with λ ∈ C a canonical representation can be computed as follows. For every flip set X ∈ f (λ)
we associate it with the colored interval matrix IX = (λ(X) , cX ) where cX (v) = (c(v), red) if
v is in X and (c(v), blue) if v is not in X for all v ∈ V (λ). For a colored interval matrix I let
ρ̂I denote a canonical representation of I. Such a canonical representation can be computed
in logspace due to Theorem 3.3. Let X̂ denote a flip set in f (λ) such that the interval model
of ρ̂IX̂ is lexicographically minimal, i.e. for all flip sets X in f (λ) it holds that the model
of ρ̂IX is not smaller than the model of ρ̂IX̂ . Let ρ̂ denote the CA representation that is
obtained after flipping the red arcs in ρ̂IX̂ . Since these are the arcs that were flipped to
convert λ into IX it holds that ρ̂ is a representation of λ. To see that this leads to a canonical
representation consider two isomorphic vertex-colored CA matrices (λ, c) and (µ, d) with
λ, µ ∈ C and V (λ) and V (µ) are disjoint. Let Iλ be the set of colored interval matrices IX
for all flip sets X ∈ f (λ), and the set Iµ is defined analogously. Let Mλ be the set of interval
models M such that there exists an I ∈ Iλ and M is the model underlying the canonical
representation ρ̂I of I. The set Mµ is defined analogously. Since f is invariant it follows that
10
Canonical Representations for Circular-Arc Graphs Using Flip Sets
for every I ∈ Iλ there exists an I 0 ∈ Iµ such that I and I 0 are isomorphic, and vice versa.
Since the models in Mλ and Mµ only depend on the isomorphism type of the matrices
in Iλ and Iµ it follows that Mλ = Mµ . The CA models which underlie the canonical
representations of λ and µ are both derived from the smallest element in Mλ = Mµ and
thus are identical.
J
Suppose that there is a partition of the set of CA graphs into two classes C and D such
that you can efficiently compute invariant flip set functions for both classes. One might be
misled into thinking that this implies canonical representations for all CA graphs can be
found efficiently. However, this is not the case unless the class C (or D) can be efficiently
recognized, or one of the two invariant flip set functions is globally invariant.
I Lemma 3.6. Let C and D be classes of CA matrices. The canonical representation problem
for C ∪ D is logspace-reducible to the canonical representation problem for C and the problem
of computing a globally invariant flip set function for D.
Proof. Let f be a globally invariant flip set function for D. Let D0 be the set of CA matrices
λ such that f (λ) contains a flip set. Clearly, D is a subset of D0 . It holds that f (λ) contains
a flip set iff λ ∈ D0 . Since f is globally invariant it follows that f is an invariant flip set
function for D0 . To obtain a canonical representation for a matrix λ ∈ C ∪ D first compute
f (λ). If f (λ) contains a flip set it holds that λ ∈ D0 and therefore the output of f can be
used to find a canonical representation for λ. If f (λ) contains no flip set it must be the case
that λ ∈ C and therefore the canonization algorithm for C can be applied.
J
We conclude this section by restating the invariant flip set function that was used in [10]
to compute canonical representations for Helly CA graphs and explain why it is correct:
fHCA (G) = N [u] ∩ N [v] | u, v ∈ V (G)
In a Helly CA graph G every inclusion-maximal clique C of G is a flip set. To see why
this holds let ρ be a representation of G with the Helly property. Since C is a clique this
means every pair of arcs ρ(u) and ρ(v) with u, v ∈ C intersects. By the Helly property it
T
follows that the overall intersection v∈C ρ(v) is non-empty. This means there exists a point
x on the circle such that every arc ρ(v) with v ∈ C contains x. Assume there exists a vertex
w ∈ V (G) \ C such that ρ(w) contains x. This means w must be adjacent to every vertex in
C, which contradicts that C is inclusion-maximal. Hence C is a flip set.
In [10, Thm. 3.2] it is shown that every Helly CA graph contains at least one inclusionmaximal clique which can be expressed as the common neighborhood of two vertices. Therefore
fHCA (G) returns at least one flip set for every Helly CA graph G. Also, it is trivial to see
that fHCA is globally invariant.
4
Uniform Circular-Arc Graphs
We define the class of uniform CA graphs for which computing a particular invariant flip set
function reduces to computing a representation. As a consequence, canonical representations
for this class of CA graphs can be computed in polynomial-time. This is an interesting
class for two reasons. First, it seems to capture the instances where it is easy to apply
the flip trick. Secondly, its complement (within the CA graphs) is a rather exotic class
of CA graphs with a quite particular structure. While the initial definition of uniformity
makes it apparent why it suffices to find an arbitrary representation in order to obtain a
canonical one, it is rather impractical when trying to understand what constitutes a uniform
M. Chandoo
11
CA graph. We provide a more pleasant characterization of uniform CA graphs in terms of
how certain triangles in a CA graph can be represented. This alternative characterization
also reveals that every Helly CA graph is uniform. Additionally, we show that the canonical
representation problem for uniform CA graphs is logspace-equivalent to what we call the
non-Helly triangle representability problem. This problem is: given a CA graph G and a set
T of three pairwise overlapping vertices as input, does there exist a representation ρ of G
such that T covers the whole circle in ρ?
The following kind of flip set will lead us to uniform CA graphs when trying to compute
canonical representations. Given a CA matrix λ recall that X is a flip set of λ if there exists
a representation ρ ∈ N (λ) and a point x on the circle such that x ∈ ρ(v) iff v ∈ X for all
vertices v of λ. We impose the additional restriction that x is not allowed to be an arbitrary
point on the circle but instead has to be one of the endpoints in ρ.
I Definition 4.1. Let λ be a CA matrix and u ∈ V (λ). A flip set X of λ is a u-flip set if
there exists a representation ρ ∈ N (λ) and an endpoint x of ρ(u) such that v ∈ X iff ρ(v)
contains the point x.
Clearly, every CA graph has a u-flip set for every vertex u. On the other hand, there
are CA graphs that have flip sets which are not u-flip sets for any vertex u. For example,
consider the cycle graph with n ≥ 4 vertices. Every flip set that consists of exactly one vertex
is not a u-flip set for any vertex u of the cycle graph.
Consider the following task: given a CA graph G and a vertex u, find a u-flip set of
G. Clearly, no vertex v which is disjoint from u or contained by u belongs to X since in
every representation the arc of v does not contain any of the two endpoints of the arc of u.
Similarly, if a vertex v contains u or forms a circle cover with u then in every representation
the arc of v contains both endpoints of u and therefore must be included in X. See Figure 4
for a schematic overview.
It remains to decide for the set of vertices N ov (u) that overlap with u whether they should
be included in X. A vertex v which overlaps with u contains exactly one of the endpoints
of u in any representation. Let x, y be two vertices that overlap with u. We say x and y
overlap from the same side with u in ρ if ρ(x) and ρ(y) contain the same endpoint of ρ(u).
Evidently, this is an equivalence relation with respect to v and ρ which partitions N ov (u)
into two parts, namely the part which contains the left endpoint and the one which contains
the right endpoint. If X is a u-flip set then X ∩ N ov (u) must be an equivalence class of the
‘overlap from the same side with u in ρ’-relation for some ρ ∈ N (G).
I Definition 4.2. For a CA matrix λ and a vertex u of λ we say a partition Y of N ov (u)
into two parts is a u-ov-partition if there exists a representation ρ ∈ N (λ) such that two
vertices x, y ∈ N ov (u) are in the same part of Y iff ρ(x) and ρ(y) overlap from the same side
with ρ(u). We say ov-partition to mean an u-ov-partition for an arbitrary u ∈ V (λ).
u
X1
X2
u
a
b
Figure 4 Exemplary u-flip sets X1 and X2
d
Pu = {{a, b}, {c, d}}
c
Figure 5 Example of a u-overlap partition Pu
12
Canonical Representations for Circular-Arc Graphs Using Flip Sets
In general, for a vertex u of a CA graph G there can be multiple u-ov-partitions. In
fact, there are instances with exponentially many u-ov-partitions with respect to |N ov (u)|.
A trivial way of obtaining at least one u-ov-partition for every vertex u of a CA graph G
is to compute an arbitrary representation ρ ∈ N (G). But the ov-partitions obtained by
this method are not invariant and thus do not yield canonical representations. However, if
one considers CA graphs where there is only one u-ov-partition for every vertex u then an
arbitrary representation suffices.
I Definition 4.3 (Uniform CA Graphs). A CA graph G is uniform if for every vertex u in G
there exists exactly one u-ov-partition. This partition is denoted by Pu = {Pu,1 , Pu,2 }.
I Lemma 4.4. The following mapping is an invariant flip set function for uniform CA
graphs. Let G be a uniform CA graph.
[
Funiform (G) =
{u} ∪ N cd (u) ∪ N cc (u) ∪ Pu,i
u∈V (G)
i∈{1,2}
Proof. Let G be a uniform CA graph and X is in Funiform (G) with X = {u} ∪ N cd (u) ∪
N cc (u) ∪ Pu,i for some u ∈ V (G) and i ∈ {1, 2}. It follows from Figure 4 and the definition
of ov-partitions that X is a u-flip set. The invariance of Funiform (G) follows from the fact
that the intersection type of two vertices as well as the property of being an ov-partition is
independent of the vertex labels.
J
We remark that the function Funiform is undefined for non-uniform CA graphs since the
sets Pu,1 and Pu,2 are not well-defined in that context.
I Theorem 4.5. Canonical representations for uniform CA graphs can be computed in
polynomial-time.
Proof. Let G be a uniform CA graph. Compute a normalized representation ρ of G
and extract the u-ov-partition for each vertex u from ρ. Then compute Funiform (G) from
Lemma 4.4 to obtain a canonical CA representation for G. Since CA representations can be
computed in polynomial-time (see for instance [14]) it follows that this procedure also works
in polynomial-time.
J
Considering that our definition of uniform CA graphs arose from the desire to compute
invariant u-flip sets one might expect that these graphs are only a small special case of CA
graphs. Surprisingly, quite the opposite is the case as we will see. We give an alternative
definition of uniform CA graphs which gives a better intuition as to why many CA graphs
are uniform.
I Definition 4.6. Let λ be a CA matrix. An ov-triangle T of λ is a set of three vertices that
overlap pairwise, i.e. for all u 6= v in T it holds that u ov v. An ov-triangle T is representable
as non-Helly triangle (interval triangle) if there exists a representation ρ ∈ N (λ) such that
the set of arcs {ρ(x) | x ∈ T } does (not) cover the whole circle. Let TNHT (λ) and TIT (λ)
denote the sets of ov-triangles representable as non-Helly triangles and interval triangles
respectively.
This definition also applies to CA graphs via their neighborhood matrix, i.e. TIT (G) =
TIT (λ) and TNHT (G) = TNHT (λ) where λ is the neighborhood matrix of G. See Figure 6 for
M. Chandoo
13
an example where the vertices u, x, z are represented as non-Helly triangle on the left and
interval triangle on the right.
Recall that a set of arcs which intersect pairwise but have overall empty intersection
is called non-Helly. Since three pairwise overlapping arcs that cover the whole circle have
overall empty intersection we call such a set a non-Helly triangle. In fact, one can verify that
this is the only non-Helly arrangement of three arcs. A complete list of inclusion-minimal
non-Helly CA models can be found in [8, Corrollary 3.1].
I Theorem 4.7. A CA graph G is uniform iff TIT (G) ∩ TNHT (G) = ∅.
Proof. “⇒”: Assume there exists a uniform CA graph G with TIT (G) ∩ TNHT (G) 6= ∅.
Let T be an ov-triangle in TIT (G) ∩ TNHT (G) and T = {x, y, z}. This means there exist
two representations ρI , ρN ∈ N (G) such that T is represented as interval triangle in ρI
and as non-Helly triangle in ρN . We assume w.l.o.g. that ρI (y) ⊂ ρI (x) ∪ ρI (z), i.e. y is
placed in-between x and z in ρI . This means y and z must be in the same part of the
unique x-ov-partition Px . However, y and z do not contain the same endpoint of x in the
representation ρN , which contradicts that G is uniform.
“⇐”: Assume there exists a CA graph G with TIT (G) ∩ TNHT (G) = ∅ that is not uniform.
This means there exist a vertex u, two vertices x, y ∈ N ov (u) and two representations
ρ, ρ0 ∈ N (G) such that x and y overlap from the same side with u in ρ but not in ρ0 . This
implies that x and y must overlap and therefore T = {u, x, y} is an ov-triangle. Notice
that T must be represented as interval triangle in ρ because x and y both contain the same
endpoint of u. It holds that T is represented as interval triangle in ρ0 as well since otherwise
T ∈ TIT (G) ∩ TNHT (G). Also, we assume w.l.o.g. that ρ(y) ⊂ ρ(x) ∪ ρ(u). Since u and y
overlap it holds that N [u] \ N [y] 6= ∅. Due to ρ0 it follows that N [u] \ N [y] ⊆ N [u] ∩ N [x].
For a vertex z ∈ N [u] \ N [y] to intersect with both u and x it is necessary that z overlaps
with u and x due to the representation ρ. It follows that {u, x, z} is represented as non-Helly
triangle in ρ. On the other hand, {u, x, z} must be represented as interval triangle in ρ0 and
therefore TIT (G) ∩ TNHT (G) 6= ∅, contradiction. See Figure 6 for a schematic overview of ρ
and ρ0 .
J
Observe that if an ov-triangle T of G is representable as non-Helly triangle then this
implies that T must have certain structural properties in G. For example, every vertex of
G must be adjacent to at least one of the vertices in T since T covers the whole circle in
some representation. Similarly, if T is representable as interval triangle this also implies
some structural properties. For instance, there must be an x ∈ T such that every vertex that
is adjacent to x must also be adjacent to at least one other vertex in T . If an ov-triangle
is representable as both non-Helly triangle and interval triangle then it must satisfy all of
these structural properties at once. As a consequence such an ov-triangle must have a very
particular structure which extends to the whole graph as we will see in the next section.
A CA graph is Helly if it has a Helly CA representation. In [8, Theorem 4.1] it is shown
that every ‘stable’ representation of a Helly CA graph is Helly. Since every normalized
y
u
x
ρ
z
x
u
y
ρ0
z
Figure 6 “⇐”-direction in the proof of Theorem 4.7
14
Canonical Representations for Circular-Arc Graphs Using Flip Sets
representation has the ‘stable’ property it follows that a CA graph is Helly iff every normalized
representation of it is Helly. If a CA graph G is Helly this implies that TNHT (G) is empty,
and therefore every Helly CA graph is uniform.
A natural question to consider is the computational complexity of deciding whether an
ov-triangle is representable as non-Helly triangle or interval triangle. Given a CA graph G
and an ov-triangle T of G let us call the problem of deciding whether T is in TNHT (G) the
non-Helly triangle representability problem. Analogously, deciding whether T is in TIT (G) is
called the interval triangle representability problem. In the case of uniform CA graphs these
two problems are complementary, i.e. an ov-triangle T is in TNHT (G) iff T is not in TIT (G).
In the following, we show that solving either of these two problems for uniform CA graphs is
logspace-equivalent to computing a canonical representation for uniform CA graphs.
I Definition 4.8. Let G be a CA graph and T = {u, v, w} is an ov-triangle of G. We say v
is amidst u and w if one of the following conditions holds:
1. NT (u) and NT (w) are non-empty
2. there exists a z ∈ NT (u, w) such that {u, w, z} ∈ TNHT (G)
I Lemma 4.9. Let G be a uniform CA graph and T = {u, v, w} is an ov-triangle of G with
T ∈
/ TNHT (G). Then the following statements are equivalent:
1. v is amidst u and w
2. ∃ρ ∈ N (G) : ρ(v) ⊂ ρ(u) ∪ ρ(w)
3. ∀ρ ∈ N (G) : ρ(v) ⊂ ρ(u) ∪ ρ(w)
Proof. “2 ⇒ 1”: Let ρ be in N (G) such that ρ(v) ⊂ ρ(u) ∪ ρ(w) and assume that v is not
amidst u, w. Since v overlaps with u and w it holds that N [u] \ N [v] and N [w] \ N [v] are
non-empty. Because NT (u) = NT (w) = ∅ it must hold that NT (u, w) 6= ∅. Let z ∈ NT (u, w).
For z to intersect with u and w in ρ it must hold that {u, w, z} is represented as non-Helly
triangle in ρ. This contradicts the assumption that v is not amidst u, w.
“1 ⇒ 3”: Let v be amidst u and w and assume that there exists a ρ ∈ N (G) such that
ρ(v) 6⊂ ρ(u) ∪ ρ(w). Since T ∈
/ TNHT (G) and G is uniform it follows by Theorem 4.7 that
T must be represented as interval triangle in every representation, which includes ρ. We
assume w.l.o.g. that ρ(w) ⊂ ρ(u) ∪ ρ(v). From that it follows that NT (w) is empty and
therefore there must be a z ∈ NT (u, w) such that {u, w, z} is a non-Helly triangle in ρ, which
is impossible.
“3 ⇒ 2”: clear.
J
I Definition 4.10. Let G be a CA graph and u ∈ V (G). Let the binary relation ∼u on
N ov (u) be defined such that x ∼u y holds if one of the following holds:
1. x = y
2. x cd y or x cs y
3. x ov y, {u, x, y} ∈
/ TNHT (G) and u is not amidst x and y
I Lemma 4.11. For every uniform CA graph G and u ∈ V (G) it holds that the partition
induced by ∼u equals the unique u-ov-partition Pu . Stated differently, x ∼u y iff x and y are
in the same part of Pu .
Proof. “⇒”: Let x ∼u y and assume for the sake of contradiction that x and y are not in
the same part of the u-ov-partition. This means there exists a representation ρ ∈ N (G)
such that ρ(x) and ρ(y) contain different endpoints of ρ(u). This is only possible if x and
y overlap. Since {u, x, y} ∈
/ TNHT (G) this means {u, x, y} must be represented as interval
triangle in ρ. In order for ρ(x) and ρ(y) to contain different endpoints of ρ(u) it must
M. Chandoo
hold that ρ(u) ⊂ ρ(x) ∪ ρ(y), which implies that u is amidst x and y by Lemma 4.9. This
contradicts x ∼u y.
“⇐”: Let x and y be in the same part of the u-ov-partition and assume that x ∼u y does
not hold. This implies that x and y must overlap and therefore {u, x, y} form an ov-triangle.
For x ∼u y to not hold it must be either the case that {u, x, y} is only representable as
non-Helly triangle or u is amidst x and y. In both cases this contradicts x and y being in
the same part of the u-ov-partition.
J
I Theorem 4.12. The representation, canonical representation, non-Helly triangle representability and interval triangle representability problem for uniform CA graphs are logspaceequivalent.
Proof. The non-Helly triangle representability and interval triangle representability problem
for uniform CA graphs are logspace-equivalent because they are complementary in the sense
that an ov-triangle is representable as non-Helly triangle iff it is not representable as interval
triangle. This follows from the fact that an ov-triangle can only be either represented as
non-Helly triangle or interval triangle and these two possibilities are mutually exclusive in
the case of uniform CA graphs. As a consequence these two problems are trivially reducible
to the representation problem for uniform CA graphs. Given a uniform CA graph G, an
ov-triangle T of G and a representation ρ ∈ N (G) it holds that T ∈ TNHT (G) iff T ∈
/ TIT (G)
iff T is represented as non-Helly triangle in ρ.
The representation problem is obviously reducible to the canonical representation problem.
Therefore it remains to show that the canonical representation problem for uniform CA
graphs is reducible to the non-Helly triangle representability problem. To obtain a canonical
representation for a uniform CA graph we can use the invariant flip set function given in
Lemma 4.4. To compute this function we need to figure out the unique ov-partitions for each
vertex. By Lemma 4.11 this can be done by computing the equivalence relation ∼u for each
vertex u. It can be verified that this relation is computable in logspace using queries of the
form T ∈ TNHT (G).
J
The isomorphism problem for CA graphs can be reduced to the one for non-uniform CA
graphs in polynomial-time due to Theorem 4.5. However, a reduction from the canonical
representation problem for CA graphs to the one for non-uniform CA graphs does not
immediately follow from Theorem 4.5 unless uniform CA graphs can be recognized in
polynomial-time. An alternative approach to construct such a reduction is to solve the
non-Helly triangle representability problem for uniform CA graphs with an additional
requirement.
I Definition 4.13. The globally invariant non-Helly triangle representability problem for
uniform CA graphs is defined as follows. Let A be an algorithm that correctly decides the
non-Helly triangle representability problem for uniform CA graphs. Let fA be the function
computed by A, i.e. for a graph G and an ov-triangle T of G it holds that fA (G, T ) = 1 iff
A accepts (G, T ). We say A decides the globally invariant non-Helly triangle representability
problem for uniform CA graphs if fA is an invariant for all graphs. Stated differently, the
output of A must be independent of the vertex labels.
I Lemma 4.14. The canonical representation problem for CA graphs is logspace-reducible
to the globally invariant non-Helly triangle representability problem for uniform CA graphs
and the canonical representation problem for vertex-colored non-uniform CA graphs.
15
16
Canonical Representations for Circular-Arc Graphs Using Flip Sets
Proof. Suppose we are given an algorithm A which solves the globally invariant non-Helly
triangle representability problem for uniform CA graphs. We argue that A can be used to
compute a globally invariant flip set function for uniform CA graphs. From Lemma 3.6 it
then follows that the canonical representation problem for CA graphs reduces to that for
vertex-colored non-uniform CA graphs.
Given a CA graph G let ∆(G, A) be the set of ov-triangles T of G such that A accepts
(G, T ). If G is a uniform CA graph then ∆(G, A) = TNHT (G). Consider Definition 4.8 and
4.10 and suppose that each occurrence of TNHT (G) is replaced by ∆(G, A). Let us call the
A
new relation ∼A
u . Clearly, in the case of uniform CA graphs ∼u and ∼u coincide. Next,
consider the following variant of Funiform :
[
A
Funiform
(G) =
{u} ∪ N cd (u) ∪ N cc (u) ∪ X
u∈V (G)
X∈(N ov (u)/∼A
u)
A
A
where (N ov (u)/ ∼A
u ) denotes the equivalence classes of ∼u . If ∼u is not an equivalence
relation let (N ov (u)/ ∼A
u ) = ∅. If G is a uniform CA graph then it follows from Lemma 4.11
A
A
that Funiform (G) = Funiform (G). Therefore Funiform
is an invariant flip set function for uniform
A
CA graphs. Additionally, it can be verified that Funiform
is globally invariant due to the fact
A
that the answer of A is independent of the vertex labels. Also, the function Funiform
can be
computed in logspace using queries of the form T ∈ ∆(G, A). Observe that ∆(G, A) only
provides n3 bits of information with n = |V (G)| and therefore can be computed ‘in a single
query’ by a functional oracle which outputs the n3 bits of information.
J
5
Non-Uniform CA Graphs and Restricted CA Matrices
In the first part of this section we examine the structure of non-uniform CA graphs. Every
such graph must have two ov-triangles which have exactly one vertex in common and both are
representable as interval triangle and as non-Helly triangle. This pair of ov-triangles enforces
a particular structure in non-uniform CA graphs. In the second part we introduce restricted
CA matrices, which try to partly capture this structure. Roughly speaking, restricted CA
matrices can be seen as a generalization of the neighborhood matrices of non-uniform CA
graphs. We pay the price of considering this more general class of structures in order to
provide a logspace reduction from the canonical representation problem for CA graphs to
that of restricted CA matrices.
I Definition 5.1. Given a CA graph G, an induced 4-cycle C = (u, w, w0 , u0 ) of G and
v ∈ V (G) \ C. We say (C, v) is a non-uniformity witness of G if {u, v, w}, {u0 , v, w0 } ∈
TIT (G) ∩ TNHT (G). We also simply call (C, v) a witness of G.
I Theorem 5.2. A CA graph G is non-uniform iff G has a non-uniformity witness.
Proof. “⇒”: Let G be a non-uniform CA graph. Due to Theorem 4.7 there exists an
ov-triangle T of G with T ∈ TIT (G) ∩ TNHT (G). Let T = {u, v, w} and ρI ∈ N (G) such
that v is in-between u and w, i.e. ρI (v) ⊂ ρI (u) ∪ ρI (w). First, we show that there exists an
induced 4-cycle C = (u, w, w0 , u0 ) in G.
From the non-Helly triangle representation of T it follows that N [u]∪N [v]∪N [w] = V (G).
Since v is in-between u and w this means N [u] ∪ N [w] = V (G). It holds that u and w overlap.
Therefore one of the conditions in the definition of the neighborhood matrix for u and w to
form a circle cover must be violated. Let us assume w.l.o.g. that the violated condition is that
there exists a u0 ∈ N [u] \ N [w] such that N [u0 ] 6⊆ N [u]. This means u0 must overlap with u
M. Chandoo
u
17
w
u
w
v
v
3K2
x
X0
X1
X2
v0
u0
w0
X3
u0
w0
X4
Figure 7 Examples of non-uniform CA graphs and one uniform CA graph X4
and there exists a w0 ∈ N [u0 ] \ N [u]. Since w0 ∈
/ N [u] it follows from N [u] ∪ N [w] = V (G)
that w0 ∈ N [w] and because w is disjoint from u0 , and because w0 intersects with both u0
and w it follows that w0 overlaps with u0 and w. Therefore C = (u, w, w0 , u0 ) is an induced
4-cycle in G.
It remains to show that {u0 , v, w0 } is an ov-triangle and that it is in both TIT (G) and
TNHT (G). Consider the representation ρI from before. Assume for the sake of contradiction
that v does not overlap with u0 . Then due to ρI it must be the case that u0 is disjoint from v
and thus u0 ∈ NT (u). However, due to fact that T is representable as non-Helly triangle this
would imply that u0 is contained by u, which is not the case. Therefore u0 overlaps with v as
the other intersections types are out of question. For the same reason w0 overlaps with v and
hence T 0 = {u0 , v, w0 } is an ov-triangle. Now, it can be verified that in every representation
of G where T is a non-Helly triangle it follows that T 0 must be an interval triangle and vice
versa. This concludes that T 0 is in TIT (G) ∩ TNHT (G).
“⇐”: Follows directly from Theorem 4.7.
J
In Figure 7 five non-uniform CA graphs and one uniform CA graph (X4 ) are given by
their CA models. We explain how to verify this claim. First, we have to check that every
CA model is normalized. This means the graphs which are induced by these models must
be twin-free and without a universal vertex. Additionally, the intersection types of the arcs
must match the intersection types in the induced graph (or more precisely its neighborhood
matrix). A quick way to determine whether two overlapping arcs also overlap in the graph is
to check if they jointly occur in an induced n-cycle for some n ≥ 4.
To see that the first five CA graphs are non-uniform we have to find an ov-triangle that is
representable as both interval and non-Helly triangle. In the case of 3K2 this ov-triangle can
be {u, v, w}. In the given representation {u, v, w} is represented as interval triangle. Observe
that v and v 0 are in the same orbit and therefore the labels v and v 0 can be swapped in the
representation. After swapping v and v 0 the ov-triangle {u, v, w} is represented as non-Helly
triangle. For the graph X0 we can also choose the ov-triangle {u, v, w}. In this case there
is an automorphism which swaps u with u0 and w with w0 and has the other vertices as
fix-points. After changing the labels in the representation according to this automorphism it
18
Canonical Representations for Circular-Arc Graphs Using Flip Sets
1
u
w
w0
u0
cs
di
di
cs
ov
di
di
cs
2
cs
di
di
ov
ov
di
di
ov
di
cs
cs
di
di
ov
cs
di
3
di
cs
ov
di
di
ov
ov
di
ov
di
ov
ov
4
ov
di
ov
cs
ov
ov
di
ov
5
cs
ov
di
ov
ov
ov
ov
di
6
ov
cs
ov
di
di
ov
ov
ov
di
ov
cs
ov
7
ov
ov
ov
ov
Table 2 Intersection types of restricted CA matrices with witness cycle (u, w, w0 , u)
holds that {u, v, w} is represented as non-Helly triangle. We remark that 3K2 and X0 are
minimal in the sense that no induced subgraph of them is a non-uniform CA graph. Next, let
us consider the graphs X1 to X3 . Observe that the black arcs in each of these graphs form
an induced 3K2 subgraph. We assume that the black arcs are labeled with u, u0 , v, v 0 , w, w0
in the same way that the representation of 3K2 is labeled. It holds that v and v 0 are in
the same orbit in all of these four graphs because they have the same open neighborhood.
Therefore {u, v, w} is representable as both interval and non-Helly triangle due to the same
argument that we made for 3K2 .
To show that X4 is uniform we argue that it has a unique normalized representation,
i.e. |N (X4 )| = 1. Observe that this graph has a unique CA model. Additionally, it has no
non-trivial automorphism (it is rigid). Therefore X4 has a unique CA representation.
I Fact 5.3. Every non-uniform CA graph contains 3K2 or X0 as induced subgraph.
Proof. Let G be a non-uniform CA graph. Due to Theorem 5.2 there exists a witness
(C, v) of G with C = (u, w, w0 , u0 ). Since G does not contain a universal vertex it holds
that V (G) \ N [v] is non-empty. Due to the fact that {u, v, w} and {u0 , v, w0 } can be
represented as interval triangles it follows that NC (C \ {x}) ⊆ N [v] for all x ∈ C. Therefore
V (G) \ N [v] ⊆ NC (C) ∪ NC (u, u0 ) ∪ NC (w, w0 ). Suppose there is a v 0 ∈ NC (C) \ N [v].
Then the vertices of C along with v and v 0 form an induced 3K2 -subgraph of G. Assume
that this is not the case, i.e. NC (C) ⊆ N [v]. Since u and v overlap it must hold that
N [u] \ N [v] 6= ∅. The only vertices that can be adjacent to N [u] but not to N [v] must be
in NC (u, u0 ) since NC (C) ⊆ N [v]. Therefore there exists a vertex x ∈ NC (u, u0 ) that is not
adjacent to v. For the same reason there must be a vertex y ∈ NC (w, w0 ) not adjacent
to v because N [w] \ N [v] 6= ∅. The vertices of C along with v, x and y form an induced
X0 -subgraph.
J
I Definition 5.4 (Restricted CA Matrix). Let λ be a CA matrix. We say λ is a restricted CA
matrix if it contains an induced 4-cycle C = (u, w, w0 , u0 ) called witness cycle such that:
1. NC (u, w), NC (u0 , w0 ) and NC (x) are empty for every x ∈ C
2. For all x ∈ NC (C) it holds that x overlaps with all vertices in C
Observe that the intersection matrix of every CA model that is shown in Figure 7 is a
restricted CA matrix.
I Fact 5.5. Given an intersection matrix λ, vertices x, y1 , . . . , yk of λ and intersection types
α1 , . . . , αk , we say x is an (α1 , . . . , αk )-neighbor of (y1 , . . . , yk ) if λx,yi = αi for all i ∈ [k].
A CA matrix λ is restricted iff λ contains an induced 4-cycle C = (u, w, w0 , u0 ) such that for
all vertices x ∈ V (λ) \ C there exists a column α in Table 2 such that x is a α-neighbor of C.
Proof. We use the numbers in the table headline to refer to the different columns. For example, 2.3 refers to the third column from left in the second part of the table: (di, cs, ov, di).
M. Chandoo
“⇒”: Let λ be a restricted CA matrix with witness cycle C = (u, w, w0 , u0 ). We need to
show for every x ∈ V (λ) \ C there exists a column α in Table 2 such that x is a α-neighbor
of C. Due to the definition of restricted CA matrices it must hold that x is in (exactly) one
of the following seven sets: NC (C), NC (u, u0 ), NC (w, w0 ) or NC (C \ {z}) for a z ∈ C. If x is
in NC (C) then x overlaps with every vertex of C by definition. This corresponds to the last
column 7.1 of the table. If x ∈ NC (u, u0 ) then x is disjoint from w and w0 . In that case x is
an α-neighbor of C where α must be one of the four columns in part one of the table. For
the same reason if x ∈ NC (w, w0 ) then it is an α-neighbor of C where α corresponds to one
of the two columns in the second part of the table. If x is in NC (C \ {w}) then x is disjoint
from w and x overlaps with both u and w0 . The intersection type between x and u0 can be
one of the following: x overlaps with u or x is contained by u or x contains u. The first two
cases are covered by the third part of the table. However, if x contains u then there exists no
corresponding column in the table since it does not have any cd-entries. This can be resolved
by using the following observation: if x is in NC (C \ {w}) and contains u0 then (u, w, w0 , x)
is a witness cycle of λ as well. As a consequence we can assume without loss of generality
that a witness cycle C of λ can be chosen such that there exists no x ∈ NC (C \ {w}) which
contains u0 . The same argument applies to the remaining three cases x ∈ NC (C \ {z}) with
z ∈ {u, u0 , w0 }.
“⇐”: clear.
J
In the remainder of this section we prove that the canonical representation problem for
CA graphs is logspace-reducible to the canonical representation problem for vertex-colored
restricted CA matrices. The proof outline looks as follows. First, we define a subset of
uniform CA graphs, namely ∆-uniform CA graphs, for which the globally invariant nonHelly triangle representability problem can be solved in logspace. Therefore the canonical
representation problem for CA graphs is logspace-reducible to that of CA graphs which are
not ∆-uniform. This reduction follows from a slightly modified version of Lemma 4.14. Then
we show that the neighborhood matrix of a non-∆-uniform CA graph can be converted into
a vertex-colored restricted CA matrix by flipping ‘long’ arcs. By coloring the flipped arcs
the isomorphism type is preserved.
I Definition 5.6. For a graph G we define ∆G as the following set of ov-triangles (see
Definition 4.6). An ov-triangle T of G is in ∆G if there exist three pairwise different vertices
u, v, w in T such that the following holds:
1. N [u] ∪ N [v] ∪ N [w] = V (G)
2. For all z ∈ T it holds that if a vertex x ∈ NT (z) then x cd z
3. If there exist u0 , w0 such that (u, w, w0 , u0 ) is an induced 4-cycle and v overlaps with u0
and w0 then N [v] ⊆ N [u0 ] ∪ N [w0 ]
I Definition 5.7. A CA graph G is ∆-uniform if ∆G ∩ TIT (G) = ∅.
Let us explain the intuition behind these two definitions. The set ∆G approximates
TNHT (G). More precisely, whenever an ov-triangle T = {u, v, w} is in TNHT (G) this implies
that T satisfies certain constraints such as for example N [u] ∪ N [v] ∪ N [w] = V (G). The
set ∆G consists of three such constraints. Therefore if an ov-triangle is representable as
non-Helly triangle it must also be in ∆G , i.e. TNHT (G) ⊆ ∆G . The ∆-uniform CA graphs
can be alternatively seen as the subset of uniform CA graphs where the constraints of ∆G
suffice to characterize TNHT (G), i.e. ∆G = TNHT (G).
I Lemma 5.8. For every graph G it holds that TNHT (G) ⊆ ∆G . If G is a ∆-uniform CA
graph then TNHT (G) = ∆G .
19
20
Canonical Representations for Circular-Arc Graphs Using Flip Sets
Proof. For the first claim consider a graph G. If G is not a CA graph then TNHT (G) = ∅.
Therefore we can assume that G is a CA graph. Given an ov-triangle T ∈ TNHT (G) we
show that it must be in ∆G . Let ρ ∈ N (G) be a representation such that T = {u, v, w} is
represented as non-Helly triangle in it. Since ρ(u) ∪ ρ(v) ∪ ρ(w) covers the whole circle it
follows that N [u] ∪ N [v] ∪ N [w] = V (G), which is the first condition of Definition 5.6. To see
that the second condition holds we consider a vertex x ∈ NT (u) without loss of generality.
Since x is not adjacent to v and w it holds that ρ(x) ⊆ C \ (ρ(v) ∪ ρ(w)) where C denotes
the whole circle. Since C \ (ρ(v) ∪ ρ(w)) ⊂ ρ(u) it follows that ρ(x) ⊂ ρ(u). Due to the fact
that ρ is a normalized representation this implies that x is contained by u. To see that the
third condition of ∆G holds let u0 , w0 be vertices such that (u, w, w0 , u0 ) is an induced 4-cycle
of G. Since T is represented as non-Helly triangle in ρ it must hold that {u0 , v, w0 } is an
interval triangle in ρ with ρ(v) ⊂ ρ(u0 ) ∪ ρ(w0 ) and therefore N [v] ⊆ N [u0 ] ∪ N [w0 ].
For the second claim let G be a ∆-uniform CA graph. From the previous claim we know
that TNHT (G) ⊆ ∆G . Since every ov-triangle must be in TNHT (G) ∪ TIT (G) it follows that
∆G ⊆ TNHT (G) ∪ TIT (G). The definition of ∆-uniform requires ∆G ∩ TIT (G) = ∅ and thus
∆G ⊆ TNHT (G).
J
I Fact 5.9. ∆-uniform CA graphs are a strict subset of uniform CA graphs.
Proof. Assume there exists a ∆-uniform CA graph G which is not uniform. This means
there exists an ov-triangle T ∈ TNHT (G) ∩ TIT (G). Due to the previous lemma it holds that
TNHT (G) ⊆ ∆G . This implies that T ∈ ∆G ∩ TIT (G) which contradicts that G is ∆-uniform.
Therefore every ∆-uniform CA graph is uniform.
An example of a uniform CA graph that is not ∆-uniform is the graph X4 in Figure 7. In
the third paragraph after Theorem 5.2 we argued that X4 is a uniform CA graph because it
has a unique normalized representation. Assume that the black arcs of X4 are labeled with
u, u0 , v, v 0 , w, w0 in the same way that the representation of 3K2 is labeled in Figure 7. To
see that X4 is not ∆-uniform it suffices to check that the ov-triangle {u, v, w} is in ∆X4 and
represented as interval triangle.
J
I Corollary 5.10. The globally invariant non-Helly triangle representability problem for
∆-uniform CA graphs can be solved in logspace.
Proof. Given a CA graph G and an ov-triangle T output yes iff T ∈ ∆G . This is correct
because in the case of a ∆-uniform CA graph G it holds that ∆G = TNHT (G) (Lemma 5.8).
Clearly, ∆G is computable in logspace and an invariant.
J
I Lemma 5.11. Let G be a CA graph that is not ∆-uniform. Then there exists an induced
4-cycle C = (u, w, w0 , u0 ) such that N [u] ∪ N [w] = N [u0 ] ∪ N [w0 ] = V (G) and a vertex v that
overlaps with every vertex in C.
Proof. The argument is essentially the same as the one made for the “⇒”-direction in
the proof of Theorem 5.2. The difference is that instead of the stronger assumption that
T ∈ TNHT (G) we only require that T ∈ ∆G .
Since G is not ∆-uniform there exists an ov-triangle T = {u, v, w} of G such that T ∈ ∆G
and there is a representation ρ ∈ N (G) such that T is represented as interval triangle in ρ.
Furthermore, let us assume w.l.o.g. that ρ(v) ⊂ ρ(u) ∪ ρ(w). Since T ∈ ∆G it holds that
N [u] ∪ N [v] ∪ N [w] = V (G). Due to the interval representation of T in ρ it follows that
N [u] ∪ N [w] = V (G). Since u and w do not form a circle cover it must hold that there
exists a vertex u0 ∈ N [u] \ N [w] such that N [u0 ] \ N [u] is non-empty. If u0 is disjoint from
v it follows that u0 must be contained by u from the second condition in Definition 5.6 of
M. Chandoo
∆G . This cannot be the case and therefore u0 ∈ NT (u, v). For u0 to have a neighbor which
is not adjacent to u it must hold that ρ(u0 ) 6⊆ ρ(u). Therefore u0 overlaps with u and v.
Let w0 ∈ N [u0 ] \ N [u]. If w0 ∈ NT (w) then w0 would be contained by w due to the second
condition of ∆G . Again, this cannot be the case and therefore w0 ∈ NT (v, w). From the
representation ρ it follows that w must overlap with u0 , v and w. Then C = (u, w, w0 , u0 ) is
an induced 4-cycle of G such that v overlaps with every vertex of C. It remains to show that
N [u0 ] ∪ N [w0 ] = V (G). Due to the third condition of ∆G it holds that N [v] ⊆ N [u0 ] ∪ N [w0 ].
Additionally, it holds that ρ(u) \ ρ(v) ⊂ ρ(u0 ) and ρ(w) \ ρ(v) ⊂ ρ(w0 ). As a consequence
N [u0 ] ∪ N [w0 ] = V (G).
J
I Corollary 5.12. Canonical representations for CA graphs without induced 4-cycle can be
computed in logspace.
Proof. By Lemma 5.11 the class of CA graphs without induced 4-cycle is a subset of ∆uniform CA graphs and due to Corollary 5.10 and Theorem 4.12 a canonical representation
for such graphs can be computed in logspace.
J
I Corollary 5.13. Helly CA graphs are a strict subset of ∆-uniform CA graphs.
Proof. Assume G is a Helly CA graph which is not ∆-uniform. Then due to Lemma 5.11
there exists an induced 4-cycle C and a vertex v not in C which overlaps with every vertex
in C. In any normalized representation of G it must hold that v forms a non-Helly triangle
with two vertices from C. This contradicts that G is Helly. The graph
is a ∆-uniform
CA graph which is not Helly.
J
I Theorem 5.14. The canonical representation problem for CA graphs is logspace-reducible
to the canonical representation problem for vertex-colored restricted CA matrices.
Proof. For brevity let Z denote the set of all CA graphs which are not ∆-uniform. Since the
globally invariant non-Helly triangle representability problem for ∆-uniform CA graphs can
be solved in logspace (see Corollary 5.10) it follows from a modified version of Lemma 4.14
that the canonical representation problem for CA graphs is logspace-reducible to the canonical
representation problem for vertex-colored Z. To see this replace ‘uniform’ with ‘∆-uniform’
and ‘non-uniform’ with ‘non-∆-uniform’ in the statement (and proof) of Lemma 4.14.
(X)
For a CA graph G let us say a subset of vertices X of G is an R-flip set if λG is a
restricted CA matrix. To find canonical representations for Z we construct an invariant
vertex set selector f such that f (G) contains at least one R-flip set for every G ∈ Z. Then
to obtain a canonical representation for G ∈ Z let X̂ denote the R-flip set in f (G) such that
(X̂)
canon(λG , cX̂ ) is lexicographically minimal with cX being the coloring which assigns every
vertex v ∈ X the color red and the other vertices are blue. Let ρ be a canonical normalized
(X̂)
representation for (λG , cX̂ ). Then ρ(X̂) is a canonical representation for G. Notice, that
ρ(X̂) can be computed in logspace by computing canonical representations for vertex-colored
restricted CA matrices. The correctness of this approach follows from the same argument
made in the proof of Theorem 3.5 in the flip trick section. The analogy is straightforward.
The R-flip sets in this context correspond to flip sets and the invariant vertex set selector f
takes the place of the invariant flip set function. Given a CA graph G and X ⊆ V (G) it can
(X)
be easily checked in logspace whether λG is a restricted CA matrix.
For a CA graph G let C(G) denote the set of all ordered induced 4-cycles in G. Now, we
claim that the following logspace-computable function f is an invariant vertex set selector
with the desired property:
21
22
Canonical Representations for Circular-Arc Graphs Using Flip Sets
[
f (G) =
{x ∈ V (G) \ C | ∃y ∈ C : x cs y}
C∈C(G)
It is not difficult to check that f is invariant. It remains to argue why f (G) contains at
least one R-flip set for every G ∈ Z. Let G ∈ Z and C = (u, w, w0 , u0 ) is an induced 4-cycle
in G such that N [u] ∪ N [w] = N [u0 ] ∪ N [w0 ] = V (G). The existence of such an induced
4-cycle is guaranteed by Lemma 5.11. Observe that if there exists a u1 ∈ NC (u, w, u0 ) with
u1 cs u then C1 = (u1 , w, w0 , u0 ) also satisfies the previous condition N [u1 ] ∪ N [w] = V (G).
Therefore we can assume that there exists no z ∈ C and z1 ∈ NC (N [z] ∩ C) such that z1 cs z.
From N [u] ∪ N [w] = N [u0 ] ∪ N [w0 ] = V (G) it immediately follows that NC (u, w), NC (u0 , w0 )
and NC (x) are empty for every x ∈ C.
We prove that λ(X) is a restricted CA matrix with witness cycle C where λ is the
neighborhood matrix of G and X = {x ∈ V (G) \ C | ∃y ∈ C : x cs y}. Note that X ∈ f (G)
via C. To reference the neighborhoods of G (which are the same as the ones of λ) or λ(X)
(X)
(X)
we write N G and N λ
to distinguish between them. First, we show that NCλ (u, w) = ∅.
(X)
Assume the opposite, i.e. there exists x ∈ NCλ (u, w). If x was not flipped, i.e. x ∈
/ X,
then it also holds that x ∈ NCG (u, w), which contradicts that NCG (u, w) is empty. If x
was flipped, i.e. x ∈ X, then it must be the case that x contains u0 and w0 in λ. This
means NG [u0 ] ∪ NG [w0 ] ⊆ NG [x] which implies that x is a universal vertex in G since
(X)
NG [u0 ] ∪ NG [w0 ] = V (G), contradiction. For the same reason it holds that NCλ (u0 , w0 )
(X)
(X)
and NCλ (z) are empty for all z ∈ C. It remains to show that for all x ∈ NCλ (C) it
(X)
holds that x overlaps with all vertices of C in λ(X) . Notice that λx,z ∈ {ov, cs, cc} for
every z ∈ C. Otherwise x would not be in NC (C). We consider the following two cases: in
the first one we assume that x contains one vertex of C in λ(X) and in the second one we
assume that x forms a circle cover with one vertex of C in λ(X) . We prove that neither of
these cases can occur and therefore x must overlap with all vertices of C in λ(X) . For the
first case assume that w.l.o.g. x contains u in λ(X) and intersects with the other vertices
of C in λ(X) . If x ∈ X then it was flipped. It follows that x was disjoint from u in λ and
therefore x ∈ NCG (w, w0 , u0 ). Since x ∈ X it also must hold that x contains at least one of the
vertices w, w0 , u0 in G. It follows that x contains w0 since it cannot contain the other two in λ.
However, this contradicts our choice of C which says that there exists no w10 ∈ NCG (w, w0 , u0 )
such that w10 contains w0 in λ. If x ∈
/ X then it must hold that x already contained u in λ.
But then x should be in X, contradiction. For the second case assume x forms a circle cover
with u in λ(X) . If x forms a circle cover with u then this implies that x contains w0 in λ(X)
and therefore this reduces to the first case. We conclude that both conditions of Definition
5.4 are satisfied and hence λ(X) is a restricted CA matrix.
J
6
Further Research
Finding a polynomial-time isomorphism test for CA graphs remains an open problem. We
have shown that it suffices to consider only non-uniform CA graphs for this problem. This
particular class of CA graphs offers quite a lot of structure, which is caused by what we
named non-uniformity witnesses. It seems plausible that such witnesses can be exploited
to devise an isomorphism test. Additionally, we proved that the canonical representation
problem for CA graphs is logspace-reducible to that of restricted CA matrices. The central
question with regard to the flip trick is how invariant flip sets for restricted CA matrices or
non-uniform CA graphs can be computed. Also, we remark that CA representations for CA
graphs can be computed in logspace if flip sets for restricted CA matrices can be found in
M. Chandoo
logspace. Another interesting problem is to extend Definition 5.6 of ∆G such that it captures
TNHT (G) on uniform CA graphs, i.e. ∆G = TNHT (G) for all uniform CA graphs G. If this
can be done in such a way that ∆G remains an invariant and computable in logspace then
everything that is said about ∆-uniform CA graphs in section 5 also applies to uniform CA
graphs.
Acknowledgements. We thank the anonymous reviewers for their insightful comments and
suggestions that helped us to improve the quality of this work.
References
1
2
3
4
5
6
7
8
9
10
Yixin Cao, Luciano N. Grippo, and Martín D. Safe.
Forbidden induced subgraphs of normal Helly circular-arc graphs: Characterization and detection. Discrete Applied Mathematics, 216, Part 1:67 – 83, 2017.
Special Graph Classes
and Algorithms — in Honor of Professor Andreas Brandstädt on the Occasion of
His 65th Birthday.
URL: http://www.sciencedirect.com/science/article/pii/
S0166218X15004308, doi:http://dx.doi.org/10.1016/j.dam.2015.08.023.
Maurice Chandoo. Deciding Circular-Arc Graph Isomorphism in Parameterized Logspace.
In Nicolas Ollinger and Heribert Vollmer, editors, 33rd Symposium on Theoretical Aspects of Computer Science (STACS 2016), volume 47 of Leibniz International Proceedings
in Informatics (LIPIcs), pages 26:1–26:13, Dagstuhl, Germany, 2016. Schloss Dagstuhl–
Leibniz-Zentrum fuer Informatik. URL: http://drops.dagstuhl.de/opus/volltexte/
2016/5727, doi:http://dx.doi.org/10.4230/LIPIcs.STACS.2016.26.
Andrew Curtis, Min Lin, Ross McConnell, Yahav Nussbaum, Francisco Soulignac, Jeremy
Spinrad, and Jayme Szwarcfiter. Isomorphism of graph classes related to the circular-ones
property. Discrete Mathematics and Theoretical Computer Science, 15(1), 2013. URL:
http://www.dmtcs.org/dmtcs-ojs/index.php/dmtcs/article/view/2298.
Elaine Marie Eschen. Circular-Arc Graph Recognition and Related Problems. PhD thesis,
Vanderbilt University, Nashville, TN, USA, 1998. UMI Order No. GAX98-03921.
F. Gavril. Algorithms on circular-arc graphs. Networks, 4(4):357–369, 1974. URL: http:
//dx.doi.org/10.1002/net.3230040407, doi:10.1002/net.3230040407.
Martin Charles Golumbic. Algorithmic Graph Theory and Perfect Graphs (Annals of Discrete Mathematics, Vol 57). North-Holland Publishing Co., Amsterdam, The Netherlands,
The Netherlands, 2004.
Wen-Lian Hsu. O(M · N ) algorithms for the recognition and isomorphism problems on
circular-arc graphs. SIAM J. Comput., 24(3):411–439, June 1995. URL: http://dx.doi.
org/10.1137/S0097539793260726, doi:10.1137/S0097539793260726.
Benson L. Joeris, Min Chih Lin, Ross M. McConnell, Jeremy P. Spinrad, and Jayme L.
Szwarcfiter. Linear-time recognition of Helly circular-arc models and graphs. Algorithmica,
59(2):215–239, 2011. URL: http://dx.doi.org/10.1007/s00453-009-9304-5, doi:10.
1007/s00453-009-9304-5.
Johannes Köbler, Sebastian Kuhnert, Bastian Laubner, and Oleg Verbitsky. Interval graphs:
Canonical representations in logspace. SIAM Journal on Computing, 40(5):1292–1315, 2011.
doi:10.1137/10080395X.
Johannes Köbler, Sebastian Kuhnert, and Oleg Verbitsky. Helly circular-arc graph isomorphism is in logspace. In Mathematical Foundations of Computer Science 2013, volume 8087 of Lecture Notes in Computer Science, pages 631–642. Springer Berlin Heidelberg, 2013. URL: http://dx.doi.org/10.1007/978-3-642-40313-2_56, doi:10.1007/
978-3-642-40313-2_56.
23
24
Canonical Representations for Circular-Arc Graphs Using Flip Sets
11
12
13
14
15
16
17
18
Johannes Köbler, Sebastian Kuhnert, and Oleg Verbitsky.
Solving the canonical
representation and star system problems for proper circular-arc graphs in logspace.
Journal of Discrete Algorithms, 38-41(Supplement C):38 – 49, 2016. URL: http:
//www.sciencedirect.com/science/article/pii/S1570866716300016, doi:https://
doi.org/10.1016/j.jda.2016.03.001.
Min Chih Lin and Jayme L. Szwarcfiter. Characterizations and recognition of circulararc graphs and subclasses: A survey. Discrete Mathematics, 309(18):5618 – 5635,
2009. Combinatorics 2006, A Meeting in Celebration of Pavol Hell’s 60th Birthday (May 1–5, 2006). URL: http://www.sciencedirect.com/science/article/pii/
S0012365X08002161, doi:http://dx.doi.org/10.1016/j.disc.2008.04.003.
George S. Lueker and Kellogg S. Booth. A linear time algorithm for deciding interval graph
isomorphism. J. ACM, 26(2):183–195, April 1979. URL: http://doi.acm.org/10.1145/
322123.322125, doi:10.1145/322123.322125.
Ross M. McConnell. Linear-time recognition of circular-arc graphs. Algorithmica,
37(2):93–147, 2003. URL: http://dx.doi.org/10.1007/s00453-003-1032-7, doi:10.
1007/s00453-003-1032-7.
Franklin W. Stahl. Circular genetic maps. Journal of Cellular Physiology, 70(S1):1–12, 1967.
URL: http://dx.doi.org/10.1002/jcp.1040700403, doi:10.1002/jcp.1040700403.
Alan Tucker. Characterizing circular-arc graphs. Bull. Amer. Math. Soc., 76(6):1257–1260,
11 1970. URL: http://projecteuclid.org/euclid.bams/1183532398.
Michael S. Waterman and Jerrold R. Griggs.
Interval graphs and maps of
dna. Bulletin of Mathematical Biology, 48(2):189 – 195, 1986. URL: http://www.
sciencedirect.com/science/article/pii/S0092824086800064, doi:http://dx.doi.
org/10.1016/S0092-8240(86)80006-4.
Tsong-Ho Wu. An O(n3 ) Isomorphism Test for Circular-Arc Graphs. PhD thesis, SUNY
Stony Brook, New York, NY, USA, 1983.
| 8cs.DS
|
Online Identification of Time-Varying Systems: a Bayesian approach
arXiv:1609.07393v1 [cs.SY] 23 Sep 2016
G. Prando, D. Romeres and A. Chiuso
Abstract— We extend the recently introduced regularization/Bayesian System Identification procedures to the estimation
of time-varying systems. Specifically, we consider an online
setting, in which new data become available at given time steps.
The real-time estimation requirements imposed by this setting
are met by estimating the hyper-parameters through just one
gradient step in the marginal likelihood maximization and by
exploiting the closed-form availability of the impulse response
estimate (when Gaussian prior and Gaussian measurement
noise are postulated). By relying on the use of a forgetting factor,
we propose two methods to tackle the tracking of time-varying
systems. In one of them, the forgetting factor is estimated
by treating it as a hyper-parameter of the Bayesian inference
procedure.
I. I NTRODUCTION
The identification of time-varying systems plays a key role in
different applications, such as adaptive and model predictive
control, where a good real-time tracking of the system to
be controlled is necessary. In addition, the detection of
changes or drifts in plant parameters is crucial in terms
of process monitoring and fault detection. Online System
Identification (SysId) and the estimation of time-varying
systems are typically strictly connected problems: one would
like to exploit the new data that become available in order
to track possible changes in the system dynamics.
Recursive Prediction Error Method (RPEM), a variant of
the classical PEM [1], [2], represents nowadays a wellestablished technique, through which the current estimate can
be efficiently updated, as soon as new data are provided.
RPEM are parametric approaches, relying on Recursive
Least-Squares (RLS) routines, which compute the parameter
estimate by minimizing a functional of the prediction errors
[1]. An extension of these approaches to the identification of
time-varying systems involves the adoption of a forgetting
factor, through which old data become less relevant in the
estimation criterion. Convergence and stability properties of
Forgetting Factor RPEM have been well-studied within the
SysId community [3], [4].
Alternative approaches model the coefficients trajectories as
stochastic processes [5], thus exploiting Kalman filtering [6]
or Bayesian inference [7] for parameter estimation. Combinations of bases sequences (e.g. wavelet basis [8]) have also
been considered to model the parameters time evolution.
The above-mentioned parametric procedures share the criticality of the model selection complexity: this step is especially crucial when the model complexity has to be modified
This work has been partially supported by the FIRB project “Learning
meets time” (RBFR12M3AC) funded by MIUR.
† Dept. of Information Engineering, University of Padova (e-mail:
{romeresd,prandogi,chiuso}@dei.unipd.it)
†
in response to changes in the true system dynamics. In
addition, classical complexity selection rules (e.g. crossvalidation or information criteria) may not be applicable in
online settings, due to the excessive computational effort
they require. Model complexity issues have been partially
addressed in the SysId community through the recent introduction of non-parametric methods, relying on Gaussian
processes and Bayesian inference [9], [10]. In this framework
model complexity is tuned in a continuous manner by
estimating the hyper-parameters which describe the prior
distribution chosen by the user [11]. This property makes
these new techniques appealing for the online identification
of time-varying systems: indeed, model complexity can be
continuously adapted whenever new data become available.
In a previous work [12] we started exploring this research
direction by adapting the newly introduced Bayesian procedures to an online identification setting. The methodologies
proposed in [12] are extended in this new paper by dealing
with time-varying systems. Two approaches, relying on the
use of a forgetting factor, are proposed; in particular, following the approach in [13], we investigate the online estimation
of the forgetting factor by treating it as a hyper-parameter
of the Bayesian inference procedure. These techniques are
experimentally compared with the classical parametric counterparts: the results appear favourable and promising for the
methods we propose.
The paper is organized as follows. Sec. II presents the online
identification framework and the challenges we will try to
address. Sec. III provides a brief review of parametric realtime identification techniques, while Sec. IV illustrates the
Bayesian approach to linear SysId, both in the batch and
online scenarios. In particular, Sec. IV-C focuses on the
estimation of time-varying systems. Experimental results are
reported in Sec. V, while conclusions are drawn in Sec. VI.
II. P ROBLEM F ORMULATION
Consider a dynamical system described through an outputerror model, i.e.:
y(t) = [h ∗ u] (t) + e(t),
y(t), u(t) ∈ R
(1)
where h(t) denotes the model impulse response and e(t) is
assumed to be a zero-mean Gaussian noise with variance σ 2 .
SysId techniques aim at estimating the impulse response h of
N
the system, once a set D := {y(t), u(t)}t=1
of measurements
of its input and output signals is provided.
In this work we consider an online setting, in which a new
set of input-output measurements becomes available every T
time steps. Specifically, let us define the variable i := k/T by
assuming w.l.o.g. that k is a multiple of T , and the ith −dataset
iT
as Di = {u(t), y(t)}t=(i−1)T
+1 .
We suppose that at time k an impulse response estimate ĥ(i)
has been computed using the data coming from a collection
S
iT
of previous datasets il=1 Dl = {u(t), y(t)}t=1
; at time k + T
new data Di+1 become available and we would like to update
the previous estimate ĥ(i) by exploiting them. In addition
we assume that the underlying system undergoes certain
variations that we would like to track: this situation could
often arise in practice, due to e.g. variations of the internal
temperature, of the masses (e.g. after grasping an object).
Furthermore, online applications typically require that the
new estimate is available before the new dataset Di+2 is
provided, thus limiting the computational complexity and the
memory storage of the adopted estimation methods.
In this paper, the recently proposed Bayesian approach to
SysId [10] is adapted in order to cope with the outlined
online setting. Its performances are compared with the ones
achieved using classical parametric approaches.
Remark 1: We stress that in the remainder of the paper
we will use the indexes k and iT interchangeably.
III. PARAMETRIC A PPROACH
Standard parametric approaches to SysId rely on the a-priori
choice of a model class M (e.g. ARX, ARMAX, OE, etc.),
which is completely characterized by a parameter θ ∈ Rm .
A. Batch Approach
N
In the batch setting, when a dataset D = {y(t), u(t)}t=1
is
provided, the identification procedure reduces to estimate θ
by minimizing the sum of squared prediction errors:
1 N
θ̂ = arg minm VN (θ , D) = arg minm ∑ (y(t) − ŷ(t|θ ))2 (2)
θ ∈R
θ ∈R 2 t=1
where ŷ(t|θ ) denotes the one-step ahead predictor [1].
B. Online Approach
The extension of these procedures to an online setting relies
on RLS (or pseudo LS) methods.
For ease of notation, let us assume T = 1 in this section.
Suppose that at time k + 1 a new input-output data pair Di+1
is provided; then θ̂ (i) is updated as:
−1
θ̂ (i+1) = θ̂ (i) + µ (i+1) Q(i+1) ∇θ Vk+1 (θ̂ (i) ,
l=1 Dl )
Si+1
(3)
where
Dl ) denotes the gradient of the
loss function computed in the previous estimate and in the
new data; µ (i+1) ∈ R and Q(i+1) ∈ Rm×m are appropriate
scalings which assume different shapes according to the
specific algorithm which is adopted (see [2] and [1], Ch.
11, for further details). Notice that (3) is simply a scaled
S
gradient step w.r.t. the loss function Vk+1 (θ , i+1
l=1 Dl ).
S
∇θ Vk+1 (θ̂ (i) , i+1
l=1
C. Dealing with time-varying systems
In order to cope with time-varying systems, a possible
strategy involves the inclusion of a forgetting factor γ̄ in
the loss function Vk (θ , D):
Vk (θ , D) =
γ
1 k k−t
∑ γ̄ (y(t) − ŷ(t|θ ))2 ,
2 t=1
γ̄ ∈ (0, 1]
(4)
In this way old measurements become less relevant for
the computation of the estimate. A recursive update of the
estimate θ̂ (i) (as the one in (3)) can be derived ([1], Ch. 11).
As an alternative, a sliding window approach can be adopted:
at each time step only the last Nw data are used for computing
the current estimate (with Nw being the window length).
However, since this approach does not admit an update rule
as the one in (3), the computational complexity of the new
estimate will depend on the window length.
A crucial role in the application of parametric SysId techniques is played by the model order selection step: once a
model class M is fixed, its complexity has to be chosen
using the available data. This is typically accomplished
by estimating models with different complexities and by
applying tools such as cross-validation or information criteria
to select the most appropriate one. However, the estimation of
multiple models may be computationally expensive, making
this procedure not suited for the online identification of timevarying systems. Indeed, in this framework, it should ideally
be applied every time new data become available.
The recently proposed approach to SysId, relying on regularization/Bayesian techniques, overpasses the above-described
issue by jointly performing estimation and order selection. Next section will illustrate how the batch regularization/Bayesian method can be tailored to the online identification of time-varying systems.
IV. R EGULARIZATION /BAYESIAN A PPROACH
A. Batch Approach
We discuss how the regularization/Bayesian technique
works in the standard batch setting, i.e. when data D =
N
{y(t), u(t)}t=1
are given. For future use, let us define the
vector YN = [y(1) ... y(N)]> ∈ RN .
According to the Bayesian estimation, the impulse response
h is considered as a realization of a stochastic process with
a prior distribution pη (h), depending on some parameters
η ∈ Ω. The prior pη (h) is designed in order to account for
some desired properties of the estimated impulse response,
such as smoothness and stability [9], [10]. In the Bayesian
framework, the parameters η are known as hyper-parameters
and they need to be estimated from the data, e.g. by optimizing the so-called marginal likelihood (i.e. the likelihood
once the latent variable h has been integrated out) [11]:
Z
η̂ = arg max pη (YN ) = arg max
η∈Ω
η∈Ω
p(YN |h)pη (h)dh
(5)
Once the hyper-parameters η have been estimated, the
minimum variance estimate of h needs to be computed; it
coincides with the posterior mean given the observed data:
Z
ĥ := Eη̂ [h|YN ] =
h
p(YN |h)pη̂ (h)
dh
pη̂ (YN )
(6)
In the SysId context, h is typically modelled as a zeromean Gaussian process (independent of the noise e(t)) with
covariance E [h(t), h(s)] = K̄η (t, s) (aka kernel in the Machine
Learning literature) [9], [14]. Thanks to this asssumption, the
marginal likelihood pη (YN ) is Gaussian and the estimate (6)
is available in closed form.
Furthermore, for simplicity the IIR model in (1) can be accurately approximated by a FIR model of order n, whenever n is
chosen large enough to catch the relevant components of the
system dynamics. By collecting in h := [h(1) · · · h(n)]> ∈
Rn the first n impulse response coefficients, the following
Gaussian prior can be defined:
pη (h) ∼ N (0, Kη ),
η ∈ Ω ⊂ Rd , Kη ∈ Rn×n
(7)
as 1st or 2nd order optimization algorithms [15] or the
Expectation-Maximization (EM) algorithm [16], [17]. Since
these methods may require a large number of iterations
before reaching convergence, they may be unsuited for
online applications. We should recall that, when adopted
for marginal likelihood optimization, each iteration of these
algorithms has a computational complexity of O(n3 ), due to
the objective function evaluation. Specifically, f(i+1)T (η) can
be robustly evaluated as [18]
The hyper-parameters η can then be estimated by solving
η̂ = arg min − ln pη (YN ) = arg min fN (η)
η∈Ω
u(−1)
..
.
u(N) u(N − 1)
(8)
···
..
.
···
u(−n + 1)
..
.
u(N − n + 1)
(9)
(10)
(11)
In the batch setting we are considering the quantities
u(−n + 1), ..., u(0) can be either estimated or set to zero.
Here, we follow the latter option. Once η̂ has been computed,
the corresponding minimum variance estimate is given by
b : = Eη̂ [h|YN ] = arg min (YN − ΦN h)> (YN − ΦN h) + σ 2 h> K −1 h
h
η̂
∈ n
h R
2 −1 −1 >
= (Φ>
N ΦN + σ Kη̂ ) ΦN YN
+ σ −2 ( Y
η∈Ω
fN (η) = YN> Σ(η)−1YN + ln det Σ(η)
2
Σ(η) = ΦN Kη Φ>
N + σ IN
where ΦN ∈ RN×n :
u(0)
ΦN := ...
f(i+1)T (η) =((i + 1)T − n) ln σ 2 + 2 ln |S|
(i+1)
− kS−1 L>Ye (i+1) k22 )
(16)
where L and S are Cholesky factors: Kη =: LL> and σ 2 In +
L> R(i+1) L =: SS> (whose computation is O(n3 )).
To tackle the real-time constraints, the approach proposed
in [12] is adopted: η̂ (i+1) is computed by running just one
iteration of a Scaled Gradient Projection (SGP) algorithm
(a 1st order optimization method) applied to solve problem
(8) [15]. Algorithm 1 summarizes its implementation. Notice
that it is initialized
with the previous estimate η̂ (i) (obtained
Si
using the data l=1 Dl ) which is likely to be close to a local
optimum of the objective function fiT (η) ≡ fk (η). If the
number of new data T << k, it is reasonable to suppose
that arg minη∈Ω fiT (η) ≈ arg minη∈Ω f(i+1)T (η). Therefore,
by just performing one SGP iteration, η̂ (i+1) will be sufficiently close to a local optimum of f(i+1)T (η).
(12)
b in (12) can be computed once
Remark 2: The estimate h
a noise variance estimate σ̂ 2 is available. For this purpose,
σ 2 can be treated as a hyper-parameter and estimated by
solving (8) or it can be computed from a LS estimate of h.
In this work the latter option is adopted.
B. Online Approach
We now adapt the batch technique described in Sec. IVA to the online setting outlined in Sec. II. At time k + T ,
(i+1)T
when data Di+1 = {u(t), y(t)}t=iT +1 are provided, the current
b(i) is updated through formula
impulse response estimate h
(12), once the data matrices are enlarged with the new data
and a new hyper-parameter estimate η̂ (i+1) is computed. The
data matrices are updated through the following recursions
(i+1)T > (i+1)T
(i)
ΦiT +1 (13)
R(i+1) := Φ>
(i+1)T Φ(i+1)T = R + ΦiT +1
>
(i+1)T
(i+1)T
e (i)
Ye (i+1) := Φ>
YiT +1
(14)
(i+1)T Y(i+1)T = Y + ΦiT +1
(i+1)
(i)
(i+1)T > (i+1)T
>
Y
:= Y(i+1)T
Y(i+1)T =Y + YiT +1
YiT +1
(15)
(i+1)T
where Y(i+1)T = [y(1) · · · y(iT + T )]> ∈ R(i+1)T , YiT +1 =
[y(iT + 1) · · · y(iT + T )]; Φi is defined as in (11) with N
(i+1)T
replaced by (i + 1)T , while ΦiT +1 has the same structure
of matrix (11) but it contains the data from iT − n + 1 to
(i + 1)T . The computational cost of (13)-(15) is, O(n2 T ),
O(nT ) and O(T 2 ), respectively.
The minimization of f(i+1)T (η) in (9), needed to determine
η̂ (i+1) , is typically performed through iterative routines, such
Algorithm 1 1-step Scaled Gradient Projection (SGP)
1:
2:
3:
4:
5:
6:
7:
8:
9:
10:
11:
12:
Inputs: previous estimates {η̂ (i) , η̂ (i−1) }, ∇ fiT (η̂ (i−1) ),
(i+1)
2
R(i+1) , Ye (i+1) , Y
, σ̂ (i+1)
Initialize: c = 10−4 , δ = 0.4
Compute ∇ f(i+1)T (η̂ (i) )
r(i−1) ← η̂ (i) − η̂ (i−1)
w(i−1) ← ∇ f(i+1)T (η̂ (i) ) − ∇ fiT (η̂ (i−1) )
Approximate the inverse Hessian of f(i+1)T (η̂ (i) ) as
B(i) = α (i) D(i) (using the procedure outlined in [15])
Project onto the feasible set:
z ← ΠΩ,D(i) ( η̂ (i) − B(i) ∇ f(i+1)T (η̂ (i) ) )
∆η̂ (i) ← z − η̂ (i)
ν ←1
if
f(i+1)T (η̂ (i) + ν∆η̂ (i) ) ≤ f(i+1)T (η̂ (i) ) +
cν∇ f(i+1)T (η̂ (i) )> ∆η̂ (i) then
Go to step 12
else
ν ← δν
η̂ (i+1) ← η̂ (i) + ν∆η̂ (i)
Output: η̂ (i+1)
The key step in Algorithm 1 is 4, where the inverse Hessian
is approximated as the product between the positive scalar
α (i) ∈ R+ and the diagonal matrix D(i) ∈ Rd×d . α (i) is chosen
by alternating the so-called Barzilai-Borwein (BB) rules [19]:
>
(i)
α1 :=
r(i−1) r(i−1)
,
>
r(i−1) w(i−1)
>
(i)
α2 :=
r(i−1) w(i−1)
>
w(i−1) w(i−1)
(17)
with r(i−1) and w(i−1) specified at steps 2 and 3 of Algorithm
1. The definition of D(i) depends on the constraints set and
on the objective function. The authors in [15] exploit the
following decomposition of ∇η f(i+1)T (η) (defined in (9)):
∇η f(i+1)T (η) = V (η) −U(η),
V (η) > 0, U(η) ≥ 0 (18)
to specify D(i) . We refer the interested reader to [15] for
further details.
The projection operator adopted at step 5 of Algorithm 1 is
ΠΩ,D(i) (z) = arg minx∈Ω
−1
(x − z)> D(i) (x − z)
In this section we deal with the identification of timevarying systems: specifically, estimators have to be equipped
with tools through which past data become less relevant for
the current estimation. In the following we propose two
routines which combine the “online Bayesian estimation”
above sketched with the ability to “forget” past data.
1) Fixed Forgetting Factor: Following a classical practice
in parametric SysId (see Sec. III), we introduce a forgetting
factor γ̄ ∈ (0, 1] into the data we are provided in order to base
the estimation mainly on the more recent data. Specifically,
we assume that the first k data are generated according to
the following linear model:
ḠkYk = Ḡk Φk h + E, E = [e(1)...e(k)]> ∼ N (0, σ 2 Ik ) (20)
where Ḡk Ḡk =: Γ̄k and Γ̄k := diag γ̄ k−1 , γ̄ k−2 , ..., γ̄ 0 . Therefore, when adopting the regularized regression criterion (12),
the estimate at time k is computed as:
(21)
= arg minn (Yk − Φk h)> Γ̄k (Yk − Φk h) + σ 2 h> Kη̂−1 h
h∈R
>
= (Φk Γ̄k Φk + σ 2 Kη̂−1 )−1 Φ>
k Γ̄kYk
(22)
Correspondingly, the hyper-parameters are estimated solving:
η̂ = arg min Yk> Ḡk Σγ̄ (η)−1 ḠkYk + ln det Σγ̄ (η)
(23)
η∈Ω
2
Σγ̄ (η) = Ḡk Φk Kη Φ>
k Ḡk + σ Ik
Algorithm 2
identification
In particular,
and η̂ (i) are
Inputs: forgetting factor γ̄, previous estimates
(i) (i) (i)
{η̂ (i) , η̂ (i−1) }, previous data matrices {Rγ̄ , Yeγ̄ ,Yγ̄ },
(i+1)T
C. Dealing with time-varying systems
h∈R t=1
Algorithm 2 Online Bayesian SysId: Fixed Forgetting Factor
(19)
Remark 3: Besides SGP, in [12] other inverse Hessian
approximations are investigated (e.g. the BFGS formula).
In this work we only consider the SGP approximation,
since it appears preferable to the others, according to the
experiments we performed (both in the time-invariant and
-variant domain). [12] also considers the EM algorithm as
an alternative to 1st order optimization methods to solve
problem (8). Even if the results reported for EM in [12]
are comparable to the ones achieved through SGP, the latter
approach appears superior to EM in the time-varying setting
we are considering.
k
bγ̄ := arg min ∑ γ̄ k−t y(t) − Φtt h 2 + σ 2 h> K −1 h
h
η̂
n
solving, respectively, (21) and (23); these estimates are
then online updated after the new data Di+1 are provided. Once γ̄ is chosen by the user, it is inserted in
(i+1)
e
the data matrices Rγ̄
:= Φ>
(i+1)T Γ̄(i+1)T Φ(i+1)T , Yγ̄ (i+1) :=
>
>
Φ(i+1)T Γ̄(i+1)T Y(i+1)T , Yγ̄ (i+1) := Y(i+1)T Γ̄(i+1)T Y(i+1)T , updated at steps 1-3 of the algorithm.
(24)
illustrates the online implementation of the
procedure based on equations (22) and (23).
b(i)
it assumes that at time k the estimates h
available and they have been computed by
new data Di+1 = {u(t), y(t)}t=iT +1
(i+1)
(i)
(i+1)T >
(i+1)T
1: Rγ̄
← γ̄ T Rγ̄ + ΦiT +1
Γ̄T ΦiT +1
>
e (i+1) ← γ T Yeγ(i) + Φ(i+1)T Γ̄T Y (i+1)T
2: Y
γ̄
iT +1
iT +1
>
(i+1)
(i)
(i+1)T
(i+1)T
← γ̄ TYγ̄ + YiT +1
Γ̄T YiT +1
3: Y γ̄
−1
4:
b(i+1) ← R(i+1) Ye (i+1)
h
γ̄
γ̄
LS
2
5: σ̂ (i+1) ←
1
(i+1)T −n
(i+1)
(i+1)> b(i+1) b(i+1)> (i+1) b(i+1)
Ȳγ̄
− 2Yeγ̄
hLS + hLS
Rγ̄
hLS
η̂ (i+1) ← arg minη∈Ω f(i+1)T (η) (use Algorithm 1)
−1
2
(i+1)
b(i+1) ← R(i+1) + σ̂ (i+1) K −1
7: h
Yeγ̄
(i+1)
γ̄
γ̄
η̂
b(i+1) , η̂ (i+1)
Output: h
6:
2) Treating the Forgetting Factor as a Hyper-parameter:
The Bayesian framework provides the user with the possibility to treat the forgetting factor as a hyper-parameter and
to estimate it by solving:
η̂, γ̂ = arg minη∈Ω,γ∈(0,1] fk (η, γ)
fk (η, γ) = Yk> Gk Σ(η, γ)−1 GkYk + ln det Σ(η, γ)
2
Σ(η, γ) = Gk Φk Kη Φ>
k Gk + σ Ik
(25)
(26)
(27)
where Gk Gk =: Γk and Γk := diag
.
Remark 4: Notice that the model (20) is equivalent to
>
Yk = Φk h + Eγ̄ , Eγ̄ = eγ̄ (1), ..., eγ̄ (k) ∼ N (0, σ 2 Γ̄−1
k )
γ k−1 , γ k−2 , ..., γ 0
Therefore, treating the forgetting factor as a hyper-parameter
is equivalent to modeling the noise with a non-constant
variance and to give to the diagonal entries of the covariance
matrix an exponential decaying structure.
The online implementation of this approach is detailed in
Algorithm 3, where
>
(i)
(i−1)
b(i) ΦiT
Rγ̂γ := γ̂ (i) Rγ̂γ
+ ΦiT
Γ
(28)
T
(i−1)T +1
(i−1)T +1
b(i) = diag((γ̂ (i) )T −1 , .., (γ̂ (i) )0 ). Ye (i) and Yγ̂γ(i) are analowith Γ
T
γ̂γ
gously defined.
We should stress that the objective function in (26) does not
admit the decomposition (18); we have
∂ fk (η, γ)
= V (η, γ) +U(η, γ),
∂γ
V (η, γ) > 0, U(η, γ) ≥ 0
Thus, when γ is treated as an hyper-parameter, Algorithm
1 is run setting D(i) = Id at step 4; α (i) is still determined
alternating the BB rules (17).
Algorithm 3 Online Bayesian SysId: Forgetting Factor as a
hyper-parameter
Inputs: previous estimates {η̂ (i) , η̂ (i−1) , γ̂ (i) , γ̂ (i−1) }, pre(i) (i) (i)
vious data matrices {Rγ̂γ , Yeγ̂γ ,Yγ̂γ }, new data Di+1 =
(i+1)T
{u(t), y(t)}t=iT +1
(i)
(i+1)T >
(i+1)T
← γ T Rγ̂γ + ΦiT +1
ΓT ΦiT +1
>
eγ(i+1) ← γ T Ye (i) + Φ(i+1)T ΓT Y (i+1)T
2: Y
iT +1
iT +1
γ̂γ
(i+1)
(i)
(i+1)T >
(i+1)T
T
← γ Yγ̂γ + YiT +1
ΓT YiT +1
3: Y γ
(i+1)
(i)
(i)
−1
b
4: h
← (R ) Ye
1:
(i+1)
Rγ
LS
5: σ̂ 2
(i+1)
γ̂γ
←
1
(i+1)T −n
(i)γ̂γ
(i)
b(i+1)
b(i+1) + (h
b(i+1) )> R(i) h
Yγ̂γ − 2(Yeγ̂γ )> h
LS
LS
γ̂γ LS
η̂ (i+1) , γ̂ (i+1) ← arg minη∈Ω,γ∈(0,1] f(i+1)T (η, γ)
(use Algorithm
1)
−1
(i+1)
b(i+1) ← R(i+1) + σ̂ 2(i+1) (γ̂ (i+1) ) K −1
7: h
Yeγ̂γ
(i+1)
γ̂γ
η̂
b(i+1) , η̂ (i+1)
Output: h
6:
V. E XPERIMENTAL R ESULTS
In this section we test the online algorithms for parametric
and Bayesian SysId described in Sec. III and IV. Their
performance are compared through a Monte-Carlo study over
200 time-varying systems.
A. Data
200 datasets consisting of 3000 input-output measurement
pairs are generated. Each of them is created as follows:
the first 1000 data are produced by a system contained in
the data-bank D4 (used in [20]), while the remaining 2000
data are generated by perturbing the D4-system with two
additional poles and zeros. These are chosen such that the
order of the D4-system changes, thus creating a switch on
the data generating system at time k = 1001.
The data-bank D4 consists of 30th order random SISO
dicrete-time systems having all the poles inside a circle of
radius 0.95. These systems are simulated with a unit variance
band-limited Gaussian signal with normalized band [0, 0.8].
A zero mean white Gaussian noise, with variance adjusted
so that the Signal to Noise Ration (SNR) is always equal to
1, is then added to the output data.
B. Estimators
The parametric estimators are computed with the roe Matlab routine, using the BIC criterion for the model complexity
selection. In the following this estimator will be denoted as
PEM BIC. Furthermore, as a benchmark we introduce the
parametric oracle estimator, called PEM OR, which selects
the model complexity by choosing the model that gives the
best fit to the impulse response of the true system. The order
selection is performed every time a new dataset becomes
available: multiple models with orders ranging from 1 to 20
are estimated and the order selection is performed according
to the two criteria above-described.
For what regards the methods relying on Bayesian inference
we adopt a zero-mean Gaussian prior with a covariance
matrix (kernel) given by the so-called TC-kernel:
KηTC (k, j) = λ min(β k , β j ),
η = [λ , β ]
(29)
with Ω = {(λ , β ) : λ ≥ 0, 0 ≤ β ≤ 1} [14]. The length n
of the estimated impulse responses is set to 100. In the
following, we will use the acronym TC to denote these
methods. Furthermore, the notation OPT will refer to the
standard Bayesian procedure, in which the SGP algorithm
adopted to optimize the marginal likelihood fk (η) is run until
the relative change in fk (η) is less than 10−9 . From here on,
the online counterpart (illustrated in Sec. IV) will be referred
to as the 1-step ML. We will also use the acronyms TC FF
when a fixed forgetting factor is adopted, TC est FF when
the forgetting factor is estimated as a hyper-parameter.
For each Monte Carlo run, the identification algorithms are
300
initialized using the first batch of data Dinit = {u(t), y(t)}t=1
.
After this initial step, the estimators are updated every T = 10
(i+1)T
time steps, when new data Di+1 = {u(t), y(t)}t=iT are
provided. The forgetting factor in the TC FF and PEM
methods is set to 0.998, while its estimation in TC est FF
method is initialized with 0.995.
C. Performance
The purpose of the experiments is twofold. First, we will
compare the two routines we have proposed in Sec. IV-C
to explicitly deal with time-varying systems. Second, we
will compare the parametric and the Bayesian identification
approaches while dealing with time-varying systems.
As a first comparison, we evaluate the adherence of the
b to the true one h, measured as
estimated impulse response h
b
b = 100 · 1 − kh − hk2
(30)
F (h)
khk2
b at four time instants.
Figure 1 reports the values of F (h)
It is interesting to note that immediately before the change
in the data generating system (k = 1000) the TC methods
slightly outperform the ideal parametric estimator PEM OR.
After the switch (occurring at k = 1001), among regularization/Bayesian routines TC est FF recovers the fit performance a bit faster than TC FF; even at regime it outperforms
the latter because it can choose forgetting factor values that
retain a larger amount of data.
We also observe how the 1-step ML procedures and the
corresponding OPT routines provide analogous performance
at each time step k, validating the method we propose for
online estimation and confirming the results in [12].
The unrealistic PEM OR represents the reference on the
achievable performance of the PEM estimators; it outperforms TC methods in the transient after the switch, while it
has comparable performance at regime. Instead, the recursive
PEM BIC estimator performs very poorly.
As a second comparison, Table I reports the computational
cumulative time of the proposed algorithms in terms of mean
and standard deviation after the estimators are fed with all
3000
the data D = {u(t), y(t)}t=1
. The 1-step ML methods are
one order of magnitude faster than the corresponding OPT
k = 1000
100
update of the Bayesian estimate, resembling the one which
is available for parametric techniques.
b
F (h)
80
R EFERENCES
60
40
TC OPT FF
TC FF
TC est FF
PEM OR
PEM BIC
PEM OR
PEM BIC
PEM OR
PEM BIC
PEM OR
PEM BIC
k = 1300
100
b
F (h)
80
60
40
TC OPT FF
TC FF
TC est FF
k = 1800
100
b
F (h)
80
60
40
TC OPT FF
TC FF
b
F (h)
TC est FF
k = 3000
100
80
60
40
TC OPT FF
TC FF
TC est FF
b achieved at four time instants k (correFig. 1: Fit F (h)
sponding to the number of data available for the estimation).
mean
std
OPT FF
6.70
1.28
TC
FF
0.44
0.03
est FF
5.45
0.67
OR
18.44
0.69
PEM
BIC
18.44
0.69
TABLE I: Computational cumulative time after data D =
3000
{u(t), y(t)}t=1
are used: mean and std over 200 datasets.
ones. The TC est FF estimator is slower than TC FF: this
should be a consequence of having set D(i) = Id in Algorithm
1. On the other hand the RPEM estimators are three times
slower than the OPT ones, thus appearing not particularly
appealing for online applications.
VI. C ONCLUSION AND F UTURE W ORK
We have adopted recently developed SysId techniques relying on the Gaussian processes and Bayesian inference to
the identification of time-varying systems. Specifically, we
have focused on an online setting by assuming that new data
become available at predefined time instants. To tackle the
real-time constraints we have modified the standard Bayesian
procedure: hyper-parameters are estimated by performing
only one gradient step in the corresponding marginal likelihood optimization problem. In order to cope with the timevarying nature of the systems to be identified, we propose
two approaches, based on the use of a forgetting factor.
One of them treats the forgetting factor as a constant, while
the other estimates it as a hyper-parameter of the Bayesian
inference procedure.
We believe that the preliminary investigation performed in
this work may pave the way for further research in this
topic. A future research direction could consider the recursive
[1] L. Ljung, System Identification - Theory for the User, 2nd ed. Upper
Saddle River, N.J.: Prentice-Hall, 1999.
[2] L. Ljung and T. Söderström, Theory and Practice of Recursive
Identificationn, ser. Signal Processing, Optimization, and Control. The
MIT Press, 1983.
[3] S. Bittanti, P. Bolzern, and M. Campi, “Convergence and exponential
convergence of identification algorithms with directional forgetting
factor,” Automatica, vol. 26, no. 5, pp. 929–932, 1990.
[4] L. Guo, L. Ljung, and P. Priouret, “Performance analysis of the
forgetting factor rls algorithm,” International journal of adaptive
control and signal processing, vol. 7, no. 6, pp. 525–538, 1993.
[5] G. C. Chow, “Random and changing coefficient models,” in Handbook
of Econometrics, 1st ed. Elsevier, 1984, vol. 2, ch. 21, pp. 1213–1245.
[6] L. Guo, “Estimating time-varying parameters by the kalman filter
based algorithm: stability and convergence,” Automatic Control, IEEE
Transactions on, vol. 35, no. 2, pp. 141–147, 1990.
[7] A. H. Sarris, A Bayesian approach to estimation of time-varying
regression coefficients. National Bureau of Economic Research, 1973.
[8] M. K. Tsatsanis and G. B. Giannakis, “Time-varying system identification and model validation using wavelets,” Signal Processing, IEEE
Transactions on, vol. 41, no. 12, pp. 3512–3523, 1993.
[9] G. Pillonetto, A. Chiuso, and G. De Nicolao, “Prediction error
identification of linear systems: a nonparametric Gaussian regression
approach,” Automatica, no. 47, pp. 291–305, 2011.
[10] G. Pillonetto, F. Dinuzzo, T. Chen, G. De Nicolao, and L. Ljung, “Kernel methods in system identification, machine learning and function
estimation: a survey,” Automatica, vol. 50, no. 3, pp. 657–682, 2014.
[11] G. Pillonetto and A. Chiuso, “Tuning complexity in kernel-based
linear system identification: the robustness of the marginal likelihood
estimator,” Automatica, vol. 58, pp. 106–117, 2015.
[12] D. Romeres, G. Prando, G. Pillonetto, and A. Chiuso, “On-line
bayesian system identification,” in Proc. of ECC 2016, 2016.
[13] G. Pillonetto and A. Aravkin, “A new kernel-based approach for identification of time-varying linear systems,” in 2014 IEEE International
Workshop on Machine Learning for Signal Processing (MLSP), Sept
2014, pp. 1–6.
[14] T. Chen, H. Ohlsson, and L. Ljung, “On the estimation of transfer
functions, regularizations and Gaussian processes - revisited,” Automatica, vol. 48, no. 8, pp. 1525–1535, 2012.
[15] S. Bonettini, A. Chiuso, and M. Prato, “A scaled gradient projection
methods for Bayesian learning in dynamical systems,” SIAM Journal
on Scientific Computing, p. in press, 2015.
[16] G. Bottegal, A. Y. Aravkin, H. Hjalmarsson, and G. Pillonetto, “Robust
em kernel-based methods for linear system identification,” Automatica,
vol. 67, pp. 114–126, 2016.
[17] G. Bottegal, R. S. Risuleo, and H. Hjalmarsson, “Blind system identification using kernel-based methods,” IFAC-PapersOnLine, vol. 48,
no. 28, pp. 466 – 471, 2015.
[18] T. Chen and L. Ljung, “Implementation of algorithms for tuning
parameters in regularized least squares problems in system identification,” Automatica, vol. 49, no. 7, pp. 2213–2220, 2013.
[19] J. Barzilai and J. M. Borwein, “Two-point step size gradient methods,”
IMA Journal of Numerical Analysis, vol. 8, no. 1, pp. 141–148, 1988.
[20] T. Chen, M. Andersen, L. Ljung, A. Chiuso, and G. Pillonetto, “System
identification via sparse multiple kernel-based regularization using
sequential convex optimization techniques,” IEEE Transactions on
Automatic Control, 2014.
| 3cs.SY
|
A linear programming based heuristic framework for min-max
regret combinatorial optimization problems with interval costs
Lucas Assunçãoa,∗, Thiago F. Noronhab, Andréa Cynthia Santosc , Rafael Andraded
arXiv:1609.09179v1 [cs.DS] 29 Sep 2016
a
Departamento de Engenharia de Produção, Universidade Federal de Minas Gerais
Avenida Antônio Carlos 6627, CEP 31270-901, Belo Horizonte, MG, Brazil
b Departamento de Ciência da Computação, Universidade Federal de Minas Gerais
Avenida Antônio Carlos 6627, CEP 31270-901, Belo Horizonte, MG, Brazil
c ICD-LOSI, UMR CNRS 6281, Université de Technologie de Troyes
12, rue Marie Curie, CS 42060, 10004, Troyes CEDEX, France
d
Departamento de Estatı́stica e Matemática Aplicada, Universidade Federal do Ceará
Campus do Pici - Bloco 910, 60455-900, Fortaleza, CE, Brazil
Abstract
This work deals with a class of problems under interval data uncertainty, namely interval robusthard problems, composed of interval data min-max regret generalizations of classical NP-hard
combinatorial problems modeled as 0-1 integer linear programming problems. These problems
are more challenging than other interval data min-max regret problems, as solely computing the
cost of any feasible solution requires solving an instance of an NP-hard problem. The state-ofthe-art exact algorithms in the literature are based on the generation of a possibly exponential
number of cuts. As each cut separation involves the resolution of an NP-hard classical optimization problem, the size of the instances that can be solved efficiently is relatively small. To smooth
this issue, we present a modeling technique for interval robust-hard problems in the context of a
heuristic framework. The heuristic obtains feasible solutions by exploring dual information of a
linearly relaxed model associated with the classical optimization problem counterpart. Computational experiments for interval data min-max regret versions of the restricted shortest path problem and the set covering problem show that our heuristic is able to find optimal or near-optimal
solutions and also improves the primal bounds obtained by a state-of-the-art exact algorithm and
a 2-approximation procedure for interval data min-max regret problems.
Keywords: Robust optimization, Matheuristics, Benders’ decomposition
∗ Corresponding
author.
Email addresses: [email protected] (Lucas Assunção), [email protected] (Thiago F. Noronha),
[email protected] (Andréa Cynthia Santos), [email protected] (Rafael Andrade)
Preprint submitted to arXiv.org
September 30, 2016
1. Introduction
Robust optimization [1] is an alternative to stochastic programming [2] in which the variability of the data is represented by deterministic values in the context of scenarios. A scenario
corresponds to a parameters assignment, i.e., a value is fixed for each parameter subject to uncertainty. The two main approaches adopted to model robust optimization problems are the discrete
scenarios model and the interval data model. In the former, a discrete set of possible scenarios
is considered. In the latter, the uncertainty referred to a parameter is represented by a continuous interval of possible values. Differently from the discrete scenarios model, the infinite many
possible scenarios that arise in the interval data model are not explicitly given. Nevertheless, in
both models, a classical (i.e., parameters known in advance) optimization problem takes place
whenever a scenario is established.
With respect to robust optimization criteria, the min-max regret (also known as robust deviation criterion) is one of the most used in the literature (see, e.g., [3, 4, 5, 6]). The regret of a
solution in a given scenario is defined as the cost difference between such solution and an optimal one in this scenario. In turn, the robustness cost of a solution is defined as its maximum
regret over all scenarios. Min-max regret problems aim at finding a solution with the minimum
robustness cost, which is referred to as a robust solution. We refer to [1] for details on other
robust optimization criteria.
Robust optimization versions of several combinatorial optimization problems have been studied in the literature, addressing, for example, uncertainties over costs. Handling uncertain costs
brings an extra level of difficulty, such that even polynomially solvable problems become NPhard in their corresponding robust versions [4, 6, 7, 8, 9]. A recent trend in this field is to investigate robust optimization problems whose classical counterparts are already NP-hard. We refer
to these problems as robust-hard problems. The interval data min-max regret restricted shortest
path problem, introduced in this study, belongs to this class of problems, along with interval data
min-max regret versions of the traveling salesman problem [5], the 0-1 knapsack problem [10]
and the set covering problem [11].
This work addresses interval min-max regret problems, which consist of min-max regret versions of combinatorial problems with interval costs. Precisely, we consider interval data min-max
regret generalizations of classical combinatorial problems modeled by means of 0-1 Integer Linear Programming (ILP). Notice that a large variety of combinatorial problems are modeled as 0-1
2
ILP problems, including (i) polynomially solvable problems, such as the shortest path problem,
the minimum spanning tree problem and the assignment problem, and (ii) NP-hard problems,
such as the 0-1 knapsack problem, the set covering problem, the traveling salesman problem and
the restricted shortest path problem [12, 13]. In this study, we are particularly interested in a
subclass of interval min-max regret problems, namely interval robust-hard problems, composed
of interval data min-max regret versions of classical NP-hard combinatorial problems as those
aforementioned in (ii).
Aissi at al. [14] (also see [15]) showed that, for any interval min-max regret problem (including
interval robust-hard problems), the robustness cost of a solution can be computed by solving a
single instance of the classical optimization problem counterpart in a particular scenario. Therefore, one does not have to consider all the infinite many possible scenarios during the search for
a robust solution, but only a subset of them, one for each feasible solution. Notice, however, that,
in the case of interval robust-hard problems, computing the cost of a solution still involves solving an NP-hard problem. Thus, these problems are more challenging than other interval min-max
regret problems.
The state-of-the-art exact algorithms used to solve these problems are based on the generation
of a possibly exponential number of cuts (see, e.g., [5, 11]). Since each cut separation implies
solving an instance of an NP-hard problem (which corresponds to the classical counterpart of the
robust optimization problem considered), the size of the instances efficiently solvable is considerably smaller than that of the instances solved for the corresponding classical counterparts. In
fact, to the best of our knowledge, no work in the literature provides a compact ILP formulation
(with a polynomial number of variables and constraints) for any interval robust-hard problem.
Although we do not close the aforementioned issues in this work, we smooth them by presenting an alternative way to handle interval robust-hard problem. We propose a Linear Programming
(LP) based heuristic framework inspired by the modeling technique introduced in [7, 16] and formalized by Kasperski [9]. The heuristic framework is suitable to tackle interval min-max regret
problems in general and consists in solving a Mixed Integer Linear Programming (MILP) model
based on the dual of a linearly relaxed formulation for the classical optimization problem counterpart. An optimal solution for the model solved by our heuristic is not necessarily optimal for
the original robust optimization problem. However, computational experiments for interval data
min-max regret versions of the restricted shortest path problem and the set covering problem [11]
3
showed that the heuristic is able to find optimal or near-optimal solutions, and that it improves
the upper bounds obtained by both a state-of-the-art exact algorithm and a 2-approximation procedure for interval min-max regret problems.
The theoretical quality of the solutions obtained by the heuristic in general is beyond the scope
of this work, as it may rely on specific problem dependent factors, such as the strength of the
formulation adopted to model the classical counterpart problem within the heuristic framework.
In fact, as we will discuss in the sequel, the study of approximative procedures for interval minmax regret problems is a relatively unexplored field, and not much is known.
The remainder of this work is organized as follows. Related works on robust-hard problems are
discussed in Section 2. In Section 3, we present a standard modeling technique for interval minmax regret problems and a state-of-the-art logic-based Benders’ framework for solving problems
in this class. In this study, the solutions obtained by this exact approach are used to evaluate the
quality of the solutions found by the proposed LP based heuristic framework, which is presented
in Section 4. In Section 5, we formally describe the interval robust-hard problems used as case
studies for the heuristic framework. In this same section, we introduce the interval data minmax regret restricted shortest path problem, along with a brief motivation and related works.
Computational experiments are showed in Section 6, while concluding remarks and future work
directions are discussed in the last section.
2. Related works
As far as we know, Montemanni et al. [5] (also see [17]) were the first to address an interval robust-hard problem. The authors introduced the interval data min-max regret traveling
salesman problem, along with a mathematical formulation containing an exponential number
of constraints. Moreover, three exact algorithms were presented and computationally compared
at solving the proposed formulation: a branch-and-bound, a branch-and-cut and a logic-based
Benders’ decomposition [18] algorithm. The latter algorithm has been widely used to solve robust optimization problems whose classical counterparts are polynomially solvable (see, e.g.,
[4, 6, 8]). Computational experiments showed that the logic-based Benders’ algorithm outperforms the other exact algorithms for the interval data min-max regret traveling salesman problem.
Later on, Pereira and Averbakh [11] introduced the interval data min-max regret set covering
problem. The authors proposed a mathematical formulation for the problem that is similar to
4
the one proposed by [5] for the interval data min-max regret traveling salesman problem. As in
[5], the formulation has an exponential number of constraints. They also adapted the logic-based
Benders’ algorithm of [4, 5, 8] to this problem and presented an extension of the method that aims
at generating multiple Benders’ cuts per iteration of the algorithm. Moreover, the work presents
an exact approach that uses Benders’ cuts in the context of a branch-and-cut framework. Computational experiments showed that such approach, as well as the extended logic-based Benders’
algorithm, outperforms the standard logic-based Benders’ algorithm at solving the instances considered. This robust version of the set covering problem was also addressed in [19], where the
authors propose scenario-based heuristics with path-relinking.
A few works also deal with robust optimization versions of the 0-1 knapsack problem. For
instance, the studies [1] and [20] address a version of the problem where the uncertainty over
each item profit is represented by a discrete set of possible values. In these works, the absolute
robustness criterion is considered. In [20], the author proved that this version of the problem is
strongly NP-hard when the number of possible scenarios is unbounded and pseudo-polynomially
solvable for a bounded number of scenarios. Kouvelis et al. [1] also studied a min-max regret
version of the problem that considers a discrete set of scenarios of item profits. They provided a
pseudo-polynomial algorithm for solving the problem when the number of possible scenarios is
bounded. When the number os scenarios is unbounded, the problem becomes strongly NP-hard
and there is no approximation scheme for it [21].
More recently, Feizollahi and Averbakh [22] introduced the min-max regret quadratic assignment problem with interval flows, which is a generalization of the classical quadratic assignment
problem in which material flows between facilities are uncertain and vary in given intervals.
Although quadratic, the problem presents a structure that is very similar to the robust versions
of combinatorial problems we address in this work. The authors proposed two mathematical
formulations and adapted the logic-based Benders’ algorithm of [4, 5, 8] to solve them through
the linearization of the corresponding master problems. They also developed a hybrid approach
which combines Benders’ decomposition with heuristics.
Regarding heuristics for interval robust-hard problems, a simple and efficient scenario-based
procedure to tackle interval min-max regret problems in general was proposed in [23] and successfully applied in several works (see, e.g., [17, 23, 24]). The procedure, called Algorithm Mean
Upper (AMU), consists in solving the corresponding classical optimization problem in two spe5
cific scenarios: the so called worst-case scenario, where the cost referred to each binary variable
is set to its upper bound, and the mid-point scenario, where the cost of the binary variables are
set to the mean values referred to the bounds of the respective cost intervals. With this heuristic,
one can obtain a feasible solution for any interval min-max regret optimization problem (including interval robust-hard problems) with the same worst-case asymptotic complexity of solving
an instance of the classical optimization problem counterpart. Moreover, it is proven in [24] that
this algorithm is 2-approximative for any interval min-max regret optimization problem. Notice
that AMU does not run in polynomial time for interval robust-hard problems, unless P = NP.
The study of approximative procedures for interval min-max regret problems in general is a
relatively unexplored field, and not much is known. Conde [25] proved that AMU gives a 2approximation for an even broader class of min-max regret problems. Precisely, while the works
of Kasperski et al. [23, 24] only address combinatorial (finite and discrete) min-max regret optimization models, Conde [25] extends the 2-approximation result for models with compact constraint sets in general, including continuous ones. Recently, some research has been conducted to
refine the constant factor of the aforementioned approximation. For example, in [26], the author
attempts to tighten this factor of 2 through the resolution of a robust optimization problem over
a reduced uncertainty cost set. Moreover, in [27], the authors introduced a new bound that gives
an instance dependent performance guarantee of the mid-point scenario solution for interval data
min-max regret versions of combinatorial problems. They show that the new performance ratio is at most 2, and the bound is successfully applied to solve the interval data min-max regret
shortest path problem [1] within a branch-and-bound framework.
Kasperski and Zieliński [28] also developed a Fully Polynomial Time Approximation Scheme
(FPTAS) for interval min-max regret problems. However, this FPTAS relies on two very restrictive conditions: (i) the problem tackled must present a pseudopolynomial algorithm, and (ii) the
corresponding classical counterpart has to be polynomially solvable. Condition (ii) comes from
the fact that the aforementioned FPTAS uses AMU within its framework. Notice that, from (ii),
this FPTAS does not naturally hold for interval robust-hard problems.
The existence of efficient approximative algorithms is closely related to another almost unexplored aspect of interval robust-hard problems, which is their computational complexity. Although NP-hard by definition, whether these problems are necessarily strongly NP-hard or not is
still an open issue.
6
3. Modeling and solving interval min-max regret problems
In this section, we discuss a standard modeling technique in the literature of interval min-max
regret problems, as well as a state-of-the-art exact algorithm to solve problems in this class. To
this end, consider G, a generic 0-1 ILP combinatorial problem defined as follows.
(G)
min
s.t.
cy
(1)
Ay ≥ b
(2)
y ∈ {0, 1}n .
(3)
The binary variables are represented by an n-dimensional column vector y, whereas their corresponding cost values are given by an n-dimensional row vector c. Moreover, b is an mdimensional column vector, and A is an m × n matrix. The feasible region of G is given by
Ω = {y : Ay ≥ b, y ∈ {0, 1}n }.
Let R be an interval data min-max regret robust optimization version of G, where a continuous
cost interval [li , ui ], with li , ui ∈ Z+ and li ≤ ui , is associated with each binary variable yi ,
i = 1, . . . , n. The following definitions describe R formally.
Definition 1. A scenario s is an assignment of costs to the binary variables, i.e., a cost cis ∈ [li , ui ]
is fixed for all yi , i = 1, . . . , n.
Let S be the set of all possible cost scenarios, which consists of the cartesian product of the
continuous intervals [li , ui ], i = 1, . . . , n. The cost of a solution y ∈ Ω in a scenario s ∈ S is given
n
P
by c s y = cis yi .
i=1
Definition 2. A solution opt(s) ∈ Ω is said to be optimal for a scenario s ∈ S if it has the
smallest cost in s among all the solutions in Ω, i.e., opt(s) = arg min c s y.
y∈Ω
Definition 3. The regret (robust deviation) of a solution y ∈ Ω in a scenario s ∈ S, denoted by
rys , is the difference between the cost of y in s and the cost of opt(s) in s, i.e., rys = c s y − c s opt(s).
Definition 4. The robustness cost of a solution y ∈ Ω, denoted by Ry , is the maximum regret of y
among all possible scenarios, i.e., Ry = max rys .
s∈S
∗
Definition 5. A solution y ∈ Ω is said to be robust if it has the smallest robustness cost among
all the solutions in Ω, i.e., y∗ = arg min Ry .
y∈Ω
7
Definition 6. The interval data min-max regret problem R consists in finding a robust solution.
For each scenario s ∈ S, let G(s) denote the corresponding 0-1 ILP problem G under the cost
vector c s ∈ Rn+ referred to s. Also consider an n-dimensional column vector x of binary variables.
Then, R can be generically modeled as follows.
G(s)
(R)
z }| {
max (c y − min c s x)
(4)
y ∈ Ω.
(5)
s
min
x∈Ω
s∈S
s.t.
Theorem 1 (Aissi et al. [14]). The robust deviation (regret) of any feasible solution ȳ ∈ Ω is
maximum in the scenario s(ȳ) induced by ȳ, defined as follows:
for all i ∈ {1, . . . , n},
cis(ȳ)
ui , if ȳi = 1,
=
li , if ȳi = 0.
Theorem 1, which is also stated in [15], reduces the number of scenarios to be considered
during the search for a robust solution. Accordingly, R can be rewritten taking into account only
the scenario induced by the solution that the y variables define. This scenario, referred to as s(y),
is represented by the cost vector c s(y) = l1 + (u1 − l1 )y1 , . . . , ln + (un − ln )yn . Then, R can be
rewritten as
G(s(y))
(R̃)
z }| {
c s(y) y − min c s(y) x
min
x∈Ω
y ∈ Ω.
s.t.
(6)
(7)
In order to obtain an MILP formulation for R, we reformulate R̃ according to [14]. Precisely,
we add a free variable ρ and linear constraints that explicitly bound ρ with respect to all the
feasible solutions that x can represent. The resulting MILP formulation is provided from (8) to
(11).
(F )
min
(
n
X
ui yi − ρ)
(8)
i=1
s.t.
ρ≤
n
X
(li + (ui − li )yi ) x̄i
∀ x̄ ∈ Ω,
(9)
i=1
y ∈ Ω,
(10)
ρ free.
(11)
8
Constraints (9) ensure that ρ does not exceed the value related to the inner minimization in (6).
Note that, in (9), x̄ is a constant vector, one for each solution in Ω. These constraints are tight
whenever x̄ is optimal for the classical counterpart problem G in the scenario s(y). Constraints
(10) define the feasible region referred to the y variables, and constraint (11) gives the domain of
the variable ρ.
The number of constraints (9) corresponds to the number of feasible solutions in Ω. As the
size of this region may grow exponentially with the number of binary variables, this fomulation is
particularly suitable to be handled by decomposition methods, such as the logic-based Benders’
decomposition [18] algorithm detailed below.
3.1. A logic-based Benders’ decomposition algorithm
Benders’ decomposition method was originally proposed in [29] (also see [30]) to tackle MILP
problems by exploring duality theory properties. Several methodologies were later studied to
improve the convergence speed of the method (see, e.g., [31, 32, 33]). More recently, Hooker and
Ottosson [18] introduced the idea of a logic-based Benders’ decomposition, which is a Benderslike decomposition approach suitable for a broader class of problems. This specific method
is intended to address any optimization problem by devising valid cuts solely based on logic
inference.
The logic-based Benders’ algorithm presented below is a state-of-the-art exact method for
interval min-max regret problems [4, 5, 6, 8, 11]. The algorithm solves formulation F , given
by (8)-(11), by assuming that, since several of constraints (9) might be inactive at optimality,
they can be generated on demand whenever they are violated. The procedure is described in
Algorithm 1. Let Ωψ ⊆ Ω be the set of solutions x̄ ∈ Ω (Benders’ cuts) available at an iteration
ψ. Also let F ψ be a relaxed version of F in which constraints (9) are replaced by
ρ≤
n
X
(li + (ui − li )yi ) x̄i
∀ x̄ ∈ Ωψ .
(12)
i=1
Thus, the relaxed problem F ψ , called master problem, is defined by (8), (10), (11) and (12).
Let ubψ keep the best upper bound found (until an iteration ψ) on the solution of F . Notice
that, at the beginning of Algorithm 1, Ω1 contains the initial Benders’ cuts available, whereas
ub1 keeps the initial upper bound on the solution of F . In this case, Ω1 = ∅ and ub1 := +∞. At
each iteration ψ, the algorithm obtains a solution by solving a corresponding master problem F ψ
9
and seeks a constraint (9) that is most violated by this solution. Initially, no constraint (12) is
considered, since Ω1 = ∅. An initialization step is then necessary to add at least one solution to
Ω1 , thus avoiding unbounded solutions during the first resolution of the master problem. To this
end, it is computed an optimal solution for the worst-case scenario su , in which c su = u (Step I,
Algorithm 1).
Algorithm 1: Logic-based Benders’ algorithm.
Input: Cost intervals [li , ui ] referred to yi , i = 1, . . . , n.
Output: A robust solution for F , and its corresponding robustness cost.
ψ ← 1; ub1 ← +∞; Ω1 ← ∅;
Step I. (Initialization)
Find an optimal solution x̄1 = opt(su ) for the worst-case scenario su ;
Ω1 ← Ω1 ∪ { x̄1 };
Step II. (Master problem)
Solve the relaxed problem F ψ , obtaining a solution (ȳψ , ρ̄ψ );
Step III. (Slave problem)
Find an optimal solution x̄ψ = opt(s(ȳψ )) for the scenario s(ȳψ ) induced by ȳψ and use it to
compute Rȳψ , the robustness cost of ȳψ ;
Step IV. (Stopping condition)
lbψ ← uȳψ − ρ̄ψ ;
if lbψ ≥ Rȳψ then
Return (ȳ∗ , R∗ );
end
else
ubψ+1 ← ubψ ← min{ubψ , Rȳψ };
Ωψ+1 ← Ωψ ∪ { x̄ψ };
ψ ← ψ + 1;
Go to Step II;
end
After the initialization step, at each iteration ψ, the corresponding relaxed problem F ψ is
solved (Step II, Algorithm 1), obtaining a solution (ȳψ , ρ̄ψ ). Then, the algorithm checks if (ȳψ , ρ̄ψ )
violates any constraint (9) of the original problem F . For this purpose, it is solved a slave
10
problem that computes Rȳψ (the actual robustness cost of ȳψ ) by finding an optimal solution
x̄ψ = opt(s(ȳψ )) for the scenario s(ȳψ ) induced by ȳψ (see Step III, Algorithm 1). Notice that
each slave problem involves solving the classical optimization problem G, given by (1)-(3), in
the scenario s(ȳψ ).
Let lbψ = uȳψ − ρ̄ψ be the value of the objective function in (8) related to the solution (ȳψ , ρ̄ψ ) of
the current master problem F ψ . According to [34], lbψ and Rȳψ give, respectively, a lower (dual)
and an upper (primal) bounds on the solution of F . If lbψ does not reach Rȳψ , ubψ and ubψ+1
are both set to the best upper bound found by the algorithm until the iteration ψ. In addition,
a new constraint (12) is generated from x̄ψ and added to F ψ+1 by setting Ωψ+1 ← Ωψ ∪ { x̄ψ }.
Otherwise, if lbψ equals Rȳψ , the algorithm stops (see Step IV of Algorithm 1). As proved in
[34], this stopping condition is always satisfied in a finite number of iterations.
The algorithm detailed above is applied to obtain optimal solutions for the interval robust-hard
problems considered in this work, and their corresponding bounds are used to evaluate the quality
of the solutions produced by the heuristic proposed in the next section. We highlight that other
exact algorithms can be adapted and used for this purpose, such as the branch-and-cut algorithm
proposed by Pereira and Averbakh [11] for the interval data min-max regret set covering problem.
In this work, we chose the logic-based Benders’ algorithm, as it has already been successfully
applied to solve a wide range of interval min-max regret problems [4, 5, 6, 8, 11].
4. An LP based heuristic framework for interval min-max regret problems
In this section, we present an LP based heuristic framework for interval robust-hard problems
which is applicable to interval min-max regret problems in general. Consider an interval minmax regret problem R̃, as defined by (6) and (7) in Section 3. For a given ȳ ∈ Ω, the inner
minimization in (6) is a 0-1 ILP problem, namely G(s(ȳ)). Particularly, it corresponds to problem
G, defined by (1)-(3), under the cost vector c s(ȳ) , where s(ȳ) is the scenario induced by ȳ.
Relaxing the integrality on the x variables of G(s(ȳ)), we obtain the LP problem
ϑ(ȳ) = min
s.t.
11
c s(ȳ) x
(13)
Ax ≥ b,
(14)
I x ≤ 1,
(15)
x ≥ 0,
(16)
whose corresponding dual problem is given by
(D(ȳ)) ϑ(ȳ) = max
s.t.
(bT λ + 1T µ)
(17)
AT λ + I T µ ≤ (c s(ȳ) )T ,
(18)
λ ≥ 0,
(19)
µ ≤ 0.
(20)
Here, I is the identidy matrix, and the dual variables λ and µ are associated, respectively, with
constraints (14) and (15) of the primal problem. Notice that, in both LP problems, ϑ(ȳ) corresponds to an optimal solution cost and gives a lower (dual) bound on the optimal value of G(s(ȳ)).
Precisely,
G(s(ȳ))
z }| {
ϑ(ȳ) ≤ min c s(ȳ) x
x∈Ω
∀ ȳ ∈ Ω.
(21)
Replacing G(s(y)) by D(y) in (6), we obtain
min
s.t.
c s(y) y − max (bT λ + 1T µ)
(22)
AT λ + I T µ ≤ (c s(y) )T .
(23)
Constraints (7), (19) and (20),
Recall that c s(y) = l1 + (u1 − l1 )y1 , . . . , ln + (un − ln )yn is the cost vector referred to the scenario
s(y) induced by the y variables. Notice that the nested maximization operator can be omitted,
giving the following formulation.
(R̂)
min
s.t.
c s(y) y − bT λ − 1T µ
(24)
Constraints (7), (19), (20) and (23).
Proposition 1. The cost value referred to an optimal solution for R̂ gives an upper bound on
the optimal solution value of R̃, and this bound is tight (optimal) if (i) the restriction matrix A is
totally unimodular, and (ii) the column vector b is integral.
Proof. Let (ỹ, x̃) and (ŷ, λ̂, µ̂) be optimal solutions for R̃ and R̂, respectively. The value of the
objective function in (6) referred to (ỹ, x̃) is given by (c s(ỹ) ỹ − c s(ỹ) x̃), whereas that of (24) referred
to (ŷ, λ̂, µ̂) is (c s(ŷ) ŷ − (bT λ̂ + 1T µ̂)). Since (ỹ, x̃) is optimal for R̃, we have that (c s(ỹ) ỹ − c s(ỹ) x̃) ≤
(c s(y) y − min c s(y) x) for all y ∈ Ω. In particular, as ŷ ∈ Ω, it holds that
x∈Ω
c s(ỹ) ỹ − c s(ỹ) x̃ ≤ c s(ŷ) ŷ − min c s(ŷ) x.
x∈Ω
12
(25)
As (ŷ, λ̂, µ̂) is optimal for R̂, it follows, from (13)-(21), that
c s(ŷ) ŷ − min c s(ŷ) x ≤ c s(ŷ) ŷ − ϑ(ŷ) = c s(ŷ) ŷ − (bT λ̂ + 1T µ̂).
x∈Ω
(26)
Then, from (25) and (26), we obtain that
c s(ỹ) ỹ − c s(ỹ) x̃ ≤ c s(ŷ) ŷ − (bT λ̂ + 1T µ̂).
(27)
Now, also suppose that (i) the matrix A is totally unimodular, and (ii) the column vector b is
integral. As (ŷ, λ̂, µ̂) is optimal for R̂, it follows, from (13)-(20), that
c s(ŷ) ŷ − (bT λ̂ + 1T µ̂) = c s(ŷ) ŷ − ϑ(ŷ) ≤ c s(y) y − ϑ(y) ∀y ∈ Ω.
(28)
Particularly, as ỹ ∈ Ω,
c s(ŷ) ŷ − (bT λ̂ + 1T µ̂) ≤ c s(ỹ) ỹ − ϑ(ỹ).
(29)
Additionally, from assumption (i), it follows that the restriction matrix (A, I)T referred to (17)(20) is also totally unimodular. Thus, from assumption (ii), inequation (21) is tight, i.e.,
ϑ(ȳ) = min c s(ȳ) x
x∈Ω
∀ȳ ∈ Ω.
(30)
As (ỹ, x̃) is optimal for R̃, we obtain, from (29) and (30),
c s(ŷ) ŷ − (bT λ̂ + 1T µ̂) ≤ c s(ỹ) ỹ − ϑ(ỹ) = c s(ỹ) ỹ − min c s(ỹ) x = c s(ỹ) ỹ − c s(ỹ) x̃,
x∈Ω
(31)
which, along with (27), implies (c s(ŷ) ŷ − (bT λ̂ + 1T µ̂)) = (c s(ỹ) ỹ − c s(ỹ) x̃).
For a given problem R, defined by (4) and (5), the heuristic framework consists in (I) solving
the corresponding formulation R̂, obtaining a solution (ŷ, λ̂, µ̂), and (II) computing the robustness
cost (maximum regret) referred to ŷ, considering Theorem 1. One may note that the heuristic is
applicable not only to interval robust-hard problems, but to any interval min-max regret problem of the general form of R. From Proposition 1, whenever the classical optimization problem
counterpart can be modeled as a 0-1 ILP of the form of G, with a totally unimodular restriction
matrix and b integral, there is a guarantee of optimality at solving R̂. In fact, applying the framework detailed above to the interval data min-max regret versions of the polynomially solvable
shortest path and assignment problems presented, respectively, in [16] and [23], leads to the same
compact MILP formulations proposed and computationally tested in these works.
13
Notice that, whenever G is compact, the resulting formulation R̂ is also compact. We also
highlight that, although the heuristic framework was detailed by the assumption of G being a
minimization problem, the results also hold for maximization problems, with minor modifications. In addition, we conjecture that the heuristic framework also provides valid bounds for the
wider class of interval data min-max regret problems with compact constraint sets addressed in
[25, 26]. We believe that Theorem 1 can be extended to this class of problems through the definition of a specific scenario similar to the one induced by a solution. However, a more careful
study needs to be conducted to close this issue.
In this work, we do not present any theoretical guarantee of quality for the solutions obtained
by the heuristic, as it may rely on specific problem dependent factors, such as the strength of
the formulation adopted to model the classical counterpart problem G. Nevertheless, in the next
section, we present two very successful applications of the heuristic in solving interval robusthard problems.
5. Case studies in solving interval robust-hard problems
In this section, we define the interval robust-hard problems used as case studies for the proposed heuristic framework. For each problem, we give a mathematical formulation according to
the modeling technique presented in Section 3 and devise the corresponding MILP formulation
tackled by the heuristic. For the interval data min-max regret restricted shortest path problem,
which is introduced in this work, we give a more detailed description, along with a brief motivation and some related works. For simplicity, let robust stand for interval data min-max regret in
the designation of each problem.
5.1. The Restricted Robust Shortest Path problem (R-RSP)
The Restricted Robust Shortest Path problem (R-RSP) is an interval data min-max regret version of the Restricted Shortest Path problem (R-SP), an extensively studied NP-hard problem
[12, 13, 35, 36, 37, 38]. Consider a digraph G = (V, A), where V is the set of vertices, and A
is the set of arcs. With each arc (i, j) ∈ A, we associate a resource consumption di j ∈ Z+ and
a continuous cost interval [li j ,ui j ], where li j ∈ Z+ is the lower bound, and ui j ∈ Z+ is the upper
bound on this interval of cost, with li j ≤ ui j . An origin vertex o ∈ V and a destination one t ∈ V
are also given, as well as a value β ∈ Z, parameter used to limit the resource consumed along a
14
path from o to t in G, as discussed in the sequel. An example of an R-RSP instance is given in
Figure 1.
0
}
{2
8]
,
[5
1
}
{1
2]
,
[2
[3,5]{1}
[1,7]{3}
[3,6]{1}
2
[2,2]{1}
3
Figure 1: Example of an R-RSP instance, with origin o = 0 and destination t = 3. The notation
[li j , ui j ]{di j } means, respectively, the cost interval [li j , ui j ] and the resource consumption {di j }
associated with each arc (i, j) ∈ A.
Here, a scenario s is an assignment of arc costs, where a cost cisj ∈ [li j , ui j ] is fixed for all
(i, j) ∈ A. Let P be the set of all paths from o to t and A[p] be the set of the arcs that compose
a path p ∈ P. Also let S be the set of all possible scenarios of G. The cost of a path p ∈ P in
P
a scenario s ∈ S is given by C ps =
cisj . Similarly, the resource consumption referred to a
(i,
j)∈A[p]
P
path p ∈ P is given by D p =
di j . Also consider P(β) = {p ∈ P | D p ≤ β}, the subset of
(i, j)∈A[p]
paths in P whose resource consumptions are smaller than or equal to β.
Definition 7. A path p∗ (s, β) ∈ P(β) is said to be a β-restricted shortest path in a scenario s ∈ S
if it has the smallest cost in s among all paths in P(β), i.e., p∗ (s, β) = arg min C ps .
p∈P(β)
Definition 8. The regret (robust deviation) of a path p ∈ P(β) in a scenario s ∈ S, denoted by
β)
r(s,
, is the difference between the cost C ps of p in s and the cost of a β-restricted shortest path
p
β)
p∗ (s, β) ∈ P(β) in s, i.e., r(s,
= C ps − C ps ∗ (s, β) .
p
Definition 9. The β-restricted robustness cost of a path p ∈ P(β), denoted by Rβp , is the maximum
(s, β)
β
regret of p among all possible scenarios, i.e., R p = max r p
s∈S
.
Definition 10. A path p∗ ∈ P(β) is said to be a β-restricted robust path if it has the smallest
β-restricted robustness cost among all paths in P(β), i.e., p∗ = arg min Rβp .
p∈P(β)
Definition 11. R-RSP consists in finding a β-restricted robust path p∗ ∈ P(β).
15
R-RSP has applications in determining paths in urban areas, where travel distances are known
in advance, but travel times may vary according to unpredictable traffic jams, bad weather conditions, etc. Here, uncertainties are represented by values in continuous intervals, which estimate
the minimum and the maximum traveling times to traverse each pathway. For instance, R-RSP
can model situations involving electrical vehicles with a limited battery (energy) autonomy, when
one wants to find the fastest robust path with a length (distance) constraint. A similar application
arises in telecommunications networks, when one wants to determine a path to efficiently send
a data packet from an origin node to a destination one in a network. Due to the varying traffic
load, transmission links are subject to uncertain delays. Moreover, each link is associated with a
packet loss rate. In order to guarantee Quality of Service (QoS) [38, 39], a limit is imposed on
the total packet loss rates of the path used.
The classical R-SP is a particular case of R-RSP in which li j = ui j ∀ (i, j) ∈ A. As R-SP is
known to be NP-hard [12, 13] even for acyclic graphs [38], the same holds for R-RSP. The main
exact algorithms to solve R-SP can be subdivided into two groups: Lagrangian relaxation and
dynamic programming procedures. The former procedures use Lagrangian relaxation to handle
ILP formulations for the problem (see, e.g., [13, 36]). In addition, preprocessing techniques have
been presented in [35] and refined in [36]. These techniques identify arcs and vertices that cannot
compose an optimal solution for R-SP through the analysis of the reduced costs related to the
resolution of dual Lagrangian relaxations. More recently, [40] proposed a path ranking approach
that linearly combines the arc costs and the resource consumption values to generate a descent
direction of search. In turn, dynamic programming procedures for R-SP consist of label-setting
and label-correcting algorithms, such as the one proposed in [41] and further improved in [42] by
the addition of preprocessing strategies. Recently, Zhu and Wilhelm [43] developed a three-stage
label-setting algorithm that runs in pseudo-polynomial time and figures among the state-of-theart methods to solve R-SP, along with the algorithms presented in [40] and [42]. We refer to [44]
for a survey on exact methods to solve R-SP.
Although NP-hard, R-SP can be solved efficiently by some of the aforementioned procedures
(particularly, the ones proposed in [40, 42, 43]). Moreover, optimization softwares, as CPLEX1 ,
are also competitive in handling reasonably-sized instances (with up to 3000 vertices) of the
problem [43].
1 http://www-01.ibm.com/software/commerce/optimization/cplex-optimizer/
16
R-RSP is also a generalization of the interval data min-max regret Robust Shortest Path problem (RSP) [1, 3, 45, 46]. RSP consists in finding a robust path (from the origin vertex to the
destination one) considering the min-max regret criterion, with no additional resource consumption restriction on the solution path. Therefore, RSP can be reduced to R-RSP by considering
β = 0 and di j = 0 ∀ (i, j) ∈ A.
Preprocessing techniques able to identify arcs that cannot compose an optimal solution for
RSP have been proposed in [16] and later improved in [47]. A compact MILP formulation for
the problem, based on the dual of an LP formulation for the classical shortest path problem, was
presented in [16]. Exact algorithms have been proposed for RSP, such as the branch-and-bound
algorithm of [48] and the logic-based Benders’ algorithm of [8], which is able to solve instances
with up to 4000 vertices. Moreover, the FPTAS of [28] for interval min-max regret problems
is applicable to RSP when the problem is considered in series-parallel graphs. However, as
pointed out by the end of Section 2, this FPTAS does not naturally extend to interval robust-hard
problems, such as R-RSP.
5.1.1. Mathematical formulation
The mathematical formulation here presented makes use of Theorem 1, which can be stated
for the specific case of R-RSP as follows.
Proposition 2. Given a value β ∈ Z and a path p ∈ P(β), the regret of p is maximum in the
scenario s(p) induced by p, where the costs of all the arcs of p are in their corresponding upper
bounds and the costs of all the other arcs are in their lower bounds.
2{
1}
5{1}
1
1{3}
3{1}
2
2{1}
5{
2}
0
3
Figure 2: Scenario s p̃ induced by the path p̃ = {0, 1, 2, 3} in the digraph presented in Figure 1.
s( p̃)
s( p̃)
For each arc (i, j) ∈ A, the notation ci j {di j } means, respectively, the arc cost ci j in the scenario
s( p̃) and its resource consumption {di j }.
17
Consider the digraph presented in Figure 1 and the scenario s( p̃) induced by the path p̃ =
{0, 1, 2, 3} (as showed in Figure 2). Also let the resource limit be β = 3. According to Proposition
p̃), β)
2, the β-restricted robustness cost of p̃ is given by Rβp̃ = r(s(
= C p̃s( p̃) − C ps(∗p̃)
p̃
(s( p̃), β) = (2 +
2 + 5) − (3 + 5) = 1. Proposition 2 reduces R-RSP to finding a path p∗ ∈ P(β) such that
(s(p), β)
p∗ = arg min r p
p∈P
s(p)
, i.e., p∗ = arg min {C p
p∈P(β)
s(p)
− C p∗ (s(p), β) }. Nevertheless, computing the β-
restricted robustness cost of any feasible solution p for R-RSP still implies finding a β-restricted
shortest path p∗ (s(p), β) in the scenario s(p) induced by p, and this problem is NP-hard.
Now, let us consider the following result, which helps describing an optimal solution path for
R-RSP.
Property 1. Given two arbitrary sets Z1 and Z2 , it holds that Z1 = (Z1 ∩ Z2 ) ∪ (Z1 \Z2 ).
Theorem 2. Given a value β ∈ Z and a non-elementary path p ∈ P(β), for any elementary path
p̃),β)
p̃ ∈ P(β) such that A[ p̃] ⊂ A[p], it holds that r(s(
≤ r(s(p),β)
.
p
p̃
Proof. Consider a value β ∈ Z and a non-elementary path p ∈ P(β). By definition, p contains at
least one cycle. Let G[p] be the subgraph of G induced by the arcs in A[p] and p̃ be an elementary
path from o to t in G[p]. Clearly, A[ p̃] ⊂ A[p] and, therefore, p̃ ∈ P(β). By definition,
(s( p̃),β)
r p̃
s( p̃)
= C p̃
s( p̃)
− C p∗ (s( p̃),β) .
(32)
Consider the set Ā = A[p]\A[ p̃] of the arcs in p which do not belong to p̃. As p is supposed to
contain at least one cycle, then Ā , ∅. Since A[ p̃] ⊂ A[p], the difference between scenarios s(p)
and s( p̃) consists of the cost values assumed by the arcs in Ā. More precisely,
cis(j p̃) = cis(p)
j
cis(p)
j = ui j
s( p̃)
ci j = li j
∀(i, j) ∈ A\Ā,
(33)
∀(i, j) ∈ Ā,
(34)
∀(i, j) ∈ Ā.
(35)
It follows that
C p̃s( p̃) =
X
(i, j)∈A[ p̃]
ui j =
X
(i, j)∈A[p]
X
ui j −
(i, j)∈A[p]\A[ p̃]
18
ui j = C ps(p) −
X
(i, j)∈Ā
ui j .
(36)
Applying Property 1 to the sets A[p∗ (s( p̃), β)] and A[p]:
(a1 )
z
}|
{
A[p (s( p̃), β)] = (A[p∗ (s( p̃), β)] ∩ A[p]) ∪(A[p∗ (s( p̃), β)]\A[p]).
∗
(37)
Since A[ p̃] ⊂ A[p] and Ā = A[p]\A[ p̃], it follows that
A[p] = A[ p̃] ∪ (A[p]\A[ p̃]) = A[ p̃] ∪ Ā.
(38)
Therefore, expression (a1 ) of (37) can be rewritten as
(A[p∗ (s( p̃), β)] ∩ A[p]) = (A[p∗ (s( p̃), β)] ∩ (A[ p̃] ∪ Ā)) =
(A[p∗ (s( p̃), β)] ∩ A[ p̃]) ∪ (A[p∗ (s( p̃), β)] ∩ Ā).
(39)
s
p
Applying (37) and (39) to C ps(∗p̃)
(s( p̃),β) and C p∗ (s( p̃),β) , we obtain:
X
C ps(∗p̃)
(s( p̃),β) =
(i, j)∈A[p∗ (s( p̃),β)]∩A[ p̃]
cis(j p̃)
(i, j)∈A[p∗ (s( p̃),β)]∩Ā
X
+
X
cis(j p̃) +
cis(j p̃) ,
(40)
(i, j)∈A[p∗ (s( p̃),β)]\A[p]
X
C ps(p)
∗ (s( p̃),β) =
(i, j)∈A[p∗ (s( p̃),β)]∩A[ p̃]
X
+
X
cis(p)
j +
cis(p)
j
(i, j)∈A[p∗ (s( p̃),β)]∩Ā
s(p)
ci j .
(41)
(i, j)∈A[p∗ (s( p̃),β)]\A[p]
Considering (33)-(35), (40) and (41), we deduce that the difference between the cost of path
p∗ (s( p̃), β) in s(p) and its cost in s( p̃) is given by the arcs which are simultaneously in Ā and in
A[p∗ (s( p̃), β)]. Thus, expressions (40) and (41) can be reformulated as
X
C ps(∗p̃)
(s( p̃),β) =
(i, j)∈A[p∗ (s( p̃),β)]∩A[ p̃]
+
X
ui j +
X
(i, j)∈A[p∗ (s( p̃),β)]\A[p]
19
li j
(i, j)∈A[p∗ (s( p̃),β)]∩Ā
li j ,
(42)
X
C ps(p)
∗ (s( p̃),β) =
(i, j)∈A[p∗ (s( p̃),β)]∩A[ p̃]
ui j
(i, j)∈A[p∗ (s( p̃),β)]∩Ā
X
+
X
ui j +
li j .
(43)
(i, j)∈A[p∗ (s( p̃),β)]\A[p]
Subtracting (43) from (42),
X
s(p)
C ps(∗p̃)
(s( p̃),β) − C p∗ (s( p̃),β) =
X
li j −
(i, j)∈A[p∗ (s( p̃),β)]∩Ā
ui j .
(44)
(i, j)∈A[p∗ (s( p̃),β)]∩Ā
Therefore,
X
s(p)
C ps(∗p̃)
(s( p̃),β) = C p∗ (s( p̃),β) −
(ui j − li j ).
(45)
(i, j)∈A[p∗ (s( p̃),β)]∩Ā
Applying (36) and (45) in (32):
p̃),β)
r(s(
= C ps(p) −
p̃
X
(i, j)∈Ā
ui j − C ps(p)
∗ (s( p̃),β) −
X
C ps(p) − C ps(p)
∗ (s( p̃),β) +
X
(i, j)∈A[p∗ (s( p̃),β)]∩Ā
(ui j − li j ) −
(i, j)∈A[p∗ (s( p̃),β)]∩Ā
(ui j − li j ) =
X
ui j .
(46)
(i, j)∈Ā
One may note that
X
(ui j − li j ) −
(i, j)∈A[p∗ (s( p̃),β)]∩Ā
X
(i, j)∈Ā
ui j ≤
X
(ui j − li j ) −
X
(i, j)∈Ā
(i, j)∈Ā
P
Since Ā ⊂ A, and li j ≥ 0 for all (i, j) ∈ A, it follows that
ui j ≤
X
(−li j ).
(47)
(i, j)∈Ā
(−li j ) ≤ 0 and, thus,
(i, j)∈Ā
X
(ui j − li j ) −
(i, j)∈A[p∗ (s( p̃),β)]∩Ā
X
ui j ≤ 0.
(48)
(i, j)∈Ā
From (46) and (48),
p̃),β)
r(s(
≤ C ps(p) − C ps(p)
∗ (s( p̃),β) .
p̃
20
(49)
As p∗ (s(p), β) is a path with the smallest cost in s(p) among all the paths in P(β), including
s(p)
p∗ (s( p̃), β), it holds that C ps(p)
∗ (s( p̃),β) ≥ C p∗ (s(p),β) . Thus,
p̃),β)
s(p)
r(s(
≤ C ps(p) − C ps(p)
− C ps(p)
∗ (s( p̃),β) ≤ C p
∗ (s(p),β) .
p̃
(50)
(s( p̃),β)
By definition, r(s(p),β)
= C ps(p) − C ps(p)
≤ r(s(p),β)
.
∗ (s(p),β) . Therefore, r p̃
p
p
Now, we can devise a mathematical formulation for R-RSP from the generic model R̃, defined
by (6) and (7). Consider the decision variables y on the choice of arcs belonging or not to a βrestricted robust path: yi j = 1 if the arc (i, j) ∈ A belongs to the solution path; yi j = 0, otherwise.
Likewise, let the binary variables x identify a β-restricted shortest path in the scenario induced
by the path defined by y, such that xi j = 1 if the arc (i, j) ∈ A belongs to this β-restricted shortest
path, and xi j = 0, otherwise. A nonlinear compact formulation for R-RSP is given by
!
X
X
(li j + (ui j − li j )yi j )xi j .
min
ui j yi j − min
y∈P(β)
x∈P(β)
(i, j)∈A
(51)
(i, j)∈A
As discussed in Section 3, we can derive an MILP formulation from (51) by adding a free
variable ρ and linear constraints that explicitly bound ρ with respect to all the feasible paths that
x can represent. The resulting formulation is provided from (52) to (59).
min
X
u i j yi j − ρ
(52)
(i, j)∈A
s.t.
X
y jo −
X
y ji −
X
y jt −
j:( j,o)∈A
yok = −1,
(53)
k:(o,k)∈A
j:( j,i)∈A
X
yik = 0
X
ytk = 1,
∀ i ∈ V\{o, t},
(54)
k:(i,k)∈A
j:( j,t)∈A
X
X
(55)
k:(t,k)∈A
di j yi j ≤ β,
(56)
(i, j)∈A
ρ≤
X
(li j + (ui j − li j )yi j ) x̄i j
∀ x̄ ∈ P(β),
(57)
(i, j)∈A
yi j ∈ {0, 1} ∀ (i, j) ∈ A,
(58)
ρ free.
(59)
The flow conservation constraints (53)-(55), along with the domain constraints (58), ensure
that the y variables define a path from the origin to the destination vertices. In fact, as pointed out
21
in [16], these constraints do not prevent the existence of additional cycles of cost zero disjoint
from the solution path. Notice, however, that every arc (i, j) of these cycles necessarily has
li j = ui j = 0 and, thus, they do not modify the optimal solution value. Hence, these cycles are
not taken into account hereafter.
Constraint (56) limits the resource consumption of the path defined by y to be at most β,
whereas constraints (57) guarantee that ρ does not exceed the value related to the inner minimization in (51). Note that, in (57), x̄ is a constant vector, one for each path in P(β). Moreover,
these constraints are tight whenever x̄ identifies a β-restricted shortest path in the scenario induced by the path that y defines. Constraint (59) gives the domain of the variable ρ.
Notice that, in the definition of R-RSP, we do not impose that a vertex in the solution path must
be traversed at most once. However, if that is the case, Theorem 2 indicates that the formulation
presented above can also be used to determine an elementary solution path for R-RSP by simply
discarding some edges from the cycles that may appear in the solution. In fact, Proposition 2 and
Theorem 2 imply that, for any β ∈ Z, if P(β) , ∅, then there is an elementary path p ∈ P(β)
which is a β-restricted robust path.
In this study, we use the logic-based Benders’ algorithm discussed in the Section 3.1 to solve
the formulation detailed above.
5.1.2. An LP based heuristic for R-RSP
In this section, we apply to R-RSP the heuristic framework presented in Section 4. To this
end, consider the following R-SP ILP formulation used to compute a β-restricted shortest path
p∗ (s, β) ∈ P(β) in a scenario s ∈ S. The binary variables x define p∗ (s, β), such that xi j = 1 if the
arc (i, j) ∈ A belongs to A[p∗ (s, β)], and xi j = 0, otherwise.
(I1 )
min
X
cisj xi j
(60)
(i, j)∈A
s.t.
X
x jo −
X
x ji −
X
x jt −
j:( j,o)∈A
X
xok = −1,
(61)
k:(o,k)∈A
j:( j,i)∈A
j:( j,t)∈A
X
X
xik = 0
X
xtk = 1,
∀ i ∈ V\{o, t},
(62)
k:(i,k)∈A
(63)
k:(t,k)∈A
di j xi j ≤ β,
(64)
(i, j)∈A
xi j ∈ {0, 1} ∀ (i, j) ∈ A.
22
(65)
The objective function in (60) represents the cost, in the scenario s, of the path defined by x,
while constraints (61)-(65) ensure that x identifies a path in P(β). Relaxing the integrality on x,
we obtain the following LP formulation:
X
(L1 ) θ(s, β) = min
cisj xi j
(66)
(i, j)∈A
s.t.
Constraints (61)-(64),
xi j ≥ 0
∀ (i, j) ∈ A.
(67)
The domain constraints xi j ≤ 1 for all (i, j) ∈ A were omitted from L1 , since they are redundant. Let θ(s, β) be the optimal value for problem L1 in a scenario s. Observe that θ(s, β) provides
a lower bound on the solution of I1 in the scenario s. For the sake of clarity, let us define a new
metric to evaluate the quality of a path in P(β).
Definition 12. The β-heuristic robustness cost of a path p ∈ P(β), denoted by H βp , is the difference
s(p)
between the cost C p
of p in the scenario s(p) induced by p and the relaxed cost θ(s(p), β) in s(p),
i.e., H βp = C ps(p) − θ(s(p), β) .
Definition 13. A path p̃∗ ∈ P(β) is said to be a β-heuristic robust path if it has the smallest
β
β-heuristic robustness cost among all the paths in P(β), i.e., p̃∗ = arg min H p .
p∈P(β)
In the case of R-RSP, the proposed heuristic aims at finding a β-heuristic robust path and relies
on the hypothesis that such a path is a near-optimal solution for R-RSP. The problem of finding
a β-heuristic robust path can be modeled by adapting formulation (51). To this end, the binary
variables y now represent a β-heuristic robust path in P(β). Furthermore, considering the scenario
s(y) induced by the path defined by y, the nested minimization in (51) is replaced by θ(s(y), β) . We
obtain:
min
y∈P(β)
X
(i, j)∈A
!
ui j yi j − θ(s(y), β) .
(68)
Given a scenario s ∈ S, the optimal value assumed by θ(s, β) can be represented by the dual of
L1 , as follows:
(L̃1 )
θ(s,β) = max
s.t.
(λt − λo − βµ)
λ j ≤ λi + cisj + di j µ
(69)
∀ (i, j) ∈ A,
(70)
µ ≥ 0,
(71)
λk free ∀ k ∈ V.
23
(72)
The dual variables {λk : k ∈ V} and µ are associated, respectively, with constraints (61)-(63)
and with constraint (64) in the primal problem L1 . Since L̃1 is a maximization problem, its
objective function, along with (70)-(72), can be used to replace the relaxed cost θ(s(y),β) in (68),
thus deriving the following formulation:
X
min
y∈P(β)
s.t.
(i, j)∈A
From (69) !
z
}|
{
ui j yi j − (λt − λo − βµ)
λ j ≤ λi + li j + (ui j − li j )yi j + di j µ
(73)
∀ (i, j) ∈ A,
(74)
µ ≥ 0,
(75)
λk free ∀ k ∈ V.
(76)
Notice that constraints (74) consider the cost of each arc (i, j) ∈ A in the scenario s(y) induced
by the path identified by the y variables, i.e., the cost of each arc (i, j) ∈ A is given by (li j + (ui j −
li j )yi j ). The domain constraints (75) and (76) related to L̃1 remain the same. Now, we give an
MILP formulation for the problem of finding a β-heuristic robust path.
!
X
(H1 ) min
ui j yi j − λt + λo + βµ
(77)
(i, j)∈A
s.t.
X
y jo −
X
y ji −
X
y jt −
j:( j,o)∈A
X
yok = −1,
(78)
k:(o,k)∈A
j:( j,i)∈A
j:( j,t)∈A
X
X
yik = 0 ∀ i ∈ V\{o, t},
(79)
X
ytk = 1,
(80)
k:(i,k)∈A
k:(t,k)∈A
di j yi j ≤ β,
(81)
(i, j)∈A
Constraints (74)-(76),
yi j ∈ {0, 1} ∀ (i, j) ∈ A.
(82)
The objective function in (77) represents the β-heuristic robustness cost of the path defined
by the y variables. Constraints (78)-(81) and (82) ensure that y belongs to P(β). Constraints
(74)-(76) are the remaining restrictions related to L̃1 .
The heuristic consists in solving the corresponding problem H1 in order to find a β-heuristic
robust path p̃∗ ∈ P(β). Note that p̃∗ is also a feasible solution path for R-RSP, and, according to
Proposition 1, its β-heuristic robustness cost provides an upper bound on the solution of R-RSP.
Such bound can be improved by the evaluation of the actual β-restricted robustness cost of p̃∗ .
24
5.2. The Robust Set Covering problem (RSC)
The Robust Set Covering problem (RSC), introduced by Pereira and Averbakh [6], is an interval data min-max regret generalization of the Set Covering problem (SC). The classical SC is
known to be strongly NP-hard [12], and, thus, the same holds for RSC.
Let O = (oi j ) be an i × j binary matrix, such that I = {1, . . . , i} and J = {1, . . . , j} are its
corresponding rows and columns sets, respectively. We say that a column j ∈ J covers a row
i ∈ I if oi j = 1. In this sense, a covering is a subset K ⊆ J of columns such that every row in
I is covered by at least one column from K. Hereafter, we denote by Λ the set of all possible
coverings.
In the case of RSC, we associate with each column j ∈ J a continuous cost interval [l j ,u j ],
with l j , u j ∈ Z+ and l j ≤ u j . Accordingly, a scenario s is an assignment of column costs, where
a cost c sj ∈ [l j , u j ] is fixed for all j ∈ J. The set of all these possible cost scenarios is denoted by
P s
S, and the cost of a covering K ∈ Λ in a scenario s ∈ S is given by C Ks =
c j.
j∈K
∗
Definition 14. A covering K (s) ∈ Λ is said to be optimal in a scenario s ∈ S if it has the
smallest cost in s among all coverings in Λ, i.e., K ∗ (s) = arg min C Ks .
K∈Λ
Definition 15. The regret (robust deviation) of a covering K ∈ Λ in a scenario s ∈ S, denoted by
rKs , is the difference between the cost C Ks of K in s and the cost of an optimal covering K ∗ (s) ∈ Λ
in s, i.e., rKs = C Ks − C Ks ∗ (s) .
Definition 16. The robustness cost of a covering K ∈ Λ, denoted by RK , is the maximum regret
of K among all possible scenarios, i.e., RK = max rKs .
s∈S
∗
Definition 17. A covering K ∈ Λ is said to be a robust covering if it has the smallest robustness
cost among all coverings in Λ, i.e., K ∗ = arg min RK .
K∈Λ
Definition 18. RSC consists in finding a robust covering K ∗ ∈ Λ.
As far as we are aware, RSC was only addressed in [6] and [19]. On the other hand, the classical SC has been widely studied in the literature, especially because it can be used as a basic model
for applications in several fields, including production planning [49] and crew management [50].
We refer to [51] for an annotated bibliography on the main applications and the state-of-the-art of
SC. We highlight that, as well as for the classical counterpart of R-RSP, directly solving compact
ILP formulations for RSC via CPLEX’s branch-and-bound is competitive with the best exact
algorithms for the problem [52].
25
5.2.1. Mathematical formulation
The mathematical formulation presented below was proposed by Pereira and Averbakh [6]. As
the one for R-RSP presented in Section 5.1.1, this formulation is based on the modeling technique
for interval min-max regret problems in general discussed in Section 3. For the specific case of
RSC, Theorem 1 can be stated as follows.
Proposition 3. Given a covering X ∈ Λ, the regret of K is maximum in the scenario induced by
K, where the costs of all the columns of K are in their corresponding upper bounds and the costs
of all the other columns are in their lower bounds.
Now, consider the decision variables y on the choice of columns belonging or not to a robust
covering, such that y j = 1 if the column j ∈ J belongs to the solution; y j = 0, otherwise. Also
let ρ be a continuous variable. The MILP formulation of [6] is provided from (83) to (87).
min
X
u jy j − ρ
X
oi j y j ≥ 1
ρ≤
X
(83)
j∈J
s.t.
∀ i ∈ I,
(84)
j∈J
(l j + (u j − l j )y j ) x̄ j
∀ x̄ ∈ Λ,
(85)
j∈J
y j ∈ {0, 1} ∀ j ∈ J,
(86)
ρ free.
(87)
The objective function in (83) considers Proposition 3 and gives the robustness cost of a robust
covering. Constraints (84) and (86) ensure that the y variables represent a covering, whereas
constraints (85) guarantee that ρ does not exceed the cost of an optimal covering in the scenario
induced by the covering defined by y. In (85), x̄ is a constant vector, one for each possible
covering. Constraint (87) gives the domain of the variable ρ.
As for R-RSP, we use the logic-based Benders’ algorithm discussed in the Section 3.1 to solve
the formulation described above.
5.2.2. An LP based heuristic for RSC
Consider the following ILP formulation used to model the classical SC in a given cost scenario
s ∈ S. Here, the binary variables x define an optimal covering K ∗ (s) ∈ Λ in s, such that x j = 1 if
26
the column j ∈ J belongs to K ∗ (s), and x j = 0, otherwise.
(I2 )
min
X
c sj x j
(88)
X
oi j x j ≥ 1 ∀ i ∈ I,
(89)
j∈J
s.t.
j∈J
x j ∈ {0, 1} ∀ j ∈ J.
(90)
The objective function in (88) gives the cost, in the scenario s, of the covering defined by x,
while constraints (89) and (90) ensure that x identifies a covering in Λ. Relaxing the integrality
on x, we obtain:
(L2 )
min
X
c sj x j
(91)
j∈J
s.t.
Constraint (89),
xj ≥ 0
∀ j ∈ J.
(92)
Notice that we omitted the domain constraints x j ≤ 1 for all j ∈ J, since they are redundant
in this case. Considering formulations I2 , L2 and the generic model R̂, given by (7), (19), (20),
(23) and (24), we can devise a heuristic formulation for RSC. Now, the y variables represent a
heuristic solution covering, and the variables {λi : i ∈ I} are the ones of the dual problem related
to L2 .
(H2 )
min
X
j∈J
s.t.
X !
u jy j −
λi
(93)
i∈I
X
oi j y j ≥ 1 ∀ i ∈ I,
X
oi j λi ≤ l j + (u j − l j )y j
(94)
j∈J
∀ j ∈ J,
(95)
i∈I
λi ≥ 0 ∀ i ∈ I,
(96)
y j ∈ {0, 1} ∀ j ∈ J.
(97)
According to Proposition 1, the objective function in (93) gives an upper bound on the robustness cost of a robust solution for RSC. Constraints (94) and (97) ensure that y defines a covering
in Λ, while constraints (95) are the ones related to the dual of L2 . Notice that constraints (95)
consider the cost of each column j ∈ J in the scenario induced by the covering identified by the
y variables. Restrictions (96) give the domain of the dual variables λ.
27
In the case of RSC, the LP based heuristic consists in solving formulation H2 and, then,
computing the robustness cost of the solution obtained.
6. Computational experiments
In this section, we evaluate, out of computational experiments, the effectiveness and the time
efficiency of the proposed heuristic at solving the two interval robust-hard problems considered
in this study. For short, the Logic-Based Benders’ decomposition algorithm is referred to as
LB-Benders’, whereas the LP based Heuristic is referred to as LPH. LB-Benders’, LPH and
the 2-approximation heuristic for interval min-max regret problems, namely AMU [23], were
implemented in C++, along with the optimization solver ILOG CPLEX 12.5. The computational
experiments were performed on a 64 bits Intel R Xeon R E5405 machine with 2.0 GHz and 7.0
GB of RAM, under Linux operating system. LB-Benders’ was set to run for up to 3600 seconds
of wall-clock time.
6.1. The Restricted Robust Shortest Path problem (R-RSP)
In all of the algorithms implemented, whenever a classical R-SP instance had to be solved,
we used CPLEX to handle the ILP formulation I1 , defined by (60)-(65), directly. We also used
CPLEX to solve each master problem in LB-Benders’ and the heuristic formulation H1 , defined
by (77)-(82)
6.1.1. Benchmarks description
Due to the lack of R-RSP instances in the literature, we generated two benchmarks of instances
inspired by the applications described in Section 5.1. These benchmarks were adapted from
two sets of RSP instances: Karaşan [16] and Coco [53] instances, which model, respectively,
telecommunications and urban transportation networks.
Karaşan instances have been largely used in experiments concerning RSP [8, 16, 48, 53, 54].
They consist of layered [55] and acyclic [56] digraphs. In these digraphs, each of the κ layers
has the same number ω of vertices. There is an arc from every vertex in a layer b ∈ {1, . . . , κ − 1}
to every vertex in the adjacent layer b + 1. Moreover, there is an arc from the origin o to every
vertex in the first layer, and an arc from every vertex in the layer κ to the destination vertex t.
These instances are named K-v-Φmax -δ-ω, where v is the number of vertices (aside from o and
28
t), Φmax is an integer constant, and 0 < δ < 1 is a continuous value. The arc cost intervals were
generated as follows. For each arc (i, j) ∈ A, a random integer value Φi j was uniformly chosen
in the range [1, Φmax ]. Afterwards, random integer values li j and ui j were uniformly selected,
respectively, in the ranges [(1 − δ) · Φi j , (1 + δ) · Φi j ] and [li j , (1 + δ) · Φi j ]. Note that Φ plays
the role of a base-case scenario, and δ determines the degree of uncertainty. Figure 3 shows an
example of an acyclic digraph with 3 layers of width 2.
1
3
5
0
7
2
4
6
Figure 3: An acyclic digraph with 3 layers of width 2. Here, o = 0 and t = 7.
Coco instances consist of grid digraphs based on n × m matrices, where n is the number of
rows and m is the number of columns. Each matrix cell corresponds to a vertex in the digraph,
and there are two bidirectional arcs between each pair of vertices whose respective matrix cells
are adjacent. The origin o is defined as the upper left vertex, and the destination t is defined as
the lower right vertex. These instances are named G-n×m-Φmax -δ, with 0 < δ < 1, where Φmax
is an integer value. Given Φmax and δ values, the cost intervals are generated as in the Karaşan
instances. Figure 4 gives an example of a grid digraph.
0
1
2
3
4
5
6
7
Figure 4: A 2 × 4 grid digraph, with o = 0 and t = 7.
For all instances, the resource consumption associated with each arc is given by a random
integer value uniformly selected in the interval (0, 10]. The small interval amplitude allows
the generation of instances in which most of the arcs are candidate to appear in an optimal
solution, increasing the number of feasible solutions. The symmetry with respect to arc resource
consumptions was preserved, i.e., we considered di j = d ji for any pair of adjacent vertices i and
j such that (i, j) ∈ A and ( j, i) ∈ A.
The resource consumption limit β of a given instance was computed as follows. Consider
29
the set P of all the paths from o to t, and let p̄ ∈ P be a shortest path in terms of resource
consumption, i.e., p̄ = arg min D p . We set β = 1.1·D p̄ , which means that is given a 10% tolerance
p∈P
with respect to the minimum resource consumption D p̄ . This way, the resource consumption limit
is tighter.
We generated Karaşan and Coco instances of 1000 and 2000 vertices, with Φmax ∈ {20, 200},
δ ∈ {0.5, 0.9} and ω ∈ {5, 10, 25}. Considering these values, a group of 10 instances was generated for each possible parameters configuration. In summary, 480 instances were used in the
experiments.
6.1.2. Results
Computational experiments were carried out in order to evaluate if the proposed heuristic
efficiently finds optimal or near-optimal solutions for the two benchmarks of instances described
above. Results for Karaşan and Coco instances are reported in Tables 1 and 2, respectively. The
first column displays the name of each group of 10 instances. The second and third columns
show, respectively, the number of instances solved at optimality by LB-Benders’ within 3600
seconds, and the average wall-clock processing time (in seconds) spent in solving these instances.
If no instance in the group was solved at optimality, this entry is filled with a dash. The fourth and
fifth columns show, respectively, the average and the standard deviation (over the 10 instances)
of the relative optimality gaps given by 100 ·
UBb −LBb
UBb .
Here, LBb and U Bb are, respectively, the
best lower and upper bounds obtained by LB-Benders’ for a given instance. The sixth column
displays the average wall-clock processing time (in seconds) of AMU. The seventh column shows
the average (over the 10 instances) of the relative gaps given by 100 ·
UBamu −LBb
UBamu ,
where U Bamu
is the best upper bound obtained by AMU for a given instance. The standard deviation of these
gaps is given in the eighth column. Likewise, the ninth column shows the average wall-clock
processing time of LPH, and the last two columns give the average and the standard deviation
(over the 10 instances) of the gaps given by 100 ·
UBlph −LBb
UBlph .
Here, U Blph is the β-restricted
robustness cost of the solution obtained by LPH for a given instance.
Notice that the gaps referred to the solutions obtained by AMU and LPH consider the best
lower bounds obtained by LB-Benders’ (within 3600 seconds of execution), which might not
correspond to the cost of optimal solutions. Thus, the aforementioned gaps may overestimate the
actual gaps between the cost of the solutions obtained and the cost of optimal ones.
30
Table 1: Computational results for the layered and acyclic digraph instances.
LB-Benders’
Test set
#opt
Time (s)
AvgGAP (%)
AMU
StDev (%)
Time (s)
AvgGAP (%)
LPH
StDev (%)
Time (s)
AvgGAP (%)
StDev (%)
31
K-1000-20-0.5-5
8
1515.25
0.11
0.24
3.13
4.21
3.59
10.33
0.11
0.24
K-1000-20-0.9-5
2
2108.61
7.47
5.29
3.12
10.06
4.21
28.84
5.79
3.75
K-1000-200-0.5-5
10
1165.08
0.00
0.00
3.13
3.68
2.18
8.52
0.16
0.28
K-1000-200-0.9-5
1
1919.16
4.85
3.30
3.07
9.77
1.83
21.36
3.80
2.57
K-1000-20-0.5-10
10
83.30
0.00
0.00
4.15
3.06
2.70
11.23
0.07
0.22
K-1000-20-0.9-10
10
218.69
0.00
0.00
4.17
4.52
3.20
17.75
0.00
0.00
K-1000-200-0.5-10
10
42.54
0.00
0.00
3.96
1.57
1.84
10.45
0.31
0.97
K-1000-200-0.9-10
10
413.43
0.00
0.00
3.94
4.50
2.98
24.44
0.05
0.15
K-1000-20-0.5-25
10
17.61
0.00
0.00
7.35
3.12
4.52
21.55
0.00
0.00
K-1000-20-0.9-25
10
32.22
0.00
0.00
7.51
2.35
3.69
26.97
0.24
0.76
K-1000-200-0.5-25
10
18.17
0.00
0.00
7.25
1.27
2.71
23.67
0.00
0.00
K-1000-200-0.9-25
10
41.04
0.00
0.00
7.33
1.13
1.89
30.92
0.00
0.00
K-2000-20-0.5-5
0
0.00
14.47
5.89
10.61
14.30
4.06
64.61
10.43
3.87
K-2000-20-0.9-5
0
0.00
25.01
2.69
10.68
21.35
2.17
241.13
17.94
2.38
K-2000-200-0.5-5
0
0.00
14.45
3.10
10.38
14.15
2.87
69.62
10.70
2.21
K-2000-200-0.9-5
0
0.00
25.77
3.39
10.43
22.13
3.17
454.79
18.15
2.79
K-2000-20-0.5-10
8
1297.89
0.91
2.23
13.01
4.37
3.69
92.04
0.89
1.99
K-2000-20-0.9-10
0
0.00
7.34
4.06
12.75
9.46
4.30
252.91
5.91
3.45
K-2000-200-0.5-10
4
846.44
1.37
2.30
12.34
4.12
2.94
112.94
1.04
1.66
K-2000-200-0.9-10
0
0.00
5.99
2.44
12.39
8.78
3.54
211.80
4.77
2.31
K-2000-20-0.5-25
10
155.30
0.00
0.00
21.72
5.98
7.21
122.22
0.00
0.00
K-2000-20-0.9-25
10
408.79
0.00
0.00
21.60
1.46
1.54
222.00
0.07
0.22
K-2000-200-0.5-25
10
138.88
0.00
0.00
21.88
1.53
2.11
121.82
0.04
0.13
K-2000-200-0.9-25
10
572.74
0.00
0.00
21.18
2.70
2.76
215.21
0.02
0.05
4.49
1.46
6.65
3.15
3.35
1.25
Average
Table 2: Computational results for the grid digraph instances.
LB-Benders’
AvgGAP (%)
StDev (%)
Time (s)
AvgGAP (%)
LPH
32
Test set
#opt
G-32x32-20-0.5
10
7.31
0.00
0.00
3.21
4.16
9.20
3.80
0.22
0.70
G-32x32-20-0.9
10
8.63
0.00
0.00
3.43
5.38
7.49
5.01
0.69
1.67
G-32x32-200-0.5
10
6.83
0.00
0.00
3.35
1.56
2.72
3.88
3.11
4.72
G-32x32-200-0.9
10
9.79
0.00
0.00
3.22
3.90
5.89
5.33
0.00
0.00
G-20x50-20-0.5
10
6.66
0.00
0.00
2.86
2.71
5.94
3.96
0.42
1.34
G-20x50-20-0.9
10
9.14
0.00
0.00
3.00
1.80
2.93
4.76
0.76
1.10
G-20x50-200-0.5
10
6.23
0.00
0.00
3.24
2.54
5.09
4.47
0.78
2.45
G-20x50-200-0.9
10
13.43
0.00
0.00
3.15
2.33
4.43
5.43
0.58
0.74
G-5x200-20-0.5
10
397.06
0.00
0.00
2.92
5.29
4.89
10.97
0.10
0.31
G-5x200-20-0.9
9
670.84
0.28
0.89
2.91
4.64
1.69
19.83
0.36
0.87
G-5x200-200-0.5
10
153.69
0.00
0.00
2.97
4.82
3.57
8.75
0.29
0.66
G-5x200-200-0.9
8
1059.09
0.20
0.50
3.01
8.00
3.73
22.34
0.32
0.57
G-44x44-20-0.5
10
23.52
0.00
0.00
10.36
0.97
1.92
13.15
0.81
1.42
G-44x44-20-0.9
10
29.43
0.00
0.00
10.32
3.92
8.06
15.50
0.55
1.04
G-44x44-200-0.5
10
23.00
0.00
0.00
9.77
5.05
4.02
14.58
0.00
0.00
G-44x44-200-0.9
10
38.13
0.00
0.00
9.53
2.70
3.23
19.98
0.13
0.22
G-20x100-20-0.5
10
34.77
0.00
0.00
10.90
2.81
5.26
20.38
0.00
0.00
G-20x100-20-0.9
10
90.28
0.00
0.00
10.76
5.41
4.98
29.39
0.61
1.13
G-20x100-200-0.5
10
47.27
0.00
0.00
11.39
1.64
1.97
20.17
0.25
0.66
G-20x100-200-0.9
10
59.16
0.00
0.00
10.53
3.37
3.27
26.32
0.21
0.37
G-5x400-20-0.5
1
3444.71
2.57
1.98
10.26
6.82
3.90
62.50
2.14
1.62
G-5x400-20-0.9
0
0.00
7.76
3.95
10.20
10.83
3.16
150.45
5.67
2.89
G-5x400-200-0.5
1
2719.17
5.24
4.32
10.27
8.67
3.59
79.37
3.94
3.17
G-5x400-200-0.9
0
0.00
11.50
3.45
9.93
13.27
3.75
249.81
8.19
2.24
1.15
0.63
4.69
4.36
1.26
1.24
Average
Time (s)
AMU
StDev (%)
Time (s)
AvgGAP (%)
StDev (%)
With respect to Karaşan instances (Table 1), the average gaps referred to the solutions provided by LB-Benders’, AMU and LPH are up to, respectively, 7.47%, 10.06% and 5.79% for
the instances with 1000 vertices (see K-1000-20-0.9-5). For the instances with 2000 vertices,
the average gaps referred to the solutions provided by LB-Benders’, AMU and LPH are up to,
respectively, 25.77%, 22.13% and 18.15% (see K-2000-200-0.9-5). Notice that the average gaps
of AMU over all Karaşan instances is 6.65%, while that of LPH is only 3.35%. In fact, the
average gaps of the solutions provided by LPH are smaller than those of AMU for all the sets
of instances considered. It can also be observed that the smaller the value of ω is, the larger the
average gaps achieved by the three algorithms are. Furthermore, for the hardest instances (with
ω = 5), the average gaps of the solutions provided by LPH are smaller than or equal to those of
LB-Benders’ (except for K-1000-200-0.5-5).
Regarding Coco instances (Table 2), it can be seen that the average optimality gaps referred
to the solutions provided by LB-Benders’, AMU and LPH are at most, respectively, 11.50%,
13.27% and 8.19% (see G-5x400-200-0.9). Also in this case, the average gaps of the solutions
provided by LPH are smaller than those of AMU for all the sets of instances (except for G32x32-200-0.5). The average optimality gap of LB-Benders’ over all Coco instances is very
small (1.15%), while that of LPH is very close to this value (1.26%). It can also be observed
that the instances based on 5x400 grids are much harder to solve than the other grid instances.
Moreover, the average relative gaps referred to the solutions provided by LPH is always smaller
than those of LB-Benders’ for the hardest grid instances.
For both benchmarks, LPH clearly outperforms AMU in terms of the quality of the solutions
obtained. In fact, the heuristic is even able to achieve better upper bounds than LB-Benders’ at
solving some instance sets, especially the hardest ones. Furthermore, LPH required significantly
smaller computational effort than LB-Benders’. Therefore, LPH arises as an effective and time
efficient heuristic to solve Karaşan and Coco instances. One may note that, although the bounds
provided by AMU are not as good as those given by LPH, the 2-approximation procedure performs within tiny average computational times when compared with LB-Benders’, especially
for the hardest instances. Thus, the results suggest that AMU should be considered in the cases
where time efficiency is preferable to the quality of the solutions.
Our computational results also suggest that, for both benchmarks, instances generated with a
higher degree of uncertainty (in particular, δ = 0.9) tend to become more difficult to be handled
33
by LB-Benders’ and LPH. As pointed out in related works [11, 16], high δ values can increase
the occurrence of overlapping cost intervals and, thus, decrease the number of dominated arcs.
As a consequence, the task of finding a robust path becomes more difficult. Such behaviour does
not apply to AMU, as it simply solves R-SP instances in specific scenarios that do not rely on
the amplitude of the cost intervals.
In Tables 3a and 3b, we detail the improvement of LPH over AMU in terms of the bounds
achieved for Karaşan and Coco instances, respectively. The first column displays the name of
each instance set, and the second one shows the number of times (out of 10) that LPH gives
better bounds than AMU. The third and fourth columns show, respectively, the minimum and the
maximum percentage improvements given by 100 ·
UBamu −UBlph
,
UBamu
while the last two columns give
the average and the standard deviation (over the 10 instances in each set) of these values. Notice
that the percentage improvement assumes a negative value whenever AMU gives a better bound
than LPH.
Regarding Karaşan instances (Table 3a), the percentage improvement is up to 21.47% (see
K-2000-20-0.5-25). In fact, AMU only overcomes LPH on two instances from the whole benchmark, one from K-1000-20-0.9-25 and other from K-2000-200-0.9-25. For the grid digraph
instances (Table 3b), the percentage improvement is up to 29.31% (see G-32x32-20-0.5). Moreover, AMU gives better bounds than LPH only on 13 out of the 240 instances tested. We could
not identify a precise pattern on these instances that might indicate why AMU performs better.
However, most of them belong to instance sets based on square-like grids (such as 32x32 and
44x44). Thus, we conjecture that the balance between the number of lines and columns in the
corresponding grids plays a role in such behaviour.
34
Table 3: Details on the improvement of LPH over AMU for the two benchmarks of R-RSP instances.
(b) Grid digraph instances.
(a) Layered and acyclic digraph instances.
LPH Improvement
Test set
#Better
Min (%)
Max (%)
LPH Improvement
Avg (%)
StDev (%)
Test set
#Better
Min (%)
Max (%)
Avg (%)
StDev (%)
9.17
35
K-1000-20-0.5-5
10
0.00
9.79
4.10
3.59
G-32x32-20-0.5
10
0.00
29.31
3.94
K-1000-20-0.9-5
10
0.60
9.62
4.51
3.22
G-32x32-20-0.9
9
-5.49
20.17
4.69
7.95
K-1000-200-0.5-5
10
0.68
8.15
3.52
2.26
G-32x32-200-0.5
7
-11.21
0.00
-1.73
3.71
K-1000-200-0.9-5
10
2.06
12.49
6.14
3.28
G-32x32-200-0.9
10
0.00
18.21
3.90
5.89
K-1000-20-0.5-10
10
0.00
7.79
2.99
2.56
G-20x50-20-0.5
10
0.00
18.89
2.29
5.97
K-1000-20-0.9-10
10
0.00
12.10
4.52
3.20
G-20x50-20-0.9
9
-2.40
8.89
1.03
3.14
K-1000-200-0.5-10
10
0.00
4.18
1.27
1.51
G-20x50-200-0.5
9
-8.41
15.57
1.70
6.14
K-1000-200-0.9-10
10
1.33
12.16
4.45
2.97
G-20x50-200-0.9
9
-1.04
12.78
1.77
4.13
K-1000-20-0.5-25
10
0.00
11.90
3.12
4.52
G-5x200-20-0.5
10
0.00
14.34
5.20
4.89
K-1000-20-0.9-25
9
-2.47
10.39
2.10
3.94
G-5x200-20-0.9
10
2.58
8.01
4.29
1.75
K-1000-200-0.5-25
10
0.00
7.27
1.27
2.71
G-5x200-200-0.5
10
0.00
11.14
4.54
3.51
K-1000-200-0.9-25
10
0.00
5.68
1.13
1.89
G-5x200-200-0.9
10
1.22
12.15
7.70
3.82
K-2000-20-0.5-5
10
0.41
9.88
4.29
3.20
G-44x44-20-0.5
8
-3.95
5.77
0.15
2.40
K-2000-20-0.9-5
10
1.34
8.01
4.13
2.09
G-44x44-20-0.9
9
-3.29
23.26
3.40
7.95
K-2000-200-0.5-5
10
0.39
7.15
3.86
2.21
G-44x44-200-0.5
10
0.00
11.05
5.05
4.02
K-2000-200-0.9-5
10
1.61
8.25
4.86
2.22
G-44x44-200-0.9
9
-0.47
7.45
2.56
3.32
K-2000-20-0.5-10
10
0.00
9.80
3.52
2.81
G-20x100-20-0.5
10
0.00
14.09
2.81
5.26
K-2000-20-0.9-10
10
1.48
6.72
3.80
1.79
G-20x100-20-0.9
10
0.00
11.06
4.85
4.25
K-2000-200-0.5-10
10
0.00
5.66
3.12
1.95
G-20x100-200-0.5
10
0.00
5.80
1.40
1.80
K-2000-200-0.9-10
10
1.04
8.19
4.23
2.31
G-20x100-200-0.9
8
-0.66
7.65
3.17
3.38
K-2000-20-0.5-25
10
0.00
21.57
5.98
7.21
G-5x400-20-0.5
10
1.27
10.58
4.80
2.87
K-2000-20-0.9-25
10
0.00
3.91
1.39
1.60
G-5x400-20-0.9
10
1.59
13.90
5.42
3.65
K-2000-200-0.5-25
10
0.00
6.46
1.49
2.14
G-5x400-200-0.5
10
0.16
10.92
4.88
3.63
K-2000-200-0.9-25
9
-0.14
7.20
2.68
2.78
G-5x400-200-0.9
10
1.72
11.72
5.53
3.26
6.2. The Robust Set Covering problem (RSC)
In all of the algorithms regarding RSC, we used CPLEX to handle the ILP formulation I2 ,
defined by (88)-(90), whenever a classical SC instance had to be solved. We also used CPLEX
to solve each master problem in LB-Benders’ and the heuristic formulation H2 , defined by (93)(97).
6.2.1. Benchmarks description
In our experiments, we considered three benchmarks of instances from the literature of RSC,
namely Beasley, Montemanni and Kasperski-Zieliński benchmarks [6]. The three of them are
based on classical SC instances from the OR-Library [57]. However, the way the column cost
intervals are generated differs from benchmark to benchmark.
Regarding Beasley instances, let Φ j represent the cost of a column j ∈ J in the original SC
instance, and let 0 < δ < 1 be a continuous value used to control the level of uncertainty referred
to an RSC instance. For each j ∈ J , the corresponding cost interval [l j , u j ] is generated by
uniformly selecting random integer values l j and u j in the ranges [(1 − δ) · Φ j , Φ j ] and [Φ j , (1 +
δ) · Φ j ], respectively. These instances are named B.<SCinst>-δ, where <SCinst> stands for the
name of the original SC instance set considered. For each original instance of the classical SC,
we considered three RSC instances, one for each value δ ∈ {0.1, 0.3, 0.5}. In total, 75 instances
from Beasley benchmark were used in our experiments.
In Montemanni instances, the column costs of the original SC instances are discarded, and,
for each column j ∈ J , the corresponding cost interval [l j , u j ] is generated as follows. First, a
random integer value u j is uniformly chosen in the range [0, 1000], and, then, a random integer
value l j is uniformly selected in the range [0, u j]. These instances are named M.<SCinst>-1000,
where <SCinst> is the name of the original SC instance set used. Each original SC instance
considered gives the backbone to generate three RSC instances, and a total of 75 instances from
Montemanni benchmark were used in our experiments.
Kasperski-Zieliński benchmark also consider classical SC instances without the original column costs. In these instances, the cost interval [l j , u j ] of each column j ∈ J is generated as
follows. First, a random integer value l j is uniformly chosen in the range [0, 1000], and, then,
a random integer value u j is uniformly selected in the range [l j , l j + 1000]. These instances are
named KZ.<SCinst>-1000, where <SCinst> is the name of the original SC instance set used.
Each of the SC instances considered gives the backbone to generate three RSC instances, and
36
a total of 75 instances from Kasperski-Zieliński benchmark were used in our experiments. In
summary, 225 RSC instances were considered in the experiments.
6.2.2. Results
Table 4 shows the computational results regarding the three benchmarks of RSC instances
considered. The first column displays the name of each instance set, while the second one gives
(i) the number of instances solved at optimality by LB-Benders’ within 3600 seconds, over (ii)
the cardinality of the corresponding instance set. The average wall-clock processing time (in
seconds) spent in solving these instances at optimality are given in the third column. This entry
is filled with a dash if no instance in the group was solved at optimality. The fourth and fifth
columns show, respectively, the average and the standard deviation (over all the instances in
each set) of the relative optimality gaps given by 100 ·
UBb −LBb
UBb .
Recall that LBb and U Bb are,
respectively, the best lower and upper bounds obtained by LB-Benders’ for a given instance.
The sixth column displays the average wall-clock processing time (in seconds) of AMU. The
seventh column shows the average (over all the instances in each set) of the relative gaps given
by 100 ·
UBamu −LBb
UBamu ,
where U Bamu is the best upper bound obtained by AMU for a given instance.
The standard deviation of these gaps is given in the eighth column. Likewise, the ninth column
shows the average wall-clock processing time of LPH, and the last two columns give the average
and the standard deviation (once again, over all the instances in each set) of the gaps given by
100 ·
UBlph −LBb
UBlph .
Accordingly, U Blph is the robustness cost of the solution obtained by LPH for a
given instance.
As for R-RSP, the gaps referred to the solutions obtained by AMU and LPH consider the (not
necessarily optimal) lower bounds obtained by LB-Benders’ within 3600 seconds of execution.
Thus, these gaps may overestimate the actual gaps between the cost of the solutions obtained and
the cost of optimal ones.
From the results, it can be seen that the average gaps of the solutions provided by LPH are
smaller than those referred to AMU for all the sets of instances tested. Furthermore, for the
hardest instances (Kasperski-Zieliński benchmark), the average gaps of the solutions provided
by LPH are even smaller than those of LB-Benders’. As discussed in [6], Kasperski-Zieliński
instances are especially challenging, mostly because of the high probability of overlap between
arbitrary cost intervals in these instances.
37
Table 4: Computational results for the three benchmarks of RSC instances.
LB-Benders’
Time (s)
AvgGAP (%)
AMU
StDev (%)
Time (s)
AvgGAP (%)
LPH
Beasley set
#opt
StDev (%)
Time (s)
AvgGAP (%)
StDev (%)
B.scp4-0.1
10/10
1.03
0.00
0.00
0.23
4.24
4.92
0.21
0.59
1.86
B.scp5-0.1
10/10
3.32
0.00
0.00
0.34
9.01
8.27
0.42
2.60
3.62
38
B.scp6-0.1
5/5
2.23
0.00
0.00
0.88
8.02
7.41
0.64
1.43
3.19
B.scp4-0.3
10/10
9.82
0.00
0.00
0.24
5.24
3.46
0.44
0.98
1.12
B.scp5-0.3
10/10
28.23
0.00
0.00
0.34
6.21
2.61
0.92
1.78
2.62
B.scp6-0.3
5/5
12.18
0.00
0.00
1.08
2.44
2.70
1.05
1.63
1.51
B.scp4-0.5
10/10
93.98
0.00
0.00
0.29
3.56
2.12
0.64
1.20
1.49
B.scp5-0.5
10/10
94.20
0.00
0.00
0.34
5.38
4.33
1.21
0.87
1.00
B.scp6-0.5
5/5
22.57
0.00
0.00
1.00
4.08
4.21
1.16
1.44
2.23
0.00
0.00
5.35
4.45
1.39
2.07
Average
LB-Benders’
Montemanni set
StDev (%)
Time (s)
Time (s)
M.scp4-1000
27/30
598.94
0.04
0.14
0.23
1.13
0.78
0.61
0.05
0.16
M.scp5-1000
30/30
481.98
0.00
0.00
0.21
1.00
0.90
0.70
0.01
0.04
M.scp6-1000
15/15
13.90
0.00
0.00
0.42
0.78
0.94
0.80
0.06
0.14
0.01
0.05
0.97
0.87
0.04
0.11
LB-Benders’
Kasperski-Zieliński set
#opt
K.scp4-1000
0/30
K.scp5-1000
0/30
K.scp6-1000
3/15
Average
Time (s)
AvgGAP (%)
LPH
#opt
Average
AvgGAP (%)
AMU
StDev (%)
Time (s)
AMU
AvgGAP (%)
StDev (%)
0.00
14.25
2.93
0.00
8.63
3.45
1881.73
2.95
3.13
8.61
3.17
Time (s)
AvgGAP (%)
StDev (%)
LPH
AvgGAP (%)
StDev (%)
Time (s)
AvgGAP (%)
StDev (%)
3.08
14.27
2.73
124.86
12.90
2.62
2.90
8.63
3.45
44.93
7.99
3.01
11.96
4.04
2.90
115.31
2.77
2.82
8.98
3.03
7.89
2.82
Notice that LPH clearly outperforms AMU in terms of the quality of the solutions obtained
and requires significantly smaller computational effort than LB-Benders’. In fact, for most of the
instance sets considered, the average execution times of LPH are comparable to those of AMU.
Therefore, LPH arises as an effective and time efficient heuristic in solving the three benchmarks
of RSC instances tested. Nevertheless, we highlight that AMU should still be considered in the
cases where time efficiency is preferable to the quality of the solutions, especially for the more
challenging instances.
Table 5: Details on the improvement of LPH over AMU for the three benchmarks of RSC instances.
LPH Improvement
Test set
#Better
Min (%)
Max (%)
Avg (%)
StDev (%)
B.scp4-0.1
10/10
0.00
12.50
3.66
5.05
B.scp5-0.1
10/10
0.00
20.83
6.53
8.33
B.scp6-0.1
5/5
0.00
15.00
6.69
6.79
B.scp4-0.3
10/10
0.00
11.76
4.29
3.57
2.98
B.scp5-0.3
10/10
0.00
8.06
4.47
B.scp6-0.3
4/5
-2.50
6.52
0.80
3.37
B.scp4-0.5
10/10
0.52
5.36
2.39
1.42
B.scp5-0.5
9/10
-1.52
13.64
4.52
5.06
B.scp6-0.5
5/5
0.00
6.58
2.70
2.94
M.scp4-1000
30/30
0.17
3.30
1.08
0.79
M.scp5-1000
30/30
0.00
3.51
0.99
0.88
M.scp6-1000
15/15
0.00
2.87
0.72
0.94
KZ.scp4-1000
29/30
-0.04
4.59
1.56
1.33
KZ.scp5-1000
29/30
-0.08
3.13
0.71
0.80
KZ.scp6-1000
14/15
-0.13
4.25
1.29
1.61
In Table 5, we detail the improvement of LPH over AMU in terms of the bounds achieved
for the three benchmarks of RSC instances. The first column displays the name of each instance
set, and the second one shows (i) the number of times LPH gives better bounds than AMU,
over (ii) the cardinality of the corresponding instance set. The third and fourth columns show,
respectively, the minimum and the maximum percentage improvements given by 100·
UBamu −UBlph
,
UBamu
while the last two columns give the average and the standard deviation (over all the instances in
each set) of these values. These percentage improvements assume negative values whenever
39
AMU gives better bounds than LPH.
Regarding Beasley instances, the percentage improvement is up to 20.83% (see B.scp5-0.1).
In fact, AMU only overcomes LPH on two instances from the whole benchmark, one from
B.scp6-0.3 and other from B.scp5-0.5. With respect to Montemanni instances, the percentage improvement is up to 3.51% (see M.scp5-1000), and LPH always gives better bounds than
AMU. Regarding Kasperski-Zieliński instances, the percentage improvement is at most 4.59%
(see KZ.scp4-1000), and AMU overcomes LPH on three instances, one from each instance set.
We could not identify any specific pattern on the instances for which AMU outperforms LPH.
However, such behaviour is only verified in 5 out of the 225 instances tested.
7. Concluding remarks
In this study, we proposed a novel heuristic approach to address the class of interval robusthard problems, which is composed of robust optimization versions of classical NP-hard combinatorial problems. We applied this new technique to two interval robust-hard problems, namely the
Restricted Robust Shortest Path problem (R-RSP) and the Robust Set Covering problem (RSC).
To our knowledge, the former problem was also introduced in this study.
In order to evaluate the quality of the solutions obtained by our heuristic (namely LPH), we
adapted to R-RSP and to RSC a logic-based Benders’ decomposition algorithm (referred to as
LB-Benders’), which is a state-of-the-art exact method to solve interval data min-max regret
problems in general. We also compared the results obtained by the proposed heuristic with a
widely used 2-approximation procedure, namely AMU.
Regarding R-RSP, the computational experiments showed the heuristic’s effectiveness in solving the two benchmarks of instances considered. For the layered and acyclic digraph instances,
the average relative gaps of LB-Benders’ and AMU were, respectively, 4.49% and 6.65%, while
that of LPH was only 3.35%. For the grid digraph instances, the average relative gaps of LBBenders’, AMU and LPH were, respectively, 1.15%, 4.69% and 1.26%. Moreover, the average
processing times of LPH were much smaller than those of LB-Benders’ for both benchmarks
considered and remain competitive with those referred to AMU for most of the instances. In addition, LPH was able to provide better bounds than AMU for 465 out of the 480 R-RSP instances
tested.
With respect to RSC, the results show that the average gaps of the solutions provided by LPH
40
were smaller than those referred to AMU for all the sets of instances from the three benchmarks
used in the experiments. Moreover, LPH achieved better primal bounds than LB-Benders’ for the
hardest instances (Kasperski-Zieliński benchmark) and was able to provide better bounds than
AMU for 220 out of the 225 RSC instances tested.
The results point out to the fact that the proposed heuristic framework may also be efficient in
finding optimal or near-optimal solutions for other interval robust-hard problems, which can be
explored in future studies. Other directions of future work remain open. For instance, research
can be conducted to close the conjecture that the heuristic framework can be applied to the
wider class of interval data min-max regret problems with compact constraint sets addressed in
[25, 26]. Future works can also add to our framework local search strategies, such as Local
Branching [58], to further improve the quality of the solutions obtained by the heuristic.
Acknowledgments
This work was partially supported by the Brazilian National Council for Scientific and Technological Development (CNPq), the Foundation for Support of Research of the State of Minas
Gerais, Brazil (FAPEMIG), and Coordination for the Improvement of Higher Education Personnel, Brazil (CAPES).
References
[1] P. Kouvelis, G. Yu, Robust Discrete Optimization and Its Applications, Kluwer Academic Publishers, Boston, 1997.
[2] J. C. Spall, Introduction to Stochastic Search and Optimization: Estimation, Simulation and Control, Wiley, New
York, 2003.
[3] I. Averbakh, Computing and minimizing the relative regret in combinatorial optimization with interval data, Discrete Optimization 2 (4) (2005) 273–287.
[4] R. Montemanni, A Benders decomposition approach for the robust spanning tree problem with interval data, European Journal of Operational Research 174 (3) (2006) 1479–1490.
[5] R. Montemanni, J. Barta, L. M. Gambardella, The robust traveling salesman problem with interval data, Transportation Science 41 (3) (2007) 366–381.
[6] J. Pereira, I. Averbakh, Exact and heuristic algorithms for the interval data robust assignment problem, Computers
& Operations Research 38 (8) (2011) 1153–1163.
[7] H. Yaman, O. E. Karaşan, M. Ç. Pinar, The robust spanning tree problem with interval data, Operations Research
Letters 29 (1) (2001) 31–40.
[8] R. Montemanni, L. M. Gambardella, The robust shortest path problem with interval data via Benders decomposition, 4OR 3 (4) (2005) 315–328.
41
[9] A. Kasperski, Discrete Optimization with Interval Data: Minmax Regret and Fuzzy Approach (Studies in Fuzziness
and Soft Computing), Springer Berlin, 2008.
[10] V. G. Deineko, G. J. Woeginger, Pinpointing the complexity of the interval min-max regret knapsack problem,
Discrete Optimization 7 (4) (2010) 191–196.
[11] J. Pereira, I. Averbakh, The robust set covering problem with interval data, Annals of Operations Research 207 (1)
(2013) 217–235.
[12] M. R. Garey, D. S. Johnson, Computers and Intractability: A Guide to the Theory of NP-Completeness, W. H.
Freeman & Co., New York, NY, USA, 1979.
[13] G. Handler, I. Zang, A dual algorithm for the constrained shortest path problem, Networks 10 (4) (1980) 293–309.
[14] H. Aissi, C. Bazgan, D. Vanderpooten, Minmax and minmax regret versions of combinatorial optimization problems: A survey, European Journal of Operational Research 197 (2) (2009) 427–438.
[15] I. Averbakh, On the complexity of a class of combinatorial optimization problems with uncertainty, Mathematical
Programming 90 (2) (2001) 263–272.
[16] O. E. Karaşan, M. Ç. Pinar, H. Yaman, The robust shortest path problem with interval data, Tech. rep., Bilkent
University, Ankara, Turkey (2001).
[17] R. Montemanni, J. Barta, L. M. Gambardella, Heuristic and preprocessing techniques for the robust traveling
salesman problem with interval data, Tech. rep., Dalle Molle Institute for Artificial Intelligence (2006).
[18] J. Hooker, G. Ottosson, Logic-based Benders decomposition, Mathematical Programming 96 (1) (2003) 33–60.
[19] A. A. Coco, A. C. Santos, T. F. Noronha, Scenario-based heuristics with path-relinking for the robust set covering
problem, in: Proceedings of the XI Metaheuristics International Conference (Agadir, Marocco, 2015), 2015, pp.
1–8.
[20] G. Yu, On the max-min 0-1 knapsack problem with robust optimization applications, Operations Research 44 (2)
(1996) 407–415.
[21] H. Aissi, C. Bazgan, D. Vanderpooten, Approximation of min-max and min-max regret versions of some combinatorial optimization problems, European Journal of Operational Research 179 (2) (2007) 281–290.
[22] M. J. Feizollahi, I. Averbakh, The robust (minmax regret) quadratic assignment problem with interval flows, INFORMS Journal on Computing 26 (2) (2014) 321–335.
[23] A. Kasperski, P. Kobylański, M. Kulej, P. Zieliński, Minimizing maximal regret in discrete optimization problems
with interval data, in: Issues in Soft Computing. Decisions and Operations Research, O. Hryniewicz, J. Kacprzyk,
D. Kuchta (eds.), Akademicka Oficyna Wydawnicza EXIT, Warszawa, 2005, pp. 193–208.
[24] A. Kasperski, P. Zieliński, An approximation algorithm for interval data minmax regret combinatorial optimization
problems, Information Processing Letters 97 (5) (2006) 177–180.
[25] E. Conde, A 2-approximation for minmax regret problems via a mid-point scenario optimal solution, Operations
Research Letters 38 (4) (2010) 326–327.
[26] E. Conde, On a constant factor approximation for minmax regret problems using a symmetry point scenario, European Journal of Operational Research 219 (2) (2012) 452 – 457.
[27] A. B. Chassein, M. Goerigk, A new bound for the midpoint solution in minmax regret optimization with an application to the robust shortest path problem, European Journal of Operational Research 244 (3) (2015) 739 –
747.
42
[28] A. Kasperski, P. Zieliński, On the existence of an FPTAS for minmax regret combinatorial optimization problems
with interval data, Operations Research Letters 35 (4) (2007) 525–532.
[29] J. F. Benders, Partitioning procedures for solving mixed-variables programming problems, Numerische Mathematik
4 (1) (1962) 238–252.
[30] A. M. Geoffrion, Generalized Benders decomposition, Journal of Optimization Theory and Applications 10 (4)
(1972) 237–260.
[31] D. McDaniel, M. Devine, A modified Benders’ partitioning algorithm for mixed integer programming, Management Science 24 (3) (1977) 312–319.
[32] T. L. Magnanti, R. T. Wong, Accelerating Benders decomposition: Algorithmic enhancement and model selection
criteria, Operations Research 29 (3) (1981) 464–484.
[33] M. Fischetti, D. Salvagnin, A. Zanette, A note on the selection of Benders’ cuts, Mathematical Programming
124 (1-2) (2010) 175–182.
[34] L. Assunção, A. C. Santos, T. F. Noronha, R. Andrade, On the finite optimal convergence of logic-based Benders’
decomposition in solving 0-1 min-max regret optimization problems with interval costs, Lecture Notes in Computer
Science 9849 (1) (2016) 1–12.
[35] Y. P. Aneja, V. Aggarwal, K. P. K. Nair, Shortest chain subject to side constraints, Networks 13 (2) (1983) 295–302.
[36] J. Beasley, N. Christofides, An algorithm for the resource constrained shortest path problem, Networks 19 (4)
(1989) 379–394.
[37] R. Hassin, Approximation schemes for the restricted shortest path problem, Mathematics of Operations Research
17 (1) (1992) 36–42.
[38] Z. Wang, J. Crowcroft, Quality-of-Service routing for supporting multimedia applications, IEEE on Selected Areas
in Communications 14 (7) (1996) 1228–1234.
[39] G. Apostolopoulos, R. Guérin, S. Kamat, S. K. Tripathi, Quality of Service based routing: A performance perspective, SIGCOMM Computer Communication Review 28 (4) (1998) 17–28.
[40] L. Santos, J. Coutinho-Rodrigues, J. R. Current, An improved solution algorithm for the constrained shortest path
problem, Transportation Research Part B: Methodological 41 (7) (2007) 756–771.
[41] H. Joksch, The shortest route problem with constraints, Journal of Mathematical Analysis and Applications 14 (2)
(1966) 191–197.
[42] I. Dumitrescu, N. Boland, Improved preprocessing, labeling and scaling algorithms for the weight-constrained
shortest path problem, Networks 42 (3) (2003) 135–153.
[43] X. Zhu, W. E. Wilhelm, A three-stage approach for the resource-constrained shortest path as a sub-problem in
column generation, Computers & Operations Research 39 (2) (2012) 164–178.
[44] L. D. P. Pugliese, F. Guerriero, A survey of resource constrained shortest path problems: Exact solution approaches,
Networks 62 (3) (2013) 183–200.
[45] M. J. Rosenhead, M. Elton, S. K. Gupta, Robustness and optimality as criteria for strategic decisions, Operational
Research Quarterly 23 (4) (1972) 413–431.
[46] P. Zieliński, The computational complexity of the relative robust shortest path problem with interval data, European
Journal of Operational Research 158 (3) (2004) 570–576.
[47] D. Catanzaro, M. Labbé, M. Salazar-Neumann, Reduction approaches for robust shortest path problems, Computers
43
& Operations Research 38 (11) (2011) 1610–1619.
[48] R. Montemanni, L. M. Gambardella, A. V. Donati, A branch and bound algorithm for the robust shortest path
problem with interval data, Operations Research Letters 32 (3) (2004) 225–232.
[49] J. K. Cochran, A. M. Uribe, A set covering formulation for agile capacity planning within supply chains, International Journal of Production Economics 95 (2) (2005) 139–149.
[50] A. Caprara, M. Fischetti, P. Toth, D. Vigo, P. L. Guida, Algorithms for railway crew management, Mathematical
Programming 79 (1) (1997) 125–141.
[51] S. Ceria, P. Nobili, A. Sassano, Set covering problem, in: Annotated Bibliographies in Combinatorial Optimization,
M. DellAmico, F. Maffioli and S. Martello (eds.), Wiley, 1997, pp. 415–428.
[52] A. Caprara, P. Toth, M. Fischetti, Algorithms for the set covering problem, Annals of Operations Research 98 (1)
(2000) 353–371.
[53] A. A. Coco, J. C. A. Júnior, T. F. Noronha, A. C. Santos, An integer linear programming formulation and heuristics
for the minmax relative regret robust shortest path problem, Journal of Global Optimization 60 (2) (2014) 265–287.
[54] R. Montemanni, L. M. Gambardella, An exact algorithm for the robust shortest path problem with interval data,
Computers & Operations Research 31 (10) (2004) 1667–1680.
[55] K. Sugiyama, S. Tagawa, M. Toda, Methods for visual understanding of hierarchical system structures, IEEE
Transactions on Systems, Man & Cybernetics 11 (2) (1981) 109–125.
[56] J. A. Bondy, U. S. R. Murty, Graph Theory with Applications, Elsevier, New York, 1976.
[57] J. E. Beasley, OR-Library: Distributing test problems by electronic mail, The Journal of the Operational Research
Society 41 (11) (1990) 1069–1072.
[58] M. Fischetti, A. Lodi, Local branching, Mathematical Programming 98 (1-3) (2003) 23–47.
44
| 8cs.DS
|
Requirements-driven Dynamic Adaptation to Mitigate
Runtime Uncertainties for Self-adaptive Systems
Zhuoqun Yang
Academy of Mathematics and Systems Science
Chinese Academy of Sciences
Beijing, China
[email protected]
Abstract: Self-adaptive systems are capable of adjusting their
behavior to cope with the changes in environment and itself. These
changes may cause runtime uncertainty, which refers to the system
state of failing to achieve appropriate reconfigurations. However, it is
often infeasible to exhaustively anticipate all the changes. Thus,
providing dynamic adaptation mechanisms for mitigating runtime
uncertainty becomes a big challenge. This paper suggests solving this
challenge at requirements phase by presenting REDAPT, short for
REquirement-Driven adAPTation. We propose an adaptive goal
model (AGM) by introducing adaptive elements, specify dynamic
properties of AGM by providing logic based grammar, derive
adaptation mechanisms with AGM specifications and achieve
adaptation by monitoring variables, diagnosing requirements
violations, determining reconfigurations and execution. Our approach
is demonstrated with an example from the Intelligent Transportation
System domain and evaluated through a series of simulation
experiments.
Keywords: Self-adaptive systems, requirements modeling, runtime
uncertainty, specification, dynamic adaptation
I. INTRODUCTION
Self-adaptive systems are capable of adjusting their
behavior to cope with the changes in environment and itself.
These changes may cause runtime uncertainty, which refers to
the system state of failing to achieve appropriate
reconfigurations under requirements violation [1]. We divide
the sources of runtime uncertainty into context uncertainty and
components uncertainty. Generally, context uncertainty means
the changes in execution environment, e.g. changes of
bandwidth for a service system or changes of temperature for
an air conditioner, while components uncertainty represents
changes in the system itself, e.g. sensors break for componentsbased systems. For keeping continuous satisfaction of
requirements at runtime, self-adaptive systems need
appropriate adaptation mechanisms. This paper suggests
achieving adaptation mechanisms at requirements phase.
Requirements phase is considered as the first stage during
the life cycle of a system. Definitely different from traditional
requirements engineering (RE), for self-adaptive systems, it is
need to capture not only functional requirements (FR) and nonfunctional requirements (NFR) but also adaptive requirements
(AR), which refer to the requirements that can be hold through
adaptation. Additionally, adaptation mechanisms also should
be taken into consideration at this phase for making clear when
to adapt and how to adapt [2]. Therefore, requirements
Wei Zhang, Haiyan Zhao, Zhi Jin
Institute of Software
School of EECS, Peking University
Beijing, China
{zhangw, zhhy}@sei.pku.edu.cn, [email protected]
engineering for self-adaptive systems should provide two kinds
of support: methods for modeling requirements and adaptation
mechanisms for mitigating runtime uncertainty. Recently, the
RE community made great strides in introducing methods and
techniques for providing the two supports. Wittle et al. [4]
introduced RELAX, a formal requirements specification
language to specify the uncertain requirements of self-adaptive
systems. Cheng et al. extended RELAX with goal modeling to
specify uncertainty in the goal model [5]. Requirements-aware
approaches [11-14] considered requirements as runtime entities
and monitoring as meta-requirements about whether the
requirements hold during runtime. Baresi et al. [16] introduced
adaptive goal into KAOS model and provided adaptation
mechanism by adopting fuzzy membership function. Other
works include monitoring and diagnose [8-10], self-repair [17]
[18] and architecture-based adaptation [20-23].
However, on account of growing complexity of system
structure, inherent volatility of environment and increasing
diversity of seamless interaction between the system and
environment, it becomes infeasible to predict and anticipate all
the runtime changes at requirements phase. Moreover, in more
and more situations, changes cannot be handled off-line, but
require the system to adapt its behavior dynamically without
human intervention. Therefore, providing requirements models
at runtime for resolving unpredictable uncertainty and modeldriven adaptation mechanisms become research urgencies and
challenges [24] [25].
This paper tackles these challenges by seeking answers to
the following questions: how to identify the boundary of
uncertainty sources (Q1); how to provide runtime requirements
model for modeling adaptive requirements and uncertainty
sources in a generic process (Q2); how to represent dynamic
properties of the runtime requirements model (Q3); how to
derive adaptation mechanisms and achieve adaptation (Q4).
To achieve these ends, we endeavor to present REDAPT,
short for REquirements-Driven adAPTation. For answering Q1,
this paper introduces how to exploring problem world for
identifying the boundary of uncertainty sources. To answer Q2,
we propose an adaptive goal model (AGM) by introducing
context uncertainty, components uncertainty, kinds of adaptive
elements and MAPE loop [26] into traditional goal model. For
answering Q3, we provide first-order linear-time temporal logic
based formal grammar for specifying AGM elements so as to
bridge the gap between requirements model and adaptation
mechanisms. To answer Q4, we derive adaptation mechanism
algorithms by integrating AGM with its specifications. The
adaptation can be achieved by monitoring variables, diagnosing
requirements violations, determining reconfigurations and
execution. We demonstrate REDAPT by applying it to a
Highway-Rail Control System (HRCS) from Intelligent
Transportation System domain (ITS) and evaluate it through a
series of simulation experiments. The results illustrate
REDAPT’s ability of modeling requirements as runtime
entities and mitigating runtime uncertainty by parametric
adaptation and structural adaptation.
The rest of the paper is structured as follows. Section II
introduces the motivating example. Section III overviews our
approach. Section IV presents the processes of modeling AGM
and deriving its specifications. Section V provides the
adaptation mechanism algorithm. We illustrate and evaluate the
proposed adaptation mechanism in Section VI. The related
work is discussed in Section VII. Finally, Section VIII
concludes the paper and identifies avenues for future work.
II. MOTIVATING EXAMPLE
AR
Description
AR1
When illuminance is above 20lx, gates open/close time
interval is set to 4s for pass efficiency.
AR2
For safety efficiency, when illuminance is under 20lx, gates’
closing time should be set within (1s, 4s], while opening time
should be set within [4s, 7s) to achieve safety efficiency.
AR3
Dispatch time interval should ensure at least 50% of the
vehicles can pass through the whole highway within 400s.
AR4
Dispatch time interval should ensure the amount of vehicles
on the highway is always under 350 at any time.
AR5
Components can be replaced once failure occurs.
III. APPROACH OVERVIEW
This section provides the framework of REDAPT and the
processes of deriving adaptive goal model, AGM specifications
and achieving adaptation.
A. REDAPT Framework
Figure 1 depicts the REDAPT framework. It is composed
of three basic layers: Problem Layer, Model Layer and
Adaptation Layer. Model Layer models the scenarios from
Problem Layer, while Adaptation Layer achieves the
adaptation mechanisms derived from Model Layer. The three
layers compose a feedback loop that controls the adaptation of
self-adaptive systems at runtime.
PROBLEM LAYER
MODEL LAYER
Shared
System
Environment
System
Evnironmentphenomena
M1
AGM
M2
A1
A2
Monitor
A6
Knowledge
Base
A3
AGM’
Execute
Analyze
A4
A5
A7
Plan
ADAPTATION LAYER
Adaptation Transitions
A1: monitoring context uncertainty
A2: monitoring components uncertainty
A3: provide monitored data
A4: requirements are violated
A5: provide adaptation
A6: execute adaptation on system
A7: trigger evolution when fails planning
M4
Requirements Model
Intelligent transport systems are advanced applications
which, without embodying intelligence as such, aim to provide
innovative services relating to different modes of transport and
traffic management and enable various users to be better
informed and make safer. Highway-rail crossing control is a
fundamental concern [29]. Basic scenarios can be described as:
Rails are built across a highway for trains dispatched from
east and west. At the crossing, gates are built at both sides
of the highway for block the vehicle flow temporarily from
south and north when train is coming.
Train Dispatch End is in charge of determining appropriate
dispatch time interval according to vehicle flow.
Gate Control End is in charge of closing/opening gates on
both side of the highway, when the train is monitored
approaching/leaving the crossing.
However, the environment and system itself are ever
changed. Thus, the changing scenarios can be described as:
When illuminance is above 20lx, the closing/opening time
interval is set to 4s for pass efficiency; otherwise the
closing time interval should be set within (1s, 4s] and
opening time interval should be set within [4s, 7s) for safety
efficiency.
Vehicle flow on highway is changing. For preventing traffic
jam and accident, we add some constraints that the dispatch
time interval should ensure at least 50% of the vehicles can
pass through the whole highway within 400s and the
amount of vehicles on the highway is always under 350.
Sometimes sensors may fail to monitor context variables or
the monitored value may suffer from noises.
The scenarios above imply that the dispatch time interval is
not fixed but varies according to the changed vehicle flow.
Thus, the requirement of determining dispatch time interval
should adapt to vehicle flow changes. We call this kind of
requirement Adaptive Requirements (AR). Adaptive
requirements of HRCS are described in Table I.
TABLE I. ADAPTIVE REQUIREMENTS OF HRCS
M3
AGM
Specification
Model Transitions
M1: capturing system requirements, context
uncertainty and components uncertainty
M2: evolution of AGM when unpredicted
uncertainty occurs
M3: describing dynamic properties of AGM
M4: achieving adaptation mechanism from
AGM specification
Fig. 1. Overview of the REDAPT framework
Problem layer aims at illustrating the relation between the
system and the environment. By analyzing the shared
phenomena and system, we can capture system’s requirements,
context uncertainty and components uncertainty (M1).
Model layer consists of Adaptive Goal Model (AGM) and
AGM Specifications. AGM is the requirements model derived
by extending traditional goal model with some new elements,
e.g. context uncertainty, adaptive goal and adaptive task. We
consider AGM as runtime entity, which can evolve at runtime
(M2). For bridging the gap between AGM and adaptation
mechanisms, dynamic properties of AGM are represented with
AGM specifications (M3). Thus we can achieve adaptation
mechanism algorithms from the specifications (M4).
Adaptation layer presents adaptation mechanisms based on
AGM specification. We adopt the MAPE feedback loop from
autonomic computing [26] for monitoring context uncertainty
(A1) and components uncertainty (A2), diagnosing
requirements violations (A4), deciding resolutions (A5) and
executing the decisions (A6). When the system fails planning,
unpredicted uncertainty should be modeled in AGM (A7).
B. From Model Layer to Adaptation Layer
1) Deriving Adaptive Goal Model and Specifications
Figure 2 presents a generic process of deriving AGM and
its specifications in Model Layer. The input is scenarios and
the output is AGM specifications. Each sub-process connects
with each other by artifacts coming from the former process.
Directed lines depict the order of processes. We give a brief
introduction to these sub-processes next.
P1: Adaptive requirements are elicited from the scenarios
and we can derive the initial requirements model in P1. The
adaptive requirements are described in adaptive tasks.
P2: Context uncertainty and components uncertainty are
identified from the adaptation scenarios.
P3: Attach context uncertainty to the adaptive tasks in
existing requirements model and then switch the adaptive tasks
into adaptive goals.
P4: Refine adaptive goals with MAPE loop. Thus, each
adaptive goal is operationalized through four tasks: Monitor,
Analyze, Plan and Execute.
P5: Attach components uncertainty to the tasks that are
accomplished by components and switch the tasks into
adaptive goals again.
P6: Refine new adaptive goals with MAPE tasks again.
P7: Specify elements of AGM with proposed grammar.
AGM can be derived from P1 to P6. P7 is involved in the
process because it has close relation with AGM. The details of
specifications are elaborated in Section IV.
Adaptation
Scenarios
Problem Layer
P2
Identify relevant sources
of runtime uncertainty
P1
Elicit and model
adaptive requirement
Context
uncertainty
(ConU)
Goal model
with adaptive
tasks (At)
P3
Add context uncertainty to
goal model and switch tasks
into adaptive goals (Ag)
AGM under
context uncertainty
Adaptation Layer
Goal model
with M/A/P/E
tasks
AGM
specifications
Components
uncertainty
(ComU)
P7
Specify elements of
AGM
P5
Add components uncertainty to
MAPE tasks and switch tasks
to adaptive goals (Ag)
AGM and
classification
of violation
AGM under
components unerrtainty
P4
P6
Refine adaptive goal with
MAPE process operating by
related components
Refine adaptive goal
with MAPE process
AGM
specification
grammar
Fig. 2. A generic process of deriving adaptive goal model
Layer
Process
Artifact
C. Process of Achieving Requirements-driven Adaptation
Figure 3 depicts a generic process of achieving adaptation
in Adaptation Layer. The input is AGM specifications and the
output is new configurations.
Monitoring: Monitor algorithms are derived from
specifications of Monitor tasks. The monitored variables are
specified in attributes of monitor tasks. By monitoring, we get
runtime data of both context and components.
Analyzing: Specifications of Analyze tasks describe how to
diagnose requirements violation at runtime. We suggest
adopting quantitative verification into diagnosing process. For
choosing appropriate algorithms, we should match the type of
violation according to the classification derived from both
requirements perspective and uncertainty perspective.
Planning: Planning algorithms should be chosen according
to the type of violation. What should be noticed is that the
planning process is intertwined with analyzing process, because
the modification of parameters or structures is always followed
by iterative verification.
Executing: Realize parametric or structural adaptation
according to the results from planning process.
After adaptation, new configuration is achieved and
runtime uncertainty is mitigated. The achieving details are
provided in Section V.
AGM
Specification
Model Layer
Context/Components
uncertianty
Specification
M task
Specification
Monitoring
Monitor the changes
of variables at runtime
Classification
of violation
A task
Specification
Analyzing
Diagnose violations
and match the
classification of
violation
Runtime
Data
Diagnose
Result
Problem Layer
P task
Specification
Planning
Choose planning
algorithm and achieve
appropriate solutions
Violation
information
E task
Specification
System in new
configurations
Executing
Reconfigure system
parameters and components
Parametric/Structural
adaptation
Layer
Process
Artifact
Fig. 3. A generic process of achieving requirements-driven adaptation
IV. ADAPTIVE GOAL MODEL AND FORMAL SPECIFICATION
REDAPT provides the processes of deriving AGM and its
specifications. First, we should make clear the boundary of
uncertainty and then carry out the processes in Section IV-B.
A. Identifying Uncertainty
1) Capturing Uncertainty
Uncertainty should be identified according to concrete
scenarios. Problem Layer in Section III consists of two
intertwined parts: system and environment. The uncertainty
existing in environment that can be observed by system
belongs to context uncertainty. While, the uncertainty existing
in system itself belongs to components uncertainty. Both
context uncertainty and components uncertainty are
unpredicted at runtime.
In HRCS, context uncertainty consists of:
Illuminance: Outdoor illuminance is a continuous variable
changing over time. 20lx is a boundary of whether driver
can drive safely without auxiliary illumination instruments
g0
decomposition, father goal can be achieved by achieving all the
sub-goals or sub-tasks, while for OR decomposition it can be
achieved by achieving only one of the alternative goals or tasks.
For example, g2 can be achieved by achieving both t1 and t2,
while g4 can be achieved by achieving either t4 or t5. Tasks are
leaves in goal model and can be operated by certain agents.
Tasks can contribute to softgoals through Help-contribution or
Hurt-contribution. For instance, t4 has positive effects on sg1,
while t3 has negative effects on sg1.
g0
g1
g2
g3
t3
g4
t4
t5
Help
Hurt
sg1
Meaning
ei
Value of illuminance gauged by I_sensori
fi
g3gauged by
g4I_camera t1
Value of vehicle flow
i
E
Mean value of illuminance
to tdispatch Hurt
Utility of closing time for passing vehicles, proportional to tclose
Uopen
Appropriateto topen
Utility of opening time for passingAppropriate
vehicles, inversely proportional
tclose and topen
tclose and topen
Utility of illuminance
Ag2: Set
At2: Set
At2: Set
Appropriate
Upass
Utility of safety efficiency P3
at crossing
NFR Violation
tclose and topen
Utility of pass efficiency at crossingConU2:
p
Percentage of vehicles whose driving time is under 300
n
Number of vehicles on highway at
each moment
Appropriate
tclose and topen
P3
NFR Violation
ConU2:
Illuminance
At1: Determine
tdispatch to make
P>50% and N<350
Hurt
sg3: Pass Efficiency
t1: Dispatch
(Upass)
according to
tdispatch
Help
g2: Gates
Control
Help
sg4: Safety Efficiency
t2: Monitor
(Usafety)
Train Location
At2: Set
Appropriate
tclose and topen
Fig. 5. Goal model with adaptive tasks
Figure 6 provides the processes of refining At1. Vehicle
Ag1: Determine
Flow, represented as ConU1,
belongs to context
uncertainty
At1: Determine
tdispatch
to make
Dispatch
tdispatch of
to make
and it affects the achievement
At1. Thus,P>50%
for and
P3,
link
ConU1 g0:Trains
and
N<350
P>50% and N<350
Control Gates
to At1At1:
with
Affect relation, represented as two-arrow directed
Determine
tdispatch to make
P3 label of FR violation.
P3
FR Violation
line, attached
with the
For refiningg1:At1,
Dispatch
FR Violation
g2: G
P>50% and N<350
ConU1:
Train According
Con
switch adaptive task into adaptive
goal Flow
(Ag), ConU1:
i.e. Ag1. For
to P4,
t
ConU1: Vehicle
Vehicle
Flow
Flow
Ag1 is decomposed into fourVehicle
tasks
(M1,
A1,
P1
and
E1),
which
FR Violation
t1: Dispatch
P4
Determine
are adopt from MAPE loop. ComU2:
Thus, the Ag1:
original
adaptation
t2: Mo
according to
t
to make
Train L
ComU1:
ComU2:
Sensor
t
P>50%
and N<350 processes
mechanisms
are
presented
as
M/A/P/E
tasks.
Similar
Noise
Sensor
Sensor
Ag1: Determine
E1:
Failure
ComU1:
NFR
tdispatch to make
can be carried
out forNoise
modeling
At2
(Figure 7).
Refoncigure
M2: Gau
Sensor
Violation
P>50% and N<350
FR
NFR
Illumi
t
Failure
After modeling
all the context
uncertainty,
we take E1:into
Sen
Violation Violation
Ag3: Gauge F
FR
P1: Decide
M1:
Gauge
F
by
Precisely
Refoncigure
Violation
sg1: Precision of the components uncertainty (P5). M1 can be
consideration
t
to hold
Infrared Sensors
P5
tdispatch
Efficiency
A2:
P>50% and N<350
achieved by Infrared
Sensors, which may be affected
by Sensor
U
M1: Gauge F M3: Gauge F by
E3:
A1: Verify R5 Reconfigure
Help
Infrared
Sensors
by
Infrared
P1:
Decide
tmay
dispatch
Failure (ComU1) and Sensor
Noise
(ComU2).
ComU1
A1:
Verify R5 and
and
R6
at
components
and Record Data
Sensors
R6 at
runtime
to hold P>50%
and
P2.1: Ch
result in FR violation, while ComU2
mayruntime
cause
NFR violation.
P6
N<350
P3: Choose
betwee
A3: Detect
Available Sensor
Similar to At1, we switch M1Empty/Noise
into
Ag3
and
refine
it.
Thus
we
Ag3: Gauge F for replacing
Help
Data
Precisely
derive the original
adaptation mechanisms
for achieving
Ag3.
E3:
M3: Gauge F by
P4
dispatch
dispatch
M2: Gauge E by
E3: Reconfigure
B. Deriving Adaptive
Goal Model
Illumination
tclose and topen
Sensors
P3: Choose tclose and
Goal-oriented methods are wildly accepted in RE [27].
topen by Trade-off between
A2: Verify
Goal models are used Uto
model Uand
analyze stakeholder
safety
safety and Upass
objectives. Systems’ FR are represented as hard goals, while
P3.2: Choose topen
P3.1: Choose tclose
NFR are represented as softgoals.
Figure 1 presents
an example
between [4s, 7s)
between (1s, 4s]
of goal model. Goal can be refined through AND/OR
Hurt
Help
Help
decompositions into sub-goals
andHurtsub-tasks.
For
AND
sg3: Pass Efficiency
(Upass)
Help
dispatch
Illuminance
Ag2: Set
F
Viol
P3.2: Choose topen
between [4s, 7s)
Train According
t2
Uclose
Usafty
ComU1:
Sensor
Failure
Control Gates
Time interval of gate opening after detecting train’s leaving
UE
At1: Determine
tdispatch to mak
P>50% and N<3
sg1: Precision
Efficiency
topen
Trade-off between
g0:by
Dispatch
Usafetyand
and Upass
Trains
A2: Verify
P3.1: Choose tclose
g1: Dispatchbetween (1s, 4s]
topen
tdispatch
P>50% and N<350
P3: Choose tclose and
g2
tclose
t
At1: Determine
tdispatch to make
Ag2: Set
At2: Set
Sensors
goal
t4at each highway
t5
Mean value oft3
vehicle flow
entrance
task
softgoal
Time
Help
Hurt
And
Dispatching time interval
Or
sg1
Help/
contribution
Hurt
Time interval of gate close after detecting train’s coming
F
goal
task
softgoal
And
Or
contribution
Appropriate
Figure 5 presents theAppropriate
goal model with
adaptive tasks (At)
tclose and topen
tclose and topen
At2:
Set
derived through P1 in Section IV-B. Adaptive tasks model and
Appropriate
P3
P3
Violation
NFR
Violation
represent
thetopenadaptive
requirements.
In NFR
general,
At1 models
tclose and
ConU2:
ConU2:
AR1 and AR2, while At2
models
AR3
and
AR4.
P2 is the
Illuminance
Illuminance
process of identifying context uncertainty (ConU) and
Ag2: Set
components uncertaintyAppropriate
(ComU), which is accomplished in
t
and topen
close
Section M2:
V-A.
Next,
we
conduct
the processes
from P3 to P6 for
Gauge E by
E3: Reconfigure
both At1 Illumination
and At2. First we take At1 for illustration.
tclose and topen
Usafety
g1
Help/
Hurt
t
Fig. 4. An example of goal model
TABLE II. SYMBOL ASSUMPTIONS OF VARIABLES
Symbol
g1
Tra
t2
t1
P4
or aids. Thus, when illuminance is under 20lx, the system
should adjust it behavior for safety efficiency requirement.
Vehicle flow: Vehicle flow can be viewed as discrete
variable because the monitored results are always integer.
Components uncertainty consists of:
Sensor Failure: Sensors fails to monitor the changes in
context. There is no return value from sensors. Failed
sensors should be replaced by available sensors.
Sensor Noise: Sensors succeed in monitoring variables, but
the monitored value is unstable. Sensor noise can also
tackled by replacement of available sensors.
2) Symbol Assumptions
For the convenience of deriving AGM and specifications,
Table II introduces some symbols to represent variables and
constants in the adaptive scenarios. Utility is used to depict the
satisfaction degree of requirements, varying from 0 to 1. 0
refers to completely dissatisfaction while 1 refers to completely
satisfaction. The value between (0, 1) refers to partial
satisfaction. For instance, Uclose represents the drivers’
satisfaction degree of closing gates when train is coming. The
small tclose is, the small Uclose will be, because drivers want to
pass the crossing as soon as possible. On the contrary, the small
topen is, the large Uopen will be, because drivers don’t want to
wait at the crossing for too long. Utility is used to get better
tradeoff between NFR and mitigate the runtime uncertainty of
NFR. Among the symbols, Uclose is the function of tclose, while
Uopen is the function of topen. Usafety is the function of UE, Uclose
and Uopen, while Upass is the function of Uclose and Uopen. We will
give the concrete function in Section VI.
sg4: Safety Efficiency
(Usafety)
dispatch
dispatch
s
Infrared Sensors
and Record Data
A3: Detect
Empty/Noise
Data
sg1: Precision
Reconfigure
Efficiency
components
P3: Choose
Available Sensor
for replacing
sg2: Pas
(U
dispatch
At1: Determine
t1: Dispatch
according to
tdispatch to make
p>50% and n<350
l
At2: Set
Appropriate
t2: Monitor
Train Location
tdispatch
tclose and topen
ution
TABLE III. CLASSIFICATION OF VIOLATIONS
Ag2: Set
ppropriate
Ag1: Determine
tdispatch to make
p>50% and n<350
p>50% and n<350
At1: Determine
e and topen
At1: Determine
tdispatch to make
P3
tdispatch to make
P3
p>50% and n<350
ConU1:
Vehicle Flow
ConU2:
uminance
Functional
Requirements
FR Violation
FR Violation
R Violation
ConU1:
Vehicle Flow
Non-functional
Requirements
P4
ComU1:
Sensor
Failure
ComU2:
Sensor
Noise
FR
Violation
econfigure
and topen
Ag1: Determine
tdispatch to make
g0
P>50% and N<350
NFR
Violation
M1: Gauge fi by
Infrared Sensors
P5
g1
g2
M1: Gauge fi
by Infrared
Sensors
g3
tdispatch
A1: Verify p>50%
and n<350
at runtime
g4
P1: Decide tdispatch
to hold p>50% and
n<350
t2
t1
elp
t3
goal
task
Ag3: Gauge fi
Precisely
t4
M3: Gauge fi by
Infrared Sensors
Hurt
and Record Data
iency
t5
Help
A3: Detect
Empty/Noise
Data
sg1
E3:
Reconfigure
softgoal
components
And
P3: Choose
sg1: Precision
Available Sensor
Help
Or
Efficiency
for replacing Help/
contribution
Hurt
Fig. 6. Refinement of At1
g0: Dispatch
Trains and
Control Gates
tdispatch
ConU2:
P3
Illuminance
NFR Violation
tclose and topen
t1: Dispatch
according to
ConU2:
Ag2: SetIlluminance
Appropriate
t2: Monitor
Train Location
tdispatch
P1: Decide tdispatch
to hold P>50% and
N<350
A1: Verify P>50%
and N<350
at runtime
ConU2:
Illuminance
P4
Ag2: Set
Appropriate
M2: Gauge E
by Illumination
Sensors
NFR Violation
NFR Violation
tclose and topen
tdispatch
E1:
Refoncigure
tclose and topen
tclose and topen
At2: Set g2: Gates
Appropriate Control P3
g1: Dispatch Train
According to
Ag2: Set
Appropriate
At2: Set
Appropriate
E2: Reconfigure
tclose and topen
tclose and topen
P2: Choose tclose and topen
by Trade-off between Usafety
M2: Gauge E byA2: Verify
Illumination U
safety
Sensors
A2: Verify
Usafety
and U
P2: Choose pass
tclose and
tclose and topen
topen by Trade-off between
P2.2: Choose
P2.1: Choose
Usafety and Upass
topen between
between
[4s, 7s)
(1s, 4s]
tclose
HurtPass Efficiency
sg2:
Hurt
Help
P2.2: Choose topen
Help
between [4s, 7s)
sg3:
Safety Efficiency
Help
Help
(Upass)
(Usafety)
sg3: Pass Efficiency
sg4: Safety Efficiency
(Upass)
(Usafety)
Components Uncertainty
Context uncertainty
caused FR violation
(violation of Ag1)
Context uncertainty
caused NFR violation
(violation of Ag2)
Components uncertainty
caused FR violation
(violation of Ag3)
Components uncertainty
caused NFR violation
(violation of Ag3)
to tdispatch
At1:
Determine
t1: Dispatch
At2: Set
//
ELEMENTS
t2: Monitor
according to
Appropriate
tdispatch to make
Train Location
entity
:=
goal
|
softgoal
|
task
|
uncertainty
p>50% and n<350
tdispatch
tclose and topen
goal := goal-type mode name [attributes] [initialization]
[invariant] [variant] [fulfillment]
softgoal := Softgoal name [attribute] [tradeoff-softgoal]
[invariant] [variant] [fulfillment]
task := task-type name From goal-type
name input output Ag1: Determine
At1: Determine
[attributes] [initialization]
[fulfillment]
tdispatch to make
tdispatch
to make
and
n<350
uncertainty
:= uncertainty-typep>50%
name
[attribute]
[violation] p>50% and n<350
At1: Determine
P3
P3
tdispatch to :=
make
goal-type
Ordinary
Goal | Adaptive Goal
p>50% and n<350
FR Violation
FR Violation
mode := achieve | maintain
ConU1:
ConU1:
tradeoff-softgoal := Tradeoff With
Softgoal name
Vehicle Flow
Vehicle Flow
task-type := Ordinary Task| Monitor | Analyze | Plan | Execute
P4
input := Input name
ComU1:
ComU2:
output
:=
Output
name
Ag1: Determine
Sensor
Sensor
Failure
Noise
uncertainty-type
:=
Context Uncertainty | Components
tdispatch toUncertainty
make
P>50%
and N<350
violationFR:= Affected
violation-type
NFR Adaptive Goal name formula
E1:
Violation
violation-type :=Violation
FR Violation| NFR
Violation
M1:
Gauge fi by
Refoncigure
P5
Infrared Sensors
tdispatch
// ATTRIBUTES
M1: Gauge fi attribute+
attribute := Attribute
A1: Verify p>50%
P1: Decide tdispatch
by Infrared
and n<350
attribute := attribute-type
: name
to hold p>50% and
Sensors
at runtime
n<350
attribute-type := Numeric | Boolean | Class
// INVARIANT, VARIANT, INITIALIZATION, FULFILLMENT
+
initialization := Initialization
initial-property
Ag3: Gauge
fi
Precisely
initial-property := property-type
conditional-type formula
E3:
M3: Gauge fi by
Reconfigure
invariant
:= Invariant invar-property+
Infrared Sensors
components
and Record Data
invar-property
:=A3:
Constraint
formula
Detect
P3: Choose
sg1: Precision
Empty/Noise
Available
Sensor
+
Help
variant := Variant var-property
Efficiency
Data
for replacing
var-property := Possibility formula
fulfillment := Fulfillment fulfill-property+
fulfill-property := property-type conditional-type formula
g0:
Dispatch
condition-type
:= PreCondition | TriggerCondition | PostCondition
P6
P2.1: Choose tclose
Hurt
Hurt
between (1s, 4s]
sg1: Precision Efficiency
E2: Reconfigure
Context Uncertainty
C. Adaptive Goal Model Specificationsl
g0: Dispatch
For representing the dynamic
Trains and properties of AGM and
Control Gates
deriving adaptation mechanisms
later, we provide AGM
specification’s
grammar in Figure 8, inspired by Formal Tropos
g1: Dispatch
g2: Gates
Train According
[27] and KAOS
specifications [28].
Control
P6
e topen
s, 7s)
E1:
Refoncigure
Uncertainty Type
Requirements
Type
Fig. 7. Refinement of At2
After deriving the AGM, we should classify the violations
for the convenience of choosing appropriate adaptation
mechanisms during runtime. According to the Affect relation in
Trains and
Control Gates
Section V-B, we suggest classifying violations into four kinds
Fig. 8. AGM specification grammar
from both uncertainty perspective
ConU1:and requirements perspective.
Vehicle Flow
g2: Gates
g1: Dispatch
Train
Table III presents the classification
of requirements
violations
ConU2:of entities, i.e.
AGM specifications
consist of specifications
Control
According to
Illuminance
of HRCS. Based on the fourFRkinds
of
violation,
we
can
design
Violation
goal, softgoal, task and uncertainty. Attribute presents some
tdispatch
respective adaptation
mechanism algorithms in Section VI.
NFR Violation
ComU2:
properties related to the entity. Attribute-type
can be Numeric,
Sensorof violations, Ag1:
Determine
Among the four kinds
components
uncertainty
t1:
Dispatch
Boolean
or
Class.
Numeric
attributes
depicts
the
variables and
Ag2:
Set
Appropriate
t2:
Monitor
Noise
tdispatch
to make
according to
Train Location
caused violations
can be solved through
structural
adaptation.
tclose to
and tachieving
ComU1:
open
constants
that
are
needed
the
entity.
Boolean
P>50% and N<350
Sensor uncertainty
While context
caused violations can be mitigatingtdispatch attributes always function as the output of verification
NFR
activity.
Failure
E2:
Reconfigure
M2: Gauge E
Violation
E1:
by parametric adaptation.
tduring
by Illumination
close and tachieving
open
Class
attributes
refer
to
other
entities
involved
FR
Refoncigure
Ag3: Gauge F
Sensors
Violation
Precisely
attribute
M3 (Gauge F by
tdispatchthe specified entity. For example,
P2: Choose
tclose andof
topen
M3: Gauge F by
Infrared Sensors
and Record Data
A3: Detect
Empty/Noise
Data
A2: Verify
E3:
Reconfigure
components
P1: Decide tdispatch
to hold P>50% and
N<350
by Trade-off between Usafety
Usafety
and Upass
P2.1: Choose
P3: Choose
Available Sensor
for replacing
A1: Verify P>50%
and N<350
at runtime
tclose
between
(1s, 4s]
Hurt
Hurt
P2.2: Choose
topen between
[4s, 7s)
Help
Infrared Sensors) contains numeric attribute F (Vehicle Flow)
and Class attribute I_sensor (Infrared Sensor). Attribute of A1
contains a Boolean to record the result of verifying R3 and R4.
Besides, father goals’ attributes contain sub-goals’ attributes
and sub-tasks’ attributes.
For goal, softgoal and task, initialization and fulfillment
refer to the activating process and the terminating process of an
entity respectively. Condition-type consists of PreCondition,
TriggerCondition and PostCondition. PreCondition means the
condition before initialization or fulfillment; TriggerCondition
means the trigger condition; PostCondition means the result
after initialization or fulfillment. It is known that father entities
can be satisfied by achieving child entities. That is to say, child
entities’ initialization conditions are always triggered by the
activation of their father entities, while father entities’
fulfillment conditions are always triggered by fulfillment of
their child entities. For instance, Ag1’s initialization is triggered
by activation of g1, while its fulfillment is triggered by
fulfillment of M1, A1, P1 and E1.
Invariant refers to the constraints that the entities should
hold all the time, while variant refers to the possibilities that
may occur. For example, R3 and R4 are constraints to Ag1,
while the priority of sg2 and sg3 is changeable. Violation is
unique in uncertainty, describing the affected adaptive goals
and violation types.
The formulas in the grammar are specified by first-order
linear-time temporal logic. The syntax is given by:
t :: x | c | f(t1 ,..., tn )
:: t | P(t1 ,..., tn ) |
| | | |
X | F | G | U
x | x
A term t is a variable x, a constant c, or a function f of a
number of terms. A formula Φ is either a term, a predicate of a
number of terms, a Boolean operation, a timed operation or a
quantifiers operation. XΦ refers to Φ should hold in the next
state reached by the system. FΦ refers to Φ should eventually
hold in some future state. GΦ refers to Φ should hold in all state
of the system. Φ1 U Φ2 refers to Φ1 should hold until Φ2 holds.
The grammar provides a template for representing dynamic
properties of model entities. Several examples are provided.
Context Uncertainty Vehicle Flow
Attribute
Numeric f i, F
Class I_sensor
Affected Adaptive Goal Determine tdispatch to make p>50% and n<350
F ( p (tdispatch , F ) 50% n(tdispatch , F ) 350)
FR Violation
Components Uncertainty Sensor Failure
Attribute
Numeric f i
Class I_sensor
Affected Adaptive Goal Gauge f i Precisely
I _ sensori I _ sensori .value '' ''
FR Violation
Fig. 9. Specification of ConU1 and ComU1
Adaptive Goal Achieve Determine tdispatch to make p>50% and n<350
Attribute
Numeric tdispatch , f i, F, p, n
Class I_sensor
Initialization PreCondition
Fulfill ( Dispatch Train According to tdispatch )
Initialization TriggerCondition
Activate( Dispatch Train According to tdispatch )
Initialization PostCondition
tdispatch " "
Invariant
G ( p 50%0 n 350)
Fulfillment PreCondition
tdispatch F ( p(tdispatch , F ) 50% n(tdispatch , F ) 350)
Fulfillment TriggerCondition
new
new
new
tdispatch
( p (tdispatch
, F ) 50% n(tdispatch
, F ) 350)
Fulfillment PostCondition
new
tdispatch tdispatch
Fig. 10. Specification of Ag1
Softgoal Maintain Safety Efficiency
Attribute
Numeric tclose, topen, E, Usafety, Upass
Tradeoff With Softgoal Pass Efficiency
Invariant Constraint
{tclose , topen , E} G(U safety (tclose , topen , E) 0)
Variant Possibility
t (Prior( safety efficiency, pass efficiency , t )
Prior( pass efficiency, safety efficiency , t )
equalPrior(pass efficiency, safety efficiency , t ))
Fulfillment PreCondition
desired
{tclose , topen } U safety (tclose , topen , E) U safety
Fulfillment TriggerCondition
new
new
new
new
desired
{tclose
, topen
} (U safety (tclose
, topen
, E) U safety
)
MAX _ Tradeoff (U safety , U pass )
Fulfillment PostCondition
new
new
tclose tclose
topen topen
Fig. 11. Specification of sg2
Monitor Gauge fi by Infrared Sensors
From Adaptive Goal Determine tdispatch to make p>50% and n<350
Attribute
Numeric f i
Class I_sensor
Input None
Output f 1…f 10
Initialization PreCondition
Fulfill ( Determine tdispatch to make p 50% and n 350)
Initialization TriggerCondition
activate( Determine tdispatch to make p 50% and n 350)
Initialization PostCondition
I _ sensor1 ,...I _ sensor10 I _ sensori .select TRUE
Fulfillment PreCondition
I _ sensori , i {1,...,10} I _ sensori .value " "
Fulfillment TriggerCondition
I _ sensori , i {1,...,10} I _ sensori .gauge TURE
Fulfillment PostCondition
I _ sensori .value guagedValue output ( I _ sensori .value)
Fig. 12. Specification of M1
Analyze Verify p>50% and n<350 at runtime
From Adaptive Goal Determine tdispatch to
make p>50% and n<350
Attribute
Numeric f i, F, tdispatch, p, n
Boolean sat
Input f 1…f 10, tdispatch
Output sat
Initialization PreCondition
Fulfill ( Determine tdispatch to make p 50% and n 350)
Initialization TriggerCondition
I _ sensori .value " "
Initialization PostCondition
input output ( I _ sensori .value)
Fulfillment PreCondition
sat " "
Fulfillment TriggerCondition
Verification( p (tdispatch , F ) 50% n(tdispatch , F ) 350)
Fulfillment PostCondition
sat Return value of Verification output (sat )
Fig. 13. Specification of A1
Plan Decide tdispatch to hold p>50% and n<350
From Adaptive Goal Determine tdispatch to
make p>50% and n<350
Attribute
new
Numeric F, tdispatch, tdispatch
Boolean sat
Input sat, F, tdispatch
new
Output tdispatch
Initialization PreCondition
Fulfill ( Determine tdispatch to make p 50% and n 350)
Initialization TriggerCondition
input 0
Initialization
PostCondition
new
tdispatch " "
Fulfillment PreCondition
sat " "
Fulfillment TriggerCondition
while( sat 1)
new
{tdispatch
tdispatch 1;
new
new
Verification( p (tdispatch
, F ) 50% n(tdispatch
, F ) 350)
new
tdispatch tdispatch
}
return tdispatch
Fulfillment PostCondition
new
new
tdispatch
tdispatch output (tdispatch
)
Fig. 14. Specification of P1
V. REQUIREMENTS-DRIVEN ADAPTATION MECHANISM
This section presents how to get adaptation mechanisms
from AGM specifications. Adaptation mechanisms are
composed of four parts: monitoring, analyzing, planning and
executing, which are also known as adaptive tasks. We give the
generic algorithm based on the classification of violations in
Section IV-B.
Monitoring algorithm should provide the ability of
monitoring context uncertainty and components uncertainty.
The variables and sensors are specified in specifications
(Figure 12).
Algorithm 1 Monitor Context and Components Uncertainty
monitorUncertainty (AGM specifications){
for each Monitor task M{
select M.Specification.Attribute.Numeric.variables
as monitored variables
select M.Specification.Attribute.Class.instance as monitor
gauge values V
return V
}}
Analyzing algorithm is used for diagnosing whether the FR
or NFR are violated. The inputs of analyzing algorithm are
specifications of Analyze task (figure 13) and the returned
value of variables from monitoring algorithm.
Algorithm 2 Diagnose Requirements Violations
diagnoseViolations (AGM specifications, monitored value){
for each Analyze task A{
violationType VT
if A.InitializationPostCondition=TRUE
Match violation type
if (father Ag is affected by context uncertainty and Ag is
related to FR)
{ computing and verifying Ag.Invariant
if (Ag.Invariant=FALSE) VT=ConU_FR
else VT=None
return VT}
end if
if (father Ag is affected by context uncertainty and Ag is to
with sg)
{ computing sg.Attribute.Numeric.Utility
if(Utility<desired value) VT=ConU_NFR
else VT=None
return VT}
end if
if (father Ag is affected by components uncertainty and Ag
is to related with FR)
{ if (monitored value=” ”) VT=ComU_FR
else VT=None
return VT}
end if
if (father Ag is affected by components uncertainty and Ag
is related to NFR)
{ if (detect noise=TURE) VT=ComU_NFR
else VT=None
return VT }
end if
end if
}}
Planning algorithm is designed for determining how to
reconfigure the system for mitigating these violations. The
inputs are specifications of Plan task (Figure 14) and the
violation type.
Algorithm 3 Determine reconfiguration
decisionMaking (AGM specifications, violation_type){
for each Plan task P{
if P.InitializationPostCondition=TRUE
Match violation type
if (violation_type = None) return currentconfiguration
if (violation_type = ConU_FR or ConU_NFR)
{while (violation_type≠None)
do {adjust P.Attribte.Numeric.parameterValue
diagnoseViolations }
end do
return new parameterValue }
end if
if (violation_type = ComU_FR or ComU_NFR)
{while (violation_type≠None)
do { replace failed components with
M.Specification.Attribute.Class.instance
diagnoseViolations }
end do
return new structureconfiguration }
end if
end if
}}
Executing algorithm is built for carrying out the
reconfigurations derived in planning algorithm. The
reconfiguration can either be parametric or structural.
Algorithm 4 Execute Reconfiguration
executeDecision (AGM specifications, reconfiguration){
for each Execute task E{
if E.InitializationPostCondition=TRUE
if (reconfiguration= new parameterValue)
P.Attribte.Numeric.parameterValue=
new parameterValue
end if
if ( reconfiguration= new structureconfiguration)
M.Specification.Attribute.Class.instance=
new structureconfiguration
end if
end if
}}
Thus, we derive the generic adaptation mechanism
algorithms according to AGM specifications. In next Section,
we conduct two simulation experiments to demonstrate the
adaptation mechanism algorithms’ ability.
VI. EXPERIMENTAL EVALUATION
To evaluate the effectiveness of our approach, we conduct
two experiments based on the scenarios of HRCS on a
computer with Intel Core 3110M CPU and 2G memory. HRCS
is modeled by using AnyLogic. Road Traffic Library and
Railway Library are used for runtime simulation. The first
experiment focuses on mitigating violation of R2. We present
how to trade-off between softgoal sg2 and sg3 by parametric
adaptation. In the second experiment, we illustrate how to
reconfigure the system for mitigating violation of functional
requirements R3 and R4.
A. Mitigating Violation of Non-functional Requirements
For diagnosing violation of R2, we suggest leveraging
utility-based quantitative verification. Utility can be used to
represent the satisfaction degree of NFR, just as what we state
in Section IV-A. First, we give the function relation of these
utility and variables.
E 20
1
UE
0
E 20
UE 0
4
topen
[4, 7) U E 0
(1)
Uopen
UE 0
4
tclose
(1, 4] U E 0
Uclose
7 topen
3
tclose 1
3
1
Usafety =U E + (1-sgnU E ) Uopen +Uclose -2
2
Uopen +Uclose
U pass
2
(2)
(3)
(4)
(5)
Equation 1 depicts utility function of illuminance is 0-1
function. We assume the optimal close/open time interval are
both 4s when E>20. When E<20, the time interval can be
adjusted according to Eq. 2 and Eq. 3. In Eq. 4, sgnU E is the
symbolic function of UE. When E>20, Usafety equals to UE. That
is to say under better illumination, Usafety is not affected by tclose
and topen. When UE decreases to 0, Usafety can be tuned by
adjusting tclose and topen. Upass means that the more time vehicles
can have to pass the crossing, the larger value it will be.
Integrate Eq. 4 and Eq. 5, we can derive
U wait U safety 1
MRSU safetyU wait
U pass
U safety
(6)
1
(7)
MRS refers to marginal rate of substitution. Equation 7
implies that time resource distributed into safety efficiency and
pass efficiency result in Pareto Optimality. That means our
assumption is reasonable. Under Pareto Optimality, we can
better trade-off between the two “commodities”. When E<20,
we assume the desired Usafety is above 0.7. The dynamic
adaptation process is shown in Figure 15.
X-axis refers to time. Illuminance is monitored under 20lx
and Usafety is diagnosed to be 0 at 9, 13 and 18 time point.
System first tries to tune tclose and topen once violation occurs.
However, with iterative verification, R4 is still dissatisfied.
Then system tune tclose and topen for the second time at 10, 14
and 19 time point. We can see Usafety of the former two cases
are above 0.7, which means R2 hold at 10 and 14 time point.
Thus the adaptation is achieved. For the third case, further
tuning is needed.
Utility
1
0.9
0.8
0.7
0.6
0.5
0.4
0.3
0.2
0.1
0
(a)
0
2
4
6
illuminance
8
close
10
open
12
Time
14
16
18
safety efficiency
20
22
24
pass efficiency
Fig. 15. Adaptation of NFR violation
B. Mitigating Violation of Functional Requirements
This experiment mainly presents the adaptation of R4 and
R5. We design two comparison experiments. The context
uncertainty is simulated through changes of vehicle flow.
(b)
Fig. 16. Histogram of driving time (a) and vehicle amount curve (b) in
experiment 1 when tdispatch=5s and R3, R4 hold
TABLE IV. CONFIGURATION OF PARAMETERS
Comparison
Experiment
1
2
Configuration of Parameters
Vehicle Flow
Vehicle Flow
tclose
from North
from South
15Vehicles/m
18 Vehicles/m
4s
20 Vehicles/m
18Vehicle/m
4s
topen
4s
4s
(a)
In experiment 1, tdispatch is set to 5min. The x-axis of Figure
16(a) refers to driving time, while y-axis refers to the
percentage of vehicles. The x-axis of Figure 16(b) refers to
virtual time, while y-axis refers to the number of vehicles on
highway. In Figure 16(a), the yellow histogram refers to the
vehicles from south to north, while the blue histogram refers to
those from north to south. The green vertical line refers to the
mean of driving time from south to north while the red vertical
line refers to the mean of driving time from the other direction.
Based on the statistical result of 165118 samples, we can
calculate pblue=66.84% and pyellow=80.04%, so R3 hold. Besides,
the cureve in Figure 16(b) depicts R4 holds.
In experiment 2, the vehicle flow at both sides of highway
is monitored increasing by Infrared sensors, while tdispatch is also
5min. We can derive the result in the same way. In Figure 17,
pblue=38.77%, pyellow=48.51% and n>350. Thus, both R3 and R4
are diagnosed violated.
According to the adaptation mechanism algorithm, we
should tune the parameter tdispatch at runtime by increasing its
new
value. Do tdispatch
tdispatch 1 6s and verify R3 and R4
(b)
Fig. 17. Histogram of driving time (a) and vehicle amount curve (b) in
experiment 2 when tdispatch=5s and R3, R4 are violated
(a)
again. The result is presented in Figure 18 with pblue=90.57%,
pyellow=87.45% and n<350. Thus, R3 and R4 hold again and
adaptation is accomplished.
(b)
Fig. 18. The result after parametric adaptation
VII. RELATED WORK
Over the past decade, researches and practitioners have
developed a variety of methodologies, frameworks, and
technologies intended to support building adaptation.
Requirements model. Wittle et al. [4] introduced RELAX,
a formal requirements specification language that leverage
Fuzzy Branching Temporal Logic to specify the uncertain
requirements of self-adaptive systems. Our specification work
differs from theirs in that they just specify the static properties
of requirement, e.g. involved environment and relations with
other entities. However, AGM specification can describe the
dynamic properties of requirements, e.g. the initialization and
fulfillment of goals or tasks, input and output of tasks, the
variant of goals. In a subsequent work [5], Cheng et al.
extended RELAX with goal modeling to specify uncertainty in
the goals, while our AGM can not only describes uncertainty,
but also describes how to mitigate uncertainty by refining
adaptive goal with MAPE loop. There are some other works on
addressing uncertainty. Goldsby and Cheng [6] presented
behavior models to deal with uncertainty in environment
through processes in model-driven engineering. Our REDAPT
is also a model-driven method, but we focus both on
environment and system itself. To managing requirements time
uncertainty, Salay et al. [7] proposed partial models to
represent uncertainty in requirement and illustrate uncertainty
reduction by reason through the traceability relations.
Monitoring and Diagnosing. Requirement monitoring
aims to track systems’ runtime behavior for detecting
requirements violations. Diagnosing always comes along with
monitoring. Fickas and Feather proposed goal-oriented
methods for runtime requirements monitoring [8] and
mechanisms for repairing deviations caused by unsatisfied
domain assumptions [9]. However, our work also focuses on
how to monitor the deviation of system itself. Besides,
REDAPT gives an answer to the question about how to provide
monitoring specifications [8] [10]. Another representative work
on monitoring is requirements awareness. Requirements-aware
approaches [11-14] considered requirements as runtime entities
and monitoring as meta-requirements about whether the
requirements hold during runtime. Our work not only treats
requirements as runtime entities, but also treat requirements
model as runtime entities, i.e. requirements models at runtime.
Besides, Ramirez and Cheng [15] proposed to use utility
changes to depict requirements violation, while we just
leverage utility for represent satisfaction degree of NFR.
Achieving adaptation. Notable work of Baresi et al. [16]
introduced adaptive goal into KAOS model and provided
adaptation mechanism by adopting fuzzy membership function.
Our work differs from theirs in that adaptive goals in FLAGS
refers to the goals that can be fuzzy or modified, while adaptive
goals in REDAPT represent the adaptation needs of both NR
and NFR. In addition, adaptive goals in FLAGS couldn’t adjust
themselves online, because it has no online adaptation
mechanisms. On the contrary, REDAPT provides plenty and
generic adaptation mechanisms for supporting adjustment at
runtime. Wang et al. [17] [18] presented goal-oriented methods
for diagnosing and repairing requirements violations by
selecting the optimal structural configuration that contributes
most positively to system’s NFR. Our work not only focuses on
structural adaptation but also parametric adaptation. Esfahani et
al. [19] provided POISED for tackling the challenge posed by
internal uncertainty by introducing possibility theory to
quantify uncertainty. While REDAPT introduces utility
functions to quantify satisfaction of NFR.
Architecture-based methods. Researches also endeavor to
develop architectural methods and techniques. Cheng and
Garlan [20] described three specific sources of uncertainty and
address the way of mitigating them in Rainbow framework [21].
In notable work of Oreizy et al. [22], A broad framework for
studying and describing evolution is introduced by addressing
several issues on architectural, that serves to unify the wide
range of work in the field of dynamic software adaptation.
Vogel and Giese [23] proposed a model-driven approach to
provide multiple architectural runtime models at different
levels of abstraction as a basis for adaptation.
VIII. CONCLUSION
This paper presents REDAPT, short for RequirementsDriven adaptation, a new method of mitigating runtime
uncertainty for self-adaptive systems. The contributions of
REDAPT are as follows. First, by developing adaptive goal
model (AGM), the approach provides generically
comprehensive processes for reflecting Problem Layer into
Model Layer through modeling adaptive goals, context
uncertainty, components uncertainty and refining adaptive
goals with MAPE loops. Second, by specifying elements of
AGM, REDAPT presents the dynamic properties of AGM that
bridge the gap between Model Layer and Adaptation Layer.
Third, by proposing adaptation algorithm, we can achieve
dynamic adaptation for mitigating runtime uncertainty through
monitoring, analyzing, planning and executing. Thus, the
adaptation problem returns to Problem Layer again. The three
layers compose a feedback loop that controls the adaptation of
self-adaptive systems.
In our future work, we will concentrate on investigating
appropriate behavior models at runtime for representing selfadaptive systems and transitions from our AGM to behavior
model. In parallel, we will also intend to provide novel
adaptation mechanisms, especially runtime verification and
decision making.
REFERENCES
[1] A. J. Ramirez, A. C. Jensen, and B. H. C. Cheng, "A taxonomy
of uncertainty for dynamically adaptive systems," in
Proceedings of the 7th ICSE Workshop on Software
Engineering for Adaptive and Self-Managing Systems
(SEAMS’12), East Lansing, MI, USA, 2012, pp. 99-108.
[2] B. H. Cheng, R. Lemos, H. Giese, P. Inverardi, J. Magee, J.
Andersson, et al., "Software Engineering for Self-Adaptive
Systems: A Research Roadmap," Software Engineering for SelfAdaptive Systems, vol. 5525, pp. 1-26, 2009.
[3] Y. Brun, G. M. Serugendo, C. Gacek, H. Giese, H. Kienle, M.
Litoiu, H. Müller, M. Pezzè and M. Shaw "Engineering SelfAdaptive Systems through Feedback Loops," in Software
Engineering for Self-Adaptive Systems, 2009, pp. 48-70.
[4] J. Whittle, P. Sawyer, N. Bencomo, B. H. C. Cheng, and J. M.
Bruel, "RELAX: Incorporating Uncertainty into the
Specification of Self-Adaptive Systems," in Proceedings of the
17th IEEE International Conference on Requirements
Engineering (RE’09), Lancaster, UK, 2009, pp. 79-88.
[5] B. H. Cheng, P. Sawyer, N. Bencomo, and J. Whittle, "A GoalBased Modeling Approach to Develop Requirements of an
Adaptive System with Environmental Uncertainty," in
Proceedings of the 12th International Conference on Model
Driven Engineering Languages and Systems (MODELS’09),
Denver, CO, 2009, pp. 468 - 483 .
[6] H. J. Goldsby and B. H. Cheng, "Automatically Generating
Behavioral Models of Adaptive Systems to Address
Uncertainty," in Proceedings of the 11th International
Conference on Model Driven Engineering Languages and
Systems (MODELS’08), Toulouse, France, 2008, pp. 568-583.
[7] R. Salay, M. Chechik, and J. Horkoff, "Managing requirements
uncertainty with partial models," in Proceedings of the 20th
IEEE International Conference on Requirements Engineering
(RE’12), 2012, pp. 1-10.
[8] S. Fickas and M. S. Feather, "Requirements monitoring in
dynamic environments," in Proceedings of the 2nd IEEE
International Symposium on Requirements Engineering (RE’95),
Eugene, OR, USA, 1995, pp. 140-147.
[9] M. S. Feather, S. Fickas, A. van Lamsweerde, and C. Ponsard,
"Reconciling system requirements and runtime behavior," in
Proceedings of the 9th International Workshop on Software
Specification and Design, 1998, pp. 50-59.
[10] K. Welsh and P. Sawyer, "When to Adapt? Identification of
Problem Domains for Adaptive Systems," in Proceedings of the
14th international conference on Requirements Engineering:
Foundation for Software Quality (REFSQ’08), Montpellier,
France, 2008, pp. 198-203.
[11] N. Bencomo, J. Whittle, P. Sawyer, A. Finkelstein, and E. Letier,
"Requirements reflection: requirements as runtime entities," in
Proceedings of 32nd ACM/IEEE International Conference on
Software Engineering (ICSE), Lancaster, UK, 2010, pp. 199-202.
[12] P. Sawyer, N. Bencomo, J. Whittle, E. Letier, and A. Finkelstein,
"Requirements-Aware Systems: A Research Agenda for RE for
Self-adaptive Systems," in Proceedings of 18th IEEE
International Conference on Requirements Engineering (RE’10),
Lancaster, UK, 2010, pp. 95-103.
[13] K. Welsh, P. Sawyer, and N. Bencomo, "Towards requirements
aware systems: Run-time resolution of design-time
assumptions," in Proceedings of the 26th IEEE/ACM
International Conference on Automated Software Engineering
(ASE’11), Lawrence, KS, USA, 2011, pp. 560-563.
[14] V. E. S. Souza, A. Lapouchnian, W. N. Robinson, and J.
Mylopoulos, "Awareness Requirements for Adaptive Systems,"
in Proceedings of the 6th International Symposium on Software
Engineering for Adaptive and Self-Managing Systems
(SEAMS’11), Waikiki, Honolulu, HI, USA, 2011, pp. 60-69.
[15] A. J. Ramirez and B. H. C. Cheng, "Automatic derivation of
utility functions for monitoring software requirements," in
Proceedings of the 14th international conference on Model
[16]
[17]
[18]
[19]
[20]
[21]
[22]
[23]
[24]
[25]
[26]
[27]
[28]
[29]
driven engineering languages and systems (MODELS’11),
Wellington, New Zealand, 2011, pp. 501-516.
L. Baresi, L. Pasquale, and P. Spoletini, "Fuzzy Goals for
Requirements-Driven Adaptation," in Proceedings of the 18th
IEEE International Conference on Requirements Engineering
(RE’10), Milan, Italy, 2010, pp. 125-134.
Y. Wang, S. A. Mcilraith, Y. Yu, and J. Mylopoulos,
"Monitoring and diagnosing software requirements," Automated
Software Engineering, vol. 16, pp. 3-35, March 2009.
W. Yiqiao and J. Mylopoulos, "Self-Repair through
Reconfiguration: A Requirements Engineering Approach," in
Proceedings of the 24th IEEE/ACM International Conference on
Automated Software Engineering (ASE’09), Washington, DC,
USA, 2009, pp. 257-268.
N. Esfahani, E. Kouroshfar, and S. Malek, "Taming uncertainty
in self-adaptive software," in Proceedings of the 19th ACM
SIGSOFT symposium and the 13th European conference on
Foundations of software engineering (ESEC/FSE’11), Szeged,
Hungary, 2011, pp. 234-244.
S.W. Cheng and D. Garlan, "Handling Uncertainty in
Autonomic Systems," In Proceedings of International Workshop
on Living with Uncertainties (IWLU'07), co-located with the
22nd International Conference on Automated Software
Engineering (ASE'07), Atlanta, Georgia, USA, 2007.
D. Garlan, S.W. Cheng, A.C. Huang, B. Schmerl, and P.
Steenkiste, "Rainbow: Architecture-Based Self-Adaptation with
Reusable Infrastructure," Computer, vol. 37, pp. 46-54, October
2004.
P. Oreizy, N. Medvidovic, and R. N. Taylor, "Runtime software
adaptation: framework, approaches, and styles," in Proceedings
of the 29th International Conference on Software engineering
(ICSE’08), Leipzig, Germany, 2008, pp. 899-909
T. Vogel and H. Giese, "Adaptation and abstract runtime
models," in Proceedings of the 5th ICSE Workshop on Software
Engineering for Adaptive and Self-Managing Systems
(SEAMS’10), Cape Town, South Africa, 2010, pp. 39-48.
G. Blair, N. Bencomo, and R. B. France, "Models@ run.time,"
Computer, vol. 42, pp. 22-26, 2009.
L. Baresi and C. Ghezzi, "The disappearing boundary between
development-time and run-time," in Proceedings of the
FSE/SDP workshop on Future of software engineering research,
Santa Fe, New Mexico, USA, 2010, pp. 17-22.
J. O. Kephart and D. M. Chess, "The Vision of Autonomic
Computing," Computer, vol. 36, pp. 41-50, January 2003.
A. Fuxman, L. Liu, J. Mylopoulos, M. Pistore, M. Roveri, and P.
Traverso, "Specifying and analyzing early requirements in
Tropos," Requir. Eng., vol. 9, pp. 132-150, May 2004.
A. Dardenne, A. v. Lamsweerde, and S. Fickas, "Goal-directed
requirements acquisition," Sci. Comput. Program., vol. 20, pp.
3-50, April 1993.
C.A. Bell, K.M. Hunter, “Low Volume Highway-rail Grade
Crossing Treatments for the Oregon High Speed Rail Corridor”,
technical report, Transportation Research Institute, Oregon State
University, 1997.
| 3cs.SY
|
Analysing the Degree of Meshing in Medium Voltage Target Grids - An Automated
Technical and Economical Impact Assessment
Leon Thurnera,d , Alexander Scheidlerb,d , Alexander Probstc , Martin Brauna,b
b Fraunhofer
a University of Kassel, Germany
Institute for Wind Energy and Energy System Technology, Kassel, Germany
c Netze BW GmbH, Stuttgart, Germany
d contributed equally
arXiv:1802.01492v1 [cs.CE] 5 Feb 2018
Abstract
There are different medium voltage (MV) grid concepts with regard to mode of operation and protection system layout.
The increasing installation of distributed generation (DG) raises the question if the currently used concepts are still
optimal for future power systems. We present a methodology that allows the automated calculation and comparison of
target grids within different concepts. Specifically, we consider radial grids, closed ring grids and grids with switching
stations. A target grid structure is optimized for each of those grid concepts based on geographical information. To
model a realistic planning process, compliance with technical constraints for normal operation, contingency behaviour
and reliability figures are ensured in all grid concepts. We present a multiphase approach to solve the optimization
problem based on an iterated local search meta-heuristic. We then economically compare the grids with regards to
investment and operational cost for primary and secondary equipment, to analyse which concept leads to the most
overall cost-efficient target grids. Since the methodology allows an automated evaluation of a large number of grids,
it can be used to draw general conclusions about the cost-efficiency of specific concepts. The methodology is applied
to 44 real MV grids spanning about 4800 km of lines, for which the results show that a radial grid structure is overall
cost effective compared to grid topologies with switching stations or closed rings even in grid areas with a large DG
penetration. The contribution of this paper is threefold: first, a comprehensive methodology to compile automated target
grid plans under realistic premises is presented. Second, the practical applicability of the approach is demonstrated by
its application in a large scale case study with a high degree of automation. And third, the results of the case study
allow to draw conclusions about the techno-economical differences of different MV grid concepts.
Keywords: grid planning, distribution systems, expansion planning, reliability, meshing, switching stations, single
contingency policy, radial grid, mode of operation, distributed generation, optimal planning
1. Introduction
The increasing installation of distributed generation
(DG) in electric distribution systems leads to a gradual
transformation from a centralized to a decentralized power
generation. This paradigm shift presents a significant challenge for distribution system operators (DSO), especially
in medium voltage (MV) and low voltage (LV) grids. For
example, the German DSO Netze BW GmbH expects necessary investment costs between 1.5 and 1.9 billion Euros
to integrate additional DG units between the years 2012
and 2030 [1].
1.1. DG Integration and Increased Degree of Meshing
Several improvements in grid operation have been considered to reduce grid integration costs, such as controllable MV/LV substations, innovative HV/MV transformer
control or intelligent curtailment of DG feed-in [1]. It has
also been suggested that an increased degree of meshing
in the MV grid can facilitate the integration of DG by
improving the operational behaviour of the grid [2, 3, 4],
which could decrease the need for additional grid extension. But closed ring systems also require a more sophisticated protection system layout than open ring systems
[5, 6], which leads to additional costs. So while meshing
can be a technical solution for DG integration, the question arises if it is also economically feasible. It is therefore
necessary to study not only the qualitative effect of additional integration of DG by closed ring structures, but
to quantify the benefits in terms of saved grid extension
and compare them to the additional costs for a more sophisticated protection system layout. Because of the high
diversity of distribution grids, it is difficult to draw substantiated conclusions from exemplary case studies. For
statistically relevant results, a grid study has to be based
on the evaluation of a large number of grids. This can only
be achieved with a high degree of automation [7].
Preprint submitted to International Journal of Electrical Power & Energy Systems
February 6, 2018
1.2. Automated Comparison of Grid Concepts
In this paper we introduce a methodology that allows
the automated comparison of different grid concepts for
future power systems. We consider the current grid structure as well as the expected changes in future power systems, such as increasing installation of DG and increasing
share of underground cables. We then derive three different possible future grid structures following the three
different grid concepts: radial grid without switching station, radial grid with switching station and closed ring
grid. To ensure that all grids have equivalent technical
capabilities, all grids have to comply with the same technical constraints. These include constraints on voltage and
line loading in normal operation and in contingency operation as well constraints that limit the outage times in the
grid. The different grid plans are then compared with regard to their cost for primary and secondary equipment.
This methodology is applied to 44 real MV grid areas that
span about 4800 km of lines to reach a sound conclusion
about the technical and economic feasibility of each grid
concept. The presented approach takes the existing grid
infrastructure as well as a prognosis for the future development of the grid into account. The results allow to draw
conclusions about strategic decisions in grid planning and
adaptation of planning principles.
Figure 1: Basic structural MV grid elements: a. open ring, b. closed
ring, c. switching station ring.
Radial grid. A radial grid is built exclusively out of open
ring structures as shown in Figure 1 a. The radial structure ensures that short-circuit currents are always unidirectional, which makes fault detection and location easier than in grid structures with closed rings. We therefore consider a simple protection system layout with overcurrent protection systems at HV/MV substations (primary substations) for fault cut-off and non-directed shortcircuit indicators at the MV/LV substations (secondary
substations) for fault location in this concept.
Closed Ring grid. A closed ring grid has the same structure as a radial grid, only that some of the rings are operated as closed rings as shown in Figure 1 b. Since this
allows bi-directional short-circuit currents, the protection
system needs to be more sophisticated than in the open
ring case. We therefore assume an impedance protection
system in the primary substations and directional shortcircuit indicators in the secondary substations.
1.3. Overview
Switching Station grid. The switching station concept is a
radial grid concept with additional MV substations placed
in load or generation centres to stabilize the grid. Switching stations are MV substations with over-current protection devices that allow parallel operation of cables (see
Figure 1 c.). Apart from the additional protection system
in the MV substations, the protection system layout is
the same as in a radial grid. Using switching stations can
be seen as a way to allow closed rings in the grid without
changing the overall protection system layout by installing
additional circuit breakers in the MV grid.
The paper is organized as follows: Section 2 defines the
three grid concepts that are considered in this study and
Section 3 gives an overview of the overall methodology that
is used to replace switching stations. Section 4 introduces
the grid data used in the case study and the scenario for
future power systems which is applied. Section 5 describes
the optimization problem and its solution with heuristic
random search algorithms in general. Section 6 outlines
the specific multi-phase target grid optimization approach
in detail. Finally, the results of applying the methodology
to all grids are presented and interpreted in Section 7.
Section 8 gives a summary and an outlook of how the
presented methodology can be used in future studies.
3. Methodology for Replacing Switching Stations
We use the existing switching stations as starting point
for the analysis and optimize the respective area for the
three concepts. We assume that the switching station will
have to be renewed within the planning horizon, so that a
replacement investment will be necessary if the switching
station topology is maintained. The question then arises,
if it is more economical to avoid this replacement investment by changing the grid concept to a strictly radial or
a closed ring grid structure. Founding new switching stations in grid areas that are currently radial is out of the
scope of this paper. An example for the methodology
can be seen in Figure 2, where a current grid structure
with switching station is shown on the left. The grid area
around the switching station is now dismantled with respect to the planning horizon of the year 2030 (Figure 2,
2. Grid Concepts
Grid layout and protection system layout have to be
inter-coordinated to guarantee a safe grid operation [8].
For the grid layout, we consider three basic structural elements: open line rings, closed line rings and ring structures
with switching stations (see Figure 1). A grid concept is
then defined as the combination of these elements with an
appropriate protection system layout.
Every DSO defines its grid concept depending on individual requirements and boundary conditions. For this
study, we consider three different MV grid concepts:
2
Current Network Configuration
(with Switching Station)
Radial Target Network 2030
(with Switching Station)
Dismantled Network 2030
(with Switching Station)
Radial Target Network 2030
(without Switching Station)
Dismantled Network 2030
(without Switching Station
& Supply Lines)
Closed Ring Target Network 2030
(without Switching Station)
Primary Substation
Secondary Substation
Long Line
Switching Station
Automated Station
Supply Line
Closed Ring
Figure 2: Overview of target grid optimization methodology: the current grid structure (left) is dismantled with and without switching station
with assumptions for the grid state in 2030 (middle) and then target grids for switching station, open ring and closed ring grid concept is
optimized (right)
middle). Since asset data of the lines was not available,
the dismantling is based on the importance of the line for
the grid topology. Short lines which connect two secondary
substations will be necessary in any grid to ensure the supply of all stations. Longer supply lines however might be
replaced by different cable routes depending on the chosen concept. We therefore remove all long lines, which are
defined as lines with a length of over 2 km for this case
study. The methodology works the same with other criteria for which lines should be removed, for example by
installation date or standard type if this data is available.
To develop an alternative radial grid structure, we create
a second dismantled grid where the switching station with
all of its supply lines is removed in addition (Figure 2,
middle). From these two topologies, we then generate target grids for open ring, closed ring and switching stations
concepts as shown in Figure 2 on the right. The optimization process that is used to create these grids is outlined
in detail in Section 6.
level through 51 HV/MV transformers. The grids cover
a total of about 4800 km of lines and service loads with
about 770 MVA and DG with about 750 MVA installed
power (see Table 1). The grids are all located in southern
Germany and operated by the DSO Netze BW GmbH. All
MV grids are currently operated as an open ring grid with
switching stations in load or generation centres. There are
a total of 49 switching stations in the grid data. The grid
area around each switching station is taken as a starting
point for the analysis as outlined in Section 3. We model
the situation for the planning horizon of 2030 by applying a load prognosis as well as installing additional DG
based on a prognosis for the expected expansion of phoGrid
Group
1
2
3
4
5
Total
4. Grid Data and Scenario
In this paper we study 5 MV grid groups at the 20 kV
voltage level which are connected to the 110 kV voltage
HV/MV
Transf.
15
8
8
12
8
51
Switching
Stations
16
8
8
7
10
49
Load
[MVA]
249
87
151
169
117
773
DG
[MVA]
183
275
231
28
34
751
Table 1: Parameters of considered grid groups
3
Lines
[km]
1363
907
1329
655
525
4779
Grid Component
Cable NA2XS2Y 3x1x300
MV switching station
Communication link
Directed short-circuit indicator (update)
Impedance protection (update)
tovoltaic systems (PV) and wind power plants [1]. Table
1 shows that the load remains predominant in some grids
while in others DG clearly dominates. The set of grid
groups was chosen in order to form a good representation of the expected situation in 2030. The DSOs internal
planning principles dictate that new line trails are always
built as underground cables. We therefore assume that all
new lines are built as cables and overhead lines will be replaced by underground cables until the planning horizon
in 2030. The grid is modelled and analysed in the open
source power system analysis tool pandapower [9].
Annual Cost
7,000 e/km
35,900 e
1,200 e
30 e/Station
400 e/Feeder
Table 2: Annual costs of elements considered in this study
5.3. Cost Assumptions
Different measures, such as cables or communication
links, differ in operational costs, investment costs and life
expectancy. To make the costs of these measures comparable, we chose the Net Equivalent Uniform Annual Cost
[10] as a measure of cost for all grid elements. The annual
costs Cpa are equal to the sum of annual operational costs
Cop,pa [EU R/a] and annual investment costs Cinv,pa [EU R/a]:
5. Heuristic Grid Optimization
The goal of this paper is to economically compare different grid concepts taking into account the currently existing grid structure. Figure 2 shows an example of such a
topology optimization. This section outlines, how the optimization problem is formulated and solved with a heuristic
random search algorithm.
Cpa = Cop,pa + Cinv,pa
(1)
While operational costs are usually already given as yearly
costs, investment costs are typically given as total costs
Cinv,total [EU R]. The annual investment costs can be calculated by discounting the total investment costs with the
calculation interest rate i [%] over the life expectancy m [a]
of the component:
5.1. Technical Constraints
An economic comparison is only valid if the compared
grids are equivalent with respect to their technical capabilities. To ensure all grids meet the technical requirements, we introduce constraints regarding grid topology,
operational behaviour in normal operation, operational behaviour in contingency operation and outage times. The
goal of the optimization is then to find a grid that complies with all these constraints at the minimal possible
costs. Which constraints are applied in the different optimization phases is explained in detail in Section 6.
Cinv,pa = Cinv,total ·
(1 + i/100)m · i/100
(1 + i/100)m − 1
(2)
The cost assumptions used for all relevant components in
this study are depicted in Table 2. The cable costs are
assumed to be constant per kilometre for both adding new
lines an replacing existing lines. This is because the main
cost factor is the excavator work, which has to be carried out when replacing an existing line as well as when
laying a new cable. The full switching station costs are
assumed even if the switching station already exists in the
current grid, in accordance with the strategic viewpoint of
expected renewal outlined in Section 3.
5.2. Measures
To generate realistic grid structures, all options that a
grid planner has in the planning process have to be considered as degrees of freedom in the optimization. In this
study, we consider the following measures:
• Replacing existing overhead lines with cables
• Replacing existing cables with cables of higher diameter
5.4. Heuristic Solution
• Optimizing the position of normally open switches
(sectioning points)
We formulate the DEP as a combinatorial optimization
problem with non-linear constraints. Given a fixed number of possible measures, the goal is to find the cheapest
subset of these measures that fulfils all constraints. It
is not considered feasible to formulate this optimization
problem in a closed form and solve it analytically. Instead,
heuristic algorithms such as genetic algorithms [11, 12, 13],
evolutionary algorithms [14], tabu search [15, 16], particle
swarm optimization [17, 18] or artificial immune systems
[19] are popular methods for its solution. Most of these
studies assume the radial structure of the grid as a constraint [20, 11, 15, 21, 16, 13, 12, 18] and are therefore not
designed to optimize and compare grids in other grid concepts. The approach described in [7] is however flexible
enough to handle the heuristic optimization with varying
• Adding cables in parallel to existing line trails
• Adding cables in new line trails
• Equipping secondary substations with communication
links to improve reliability
• Removing or renewing switching stations
Each of the possible measures can either be applied or not
applied, which leads to the formulation of the Distribution system Expansion Problem (DEP) as a combinatorial
optimization problem [7]. The details of the different measure and at what point in the optimization process they
are deployed is explained in detail in Section 6.
4
Current Grid
Preparation and
Dismantling
With
Switching
Station
Without
Switching
Station
Secondary Substation
1a
1...m
Topology
Optimization
1b
Topology
Optimization
2a
Reconfiguration
Reinforcement
2b
Reconfiguration
Reinforcement
3a
Automation for
Reliability
Switching
Station
Network
5
1...m
3b
Line
Primary Substation
Supply Line
Switching Station
New Line
Figure 4: Considered new line trails in the example grid area
6.1.1. Topological Constraints
Topological constraints specify requirements for the
topological structure of the grid without taking electric
parameters into account. They can be analysed with
graph searches using the pandapower topology package [9].
Which topological constraints are relevant depend on the
grid concept and protection system layout. Here, we assume the following constraints:
4
Automation for
Reliability
Meshing
Radial
Network
Closed Ring
Network
Cost Comparison
Supply connection. All secondary substations have to be
connected to an HV/MV substation to be supplied. This
means there has to be at least one path from each station
to an external grid connection.
Figure 3: Methodology for the calculation and comparison of the
three grid structures
measures and constraints, so that a study of different grid
concepts is possible. The DEP is solved using an Iterated Local Search (ILS) algorithm with Hill Climbing as
local search. This paper concentrates on the application
of the optimization framework to the specific questions of
structural optimization in different grid concepts. Detailed
information on the formulation of the optimization problem, codification of measures, definition of the step-wise
cost function and neighbourhood function can be found in
[7] and [22].
Contingency supply. All secondary substations must have
a second connection for resupply in case of a single contingency, which is provided by ring structures in the grid.
Secondary substations which are located on stubs and
therefore do not have a contingency connection in the current configuration are exempted from this rule. Note that
this constraint only guarantees the topological possibility
of a resupply, operational constraints in the contingency
state are addressed in section 6.2.2.
Radiality. The grid has to be radial, in that no feeders
can be galvanically connected through closed rings in the
MV grid. Rings are only permitted if they go through
a switching station. Closed ring structures as shown in
Figure 1 b. are note permitted, as they will be investigated
separately in phase 4 (see Section 6.4).
6. Multiphase Target Grid Optimization
Because of the complexity of the combinatorial optimization problem, it is not feasible to optimize sectioning
points, new line trails, line replacement, parallel lines and
secondary substation automation all in one optimization.
We therefore split the problem into several sub-problems
that are solved subsequently. An overview of the multiphase optimization process that is used to find grid structures for the three concepts starting from the current grid
configuration is shown in Figure 3. Each phase is explained
in this section with the help of the example grid area shown
in Figure 2.
6.1.2. Line Trail Optimization
To construct grid structures that comply with the constraints outlined above from a dismantled grid, new lines
are added between two secondary substations which are
not currently connected. The length of a new line is calculated as the air-line distance between the stations multiplied with a factor of 1.5. The costs per kilometre line
are given in Table 2. We find possible new line trails to
complete the grid with a Delaunay-triangulation [23] between all stations from which a line was removed. The
considered line trails in the example grid are shown in
the example in Figure 4 for the layout with and without
switching station. Since there are a lot of possible combinations and the topologies cannot be easily compared, we
6.1. Phase 1: Topology Optimization
A valid grid has to comply with several constraints regarding its structural layout. In the first step, we therefore
optimize the topology of the grid.
5
Scaling Load
Scaling DG (PV)
Scaling DG (Wind)
Transformer Setpoint
Peak Load
1.0
0.0
0.0
1.0 pu
Peak Generation
0.3
0.8
1.0
1.05 pu
Figure 5: Resupply switching sequence for a line fault in an open
ring: a. normal operation, b. line fault with protection trip, c. fault
isolation, d. resupply
Table 3: Definition of worst-case scenarios
consider several different solutions. Specifically, we create
50 different topologies for each grid area. Figure 6 shows
three of the 50 topologies for the example grid area. All
steps that are explained in the following are conducted 50
times per studied grid area.
scenario, since the whole ring has to be supplied through
only one feeder. A typical switching sequence for a line
outage in a radial grid is shown in Figure 5. When a line
fails, the circuit breaker in the primary substation opens to
disrupt the short-circuit current, and thereby cuts the affected half ring from power supply (Figure 5 b.). After the
fault is located, it is isolated by manually opening the loadbreak switches at the secondary substations connected to
the faulted line segment (Figure 5 c.). Finally, the circuit
breaker in the primary substation as well as the sectioning point are closed to allow a resupply of all stations on
the ring (Figure 5 d.). This switching sequence is automatically carried out for all feeders using the pandapower
topology package to find a resupplied state. Compliance
with contingency constraints is checked with a power flow
in the resupplied state. The constraints are checked for the
peak load case as defined in Table 3. The peak generation
scenario is not checked in contingency situations because
DG are not considered to be subject to the SCP.
6.2. Phase 2: Reconfiguration and Reinforcement
After the first optimization step, the grids comply with
topological constraints, so that all stations are supplied
and the grid is radial. In the second optimization step, it
is ensured that the electric parameters of the grids comply
with the grid planning principles. This is achieved by grid
reconfiguration and reinforcement.
6.2.1. Normal Operation Constraints
Constraints for equipment loading and bus voltages have
to be complied with in every possible load or generation
scenario. We therefore define two worst-case scenarios for
the peak load and peak generation situation. The simultaneous factors used to generate the worst case scenarios
can be seen in Table 3. The scaling factors for the loads
refer to the drag pointer measurements at the secondary
substations and to the installed power of DG. Since we
assume V(P) transformer control, the voltage set point for
the transformer voltage controller depends on the active
power flow and is therefore different in the two worst-case
scenarios. Adherence with the power flow constraints in
normal operation is checked with one power flow for each
worst-case scenario using pandapower [9]. In both cases,
all bus voltages have to be within the voltage band defined
by the DSO and the line loadings have to be below 100 %.
6.2.3. Optimization of Operational Behaviour
We consider switching and cable measures to improve
the electric parameters in a grid structure and ensure compliance with constraints for normal and contingency operation.
Sectioning Point Optimization. In a radial grid structure,
sectioning points are necessary to fulfill the topological
constraints, specifically to avoid direct galvanic connection of feeders or transformers. Sectioning points can be
relocated to improve the operational behaviour of the grid.
The heuristic optimization aims to find a switching state
which minimizes the voltage and line loading violations
while still complying with all topological constraints. Details about the used composite objective function are described in [22].
6.2.2. Constraints in Contingency Operation
The Single Contingency Policy (SCP) dictates, that the
power system must continue functioning after the outage
of one power system element. The topological contingency
constraint ensures that a resupply is possible after the failure of a line through a backup connection (see Section
6.1.1). However, it also has to be ensured that the grid
operates safely in the resupplied state. Specifically, the
bus voltages have to be within the contingency voltage
band (which is usually broader than the voltage band for
normal operation) and the line loadings have still to be
below 100 %.
To check this constraint, we calculate a resupply scenario for each feeder line directly connected to transformer
or switching station. A fault of such a line is the worst case
Cable Measures. Existing line segments can be replaced by
a new cable with higher ampacity, to mitigate line overloading, or with a lower impedance, to mitigate voltage
problems. If line replacement is not enough to mitigate
all constraint violations, additional lines can be added to
the grid in parallel to existing line routes. Parallel lines
can only be connected to secondary substations and the
radiality constraints have to be respected.
Constraint violations are first mitigated through sectioning point optimization, since opening and closing
switches is not associated with costs. If not all constraint
6
failure rates of the components are taken from statistical
analysis where it is given as a function of the line type
and, in case of underground cables, the insulation material. The effect of a line failure can be calculated from
the resupply switching sequence as shown in Figure 5. By
assuming time constants for fault location, on-site switching and remote switching, we calculate the outage time for
each of the m stations in the case of a failure of each of
the n lines in the grid. By weighting the calculated outage time with the yearly failure rate, we get the expected
yearly outage time tout,i [h/a] for a station i:
tout,i =
n
X
hk · tout,ki
(3)
k=0
where hk [1/a] is the yearly failure rate of line k and
tout,ik [h] is the outage time for station i after a failure
of line k. The yearly outage energy Eout,i [kW h/a] for a
station i can then be calculated with the installed power
Pk as:
Eout,i = Pk · tout,i
Secondary Substation
Primary Substation
(4)
The ASIDI of the whole grid is then defined as the sum of
all the outage energy in all m stations in relation to the
total installed power:
Pm
i=0 Eout,i
(5)
ASIDI = P
m
i=0 Pi
Figure 6: Necessary reinforcement for the three example grids with
and without switching station
violations can be mitigated through reconfiguration, the
grid has to be reinforced with additional cable measures
until all violations are mitigated.
The necessary reinforcement for the three example grids
can be seen in Figure 6. It can be seen that there is overall
less need for reinforcement in the switching station grid,
since the switching station serves as a junction that stabilizes the grid.
To prevent any decline in service reliability, we define
the following reliability constraints:
System wide Criterion. To assure that the target grid
topologies are at least as reliable as the current grid, the
ASIDI of the grid must not increase compared to the current grid.
After the second optimization step, all grids comply with
topological constraints as well as operational constraints
for normal and contingency operation. To ensure that the
grids are also sufficiently reliable, the grid is equipped with
communication links to speed up resupply and reduce outage times if necessary.
Station Criterion. To assure that no individual station
suffers a great setback in service reliability compared to
the current grid, the expected outage energy for each station is limited to an allowed maximum of Eout,max . For
stations that already violate this constraint in current grid
configuration, no further increase of the outage energy is
allowed. In this case study, we use a maximum outage
energy of Eout,max = 150 kWh/a.
6.3.1. Reliability Constraints
The SCP demands that the grid complies with the operational constraints in the resupplied state. It does however
not draw any conclusion about the frequency of fault occurrences in the grid or about which secondary substations
will experience outages for how long. In this optimization
step, it is ensured that the grid structure is sufficiently
reliable with respect to outage frequency and restoration
times. The service reliability can be measured in reliability
figures, the most prominent of which is the Expected Average System Interruption Duration Index (ASIDI), which
can be computed with a Failure mode and effects analysis
(FMEA) [24]. The FMEA takes into account the failure
rates of components as well as the effect of the failure. The
6.3.2. Automating Resupply
Secondary substations can be equipped with a communication link to allow remote controllable switching of the
sectioning point. This measure accelerates the fault isolation and resupply process, so that it can be used to improve the service reliability. If there are violations of the
reliability constraints in a feeder, the secondary substation
in the load centre of the feeder is chosen for automation.
This results in a partitioning, which confines the spread
of the fault area and speeds up the resupply process. secondary substations are repeatedly selected until all constraints are met. The resulting grids now comply with all
planning constraints and are used as the reference grid for
the radial and switching station grid respectively.
6.3. Phase 3: Automation for Reliability
7
122.1
101.3
Closed Ring
Cost [Thousand EUR / Year]
100
Switching Station
Network Concept
Radial Network
120
Cabling
Switching
Station
Secondary
Equipment
0
50
100
Cost [Thousand EUR /Year]
150
200
90.7
80
60
40
20
0
Radial
Network
Closed
Rings
Switching
Station
Figure 7: Cost comparison for example grid area: costs for all 50 separately optimized grids (left) and cost minimal reference grid (right) for
each concept
solution, since the additional cost for secondary equipment
is greater than the cost savings in grid reinforcement. We
therefore conclude, that the best concept for the example
grid area is a radial grid without a switching station.
6.4. Phase 4: Meshing
In a last step, we construct a closed ring structure from
the radial grid. Closed rings are only allowed with a more
sophisticated protection system as detailed in Section 2.
The costs for updating the protection system are considered as per Table 2. In return, the meshing constraint
is now relaxed so that the meshing of two feeders is allowed even without a switching station. The Iterated Local Search meta-heuristic is used to create a closed ring
solution from each of the fifty valid radial topologies. As
explained in Section 2, closing sectioning points leads to a
decrease in service reliability, so that compliance with the
reliability constraints cannot be guaranteed after sectioning points are closed. We therefore demand that for every
sectioning point that is closed, the associated secondary
substations has to be automated. Since the open sectioning point is replaced with an automated sectioning point,
the grid is considered at least as reliable as the radial grid.
The optimization creates fifty closed ring grids for each
grid area and the cost minimal grid is chosen as the reference grid for the closed ring concept.
7. Results
The methodology outlined in Section 6 for one grid area
is applied to all switching stations in the case study grid.
Of the 49 switching stations, 5 where dismissed due to
faulty or inconsistent data. The methodology described in
Section 6 is applied to all remaining 44 switching station
grid areas. As 50 topologies are calculated for all the three
network concepts in each of the 44 grid areas, a total of
3 · 50 · 44 = 6600 independent network plans are compiled
for this study. To provide enough computational power,
calculations were carried out on a computation cluster and
over 840 million power flows were conducted to obtain the
results. The results are now interpreted to draw a conclusion about the overall cost efficiency of the different MV
grid concepts.
6.5. Phase 5: Cost Comparison
7.1. Switching Stations
We have constructed fifty grids for each of the three
meshing concepts which all fulfil the planning constraints,
but differ in their structure and therefore in their total
costs. Figure 7, shows the costs of the fifty topologies for
each grid concept on the left. We select the cost minimal
grid for each concept as the reference grid. These three
grids are then compared to draw a conclusion about the
differences of the three concepts. This comparison is shown
for the example area in Figure 7 on the right. We can
see, that the best open ring grid is cheaper than the best
switching station solution for the example grid by around
31,400 e per year. We can also see, that the best closed
ring solution is more expensive than the best open ring
We compare radial and switching station grids to evaluate the profitability of switching stations. The switching
station improves reliability because of the included protection systems as well as the operational behaviour by allowing closed line rings. On the other hand, the costs for
the switching station are equivalent to over 5 km of cable
and it needs additional supply lines to create a junction
in the grid. The comparison in Figure 8 shows, that the
radial grid is more cost efficient in all 44 analysed cases.
This means that none of the switching stations are able to
save enough grid reinforcement for it to be cost-efficient.
Reliability only seems to be a minor impact factor, since
compliance with the reliability constraints can be achieved
8
are outweighed by the costs for the switching station itself and the necessary supply lines. We therefore conclude
that it is more cost-efficient to develop the grid towards
a radial structure in the long run, avoiding replacement
investments for switching stations that have reached the
end of their life cycle. The closed ring concept is only cost
effective in few grid areas, where the expected savings are
small compared to the additional cost in other grid areas.
We therefore conclude, that the radial grid in combination with selective automation of secondary substations is
the most cost efficient mode of operation for the analysed
grids. The contributions of this paper can be summarized
as follows:
1. Automated target grid planning: the methodology
presented in this paper allows to automatically compile target grid plans based on geographical information and a wide range of technical constraints. This
includes constraints for grid topology, normal operation power flow parameters, contingency operation
power flow parameters and service reliability.
Figure 8: Cost difference between switching station and radial grid
for all 44 grid areas (GA)
with 2.4 automated stations on average, which is the cost
equivalent of 0.4 km of cable.
We therefore conclude, that a radial grid with automated secondary substations is preferable to a structure
with switching stations. The radial grid structure with secondary substation automation is equivalent to the switching station grid in relation to grid operation and service
reliability, but comes with significantly lower investment
and maintenance costs.
2. Proof of concept: the successful application of the approach to 44 grid areas with about 4800 km of lines
demonstrates the practical applicability of the approach. The high degree of automation makes the
approach feasible for large-scale grid studies as well
as for grid planning assistance systems.
3. Comparison of grid concepts: The results of the case
study allow to draw conclusions about the technoeconomical differences of different MV grid concepts.
A higher degree of meshing for the integration of DG
was not found to be cost-efficient, as the additional
costs for secondary equipment outweighed the cost
savings in network reinforcement.
7.2. Closed Rings
We now compare the closed ring grids with the open
ring grids to evaluate the profitability of a closed ring concept. The comparison for all 44 cases is shown in Figure
9. In five grid areas, the closed ring solution is economical (green). In ten grids, the costs for the upgrade of
the protection and fault location systems exceed the savings in grid reinforcement (orange). In the remaining 29
grids, closed rings do not lead to any savings in grid reinforcement and are therefore not cost-efficient (red). In
conclusion, closed rings are only cost-efficient in very few
grids, and even in those grids the saving potential with less
than 4,000 e per year in average is not very high. Since
the DSO usually aims to have the same grid concept in all
MV grids to allow harmonized procedures in grid planning
and operation, the radial structure is more cost effective
than the closed ring structure for the overall grid.
It should be noted that the conclusion about the grid concepts are only valid for the considered grids and under the
considered boundary conditions. Even though the grids
where chosen with the aim to include structurally different
grids, a generalization for other grid groups is not easily
possible. The boundary conditions with regard to protection system layout, spatial distribution of loads and DG
or ratio of underground cables and overhead lines might
differ significantly in other grids, especially of a different
DSO. While meshed operation for the integration of DG
could still be cost-efficient in other grids, our study does
not confirm the assumption that meshing is always better
for integration of DG. Instead, a comprehensive consideration of expected grid extension cost and protection system
layout is necessary to determine the best mode of operation for the future power system. The approach could be
further extended in the future to include transformation
paths from the current power system to a future target
grid or probabilistic scenarios for DG installation.
8. Conclusion
In this study we economically compare target grids for
radial, closed ring and switching station grids to come to
a conclusion about the optimal grid concept in 44 real
MV grid areas for a planning horizon in 2030. The results
show, that switching stations are economically inefficient
under the assumed constraints, since the technical benefits
9
GA 01
GA 02
GA 03
GA 04
GA 05
GA 06
GA 08
GA 07
GA 09
GA 10
GA 11
GA 12
GA 13
GA 14
GA 15
GA 16
GA 17
GA 18
GA 19
GA 20
GA 21
GA 22
GA 23
GA 24
GA 25
GA 26
GA 27
GA 28
GA 29
GA 30
GA 31
GA 32
GA 33
GA 34
GA 35
GA 36
GA 37
GA 38
GA 39
GA 40
GA 41
GA 42
GA 43
GA 44
Figure 9: Cost difference between closed ring and radial grid for all 44 grid areas (GA)
Acknowledgement
[7] A. Scheidler, L. Thurner, M. Braun, Automated distribution
system planning for large-scale network integration studies, IET
Renewable Power Generation (submitted)Preprint.
URL https://arxiv.org/abs/1711.03331
[8] J. Schlabbach, K.-H. Rofalski, Power System Engineering:
Planning, Design, and Operation of Power Systems and Equipment, Wiley-VCH Verlag GmbH & Co. KGaA, 2008.
[9] L. Thurner, A. Scheidler, F. Schäfer, J.-H. Menke, J. Dollichon,
F. Meier, S. Meinecke, M. Braun, pandapower - an Open Source
Python Tool for Convenient Modeling, Analysis and Optimization of Electric Power Systems, preprint (2017).
URL https://arxiv.org/abs/1709.06743
[10] H. Seifi, M. S. Sepasian, Electric Power System Planning - Issues, Algorithms and Solutions, Springer, 2011.
[11] V. Camargo, M. Lavorato, R. Romero, Specialized genetic algorithm to solve the electrical distribution system expansion
planning, in: 2013 IEEE Power Energy Society General Meeting, 2013, pp. 1–5. doi:10.1109/PESMG.2013.6672615.
[12] V. Miranda, J. V. Ranito, L. M. Proenca, Genetic algorithms in
optimal multistage distribution network planning, IEEE Transactions on Power Systems 9 (4) (1994) 1927–1933. doi:10.1109/
59.331452.
[13] H. Falaghi, C. Singh, M.-R. Haghifam, M. Ramezani, Dg integrated multistage distribution system expansion planning,
International Journal of Electrical Power & Energy Systems
33 (8) (2011) 1489 – 1497. doi:http://dx.doi.org/10.1016/
j.ijepes.2011.06.031.
[14] Z. Zmijarević, M. Skok, H. Keko, D. Škrlec, S. Krajcar, N. LangKosić, G. S. čki, A comprehensive methodology for long-term
planning of distribution networks with intrinsic contingency
support, in: 18th International Conference and Exhibition on
Electricity Distribution, CIRED, Turin, Italy, 2005, pp. 1–5.
doi:10.1049/cp:20051353.
[15] A. M. Cossi, L. G. W. D. Silva, R. A. R. Lazaro, J. R. S.
Mantovani, Primary power distribution systems planning taking into account reliability, operation and expansion costs, IET
Generation, Transmission Distribution 6 (3) (2012) 274–284.
doi:10.1049/iet-gtd.2010.0666.
This work was supported by the German Federal Ministry for Economic Affairs and Energy and the Projektträger Jülich GmbH (PTJ) within the framework of the
project Smart Grid Models (FKZ: 0325616).
References
References
[1] C. Rehtanz, M. Greve, B. Gwisdorf, A. El-Hadidy, J. Kays,
M. Kch, V. Liebenau, J. Teuwsen, EnBW-Verteilnetzstudie
(2014).
[2] G. Celli, F. Pilo, G. Pisano, V. Allegranza, R. Cicoria, A. Iaria,
Meshed vs. radial mv distribution network in presence of large
amount of dg, in: Power Systems Conference and Exposition,
2004. IEEE PES, 2004, pp. 709–714 vol.2. doi:10.1109/PSCE.
2004.1397664.
[3] S. Repo, A. Nikander, H. Laaksonen, P. Jrventausta, A method
to increase the integration capacity of distributed generation on
weak distribution networks, in: 17th International Conference
on Electricity Distribution, 2003.
[4] A. Nikander, R. E. P. O. Sami, P. Järventausta, Utilizing the
ring operation mode of medium voltage distribution feeders,
2003.
[5] F. Viawan, D. Karlsson, A. Sannino, J. Daalder, Protection
scheme for meshed distribution systems with high penetration
of distributed generation, in: Power Systems Conference: Advanced Metering, Protection, Control, Communication, and
Distributed Resources, 2006. PS ’06, 2006, pp. 99–104. doi:
10.1109/PSAMP.2006.285378.
[6] S. Salman, S. Tan, Comparative study of protection requirements of active distribution networks using radial and ring operations, in: Power Tech, 2007 IEEE Lausanne, 2007, pp. 1182–
1186. doi:10.1109/PCT.2007.4538483.
10
[16] B. R. P. Junior, A. M. Cossi, J. Contreras, J. R. S. Mantovani,
Multiobjective multistage distribution system planning using
tabu search, IET Generation, Transmission Distribution 8 (1)
(2014) 35–45. doi:10.1049/iet-gtd.2013.0115.
[17] S. Ganguly, N. Sahoo, D. Das, A novel multi-objective pso
for electrical distribution system planning incorporating distributed generation, Energy Systems 1 (3) (2010) 291–337.
[18] N. Sahoo, S. Ganguly, D. Das, Multi-objective planning of electrical distribution systems incorporating sectionalizing switches
and tie-lines using particle swarm optimization, Swarm and
Evolutionary Computation 3 (2012) 15 – 32. doi:http://dx.
doi.org/10.1016/j.swevo.2011.11.002.
[19] H. Keko, M. Skok, D. Skrlec, Solving the distribution network
routing problem with artificial immune systems, in: Proceedings
of the 12th IEEE Mediterranean Electrotechnical Conference
(MELECON), Vol. 3, Dubrovnik, Croatia, 2004, pp. 959–962
Vol.3. doi:10.1109/MELCON.2004.1348212.
[20] N. G. Boulaxis, M. P. Papadopoulos, Optimal feeder routing in
distribution system planning using dynamic programming technique and gis facilities, IEEE Transactions on Power Delivery
17 (1) (2002) 242–247. doi:10.1109/61.974213.
[21] E. Diaz-Dorado, J. Cidras, E. Miguez, Application of evolutionary algorithms for the planning of urban distribution networks
of medium voltage, IEEE Transactions on Power Systems 17 (3)
(2002) 879–884. doi:10.1109/TPWRS.2002.800975.
[22] L. Thurner, A. Scheidler, A. Probst, M. Braun, IET Generation, Transmission & Distribution 11 (2017) 4264–4273(9).
[link].
URL
http://digital-library.theiet.org/content/
journals/10.1049/iet-gtd.2017.0729
[23] M. de Berg, O. Cheong, M. van Krefeld, M. Overmars, Computational Geometry: Algorithms and Applications, 2008.
[24] R. E. Brown, Electric power distribution reliability, 2nd Edition,
Vol. 31 of Power engineering, CRC, Boca Raton, 2009.
11
| 5cs.CE
|
1
Diffusion Based Cooperative Molecular Communication in Nano-Networks
arXiv:1710.01882v2 [cs.IT] 15 Oct 2017
Neeraj Varshney, Student Member, IEEE, Adarsh Patel, Student Member, IEEE, and Aditya K.
Jagannatham, Member, IEEE
Abstract—This work presents a novel diffusion based dualphase molecular communication system where the source leverages multiple cooperating nanomachines to improve the end-toend reliability of communication. The Neyman-Pearson Likelihood Ratio Tests are derived for each of the cooperative as
well as the destination nanomachines in the presence of multiuser interference. Further, to characterize the performance of
the aforementioned system, closed form expressions are derived
for the probabilities of detection, false alarm at the individual
cooperative, destination nanomachines, as well as the overall
end-to-end probability of error. Simulation results demonstrate
a significant improvement in the end-to-end performance of the
proposed cooperative framework in comparison to multiple-input
single-output and single-input single-output molecular communication scenarios in the existing literature.
Index Terms—Cooperation, diffusion, Likelihood Ratio Test
(LRT), molecular communication.
I. I NTRODUCTION
Nanoscale molecular communication has gained significant
prominence in recent times due to its ability to provide
novel solutions for various problems arising in biomedical,
industrial, and surveillance scenarios. Efficient drug delivery,
as described in [1], is one such example of its envisaged
potential. Several research efforts [2]–[6] have been devoted
to developing models as well as analyzing the performance
of diffusion based molecular systems. It has been shown in
[7] that the distance between two nanomachines significantly
affects the performance of communication, since the molecular
concentration decays inversely as the cube of this distance.
To overcome this impediment, the work in [8] proposed a
novel multiple-input multiple-output (MIMO) molecular communication framework, wherein a noticeable performance improvement has been demonstrated through suitable allocation
of molecules among the transmitting nodes. However, the
work therein focuses exclusively on applications of transmit/
receive diversity and spatial multiplexing in molecular communication, while not exploring cooperative molecular communication that can significantly enhance the communication
range with improvement in the reliability through cooperative
diversity.
Some works in the existing literature [9], [10] and the
references therein have analyzed the performance of relayassisted molecular communication systems in terms of their
error rate, capacity, etc. However, to the best of our knowledge,
none of the works in the existing literature consider dual-phase
multiple half-duplex nanomachine assisted cooperative molecular communication in the presence of multi-user interference
(MUI) and exploit cooperative diversity, which is the key focus
of this work.
Neeraj Varshney, Adarsh Patel, and Aditya K. Jagannatham are with the
Department of Electrical Engineering, Indian Institute of Technology Kanpur,
Kanpur UP 208016, India (e-mail:{neerajv,adarsh,adityaj}@iitk.ac.in).
Towards this objective, the optimal Likelihood Ratio Test
(LRT) based decision rule at each cooperating nanomachine
is initially derived, followed by a characterization of its
probabilities of detection and false alarm. Subsequently, the
optimal fusion rule is derived for the destination nanomachine
incorporating also the probabilities of false alarm and detection
at each of the cooperating nanomachines. Thus, the framework
developed is practically applicable, unlike the selective decode
and forward protocol considered in works such as [11], [12]
that assume retransmission only when the symbol is accurately
decoded at the relay. Finally, closed form expressions are
derived for the end-to-end probabilities of detection, false
alarm, and probability of error for the cooperative scenario
under consideration. Simulation results demonstrate the improved performance of the proposed cooperative nanosystem
in comparison to the existing multiple-input single-output
(MISO) and single-input multiple-output (SIMO) systems [8].
Further, while this work employs multiple molecule types
for the source and cooperating nanomachines, it results in a
simplistic linear combining based decision rule and also does
not require a large capacity backhaul that is necessitated in [8].
Due to space limitations, detailed derivations of some results
are given in a supplemental technical report [13].
II. D IFFUSION BASED C OOPERATIVE M OLECULAR
C OMMUNICATION S YSTEM M ODEL
Consider a diffusion based molecular communication system with N cooperating nanomachines R1 , R2 , · · · , RN as
shown schematically in Fig. 1. Further, it can be noted
that the diffusion takes place in 3-dimensional and infinite
space. The N intermediate nanomachines cooperate with the
source nanomachine to relay its information to the destination nanomachine. The transmitter is modeled as a point
source while the the destination node is a perfectly absorbing
surface. Further, the relay nodes during reception act as
perfect absorbing surfaces while during transmission act as
point sources. End-to-end communication between the source
and destination nanomachines occurs in two phases. In first
phase, the source nanomachine emits either Q0 molecules in
the propagation medium for information symbol 1 generated
with a prior probability β or remains silent for information
symbol 0. In the second phase, the intermediate nanomachines
Ri , i = 1, 2, · · · , N that employ decode-and-forwarding protocol, decode the symbol using the concentration received
from the source followed by retransmission to the destination nanomachine using different types of molecules1 . As
described in [14], nanomachines such as eukaryotic cells can
1 The use of different types of molecules at each transmitting nanomachine
allows the cooperative nanomachines to operate either in half or full duplex
modes [10].
where ηei ∼ N (e
µi , σ
ei2 ) represents the MUI at the destination
nanomachine and Qi is the number of molecules emitted
by node Ri corresponding to information symbol 1. Similar
to Q0 hp (di ) in (2), the peak concentration Qi hp (dei ) at the
destination nanomachine corresponding to the emission by Ri
is obtained as
3/2
3
−3
e
e
,
(4)
Qi hp (di ) = Qi (di )
2πe
Fig. 1. Schematic diagram of a cooperative molecular nano-network
with di and dei denoting distances from source nanomachine to Ri ,
and Ri to destination nanomachine respectively.
be genetically modified to emit different types of molecules.
The molecules released by the transmitter nanomachine are
assumed to diffuse freely through the propagation medium
with Brownian motion and are absorbed by the receiver once
they reach it. Furthermore, similar to [8], this work also
assumes that the inter symbol interference (ISI) and receiver
noise are suppressed and negligible in comparison to the MUI.
The effect of ISI can be ignored by considering the symbol
duration Ts to be significantly larger than tp , where tp is
the time instant when the channel impulse response has a
maximum as can be seen in [15, Fig.3]. Further, since such
nanonetworks are expected to operate in a distributed and
uncoordinated manner, this work focuses on MUI and assumes
ISI, noise effects to be negligible in comparison.
The peak concentration sensed at the ith cooperating
nanomachine Ri corresponding to transmission by the source
nanomachine in the first phase is given as [8]
ci = x0 Q0 hp (di ) + ηi ,
(1)
where x0 ∈ {0, 1} denotes the binary information symbol.
The term ηi represents the MUI at the cooperative node Ri .
Similar to [8], assuming the MUI to arise from a large number
of interfering sources, it can be modeled as a Gaussian random
variable with mean µi and variance σi2 , denoted by N (µi , σi2 ),
as per the central limit theorem (CLT) [16]. The molecular
concentration is given as
d2i
1
−
,
Q0 h(t) = Q0
3 exp
4Dt
(4πDt) 2
where di denotes the distance between the source 2and the ith
d
node Ri . The peak concentration is given at t = 6Di , obtained
by solving dh(t)
dt = 0. The peak concentration is obtained as
3/2
3
−3
.
(2)
Q0 hp (di ) = Qdi
2πe
Each cooperative nanomachine employs the minimum probability of error criterion for decoding the transmitted symbol
followed by retransmission of the decoded symbol x
bi ∈ {0, 1}
to the destination nanomachine. Therefore, the peak concentration sensed at the destination corresponding to the ith
cooperating nanomachine Ri is
ci = x
e
bi Qi hp (dei ) + ηei ,
(3)
where dei is distance of the destination from Ri . The end-to-end
error rate of the cooperative molecular communication system
depends on the detection performance of the individual cooperative nanomachines. The next section begins by determining
the probabilities of detection and false alarm at Ri .
III. D ETECTION AND E RROR R ATE A NALYSIS
WITH
MUI
The problem of sensing the peak concentration at the
cooperative nanomachine Ri in (1) can be formulated as the
binary hypothesis testing problem
H0 : ci = ηi
(5)
H1 : ci = Q0 hp (di ) + ηi ,
where the null and alternative hypotheses H0 , H1 correspond
to the binary symbols 0, 1 respectively. The peak concentration
ci at the ith cooperative nanomachine corresponding to the
individual hypotheses is distributed as
H0 : ci ∼ N (µi , σi2 )
(6)
H1 : ci ∼ N (Q0 hp (di ) + µi , σi2 ).
The optimal detection statistic Λ(ci ) for the cooperating
nanomachine Ri can be obtained employing the NeymanPearson LRT and is given as
p(ci |H1 ) H1
1−β
Λ(ci ) = ln
.
(7)
≷ ln
p(ci |H0 ) H0
β
Substituting PDFs p(ci |H0 ) and p(ci |H1 ) from (6), the logarithm of the LRT above can be evaluated as
Λ(ci )=[−(ci − Q0 hp (di ) − µi )2 + (ci − µi )2 ]/2σi2 .
(8)
On further simplification, the test above reduces to
H1
T (ci ) = α
bi ci ≷ γ,
(9)
H0
Q0 hp (di )
and
σi2
(Q0 hp (di )) +2Q0 hp (di )µi
+
2σi2
where the parameter α
bi is defined as α
bi =
2
the threshold γ is obtained as γ =
. The result below determines the detection perforln 1−β
β
mance of the individual cooperative nanomachines.
(i)
Lemma 1: The probabilities of detection (PD ) and false
(i)
alarm (PF A ) at the ith cooperative nanomachine corresponding to the test statistic T (ci ) in (9) are given as
′
γ − Q0 hp (di ) − µi
(i)
PD = Q
,
(10)
σ
′
i
γ − µi
(i)
PF A = Q
,
(11)
σi
where γ ′ is defined as γ ′ = γ/b
αi and the function Q(·) is the
tail probability of the standard normal random variable.
Proof: Given in the technical report [13, Appendix A].
The cooperative nanomachines employ different types of
molecules. Therefore, the joint concentration vector e
c =
[e
c1 , e
c2 , · · · , e
cN ]T ∈ RN ×1 at the destination2 corresponding
to the N cooperating nanomachines can be written as
e
e+n
e,
c=x
(12)
N ×1
e ∈ R
where the concatenated vector x
is defined as
e = [b
x
x1 Q1 hp (de1 ), x
b2 Q2 hp (de2 ), · · · , x
bN QN hp (deN )]T . Sime ∈ RN ×1 is given as
ilarly, the concatenated noise vector n
T
e = [e
n
η1 , ηe2 , · · · , ηeN ] . The sensing problem at the destination
nanomachine can be formulated as the binary hypothesis
testing problem
e
H0 : e
c=n
(13)
e+n
e,
H1 : e
c=x
e = [Q1 hp (de1 ), Q2 hp (de2 ), · · · , QN hp (deN )]T . Considwhere x
ering the logarithm of the LRT at the destination nanomachine,
the decision statistic corresponding to the N cooperative
nanomachine transmissions is obtained as
"N
#
Y p(e
ci |H1 )
p(e
c|H1 )
= ln
,
(14)
Λ(e
c) = ln
p(e
c|H0 )
p(e
ci |H0 )
i=1
where (14) follows from the fact that the peak concentrations
at the destination nanomachine are conditionally independent
i.e., corresponding
to the alternative hypothesis H1 the PDF
Q
p(e
c|H1 ) = N
ci |H1 ). The individual PDFs p(e
ci |H0 ) and
i=1 p(e
p(e
ci |H1 ) in (14) corresponding to the two hypotheses H0 and
H1 are Gaussian with
p(e
ci |H0 ) ∼ N (e
µi , σ
ei2 )
(15)
p(e
ci |H1 ) ∼ N (Qi hp (dei ) + µ
ei , σ
e2 ).
i
Result in Lemma 2 below derives the simplified optimal
Neyman-Pearson LRT at the destination nanomachine for the
cooperative nano-network for moderate to high concentration
scenarios with molecules (> 109 ).
Lemma 2: The optimal test statistic T (e
c) and the resulting
test at the destination nanomachine for the binary hypothesis
testing problem in (13), for a scenario in which a moderate to
high number of molecules is emitted, is obtained as
N
X
H1
αi e
ci ≷ γ ′′ ,
(16)
T (e
c) =
i=1
H0
PN
where γ ′′ = ln 1−β
+ i=1 θi . The quantities αi and θi
β
are defined as
h
i
(i)
(i)
(17)
αi = Qi hp (dei )/e
σi2 (PD −PF A ),
#
"
(Qi hp (dei ))2 +2Qi hp (dei )e
µi
(i)
(i)
(18)
(PD −PF A ),
θi =
2e
σi2
with the expressions for the individual probabilities of de(i)
(i)
tection PD and false alarm PF A for the ith cooperative
nanomachine as obtained in (10) and (11) respectively.
Proof: Given in the technical report [13, Appendix B].
2 The destination nanomachine responds independently to each of the
cooperative nanomachines as the various cooperating nanomachines employ
different types of molecules. This is similar to the Multi-Molecule-Type MultiHop Network (MMT-MH) considered in works such as [17] that also employs
multiple molecule types.
Employing the distributions of e
ci for the null and the alternative hypotheses obtained in (15), together with the expression
for the test statistic T (e
c) in (16), its distributions under the
various hypotheses can be determined as
X
XN
N
2 2
α σ
H0 : N
e
αi µ
ei ,
i=1 i i
i=1
(19)
X
XN
N
α2i σ
ei2 .
H1 : N
ei ,
αi Qi hp (dei ) + µ
i=1
i=1
The end-to-end probability of error for the cooperative nanonetwork follows as described in the result below.
Theorem 1: The end-to-end probability of error (Pe ) at
the destination nanomachine in the diffusion based cooperative molecular nano-network comprising of N cooperating
nanomachines,
is given
as
PN
′′
e
γ
−
α
(Q
h
(
d
)
+
µ
e
)
i p i
i
i=1 i
qP
Pe =β 1 − Q
N
2
2
ei
i=1 αi σ
P
N
γ ′′ −
αi µ
ei
,
(20)
+ (1 − β)Q qP i=1
N
2
2σ
e
α
i=1 i i
P
where γ ′′ = ln 1−β
+ N
i=1 θi . The parameters αi and θi
β
are defined in (17) and (18) respectively.
Proof: Given in the technical report [13, Appendix C].
IV. S IMULATION R ESULTS
For simulation purposes, a cooperative nanonetwork is considered with diffusion coefficient D = 10−6 cm2 /s. The MUI
at each receiving node is modeled as a Gaussian distributed
RV with mean µi = µ
ei = µI = 4 × 1016 molecules/cm3
that is equivalent to five interfering transmissions, each with
Q = 3 × 109 molecules at a distance of 30 µm. Similar
to [8], the coefficient of variation of the medium is set as
0.3 with σi = σ
ei = 0.3µI . Fig. 2(a) shows the probability
of error Pe versus the number of molecules Q employed at
each node. For simulation, the distances between the source
and cooperative nanomachines, cooperative and destination
nanomachines, and the source and destination nanomachines
are set as di = dsr = 10 µm, dei = drd = 20 µm, i ∈ {1, 2, 3},
and d = 25 µm respectively. It can be observed from Fig.
2(a) that the analytical values obtained using (20) coincide
with those obtained from simulations, thus validating the
derived analytical results. One can also observe that the endto-end performance of the system is significantly enhanced by
cooperation in comparison to the direct source-destination only
communication scenario. Moreover, the end-to-end probability
of error decreases progressively as the number of cooperative
nanomachines N increases.
Figs. 2(b) and 2(c) compare the error rate of the cooperative molecular system with that of the existing multi-input
single-output (MISO) and single-input multi-output (SIMO)
systems proposed in [8] for a fixed number of molecules
and a fixed distance respectively. The number of cooperating
nanomachines is set as N = 2, with two nano-transmission
nodes at the information source for the MISO system, and
two reception nodes at the information sink for the SIMO
system. Further, the distance between each transmitting and
0
0
10
−2
10
N =1
−3
10
d = 25µm
−4
10
−5
10
−6
N =3
N =2
10
(c)
−1
10
di = 2d/3, dei = d/3
−2
10
di = d/3, dei = 2d/3
−3
10
di = dei = d/2
−4
10
Proposed
MISO, 2 Tx
SIMO, 2 Rx, MRC
−5
10
−7
10
0.2
0.4
0.6
0.8
1
1.2
1.4
Number of Molecules (Q)
1.6
1.8
2
10
x 10
Probability of Error (Pe )
10
10
(b)
Direct Communication
Proposed (Analytical)
Proposed (Simulated)
Probability of Error (Pe )
Probability of Error (Pe )
0
10
(a)
−1
0.9
1
1.1
1.2
1.3
1.4
Distance (d)
1.5
1.6
di = 20µm,
dei = 10µm
−1
10
−2
10
di = 10µm,
dei = 20µm
−3
10
−4
10
−5
Proposed
MISO, 2 Tx
SIMO, 2 Rx, MRC
di = dei = 15µm
10
0.4
1.7
−3
x 10
0.6
0.8
1
1.2
1.4
Number of Molecules (Q)
1.6
1.8
2
10
x 10
Error rate of the diffusion based cooperative molecular communication system for various scenarios with (a) direct communication
(b) MISO and SIMO systems with fixed number of molecules (c) MISO and SIMO systems with fixed distance.
Fig. 2.
receiving node in the SIMO and MISO systems is considered
to be d and 30 µm in Figs. 2(b) and 2(c) respectively. For a fair
comparison, the total molecules Q are uniformly distributed
among the transmitting nodes, i.e., Q0 = Q1 = Q2 = Q
3 in
the cooperative system, with Q0 = Q for the SIMO system,
and Q0,1 = Q0,2 = Q
2 for the MISO system. One can
observe from Fig. 2(b) that the performance of the molecular
communication systems with Q = 1×109 molecules degrades
as the distance increases. Moreover, it can be seen in Figs.
2(b)-(c) that the cooperative molecular system outperforms
the MISO and the SIMO systems for the scenario when the
distance between the source and cooperative nanomachines is
less than the distance between the cooperative and destination
nanomachines. This is owing to the fact that when di < dei ,
the cooperative nanomachines are able to decode the source
symbol correctly with high probability. Therefore, the endto-end performance under such a scenario is dominated by
the communication distance between the cooperative and the
destination nanomachines. On the other hand, for the scenario
with di > dei , the resulting probability of error at the cooperative nanomachines is relatively higher, leading to erroneous transmissions to the destination nanomachine. Hence,
the performance of the cooperative system is dominated by
the source-cooperative nanomachine distances. In contrast to
the SIMO system with Q0 = Q molecules, the cooperative
scenario uses Q0 = Q
3 molecules at the source. Therefore,
the cooperative system has a higher probability of error in
comparison to the SIMO system. However, the cooperative
system outperforms the MISO system for this scenario as well.
Moreover, a significant improvement in the error performance
is attained for the scenario when the cooperative nanomachines
are at equal distances from both the source and destination
nanomachines. Due to space limitations, additional simulation
results for detection performance at the destination nanomachine are presented in the technical report [13].
V. C ONCLUSION
This work presented a performance analysis for diffusion
based cooperative molecular communication systems wherein
multiple nanomachines cooperate with the source to enhance
the end-to-end reliability in the presence of MUI. Analytical
expressions were derived for the optimal test statistics at
the cooperative, destination nanomachines, together with the
resulting probabilities of detection, false alarm as well as the
end-to-end error rate. Moreover, the proposed system was seen
to yield a performance improvement in comparison to the
existing SIMO and MISO systems.
R EFERENCES
[1] A. Singhal, R. K. Mallik, and B. Lall, “Performance analysis of amplitude modulation schemes for diffusion-based molecular communication,” IEEE Trans. Wireless Commun., vol. 14, no. 10, pp. 5681–5691,
2015.
[2] T. Nakano, Y. Okaie, and J.-Q. Liu, “Channel model and capacity
analysis of molecular communication with Brownian motion,” IEEE
Commun. Lett., vol. 16, no. 6, pp. 797–800, 2012.
[3] M. Pierobon and I. F. Akyildiz, “A physical end-to-end model for molecular communication in nanonetworks,” IEEE J. Sel. Areas Commun.,
vol. 28, no. 4, pp. 602–611, 2010.
[4] T. Nakano, T. Suda, Y. Okaie, M. J. Moore, and A. V. Vasilakos,
“Molecular communication among biological nanomachines: A layered
architecture and research issues,” IEEE Trans. Nanobiosci., vol. 13,
no. 3, pp. 169–197, 2014.
[5] I. Llatser, E. Alarcón, and M. Pierobony, “Diffusion-based channel characterization in molecular nanonetworks,” in proc. 2011 IEEE Conference
on Computer Communications Workshops, 2011, pp. 467–472.
[6] I. Llatser, A. Cabellos-Aparicio, and E. Alarcon, “Networking challenges
and principles in diffusion-based molecular communication,” IEEE
Wireless Commun., vol. 19, no. 5, pp. 36–41, 2012.
[7] I. Llatser, A. Cabellos-Aparicio, M. Pierobon, and E. Alarcón, “Detection techniques for diffusion-based molecular communication,” IEEE J.
Sel. Areas Commun., vol. 31, no. 12, pp. 726–734, 2013.
[8] L.-S. Meng, P.-C. Yeh, K.-C. Chen, and I. F. Akyildiz, “MIMO communications based on molecular diffusion,” in proc. 2012 IEEE Global
Communications Conference, 2012, pp. 5380–5385.
[9] X. Wang, M. D. Higgins, and M. S. Leeson, “Relay analysis in molecular
communications with time-dependent concentration,” IEEE Commun.
Lett., vol. 19, no. 11, pp. 1977–1980, 2015.
[10] N. Tavakkoli, P. Azmi, and N. Mokari, “Performance evaluation and optimal detection of relay-assisted diffusion-based molecular communication with drift,” IEEE Trans. Nanobiosci., vol. 16, no. 1, pp. 34–42,
2017.
[11] A. K. Sadek, W. Su, and K. R. Liu, “Multinode cooperative communications in wireless networks,” IEEE Trans. Signal Process., vol. 55,
no. 1, pp. 341–355, 2007.
[12] K. R. Liu, Cooperative communications and networking. Cambridge
University Press, 2009.
[13] N. Varshney, A. Patel, and A. K. Jagannatham, “Technical
Report: Diffusion based cooperative molecular communication
in nano-networks,” IIT Kanpur, Tech. Rep., 2017, [Online]
http://www.iitk.ac.in/mwn/documents/MWNLab_TR_DCoop_2017.pdf
[14] Y. Moritani, S. Hiyama, and T. Suda, “Molecular communication
among nanomachines using vesicles,” in Proc. NSTI nanotechnology
conference, 2006, pp. 705–708.
[15] L.-S. Meng, P.-C. Yeh, K.-C. Chen, and I. F. Akyildiz, “On receiver
design for diffusion-based molecular communication,” IEEE Trans.
Signal Process., vol. 62, no. 22, pp. 6032–6044, 2014.
[16] A. Papoulis and S. U. Pillai, Probability, random variables, and stochastic processes. Tata McGraw-Hill Education, 2002.
[17] A. Ahmadzadeh, A. Noel, and R. Schober, “Analysis and design of
multi-hop diffusion-based molecular communication networks,” IEEE
Trans. Mol. Biol. Multi-Scale Commun., vol. 1, no. 2, pp. 144–157,
2015.
| 7cs.IT
|
Improvised Comedy as a Turing Test
arXiv:1711.08819v2 [cs.AI] 2 Dec 2017
Kory Mathewson ∗
Department of Computing Science
University of Alberta
Edmonton, Alberta, Canada
[email protected]
Piotr Mirowski ∗
HumanMachine
London, UK
[email protected]
Abstract
The best improvisational theatre actors can make any scene partner, of any skill level
or ability, appear talented and proficient in the art form, and thus "make them shine".
To challenge this improvisational paradigm, we built an artificial intelligence (AI)
trained to perform live shows alongside human actors for human audiences. Over
the course of 30 performances to a combined audience of almost 3000 people, we
have refined theatrical games which involve combinations of human and (at times,
adversarial) AI actors. We have developed specific scene structures to include
audience participants in interesting ways. Finally, we developed a complete show
structure that submitted the audience to a Turing test and observed their suspension
of disbelief, which we believe is key for human/non-human theatre co-creation.
1
Background
Theatrical improvisation is a form of live theatre where artists perform "real-time dynamic problem
solving" through semi-structured spontaneous storytelling [1]. Improvised comedy involves both
performers and audience members in interactive formats. We present explorations in a theatrical
Turing Test as part of an improvised comedy show. We have developed an artificial intelligence-based
improvisational theatre actor—a chatbot with speech recognition and speech synthesis, with a physical
humanoid robot embodiment [2, 3] and performed alongside it in improv showsA at performing
arts festivals, including ImproFest UK and the Brighton, Camden, and Edinburgh Fringe Festivals
[4]. Over these first 30 shows, one or two humans performed improvised scenes with the AI. The
performers strove to endow the AI with human qualities of character/personality, relationship, status,
emotion, perspective, and intelligence, according to common rules of improvisation [5, 6]. Relying
on custom state-of-the-art neural network software for language understanding and text generation,
we were able to produce context-dependent replies for the AI actor.
The system we developed aims to maintain the illusion of intelligent dialogue. Improvised scenes
developed emotional connections between imaginary characters played by humans and AI improvisors.
The human-like characterization elicited attachment for the AI from audience members. Through
various configurations (e.g. human-human, human-AI, and AI-AI) and different AI embodiments (e.g.
voice alone, visual avatar, or robot), we challenged the audience to discriminate between human- and
AI-led improvisation. In one particular game setup, through a Wizard-of-Oz illusion, we performed a
Turing test inspired structure. We deceived the audience into believing that an AI was performing,
then we asked them to compare that performance with a performance by an actual AI. Feedback
from the audience, and from performers who have experimented with our system, provide insight for
future development of improv games. Below we present details on how we debuted this technology
to audiences, and provide strictl anecdotal observations collected over multiple performances.
∗
A
Both authors contributed equally.
Show listings and recordings are available at https://humanmachine.live
31st Conference on Neural Information Processing Systems (NIPS 2017), Long Beach, California, USA.
Workshop on Machine Learning for Creativity and Design.
2
Methods
We named our AI improviser A.L.Ex, the Artificial Language Experiment, an homage to Alex the
Parrot, trained to communicate using a vocabulary of 150 words [7]. The core of A.L.Ex consists of
a text-based chatbot implemented as a word-level sequence-to-sequence recurrent neural network
(4-layer LSTM encoder, similar decoder, and topic model inputs) with an output vocabulary of 50k
words. The network was trained on cleaned and filtered subtitles from about 100k filmsA . Dialogue
turn-taking, candidate sentence selection, and sentiment analysis [8] on the input sentences are based
on heuristics. The chatbot communicates with performers through out-of-the-box speech recognition
and text-to-speech software. The chatbot runs on a local web server for modularity and allows for
integration with physical embodiments (e.g. parallel control of a humanoid robotB . The server also
enables remote connection which can override the chatbot and give dialog control to a human operator.
Further technological implementation details are provided by Mathewson and Mirowski [4].
An improvisational scene starts by soliciting suggestion for context from the audience (e.g., “nongeographical location” or “advice a grandparent might give”). The human performer then says several
lines of dialogue to prime the AI with dense context. The scene continues through alternating lines of
dialog between the human improviser(s) and the AI. Often through human justification, performers
aim to maintain scene reality and ground narrative in believable storytelling. A typical scene lasts
between 3-6 minutes, and is interrupted by the human performer when it reaches a natural ending
(e.g. narrative conclusion or comical high point).
The first versions of the improvising artificial stage companions had their stage presence reduced to
projected video and amplified sound. We evolved to physical embodiments (i.e. the humanoid robot)
to project the attention of the performer(s) and audience on a material avatar. Our robotic performers
are distinctly non-human in size, shape, material, actuation and lighting. We chose humanoid robotics
because the more realistic an embodiment is the more comfortable humans often are with it; though
comfort sharply drops when creatures have human-like qualities but are distinctly non-human [9].
The performances at the Camden and Edinburgh Fringe festivals involved a Turing test inspired scene
conducted with the willing audience. We performed the scene by first deceiving the audience into
believing that an AI was performing (whereas the chatbot and the robot were controlled by a human);
then we performed a second scene with an actual AI. In game (1), we explained the Turing test first,
then performed the two scenes consecutively and finally asked the audience to discriminate, through
a vote, which scene was AI-led. In a different game (2), we performed the Wizard-of-Oz scene and
then immediately asked, in character and as part of the performance, if the audience suspected that a
human was in control of the chatbot.
3
Preliminary Observations and Conclusions
We summarize here anecdotal observations from our performance. In game (1), nearly everyone
identified the AI from the human. However, we noted that in game (2) approximately half the
audience members believed that an AI was performing flawlessly alongside human improvisor(s).
When not forewarned about the Turing test, the audience (of various ages and genders) was convinced
that the dialog system understood the details of the scene and responded immediately and contextually.
The propensity of this delusion is likely driven by several factors: the context within which they are
viewing the deception, the lack of personal awareness of the current state-of-the-art AI abilities, and
emotional connections with the scene. Post-show discussions with audience members confirmed
that when a performer tells the audience that an AI is controlling the robot’s dialogue, the audience
members will trust this information. Being at an improvisational show, they expect to suspend
disbelief and use their imagination. Most of them were also unaware of capabilities and limitations of
state-of-the-art AI systems, which highlights the responsibility of the AI community to communicate
progress in AI effectively and to effectively invite public understanding of AI ability. Finally, we
observed that the introduction of a humanoid robot, with a human-like voice, increased the audiences’
propensity to immerse themselves in the imaginative narrative presented to them.
A
B
Subtitles from 100k movies were collected from https://opensubtitles.org
The robot was manufactured by https://www.ez-robot.com
2
We plan to conduct an experimental study of the audience beliefs in shared AI and human
creativity[10]. We hope to better understand the way that audiences enjoy art when co-created
by humans and AIs, to create better tools and mediums for human expression.
References
[1] Brian Magerko, Waleed Manzoul, Mark Riedl, Allan Baumer, Daniel Fuller, Kurt Luther, and
Celia Pearce. An empirical study of cognition and theatrical improvisation. In Proceedings of
the seventh ACM conference on Creativity and cognition, pages 117–126. ACM, 2009.
[2] Ken Perlin and Athomas Goldberg. Improv: A system for scripting interactive actors in virtual
worlds. In Proceedings of the 23rd annual conference on Computer graphics and interactive
techniques, pages 205–216. ACM, 1996.
[3] Barbara Hayes-Roth and Robert Van Gent. Improvisational puppets, actors, and avatars. In
Computer Game Developers Conference, 1996.
[4] Kory Mathewson and Piotr Mirowski. Improvised theatre alongside artificial intelligences. In
AAAI Conference on Artificial Intelligence and Interactive Digital Entertainment, 2017.
[5] Keith Johnstone. Impro: Improvisation and the theatre. Routledge, 2012.
[6] Mick Napier. Improvise: Scene from the inside out. Heinemann Drama, 2004.
[7] Irene M Pepperberg and Irene M Pepperberg. The Alex studies: cognitive and communicative
abilities of grey parrots. Harvard University Press, 2009.
[8] Clayton J Hutto and Eric Gilbert. Vader: A parsimonious rule-based model for sentiment
analysis of social media text. In Eighth international AAAI conference on weblogs and social
media, 2014.
[9] Masahiro Mori. The uncanny valley. Energy, 7(4):33–35, 1970.
[10] Jürgen Schmidhuber. Formal theory of creativity, fun, and intrinsic motivation (1990–2010).
IEEE Transactions on Autonomous Mental Development, 2(3):230–247, 2010.
Supplementary Material
Acknowledgments
We would like to acknowledge the fantastic collaborators and supporters throughout the project, in
particular Adam Meggido, Colin Mochrie, Matt Schuurman, Paul Blinov, Lana Cuthbertson, Patrick
Pilarski, as well as Alessia Pannese, Stephen Davidson, Stuart Moses, Roisin Rae, John Agapiou,
Arfie Mansfield, Luba Elliott, Shama Rahman, Holly Bartolo, Benoist Brucker, Charles Sabourdin,
Katy Schutte and Steve Roe. Thank you to Rapid Fire Theatre for a space for new ideas to flourish.
Illustrations
Figure 1: System diagram of the Artificial Language Experiment (A.L.Ex).
3
Figure 2: Visual and physical embodiments of the AI improviser.
Figure 3: Two human performers and an audience volunteer improvising with a robot.
4
| 2cs.AI
|
Berezin quantization of noncommutative projective varieties
Andreas Andersson
arXiv:1506.01454v8 [math.OA] 4 Feb 2018
Email: [email protected]
Max Planck Institute for Mathematics in the Sciences. Inselstrasse 22, D-04103 Leipzig, Germany
Wollongong University, School of Mathematics and Applied Statistics, 2522 Wollongong, Australia
Mathematics Subject Classification 2010 Primary: 58B32; Secondary: 58B34, 46L89
Keywords: Berezin quantization, Toeplitz operators, Cuntz–Pimsner algebras, compact quantum groups, generalized
inductive limits, noncommutative geometry, subproduct systems, noncommutative random walks, Arveson’s conjecture,
balanced metrics.
February 6, 2018
Abstract
We use operator algebras and operator theory to obtain new result concerning Berezin quantization of compact Kähler manifolds. Our main tool is the notion of subproduct systems of finitedimensional Hilbert spaces, which enables all involved objects, such as the Toeplitz operators, to be
very conveniently expressed in terms of shift operators compressed to a subspace of full Fock space.
This subspace is not required to be contained in the symmetric Fock space, so from finite-dimensional
matrix algebras we can construct noncommutative manifolds with extra structure generalizing that
of a projective variety endowed with a positive Hermitian line bundle and a Kähler metric in the class
of the line bundle. Even in the commutative setting these constructions are very fruitful. Firstly, we
show that the algebra of smooth functions on any smooth projective variety can be quantized in a
strong sense of inductive limits, as was previously only accomplished for homogeneous manifolds. In
this way the Kähler manifold is recovered exactly from quantization and not just approximately. Secondly, we obtain a strict quantization also for singular varieties. Thirdly, we show that the Arveson
conjecture is true in full generality for shift operators compressed to the subspace of symmetric Fock
space associated with any homogeneous ideal. For noncommutative examples we consider homogeneous spaces for compact matrix quantum groups which generalize q-deformed projective spaces,
and we show that these can be obtained as the cores of Cuntz–Pimsner algebras constructed solely
from the representation theory of the quantum group. We also discuss interesting connections with
noncommutative random walks.
Contents
1
Introduction
1.1 Kähler geometry . . . . . . . . . .
1.2 Algebraic geometry . . . . . . . .
1.3 Operator algebra . . . . . . . . . .
1.4 Operator theory . . . . . . . . . .
1.5 Quantum homogeneous manifolds
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
1
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
3
3
5
6
7
8
2
3
4
5
6
7
Subproduct systems
2.1 Basic properties . . . . .
2.2 Toeplitz algebras . . . . .
2.2.1 The Toeplitz core
2.2.2 The right shifts .
2.2.3 Normal ordering
2.3 Cuntz–Pimsner algebras .
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
9
9
10
11
11
12
12
Review of quantization of projective varieties
3.1 Berezin quantization with prequantum condition
3.2 Projectively induced quantization . . . . . . . .
3.3 The circle bundle . . . . . . . . . . . . . . . . .
3.4 Singular varieties . . . . . . . . . . . . . . . . .
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
13
13
15
17
18
Inductive limits
4.1 Relaxed definition of inductive limits . . . . .
4.2 Inductive limits from subproduct systems . . .
4.3 Cuntz–Pimsner algebras from inductive limits
4.4 Formulas for covariant symbols . . . . . . . . .
4.5 Commutative case and the Arveson conjecture
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
19
19
21
23
24
25
Projective limits
5.1 Relaxing the notion of projective limit . .
5.2 Changing the inner products . . . . . . .
5.3 The isometries . . . . . . . . . . . . . . .
5.4 Projective system for subproduct systems
5.5 The state on OH . . . . . . . . . . . . . .
5.6 Contravariant symbols . . . . . . . . . .
5.7 The asymptotic multiplication . . . . . .
5.8 The adjoint of the total Toeplitz map . .
(0)
5.9 OH as a projective limit . . . . . . . . .
5.10 Strict quantization . . . . . . . . . . . . .
5.11 OH assembled from projective limits . . .
5.12 Commutative case . . . . . . . . . . . . .
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
26
27
27
28
30
32
33
35
35
37
38
39
39
Application to compact matrix quantum groups
6.1 Compact matrix quantum groups . . . . . . . . . . . . .
6.1.1 Representations and actions . . . . . . . . . . . .
6.1.2 Universal quantum groups . . . . . . . . . . . . .
6.1.3 The dual discrete quantum group . . . . . . . . .
6.2 First-row and first-column algebras . . . . . . . . . . . .
6.3 Subproduct systems of G-representations . . . . . . . . .
6.4 Berezin quantization of C(G/K) . . . . . . . . . . . . . .
6.4.1 Covariant symbols as first-row matrix coefficients
6.4.2 Intertwining the actions . . . . . . . . . . . . . .
6.4.3 C(G/K) as an inductive limit . . . . . . . . . . .
6.4.4 C(SG ) as an inductive limit . . . . . . . . . . . .
6.5 Comparison with Poisson and Martin boundaries . . . .
6.5.1 Poisson integral versus total Toeplitz map . . . .
6.5.2 Markov operator . . . . . . . . . . . . . . . . . .
6.5.3 Martin boundaries . . . . . . . . . . . . . . . . .
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
40
40
40
42
42
44
45
46
46
46
47
49
49
49
50
51
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
Concluding remarks
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
52
2
8
References
52
1 Introduction
With motivations from physics, Berezin introduced a way of approximating projective compact Kähler
manifolds M by finite-dimensional matrix algebras B(Hm ) parameterized by m ∈ N0 [Bere1, Bere2,
CGR1, Lan2, Schl1]. When M = G/K is a homogeneous space of some Lie group G, each Hilbert
space Hm carries an irreducible representation of G, and it is obtained by the Borel–Weil construction:
Hm is the space of holomorphic sections of a suitable line bundle L⊗m over M .
In order to apply Berezin quantization to quantum physics, the parameters (time or temperature
or energy etc.) should be chosen such that the limit m → ∞ simplifies the description of the system
at hand. This is a powerful method; for instance it gives the Hartree–Fock approximation as a special
case [Raj1]. The limit behavior is captured by a classical (compact Kähler) manifold M .
Nowadays it is however becoming more and more important to have a versatile theory of open
quantum systems. Recently we observed how to obtain a simplifying infinite-m limit in the standard
framework of quantum channels as driving the evolution of open quantum systems [An4, An5]. It so
happens though, that the infinite-m system is (in general) not given by a classical manifold but by
a noncommutative manifold, i.e. there is a noncommutative C ∗ -algebra C(M) which is supposed to
encode the properties of the dynamics and which is a surprisingly good analogue of the commutative
C ∗ -algebra C(M ) of continuous functions on a projective variety M . Here we use the symbol M
for a nonexisting object appearing only in the notation for the algebra C(M), while M denotes an
honest manifold. Such a C ∗ -algebra C(M) of continuous functions on a “noncommutative projective
variety” will be obtained as an inductive limit of matrix algebras B(Hm ). These in turn arise from
a sequence H• = (Hm )m∈N0 of finite-dimensional Hilbert spaces such that Hm+l ⊆ Hm ⊗ Hl for
all m, l ∈ M0 . Such a sequence has been referred to as a “subproduct system” [ShSo1] and it
generalizes the structure needed to perform ordinary Berezin quantization. In [An4] we discussed the
physical meaning of the special case when M = G/K is a “projective” quantum homogeneous space
(a generalization of compact coadjoint orbits).
The purpose of the present paper is to introduce and study the C ∗ -algebras C(M) defining these
noncommutative manifolds. They will be constructed in such a way that they possess a lot of extra
structure generalizing that complex-analytic structure, a positive line bundle and a Kähler metric.
The construction is new also in the commutative setting and we will solve some very interesting
problems in operator theory which provide new insight in the geometry of compact Kähler manifolds.
In this way we set the stage for a new interplay between operator theory and complex differential
geometry. We begin by outlining the results from several different viewpoints.
1.1 Kähler geometry
Let (M, L) be a polarized manifold, i.e. M is a compact connected complex-analytic manifold
admitting a Kähler metric and L is a holomorphic line bundle over M with the property that any
choice of basis for the finite-dimensional vector space H 0 (M ; L) of holomorphic sections of L gives
a holomorphic embedding of M into the projective space CPn−1 , where n := dim H 0 (M ; L). For
m ∈ N, let Lm be the mth tensor power of the line bundle L and let L0 = OM be the trivial
holomorphic line bundle. The idea of Berezin quantization is that if one chooses an inner product
on H 0 (M ; Lm ) for each m, so that we obtain a sequence H• = (Hm )m∈N0 of Hilbert spaces, then
the finite-dimensional matrix algebras B(Hm ) should give an increasingly good approximation of the
C ∗ -algebra C(M ) of continuous functions on M as m goes to infinity. This works for any polarized
manifold (M, L) [BMS] if the inner product on each Hm is given by
hφ|ψih,ω := md
ˆ
hm (φ(x), ψ(x))
M
3
ω(x)d
,
d!
∀ψ, φ ∈ H 0 (M, Lm )
for some fixed Kähler metric ω on M and a Hermitian metric h on L related to the Kähler metric
via the “prequantum condition”
√
¯ log h = ω.
(1.1)
−1∂∂
The approximation of C(M ) by the matrix algebras B(Hm ) is, more precisely, a “strict quantization”
of C(M ) realized by explicit surjective positive maps (“Toeplitz maps”) (see §3 for more details)
ς˘(m) : C(M ) → B(Hm )
and explicit injective positive maps (covariant symbol maps)
ς (m) : C(M ) → B(Hm ).
such that ς (m) is the adjoint of ς˘(m) with respect to the inner product on B(Hm ) and C(M ) defined
by the trace and by ω respectively, and such that the “Berezin transforms” ς (m) ◦ ς˘(m) converge to
the identity map on C(M ) as the “quantum number” m goes to infinity.
One could imagine however, that it should be possible to approximate C(M ) in some stronger
sense. It turns out that is not true for any polarized manifold (M, L), if we want the prequantum condition (1.1). We are now interested in the problem of relating properties of (M, L) to the
well-behavedness of the quantization H• . As has been well known every since the beginnings of quantization theory, and made very clear in [CGR1, CGR2], if (M, L) is a homogeneous manifold then
it can be quantized in a stronger sense than that provided by a strict quantization. Hawkins made
this very explicit in a C ∗ -algebraic setting [Hawk1] by realizing C(M ) as an inductive limit of the
matrix algebras B(Hm ). We shall show that these inductive limits are arising very intrinsically from
a choice of embedding M ֒→ CPn−1 and that the construction works for any projective variety M if
we drop the prequantum condition (1.1) and instead choose h and ω to be related in a different way.
In fact we need not refer to Hermitian metrics or Kähler metrics for the construction of the inductive
limit, and the covariant symbol ς (m) and the Toeplitz maps ς˘(m) arise naturally from the very maps
ιm,l : B(Hm ) → B(Hl ) which defines the inductive system. Nevertheless it is easy to recover the
metrics h and ω such that ς (m) and ς˘(m) attains the same geometric meaning as before.
Thus we drop the prequantum condition (1.1) and instead look at the Hilbert spaces Hm obtained
from a sequence (ω, hm ) where the metric on Lm varies with m ∈ N0 , or equivalently a sequence
(ωm , h) where the Kähler metric varies with m; the important datum is the sequence H• = (Hm )m∈N0
of Hilbert spaces. We call H• a “projectively induced quantization” of (M, L) (again see §3 for details)
if H• is a subproduct system in the sense of [ShSo1], i.e.
Hl ⊂ Hm ⊗ Hl−m ,
∀m ≤ l ∈ N.
This is the condition which allows the construction of an inductive system of unital completely
positive maps
ιm,l : B(Hm ) → B(Hl ),
∀m ≤ l ∈ N0
such that C(M ) is recovered as a C ∗ -algebra as the limit of the matrix algebras B(Hm ) as m goes to
infinity.
An inductive system which recovers C(M ) could possibly be constructed also from a prequantum
quantization, but the inductive system will have less nice properties, depending on the geometry of
M . It would be interesting to study further if one could characterize (“stability”) properties of M
as existence of an inductive system of matrix algebras with certain properties (see Conjecture 1.2
below).
What is special to the case when M is a coadjoint orbit is that then the maps ιm,l intertwine
the tracial states. In that case Hawkins showed that one obtains C(M ) as a projective limit is well
[Hawk2]. He also showed that a similar construction works for general polarized manifolds if one uses
a prequantum quantization [Hawk2]. Our contribution is the description of these constructions on a
single Hilbert space, namely the Hilbert-space direct sum
M
Hm ,
HN :=
m∈N0
4
which (as will be discussed in much more detail in future work) can be realized as a Hilbert space of
analytic functions on a subvariety of the unit ball in Cn (cf. [DRS1, DRS2]). The space HN sits as a
subspace of the symmetric Fock space H∨N over H1 , and the point is that H∨N can be identified with
the so-called Drury–Arveson space which has a very central role in multivariable operator theory.
Our ongoing work uses the results of the present paper to study the geometry of (M, L), in particular
the stability of vector bundles over M , using operator theory in Drury–Arveson space.
The subproduct property of the sequence H• says precisely that HN is invariant under the backward
shifts on H∨N . The inductive and projective limits mentioned above encode the data of a “strict
quantization”, as needed to generalize the classical setting, but they are much more convenient than
just knowing that there is a strict quantization because they are constructed using the shift operators
on HN . The notion of subproduct systems and the associated operator algebras of shift operators
provide a machinery for explicit calculations that has previously been available mainly in the case of
CPn−1 , where Berezin quantization and fuzzy geometry has been successfully described in terms of
creation and annihilation operators (the unnormalized shift operators) (see e.g. [BDLMC]).
1.2 Algebraic geometry
There is an analogue of Berezin quantization in projective algebraic geometry saying that the vector
spaces H 0 (M ; Lm ) of algebraic sections of higher tensor powers of a very ample line bundle L over
a projective complex variety M ⊂ CPn−1 determine all coherent sheaves on M . Namely, take the
Abelian category gr(A) of finitely generated graded modules over the graded algebra
M
H 0 (M ; Lm ).
A=
m∈N0
Elements of A are not functions on the variety M . In order to pass to objects defined on M we have
to work modulo the modules which are finite-dimensional as vector spaces over C, by replacing the
homomorphism spaces Homgr(A) (E, F ) by
Homqgr(A) (E, F ) := lim Homgr(A) (E≥m , F ),
m→∞
L
where E≥m := l≥m El is a tail of a graded A-module E = k∈Z Ek . It was shown in [Serre2] that in
this way we obtain an Abelian category qgr(A) which is equivalent to the Abelian category coh(M ) of
coherent sheaves on M . This result is also the starting point for noncommutative projective
L algebraic
geometry [ArZh1], namely one starts with a finitely generated graded algebra A =
m∈N0 Am
satisfying less stringent assumptions than commutativity and one studies the category qgr(A) guided
by the geometric intuition from analogy with commutative algebraic geometry.
Our observation in §4 is that if we endow the subspaces Am ⊂ A by inner products such that
the resulting Hilbert spaces Hm form a subproduct system then the above inductive system can be
explicitly described by unital completely positive maps and is compatible with the inner products in
a sense (namely we obtain a generalized inductive
limit of C ∗ -algebras as described below). Instead
L
of A one considers a N0 -graded ring R = m∈N0 Rm which can be concretely described as a (non∗-closed) algebra of operators on the Fock space HN . The limit
L
0
B∞ := lim Endgr(R) (R≥m )
m→∞
exists for the same reason as in the case of A. We show that 0 B∞ coincides with the normally ordered
part of the algebraic “Cuntz–Pimsner core” of the subproduct system (for the definitions see §2). In
the commutative case it is the algebra of real-algebraic C-valued functions on the variety M ⊂ CPn−1
associated with H• . Moreover, there is a natural norm on 0 B∞ such that its completion B∞ is (in
the commutative case) the C ∗ -algebra C(M ) of continous functions on M .
The quotient category qgr(R) is (as will be discussed in another publication) in the commutative
case equivalent to the category of torsionfree modules over the sheaf of real-algebraic functions on the
variety M . From there it is easy to go to modules over the sheaf of continuous functions. Thus we are
5
discussing a continuous version of Serre’s theorem and thereby a continuous analogue of Artin–Zhang
approach to noncommutative projective geometry.
The ring A is contained as a graded subring of R,
Am ⊂ Rm ,
∀m ∈ N0 ,
and one can define a “holomorphic structure” on (the continuous extensions of) objects in qgr(R)
as an operator on modules over B∞ possessing certain properties. Then we are lead to the following
research problem:
Problem 1.1 (Noncommutative GAGA). Find examples of noncommutative N0 -graded algebras A
such that qgr(A) is equivalent to the holomorphic subcategory of qgr(R).
The works [DRS1, DRS2] can be regarded as an operator-theoretic approach to noncommutative
projective geometry using shift operators on Fock space. What we are doing here suggest that this
gives the analytic version of Artin–Zhang’s algebraic approach.
1.3 Operator algebra
The C ∗ -algebra B∞ is a special case of a “generalized inductive limit” of C ∗ -algebras in the sense of
[BlKi1]. What is special with the inductive system coming from a subproduct system is not only that
it is “NF”, i.e. defined by completely positive maps, but also that the underlying algebraic inductive
limit of sets is already an algebra.
A tracial state ω on a C ∗ -algebra such as B∞ can have finite-dimensional approximation properties of various strengths, e.g. “quasidiagonality”, “uniform quasidiagonality”, “amenability” and
“uniform amenability”; see [Brow1, §3]. These notions involve tracial states φm : B(Hm ) → C on
finite-dimensional matrix algebras such that ω is in some sense the limit of the φm ’s as m → ∞,
in that there are completely positive maps ς˘(m) : B∞ → B(Hm ) intertwining ω and φm up to some
error. In this case we call (˘
ς (m) )m∈N0 an explicit realization of the approximation property of ω.
Consider the case of a commutative smooth projective variety M , where as mentioned we shall
show that the inductive limit B∞ coincides with C(M ). Berezin quantization can be regarded as
an explicit realization of the quasidiagonality of states on C(M ), namely the states associated with
volume forms of Kähler metric on M . The point is not to show that some traces are quasidiagonal,
but to obtain an explicit realization where the approximating finite-dimensional tracial states φm :
B(Hm ) → C are defined on matrix algebras whose dimension nm = χ(OM (m)) depend on the
complex-analytic structure of M.
With a prequantum quantization H• of (M, L) one will not obtain a subproduct system unless
the quantization is “regular” in the sense of [CGR2]. However, Blackadar–Kirchberg’s notion of
generalized inductive limit is very general and one can probably still obtain C(M ) as such an inductive
limit, albeit in a weaker sense than as the Cuntz–Pimsner algebra of a subproduct system. If one
could characterize precisely the properties of such an inductive limit needed for the existence of a
constant scalar curvature Kähler metric in the class c1 (L), one could hope to find the correct stability
condition on the manifold (M, L) which characterizes the existence of such a metric.
By analogue with the Donaldson–Tian–Yau conjecture about the equivalence of the exstence of a
constant scalar curvature Kähler metric and some stability property (“K-stability”) [Don9, Don12,
Tian1, Tian2] we formulate the following speculative but suggesting conjecture:
Conjecture 1.2. There exists an approximation property (say “QK-stability”) of traces on C ∗ algebras (perhaps quasidiagonality or amenability) such that the following holds: If ω is a Kähler
form on a smooth projective variety M ⊂ CPn−1 then ω has constant scalar curvature if and only if
there is a prequantum quantization H• of ω which explictly realizes ω as a QK-stable state on C(M ).
The inductive and projective limits constructed in the present papers may serve as guidance for
less well-behaved structures associated with quantizations with prequantum condition. Our ongoing
work is more focused on showing that such a characterization is possible for the analogous problem
of stability of vector bundles (where the analogue of the Donaldson–Tian–Yau conjecture is known
to be true [LuTe1]).
6
1.4 Operator theory
L
Starting from any subproduct system H• = (Hm )m∈N0 one can form its Fock space HN := m∈N0 Hm ,
L
which is a subspace of the full Fock space H⊗N := m∈N0 H⊗m which is invariant under the backward
shift operators. The shift operators S1 , . . . , SL
n on HN commute pairwisely if and only if HN is
contained in the symmetric Fock space H∨N = m∈N0 H∨m , where H∨m denotes the mth symmetric
tensor power of the Hilbert space H = H1 = Cn . The symmetric Fock space H∨N can be identified
with a Hilbert space of analytic functions on the unit ball Bn ⊂ Cn , called the Drury–Arveson
space and usually denoted by Hn2 , in such a way that the shifts on H∨N identify with the operators
M1 , . . . , Mn on Hn2 acting by multiplication by the coordinate functions z1 , . . . , zn on Bn .
Subspaces of Hn2 which are invariant under the adjoint shifts M1∗ , . . . , Mn∗ (briefly, “quotient
modules” of Hn2 ) have a simple description generalizing that of the Beurling representation of quotient
modules of the Hardy space H12 = H 2 (S1 ) of the unit circle [McTr1]. The most basic open question
about these quotient modules is whether the following is true.
Conjecture 1.3 (Arveson’s conjecture). Let HN be a graded quotient module of the Drury–Arveson
space H∨N . Then the shift operators S1 , . . . , Sn on HN form an essentially normal n-tuple, i.e.
[Sj∗ , Sk ] ∈ K,
∀j, k = 1, . . . , n.
In the present paper we shall prove Conjecture 1.3 by operator-algebraic methods. Moreover, the
geometric interpretations discussed here lead to an alternative more geometric proof which we will
present in a separate paper.
The conjecture has been proven previously in several special cases by different means (see e.g.
[Arv8, Arv9, Doug4, DoWa2, DoWa4, EnEs1, Esch1, Kenn1, KeSh1, KeSh2, Sha3] and references
therein), and the proofs have provided great new insights in the structure of submodules and quotient
modules of Drury–Arveson space, Hardy space and Bergman space. It is probably not possible to
have essential normality for any quotient module, as counterexamples have been found e.g. in the
case of the Hardy space of the polydisk [Doug4], and one has to restrict attention to some special
subclass of quotient modules. In relation to projective geometry one only needs graded quotient
modules, which is why Conjecture 1.3 is very important there.
Let TH be the C ∗ -algebra generated by S1 , . . . , Sn and let OH be the quotient TH /K by the ideal
of compact operators. Then Conjecture 1.3 can be reformulated by saying that the C ∗ -algebra OH
is commutative. The algebras TH and OH both have a natural Z-grading due to the grading of HN .
Our proof of the essential normality of the tuple (S1 , . . . , Sn ) is based on the observation that the
(0)
degree-0 part OH of OH can be constructed as an inductive system of sets. The inductive system
is given by explicit unital completely positive maps ιm,l : B(Hm ) → B(Hl ) for m ≤ l ∈ N0 . To show
that the limit is a unital C ∗ -algebra it is therefore enough to show that the ιm,l ’s are “asymptotically
multiplicative”. To see this we forget about the Hilbert-space structure and regard the ιm,l ’s as maps
between matrix rings. Then we observe that these matrix rings all sit inside a bigger N0 -graded ring
R and that the inductive system is of a certain type which is known to have a ring structure on the
set-theoretic limit.
The importance of the Arveson conjecture comes from the fact that, if the C ∗ -algebra TH generated
by S1 , . . . , Sn on HN is commutative modulo compacts, we have a short exact sequence of C ∗ -algebras
0 → K → TH → C(S) → 0,
where S is a subset of the unit sphere S2n−1 in Cn . Taking the U(1)-invariant part of this sequence
one obtains
(0)
0 → Γ0 → TH → C(M ) → 0,
and M is a compact Kähler manifold endowed with a positive line bundle L with associated circle
(0)
bundle equal to S. The algebra TH acts on HN which, just as the ambient space Hn2 , has the
property that every invariant subspace under S1 , . . . , Sn has a “Beurling decomposition” [McTr1].
Such submodules give rise to coherent sheaves on M and sometimes to vector bundles over M . We
expect that vector bundles arising like this have certain stability properties not possessed by an
arbitrary vector bundle over M .
7
1.5 Quantum homogeneous manifolds
Smooth projective varieties include in particular all coadjoint orbits G/K and, going noncommutative, we observe that every compact matrix quantum group G defines a “noncommutative manifold”
G/K with properties resembling very much those of a coadjoint orbit. Our main aim is then to show
that the C ∗ -algebra C(G/K) can be recovered from a suitably chosen subproduct system H• via the
noncommutative version of strict quantization sketched above.
In fact the definition of G/K is very simple. Let G be a compact matrix quantum group with
defining unitary representation u ∈ Mn (C) ⊗ C(G). We let zj := u1,j for j = 1, . . . , n denote the
elements of the first row of u. Then C(G/K) is defined as the C ∗ -algebra generated by elements
of the form zj1 · · · zjm zk∗m · · · zk∗1 for all multi-indices (j1 , . . . , jm ) and (k1 , . . . , km ) of equal length.
We also denote by C(SG ) the C ∗ -algebra generated by z1 , . . . , zn (and refer to it as the “first-row
algebra”).
Suppose that the compact matrix quantum group G is such that every element of C(G/K) can be
“normally ordered”, in the sense that all zj∗ ’s are to the right of the zk ’s (this is a crucial assumption).
Assume also that the Haar state is faithful on C(G/K). As recalled in §6.1, every compact quantum
group G has a dual discrete quantum group Ĝ, and both G and Ĝ “act” on the C ∗ -algebra C(G).
Hence they also act on the subalgebra C(SG ).
Theorem 1.4. For each m ∈ N0 , let Hm be the Hilbert space spanned by products zj1 · · · zjm with
inner product coming from the Haar measure on G (the sequence of Hm ’s is the “G-subproduct system”
H• ). Then there are explicit G-Ĝ-biequivariant injections (“Berezin covariant symbol maps”)
(m)
: B(Hm ) → C(G/K)
ςG
and explicit surjections (“Toeplitz quantization maps”)
(m)
: C(G/K) → B(Hm )
ς˘G
(m)
(m)
such that ςG ◦ ς˘G
isomorphism
converges point-norm to the identity on C(G/K) as m → ∞. This effects an
C(SG ) ∼
= OH
of the first-row algebra C(SG ) with the Cuntz–Pimsner algebra OH of the subproduct system H• , and
this isomorphism is equivariant for the natural ergodic actions of G and its discrete dual group Ĝ.
(0)
Denoting by OH the U(1)-invariant part of OH under the gauge action, we also have
(0)
C(G/K) ∼
= OH ,
(0)
(1.2)
(0)
and it is the C ∗ -algebra OH which will occupy most of the paper. We will first realize OH as a
“generalized inductive limit” in the sense of [BlKi1], [Hawk1] (as in the case of a general subproduct
system as described before), and then as a generalized projective limit in the spirit of [Hawk1]. Then
we do the same thing for C(G/K) to obtain the desired isomorphism (1.2).
The quantization of coadjoint orbits is studied in detail in [Hawk1] and [Rie2]. Berezin quantization for quantum homogeneous spaces of compact quantum groups with tracial Haar state was
discussed in [Sain].
The idea of looking at the G-subproduct system was partially motivated by Woronowicz’ reconstruction of a compact matrix quantum group G from its irreducible representations [Wor3]. Since
H• only contains a subset of all irreducible representations (in general), we recover not C(G) but
C(SG ).
For a classical manifold M , with quantization defined by a line bundle L over M , elements
(k)
(m)
of OH are continuous sections of the line bundle L⊗k . The subspace Hm ⊂ OH consists of the
holomorphic sections of the line bundle. For M = G/K a homogeneous space, the Hm ’s are irreducible
(k)
(0)
representations of G. In general, the subspaces OH for k ∈ Z \ {0} are Hilbert modules over OH ,
8
and for a quantum homogeneous space M = G/K each Hm is an irreducible representation of G. In
this sense, OH is a kind of “Borel–Weil algebra” for G (cf. [Seg1, Thm. 14.1]).
We shall also compare our results with “noncommutative random walks” on duals of compact
(0)
quantum groups [Iz1, INT1, Iz4]. The Toeplitz core TH plays the role of Martin compactification
(0)
of a walk restricted to the “dual” of G/K while OH is the boundary of the walk. Recalling that
the simplest Cuntz–Pimsner algebras C(S2n−1 ) of functions on spheres behave like boundaries of the
corresponding Toeplitz algebras, these observations are not too surprising.
This shows that in the presence of time-reversal symmetry, one obtains a noncommutative random walk, not on the dual of a compact quantum group, but on the dual of a compact quantum
homogeneous space. In this way one can use results from the theory of noncommutative random
walks to study physically relevant quantum walks, even though these two notions of “walks” are a
priori completely unrelated. Most significant is the possibility to describe the infinite-time limit in
a mathematically rigorous way, as provided by the Martin boundary of a noncommutative random
walk (or rather, since we really end up with random walks on homogeneous spaces, one has the
dequantization manifold replacing the Martin boundary as the infinite-time limit).
Acknowledgment. The author thanks Adam Rennie for great comments, support and inspiration.
Many thanks also to Orr Shalit and Guy Salomon for finding an important error in an earlier version
of this paper. We thank Orr Shalit also for other remarks of great value.
2 Subproduct systems
2.1 Basic properties
In this paper we write N0 := N ∪ {0} = {0, 1, 2, . . . }.
Definition 2.1. [[ShSo1, Def. 6.2]] A subproduct system is a sequence H• = (Hm )m∈N0 of finitedimensional Hilbert space Hm such that H0 = C and
Hm+l ⊆ Hm ⊗ Hl ,
∀m, l ∈ N0 .
(2.1)
We shall always denote H1 by H and, throughout this paper, n ∈ N will always be the dimension
of H,
H∼
= Cn .
Example 2.2. Given a finite-dimensional Hilbert space H, we set Hm := H⊗m for each m and refer to
it as the “product system” associated with H. Another example of a subproduct system is obtained
by taking Hm := H∨m to be the mth symmetric power of H; this is the “symmetric subproduct
system”.
Definition 2.3. A subproduct system is commutative if Hm ⊆ H∨m for all m ∈ N0 .
Lemma 2.4. [[ShSo1, Lemma 6.1]] Let H• be a subproduct system. Then the projections pm :
H⊗m → Hm satisfy
pl (pm ⊗ pl−m )pl = pl = pl (pl−m ⊗ pm )pl
(2.2)
whenver m ≤ l.
Proof. Replacing l by l − m for m ≤ l, the condition (2.1) reads
Hl ⊆ Hm ⊗ Hl−m ,
∀m ≤ l ∈ N0 .
Writing (2.3) in terms of projections,
pl ≤ pm ⊗ pl−m ,
the result is clear.
9
(2.3)
Definition 2.5. The Fock space associated with a subproduct system H• is the Hilbert space
M
HN :=
Hm .
m∈N0
P
L
We regard HN as a subspace of full Fock space H⊗N := m∈N0 H⊗m and denote by pN = m∈N0 pm
the projection from H⊗N onto HN . Thus pN is the identity in B(HN ), just as pm is the identity in
B(Hm ).
Example 2.6. If H• = H⊗• is the product system over a fixed Hilbert space H then HN is the full
(or “Boltzmannian”) Fock space H⊗N over H.
Example 2.7. If H• = H∨• is theLfull commutative subproduct system then HN is the symmetric
(or “Bosonic”) Fock space H∨N := m∈N0 H∨m over H.
Notation 2.8. We denote by Chzi = Chz1 , . . . , zn i the algebra of polynomials in n freely commuting
variables. We denote by C[z] = C[z1 , . . . , zn ] the algebra of polynomials in n commuting variables.
P
For any polynomial f (z1 , . . . , zn ) = j1 ,...,jn fj1 ,...,jn z1j1 · · · znjn in Chz1 , . . . , zn i, evaluation on the
basis e1 , . . . , en for H = H1 defines an element in Fock space,
X
fj1 ,...,jn ej11 ⊗ · · · ⊗ ejnn ∈ HN ,
f (e1 , . . . , en ) :=
j1 ,...,jn
and f is homogeneous iff
f (e1 , . . . , en ) ∈ H⊗m ,
for some m ∈ N0 .
Lemma 2.9. Every subproduct system H• = (Hm )m∈N0 defines a homogeneous ideal in Chzi, where
n = dim(H). Conversely, every homogeneous ideal in Chzi corresponds to a subproduct system
[ShSo1, Prop. 7.2]. For commutative subproduct systems the same is true with C[z] instead [DRS1,
§2.3].
Sketch of proof. Given H• , define a homogeneous ideal I in Chzi by
I := {f ∈ Chzi|f (e1 , . . . , en ) ∈ H⊗m ⊖ Hm for some m ∈ N0 }.
Conversely, given a homogeneous ideal I, we associate the Hilbert spaces
Hm := H⊗m ⊖ {f (e1 , . . . , en )|f ∈ I (m) },
where I (m) is the degree-m component of I.
2.2 Toeplitz algebras
Having fixed a subproduct system H• , we shall always denote by S1 , . . . , Sn the operators on Fock
space HN defined by
Sk φ := pm+1 (ek ⊗ φ),
∀φ ∈ Hm
for all m ∈ N0 , where pm+1 : H⊗(m+1) → Hm+1 is the orthogonal projection. They are the compressions to HN of the left shifts ψ → ek ⊗ ψ on full Fock space H⊗N . For more about compressed
n-tuples of shift operators, see [Pop1], [Pop2], [ShSo1], [DRS1], [DRS2].
Definition 2.10. The Toeplitz algebra of a subproduct system H• is the unital C ∗ -algebra TH of
operators on HN generated by the shifts S1 , . . . , Sn .
The backward shifts on H⊗N preserves the subspace HN , so the adjoints S1∗ , . . . , Sn∗ of S1 , . . . , Sn
are just the restrictions to HN of the backward shifts on H⊗N .
10
Definition 2.11. The vacuum state on the Toeplitz algebra TH is the restriction ε̂ : TH → C of
the vector state on B(HN ) defined by the unit vector Ω ∈ H0 = C. That is,
ε̂(X) := hΩ|XΩi,
∀X ∈ B(HN ).
If p0 denotes the unit in B(H0 ) then
Xp0 = ε̂(X)p0 = p0 X,
∀X ∈ B(HN ).
(2.4)
Notation 2.12. Let F+
n be the free unital semigroup generated by n elements 1, . . . , n (the empty
+
word ∅ is the identity in F+
n ). We write a word k ∈ Fn as k = k1 · · · km and refer to |k| := m as the
length of k. For the shifts S1 , . . . , Sn and the basis vectors e1 , . . . , en we then write
Sk∗ := (Sk )∗ = Sk∗m · · · Sk∗1 ,
Sk := Sk1 · · · Skm ,
ek := ek1 ⊗ · · · ⊗ ekm ,
and similarly for other n-tuples of elements defined below. Finally, jk := j1 · · · jl k1 · · · km for j, k ∈ F+
n
with |j| = l and |k| = m.
2.2.1
The Toeplitz core
L
Let N = m m pm be the number operator on HN . It generates a unitary group on HN which
implements an action γ• of the circle group U(1) on TH ,
γt (Sk ) := eit Sk ,
∀eit ∈ U(1), k ∈ {1, . . . , n},
(2.5)
referred to as the gauge action on TH .
The gauge action (2.5) splits TH into the C ∗ -direct sum of the subspaces
(k)
TH
:= {T ∈ TH |γt (T ) = eikt T for all eit ∈ U(1)},
k ∈ Z.
(0)
The fixed-point subalgebra TH (the Toeplitz core) will be of great importance to us. It is generated
by polynomials in the shifts Sj and Sk∗ which are “homogeneous of degree zero” in the sense that
each term contains equally many forward shifts Sj as backward shifts Sk∗ .
2.2.2
The right shifts
In addition to the “sinister” shift Sk by the basis vector ek ∈ H, we shall need the “rectus” shift
Rk ψ := pm+1 (ψ ⊗ ek ),
∀ψ ∈ Hm , m ∈ N0
(2.6)
acting on the same Fock space HN . Note that Rk commutes with each Sj , and that Rk∗ commutes
with each Sj∗ , but [Rk , Sj∗ ] 6= 0.
The following formulas will be used extensively.
Lemma 2.13. For all m, l ∈ N with m ≤ l we have
X
X
Rr Rr∗
Sr Sr∗ H = pl =
l
Hence
X
|r|=m
and, in particular (m = 1),
Hl
.
|r|=m
|r|=m
n
X
k=1
Sr Sr∗ =
X
pl
l≥m
Sk Sk∗ = 1 − |ΩihΩ|.
11
(2.7)
∗
Proof. For r, s ∈ F+
n with |r| = m = |s| we have Sr Ss |Hl = pl (|er ihes |⊗pl−m )pl = pl (|er ihes |⊗pl−m )pl ,
so
X
X
|er iher | ⊗ pl−m pl
Sr Sr∗ H = pl
l
|r|=m
|r|=m
= pl (pm ⊗ pl−m )pl = pl ,
and similarly for the right shifts.
From (2.7) we see that the vacuum projection p0 = |ΩihΩ| belongs to the Toeplitz algebra.
Considering multiplying p0 from both sides with different shift operators, it is a simple matter to
deduce the following.
Corollary 2.14. The Toeplitz algebra TH contains the C ∗ -algebra K of all compact operators on Fock
space HN as a norm-closed two-sided ideal.
2.2.3
Normal ordering
In §5.9 we will obtain the following important result about the Toeplitz algebra, which we state here
for emphasis.
Lemma 2.15 (Normal ordering). Let H• be a subproduct system. Let AH denote the norm-closed
(non-∗) algebra generated by the shifts S1 , . . . , Sn and the identity in B(HN ). Then
span(AH A∗H ) = TH .
In particular, span(AH A∗H ) is an algebra.
2.3 Cuntz–Pimsner algebras
Definition 2.16 ([Vis2, Cor. 3.2]). The Cuntz–Pimsner algebra of a subproduct system H• is
the quotient of the Toeplitz algebra TH by the ideal K of all compact operators on HN ,
OH := TH /K.
We denote by Z1 , . . . , Zn the generators of OH , i.e. the images of the shifts S1 , . . . , Sn in the
quotient. They satisfy the sphere relation
n
X
Zk Zk∗ = 1,
k=1
Pn
which suggests viewing OH as the “boundary” of TH ; in the latter holds k=1 Sk Sk∗ ≤ 1, as we saw
in (2.7).
The formula (2.5), but with Zk replacing Sk , defines the gauge action on OH , which gives a
splitting
M (k) k·k
OH
OH =
k∈Z
of OH into spectral subspaces for this U(1)-action.
Remark 2.17 (Known examples). The most straightforward example of a subproduct Cuntz–
Pimsner algebra is the Cuntz algebra On , obtained from H• = H⊗• . As a commutative example, OH
for the symmetric subproduct system H∨• was shown in [Arv6c] to be isomorphic to the C ∗ -algebra
C(S2n−1 ) of continuous functions on the unit sphere S2n−1 ⊂ Cn . Cuntz–Pimsner algebras coming
from monomial ideals were described in [KaSh1].
We can reformulate Conjecture 1.3 as a statement about Cuntz–Pimsner algebras:
12
Conjecture 2.18 (Arveson’s conjecture). For every commutative subproduct system H• ⊂ H•∨ , the
Cuntz–Pimsner algebra OH is commutative.
(k)
For any subproduct system H• , the spectral subspaces OH for the gauge action on OH are Hilbert
(0)
∗
C -bimodules over the fixed-point subalgebra OH , with left and right inner products
hξ|ηiright := ξ ∗ η,
hξ|ηileft := ξη ∗
(2.8)
(k)
for ξ, η ∈ OH .
3 Review of quantization of projective varieties
Let us formulate Berezin quantization of complex submanifolds of projective n-space CPn−1 in terms
of subproduct systems, just to make it clear how the results of the subsequent sections relate to the
classical ones.
3.1 Berezin quantization with prequantum condition
Recall that Chow’s theorem says that a submanifold of projective space P[Cn ] = CPn−1 is a nonsingular (i.e. smooth) projective variety, i.e. the zero-set of some finitely generated homogeneous ideal
in C[z1 , . . . , zn ]. These manifolds can be characterized without even referring to CPn−1 (see Lemma
3.3 below), but for this we need to recall some complex geometry. A Kähler manifold is a pair
(M, ω) consisting of a complex manifold M and a closed nondegenerate 2-form ω on M which equals
the imaginary part of a Hermitian metric on M .
Remark 3.1 (Poisson bracket). The Kähler form ω is in particular a symplectic (i.e. closed and
nondegenerate) form, making M a symplectic manifold. The nondegeneracy of ω allows us to use
the inverse ω −1 to define a Poisson bracket on C ∞ (M ) by
{f, g} := ω j,k
∂f ∂g
,
∂xj ∂xk
(3.1)
if we denote by ω j,k the coefficients of ω −1 in local Darboux coordinates xj .
Recall that for a holomorphic line bundle L with a fixed choice of Hermitian metric h, there is
a unique connection, the “Chern connection”, which is compatible with both the metric and the
holomorphic structure in a suitable sense [Huy, Prop. 4.2.14]. If we locally represent h by a matrix¯ log h.
valued function, the curvature of this connection is given by ∂∂
Definition 3.2 ([BeSl1, §2.1]). A compact Kähler manifold (M, ω) is quantizable if there is a
¯ log h of the Chern
holomorphic Hermitian line bundle (L, h) over M such that the curvature ∂∂
connection satisfies the prequantum condition
√
¯ log h = ω.
(3.2)
−1∂∂
Then (L, h) gives a quantization of the Kähler manifold (M, ω).
Condition (3.2) is there to ensure ensures the following.
Lemma 3.3 ([Schl2], [BeSl1, §2.1]). Every quantization (L, h) of a compact Kähler manifold (M, ω)
gives an embedding of M as a submanifold of CPn−1 for some n ∈ N, and hence M can be regarded
as a projective algebraic variety (by Chow’s theorem). Conversely, every smooth projective algebraic
variety is a quantizable compact Kähler manifold.
Example 3.4 (The hyperplane bundle). The “tautological line bundle” over CPn−1 is the holomorphic line bundle, usually denoted by O(−1), whose fiber over a point in CPn−1 is the corresponding
line in Cn . The dual O(1) := O(−1)∗ of this line bundle is the hyperplane line bundle over CPn−1 .
The triple (CPn−1 , O(1), ωFS ), where ωFS is the Fubini–Study form and O(1) is equipped with the
Fubini–Study metric, is the prototypical example of a quantizable Kähler manifold (M, L, ω) [Schl1].
13
The embedding into CPn−1 mentioned in Lemma 3.3 requires a sufficiently positive line bundle,
and (3.2) says only that L is positive (“ample” ). It may therefore be necessary to use some tensor
power L⊗m of the line bundle L. However, by replacing L by L⊗m and rescaling the Kähler form ω
to mω we can, and shall, assume that L is itself sufficiently positive (“very ample”).
The important requirement in Lemma 3.3 is that M admits a Kähler metric, but we do not
need to choose one in order to an embedding of M into CPn−1 as a complex-analytic submanifold
(similarly we do not have the choose a Hermitian metric on L). Also, if we choose a Kähler metric ω
on M and a Hermitian metric h on L, so that we can embed M as a Kähler submanifold of CPn−1 ,
there is no need to require the prequantum relation (3.2) between h and ω; it is just the existence of
metrics satisfying the prequantum condition which is needed, to ensure that there is an ample line
bundle on M . Therefore, we will often speak of a polarized manifold, i.e. a pair (M, L) where M
is a compact Kähler manifold (with no choice of Kähler metric) and L is a positive line bundle on M
(which we shall assume very ample for convenience, with no choice of Hermitian metric specified).
Let (M, ω) be a compact Kähler manifold and let (L, h) be a Hermitian line bundle over M .
The space H 0 (M ; L) of global holomorphic sections of L is finite-dimensional and hence made into
a Hilbert space after fixing any inner product on H 0 (M ; L). In Berezin quantization one looks at
the limit of large m for the spaces H 0 (M ; L⊗m ) of sections of the tensor powers of L, and therefore
the inner products on these spaces should be comparable in some way. A consequence of the fact
that the Kähler form ω is symplectic is that ω d /d! (where d := dimC M ) is a volume form on M (the
“Liouville form”) and we can take the inner product
hφ|ψih,ω := md
ˆ
hm (φ(x), ψ(x))
M
ω(x)d
,
d!
∀ψ, φ ∈ H 0 (M, Lm ),
(3.3)
where hm is the Hermitian metric on L⊗m induced by h. Note that (3.3) is determined for all m by
the choice of inner product on H 0 (M ; L). If (L, h) is a quantization of (M, ω) then it is reasonable
to leave out either h or ω from the notation in h·|·ih,ω .
Example 3.5 (Sections of the hyperplane bundle). Recall the hyperplane line bundle O(1) over
P[H∗ ] introduced in Example 3.4. Fixing a basis for H∗ ∼
= Cn , the global holomorphic sections of
the mth tensor power O(m) of O(1) are identified with the degree-m homogeneous polynomials on
Cn . In particular, the space of holomorphic sections of O(1) is just the space H of continuous linear
functionals on H∗ . If we define Hm to be the Hilbert space of holomorphic sections of O(m) with
inner product (3.3) then for L = O(1) we simply have Hm = H∨m (symmetrized tensor product).
Thus, the Hm ’s form the full symmetric subproduct system (see Example 2.2).
Let (L, h) be a quantization of (M, ω) and endow H 0 (M ; Lm ) with the inner product (3.3). The
Hilbert space L2 (M ; L⊗m ) of all square-integrable sections of the line bundle L⊗m is much larger
than the holomorphic subspace H 0 (M ; Lm ). If Πm denotes the projection from L2 (M ; L⊗m ) to
H 0 (M ; Lm ) then every function f ∈ C(M ) defines an operator ς˘(m) (f ) on H 0 (M ; Lm ) by
ς˘(m) (f )φ := Πm (f φ),
∀φ ∈ H 0 (M ; Lm ),
(3.4)
i.e. acting as multiplication by f (recall that a section of a line bundle can be multiplied by continuous
functions to yield a new section) followed by projection back to H 0 (M ; Lm ) (the latter step is needed
since f is not holomorphic unless it is constant). In the case (L, h) is a quantization of (M, ω), we
have the following.
Proposition 3.6 ([BMS, Thms. 4.1,4.2, §5]). Let (L, h) be a quantization of a compact Kähler
manifold (M, ω) and define a structure of Hilbert space on H 0 (M ; Lm ) by (3.3). Then the collection
of endomorphism algebras EndC H 0 (M ; Lm ) and maps C ∞ (M ) ∋ f → ς˘(m) (f ) ∈ EndC H 0 (M ; Lm )
defined by (3.4) gives a strict quantization of the algebra C ∞ (M ) in the sense of [Lan1, Def. 1.1.1],
i.e. for all f, g ∈ C ∞ (M ) we have
(i) limm→∞ k˘
ς (m) (f )k = kf k (Rieffel condition),
(ii) limm→∞ k˘
ς (m) (f g) − ς˘(m) (f )˘
ς (m) (g)k = 0 (von Neumann condition),
14
(iii) limm→∞ km−1 [˘
ς (m) (f ), ς˘(m) (g)] − {f, g}k = 0 (Dirac condition),
and every operator in EndC H 0 (M ; Lm ) is of the form ς˘(m) (f ) for some f ∈ C ∞ (M ) [BMS, Prop.
4.2]. Here {·, ·} is the Poisson bracket (3.1).
For any volume form ω d /d! of (M, L), we have the associated Lebesgue space L2 (M, ω). The
algebra C(M ) identifies with a subspace of L2 (M, ω). Let ς (m) : B(Hm ) → C(M ) denote the adjoint
of ς˘(m) : C(M ) → B(Hm ) with respect to the L2 -inner product on L2 (M, ω) and the normalized
Hilbert-Schmidt inner product on B(Hm ).
For A ∈ B(Hm ), the function ς (m) (A) is also called the Berezin covariant symbol of A, and if
A = ς˘(m) (f ) then f is a (non-unique) contravariant symbol of A. The map
ς (m) ◦ ς˘(m) : C(M ) → C(M )
is the Berezin transform at level m. Similar to the famous expansion of the integral kernel for the
Bergman projections Πm [Zeld1], the Berezin transform ς (m) ◦ ς˘(m) has an asymptotic expansion at
large m [KaSc1].
Since the Toeplitz maps ς˘(m) are surjective by Proposition 3.6, their adjoints ς (m) are injective.
Hence we may regard the B(Hm )’s as embedded in C ∞ (M ) as vector subspaces. One may then ask if
it is possible to use the covariant symbols to approximate the whole C ∗ -algebraic structure of C(M )
by that of finite-dimensional matrix algebras B(Hm ).
We shall see that by changing the definition of the Toeplitz maps ς˘(m) we can in fact obtain C(M )
as an inductive limit for any polarized manifold (M, L).
3.2 Projectively induced quantization
The vector spaces H 0 (M ; Lm ) equipped with the inner products (3.3) do not always form a subproduct system. For that one has to choose ω and h appropriately, and for most polarized manifolds
(M, L) one cannot choose them to satisfy the prequantum condition (3.2) at the same time.
If we do not require that h and ω are related as in (3.2) then any two of (i) an inner product on
H 0 (M ; L), (ii) a Hermitian metric on L with positive curvature and (iii) a volume form ω d /d! on M
determines the third via (3.3). By the Calabi–Yau theorem [Yau1], any volume form on M can be
obtained as ω d /d! for some ω in the cohomology class c1 (L) (for any choice of polarization L, after
normalization of the volume form). If we do not require h to have positive curvature then there are
infinitely many Hermitian metrics h giving rise to the same inner product via the same volume form
(see [LMS1, Eq. (3.25)]).
For us, the choice of inner product h·|·i on H 0 (M ; L) will be the important input, and it will not
matter which Hermitian metric on L and volume form on M was used to define it.
Given a polarized manifold (M, L), a choice of basis for the n-dimensional vector space H 0 (M ; L)
allows use to embed M into the projectivization P[H 0 (M ; L)∗ ] of the vector space dual to H 0 (M ; L).
The elements of the basis for H 0 (M ; L) become the restrictions of the homogeneous coordinate functions z1 , . . . , zn on P[H 0 (M ; L)∗ ] to the embedded M . Choosing an inner product h·|·i on H 0 (M ; L)
we obtain an n-dimensional Hilbert space H which after a choice of orthonormal basis identifies with
Cn , and so M embeds into P[H∗ ] = CPn−1 . Whatever inner product on H 0 (M ; L) we used to define
the Hilbert space H, it will produce the symmetric subproduct system H∨• of holomorphic sections of
the hyperplane bundle on P[H∗ ] as in Example 3.5. What Lemma 3.3 says is that the ideal determined
by the algebraic relations among the zj ’s, appearing when we restrict them to the submanifold M ,
is homogeneous. The subspaces H 0 (M ; Lm ) ⊂ H 0 (M ; L)∨m of holomorphic sections of the tensor
powers of L endowed with the inner product as a subspace of H∨m will be denoted by
Hm = (H 0 (M ; L), h·|·i).
Here h·|·i is thus the inner product (3.3) in the special case when ω and h are the restrictions to M of
the Fubini–Study metrics on P[H∗ ], depending only on the inner product on H 0 (M ; L) which defines
the one-particle Hilbert space H. We set H0 := C.
15
We therefore have a description of polarized manifolds (M, L) with the extra datum of an inner
product on H 0 (M ; L) as a collection of Hilbert spaces Hm satisfying (2.1) with Hm ⊆ H∨m , where ∨
is the symmetrized tensor product (recall Lemma 2.9). The subproduct system H• is obtained from
H∨• by quotiening out by the ideal in C[z1 , . . . , zn ] which defines the embedded M .
Corollary 3.7. Every commutative subproduct system H• = (Hm )m∈N0 (see Definition 2.3) determines (via its associated homogeneous ideal in C[z1 , . . . , zn ]) a polarized manifold (M, L) with a fixed
structure of Hilbert space on H 0 (M ; L). Conversely, every such datum (M, L, h·|·i) determines a
commutative subproduct system.
We stress that for obtaining the subproduct system H• , the inner product on H 0 (M ; L) is arbitrary;√we do not require h and ω in (3.3) to satisfy the pre-quantum condition. Even if we did require
¯ log h, the inner product on Hm ⊂ H∨m for m ≥ 2 would in general differ from the inner
ω = −1∂∂
product h·|·ih defined by the initial ω and h.
Lemma 3.8. Let (M, L) be a polarized manifold with d := dimC M . Then for any inner product
h·|·i on H 0 (M ; L), there exists a unique volume form on M , which we can express as ω d for a
Kähler metric in the class c1 (L), such that h·|·i is ω d -balanced in the sense of [Don3, §2.2], i.e. if
Z1 , . . . , Zn are the homogeneous coordinates
on M ⊂ P[H∗ ] associated with any orthonormal basis for
Pn
0
H = (H (M ; L), h·|·i), normalized to k=1 Zk Zk∗ = 1 ∈ C ∞ (M ), then
1
vol(M, L)
where vol(M, L) :=
´
M
ˆ
M
Zj∗ Zk
δj,k
ωd
=
,
d!
n
∀j, k = 1, . . . , n,
ω d /d!.
Proof. The statement follows from the Calabi–Yau theorem [Yau1] and the fact that every polarized
manifold (M, L) admits a unique ω d -balanced metric for every volume form ω d on M [BLY1], [Don3,
§2.2] (equivalently, every line bundle is stable and from this it follows that every very ample line
bundle is “balanced as a line bundle” in the sense of [Wa1]).
To say that (M, L) is balanced as a polarized manifold [Don1] means precisely that there exists a
Hilbert space structure H on H 0 (M ; L) such that the volume form ω d in Lemma 3.8 is the restriction
to M of the Fubini–Study volume form on P[H∗ ]. Not every polarized manifold is balanced, and so in
general one cannot form a subproduct system from a quantization (L, h) of a compact Kähler manifold
(M, ω) in the sense of the last section. In fact that would require (M, Lm ) to be balanced for each
m ∈ N, in which case one says that the quantization is regular [CGR2]. The only polarized manifolds
known to admit a regular quantization are coadjoint orbits; cf. [ArLo1]. Since the subproduct
condition clearly will lead to a stronger kind of quantization (as will be shown in this paper), to be
able to use it for any polarized manifold we therefore consider a new kind of quantization.
We shall see that the normalized traces on the B(Hm )’s converge to a faithful state ω on C(M ),
which we call the limit state of the subproduct system H• .
Definition 3.9. A projectively induced quantization of a polarized manifold (M, L) is the datum
of a subproduct system H• ⊆ H∨• associated with some choice of inner product h·|·i on H 0 (M ; L)
together with the covariant and contravariant symbol maps specified by H• . That is, we define
ς (m) : B(Hm ) → C(M ) as the Berezin covariant symbol map (see e.g. [?]) and we take the Toeplitz
map ς˘(m) : C(M ) → B(Hm ) to be the adjoint of ς (m) with respect to the limit state ω and the
normalized trace on B(Hm ).
Remark 3.10. The terminology in Definition 3.9 is slightly nonstandard unless (M, L) is balanced;
indeed, (M, L) is a balanced polarized manifold (in the sense of [Don1]) if and only if there exists a
¯ log h) is projectively induced for
Hermitian metric h on L such that the quantization (L, h) of (M, ∂∂
0
some choice of inner product on H (M ; L). In that sense the term “projectively induced” appeared in
[CGR1] (it says precisely that the epsilon function discussed there is constant at each level, i.e. that
we have a “regular” quantization in the sense of [CGR2]). In the less restricted sense of Definition 3.9,
which works for any polarized manifold (M, L) since we do not require the prequantization condition,
16
the families covariant symbols maps associated with projectively induced quantizations were referred
to as “Berezin–Bergman quantizations” in [LMS1, §5] (this is the only work we know of where it has
been discussed for not necessarily balanced manifolds). In order to choose Toeplitz operators one
needs
An explicit formula for the covariant symbol map ς (m) is easy to write down; see Theorem 4.15.
In order to define Toeplitz operators one also needs to choose a state ω : C(M ) → C. The choice of
state ω is very important if one wants the Toeplitz maps ς˘(m) to give a strict quantization. We will
show that there is a canonical choice of ω, appearing as the limit of the normalized traces on the
B(Hm )’s, which produces a strict quantization of (M, L) with covariant symbols determned by the
subproduct system H• . We will show that a projectively induced quantization gives
(i) C(M ) as the “generalized inductive limit” of the C ∗ -algebras B(Hm ), and
(ii) a strict quantization of (M, L).
In this paper we will mainly discuss (ii) in the case of (quantum) homogeneous manifolds, but due
to our results concerning point (i) in the next sections we can fill in the details to obtain (ii) for
any polarized manifold. The latter will be very important in future work where more details will be
given.
Both (i) and (ii) could be satisfied without the subproduct condition. However, the inductive
system in (i) has very nice properties in the subproduct case which strictly relies on this assumption.
Concerning (ii) it is not necessarily the case that the subproduct condition gives something extra.
Rather, the important fact is that one can have a strict quantization at the same time as an inductive
system.
3.3 The circle bundle
Recall the Toeplitz quantization maps ς˘(m) : C(M ) → B(Hm ) (for definiteness and later relevance we
will focus on the case of a projectively induced quantization). We can assemble them into a single
map
Y
B(Hm ),
(3.5)
ς˘ : C(M ) →
m∈N0
∗
where the C -algebra on the right-hand side is the C ∗ -direct product.
Let L∗ be the dual line bundle of L. Under the embedding of M into CPn−1 , when L becomes the
restriction of the hyperplane line bundle, L∗ becomes the restriction of the tautological line bundle.
Denote by
SM := {ζ ∈ L∗ | kζk = 1}
(3.6)
the total space of the associated principal U(1)-bundle. The U(1)-action on SM induces a Z-grading
C(SM ) =
M
k·k
C(SM )(k)
k∈Z
of the C ∗ -algebra of continuous functions on SM , with C(SM )(0) = C(M ) and more generally
C(SM )(k) = Γ(M ; Lk )
as vector spaces, where Γ(M ; Lm ) is the space of all global continuous sections of Lk . The strongly
Z-graded algebraic structure on C(SM ) comes from the C(M )-module structure on each Γ(M, Lm )
and the tensor operation
Γ(M ; Lj ) ⊗C(SM ) Γ(M ; Lk ) = Γ(M ; Lj+k ).
The ∗-operation on C(SM ) is obtained by endowing each module Γ(M, Lk ) with the structure of
a Hilbert module given by hk , where h is the Fubini–Study Hermitian metric on L. That is, the
17
C ∗ -algebra C(SM ) is generated by the homogeneous coordinate functions Z1 , . . . , Zn on M ⊂ CPn−1
satisfying
n
n
X
X
Zk Zk∗ = 1 =
Zk∗ Zk .
k=1
k=1
These “sphere” relations are a manifestation of the fact that SM is nothing but the preimage of M
under the map S2n−1 → CPn−1 which defines projective space. Thus we can make an identification
SM ⊂ S2n−1 .
Now let ω : C(M ) → C be any faithful state. It extends canonically to a faithful state on C(SM )
by setting
ω(Zj Zk∗ ) := 0,
∀j, k ∈ F+
n , |j| 6= |k|.
L
k·k
As just mentioned, we have C(SM ) = k∈Z Γ(M ; Lk ) as a C ∗ -algebra if we endow each Γ(M, Lk )
with the metric hk . The GNS space of ω is the L2 -space L2 (S, ω) of ω-square-integrable functions
on S, and the closed subspace H 2 (S, ω) spanned by the coordinate functions Z1 , . . . , Zn on S is a
Hardy-type space.
2
Fock space HN are completions of the homogeneous coordinate ring A =
L Both H (S, ω) and the
n−1
A
of
M
⊂
CP
in such a way that elements of Am are orthogonal to elements of Al
m
m∈N0
whenever m 6= l. If M = G/K is a coadjoint orbit and H• is a regular quantization of G/K then one
simply has (see the proof of Lemma 6.30)
hψ|ϕiL2 =
1
hψ|ϕi.
dim Hm
So in this case Fock space can be embedded into H 2 (SM ),
h·|·i
M
Hm
⊂ H 2 (SM ) ⊂ L2 (SM ).
HN =
m∈N0
In general the relation between HN and H 2 (SM , ω) is more involved. Hence H 2 (SM , ω) is far from
sitting inside H 2 (S2n−1 , ωFS ) as a coinvariant subspace. For this reason, the Fock space HN is better
suited for studying how well the geometric properties of M are compatible with an embedding
M ֒→ CPn−1 and the associated pullback quantities.
Suppose now that ω is the state on C(SM ) associated with a Kähler form on M (denoted by the
same symbol ω), and let Π : L2 (SM , ω) → HN be the orthogonal projection. Then, with ς˘ as in (3.5),
we have
ς˘(f )ψ = Π(f ψ),
∀ψ ∈ HN
if we identify f ∈ C(M ) with the multiplication operator it defines on L2 (SM , ω). Then f is just the
contravariant symbol of the operator ς˘(f ) in the general sense of [Bere3]. The interior of SM (the
disk bundle) is a bounded symmetric domain and Berezin quantization on spaces such as SM has
been studied even more than in the setting of compact Kähler manifolds, see e.g. [UnUp1], [Bere2].
The circle bundle comes with the structure of a Cauchy–Riemann manifold, the details of which
can be found in [Schl1, §2], [Zeld1, §2].
We can define the Berezin transform and the covariant symbol of an operator on HN , just as we
did on the components Hm , using the fact that HN is a reproducing kernel Hilbert space. Again the
covariant symbol map ς is the adjoint of ς˘. In the noncommutative setting we will just calculate the
adjoint of ς˘ and take that as the definition of the covariant symbol map.
3.4 Singular varieties
We have seen that Berezin quantization of quantizable Kähler manifolds is really the quantization
of smooth projective varieties. It was suggested in [Schl2] that it may be possible to quantize also
singular (non-smooth) projective varieties in the same fashion. We shall see that this is in fact so:
it will be covered by the constructions in the next two sections, as the case when the subproduct
system H• is commutative (Corollary 5.35).
18
4 Inductive limits
Recall [ArMa1, Def. 1.1.11] that a sequence (Bm )m∈N0 of ∗-algebras Bm forms an “inductive system”
if there are ∗-homomorphisms ιm,l : Bm
S → Bm+l for each m ≤ l, and that the algebraic inductive
limit of such a sequence is the algebra m∈N0 Bm obtained as the quotient of the algebra of eventually
constant sequences of elements in the Bm ’s,
n
o
Y
(bj )j∈N0 ∈
Bj ∃m ∈ N0 such that bj = bm for all j ≥ m ,
j∈N0
S
by its ideal of sequences (bj )j∈N0 which are eventually 0. If each Bm is a C ∗ -algebra, m∈N0 Bm can
be completed in a canonical C ∗ -norm to obtain a C ∗ -algebra which, if the ιm,l ’s are injective, can be
S
k·k
identified with the non-disjoint union m∈N0 Bm [ArMa1, §1.2].
It was observed in [Hawk1] that the sequence of algebras Bm := B(Hm ) arising in quantization
has a structure resembling that of an inductive system, although the map from Bm to Bm+1 is
not a homomorphism in the category of C ∗ -algebras. If we want to obtain a C ∗ -algebra C(M ) of
continuous functions on a manifold as an inductive limit of finite-dimensional matrix algebras, then
requiring Bm ⊂ Bm+1 says by definition that C(M ) is an AF algebra. This forces M to be totally
disconnected. Hence we must relax the notion of inductive limit.
4.1 Relaxed definition of inductive limits
Blackadar and Kirchberg introduced a more general inductive-limit-type construction [BlKi1]. Although never pointed out in the literature, the system of finite-dimensional C ∗ -algebras B(Hm )
obtained from a projective quantization (M, ω, L) fits perfectly into their framework. This is most
apparent in [Hawk1] where similar notions were introduced independently. We will follow the notation
of [Hawk1] as closely as possible.
Notation 4.1. If B• = (Bm )m∈N0 is a sequence of C ∗ -algebras, we write
Y
Bm
Γb (B• ) =
m∈N0
for the full C ∗ -direct product of the Bm ’s, i.e. the set of sequences X• = (Xm )m∈N0 of elements
Xm ∈ Bm with finite supremum norm
kX• k := sup kXm kBm < ∞.
m∈N0
The multiplication and ∗-operation in Γb (Bm ) is pointwise. We also write
Γ0 (B• ) =
M
m∈N0
Bm
for the C ∗ -direct sum, the closed two-sided ideal in Γb (B• ) consisting of the sequences converging
to zero in norm. We simply write Γb := Γb (B• ) etc. if it is clear which sequence B• it concerns. We
let
π : Γb → Γb /Γ0
be the quotient map
Since we will only deal with a special kind of the “generalized inductive systems” defined in [BlKi1]
(namely the “NF” ones), we will simply refer to them as “inductive systems”. See also [BrOz1, §11].
Definition 4.2. An inductive system is a sequence (B• , ι• ) of full matrix algebras Bm = Mk(m) (C)
and unital completely positive maps ιm,l : Bm → Bm+l for l ≥ m (with ιm,m := id) satisfying
ιm,l = ιr,l ◦ ιm,r ,
19
if m ≤ r ≤ l
(4.1)
and which are asymptotically multiplicative in the sense that for all A, B ∈ B(Hm ), ε > 0, there
are r ≤ l such that
kιr,l (ιm,r (A)ιm,r (B)) − ιm,l (A)ιm,l (B)k < ε.
(4.2)
The inductive limit of an inductive system (B• , ι• ) is the C ∗ -algebra
B∞ ⊂ Γb (B• )/Γ0 (B• )
generated by the elements
ς (m) (A) := π((ιl (A))l≥m ),
A ∈ B(Hm )
(4.3)
for all m ∈ N0 , where π : Γb → Γb /Γ0 is the quotient map.
Remark 4.3 (Norm). A norm on the quotient C ∗ -algebra Γb /Γ0 is given by
kπ(X• )k = lim sup kXm k,
∀X• ∈ Γb ,
m→∞
and this norm satisfies the C ∗ -identity, hence it is the unique C ∗ -norm on Γb /Γ0 . Moreover, since
the ιm,l ’s are norm-decreasing,
lim sup kς (m) (A)k = lim kιm,l (A)k,
l→∞
m→∞
∀A ∈ B(Hm ),
so the norm on B∞ is just the “norm-at-infinity” of π −1 (B∞ ).
It follows that the maps
ς (m) : Bm → B∞
(4.4)
(m)
are completely positive, and we refer to ς
as the covariant Berezin symbol map at level m.
The motivation for this terminology will become clear below. Due to (4.1), the covariant symbol
maps satisfy
ς (l) ◦ ιm,l = ς (m) ,
∀m ≤ l ∈ N0 .
(4.5)
We may say that a sequence A• ∈ Γb is eventually constant under ι•,• if there is a large enough
m ∈ N0 such that Al = ιr,l (Ar ) for all l ≥ r ≥ m. Then B∞ is the image under π of the norm closure
of the algebra of eventually constant sequences.
Remark 4.4 (Asymptotic multiplicativity). The condition (4.2) is chosen precisely to ensure that
ς (m) (A)ς (m) (B) belongs to the C ∗ -algebra B∞ for all A, B ∈ B(Hm ), without requiring it to be close
to ς (m) (AB). Conversely, if ς (m) (A)ς (m) (B) belongs to B∞ for all A and B then each ς (m) (A)ς (m) (B)
is an eventually constant sequence, so (4.2) must hold.
Remark 4.5 (Continuous fields). Suppose that B(•) is a continuous field of matrix algebras over
N0 ∪ {∞}. For each A ∈ B(∞), thereQis a continuous section x → A(x) of B(•) with A(∞) = A,
and this section
L defines an element of m∈N0 B(m). Two sections evaluating to A at ∞ differ by an
element in m∈N0 B(m). Hence [BlKi1, Prop. 2.2.3]
Y
. M
B(∞) ⊂
B(m)
B(m) .
m∈N0
m∈N0
In fact, a C ∗ -algebra is an inductive limit (in the sense of Definition 4.2) if and only if it is a nuclear
separable C ∗ -algebra which is of the form B(∞) for some continuous field of matrix algebras over
N0 ∪ {∞} [BlKi1, Thm. 5.2.2].
Remark 4.6 (Quasi-diagonality). If a C ∗ -algebra B∞ is an inductive limit in the sense of Definition
4.2, there exists a short-exact sequence
0 −→ K −→ D −→ B∞
which is an “essential quasi-diagonal extension” of B∞ , meaning that D is a C ∗ -algebra of quasidiagonal operators containing the C ∗ -algebra K of compact operators as an essential ideal. In fact,
such an extension of a C ∗ -algebra B∞ exists if and only if B∞ can be embedded into Γb (B• )/Γ0 (B• )
for some sequence of full matrix algebras Bm [BlKi1].
20
Remark 4.7 (Nuclearity). Since B∞ is nuclear, the Choi–Effros lifting theorem [Blac1, IV.2.3.4]
says that the identity mapping id : B∞ → B∞ can be lifted to a unital completely positive map
ς˘ : B∞ → Γb such that if
ς˘(m) (f ) := ς˘(f )pm ∈ B(Hm ),
∀f ∈ B∞ ,
then the sequence ς (m) ◦ ς˘ converges in the point-norm topology to id : B∞ → B∞ . We shall calculate
ς˘ and its inverse ς explicitly in §5.8.
4.2 Inductive limits from subproduct systems
Lemma 4.8. Let H• be a subproduct system and define completely positive maps ιm,l : Bm → Bl by
ιm,l (A) := pl (A ⊗ 1H⊗(l−m) )pl ,
∀A ∈ B(Hm ),
where pl : H⊗l → Hl is the projection. Then for all A ∈ B(Hm ) we have the formulae
X
Rk ARk∗ H
ιm,l (A) =
l
(4.6)
(4.7)
|k|=l−m
=
X
Aj,k Sj Sk∗
Hl
(4.8)
|j|=m=|k|
where Rk is the right shift by the vector ek as in (2.6) and Aj,k := hej |Aek i.
Proof. Formula (4.8) is immediate from
Sj Sk∗ |Hl = pl (|pm ej ihpm ek | ⊗ 1Hl−m )pl .
Similarly, the expression (4.7) is deduced from straightforward calculations.
Theorem 4.9. Every subproduct system H• defines a generalized inductive system (B• , ι•,• ) by setting
Bm := B(Hm ) and letting ιm,l : Bm → Bl be as in (4.6).
Proof. It is clear that each ιm,l : Bm → Bl is unital and completely positive. For m ≤ r ≤ l and
A ∈ B(Hm ) we have
ιr,l ◦ ιm,r (A) = ιm,l (pr (A ⊗ 1H⊗(r−m) )pr ) = pl (pr (A ⊗ 1H⊗(r−m) )pr ⊗ 1H⊗(l−r) )pl
= pl (A ⊗ 1H⊗(l−m) )pl ,
where the last equality is due to (2.2). That is, the coherence condition (4.1) holds.
It remains to show that ι•,• is asymptotically multiplicative, i.e. that it satisfies (4.2). We have
ιr,l (ιm,r (A)ιm,r (B)) = ιr,l pr (A ⊗ 1)pr (B ⊗ 1)pr
= pl pr (A ⊗ 1)pr (B ⊗ 1)pr ⊗ 1 pl
= pl (A ⊗ 1)pr (B ⊗ 1) ⊗ 1 pl ,
so it is the failure of A ⊗ 1 to commute with the projection pr which spoils multiplicativity. It seems
hard to show directly from norm estimates that the maps (4.6) satisfy the asymptotic multiplicativity
condition (4.2). We shall instead obtain that by showing that the set of elements (4.3) forms an
algebra.
Consider the positively graded algebraic part R of the Toeplitz algebra TH , i.e. the N0 -graded
ring
M
M (m)
R=
Rm :=
TH .
m∈N0
21
m∈N0
Denote by Gr(R) the Abelian category of Z-graded right R-modules, with morphisms
L the gradingpreserving morphisms in the category of R-modules. Write R≥m for the R-module l≥m Rl . Then
it is straightforward to see that
EndGr(R) (R≥m ) = B(Hm )
as rings. Indeed, we have the left R-action on R≥m and the grading-preseving elements can all be
obtained by taking linear combinations of the elements Sj Sk∗ with |j| = m = |k|. Namely, the operator
Sj Sk∗ on HN is the direct sum T ⊕ 0 of an operator T ∈∈ B(H≥m ) and the zero operator 0 ∈ B(H<m ).
So Sj Sk∗ can be viewed as an operator of the R-module R≥m , and Sj Sk∗ is right R-linear because it
acts by multiplication from the left. Now the family (Sj Sk∗ )|j|=m=|k| forms an overcomplete set of
matrix units in B(Hm ), so their C-linear span identifies with B(Hm ). We have an inductive system
EndGr(R) (R≥m ) ∋ X|H≥m → Y |R≥l ∈ EndGr(R) (R≥l ),
∀m ≤ l ∈ N0
obtained by restriction to shorter tails R≥l ⊂ R≥m . From Equation (4.8) we see that this is precisely the algebraic inductive system underlying ιm,l : B(Hm ) → B(Hl ), under the identification
EndGr(R) (R≥m ) = B(Hm ).
By [Sten1, §IX.1] (see also [ArZh1, Example 5.4]), the algebraic inductive limit
0
B∞ = lim EndGr(R) (R≥m )
m→∞
is a ring (and an algebra over C since the maps ιm,l are C-linear). Therefore the norm closure
B∞ of 0 B∞ is an algebra as well. In particular, the asymptotic multiplicativity condition (4.2) is
satisfied.
Thus, subproduct systems give rise to generalized inductive limits of C ∗ -algebras with the special
property that the algebraic direct limit 0 B∞ is already an algebra (no need for norm closure). Still,
the asymptotic multiplicativity condition (4.2) cannot be formulated in a weaker fashion even for
subproduct systems, since the set of eventually constant sequences under ι•,• is only an algebra after
taking norm closure.
(0)
Our aim is to identify the inductive limit B∞ with the Cuntz–Pimsner core OH . For that we
need a lemma.
Q
Lemma 4.10. Let π −1 (B∞ ) be the norm closure of the subset of m B(Hm ) consisting of sequences
which are eventually constant under the coherent system ι•,• defined by (4.6). Then π −1 (B∞ ) coin(0)
cides with the normally ordered part of the Toeplitz core TH . Hence the normally ordered part of
(0)
(0)
TH is an algebra, and must coincide with all of TH , so
(0)
π −1 (B∞ ) = TH .
In this way we have proven Lemma 2.15.
(0)
Proof. It is clear that every normally ordered element of TH defines a sequence A• = (Am )m∈N0 of
operators Am ∈ B(Hm ) with ιm,l (Am ) = Al for sufficiently large m ≤ l. For example,
Y
Sj Sk∗ = (Sj Sk∗ |Hm )m∈N0 ∈
B(Hm ).
m∈N0
Suppose now that A = (Am )m∈N0 is any element of
(0)
TH
Q
m∈N0
B(Hm ) which is eventually constant.
Since B(Hm ) is contained in
for each m, we may for simplicity just as well look at the case
where ιr,l (Ar ) = Al for all r ≤ l for some r ∈ N0 while Am = 0 for m ≤ r. Then (4.8) in Lemma 4.8
shows that A is a combination of shift operators.
From the fact that B∞ is an algebra we have that π −1 (B∞ ) is an algebra, whence the last
statement.
22
Remark 4.11. Let B(•) be the continuous field of C ∗ -algebras over N0 ∪{∞} such that the fiber over
m ∈ N is B(m) = B(Hm ) and the fiber over ∞ is B(∞) = B∞ , the inductive limit (cf. Remark 4.5).
(0)
Then Lemma 4.10 says that TH is the algebra of continuous sections of this field. For commutative
case see also [Hawk2, Thm. 3.3].
(0)
Theorem 4.12. Let H• be a subproduct system and let OH denote the U(1)-invariant part of the
Cuntz–Pimsner algebra of H• . Then we have
(0)
OH ∼
= B∞ ,
where the right-hand side is the inductive limit defined by the inductive system ι•,• in (4.6).
(0)
Proof. The Toeplitz core TH is the norm closure of linear combinations of elements of the form
Sj Sk∗ with |j| = |k| as well as their products with the vacuum projection p0 = |ΩihΩ|. The elements
(0)
which are products with |ΩihΩ| belong to Γ0 = K ∩ TH . Hence,
(0)
(0)
(0)
(0)
B∞ = TH /Γ0 = TH /(K ∩ TH ) = OH ,
as asserted.
Remark 4.13. The quasi-diagonal extension of B∞ mentioned in Remark 4.6 can now be taken as
(0)
D = TH + K (cf. [Blac1, V.4.2.16]).
4.3 Cuntz–Pimsner algebras from inductive limits
For m > 0, let H−m := Hm denote the conjugate Hilbert space of Hm . For all k ∈ Z we can consider
the B(Hm )-module
(k)
Em
:= B(Hm , Hm+k ),
(k)
(k)
(k)
and the maps ιm,l : Em → El
defined by
(k)
ιm,l (X) :=
X
Rr XRr∗
Hl
,
|r|=l−m
(k)
(k)
∀X ∈ Em
.
(k)
We define the C ∗ -algebras Γb (E• ) and Γ0 (E• ) in the same way as in Notation 4.1 and we denote
(k)
(k)
(k)
by π (k) : Γb (E• ) → Γb (E• )/Γ0 (E• ) the quotient map.
0 (k)
Define E
to be the vector space consisting of all elements of the form
(k)
ς (m,k) (X) := π (k) ιm,l (X) l≥m ,
(k)
X ∈ Em
(0)
for all m ∈ N0 . In particular, 0 E (0) ≡ 0 B∞ is the algebraic part of B∞ ≡ E (0) ∼
= OH . Each 0 E (k) is
0
a module over B∞ . The linear span of
B∞ 0 E (k) := {f ψ|f ∈ B∞ , ψ ∈ 0 E (k) }
is a module over B∞ , which we denote by E (k) .
Theorem 4.14. The Cuntz–Pimsner algebra OH is isomorphic to the C ∗ -algebra generated by E (1)
and B∞ . It allows the decomposition
k·k
M
E (k)
OH ∼
=
k∈Z
and E (k) ∼
=
(k)
OH
is the spectral subspace for the gauge action corresponding to k ∈ Z.
23
Proof. The vector space B(Hm , Hm+k ) has an overcomplete basis given by the operators Sk |Hm for
all k ∈ F+
n with |k| = k. In particular, B(Hm , Hm+1 ) is spanned by Sj |Hm for j = 1, . . . , n. Recalling
that Sj is the shift by the basis vector ej ∈ H, we see that
X
(k)
Rr Sj Rr∗ H
ιm,l (Sj |Hm ) =
l
|r|=l−m
=
X
Sj Rr Rr∗
Hl
|r|=l−m
= S j |H l .
We can identify a sequence X• = (Xm )m∈N0 of operators Xm ∈ B(Hm , Hm+k ) with an operator on
Fock space HN . The effect of the quotient map π (k) on such a sequence X• is to take it to its image
in the Calkin algebra B(HN )/K. From (4.5) we therefore have (for m ≥ 1)
ς (m,1) (Sj |Hm ) = ς (1,1) (Sj |H ) = π (1) (Sj Hm )m∈N0 = π (1) (Sj ) = Zj ,
where Z1 , . . . , Zn are the generators of OH . Similarly one gets that ς (l,k) (Sk |Hm ) is just Zk for all
(−m)
∗
k ∈ F+
) for |k| = m. So
n with |k| = k and all l ≥ m. The adjoints Sk define elements of Γb (E•
(k)
O
holds
for
all
k
∈
Z.
E (k) ∼
= H
4.4 Formulas for covariant symbols
Our discussion about inductive limits associated to subproduct system has been based on shift
operators on Fock space. We now observe that what we are doing is in fact a generalization of
Berezin quantization. First we show that there is a very simple expression for the maps ς (m) .
Theorem 4.15. Let Z1 , . . . , Zn be the images of the shifts of the subproduct system H• . Then the
(0)
covariant symbol map ς (m) : B(Hm ) → OH defined in (4.3) can be expressed as
X
Aj,k Zj Zk∗ .
ς (m) (A) =
|j|=m=|k|
Proof. From (4.3) we see that we need to express ιm in terms of the Toeplitz operators S1 , . . . , Sn ;
applying π transforms these into Z1 , . . . , Zn . But that is easily done using Lemma 4.8: the “second
quantization” of A,
X
Aj,k Sj Sk∗ ∈ B(HN ),
|j|=m=|k|
acts as ιm,l (A) on Hl for l ≥ m and as 0 on Hl for l < m. Applying the quotient map π to it, we
obtain
X
Aj,k Sj Sk∗ = π((ιm,l (A))l≥m ) = ς (m) (A),
π
|j|=m=|k|
and on the other hand,
π
X
|j|=m=|k|
Aj,k Sj Sk∗ =
X
Aj,k Zj Zk∗ .
|j|=m=|k|
Corollary 4.16. For all j, k ∈ F+
n with |j| = |k| = m and all l ≥ m we have
ς (l) (Sj Sk∗ |Hl ) = Zj Zk∗ .
Example 4.17. Let H• be a commutative subproduct system and let M be the compact manifold it
(0)
defines (see Corollary 3.7). Then ς (m) : B(Hm ) → OH coincides with the Berezin covariant symbol
map ς (m) : B(Hm ) → C(M ) (mentioned in §3.2).
24
Notation 4.18. Fix a faithful representation of OH on a Hilbert space H and let
u ∈ Mn (C) ⊗ B(H)
be a unitary n × n matrix with values uj,k ∈ B(H) such that the first row of u is given by the
generators Z1 , . . . , Zn of OH . Let uc be the matrix obtained from u by taking adjoints of each entry
uj,k . Denote by um the restriction of u⊗m from H⊗m to Hm and similarly for uc . Finally,
α(m) : B(Hm ) → B(Hm ) ⊗ B(H)
will be the map which takes A ∈ B(Hm ) to um (A ⊗ 1)u∗m .
The following formulas are known from the classical case to define the “Berezin covariant symbol”
in case we quantize a coadjoint orbit M = G/K (cf. [Per1], [Lan2]).
Proposition 4.19. Assume that u⊗m preserves the subspace Hm ⊂ H⊗m , in the sense that um =
⊗m
⊗m
u⊗m (pm ⊗ 1). Let |e⊗m
1 ihe1 | be the rank-1 projection onto the line spanned by e1 , where e1 is the
first basis vector in H. Then for all A ∈ B(Hm ) we have
⊗m
⊗m
c
(4.9)
ς (m) (A) = (Tr ⊗ id) (A ⊗ 1)uc∗
m (|e1 ihe1 | ⊗ 1)um
⊗m
= (Tr ⊗ id) α(m) (A)(|e⊗m
(4.10)
1 ihe1 | ⊗ 1) .
Proof. We have
⊗m
⊗m
c
uc∗
m (|e1 ihe1 | ⊗ 1)um =
X
|j|=m=|k|
so (4.9) is clear. For (4.10) we can use the formula
X
Ar,s Sj Sk∗
α(m) (A) =
Sj Sk∗ |Hm ⊗ Zk Zj∗
Hm
|j|=m=|k|
⊗ uj,r u∗k,s .
4.5 Commutative case and the Arveson conjecture
One of the most striking applications of our results is the Arveson conjecture (see Remark 2.17).
Corollary 4.20. Arveson’s conjecture holds for all homogeneous ideals I ⊂ C[z1 , . . . , zn ], i.e. the
Cuntz–Pimsner algebra OH of the subproduct system H• associated to I (as in Lemma 2.9) is commutative.
Proof. Lemma 2.15 together with [KeSh1, Prop. 4.14] gives the result.
In [Vas1], [Vas3] it was shown that for any continuous line bundle L → M , the Cuntz–Pimsner
algebra OE (defined in [Pims1]) of the Hilbert C(M )-bimodule E of continuous sections of L is
isomorphic to the C ∗ -algebra C(SL ) of continuous functions on the total space of the circle bundle
SL associated to L∗ . Recall that in the definition of OE (which is Pimsner’s original one) the tensor
products are taken over the coefficient algebra C(M ). We shall now see that, in the case (M, L) is a
polarized manifold, from a projectively induced quantization we can also obtain C(SM ) := C(SL ) as
the Cuntz–Pimsner algebra OH of the associated subproduct system H• .
Proposition 4.21. Let (M, L) be a polarized (not necessarily smooth) variety and let H• be a projectively induced quantization of (M, L) (the definition still makes sense in the non-smooth case), and
endow M with the complex (Hausdorff ) topology [Serre1, §2]. Then
C(SM ) ∼
= OH ,
and for all k ∈ Z,
(k)
Γ(M ; L⊗k ) ∼
= OH
as a Hilbert C(M )-bimodule. In particular, k = 0 gives C(M ) as an inductive limit.
25
(4.11)
Proof. As in the general noncommutative case, the commutative algebra OH is built up from Hilbert
(0)
modules over OH and the latter is generated by the images of the covariant symbol maps ς (m) . An
argument given in [CGR1, §4] shows that the ς (m) (A)’s (for all m ∈ N0 and all A ∈ Bm ) separate
points. The Stone–Weierstrass theorem gives that they form a dense subalgebra of C(M ). The
inclusion of Hm into Hm+1 coincide by construction with our ιm,m+1 , and the supremum norm
on C(M ) is seen to coincide with the norm on the inductive limit B∞ . Therefore, C(M ) ∼
= B∞ .
The result now follows from Theorem 4.12 and the well-know decomposition of C(SM ) into the
Γ(M ; L⊗m )’s (see §3.3).
In fact, given Corollary 4.20 we get Proposition 4.21 from the calculation of the space of multiplicative U(1)-valued functionals on OH done in [KeSh1, Prop. 2.4]. Indeed, the circle bundle SL
can be identified with the preimage of M under the map Cn \ {0} → CPn−1 which defined projective
space, and this is the boundary of the analytic variety discussed [KeSh1].
Note that it is not so obvious that we couldL
recover M completely (as a topological space) from
0
⊗m
) of M ⊂ P[H∗ ] is not a ring of
H• because the homogeneous coordinate ring
m∈N0 H (M ; L
functions on M . The choice of basis on H 0 (M ; L⊗m ) corresponds to a choice of algebra structure on
the ring C(M ) and the inner product on H 0 (M ; L⊗m ) to a choice of C ∗ -algebra structure on C(M ),
but all possible C ∗ -algebra structures obtain in this way are isomorphic.
In the following we use the terminology from Lemma 3.8.
Corollary 4.22. Let (M, L) be a polarized manifold and let H• be a projectively induced quantization
of (M, L). Then the Fubini–Study metric FS(h·|·i) on L associated with the inner product on H
coincides with the ∗-operation which defines the C ∗ -algebra OH , and is thus equal to the inductive
limit of the Hermitian pairings
B(Hm+1 , Hm ) × B(Hm+1 , Hm ) → B(Hm ),
(A, B) → A∗ B.
Consequently, (M, L) is balanced if and only if the limit state ω coincides with the the unique FS(h·|·i)balancing state. If M = G/K is a coadjoint orbit one also has (using Notation 2.12) for all j, k ∈ F+
n
with |j| = m = |k| that
ˆ
pj,k
ωd
1
=
,
(4.12)
Zj∗ Zk
vol(M, L) M
d!
Tr(pm )
where pm : H⊗m → Hm is the orthogonal projection and H• ⊂ H∨• is the subproduct system of
(M, L, h·|·i) and we denote by ω also the Fubini–Study Kähler form on M ⊂ CPn−1 .
Proof. Recall that the generators Z1 , . . . , Zn of OH satisfy the relation of the ideal which
defines M ,
P
so they can be identified with the homogeneous coordinates on M . Recall also that nk=1 Zk Zk∗ = 1,
which says that the adjoint operation on the operator system in OH spanned by Z1 , . . . , Zn is the
Fubini–Study metric h on L. Since products of m of the generators Z1 , . . . , Zn identify with elements
of H 0 (M ; Lm ) and since the ∗-operation on OH is given by (Zk1 · · · Zkm )∗ = Zk∗m · · · Zk∗1 , we get that
it is induced by the tensor-product metric hm on H 0 (M ; Lm ) for all m ∈ N.
If M = G/K is a coadjoint orbit then the limit state ω = ωp1 : C(M ) → C satisfies ω(Zj∗ Zk ) =
δj,k /n. The formula for ω on the products Zj∗ Zk then gives (4.12).
5 Projective limits
(0)
We now want to realize the same algebra OH as a projective limit. For this we need some background
information from [Hawk1, §B2].
26
5.1 Relaxing the notion of projective limit
In this paper, a “projective limit” will always refer to the following object which, in comparison
to more conventional C ∗ -algebraic projective limits, is defined in terms of completely positive maps
instead of C ∗ -homomorphisms.
Definition 5.1 ([Hawk1, §B2]). A projective system (B• , •,• ) is a sequence of finite-dimensional
matrix algebras Bm and norm-contracting completely positive mappings l,m : Bl → Bm for m ≤ l
satisfying l,m = r,m ◦ l,r for all m ≤ r ≤ l. The projective limit of (B• , •,• ) is the vector space
defined by
B ∞ := {A• = (Am )m∈N0 ∈ Γb (B• )| Am−1 = m,m−1 (Am ) for all m ∈ N},
equipped with the norm
kA• k := lim kAm k.
m→∞
∞
Remark 5.2. The intersection of B with Γ0 is {0}. We always identify B ∞ with its embedding into
Γb (B• )/Γ0 (B• ) because it is more likely that B ∞ is an algebra when multiplication is taken modulo
Γ0 . If we do so and then pull back B ∞ via the quotient map π : Γb → Γb /Γ0 , we obtain a vector
space π −1 (B ∞ ) which is much larger than B ∞ , namely
π −1 (B ∞ ) = B ∞ ∪ Γ0 (B• ).
(5.1)
Importantly, B ∞ is an algebra (hence a C ∗ -algebra) if and only if (5.1) is.
Remark 5.3. We could also define B ∞ as the set of elements
f = π (∞,m (f ))m∈N0
where the components ∞,m (f ) ∈ Bm satisfy ∞,m (f ) = l,m ◦ ∞,l (f ). We can regard ∞,m :=
liml→∞ l,m as the map from B ∞ to Bm which evaluates A• = (Am )m∈N0 ∈ B ∞ at m,
∞,m (A• ) = Am .
5.2 Changing the inner products
From now on Q ∈ B(H) is a positive invertible n × n matrix and let
Qm := pm Q⊗m |Hm
be the compression of Q⊗m ∈ B(H⊗m ) to the subspace Hm = pm H⊗m . We choose the orthonormal
basis e1 , . . . , en for H1 such that Q is diagonal and, as before, we let S1 , . . . , Sn be the shifts on HN
by these basis vectors. We shall write
Qj,k := (Q−1
m )j,k .
Qj,k := (Qm )j,k ,
We associate to each Qm a density matrix
(m)
ρ(m) = ρQ
:=
Qm
,
Tr(Qm )
and denote by φm the state on B(Hm ) defined by
φm (A) := Tr(ρ(m) A),
∀A ∈ B(Hm ).
Sometimes it will be useful to change the inner product on Hm to
hψ|φiρ(m) := hψ|ρ(m) φi,
∀φ, ψ ∈ Hm .
We stress that (unless H• = H⊗• )
ρ(m) 6=
Qm
= pm (ρ(1) )⊗m pm .
Tr(Q)m
27
(5.2)
Assumption 5.4. From now on Q ∈ B(H) is a positive invertible n × n matrix such that
(i) the operator Q⊗m on H⊗m preserves the subspace Hm for all m ∈ N0 , i.e. Qm = Q⊗m |Hm , and
(ii) ιm,l preserves the Q-traces, i.e.
φl ◦ ιm,l = φm ,
for all m ≤ l ∈ N.
Property (i) allows the subproduct condition to be maintained with the new inner products
h·|·iρ(m) (see Proposition 5.8 below) while property (ii) allows the construction of a state on OH
with very nice properties. We will show that in the examples of subproduct systems coming from
compact quantum groups there is always a matrix Q which satisfies these assumptions (i) and (ii). It
is possible to drop either (or both) of the assumptions (i) and (ii) and many of the constructions in
the next section will carry over; in particular there will be a limit state but with weaker quantization
properties. We shall elaborate on this slightly in the commutative case, where assumptions (i) and
(ii) hold with Qm = pm for all m ∈ N precisely when H• is a regular quantization (in the sense of
Remark 3.10).
Remark 5.5. The property pm Q⊗m pm = Q⊗m pm ensures that Qm is invertible; its inverse is
pm (Q⊗m )−1 pm because
(Q⊗m )−1 pm Q⊗m pm = (Q⊗m )−1 Q⊗m pm = pm ,
Q⊗m pm (Q⊗m )−1 pm = Q⊗m (Q⊗m )−1 pm = pm ,
where we used the fact that the inverse A−1 of any invertible matrix A preserves every A-invariant
subspace. We denote by Q−1
m this inverse of Qm . For l ≥ m we have
⊗l −1
Q−1
((Q⊗m ) ⊗ (Q⊗(l−m) ))pl = pl ,
l (Qm ⊗ Ql−m ) = (Q )
where we regard pl as an operator from Hm ⊗ Hl−m onto Hl .
5.3 The isometries
Now that Hm is endowed with the inner product (5.2) we discuss how B(Hm ) can be mapped into
B(Hl ) when m < l and calculate the explicit isometries Hl ֒→ Hl−m ⊗ Hm and Hl ֒→ Hm ⊗ Hl−m .
This construction would fail without the assumption that Q⊗m preserves Hm .
Proposition 5.6. The isometry from Hl into Hl−m ⊗ Hm is given by
s
Tr(Qm ) Tr(Ql−m ) X
pl−r er ⊗ Sr∗ ψ,
V̄m,l ψ =
Tr(Ql )
|r|=l−m
and its adjoint by
∗
V̄m,l
=
s
∀ψ ∈ Hl ,
(5.3)
Tr(Qm ) Tr(Ql−m ) (l) −1 (l−m)
(ρ ) (ρ
⊗ ρ(m) ).
Tr(Ql )
Proof. We proceed by first calculating the adjoint of the given operator (5.3). Let λm,l :=
For all ξ ∈ Hl−m , η ∈ Hm and all ψ ∈ Hl we have
∗
hV̄m,l
(ξ ⊗ η)|ψiρ(l) = hξ ⊗ η|V̄m,l ψiρ(l−m) ⊗ρ(m)
X
hξ ⊗ η|pl (er ⊗ Sr∗ ψ)iρ(l−m) ⊗ρ(m)
= λm,l
|r|=l−m
= λm,l
X
|r|=l−m
hξ ⊗ η|Sr Sr∗ ψiρ(l−m) ⊗ρ(m)
= λm,l h(ρ(l) )−1 (ρ(l−m) ξ ⊗ ρ(m) η)|ψiρ(l)
28
(5.4)
q
Tr(Qm ) Tr(Ql−m )
.
Tr(Ql )
and hence (5.4) holds. Finally, using Remark 5.5,
Tr(Qm ) Tr(Ql−m ) X
(ρ(l) )−1 (ρ(l−m) er ⊗ ρ(m) Sr∗ ψ)
Tr(Ql )
|r|=l−m
X
X
−1
pl (er ⊗ Sr∗ ψ)
Ql (Ql−m er ⊗ Qm Sr∗ ψ) =
=
∗
V̄m,l
V̄m,l ψ =
|r|=l−m
|r|=l−m
=
X
Sr Sr∗ ψ = ψ,
|r|=l−m
so V is the desired isometry. Let us also calculate the final projection:
X
∗
Sr Sr∗ Q−1
=
V̄m,l V̄m,l
l (Ql−m ⊗ Qm ) = pl (pl−m ⊗ pm ).
|r|=l−m
Now let A ∈ B(Hl ) and define
∗
ῑm,l (A) := V̄m,l
(1Hl−m ⊗ A)V̄m,l .
(5.5)
We have
Tr(Qm ) Tr(Ql−m ) X
(ρ(l) )−1 (ρ(l−m) er ⊗ ρ(m) ASr∗ ψ)
Tr(Ql )
|r|=l−m
X
∗
Q−1
=
l (Ql−m er ⊗ Qm ASr ψ)
∗
V̄m,l
(1Hl−m ⊗ A)V̄m,l ψ =
|r|=l−m
=
X
|r|=l−m
=
X
pl (er ⊗ ASr∗ ψ)
Sr ASr∗ ψ,
|r|=l−m
so ῑm,l is a “chirality-flipped” version of ιm,l , i.e. the Rr ’s are replaced by Sj ’s (cf. (4.7)). If we
use the inductive system ῑ•,• instead of ι•,• , the roles of the left and right Toeplitz algebras are
interchanged.
Proposition 5.7. Define a coherent system of maps ῑm,l : B(Hm ) → B(Hl ) by
∗
ῑm,l (A) := V̄m,l
(1Hl−m ⊗ A)V̄m,l
X
Ss ASs∗ H .
=
l
(5.6)
(5.7)
|s|=l−m
Then (B(H• ), ῑ•,• ) is an inductive system, and the C ∗ -subalgebra of Γb (B• ) consisting of norm limits
of the eventually constant sequences for ῑ•,• is equal to the U(1)-invariant part of the right Toeplitz
algebra C ∗ (R1 , . . . , Rn ).
Proof. The proof is very similar to the case of the ιm,l ’s (the “left case”).
P
We furthermore note that if we expand A ∈ B(Hm ) as A = |j|=m=|k| Aj,k Rj Rj∗ |Hm then
X
Aj,k Rj Rk∗ H ,
ῑm,l (A) =
l
|j|=m=|k|
again similar to the left case. More will be said on the “chiral duality” between ῑ•,• and ι•,• in
Remark 5.13.
We now want to find an isometric implementation of ιm,l similar to (5.5). For this we need to flip
the tensor factors.
29
Proposition 5.8. The isometry from Hl into Hm ⊗ Hl−m is given by
s
Tr(Qm ) Tr(Ql−m ) X
Vm,l ψ =
Rr∗ ψ ⊗ pl−r er ,
Tr(Ql )
|r|=l−m
and its adjoint by
∗
Vm,l
=
s
∀ψ ∈ Hl ,
Tr(Qm ) Tr(Ql−m ) (l) −1 (m)
(ρ ) (ρ
⊗ ρ(l−m) ).
Tr(Ql )
(5.8)
(5.9)
Proof. For all ξ ∈ Hl−m , η ∈ Hm and all ψ ∈ Hl we have
∗
hVm,l
(η ⊗ ξ)|ψiρ(l) = hη ⊗ ξ|Vm,l ψiρ(m) ⊗ρ(l−m)
X
hη ⊗ ξ|Rr Rr∗ ψiρ(m) ⊗ρ(l−m)
= λm,l
|r|=l−m
= λm,l h(ρ(l) )−1 (ρ(m) η ⊗ ρ(l−m) ξ)|ψiρ(l) ,
and the rest is similar to the proof of Proposition 5.8.
Corollary 5.9. The inductive system ι•,• is implemented by the system V•,• of isometries:
∗
ιm,l (A) = Vm,l
(A ⊗ 1Hl−m )Vm,l ,
∀A ∈ B(Hm ).
Proof. Follows from formula (4.7) and the calculation (with ψ ∈ Hl )
s
Tr(Qm ) Tr(Ql−m ) X
∗
Vm,l (A ⊗ 1Hl−m )Vm,l ψ =
(ρ(l) )−1 (ρ(m) ARr∗ ψ ⊗ ρ(l−m) er )
Tr(Ql )
|r|=l−m
X
−1
Ql (Qm ARr∗ ψ ⊗ Ql−m er )
=
|r|=l−m
=
X
|r|=l−m
=
X
pl (ARr∗ ψ ⊗ er )
Rr ARr∗ ψ.
|r|=l−m
5.4 Projective system for subproduct systems
Let H• be a subproduct system. We let Q ∈ B(H) be as in Assumption 5.4 and endow Hm with the
inner product defined by the density matrix ρ(m) := Qm / Tr(Qm ).
Lemma 5.10. Define maps l,m : B(Hl ) → B(Hm ) for m ≤ l by
l,m (A) :=
Tr(Qm )
Tr(Ql )
X
(Q⊗m )k,k Rk∗ ARk
Hm
,
|k|=l−m
∀A ∈ B(Hl ).
(5.10)
Then, with Vm,l as in Proposition 5.8, we have the formula
∗
)
l,m (A) = (idBm ⊗φl−m )(Vm,l AVm,l
and •,• is a projective system.
30
(5.11)
Proof. First of all, for all A ∈ B(Hl ) we have
r,m ◦ l,r (A) =
=
=
X
Tr(Qr ) Tr(Qm )
Tr(Ql ) Tr(Qr )
Tr(Qm )
Tr(Ql )
Tr(Qm )
Tr(Ql )
(Q⊗m )j,j (Q⊗m )k,k Rj∗ Rk∗ ARk Rj
Hm
|j|=r−m,|k|=l−r
X
∗
(Q⊗m )kj,kj Rkj
ARkj
Hm
|kj|=l−m
X
(Q⊗m )r,r Rr∗ ARr
Hm
= l,m (A),
|r|=l−m
and it is obvious that each l,m is completely positive. The norm-contracting property holds because
l,m is in fact unital. To see this we first prove the alternative formula (5.11). We have
l,m (A) =
=
=
=
Tr(Qm )
Tr(Ql )
Tr(Qm )
Tr(Ql )
Tr(Qm )
Tr(Ql )
Tr(Qm )
Tr(Ql )
X
(Q⊗m )r,r Rr∗ ARr
Hm
|r|=l−m
X
X
(Q⊗m )r,r hej |Rr∗ ARr ek iSj Sk∗
Hm
|r|=l−m |j|=m=|k|
X
X
(Q⊗m )r,r hej ⊗ er |A(ek ⊗ er )iSj Sk∗
Hm
|r|=l−m |j|=m=|k|
X
X
(Q⊗m )r,r (A)jr,kr Sj Sk∗
Hm
|r|=l−m |j|=m=|k|
∗
= (id ⊗φl−m )(Vm,l AVm,l
),
where in the last equality we used that, for all ξ1 , ξ2 ∈ Hm , η1 , η2 ∈ Hl−m ,
∗
∗
hVm,l
(ξ1 ⊗ η1 )|AVm,l
(ξ2 ⊗ Ql−m η2 )i
=
Tr(Qm ) Tr(Ql−m ) (l)−1 (m)
hρ
(ρ ξ1 ⊗ ρ(l−m) η1 )|Aρ(l)−1 (ρ(m) ξ2 ⊗ ρ(l−m) Ql−m η2 )i
Tr(Ql )
= hξ1 ⊗ η1 |Aρ(l)−1 (ρ(m) ξ2 ⊗ ρ(l−m) Ql−m η2 )i
=
Tr(Ql )
hξ1 ⊗ η1 |A(ξ2 ⊗ Ql−m η2 )i,
Tr(Ql−m ) Tr(Qm )
m)
∗
so that summing such inner products over a basis for Hm ⊗Hl−m and multiplying with Tr(Q
Tr(Ql ) Sj Sk Hm
∗
is the same thing as partially tracing Vm,l AVm,l
with Ql−m / Tr(Ql−m ).
The formula (5.11) shows that l,m is the adjoint of ιm,l with respect to φl and φm (see details in
5.11 below). Our assumption φl ◦ ιm,l = φm is then equivalent to the unitality
l,m (pl ) = pm ,
and hence l,m is contractive.
Notice that since l,m intertwines the normalized traces, the unitality assumption on l,m is
equivalent to assuming that l,m is contractive.
Proposition 5.11. Let m, l ∈ N0 with m ≤ l. Then l,m is the adjoint of ιm,l : for all A ∈ B(Hl )
and all B ∈ B(Hm ) we have
φl (Aιm,l (B) = φm l,m (A)B .
(5.12)
In particular, taking A = pl respectively B = pm we obtain the equivalences
φl ◦ ιm,l = φm ⇐⇒ l,m (pl ) = pm ,
31
(5.13)
φl = φm ◦ l,m ⇐⇒ ιm,l (pm ) = pl ,
(5.14)
where (5.14) holds for any subproduct system while (5.13) is our standing assumption for this section.
Proof. We have
∗
φl (Aιm,l (B)) = φl (AVm,l
(B ⊗ pl−m )Vm,l )
∗
= (φm ⊗ φl−m )(Vm,l AVm,l
(B ⊗ pl−m ))
∗
(B ⊗ pl−m ))
= φm (idBm ⊗φl−m )(Vm,l AVm,l
∗
)B ,
= φm (idBm ⊗φl−m )(Vm,l AVm,l
which equals φm l,m (A)B by (5.11).
Corollary 5.12. The states φm satisfy the “right invariance” condition
φm (l,m ◦ ιm,l (A)) = φm (A),
∀A ∈ B(Hm ).
(5.15)
Proof. Just use (5.14) and then (5.13).
Remark 5.13. Similarly one shows that
φm = φl ◦ ῑm,l .
(5.16)
for the “right” inductive system ῑ•,• . The adjoint of ῑm,l is
̄l,m (A) =
Tr(Qm )
Tr(Ql )
X
(Q⊗m )r,r Sr∗ ASr
Hm
|r|=l−m
∗
= (φl−m ⊗ id)(V̄m,l AV̄m,l
).
A “left invariance” condition similar to (5.15) is also deduced using the ῑm,l ’s and their adjoints.
5.5 The state on OH
Corollary 5.14. The limit
φ∞ := lim φm
m→∞
is a well-defined state on
(0)
TH .
It annihilates
(0)
TH
(0)
∩ K, so it descends to a state ωQ on OH = B∞ .
(0)
Proof. For well-definedness we use (5.13) and recall that the elements of TH are norm limits of
(0)
(0)
eventually constant under ι•,• . The fact that φ∞ descends to TH /(TH ∩ K) follows from
|φm (A)| ≤ kAk,
∀A ∈ B(Hm ), m ∈ N0 ,
(0)
since this shows that limm kAm k = 0 implies φ∞ (A• ) = 0 for all A• = (Am )m∈N0 ∈ TH .
Proposition 5.15. The state ωQ : B∞ → C is KMS, with modular automorphism group σ• = (σt )t∈R
given by
−it
σt ◦ ς (m) (A) = ς (m) (Qit
m AQm )
for all A ∈ B(Hm ) and all m ∈ N0 , and ωQ satisfies
ωQ (Zj Zk∗ ) =
Qk,j
Tr(Qm )
(5.17)
(m)
for all j, k ∈ F+
: B(Hm ) → B∞
n with |j| = |k| = m. Moreover, the covariant symbol map ς
intertwines ωQ and φm :
ωQ ◦ ς (m) = φm .
(5.18)
32
Proof. Due to (5.13) we have, if |j| = |k| = m,
ωQ (Zj Zk∗ ) = φ∞ (Sj Sk∗ )
= lim φl (Sj Sk∗ pl )
m≤l→∞
= φm (Sj Sk∗ pm ),
and so the first formula in (5.17) follows from
X
(Q⊗m )r,r her |pm ej ihek |pm er i
Tr(Qm )φm (Sj Sk∗ ) =
|r|=m
= hek |Qm ej i.
The definition of ς (m) immediately gives (5.18), again using (5.13).
That ωQ is KMS follows from (5.18), in view of the fact that the ∗-algebra generated by the
covariant symbols ς (m) (A) is dense in B∞ and that each φm is KMS. Finally, for t ∈ R the modular
−it
automorphism σtφm of φm takes A ∈ B(Hm ) to (ρ(m) )it A(ρ(m) )−it = Qit
m AQm .
We can extend ωQ to a state, still denoted by ωQ , on the whole Cuntz–Pimsner algebra by defining
(k)
(0)
it to be zero on each spectral subspace OH except OH .
Remark 5.16. The property (5.18) of the limit state relies on Assumption 5.4(ii) and ensures that
ω is faithful. Without this assumption we could still obtain a limit ωQ of the states φm but it is not
clear what would guarantee its faithfulness. We could go the GNS representation of B∞ associated
with ωQ and use the faithful state induced by ωQ on the image of B∞ , which is a quotient of B∞
(recall that ωQ is KMS). Then analogous results hold for the image of B∞ in the GNS representation.
Example 5.17. For the product system H⊗• , the Cuntz–Pimsner algebra OH is the Cuntz algebra
On and ωQ is the quasi-free state on On defined by the density matrix Q/ Tr(Q) [Ev1].
5.6 Contravariant symbols
Proposition 5.18. The adjoint ς˘(m) : B∞ → B(Hm ) of the covariant symbol map ς (m) : B(Hm ) →
B∞ , defined by the relation
∀A ∈ B(Hm ), f ∈ B∞ ,
ωQ (ς (m) (A)∗ f ) = φm A∗ ς˘(m) (f ) ,
is given by
X
ς˘(m) (f ) = Tr(Qm )
∗
∗
(Q⊗m )−1
j,j ωQ (Zj Zk f )Sk Sj
Hm
(5.19)
|j|,|k|=m
Proof. Let ς˘(m) (f ) be defined by (5.19). Then
X
(A∗ )j,k ωQ (Zj Zk∗ f )
ωQ (ς (m) (A)∗ f ) =
|j|=m=|k|
=
X
∗
∗
(Q⊗m )j,j (Q⊗m )−1
j,j (A )j,k ωQ (Zj Zk f )
|j|=m=|k|
= φm A∗ ς˘(m) (f ) .
Corollary 5.19. We have
(m)
and, moreover, each ς˘
ωQ = φm ◦ ς˘(m)
is unital.
33
(5.20)
Proof. Equation (5.20) is a direct consequence of the fact that ς˘(m) is adjoint to the unital map ς (m) .
Unitality of ς˘(m) follows from ωQ (ς (m) (A)∗ 1) = φm (A∗ ), which we know from (5.18).
We can now assembly the ς˘(m) ’s to a map
Y
Y
B(Hm ),
ς˘(m) : B∞ →
ς˘ :=
(5.21)
m∈N0
m∈N0
which is a noncommutative generalization of the total Toeplitz map (3.5). We can recover its components as
ς˘(m) (f ) = ς˘(f )pm .
The following result which relies on the fact that ωQ is faithful (cf. Remark 5.16).
(0)
Lemma 5.20. No nonzero element of B∞ is mapped to Γ0 = TH ∩ K under the map ς˘.
Proof. We have φm ς˘(m) (f ) = ωQ (f ), so if ς˘(m) (f ) → 0 as m → ∞ then ωQ (f ) = 0. Hence if f ≥ 0
then f = 0 and the result follows.
Let M = πωQ (B)′′ be the von Neumann algebra generated by the inductive limit B∞ in the GNS
representation of the limit state ωQ . Then we can define ς˘(f ) ∈ Γb also for elements in M, and
Lemma 5.20 extends to M.
Lemma 5.21. For all f ∈ M and all l ≥ m,
ς˘(m) (f ) = l,m ◦ ς˘(l) (f ).
(5.22)
Hence the image of M under the total Toeplitz map ς˘ is contained in the projective limit B ∞ , and in
fact we have equality
ς˘(M) = B ∞ .
Therefore B ∞ can be identified with the weak-∗-closed operator system of elements of the form
ς˘(f ) = (˘
ς (m) (f ))m∈N0 ,
f ∈M
and, as in Remark 5.3,
ς˘(m) = ∞,m
is the map which evaluates (Xm )m∈N0 ∈ B ∞ at m ∈ N0 . The norm-closed subset ς˘(B∞ ) equals the
anti-normally ordered part of the Toeplitz core.
Proof. We know that ς˘ is injective (Lemma 5.20). Since we have shown that l,m is adjoint to ιm,l ,
we obtain (5.22) by taking adjoints of
ς (l) ◦ ιm,l = ς (m) .
From (5.22) follows that ς˘(f ) ∈ B ∞ for all f ∈ M. Moreover, ς˘ : M → Γb is onto B ∞ because each
ς˘(m) is onto. Thus B ∞ is in bijection with M via ς˘.
(0)
We need to show that ς˘(B∞ ) equals the anti-normally part of the Toeplitz core TH . Firstly,
since the left and right shifts commute outside the vacuum subspace, for all r, s = 1, . . . , n we have
l,m (Sr∗ Ss pl ) =
=
Tr(Qm )
Tr(Ql )
Tr(Qm )
Tr(Ql )
X
(Q⊗m )k,k Rk∗ Sr∗ Ss Rk
Hm
|k|=l−m
X
(Q⊗m )k,k Sr∗ Rk∗ Rk Ss
|k|=l−m
Hm
= Sr∗ Ss |Hm
(0)
(where we used that l,m (pl ) = pm ), which shows that the anti-normally ordered elements of TH are
constant under •,• . Secondly, an explicit calculation using (5.19) shows that ς˘(f ) is anti-normally
ordered for each f ∈ B∞ .
34
Remark 5.22. Now we can give an alternative proof for the fact that the contravariant symbol map
ς˘(l) : B∞ → B(Hm ) intertwines ωQ with φl ,
ωQ = φl ◦ ς˘(l) .
Recall that ωQ denotes the limit state φ∞ := limm→∞ φm when regarded as a state on the quotient
(0)
B∞ of TH . Then ωQ = φl ◦ ς˘(l) follows from the compatibility φm = φl ◦ m,l (see (5.13)) and the
fact that ∞,l = ς˘(l) .
5.7 The asymptotic multiplication
We now endow the projective limit B ∞ with a multiplication which is the m → ∞ limit of the
multiplication on B(Hm ).
Definition 5.23. The projective-limit multiplication on B ∞ ⊂ Γb is defined by
ς˘(f ) · ς˘(g) := lim ς˘(m) (f g)
m→∞
(5.23)
for all f, g ∈ B∞ .
The projective limit B ∞ is not an algebra under the projective-limit multiplication, but we shall
see that the subset ς˘(B∞ ) is.
The multiplication on B ∞ taken modulo Γ0 is the one where sequences (˘
ς (m) (f ))m∈N0 and
(m)
(˘
ς (g))m∈N0 are multiplied componentwise but the finite-m part is ignored. That is,
π(˘
ς (f )˘
ς (g)) = lim ς˘(m) (f )˘
ς (m) (g).
m→∞
(5.24)
We will see momentarily that the products (5.23) and (5.24) coincide for f, g ∈ B∞ . Comparing the
two formulas one then concludes that the Toeplitz maps ς˘(m) are “asymptotically multiplicative”.
Again the projective limit B ∞ is not an algebra under the multiplication modulo compacts, while
ς˘(B∞ ) will be shown to be so.
Remark 5.24 (Filters). A projective-limit multiplication can be defined using any filter ω on N.
On the C ∗ -level this corresponds to considering not a subalgebra of Γb /Γ0 but a subalgebra of Γb /Γω
where Γω is the ideal consisting of the sequences A• with
lim kAm k = 0.
ω
We recover Γ0 if ω is the free filter of all cofinite subsets of N0 . Confer [RoSt1, §6.2].
5.8 The adjoint of the total Toeplitz map
Lemma 5.25. For A ∈ B(Hl ) we have
l,0 (A) = φl (A)p0 .
(5.25)
(0)
and hence, if ε̂ denotes the vacuum state restricted to TH ,
ε̂ ◦ l,0 = φl .
The vacuum state ε̂ restricted to B ∞ is equal to ε̂ ◦ ∞,0 and coincides with the limit state φ∞ :=
liml→∞ φl ,
ε̂ ◦ ∞,0 = φ∞ .
35
Proof. We use φm ◦ l,m = φl for m = 0. This gives (5.25). Alternatively, note that for each positive
operator A on B(Hm ) one has
X
Ak,k
Tr(A) =
|k|=m
where Ak,k := hpm ek |Apm ek i. Consequently,
φm (A) =
X
1
hΩ|Sk∗ ASk Ωi = φ0 (m,0 (A)).
dim Hm
|k|=m
Letting m → ∞ one obtains
ω(f ) = φ0 (˘
ς (0) (f )),
∀f ∈ C 0 (M), f ≥ 0.
The rest is obvious.
We can therefore regard ε̂ as a state on the projective limit modulo compact operators as well,
i.e. on the algebra π(B ∞ ) ⊂ Γb /Γ0 .
Recall that the covariant-symbol map ς (m) is the adjoint of ς˘(m) , for each m ∈ N. We now show
that the total Toeplitz map ς˘ has an adjoint as well. This should be compared with [INT1, Lemma
2.3].
Proposition 5.26. There exists a completely positive map
ς˘∗ : ς˘(B∞ ) → B∞
such that, for all X ∈ ς˘(B∞ ) and all f ∈ B∞ ,
ωQ (˘
ς ∗ (X ∗ )f ) = ε̂(π(X ∗ )π(˘
ς (f ))).
(5.26)
Explicitly, this map is given by the point-norm limt ς˘∗ = limm→∞ ς (m) ,
ς˘∗ (X) = lim ς (m) (Xpm ),
m→∞
∀X ∈ ς˘(B∞ ),
and will be denoted by ς.
Proof. We identify X ∈ ς˘(B∞ ) with a bounded sequence (Xm )m∈N0 of operators Xm = Xpm ∈
B(Hm ). Using the formula (5.24) for the multiplication in π(B ∞ ) we have, by norm-continuity of the
vacuum state, the norm limits
∗ (m)
ε̂(π(X ∗ )π(˘
ς (f )))p0 = Ω lim Xm
ς˘ (f )Ω p0
m→∞
∗ (m)
ς˘ (f )
= ∞,0 lim Xm
m→∞
∗ (m)
ς˘ (f )
= lim m,0 Xm
m→∞
∗ (m)
= lim φm Xm
ς˘ (f ) p0
m→∞
∗
)f p0
= lim ωQ ς (m) (Xm
m→∞
∗
)f p0 .
= ωQ lim ς (m) (Xm
m→∞
Being a point-norm limit of completely positive maps, ς is completely positive.
Since B ∞ = ς˘(M) contains no compact operator, it is clear from the definition of the covariant
symbol that ς restricts to a bijection from B ∞ onto M and that ς ◦ ς˘ is the identity on M. Hence ς˘
is an isometry. So we have a decomposition of the identity map on B∞ ,
id = ς ◦ ς˘ = lim ς (m) ◦ ς˘(m) ,
m→∞
36
making Remark 4.7 explicit. We have now seen that ς˘ : B∞ → ς˘(B∞ ) is a complete order isomorphism,
i.e. a bijective unital completely positive map with completely positive inverse.
There is also a version of this result on the level of von Neumann algebras. As we shall see in
§6.5.2, for any subproduct system H• , the weak-∗-closed operator system B ∞ becomes a von Neumann
algebra when equipped with a SOT-version of the projective-limit multiplication (5.23). When H•
is the G-subproduct system (see §6 below), B ∞ is an operator system in the group-von Neumann
algebra R(G).
Corollary 5.27. The total Toeplitz map ς˘ intertwines the state ωQ on M = πωQ (B∞ )′′ with the
vacuum state ε̂ on B ∞ ⊂ B(HN ),
ωQ = ε̂ ◦ ς˘,
(5.27)
and similarly
ωQ ◦ ς = ε̂,
(5.28)
Proof. Take X = 1 respectively f = 1 in (5.26) to get (5.27) respectively (5.28).
(0)
5.9 OH as a projective limit
Theorem 5.28. The operator system ς˘(B∞ ) ⊂ B ∞ is a C ∗ -algebra with the multiplication taken
(0)
modulo compacts; indeed π(˘
ς (B∞ )) is isomorphic as a C ∗ -algebra to the inductive limit B∞ ∼
= OH .
Remark 5.29. We saw in Lemma 5.20 that the image of ς˘ does not contain Γ0 . On the other hand,
ς˘(B∞ ) + Γ0 is generated by Ran ς˘ alone as a C ∗ -algebra. The theorem implies that
ς˘(f )˘
ς (g) − ς˘(f g) ∈ Γ0
even for nontrivial f, g ∈ B∞ . These elements do not belong to B ∞ , which is why we need to apply
the quotient map π : Γb → Γb /Γ0 in order to obtain an algebra.
Proof. This is a well-known consequence of the fact that ς˘ : B∞ → ς˘(B∞ ) is a complete order
isomorphism from a C ∗ -algebra B∞ onto the operator system ς˘(B∞ ); see [Arv10, Prop. 2.2].
Corollary 5.30. The projective-limit multiplication on ς˘(B∞ ) ⊂ Γb coincides with the multiplication
on ς˘(B∞ ) taken modulo Γ0 .
Proof. By uniqueness of the C ∗ -algebraic structure we know that any two multiplications on ς˘(B∞ )
compatible with the norm must be isomorphic. But as remarked in §5.7, the exact equality of the
two products at hand is equivalent to the statement that ς˘ is multiplicative modulo Γ0 , whence the
result.
(0)
Recall that it is the normally ordered elements of TH which are constant under the inductive
system ι•,• . The partial inverse ς(m) : ς (m) (Bm ) → Bm Q
of the covariant symbol map ς (m) gives a
normally ordered “quantization” of B∞ , and the image of m∈N0 ς(m) is the normally ordered part of
(0)
the Toeplitz core, which is all of TH . In contrast, the projective limit B ∞ contains (as an operator
(0)
space) only the anti-normally ordered elements in TH , so “Toeplitz quantization” gives the anti−1
normal ordering. Lemma 2.15 shows that π (π(˘
ς (B∞ ))) = ς˘(B∞ ) + Γ0 nevertheless gives all of
(0)
TH .
37
5.10 Strict quantization
Some authors ([Hawk3], [Rie1], [Sain]) do not require commutativity of the “classical limit algebra”
in an axiomatic approach to “strict quantization”. Adapting such a definition, we can show that
what we have done here is a strict quantization.
Let 0 B∞ denote the ∗-algebra generated by the ς (m) (A)’s for all A ∈ B(Hm ) and all m ∈ N0 ; thus
0
B∞ is a dense ∗-subalgebra (the “algebraic part”) of the inductive-limit C ∗ -algebra B∞ .
Definition 5.31. The Berezin product on 0 B∞ is defined for all f, g ∈ 0 B∞ by
(m)
f ⋆ g := ς (m) ς(m) (f )ς(m) (g) ,
where ς(m) : ς (m) (Bm ) → Bm denotes the partial inverse of ς (m) . The Poisson bracket on 0 B∞ is
defined by (cf. [Hawk1, §D.1])
(m)
(m)
m
{f, g} := lim √ (f ⋆ g − g ⋆ f ).
m→∞
−1
(5.29)
Of course we do not expect (5.29) to be a Poisson bracket in the ordinary sense, and {·, ·} is not
likely to be interesting unless H• is commutative.
Corollary 5.32. The sequence (B• , ς˘(•) ) = (Bm , ς˘(m) )m∈N0 is a strict quantization of 0 B∞ in the
sense that each ς˘(m) is surjective and, for all f, g ∈ 0 B∞ ,
lim k˘
ς (m) (f g) − ς˘(m) (f )˘
ς (m) (g)k = 0,
(5.30)
lim k˘
ς (m) (f )k = kf k,
(5.31)
lim km−1 [˘
ς (m) (f ), ς˘(m) (g)] − {f, g}]k = 0.
(5.32)
m→∞
m→∞
m→∞
(0)
Proof. We have seen that π ◦ ς˘ : B∞ → TH /Γ0 is injective, so
ς˘(f )˘
ς (g) − ς˘(f g) ∈ Γ0 ,
which is equivalent to von Neumann’s condition (5.30). Rieffel’s condition (5.31) coincides with the
definition of the norm on B ∞ . Similarly, the Dirac condition (5.32) is tautology in view of our
definition of {·, ·} in (5.29).
We have seen that a subproduct system H• comes with a sequence B• = (Bm )m∈N0 of finite(0)
dimensional algebras Bm := B(Hm ), to which we can add B∞ ∼
= OH , and two sequences ς (•) =
(•)
(m)
(m)
ς )m∈N0 of positive unital maps
(ς )m∈N0 and ς˘ = (˘
ς (m) : Bm → B∞ ,
ς˘(m) : B∞ → Bm
such that ς (m) ◦ ς˘(m) converges to the identity map on B∞ . As in [Sain, Prop. 2.2] we can associate
to this data a continuous field of C ∗ -algebras, making explicit the assertion in Remark 4.5.
(0)
Corollary 5.33. The C ∗ -algebra TH can be identified with the space of continuous sections of the
continuous field N0 ∪ {∞} ∋ m → Bm , i.e.
o
n
Y
(0)
Bm X∞ = lim ς (m) (Xm ) .
TH ∼
= (Xm )m∈N0 ∪{∞} ∈
mN0 ∪{∞}
m→∞
Proof. We have seen that ς : ς˘(B∞ ) → B∞ can be obtained as
ς(X) = lim ς (m) (Xpm ).
m→∞
∗
Thus, the C -algebra of continuous sections of B• consists of the image of ς˘(B∞ ) under ς together
with the sequences (Xm )m∈N0 ∪{∞} such that X∞ = 0. Hence the result follows from the facts that
(0)
ς˘(B∞ ) + Γ0 = TH
and that ς is an isomorphism.
38
5.11 OH assembled from projective limits
We now define modules over the projective limit B ∞ .
(k)
Recall that we defined in §4.3 an inductive system ιm,l : B(Hm , Hm+k ) → B(Hl , Hl+k ). Define the
(k)
(k)
adjoint l,m : B(Hl+k , Hl ) → B(Hm+k , Hm ) of ιm,l by the property that
(k)
(k)
φm l,m (X)Y = φl Xιm,l (Y )
for all X ∈ B(Hl+k , Hl ) and all Y ∈ B(Hm , Hm+k ). We deduce that
Tr(Qm ) X
(k)
l,m (X) =
∀X ∈ B(Hl+k , Hl ),
(Q⊗m )r,r Rr∗ XRr Hm ,
Tr(Ql )
|r|=l−m
(k)
and that the opertors on HN which are constant with respect to the system •,• are precisely those
(l)
of the form ς˘k (f ) = (˘
ςk (f ))l∈N0 for some f ∈ B∞ , where
X
(l)
−1
(Q⊗m )j,j
ωQ (Zj Zk∗ f )Sj Sk∗ H .
ς˘k (f ) = Tr(Ql )
l
|j|=l,|k|=l+k
Define E(k) to be the set of ς˘k (f )’s for all f ∈ B∞ . Then E(k) is an operator system.
(k)
Let Γ0
l → ∞.
be the vector space of sequences of operators in B(Hl+k , Hl ) which converge to zero as
(k)
(−k)
Proposition 5.34. The vector space E(k) + Γ0 coincides with the subspace TH
of the Toeplitz
(k)
∗
∞
algebra. Hence E(k) is a module over the C -algebra B , the module action taken modulo Γ0 . In
∼ O(−k) .
fact, E(k) is isomorphic as a Hilbert bimodule to E (−k) =
H
Proof. The first statements are proven in the same way as for k = 0. For the last assertion, note
that the algebras of compact module operators KB∞ (E (−k) ) and KB∞ (E(k) ) are isomorphic, namely
to B∞ ∼
= B ∞ . Hence the modules E(k) and E (−k) are isomorphic [Frank1].
5.12 Commutative case
If H• is associated with the radical homogeneous ideal which defines a projective variety M ⊂ CPn−1 ,
Assumption 5.4 is satisfies if and only if M is a coadjoint orbit G/K under some Lie group G, and
then one may take Q = p1 (the identity operator on H1 ). However, there are many commutative and
noncommutative subproduct systems H• for which a projective limit can be constructed in a weaker
sense.
Let us focus on the case when commutative H• . Then we know that the right shifts R1 , . . . , Rn
coincide with the left shifts S1 , . . . , Sn , and from our discussion about inductive limits we know
that [Sj∗ , Sk ] is compact for all j, k = 1, . . . , n. Therefore, the maps l,m , and hence the Toeplitz
maps ς˘(m) , become asymptotically multiplicative. That is, ς˘ is a homomorphism modulo compacts.
Furthermore, the asymptotic unitality of the maps m+1,m allows us to define a norm on B ∞ by the
same formula as before. The map ς˘ then becomes isometric, and it is adjoint to the map ς which
(0)
identifies TH /Γ0 with B∞ = C 0 (M ). One easily sees that no Toeplitz operator is in Γ0 and that
ς ◦ ς˘ = id .
The main difference from the special case M = G/K is that for general M one has
ς˘(1) 6= 1
P
and the passage from S to a spherical isometry is more involved since nk=1 Sk∗ Sk pm is not just a
scalar multiple of pm for each m.
As we have seen (recall Proposition 3.6), from the version of Berezin quantization with prequantum condition one obtains a strict quantization of C(M ). With projectively induced quantization we
obtain from Corollary 5.32 a strict quantization of C(M ), and we do not require M to be smooth.
39
Corollary 5.35. For any projective variety M , the sequence (Bm , ς˘(m) )m∈N0 is a strict quantization
of the dense ∗-subalgebra of C(M ) generated by the ς (m) (Bm )’s.
Corollary 5.35 was inspired [Hawk2], where the Toeplitz operators where defined geometrically in
the case of a prequantum quantization. When M is smooth we see from the proof of [Hawk2, Lemma
4.2] that the limit state on B∞ = C(M ) is faithful and hence C(M ) is also isomorphic to the subset
ς˘(B∞ ) of the projective limit B ∞ with the multiplication taken modulo compacts. For non-smooth
M we do not know if the limit state on B∞ is faithful.
6 Application to compact matrix quantum groups
6.1 Compact matrix quantum groups
For the theory of compact quantum groups we refer to [KlS], [MaVD], [Timm1]. We shall restrict
attention to compact matrix quantum groups, defined as follows.
Definition 6.1 ([Wang3], [Wor1]). A compact matrix quantum group G is defined by a C ∗ algebra C(G) generated by the entries uj,k of a single unitary matrix u ∈ Mn (C) ⊗ C(G) (for some
n ∈ N) such that the map ∆ : C(G) → C(G) ⊗ C(G) defined by
∆(uj,k ) :=
n
X
r=1
uj,r ⊗ ur,k
is a ∗-homomorphism, and such that the transpose ut is invertible.
We refer to the generating matrix u as the defining representation of the “group” G.
The Haar state on C(G) (or the Haar measure on G) is the unique state on C(G) which is
left G-invariant, in the sense that
(id ⊗h) ◦ ∆(f ) = h(f )1.
The Haar state is always faithful on the ∗-algebra generated by the uj,k ’s but not necessarily so on
the norm closure C(G). There is a canonical construction of a “reduced version” of G, which is a
compact quantum group with faithful Haar state [BMT1, §2] and has the same dense Hopf ∗-algebra.
We shall always work with the reduced version or, what amounts to the same thing, assume that h
is faithful on all of C(G). Then h is a KMS state [Wor4].
6.1.1
Representations and actions
Definition 6.2. A representation of G is a corepresentation of C(G), i.e. an invertible element
v ∈ B(Hv ) ⊗ C(G), for some Hilbert space Hv , satisfying (in leg-numbering notation)
(id ⊗∆)(v) = v13 v23
as elements of B(Hv ) ⊗ B(Hv ) ⊗ C(G). A representation v is irreducible if the set
HomG (v, v) := {T ∈ B(Hv )|(T ⊗ 1)v = v(T ⊗ 1)}
is trivial.
Definition 6.3. Two representations v ∈ B(Hv ) ⊗ C(G) and w ∈ B(Hw ) ⊗ C(G) are equivalent,
denoted v ≃ w, if there is a unitary U : Hv → Hw such that
(U ⊗ 1)v = w(U ⊗ 1)
(in particular, this requires dim Hv = dim Hw ). We denote by Irrep G the (countable) set of equivalence classes of irreducible representations of G. We choose a representative u(λ) ∈ B(Hλ ) ⊗ C(G)
for each λ ∈ Ĝ.
40
Definition 6.4. The tensor product of two representations u ∈ B(H) ⊗ C(G) and v ∈ B(K) ⊗ C(G)
is the representation
u ⊗ v := u13 v23 ∈ B(H ⊗ K) ⊗ C(G).
In particular, u⊗m = u1,m+1 · · · um,m+1 is the matrix whose entries in the product basis for H⊗m is
given by
uj,k = uj1 ,k1 · · · ujm ,km .
Now let us explain the motivation for the invertible operator Q ∈ B(H) that we incorporated in
the Berezin quantization (recall §5.2).
It is a crucial consequence of the axioms of compact matrix quantum groups that for any finitedimensional representation v ∈ B(Hv ) ⊗ C(G) of G, one can find an invertible matrix Fv ∈ B(Hv )
such that
v̄ := (Fv ⊗ 1)v c (Fv−1 ⊗ 1)
(6.1)
is unitary, where v c = (v t )∗ is the matrix whose coefficients are the adjoints of those of v. The
equivalence class of v̄ is the conjugate of the equivalence class of v (we shall also say that v̄ is a
conjugate of v). The matrix Fv in (6.1) is usually chosen such that Qv := Fv∗ Fv satisfies
Tr(Q−1
v ) = Tr(Qv ) ≡ dimq (v),
and this quantity is the “quantum dimension” of v. We have Qv̄ = (Qtv )−1 . We shall write Qλ :=
Qu(λ) etc. for irreducibles λ ∈ Irrep G and we denote by λ̄ the conjugate of λ.
Every representation of G decomposes completely into a direct sum of irreducibles. Hence, for
each pair of irreps λ, µ ∈ G there are integers mult(ν, λ ⊗ µ) ∈ N0 such that
M
u(λ) ⊗ u(µ) ≃
mult(ν, λ ⊗ µ)u(ν) .
(6.2)
ν∈Irrep G
Definition 6.5. The equations (6.2) dictate the fusion rules of G. The fusion rules are commutative if
mult(ν, λ ⊗ µ) = mult(λ ⊗ µ, ν),
∀λ, µ, ν ∈ Irrep G.
Example 6.6. Compact groups G = G have commutative fusion rules. More generally, q-deformations
of compact Lie groups have commutative fusion rules because the equivalence class of an irreducible
representation is determined by the highest weight of the representation.
The quantum groups in the next two examples are introduced in Definition 6.10 below.
Example 6.7. For any F , the fusion rules of the quantum group Bu (F ) are identical to those of
SU(2); in particular this is true for SUq (2). These fusion rules in fact characterize the Bu (F )’s among
compact quantum groups [Ban3, Théorème 2].
Example 6.8. The fusion rules of Au (Q) are far from commutative, see [Ban4].
Definition 6.9 ([Wang1, Def. 3.1]). A left action of a compact matrix quantum group G on a
C ∗ -algebra B is a unital ∗-homomorphism α : B → B ⊗ C(G) such that
(i) (α ⊗ id) ◦ α = (id ⊗∆) ◦ α,
(ii) (id ⊗ε) ◦ α = id, where ε is the counit on the dense Hopf-∗-subalgebra of C(G), and
(iii) there is a dense ∗-subalgebra 0 B of B such that α(0 B) ⊂ 0 B ⊗ C ∞ (G).
Similarly, a right action of G on B is a unital ∗-homomorphism α : B → C(G) ⊗ B satisfying the
obvious analogues of the properties (i), (ii) and (iii).
If B is a von Neumann algebra then we replace C(G) by its weak closure L∞ (G) in the GNS
representation of the Haar state, and only condition (i) is required in the definition of an action.
Every unitary representation v ∈ B(H) ⊗ C(G) of G induces a left action of G on B(H) given by
Adv : B(H) → B(H) ⊗ L∞ (G),
41
Adv (A) := v(A ⊗ 1)v ∗ .
(6.3)
6.1.2
Universal quantum groups
In the following, for a matrix u with entries in C(G), we write uc for the transpose of u∗ , i.e.
(uc )j,k := u∗j,k where u∗j,k is the adjoint of uj,k in C(G).
Definition 6.10 ([Wang3], [Ban4, Déf. 1]). Let F ∈ GL(n, C) be an invertible matrix and write
Q := F ∗ F . The universal unitary quantum group G = Au (Q) is the compact matrix quantum
group G whose algebra of continuous functions C(G) is generated by the entries of a unitary n × n
matrix u satisfying the relations making (F ⊗ 1)uc (F −1 ⊗ 1) a unitary matrix.
The universal orthogonal quantum group G = Bu (F ) is the compact matrix quantum group
whose algebra C(G) is the quotient of that of Au (Q) by the relation u = (F ⊗ 1)uc (F −1 ⊗ 1).
The prototype example of a Bu (F ) is the quantum SUq (2) group G := SUq (2). In general, Bu (F )
is some kind of higher-dimensional quantum SU(2) group which has no classical counterpart.
Suppose that H and G are compact matrix quantum groups such that C(H) is a quotient of
C(G). If the quotient map π : C(G) → C(H) fulfills (π ⊗ π) ◦ ∆G = ∆H ◦ π, i.e. if π intertwines the
comultiplication of G with that of H, then H is a quantum subgroup G. We have seen that Bu (F )
is a quantum subgroup of Au (Q) when F ∗ F = Q.
The name “universal” is motivated by the following fact, which we should anticipate from (6.1).
Lemma 6.11 ([VaDW]). Any compact matrix quantum group G is a quantum subgroup of Au (Q)
for some Q. If G in addition has a self-conjugate defining representation, then C(G) is a quantum
subgroup of some Bu (F ). We write G ⊂ Au (Q) and G ⊂ Bu (F ) ⊂ Au (Q) for these cases respectively.
Let u be the fundamental representation of G ⊂ Au (Q), with Q ∈ GL(n, C). Then the elements
z1 := uk,1 , . . . , zn := uk,n of the first row of u satisfy the Q-sphere relations
(Q−1 )1,1 1 =
n
X
(Q−1 )r,s zr∗ zs ,
r,s=1
6.1.3
1=
n
X
zs zs∗ .
(6.4)
s=1
The dual discrete quantum group
Let G be a compact matrix quantum group such that the GNS representation C(G) → B(L2 (G)) of
the Haar state is faithful. We shall identify C(G) with its image in B(L2 (G)) and denote by L∞ (G)
the von Neumann algebra generated by C(G) in B(L2 (G)).
In perfect analogy to the case of ordinary compact groups, the C ∗ -algebra C(G) has a Peter–
Weyl decomposition
M
C(G) =
B(Hλ )∗ ,
(6.5)
λ∈Irrep G
2
and the completion L (G) of C(G) in the inner product defined by the Haar state then allows for a
similar decomposition. The comultiplication ∆ on C(G) ⊂ B(L2 (G)) takes the form
∆(f ) = W (f ⊗ 1)W ∗ ,
∀f ∈ C(G)
for a unitary operator W on L2 (G) ⊗ L2 (G) referred to as the multiplicative unitary of G. The
dual of G is then defined via the (multiplier) Hopf C ∗ -algebra
M
c0 (Ĝ) :=
B(Hλ ),
(6.6)
λ∈Irrep G
with the comultiplication given by
ˆ
∆(X)
:= W ∗ (1 ⊗ X)W,
∀X ∈ c0 (Ĝ).
We denote by pλ the identity in B(Hλ ), regarded as an element of c0 (Ĝ). Then the counit ε̂ on c0 (Ĝ)
is characterized by (cf. (2.4))
ε̂(X)p0 = Xp0 ,
42
∀X ∈ c0 (Ĝ),
where 0 ∈ Irrep G is the trivial representation. Every irreducible representation u(λ) of G is obtained
from W by means of
u(λ) = W (pλ ⊗ 1).
The object Ĝ is referred to as a discrete quantum group. In the general theory of “locally
compact quantum groups”, there is a canonical dual quantum group associated also to Ĝ, and this
quantum group is precisely G. In particular, the dual of an ordinary compact group G is a discrete
quantum group, which is an honest group only if G is abelian.
The C ∗ -algebra c0 (Ĝ) is contained in the C ∗ -algebra K of compact operators on L2 (G). The
multiplier algebra of c0 (Ĝ) can be identified with the C ∗ -direct product
Y
cb (Ĝ) :=
B(Hλ ),
λ∈Irrep G
ˆ is a map from c0 (Ĝ) into cb (Ĝ) ⊗ cb (Ĝ). Continuing the analogy with the
and the comultiplication ∆
theory of honest groups, we shall denote by
M
cc (Ĝ) :=
B(Hλ )
λ∈Irrep G
the algebraic sum, and we denote the weak closure of c0 (Ĝ) in B(L2 (G)) by
Y
R(G) = ℓ∞ (Ĝ) := ℓ∞ B(Hλ ).
λ∈Irrep G
This “group-von Neumann algebra” R(G) is contained in the dual C(G)∗ of C(G).
Finally, the algebra of operators on L2 (G) affiliated with R(G) can be identified with the product
Q
b
λ∈Irrep G B(Hλ ), containing all (not necessarily bounded) sequences of elements in the B(Hλ )’s. Of
particular importance is the operator QG := (Qλ )λ∈Irrep G , where Qλ is as in §6.1.1.
From (6.6) we see that the irreducible representations of the C ∗ -algebra c0 (Ĝ) (also referred to
as the irreducible “corepresentations” of Ĝ) are parameterized by λ ∈ Irrep G. In fact, if u(λ) ∈
B(Hλ ) ⊗ C(G) is the irreducible representation of G with label λ (as in §6.1.1) then
πλ (X) := (id ⊗X)(u(λ) )
(6.7)
is the corresponding irreducible corepresentation of Ĝ, where X ∈ c0 (Ĝ) is regarded as a functional
on C(G). In general, if v is a unitary representation of G then (6.7) defines a representation πv of Ĝ
by substituting u(λ) with v. Then the commutant of πv (c0 (Ĝ)) in B(Hv ) equals
πv (c0 (Ĝ))′ = B(Hv )G ,
the fixed-point subalgebra under the G-action Adv (recall (6.3)).
The same equation (6.7) represents any (possibly unbounded) operator X affiliated to R(G) on
B(Hλ ). For each finite-dimensional representation v of G,
πv (QG ) = Qtv ,
where Qv is as in §6.1.1 and Qtv denotes its transpose. In particular, Qtv commutes with the projection
ˆ G ) = QG ⊗ QG , and it gives
onto any irreducible subrepresentation of v. It is well known that ∆(Q
Qv⊗w = Qv ⊗ Qw
for all finite-dimensional representations v and w.
43
6.2 First-row and first-column algebras
Throughout this section, G is a compact matrix quantum group. We denote by (u, H) the defining
representation of G. Thus the C ∗ -algebra C(G) is generated by the matrix coefficients of the unitary
matrix u ∈ B(H) ⊗ C(G). Set n := dim(H) and fix an orthonormal basis e1 , . . . , en of H so that
H∼
= Cn , and let uj,k be the matrix coefficients of u in this basis.
Definition 6.12. The first-row algebra of G is the C ∗ -algebra C(SG ) generated by the first row
z1 := u1,1 , . . . , zn := u1,n . This defines the quantum homogeneous space SG .
There is a Z-grading on C(SG ) obtained by letting the zk ’s have degree 1 while their adjoints
are given degree −1. We write the decomposition into spectral subspaces for the corresponding
U(1)-action as
k·k
M
C(SG ) =
C(SG )(k) .
k∈Z
Definition 6.13. The quantum homogeneous space G/K is defined as the noncommutative manifold
corresponding to the C ∗ -subalgebra of fixed points in C(SG ) for the U(1)-action:
C(G/K) := C(SG )(0) .
It is clear that C(G/K) is generated by the n2 elements {zj∗ zk }nj,k=1 (but this is obviously not a
minimal set of generators).
Example 6.14. If G = G is a compact semisimple Lie group then G/K is a coadjoint orbit and SG is
a principal U(1)-bundle over G/K. Indeed, let (U−1 , H−1 ) be the irreducible unitary representation
of G with highest weight (−1, 0, . . . , 0) and let K be the stabilizer of the complex line spanned by the
highest-weight vector ξ−1 . The action U−1 of G on H−1 is unitary, and hence Hamiltonian for the
symplectic form given by the imaginary part of the inner product on H−1 . The orbit U−1 (G) · [ξ−1 ]
of the line spanned by ξ−1 is then a Hamiltonian G-homogeneous space, and a characterization of
coadjoint orbits shows that G/K ∼
= U−1 (G) · [ξ−1 ] is a coadjoint orbit.
The hyperplane bundle over the projectivization P[H−1 ] restricts to a holomorphic line bundle L
over G/K and we let SG be the total space of the principal U(1)-bundle over G/K associated with
L∗ (cf. §3.3). A basis for the space of holomorphic sections of L generates C(SG ) and, after fixing
a basis e∗1 , . . . , e∗n for H−1 ∼
= Cn , such a basis is provided by the coordinate functions z1 , . . . , zn of
n−1
CP
restricted to G/K. Choosing the basis such that e∗1 ∝ ξ−1 we get G/K = G/K and SG = SG .
For example, if G = SU(n) then K = U(1) × SU(n − 1) and G/K = G/K is complex projective
n-space CPn−1 , whereas SSU(n) = S2n−1 is the unit sphere in Cn .
Example 6.15. The preceding discussion carries over to q-deformations of G, and we get that G/K
is a quantum flag manifold. For G = SUq (n) we obtain quantum projective n-space G/K = CPqn−1 ,
and SG is the q-deformed (2n − 1)-sphere S2n−1
(cf. [DDL1]).
q
Example 6.16 ([BaGo1, Thm. 3.3]). Let G := O∗ (n) be the half-liberated orthogonal group. Then
C(G/K) is in fact commutative and G/K is just the ordinary complex projective n-space CPn−1 ,
C(G/K) ∼
= C(CPn−1 ).
The spectral subspaces C(SG )(k) for the U(1) action on C(SG ) are Hilbert bimodules over the
fixed-point subalgebra C(G/K), where the multiplication in the ambient algebra C(SG ) defines left
and right C(G/K)-valued inner products
hξ|ηiright := ξ ∗ η,
hξ|ηileft := ξη ∗
(6.8)
between elements ξ and η in C(SG )(k) .
Remark 6.17 (Row vs column). We can also consider the C ∗ -algebra generated by the first column
elements wj := uj,1 of u (the “first-column algebra”). Everything proven about the first-row algebra
C(SG ) in this paper has a version where one instead uses the generators of the first-column algebra.
44
Lemma 6.18. The first-row algebra C(SG ) carries an ergodic action of G which contains every
irreducible representation of G with multiplicity one.
Proof. We define a left action C(SG ) → C(SG ) ⊗ C(G) by restriction of the comultiplication. The
Peter–Weyl decomposition (6.5) of C(G) gives the decomposition
M
C(SG ) ∼
Hλ ,
=
λ∈Irrep G
and the comultiplication restricts to the irreducible G-representation u(λ) on each Hλ .
In view of Lemma 6.18 and the above examples, the quantum homogeneous G-space G/K is a
natural generalization of the q-deformed projective spaces (in particular the standard Podleś sphere
S2q = CP1 ). In all cases the unique invariant state under the G-action is the restriction to C(SG ) of
the Haar state on C(G).
6.3 Subproduct systems of G-representations
The subproduct system associated with a compact quantum group G will be a subproduct H• in which
the Hilbert space Hm is contained in the mth tensor power H⊗m of the fundamental representation
H of G.
The idea is based on the observation that if u ∈ Mn (C) ⊗ C(G) is a representation of a compact matrix quantum group G then the first row z1 := u1,1 , . . . , zn := u1,n of u transforms as the
representation u under the “left translation” action λ of G given by restricting the comultiplication
∆:
n
X
zj ⊗ uj,k .
λ(zk ) := ∆(zk ) =
j=1
The constructions below can easily be made more general but we shall always assume that u is
irreducible. In fact we shall, for simplicity and concreteness, from now on assume that u is the
defining representation of G. Let H be the n-dimensional Hilbert space with basis vectors z1 , . . . , zn .
In most cases there are subrepresentations of G contained in the tensor product H ⊗ H. Keeping only
the largest G-invariant subspace H2 of H ⊗ H we obtain another irreducible representation u(2) of G.
Indeed, H2 can be identified with the span of zj zk for j, k = 1, . . . , n, and then u(2) is obtained by
the restricting the comultiplication, just as for u. Continuing like this we obtain a family (Hm )m∈N0
of Hilbert spaces satisfying the subproduct condition (2.1).
Definition 6.19. Let G be a compact matrix quantum group. The subproduct system H• just
described will be referred to as the the G-subproduct system.
If we dropped the requirement that u generates C(G) then Definition 6.19 makes no use of the
fact that C(G) is finitely generated, and hence it works for all compact quantum groups. On the
other hand, if we do not require irreducibility but G is a matrix group, we may always find a selfconjugate unitary finite-dimensional representation u whose coefficients generate C(G). Indeed, if u
generates C(G) then so does u⊕ ū, and the latter is self-conjugate. If u is self-conjugate and generates
C(G), every irreducible representation of G is obtained as Hm for a unique m ∈ N0 . However, for
definiteness we shall always suppose that G is a compact matrix quantum group and that u is the
defining representation, assumed irreducible.
Example 6.20. For G = G a classical compact Lie group, it is well known that the representation
Hλ+µ with dominant weight λ + µ occurs exactly once in the tensor product Hλ ⊗ Hµ ; this is the
“Cartan product” of Hλ and Hµ [East1]. In particular, if H• denotes the G-subproduct system then
Hm+1 is the Cartan product of Hm and H. This subproduct system is commutative, i.e. H• ⊆ H∨• ,
and the associated projective variety mentioned in §3.1 is a coadjoint orbit, isomorphic to G/K for
some closed subgroup K of G.
45
Example 6.21. The SU(n)-subproduct system coincides with the fully symmetric subproduct system
H∨• (Example 2.2).
Example 6.22. The G-subproduct system of the universal quantum group G = Au (Q) with positive
Q ∈ GL(n, C) is the product system H⊗• because each power u⊗m of the defining representation is
irreducible [Ban4].
Example 6.23. For G = Bu (F ) we have self-conjugacy u ≃ ū [Ban3]. So if u is irreducible then, as
mentioned above, every λ ∈ Irrep G occurs as Hλ ∼
= Hm for some m ∈ N0 .
The Hm ’s are all irreducible and usually pairwise inequivalent. The only examples where they
are not all inequivalent are those where C(G) is finite-dimensional.
6.4 Berezin quantization of C(G/K)
6.4.1
Covariant symbols as first-row matrix coefficients
Recall the formula (4.9) for the covariant symbol derived in Proposition 4.19. We now observe
that for any compact matrix quantum groups G, the same formula (with u now being the defining
representation of G) appears when taking matrix coefficients of the representation Ad(u(m) ) ≃ u(m) ⊗
ū(m) on B(Hm ).
Definition 6.24. We say that an element of C(G/K) is normally ordered if all zj ’s occur to the
left of the zk∗ ’s.
Lemma 6.25. Suppose that every element in C(G/K) can be written in normally ordered form.
Then the C ∗ -algebra C(G/K) can be generated by covariant symbols
(m)
⊗m
(m)c
ςG (A) := (Tr ⊗ id) (A ⊗ 1)u(m)c∗ (|e⊗m
(6.9)
1 ihe1 | ⊗ 1)u
for all A ∈ B(Hm ) and all m ∈ N0 .
Proof. Write φA := Tr(A·). Then the elements
(m)
⊗m
(m)c
,
ςG (A) = (φA ⊗ id) u(m)c∗ (|e⊗m
1 ihe1 | ⊗ 1)u
A ∈ B(Hm )
form a set which consists exactly of those matrix coefficients of the representation u(m)c∗ ⊗ u(m)c ≃
u(m) ⊗ ū(m) which are contained in C(G/K).
6.4.2
Intertwining the actions
Let W be the multiplicative unitary of G, i.e. the unitary on L2 (G) ⊗ L2 (G) implementing the
comultiplication ∆ (cf. §6.1.3). Then the restriction of W to L2 (G/K) ⊗ L2 (G) identifies with
u(N) := (u(m) )m∈N0 ∈ cb (Ĝ) ⊗ C(G).
We have an action of G on R(G) given by Ad(W ) (i.e. the same formula as for ∆ but now applied
to elements of a different algebra; of course this action extends to all of B(L2 (G))). The restriction
ˆ to B(L2 (G)) restricts to a
of this G-action to B(HN ) is just Ad(u(N) ). Similarly, the extension of ∆
∞
right Ĝ-action on L (G).
So we have the following actions of G and Ĝ on C(G/K).
Definition 6.26. The left G-action αG : C(G/K) → C(G/K) ⊗ C(G) is defined by
(m)
(m)
αG (ςG (A)) := (ςG
⊗ id)(u(m) (A ⊗ 1)u(m)∗ )
for all A ∈ B(Hm ) and all m ∈ N0 . The right Ĝ-action α̂G : C(G/K) → cb (Ĝ) ⊗ C(G/K) is defined
by
(m)
(m)
α̂G (ςG (A)) := (id ⊗ςG )(u(m)∗ (1 ⊗ A)u(m) ).
46
(m)
Lemma 6.27. The map ςG
is G- and Ĝ-equivariant,
(m)
(m)
⊗ id)(u(m) (A ⊗ 1)u(m)∗ ),
(6.10)
ˆ ◦ ς (m) (A) = (id ⊗ς (m) )(u(m)∗ (1 ⊗ A)u(m) ).
∆
G
G
(6.11)
∆ ◦ ςG (A) = (ςG
G
G
∞
The actions α and α̂ therefore coincide on C(G/K) ⊂ L (G) with the left regular action of G and
the right regular action of Ĝ, respectively.
Proof. Let α(m) (A) := u(m) (A ⊗ 1)u(m)∗ and α̂(m) (A) := u(m)∗ (1 ⊗ A)u(m) . We use the defining
property of a left action,
(α(m) ⊗ id) ◦ α(m) = (id ⊗∆) ◦ α(m) .
Formula (4.9) gives
(m)
(ςG
m
⊗ id)(α(m) (A)) = (Tr ⊗ id ⊗ id) (α(m) ⊗ id) ◦ α(m) (A)(|em
1 ihe1 | ⊗ 1)
m
= (Tr ⊗ id ⊗ id) (id ⊗∆) ◦ α(m) (A)(|em
1 ihe1 | ⊗ 1)
(m)
m
= ∆(Tr ⊗ id) α(m) (A)(|em
1 ihe1 | ⊗ 1) = ∆ ◦ ςG (A).
ˆ ⊗ id) ◦ α̂(m) .
The proof of (6.11) is identical, using (id ⊗α̂(m) ) ◦ α̂(m) = (∆
6.4.3
C(G/K) as an inductive limit
Now we will, for certain compact matrix quantum groups G, realize the first-row algebra C(G/K) as a
projective limit B ∞ . From our previous results we have then obtained C(G/K) as the U(1)-invariant
part of the Cuntz–Pimsner algebra of the G-subproduct system.
Let G ⊂ Au (Q) be a compact matrix quantum group (with faithful Haar measure), with Q ∈
GL(n, C), and let C(G/K) be the U(1)-invariant part of the first-row algebra C(SG ).
Let H• = HG
• be the G-subproduct system and let OH be its Cuntz–Pimsner algebra. In §5 we
defined the Toeplitz quantization ς˘(m) as a map from OH to B ∞ . In that way we could realize an
(0)
isomorphism between OH ∼
= B∞ and the projective limit B ∞ . In this section we shall use the same
strategy but with a map
(m)
ς˘G : C(G/K) → B(Hm ),
(6.12)
(0)
(m)
i.e. we quantize C(G/K) instead of OH . We define (6.12) to be the adjoint of the map ςG appearing
in (6.9). We shall in this way obtain an isomorphism between C(G/K) and B ∞ , and hence, due to
B∞ ∼
= B ∞ , we will arrive at the following result.
Theorem 6.28. Assume that normal ordering is possible in C(G/K). Then there is a C ∗ -isomorphism
between C(G/K) and the U(1)-invariant part of the Cuntz–Pimsner algebra OH of the G-suproduct
system:
(0)
C(G/K) ∼
= OH .
Q (m)
This isomorphism is given by the total Toeplitz map ς˘G = m ς˘G , and it intertwines the ergodic Gand Ĝ-actions as well as the G-invariant states.
Remark 6.29 (Normal ordering). For general G, the map ς˘G maps the normally ordered part of
(0)
C(G/K) onto OH . For instance, normal ordering is possible for G = Bu (F ) but not for Au (Q). In
fact, Au (Q) is our only example where ς˘G is not an isomorphism. Commutative fusion rules implies
normal ordering (recall Definition 6.5).
So let us begin by defining B ∞ to be the projective limit of the system (B(H• ), •,• ), where H• is
the G-subproduct system. Here the operator Q on H which appears in the construction of B ∞ (§5.2)
is taken to be the same as the matrix defining Au (Q) ⊃ G, assuming Q is equal to its transpose.
(m)
Thus, B(Hm ) is equipped with the φm -inner product, where φm = Tr(ρQ ·) is the state defined by
47
(m)
(0)
the density matrix ρQ := Qm / Tr(Qm ). We may therefore regard B ∞ ∩ TH
having trivial intersection with c0 (Ĝ).
as a subset of cb (Ĝ)
Lemma 6.30. The G-subproduct system H• and the matrix Q satisfy Assumption 5.4.
Proof. That Q⊗m preserves the subspace Hm ⊂ H⊗m follows from the fact, mentioned in §6.1.3, that
Q⊗m belongs to the commutant of the G-action on H⊗m .
Let L2 (S) be the GNS Hilbert space of the restriction of the Haar state to the subalgebra C(S) ⊂
C(G). Then the generators z1 , . . . , zn of C(S) are represented ∗-homomorphically as operators on
L2 (S). If we denote these by Z1 , . . . , Zn we thus have (assuming Q1,1 = 1) from (6.4) that
n
X
Qk,k Zk∗ Zk = 1.
k=1
Let H 0 (S) be the closed subspace of L2 (S) spanned by z1 , . . . , zn . Then H 0 (S) is invariant under
Z1 , . . . , Zn . Denote by Tk the restriction of Zk to H 0 (S) for each k ∈ {1, . . . , n}. If P is the orthogonal
projection of L2 (S) onto H 2 (S), we get
n
X
Qk,k Tk∗ Tk = P
n
X
Qk,k Zk∗ Zk
H 2 (S)
= 1.
(6.13)
k=1
k=1
Now the tuple T1 , . . . , Tn is unitarily equivalent to an operator tuple T̃1 , . . . , T̃n on the Fock space
HN satisfying
Tr(Qm+1 ) ∗
T̃j∗ T̃k |Hm =
∀m ∈ N0 , j, k ∈ {1, . . . , n}.
S S k |H m ,
Tr(Qm ) j
where S1 , . . . , Sn are the standard shifts on HN and we used again that Qm is simply the restriction
of Q⊗m to an invariant subspace. Equation (6.13) then says that the maps l,m are unital, i.e. that
ιm,l preserves the Q-traces.
Remark 6.31 (Q-spherical isometries and Q-subnormality). One may say that a tuple of operators
T1 , . . . , Tn satisfying Equation (6.13) is a Q-spherical isometry’. For Q = 1 we obtain the usual
notion of a spherical isometry. The particular Q-spherical isometry T1 , . . . , Tn obtained in the
proof of Lemma 6.30 is moreover Q-subnormal
P in that it is the restriction to an invariant subspace
of a tuple of operators Z1 , . . . , Zn satisfying nk=1 Zk Zk∗ = 1. In the commutative case (where we
must have Q = 1) we know from [Atha3, Prop. 2] that a subnormal operator tuple is a spherical
isometry if and only if it is subnormal and its normal extension has joint spectrum contained in the
unit sphere S2n−1 .
From our general results we have an isomorphism ς˘(B∞ ) ∼
= B∞ which realizes the projective limit
as an inductive limit. We stress again that this isomorphism ς˘ is not the same as the map ς˘G which
we now try to prove is an isomorphism.
The matrix coefficients of the operator ς˘(m) (f ) are of the form
h(zj zk∗ f ),
j, k ∈ F+
n with |j| = m = |k|.
(m)
(6.14)
(m)
Proof of Theorem 6.28. Since the “coefficient map” ςG in (6.9) is injective, its adjoint ς˘G is surjective. As in the case of B∞ , we get that the image of L∞ (G/K) under ς˘G is exactly B ∞ as a
set.
We cannot use the reasoning in the proof of Lemma 5.20 to deduce that ς˘G is an injection of
C(G/K) into the operator system B ∞ . On the other hand, we see directly that if ς˘(f ) = 0 then,
using that the matrix coefficients of ς˘(f ) are given by (6.14) for all m ∈ N, we get that f must be
orthogonal to the whole normally ordered part of C(G/K) ⊂ L2 (G). Since we have assumed that
each f ∈ C(G/K) can be normally ordered and that that the Haar state is faithful, this means that
f = 0.
48
(0)
Moreover, π −1 (˘
ς (B∞ )) is again equal to TH . Namely, the proof in §5.9 carries over completely.
As before we get that ς˘(m) = ∞,m . Since we know that ς˘(B∞ ) is a C ∗ -algebra (using that it is a
quotient of the Toeplitz algebra) with a unique multiplication, we obtain the von Neumann condition,
i.e. ς˘(m) is asymptotically a homomorphism (see Corollary 5.30). Thus ς˘ is an isomorphism for the
projective-limit multiplication.
We also know that ς˘G intertwines the vacuum state ε̂ with the Haar state h restricted to C(G/K).
Composing with the isomorphism ς˘ : B∞ → ς˘(B∞ ) we get that h is intertwined with the limit state
ωQ . Finally, Lemma 6.27 shows that ς˘G is G-Ĝ-equivariant.
6.4.4
C(SG ) as an inductive limit
Corollary 6.32. Let G be a compact matrix quantum group with faithful Haar measure h : C(G) → C
such that normal ordering is possible in C(G/K). Then there is a G-Ĝ-equivariant isomorphism
between the first-row algebra C(SG ) and the Cuntz–Pimsner algebra OH of the G-subproduct system,
C(SG ) ∼
= OH .
In particular, OH carries an ergodic action of G in which each irreducible representation of G occurs
exactly once.
(0)
(k)
Proof. For notation simplicity we identify OH with the inductive limit B∞ and the modules OH
with the modules E (k) .
Since B∞ ∼
= C(G/K), we know that there is a basis e1 , . . . , en for H such that the Q-sphere
condition (6.4) is satisfied by the generators Z1 , . . . , Zn of OH , just as it is for the generators z1 , . . . , zn
−1/2
−1/2
of C(SG ). This says precisely that Z1 , . . . , Zn and Q1,1 Z1 , . . . , Qn,n Zn are standard right and left
tight normalized frames for the B∞ -bimodule E (1) , respectively; for all ξ ∈ E (1) ,
n
X
k=1
n
X
k=1
−1/2
hξ|Zk iright hZk |ξiright = hξ|ξiright ,
−1/2
hξ|Qk,k Zk ileft hQk,k Zk |ξileft =
n
X
k=1
−1 ∗
ξQk,k
Zk Zk ξ ∗ = ξξ ∗ = hξ|ξileft ,
and identically for C(SG )(1) and the zj ’s. If we identify C(G/K) with B∞ , this means that the
projection P (1) ∈ Mn (C) ⊗ C(G/K) which defines the module C(SG )(1) coincides with the projection
which defines the module E (1) . So the modules are the same and the isomorphism C(SG ) ∼
= OH is
clear.
For the G-Ĝ-equivariance, we must first define actions on OH . But since we know that C(SG ) ∼
=
OH we can just specify these action on generators Z1 , . . . , Zn by the same formulas as for C(SG ).
The last statement is due to Lemma 6.18.
6.5 Comparison with Poisson and Martin boundaries
6.5.1
Poisson integral versus total Toeplitz map
Let G be a compact matrix quantum group with commutative fusion rules (see Definition 6.5) and
faithful Haar measure. The Poisson boundary to be discussed here is the one defined in [Iz1], so if
we were phrasing things in terms of random walks (we shall not), there would in the background be
a representation u of G whose coefficients generate C(G) (without any need of the adjoints u∗j,k ).
Izumi defines [Iz1, Lemma 3.8] the Poisson integral to be the unital completely positive map
Θ : L∞ (G) → R(G) given by
Θ(f ) := (id ⊗h)(W ∗ (1 ⊗ f )W ),
(6.15)
49
where W is the fundamental unitary (§6.1.3). Similar to the projective limit B ∞ which is the image
of our total Toeplitz map ς˘, the image of map Θ is an operator system, usually denoted by H ∞ (Ĝ),
which can be made into a von Neumann algebra by replacing the operator multiplication by the
new one. Moreover, Θ is a complete order isomorphism onto its image. A possible definition of the
Poisson boundary of Ĝ is then as the preimage, say L∞ (G/T), of Θ in L∞ (G). We then refer to
the abstract object G/T as the Poisson boundary of Ĝ. The notation G/T is chosen to indicate that
G and Ĝ act ergodically on L∞ (G/T).
The Poisson boundary G/T is defined in terms of a von Neumann algebra. In order to compare
G/T with what we have denoted G/K, note that ς˘ extends to a normal completely positive map
(denoted by the same symbol)
ς˘ : L∞ (G/K) → B ∞
(6.16)
and this is the “first-row” version of the Poisson integral. Using it one can carry out Berezin quantization on the level of von Neumann algebras. Inspiring work here is [INT1].
The Poisson integral (6.15) can be decomposed into components Θλ : L∞ (G) → B(Hλ ) for
λ ∈ Irrep G, and doing so one easily calculates the adjoints Θ∗λ : B(Hλ ) → L∞ (G). Noticing
the similarity to Berezin quantization, [INT1] referred to the composition Θ∗λ ◦ Θλ as the “Berezin
transform”. This terminology is not entirely fortunate because Θ∗λ ◦ Θλ does not coincide with the
usual notion of Berezin transform when G = G is an ordinary group. The issue is that Θ∗λ is obtained
by tracing against the invertible operator Qλ (which is of full rank) instead of a rank-1 projection.
The distinction is the use of “first-row” versus all of G. This distinction persists even if we, as Izumi
does, assume that every irreducible representation of G is contained in some power of u.
It is therefore interesting that the final results (G/K and G/T) are not very different. For SUq (2)
they even coincide. In general, we should view G/K as a (noncommutative) non-maximal flag variety
(prototype example being CPqn−1 ) while G/T is the maximal flag variety (so T is the “maximal
torus”); cf. [Tom1].
The transition between classical and quantum Poisson boundaries is rather involved [NT1]. In
fact, if G = G is an ordinary compact group then the Poisson boundary is trivial: L∞ (G/T) = C1
[Iz1, Cor. 3.9]. In contrast, Berezin quantization carries over in perfect analogy with the commutative
case.
6.5.2
Markov operator
The set H ∞ (Φ) of fixed points of a normal completely positive map Φ on a von Neumann algebra is
an ultraweakly closed operator system which can be made into a von Neumann algebra by replacing
the operator multiplication by the so-called “Choi–Effros multiplication” [Arv10, Thm. 3.1], [Iz4].
The new multiplication on the Poisson boundary H ∞ (Ĝ) mentioned above is just an example
of a Choi–Effros multiplication. The completely positive map on R(G) whose fixed-point set equals
H ∞ (Ĝ) takes the role of Markov operator for the “noncommutative random walk” on Ĝ.
The following can be summarized by saying that with Berezin quantization one ends up with a
random walk on the “dual” of G/K instead of the dual of G. Note however that it works for any
subproduct system H• . Fix thus a subproduct system H• and denote as usual by Γb = Γb (B• ) the
von Neumann-algebraic direct sum of the matrix algebras Bm := B(Hm ).
Definition 6.33. The Markov operator on B• is the unital normal completely positive map
Φ : Γb → Γb defined by
Φ(X• ) := X•−1 = (m,m−1 (Xm ))m∈N .
Proposition 6.34. The set H ∞ (Φ) of Φ-fixed points in Γb (B• ) is equal to the projective limit B ∞ . In
particular, B ∞ is a von Neumann algebra. On the subset ς˘(B∞ ) ⊂ B ∞ , the Choi–Effros multiplication
coincides with the projective-limit multiplication.
Proof. The first statement is clear, so B ∞ is a von Neumann algebra. To prove the last statement
we use the result [Iz3, Cor. 5.2] that the Choi–Effros product of X, Y ∈ H ∞ (Φ) is given by
X ⋄ Y = lim Φr (XY ),
r→∞
50
where XY is the multiplication in B(HN ) and the limit is in the strong operator topology. Now, the
mth component of X ⋄ Y is
(X ⋄ Y )m = lim Φr (XY ) m = lim m+r,m ((XY )m+r )
r→∞
r→∞
= ∞,m lim (XY )m+r
r→∞
= lim ς˘(l) (XY ) m ,
l→∞
where we used that Xm = ∞,m (X) = ς˘(m) (X). This shows that ⋄ is the projective-limit multiplication (5.23) whenever we have convergence in norm. Since norm-convergence holds for X = ς˘(f ) and
Y = ς˘(g) with f, g ∈ B∞ , the claim holds.
6.5.3
Martin boundaries
While the Poisson boundary is a measure-theoretic object defined via a von Neumann algebra, the
Martin boundary is specified in terms of a C ∗ -algebra [NT1]. Its relation to Berezin quantization is
the same ”first-row versus all-of-G“ story as with the Poisson boundary but we shall discuss only a
special case in which G/K agrees with the Martin boundary of Ĝ. The reason for this coincidence is
that the defining representation of the chosen G is self-conjugate and irreducible, so that H• contains
all irreducible representations.
Our approach here via inductive limits was partially inspired by [VVer1], where they construct a
“Martin boundary” of the dual of G for G = Bu (F ) in the same way. Our notation B∞ is chosen to
make comparison with that paper easy. Let F ∈ GL(n, C) such that F̄ F = ±1; this ensures that the
defining representation of G = Bu (F ) is irreducible. By construction, the Martin boundary of Ĝ is
equal to the inductive limit B∞ of the G-subproduct system.
In [VaVe1], another realization of the Martin boundary was accomplished. First define Bu (F, Fq )
to be the universal C ∗ -algebra generated by the entries of a unitary 2 × n matrix Y satisfying
Y = Fq Y c F −1 .
where Fq :=
0
|q|1/2
±|q|−1/2
0
(6.17)
, with q defined by |q + q −1 | = Tr(F ∗ F ) and F F̄ = ±q and we wrote
q = ∓|q|. It is shown in [VaVe1] that the U(1)-action ρ on Bu (F, Fq ) given by
λ 0
ρλ (Y ) :=
Y,
∀λ ∈ C, |λ| = 1
0 λ̄
allows recovering the Martin boundary as the fixed-point algebra Bu (F, Fq )U(1) .
Since our inductive limit B∞ coincides with the Martin boundary of the dual of Bu (F ), we know
(using Theorem 6.28) that Bu (F, Fq )U(1) must coincide with C(G/K). This can be seen directly. Let
z1 , . . . , zn and w1 , . . . , wn be the elements of the first and second row of Y respectively. Then (6.17)
reads
n
X
−1
zk = |q|1/2
ws∗ Fs,k
,
∀k = 1, . . . , n.
(6.18)
s=1
The action ρz is given by
ρλ (zk ) = λzk ,
ρλ (wk ) = λ̄wk ,
so the fixed-point algebra consists of elements of the form zj wk , and their adjoints, as well as zj zk∗
and wj wk∗ . Now (6.18) shows that Bu (F, Fq )U(1) = C(G/K), as asserted.
Note however that Bu (F, Fq ) is not at all the same as the first-row algebra C(SG ).
Thus we have one example where the Martin boundary of a discrete quantum group identifies
with the object G/K defined in this paper. Also, let q ∈ (0, 1]. Then for the G = SUq (2)-subproduct
system H• we have an equivariant isomorphism
(0)
OH ∼
= C(S2q ),
51
where G/K = S2q is the Podleś sphere. For q < 1, this shows again that our inductive limit B∞
coincides with the C ∗ -algebra referred to as the Martin boundary of the dual of SUq (2) in [VVer1]
(because the same boundary is known to be the Podleś sphere [NT1]). For q = 1, we have agreement
with Biane’s Martin boundary of the dual of SU(2) [Biane1].
7 Concluding remarks
We have seen that the inductive limit B∞ associated with a subproduct system H• is a sensible
generalization of the C ∗ -algebra C(M ) of continuous functions on a quantizable Kähler manifold,
in the case the Kähler structure is projectively induced (so M is embeddable as a submanifold of
projective space). We may therefore write
C(M) := B∞ ,
and say that M is the noncommutative projective variety associated to H• . We may also refer
to elements of
C(SM ) := OH .
as functions on the total space SM of a noncommutative circle bundle over M. Thus the notation
M := G/K and SM := SG would be consistent with that in §6 when H• is the G-subproduct system.
In [An5] we refer to M as the “dequantization manifold”.
By defining C(M) to be equal (and not just isomorphic) to the inductive limit B∞ , the noncommutative space M comes with more structure than just its topology. Namely, if M = M is
commutative then the inductive system gives an embedding into projective space CPn−1 and, if M
is non-singular, endows M with a complex-analytic (in particular smooth) structure, a polarization
L (choice of ample line bundle), an inner product on H 0 (M ; L) (the one we started with, making
H 0 (M ; L) into the Hilbert space H), a Hermitian metric on L (the one defining the ∗-structure on
OH ; this is just the Fubini–Study metric associated with the inner product on H) and a volume
form on M (viz. the limit state, which need not be the same as Fubini–Study volume form). As we
have seen, these structures have perfect generalizations to the noncommutative setting. Note that
the quantum homogeneous spaces G/K are “balanced” in the sense that the limit state on C(G/K)
coincides with the state induced by the Haar state on C(G).
The covariant symbols ς (m) (A) and the Toeplitz operators ς˘(m) (f ) can be expressed in terms of
the projections P (m) ∈ B(Hm ) ⊗ C(M) which define the modules E (m) . In this way one generalizes
the Rawsnely coherent-state projections in [RCG1], and in particular the coherent states in [Per1].
We will use this when we discuss the (fuzzy) geometry of M in another paper.
There are also projections P (−m) and maps ς (−m) , ς˘(−m) etc. associated with the modules E (−m) .
In this way one quantizes instead the anti-normal part of C(G/K).
8 References
11-124 (2000).
[An4] Andersson A. Detailed balance as a quantum-group symmetry of Kraus operators. arXiv:1506.00411
(2015).
[An5] Andersson A. Dequantization via quantum channels. Lett. Math. Phys. Vol 106, Issue 10, pp.
1397-1414 (2016).
[ArMa1] Ara P, Mathieu M. Local multipliers of C ∗ -algebras. Springer (2003).
[ArLo1] Arezzo C, Loi A. Quantization of Kähler manifolds and the asymptotic expansion of Tian–
Yau–Zelditch. J. Geom. Phys. Vol 47, Issue1, pp. 87-99 (2003).
[ArZh1] Artin M, Zhang JJ. Noncommutative projective schemes. Adv. in Math. Vol 109, Issue 2, pp.
228-287 (1994).
52
[Arv6c] Arveson W. Subalgebras of C ∗ -algebras III: Multivariable operator theory. Acta Math. Vol
181, pp. 159-228 (1998).
[Arv8] Arveson W. p-Summable commutators in dimension d. J. Operator Theory. Vol 54, pp. 101-117
(2005).
[Arv9] Arveson W. Quotients of standard Hilbert modules. Trans. Amer. Math. Soc. Vol 359, pp.
6027-6055 (2007).
[Arv10] Arveson W. Noncommutative Poisson boundaries. Unpublished. Available at http://math.berkeley.edu/ arve
son/Dvi/290F04/22Sept.pdf (2004).
[Atha3] Athavale A. On the intertwining of joint isometries. J. Oper. Theory. Vol 23, pp. 339-350
(1990).
[BDLMC] Balachandran AP, Dolan BP, Lee JH, Martin X, O’Connor D. Fuzzy complex projective
spaces and their star-products. J. Geom. Phys. Vol 43, pp. 184 (2002).
[Ban3] Banica T. Théorie des représentations du groupe quantique compact libre O(n). C. R. Acad.
Sci. Paris Sér. I Math. Vol 322, pp. 241-244 (1996).
[Ban4] Banica T. Le groupe quantique compact libre U(n). Comm. Math. Phys. Vol 190, pp. 143–172
(1997).
[BaGo1] Banica T, Goswami D. Quantum isometries and noncommutative spheres. Comm. Math.
Phys. Vol 298, Issue 2, pp. 343-356 (2010).
[BMT1] Bédos E, Murphy GJ, Tuset L. Co-amenability of compact quantum groups. J. Geom. Phys.
Vol 40, Issue 2, pp. 129-153 (2001).
[BeSl1] Berceanu S, Schlichenmaier M. Coherent state embeddings, polar divisors and Cauchy formulas.
J. Geom. Phys. Vol, Issue 34, pp. 336-358 (2000).
[Bere1] Berezin FA. Quantization. Math. USSR-Izv. Vol 38, pp. 1116-1175 (1974).
[Bere2] Berezin FA. General concept of quantization. Comm. Math. Phys. Vol 40, pp. 153-174 (1995).
[Bere3] Berezin FA. Covariant and contravariant symbols of operators. Math. USSR-Izv. Vol 6, Issue
5, p. 1117 (1972).
[Bere4] Berezin FA. Some remarks about the associative envelope of a Lie algebra. Funct. Anal. Appl.
Vol 1, pp. 91-102 (1967).
[Biane1] Biane P. Introduction to random walks on noncommutative spaces. In: Quantum Potential
Theory. pp. 61-116. Springer (2008).
[Bied1] Biedenharn LC. The quantum group SUq (2) and a q-analogue of the boson operators. J. Phys.
A: Math. Gen. Vol 22, pp. L873-L878 (1989).
[Blac1] Blackadar B. Operator algebras: theory of C ∗ -algebras and von Neumann algebras. Springer
(2006).
[BlKi1] Blackadar B, Kirchberg E. Generalized inductive limits of finite-dimensional C ∗ -algebras. Math.
Ann. Vol 307, pp. 343-380 (1997).
[BMS] Bordemann M, Meinrenken E, Schlichenmaier M. Toeplitz quantization of Kähler manifolds and
gl(n), n → ∞ limits. Comm. Math. Phys. Vol 165, Issue 2, pp. 281–296 (1994).
[BHSS] Bordemann M, Hoppe J, Schaller P, Schlichenmaier M. gl(∞) and geometric quantization.
Comm. Math. Phys. Vol 138, Issue 2, pp. 209-244 (1991).
[BLY1] Bourguignon J-P, Li P, Yau ST. Upper bound for the first eigenvalue of algebraic submanifolds.
Comment. Math. Helv. Vol 69, pp. 199-207 (1994).
[Brow1] Brown NP. Invariant means and finite representation theory of C ∗ -algebras. Mem. Amer.
Math. Soc. Vol 184, Issue 865 (2006).
[BrOz1] Brown NP, Ozawa N. C ∗ -algebras and finite-dimensional approximations. Amer. Math. Soc.
(2008).
[CGR1] Cahen M, Gutt S, Rawnsley J. Quantization of Kähler manifolds I: geometric interpretation of
Berezin’s quantization. J. Geom. Phys. Vol 7, Issue 1 (1990).
53
[CGR2] Cahen M, Gutt S, Rawnsley J. Quantization of Kähler manifolds II. Trans. Amer. Math. Vol
337, Issue 1 (1993).
[DDL1] D’Andrea F, Dabrowski L, Landi G. The noncommutative geometry of the quantum projective
plane. Reviews in Mathematical Physics. Vol 20, Issue 08, pp. 979-1006 (2008).
[DRS1] Davidson KR, Ramsey C, Shalit OM. The isomorphism problem for some universal operator
algebras. Adv. Math. Vol 228, Issue 1, pp. 167-218 (2011).
[DRS2] Davidson KR, Ramsey C, Shalit OM. Operator algebras for analytic varieties. Trans. Amer.
Math. Soc. Vol 367, Issue 2, pp. 1121-1150 (2015).
[Don1] Donaldson SK. Scalar curvature and projective embeddings, I J. Differential Geom. Vol 59, pp.
479-522 (2001).
[Don2] Donaldson SK. Scalar curvature and projective embeddings, II. Quart. J. Math. Vol 56, pp.
345-356 (2005).
[Don3] Donaldson SK. Some numerical results in complex differential geometry. Pure Appl. Math. Q.
Vol 5, Issue 2, pp. 571-618 (2009).
[Don9] Donaldson SK. Scalar curvature and stability of toric varieties. J. Differential Geom. Vol 62,
pp. 289-349 (2002).
[Don12] Donaldson SK. Lower bounds on the Calabi functional. J. Differential Geom. Vol 70, pp.
453-472 (2005).
[Doug4] Douglas RG. Essentially reductive Hilbert modules. J. Operator Theory. Vol 55, Issue 1, pp.
117-133 (2006).
[DoWa2] Douglas RG, Wang K. Geometric Arveson–Douglas conjecture and holomorphic extension.
arXiv:1511.00782v1 (2015).
[DoWa4] Douglas RG, Wang K. Essential normality of cyclic submodule generated by any polynomial.
J. Funct. Anal. Vol 261, pp. 3155-3180 (2011).
[East1] Eastwood M. The Cartan product. Bull. Belg. Math. Soc. Simon Stevin. Vol. 11, Issue 5, pp.
641-651 (2005).
[EnEs1] Engliš M, Eschmeier J. Geometric Arveson–Douglas conjecture. Adv. Math. Vol 274, pp.
606-630 (2015).
[Esch1] Eschmeier J. Essential normality of homogeneous submodules. Integr. Equ. Oper. Theory.
Vol 69, Issue 2, pp. 171-182 (2011).
[Ev1] Evans DE. On On . Publ. RIMS, Kyoto Univ. Vol 16, pp. 915-927 (1980).
[Frank1] Frank M. Isomorphisms of Hilbert C ∗ -modules and*-isomorphisms of related operator C ∗ algebras. Math. Scand. Vol 80, pp. 313-319 (1997).
[Hawk1] Hawkins E. Quantization of equivariant vector bundles. Comm. Math. Phys. Vol 202, Issue
3, pp. 517-546 (1999).
[Hawk2] Hawkins E. Geometric quantization of vector bundles and the correspondence with deformation
quantization. Comm. Math. Phys. Vol 215, Issue 2, pp. 409-432 (2000).
[Hawk3] Hawkins E. An obstruction to quantization of the sphere. Comm. Math. Phys. Vol 283, Issue
3, pp. 675-699 (2008).
[Huy] Huybrechts D. Complex geometry. An introduction. Springer (2005).
[Iz1] Izumi M. Non-commutative Poisson boundaries and compact quantum group actions. Adv. Math.
Vol 169, Issue 1, pp. 1-57 (2002).
[Iz2] Izumi M. Non-commutative Markov operators arising from subfactors. Operator algebras and
applications. Adv. Stud. Pure Math. Vol 38, pp. 201-217 (2004).
[Iz3] Izumi M. E0 -semigroups: around and beyond Arveson’s work. J. Operator Theory. Vol 68, Issue
2, pp. 335-363 (2012).
[Iz4] Izumi M. Non-commutative Poisson boundaries, Discrete geometric analysis. Contemp. Math.
Vol 347, pp. 69-81 (2004).
54
[INT1] Izumi M, Neshveyev S, Tuset L. Poisson boundary of the dual of SUq (n). Comm. Math. Phys.
Vol 262, Issue 2, pp. 505-531 (2006).
[KaSh1] Kakariadis E, Shalit O. On operator algebras associated with monomial ideals in noncommuting
variables. arXiv:1501.06495 (2015).
[KaSc1] Karabegov AV, Schlichenmaier M. Identification of Berezin–Toeplitz deformation quantization.
J. Reine Angew. Math. Issue 540, p.49-76 (2001).
[Kenn1] Kennedy M. Essential normality and the decomposability of homogeneous submodules. Trans.
Amer. Math. Socl. Vol 367, Issue 1, pp. 293-311 (2015).
[KeSh1] Kennedy M, Shalit OM. Essential normality and the decomposability of algebraic varieties.
New York J. Math. Vol 18, pp. 877-890 (2012).
[KeSh2] Kennedy M, Shalit OM. Essential normality, essential norms and hyperrigidity. New York J.
Math. Vol 18, pp. 877-890 (2012).
[KlS] Klimyk AU, Schmüdgen K. Quantum groups and their representations. Vol. 552, Springer, Berlin
(1997).
[Lan1] Landsman NP. Mathematical topics between classical and quantum mechanics. Springer (1998).
[Lan2] Landsman NP. Strict quantization of coadjoint orbits. J. Math. Phys. Vol 39, Issue 12, pp.
6372-6383 (1998).
[LMS1] Lazaroiu CI, McNamee D, Sämann C. Generalized Berezin quantization, Bergman metrics and
fuzzy Laplacians. J. High Energy Phys. Issue 9, pp. 1-59 (2008).
[LuTe1] Lübke M, Teleman A. The Kobayashi–Hitchin correspondence. World Scienlific Publishing
(1995).
[MaVD] Maes A, Van Daele A. Notes on compact quantum groups. arXiv: math/9803122 (1998).
[McTr1] McCullough S, Trent TT. Invariant subspaces and Nevanlinna–Pick kernels. J. Funct. Anal.
Vol 178, Issue 1, pp. 226-249 (2000).
[NT1] Neshveyev S, Tuset L. The Martin boundary of a discrete quantum group, J. Reine Angew.
Math. Vol 568, pp. 23-70 (2004).
[Per1] Perelomov AM. Generalized coherent states and applications. Springer (1986).
[Pims1] Pimsner MV. A class of C ∗ -algebras generalizing both Cuntz-Krieger algebras and crossed
products by Z. Fields Inst. Commun. Vol 12, pp. 189–212 (1997).
[Pop1] Popescu G. Operator theory on noncommutative varieties. Indiana Univ. Math. J. Vol 56, Issue
2, pp. 389-442 (2006).
[Pop2] Popescu G. Operator theory on noncommutative varieties II. Proc. Amer. Math. Soc. Vol 135,
Issue 7, pp. 2151-2164 (2007).
[Raj1] Rajeev SG. New classical limits of quantum theories. In: Infinite Dimensional Groups and
Manifolds. Vol 5, 213 (2004).
[RCG1] Rawnsley J, Cahen M, Gutt S. Quantization of Kähler manifolds I: geometric interpretation of
Berezin’s quantization. J. Geom. Phys. Vol 7, Issue 1, pp. 45-62 (1990).
[RCG2] Rawnsley J, Cahen M, Gutt S. Quantization of Kähler manifolds II. Trans. Amer. Math. Soc.
Vol 337, Issue 1 (1993).
[Rie1] Rieffel M. Deformation quantization for actions of Rd . Mem. Amer. Math. Soc. Vol 506 (1993).
[Rie2] Rieffel M. Matrix algebras converge to the sphere for quantum Gromov–Hausdorff distance.
Mem. Amer. Math. Soc. Vol 168, Issue 796, pp. 67-91 (2004).
[RoSt1] Rørdam M, Størmer E (Eds.). Classification of nuclear C ∗ -algebras. Entropy in operator
algebras. Vol 7. Springer (2002).
[Sain] Sain J. Berezin quantization from ergodic actions of compact quantum groups, and quantum
Gromov–Hausdorff distance. PhD thesis, University of California (2009).
[Schl1] Schlichenmaier M. Berezin-Toeplitz quantization for compact Kähler manifolds. A review of
results. Adv. Math. Phys. Article ID 927280, 38 pages (2010).
55
[Schl2] Schlichenmaier M. Singular projective varieties and quantization. In: Quantization of Singular
Symplectic Quotients. pp. 259-282 (2001).
[Seg1] Segal G. Lectures on Lie groups. In: Lectures on Lie groups and Lie algebras. Cambridge
University Press (1995).
[Serre1] Serre JP. Géométrie algébrique et géométrie analytique. Ann. Inst. Fourier, Grenoble. Vol 6,
pp. 1-42 (1956).
[Serre2] Serre JP. Faisceaux algébriques cohérents. Ann. Math. Vol 61, Issue 2, pp. 197-278 (1955).
[Sha3] Shalit OM. Stable polynomial division and essential normality of graded Hilbert modules. J.
London Math. Soc. Vol 83, Issue 2, pp. 273-289 (2011).
[ShSo1] Shalit OM, Solel B. Subproduct systems. Doc. Math. Vol 14, pp. 801-868 (2009).
[Sten1] Stenstrom B. Rings of quotients – An introduction to methods of ring theory. Springer (1975).
[Tian1] Tian G. Kähler–Einstein metrics with positive scalar curvature. Invent. Math. Vol 137, pp.
1-37 (1995).
[Tian2] Tian G. Canonical metrics in Kähler geometry. Birkhauser (2000).
[Timm1] Timmermann T. An invitation to quantum groups and duality: from Hopf algebras to multiplicative unitaries and beyond. Eur. Math. Soc. (2008).
[Tom1] Tomatsu R. A characterization of right coideals of quotient type and its application to classification of Poisson Boundaries. Comm. Math. Phys. Vol 275, Issue 1, pp 271-296 (2007).
[UnUp1] Unterberger A, Upmeier H. The Berezin transform and invariant differential operators. Comm.
Math. Phys. Vol 164, pp. 563-597 (1994).
[VaVe1] Vaes S, Vennet N. Identification of the Poisson and Martin boundaries of orthogonal discrete
quantum groups. J. Inst. Math. Jussieu. Issue 7, pp. 391-412 (2008).
[VVer1] Vaes S, Vergnioux R. The boundary of universal discrete quantum groups, exactness and factoriality. Duke Math. J. Vol 140, Issue 1, pp. 35-84 (2006).
[VaDW] Van Daele A, Wang SZ. Universal quantum groups. Int. J. Math. Vol 7, Issue 2, pp. 255-264
(1996).
[Vas1] Vasselli E. Continuous fields of C ∗ -algebras arising from extensions of tensor C ∗ -categories. J.
Funct. Anal. Vol 199, pp. 122-152 (2003).
[Vas3] Vasselli E. The C ∗ -algebra of a vector bundle and fields of Cuntz algebras. J. Funct. Anal. 222,
Issue 2, pp. 491-502 (2005).
[Vis2] Viselter A. Cuntz–Pimsner algebras for subproduct systems. Int. J. Math. Vol 23, Issue 8, p.
1250081 (2012).
[Wang1] Wang SZ. Ergodic actions of universal quantum groups on operator algebras. Comm. Math.
Phys. Vol 203, pp. 481-498 (1999).
[Wang3] Wang SZ. Structure and isomorphism classification of compact quantum groups Au (q) and
Bu (q). arXiv:math/9807095v2 (2000).
[Wa1] Wang X. Balance point and stability of vector bundles over a projective manifold. Math. Res.
Lett. Vol 9, Issues 2-3, pp. 393-411 (2002).
[Wor1] Woronowicz SL. Compact matrix pseudogroups. Comm. Math. Phys. Vol 111, pp. 613-665
(1987).
[Wor3] Woronowicz SL. Tannaka–Krein duality for compact matrix pseudogroups. Twisted SU(n)
groups, Inv. Math. Vol 93, pp. 35-76 (1988).
[Wor4] Woronowicz SL. Compact quantum groups. Symétries quantiques, Les Houches 1995, pp. 845884 (1998).
[Yau1] Yau S-T. On the Ricci curvature of a compact Kähler manifold and the complex Monge–Amère
equation, I. Commun. Pure Appl. Math. Vol 31, pp. 339-411 (1978).
[Zeld1] Zelditch S. Szegö kernels and a theorem of Tian. Int. Math. Res. Not. Issue 6, pp. 317-331
(1998).
56
| 4math.GR
|
arXiv:1801.06733v2 [cs.DS] 29 Jan 2018
Probabilistic Tools for the Analysis of
Randomized Optimization Heuristics
Benjamin Doerr
Laboratoire d’Informatique (LIX)
École Polytechnique
Palaiseau
France
January 31, 2018
Abstract
This chapter collects several probabilistic tools that proved to be useful in the analysis of randomized search heuristics. This includes classic
material like Markov, Chebyshev and Chernoff inequalities, but also lesser
known topics like stochastic domination and coupling or Chernoff bounds
for geometrically distributed random variables and for negatively correlated
random variables. Almost all of the results presented here have appeared
previously, some, however, only in recent conference publications. While the
focus is on collecting tools for the analysis of randomized search heuristics,
many of these may be useful as well in the analysis of classic randomized
algorithms or discrete random structures.
1
Introduction
Unlike in the field of classic randomized algorithms for discrete optimization problems, where theory has always supported (and, in fact, often led) the development
and understanding of new algorithms, the theoretical analysis of nature-inspired
search heuristics is much younger than the use of these heuristics. The use of
nature-inspired heuristics can easily be traced back to the 1960s, their rigorous
analysis with proven performance guarantees only started in the late 1990s. Propelled by impressive results, most notably from the German computer scientist
Ingo Wegener (*1950–†2008) and his students, theoretical works became quickly
accepted in the nature-inspired algorithms field and now form an integral part of it.
1
They now help to understand these methods, guide the choice of their parameters,
and even (as in the classic algorithms field) suggest new promising algorithms.
It is safe to say that Wegener’s vision that nature-inspired heuristics are nothing
more than a particular class of randomized algorithms, which therefore should be
analyzed with the same rigor as other randomized algorithms, has come true.
After around 20 years of theoretical analysis of nature-inspired algorithms,
however, we have to note that the methods used here are different from those in
the analysis of classic randomized algorithms. This is most visible for particular methods like the fitness level method or drift analysis, but applies even to the
elementary probabilistic tools employed throughout the field. The aim of this chapter is to collect those elementary tools which often have been used in the past 20
years. This includes classic material like expectations, variances, the coupon collector process, Markov’s inequality, Chebyshev’s inequality and Chernoff-Hoeffding
bounds for sums of independent random variables, but also topics that are used
rarely outside the analysis of nature-inspired heuristics like stochastic domination,
Chernoff-Hoeffding bounds for sums of independent geometrically distributed random variables, and Chernoff-Hoeffding bounds for sums of random variables which
are not fully independent. For all results, we also sketch a typical application or
refer to applications in the literature. The large majority of the results and applications presented in this work have appeared previously, some in textbooks, some
in recent conference publications.
This chapter aims to serve both as introduction for newcomers to the field
and as reference book for regular users of these methods. With both addressees
in mind, we did not shy away from stating also elementary reformulations of the
results. We hope that this saves all users of this chapter some time, which is better
spent on understanding the challenging random processes that arise in the analysis
of nature-inspired heuristics.
2
Notation
All notation in this chapter is standard and should need not much additional
explanation. We use N := {1, 2, . . . } to denote the positive integers. We write
N0 := N ∪ {0}. For intervals of integers, we write [a..b] := {x ∈ Z | a ≤ x ≤ b}.
We use the standard definition 00 := 1 (and not 00 = 0).
3
Elementary Probability Theory
We shall assume that the reader has some basic understanding of the concepts
of probability spaces, events and random variables. As usual in probability theory
2
and very convenient in analysis of algorithms, we shall almost never explicitly state
the probability space we are working in. Hence an intuitive understanding of the
notion of a random variable should be enough to follow this exposition.
While many results presented in the following naturally extend to continuous
probability spaces, in the interest of simplicity and accessability for a discrete
optimization audience, we shall assume that all random variables in this book
will be discrete, that is, they take at most a countable number of values. As
a simple example, consider the random experiment of independently rolling two
distinguishable dice. Let X1 denote the outcome of the first roll, that is, the
number between 1 and 6 which the first die displays. Likewise, let X2 denote
the outcome of the second roll. These are already two random variables. We
formalize the statement that with probability 16 the first die shows a one by saying
Pr[X1 = 1] = 16 . Also, the probability that both dice show the same number is
Pr[X1 = X2 ] = 61 . The complementary event that they show different numbers,
naturally has a probability of Pr[X1 6= X2 ] = 1 − Pr[X1 = X2 ] = 65 .
We can add random variables (defined over the same probability space), e.g.,
X := X1 + X2 is the sum of the numbers shown by the two dice, and we can
multiply a random variable by a number, e.g., X := 2X1 is twice the number
shown by the first die.
The most common type of random variable we shall encounter in this book is an
extremely simple one called binary random variable or Bernoulli random variable.
It takes the values 0 and 1 only. In consequence, the probability distribution of a
binary random variable X is fully described by its probability Pr[X = 1] of being
one, since Pr[X = 0] = 1 − Pr[X = 1].
Binary random variables often show up as indicator random variables for random events. For example, if the random experiment is a simple roll of a die, we
may define a random variable X by setting X = 1, if the die shows a 6, and X = 0
otherwise. We say that X is the indicator random variable for the event “die shows
a 6.”
Indicator random variables are useful for counting. If we roll a die n times and
X1 , . . . , Xn are the indicator random variables for the events that the correspondP
ing roll showed a 6 (considered as a success), then ni=1 Xi is a random variable
describing the number of times we saw a 6 in these n rolls. In general, a random
variable X that is the sum of n independent binary random variables being one
all with equal probability p, is called a binomial random variable (with success
probability p). We denote this distribution by Bin(n, p) and write X ∼ Bin(n, p)
to denote that X has this distribution. We have
!
n k
p (1 − p)n−k
Pr[X = k] =
k
for all k ∈ [0..n]. See Section 4.3 for the definition of the binomial coefficient.
3
A different question is how long we have to wait until we roll a 6. Assume that
we have an infinite sequence of die rolls and X1 , X2 , . . . are the indicator random
variables for the event that the corresponding roll showed a 6 (success). Then we
are interested in the random variable Y = min{k ∈ N | Xk = 1}. Again for the
general case of all Xi being one independently with probability p > 0, this random
variable Y is called geometric random variable (with success probability p). We
denote this distribution by Geom(p) and write Y ∼ Geom(p) to indicate that Y
is geometrically distributed (with parameter p). We have
Pr[Y = k] = (1 − p)k−1 p
for all k ∈ N. We note that an equally established definition is to count only the
failures, that is, to regard the random variable Y − 1. So some care is necessary
when comparing results from different sources.
4
Useful Inequalities
Before starting our presentation of probabilistic tools useful in the analysis of
randomized search heuristics, let us briefly mention a few inequalities that are
often needed to estimate probabilities arising naturally in this area.
4.1
Switching Between Exponential and Polynomial Terms
When dealing with events occurring with small probability ε > 0, we often encounter expressions like (1 − ε)n . Such a mix of a polynomial term (1 − ε) with
an exponentiation is often hard to work with. It is therefore very convenient that
1 − ε ≈ e−ε , so that the above expression becomes approximately the purely exponential term e−εn . In this section, we collect a few estimates of this flavor. All
are well-known and can be derived via elementary arguments.
Lemma 1. For all x ∈ R,
1 + x ≤ ex .
We give a canonic proof as an example for a proof method that is often useful
for such estimates.
Proof. Define a function f : R → R by f (x) = ex − 1 − x for all x ∈ R. Since
f ′ (x) = ex − 1, we have f ′ (x) = 0 if and only if x = 0. Since f ′′ (x) = ex > 0 for
all x, we see that x = 0 is the unique minimum of f . Since f (0) = 0, we have
f (x) ≥ 0 for all x, which is equivalent to the claim of the lemma.
4
f (x) = 1 + x + x2
x2
f (x) = 1 + x + 1−x
f (x) = ex
f (x) = 1 + x
f (x)
3
2
1
0
−1
−0.5
0
x
0.5
1
Figure 1: Plot of the estimates of Lemma 1 and 2.
Applying Lemma 1 to −x and taking reciprocals, we immediately derive the
first of the following two upper bounds for the exponential function. The second
bound again follows from elementary calculus. Obviously, the first estimate is
better for x < 0, the second one is better for x > 0.
Lemma 2.
(a) For all x < 1,
ex ≤
x
x2
1
=1+
=1+x+
.
1−x
1−x
1−x
(1)
In particular, for 0 ≤ x ≤ 1, we have e−x ≤ 1 − x2 .
(b) For all x < 1.79,
ex ≤ 1 + x + x2 .
(2)
As visible also from Figure 1, these estimates are strongest for x close to zero.
x
Replacing x with 1+x
in the first inequality of Lemma 2 gives the following bounds.
Corollary 3. For all x > −1, we have
x
e 1+x ≤ 1 + x ≤ ex .
For all x, y > 0,
xy
e x+y ≤ (1 + xy )y ≤ ex .
(3)
(4)
A reformulation often useful on the context of standard-bit mutation (mutating
a bit-string by flipping each bit independently with a small probability like n1 ) is
5
f (x) = (1 − 1/x)x
f (x) = (1 − 1/x)x−0.5
f (x) = (1 − 1/x)x−1
f (x) = ((1 − 1/x)x−1 + (1 − 1/x)x )/2
0.8
f (x)
0.6
0.4
0.2
2
3
4
5
6
7
8
9
10
x
Figure 2: Plots related to Corollary 4.
the following. Note that the first bound holds for all r ≥ 1, while it is often only
stated for r ∈ N. For the (not so interesting) boundary case r = 1, recall that we
use the common convention 00 := 1.
Corollary 4. For all r ≥ 1 and 0 ≤ s ≤ r,
(1 − 1r )r ≤ 1e ≤ (1 − 1r )r−1 ,
(1 − rs )r ≤ e−s ≤ (1 − rs )r−s .
(5)
(6)
Proof.
Occasionally, it is useful to know that (1 − 1r )r is monotonically increasing and
that (1 − 1r )r−1 is monotonically decreasing in r (and thus both converge to 1e ).
Lemma 5. For all 1 ≤ s ≤ r, we have (1 − 1s )s ≤ (1 − 1r )r and (1 − 1s )s−1 ≥
(1 − 1r )r−1 .
Finally, we mention Bernoulli’s inequality and a related result. The lower
Q
bound on ni=1 (1 − pi ) in Lemma 6 (b) below is also valid when all pi ∈ (−∞, 0].
The upper bound will be proven at the end of the Section 5.2, both to show how
probabilistic arguments can be used to prove non-probabilistic results and because
we have not found a proof for it in the literature.
Lemma 6. (a) Bernoulli’s inequality: Let x ≥ −1 and r ∈ {0} ∪ [1, ∞). Then
(1 + x)r ≥ 1 + rx.
6
(b) Weierstrass product inequality: Let p1 , . . . , pn ∈ [0, 1]. Let P :=
Then
n
1−P ≤
4.2
Y
(1 − pi ) ≤ 1 − P +
i=1
X
i<j
Pn
i=1
pi .
pi pj ≤ 1 − P + 12 P 2 .
Harmonic Number
Quite frequently in the analysis of randomized search heuristics we will encounter
P
the harmonic number Hn . For all n ∈ N, it is defined by Hn = nk=1 k1 . Approximating this sum via integrals, namely by
Z
n+1
1
Z n
1
1
dx ≤ Hn ≤ 1 +
dx,
x
1 x
we obtain the estimate
ln n < Hn ≤ 1 + ln n
(7)
valid for all n ≥ 1. Sharper estimates involving the Euler-Mascheroni constant
γ ≈ 0.5772156649 are known, e.g.,
Hn = ln n + γ ± O( n1 ),
1
Hn = ln n + γ + 2n
± O( n12 ).
For non-asymptotic statements, it is helpful to know that Hn −ln n is monotonically
decreasing (with limit γ obviously). In most cases, however, the simple estimate (7)
will be sufficient.
4.3
Binomial Coefficients and Stirling’s Formula
Since discrete probability is strongly related to counting, we often encounter the
binomial coefficients defined by
!
n!
n
:=
k
k! (n − k)!
for all n ∈ N0 , k ∈ [0..n]. The binomial coefficient nk equals the number of kelement subsets ofa given n-element set. For this reason, the above definition is
often extended to nk := 0 for k > n.
In this section, we give several useful estimates for binomial coefficients. We
start by remarking that, while very precise estimates are available, in the analysis
of randomized search heuristics often crude estimates are sufficient.
7
The following lemma lists some estimates which all can be proven by elementary
P
kk
ki
means. To prove the second inequality of (11), note that ek = ∞
i=0 i! ≥ k! gives
the elementary estimate
!k
k
≤ k! ≤ k k .
(8)
e
Qn/2
n!
= i=1 2i(2i−1)
=
(n/2)!(n/2)!q
i2
P
Q
n/2
n/2
2n i=1 (1 − 2i1 ) ≤ 2n exp(− 12 i=1 1i ) ≤ 2n exp(− 12 ln n2 ) = 2n n2 , see Lemma 1
q
n
n+1
2
and (7), while for odd n we have ⌊n/2⌋
= 21 (n+1)/2
≤ 2n n+1
.
To prove (12), note that for even n we have
n
n/2
=
Lemma 7. For all n ∈ N and k ∈ [1..n], we have
!
(9)
!
(10)
n
≤ 2n ,
k
n
k
!k
n
≤ nk ,
≤
k
nk
n
≤
≤
k!
k
!
ne
k
!
!
!k
,
(11)
s
2
n
n
≤ 2n
≤
.
⌊n/2⌋
n
k
(12)
q
n
2
of (12),
Stronger estimates, giving also the well-known version ⌊n/2⌋
≤ 2n πn
+
can be obtained from Stirling’s formula below. See [HPR 14] for an analysis of
randomized search heuristics which clearly required Stirling’s formula.
Theorem 8 (Robbins [Rob55]). For all n ∈ N,
√
n! = 2πn( ne )n Rn ,
1
1
) < Rn < exp( 12n
) < 1.08690405.
where 1 < exp( 12n+1
Corollary 9. For all n ∈ N and k ∈ [1..n − 1],
!
1
n
=√
k
2π
s
n
k(n − k)
n
k
!k
n
n−k
1
1
where 0.88102729... = exp(− 16 + 25
) ≤ exp(− 12k
−
1
1
1
− 12(n−k)+1
+ 12n
) < 1.
exp(− 12k+1
!n−k
Rnk ,
1
12(n−k)
+
1
)
12n+1
< Rnk <
Stirling’s formula was also used in [DW14, proof of Lemma 8] to√compute
another useful fact, namely that all binomial coefficients that are O( n) away
from the middle one have the same asymptotic order of magnitude of Θ(2n n−1/2 ).
Here the upper bound is simply (12).
8
Corollary 10. Let γ ≥ 0. Let n ∈ N and ℓ =
n
2
o(1)) 2√2 πn e−4γ .
n
2
√
± γ n. Then nℓ ≥ (1 −
When working with mutation rates different from classic choice of n1 , the following estimates can be useful.
Lemma 11. Let n ∈ N, k ∈ [0..n], and p ∈ [0, 1]. Let X ∼ Bin(n, p).
(a) Let Y ∼ Bin(n, nk ). Then Pr[X = k] ≤ Pr[Y = k]. This inequality is strict
except for trivial case p = nk .
(b) For k ∈ [1..n − 1], Pr[X = k] ≤
√1
2π
q
n
.
k(n−k)
Proof. The first part follows from Pr[X = k] = nk pk (1 − p)n−k and noting that
p 7→ pk (1−p)n−k has a unique maximum in the interval [0, 1], namely at p = nk . The
second part follows from the first and using
Corollary 9 to estimate the binomial
coefficient in the expression Pr[Y = k] = nk ( k1 )k (1 − nk )n−k .
For the special case that np = k, the second part of the lemma above was
already shown in [SW16]. For k ∈ {⌊np⌋, ⌈np⌉} but np 6= k, a bound larger than
ours by a factor of e was shown there as well.
To estimate sums of binomial coefficients, large deviations bounds (to be discussed in Section
10) can be an elegant tool. Imagine we need an upper bound
Pn n
for S = k=a k , where a > n2 . Let X be a random variable with distribution
Bin(n, 21 ). Then Pr[X ≥ a] = 2−n S. Using the additive Chernoff bound of The-
orem 53, we also see Pr[X ≥ a] = Pr[X ≥ E[X] + (a − n2 )] ≤ exp(−
2(a− n )2
2(a− n
)2
2
).
n
Consequently, S ≤ 2n exp(− n 2 ).
The same argument can even be used to estimate single binomial coefficients,
in particular,
to close to the middle one. Note that by Lemma 82,
those
not
P
S = nk=a nk and na are quite close when a is not too close to n2 . Hence
2(a − n2 )2
n
≤ 2n exp −
a
n
!
!
(13)
is a good estimate in this case.
5
Union Bound
The union bound, sometimes called Boole’s inequality, is a very elementary consequence of the axioms of a probability space, in particular, the σ-additivity of the
probability measure.
9
Lemma 12 (Union bound). Let E1 , . . . , En be arbitrary events in some probability
space. Then
#
"
Pr
n
[
i=1
Ei ≤
n
X
Pr[Ei ].
i=1
Despite its simplicity, the union bound is a surprisingly powerful tool in the
analysis of randomized algorithms. It draws its strength from the fact that does
not need any additional assumptions. In particular, the events Ei are not required
to be independent. Here is an example of such an application of the union bound.
5.1
Example: The (1 + 1) EA Solving the Needle Problem
The needle function is the fitness function f : {0, 1}n → Z defined by f (x) = 0
for all x ∈ {0, 1}n \ {(1, . . . , 1)} and f ((1, . . . , 1)) = 1. It is neither surprising
nor difficult to prove that all reasonable randomized search heuristics need time
exponential in n to find the maximum of the needle function. To give a simple
example for the use of the simplified drift theorem, it was shown in [OW11] that
the classic (1 + 1) EA within a sufficiently small exponential time does not even
get close to the optimum of the needle function (see Theorem 13 below). We now
show that the same result (and in fact a stronger one) can be shown via the union
bound.
The (1 + 1) EA is the simple randomized search heuristic that starts with a
random search point x ∈ {0, 1}n . Then, in each iteration, it generates from x a
new search point y by copying x into y and flipping each bit independently with
probability n1 . If the new search point (“offspring”) y is at least as good as the
parent x, that is, if f (y) ≥ f (x) for an objective function to be maximized, then
x is replaced by y, that is, we set x := y. Otherwise, y is discarded.
Algorithm 1: The (1 + 1) EA for maximizing f : {0, 1}n → R.
n
1 Choose x ∈ {0, 1} uniformly at random;
2 for t = 1, 2, 3, . . . do
3
y ← x;
4
for i ∈ [1..n] do
5
with probability n1 do yi ← 1 − yi;
6
if f (y) ≥ f (x) then x ← y;
The precise result of [OW11] is the following.
Theorem 13. For all η > 0 there are c1 , c2 > 0 such that with probability 1 − 2c1 n
the first 2c2 n search points generated in a run of the (1 + 1) EA on the needle
function all have a Hamming distance of more than ( 21 − η)n from the optimum.
10
The proof of this theorem in [OW11] argues as follows. Denote by x(0) , x(1) , . . .
the search points generated in a run of the (1 + 1) EA. Denote by x∗ the optimum
(i)
of the needle function. For all i ≥ 0, let Xi := H(x(i) , x∗ ) := |{j ∈ [1..n] | xj 6=
x∗j }| be the Hamming distance of x(i) from the optimum. The random initial
search point x(0) has an expected Hamming distance of n2 from the optimum. By
a simple Chernoff bound argument (Theorem 53), we see that with probability
1 − exp(−2η 2 n), we have X0 = H(x(0) , x∗ ) > ( 21 − η)n. Now a careful analysis of
the random process (Xi )i≥0 via a new “simplified drift theorem” gives the claim.
We now show that the Chernoff bound argument plus a simple union bound are
sufficient to prove the theorem. We show the following more explicit bound, which
also applies to all other unbiased algorithms in the sense of Lehre and Witt [LW12]
(roughly speaking, all algorithms which treat the bit-positions [1..n] in a symmetric
fashion as well as the bit-values {0, 1}).
Theorem 14. For all η > 0 and c > 0 we have that with probability at least
2
1−2(c−2 ln(2)η )n the first L := 2cn search points generated in a run of the (1+1) EA
(or any other unbiased black-box optimization algorithm) on the needle function
all have a Hamming distance of more than ( 12 − η)n from the optimum.
Proof. The key observation is that as long as the (1 + 1) EA has not found the
optimum, any search point x generated by the (1 + 1) EA is uniformly distributed
in {0, 1}n . Hence Pr[H(x, x∗ ) ≤ ( 21 − η)n] ≤ exp(−2η 2 n) by Theorem 53. By
the union bound, the probability that one of the first L := 2cn search points
generated by the (1 + 1) EA has a distance H(x, x∗ ) of at most ( 12 − η)n, is at
2
most L exp(−2η 2 n) = 2(c−2 ln(2)η )n .
To be more formal, let x(0) , x(1) , . . . be the search points generated in a run of
the (1 + 1) EA. Let T = min{t ∈ N0 | x(t) = x∗ }. Define a sequence y (0) , y (1) , . . .
of search points by setting y (t) := x(t) for all t ≤ T . For all t > T , let y (t) be
obtained from y (t−1) by flipping each bit independently with probability n1 . With
this definition, and since x(t) = x∗ for all t ≥ T , we have
{x(t) | t ∈ [0..L − 1]} = {x(t) | t ∈ [0.. min{T, L − 1}]}
= {y (t) | t ∈ [0.. min{T, L − 1}]} ⊆ {y (t) | t ∈ [0..L − 1]}.
Consequently,
Pr[∃t ∈ [0..L−1] : H(x(t) , x∗ ) ≤ ( 12 −η)n] ≤ Pr[∃t ∈ [0..L−1] : H(y (t) , x∗ ) ≤ ( 12 −η)n].
By the union bound,
Pr[∃t ∈ [0..L − 1] : H(y (t) , x∗ ) ≤ ( 12 − η)n] ≤
11
L−1
X
t=0
Pr[H(y (t), x∗ ) ≤ ( 21 − η)n].
Note that when y (t) is a search point uniformly distributed in {0, 1}n , then so is
y (t+1) . Since y (0) is uniformly distributed, all y (t) are. Hence by Theorem 53 we
have Pr[H(y (t) , x∗ ) ≤ ( 12 − η)n] ≤ exp(−2η 2 n) for all t and thus
L−1
X
t=0
Pr[H(y (t) , x∗ ) ≤ ( 21 − η)n] ≤ L exp(−2η 2 n) = 2(c−2 ln(2)η
2 )n
.
This proof immediately extends to all algorithms which, when optimizing the
needle function, generate uniformly distributed search points until the optimum is
found. These are, in particular, all unbiased algorithms in the sense of Lehre and
Witt [LW12].
Note that the yt in the proof above are heavily correlated. For all t, the
search points yt and yt+1 have an expected Hamming distance of exactly one.
Nevertheless, we could apply the union bound to the events “H(yt , x∗ ) < ( 21 − η)n”
and from this obtain a very elementary proof of Theorem 14.
5.2
Lower Bounds, Bonferroni Inequalities
The union bound is tight, that is, holds with equality, when the events Ei are
disjoint. In this case, the union bound simply reverts to the σ-additivity of the
probability measure. The second Bonferroni inequality gives a lower bound for the
probability of a union of events also when they are not disjoint.
Lemma 15. Let E1 , . . . , En be arbitrary events in some probability space. Then
Pr
"
n
[
i=1
#
Ei ≥
n
X
i=1
Pr[Ei ] −
n−1
X
n
X
i=1 j=i+1
Pr[Ei ∩ Ej ].
As an illustration, let us regard the performance of blind random search on
the needle function, that is, we let x(1) , x(2) , . . . be independent random search
points from {0, 1}n and ask ourselves what is the first hitting time T = min{t ∈
N | x(t) = (1, . . . , 1)} of the maximum x∗ = (1, . . . , 1) of the needle function (any
other function f : {0, 1}n → R with unique global optimum would do as well).
This is easy to compute directly. We see that T has geometric distribution with
success probability 2−n , so the probability that L iterations do not suffice to find
the optimum is Pr[T > L] = (1 − 2−n )L .
Let us nevertheless see what we can derive from union bound and second Bonferroni inequality. Let Et be the event x(t) = x∗ . Then the union bound gives
Pr[T ≤ L] = Pr
"
L
[
t=1
12
#
Et ≤ L2−n ,
the second Bonferroni inequality yields
Pr[T ≤ L] = Pr
"
L
[
t=1
#
Et ≥ L2−n −
L(L − 1) −2n
2 .
2
Hence if L = o(2n ), that is, L is of smaller asymptotic order than 2n , then Pr[T ≤
L] = (1 − o(1))L2−n , that is, the union bound estimate is asymptotically tight.
For reasons of completeness, we state the full set of Bonferroni inequalities.
Note that the case k = 1 is the union bound and the case k = 2 is the lemma
above.
Lemma 16. Let E1 , . . . , En be arbitrary events in some probability space. For all
k ∈ [1..n], let
X
Sk :=
Pr[Ai1 ∩ · · · ∩ Aik ].
1≤i1 <···<ik ≤n
Then for all k ∈ [1..n] we have
• Pr
"
• Pr
"
n
[
Ei ≤
n
[
#
i=1
i=1
#
Ei ≥
k
X
(−1)j−1 Sj for k ∈ [1..n] odd,
k
X
(−1)j−1 Sj for k ∈ [1..n] even.
j=1
j=1
In simple terms, the Bonferroni inequalities state that when we omit the terms
for j > k in the inclusion-exclusion formula
Pr
"
n
[
i=1
#
Ei =
n
X
(−1)j−1 Sj ,
j=1
then first of the omitted terms (that is, the one for j = k + 1) dominates the error.
So if k is odd and thus the first omitted term is negative, then we obtain a ≤
inequality, and inversely for k even.
We now use the Bonferroni inequalities to prove two of the inequalities given
in the previous section.
Proof of Lemma 6 (b). Consider some probability space with independent events
E1 , . . . , En having Pr[Ei ] = pi . Due to the independence,
n
Y
(1 − pi ) = Pr[∀i ∈ [1..n] : ¬Ei ] = 1 − Pr[∃i ∈ [1..n] : Ei ].
i=1
13
(14)
By the union bound, the right-hand side of (14) is at least 1 − ni=1 pi = 1 − P . By
the Bonferroni inequality for k = 2 and again the independence, the right-hand
side of (14) is at most
P
1−P +
X
i<j
Pr[Ei ∩ Ej ] = 1 − P +
X
i<j
pi pj ≤ 1 − P +
1
2
n X
n
X
i=1 j=1
pi pj = 1 − P + 21 P 2.
Note that the slack in the last inequality is only the term ni=1 p2i , so there is
P
not much reason to prefer the stronger upper bound 1 − P + i<j pi pj over the
bound 1 − P + 12 P 2 .
P
6
6.1
Expectations,
Markov’s
Chebyshev’s Inequality
Inequality,
and
Expectation
The expectation (or mean) of a random variable X taking values in some set Ω ⊆ R
P
is defined by E[X] = ω∈Ω ω Pr[X = ω], where we shall always assume that the
sum exists and is finite. As a trivial example, we immediately see that if X is a
binary random variable, then E[X] = Pr[X = 1].
For non-negative integral random variables, the expectation can also be computed by the following formula (which is valid also when E[X] is not finite).
Lemma 17. Let X be a random variable taking values in the non-negative integers.
Then
∞
E[X] =
X
i=1
Pr[X ≥ i].
This lemma, among others, allows to conveniently transform information about
the tail bound of a distribution into a bound on its expectation. This was done,
e.g., in [DJW02, proof of Lemma 10] for lower bounds and in [DG13] in the simplified proof of the multiplicative drift theorem (which is an upper bound on an
expectation). For exponential tails, we easily obtain the following general result.
Corollary 18 (Expectations from exponential tail bounds). Let α, β > 0 and
T ≥ 0. Let X be an integer random variable and Y be a non-negative integer
random variable.
(a) If Pr[X ≥ T + λ] ≤ α exp(− βλ ) for all λ ∈ N, then E[X] ≤ T + αβ.
(b) If Pr[Y ≤ T − λ] ≤ α exp(− βλ ) for all λ ∈ [1..T ], then E[Y ] ≥ T − αβ.
14
(c) If Pr[X ≥ (1 + ε)T ] ≤ α exp(− βε ) for all ε > 0, then E[X] ≤ (1 + αβ)T .
(d) If Pr[X ≤ (1 − ε)T ] ≤ α exp(− βε ) for all ε ∈ (0, 1], then E[X] ≥ (1 − αβ)T .
∞
i−T
Proof. We compute E[X] ≤ ∞
i=1 Pr[X ≥ i] ≤ T +
i=T +1 α exp(− β ) = T − α +
1
≤ T + αβ, where the last estimate uses Lemma 2.
α 1−exp(−1/β)
P
P
Similarly, we compute E[Y ] ≥ Ti=1 Pr[Y ≥ i] ≥ Ti=1 (1 − Pr[Y ≤ i − 1]) ≥
P∞
PT
λ
λ
λ=1 α exp(− β ) ≥ T − αβ.
λ=1 (1 − α exp(− β )) ≥ T −
The last two claims are simple reformulations of the first two.
P
P
In a similar vein, Lemma 17 yields an elegant analysis of the expectation of a
geometric random variable. Let X be a geometric random variable with success
probability p. Intuitively, we feel that the expected waiting time for a success
is 1p . This intuition is guided by the fact that after 1p repetitions of the underlying
binary random experiment, the expected number of successes is exactly one. This
intuition led to the right result, the “proof” however is not correct. The correct
proof either uses standard results in Markov chain theory, or elementary but nontrivial calculations, or (as done below) the above lemma.
Lemma 19 (Waiting time argument). Let X be a geometric random variable with
success probability p > 0. Then E[X] = p1 .
Proof. We have Pr[X ≥ i] = (1 − p)i−1 , since X ≥ i is the event of having no
success in the first i − 1 rounds of the random experiment. Now Lemma 17 gives
E[X] =
∞
X
i=1
Pr[X ≥ i] =
∞
X
i=1
(1 − p)i−1 =
1
1
= .
1 − (1 − p)
p
An elementary, but very useful property is that expectation is linear.
Lemma 20 (Linearity of expectation). Let X1 , . . . , Xn be arbitrary random variables and a1 , . . . , an ∈ R. Then
E
"
n
X
i=1
#
ai Xi =
n
X
ai E[Xi].
i=1
This fact is very convenient when we can write a complicated random variable
as sum of simpler ones. For example, let X be a binomial
random variable with
n k
parameters n and p, that is, we have Pr[X = k] = k p (1 −p)n−k . Since X counts
P
the number of successes in n (independent) trials, we can write X = ni=1 Xi as
the sum of (independent) binary random variables X1 , . . . , Xn , each with Pr[Xi =
15
1] = p. Here Xi is the indicator random variable for the event that the i-th trial
is a success. Using linearity of expectation, we compute
E[X] = E
"
n
X
i=1
#
Xi =
n
X
E[Xi ] = np.
i=1
Note that we did not need that the Xi are independent.
We just proved the following.
Lemma 21 (Expectation of binomial random variables). Let X be a binomial
random variable with parameters n and p. Then E[X] = pn.
In the same fashion, we can compute the following elementary facts.
Lemma 22. Let x, y, x∗ ∈ {0, 1}n . Denote by H(x, y) := |{i ∈ [1..n] | xi 6= yi }|
the Hamming distance of x and y.
(a) Let z be obtained from x via standard-bit mutation with rate p ∈ [0, 1],
that is, by flipping each bit of x independently with probability p. Then
E[H(x, z)] = pn and E[H(z, x∗ )] = H(x, x∗ ) + 2p( n2 − H(x, x∗ )).
(b) Let z be obtained from x and y via uniform crossover, that is, for each
i ∈ [1..n] independently, we have Pr[zi = xi ] = 21 = Pr[zi = yi ]. Then
E[H(x, z)] = 12 H(x, y) and E[H(z, x∗ )] = 12 (H(x, x∗ ) + H(y, x∗)).
(c) Let z be obtained from the unordered pair {x, y} via 1-point crossover, that
is, we choose r uniformly at random from [0..n] and then with probability 21
each
• define z by zi = xi for i ≤ r and zi = yi for i > r, or
• define z by zi = yi for i ≤ r and zi = xi for i > r.
Then E[H(x, z)] = 12 H(x, y) and E[H(z, x∗ )] = 12 (H(x, x∗ ) + H(y, x∗)).
The fact that the results for the two crossover operators are identical shows
again that linearity of expectation does not care about possible dependencies. We
have Pr[zi = xi ] = 12 in both cases, and this is what is important for the result,
whereas the fact that the events “zi = xi ” are independent for uniform crossover
and strongly dependent for 1-point crossover has no influence on the results.
16
6.2
Markov’s Inequality
Markov’s inequality is an elementary large deviation bound valid for all nonnegative random variables.
Lemma 23 (Markov’s inequality). Let X be a non-negative random variable.
Then for all λ > 0,
Pr[X ≥ λE[X]] ≤ λ1 ,
Pr[X ≥ λ] ≤
Proof. We have E[X] =
X
ω
ω Pr[X = ω] ≥
E[X]
.
λ
X
ω≥λ
(15)
(16)
λ Pr[X = ω] = λ Pr[X ≥ λ].
It is important to note that Markov’s inequality, without further assumptions,
only gives information about deviations above the expectation. If X is a (not
necessarily non-negative) random variable taking only values not larger than some
u ∈ R, then the random variable u − X is non-negative and Markov’s inequality
gives the bound
u − E[X]
Pr[X ≤ λ] ≤
,
u−λ
which is sometimes called reverse Markov’s inequality. An equivalent formulation
of this bound is
E[X] − λ
.
Pr[X > λ] ≥
u−λ
Markov’s inequality is useful if not much information is available about the
random variable under consideration. Also, when the expectation of X is very
small, then the following elementary corollary is convenient and, in fact, often
quite tight.
Corollary 24 (First moment method). If X is a non-negative random variable,
then Pr[X ≥ 1] ≤ E[X].
Corollary 24 together with linearity of expectation often gives the same results
as the union bound. For an example, recall that in Section 5.2 we observed that
in a run of the randomized search heuristic, the probability that the t-th search
point xt is the unique optimum of a given function f : {0, 1}n → R, is 2−n .
Denote this event by Et and let Xt be the indicator random variable for this event.
Then the probability that one of the first L search points is the optimum, can be
estimated equally well via the union bound or the above corollary and linearity of
17
expectation:
6.3
Pr
"
Pr
"
L
[
t=1
L
X
t=1
#
Et ≤
L
X
Pr[Et ] = L2−n ,
t=1
#
Xt ≥ 1 ≤ E
"
L
X
#
Xt =
t=1
L
X
E[Xt ] = L2−n .
t=1
Chebyshev’s Inequality
The second elementary large deviation bound is Chebyshev’s inequality, sometimes
called Bienaymé-Chebyshev inequality as it was first stated in Bienaymé [Bie53]
and later proven in Chebyshev [Tch67]. It seems rarely used in the theory of
randomized search heuristics (exceptions being [NSW10, DJWZ13]).
Recall that the variance of a discrete random variable X is
Var[X] = E[(X − E[X])2 ] = E[X 2 ] − E[X]2 .
Just by definition, the variance already is a measure of how well X is concentrated
around its mean. Applying Markov’s inequality to the random variable (X −
E[X])2 easily yields the following inequality.
Lemma 25 (Chebyshev’s inequality). For all λ > 0,
q
h
i
Pr |X − E[X]| ≥ λ Var[X] ≤
h
i
Pr |X − E[X]| ≥ λ ≤
1
,
λ2
Var[X]
.
λ2
(17)
(18)
Note that Chebyshev’s inequality automatically yields a two-sided tail bound
(that is, for both cases that the random variable is larger and smaller than its
expectation), as opposed to Markov’s inequality (giving just a bound for exceeding
the expectation). There is a one-sided version of Chebyshev’s inequality that is
often attributed to Cantelli, though Hoeffding [Hoe63] sees Chebyshev [Tch74] as
its inventor.
Lemma 26 (Cantelli’s inequality). For all λ > 0,
h
q
i
Pr X ≥ E[X] + λ Var[X] ≤
1
,
λ2 +1
(19)
Pr X ≤ E[X] − λ Var[X] ≤
1
.
λ2 +1
(20)
h
q
i
In most applications, the slightly better bound of Cantelli’s inequality is not
very interesting. Cantelli’s inequality, however, has the charm that the right-hand
side is always less than one.
18
While Markov’s inequality can be used to show that a non-negative random variable X rarely is positive (first moment method), Chebyshev’s inequality can serve the opposite purpose, namely showing that X is positive with
good probability. By taking λ = E[X] in (18), we obtain the first estimate
of the following lemma. Using the Cauchy-Schwarz inequality and computing
E[X]2 = E[X1X6=0 ]2 ≤ E[X 2 ]E[1X6=0 ] = E[X 2 ] Pr[X 6= 0], we obtain the second
2
. Since
estimate, which has the nice equivalent formulation Pr[X 6= 0] ≥ E[X]
E[X 2 ]
2
2
E[X ] ≥ E[X] , the second estimate gives a stronger bound for Pr[X = 0] than
the first. While the lemma below does not require that X is non-negative, the
typical application of showing that X is positive requires that X is non-negative
in the second bound, so that Pr[X 6= 0] = Pr[X > 0].
Lemma 27 (Second moment method). For a random variable X with E[X] 6= 0,
Pr[X = 0] ≤ Pr[X ≤ 0] ≤
Pr[X = 0] ≤
Var[X]
,
E[X]2
(21)
Var[X]
.
E[X 2 ]
(22)
In the (purely academic) example of finding a unique global optimum via blind
random search (see Section 5.2), let Xt be indicator random variable for the event
P
that the t-th search point is the optimum. Let X = Lt=1 Xt . Then the probability
that the optimum is found within the first L iterations is
Pr[X > 0] = 1 − Pr[X = 0] ≥ 1 −
Var[X]
.
E[X]2
The variance for a sum of binary random variables is
Var[X] =
L
X
t=1
Var[Xt ] +
X
s<t
Cov[Xs , Xt ] ≤ E[X] +
X
Cov[Xs , Xt ],
s<t
where we recall the definition of the covariance Cov[U, V ] := E[UV ] − E[U]E[V ]
of two arbitrary random variables U and V . Here we have Cov[Xs , Xt ] = 0, since
the Xt are independent. Consequently,
Pr[X > 0] ≥ 1 −
1
.
E[X]
Hence the probability to find the optimum within L iterations is Pr[T ≤ L] =
Pr[X > 0] ≥ 1 − L21−n . Note that this estimate is, for interesting case that E[X]
2−2n which we
is large, much better than the bound Pr[T ≤ L] ≥ L2−n − L(L−1)
2
obtained from the second Bonferroni inequality.
19
7
Conditioning
In the analysis of randomized heuristics, we often want to argue that a certain
desired event C already holds and the continue arguing under this condition. Formally, this gives rise to a new probability space where each of the original events
A now has a probability of
Pr[A | C] :=
Pr[A ∩ C]
.
Pr[C]
Obviously, this only makes sense for events C with Pr[C] > 0. In an analogous
fashion, we define the expectation of a random variable X conditional on C by
P
E[X | C] = ω∈C X(ω) Pr[ω | C]. Conditioning as a proof technique has many
faces, among them the following.
Decomposing events: If we can write some event A as the intersection of two
events A1 and A2 , then it can be useful to first compute the probability of A1 and
then the probability of A2 conditional on A1 . Right from the definition, we have
Pr[A1 ∩ A2 ] = Pr[A1 ] Pr[A2 | A1 ]. Of course, this requires that we have some direct
way of computing Pr[A1 | A2 ].
Case distinctions: Let C1 , . . . , Ck be a partition of our probability space. If it
is easy to analyse our problem conditional on each of these events (“in the that case
Ci holds”), then the following law of total probability and law of total expectation
are useful.
Lemma 28 (Laws of total probability and total expectation). Let C1 , . . . , Ck be
a partition of our probability space. Let A be some event and X be some random
variable. Then
Pr[A] =
E[X] =
k
X
i=1
k
X
i=1
Pr[A | Ci ] Pr[Ci],
E[X | Ci ] Pr[Ci ].
Excluding rare events: Quite often in the analysis of nature-inspired search
heuristics, we would like to exclude some rare unwanted event. For example,
assume that we analyze an evolutionary algorithm using standard-bit mutation
with mutation rate n1 . Then it is very unlikely that in an application of this
mutation operator more than n1/4 bits are flipped. So it could be convenient to
1/4
exclude this rare event, say by stating that “with probability 1 − 2−Ω(n ) , in none
20
of the first n2 applications of the mutation operator more than n1/4 bits are flipped;
let us in the following condition on this event”. See the proofs of Theorem 7 and 8
in [DJW02] for examples where such an argument is useful.
What could be a problem with this approach is that as soon as we condition
on such an event, we change the probability space and thus arguments valid in
the unconditional setting are not valid anymore. As a simple example, note that
once we condition on that we flip at most n1/4 bits, the events Ei that the i-th
bit flips are not independent anymore. Fortunately, we can safely ignore this in
most cases (and many authors do so without saying a word on this affair). The
reason is that when conditioning on an almost sure event, then the probabilities
of all events change only very little (see the lemma below for this statement made
precise). Hence in our example, we can compute the probability of some event
assuming that the bit flips are independent and then correct this probability by a
minor amount.
Lemma 29. Let C be some event with probability 1 − p. Let A be any event. Then
Pr[A]
Pr[A] − p
≤ Pr[A | C] ≤
.
1−p
1−p
In particular, for p ≤ 21 , we have Pr[A] − p ≤ Pr[A | C] ≤ Pr[A] + 2p.
The proof of this lemma follows right from the definition of conditional probabilities and the elementary estimate Pr[A] − p ≤ Pr[A \ C] = Pr[A ∩ C] ≤ Pr[A],
where C denotes the complement of C. From this, we also observe the natural fact
that when A ⊆ C, that is, the event A implies C, then conditioning on C rather
increases the probability of A:
Pr[A ∩ C]
Pr[A]
=
≥ Pr[A].
Pr[C]
Pr[C]
(23)
Pr[A] − p
Pr[A \ C]
=
≤ Pr[A].
Pr[C]
1−p
(24)
Pr[A | C] =
Likewise, when A ⊇ C, then
Pr[A | C] =
For example, if X is the number of bits flipped in an application of standard-bit
mutation, then Pr[X ≤ 10 | X ≤ n2 ] ≥ Pr[X ≥ 10] and Pr[X ≥ 10 | X ≤ n2 ] ≤
Pr[X ≥ 10].
Conditional binomial random variables: We occasionally need to know the
expected value of a binomially distributed random variable X ∼ Bin(n, p) conditional on that the variable has at least a certain value k. An intuitive (but wrong)
21
argument is that E[X | X ≥ k] should be around k + p(n − k), because we know
already that k of the n independent trials are successes and the remaining (n − k)
trials still have their independent success probability of p. While this argument
is wrong (as we might need more than k trials to have k successes), the result is
correct as an upper bound as shown in this lemma from [DD17].
Lemma 30. Let X be a random variable with binomial distribution with parameters n and p ∈ [0, 1]. Let k ∈ [0..n]. Then
E[X | X ≥ k] ≤ k + (n − k)p ≤ k + E[X].
Pn
Proof. Let X = i=1 Xi with X1 , . . . , Xn being independent binary random variables with Pr[Xi = 1] = p for all i ∈ [1..n]. Conditioning on X ≥ k, let
P
ℓ := min{i ∈ [1..n] | ij=1 Xj = k}. Then
E[X | X ≥ k] =
n
X
i=1
Pr[ℓ = i | X ≥ k]E[X | ℓ = i].
Note that ℓ ≥ k by definition. Note also that (X | ℓ = i) = k + nj=i+1 Xj with
unconditioned Xj . In particular, E[X | ℓ = i] = k + (n − i)p. Consequently,
P
E[X | X ≥ k] =
≤
n
X
i=1
n
X
i=k
Pr[ℓ = i | X ≥ k]E[X | ℓ = i]
Pr[ℓ = i | X ≥ k](k + (n − k)p) = k + (n − k)p.
We note that, in the language introduced in the following section, we have
actually shown the stronger statement that (X | X ≥ k) is dominated by k +
Bin(n − k, p). This stronger version can be useful to obtain tail bounds for (X |
X ≥ k).
8
Stochastic Domination and Coupling
In this section, we discuss two concepts that are not too often used explicitly, but
where we feel that mastering them can greatly help in the analysis of randomized
search heuristics. The first of these is stochastic domination, which is a very strong
way of saying that one random variable is better than another even when they are
not defined on the same probability space. The second concept is coupling, which
means defining two random variables suitably over the same probability space to
facilitate comparing them. These two concepts are strongly related: If the random
variable Y dominates X, then X and Y can be coupled in a way that Y is pointwise not smaller than X, and vice versa. The results of this section and some
related ones have appeared in [Doe18], however, in a more condensed form.
22
8.1
The Notion of Stochastic Domination
Definition 31 (Stochastic domination). Let X and Y be two random variables
not necessarily defined on the same probability space. We say that Y stochastically
dominates X, written as X Y , if for all λ ∈ R we have Pr[X ≤ λ] ≥ Pr[Y ≤ λ].
If Y dominates X, then the cumulative distribution function of Y is point-wise
not larger than the one of X. The definition of domination is equivalent to
∀λ ∈ R : Pr[X ≥ λ] ≤ Pr[Y ≥ λ],
which is maybe a formulation making it more visible why we feel that Y is at least
as large as X.
Concerning nomenclature, we remark that some research communities in addition require that the inequality is strict for at least one value of λ. Hence,
intuitively speaking, Y is strictly larger than X. From the mathematical perspective, this appears not very practical. Consequently, our definition above is
more common in computer science. We also note that stochastic domination is
sometimes called first-order stochastic domination. For an extensive treatment of
various forms of stochastic orders, we refer to [MS02].
The usual way of explaining stochastic domination is via games. Let us
consider the following three games.
Game A: With probability 12 , each you win 500 and 1500.
Game B: With probability 31 , you win 500, with probability 61 , you win 800, and
with probability 12 , you win 1500.
1
Game C: With probability 1000
, you win 2,000,000. Otherwise, you win nothing.
Which of these games is best to play? It is intuitively clear that you prefer
Game B over Game A. However, it is not clear whether you should prefer Game C
over Game B. Clearly, the expected win in Game C is 2000 compared to only 1050
in Game B. However, the chance of winning something at all is really small in
Game C. If you do not like to go home empty-handed, you might prefer Game B.
The mathematical take on these games is that the random variable XB describing the win in Game B stochastically dominates the one XA for Game A.
This captures our intuitive feeling that it cannot be wrong to prefer Game B over
Game A. For Games B and C, neither of XB and XC dominates the other. Consequently, it depends on the precise utility function of the player which game he
prefers. This statement is made precise in the following lemma.
Lemma 32. The following two conditions are equivalent.
(a) X Y .
23
(b) For all monotonically non-decreasing functions f : R → R, we have
E[f (X)] ≤ E[f (Y )].
As a simple corollary we note the following.
Corollary 33. If X Y , then E[X] ≤ E[Y ].
We note another simple, but useful property.
Lemma 34. Let X1 , . . . , Xn be independent random variables defined over some
common probability space. Let Y1 , . . . , Yn be independent random variables defined
over a possibly different probability space. If Xi Yi for all i ∈ [1..n], then
n
X
i=1
Xi
n
X
Yi .
i=1
For discrete random variables, this result is a special case of Lemma 38 stated
further below.
Finally, we note two trivial facts.
Lemma 35. Let X and Y be random variables.
(a) If X and Y are defined on the same probability space and X ≤ Y , then
X Y.
(b) If X and Y are identically distributed, then X Y .
8.2
Stochastic Domination in Runtime Analysis
From the perspective of algorithms analysis, stochastic domination allows to very
clearly state that one algorithm is better than another. If the runtime distribution
XA of algorithms A dominates the one XB of Algorithm B, then from the runtime
perspective Algorithm B is always preferable to Algorithm A.
In a similar vein, we can use domination also to give more detailed descriptions
of the runtime of an algorithm. For almost all algorithms, we will not be able to
precisely determine the runtime distribution. However, via stochastic domination
we can give a lot of useful information beyond, say, just the expectation. We
demonstrate this via an extension of the classic fitness level method, which is
implicit in Zhou, Luo, Lu, and Han [ZLLH12].
Theorem 36 (Domination version of the fitness level method). Consider an iterative randomized search heuristic A maximizing a function f : Ω → R. Let
A1 , . . . , Am be a partition of Ω such that for all i, j ∈ [1..m] with i < j and all
24
x ∈ Ai , y ∈ Aj , we have f (x) < f (y). Set A≥i := Ai ∪ · · · ∪ Am . Let p1 , . . . , pm−1
be such that for all i ∈ [1..m − 1] we have that if the best-so-far search point is
in Ai , then regardless of the past A has a probability of at least pi to generate a
search point in A≥i+1 in the next iteration.
Denote by T the (random) number of iterations A takes to generate a search
point in Am . Then
T
m−1
X
Geom(pi ),
i=1
where this sum is to be understood as a sum of independent geometric distributions.
To prove this theorem, we need a technical lemma which we defer to the subsequent subsection to ease reading this part.
Proof. Consider a run of the algorithm A. For all i ∈ [1..m], let Ti be the first
time (iteration) when A has generated a search point in A≥i . Then T = Tm =
Pm−1
i=1 (Ti+1 − Ti ). By assumption, Ti+1 − Ti is dominated by a geometric random
variable with parameter pi regardless what happened before time Ti . Consequently,
Lemma 38 gives the claim.
Note that a result like Theorem 36 implies various statements on the runtime.
P
1
By Corollary 33, the expected runtime satisfies E[T ] ≤ m−1
i=1 pi , which is the common version of the fitness level theorem [Weg01]. By using tail bounds for sums
of independent geometric random variables (see Section 10.4), we also obtain runtime bounds that hold with high probability. This was first proposed in [ZLLH12].
We defer a list of examples where previous results can profitably be turned into a
domination statement to Section 10.4, where we will also have the large deviation
bounds to exploit such statements.
8.3
Domination by Independent Random Variables
A situation often encountered in the analysis of algorithms is that a sequence of
random variables is not independent, but that each member of the sequence has a
good chance of having a desired property no matter what was the outcome of its
predecessors. In this case, the random variables in some sense can be treated as if
they were independent.
Lemma 37. Let X1 , . . . , Xn be arbitrary binary random variables and let
X1∗ , . . . , Xn∗ be independent binary random variables.
(a) If we have
Pr[Xi = 1 | X1 = x1 , . . . , Xi−1 = xi−1 ] ≤ Pr[Xi∗ = 1]
25
for all i ∈ [1..n] and all x1 , . . . , xi−1 ∈ {0, 1} with Pr[X1 = x1 , . . . , Xi−1 =
xi−1 ] > 0, then
n
X
i=1
Xi
n
X
Xi∗ .
i=1
(b) If we have
Pr[Xi = 1 | X1 = x1 , . . . , Xi−1 = xi−1 ] ≥ Pr[Xi∗ = 1]
for all i ∈ [1..n] and all x1 , . . . , xi−1 ∈ {0, 1} with Pr[X1 = x1 , . . . , Xi−1 =
xi−1 ] > 0, then
n
X
i=1
Xi∗
n
X
Xi .
i=1
Note that here and in the following, we view “X1 = x1 , . . . , Xi−1 = xi−1 ” for
i = 1 as an empty intersection of events, that is, an intersection over an empty
index set. As most textbooks, we define this to be the whole probability space.
Both parts of the lemma are simple corollaries from the following, slightly
technical, general result, which might be of independent interest.
For two sequences (X1 , . . . , Xn ) and (X1∗ , . . . , Xn∗ ) of random variables, we say
that (X1∗ , . . . , Xn∗ ) unconditionally sequentially dominates (X1 , . . . , Xn ) if for all
i ∈ [1..n] and all x1 , . . . , xi−1 ∈ R with Pr[X1 = x1 , . . . , Xi−1 = xi−1 ] > 0, we have
(Xi | X1 = x1 , . . . , Xi−1 = xi−1 ) Xi∗ . Analogously, we speak of unconditional
sequential subdomination if the last condition is replaced by Xi∗ (Xi | X1 =
x1 , . . . , Xi−1 = xi−1 ).
The following lemma shows that unconditional sequential (sub-)domination
and independence of the Xi∗ imply (sub-)domination for the sums of these random
variables. Note that unconditional sequential (sub-)domination is inherited by
subsequences, so the following lemma immediately extends to sums over arbitrary
subsets I of the index set [1..n].
Lemma 38. Let X1 , . . . , Xn be arbitrary discrete random variables.
X1∗ , . . . , Xn∗ be independent discrete random variables.
Let
(a) If (X1∗ , . . . , Xn∗ ) unconditionally sequentially dominates (X1 , . . . , Xn ), then
Pn
Pn
∗
i=1 Xi
i=1 Xi .
(b) If (X1∗ , . . . , Xn∗ ) unconditionally sequentially subdominates (X1 , . . . , Xn ),
P
P
then ni=1 Xi∗ ni=1 Xi .
Proof. The two parts of the lemma imply each other (as seen by multiplying the
random variables with −1), so it suffices to prove the first statement.
26
Since the statement of the theorem is independent of the correlation between
the Xi and the Xi∗ , we may assume that they are independent. Let λ ∈ R. Define
Pj := Pr
X
j
n
X
Xi +
i=j+1
i=1
Xi∗ ≥ λ
for j ∈ [0..n]. We show Pj+1 ≤ Pj for all j ∈ [0..n − 1].
For m ∈ R, let Ωm denote the set of all (x1 , . . . , xj , xj+2 , . . . , xn ) ∈ Rn−1 such
P
that Pr[X1 = x1 , . . . , Xj = xj ] > 0 and i∈[1..n]\{j+1} xi = λ − m. Let M := {m ∈
R | Ωm 6= ∅}. Then
Pj+1 = Pr
j+1
X
n
X
Xi∗ ≥ λ
Xi +
Xi∗
Xi +
i=j+2
i=1
=
X
Pr
i=1
m∈M
=
X
j
n
X
i=j+2
X
X
m∈M (x1 ,...,xj ,xj+2 ,...,xn )∈Ωm
= λ − m ∧ Xj+1 ≥ m
h
Pr X1 = x1 , . . . , Xj = xj ·
h
i
Pr Xj+1 ≥ m X1 = x1 , . . . , Xj = xj ·
≤
X
Pr
Xi +
X
j
i=1
Xi +
n
X
i=j+2
i=1
m∈M
= Pr
X
j
n
X
i=j+1
Xi∗
n
Y
h
Pr Xi∗ = xi
i=j+2
h
i
i
∗
Xi∗ = λ − m · Pr Xj+1
≥m
≥λ
= Pj .
Thus, we have
Pr
X
n
i=1
8.4
Xi ≥ λ = Pn ≤ Pn−1 ≤ · · · ≤ P1 ≤ P0 = Pr
X
n
i=1
Xi∗
≥λ .
Coupling
Coupling is an analysis technique that consists of defining two unrelated random
variables over the same probability space to ease comparing them. As an example,
let us regard standard-bit mutation with rate p and with rate q, where p < q.
Intuitively, it seem obvious that we flip more bits when using the higher rate q.
27
We could make this precise by looking at the distributions of the random variables
Xp and Xq describing the numbers of bits that flip and computing that Xp Xq .
For that, we would need to show that for all k ∈ [0..n], we have
k
X
i=0
k
X
n i
n i
p (1 − p)n−i ≥
q (1 − q)n−i .
i
i
i=0
!
!
Coupling is a way to get the same result in a more natural manner.
Consider the following random experiment. For each i ∈ [1..n], let ri be a
random number chosen independently and uniformly distributed in [0, 1]. Let X̃p
be the number of ri that are less than p and let Xq be the number of ri that are less
than q. We immediately see that X̃p ∼ Bin(n, p) and X̃q ∼ Bin(n, q). However,
we know more. We defined X̃p and X̃q in a common probability space in a way
that we have X̃p ≤ X̃q with probability one: Xp and Xq , viewed as functions
on the (hidden) probability space Ω = {(r1 , . . . , rn ) | r1 , . . . , rn ∈ [0, 1]} satisfy
X̃p (ω) ≤ X̃q (ω) for all ω ∈ Ω. Consequently, by the trivial Lemma 35, we have
Xp X̃p X̃q Xq and hence Xp Xq .
The same argument works for geometric distributions. We summarize these
findings (and two more) in the following lemma. Part (b) follows from the obvious
embedding (which is a coupling as well) of the Bin(n, p) probability space into the
one of Bin(m, p). The first inequality of part (c) is easily computed right from the
definition of domination (and holds in fact for all random variables), the second
part was proved and used in [KW17].
Lemma 39. Let X and Y be two random variables. Let p, q ∈ [0, 1] with p ≤ q.
(a) If X ∼ Bin(n, p) and Y ∼ Bin(n, q), then X Y .
(b) If n ≤ m, X ∼ Bin(n, p) and Y ∼ Bin(m, p), then X Y .
(c) If X ∼ Bin(n, p) and x ∈ [0..n], then X (X | X ≥ x) (X + x).
(d) If p > 0, X ∼ Geom(p), and Y ∼ Geom(q), then X Y .
Let us now formally define what we mean by coupling. Let X and Y be two
random variables not necessarily defined over the same probability space. We
say that (X̃, Ỹ ) is a coupling of (X, Y ) if X̃ and Ỹ are defined over a common
probability space and if X and X ′ as well as Y and Y ′ are identically distributed.
This definition itself is very weak. (X, Y ) have many couplings and most of
them are not interesting. So the art of coupling as a proof and analysis technique
is to find a coupling of (X, Y ) that allows to derive some useful information.
It is not a coincidence that we could use coupling to prove stochastic domination. The following theorem is well-known.
28
Theorem 40. Let X and Y be two random variables. Then the following two
statements are equivalent.
(a) X Y .
(b) There is a coupling (X̃, Ỹ ) of (X, Y ) such that X̃ ≤ Ỹ .
We remark without further details that coupling as a proof technique found
numerous powerful applications beyond its connection to stochastic domination.
8.5
Domination in Fitness or Distance
So far we have used stochastic domination to compare runtime distributions. We
now show that stochastic domination is a very elegant proof tool also when applied
to other distributions. To do so, we give a short and elegant proof for the result of
Witt [Wit13] that compares the runtimes of mutation-based algorithms. The main
reason why our proof is significantly shorter than the one of Witt is that we use
the notion of stochastic domination also for the distance from the optimum. This
will also be an example where we heavily exploit the connection between coupling
and stochastic domination (Theorem 40).
To state this result, we need the notion of a (µ, p) mutation-based algorithm
introduced in [Sud13]. This class of algorithms is called only mutation-based
in [Sud13], but since (i) it does not include all adaptive algorithms using mutation only, e.g., those regarded in [JW06, OLN09, BDN10, BLS14, DGWY17],
(ii) it does not include all algorithms using a different mutation operator than
standard-bit mutation, e.g., those in [DDY16a, DDY16b, LOW17, DLMN17], and
(iii) this notion collides with the notion of unary unbiased black-box complexity algorithms (see [LW12]), which without greater justification could also be called the
class of mutation-based algorithms, we feel that a notion making these restrictions
precise is more appropriate.
The class of (µ, p) mutation-based algorithms comprises all algorithms which
first generate a set of µ search points uniformly and independently at random from
{0, 1}n and then repeat generating new search points from any of the previous ones
via standard-bit mutation with probability p. This class includes all (µ + λ) and
(µ, λ) EAs which only use standard-bit mutation with static mutation rate p.
Denote by (1 + 1) EAµ the following algorithm in this class. It first generates
µ random search points. From these, it selects uniformly at random one with
highest fitness and then continues from this search point as a (1 + 1) EA, that
is, repeatedly generates a new search point from the current one via standard-bit
mutation with rate p and replaces the previous one by the new one if the new one
is not worse (in terms of the fitness). This algorithm was called (1 + 1) EA with
BestOf(µ) initialization in [dPdLDD15].
29
For any algorithm A from the class of (µ, p) mutation-based algorithms and
any fitness function f : {0, 1}n → R, let us denote by T (A, f ) the runtime of the
algorithm A on the fitness function f , that is, the number of the first individual
generated that is an optimal solution. Usually, this will be µ plus the number
of the iteration in which the optimum was generated. To cover also the case
that one of the random initial individuals is optimal, let us assume that these
initial individuals are generated sequentially. As a final technicality, for reasons
of convenience, let us assume that the (1 + 1) EAµ in iteration µ + 1 does not
choose as parent a random one of the previous search points with maximal fitness,
but the last one with maximal fitness. Since the first µ individuals are generated
independently, this modification does not change the distribution of this parent.
In this language, Witt [Wit13] shows the following remarkable result.
Theorem 41. For any (µ, p) mutation-based algorithm A and any f : {0, 1}n → R
with unique global optimum,
T ((1 + 1) EAµ , OneMax) T (A, f ).
This result significantly extends results of a similar flavor in [BE08, DJW12,
Sud13]. The importance of such types of results is that they allow to prove lower
bounds for the performance of many algorithm on essentially arbitrary fitness
functions by just regarding the performance of the (1 + 1) EAµ on OneMax.
Let us denote by |x|1 the number of ones in the bit string x ∈ {0, 1}n . In
other words, |x|1 = kxk1 , but the former is nicer to read. Then Witt [Wit13] has
shown the following natural domination relation between offspring generated via
standard-bit mutation.
Lemma 42. Let x, y ∈ {0, 1}n . Let p ∈ [0, 21 ]. Let x′ , y ′ be obtained from x, y via
standard-bit mutation with rate p. If |x|1 ≤ |y|1, then |x′ |1 |y ′|1 .
We are now ready to give our alternate proof for Theorem 41. While it is
clearly shorter that the original one in [Wit13], we also feel that it is more natural.
In very simple words, it shows that T (A, f ) dominates T ((1 + 1) EAµ , OneMax)
because the search points generated in the run of the (1 + 1) EAµ on OneMax
always are at least as close to the optimum (in the domination or coupling sense)
as the ones in the run of A on f .
Proof. Since A treats bit-positions and bit-values in a symmetric fashion, we may
without loss of generality assume that the unique optimum of f is (1, . . . , 1).
Let x(1) , x(2) , . . . be the sequence of search points generated in a run of A
on the fitness function f . Hence x(1) , . . . , x(µ) are independently and uniformly
distributed in {0, 1}n and all subsequent search points are generated from suitably
chosen previous ones via standard-bit mutation with rate p. Let y (1) , y (2) , . . . be
30
the sequence of search points generated in a run of the (1 + 1) EAµ on the fitness
function OneMax.
We show how to couple these random sequences of search points in a way that
(t)
|x̃ |1 ≤ |ỹ (t) |1 for all t ∈ N. We take as common probability space Ω simply the
space that (x(t) )t∈N is defined on and let x̃(t) = x(t) for all t ∈ N.
We define the ỹ (t) inductively as follows. For t ∈ [1..µ], let ỹ (t) = x(t) . Note
that this trivially implies |x̃(t) |1 ≤ |ỹ (t) |1 for these search points. Let t > µ and
′
′
assume that |x̃(t ) |1 ≤ |ỹ (t ) |1 for all t′ < t. Let s ∈ [1..t − 1] be maximal such that
ỹ (s) has maximal OneMax-fitness among ỹ (1) , . . . , ỹ (t−1) . Let r ∈ [1..t − 1] be such
that x(t) was generated from x(r) in the run of A on f . By induction, we have
|x(r) |1 ≤ |ỹ (r) |1 . By the choice of s we have |ỹ (r) |1 ≤ |ỹ (s) |1 . Consequently, we have
|x(r) |1 ≤ |ỹ (s)|1 . By Lemma 42 and Theorem 40, there is a random ỹ (t) (defined on
Ω) such that ỹ (t) has the distribution of being obtained from ỹ (s) via standard-bit
mutation with rate p and such that |x(t) |1 ≤ |ỹ (t) |1 .
With this construction, the sequence (ỹ (t) )t∈N has the same distribution as
(y (t) )t∈N . This is because the first µ elements are random and then each subsequent
one is generated via standard-bit mutation from the current-best one, which is just
the way the (1 + 1) EAµ is defined. At the same time, we have |x̃(t) |1 ≤ |ỹ (t) |1
for all t ∈ N. Consequently, we have min{t ∈ N | |ỹ (t) |1 = n} ≤ min{t ∈
N | |x(t) |1 = n}. Since T ((1 + 1) EAµ , OneMax) and min{t ∈ N | |ỹ (t) |1 = n} are
identically distributed and also T (A, f ) and min{t ∈ N | |x(t) |1 = n} are identically
distributed, we have T ((1 + 1) EAµ , OneMax) T (A, f ).
While not explicitly using the notion of stochastic domination, the result and
proof in [BE08] bear some similarity to those above. In very simple words and
omitting many details, the result [BE08, Theorem1] states the following. Assume
that you run the (1 + 1) EA and some other algorithm A (from a relatively large
class of algorithms) to maximize a function f . Denote by x(t) and y (t) the best
individual produced by the (1 + 1) EA and A up to iteration t. Assume that
for all t and all possible runs of the algorithms up to iteration t we have that
f (x(t) ) ≥ f (y (t) ) implies f (x(t+1) ) f (y (t+1) ). Assume further that the random
initial individual of the (1 + 1) EA is at least as good (in terms of f ) as all initial
individuals of algorithm A. Then f (x(t) ) f (y (t) ) for all t.
The proof of this result (like the one of the fitness domination statement in
our proof of Theorem 41) uses induction over the time t. Since [BE08] do not use
the notion of stochastic domination explicitly, they cannot simply couple the two
processes, but have to compare the two distributions manually using an argument
they call Abel transform. While not fully exploiting the power of stochastic domination, [BE08] might be the first paper in the theory of evolutionary algorithms
to formulate results and proofs via stochastic domination.
31
9
The Coupon Collector Process
The coupon collector process is one of the central building blocks in the analysis of
randomized algorithms. It is particularly important in the theory of randomized
search heuristics, since the unorganized progress of these algorithms often leads to
situations very similar to the coupon collector process.
The coupon collector process is the following simple randomized process. Assume that there are n types of coupons available. Whenever you buy a certain
product, you get one coupon with a type chosen uniformly at random from the
n types. How long does it take until you have a coupon of each type? We denote,
in this section, the random variable describing the first round after which we have
all types by Tn and call it coupon collecting time. Hence in simple words, this is
the number of rounds it takes to obtain all types.
As an easy example showing the coupon collector problem arising in the theory
of randomized search heuristics, let us regard how the randomized local search
(RLS) heuristic optimizes strictly monotonically increasing functions. The RLS
heuristic when maximizing a given function f : {0, 1}n → R starts with a random
search point. Then, in each iteration of the process, a single random bit is flipped
in the current solution. If this gives a solution worse than the current one (in terms
of f ), then the new solution is discarded. Otherwise, the process is continued from
this new solution.
Assume that f is strictly monotonically increasing, that is, flipping any 0-bit
to 1 increases the function value. Then the optimization process of RLS on f
strongly resembles a coupon collector process. In each round, we flip a random
bit. If this bit was 1 in our current solution, then nothing changes (we discard
the new solution as it has a smaller f -value). If this bit was 0, then we keep the
new solution, which now has one extra 1. Hence taking the 1- bits as coupons, in
each round we obtain a random coupon. This has no effect if we had this coupon
already, but is good if not.
We observe that the optimization time (number of solutions evaluated until
the optimal solution is found) of RLS on strictly monotonic functions is exactly
the coupon collecting time when we start with an initial stake of coupons that
follows a Bin(n, 21 ) distribution. This shows that the optimization time is at most
the classic coupon collector time (where we start with no coupons). See [DD16]
for a very precise analysis of this process.
The expectation of the coupon collecting time is easy to determine. Recall
P
from Section 4.2 the definition of the harmonic number Hn := nk=1 k1 .
Theorem 43 (Coupon collector, expectation). The expected time to collect all n
coupons is E[Tn ] = nHn = (1 + o(1))n ln n.
32
Proof. Given that we already have k different coupons for some k ∈ [0..n − 1], the
. By
probability that the next coupon is one that we do not already have, is n−k
n
the waiting time argument (Lemma 19), we see that the time Tn,k needed to obtain
n
a new coupon given that we have exactly k different ones, satisfies E[Tn,k ] = n−k
.
Pn−1
Clearly, the total time Tn needed to obtain all coupons is k=0 Tn,k . Hence, by
Pn−1
linearity of expectation (Lemma 20), E[Tn ] = k=0
E[Tn,k ] = nHn .
We proceed by trying to gain more information on Tn than just the expectation.
The tools discussed so far (and one to come in a later section) lead to the following
results.
• Markov’s inequality (Lemma 23) gives Pr[Tn ≥ λnHn ] ≤
1
λ
for all λ ≥ 1.
• Chebyshev’s inequality (Lemma 25) can be used to prove Pr[|Tn − nHn | ≥
6
π2
This builds on the fact (implicit in
εn] ≤ 6ε
2 for all ε ≥ π 2 ≈ 0.6079.
the proof above) that the coupon collector time is the sum of independent
Pn−1
geometric random variables Tn = k=0
Geom( n−k
). Hence the variance is
n
π 2 n2
Var[Tn ] = 6 .
n−1
), Witt’s Chernoff bound for geomet• Again exploiting Tn = k=0
Geom( n−k
n
ric random variables (Theorem 78) gives
P
Pr[Tn ≥ E[Tn ] + εn] ≤
exp(− 3ε2 )
π2
exp(− ε )
4
if ε ≤
if ε >
π2
6
π2
6
2
Pr[Tn ≤ E[Tn ] − εn] ≤ exp(− 3ε
)
π2
for all ε ≥ 0. See [Wit14] for the details.
Interestingly, asymptotically much stronger bounds can be derived by fairly
elementary means. These are the basis for Theorem 79, hence for that reason we
did not mention this result in the list above. The key idea is to not regard how the
number of coupons increases over time, but instead to regard the event that we
miss a particular coupon for some period of time. Note that the probability that
a particular coupon is not obtained for t rounds is (1 − n1 )t . By a union bound
argument (see Lemma 12), the probability that there is a coupon not obtained
within t rounds, and equivalently, that Tn > t, satisfies
Pr[Tn > t] ≤ n(1 − n1 )t .
Using the simple estimate of Lemma 1, we obtain the following (equivalent)
bounds.
33
Theorem 44 (Coupon collector, upper tail). For all ε ≥ 0,
Pr[Tn ≥ (1 + ε)n ln n] ≤ n−ε ,
Pr[Tn ≥ n ln n + εn] ≤ exp(−ε).
(25)
(26)
Surprisingly, prior to the following result from [Doe11], no good lower bound
for the coupon collecting time was published.
Theorem 45 (Coupon collector, lower tail). For all ε ≥ 0,
Pr[Tn ≤ (1 − ε)(n − 1) ln n] ≤ exp(−nε ),
Pr[Tn ≤ (n − 1) ln n − ε(n − 1)] ≤ exp(−eε ).
(27)
(28)
Theorem 45 was proven in [Doe11] by showing that the events of having a
coupon after a certain time are 1-negatively correlated. The following proof defers
this work to Lemma 71.
Proof. Let t = (1 − ε)(n − 1) ln n. For i ∈ [1..n], let Xi be the indicator random
variable for the event that a coupon of type i is obtained within the first t rounds.
Then Pr[Xi = 1] = 1 − (1 − n1 )t ≤ 1 − exp(−(1 − ε) ln n) = 1 − n−1+ε , where the
estimate follows from Corollary 4.
Since in the coupon collector process in each round j we choose a random set
Sj of cardinality 1, by Lemma 71 the Xi are negatively correlated. Consequently,
Pr[Tn ≤ (1 − ε)(n − 1) ln n] = Pr[∀i ∈ [1..n] : Xi = 1]
≤
n
Y
Pr[Xi = 1]
i=1
≤ (1 − n−1+ε )n ≤ exp(−nε )
by Lemma 1.
We may remark that good mathematical understanding of the coupon collector process not only is important because such processes directly show up in some
randomized algorithms, but also because it might give us the right intuitive understanding of other processes. Consider, for example, a run of the (1 + 1) EA on
some pseudo-Boolean function f : {0, 1}n → R with a unique global maximum.
The following intuitive consideration leads us to believe that the (1 + 1) EA
with high probability needs at least roughly n ln n2 iterations to find the optimum
of f : By the strong concentration of the binomial distribution, the initial search
point differs in at least roughly n2 bits from the global optimum. To find the global
optimum, it is necessary (but clearly not sufficient) that each of these missing bits
is flipped at least once in some mutation step. Now that the (1 + 1) EA in average
34
flips one bit per iteration, this looks like a coupon collector process started with an
initial stake of n2 coupons, so we expect to need at least roughly n ln n2 iterations
to perform the n ln n2 bit-flips necessary to have each missing bit flipped at least
once. Clearly, this argumentation is not rigorous, but it suggested to us the right
answer.
Theorem 46. The optimization time T of the (1 + 1) EA on any function f :
{0, 1}n → R with unique global maximum satisfies
Pr[T ≤ (1 − ε)(n − 1) ln n2 ] ≤ exp(−nε ).
Proof. By symmetry, we may assume that the unique global optimum of f is
(1, . . . , 1). Let t = (1 − ε)(n − 1) ln n2 . For all i ∈ [1..n], let Yi denote the event
that the i-th bit was zero in the initial search point and was not flipped in any
application of the mutation operator in the first t iterations. Let Xi = 1 − Yi.
Then Pr[Xi = 1] = 1 − 12 (1 − n1 )t ≤ 1 − n−1+ε . The events Xi are independent, so
we compute
Pr[T ≤ t] ≤ Pr[∀i ∈ [1..n] : Xi = 1]
=
n
Y
Pr[Xi = 1]
i=1
= (1 − n−1+ε )n = exp(−nε ).
We stated the above theorem to give a simple example how understanding the
coupon collector process can help understanding also randomized search heuristics
that do not directly simulate a coupon collecting process. We remark that the
theorem above is not best possible, in particular, it does not outrule an expected
optimization time of n ln n2 . In contrast it is known that the optimization time of
the (1 + 1) EA on the OneMax function is E[T ] ≥ en ln n − O(n), see [DFW11],
improving over the slightly weaker E[T ] ≥ en ln n − O(n log log n) from, independently, [DFW10] and [Sud13], where the latter holds for a much broader
class of mutation-based algorithms. Since it has been observed that OneMax
is the easiest function with unique global optimum for many mutation-based algorithms [DJW12, Sud13, Wit13], these results take over to all pseudo-Boolean
functions with unique global optimum.
10
Large Deviation Bounds
Often, we are not only interested in the expectation of some random variable, but
we need a bound that holds with high probability. We have seen in the proof of
35
Theorem 14 that such high-probability statements can be very useful: If a certain
bad event occurs in each iteration with a very small probability only, then a simple
union bound is enough to argue that this event is unlikely to occur even over a large
number of iterations. The better the original high-probability statement is, the
more iterations we can cover. For this reason, the tools discussed in this chapter
are among the most employed in the theory of randomized search heuristics.
Since computing the expectation often is easy, a very common approach is to
first compute the expectation of a random variable and then bound the probability
that the random variable deviates from this expectation by a too large amount.
The tools for this second step are called tail inequalities or large deviation inequalities, and this is the topic of this section. In a sense, Markov’s and Chebyshev’s
inequality discussed in Section 6 can be seen as large deviation inequalities as well,
but usually the term is reserved for exponential tail bounds.
A large number of large deviation bounds have been developed in the past.
They differ in the situations they are applicable to, but also in their sharpness.
Often, the sharpest bounds give expressions for the tail probability that are very
difficult to work with. Hence some experience is needed to choose a tail bound
that is not overly complicated, but sharp enough to give the desired result.
To give the novice to this topic some orientation, here is a short list of results
that are particularly useful and which are sufficient in many situations.
(a) The simple multiplicative Chernoff bounds (33) and (40) showing that for
sums of independent [0, 1] random variables, a constant factor deviation from
the expectation occurs only with probability negatively exponential in the
expectation.
(b) The additive Chernoff bounds of Theorems 53 and 55 showing that a sum
of n independent random variables deviates from the expectation by more
2
than an additive term of λ only with probability exp(−Ω( λn )).
(c) The fact that essentially all large deviation bounds can be used also with
a pessimistic estimate for the expectation instead of the precise expectation
(Section 10.1.8).
(d) The method of bounded differences (Theorem 72), which states that the
additive Chernoff bounds remain valid if X is functionally dependent of
independent random variables each having a small influence on X.
For the experienced reader, the following results may be interesting as they go
beyond what most introductions to tail bounds cover.
(a) In Section 10.2.2 we show that essentially all large deviation bounds usually
stated for sums of independent random variables are also valid for negatively correlated random variables. An important application of this result
36
are distributions arising from sampling without replacement or with partial
replacement.
(b) In Section 10.4, we present a number of large deviation bounds for sums of
independent geometrically distributed random variables. These seem to be
particularly useful in the analysis of randomized search heuristics, whereas
they are rarely used in classic randomized algorithms.
(c) In Theorem 73, we present a version of the bounded differences method which
only requires that the t-th random variable has a bounded influence on the
expected outcome resulting from variables t + 1 to n. This is much weaker
than the common bounded differences assumption that each random variable, regardless how we condition on the remaining variables, has a bounded
influence on the result. We feel that this new version (which is an easy consequence of known results) may be very useful in the analysis of iterative
improvement heuristics. In particular, it may lead to elementary proofs for
results which so far could only be proven via tail bounds for martingales.
10.1
Chernoff Bounds for Sums of Independent Bounded
Random Variables
In this longer subsection, we assume that our random variable of interest is the
sum of independent random variables, each taking values in some bounded range.
The bounds presented below are all known under names like Chernoff or
Hoeffding bounds, referring to the seminal papers by Chernoff [Che52] and
Hoeffding [Hoe63]. Since the first bounds of this type were proven by Bernstein [Ber24]—via the exponential moments method that is used in essentially all
proofs of such results, see Section 10.1.7—the name Bernstein inequalities would be
more appropriate. We shall not be that precise and instead use the most common
name Chernoff inequalities for all such bounds.
For the readers’ convenience, we shall not be shy to write out also minor reformulations of some results. We believe that it helps a lot to have seen them and
we think that it is convenient, both for using the bounds or for referring to them,
if all natural version are visible in the text.
10.1.1
Multiplicative Chernoff Bounds for the Upper Tail
The multiplicative Chernoff bounds presented in this and the next section bound
the probability to deviate from the expectation by at least a given factor. Since
in many algorithmic analyses we are interested only in the asymptotic order of
magnitude of some quantity, a constant-factor deviation can be easily tolerated
37
and knowing that larger deviations are very unlikely is just what we want to
know. For this reason, the multiplicative Chernoff bounds are often the right tool.
The following theorem collects a number of bounds for the upper tail, that is,
for deviations above the expectation.
Theorem 47. Let X1 , . . . , Xn be independent random variables taking values in
P
[0, 1]. Let X = ni=1 Xi . Let δ ≥ 0. Then
Pr[X ≥ (1 + δ)E[X]]
≤
1
1+δ
!(1+δ)E[X]
!E[X]
n − E[X]
n − (1 + δ)E[X]
!n−(1+δ)E[X]
(29)
eδ
≤
= exp(−((1 + δ) ln(1 + δ) − δ)E[X])
(1 + δ)1+δ
!
δ 2 E[X]
≤ exp −
2 + 32 δ
!
min{δ 2 , δ}E[X]
≤ exp −
,
3
where the bound in (29) is read as 0 for δ >
For δ ≤ 1, equation (32) simplifies to
n−E[X]
E[X]
Pr[X ≥ (1 + δ)E[X]] ≤ exp
and as ( E[X]
)n for δ =
n
δ 2 E[X]
.
−
3
!
(30)
(31)
(32)
n−E[X]
.
E[X]
(33)
The first and strongest bound (29) was first stated explicitly by
Hoeffding [Hoe63]. It improves over Chernoff’s [Che52] tail bounds in particular by not requiring that the Xi are identically distributed. Hoeffding also shows
that (29) is the best bound that can be shown via the exponential moments methods under the assumptions of Theorem 47.
For E[X] small, say E[X] = o(n) when taking a view asymptotic in n → ∞,
the second bound (30) is easier to use, but essentially as strong as (29). More
precisely, it is larger only by a factor of (1 + o(1))E[X] , since we estimated
n − E[X]
n − (1 + δ)E[X]
!n−(1+δ)E[X]
δE[X]
= 1+
n − (1 + δ)E[X]
!n−(1+δ)E[X]
≤ eδE[X] (34)
using Lemma 1.
3δ2
Equation (31) is derived from (30) by noting that (1 + δ) ln(1 + δ) − δ ≥ 6+2δ
holds for all δ ≥ 0, see Theorem 2.3 and Lemma 2.4 in McDiarmid [McD98].
Equations (32) and (33) are trivial simplifications of (31).
38
f (x) = (1 + x) ln(1 + x) − x
x2
f (x) = 2+2x/3
f (x) = min{x2 , x}/3
f (x)
1.5
1
0.5
0
0.5
1
1.5
2
2.5
x
Figure 3: Visual comparison of the bounds (30), (31), (32). Depicted is the term
f (x) leading to the bound Pr[X ≥ (1 + x)E[X]] ≤ exp(−f (x)E[X]).
In general, to successfully use Chernoff bound in one’s research, it greatly
helps to look a little behind the formulas and understand their meaning. Very
roughly speaking, we can distinguish three different regimes relative to δ, namely
that the tail bound is of order exp(−Θ(δ log(δ)E[X])), exp(−Θ(δE[X])), and
exp(−Θ(δ 2 E[X])).
Superexponential regime: Equation (30) shows a tail bound of order
−Θ(δE[X])
δ
= exp(−Θ(δ log(δ)E[X])), where the asymptotics are for δ → ∞. In
this regime, the deviation δE[X] from the expectation E[X] is much larger than
the expectation itself. It is not very often that we need to analyze such large deviations, so this Chernoff bound is rarely used. It can be useful in the analysis of
evolutionary algorithms with larger offspring populations, where the most extreme
behavior among the offspring can deviate significantly from the expected behavior.
See [DK15, DD17] for examples how to use Chernoff bounds for large deviations
occurring in the analysis of the (1 + λ) EA. Note that in [JJW05], the first theoretical work on the (1 + λ) EA, such Chernoff bounds could have been used as
well, but the authors found it easier to directly estimate the tail probability by
estimating binomial coefficients.
Weaker forms of (30) are
Pr[X ≥ (1 + δ)E[X]] ≤
e
(1 + δ)
Pr[X ≥ (1 + δ)E[X]] ≤
e
δ
39
!(1+δ)E[X]
!δE[X]
,
,
(35)
(36)
where the first one is stronger for those values of δ where the tail probability is
less than one (that is, δ > e − 1).
It is not totally obvious how to find a value for δ ensuring that ( δe )δ is less than
a desired bound. The following lemma solves this problem.
Lemma 48. Let t ≥ ee
1/e
≈ 4.24044349... . Let δ =
Proof. We compute δ ln δe = δ ln
ln t
ln t
e ln( e ln
)
ln t
ln t
.
ln t
ln( e ln
)
ln t
Then ( eδ )δ ≤ 1t .
≥ δ ln( e lnlnlnt t ) = ln t.
We use this estimate to bound the number of bits flipped in an application of
the standard-bit mutation operator. The standard-bit mutation operator takes as
input a bit-string x ∈ {0, 1}n of length n and returns the bit-string y ∈ {0, 1}n
obtained from flipping each bit of x independently at random with probability n1 ,
that is, for each i ∈ [1..n] independently we have Pr[yi = 1 − xi ] = n1 and Pr[yi =
xi ] = 1 − n1 . Let us denote by H(x, y) := |{i ∈ [1..n] | xi 6= yi } the Hamming
distance of x and y, that is, the number of bits x and y differ in. By linearity
of expectation, it is clear that the expected Hamming distance of x and y is
E[H(x, y)] = 1, see Lemma 21. Using Chernoff bounds, we now give an upper
bound on how far we can exceed this value. Such arguments are often useful
in the analysis of evolutionary algorithms, see, e.g., Lemma 26 in [DK15] for an
example.
Lemma 49. (a) Let x ∈ {0, 1}n and y be obtained from x via standard-bit mutation with mutation rate αn . Then Pr[H(x, y) ≥ k] ≤ ( eα
)k .
k
(b) Let 0 < p ≤ exp(−α exp( 1e )).
Let k ≥ kp :=
ln(1/p)
ln
Pr[H(x, y) ≥ k] ≤ p.
ln(1/p1/α )
e ln ln(1/p1/α )
.
Then
(c) Let T ∈ N and 0 < p ≤ T1 exp(−α exp( 1e )). Let y1 , . . . , yT be obtained from
ln(T /p)
.
x1 , . . . , xT , respectively, via standard-bit mutation. Let k ≥ ln((T
/p)1/α )
ln
e ln ln((T /p)1/α )
Then
Pr[∃i ∈ [1..T ] : H(xi , yi) ≥ k] ≤ p.
Proof. Note that H(x, y) ∼ Bin(n, αn ), hence H(x, y) can be written as a sum of n
independent random variables X1 , . . . , Xn with Pr[Xi = 1] = αn and Pr[Xi = 0] =
1 − αn for all i ∈ [1..n]. Since E[H(x, y)] = α, we can apply equation (35) with
(δ + 1) = αk . This proves (a).
For part (b), we use Lemma 48 and compute Pr[H(x, y) ≥ k] ≤ Pr[H(x, y) ≥
kp ] ≤ (( kpe/α )kp /α )α ≤ (p1/α )α = p. Similarly, for (c) we obtain Pr[H(xi, yi ) ≥ k] ≤
p
and use the union bound (Lemma 12).
T
40
Observe that the bounds in Lemma 49 are independent of n. Also, the bounds
in parts (b) and (c) depend only mildly on α. By applying part (c) with p = n−c1
and T = nc2 , we see that the probability that an evolutionary algorithm using
standard-bit mutation with rate αn , α a constant, flips more than (c1 +c2 +o(1)) lnlnlnnn
bits in any of the first nc2 applications of the mutation operator, is at most n−c1 .
Exponential regime: When δ = Θ(1), then all bounds give a tail probability of order exp(−Θ(δE[X])). Note that the difference between these bounds
often is not very large. For δ = 1, the bounds in (30), (31), and (32) become
(0.67957...)E[X], (0.68728...)E[X] , and (0.71653...)E[X] , respectively. So there is often no reason to use the unwieldy equation (30).
We remark that also for large δ, where the bound (30) gives the better asymptotics exp(−Θ(δ log(δ)E[X])), one can, with the help of Section 10.1.8 resort to
the easier-to-use bounds (31) and (32) when the additional logarithmic term is
not needed. For example, when X is again the number of bits that flip in an
application of the standard-bit mutation operator with mutation rate p = αn , then
for all c > 0 and n ∈ N with c ln n ≥ α equation (32) with E[X] ≤ µ+ := c ln n
and the argument of Section 10.1.8 gives Pr[X ≥ 2c ln n] = Pr[X ≥ (1 + 1)µ+ ] ≤
exp(− 31 µ+ ) = n−c/3 , which in many applications is fully sufficient.
A different way of stating an exp(−Θ(δE[X])) tail bound, following directly
from applying (35) for δ ≥ 2e − 1, is the following.
Corollary 50. Under the assumptions of Theorem 47, we have
Pr[X ≥ k] ≤ 2−k
(37)
for all k ≥ 2eE[X].
Sub-exponential regime: When δ ≤ 1, the tail probability is of order
exp(−Θ(δ 2 E[X])). We need δ to be at least of order (E[X])−1/2 to obtain useful statements. Note that for E[X] close to n2 , Theorem 53 below gives slightly
stronger bounds.
10.1.2
Multiplicative Chernoff Bounds for the Lower Tail
In principle, of course, there is no difference between bounds for the upper and
lower tail. If in the situation of Theorem 47 we set Yi := 1 − Xi , then the Yi
are independent random variables taking values in [0, 1] and any upper tail bound
P
for X turns into a lower tail bound for Y := ni=1 Yi via Pr[Y ≤ t] = Pr[X ≥
n − t]. However, since this transformation also changes the expectation, that is,
E[Y ] = n − E[X], a convenient bound like (33) becomes Pr[Y ≤ (1 − δ)E[Y ]] ≤
E[Y ] 2
exp(− 13 (1 + δ n−E[Y
) (n − E[Y ])).
]
For this reason, usually the tail bounds for the lower tail are either proven
completely separately (however, using similar ideas) or are derived from simplifying
41
f (x) = −x − (1 − x) ln(1 − x)
2
f (x) = x2
0.8
f (x)
0.6
0.4
0.2
0
0.2
0.4
0.6
0.8
x
Figure 4: Visual comparison of the bounds (39) and (40). Depicted is the term
f (x) leading to the bound Pr[X ≤ (1 − x)E[X]] ≤ exp(−f (x)E[X]).
the result of applying the above symmetry argument to (29). Either approach can
be used to show the following bounds. As a visible result of the asymmetry of
the situation for upper and lower bounds, note the better constant of 21 in the
exponent of (40) as compared to the 13 in (33).
Theorem 51. Let X1 , . . . , Xn be independent random variables taking values in
P
[0, 1]. Let X = ni=1 Xi . Let δ ∈ [0, 1]. Then
Pr[X ≤ (1 − δ)E[X]] ≤
1
1−δ
!(1−δ)E[X]
!E[X]
e−δ
≤
(1 − δ)1−δ
!
δ 2 E[X]
≤ exp −
.
2
n − E[X]
n − (1 − δ)E[X]
!n−(1−δ)E[X]
(38)
(39)
(40)
For the not so interesting boundary cases, recall our definition 00 := 1. The
first bound (38) follows from (29) by regarding the random variables Yi := 1 − Xi.
P
, we compute
Setting Y = ni=1 Yi and δ ′ = δ E[X]
E[Y ]
Pr[X ≤ (1 − δ)E[X]] = Pr[Y ≥ (1 + δ ′ )E[Y ]]
≤
1
1 + δ′
!(1+δ′ )E[Y ]
42
n − E[Y ]
n − (1 + δ ′ )E[Y ]
!n−(1+δ′ )E[Y ]
=
n − E[X]
n − (1 − δ)E[X]
!n−(1−δ)E[X]
1
1−δ
!(1−δ)E[X]
.
Obviously, in an analoguous fashion, (29) can be derived from (38), so both
bounds are equivalent. Equation (39) follows from (38) using an elementary estimate analoguous to (34). Equation (40) follows from (39) using elementary
calculus, see, e.g., the proof of Theorem 4.5 in [MU05].
Theorems 47 and 51 in particular show that constant-factor deviations from
the expectation appear only with exponentially small probability.
Corollary 52. Let X1 , . . . , Xn be independent random variables taking values in
P
[0, 1]. Let X = ni=1 Xi . Let δ ∈ [0, 1]. Then
h
i
Pr |X − E[X]| ≥ δE[X] ≤ 2 exp
10.1.3
δ 2 E[X]
−
.
3
!
Additive Chernoff Bounds
We now present a few bounds for the probability that a random variable deviates
from its expectation by an additive term independent of the expectation. The
advantage of such bounds is that they are identical for upper and lower tails and
that they are invariant under additive rescalings.
Already from Theorem 47, equation (29), by careful estimates (see, e.g.,
Hoeffding [Hoe63]) and exploiting the obvious symmetry, we obtain the following
estimates. When E[X] is close to n2 , this additive Chernoff bound gives (slightly)
stronger results than the simplified bounds of Theorems 47 and 51.
Theorem 53. Let X1 , . . . , Xn be independent random variables taking values in
P
[0, 1]. Let X = ni=1 Xi . Then for all λ ≥ 0,
Pr[X ≥ E[X] + λ] ≤ exp
Pr[X ≤ E[X] − λ] ≤ exp
2λ2
,
−
n
!
2λ2
−
.
n
!
(41)
(42)
A second advantage of additive Chernoff bounds is that they are often very
easy to apply. As a typical application in evolutionary computation, let us regard
the number of ones kxk1 in a random search point x ∈ {0, 1}, which could, e.g.,
be an initial solution in an evolutionary algorithm.
Lemma 54. Let x ∈ {0, 1}n be chosen uniformly at random. Then
Pr
n
2λ2
kxk1 −
.
≥ λ ≤ 2 exp −
2
n
43
!
Proof. Note that if x ∈ {0, 1}n is uniformly distributed, then the xi are independent random variables uniformly distributed in {0, 1}. Consequently, kxk1 =
Pn
n
i=1 xi is a sum of independent random variables and E[kxk1 ] = 2 . The claim now
follows immediately from applying Theorem 53 to the events “kxk1 ≥ E[kxk1 ]+ λ”
and “kxk1 ≤ E[kxk1 ] − λ”.
The following theorem, again due to Hoeffding [Hoe63], non-trivially extends
Theorem 53 by allowing the Xi to take values in arbitrary intervals [ai , bi ].
Theorem 55. Let X1 , . . . , Xn be independent random variables. Assume that each
P
Xi takes values in a real interval [ai , bi ] of length ci := bi − ai . Let X = ni=1 Xi .
Then for all λ > 0,
Pr[X ≥ E[X] + λ] ≤ exp
Pr[X ≤ E[X] − λ] ≤ exp
2λ2
!
− Pn
,
(43)
.
(44)
2
i=1 ci
!
2
2λ
− Pn
2
i=1 ci
For comparison, we now reformulate Theorems 47 and 51 as additive bounds.
There is no greater intellectual challenge hidden, but we feel that it helps to have
seen these bounds at least once. Note that, since the resulting bounds depend on
the expectation, we need that the Xi take values in [0, 1]. In other words, different
from the bounds presented so far in this subsection, the following bounds are not
invariant under additive rescaling and are not symmetric for upper and lower tails.
Theorem 56 (equivalent to Theorem 47). Let X1 , . . . , Xn be independent random
P
variables taking values in [0, 1]. Let X = ni=1 Xi . Let λ ≥ 0. Then
Pr(X ≥ E[X] + λ)
≤
E[X]
E[X] + λ
≤ eλ
≤ exp
≤ exp
!E[X]+λ
E[X]
E[X] + λ
n − E[X]
n − E[X] − λ
!E[X]+λ
= exp
!n−E[X]−λ
(45)
!
λ
+λ
− (E[X] + λ) ln 1 +
E[X]
λ2
−
2E[X] + 23 λ
(
)!
1
λ2
− min
,λ ,
3
E[X]
!
!
(46)
(47)
(48)
)n for λ =
where the bound in (45) is read as 0 for λ > n − E[X] and as ( E[X]
n
n − E[X]. For λ ≤ E[X], equation (48) simplifies to
Pr[X ≥ E[X] + λ] ≤ exp
44
λ2
−
.
3E[X]
!
(49)
Theorem 57 (equivalent to Theorem 51). Let X1 , . . . , Xn be independent random
P
variables taking values in [0, 1]. Let X = ni=1 Xi . Let δ ∈ [0, 1]. Then
Pr[X ≤ E[X] − λ] ≤
E[X]
E[X] − λ
!E[X]−λ
!n−E[X]+λ
!E[X]−λ
E[X]
≤e
E[X] − λ
!
λ2
.
≤ exp −
2E[X]
−λ
10.1.4
n − E[X]
n − E[X] + λ
(50)
(51)
(52)
Chernoff Bounds Using the Variance
There are several versions of Chernoff bounds that take into account the variance.
In certain situations, they can give significantly stronger bounds than the estimates
discussed so far. Hoeffding [Hoe63] proves essentially the following result.
Theorem 58. Let X1 , . . . , Xn be independent random variables such that Xi ≤
P
P
E[Xi ] + 1 for all i = 1, . . . , n. Let X = ni=1 Xi . Let σ 2 = ni=1 Var(Xi ) = Var[X].
Then for all λ ≥ 0,
Pr[X ≥ E[X] + λ]
≤
≤ exp
= exp
≤ exp
≤ exp
2
σ
) n+σ
2
!− 1− λ n !n
λ ( n ) n+σ2
1−
n
!
!
!!
2
λ
σ
ln 1 + 2 − 1
−λ 1+
λ
σ
!
!
!!
λ
λ
λ
2
1 + 2 ln 1 + 2 − 2
−σ
σ
σ
σ
!
2
λ
− 2 2
2σ + 3 λ
(
)!
1
λ2
− min
,λ ,
3
σ2
λ
1+ 2
σ
!−(1+
λ
σ2
(53)
(54)
(55)
(56)
2
σ
n
where the term in (53) is understood to mean 0 when λ > n and ( n+σ
when
2)
λ = n.
The estimate from (53) to (54) is non-trivial and can be found, e.g., in
Hoeffding [Hoe63]. From (54) we derive (55) in the same way that was used
to derive (31) from (30).
By replacing Xi with −Xi , we obtain the analoguous bounds for the lower tail.
45
Corollary 59. If the condition Xi ≤ E[Xi ] + 1 in Theorem 58 is replaced by
Xi ≥ E[Xi ] − 1, then Pr[X ≤ E[X] − λ] satisfies the estimates of equations (53)
to (56).
As discussed in Hoeffding [Hoe63], the bound (54) is the same as inequality (8b)
in Bennett [Ben62], which is stronger than the bound (55) due to Bernstein [Ber24]
and the bound of exp(− 12 λ arcsinh( 2σλ2 )) due to Prokhorov [Pro56].
In comparison to the additive version of the usual Chernoff bounds for the upper
tail (Theorem 56), very roughly speaking, we see that the Chernoff bounds working
with the variance allow to replace the expectation of X by its variance. When the
Xi are binary random variables with Pr[Xi = 1] small, then E[X] ≈ Var[X]
and there is not much value of using Theorem 58. For this reason, Chernoff
bounds taking into account the variance have not been used a lot in the theory
of randomized search heuristics. They can, however, be convenient. For example,
when a search point y ∈ {0, 1}n is obtained from a given x ∈ {0, 1}n via standardbit mutation with probability p. Assume for simplicity that we are interested
in estimating the number of ones in y (the same argument would hold for the
Hamming distance of y to some other search point z ∈ {0, 1}∗, e.g., a unique
P
optimum). Now the number of ones in y is simply X = ni=1 yi and X is a sum of
independent binary random variables. The expectation of X may be big, namely
if x has many ones, but the variance is small (assuming that p is small), namely
Var[X] = np(1 − p). Consequently, here the Chernoff bounds of this subsection
are very useful. See, e.g., [DGWY17] for an example where this problem appeared
in a recent research paper.
When not too precise bounds are needed, looking separately at the number
of zeros and ones of x that flip (and bounding these via simple Chernoff bounds)
is a way to circumvent the use of Chernoff bounds taking into account the variance. Several research works follow this approach despite the often more technical
computations.
Chernoff bounds using the variance can also be useful in ant colony algorithms
and estimation of distribution algorithms, where again pheromone values or frequencies close to 0 or 1 can lead to a small variance. See [Wit17] for a recent
example.
The bounds of Theorem 58 can be written in a multiplicative form, e.g.,
Pr[X ≥ (1 + δ)E[X]]
!−(1+ δE[X] )
δE[X]
≤
1+
σ2
!
δ 2 E[X]2
≤ exp − 2 2
.
2σ + 3 δE[X]
σ2
σ2
n+σ 2
δE[X]
1−
n
!−(1− δE[X] )
n
n
n+σ 2
!n
(57)
(58)
46
This is useful when working with relative errors, however, it seems that unlike for
some previous bounds (compare, e.g., (30) and (46)) the multiplicative forms are
not much simpler here.
Obviously, the case that all Xi satisfy Xi ≤ E[Xi ] + b for some number b
(instead of 1) can be reduced to the case b = 1 by dividing all random variable
by b. For the reader’s convenience, we here state the resulting Chernoff bounds.
Theorem 60 (equivalent to Theorem 58 and Corollary 59). Let X1 , . . . , Xn be
independent random variables. Let b be such that Xi ≤ E[Xi ] + b for all i =
P
P
1, . . . , n. Let X = ni=1 Xi . Let σ 2 = ni=1 Var(Xi ) = Var[X]. Then for all λ ≥ 0,
!−(1+ bλ )
σ2
nb2 +σ 2
2
≤ exp
!−(1− λ ) nb !n
nb nb2 +σ 2
λ
1−
nb
!
!
!!
σ2
bλ
1+
ln 1 + 2 − 1
bλ
σ
!
2
λ
− 2
σ (2 + 23 σbλ2 )
≤ exp
1
λ2 λ
− min
,
3
σ2 b
bλ
Pr[X ≥ E[X] + λ] ≤
1+ 2
σ
λ
≤ exp −
b
σ2
(
)!
,
(59)
(60)
(61)
(62)
2
where the term in (59) is understood to mean 0 when λ > nb and ( nb2σ+σ2 )n when
λ = nb.
When we have Xi ≥ E[Xi ] − b instead of Xi ≤ E[Xi ] + b for all i = 1, . . . , n,
then the above estimates hold for Pr[X ≤ E[X] − λ].
10.1.5
Relation Between the Different Chernoff Bounds
We proceed by discussing how the bounds presented so far are related. The main
finding will be that the Chernoff bounds depending on the variance imply all
other bounds discussed so far with the exception of the additive Chernoff bound
for different variable ranges (Theorem 55).
Surprisingly, this fact is not stated that explicitly in Hoeffding’s paper [Hoe63].
More precisely, in [Hoe63] the analogue of Theorems 58 and 60 uses the additional
assumption that all Xi have the same expectation. Since this assumption is not
made for the theorems not involving the variance, Hoeffding explicitely states that
the latter are stronger in this respect (see the penultimate paragraph of Section 3
of [Hoe63].
It is however quite obvious that the common-expectation assumption can be
easily removed. From random variables with arbitrary means we can obtain random variables all having mean zero by subtracting their expectation. This operation does not change the variance and does not change the distribution of X −E[X].
47
Consequently, Hoeffding’s result for variables with identical expectations immediately yields our version of this result (Theorem 58 and 60). Theorem 58 implies
Theorem 47 via the equivalent version of Theorem 56, see again the penultimate
paragraph of Section 3 of [Hoe63].
Consequently, the first (strongest) bound in Theorem 58 (equivalently the first
bound of Theorem 60) implies the first (strongest) bound of Theorem 47, which
is equivalent to the first (strongest) bound in Theorem 51. Essentially all other
bounds presented so far can be derived from these main theorems via simple,
sometimes tedious, estimates. The sole exception is Theorem 55, which can lead to
significantly stronger estimates when the random variables have ranges of different
size.
As an example, let X1 , . . . , Xn be independent random variables such that
X1 , . . . , Xn−1 take the values 0 and (n − 1)−1/2 with equal probability 12 and such
P
that Xn takes
the values 0 and 1 with equal probability 21 . Let X = ni=1 Xi . Then
√
E[X] = 12 ( n − 1 + 1). Theorem 55, taking ci = (n − 1)−1/2 for i ∈ [1..n − 1] and
cn = 1, yields the estimate
Pr[X ≥ E[X] + λ] ≤ exp
Note that Var[X] =
1
2
2λ2
− Pn
2
i=1 ci
!
= exp(−λ2 ).
(63)
=: σ 2 . Consequently, the strongest Chernoff bound of
λ
nσ 2
Theorem 58, equation (53), gives an estimate larger than (1 + σλ2 )−(1+ σ2 ) n+σ =
exp(−Θ(λ log λ)). Consequently, in this case Theorem 55 gives a significantly
stronger estimate than Theorem 58.
10.1.6
Tightness of Chernoff Bounds, Lower Bounds for Deviations
As a very general and not at all precise rule of thumb, we can say that often the
sharpest Chernoff bound presented so far gives an estimate for the tail probability
that is near-tight. This is good to know from the perspective of proof design, since
it indicates that failing to prove a desired statement usually cannot be overcome by
trying to invent sharper Chernoff bounds. We shall not try to make this statement
precise.
However, occasionally, we also need lower bounds for the deviation from the
expectation as a crucial argument in our analysis. For example, when generating
several offspring independently in parallel, as, e.g., in a (1 + λ) EA, we expect the
best of these to be significantly better than the expectation and the efficiency of
the algorithm relies on such large deviations from the expectation.
Such lower bounds for deviations seem to be harder to work with. For this
reason, we only briefly give some indications how to handle them and refer the
reader to the literature. We note that there is a substantial body of mathematics
48
literature on this topic, see, e.g., [Nag01] and the references therein, which however
is not always easy to use for algorithmic problems.
Estimating binomial coefficients: While more advanced methods are available, surprisingly often estimating the sum of binomial coefficients arising in the
expression of the tail probability is a good approach. In the theory of randomized search heuristics, this approach was used, among others, in the analysis of the
(1+λ) EA in [JJW05, DK15, GW17, DGWY17] and the (1+(λ, λ)) GA in [DD17].
The following elementary bound was shown in [Doe14].
Lemma 61. Let n ∈ N and X ∼ Bin(n,
1
).
2
Then Pr X ≤ E[X] −
1
2
q
E[X] ≥ 18 .
Approximation via the normal distribution: The generic approach of approximating binomial distributions via normal distributions, surprisingly, is not
often used in the theory of randomized search. In [OW15], it was used to give
an elegant proof of the fact that a binomial random variable
X with p ≤ 12 with
q
constant probability deviates from its expectation by Ω( E[X]). This matches
the case of δ = Θ(E[X]−1/2 ) in (40).
Lemma 62. Let X ∼ Bin(n, p) with p ≤ 21 . Then Pr[X ≤ E[X] −
Pr[X ≥ E[X] +
q
1
E[X] ]
2
are both Ω(1).
q
1
E[X] ]
2
and
In [dPdLDD15],
the normal approximation was used to show that the best of
√
n
k ∈ ω(n) ∩ o( n) independent random
q initial search points in {0, 1} with probability 1 − o(1) has a distance of n2 − n2 (ln k − 12 ln ln k ± ck ) from the optimum,
where ck is an arbitrary sequence tending to infinity.
Order statistics: The last example actually says something about the maximum order statistics of k independent Bin(n, 12 ) random variables. In general, the
maximum order statistics is strongly related to lower bounds for tail probabilities
as the following elementary argument (more or less explicit in all works on the
(1 + λ) EA) shows: Let X1 , . . . , Xλ be independent random variables following the
same distribution. Let Xmax = max{Xi | i ∈ [1..λ]}. Then
Pr[X ∗ ≥ D] ≤ λ Pr[X1 ≥ D];
Pr[X ∗ ≥ D] = 1 − (1 − Pr[X1 ≥ D])λ ≥ 1 − exp(λ Pr[X1 ≥ D]).
Consequently, Pr[X ∗ ≥ D] is constant if and only if Pr[X1 ≥ D] = Θ( λ1 ).
For the maximum order statistics of binomially distributed random variables
with small success probability, Gießen and Witt [GW17] proved the following result
and used it in the analysis of the (1 + λ) EA.
49
Lemma 63. Let α ≥ 0 and c > 0 be constants. Let n ∈ N and let all of the
following asymptotics be for n → ∞. Let k = n(ln n)−α and λ = ω(1). Let Xmax
be the maximum of λ independent random variables with distribution Bin(k, nc ).
1
ln λ
Then E[Xmax ] = (1 ± o(1)) 1+α
.
ln ln λ
Extremal situations: Occasionally, it is desirable to understand which situation gives the smallest or the largest deviations. For example, let X1 , . . . , Xn be
independent binary random variables with expectations E[Xi ] = pi . Then it could
P
be useful to know that X = ni=1 Xi deviates most (in some suitable sense) from
its expectation when all pi are 12 . Such statements can be made formal and can be
proven with the notions of majorization and Schur-convexity. We refer to [Sch00]
for a nice treatment of this topic. Such arguments have been used to analyze
estimation-of-distribution algorithms in [SW16].
Staying on one side of the expectation and Feige’s inequality: When it
suffices to know that with reasonable probability we stay (more or less) on one
side of the expectation, then the following results can be useful.
A very general bound is Feige’s inequality [Fei06], which has found applications
in the analysis of randomized search heuristics, among others, in [ST12, DL15,
CDEL16, LN17].
Lemma 64 (Feige’s inequality). Let X1 , . . . , Xn be independent non-negative ranP
dom variables with expectations µi := E[Xi ] satisfying µi ≤ 1. Let X = ni=1 Xi .
Then
δ
1
, δ+1
}.
Pr[X ≤ E[X] + δ] ≥ min{ 13
For binomial distributions, we have stronger guarantees. Besides bounds comparing the binomial distribution with its normal approximation [Slu77], the following specific bounds are known.
Lemma 65. Let n ∈ N, p ∈ [0, 1], and k = ⌊np⌋. Let X ∼ Bin(n, p).
(a) If
1
n
< p, then Pr[X ≥ E[X]] > 41 .
(b) If 0.29/n ≤ p < 1, then Pr[X > E[X]] ≥ 14 .
1
,
n
(c) If
1
n
≤p≤1−
(d) If
1
n
≤ p < 1, then Pr[X > E[X]] >
then Pr[X ≥ E[X]] ≥
50
1
2
−
√
1 √ np(1−p)
√
.
2 2
np(1−p)+1+1
q
n
.
2πk(n−k)
(e) If
1
n
≤ p < 1 − n1 , then Pr[X > E[X] + 1] ≥ 0.037.
Surprisingly, all these results are quite recent. Bound (a) from [GM14] appears
to be the first general result of this type at all.1 It was followed up by estimate (c)
from [PR16], which gives stronger estimates when np(1 − p) > 8. Result (d)
from [Doe17] is the only one to give a bound tending to 12 for both np and n(1 − p)
tending to infinity. Estimates (b) and (e) are also from [Doe17]. A lower bound
for the probability of exceeding the expectation by more than one, like (e), was
needed in the analysis of an evolutionary algorithm with self-adjusting mutation
rate (proof of Lemma 3 of the extended version of [DGWY17]).
10.1.7
Proofs of the Chernoff Bounds
As discussed in the previous subsection, all Chernoff bounds stated so far can
be derived from the strongest bounds of Theorem 55 or 58 via elementary estimates that have nothing to do with probability theory. We shall not detail these
estimates—the reader can find them all in the literature, e.g., in [Hoe63]. We shall,
however, sketch how to prove these two central inequalities (43) and (53). One reason for this is that we can then argue in Section 10.2.2 that these proofs (and thus
also all Chernoff bounds presented so far) in fact not only hold for independent
random variables, but also negatively correlated ones.
A second reason is that occasionally, it can be profitable to have this central
argument ready to prove Chernoff bounds for particular distributions, for which
the classic bounds are not applicable or do not give sufficient results. This has
been done, e.g., in [DFW11, OW11, OW12, DJWZ13, LW14, Wit14, BLS14].
The central step in almost all proofs of Chernoff bounds, going back to Bernstein [Ber24], is the following one-line argument. Let h > 0. Then
Pr[X ≥ t] ≤ Pr[ehX ≥ eht ] ≤
n
Y
E[ehX ]
−ht
E[ehXi ].
=
e
eht
i=1
Here the first inequality simply stems from the fact that the function x 7→
ehx is monotonically increasing. The second inequality is Markov’s inequality
(Lemma 23) applied to the (non-negative) random variable ehX . The last equality
exploits the independence of the Xi , which carries over to the ehXi .
It now remains to estimate E[ehXi ] and choose h as to minimize the resulting
expression. We do this exemplarily for the case that all Xi take values in [0, 1] and
that E[X] < t < n. Since the exponential function is convex, E[ehXi ] is maximized
(which is the worst-case for your estimate) when Xi is concentrated on the values
For p ∈ [ n1 , 12 ], this result follows from the proof of Lemma 6.4 in [RT11]. The lemma itself
only states the bound Pr[X ≥ E[X]] ≤ min{p, 14 } for p ≤ 21 . The assumption p ≤ 12 appears to
be crucial for the proof.
1
51
0 and 1, that is, we have Pr[Xi = 1] = E[Xi ] and Pr[Xi = 0] = 1 − E[Xi ]. In
this case, E[ehXi ] = (1 − E[Xi ])e0 + E[Xi ]eh . By the inequality of arithmetic and
geometric means, we compute
n
Y
i=1
E[ehXi ] ≤
≤
≤
n
Y
(1 − E[Xi] + E[Xi ]eh )
i=1
n
1X
(1 − E[Xi ] + E[Xi ]eh )
n i=1
1
(n − E[X] + E[X]eh )
n
!n
!n
.
This gives the tail estimate Pr[X ≥ t] ≤ e−ht ( n1 (n − E[X] + E[X]eh ))n , which is
minimized by taking
!
(n − E[X])t
h = ln
,
(n − t)E[X]
which then gives the strongest multiplicative Chernoff bound (29) by rewriting
t = (1 + δ)E[X].
10.1.8
Chernoff Bounds with Estimates for the Expectation
Often we do not know the precise value of the expectation or it is tedious to compute it. In such cases, we can exploit the fact that all Chernoff bounds discussed
in this work are valid also when the expectation is replaced by an upper or lower
bound for it. This is obvious for many bounds, e.g., from equations (41), (42),
and (40) we immediately derive the estimates
2λ2
Pr[X ≥ µ + λ] ≤ Pr[X ≥ µ + λ] ≤ exp −
,
n
!
2
2λ
Pr[X ≤ µ− − λ] ≤ Pr[X ≤ µ − λ] ≤ exp −
,
n
!
δ2µ
−
≤ exp
Pr[X ≤ (1 − δ)µ ] ≤ Pr[X ≤ (1 − δ)µ] ≤ exp −
2
!
+
δ 2 µ−
−
2
!
for all µ+ ≥ E[X] =: µ and µ− ≤ E[X].
This is less obvious for a bound like Pr[X ≥ (1 + δ)µ+ ] ≤ exp(− 31 δ 2 µ+ ), since
now also the probability of the tail event decreases for increasing µ+ . However,
also for such bounds we can replace E[X] by an estimate as the following argument
shows.
52
Theorem 66. (a) Upper tail: Let X1 , . . . , Xn be independent random variables
P
taking values in [0, 1]. Let X = ni=1 Xi . Let µ+ ≥ E[X]. Then for all
δ ≥ 0,
+
Pr[X ≥ (1 + δ)µ ] ≤
1
1+δ
!(1+δ)µ+
n − µ+
n − (1 + δ)µ+
+
!n−(1+δ)µ+
+
,
(64)
+
and as ( µn )n for δ = n−µ
.
where this bound is read as 0 for δ > n−µ
µ+
µ+
Consequently, all Chernoff bounds of Theorem 47 (including equations (35)
and (36) and Corollary 50) as well as those of Theorem 56 are valid when all
occurrences of E[X] are replaced by µ+ . The additive bounds (41) and (43)
as well as those of Theorem 58 and 60 are trivially valid with the expectation
replaced by an upper bound for it.
(b) Lower tail: All Chernoff bounds of Theorem 51 and 57, the ones in equations (42) and (44), as well as those of Corollary 59 are valid when all
occurrences of E[X] are replaced by µ− ≤ E[X].
Proof. We first show (64). There is nothing to do when (1 + δ)µ+ > n, so let
+ −E[X]
us assume (1 + δ)µ+ ≤ n. Let γ = µn−E[X]
. For all i ∈ [1..n], define Yi by
Yi = Xi + γ(1 − Xi ). Since γ ≤ 1, Yi ≤ 1. By definition, Yi ≥ Xi , and thus also
P
Y ≥ X for Y := ni=1 Yi . Also, µ+ = E[Y ]. Hence
Pr[X ≥ (1 + δ)µ+ ] ≤ Pr[Y ≥ (1 + δ)µ+ ] = Pr[Y ≥ (1 + δ)E[Y ]].
Now (64) follows immediately from Theorem 47, equation (29). Since (64) implies
all other Chernoff bounds of Theorem 47 (including equations (35) and (36) and
Corollary 50) via elementary estimates, all these bounds are valid with E[X] replaced by µ+ as well. This extends to Theorem 56, since it is just a reformulation
of Theorem 47. For the remaining (additive) bounds, replacing E[X] by an upper bound only decreases the probability of the tail event, so clearly these remain
valid.
To prove our claim on lower tail bounds, it suffices to note that all bounds in
Theorem 51 are monotonically decreasing in E[X]. So replacing E[X] by some
µ− < E[X] makes the tail event less likely and increases the probability in the
statement. Similarly, the additive bounds are not affected when replacing E[X]
with µ− .
We note without proof that the variance of the random variable Y constructed
above is at most the one of X. Since the tail bound in Theorem 58 is increasing in σ 2 , the same argument as above also shows that multiplicative versions of
Theorem 58 such as equation (57) remain valid when all occurrences of E[X] are
replaced by an upper bound µ+ ≥ E[X].
53
10.2
Chernoff Bounds for Sums of Dependent Random
Variables
In the previous subsection, we discussed large deviation bounds for the classic
setting of sums of independent random variables. In the analysis of algorithms,
often we cannot fully satisfy the assumption of independence. The dependencies
may appear minor, maybe even in our favor in some sense, so we could hope for
some good large deviations bounds.
In this section, we discuss three such situations which all lead to (essentially)
the known Chernoff bounds being applicable despite perfect independence missing.
The first of these was already discussed in Section 8.3, so we just note here how it
also implies the usual Chernoff bounds.
10.2.1
Unconditional Sequential Domination
In the analysis of sequential random processes such as iterative randomized algorithms, we rarely encounter that the events in different iterations are independent,
simply because the actions of our algorithm depend on the results of the previous
iterations. However, due to the independent randomness used, we can often say
that, independent of what happened in iterations 1, . . . , t − 1, in iteration t we
have a particular event with at least some probability p.
This property was made precise in the definition of unconditional sequential
domination before Lemma 38. This lemma then showed that unconditional sequential domination can lead to domination between the sums of the random
variables. This, however, immediately yields that tail bounds for the one set take
over to the other. We make this elementary insight precise in the following lemma.
This type of argument was used, among others, in works on shortest path problems [DHK11, DHK12]. Here one can show that, in each iteration, independent
of the past, with at least a certain probability an extra edge of a desired path is
found.
Lemma 67. Let (X1 , . . . , Xn ) and (X1∗ , . . . , Xn∗ ) be finite sequences of discrete
random variables. Assume that X1∗ , . . . , Xn∗ are independent.
(a) If (X1∗ , . . . , Xn∗ ) unconditionally sequentially dominates (X1 , . . . , Xn ), then
P
P
for all λ ∈ R, we have Pr[ ni=1 Xi ≥ λ] ≤ Pr[ ni=1 Xi∗ ≥ λ] and the latter expression can be bounded by Chernoff bounds for the upper tail of independent
random variables.
(b) If (X1∗ , . . . , Xn∗ ) unconditionally sequentially subdominates (X1 , . . . , Xn ),
P
P
then for all λ ∈ R, we have Pr[ ni=1 Xi ≤ λ] ≤ Pr[ ni=1 Xi∗ ≤ λ] and
the latter expression can be bounded by Chernoff bounds for the lower tail of
independent random variables.
54
10.2.2
Negative Correlation
Occasionally, we encounter random variables that are not independent, but that
display an intuitively even better negative correlation behavior. Take as example
the situation that we do not flip bits independently with probability nk , but that
we flip a set of exactly k bits chosen uniformly at random among all sets of k out
of n bits. Let X1 , . . . , Xn be the indicator random variables for the events that
bit 1, . . . , n flips. Clearly, the Xi are not independent. If X1 = 1, then Pr[X2 =
k−1
1] = n−1
, which is different from the unconditional probability nk . However, things
feel even better than independent: Knowing that X1 = 1 actually reduces the
probability that X2 = 1. This intuition is made precise in the following notion of
negative correlation.
Let X1 , . . . , Xn binary random variables. We say that X1 , . . . , Xn are
1-negatively correlated if for all I ⊆ [1..n] we have
Pr[∀i ∈ I : Xi = 1] ≤
Y
Pr[Xi = 1].
i∈I
We say that X1 , . . . , Xn are 0-negatively correlated if for all I ⊆ [1..n] we have
Pr[∀i ∈ I : Xi = 0] ≤
Y
Pr[Xi = 0].
i∈I
Finally, we call X1 , . . . , Xn negatively correlated if they are both 0-negatively correlated and 1-negatively correlated.
In simple words, these conditions require that the event that a set of variables
is all zero or all one, is at most as likely as in the case of independent random
variables. It seems natural that sums of such random variables are at least as
strongly concentrated as independent random variable, and in fact, Panconesi and
Srinivasan [PS97] were able to prove that negatively correlated random variables
admit Chernoff bounds. To be precise, they only proved that 1-negative correlation implies Chernoff bounds for the upper tail, but it is not too difficult to show
(see below) that the main argument works for all bounds proven via Bernstein’s
exponential moments method. In particular, for sums of 1-negatively correlated
random variable we obtain all Chernoff bounds for the upper tail that were presented in this work for independent random variables (as far as they can be applied
to binary random variables). We prove a slightly more general result as this helps
arguing that we can also work with upper bounds for the expectation instead of the
precise expectation. Further below, we then use a symmetry argument to argue
that 0-negative correlation implies all lower tail bounds presented so far.
Theorem 68 (1-negative correlation implies upper tail bounds). Let X1 , . . . , Xn
be 1-negatively correlated binary random variables. Let a1 , . . . , an , b1 , . . . , bn ∈ R
with ai ≤ bi for all i ∈ [1..n]. Let Y1 , . . . , Yn be random variables with Pr[Yi =
P
ai ] = Pr[Xi = 0] and Pr[Yi = bi ] = Pr[Xi = 1]. Let Y = ni=1 Yi .
55
(a) If a1 , . . . , an , b1 , . . . , bn ∈ [0, 1], then Y satisfies the Chernoff bounds given
in equations (29) to (33), (35) to (37), (41), (45) to (49), and (53) to (58),
P
where in the latter we use σ 2 := ni=1 Var[Yi ].
(b) Without the restriction to [0, 1] made in the previous paragraph, Y satisfies
the Chernoff bound of (43) with ci := bi − ai and the bounds of (59) to (62)
P
with σ 2 := ni=1 Var[Yi].
All these results also hold when E[Y ] is replaced by some µ+ ≥ E[Y ].
Proof. Let X1′ , . . . , Xn′ be independent binary random variables such that for all
i ∈ [1..n], the random variables Xi and Xi′ are identically distributed. Let ci :=
bi −ai for all i ∈ [1..n]. Note that Yi = ai +ci Xi for all i ∈ [1..n]. Let Yi′ = ai +ci Xi′ .
P
Let Y ′ = ni=1 Yi′ .
We first show that the 1-negative correlation of the Xi implies E[Y ℓ ] ≤ E[(Y ′ )ℓ ]
for all ℓ ∈ N0 . There is nothing to show for ℓ = 0 and
ℓ = 1, so let ℓ ≥ 2. Since
Pn
Pn
Pℓ
P
ℓ Pn
ℓ
Y = ( i=1 ai ) + ( i=1 ci Xi ), we have Y = k=0 k ( i=1 ai )ℓ−k ( ni=1 ci Xi )k . By
P
P
linearity of expectation, it suffices to show E[( ni=1 ci Xi )k ] ≤ E[( ni=1 ci Xi′ )k ].
P
P
Q
We have ( ni=1 ci Xi )k = (i1 ,...,ik )∈[1..n]k kj=1 cij Xij . Applying the definition of
1-negative correlation to the set I = {i1 , . . . , ik }, we compute
E
"
k
Y
j=1
#
cij Xij =
k
Y
j=1
≤
=
k
Y
!
cij Pr[∀j ∈ [1..k] : Xij = 1]
cij
j=1
k
Y
cij
j=1
!
!
Y
!
Pr[Xi = 1]
i∈I
Y
!
Pr[Xi′ = 1] = E
i∈I
"
k
Y
#
cij Xi′j .
j=1
Consequently, by linearity of expectation, E[( ni=1 ci Xi )k ] ≤ E[( ni=1 ci Xi′ )k ] for
all k ∈ N and thus E[Y ℓ ] ≤ E[(Y ′ )ℓ ].
We recall from Section 10.1.7 that essentially all large deviation bounds were
proven via upper bounds on the exponential moment E[ehY ]. Since the random
variable Y is bounded, by Fubini’s theorem we have
P
hY
E[e
∞
X
∞
X
hℓ Y ℓ
hℓ E[Y ℓ ]
]=E
=
.
ℓ!
ℓ=0 ℓ!
ℓ=0
"
#
′
P
(65)
Since E[Y ℓ ] ≤ E[(Y ′ )ℓ ], we have E[ehY ] ≤ E[ehY ]. Consequently, we obtain for Y
all Chernoff bounds which we could prove with the classic methods for Y ′ .
It remains to show that we can also work with an upper bound µ+ ≥ E[Y ].
For this, note that when we apply the construction of Theorem 66 to our random
56
variables Yi, that is, we define Zi = Yi + γ(1 − Yi ) for a suitable γ ∈ [0, 1], then the
resulting random variables Zi satisfy the same properties as the Yi, that is, there
are a′i and c′i such that Zi = a′i + c′i Xi . Consequently, we have Pr[Y ≥ (1 + δ)µ+ ] ≤
P
Pr[Z ≥ (1 + δ)µ+ ] = Pr[Z ≥ (1 + δ)E[Z]] for the sum Z = ni=1 Zi and the last
expression can bounded via the results we just proved.
Theorem 69 (0-negative correlation implies lower tail bounds). Let X1 , . . . , Xn
be 0-negatively correlated binary random variables. Let a1 , . . . , an , b1 , . . . , bn ∈ R
with ai ≤ bi for all i ∈ [1..n]. Let Y1 , . . . , Yn be random variables with Pr[Yi =
P
ai ] = Pr[Xi = 0] and Pr[Yi = bi ] = Pr[Xi = 1]. Let Y = ni=1 Yi .
(a) If a1 , . . . , an , b1 , . . . , bn ∈ [0, 1], then Y satisfies the Chernoff bounds given
in equations (38) to (40), (42), (50) to (52), and those in Corollary 59 with
P
σ 2 := ni=1 Var[Yi].
(b) Without the restriction to [0, 1] made in the previous paragraph, Y satisfies
the Chernoff bound of (44) with ci := bi − ai and those of the last paragraph
P
of Theorem 60 with σ 2 := ni=1 Var[Yi].
All these results also hold when E[Y ] is replaced by some µ− ≤ E[Y ].
Proof. Let Ỹi := 1 − Yi . Then the Ỹi satisfy the assumptions of Theorem 68 (with
ãi = 1 − bi , b̃i = 1 − ai , and X̃i = 1 − Xi ; note that the latter are 1-negatively
correlated since the Xi are 0-negatively correlated, note further that ãi , b̃i ∈ [0, 1] if
ai , bi ∈ [0, 1]). Hence Theorem 68 gives the usual Chernoff bounds for the Ỹi. As in
Section 10.1.2, these translate into the estimates (38) to (40) and these imply (50)
to (52). Bound (41) for the Ỹi immediately translates to (42) for the Yi . Finally, the
results of Theorem 58 imply those of Corollary 59. All these results are obviously
weaker when E[Y ] is replaced by some µ− ≤ E[Y ].
10.2.3
Hypergeometric Distribution
It remains to point out some situations where we encounter negatively correlated
random variables. One typical situations (but by far not the only one) is sampling
without replacement, which leads to the hypergeometric distribution.
Say we choose randomly n elements from a given N-element set S without
replacement. For a given m-element subset T of S, we wonder how many of
its elements we have chosen. This random variable is called hypergeometrically
distributed with parameters N, n and m.
More formally, let S be any N-element set. Let T ⊆ S have exactly m elements. Let U be a subset of S chosen uniformly among all n-element subsets of
57
S. Then X = |U ∩ T | is a random variable with hypergeometric distribution (with
parameters N, n and m). By definition,
Pr[X = k] =
m
k
N −m
n−k
N
n
for all k ∈ [max{0, n + m − N}.. min{n, m}].
||T |
It is easy to see that E[X] = |U|S|
= mn
: Enumerate T = {t1 , . . . , tm } in an
N
arbitrary manner (before choosing U). For i = 1, . . . , m, let Xi be the indicator
|
= Nn . Since
random variable for the event ti ∈ U. Clearly, Pr[Xi = 1] = |U
|S|
Pm
X = i=1 Xi , we have E[X] = mn
by linearity of expectation (Lemma 20).
N
It is also obvious that the Xi are not independent. If n < m and X1 = . . . =
Xn = 1, then necessarily we have Xi = 0 for i > n. Fortunately, however, these
dependencies are of the negative correlation type. This is intuitively clear, but
also straight-forward to prove.
Let I ⊆ [1..m], W = {ti | i ∈ I}, and w = |W | = |I|. Then Pr[∀i ∈ I : Xi =
1] = Pr[W ⊆ U]. Since U is uniformly
chosen, it suffices to count the number of
|S\W |
U that contain W , these are |U \W | , and to compare them with the total number
of possible U. Hence
N −w
Pr[W ⊆ U] =
n−w
!
N
n
!
n
n · . . . · (n − w + 1)
<
=
N · . . . · (N − w + 1)
N
w
=
Y
Pr[Xi = 1].
i∈I
In a similar fashion, we have
Pr[∀i ∈ I : Xi = 0] = Pr[U ∩ W = ∅]
!
!
N
N −w
=
n
n
(N − n) . . . (N − n − w + 1)
=
N . . . (N − w + 1)
N −n w Y
≤
=
Pr[Xi = 0],
N
i∈I
where we read N −w
= 0 when n < N − w.
n
Together with Theorems 68 and 69, we obtain the following theorem.
Theorem 70. Let N ∈ N. Let S be some set of cardinality N, for convenience,
S = [1..N]. Let n ≤ N and let U be a subset of S having cardinality n uniformly
chosen among all such subsets. For i ∈ [1..N] let Xi be the indicator random
variable for the event i ∈ U. Then X1 , . . . , XN are negatively correlated.
58
Consequently, if X is a random variable having a hypergeometric distribution
with parameters N, n, and m, then the usual Chernoff bounds for sums of n
independent binary random variables (listed in Theorems 68 and 69) hold.
Note that for hypergeometric distributions we have symmetry in n and m, that
is, the hypergeometric distribution with parameters N, n, and m is the same as
the hypergeometric distribution with parameters N, m, and n. Hence for Chernoff
bounds depending on the number of random variables, e.g., Theorem 53, we can
make this number being min{n, m} by interpreting the random experiment in the
right fashion.
That the hypergeometric distribution satisfies the Chernoff bounds of Theorem 53 has recently in some works been attributed to Chvátal [Chv79], but this is
not correct. As Chvátal writes, the aim of his note is solely to give an elementary
proof of the fact that the hypergeometric distribution satisfies the strongest Chernoff bound of Theorem 47 (which implies the bounds of Theorem 53), whereas the
result itself is from Hoeffding [Hoe63].
For a hypergeometric random variable X with parameters N, n, and m,
N
and z ≥ n2 , then Pr[X = z] ≤ ( 2em
)z . With
[BLS14] show that if m < 2e
N
Theorem 70, we can use the usual Chernoff bound of equation (46) and obtain the
stronger bound
z−E[X]
Pr[X ≥ z] ≤ e
E[X]
z
!z
≤
eE[X]
z
!z
enm
=
zN
z
,
(66)
)z for z ≥ n/2.
which is at most ( 2em
N
Theorem 70 can be extended to point-wise maxima of several families like (Xi )
in Theorem 70 if these are independent. This result was used in the analysis of a
population-based genetic algorithm in [DD17], but might be useful also in other
areas of discrete algorithmics.
Lemma 71. Let k, N ∈ N. For all j ∈ [1..k], let nj ∈ [1..N]. Let S be some
set of cardinality N, for convenience, S = [1..N]. For all j ∈ [1..k], let Uj be a
subset of S having cardinality nj uniformly chosen among all such subsets. Let
the Uj be stochastically independent. For all i ∈ S, let Xi be the indicator random
variable for the event that i ∈ Uj for some j ∈ [1..k]. Then the random variables
X1 , . . . , XN are negatively correlated.
Note that the situation in the lemma above can be seen as sampling with partial
P
replacement. We sample a total of j nj elements, but we replace the elements
chosen only after round n1 , n1 + n2 , ... We expect that other partial replacement
scenarios also lead to negatively correlated random variables, and thus to the usual
Chernoff bounds.
59
We remark that negative correlation can be useful also without Chernoff
bounds. For example, in Section 9 we used the lemma above to prove a lower
bound on the coupon collector time (equivalently, on the runtime of the randomized local search heuristic on monotonic fuctions).
10.3
Chernoff Bounds for Functions of Independent Variables, Martingales, and Bounds for Maxima
So far we discussed tail bounds for random variables which can be written as sum
of (more or less) independent random variables. Sometimes, the random variable
we are interested in is determined by the outcomes of many independent random
variables, however, not simply as a sum of these. Nevertheless, if each of the
independent random variables only has a limited influence on the outcome, then
bounds similar to those of Theorem 55 can be proven. Such bounds can be found
under the names Azuma’s inequality, Martingale inequalities, or method of bounded
differences.
We shall try to avoid the use of martingales, which need some deeper understanding of probability theory, and first present two bounds due to McDiarmid [McD98] that need martingales in their proof, but not in their statement.
Theorem 72 (Method of bounded differences). Let X1 , . . . , Xn be independent
random variables taking values in the sets Ω1 , . . . , Ωn , respectively. Let Ω := Ω1 ×
. . . × Ωn . Let f : Ω → R. For all i ∈ [1..n] let ci > 0 be such that for all ω, ω̄ ∈ Ω
we have that if for all j 6= i, ωj = ω̄j , then |f (ω) − f (ω̄)| ≤ ci .
Let X = f (X1 , . . . , Xn ). Then for all λ ≥ 0,
Pr[X ≥ E[X] + λ] ≤ exp
Pr[X ≤ E[X] − λ] ≤ exp
2λ2
− Pn
!
2
i=1 ci
!
2
2λ
− Pn
2
i=1 ci
,
.
The version of Azuma’s inequality given above is due to McDiarmid [McD98]
P
and is stronger than the bound exp(−λ2 /2 ni=1 c2i ) given by several other authors.
Theorem 72 found numerous applications in discrete mathematics and computer science, however, only few in the analysis of randomized search heuristics
(the only one we are aware of is [BD17]). All other analyses of randomized search
heuristics that needed Chernoff-type bounds for random variables that are determined by independent random variables, but in a way other than as simple sum,
resorted to the use of martingales.
One reason for this might be that the bounded differences assumption is easily proven in discrete mathematics problems like the analysis of random graphs,
60
whereas in algorithms the sequential nature of the use of randomness may make
it hard to argue that a particular random variable sampled now has a bounded
influence on the final result regardless of how we condition on all future random
variables. A more natural condition might be that the outcome of the current
random variable has only a limited influence on the expected result determined by
the future random variables. For this reason, we are optimistic that the following
result might become useful in the analysis of randomized search heuristics. This
result is a weak version of Theorem 3.7 in [McD98].
Theorem 73 (Method of bounded conditional expectations). Let X1 , . . . , Xn be
independent random variables taking values in the sets Ω1 , . . . , Ωn , respectively.
Let Ω := Ω1 × . . . × Ωn . Let f : Ω → R. For all i ∈ [1..n] let ci > 0 be such that
for all ω1 ∈ Ω1 , . . . , ωi−1 ∈ Ωi−1 and all ωi , ω̄i ∈ Ωi we have
|E[f (ω1 , . . . , ωi−1 , ωi , Xi+1 , . . . , Xn )] − E[f (ω1 , . . . , ωi−1, ω̄i , Xi+1 , . . . , Xn )]| ≤ ci .
Let X = f (X1 , . . . , Xn ). Then for all λ ≥ 0,
Pr[X ≥ E[X] + λ] ≤ exp
Pr[X ≤ E[X] − λ] ≤ exp
λ2
!
− Pn 2 ,
2 i=1 ci
!
λ2
− Pn 2 .
2 i=1 ci
Here is an example of how the new theorem can be helpful. The compact
genetic algorithms (cGA) maximizes a function f : {0, 1}n → R as follows. There
is a (hypothetical) population size K ∈ N, which we assume to be an even integer.
The cGA sets the initial frequency vector τ (0) ∈ [0, 1]n to τ (0) = ( 21 , . . . , 12 ). Then,
in each iteration t = 1, 2, . . . it generates two search points x(t,1) , x(t,2) ∈ {0, 1}n
randomly such that, independently for all j ∈ {1, 2} and i ∈ [1..n], we have
(t,j)
(t)
Pr[xi = 1] = τi . If f (x(t,1) ) < f (x(t,2) ), then we swap the two variables, that
is, we set (x(t,1) , x(t,2) ) ← (x(t,2) , x(t,1) ). Finally, in this iteration, we update the
frequency vector by setting τ (t+1) ← τ (t) + K1 (x(t,1) − x(t,2) ).
(t)
Let us analyze the behavior of the frequency τi of a neutral bit i ∈ [1..n], that
(t)
is, one that has no influence on the fitness. To ease reading, let Xt := τi . We
have X0 = 12 with probability one. Once Xt is determined, we have
Pr[Xt+1 = Xt + K1 ] = Xt (1 − Xt ),
Pr[Xt+1 = Xt − K1 ] = Xt (1 − Xt ),
Pr[Xt+1 = Xt ] = 1 − 2Xt (1 − Xt ).
In particular, we have E[Xt+1 | X0 , . . . , Xt ] = E[Xt+1 | Xt ] = Xt . By induction,
we have E[XT | Xt ] = Xt for all T > t.
61
2
K
, XT has
Our aim is to show that with probability at least 1 − 2 exp − 32T
not yet converged to one of the absorbing states 0 and 1. We first write the
frequencies as results of independent random variables. For convenience, these
will be continuous random variables, but it is easy to see that instead we could
have used discrete ones as well. For all t = 1, 2, . . . let Rt be a random number
uniformly distributed in the interval [0, 1]. Define Y0 , Y1 , . . . as follows. We have
Y0 = 12 with probability one. For t ∈ N0 , we set
Pr[Yt+1 = Yt + K1 ] if Rt ≥ 1 − Yt (1 − Yt ),
Pr[Yt+1 = Yt − K1 ] if Rt ≤ Yt (1 − Yt ),
Pr[Xt+1 = Xt ] else.
It is easy to see that (X0 , X1 , . . . ) and (Y0 , Y1, . . . ) are identically distributed.
Note that YT is a function g of (R1 , . . . , RT ). For concrete values r1 , . . . , rt ∈
[0, 1], we have E[g(r1, . . . , rt , Rt+1 , . . . , RT )] = E[YT | Yt ] = Yt . Consequently,
for all r t ∈ [0, 1], the two expectations E[g(r1, . . . , rt−1 , rt , Rt+1 , . . . , RT )] and
E[g(r1, . . . , rt−1 , rt , Rt+1 , . . . , RT )] are two possible outcomes of Yt given a common value for Yt−1 (which is determined by r1 , . . . , rt−1 ), and hence differ by at
most ct = K2 . We can thus apply Theorem 73 as follows.
h
Pr[YT ∈ {0, 1}] = Pr |YT − 12 | ≥
h
1
2
i
= Pr |g(R1 , . . . , RT ) − E[g(R1, . . . , RT )]| ≥
( 1 )2
≤ 2 exp − 2 2 2
2T ( K )
!
K2
= 2 exp −
32T
!
1
2
i
.
Note that it is not obvious how to obtain this result with the classic method
of bounded differences (Theorem 72). In particular, the above construction does
not satisfy the bounded differences condition, that is, there are values r1 , . . . , rT
and rt such that g(r1 , . . . , rT ) and g(r1 , . . . , rt−1 , r t , rt+1 , . . . , rT ) differ by significantly more than K2 . For this reason, we are optimistic that Theorem 73 will find
applications in the theory of randomized search heuristics.
Both Theorem 72 and 73 are special cases of the following martingale result,
which is often attributed to Azuma [Azu67] despite the fact that it was proposed
already in Hoeffding [Hoe63].
Theorem 74 (Azuma-Hoeffding inequality). Let X0 , X1 , . . . , Xn be a martingale.
Let c1 , . . . , cn > 0 with |Xi − Xi−1 | ≤ ci for all i ∈ [1..n]. Then for any λ ≥ 0,
Pr[Xn − X0 ≥ λ] ≤ exp
62
λ2
!
− Pn 2 .
2 i=1 ci
This result has found several applications in the theory of randomized search
heuristics, e.g., in [DK15, Köt16, DDY16b].
We note that the theorem above is a direct extension of Theorem 55 to Martingales. In a similar vein, there are Martingale versions of most other Chernoff
bounds presented in this work. We refer to McDiarmid [McD98] for more details.
Tail bounds for maxima and minima of partial sums: We end this section
with a gem already contained in Hoeffding. It builds on the following elementary
observation: If X0 , X1 , . . . , Xn is a martingale, then Y0 , Y1 , . . . , Yn defined as follows
also forms a martingale. Let λ ∈ R. Let i ∈ [0..n] minimal with Xi ≥ λ, if such
an Xi exists, and i = n + 1 otherwise. Let Yj = Xj for j ≤ i and Yj = Xi
for j > i. Then Yn ≥ λ if and only if maxi∈[1..n] Xi ≥ λ. Since Y0 , . . . , Yn is a
martingale with martingales differences bounded as least as well as for X0 , . . . , Xn
(and also all other variation measures at least as good as for X0 , . . . , Xn ), all large
deviation bounds provable for the martingale X0 , . . . , Xn via the Bernstein method
are valid also for Y0 , . . . , Yn , that is, for maxi∈[1..n] Xi . Since we did not introduce
martingales here, we omit the details and only state some implications of this
observation. The reader finds more details in [Hoe63, end of Section 2] and [McD98,
end of Section 3.5]. It seems that both authors do not see this extension as very
important (see also the comment at the end of Section 2 in [McD98]). We feel that
this might be different for randomized search heuristics. For example, to prove
that a randomized search heuristic has at least some optimization time T , we need
to show that the distance of each of the first T − 1 solutions from the optimum is
positive, that is, that the minimum of these differences is positive.
Theorem 75 (Tail bounds for maxima and minima). Let X1 , . . . , Xn be indepenP
dent random variables. For all i ∈ [1..n], let Si = ij=1 Xi . Assume that one of
the results in Section 10.1 yields the tail bound Pr[Sn ≥ E[Sn ] + λ] ≤ p. Then we
also have
Pr[∃i ∈ [1..n] : Si ≥ E[Si ] + λ] ≤ p.
(67)
In an analogous manner, each tail bound Pr[Sn ≤ E[Sn ] − λ] ≤ p derivable from
Section 10.1 can be strengthened to Pr[∃i ∈ [1..n] : Si ≤ E[Si ] − λ] ≤ p.
Note that if the Xi in the theorem are non-negative, then trivially equation (67)
implies the uniform bound
Pr[∃i ∈ [1..n] : Si ≥ E[Sn ] + λ] ≤ p.
(68)
Note also that the deviation parameter λ does not scale with i. In particular, a
bound like Pr[∃i ∈ [1..n] : Si ≥ (1 + δ)E[Si ]] ≤ p cannot be derived.
63
10.4
Chernoff Bounds for Geometric Random Variables
As visible from Lemma 80 below, sums of independent geometric random variables
occur frequently in the analysis of randomized search heuristics. Surprisingly, it
was only in 2007 that a Chernoff-type bound was used to analyze such sums
in the theory of randomized search heuristics [DHK07] (for subsequent uses see,
e.g., [BBD+ 09, DHK11, ZLLH12, DJWZ13, DD17]). Even more surprisingly, only
recently Witt [Wit14] proved good tail bounds for sums of geometric random
variables having significantly different success probabilities. Note that geometric
random variables are unbounded. Hence the Chernoff bounds presented so far
cannot be applied directly.
We start this subsection with simple Chernoff bounds for sums of identically
distributed geometric random variables as these can be derived from Chernoff
bounds for sums of independent 0, 1 random variables discussed so far. We remark
that a sum X of n independent geometric distributions with success probability
p > 0 is closely related to the negative binomial distribution NB(n, 1 − p) with
parameters n and 1 − p: We have X ∼ NB(n, 1 − p) + n.
Theorem 76. Let X1 , . . . , Xn be independent geometric random variables with
P
common success probability p > 0. Let X := ni=1 Xi and µ := E[X] = np .
(a) For all δ ≥ 0,
δ2 n − 1
Pr[X ≥ (1 + δ)µ] ≤ exp −
2 1+δ
!
1
≤ exp − min{δ 2 , δ}(n − 1) .
4
(69)
(b) For all 0 ≤ δ ≤ 1,
(1 − δ)(µ − n)
Pr[X ≤ (1 − δ)µ] ≤ (1 − δ)
(1 − δ)µ − n
≤ (1 − δ)n exp(δn)
n
2
≤ exp −
!(1−δ)µ−n
!
δ n
,
2 − 43 δ
(70)
(71)
(72)
where the first bound reads as pn for (1 − δ)µ = n and as 0 for (1 − δ)µ < n.
For 0 ≤ δ < 1, we also have
2δ 2 pn
,
Pr[X ≤ (1 − δ)µ] ≤ exp −
(1 − δ)
!
2p3 λ2
Pr[X ≤ µ − λ] ≤ exp −
.
n
!
64
(73)
(74)
Bounds (73) and (74) are interesting only for relatively large values of p. Since
part (a) has been proven in [BBD+ 09], we only prove (b). The main idea in both
cases is exploiting the natural relation between a sum of independent identically
distributed geometric random variables and a sequence of Bernoulli events.
Proof. Let Z1 , Z2 , . . . be independent binary random variables with Pr[Zi = 1] = p
P
for all i ∈ N. Let n < K ≤ np . Let YK = K
i=1 Zi . Then X ≤ K if and only if
YK ≥ n. Consequently, by Theorem 47,
Pr[X ≤ K] = Pr[YK ≥ n]
"
n
= Pr YK ≥ 1 +
−1
Kp
!!
#
E[YK ]
Kp n K − Kp K−n
n
K−n
Kp n
exp(n − Kp)
≤
n
!
pλ2
≤ exp
,
2K + 32 λ
≤
where we used the shorthand λ := µ − K for the absolute deviation. From Theorem 53, we derive
Pr[X ≤ K] = Pr[YK ≥ n]
= Pr[YK ≥ E[YK ] + (n − Kp)]
2(n − Kp)2
≤ exp −
K
!
!
2p2 λ2
2p2 λ2
≤ exp −
.
= exp −
µ−λ
µ
!
Replacing K by (1 − δ)µ and λ by δµ in these equations gives the claim.
When the geometric random variables have different success probabilities, the
following bounds can be employed.
Theorem 77. Let X1 , . . . , Xn be independent geometric random variables with
success probabilities p1 , . . . , pn > 0. Let pmin := min{pi | i ∈ [1..n]}. Let X :=
Pn
Pn 1
i=1 Xi and µ = E[X] =
i=1 pi .
65
(a) For all δ ≥ 0,
1
(1 − pmin)µ(δ−ln(1+δ))
1+δ
≤ exp(−pmin µ(δ − ln(1 + δ)))
Pr[X ≥ (1 + δ)µ] ≤
!n
δµpmin
exp(−δµpmin )
n
!
(δµpmin)2
.
≤ exp −
2n(1 + δµpnmin )
≤ 1+
(75)
(76)
(77)
(78)
(b) For all 0 ≤ δ ≤ 1,
Pr[X ≤ (1 − δ)µ] ≤ (1 − δ)pminµ exp(−δpmin µ)
(79)
≤ exp −
!
(80)
≤ exp(− 12 δ 2 µpmin ).
(81)
δ 2 µpmin
2 − 34 δ
Estimates (75) and (76) are from [Jan17], bound (77) is from [Sch00], and (78)
follows from the previous by standard estimates. Consequently, these bounds
are not only more general, but also stronger than our elementary bound (69) for
identically distributed geometric random variables.
For the lower tail bounds, (79) from [Jan17] is identical to (71) for identically distributed variables. Hence (70) is the strongest estimate for identically
distributed geometric random variables. Equation (79) gives (80) via the same
estimate that gives (72) from (71). Estimate (81) appeared already in [Sch00].
Overall, it remains surprising that such useful bounds were proven only relatively late and have not yet appeared in a scientific journal.
The bounds of Theorem 77 allow the geometric random variables to have different success probabilities, however, the tail probability depends only on the smallest
of them. This is partially justified by the fact that the corresponding geometric
random variable has the largest variance, and thus might be most detrimental to
the desired strong concentration. If the success probabilities vary significantly,
however, then this approach gives overly pessimistic tail bounds. Witt [Wit14]
proves the following result, which can lead to stronger estimates.
Theorem 78. Let X1 , . . . , Xn be independent geometric random variables with
P
P
success probabilities p1 , . . . , pn > 0. Let X = ni=1 Xi , s = ni=1 ( p1i )2 , and pmin :=
66
min{pi | i ∈ [1..n]}. Then for all λ ≥ 0,
λ2
1
, λpmin
Pr[X ≥ E[X] + λ] ≤ exp − min
4
s
!
λ2
Pr[X ≤ E[X] − λ] ≤ exp −
.
2s
(
)!
,
(82)
(83)
In the analysis of randomized search heuristics, apparently we often encounter
sums of independent geometrically distributed random variables X1 , . . . , Xn with
success probabilities pi proportional to i. For this case, the following result
from [DD17] gives stronger tail bounds than the previous result. See Section 4.2
for the definition of the harmonic number Hn .
Theorem 79. Let X1 , . . . , Xn be independent geometric random variables with
success probabilities p1 , . . . , pn . Assume that there is a number C ≤ 1 such that
P
pi ≥ C ni for all i ∈ [1..n]. Let X = ni=1 Xi . Then
E[X] ≤
1
nHn
C
Pr[X ≥ (1 +
≤
1
n(1
C
+ ln n),
δ) C1 n ln n]
−δ
≤n
(84)
for all δ ≥ 0.
(85)
As announced in Section 8.2, we now present a few examples where the existing
literature only gives an upper bound for the expected runtime, but where a closer
look at the proofs easily gives more details about the distribution, which in particular allows to obtain tail bounds for the runtime. We note that similar results so
far have only been presented for the (1 + 1) EA optimizing the LeadingOnes test
function [DJWZ13] and for RLS optimizing the OneMax test function [Wit14].
Zhou et al. [ZLLH12] implicitly give several results of this type, however, the resulting runtime guarantees are not optimal due to the use of an inferior Chernoff
bound for geometric random variables.
Lemma 80. (a) The runtime T of the (1 + 1) EA on the OneMax function is
P
i
dominated by the independent sum ni=1 Geom( en
) [DJW02]. Hence E[T ] ≤
−δ
enHn and Pr[T ≥ (1 + δ)en ln n] ≤ n for all δ ≥ 0.
(b) For any function f : {0, 1}n → R, the runtime T of the (1 + 1) EA is
dominated by Geom(n−n ) [DJW02]. Hence E[T ] ≤ nn and Pr[T ≥ γnn ] ≤
n
(1 − n−n )γn ≤ e−γ for all γ ≥ 0.
(c) The runtime T of the (1 + 1) EA finding Eulerian
graphs using perfect matchings in the adjacency lists
ing the edge-based mutation operator is dominated by
Pm/3
i
Hence E[T ] ≤ 2emHm/3
i=1 Geom( 2em ) [DJ07].
δ)em ln m3 ] ≤ ( m3 )−δ for all δ ≥ 0.
67
cycles in undirected
as genotype and usthe independent sum
and Pr[T ≥ 2(1 +
(d) The runtime of the (1 + 1) EA sorting an array of length n by minimizing the number of inversions is dominated by the independent sum
P(n2 )
4e n
3i
H(n) ≤ 2e
n2 (1 + 2 ln n)
)
[STW04].
Hence
E[T
]
≤
Geom(
i=1
3 2
3
4e(n
2
2)
and Pr[T ≥ (1 + δ) 4e
n2 ln n] ≤
3
−δ
n
2
.
(e) The runtime of the multi-criteria (1 + 1) EA for the single-source shortest
path problem in a graph G can be described as follows. Let ℓ be such that
there is a shortest path from the source to any vertex having at most ℓ edges.
Then there are random variables Gij , i ∈ [1..ℓ], j ∈ [1..n − 1], such that
(i) Gij ∼ Geom( en12 ) for all i ∈ [1..ℓ] and j ∈ [1..n − 1], (ii) for all j ∈
[1..n−1] the variables G1j , . . . , Gℓj are independent, and (iii) T is dominated
P
by max{ ℓi=1 G
| j ∈ [1..n − 1]} [STW04, DHK11]. Consequently, for δ =
qij
4 ln(n−1)
4 ln(n−1)
1
} and T0 := (1 + δ) pℓ , we have E[T ] ≤ (1 + ln(n−1)
)T0
max{ ℓ−1 ,
ℓ−1
−ε
and Pr[T ≥ (1 + ε)T0 ] ≤ (n − 1) for all ε ≥ 0.
Proof. We shall not show the domination statements as these can be easily derived
from the original analyses cited in the theorem. Given the domination result,
parts (a), (c), and (d) follow immediately from Theorem 79. Part (b) follows
directly from the law of the geometric distribution.
To prove part (e), let X1 , . . . , Xℓ be independent geometrically distributed
Pℓ
random variables with parameter p = en1 2 . Let X =
Let δ =
i=1 Xi .
q
2
δ
max{ 4 ln(n−1)
, 4 ln(n−1)
}. Then, by (69), Pr[X ≥ (1 + δ)E[X]] ≤ exp(− 12 1+δ
(ℓ −
ℓ−1
ℓ−1
1 4 ln(n−1)
1
1
2
1)) ≤ exp(− 4 min{δ , δ}(ℓ − 1)) ≤ exp(− 4 ℓ−1 (ℓ − 1)) = n−1 . For all ε > 0,
again by (69), we compute
1 (δ + ε + δε)2
Pr[X ≥ (1 + ε)(1 + δ)E[X]] ≤ exp −
(ℓ − 1)
2 (1 + δ)(1 + ε)
!
1 δ 2 (1 + ε)2
(ℓ − 1)
≤ exp −
2 (1 + δ)(1 + ε)
!
!1+ε
1 δ2
≤ exp −
(ℓ − 1)
21+δ
≤ (n − 1)−(1+ε) .
Let Y1 , . . . , Yn−1 be random variables with distribution equal to the one of X. We
do not make any assumption on the correlation of the Yi , in particular, they do
not need to be independent. Let Y = max{Yi | i ∈ [1..n − 1]} and recall that
the runtime T is dominated by Y . Let T0 = (1 + δ)E[X] = (1 + δ) pℓ . Then
Pr[Y ≥ (1 + ε)T0 ] ≤ (n − 1) Pr[X ≥ (1 + ε)T0 ] ≤ (n − 1)−ε by the union bound
68
(Lemma 12). By Corollary 18,
!
1
T0 .
E[Y ] ≤ 1 +
ln(n − 1)
We note that not all classic proofs reveal details on the distribution. For
results obtained via random walk arguments, e.g., the optimization of the short
path function SPCn [JW01], monotone polynomials [WW05], or vertex covers on
paths-like graphs [OHY09], as well as for results proven via additive drift [HY01],
the proofs often give little information about the runtime distribution (an exception
is the analysis of the needle and the OneMax function in [GKS99]).
For results obtained via the average weight decrease method [NW07] or multiplicative drift analysis [DG13], the proof also does not give information on
the runtime distribution. However, the probabilistic runtime bound of type
Pr[T ≥ T0 + λ] ≤ (1 − δ)λ obtained from these methods implies that the runtime is dominated by T T0 − 1 + Geom(1 − δ).
10.5
Tail Bounds for the Binomial Distribution
For binomially distributed random variables, slightly stronger tail bounds exist.
The difference is small, but since they have been used in the analysis of randomized
search heuristics, we briefly describe them here.
In this section, let X always be a binomially distributed random variable with
P
parameters n and p, that is, X = ni=1 Xi with independent Xi satisfying Pr[Xi =
1] = p and Pr[Xi = 0] = 1 − p. The following estimate seems well-known (e.g., it
was used in [JJW05] without proof or reference). Gießen and Witt [GW17] give an
elementary proof via estimates of binomial coefficients and the binomial identity.
We find the proof below more intuitive.
Lemma 81. Let X ∼ Bin(n, p). Let k ∈ [0..n]. Then
!
n k
p .
Pr[X ≥ k] ≤
k
Proof. For all T ⊆ [1..n] with |T | = k let AT be the event that Xi = 1 for all
i ∈ T . Clearly, Pr[AT ] = pk . The event “X ≥ k” is the
union of the events AT
P
with T as above. Hence Pr[X ≥ k] ≤ T Pr[AT ] = nk pk by the union bound
(Lemma 12).
)k , which often is an apWhen estimating the binomial coefficient by nk ≤ ( en
k
propriate way to derive more understandable expressions, the above bound reverts
69
to equation (35), a slightly weaker version of the classic multiplicative bound (30).
Since we are not aware of an application of Lemma 81 that does not estimate the
binomial coefficient in this way, its main value might be its simplicity.
The following tail bound for the binomial distribution was shown by
Klar [Kla00], again with elementary arguments. In many cases, it is significantly
stronger than Lemma 81. However, again we do not see an example where this tail
bound would have improved an existing analysis of a randomized search heuristics.
Lemma 82. Let X ∼ Bin(n, p) and k ∈ [np..n]. Then
Pr[X ≥ k] ≤
(k + 1)(1 − p)
Pr[X = k].
k + 1 − (n + 1)p
Note that, trivially, Pr[X = k] ≤ Pr[X ≥ k], so it is immediately clear that this
(k+1)(1−p)
). With elementary
estimate is quite tight (the gap is at most the factor k+1−(n+1)p
arguments, Lemma 82 gives the slightly weaker estimate
Pr[X ≥ k] ≤
k − kp
Pr[X = k],
k − np
(86)
which appeared also in [Fel68, equation (VI.3.4)]. For p = n1 , the typical mutation
rate in standard-bit mutation, Lemma 82 gives
Pr[X ≥ k] ≤
k+1
Pr[X = k].
k
(87)
1 n−k
)
Pr[X = k] and
Writing Lemma 81 in the equivalent form Pr[X ≥ k] ≤ ( 1−p
1 n−k
noting that ( 1−p )
≥ exp(p(n − k)), we see that in many cases Lemma 82 gives
substantially better estimates.
References
[Azu67]
Kazuoki Azuma. Weighted sums of certain dependent variables. Tohoku Mathematical Journal, 3:357–367, 1967.
[BBD+ 09]
Surender Baswana, Somenath Biswas, Benjamin Doerr, Tobias
Friedrich, Piyush P. Kurur, and Frank Neumann. Computing single
source shortest paths using single-objective fitness. In 10th Workshop
on Foundations of Genetic Algorithms, FOGA 2009, pages 59–66.
ACM, 2009.
[BD17]
Maxim Buzdalov and Benjamin Doerr. Runtime analysis of the
(1 + (λ, λ)) genetic algorithm on random satisfiable 3-CNF formulas. In Genetic and Evolutionary Computation Conference, GECCO
70
2017, pages 1343–1350. ACM, 2017.
http://arxiv.org/abs/1704.04366.
Full version available at
[BDN10]
Süntje Böttcher, Benjamin Doerr, and Frank Neumann. Optimal
fixed and adaptive mutation rates for the LeadingOnes problem. In
11th International Conference on Parallel Problem Solving from Nature, PPSN 2010, pages 1–10. Springer, 2010.
[BE08]
Pavel A. Borisovsky and Anton V. Eremeev. Comparing evolutionary
algorithms to the (1+1)-EA. Theoretical Computer Science, 403:33–
41, 2008.
[Ben62]
George Bennett. Probability inequalities for the sum of independent
random variables. Journal of the American Statistical Association,
57:33–45, 1962.
[Ber24]
Sergey N. Bernstein. On a modification of Chebyshev’s inequality
and of the error formula of Laplace. Ann. Sci. Inst. Sav. Ukraine,
Sect. Math. 1, 4:38–49, 1924.
[Bie53]
Irénée-Jules Bienaymé. Considérations à l’appui de la découverte de
Laplace. Comptes Rendus de l’Académie des Sciences, 37:309–324,
1853.
[BLS14]
Golnaz Badkobeh, Per Kristian Lehre, and Dirk Sudholt. Unbiased
black-box complexity of parallel search. In Parallel Problem Solving
from Nature, PPSN 2014, pages 892–901. Springer, 2014.
[CDEL16]
Dogan Corus, Duc-Cuong Dang, Anton V. Eremeev, and Per Kristian Lehre. Level-based analysis of genetic algorithms and other
search processes. CoRR, abs/1407.7663v2, 2016.
[Che52]
Herman Chernoff. A measure of asymptotic efficiency for tests of a
hypothesis based on the sum of observations. Annals of Mathematical
Statistics, 23:493–507, 1952.
[Chv79]
Vasek Chvátal. The tail of the hypergeometric distribution. Discrete
Mathematics, 25:285–287, 1979.
[DD16]
Benjamin Doerr and Carola Doerr. The impact of random initialization on the runtime of randomized search heuristics. Algorithmica,
75:529–553, 2016.
71
[DD17]
Benjamin Doerr and Carola Doerr. Optimal static and self-adjusting
parameter choices for the (1+(λ, λ)) genetic algorithm. Algorithmica,
2017. To appear.
[DDY16a]
Benjamin Doerr, Carola Doerr, and Jing Yang. k-bit mutation with
self-adjusting k outperforms standard bit mutation. In 14th International Conference on Parallel Problem Solving from Nature, PPSN
2016, pages 824–834. Springer, 2016.
[DDY16b]
Benjamin Doerr, Carola Doerr, and Jing Yang. Optimal parameter
choices via precise black-box analysis. In Genetic and Evolutionary
Computation Conference, GECCO 2016, pages 1123–1130. ACM,
2016.
[DFW10]
Benjamin Doerr, Mahmoud Fouz, and Carsten Witt. Quasirandom
evolutionary algorithms. In Genetic and Evolutionary Computation
Conference, GECCO 2010, pages 1457–1464. ACM, 2010.
[DFW11]
Benjamin Doerr, Mahmoud Fouz, and Carsten Witt. Sharp bounds
by probability-generating functions and variable drift. In Genetic
and Evolutionary Computation Conference, GECCO 2011, pages
2083–2090. ACM, 2011.
[DG13]
Benjamin Doerr and Leslie Ann Goldberg. Adaptive drift analysis.
Algorithmica, 65:224–250, 2013.
[DGWY17]
Benjamin Doerr, Christian Gießen, Carsten Witt, and Jing
Yang. The (1+λ) evolutionary algorithm with self-adjusting mutation rate.
In Genetic and Evolutionary Computation Conference, GECCO 2017. ACM, 2017. Full version available at
http://arxiv.org/abs/1704.02191.
[DHK07]
Benjamin Doerr, Edda Happ, and Christian Klein. A tight bound
for the (1 + 1)-EA for the single source shortest path problem.
In Congress on Evolutionary Computation, CEC 2007, pages 1890–
1895. IEEE, 2007.
[DHK11]
Benjamin Doerr, Edda Happ, and Christian Klein. Tight analysis
of the (1+1)-EA for the single source shortest path problem. Evolutionary Computation, 19:673–691, 2011.
[DHK12]
Benjamin Doerr, Edda Happ, and Christian Klein. Crossover can
provably be useful in evolutionary computation. Theoretical Computer Science, 425:17–33, 2012.
72
[DJ07]
Benjamin Doerr and Daniel Johannsen. Adjacency list matchings:
an ideal genotype for cycle covers. In Genetic and Evolutionary
Computation Conference, GECCO 2007, pages 1203–1210. ACM,
2007.
[DJW02]
Stefan Droste, Thomas Jansen, and Ingo Wegener. On the analysis
of the (1+1) evolutionary algorithm. Theoretical Computer Science,
276:51–81, 2002.
[DJW12]
Benjamin Doerr, Daniel Johannsen, and Carola Winzen. Multiplicative drift analysis. Algorithmica, 64:673–697, 2012.
[DJWZ13]
Benjamin Doerr, Thomas Jansen, Carsten Witt, and Christine
Zarges. A method to derive fixed budget results from expected optimisation times. In Genetic and Evolutionary Computation Conference, GECCO 2013, pages 1581–1588. ACM, 2013.
[DK15]
Benjamin Doerr and Marvin Künnemann. Optimizing linear functions with the (1+λ) evolutionary algorithm—different asymptotic
runtimes for different instances. Theoretical Computer Science,
561:3–23, 2015.
[DL15]
Duc-Cuong Dang and Per Kristian Lehre. Simplified runtime analysis of estimation of distribution algorithms. In Genetic and Evolutionary Computation Conference, GECCO 2015, pages 513–518.
ACM, 2015.
[DLMN17]
Benjamin Doerr, Huu Phuoc Le, Régis Makhmara, and Ta Duy
Nguyen. Fast genetic algorithms. In Genetic and Evolutionary Computation Conference, GECCO 2017. ACM, 2017. Full version available at http://arxiv.org/abs/1703.03334.
[Doe11]
Benjamin Doerr. Analyzing randomized search heuristics: Tools
from probability theory. In Anne Auger and Benjamin Doerr, editors, Theory of Randomized Search Heuristics, pages 1–20. World
Scientific, 2011.
[Doe14]
Benjamin Doerr. A lower bound for the discrepancy of a random
point set. Journal of Complexity, 30:16–20, 2014.
[Doe17]
Benjamin Doerr. An elementary analysis of the probability that a
binomial random variable exceeds its expectation. ArXiv e-prints,
arXiv:1712.00519, 2017.
73
[Doe18]
Benjamin Doerr. Better runtime guarantees via stochastic domination. In Evolutionary Computation in Combinatorial Optimization,
EvoCOP 2018. Springer, 2018.
[dPdLDD15] Axel de Perthuis de Laillevault, Benjamin Doerr, and Carola Doerr.
Money for nothing: Speeding up evolutionary algorithms through
better initialization. In Genetic and Evolutionary Computation Conference, GECCO 2015, pages 815–822. ACM, 2015.
[DW14]
Benjamin Doerr and Carola Winzen. Ranking-based black-box complexity. Algorithmica, 68:571–609, 2014.
[Fei06]
Uriel Feige. On sums of independent random variables with unbounded variance and estimating the average degree in a graph.
SIAM Journal of Computing, 35:964–984, 2006.
[Fel68]
William Feller. An Introduction to Probability Theory and Its Applications, volume I. Wiley, third edition, 1968.
[GKS99]
Josselin Garnier, Leila Kallel, and Marc Schoenauer. Rigorous hitting times for binary mutations. Evolutionary Computation, 7:173–
203, 1999.
[GM14]
Spencer Greenberg and Mehryar Mohri. Tight lower bound on the
probability of a binomial exceeding its expectation. Statistics and
Probability Letters, 86:91–98, 2014.
[GW17]
Christian Gießen and Carsten Witt. The interplay of population size
and mutation probability in the (1 + λ) EA on OneMax. Algorithmica, 78:587–609, 2017.
[Hoe63]
Wassily Hoeffding. Probability inequalities for sums of bounded
random variables. Journal of the American Statistical Association,
58:13–30, 1963.
[HPR+ 14]
Hsien-Kuei Hwang, Alois Panholzer, Nicolas Rolin, Tsung-Hsi Tsai,
and Wei-Mei Chen. Probabilistic analysis of the (1+1)-evolutionary
algorithm. CoRR, abs/1409.4955, 2014.
[HY01]
Jun He and Xin Yao. Drift analysis and average time complexity of
evolutionary algorithms. Artificial Intelligence, 127:51–81, 2001.
[Jan17]
Swante Janson. Tail bounds for sums of geometric and exponential
variables. ArXiv e-prints, arXiv:1709.08157, 2017.
74
[JJW05]
Thomas Jansen, Kenneth A. De Jong, and Ingo Wegener. On the
choice of the offspring population size in evolutionary algorithms.
Evolutionary Computation, 13:413–440, 2005.
[JW01]
Thomas Jansen and Ingo Wegener. Evolutionary algorithms - how to
cope with plateaus of constant fitness and when to reject strings of
the same fitness. IEEE Transactions on Evolutionary Computation,
5:589–599, 2001.
[JW06]
Thomas Jansen and Ingo Wegener. On the analysis of a dynamic
evolutionary algorithm. Journal of Discrete Algorithms, 4:181–199,
2006.
[Kla00]
Bernhard Klar. Bounds on tail probabilities of discrete distributions.
Probability in the Engineering and Informational Sciences, 14:161–
171, 2000.
[Köt16]
Timo Kötzing. Concentration of first hitting times under additive
drift. Algorithmica, 75:490–506, 2016.
[KW17]
Martin S. Krejca and Carsten Witt. Lower bounds on the run time
of the univariate marginal distribution algorithm on OneMax. In
Foundations of Genetic Algorithms, FOGA 2017, pages 65–79. ACM,
2017.
[LN17]
Per Kristian Lehre and Phan Trung Hai Nguyen. Improved runtime bounds for the univariate marginal distribution algorithm via
anti-concentration. In Genetic and Evolutionary Computation Conference, GECCO 2017, pages 1383–1390. ACM, 2017.
[LOW17]
Andrei Lissovoi, Pietro Simone Oliveto, and John Alasdair Warwicker. On the runtime analysis of generalised selection hyperheuristics for pseudo-boolean optimisation. In Genetic and Evolutionary Computation Conference, GECCO 2017, pages 849–856.
ACM, 2017.
[LW12]
Per Kristian Lehre and Carsten Witt. Black-box search by unbiased
variation. Algorithmica, 64:623–642, 2012.
[LW14]
Per Kristian Lehre and Carsten Witt. Concentrated hitting times
of randomized search heuristics with variable drift. In 25th International Symposium on Algorithms and Computation, ISAAC 2014,
pages 686–697. Springer, 2014.
75
[McD98]
Colin McDiarmid. Concentration. In Probabilistic Methods for Algorithmic Discrete Mathematics, volume 16, pages 195–248. Springer,
Berlin, 1998.
[MS02]
Alfred Müller and Dietrich Stoyan. Comparison Methods for Stochastic Models and Risks. Wiley, 2002.
[MU05]
Michael Mitzenmacher and Eli Upfal. Probability and Computing—
Randomized Algorithms and Probabilistic Analysis. Cambridge University Press, 2005.
[Nag01]
S. V. Nagaev. Lower bounds on large deviation probabilities for
sums of independent random variables. Theory of Probability and
Its Applications, 46:79–102, 2001.
[NSW10]
Frank Neumann, Dirk Sudholt, and Carsten Witt. A few ants are
enough: ACO with iteration-best update. In Genetic and Evolutionary Computation Conference, GECCO 2010, pages 63–70. ACM,
2010.
[NW07]
Frank Neumann and Ingo Wegener. Randomized local search, evolutionary algorithms, and the minimum spanning tree problem. Theoretical Computer Science, 378:32–40, 2007.
[OHY09]
Pietro Simone Oliveto, Jun He, and Xin Yao. Analysis of the (1+1)EA for finding approximate solutions to vertex cover problems. IEEE
Transactions on Evolutionary Computation, 13:1006–1029, 2009.
[OLN09]
Pietro Simone Oliveto, Per Kristian Lehre, and Frank Neumann.
Theoretical analysis of rank-based mutation - combining exploration
and exploitation. In Congress on Evolutionary Computation, CEC
2009, pages 1455–1462. IEEE, 2009.
[OW11]
Pietro Simone Oliveto and Carsten Witt. Simplified drift analysis
for proving lower bounds in evolutionary computation. Algorithmica,
59:369–386, 2011.
[OW12]
Pietro Simone Oliveto and Carsten Witt. Erratum: Simplified
drift analysis for proving lower bounds in evolutionary computation.
CoRR, abs/1211.7184, 2012.
[OW15]
Pietro Simone Oliveto and Carsten Witt. Improved time complexity analysis of the simple genetic algorithm. Theoretical Computer
Science, 605:21–41, 2015.
76
[PR16]
Christos Pelekis and Jan Ramon. A lower bound on the probability
that a binomial random variable is exceeding its mean. Statistics
and Probability Letters, 119:305–309, 2016.
[Pro56]
Yuri Prokhorov. Convergence of random processes and limit theorems in probability theory. Theory of Probability and Its Applications, 1:157–214, 1956.
[PS97]
Alessandro Panconesi and Aravind Srinivasan. Randomized distributed edge coloring via an extension of the Chernoff–Hoeffding
bounds. SIAM Journal on Computing, 26:350–368, 1997.
[Rob55]
Herbert Robbins. A remark on Stirling’s formula. American Mathematical Monthly, 62:26–29, 1955.
[RT11]
Philippe Rigollet and Xin Tong. Neyman-Pearson classification, convexity and stochastic constraints. Journal of Machine Learning Research, 12:2831–2855, 2011.
[Sch00]
Christian Scheideler. Probabilistic Methods for Coordination Problems. University of Paderborn, 2000. Habilitation thesis. Available at
http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.70.1319.
[Slu77]
Eric V. Slud. Distribution inequalities for the binomial law. Annals
of Probability, 5:404–412, 1977.
[ST12]
Dirk Sudholt and Christian Thyssen. A simple ant colony optimizer
for stochastic shortest path problems. Algorithmica, 64:643–672,
2012.
[STW04]
Jens Scharnow, Karsten Tinnefeld, and Ingo Wegener. The analysis
of evolutionary algorithms on sorting and shortest paths problems.
Journal of Mathematical Modelling and Algorithms, 3:349–366, 2004.
[Sud13]
Dirk Sudholt. A new method for lower bounds on the running time of
evolutionary algorithms. IEEE Transactions on Evolutionary Computation, 17:418–435, 2013.
[SW16]
Dirk Sudholt and Carsten Witt. Update strength in EDAs and ACO:
how to avoid genetic drift. In Genetic and Evolutionary Computation Conference, GECCO 2016, pages 61–68. ACM, 2016. Extended
version CoRR abs/1607.04063.
[Tch67]
Pafnuty Tchebichef.
Des valeurs moyennes.
Journal de
mathématiques pures et appliquées, série 2, 12:177–184, 1867.
77
[Tch74]
Pafnuty Tchebichef. Sur les valeurs limites des intégrales. Journal
de mathématiques pures et appliquées, série 2, 19:157–160, 1874.
[Weg01]
Ingo Wegener. Theoretical aspects of evolutionary algorithms. In International Colloquium on Automata, Languages and Programming,
ICALP 2001, pages 64–78. Springer, 2001.
[Wit13]
Carsten Witt. Tight bounds on the optimization time of a randomized search heuristic on linear functions. Combinatorics, Probability
& Computing, 22:294–318, 2013.
[Wit14]
Carsten Witt. Fitness levels with tail bounds for the analysis of randomized search heuristics. Information Processing Letters, 114:38–
41, 2014.
[Wit17]
Carsten Witt. Upper bounds on the runtime of the univariate
marginal distribution algorithm on onemax. In Genetic and Evolutionary Computation Conference, GECCO 2017, pages 1415–1422.
ACM, 2017.
[WW05]
Ingo Wegener and Carsten Witt. On the optimization of monotone
polynomials by simple randomized search heuristics. Combinatorics,
Probability & Computing, 14:225–247, 2005.
[ZLLH12]
Dong Zhou, Dan Luo, Ruqian Lu, and Zhangang Han. The use of
tail inequalities on the probable computational time of randomized
search heuristics. Theoretical Computer Science, 436:106–117, 2012.
78
| 9cs.NE
|
arXiv:1709.06534v1 [cs.CR] 19 Sep 2017
BIOS ORAM: Improved Privacy-Preserving Data Access
for Parameterized Outsourced Storage
Michael T. Goodrich
University of California, Irvine
Dept. of Computer Science
[email protected]
Abstract
Algorithms for oblivious random access machine (ORAM) simulation allow a client, Alice, to
obfuscate a pattern of data accesses with a server, Bob, who is maintaining Alice’s outsourced
data while trying to learn information about her data. We present a novel ORAM scheme that
improves the asymptotic I/O overhead of previous schemes for a wide range of size parameters
for client-side private memory and message blocks, from logarithmic to polynomial. Our method
achieves statistical security for hiding Alice’s access pattern and, with high probability, achieves
an I/O overhead that ranges from O(1) to O(log2 n/(log log n)2 ), depending on these size
parameters, where n is the size of Alice’s outsourced memory. Our scheme, which we call BIOS
ORAM, combines multiple uses of B-trees with a reduction of ORAM simulation to isogrammic
access sequences.
1
Introduction
In outsourced storage applications, a client, Alice, outsources her data to a server, Bob, who stores
her data and provides her with an interface to access it via a network. We assume that Bob is
“honest-but-curious,” meaning that Bob is trusted to keep Alice’s data safe and available, but he
wants to learn as much as he can about Alice’s data. For privacy protection, we also assume that
Alice encrypts her data by a semantically secure encryption scheme so that each time she accesses an
item then she securely re-encrypts it before returning it to Bob’s storage. The remaining problem,
then, is for Alice to obscure her data access pattern so that Bob can learn nothing from her access
sequence.
Fortunately, there is a large and growing literature on algorithms for oblivious random access
machine (ORAM) simulation to obfuscate Alice’s access sequence (e.g., see [1,2,6,9–12,17,19,22,23,
25]). Such ORAM simulation methods provide ways for Alice to replace each of the data accesses
in her algorithm, A, with a sequence of accesses to her data stored with Bob so as to obfuscate
her original access sequence. Ideally, such an ORAM scheme achieves statistically security, which
intuitively means that Bob is unable to determine any information about Alice’s original access
sequence beyond its length, N , and the size of her data set, n. In addition to the parameters, n
and N , the following parameters are also important in this context:
• B: The maximum number of words in a message block sent from/to Alice in one I/O
operation.
1
• M : The number of words in Alice’s client-side private memory.
In this paper, we are interested in scenarios where B and M can be set to arbitrary values that
are at least logarithmic in n, and at most a constant fraction of n, so as to apply to a wide range
of scenarios, while still applying to cases where Alice would still be motivated to outsource her
memory to Bob. Formally, in an ORAM framework, we assume that Alice’s RAM algorithm, A,
indexes data using integer addresses in the range [0, n − 1], using the following operations:
• write(i, v): Write the value v into the memory cell indexed by the integer, i. Since A is a
RAM algorithm, we assume i and v each fit in a single memory word.
• read(i): Read and return the value, v, stored in the cell with integer address, i.
These operations are the low-level accesses that are issued during Alice’s execution of her RAM
algorithm, A. The goal of an ORAM simulation scheme is to allow Alice to perform her algorithm,
A, but to replace each individual read or write operation with a sequence of input/output (I/O)
messages exchanged between Alice and Bob so that Alice effectively hides A’s pattern of data
accesses, i.e., A’s sequence of read/write operations. Moreover, we would like to minimize the
amortized number of such messages exchanged between Alice and Bob while still preserving Alice’s
privacy.
A related concept is that of an oblivious storage (OS), e.g., see [1, 2, 12, 19, 23, 24]. In this
framework, Alice stores a dictionary at the server, Bob, of size at most n, and her algorithm, A,
accesses this dictionary using the following operations:
• put(k, v): Add the key-value item, (k, v). An error occurs if there is already an item with this
key. We assume here that each key, k, fits in a single memory word and each value, v, fits in
a message block of size B.
• get(k): Return and remove the value, v, associated with the key, k. If there is no item in the
collection with key k, then return a special “not found” value.
Note that OS includes ORAM as a special case. For example, we can initialize A’s memory,
A[0..n−1], as put(i, A[i]), for i = 0, . . . , n−1. Then we can perform any write(i, v) as get(i), put(i, v),
and we can perform any read(i) as v = get(i), put(i, v). We assume that Alice’s original access
sequence has a given length, N , where N is at most polynomial in n, and an OS scheme replaces each
such operation with a sequence of operations that obfuscate the original access sequence. Ideally,
Bob should learn nothing about Alice’s original access sequence, which we formalize in terms of a
security game. Let σ denote a sequence of N read/write operations (or get/put operations). An
ORAM (resp., OS) scheme transforms σ into into a sequence, σ 0 , of access operations. As mentioned
above, we assume that each item is stored using a semantically-secure encryption scheme, so that
independent of whether Alice wants to keep a key-value item unchanged, the sequence σ 0 involves
always replacing anything Alice accesses with a new encrypted value so that Bob is unable to tell
if the underlying plaintext value has changed. The security for an ORAM (or OS) simulation is
defined in terms of the following security game. Let σ1 and σ2 be two different RAM-algorithm or
dictionary access sequences, of length N , for a key/index set of size n, that are chosen by Bob and
given to Alice. Alice chooses uniformly at random one of these sequences and transforms it into the
access sequence σ 0 according to her ORAM (or OS) scheme, which she then executes. Her ORAM
(resp., OS) scheme is statistically secure if Bob can determine which sequence, σ1 or σ2 , Alice chose
2
with probability at most 1/2. This assumes that Bob learns nothing from the encryption of Alice’s
data.
The I/O overhead for such an OS or ORAM scheme is a function, T (n), such that the total
number of messages sent between Alice and Bob during the simulation of all N of her accesses from
σ is O(N · T (n)) with high probability (i.e., with probability at least 1 − 1/nc , for some constant
c > 1). That is, the I/O overhead is the amortized expected number of accesses to Bob’s storage
that are done to hide each of Alice’s original accesses in her algorithm, A. Of course, we would like
T (n) to be as small as possible.
In this paper, we provide methods for improving the asymptotic I/O overhead for ORAM
simulations by more than just constant factors. The approach we take to achieve this goal is to
first transform the original RAM access sequence, σ, into an intermediate OS sequence, σ̂, which
has a restricted structure that we refer to as it being isogrammic, and we then efficiently implement
an oblivious storage for this isogrammic sequence, σ̂, transforming it into a final access sequence,
σ 0 , by taking advantage of this restricted structure. We define a sequence, σ = (σ1 , σ2 , . . . , σN )
of put and get operations to be isogrammic 1 , for an underlying set of size, n, if it satisfies the
following conditions:
• For every get(k) operation, there is a previous put(k, v) operation, with the same key, k.
• No put(k, v) operation attempts to add an item (k, v) when the key k is already in the set.
• The key, k, used in each get(k) (resp., put(k, v)) operation contains random component chosen
independently and uniformly of at least dlog ne bits. Thus, keys are unlikely to be repeated.
That is, each time we issue a put(k, v) operation, the key, k, contains a random nonce that is
chosen independently from any of the previous random nonces we chose for previous keys. At a
high level, then, our two-phase ORAM simulation scheme is surprisingly simple, in that it combines
the classic well-known B-tree data structure, which is ubiquitous in database applications, with
isogrammic OS. That is, at a high level our scheme can be summarized as
B-trees + Isogrammic-OS =⇒ ORAM.
Thus, we call our scheme BIOS ORAM.2 This approach allows us to achieve the main goals of this
paper, which is the design of ORAM simulation methods that work for a wide range of values to
the parameters B and M . Moreover, we are able to use this approach to design schemes that are
statistically secure and, w.h.p., have efficient I/O overhead bounds.
1.1
Previous Related Results
Work on ORAM simulation methods traces its origins to seminal work of Goldreich and
Ostrofsky [9], who achieve an I/O overhead of O(log3 n) with M and B being O(1) using a scheme
1
An isogram is a word, like “copyrightable,” without a repeated letter.
E.g., see wikipedia.org/wiki/Isogram.
2
Our scheme implements an ORAM by a reduction to an isogrammic OS, i.e., by replacing a sequence of read
and write operations with a sequence of get and put operations. If one desires a scheme that works entirely in the
ORAM framework, one can, for example, implement these get and put operations using a cuckoo hash table, with
O(1) lookup times in the worst case and O(1) amortized insertion times with high probability (w.h.p.). This will
result in a sequence of read and write operations and it does not reveal any information about Alice’s original access
sequence, since the get and put operations come from an OS.
3
Method
Parameterizable?
Statistically Secure?
B
M
I/O Overhead
Goldreich-Ostrofsky [9]
No
No
Θ(1)
Θ(1)
O(log3 n)
Kushilevitz et al. [17]
No
No
Θ(1)
Θ(1)
O(log2 n/ log log n)
Damgård et al. [6]
No
Yes
Θ(1)
Θ(1)
O(log3 n)
Supermarket ORAM [3]
No
Yes
Θ(1)
Θ(polylog n)
O(log2 n log log n)
Somewhat
No
Θ(1)
Θ(n )
O(log n)
No
Θ(n )
O(1)
Goodrich-Mitzenmacher [10]
Melbourne shuffle [19]
Somewhat
Θ(n )
Path ORAM [25]
Yes
Yes
ω(log n)
ω(B log n)
O(log n/ log B)†
BIOS ORAM
Yes
Yes
Ω(log n)
Ω(log n)
O(log2 n/ log2 B)
2
Table 1: Our BIOS ORAM bounds (in boldface), compared to some of the asymptotically
best previous ORAM methods, which are distinguished between those results have parameterized
message/memory sizes or not, and those that are statistically secure or not. The parameter
0 < ≤ 1/2 is a fixed constant. The above results that are not statistically secure assume the
existence of random one-way hash functions, i.e., they assume the existence of random oracles.
† The Path ORAM method [25] claims an I/O bandwidth of O(log n) blocks, but this assumes that
blocks can contain the responses of multiple back-and-forth messages; hence, we use the above
bound to characterize the I/O overhead for Path ORAM, which counts the actual number of
messages, each of size at most B.
that fails with polynomial probability and is not statistically secure. Kushilevitz et al. [17] improve
the I/O overhead for ORAM with a constant-size client-side memory to be O(log2 n/ log log n),
albeit while still not achieving statistical security. Damgård et al. [6] introduce an ORAM scheme
that is statistically secure with an I/O overhead that is O(log3 n), with M and B being O(1),
that is, there method is not parameterized for general values of M and B. Chung et al. [3]
provide a statistically secure ORAM scheme, which we are calling “supermarket” ORAM (due to
its reliance on an interesting “supermarket” analysis), for the case when B is O(1) and M is at least
polylogarithmic, which has an I/O overhead of O(log2 n log log n). Unfortunately, these previous
schemes do not apply to parameterized scenarios with larger values for B, such as when B is at
least logarithmic, let alone for cases when B is Ω(n ), for some constant 0 < ≤ 1. Interestingly,
Goldreich and Ostrofsky [9] give a lower-bound argument that the I/O overhead for an ORAM
scheme must be Ω(log n) when M is O(1), but their lower bound does not apply to larger values
of M and B.
There is previous work that is parameterized for larger values of M and B, however. Goodrich
and Mitzenmacher [10] provide an ORAM simulation scheme that achieves an O(log n) I/O overhead
and constant-sized messages, but their method requires M to be Ω(n ), for some fixed constant
0 < ≤ 1, which is not fully parameterized, e.g., for when M is polylogarithmic. Also, their
method is not statistically secure. Stefanov et al. [25] introduce the Path ORAM method, which is
statistically secure and parameterized for values of B that are super-logarithmic and values of M
that are at least a logarithmic factor larger than B, to achieve an I/O overhead (in terms of the
number of messages exchanged between Alice and Bob) of O(log2 n/ log B). That is, their method
also can match the logarithmic lower bound of Goldreich and Ostrofsky, but with a scheme that
requires both M and B to be Ω(n ), for a fixed constant 0 < ≤ 1. Ohrimenko et al. [19] present
4
an oblivious storage (OS) scheme (which, as we observed, can also be used for ORAM simulation)
that achieves an I/O overhead of O(1), but it is not statistically secure and it requires M and B
to be at least Ω(n ).
Wang et al. [27] introduce an interesting “oblivious data structure” framework, which applies
to bounded-degree data structures, such as search trees, to achieve an O(log n) I/O overhead for
data-structure access sequences. Their algorithms are based on (non-recursive) Path ORAM [25],
however, which requires that M and B be super-logarithmic, and, even then, their method does
not achieve an O(1) I/O overhead, even for larger values of B and M .
In addition, there is a growing literature on other ORAM and OS solutions, which is too large to
review here (e.g., see [1,7,8,11–13,20–24,26]). These results also optimize I/O overhead, but we are
not aware of any previous results that beat the asymptotic I/O bounds for the Path ORAM scheme
for a wide range of values of B and M while also achieving statistical security for the simulation
method.
1.2
Our Results
We provide a method for ORAM simulation, which we call BIOS ORAM, that achieves statistical
security and has efficient asymptotic I/O overheads for a wide range of values for the parameters
B and M . In particular, we show how to perform an ORAM simulation of a polynomial number of
accesses to an outsourced storage of size n with an I/O overhead that is O(log2 n/ log2 B), w.h.p.,
for B and M ranging from logarithmic to a fraction of n. For example, we can achieve the following
specific bounds, depending on the values of B and M :
• When B and M are logarithmic or polylogarithmic in n, we achieve an I/O overhead that is
O(log2 n/(log log n)2 ), w.h.p.
√
• When B and M are only Ω(2
log n ),
we achieve an I/O overhead that is O(log n), w.h.p.
• When B and M are O(n ), for some constant 0 < ≤ 1/2, we achieve an I/O overhead that
is O(1), w.h.p.
We summarize our results in Table 1, comparing them to some of best-known previous ORAM
results. Note, for example, that our results apply to a wider range of values of the parameters B and
M than the Path ORAM scheme [25] and improves the I/O overhead for ORAM simulation over
this entire range. For example, the best I/O overhead that Path ORAM can achieve is O(log n) even
when B and M are O(n ), whereas our BIOS ORAM scheme achieves a constant I/O overhead
in such scenarios. In addition, our I/O overhead bounds match those of the Melbourne shuffle
for values of B that are Θ(n ) while also extending to values of B that are smaller than those
possible √using the Melbourne shuffle approach. For example, as mentioned above, if B and M are
just Ω(2 log n ), then we achieve an I/O overhead of O(log n), w.h.p., which is a result that is not
achievable using previous ORAM methods for such values of B and M .
Our methods are remarkably simple and make multiple uses of the ubiquitous B-tree data
structure (e.g., see [4,5,16]), along with a reduction of ORAM simulations to isogrammic OS access
sequences, as well as efficient ways of obliviously simulating isogrammic access sequences (again,
using B-trees). In particular, we show how to implement an oblivious storage (OS) scheme for
any isogrammic access sequence so as to achieve a simulation that achieves statistical security and
has an I/O overhead that is O(log n/ log B) with high probability. In addition, we show how to
5
apply this result to improve the I/O overhead for oblivious tree-structured data structures, which
improves an oblivious data-structure bound of Wang et al. [27] and may be of independent interest.
2
An Overview of B-Trees
As is well-known in database circles, a B-tree is a multi-way search tree, which stores internal nodes
as blocks so that its depth is O(logB n), e.g., see [4, 5, 16]. In the B-trees we use in this paper, we
choose a branching factor of
B 0 = B 1/4 ,
where B is our message-size parameter. Such a B-tree supports searching and updates (insertions
and deletions) in O(logB 0 n) = O(log n/ log B 0 ) = O(log n/ log B) I/Os of blocks of size B 0 . That
is, each search or update involves accessing O(1) nodes on each level of the B-tree, in a root-to-leaf
search followed (for updates) by a leaf-to-root set of updates, for which we refer the interested reader
to known methods for searching and updating B-trees (e.g., see [4,5,16]). From the perspective of the
server, Bob, the I/Os for searching a B-tree would simply look like Alice accessing O(log n/ log B 0 ) =
O(log n/ log B) blocks of storage. (See Figure 1.)
An example B-tree:
a
b
c
e
f
g
h
d
i
j
Figure 1: An example B-tree with branching factor 3.
permission.
3
k
l
m
c 2017 Michael Goodrich. Used with
B-Trees + Isogrammic OS = ORAM
In this section, we describe the first component of our BIOS ORAM scheme, which is a reduction of
ORAM simulation to isogrammic OS, at the cost of increasing the I/O overhead of Alice’s accesses
by a factor of O(log n/ log B). That is, we show how to transform an arbitrary sequence of read and
write operations into an isogrammic sequence of get and put operations, with a blow-up in length
of O(log n/ log B). By then showing how to obliviously simulate an isogrammic access sequence
with an I/O overhead of O(log n/ log B), we get the main result of this paper, that is, that we can
achieve an ORAM scheme with an I/O overhead of O((log n/ log B)2 ).
Suppose, then, that Alice’s RAM algorithm, A, which she wishes to perform on her data
outsourced to Bob, uses a memory of n cells indexed by integers in the range [0, n − 1]. Let R be
a B-tree having each cell of Alice’s storage stored in a sub-block of size B 0 = B 1/4 associated with
a block at a leaf of R (ordered in the standard left-to-right fashion). Furthermore, let R have a
branching factor of B 0 = B 1/4 , so each internal node in R can be stored in a single sub-block of
size B 0 and the depth of R is O(log n/ log B 0 ) = O(log n/ log B). Intuitively, the main idea of our
reduction is that, for each write(i, v) or read(i) operation in A, we perform a search in R for the
6
index i, to find the sub-block containing memory cell, i, and then we replace this sub-block of size
B 0 and all the nodes of size B 0 that we just traversed with new nodes.
Initially, we construct R in a bottom-up fashion so that each node u in R is assigned a random
nonce, ru , of dlog ne bits. For each leaf, u, of R, which is storing some block, V , of B values for
the cells in Alice’s storage for some set of indices, {i, i + 1, . . . , i + B 0 − 1}, we issue a put(k, v)
operation, where k = (ru , u) and v = (i, V ). In addition, we (obliviously) store ru at u in R on
the server. Note that v fits in a single block of size B. For each internal node, u, of R, which we
construct level-by-level, so that we can obliviously read in the random nonce, rui , associated with
each child, ui , of u in R, then we assign u a random nonce, ru , and we issue a put(k, v) operation,
where k = (ru , u) and
v = (I, ru1 , u1 , ru2 , u2 , . . . , ruB0 −1 , uB 0 −1 ),
where I is the block of key values needed to decide for any search which child, ui , of u to access
next. Note that v fits in O(1) sub-blocks of size B 0 . This initialization phase establishes the B-tree,
R, in Bob’s storage and issues O(n/B 0 ) put operations that identify each node, u, of R using a key
that comprises a random nonce, ru , of dlog ne bits. We also keep a global variable, that maintains
the random nonce for the root.
For each read(i) or write(i, v) operation after this initialization, we traverse a root-to-leaf path,
π, in R to the leaf associated with the sub-block holding the cell i. This involves performing a
sequence of O(log n/ log B) get(k) operations, where each k is a pair of a node name in R and the
random nonce for that node. We cache the nodes returned by these get operations in Alice’s private
memory. Then, processing the nodes in π in reverse order, we give each node u in this sequence a
new random nonce, ru , and we issue a put(k, v) operation, where k = (ru , u) and
v = (I, ru1 , u1 , ru2 , u2 , . . . , ruB0 −1 , uB 0 −1 ),
where u1 , . . . , uB 0 −1 are the children of u in R. We do this processing in reverse order so that when
we issue such a put(k, v) operation, we will have available the new random nonce for the child, uj ,
of u that we previously processed as well as the old (and still unused) random nonces for the other
children of u. In this case, the nodes are B-tree nodes, which are of size B 1/4 , as we have defined
this to be the branching factor for our B-tree. Fortunately, our message block size, B, is large
enough to store up to B 3/4 such nodes in a single message block.
Each read or write involves issuing O(log n/ log B) get and put operations; hence, this increases
the total number of I/Os for Alice’s access sequence by an O(log n/ log B) factor. The important
observation is that this process results an isogrammic access sequence, since each key used in a
put(k, v) operation comprises a random nonce of at least dlog ne bits, each such key is not already in
our set (since each key also comprises a unique node name), and each get(k) operation is guaranteed
to match up with a previous put(k, v) operation. Thus, we have the following.
Theorem 1. Given a RAM algorithm, A, with memory size, n, we can simulate the memory
accesses of A using an isogrammic access sequence that initially creates O(n/B 0 ) put operations
and then creates O(log n/ log B) get and put operations for each step of A. Each key used in a get
or put operation comprises a random nonce of at least dlog ne bits and each value used in a put
operation is a sub-block of size O(B 0 ) words.
Proof. For the security claim, consider a simulation of the security game mentioned in the
introduction, assuming the statistical security for our isogrammic OS. Suppose, then, that Bob
7
R:
a
b
e
f
c
g
h
i
O(log n/log B)
I/O overhead
d
j
k
l
m
Our Isogrammic OS method
Another
O(log n/log B)
I/O overhead
Figure 2: A high-level view of our BIOS ORAM scheme. c 2017 Michael Goodrich. Used with
permission.
creates two access sequences, σ1 and σ2 , and gives them to Alice, who then chooses one at random
and simulates it, as described above. For each access to a memory index, i, in the RAM simulation
for her chosen σj , the memory cell for i is read and written to by doing a search in R. The
important observation is that this access consists of O(log n/ log B) accesses a root-to-leaf sequence
of nodes of R, indexed by newly-generated independent random numbers each time. Thus, nothing
is revealed to Bob about the index, i. That is, the number of accesses in Alice’s simulation is the
same for σ1 and σ2 , and the sequence of keys used is completely independent of the choice of σ1 or
σ2 . Thus, Bob is not able to determine which of these sequences she chose with probability better
than 1/2.
As we show in the remainder of this paper, we can simulate an isogrammic access sequence
obliviously in a statistically secure manner with an I/O overhead that is O(log n/ log B) with
high probability. Combining this result with Theorem 1 gives us our claimed result that we can
perform statistically-secure ORAM simulation with an I/O overhead that, with high probability, is
O(log2 n/ log2 B). (See Figure 2.)
4
B-tree OS for Small Sets
In this section, we present an OS solution for small sets, that is, sets whose size, n, is O(B 3/2 ), and
small items, that is, items whose size is O(B 0 ) words, where B 0 = B 1/4 . This is admittedly a fairly
restrictive scenario, but it nevertheless is a critical component of our isogrammic OS scheme. We
show how, in this scenario, to use a B-tree to achieve statistical security for an OS simulation that
works for general sequences of put and get operations, not just isogrammic sequences. That is, in
this subsection, we allow for keys that are not necessarily random (so long as they are unique) and
we allow get(k) operations to return “not found” responses.
Suppose, then, that we wish to support an oblivious storage (OS) for a set of items that can
be as large as n = Θ(B 3/2 ). In this case, we utilize a B-tree, F , with branching factor, B 0 = B 1/4 ,
so its height is O(log n/ log B 0 ) = O(log n/ log B) = O(1), since we are restricting ourselves here to
sets of size at most O(B 3/2 ) and items of size O(B 0 ). Put another way, our restriction on the set
size, n, implies that B is Ω(n2/3 ) and B 0 is Ω(n1/6 ), that is, that B is Ω(B 1/4 n1/2 ).
8
√
Our small-set B-tree OS method is a modification and adaptation of the “ n ” solution of
Damgård et al. [6] to B-trees and the OS setting. Let F be our B-tree with capacity n and
branching factor B 0 ; hence, F has depth D = 4dlog n/ log Be, with n items stored in its leaves,
and randomly shuffled in an array of Bob’s storage of size O(nB 0 ) memory words. Initially, we
construct F using an initial set of items, which could even be empty. We pad the nodes of F with
empty dummy nodes, as necessary, to make every node of F have the same depth, D. An internal
B-tree node consists of B 0 keys; hence, a single message block can fit B 3/4 B-tree nodes or items
(since items are also of size B 0 here), that is, Ω(n1/2 ) B-tree nodes or items. In addition, we also
√
store a singly linked list, `, of Dd ne nodes, which are the same size as B-tree nodes and items
and are randomly shuffled in with the B-tree nodes of F .
We can initialize F in this way using the oblivious shuffling method of Goodrich and
Mitzenmacher [10]. In this context, where we are obliviously sorting nodes and items that are
themselves of size B 0 , their method involves a multi-way merging of sorted lists with a branching
factor of (M/B 0 )1/3 = Θ(n1/6 ), where the merging step involves a simple oblivious scanning of each
of these arrays. The merge in their method requires, in this context (where we are merging nodes
and items of size B 0 = Θ(n1/6 )) that there be
Ω((M/B 0 )2/3 B 0 + (M/B 0 )1/3 (B 0 )2 )
values stored in memory at any given time, which we can bound as Ω(n1/2 ) using the fact that, in
this case,
(M/B 0 )2/3 B 0 + (M/B 0 )1/3 (B 0 )2
is at least (n1/2 )2/3 n1/6 + (n1/2 )1/3 n1/3 , which equals 2n1/2 . Thus, we can scan each of the Θ(n1/6 )
sorted lists by reading Θ(n1/2 ) elements from each sorted list at a time (and stopping the recursion
when we reach lists of this size). This means that the total number of I/Os needed for this oblivious
shuffling is O((n/n1/2 ) log2M/B 0 (n/B 0 )) I/Os. Given our other assumptions about B and M , this
shuffling therefore requires at most O(n1/2 ) I/Os. In addition, we maintain D caches, C1 , . . . , CD ,
√
of size B 0 n each, one for each level of F . Thus, each cache can be read or written in O(1) I/Os.
square-root size
F
C3
C2
C1
a
a
b
c
f
b
c
d
h
e
f
g
h
i
j
k
l
m
Figure 3: A B-tree, F , and a hierarchy of Θ(log n/ log B) caches, C1 , C2 . . . . We shade the nodes
that have been accessed previously in grey. Each cache is associated with a specific level of F .
c 2017 Michael Goodrich. Used with permission.
Let us consider each type of access, with the design of making it impossible for Bob to determine
even if we are performing a get or put operation. In either a get(k) or put(k, v) operation, we begin
9
with a search for the key k in F . To perform such a search in F , we read each of the nodes in a
path, π, from the root of F to the leaf containing our search key, k, or its predecessor (if k is not in
our set, S). For each level, i, of F during this search, we first read (as one I/O), the cache, Ci , to
see if the i-th node, vi , of π is in Ci . If vi is in Ci , then we examine it and determine the location
of the next node, vi+1 , in π, and we read the next dummy node in ` (for the sake of obliviousness,
since the location of this dummy node looks random to Bob and has not been previously accessed).
If vi is not in Ci , then we read it in (this is the first time we are accessing vi and this location looks
to Bob to be random). We note that each such node is of size B 0 ; hence, it and each cache can be
read or written in O(1) I/Os. (See Figure 3.)
After we have completed the reading of all the nodes in π, we can perform any updating as
necessary for these nodes so as to perform the functionality of our get(k) or put(k, v) operation.
Without going into details (e.g., see [4, 5, 16]), either of these operations will either involve no
structural changes to F or will involve our adding O(1) nodes per level of F . Let π 0 denote the
set of updated nodes in F (which we can determine using Alice’s private memory). Note that each
internal node of F in π 0 will including pointers to existing nodes in F , but these have not yet been
accessed yet and we have not revealed any information about them to Bob. We then write the
nodes of π 0 out to Bob’s storage, placing each node, vi , on level of i of π, in the cache, Ci , using
O(1) I/Os for each level of F . In fact, we pad this set so that we always write the same number of
O(1) nodes to each Ci , based on standard update rules for B-trees (e.g., see [4, 5, 16]). We perform
this process in a bottom-up leaf-to-root fastion, so that we can inductively always be able to know
the locations for the child nodes for any node in F (even if that node is in a cache and some of its
children are in the lower-level cache). Thus, we can determine the locations in Bob’s storage for
any root-to-leaf path in F by reading the nodes and caches in Bob’s storage sequentially starting
√
from the root. After we have completed d ne accesses of F in this manner, we rebuild and reshuffle
F and a new linked list, `, and repeat this B-tree access procedure. This rebuilding and reshuffling
requires O(n1/2 ) I/Os, as described above. Thus, we have the following.
Theorem 2. Suppose we have a set, S, of up to n items, where each item is of size at most B 0 ,
where B 0 = B 1/4 , and n is O(B 3/2 ). Then our B-tree OS solution can implement an oblivious
storage for S that has an I/O overhead of O(log n/ log B) = O(1), with high probability. This
simulation is statistically secure, even for non-isogrammic access sequences.
Proof. With respect to the security of this method, note that each access involves a search of all
√
the caches of size n and an access to a distinct random location (which is either a real node or a
dummy node that Bob cannot tell apart) for each level of a shuffled B-tree, F , which was shuffled
obliviously and has every possible permutation of its nodes on that level as being equally likely. We
then access each cache for every level of F in a bottom-up fashion. Moreover, both the top-down
and bottom-up phases of this computation involve the same form of access irrespective of whether
we are performing a get or put operation. Thus, the adversary, Bob, can learn nothing about Alice’s
access sequence based on observing her access pattern. That is, in terms of the security game, Bob
is unable to distinguish between two access sequences, σ1 and σ2 , of length N for sets of up to n
items.
Since D is O(log n/ log B), and B is large enough for us to read an entire cache with one I/O, it
is easy to see that each access in this simulation requires O(log n/ log B) = O(1) I/Os. In addition,
√
after we have performed O( n) such accesses, we do a rebuilding action that requires O(n1/2 ) I/Os;
√
hence, this adds an amortized O(1) number of I/Os for each of the previous O( n) accesses. Thus,
10
the total I/O overhead is O(log n/ log B) = O(1), with high probability (where this probability is
dependent only on the algorithm we use for oblivious shuffling, e.g., see [10]).
This solution is a crucial component of our general isogrammic OS solution, which we describe
next.
5
Isogrammic Oblivious Storage
In this section, we describe our isogrammic OS scheme, which is able to obfuscate any isogrammic
access sequence with statistical security, achieving an I/O overhead that is O(log n/ log B) with high
probability. Our construction involves yet another use of B-trees, as a primary search structure, as
well as repeated uses of our B-tree OS for small sets from Section 4.
H:
a
b
1
2
c
3
4
5
d
6
7
8
9
Figure 4: An illustration of our isogrammic OS. The B-tree tree, H, is shown in black. Each
bucket, which implements our B-tree OS for small sets, is shown as a blue triangle. That is, each
triangle represents a bucket of up to B 3/2 items, which are accessed according to our B-tree OS
method of Section 4. c 2017 Michael Goodrich. Used with permission.
Let n be the size of a set for which we wish to support an oblivious storage (OS), and let H
be a static B-tree of height O(log n/ log B) with branching factor B 0 = B 1/4 , such that H has n/B
leaves. For every node, u in H, including both the internal nodes and leaves, we store a “bucket,”
bu , which maintains an instance of our B-tree OS, as described above in Section 4, and let each
such bucket have capacity 4L, where L = B 3/2 , except for leaves, which each have capacity 8L.
These buckets are used to store (k, v) items that are in the current set, i.e., items for which we
have processed a put(k, v) operation and have yet to perform a get(k) operation. See Figure 4.
Recall that in an isogrammic access sequence we are given a sequence of put(k, v) and get(k) such
that get(k) operations always have an item to return (i.e., there is a previous matching put(k, v)
operation) and put(k, v) operations never try to insert an item whose key matches the key of an
existing item. More importantly, every key contains a random nonce component of at least dlog ne
bits. We use these random nonces as the addresses for where items should go in H. Namely, we
maintain the following invariant throughout our OS simulation:
• For each item, (k, v), in our current set of items, (k, v) is stored in exactly one bucket, bu , for
a node, u, on the root-to-leaf search path in H for the random part of k.
11
Given this invariant, let us describe how we process put and get operations.
For a put(k, v) operation, we add (k, v) to the bucket, br , for the root, r, of H, using the B-tree
OS method described in Section 4. Note that this satisfies our invariant for storing items in H,
that is, storing an item in bucket for the root implies that it is stored in the root-to-leaf search path
for the random part of its key. (We will describe later what we do when the root bucket becomes
full, but that too will satisfy our invariant.) Then, for the sake of obliviousness (so Bob cannot tell
whether this operation is a get or put), we uniformly and independently choose a random key, k 0 ,
and traverse the root-to-leaf path in H for k 0 , performing a search for k 0 in the bucket, bu , for each
node u on this path, using the B-tree OS method described in Section 4. Alice just “throws away”
the results of these searches, but, of course, Bob doesn’t know this.
For any given get(k) operation, we begin, for the sake of obliviousness, by inserting a dummy
item, (k 0 , e), in the bucket, br , for the root, r, of H, where e is a special “empty” value (that
nevertheless has the same size as any other value) and k 0 is a random key, using the fusion-tree OS
method described in Section 4. So as to distinguish this type of dummy item from others, we refer
to each such dummy item as an original dummy item. We then traverse the root-to-leaf path, π,
for (the random part of) k in H, and, for each node, u, in π, we search in the bucket, bu , for u,
to see if the key-vaue pair for k is in this bucket, using the B-tree OS scheme described above in
Section 4. By our invariant, the item, (k, v), must be stored in the bucket for one of the nodes
in the path π. Note that we search in the bucket for every node in π, even after we have found
and removed the key-value pair, (k, v). Because we are simulating an isogrammic access sequence,
there will be one bucket with this item, but we search all the buckets for the sake of obliviousness.
An important consequence of the above methods and the fact that we are simulating an
isogrammic access sequence is that each traversal of a path in H is determined by a random
nonce that is chosen uniformly at random and is independent of every other nonce used to do a
search in H. Thus, the server, Bob, learns nothing about Alice’s access pattern from these searches.
In addition, as we will see shortly, the server cannot determine where any item, (k, v), is actually
stored, because the random part of the key k is only revealed when we do a get(k) operation and
put operations never reveal the locations of their keys. Moreover, we maintain the fact that the
server doesn’t know the actual location of any item, along with our invariant, even as bucket for a
node, u, becomes full and needs to have its items distributed to its children.
Periodically, so as to avoid overflowing buckets, we move items from a bucket, bu , stored at a
node u in H to u’s children, in a process we call a flush operation. In particular, we flush the root
node, r, every L put or get operations. We flush each internal node, u, after u has received B 0 flushes
from its parent, which each involve inserting exactly 4L/B 0 real and dummy items (including new
dummy items) into the bucket for u. Because of this functionality, and the fact that we are moving
items based on random keys, the number of real and original dummy items in the bucket, bu , at
a time when we are flusing a node u at depth i is expected to be L, and we maintain it to be at
most 4L. Also, note that we will periodically perform flush operations across all the nodes on a
given level of H at any given time when flush operations occur, which is the main reason why our
I/O overhead bounds are amortized. We don’t flush the leaf nodes in H, however. Instead, after
every leaf, u, in H has received B 0 flushes, we perform an oblivious compression to compress out
a sufficient number of dummy items so that the number of real and dummy items in u’s bucket is
4L. Thus, the bucket for a leaf never grows to have more than 8L real and dummy items. If, at
the time we are compressing the contents of a leaf bucket, we determine that there are more than
4L real items being stored in such a bucket, which, as we show, is an event that occurs with low
12
probability, then we restart the entire OS simulation. Such an event doesn’t compromise privacy,
since it depends only on random keys, not Alice’s data or access sequence. Thus, doing a restart
just impacts performance, but because restarts are so improbable, our I/O bounds still hold with
high probability.
At a high-level, our method for doing a flush operation at a node, u, in H has a similar structure
to an analogous operation in the Path ORAM scheme [25], as well as in the paper mentioned above
that is currently under submission for ORAM simulation when B and M are both very small. The
details for our flush operation here are different than both of these works, however, in that our
flush method depends crucially on the B-tree OS method of Section 4.
1. We obliviously shuffle the real and original dummy items of bu into an array, A, of size 4L,
stored at the server. This step will never overflow A (because of how we perform the rest
of the steps in a flush operation). This step can be done using known oblivious shuffling
methods (e.g., see [10]), which add just a constant I/O overhead factor.
2. For each child, xi , i = 1, 2, . . . , B 0 , of u, we create an array, Ai , of size 4L/B 0 .
3. We obliviously sort the real and original dummy items from A into the arrays, A1 , . . . , A` ,
according the keys for these items, so that the item, (k, v), goes to the array Ai if the next
O(log B 0 ) bits of the random part of key k would direct a search for k to the child xi . We
perform this oblivious sorting step so that if there are fewer than 4L/B 0 items destined for any
array, Ai , we pad the array with (new) dummy items to bring the number of items destined
to each array, Ai , to be exactly 4L/B 0 . However, if we determine from this oblivious sorting
step that there are more than 4L/B 0 real and original dummy items destined for any array,
Ai , which (as we show) is an event that occurs with low probability, then we restart the entire
OS simulation. Because this step is done obliviously and search keys are random (hence, they
never depend on Alice’s data values or access pattern), even if we restart, Bob learns nothing
about Alice’s access sequence during this step. So, let us assume that we don’t restart. This
step can be done using known oblivious sorting, padding, and partitioning methods (e.g.,
see [10]), which add only a constant I/O overhead factor.
4. For each real and dummy item (including both original and new dummy items), (k, v), in each
Ai , we insert (k, v) into the bucket bxi using the B-tree OS method of Section 4. This method
works only for small sets, but, of course, the number of items in each bucket determines such
a small set.
The first important thing to note about a flush operation is that it is guaranteed to preserve
our invariant that each item, (k, v), is stored in the bucket of a node in H on the root-to-leaf path
determined by the random part of k. Moreover, because we move real and original dummy items to
children nodes obliviously, in spite of our invariant, the server never knows where an item, (k, v),
is stored; hence, the server can never differentiate two access sequences more than at random.
Let us analyze the complexity of a flush operation. Since we flush the root every L steps, and
we flush every other node, u, at depth i, after it has received B 0 flushes, and both real and original
dummy items are mapped to u only if the first i log B 0 bits of each of their random keys matches
u’s address, the expected number of real and original dummy items stored in the bucket for u is
at most L at the time we flush u. In fact, this is a rather conservative estimate, since it assumes
that none of these items were removed as a result of get operations. More importantly, we have
the following.
13
Lemma 3. The number, f , of real and original dummy items flushed from a node, u, to one of
its children, xi , is never more than 4L/B 0 , with high probability. Likewise, a leaf in H will never
receive more than 4L real items, with high probability.
Proof. The expected value of f , which can be expressed as a sum of independent indicator random
variables, is at most
L/B 0 = B 3/2−1/4 = B 5/4 ≥ d log5/4 n,
for a constant, d ≥ 3, since we are assuming that B is Ω(log n). Thus, by a Chernoff bound (e.g.,
see [18]),
5/4
1/4
Pr(f ≥ 4L/B 0 ) ≤ e−L/B ≤ e−d log n ≤ n−3 log n .
The probability bound argument for a leaf in H is similar. The lemma follows, then, by a union
bound across all nodes of H and the polynomial length of access sequences.
Thus, with high probability, we never need to do a restart as a result of a potential overflow
during a flush operation.
Theorem 4. We can obliviously simulate an isogrammic sequence of a polynomial number of
put(k, v) and get(k) operations, for a data set of size n, with an I/O overhead of O(log n/ log B),
with high probability. Moreover, this simulation is statistically secure.
Proof. The height of the tree, H, is O(log n/ log B). Thus, by Theorem 2, with high probability, the
I/O overhead is proportional to a constant times O(log n/ log B), which is itself O(log n/ log B). For
the security claim, consider an instance of the simulation game, where Bob chooses two isogrammic
access sequences, σ1 and σ2 , of length N for a key set of size n, and gives them to Alice, who then
chooses one uniformly at random and simulates it according to the isogrammic OS scheme. Each
access that she does involves accessing a sequence of nodes of H determined by random keys and
for each node doing a lookup in an OS scheme that is itself statistically secure, by Theorem 2.
In addition, put operations add items at the top bucket and are obfuscated with data-oblivious
flush operations. Therefore, Bob is not able to distinguish between σ1 and σ2 any better than at
random.
6
Our BIOS ORAM Algorithm
Putting the above pieces together, then, gives us the following theorem, which is the main result
of this paper.
Theorem 5. Given a RAM algorithm, A, with memory size, n, where n is a power of 2, we can
simulate the memory accesses of A in an oblivious fashion that achieves statistical security, such
that, with high probability, the I/O overhead is O(log2 n/ log2 B) for a client-side private memory
of size M ≥ B and messages of size B ≥ 3 log n.
Proof. By Theorem 1, each access in A gets expanded into O(log n/ log B) operations in an
isogrammic access sequence, and, with high probability, each such operation has an overhead of
O(log n/ log B), by Theorem 4. The security claim follows from the security claims of Theorems 1
and 4.
14
7
Isogrammic Algorithm Design
In this section, we study the expressive power of the isogrammic access sequences, showing that it
subsumes some previous specialized design patterns for implementing algorithms in the cloud in a
privacy-preserving way. Thus, by Theorem 4, any algorithm designed in this framework, to give
rise to an isogrammic access sequence, can be simulated in an oblivious fashion to have an I/O
overhead that is O(log n/ log B), with high probability.
There are a number of previous algorithm-engineering design paradigms that can facilitate
privacy-preserving data access in the cloud, which, as we show, can be reduced to isogrammic
access sequences at only a constant cost per operation. Thus, the observations made in this section
may be of independent interest for these specialized applications.
7.1
Simulating Oblivious Data Structures
The first application we explore is for bounded-degree directed data structures in the oblivious data
structure framework of Wang et al. [27]. This framework applies to any data structure that has a
small number of “root” nodes for tree structures with bounded out-degree, such that updates and
accesses are done as a sequence of linked nodes starting from a root. Using a heuristic similar to
that used by Wang et al. [27], we can make any such access sequence isogrammic. Namely, let us
keep a random nonce, ru , of dlog ne bits for each node, u, in our data structure, and let us assign
the key for accessing a node u to be the pair, (ru , u). That is, any other node that points to u
will identify u using the pair (ru , u). The important observation is that any access sequence can
inductively be able to access nodes with their nonces, because bounded-degree data structures are
accessed starting from a root node; hence, any set of node updates performs its operations on a
path from a root and we can update each node on such a path in reverse order to have its new
random nonce. More importantly, for each node, x, that points to node u, we can also update x to
change its pointer to u to have u’s new nonce. Using such nonces as keys, therefore, gives rise to
an isogrammic access sequence; hence, our result from Theorem 4 applies to such scenarios. This
implies the existence of efficient oblivious simulations for access sequences involving stacks, queues,
and deques (which have just Θ(1) node updates per operation), as well as binary trees, such as
AVL trees and red-black trees (whose updates and searches can be padded to have Θ(log n) node
updates per operation). We summarize as follows.
Theorem 6. Any algorithm, A, written in the oblivious data structure framework, with boundeddegree tree nodes reachable from a constant number of “root” nodes, can be implemented as an
algorithm, A0 , in the isogrammic algorithm design paradigm such that each data access in A is
translated into O(1) accesses in A0 .
For example, we can create an isogrammic queue, Q, by using an array, A, of size n and a
dummy array, B, of size n, together with three global “root” indices, front, rear, and dummy.
Each time we access Q, for an enqueue, dequeue, or no-op operation, we read the front, rear, and
dummy variables. If this is a no-op operation (or this would be an error operation, like doing a
dequeue from an empty queue), then we next read the next dummy slot in B and we increment
the dummy variable. If this is a valid enqueue, then we increment rear and add the new element to
that location in A. If this is a valid dequeue, then we increment front and read the element from
the previous front location in A. Anytime we wrap around A or B, we increment a version counter
15
(associated with the global variables), so that we access the cells in A or B by index and version
counter. This implies that we always access the queue using an isogrammic access sequence.
7.2
Compressed Scanning
In addition, the compressed-scanning paradigm [14,15] also falls into our framework for isogrammic
access sequences. A compressed-scanning algorithm consists of t rounds, where each round involves
accessing each of the elements of a set, S, of n data items exactly once in a read-compute-write
operation. By introducing random nonces and assigning them to items for each round, we can easily
transform any algorithm in the compressed-scanning model into an isogrammic access sequence.
Thus, all of the graph algorithms presented in these papers [14, 15] can be simulated obliviously
with our isogrammic OS scheme. We summarize as follows.
Theorem 7. Any algorithm, A, written in the compressed-scanning framework can be implemented
as an algorithm, A0 , in the isogrammic algorithm design paradigm such that each data access in A
is translated into O(1) accesses in A0 .
8
Conclusion
In this paper we have shown how to improve the I/O overhead for statistically secure ORAM
simulation for a wide range of parameterized values for the client-side private memory size, M ,
and the size, B, of message blocks. Our results imply I/O overhead bounds that range from O(1)
to O(log2 n/(log log n)2 ), with high probability. For example, we can achieve an I/O overhead of
O(log
√ n), with high probability, for statistically secure ORAM simulation if B and M are at least
Ω(2 log n ), which is asymptotically smaller than n , for any constant 0 < ≤ 1.
For future work, it would be interesting to see if there is a super-logarithmic lower bound for the
I/O overhead for ORAM simulation for cases when B and M are small. Also, it would interesting
to see if it is possible to achieve √
an I/O overhead for statistically secure ORAM
simulation that is
√
O(log n) when B and M are o(2 log n ), i.e., asymptotically smaller than 2 log n .
Acknowledgments
This research was supported in part by the National Science Foundation under grant 1228639.
This article also reports on work supported by the Defense Advanced Research Projects Agency
(DARPA) under agreement no. AFRL FA8750-15-2-0092. The views expressed are those of the
authors and do not reflect the official policy or position of the Department of Defense or the
U.S. Government. We would like to thank Eli Upfal and Marina Blanton for helpful discussions
regarding the topics of this paper.
References
[1] D. Apon, J. Katz, E. Shi, and A. Thiruvengadam. Verifiable oblivious storage. In 17th Int.
Conf. on Practice and Theory in Public-Key Cryptography (PKC), volume 8383 of LNCS,
pages 131–148. Springer, 2014.
16
[2] D. Boneh, D. Mazières, and R. A. Popa. Remote oblivious storage: Making oblivious RAM
practical. Technical report, MIT CSAIL, 2011.
http://dspace.mit.edu/handle/1721.1/62006.
[3] K.-M. Chung, Z. Liu, and R. Pass. Statistically-secure ORAM with Õ(log2 n) overhead. In
20th ASIACRYPT, pages 62–81, 2014.
[4] D. Comer. Ubiquitous B-tree. ACM Comput. Surv., 11(2):121–137, June 1979.
[5] T. H. Cormen, C. E. Leiserson, R. L. Rivest, and C. Stein. Introduction to Algorithms. The
MIT Press, 3rd edition, 2009.
[6] I. Damgård, S. Meldgaard, and J. B. Nielsen. Perfectly secure oblivious RAM without
random oracles. In 8th Theory of Cryptography Conference (TCC), volume 6597 of LNCS,
pages 144–163. Springer, 2011.
[7] S. Devadas, M. Dijk, C. W. Fletcher, L. Ren, E. Shi, and D. Wichs. Onion ORAM: A
constant bandwidth blowup oblivious RAM. In 13th Int. Conf. on Theory of Cryptography
(TCC), volume 9563 of LNCS, pages 145–174. Springer, 2016.
[8] C. Gentry, K. A. Goldman, S. Halevi, C. Julta, M. Raykova, and D. Wichs. Optimizing
ORAM and using it efficiently for secure computation. In 13th Int. Symp. on Privacy
Enhancing Technologies (PETS), pages 1–18. Springer, 2013.
[9] O. Goldreich and R. Ostrovsky. Software protection and simulation on oblivious RAMs. J.
ACM, 43(3):431–473, May 1996.
[10] M. T. Goodrich and M. Mitzenmacher. Privacy-preserving access of outsourced data via
oblivious RAM simulation. In 28th Int. Colloq. on Automata, Languages and Programming
(ICALP), volume 6756 of LNCS, pages 576–587. Springer, 2011.
[11] M. T. Goodrich, M. Mitzenmacher, O. Ohrimenko, and R. Tamassia. Oblivious RAM
simulation with efficient worst-case access overhead. In 3rd Cloud Computing Security
Workshop, pages 95–100, 2011.
[12] M. T. Goodrich, M. Mitzenmacher, O. Ohrimenko, and R. Tamassia. Practical oblivious
storage. In 2nd ACM Conf. on Data and Application Security and Privacy (CODASPY),
pages 13–24, 2012.
[13] M. T. Goodrich, M. Mitzenmacher, O. Ohrimenko, and R. Tamassia. Privacy-preserving
group data access via stateless oblivious RAM simulation. In 23rd ACM-SIAM Symposium
on Discrete Algorithms (SODA), pages 157–167, 2012.
[14] M. T. Goodrich, O. Ohrimenko, and R. Tamassia. Graph drawing in the cloud: Privately
visualizing relational data using small working storage. In 20th Int. Symp. on Graph Drawing
(GD), volume 7704 of LNCS, pages 43–54. Springer, 2013.
[15] M. T. Goodrich and J. A. Simons. Data-oblivious graph algorithms in outsourced external
memory. In 8th Int. Conf. on Combinatorial Optimization and Applications (COCOA),
volume 8881 of LNCS, pages 241–257. Springer, 2014.
17
[16] M. T. Goodrich and R. Tamassia. Algorithm Design and Applications. Wiley Publishing, 1st
edition, 2014.
[17] E. Kushilevitz, S. Lu, and R. Ostrovsky. On the (in)security of hash-based oblivious RAM
and a new balancing scheme. In 23rd ACM-SIAM Symposium on Discrete Algorithms
(SODA), pages 143–156, 2012.
[18] M. Mitzenmacher and E. Upfal. Probability and computing: Randomized algorithms and
probabilistic analysis. Cambridge University Press, 2005.
[19] O. Ohrimenko, M. T. Goodrich, R. Tamassia, and E. Upfal. The Melbourne shuffle:
Improving oblivious storage in the cloud. In Int. Colloq. on Automata, Languages, and
Programming (ICALP), volume 8573 of LNCS, pages 556–567. Springer, 2014.
[20] L. Ren, C. W. Fletcher, A. Kwon, E. Stefanov, E. Shi, M. van Dijk, and S. Devadas. Ring
ORAM: Closing the gap between small and large client storage oblivious RAM, 2014.
Cryptology ePrint Archive, Report 2014/997, http://eprint.iacr.org/.
[21] L. Ren, X. Yu, C. W. Fletcher, M. van Dijk, and S. Devadas. Design space exploration and
optimization of path oblivious RAM in secure processors. In 40th ACM Int. Symp. on
Computer Architecture (ISCA), pages 571–582, 2013.
[22] E. Shi, T.-H. H. Chan, E. Stefanov, and M. Li. Oblivious RAM with O((log N )3 ) worst-case
cost. In 17th Int. Conf. on the Theory and Application of Cryptology and Information
Security (ASIACRYPT), volume 7073 of LNCS, pages 197–214. Springer, 2011.
[23] E. Stefanov and E. Shi. Multi-cloud oblivious storage. In 2013 ACM Conf. on Computer and
Communications Security (CCS), pages 247–258, 2013.
[24] E. Stefanov and E. Shi. ObliviStore: High performance oblivious cloud storage. In IEEE
Symp. on Security and Privacy (SP), pages 253–267, May 2013.
[25] E. Stefanov, M. van Dijk, E. Shi, C. Fletcher, L. Ren, X. Yu, and S. Devadas. Path ORAM:
An extremely simple oblivious RAM protocol. In ACM Conf. on Computer and
Communications Security (CCS), pages 299–310, 2013.
[26] X. Wang, H. Chan, and E. Shi. Circuit ORAM: On tightness of the Goldreich-Ostrovsky
lower bound. In 22nd ACM Conf. on Computer and Communications Security (CCS), pages
850–861, 2015.
[27] X. S. Wang, K. Nayak, C. Liu, T.-H. H. Chan, E. Shi, E. Stefanov, and Y. Huang. Oblivious
data structures. In ACM Conf. on Computer and Communications Security (CCS), pages
215–226, 2014.
18
| 8cs.DS
|
arXiv:1701.06849v1 [math.AC] 24 Jan 2017
SYMMETRIES AND CONNECTED COMPONENTS OF THE
AR-QUIVER
TONY J. PUTHENPURAKAL
Abstract. Let (A, m) be a commutative complete equicharacteristic Gorenstein isolated singularity of dimension d with k = A/m algebraically closed.
Let Γ(A) be the AR (Auslander-Reiten) quiver of A. Let P be a property
of maximal Cohen-Macaulay A-modules. We show that some naturally defined properties P define a union of connected components of Γ(A). So in this
case if there is a maximal Cohen-Macaulay module satisfying P and if A is
not of finite representation type then there exists a family {Mn }n≥1 of maximal Cohen-Macaulay indecomposable modules satisfying P with multiplicity
e(Mn ) > n. Let Γ(A) be the stable quiver. We show that there are many
symmetries in Γ(A). Furthermore Γ(A) is isomorphic to its reverse graph. As
an application we show that if (A, m) is a two dimensional Gorenstein isolated singularity with multiplicity e(A) ≥ 3 then for all n ≥ 1 there exists an
indecomposable self-dual maximal Cohen-Macaulay A-module of rank n.
1. introduction
Let us recall that a commutative Noetherian local ring (A, m) is called an isolated
singularity if AP is a regular local ring for all prime ideals P 6= m. We note
that with this definition if A is Artinian then it is an isolated singularity. This is
not a usual practice, nevertheless in this paper Artin rings will be considered as
isolated singularities. Also recall that if a local Noetherian ring (B, n) is Henselian
then it satisfies Krull-Schmidt property, i.e., every finitely generated B-module is
uniquely a direct sum of indecomposable B-modules. Now assume that B is CohenMacaulay. Then we say B is of finite (Cohen-Macaulay) representation type if B
has only finitely many indecomposable maximal Cohen-Macaulay B-modules. In a
remarkable paper Auslander proved that in this case B is an isolated singularity,
for instance see [23, Theorem 4.22].
To study (not necessarily commutative) Artin algebra’s Auslander and Reiten introduced the theory of almost-split sequences. These are now called AR-sequences.
The AR-sequences are organized to form the AR-quiver. Later Auslander and Reiten extended the theory of AR-sequences to the case of commutative Henselian
isolated singularities.
If (A, m) is a Henselian Cohen-Macaulay isolated singularity then we denote its
AR-quiver by Γ(A). A good reference for this topic is [23]. The motivation for
this paper comes from the following crucial fact about AR quivers (under some
conditions on A), see [23, 6.2]:
Date: January 25, 2017.
1991 Mathematics Subject Classification. Primary 13 C14, Secondary 13H10, 14B05.
Key words and phrases. Artin-Reiten Quiver, Hensel rings, indecomposable modules, Ulrich
modules, periodic modules, Non-periodic modules with bounded betti numbers.
1
2
TONY J. PUTHENPURAKAL
If C is a non-empty connected component of Γ(A) and if A is not of finite
representation type then there exist a family {Mn }n≥1 of maximal Cohen-Macaulay
indecomposable modules in C with multiplicity e(Mn ) > n.
Let P be a property of maximal Cohen-Macaulay A-modules. We show that
some naturally defined properties P define a union of connected components of the
AR quiver of A. Thus the above mentioned observation still holds. Therefore if
there is a maximal Cohen-Macaulay module satisfying P then there exists a family
{Mn }n≥1 of maximal Cohen-Macaulay indecomposable modules satisfying P with
multiplicity e(Mn ) > n.
1.1. For the rest of the paper let us assume that (A, m) is a complete equicharacteristic Gorenstein isolated singularity of dimension d. Assume k = A/m is
algebraically closed. Some of our results are applicable more generally. However
for simplicity we will make this hypothesis throughout this paper. We will also
assume that A does not have finite representation type. This is automatic if A is
not a hypersurface, see [23, 8.15]. Furthermore if A is a hypersurface ring with
dim A ≥ 2 and e(A) ≥ 3 then also A is not of finite representation type.
Now we describe our results. We first describe our results on
Connected Components of the AR-quiver:
I: Modules with periodic resolution:
Let M be a maximal Cohen-Macaulay non-free A-module. Let Syzn (M ) be the
nth -syzygy module of M . We say M has periodic resolution if there exists a nonnegative integer n and a positive integer p with Syzn+p (M ) ∼
= Syzn (M ). The
smallest p for which this holds is called the period of the resolution. We say M has
property P if it has a periodic resolution.
If A is a hypersurface ring then any non-free maximal Cohen-Macaulay A-module
has periodic resolution with period ≤ 2 and in fact Syz3 (M ) ∼
= Syz1 (M ). There
exits maximal Cohen-Macaulay modules with periodic resolutions if A is a complete
intersection of any codimension c ≥ 1. Again it can be shown that in this case the
period is ≤ 2 and in fact Syz3 (M ) ∼
= Syz1 (M ).
For general Gorenstein local rings there is no convenient criterion to determine
when A has a module with perodic resolution (however see [11, 5.8] for a criterion).
It was conjectured by Eisenbud that if a module M has a periodic resolution then
the period is ≤ 2, see [13, p. 37]. This was disproved by Gasharov and Peeva, see
[14, Theorem 1.3].
Our first result is
Theorem 1.2. (with hypotheses as in 1.1.) If A is not a hypersurface ring then P
defines a union of connected components of Γ(A).
We now give more refined versions of Theorem 1.2:
1.3. Assume A = Q/(f ) where (Q, n) is a Gorenstein local ring and f ∈ n2 is a
Q-regular element.
Let M be a maximal Cohen-Macaulay non-free A-module. We say M has property PQ if projdimQ M finite. In this case it is easy to prove that M has a periodicresolution over A with period ≤ 2. There is essentially a unique method to construct
non-free maximal Cohen-Macaulay modules over A having finite projective dimension over Q. This is essentially due to Buchweitz et al, see [10, 2.3]. Also see the
paper [17, 1.2] by Herzog et al. Our next result is:
SYMMETRIES AND CONNECTED COMPONENTS OF THE AR-QUIVER
3
Theorem 1.4. [ with hypotheses as in 1.3.] If Q is not regular then PQ defines a
union of connected components of Γ(A).
Again our results implies existence of indecomposable maximal Cohen-Macaulay
A-modules with arbitrarily high multiplicity and satisfying property PQ . However
our method does not give a way to construct these modules.
1.5. Eisenbud’s conjecture (as stated above) is valid if M has the so-called finite
CI-dimension [3, 7.3]. We say M has property PO if M has finite CI-dimension
over A and has a periodic resolution over A. We say M has property PE if M has
periodic resolution over A but it has infinite CI dimension over A. Our next result
is
Theorem 1.6. [with hypotheses as in 1.1.] Assume A is not a hypersurface.
(1) PO defines a union of connected components of Γ(A).
(2) PE defines a union of connected components of Γ(A).
We note that in [14, 3.1] a family Aα of an Artininian Gorenstein local ring
is constructed with each having a single module Mα having periodic resolution
of period > 2 is given. As the period of Mα is greater than two it cannot have
finite CI-dimension over Aα . Thus our result implies existence of indecomposable
modules with arbitrary length, having a periodic resolution and having infinite CI
dimension over Aα .
Note that till now our results does not give any information regarding period’s.
In dimension two we can say something, see Theorem 1.15.
1.7. Now assume that A is a complete intersection of codimension c ≥ 2. There
is a theory of support varieties for modules over A. Essentially for every finitely
generated module E over A an algebraic set V (E) in the projective space Pc−1 is
attached, see [4, 6.2]. Conversely it is known that if V is an algebraic set in Pc−1
then there exists a finitely generated module E with V (E) = V , see [7, 2.3]. It is
known that V (Syzn (E)) = V (E) for any n ≥ 0. Thus we can assume E is maximal
Cohen-Macaulay. If E has periodic resolution over A then V (E) is a finite set of
points. The converse is also true. If further E is indecomposable then V (E) is
a singleton set, see [7, 3.2]. Let a ∈ Pc−1 . We say a maximal Cohen-Macaulay
A-module M satisfies property Pa if V (M ) = {a}. We prove:
Theorem 1.8. [ with hypotheses as in 1.7.] Let a ∈ Pc−1 . Then Pa defines a
union of connected components of Γ(A). Conversely if C is a non-empty connected
component of Γ(A) containing a periodic module M then for any [N ] ∈ C we have
V (N ) = V (M )(= {p}). In particular Γ(A) has at least |k| connected components.
II Modules with bounded betti-numbers but not having a periodic resolution:
For a long time it was believed that if a module M has a bounded resolution (i.e.,
there exists c with βi (M ) ≤ c for all i ≥ 0) then it is periodic. If A is a complete
intersection then modules having bounded resolutions are periodic [13, 4.1]. In [14,
3.2] there are examples of modules M having a bounded resolution but M is not
periodic.
If M is a maximal Cohen-Macaulay A-module having a bounded resolution but
M is not periodic then we say that M has property BN P . We prove
Theorem 1.9. [with hypotheses as in 1.1.] BN P defines a union of connected
components of Γ(A).
4
TONY J. PUTHENPURAKAL
We note that if M has bounded resolution but not periodic then there exists c
with e(Syzn (M )) ≤ c for all n ≥ 0. Our result implies the existence of modules
with bounded but not periodic resolution of arbitrary multiplicity.
III: Ulrich modules:
Let M be a maximal Cohen-Macaulay A-module. It is well-known that e(M ) ≥
µ(M ) (here µ(M ) denotes the cardinality of a minimal generating set of M ) A maximal Cohen-Macaulay module M is said to be an Ulrich module if its multiplicity
e(M ) = µ(M ). In this case we say M has property U.
If dim A = 1 then A has a Ulrich module. It is known that if A is a strict
complete intersection of any dimension d then it has a Ulrich module, see [17,
2.5]. In particular if A is a hypersurface ring then it has a Ulrich module. There
are some broad class of examples of Gorenstein normal domain (but not complete
intersections) of dimension two that admit an Ulrich module see [8, 4.8]. However
there are no examples of Gorenstein local rings R ( but not complete intersections)
with dim R ≥ 3 such that R admits an Ulrich module (note we are not even insisting
that R is reduced).
Even if A is a hypersurface there is essentially a unique way to construct an
Ulrich modules. We show
Theorem 1.10. [ with hypotheses as in 1.1.] Further assume that either A is a
hypersurface ring of even dimension d ≥ 2 and multiplicity e(A) ≥ 3 OR A is
Gorenstein of dimension two. Then U defines a union of connected components of
Γ(A).
The reason we cannot say anything about Ulrich modules over hypersurface rings
of odd dimension is due to a peculiar nature of AR-sequences, see remark 8.2. Also
note that if e(A) = 2 then any non-free MCM A-module is an Ulrich module.
We now describe our result on:
Symmetries of AR-quiver:
Let Γ0 (A) be the connected component of Γ(A) containing the vertex [A]. Set
e
Γ(A)
= Γ(A) \ Γ0 (A). Let Γ(A) denote the stable AR-quiver of A, i.e., we delete
the vertex [A] from Γ(A) and all arrows connecting to [A]. Also set Γ0 (A) to be
the stable part of Γ0 (A).
Our starting point is the observation that for Klienian singularities Γ(A) is trivially isomorphic to its reverse graph (see [23, p. 95]). Recall if G is a directed graph
then it’s reverse graph Grev is a graph with the same vertices as G and there is an
arrow from vertex u to v in Grev if and only if there is an arrow from vertex v to
u in G. In fact we construct
Theorem 1.11. [with hypotheses as in 1.1.] There exists isomorphisms
D, λ : Γ(A) → Γ(A)rev as graphs. If A is not a hypersurface ring then
(1) D 6= λ.
(2) There exists indecomposable maximal Cohen-Macaulay modules M, N with
λ(M ) 6= M and D(N ) 6= N .
The first isomorphism D is just the dual functor. The next map λ arises in the
theory of horizontal linkage defined by Martsinkovsky and Strooker, see [20, p. 592].
We note that the assumption A not a hypersurface is essential for the later part of
Theorem 1.11, for in the case of Klienian singularities it is known that λ(M ) = M
for each non-free indecomposable M , see [20, Theorem 3].
SYMMETRIES AND CONNECTED COMPONENTS OF THE AR-QUIVER
5
1.12. For n ≥ 0 let Syzn be the nth syzygy functor. As A is Gorenstein we can
also define for integers n ≤ −1 the nth cosyzygy functor which we again denote
with Syzn . By the definition of horizontal linkage we have Syz−1 ◦D = λ. Thus
Syz−1 = λ ◦ D−1 and Syz1 = D ◦ λ−1 . So under the assumptions as in 1.1 we get
that Syzn : Γ(A) → Γ(A) is an isomorphism for all n ∈ Z. We prove:
Theorem 1.13. [ with hypotheses as in 1.1] Let C be a connected component of
Γ(A). For [M ] ∈ C, set I(M ) = {n | [Syzn (M )] ∈ C}. Then
(1) I(M ) is an ideal in Z (possibly zero).
(2) I(N ) = I(M ) for all [N ] ∈ C.
If A is not of finite representation type then there is practically no information on
connected components of Γ(A). The only case known is when A is a hypersurface
e
there is information on connected components of Γ(A),
see [12, Theorem I]. It is
easy to show that Γ0 (A) has only finitely many components. As an application of
Theorem 1.13 we show:
Corollary 1.14. [with hypotheses as in 1.1.] Assume further that A is not a
hypersurface ring. Let D be a connected component of Γ0 (A). Then
(1) D has infinitely many vertices.
(2) The function [M ] → e(M ) is unbounded on D.
Structure of the AR-quiver:
If A is of finite representation type then the structure of the AR-quiver is known,
see [23]. For hypersurface rings which are not of finite representation type there is
some information regarding connected components of A not containing the vertex
[A]. For two dimensional Gorenstein rings we show:
Theorem 1.15. [with hypothesis as in 1.1.] Assume dim A = 2 and e(A) ≥ 3. Let
C be a non-empty component of Γ(A). Then C is of the form
M1 ⇆ M2 ⇆ M3 ⇆ M4 ⇆ · · · ⇆ Mn ⇆ · · ·
where e(Mn ) = ne(M1 ) for all n ≥ 1. Furthermore
(1) If C = Γ0 (A) then M1 = A. Furthermore Mn∗ ∼
= Mn for all n ≥ 1.
(2) Assume now that A is not a hypersurface ring. Then
(a) If Mj is periodic with period c for some j then Mn is periodic with period
c for all n ≥ 1.
(b) Let C denote the stable part of C. Let [Mi ] ∈ C. If the Poincare series of
Mi is rational then the Poincare series of M is rational for all [M ] ∈ C.
Furthermore all of them share a common denominator.
In the Theorem above the Poincare series PM (z) of a module M is
A
n
n≥0 dimk Torn (M, k)z . We also note that the structure of all components of
Γ(A) \ Γ0 (A) is already known, see [6, 4.16.2].
We have several interesting consequences of Theorem 1.15. A direct consequence
of this theorem is that if dim A = 2 and e(A) ≥ 3 then for all n ≥ 1 there exist’s an
indecomosable maximal Cohen-Macaulay A-module Mn of rank n with Mn∗ ∼
= Mn .
I do not know whether such a result holds for higher dimensional rings.
A simple consequence of Theorem’s 1.15 and 1.13 is the following:
P
Corollary 1.16. [with hypotheses as in 1.1.] Assume A is not a hypersurface ring.
Also assume dim A = 2. Then Syzn (Γ0 (A)) are distinct for all n ∈ Z, n 6= 0.
6
TONY J. PUTHENPURAKAL
We now describe in brief the contents of this paper. In section two we discuss
some preliminary results that we need. In section three we discuss lifts of irreducible
maps. In the next section we dicuss non-free indecomosable summands of maximal
Cohen-Macaulay approximation of the maximal ideal. In section five we give proof’s
of Theorem’s 1.2, 1.4 and 1.6. In the next section we give a proof of Theorem 1.8. In
section seven we discuss our notion of quasi AR-sequences and in the next section
we give a proof of Theorem 1.10. In section nine we prove Theorem 1.11. In
the next section we give a few obstructions to existence of quasi-AR sequences.
In section 11 we describe the describe Γ0 (A) when A is a two dimensional with
e(A) ≥ 3. In section twelve we give a proof of Theorem 1.15 and Corollary 1.16. In
the last section we discuss curvature and complexity of MCM modules and as an
application give a proof of Theorem 1.9
Remark 1.17. Srikanth Iyengar informed me about the excellent paper [15] where
the authors considered AR-quiver of self-injective Artin algebra’s. Note that commutative Artin Gorenstein rings is an extremely special case of self-injective Artin
Algebra’s. So our results in this case is sharper than that of [15]. I do not beleive
that the results of this paper when A is commutative Artin Gorenstein ring will
hold for the more general case of self-injective Artin algebra’s. I also thank Dan
Zacharia and Lucho Avramov for some useful discussions.
2. Some Preliminaries
In this paper all rings will be Noetherian local. All modules considered are finitely
generated. Let (A, m) be a local ring and let k = A/m be its residue field. If M is
an A-module then µ(M ) = dimk M/mM is the number of a minimal generating set
of M . Also let ℓ(M ) denote its length. In this section we discuss a few preliminary
results that we need.
th
2.1. Let M be an A-module.
βi (M ) = dimk TorA
i (M, k) be its i
P For i ≥ 0 let
n
betti-number. Let PM (z) = n≥0 βn (M )z , the Poincare series of M . Set
cx(M ) = inf{d | lim sup
βn (M )
< ∞}
nd−1
and
1
curv M = lim sup(βn (M )) n .
It is possible that cx(M ) = ∞, see [5, 4.2.2]. However curv(M ) is finite for any
module M [5, 4.1.5]. It can be shown that if cx(M ) < ∞ then curv(M ) ≤ 1.
2.2. It can be shown that for any A-module M we have
cx(M ) ≤ cx(k)
and
curv(M ) ≤ curv(k).
see [5, 4.2.4].
2.3. If A is a complete intersection of co-dimension c then for any A-module M
we have cx(M ) ≤ c. Furthermore for each i = 0, . . . , c there exists an A-module
Mi with cx(Mi ) = i. Also note that cx(k) = c. [5, 8.1.1(2)]. If A is a complete
intersection and M is a module with cx(M ) = cx(k) then we say M is extremal.
2.4. If A is not a complete intersection then curv(k) > 1. [5, 8.2.2]. In this case
we say a module M is extremal if curv(M ) = curv(k).
SYMMETRIES AND CONNECTED COMPONENTS OF THE AR-QUIVER
7
2.5. Let M, N be A-modules and let f : M → N be A-linear. Let FM be a minimal
resolution of M and let FN be a minimal resolution of N . Then f induces a lift
fe: FM → FN . This map fe is unique up to homotopy. The chain map fe induces an
A-linear map fn : Syzn (M ) → Syzn (N ) for all n ≥ 1.
2.6. Denote by β(M, N ) the set of A-homomorphisms of M to N which pass
through a free module. That is, an A-linear map f : M → N lies in β(M, N ) if and
only if it factors as
M❇
❇❇
❇❇f
u
❇❇
❇
/N
F
v
where F ∼
= A for some n ≥ 1.
n
Remark 2.7. If f : M → N is A-linear and if f1 , f1′ : Syz1 (M ) → Syz1 (N ) are two
lifts of f then it is well known and easily verified that f1 −f1′ ∈ β(Syz1 (M ), Syz1 (N )).
Recall that an A-module M is called stable if M has no free summands. We
need the following:
Proposition 2.8. Let (A, m) be a Noetherian local ring and let M, N be A-modules.
Set Λ = EndA (M ) and r = rad Λ. Let f ∈ Λ. Also suppose there exists A-linear
maps u : M → N and v : N → M . Set g = v ◦ u.
(1) If f (M ) ⊆ mM then f ∈ r.
(2) If M is stable and f ∈ β(M, M ) then f ∈ r.
(3) If 1 − g ∈ r then u is a split mono and v is a split epi.
Proof. (1) This is well known.
(2) Assume f = β ◦ α where α : M → F and β : F → M and F ∼
= An . As M
is stable it follows that α(M ) ⊆ mF and so f (M ) ⊆ mM . The result follows from
(1).
(3) Let 1 − g = h where h ∈ r. Then g = 1 − h is invertible in Λ. So there exists
τ ∈ Λ with τ ◦ g = g ◦ τ = 1M . The result follows.
2.9. Now assume A is Cohen-Macaulay. Let M, N be maximal Cohen-Macaulay
A-modules and let f : M → N be A-linear. Recall f is said to be irreducible if
(1) f is not a split epimorphism and not a split monomorphism.
(2) If X is a maximal Cohen-Macaulay A-module and if there is a commutative
diagram
M❇
❇❇
❇❇f
u
❇❇
❇
X v /N
then either u is a split monomorphism or v is a split epimorphism.
Remark 2.10. Let (A, m) be a Cohen-Macaulay local ring. If M is a maximal
Cohen-Macaulay A-module then it is easy to verify that Syzn (M ) is stable for each
n ≥ 1.
8
TONY J. PUTHENPURAKAL
2.11. Suppose M is a maximal Cohen-Macaulay over a local Gorenstein ring A.
Then M ∗ = HomA (M, A) is also a maximal Cohen-Macaulay module. Furthermore
ExtiA (M, A) = 0 for i > 0. We also have (M ∗ )∗ ∼
= M . Notice if
α
α
2
1
M3 → 0,
M2 −→
0 → M1 −→
is a short exact sequence of maximal Cohen-Macaulay A-modules then we have the
following short exact sequence
α∗
α∗
2
1
0 → M3∗ −−→
M2∗ −−→
M1∗ → 0,
of maximal Cohen-Macaulay A-modules.
Remark 2.12. Let (A, m) be a Gorenstein local ring and let M be a maximal
Cohen-Macaulay A-module. Then there exists exact sequences of the form
0 → M → F → M1 → 0,
with F free and M1 maximal Cohen-Macaulay.
Remark 2.13. Due to 2.11 the following assertions hold:
Let M1 , M2 and N1 , N2 are maximal Cohen-Macaulay A-modules and let F, G be
free A-modules. Suppose we have exact sequences:
0 → M1 → F → M2 → 0 and 0 → N1 → G → N2 → 0.
If there exists an A-linear map ψ1 : M1 → N1 then:
(1) there exists A-linear maps ψ2 : M2 → N2 and φ : F → G such that the
following diagram commutes:
0
/ M1
0
/ N1
ψ1
′
/F
/ M2
φ
/G
/0
ψ2
/ N2
/0
′
(2) If ψ : M2 → N2 and φ : F → G are another pair of maps such that the
above commutative diagram holds then ψ2 − ψ2′ ∈ β(M2 , N2 ).
Definition 2.14. (with hypotheses as in 2.13.) We call ψ2 to be a pre-lift of ψ1 .
The following is an easy consequence of 2.11.
Proposition 2.15. Let (A, m) be a local Gorenstein ring and let M, N be maximal
Cohen-Macaulay A-modules. Let f : M → N be A-linear and let f ∗ : N ∗ → M ∗ be
the induced map. We have:
(1) f is a split mono if and only if f ∗ is a split epi.
(2) f is a split epi if and only if f ∗ is a split mono.
(3) f is irreducible if and only if f ∗ is irreducible.
2.16. Let (A, m) be a Gorenstein local ring. Let us recall the definition of CohenMacaulay approximation from [1]. A Cohen-Macaulay approximation of an Amodule M is an exact sequence
0 −→ Y −→ X −→ M −→ 0,
where X is a maximal Cohen-Macaulay A-module and Y has finite projective dimension. Such a sequence is not unique but X is known to unique up to a free
SYMMETRIES AND CONNECTED COMPONENTS OF THE AR-QUIVER
9
summand and so is well defined in the stable category CM(A). We denote by X(M )
the maximal Cohen-Macaulay approximation of M
2.17. If M is Cohen-Macaulay then maximal Cohen-Macaulay approximation of
M are very easy to construct. We recall this construction from [1]. Let n =
codim M = dim A − dim M . Let M ∨ = ExtnA (M, A). It is well-known that M ∨ is
Cohen-Macaulay module of codim n and M ∨∨ ∼
= M . Let F be any free resolution
of M ∨ with each Fi a finitely generated free module. Note F need not be minimal
∂n
Fn−1 ). Then note Sn (F) is
free resolution of M . Set Sn (F) = image(Fn −→
maximal Cohen-Macaulay A-module. It can be easily proved that X(M ) ∼
= Sn (F)∗
in CM(A).
The following result is well-known and easy to prove.
Proposition 2.18. Let (A, m) be a Gorenstein local ring and let M be an A-module.
Then
X(Syz1 (M )) ∼
= Syz1 (X(M ))
in CM(A).
3. Lifts of irreducible maps
In this section (A, m) is a Gorenstein local ring, not necessarily an isolated singularity. Also A need not be Henselian.
The following is the main result of this section.
Theorem 3.1. (with hypotheses as above.) Let M, N be stable maximal CohenMacaulay A-modules and let f : M → N be A-linear. Let f1 : Syz1 (M ) → Syz1 (N )
be any lift of f . If f is irreducible then f1 is also an irreducible map.
We need a few preliminaries to prove Theorem 3.1.
We first prove:
Lemma 3.2. Let (A, m) be a local Gorenstein ring and let M, N be stable maximal
Cohen-Macaulay A-modules. Let f : M → N be A-linear and let δ ∈ β(M, N ). If
f is irreducibe then so is f + δ.
∼ An . As M is
Proof. Assume δ = v ◦ u where u : M → F and v : F → N and F =
stable it follows that u(M ) ⊆ mF and so δ(M ) ⊆ mN .
Claim-1: f + δ is not a split mono.
Suppose it is so. Then there exists σ : N → M with σ ◦ (f + δ) = 1M . So
σ ◦ f + σ ◦ δ = 1M . As δ(M ) ⊆ mN we get σ ◦ δ(M ) ⊆ mM . It follows that
σ ◦ δ ∈ rad EndA (M ). By 2.8(3) it follows that f is a split mono. This is a
contradiction as f is irreducible.
Claim-2: f + δ is not a split epi.
Suppose it is so. Then there exists σ : N → M with (f +δ)◦σ = 1N . So f ◦σ+δ◦σ =
1N . Notice
δ ◦ σ(N ) ⊂ δ(M ) ⊆ mN.
It follows that δ ◦ σ ∈ rad EndA (N ). By 2.8(3) it follows that f is a split epimorphism. This is a contradiction as f is irreducible.
10
TONY J. PUTHENPURAKAL
Claim 3: Suppose X is maximal Cohen-Macaulay and we have a commutative
diagram
M❇
❇❇
❇❇f +δ
g
❇❇
❇
/N
X
h
then either g is a split monomorphism or h is a split epimorphism.
Proof of Claim 3: Notice we have a commutative diagram
M●
●●
●●f
●●
(g,−u)
●●
#
/N
X ⊕F
h+v
As f is irreducible either (g, −u) is a split mono or h + v is a split epi. We assert:
Subclaim-1: If (g, −u) is a split mono then g is a split mono.
Subclaim-2: If h + v is a split epi then h is a split epi.
Notice that Subclaim 1 and 2 will finish the proof of Claim 3. Also Claims 1,2,3
implies the assertion of the Lemma. We now give:
Proof of Subclaim-1: As (g, −u) is a split mono there exits σ : X ⊕ F → M such
that σ ◦(g, −u) = 1M . Write σ = σ1 +σ2 where σ1 : X → M and σ2 : F → M . Thus
we have σ1 ◦ g − σ2 ◦ u = 1M . As M is stable u(M ) ⊆ mF . So σ2 ◦ u(M ) ⊆ mM .
Thus σ2 ◦ u ∈ rad EndA (M ). It follows from 2.8(3) that g is a split mono.
We now give:
Proof of Subclaim-2: As h + v is a split epi there exists σ : N → X ⊕ F with
(h + v) ◦ σ = 1N . Write σ = (σ1 , σ2 ) where σ! : N → X and σ2 : N → F . It follows
that h ◦ σ1 + v ◦ σ2 = 1N .
As N is stable σ2 (N ) ⊆ mF . So v ◦ σ2 (N ) ⊆ mN . Thus v ◦ σ2 ∈ rad EndA (N ).
It follows from 2.8(3) that h is a split epi.
We also need
Lemma 3.3. Let (A, m) be a Gorenstein local ring and let M be a stable maximal
Cohen-Macaulay A-module. Let F = Aµ(M) and let ǫ : F → M be a minimal map.
Set M1 = ker ǫ ∼
= Syz1 (M ). Let X be another maximal Cohen-Macaulay A-module
(not necessarily stable) and let η : G → X be a projective cover (not necessarily
minimal). Let X1 = ker η. Let α : M → X be A-linear and let α1 : M1 → X1 be
any lift of α. If α is a split mono then α1 is a split mono.
Proof. We note that M1 is also stable. Let φ : X → M be such that φ ◦ α = 1M .
Let φ1 : X1 → M1 be a lift of φ. Then note that φ1 ◦ α1 is a lift of 1M . Thus
φ1 ◦ α1 − 1 ∈ β(M1 , M1 ). The result now follows from 2.8.
The following is a dual version of Lemma 3.3 and can be proved similarly.
Lemma 3.4. Let (A, m) be a Gorenstein local ring and let N be a stable maximal
Cohen-Macaulay A-module. Let F = Aµ(N ) and let ǫ : F → N be a minimal map.
Set N1 = ker ǫ ∼
= Syz1 (N ). Let X be another maximal Cohen-Macaulay A-module
(not necessarily stable) and let η : G → X be a projective cover (not necessarily
minimal). Let X1 = ker η. Let β : X → N be A-linear and let β1 : X1 → N1 be any
lift of α. If β is a split epi then β1 is a split epi.
SYMMETRIES AND CONNECTED COMPONENTS OF THE AR-QUIVER
11
We now give:
Proof of Theorem 3.1. Set M1 = Syz1 (M ) and N1 = Syz1 (N ).
Claim-1: f1 is not a split mono.
Suppose if possible f1 is a split mono. Then there exists σ1 : N1 → M1 with
σ1 ◦ f1 = 1M1 . Let σ : N → M be a pre-lift of σ (see 2.14 for this notion). Then
σ ◦ f is a pre-lift of 1M1 . Notice 1M is a pre-lift of of 1M1 . Then by 2.13 we get
that 1M − σ ◦ f ∈ β(M, M ). As M is stable we get by 2.8 that f is a split mono.
This is a contradiction as f is irreducible.
Claim-2: f1 is not a split epi.
Suppose if possible f1 is a split epi. Then there exists σ1 : M1 → N1 with f1 ◦ σ1 =
1N1 . Let σ : N → M be a pre-lift of σ. Then f ◦ σ is a pre-lift of 1N1 . Notice 1N is
a pre-lift of of 1N1 . Then by 2.13 we get that 1N − f ◦ σ ∈ β(N, N ). As N is stable
we get by 2.8 that f is a split epi. This is a contradiction as f is irreducible.
Claim-3: If X1 is a maximal Cohen-Macaulay A-module and if there is a commutative diagram
M1 ❈
❈❈ f
❈❈ 1
u1
❈❈
❈!
X1 v1 / N1
then either u1 is a split monomorphism or v1 is a split epimorphism.
Proof of Claim-3: By 2.12 there exists an exact sequence
0 → X1 → L → X → 0,
with L1 free and X maximal Cohen-Macaulay.
Let u : M → X be a pre-lift of u1 and let v : X → N be a pre-lift of v1 . Then
notice v ◦ u is a pre-lift of f1 = v1 ◦ u1 . As f by definition is a pre-lift of f1 we get
that v ◦ u = f + δ for some δ ∈ β(M, N ).
By 3.2 we get that f + δ is irreducible. So u is a split mono or v is a split epi.
By Lemma’s 3.3 and 3.4 we get that u1 is a split mono or v1 is a split epi.
By Claims 1, 2 and 3 the result follows.
4. Indecomposable non-free summands of
maximal Cohen-Macaulay approximation of the maximal ideal
In this section (A, m) is a Henselian Gorenstein local ring. Let X(m) be a
maximal Cohen-Macaulay approximation of the maximal ideal. In this section we
are concerned with non-free indecomposable summands of X(m). Our results are:
Theorem 4.1. Let (A, m) be a Henselian Gorenstein local ring of dimension d and
let X(m) be a maximal approximation of m. Let M be an indecomposable non-free
summand of X(m). Then M is extremal, i.e.,
(1) If A is a complete intersection of codimension c then cx(M ) = cx(k) = c.
(2) If A is not a complete intersection then curv(M ) = curv(k) > 1.
We also prove:
Theorem 4.2. Let (A, m) be a Henselian Gorenstein local ring of dimension d ≥ 1
and infinite residue field k. Let e(A) ≥ 3. Assume either dim A = 2 or A is a
hypersurface ring (with no restriction on dimension) with multiplicity e(A) ≥ 3.
12
TONY J. PUTHENPURAKAL
Let M be an indecomposable Ulrich A-module. Then neither M or Syz1 (M ) is a
summand of X(m).
4.3. Motivation: Our motivation to prove the above results is the following: Assume A is a Gorenstein Henselian isolated singularity. If M is a maximal CohenMacaulay non-free indecomposable module then there exists an irreducible morphism from M → A only if M is a summand of X(m), see [23, 4.2.1]. In our
Theorems we have to show that the vertex [A] does not belong to certain components of Γ(A).
We first give:
Proof of Theorem 4.1. By Proposition 2.18 we get that X(m)⊕F = Syz1 (X(k))⊕G
for some free modules F, G. Thus it suffices to prove that if M is a direct summand
of X(k) then it is extemal. By 2.17 it suffices to prove that if M is a summand of
Syzd (k)∗ then M is extremal. We prove by induction on d that if M is a summand
of Syzn (k)∗ for some n ≥ d then M is extremal.
We first consider the case d = 0. We note that as k is indecomposable Syzn (k)
is indecomposable for all n ≥ 0. So Syzn (k)∗ is indecomposable. Therefore M =
Syzn (k)∗ . Notice Syzn (Syzn (k)∗ ) = k. It follows that M is extremal.
We now assume that d ≥ 1 and the result has been proved for Gorenstein
Henselian rings of dimension d − 1. Let x ∈ m \ m2 be a non-zero divisor on
A. Set B = A/(x) and for any A-module N set N = N/xN . We note that
B
B
∼
SyzA
d (k) = Syzd (k) ⊕ Syzd−1 (k).
It follows that
B
B
∗
∗
∗ ∼
SyzA
d (k) = Syzd (k) ⊕ Syzd−1 (k) .
A ∗
∗
If M is a summand of SyzA
d (k) then M is a summand of Syzd k . Let E be an
irreducible summand of M . Then by Krull-Schmidt it is an irreducible summand
B
∗
∗
of either SyzB
d (k) or of Syzd−1 (B) . By induction hypothesis we get that E is
extremal. It follows that M is extremal.
∗
We prove by induction on n ≥ d that if M is an irreducible summand of SyzA
n (k)
then M is extremal. We just proved the result for n = d. We now assume that
n ≥ d + 1 and the result has been proved for n − 1. There is an exact sequence
A
0 → SyzA
n (k) → F → Syzn−1 (k) → 0,
with F free.
As n ≥ d + 1 we have that SyzA
j (k) is maximal Cohen-Macaulay for all j ≥ n − 1.
So there is an exact sequence
A
∗
∗
∗
0 → SyzA
n−1 (k) → F → Syzn (k) → 0.
A
∗
Therefore SyzA
1 (M ) is a summand of Syzn−1 (k) . By induction hypothesis Syz1 (M )
is extremal. So M is extremal.
We now give:
Proof of Theorem 4.2. Case 1: We first consider the case when A is a hypersurface
of dimension d ≥ 1 and multiplicity e(A) ≥ 3.
Let M be an indecomposable Ulrich A-module. Suppose if possible M is a
summand of X(m). By Proposition 2.18 we get that X(m) ⊕ F = Syz1 (X(k)) ⊕ G
for some free modules F, G. It follows that Syz−1 (M ) is a summand of X(k). As
SYMMETRIES AND CONNECTED COMPONENTS OF THE AR-QUIVER
13
M has no free summands we get Syz1 (M ) = Syz−1 (M ). By 2.17 we get Syz1 (M )
is a summand of Syzd (k)∗ . It follows that Syz1 (M )∗ is a summand of Syzd (k). But
Syz1 (M )∗ ∼
= Syz1 (M ∗ ).
= Syz−1 (M ∗ ) ∼
Notice if M is Ulrich then M ∗ is also Ulrich. Similarly if we set N = Syz1 (M ) is a
summand of X(m) then M ∗ is a summand of Syzd (k).
By the arguments in the previous paragraph it suffices to prove that if E is an
Ulrich A-module then neither E nor Syz1 (E) is a summand of Syzd (k). This we
prove by induction on d.
We first consider the case d = 1. Then as e(A) ≥ 3 we have that m = Syz1 (k) is
indecomposable [22, Theorem A].
If E is a summand of m then m = E. Let x be E-superficial. Then as E = m
is Ulrich we get that mm = xm. So m2 = xm. So A has minimal multiplicity. It
follows that e(A) = 2. This is a contradiction.
If Syz1 (E) is a summand of m then m = Syz1 (E). Using [21, Theorem 2] we get
the h-polynomial of m
hm (z) = 2(1 + z + z 2 + · · · + z e−2 ) where e = e(A) ≥ 3.
It follows that the h-polynomial of A is
hA (z) = 1 + z(hm (z) − 1) = 2z e−1 + lower terms in z.
This is a contradiction as A is a hypersurface.
Now assume that d ≥ 2 and the result has been proved for hypersurface rings
of dimension d − 1. Let x ∈ m \ m2 be sufficiently general. Then x is A-regular
and A ⊕ E ⊕ SyzA
1 (E)-superficial. Set B = A/(x) and if V is an A-module set
V = V /xV . Then notice
B
B
SyzA
d (k) = Syzd (k) ⊕ Syzd−1 (k).
Note E is an Ulrich B-module. Let E = U1 ⊕ U2 ⊕ · · · ⊕ Us where Ui are indecomposable B-modules. Then each Ui is an Ulrich B-module. We also have
B
B
B
∼
∼
SyzA
1 (E) = Syz1 (E) = Syz1 (U1 ) ⊕ · · · ⊕ Syz1 (Us ).
By [23, 8.17], SyzB
1 (Ui ) is an indecomposable B-module for i = 1, . . . , s.
A
If E is a summand of SyzA
d (k) then E is a summand of Syzd (k). So U1 is
B
B
a summand of Syzd (k) or Syzd−1 (k). By our induction hypothesis U1 is not a
B
summand of SyzB
d−1 (k). It follows that U1 is a summand of Syzd (k). Therefore
B
B
∼
SyzB
1 (U1 ) is a summand of Syzd+1 (k) = Syzd−1 (k), a contradiction. A similar
A
argument will show that Syz1 (E) is not a summand of SyzA
d (k).
Case 2: We now consider the case when A is a Gorenstein local ring of dimension
2 but not a hypersurface.
Notice e(A) ≥ 4. Let M be an indecomposable non-free, maximal Cohen-Macaulay
A-module. If M is a summand of X(m) then SyzA
−1 (M ) is a summand of X(k).
Notice SyzA
(M
)
is
an
indecomposable
non-free
A-module.
Therefore SyzA
−1
−1 (M )
A
A
∗
is a summand of Syz2 (k) . By [22, Theorem B], Syz2 (k) is an indecomposable
A
∗
∼
maximal Cohen-Macaulay A-module. It follows that SyzA
−1 (M ) = Syz2 (k) . Notice
(4.3.1)
A
∗ ∼
Syz1 (M ∗ ) ∼
= SyzA
−1 (M ) = Syz2 (k).
14
TONY J. PUTHENPURAKAL
Let x1 , x2 be a A ⊕ M ∗ ⊕ Syz1 (M ∗ )-superficial sequence. Set C = A/(x1 , x2 ) and
if E is an A-module, set E = E/(x1 , x2 ). We note that
C
C
C
2
SyzA
2 (k) = Syz2 (k) ⊕ Syz1 (k) ⊕ Syz0 (k).
(4.3.2)
C
∗ ∼
Set N = M ∗ . Then SyzA
1 (M ) = Syz1 (N ). We now consider two cases.
Case 1: M is Ulrich.
Then notice M ∗ is also Ulrich. Then N = k a where a = µ(N ). Let n be the
maximal ideal of C. Note it is indecomposable as a C-module. By 4.3.2 and 4.3.1
we get
C
2
na = SyzC
2 (k) ⊕ Syz1 (k) ⊕ k.
By Krull-Schmidt we get that k = n. So n2 = 0. It follows that e(A) = e(C) = 2,
a contradiction.
Case 2: M = SyzA
1 (D) where D is Ulrich.
A
A
∗
Then D = SyzA
−1 (M ). It follows that Syz2 (k) is Ulrich. Therefore Syz2 (k) is
∼ l
also Ulrich. Therefore SyzA
2 (k) = k for some l. So by 4.3.2 it follows that n the
maximal ideal of C is isomorphic to k. Therefore n2 = 0 and so e(A) = e(C) = 2 a
contradiction.
5. Proofs of Theorem’s 1.2, 1.4 and 1.6
We first give
Proof of Theorem 1.2. Let M be an indecomposable periodic maximal
Cohen-Macaulay A-module. Let N, L be indecomposable non-free maximal CohenMacaulay A-modules and assume there exists irreducible maps u : N → M and
v : M → L. Let
0 → τ (M ) → EM → M → 0,
0 → M → VM → τ −1 (M ) → 0
be the AR-sequences starting and ending at M .
We first note that Syzi (u) : Syzi (N ) → Syzi (M ) and Syzi (v) : Syzi (M ) →
Syzi (L) are irreducible, see 3.1. Let p be the period of M . Note Syzp (M ) ∼
= M.
We have irreducible maps Syzip : Syzip (N ) → M for all i ≥ 1. As Syzip (N )
is indecomposable maximal Cohen-Macaulay A-module we get that Syzip (N ) are
factors of EM for all i ≥ 1. By Krull-Schmidt theorem we get that N is periodic.
A dual argument gives that L is periodic.
If there exists an irreducible map from M → A then M is factor of X(m) the
maximal Cohen-Macaulay approximation of m. So by 4.1 we get that M is extremal.
As A is not a hypersurface this is a contradiction.
Notice τ (M ) = Syz−d+2 (M ) as A is Gorenstein. If there is an irreducible map
from A → M then A is a factor of EM and so there exist’s an irreducible map
from τ (M ) → A. By previous argument we get that τ (M ) is extremal. So M is
extremal. As A is not a hypersurface this is a contradiction,
Thus P defines a union of connected components of Γ(A).
Remark 5.1. In Proposition 5.2 of [2] it is shown that if A is a self-injective Artin
algebra and M, N are non-projective A-modules such that there is an irreducible
map f : M → N then M is a periodic module if and only if N is. To the best of
my knolwedge this proof does not generalize to higher dimensions.
We now give
SYMMETRIES AND CONNECTED COMPONENTS OF THE AR-QUIVER
15
Proof of Theorem 1.4. Let M be an indecomposable maximal Cohen-Macaulay Amodule such that projdimQ M is finite. Then M is a periodic A-module with period
≤ 2. As A is not a hypersurface ring then by proof of previous Theorem there is
no irreducible map from A → M or M → A.
Let N, L be indecomposable non-free maximal Cohen-Macaulay A-modules and
assume there exists irreducible maps u : N → M and v : M → L. Let
0 → τ (M ) → EM → M → 0,
0 → M → VM → τ −1 (M ) → 0
be the AR-sequences starting and ending at M . Notice τ (M ) = SyzA
−d+2 (M ) and
−1
τ −1 (M ) = SyzA
(M ) is
d−2 (M ). It follows that projdimQ τ (M ) and projdimQ τ
finite. Therefore projdimQ EM and projdimQ VM is finite.
By [23, 5.5, 5.6], we get that N, L are direct summands of EM and VM respectively. It follows that projdimQ N and projdimQ L are finite. Thus PQ determines
a union of connected components of Γ(A).
5.2. Let us recall that a quasi-deformation A → B < − − Q of A is a flat local map
η
A → B and a deformation Q −
→ B (i.e., ker η is generated by a Q-regular sequence.
We say CI-dimension of an A-module M is finite if there is a quasi-deformation
A → B < − − Q with projdimQ M ⊗A B is finite. We say CI-dimension of M is
infinite if it is not finite.
We now give:
Proof of Theorem 1.6. Let M be an indecomposable maximal Cohen-Macaulay Amodule which is periodic and has a finite CI-dimension over A. Let A → B <
− − Q be a quasi-deformation of A with projdimQ M ⊗A B finite. As A is not a
hypersurface by proof of Theorem 1.2 there is no irreducible map from A → M or
M → A.
Let N, L be indecomposable non-free maximal Cohen-Macaulay A-modules and
assume there exists irreducible maps u : N → M and v : M → L. Let
0 → τ (M ) → EM → M → 0,
0 → M → VM → τ −1 (M ) → 0
be the AR-sequences starting and ending at M . Notice τ (M ) = SyzA
−d+2 (M ) and
A
−1
τ (M ) = Syzd−2 (M ).
Notice τ (M ) ⊗A B = SyzB
−d+2 (M ⊗A B). Thus CI-dimension of τ (M ) is finite.
As the quasi-deformations involved are the same we get that EM also has finite
CI-dimension over A. A similar argument yields that VM has finite CI dimension
over A. As N and L are summands of EM and VM respectively we get that CI
dimension of N and L are finite. It follows that PO defines a union of connected
components of Γ(A).
Let C be the union of connected components of Γ(A) consisting of periodic indecomposable maximal Cohen-Macaulay A-modules and let CO be the union of connected components of Γ(A) consisting of periodic indecomposable maximal CohenMacaulay A-modules having finite CI-dimension over A. Then as CO ⊆ C we get
that C \ CO is a union of connected components of Γ(A). Notice C \ CO consists
of precisely those periodic maximal Cohen-Macaulay A-modules which has infinite
CI-dimension over A.
16
TONY J. PUTHENPURAKAL
6. Proof of Theorem 1.8
We need to recall some preliminaries regarding support varieties. This is relatively simple in our case since A is complete with algebraically closed residue field.
6.1. Let A = Q/(u) where (Q, n) is regular local and u = u1 , . . . , uc ∈ n2 is a
regular sequence. We need the notion of cohomological operators over a complete
intersection ring; see [16] and [13]. The Eisenbud operators, [13] are constructed as
follows:
∂
∂
→ Fi → · · · be a complex of free A-modules.
→ Fi+1 −
Let F : · · · → Fi+2 −
Step 1: Choose a sequence of free Q-modules Fei and maps ∂e between them:
e
e
∂
∂
e : · · · → Fei+2 −
→ Fei → · · ·
→ Fei+1 −
F
e
so that F = A ⊗ F
Pc
Step 2: Since ∂e2 ≡ 0 modulo (u), we may write ∂e2 = j=1 uj e
tj where tej : Fei →
Fei−2 are linear maps for every i.
Step 3: Define, for j = 1, . . . , c the map tj = tj (Q, f , F) : F → F(−2) by tj =
A⊗e
tj .
6.2. The operators t1 , . . . , tc are called Eisenbud’s operator’s (associated to u) . It
can be shown that
(1) ti are uniquely determined up to homotopy.
(2) ti , tj commute up to homotopy.
6.3. Let R = A[t1 , . . . , tc ] be a polynomial ring over A with variables t1 , . . . , tc
of degree 2. Let M, N be finitely generated A-modules. By considering a free
resolution F of M we get well defined maps
for 1 ≤ j ≤ c and all n,
tj : ExtnA (M, N ) → Extn+2
R (M, N )
L
i
∗
which turn ExtA (M, N ) = i≥0 ExtA (M, N ) into a module over R. Furthermore
these structure depend on u, are natural in both module arguments and commute
with the connecting maps induced by short exact sequences.
6.4. Gulliksen, [16, 3.1], proved that Ext∗A (M, N ) is a finitely generated R-module.
We note that Ext∗ (M, k) is a finitely generated graded module over T = k[t1 , . . . , tc ].
Define V ∗ (M ) = V ar(annT (Ext∗ (M, k)) in the projective space Pc−1 . We call
V ∗ (M ) the support variety of a module M .
We need the following
Lemma 6.5. Let (Q, n) be a complete regular local ring with algebraically closed
residue field k. Let f = f1 , . . . , fc ∈ n2 be a regular sequence. Assume c ≥ 2. Set
A = Q/(f ) and let d = dim A. Let W be an irreducible non-empty sub-variety
of Pc−1 . Then there exists an indecomposable non-free maximal Cohen-Macaulay
A-module M with V ∗ (M ) = W .
Proof. By [7, 2.3], there exists an A-module E with V ∗ (E) = W . Then N =
Syzd+1 (E) is a maximal Cohen-Macaulay A-module and V ∗ (N ) = V ∗ (E) = W .
Notice N has no free summands. If N is indecomposable then we are done. Otherwise N = N1 ⊕ N2 where N1 and N2 are maximal Cohen-Macaulay A-modules
with no free-summands. Let T = k[t1 , . . . , tc ] and let Ext∗A (N, k), Ext∗A (N1 , k) and
SYMMETRIES AND CONNECTED COMPONENTS OF THE AR-QUIVER
17
Ext∗A (N2 , k) be given T -module structure as above. As Ext∗ (N, k) = Ext∗A (N1 , k)⊕
Ext∗A (N2 , k) we get that
annT Ext∗ (N, k) = annT Ext∗ (N1 , k) ∩ annT Ext∗ (N2 , k).
It follows that
W = W1 ∩ W2
where Wi = V ∗ (Ni ) for i = 1, 2.
As W is irreducible we get that W = W1 or W = W2 . Iterating this procedure we
get our result.
The following result yields Theorem 1.8 as an easy corollary.
Theorem 6.6. Let Q = k[[x1 , . . . , xn ]] be the formal power series over an algebraically closed field k. Let u = u1 , . . . , uc ∈ n2 be a regular sequence. Assume
c ≥ 2. Set A = Q/(u) and let d = dim A. Let W be a proper sub-variety of Pc−1 .
Let
CW = {M | M is indecomposable MCM A-module with V ∗ (M ) = W }.
Then CW defines an union of connected components of Γ(A). If W is irreducible
then CW is non-empty.
Proof. Let M ∈ CW . Notice M is not free. As W is a proper subset of Pc−1 we
get that dim W ≤ c − 2. So cx M = dim W + 1 ≤ c − 1. In particular M is not
extremal. So there is no irreducible map M → A. As τ (M ) = Syz−d+2 (M ) is also
not extremal there is no irreducible map τ (M ) → A. So there is no irreducible map
A → M.
Let N, L be indecomposable non-free maximal Cohen-Macaulay A-modules and
suppose there exists an irreducible map u : N → M and an irreducible map v : M →
L.
Claim: V ∗ (N ) = V ∗ (M ) = W and V ∗ (L) = V ∗ (M ) = W .
Suppose there exists a ∈ V ∗ (N ) \ V ∗ (M ). Let D be a maximal Cohen-Macaulay
A-module with V ∗ (D) = {a}. As {a} ∩ W = ∅ we get that ExtA
i (D, M ) = 0
for all i ≫ 0. As V ∗ (τ (M )) = V ∗ (M ) = W we also get ExtA
(D,
τ
(M )) = 0 for
i
i ≫ 0. Thus ExtA
(D,
E
)
=
0
for
i
≫
0.
As
N
is
a
summand
of
EM we get
M
i
∗
that ExtA
(D,
N
)
=
0
for
all
i
≫
0.
This
implies
a
∈
/
V
(N
),
a
contradiction.
i
Thus V ∗ (N ) ⊆ V ∗ (M ). We now notice that there exists an irreducible map M →
τ −1 (N ). By the previous argument we get that V ∗ (M ) ⊆ V ∗ (τ −1 (N )) = V ∗ (N ).
Thus V ∗ (N ) = V ∗ (M ) = W .
As there exist’s an irreducible map v : M → N . Then there exists an irreducible map from v ′ : N → τ −1 (M ). By the previous argument we get V ∗ (N ) =
V ∗ (τ −1 (M )). As V ∗ (τ −1 (M )) = V ∗ (M ) = W we get V ∗ (N ) = W . Thus we have
proved our Claim.
By our claim and as there are no irreducible maps from M → A and A → M we
get that CW is a union of connected components of Γ(A). If W is irreducible then
by 6.5 we get that CW is non-empty.
We now give
Proof of Theorem 1.8. By 6.6 the result follows.
18
TONY J. PUTHENPURAKAL
7. quasi AR-sequences
7.1. Setup: In this section (A, m) is a Henselian Gorenstein local ring with algebraically closed residue field k. We also assume A is an isolated singularity. For
the notion of AR -sequences see [23, Chapter 2]. In this section we introduce the
notion of quasi AR-sequences.
Definition 7.2. Let M be an indecomposable non-free maximal Cohen-Macaulay
A-module. By a quasi-AR sequence ending at M we mean an exact sequence
φ
s: 0 → K → E −
→ M such that
(1) E is a stable maximal Cohen-Macaulay A-module.
(2) φ is irreducible.
(3) If L is a stable maximal Cohen-Macaulay A-module and if there is an Alinear map σ : L → M which is not a split epi then there exist’s a map
ξ : L → E such that φ ◦ ξ − σ ∈ β(L, M ).
Remark 7.3. Unlike AR-sequences the module K need not be maximal CohenMacaulay. Also the map φ need not be surjective.
A consequence of the definition of quasi AR-sequence is the following:
Proposition 7.4. [with hypothesis as in 7.1.] Suppose σ is irreducible. Then ξ is
a split monomorphism.
Proof. By 3.2, φ ◦ ξ is irreducible. Now φ is irreducible. So in particular it is not a
split epi. It follows that ξ is a split mono.
We need the following analogue to Corollary 2.12 from [23].
Lemma 7.5. Let (A, m) be a Henselian Gorenstein local ring with algebraically
closed residue field k. Let M, L be indecomposable non-free maximal
φ
Cohen-Macaulay A-modules and let s : 0 → K → E −
→ M be a quasi AR-sequence
ending at M . Then the following two conditions are equivalent:
(i) There is an irreducible morphism from L to M .
(ii) L is isomorphic to a direct summand of E.
Proof. (i) =⇒ (ii). This follows from 7.4.
(ii) =⇒ (i). Assume the decomposition of E is given by E = L ⊕ Q. Denote
φ = (f, g) along this decomposition. We claim that f is irreducible.
Clearly f is not a split epi as φ is not a split epi. If f is a split mono then as L
and M are indecomposable we get that f is an isomorphism and so a split epi, a
contradiction.
The rest of the proof is similar to the proof of (ii) =⇒ (i) of Corollary 2.12
from [23].
We give two constructions of quasi AR-sequences. The first one comes from AR
sequences.
Proposition 7.6. Let (A, m) be a Henselian Gorenstein local ring with algebraically
closed residue field k. Let M be an indecomposable non-free maximal Cohenp
→ M → 0 be an AR-sequence
Macaulay A-modules and let l : 0 → N → EM −
ending at M . Suppose EM = E ⊕ F where F is a free A-module and E has no
free summands. Denote p = (φ, ψ) along this decomposition. Assume E 6= 0. Let
φ
K = ker φ. Then s : 0 → K → E −
→ M is a quasi AR-sequence ending at M .
SYMMETRIES AND CONNECTED COMPONENTS OF THE AR-QUIVER
19
Proof. By Corollary 2.12 from [23] we get that φ is an irreducible map. Now let
L be a stable maximal Cohen-Macaulay A-module and let f : L → M be A-linear
which is not a split epi. Then as l is an AR sequence ending at M there exist’s an
A-linear map g : L → EM with f = p ◦ g. Suppose
σ
g=
where σ : L → E and δ : L → F.
δ
So we get f = φ ◦ σ + ψ ◦ δ. Notice ψ ◦ δ ∈ β(L, M ). It follows that s is a quasi AR
sequence ending at M .
p
→ M → 0 be an AR-sequence ending at M then it
7.7. Let l : 0 → N → EM −
is not true that a lift of p; q : Syz1 (E) → Syz1 (M ) is surjective and defines a AR
sequence ending at Syz1 (M ). The great advantage of quasi AR sequences is that
it behaves well under lifting (and also pre-lifting).
Theorem 7.8. Let (A, m) be a Henselian Gorenstein local ring with algebraically
closed residue field k. Let M be an indecomposable non-free maximal Cohenφ
Macaulay A-modules and let s : 0 → K → E −
→ M be a quasi AR-sequence ending
ψ
at M . Let ψ be any lift of φ. Set K ′ = ker ψ. Then s′ : 0 → K ′ → Syz1 (E) −
→
Syz1 (M ) is a quasi AR sequence ending at Syz1 (M ). Similarly if θ is any pre-lift
θ
e → Syz−1 (E) −
of φ. Then se: 0 → K
→ Syz−1 (M ) is a quasi AR sequence ending at
Syz−1 (M ).
Proof. As E is a stable maximal Cohen-Macaulay A-module we get that Syz1 (E)
is also a stable maximal Cohen-Macaulay A-module. By Theorem 3.1 we get that
ψ is an irreducible map.
Let L be a stable maximal Cohen-Macaulay A-module and let f : L → Syz1 (M )
be an A-linear map which is not a split epi. Let g : Syz−1 (L) → M be any prelift of f . Then by 3.3 we get that g is not a split epi. It follows that there
exists ξ : Syz−1 (L) → M such that φ ◦ ξ − g = δ where δ ∈ β(Syz−1 (L), M ). Let
ξ ′ : L → Syz1 (M ) be a lift of ξ. Then notice by construction ψ ◦ ξ ′ − g is a lift of δ.
It follows that ψ ◦ ξ ′ − g ∈ β(L, Syz1 (M )). Thus s′ is a quasi AR-sequence ending
at Syz1 (M ).
The assertion regarding se can be proved similarly.
7.9. Till now we have not used the fact that k, the residue field of A is algebraically
closed. We will now use this fact. Let us recall the following definition from [23,
Chapter 5].
Let M, N be maximal
Cohen-MacaulayL
A-modules. Set (M, N ) = HomA (M, N ).
Lm
n
Decompose M = i=1 Mi and N = j=1 Nj where Mi , Nj are indecomposable
A-modules for all i, j For g ∈ (M, N ) decompose g = (gij ) where gij : Mi → Nj .
Definition 7.10. We say g ∈ (M, N )∗ if no gij is an isomorphism.
7.11. We define the following descending chain {(M, N )n }n≥1 of A-submodules of
(M, N ) as follows:
(M, N )n consists of those f ∈ (M, N ) such that there is a sequence X0 , . . . , Xn
of maximal Cohen-Macaulay A-modules with X0 = M and Xn = N and fi ∈
(Xi−1 , Xi )∗ such that f = fn ◦ fn−1 ◦ · · · ◦ f1 .
It is easy to see that (M, N )n are A-submodules of (M, N ) and that
(M, N ) ⊇ (M, N )1 ⊇ · · · ⊇ (M, N )n ⊇ (M, N )n+1 ⊇ · · · .
20
TONY J. PUTHENPURAKAL
It is not difficult to see that (M, N )1 /(M, N )2 is a k = A/m vector space. It is
finite dimensional since it is finitely generated as an A-module. Set
(M, N )1
.
irr(M, N ) = dimk
(M, N )2
Let us restate the following basic result from [23, 5.5].
Lemma 7.12. [with hypothesis as in 7.1.] Let M, N be indecomposable maximal
Cohen-Macaulay A-modules. Assume there is an AR-sequence ending at M
0 → τ (M ) → EM → M → 0.
Let n be the number of copies of N in direct summands of EM (note that n = 0 is
possible). Then the following equality holds:
irr(N, M ) = n.
We note that the assumption k is algebraically closed is used in the proof of
Lemma 7.12. The following is a basic result in our theory of quasi AR-sequences.
Theorem 7.13. [with hypothesis as in 7.1.] Let M, N be indecomposable nonφ
free maximal Cohen-Macaulay A-modules. Let 0 → K → E −
→ M be a quasi AR
sequence ending at M . Let n be the number of copies of N in direct summands of
E (note that n = 0 is possible). Then the following equality holds:
irr(N, M ) = n.
Proof. Set S(N, E) = (N, E)/(N, E)1 . Then by proof of Lemma 5.5. in [23] it
follows that S(N, E) ∼
= k n . Define
(N, M )1
,
(N, M )2
[f ] → [φ ◦ f ].
θ : S(N, E) →
By 7.5 we get that θ is a well-defined k-linear map.
We first show that θ is surjective. Let σ : N → M be an irreducible map. Denote
by [σ] it’s class in (N, M )1 /(N, M )2 . By our definition of quasi AR sequence there
exist’s ξ : N → E such that φ ◦ ξ − σ = g ∈ β(N, M ). By 7.4 we get that ξ is a
split monomorphism. As N, M are both non-free indecomposable A-modules we
get that g ∈ (N, M )2 . Therefore we get θ([ξ]) = [σ].
Next we show that θ is injective . Let [h] ∈ S(N, E) be non-zero. Thus h : N → E
is a split mono. Then by 7.5 we get that φ ◦ h : N → M is an irreducible map.
Thus θ([h]) = [φ ◦ h] 6= 0. Therefore θ is injective.
A consequence of the previous two results is the following:
Corollary 7.14. [with hypothesis as in 7.1.] Let M be indecomposable non-free
maximal Cohen-Macaulay A-module. Suppose the following is an AR-sequence ending at M :
p
→ M → 0.
t : 0 → τ (M ) → EM −
Further assume EM has no free summnads. Let
φ
s:0→K →E−
→M
∼ EM and φ is surjective. Furtherbe a quasi AR sequence ending at M . Then E =
more s is also an AR-sequence ending at M (and so K ∼
= τ (M )).
SYMMETRIES AND CONNECTED COMPONENTS OF THE AR-QUIVER
21
Proof. By 7.12 and 7.13 it follows that E ∼
= EM . As p : EM → M is an indecomosable map, by defining property of quasi AR-sequences there exists a map
ξ : EM → E such that φ ◦ ξ − p = δ ∈ β(EM , M ). As p is indecomposable, by 7.4 we
get ξ is a split mono. As E ∼
= EM , by Krull-Schmidt we get ξ is an isomorphism.
It follows that
φ − p ◦ ξ −1 = δ ◦ ξ −1 := η ∈ β(E, M ).
Set ψ = p◦ξ −1 : E → M . Notice ψ is surjective. As E, M has no free summands we
get that η(E) ⊆ mM . It follows that the maps φ, ψ : E/mE → M/mM are equal.
As ψ is surjective, it follows that φ is surjective. So by Nakayama’s Lemma we get
that φ is surjective.
We now use that t is an AR-sequence. As φ is irreducible, it is not a split epi.
Therefore there exists θ : E → EM such that p ◦ θ = φ. As φ is irreducible we get
that θ is a split mono. Since E ∼
= EM , by Krull-Schmidt we get θ is an isomorphism.
Note there exists f : K → τ (M ) which makes the following diagram commute:
s: 0
/K
t: 0
/ τ (M )
φ
/E
f
/M
/0
1M
θ
/M
p
/ EM
/0
By Snake Lemma we get that f is an isomorphism. So K ∼
= τ (M ). In the terminology of [23, 2.3] we get s ∼ t. So s is an AR-sequence ending at M .
The following consequence of Corollary 7.14 is significant:
Lemma 7.15. [with hypothesis as in 7.1.] Let M be an indecomposable maximal
p
→ M → 0 be an ARCohen-Macaulay non-free A-module. Let t : 0 → τ (M ) → EM −
sequence ending at M . If there is no irreducible maps A → M and A → Syz1 (M )
then we have
µ(EM ) = µ(M ) + µ(τ (M )).
Proof. Set N = τ (M ), M1 = Syz1 (M ) and E1 = Syz1 (E). As there is no irreducible
maps from A → M we get that EM is stable. In particular t is a quasi AR-sequence,
see 7.6. Let φ : E1 → M1 be any lift of p. Then we have a quasi AR-sequence
φ
→ M1 .
s : 0 → K1 → E1 −
As there are no irreducible maps from A → M1 we get that EM1 is stable. Therefore
by Corollary 7.14 we get that φ is surjective and s is an AR-sequence ending at
M1 . Furthermore E1 ∼
= τ (M1 ).
= EM1 and K1 ∼
Let F → EM and G → M be projective covers. Then we have an exact sequence
0
/ E1
0
/ M1
φ
/F
/ EM
θ
/G
/0
p
/M
/0
Set N = τ (M ). As φ, p are surjective we get θ is surjective. As G is free it is in
fact a split epi. Set H = ker θ. Then H is free and µ(H) = µ(EM ) − µ(M ).
As φ is surjective we get by Snake Lemma that the induced map H → N is
surjective. It follows that µ(N ) ≤ µ(EM ) − µ(M ). As there is an exact sequence
22
TONY J. PUTHENPURAKAL
0 → N → EM → M → 0 it follows (after tensoring with A/m) that µ(N ) ≥
µ(EM ) − µ(M ). The result follows.
8. Proof of Theorem 1.10
In this section we give a proof of Theorem 1.10.
8.1. [with hypotheses as in 1.1.] Recall if M is an indecomposable non-free Amodule then it’s AR-translate is τ (M ) = Syz−d+2 (M ). So if d = 2 or if A is a
hypersurface of even dimension then τ (M ) = M .
We now give:
Proof of Theorem 1.10. By 8.1 we get that τ (M ) = M . Let M be an indecomosable
Ulrich A-module. Then by 4.2 there is no irreducible map from M → A and
Syz1 (M ) → A. By our assumptions on the ring there is no irreducible map from
A → M and A → Syz1 (M ). Let s : 0 → M → EM → M → 0 be the ARsequence ending at M . Then by 7.15 we get µ(EM ) = 2µ(M ). Also note that
e(EM ) = 2e(M ). So e(EM ) = µ(EM ). Therefore EM is Ulrich A-module.
Let N be a non-free indecomposable maximal Cohen-Macaulay A-module. If
there is an irreducible morphism N → M then N is a summand of EM . As EM is
Ulrich we also get N is Ulrich. If there is an irreducible morphism from M → N
then by our assumptions on the ring there is also an irreducible morphism from
N → M . By our earlier argument we get N is Ulrich.
As there is no irreducible map from A → M or from M → A it follows that U
defines a union of connected components of Γ(A).
Remark 8.2. If A = Q/(f ) is a hypersurace ring with dim A is odd then note
that Auslander-Reiten translate τ (M ) = SyzA
1 (M ) which in general is not an Ulrich module (even if M is Ulrich), see [21, Theorem 2]. So for odd dimensions
our technique to produce an infinite family of indecomosable Ulrich modules with
unbounded multiplicities; fails.
9. Proof of Theorem 1.11
In this section we give a proof of Theorem 1.11.
9.1. We recall the definition of linkage of modules as given in [20]. Throughout
(A, m) is a Gorenstein local ring of dimension d.
φ
→ F0 → M → 0
9.2. Let us recall the definition of transpose of a module. Let F1 −
be a minimal presentation of M . Let (−)∗ = Hom(−, A). The transpose Tr(M ) is
defined by the exact sequence
φ∗
0 → M ∗ → F0∗ −→ F1∗ → Tr(M ) → 0.
Set λ(M ) = Syz1 (Tr(M )). We note that if M is a maximal Cohen-Macaulay Amodule then Tr(M ) = (Syz2 (M ))∗ .
Definition 9.3. Two A-modules M and N are said to be horizontally linked if
M∼
= λ(N ) and N ∼
= λ(M ).
If E is a stable maximal Cohen-Macaulay A-module then it is known that E is
linked to λ(E), i.e., λ2 (E) = E see [20, Corollary 7]. Note if M is an indecomposable
non-free maximal Cohen-Macaulay A-module then so is λ(M ).
SYMMETRIES AND CONNECTED COMPONENTS OF THE AR-QUIVER
23
Proof. We prove the result only for λ. The proof for D is in fact simpler.
Let M, N be indecomposable non-free maximal Cohen-Macaulay A-modules. Using terminology from 7.11 it suffices to prove that there exists an isomorphism
φ:
(λ(N ), λ(M ))1
(M, N )1
→
.
(M, N )2
(λ(N ), λ(M ))2
Let f ∈ (M, N )1 . Then as M, N are indecomposable we get that f is not an
isomorphism. In particular it is not a split mono. Let f2 : Syz2 (M ) → Syz2 (M ) be
a lift of f . By 3.3 and 2.15 it follows that f2 is not a split mono. Let f2∗ : Tr(N ) →
Tr(M ) be the dual of f2 . Then f2∗ is not a split epi. Let gf : λ(N ) → λ(M ) be any
lift of f2∗ . Define
(λ(N ), λ(M ))1
φe : (M, N )1 →
,
(λ(N ), λ(M ))2
f 7→ gf + (λ(N ), λ(M ))2 .
We first show that this map is independent of the choices we made. If f2′ is another
lift of f then f2 − f2′ ∈ β(Syz2 (M ), Syz2 (N )). So f2∗ − (f2′ )∗ ∈ β(Tr(N ), Tr(M )).
We know that if σ ∈ β(Tr(N ), Tr(M )) then any lift of σ is in β(λ(N ), λ(M )). Thus
we have gf − gf′ = δ ∈ β(λ(N ), λ(M )). As λ(N ), λ(M ) are indecomposable and
non-free we get that δ ∈ (λ(N ), λ(M ))2 . Thus φe is well-defined. It is elementary
to show that φe is A-linear.
Now let f ∈ (M, N )2 . Then there exists a maximal Cohen-Macaulay A-module
X and a commutative diagram
M❇
❇❇
❇❇f
u
❇❇
❇
/N
X
v
such that u is not a split mono and v is not a split epi. Let u2 : Syz2 (M ) → Syz2 (X)
be a lift of u and v2 : Syz2 (X) → Syz2 (N ) be a lift of v. By 3.3 and 3.4 we get
that u2 is not a split mono and v2 is not a split epi. Then f2 = v2 ◦ u2 is a lift of
f . Then f2∗ = u∗2 ◦ v2∗ . Also u∗2 is not a split epi and v2∗ is not a split mono. Let
Syz1 (u∗2 ) be a lift of u∗2 and Syz1 (v2∗ ) be a lift of v2∗ . Then gf = Syz1 (u∗2 ) ◦ Syz1 (v2∗ )
is a lift of f2∗ . By 3.3 and 3.4 we get that Syz1 (u∗2 ) is not a split epi and Syz1 (v2∗ )
is not a split mono. So gf ∈ (λ(N ), λ(M ))2 . Thus we have a well-defined A-linear
map
(λ(N ), λ(M ))1
(M, N )1
→
.
φ:
(M, N )2
(λ(N ), λ(M ))2
As λ2 (M ) = M and λ2 (N ) = N we have a well defined A-linear map
ψ:
(λ(N ), λ(M ))1
(M, N )1
→
.
(λ(N ), λ(M ))2
(M, N )2
Finally it is tautological that φ and ψ are inverses of each other. Thus λ : Γ(A) →
Γ(A)rev is an isomorphism.
Now assume that A is not a hypersurface ring. We first note that Syz1 (λ(M )) =
M ∗ when M is stable maximal Cohen-Macaulay A-module. If λ(M ) = D(M ) for all
indecomposable maximal non-free A-modules then M ∗ (and so M ) has a periodic
resilution with period 1. It follows that A is a hypersurface ring, a contradiction.
24
TONY J. PUTHENPURAKAL
Next we show that there exist’s E with D(E) 6= E. As A is not a hypersurface
there exists an MCM module M which is not periodic. Let M1 = Syz1 (M ). As M
is not periodic either M 6= M ∗ or M1 6= M1∗ .
If λ(M ) = M for all indecomposable maximal Cohen-Macaulay non-free M then
note that Syz1 (M ) = M ∗ for all such M . We now note that
Syz (M ∗ ) ∼
= Syz (Syz (M )) = Syz (M )
= (Syz (M ))∗ ∼
−2
2
1
2
3
We now note that
Syz−2 (M ∗ ) = Syz−2 (Syz1 (M )) = Syz−1 (M )
It follows that M is periodic for all indecomposable maximal Cohen-Macaulay nonfree M . Thus A is a hypersurface, a contradiction.
Thus λ, D : Γ(A) → Γ(A)rev are distinct isomorphism’s if A is not a hypersurface
ring. Furthermore λ 6= 1 and D 6= 1.
The following result is immediate:
Corollary 9.4. (with hypotheses as in 1.1). For all n ∈ Z the map Syzn : Γ(A) →
Γ(A) is an isomorphism.
Proof. We have Syz1 ◦λ = D. So Syz1 = D ◦ λ and Syz−1 = λ ◦ D. The result
follows.
We now give
Proof of Theorem 1.13. Let [M ] in C. Recall
I(M ) = {n | [Syzn (M )] ∈ C}.
We first show that I(M ) is an ideal in Z. As M = Syz0 (M ) we get 0 ∈ I(M ).
Now let n ∈ I(M ). The isomorphism Syz−n : Γ(A) → Γ(A) maps C to itself since
Syz−n (Syzn (M )) = M . In particular we have [Syz−n (M )] = Syz−n ([M ]) ∈ C. If
m, n ∈ C then note that the isomorphism Syzn : Γ(A) → Γ(A) maps C to itself
as Syzn ([M ]) = [Syzn (M )] ∈ C. Therefore [Syzn+m (M )] = Syzn ([Syzm (M )]) ∈ C.
Thus I(M ) is an ideal in Z. In particular there exist’s a unique non-negative integer
i(M ) such that I(M ) = i(M )Z.
To prove rest of the assertion of the theorem we first make a convention: if
[X], [Y ] ∈ C then write [X] < −− > [Y ] if there is an irreducible map from X to
Y OR there is an irreducible map from [Y ] to [X].
As [M ], [N ] are in C there is a sequence
[M = X0 ] < −− > [X1 ] < −− > · · · < −− > [Xn−1 ] < −− > [Xn = N ],
in C. Set a = i(M ) and b = i(N ). By 9.4 we have the following sequence in Γ(A):
[Syza (M )] < −− > [Syza (X1 )] < −− > · · · < −− > [Syza (N )].
As [Syza (M )] ∈ C we get [Syza (N )] ∈ C. So a ∈ I(N ) and therefore I(M ) ⊆ I(N ).
Similarly we get I(N ) ⊆ I(M ). Thus I(M ) = I(N ).
We now give
Proof of Corollary 1.14. (1) Suppose if possible D has only finitely many vertices.
e
Then Syzn (D) cannot be a component of Γ(A)
= Γ(A) \ Γ0 (A). As Γ0 (A) has
only finitely many components we get Syzn (D) = Syzm (D) for some n > m. Set
c = n − m. Then Syzc (D) = D. Therefore Syzlc (D) = D for all l ∈ Z.
SYMMETRIES AND CONNECTED COMPONENTS OF THE AR-QUIVER
25
We note that the function Syzlc permutes vertices of D among itself. As D is
finite it follows that all modules in D is periodic.
As D is a connected component of Γ0 (A) it follows that there exists [M ] ∈ D
such that there is an irreducible map either from M to A or an irreducible map
from A to M . In the first case M is a component of X(m) the maximal CohenMacaulay approximation of m. By 4.1 we get that M is extremal. As M is periodic
we get that A is a hypersurface ring, a contradiction. In the second case there
is an irreducible map from Syz−d+2 (M ) → A. Note as M is periodic then so is
Syz−d+2 (M ). An argument similar to the earlier case yields that A is a hypersurface
ring, a contradiction.
(2) Suppose if possible the function f : V ert(D) → Z given by f ([M ]) = e(M ) is
bounded. As e(M ) ≥ µ(M ) and e(Syz1 (M )) = e(A)µ(M ) − e(M ), it follows that
the multiplicity function on V ert(Syz1 (D)) is bounded. Iterating we get that the
multiplcity function on V ert(Syzn (D)) is bounded for each n ≥ 1. Then Syzn (D)
e
cannot be a component of Γ(A)
= Γ(A) \ Γ0 (A). As Γ0 (A) has only finitely many
components we get Syzn (D) = Syzm (D) for some n > m. Set c = n − m. Then
Syzc (D) = D. Therefore Syzlc (D) = D for all l ∈ Z. In particular there exists c
such that
(∗∗)
βil (M ) ≤ c
for all l ≥ 0 and all [M ] in D.
As D is a connected component of Γ0 (A) it follows that there exists [M ] ∈ D
such that there is an irreducible map either from M to A or an irreducible map
from A to M . In the first case M is a component of X(m) the maximal CohenMacaulay approximation of m. By 4.1 we get that M is extremal. As A is not an
hypersurface we get the following
(1) If A is a complete intersection of codimension c ≥ 2 then cx(M ) = c.
Furthermore lim βi (M ) = ∞. In particular the sequence {βil (M )} is unbounded. Thus (**) is not possible in this case.
(2) If A is Gorenstein but not a complete intersection then
curv(M ) = curv(k) > 1. So there exists r > 1 such that βi (M ) > ri for all
i ≫ 0. Thus (**) is not possible in this case too.
In the second case note that there is an irreducible map from N = Syz−d+2 (M )
to A. We then have that for all i ≥ 0
βil+d−2 (N ) ≤ c
Then an argument similar to above gives a contradiction.
10. Obstruction to quasi AR-sequences
Let the setup be as in 1.1. Let M be a non-free maximal Cohen-Macaulay
indecomosable A-module.
10.1. Let s : 0 → τ (M ) → EM → M → 0 be the AR-sequence ending at M . Then
using Proposition 7.6 we get the following:
There is no quasi-AR sequence ending at M ⇐⇒ EM is free.
The next result gives an essential obstruction to non-existence of quasi ARsequences.
Lemma 10.2. [with hypothesis as in 1.1] Further assume d 6= 1. Suppose there is
a non-free indecomposable maximal Cohen-Macaulay module M such that there is
no quasi AR-sequence ending at M . Then A is a hypersurface ring.
26
TONY J. PUTHENPURAKAL
Proof. By 10.1 it follows that τ (M ) = Syz1 (M ). By construction
τ (M ) = Syz−d+2 (M ). Therefore we get that M ∼
= Syz−d+1 (M ). As d 6= 1 we get
that M (and so τ (M )) is periodic.
EM is non-zero and free. In particular it has A as a summand. So there is an
irreducible map from τ (M ) → A. It follows that τ (M ) is a summand of X(m),
the maximal Cohen-Macaulay approximation of m. By 4.1 we get that τ (M ) is
extremal A-module. It is also periodic. So A is a hypersurface ring.
We now analyze hypersuface rings having perhaps modules M such that there
is no quasi AR-sequence ending at M . Let < M > denote the isomorphism class
of a module M . Set
Qc (A) = {< M >| [M ] ∈ Γ(A) with no quasi AR-sequence ending at M }.
We show
Proposition 10.3. Let (A, m) be a complete equicharacteristic hypersurface isolated singularity. Assume d = dim A is even and non-zero. Also assume that
k = A/m is algebraically closed. Then
(1) Qc (A) is a finite set (possibly empty).
(2) If A is not of finite representation type and Syzd (k) is indecomposable then
Qc (A) is empty.
(3) If Qc (A) is non-empty and if < M > ∈ Qc (A) then
(a) Syzn (M ) = M for all n ∈ Z.
(b) [M ] is an isolated component of Γ(A).
Proof. We note that as A is a hypersurface and d is even we get that τ (M ) = M
for any non-free maximal Cohen-Macaulay indecomosable A-module M .
(1) If < M >∈ QC (A) then there is an irreducibe map from M = τ (M ) → A.
So M is a component of X(m). It follows that Qc (A) is a finite set.
(2) As Syzd (k) is indecomposable there is a unique non-free component of X(m).
It follows that ♯Qc (A) ≤ 1. If < M >∈ Qc (A) then note that [M ] ⇆ [A] is a
connected component of Γ(A). It follows that A is of finite representation type, a
contradiction.
(3)(a) As there is no quasi AR-sequence ending at M we get that EM is free. So
τ (M ) = Syz1 (M ). As dim A is even we get M = τ (M ). As A is a hypersurface we
get Syzn (M ) = M for all n ∈ Z.
(3)(b) Notice [M ] is only connected to [A]. So we get that [M ] is an isolated
component in Γ(A).
11. Structure of Γ0 (A)
In this section we completely determine the structure of Γ0 (A) when dim A = 2
and its multiplcity e(A) ≥ 3.
Theorem 11.1. [with hypothesis as in 1.1.] Assume dim A = 2 and e(A) ≥ 3. Set
M1 = A. Then Γ0 (A) is of the form
M1 ⇆ M2 ⇆ M3 ⇆ M4 ⇆ · · · ⇆ Mn ⇆ · · ·
where e(Mn ) = ne(M1 ) for all n ≥ 1. Furthermore
(1) X(m) = M2 ⊕ F where F is free.
(2) Mn∗ = Mn for all n ≥ 1.
SYMMETRIES AND CONNECTED COMPONENTS OF THE AR-QUIVER
27
Remark 11.2. We do not have any idea of the structure of Γ0 (A) when e(A) = 2
(so necessarily A is a hypersurface) and A is of infinite representation type. The
reason is that Proposition 11.3 given below breaks down in the case e(A) = 2.
The following result is essential in our proof of Theorem 11.1.
Proposition 11.3. (with hypotheses as in Theorem 11.1). Let X(m) be a MCM
approximation of m. Write X(m) = M ⊕ F where F is free and M has no free
summands. Then
(1) M is indecomposable.
(2) rank M = 2.
(3) M ∼
= M ∗.
A
∗
Proof. (1) By [22, Theorem B]; SyzA
2 (k) is indecomposable. So X(k) = Syz2 (k)
A
is indecomposable. As X(m) = Syz1 (X(k)) ⊕ G where G is free we get that
A
∗
M = SyzA
1 (Syz2 (k) ) is indecomposable by [23, 8.17].
A
A
∗
(2) We get M = SyzA
−1 (Syz2 (k)). Let x, y be a A ⊕ M ⊕ Syz2 (k)-superficial
sequence. Set C = A/(x, y). If E is an A-module then set E = E/(x, y)E. Notice
A
A
C
C
C
2
∼
M∗ ∼
= SyzC
−1 (Syz2 (k)) and Syz2 (k) = Syz2 (k) ⊕ Syz1 (k) ⊕ Syz0 (k).
Therefore
C
C
2
M∗ ∼
= SyzC
1 (k) ⊕ Syz0 (k) ⊕ Syz−1 (k).
We note that as we have an exact sequence 0 → k = soc(C) → C → C/ soc(C) → 0.
Thus SyzC
−1 (k) = C/ soc(C). Let n be the maximal ideal of C. Thus we have
M∗ ∼
= n ⊕ k 2 ⊕ C/ soc(C).
Thus ℓ(M ∗ ) = 2ℓ(C). Therefore
e(M ) = e(M ∗ ) = e(M ∗ ) = ℓ(M ∗ ) = 2ℓ(C) = 2e(C) = 2e(A).
It follows that rank M = 2.
(3) As there is an irreducible map M → A there exists an irreducible map
A → M ∗ . As dim A = 2 we have τ (M ∗ ) = M ∗ . So there is an irreducible map
from M ∗ → A. Thus M ∗ is an irreducible component of X(m). By (1) we have
M∗ ∼
= M.
We now give
Proof of Theorem 11.1. Set X(m) = M2 ⊕ F where F is free and M2 has no free
summands. By Proposition 11.3 we get that M2 is indecomposable of rank 2. We
have the AR-sequence
0 → M2 → M1a ⊕ X → M2 → 0.
Thus a + rank X = 4. By Lemma 10.2 and Proposition 10.3(2) we get that X 6= 0.
Thus 1 ≤ a ≤ 3. We assert a = 1. We prove this by showing that the cases a = 2
or 3 do not occur.
Claim 1: a 6= 3.
Suppose if possible a = 3 then rank X is one. So X is indecomposable. As
dim A = 2 and there is an irreducible map from X to M2 , there is an irreducible
map from M2 → X. By rank considerations we get that the AR-quiver ending at
X is
0 → X → M2 → X → 0.
28
TONY J. PUTHENPURAKAL
It follows that M1 , M2 and X constitute a connected component of Γ0 (A) and so
it is equal to Γ0 (A). Therefore A has finite representation type, a contradiction.
Claim 2: a 6= 2.
If possible assume a = 2. It follows that rank X = 2. We assert:
Subclaim 3: X is indecomposable.
Suppose if possible X = X1 ⊕ X2 where rank Xi = 1. As dim A = 2 and there is
an irreducible map from Xi to M2 , there is an irreducible map from M2 → Xi . By
rank considerations we get that the AR-quiver ending at Xi for i = 1, 2 is
0 → Xi → M2 → Xi → 0.
It follows that M1 , M2 , X1 and X2 constitute a connected component of Γ0 (A)
and so it is equal to Γ0 (A). It follows that A has finite representation type, a
contradiction. Thus X is indecomposable.
The AR-sequence ending at X is
0 → X → M2 ⊕ X1 → X → 0.
By an argument similar to Subclaim-3 we get that X1 is indecomposable of rank
2. Set X0 = X.
For i ≥ 1, by an argument similar to Subclaim-3 we get that there exists indecomposable module Xi+1 of rank 2 such that the AR-sequence ending at Xi
is
0 → Xi → Xi−1 ⊕ Xi+1 → Xi → 0.
Thus Γ0 (A) consists of the modules {M1 , M2 , Xi | i ≥ 0}, Also rank Xi = 2. This
implies that A is of finite representation type (see [23, 6.2]), a contradiction.
By claims 1, 2 we get a = 1. Thus rank X = 3.
Claim 4: X is indecomposable.
Suppose if possible this is not so. Then either
Subcase 5: X = X1 ⊕ X2 ⊕ X3 where rank Xi = 1 for 1 ≤ i ≤ 3, OR
Subcase 6: X = X1 ⊕ X2 where rank Xi = i for i = 1, 2.
We show that subcase 5, 6 are not possible. If subcase 5 occurs then by rank
considerations the AR-quiver ending at Xi is
0 → Xi → M 2 → Xi → 0
for i = 1, 2, 3.
Thus the vertices of Γ0 (A) will be
{M1 , M2 , X1 , X2 , X3 }.
This implies that A has finite representation type, a contradiction.
If subcase 6 occurs then by rank considerations the AR-quiver ending at X1 is
0 → X1 → M2 → X1 → 0.
Furthermore the AR-quiver ending at X2 is
0 → X2 → M2 ⊕ X3 → X2 → 0.
Note rank X3 = 2. By an argument similar to that of subcase 5 we get that X3
is indecomposable. Iterating we obtain rank two indecomposable modules Xi for
i ≥ 4 such that the AR-quiver ending at Xi is
0 → Xi → Xi+1 ⊕ Xi−1 → Xi → 0.
It follows that the vertices of Γ0 (A) is
{M1 , M2 , Xi | i ≥ 1}.
SYMMETRIES AND CONNECTED COMPONENTS OF THE AR-QUIVER
29
As there is a bound on the ranks of vertices of Γ0 (A) it follows that A is of finite
representation type, a contradiction.
Set M3 = X. We have rank M3 = 3 and that M3 is indecomposable. Inductively
assume that we have indecomposable MCM A-modules M1 , . . . , Mn with n ≥ 3 and
rank Mi = i such that the AR-sequence ending at Mj for j ≤ n − 1 is
0 → Mj → Mj ⊕ Mj+1 → Mj → 0.
Let the AR-sequence ending at Mn be
0 → Mn → Mn−1 ⊕ Y → Mn → 0.
Clearly rank Y = n + 1. If we prove that Y is indecomposable then we can set
Mn+1 = Y and we will be done by induction.
Let Z be an indecomposable summand of Y . Then the AR-sequence ending at
Z is
0 → Z → Mn ⊕ W → Z → 0,
where W is an MCM A-module (possibly zero). Nevertheless we get that rank Z ≥
n/2.
As n ≥ 3, rank Y = n + 1 and an indecomposable summand Z of Y has rank
atleast n/2 it follows that Y has at most two indecomposable summnads.
We want to prove that Y is indecomposable. Suppose it is not so. Then by our
previous argument it has two indecomposable summands say Y1 and Y2 . Suppose
rank Y1 ≤ rank Y2 . Then we have
n+1
n
≤ rank Y1 ≤
.
2
2
We consider two cases:
Case 1: n = 2m + 1 is odd.
We get rank Y1 = m + 1. So rank Y2 = m + 1 also. Let the AR-sequence ending at
Y1 be
0 → Y1 → Mn ⊕ T → Y1 → 0.
Thus T has rank 1. The AR-sequence ending at T is
0 → T → Y1 ⊕ L → T → 0.
As m + 1 ≤ 2 we get m ≤ 1. As m ≥ 1 we get m = 1. Therefore n = 2m + 1 = 3.
Now consider the case n = 3. We get rank Yj = 2 for j = 1, 2 and rank T = 1.
Furthermore L = 0. Similarly the AR-sequence ending at Y2 will be
0 → Y2 → M3 ⊕ T ′ → Y2 → 0,
where T ′ has rank 1. The AR-sequence ending at T ′ is
0 → T ′ → Y2 → T ′ → 0.
It follows that the vertices of Γ0 (A) will be
{M1 , M2 , M3 , Y1 , Y2 , T, T ′ }.
It follows that A has finite representation type, a contradiction.
Case 2: n = 2m is even.
We get rank Y1 = m and rank Y2 = m + 1. The AR sequence ending at Y1 is
0 → Y1 → Mn → Y1 → 0.
30
TONY J. PUTHENPURAKAL
The AR sequence ending at Y2 is
0 → Y2 → Mn ⊕ T → Y2 → 0.
It follows that rank T = 2. We have to consider two sub cases:
Subcase-1: T is decomposable. In this case T = T1 ⊕ T2 where rank Ti = 1 for
i = 1, 2. The AR-sequence ending at T1 is
0 → T1 → Y2 ⊕ L → T1 → 0.
We have 2 = m + 1 + rank L. As m ≥ 1 we get m = 1 and L = 0. So n = 2. We
have already dealt with this case.
Subcase-2: T is indecomposable. The AR-sequence ending at T is
0 → T → Y2 ⊕ W → T → 0.
We have 4 = m + 1 + rank W . As m ≥ 1 the possibilities for m is 1, 2, 3. If m = 1
then n = 2. This case has been discussed earlier. Next we consider the case m = 3.
In this case W = 0. So the vertices of Γ0 (A) will be
{Mi , Y1 , Y2 , T | 1 ≤ i ≤ n}.
It follows that A has finite representation type, a contradiction.
Finally we consider the case when m = 2. So n = 4. Thus rank W = 1. The
AR-sequence ending at W is
0 → W → T → W → 0.
Thus the vertices of Γ0 (A) will be
{Mi , Y1 , Y2 , T, W | 1 ≤ i ≤ n}.
It follows that A has finite representation type, a contradiction.
(2) We note that the dual map D : Γ(A) → Γ(A)rev is an isomorphism of graphs.
As D(M2 ) = M2∗ ∼
= M2 and as Γ0 (A) is connected we get that D maps Γ0 (A) to
itself. Comparing ranks we get Mn∗ ∼
= Mn for all n ≥ 3.
12. Proof of Theorem 1.15 and Corollary 1.16
In this section of the results as stated in the title of this section. Throughout
(A, m) is an equicharacteristic Gorenstein isolated singularity of dimension two.
We also assume that A is complete and the residue field k is algebraically closed.
Furthermore we assume that e(A) ≥ 3.
We first give
Proof of Corollary 1.16. It suffices to show that Syzn (M ) ∈
/ Γ0 (A) for all M ∈
Γ0 (A) and for all n 6= 0. Using the terminology of Theorem 1.13 we need to
show I(M ) = 0 for all M in Γ0 (A). We also recall that I(M ) = I(N ) for all
M, N ∈ Γ0 (A). We denote this common value by c.
We want to show c = 0. If possible assume c > 0. Set
V = {|i − j| | Mj = Syzn Mi for some n 6= 0} and r = min V.
Notice c 6= 0 if and only if V 6= ∅.
We first consider the case when r = 0. Say Mi = Syzn Mi for some n 6= 0. We
may assume n > 0. Then Mi is periodic. As A is not a hypersurface this is a
contradiction by Theorem 1.2 and Theorem 4.1.
SYMMETRIES AND CONNECTED COMPONENTS OF THE AR-QUIVER
31
We now assume r ≥ 1. Say Mi+r = Syzn (Mi ) for some r > 0 and for some
n 6= 0. Note we are not assuming n > 0. As we have an irreducible morphism from
Mi+r−1 → Mi+r we have an irreducible map from
Syz−n (Mi+r−1 ) → Mi .
So we have Mi+1 = Syz−n (Mi+r−1 ) or Mi−1 = Syz−n (Mi+r−1 ). The first case
cannot occur as r = min V . So Mi−1 = Syz−n (Mi+r−1 ) and therefore Mi+r−1 =
Syzn (Mi−1 ). Iterating this procedure we get that M2+r = Syzn (M2 ). We have
irreducible maps from M2+r−1 and M2+r+1 to M2+r = Syzn (M2 ). So we have an
irreducible map from Syz−n (M2+r−1 ) and Syz−n (M2+r+1 ) to M2 . It follows that
atleast one of Syz−n (M2+r−1 ) and Syz−n (M2+r+1 ) is A. This is a contradiction.
Next we give
Proof of Theorem 1.15. The assertion on the structure of C follows from Theorem
11.1 and [6, 4.16.2].
(1) This follows from Theorem 11.1.
(2)(a) Let C be a connected component of Γ(A) such that [M ] ∈ V ert(C) is a
periodic module. Then by Theorem 1.2 all the modules N in V ert(C) is periodic.
We note that Syzn (C) consists of periodic modules and so [A] ∈
/ V ert(Syzn (C)
for all n ∈ Z (see Theorem 4.1). Using Theorem 7.8 and Corollary 7.14 we get
that if [M ] ∈ V ert(C) and if 0 → M → EM → M → 0 is an AR sequence
ending at M then for all n ∈ Z the AR-sequence ending at Syzn (M ) is of the form
0 → Syzn (M ) → Syzn (E) → Syzn (M ) → 0.
Now consider the structure of C as given in (1). Let period of M1 be c. We
first show that I(M1 ) = cZ (notation as in Theorem 1.13). Note c ∈ I(M1 ). If
I(M1 ) 6= cZ then there exists a with 1 < a < c such that [Syza (M1 )] ∈ V ert(C).
We note that 0 → Syza (M1 ) → Syza (M2 ) → Syza (M1 ) → 0 is the AR sequence
ending at Syza (M1 ). As M1 is the unique vertex in C which is connected to only
one other vertex we get that Syza (M1 ) = M1 . This contradicts the fact that period
of M1 is c.
We show by induction on n ≥ 2 that the period of Mn is c. We first consider
the case n = 2. As period of M1 is c we get that 0 → M1 → Syzc (M2 ) → M1 → 0
is also an AR-sequence ending at M1 . By uniqueness of AR sequences we get
M2 ∼
= Syzc (M2 ). Suppose for some a with 1 ≤ a < c we have Syza (M2 ) = M2 then
note that a ∈ I(M2 ) = I(M1 ) = cZ, a contradiction. Thus period of M2 is c.
Now assume that period of M1 , . . . , Mn is c. We prove that period of Mn+1 is also
c. As the period of Mn−1 and Mn is c we get that 0 → Mn → Mn−1 ⊕Syzc (Mn+1 ) →
Mn → 0 is another AR-sequence ending at Mn . By uniqueness of AR-sequences
we get that Mn+1 ∼
= Syzc (Mn+1 ). Suppose for some a with 1 ≤ a < c we have
Mn+1 = Syza (Mn+1 ). Then a ∈ I(Mn+1 ) = I(M1 ) = cZ, a contradiction. Thus
period of Mn+1 is c. The result follows.
(2)(b) By 1.16 there exists atmost one m0 ≥ 1 such that Syzm0 (C) = Γ0 (A). Thus
for n > m0 we have that [A] ∈
/ V ert(Syzn (C)). Set M0 = 0. We have that for all
n > m0 the sequence 0 → Syzn (Mi ) → Syzn (Mi−1 )⊕Syzn (Mi+1 ) → Syzn (Mi ) → 0
is the AR quiver ending at Mi for all i ≥ 1. By Lemma 7.15 we get that for all
n > m and for all i ≥ 1
2βn (Mi ) = βn (Mi−1 ) + βn (Mi+1 ).
32
TONY J. PUTHENPURAKAL
As M0 = 0 an easy recurssion yields that βn (Mi ) = iβn (M1 ). The result follows.
13. curvature and complexity
If (A, m) is a complete intersection of codimension c then it is known that for
any non-zero module M we have 0 ≤ cx M ≤ c. Furthermore for any integer i with
0 ≤ i ≤ c there exists an A-module M with complexity i. If A is not a complete
intersection then cx k = ∞. To deal with this situation the notion of curvature was
introduced. It can be shown that 1 < curv k < ∞ and for any non-zero module
with infinite projective dimension we have 1 ≤ curv M ≤ curv k. Furthermore if
cx M < ∞ then curv M = 1. We first prove
Proposition 13.1. Let (A, m) be an equicharactersitic complete Gorenstein isolated singularity with algebraically closed residue field k. Assume A is not a complete intersection. Then
(1) For any i ≥ 1 the modules M with complexity i form a union of connected
components of Γ(A).
(2) For any α ∈ [1, curv k) the modules M with curvature α form a union of connected components of Γ(A).
We first show
Lemma 13.2. [with hypotheses as in Proposition 13.1] Let 1 ≤ α < curv k. Let
Vα be the collection of all indecomposable modules M with curv M ≤ α. Then Vα
is a union of connected components of Γ(A). Furthermore Γ0 (A) * Vα .
Proof. Let M ∈ Vα . Note that τ (M ) = Syz−d+2 (M ) ∈ Vα . As α < curv k it follows
that there is no irreducible map from M to A or from A to M , see 4.1.
Clearly Syzn (M ) ∈ Vα for all n ∈ Z. By a similar argument as before there is
no irreducible map from Syzn (M ) to A or from A to Syzn (M ) for all n ∈ Z.
Let 0 → τ (M ) → EM → M → 0 be the AR-sequence ending at M . By 7.13 and
7.14 we get that
(1) 0 → Syzn (τ (M )) → Syzn (EM ) → Syzn (M ) → 0 is the AR-sequence ending
at Syzn (M ) for all n ≥ 0.
(2) βn (EM ) = βn (M ) + βn (τ (M )) for all n ≥ 0.
Thus we have curv(E) ≤ α. If there is an irreducible map from N to M then N is
a factor of EM and so curv(N ) ≤ curv(E) ≤ c. Thus N ∈ Vα . In a similar fashion
if there is an irreducible map from M to N then also N ∈ Vα . Thus Vα is a union
of connected components of Γ(A). Also clearly Γ0 (A) * Vα .
As an immediate consequence we get
Corollary 13.3. [with hypotheses as in Proposition 13.1] Let 1 < β < curv k. Let
Uβ be the collection of all indecomposable modules M with curv M < β. Then Uβ
is a union of connected components of Γ(A). Furthermore Γ0 (A) * Uβ .
Proof. Let 1 = α1 < α2 < · · · < αn < αn+1 < · · · be any strictly monotonically
increasing sequence converging to β. Notice
[
Uβ =
Vαn
n≥1
The result now follows from Lemma 13.2.
SYMMETRIES AND CONNECTED COMPONENTS OF THE AR-QUIVER
33
We now give
Proof of Proposition 13.1. We first prove (2). Let Cα = the collection of modules
with complexity α. Notice (with notation as in Lemma 13.2 and Corollary 13.3
(a) C1 = V1 .
(b) For 1 < α < curv(k) we have Cα = Vα − Uα .
Thus (2) follows.
(1) This is similar to (2). We have to prove results analogous to Lemma 13.2
and Corollary 13.3 first.
We now give
Proof of Theorem 1.9. Suppose A has a module M with bounded betti-numbers
but not periodic. Then note that A is not a complete intersection. We note that a
MCM A-module M will have bounded betti-numbers if and only if cx(M ) ≤ 1. By
Proposition 13.1, D the collection of all such modules defines a union of connected
components of Γ(A). We note that modules M having a periodic resolution will
form a subset C of D. By Theorem 1.2 we get that C is a union of connected
components of Γ(A). It follows that D \ C is a union of connected components of
Γ(A). If M is not periodic but has a bounded resolution then [M ] ∈ D \ C. The
result follows.
References
[1] M. Auslander and R-O. Buchweitz, The homological theory of maximal Cohen-Macaulay
approximations, Colloque en l’honneur de Pierre Samuel (Orsay, 1987). Mem. Soc. Math.
France (N.S.) No. 38 (1989), 5-37.
[2] M. Auslander and I. Reiten, Representation Theory of artin algebra V: Methods for computing
almost split sequences and irreducible morphisms, Communications in Algebra, 5(5) (1977),
519–554
[3] L. L. Avramov, V. N. Gasharov and I. V. Peeva, Complete intersection dimension, Inst.
Hautes Études Sci. Publ. Math. (1997), no. 86, 67–114 (1998).
[4] L. L. Avramov, Modules of finite virtual projective dimension, Invent. math. 96 (1989), 71101.
, Infinite free resolutions, Six lectures on commutative algebra (Bellaterra, 1996),
[5]
1118, Progr. Math., 166, Birkhuser, Basel, 1998.
[6] D. J. Benson, Representations and cohomology. I. Basic representation theory of finite groups
and associative algebras, Second edition. Cambridge Studies in Advanced Mathematics, 30.
Cambridge University Press, Cambridge, 1998
[7] P. A. Bergh, On support varieties for modules over complete intersections, Proc. Amer. Math.
Soc. 135 (2007), no. 12, 3795-3803.
[8] J. P. Brennan, J. Herzog and B. Ulrich, Maximally generated Cohen-Macaulay modules,
Math. Scand. 61 (1987), no. 2, 181-203.
[9] W. Bruns and J. Herzog, Cohen-Macaulay Rings, revised edition, Cambridge Stud. Adv.
Math., vol. 39, Cambridge University Press, Cambridge, (1998).
[10] R.-O. Buchweitz, G.-M. Greuel and F.-O. Schreyer, Cohen-Macaulay modules on hypersurface
singularities. II, Invent. Math. 88 (1987), no. 1, 165-182.
[11] A. Croll, Periodic modules over Gorenstein local rings, J. Algebra 395 (2013), 47-62.
[12] E. Dieterich, Reduction of isolated singularities, Comment. Math. Helv. 62 (1987), 654–676.
[13] David Eisenbud, Homological algebra on a complete intersection, with an application to group
representations, Trans. Amer. Math. Soc. 260 (1980), no. 1, 35–64.
[14] V. Gasharov and I. Peeva, Boundedness versus periodicity over commutative local rings,
Trans. Amer. Math. Soc. 320 (1990), no. 2, 569-580.
[15] E. L. Green and D. Zacharia, Auslander-Reiten components containing modules with bounded
Betti numbers, Trans. Amer. Math. Soc, 361 (2009), no. 8, 4195–4214.
34
TONY J. PUTHENPURAKAL
[16] T. H. Gulliksen, A change of ring theorem with applications to Poincaré series and intersection multiplicity, Math. Scand. 34 (1974), 167–183.
[17] J. Herzog, B. Ulrich and J. Backelin, Linear maximal Cohen-Macaulay modules over strict
complete intersections, J. Pure Appl. Algebra 71 (1991), no. 2-3, 187-202.
[18] S. B. Iyengar; G. J. Leuschke; A. Leykin; C. Miller; E. Miller; A. K. Singh and U. Walther,
Twenty-four hours of local cohomology. Graduate Studies in Mathematics, 87. American
Mathematical Society, Providence, RI, 2007.
[19] H. Matsumura, Commutative ring theory, second ed., Cambridge Studies in Advanced Mathematics, vol. 8, Cambridge University Press, Cambridge, 1989.
[20] A. Martsinkovsky and J. R. Strooker, Linkage of modules, J. Algebra 271 (2004), no. 2,
587-626.
[21] T. J. Puthenpurakal, The Hilbert function of a maximal Cohen-Macaulay module, Math. Z.
251 (2005), no. 3, 551-573.
[22] R. Takahashi, Direct summands of syzygy modules of the residue class field, Nagoya Math.
J. 189 (2008), 1-25.
, Cohen-Macaulay modules over Cohen-Macaulay rings, London Mathematical Soci[23]
ety Lecture Note Series, 146. Cambridge University Press, Cambridge, 1990.
Department of Mathematics, Indian Institute of Technology Bombay, Powai, Mumbai
400 076, India
E-mail address: [email protected]
| 0math.AC
|
1
On Coded Caching in the Overloaded MISO
Broadcast Channel
arXiv:1702.01672v3 [cs.IT] 24 Jun 2017
Enrico Piovano, Hamdi Joudeh and Bruno Clerckx
Department of Electrical and Electronic Engineering, Imperial College London, United Kingdom
Email: {e.piovano15, hamdi.joudeh10, b.clerckx}@imperial.ac.uk
Abstract—This work investigates the interplay of coded caching
and spatial multiplexing in an overloaded Multiple-Input-SingleOutput (MISO) Broadcast Channel (BC), i.e. a system where
the number of users is greater than the number of transmitting
antennas. On one hand, coded caching uses the aggregate global
cache memory of the users to create multicasting opportunities.
On the other hand, multiple antennas at the transmitter leverage
the available CSIT to transmit multiple streams simultaneously.
In this paper, we introduce a novel scheme which combines both
the gain derived from coded-caching and spatial multiplexing
and outperforms existing schemes in terms of delivery time and
CSIT requirement.
I. I NTRODUCTION
Caching is a promising technique proposed to improve the
throughput and reduce the latency in communication networks
[1]–[3]. In a seminal work by Maddah-Ali and Niesen [2], the
fundamental limits of cache-aided networks were explored by
considering a setting in which a single transmitter (server)
communicates with multiple users over a shared medium. The
analysis revealed that although users cannot cooperate, there
exists a (hidden) global caching gain that scales with the
aggregated memory distributed across the network, alongside
the more obvious local caching gain.
In the context of wireless networks, recent efforts have
been made to combine coded caching with the conventional
interference management techniques [4], [5] and proved to
provide performance gains in different settings [6]–[10]. In
this work, we focus on the cache-aided multiple-input-singleoutput (MISO) broadcast channel (BC), in which a transmitter equipped with multiple antennas serves multiple singleantenna users equipped with cache memories.
Overloading the MISO BC: The ability to simultaneously
serve a large number of users is a key feature envisioned for
future wireless networks, pushing them towards overloaded
regimes in which the number of users exceeds the number
of transmit antennas. In this context, the setting considered
in [2] is intrinsically an overloaded BC where all nodes are
equipped with a single antenna. In this work, we consider
a more general overloaded BC in which the transmitter is
allowed to have multiple antennas K > 1, which is yet
still smaller than the number of users Kt . A recent work on
overloaded system can be found in [11]. In this paper, we make
progress towards characterizing the optimum caching strategy
This work has been partially supported by the EPSRC of UK, under grant
EP/N015312/1.
and cache-aided performance in such setting, which remain
unknown. To simplify the analysis, we consider scenarios in
which the number of scheduled users is an integer multiple of
the number of antennas, i.e. Kt = GK, where G is a positive
integer denoted as an overloading factor.
First, we consider the above setting under the assumption of
perfect CSIT. A natural way to serve the GK users is to divide
them into G groups of K users, each served independently in
an orthogonal manner (e.g. over time). Caching is carried out
independently for each group in which only the local caching
gain is relevant. This is denoted by the Orthogonal Scheme
(OS). An alternative scheme is the one proposed by MaddahAli and Niesen (MAN) [2], in which spatial multiplexing gains
from zero-forcing are completely ignored. We show that both
strategies are in fact suboptimal for the considered setting by
proposing a scheme that outperforms both in terms of the
delivery time, i.e. the time required to deliver the requested
information during the delivery phase.
Proposed scheme (PS): We propose to partition the library
of files at the transmitter into two parts by dividing each file
into two subfiles. One part of the library is stored in the
global memory of all Kt users in the MAN manner (cached
part), and the remaining part is never cached (uncached part).
During the delivery phase, information requested from the
cached part is transmitted through a single coded multicasting
stream. This is superposed on top of a zero-forcing layer
shared in an orthogonal manner between the G groups, and
carrying information requested from the uncached part. From
its structure, it can be seen that such scheme can exploit both
the zero-forcing gains of the MISO BC, and the global cache
memory of all users. We show that under adequate partitioning
of the library, PS outperforms both OS and MAN.
Partial CSIT: We relax the assumption of perfect CSIT. We
show that the delivery time achieved by the PS with perfect
CSIT is in fact maintained under partial CSIT, up to a certain
quality. We then extend the PS to deal with any partial CSIT
level. This is implemented by caching a fraction of the library
tailored to the actual CSIT and we show, through numerical
results, the gain compared to the MAN scheme. We then
compare with the OS. However, we consider now the coded
caching strategy in [8] applied independently to each group
of K users. We show that this allows to serve the overloaded
system by achieving the same delivery time as in perfect CSIT
with a reduced quality. We prove then that the PS achieves the
same delivery time with a further reduced CSIT requirement.
2
II. S YSTEM M ODEL
A. Overloaded cache-aided MISO BC
We consider the overloaded scenario described before. The
transmitter has access to a library with Nf distinct files, denoted as W1 , W2 , . . . , WNf , each of size f bits and we assume
Nf ≥ Kt . Each user k ∈ Kt is equipped with a cache-memory
Zk of size M f bits, where M < Nf . For tractability, we
is an integer. This allows for
assume that the ratio Γ = KNt M
f
a closed-form expression of the achievable delivery time for
the MAN scheme. The communication takes place over two
phases: the placement phase and the delivery phase. During
the placement phase, before actual user demands are revealed,
the caches Zk are pre-filled with information from the Nf
files W1 , W2 , . . . , WNf . During the delivery phase, each user
k requests a single file Fk , for some Fk ∈ {1, 2, · · · , Nf }.
The requested files WF1 , . . . , WFKt are jointly mapped into
the transmitted signal x ∈ CK×1 , which satisfies the power
constraint E(xH x) ≤ P . At the t-th discrete channel use, the
k-th user’s received signal is given by
yk (t) = hH
k (t)x(t) + nk (t),
hH
k (t)
k = 1, 2, . . . , Kt
(1)
1×K
where
∈C
is the channel between the transmitter
and the k-th user and nk (t) ∼ CN (0, 1) is the Additive White
Gaussian Noise (AWGN). The duration of the delivery phase
is given by T , which is a normalized measure as explained in
the next subsection. The discrete channel uses are indexed by
t, where t ∈ [0, T ] as in [9]. In the remainder of the paper, the
index t of the channel use will be omitted for ease of notation.
At the end of the delivery phase, each user combines the signal
yk with its own cached information Zk in order to retrieve the
requested file WFk .
B. Performance measure
In this paper, the analysis is restricted to the high-SNR
regime. Such analysis gives insight into the role of coded
caching in interference management. The metric of evaluation
is the duration T needed to complete the delivery phase for
every request by the users. T is measured in time slots per
file served. As in [8], the time is normalized such that one
time slot is the amount of time required to transfer a single
file to a single receiver without caching and interference.
As a consequence, since the single-stream capacity scales as
log2 (P ) for the high-SNR regime, we can impose the size of
each file f = log2 (P ) to align our measure of performance
with [2] and make the two comparable. Finally, it is worth
noting that similar to [2], [8], T represents the worst case
scenario, i.e. the case when each user requests a different file.
For ease of notation, and without loss of generality, we assume
that user k requests file Wk for all k ∈ Kt .
which is assumed to have a covariance matrix σk2 I. The
variance σk2 is parametrized as a function of the SNR P in
the form of P −αk , where αk is the CSIT quality exponent
defined as
log(σk2 )
, k = 1, 2, . . . , Kt .
(3)
αk = lim −
P →∞
log(P )
The exponent is restricted to αk ∈ [0, 1] which captures the
entire range of CSIT (from unknown to perfect) in the highSNR regime [12], [13].
III. M ULTIPLEXING AND M ULTICASTING
In this section, we present what we consider to be the two
most obvious ways to deal with the cached-aided scenario at
hand. We further assume that CSIT is perfectly known.
A. The Orthogonal Scheme (OS)
The OS transmits K interference-free streams due to the
presence of K antennas and perfect CSIT. Each user stores
the same fraction from each file in the library, hence during
M
f bits from
the placement phase its memory is filled with N
f
M
each file. This leaves (1 − Nf )f bits to be delivered during the
delivery phase. The Kt users are divided into G groups of K
users each, where groups are orthogonalized in time and each
group is served using zero-forcing. It follows that the delivery
M
from which the total
time of each group is given by 1 − N
f
delivery time is given by
M
.
(4)
TDOS = G 1 −
Nf
M
corresponds to the local caching gain achieved
The term 1− N
f
due to the locally stored content in the memory of each user. It
is evident that the OS only exploits the local caching gain and
no coded multicasting is needed. In fact multiuser interference
is eliminated through time-sharing and zero-forcing.
B. Maddah-Ali Niesen scheme (MAN)
Alternatively, all Kt users can be served jointly using the
MAN scheme proposed in [2]. While this scheme is designed
for a system with a single transmitting antenna, it can be used
here by ignoring the multiplexing gains of the antenna array.
Following the same placement and delivery procedure in [2],
the total delivery time is given by
M
1
·
(5)
TDMAN = Kt 1 −
Nf 1 + Γ
M
The term 1 − N
corresponds to the local caching gain as in
f
1
·
the OS, while the global caching gain is captured by 1+Γ
C. Motivations for a new scheme
C. Partial Instantaneous CSIT
To study the influence of CSIT imperfections, the channel
is modelled by
hk = ĥk + h̃k
(2)
where ĥk denotes the instantaneous channel estimate available
at the transmitter for user k, and h̃k denotes the CSIT error,
We compare the performance of OS and MAN using the
OS
TD
ratio T MAN
= 1+Γ
K . The value of Γ, which is an integer,
D
belongs to the set {1, . . . , Kt }. It is evident from the ratio that
the OS performs comparatively better or equal to the MAN
scheme for Γ ∈ {1, . . . , K −1}. On the other hand, for Γ ≥ K,
MAN scheme performs better than the OS scheme. The OS
3
and MAN schemes can be seen as the two extreme cases of
utilizing the available CSIT on one side and caching on the
other side. We propose a scheme that combines elements of
OS and MAN by incorporating both spatial multiplexing and
global cache gains. This is shown to outperform both OS and
MAN in the region Γ ∈ {1, . . . , ζ}, where ζ ≥ K − 1 is some
integer. For the region Γ ∈ {ζ + 1, . . . , Kt }, the proposed
scheme matches the performance of MAN. In this paper we
focus on Γ ≤ K − 1, i.e. Γ belongs to the set {1, . . . , K − 1}.
IV. P ROPOSED S CHEME
The design of the PS involves a partition of the library
into two parts: one treated in the MAN manner, while the
other is never cached, hence delivered using zero-forcing. Such
partition is implemented by caching a fraction p ∈ [0, 1] of
each file, so that the MAN scheme consists of pNf files, while
the remaining (1 − p)Nf files correspond to the zero-forcing
part. Since we treat the cached part in a MAN manner, the
tM
ratio η = KpN
is assumed to be an integer, where η indicates
f
the number of times the cached part is repeated inside the
memories. In case of p = 1, we cache all the library and
M
, the cached part fits
η = Γ. On the other hand, for p = N
f
exactly in every single memory and in this case η = Kt .
tM
We can write p in terms of η, i.e. p = KηN
, where
f
η ∈ [Γ, Kt ] ∩ Z. Increasing η translates into a decreased
cached portion from each file and higher replication in the
memories which, in turn, is translated into multicasting messages intended for more receivers. However, a larger uncached
part needs to be delivered using zero-forcing. Selecting the
right parameter η (or equivalently the right p), is crucial to
achieve an optimum trade-off between spatial multiplexing and
coded multicasting gains as we see in what follows. Next, the
placement and delivery phase of the PS is described in detail.
B. Delivery Phase
During the delivery phase, the actual demands from users
are revealed. A given file Wk requested by the corresponding
user k consists of three parts: a) a part that is contained in
the cache Zk and hence it is not requested during the delivery
phase, b) a part that is contained in the memories of other users
Zm for m ∈ Kt \ k, which is termed as the requested cached
(c)
part and given by the subfiles Wk,τ , for all k ∈
/ τ c) a part
that has never been cached termed as the uncached part which
(p)
is denoted by Wk . The delivery phase is carried out using a
superposed transmission of the requested cached part, where
the coded multicasting information is delivered by a common
symbol decoded by all Kt users, and the uncached parts,
delivered through private symbols in a zero-forcing fashion.
Since the users share the zero-forcing layer in a orthogonal
manner, the transmission is carried out over G sub-phases
indexed by g = 1, . . . , G. Without loss of generality, we
assume that in the g-th sub-phase, the private symbols are
intended to the group Kg = {(g − 1)K + 1, . . . , gK}.
We denote the common symbols transmitted over the G
(c)
sub-phases as {xg }G
g=1 . They carry the coded messages
(c)
(c)
WS = (⊕k∈S Wk,S\{k} : S ∈ Θ)
(7)
where Θ = {S ⊂ Kt : |S| = η + 1}. These coded messages
are a combination of the requested cached part as they were
first proposed in [2] and each of them contains information for
η + 1 users. Similarly, at the g-th sub-phase, private symbols
(p)
(p)
xk carry the uncached parts Wk , where k ∈ Kg . During
the g-th delivery sub-phase, the transmitted signal is
X √
√
(p) (p)
(8)
P β vk xk +O(1)
xg = P v(c) x(c)
g +
|
{z
} k∈Kg
MAN
{z
}
|
ZF
(p)
A. Placement Phase
We first describe the placement and delivery for a given
tM
factor η, or equivalently p = KηN
. Then η is optimized to
f
minimize the delivery time. We divide each of the Nf files
W1 , W2 , . . . , WNf into two subfiles:
Wn = (Wn(c) , Wn(p) )
(6)
(c)
Wn ,
where
of size pf , is cached into the memories while
(p)
Wn , of size (1 − p)f , is never cached. We apply the idea in
(c)
(c)
(c)
[2] to the subfiles W1 , W2 , . . . , WNf by jointly encoding
all Kt users together considering their total global cache
(c)
memory. Consequently,
according to [2], each subfile Wn
(c)
Kt
is split into η smaller subfiles Wn,τ , for all τ ∈ Ω, where
(c)
Ω = {τ ⊂ Kt : |τ | = η}. It follows that each subfile Wn,τ has
. From each file n ∈ {1, 2, . . . , Nf }, user k caches
size pf
(Kηt )
(c)
the subfiles Wn,τ such that k ∈ τ . Hence each user caches Mf
Nf
(c)
bits from any Wn . Since we assume different demands across
users, the total number of files to be delivered from the cached
(c)
M
tM
part of the library is given by Qη = Kt ( KηN
−N
) 1 ·
f
f 1+η
Additionally, the number of files to be delivered
through zero
(p)
Kt M
forcing is given by Qη = Kt 1 − ηNf ·
where v(c) ∈ CM×1 and vk ∈ CM×1 are unitary precoding
vectors, and β ∈ [0, 1] is the power partitioning factor [11].
Note that the term O(1) guarantees that the power constraint is
not violated. Such term has no influence on high-SNR analysis.
(c)
Since xg has to be decoded by all Kt users, v(c) is chosen as
a generic precoding vector. On the other hand, private symbols
are precoded using the well-known zero-forcing precoders.
The received signal for each user k ∈ Kt is given by
X√
√
(p) (p)
(c) (c)
y k = P hH
+ O(1).
P β hH
k v xg +
k vi xi
i∈Kg
(c)
All users in Kt decode xg by treating the interference
(c)
from all the other symbols as noise. Hence, xg can carry
(1 − β) log2 (P ) bits per time slot. Users in Kg proceed to
(c)
remove the contribution of xg to the received signal and
(p)
(p)
decode their private symbols xk . The symbol xk is decoded
β
with a SINR of O(P ), hence carrying β log2 (P ) bits per
time slot. It follows that the cached part of the library is
delivered with a rate of (1 − β) log2 (P ) bits per time slot and
the uncached part of the library with a rate of Kβ log2 (P ) bits
(c)
per time slot. From {xg }G
g=1 each user k ∈ Kt retrieves the
(c)
messages WS and consequently its cached part. In fact any
4
(c)
missing sub-files Wk,τ , so that k ∈
/ τ , can be recovered by
(c)
(c)
combining WS with the pre-stored sub-files Wi,S\{i} , where
(p)
S = τ ∪ {k} and i ∈ S \ {k}. On the other hand, from xk
(p)
each user k ∈ Kg retrieves the uncached part Wk .
C. Delivery time
During the communication both the cached and uncached
∗
parts must be delivered. We indicate as TD,η
the delivery
time of such communication. The power partitioning factor,
indicated as β ∗ , is chosen to let both parts to be delivered
(p)
over this delivery time. Hence, the two equalities Qη f =
(c)
∗
∗
Kβ ∗ f TD,η
and Qη f = (1 − β ∗ )f TD,η
must be simultaneously satisfied. It can be verified that the solution is given by
Q(p)
(c)
η
K + Qη and
(p)
(c)
Qη and Qη , we obtain
∗
TD,η
=
∗
TD,η
β∗ =
Q(p)
η /K
(p)
(c)
Qη /K+Qη
. By expanding
M Kt
M Kt
M
Kt
=G 1−
−
+
.
ηNf
η + 1 ηNf
Nf
(9)
The value of η ∈ [Γ, Kt ] ∩ Z must be chosen to minimize the
delivery time in (9). This is given by
TD∗ =
min
η∈[Γ,Kt ]∩Z
∗
TD,η
.
(10)
where TD∗ denotes the minimum delivery time. The following
result holds for which proof can be found in the appendix.
Proposition 1. In case of perfect CSIT, the PS achieves a
delivery time TD∗ given by
TD∗ =
min
η∈{⌊x⌋,⌈x⌉}
∗
TD,η
x=
∗
which scales as O(P β ), where β ∗ =
(p)
Qη∗ /K
(p)
(c)
Qη∗ /K+Qη∗
. If the
channel estimation error decays as O(P −α ), where α ≥ β ∗ ,
each user can still decode its own private symbol as interference from other symbols is at (or below) the noise floor.
[14]. Hence the SINR still scales as in case of perfect CSIT. It
follows that, the delivery time TD∗ is mantained for any CSIT
quality no less than β ∗ . Since this represents a CSIT quality
threshold, by indicating it as α∗ , we obtain
t
G 1 − MK
η ∗ Nf
.
(13)
α∗ = β ∗ =
MKt
Kt
M
t
G 1 − η∗ Nf + η∗ +1 MK
η ∗ Nf − Nf
B. General Case
The case α < α∗ is treated by caching a larger fraction
of the library which reduces the load carried by the private
symbols. We proceed by considering a given η which will be
then optimized based on the actual CSIT. For the delivery of
the uncached part, zero-forcing is replaced by rate-splitting,
which is well suited to operate under partial CSIT [14]. The
placement phase and delivery phase follow the same steps
as in perfect CSIT. In rate-splitting, at the g-th delivery sub(p)
phase, the uncached parts Wk with k ∈ Kg are divided
(p)
and partially mapped to the private symbols xk , while
the remaining parts are jointly encoded into the symbol x̃g ,
decoded by all users in Kg . The transmitted signal is
X √
√
√
(p) (p)
β (c) x̃ +
P a vk xk +O(1)
xg = P v(c) x(c)
g
g + P v
{z
}
|
k∈Kg
MAN
{z
}
|
RS
(11)
where
G(K − 1) +
A. CSIT Relaxation
In Section IV-B, perfect CSIT was exploited to deliver K
interference-free private symbols, transmitted with a power
p
G2 (K − 1)2 + G(G + 1)(K − 1)
.
G+1
(12)
The value of η that minimizes the delivery time in (11) is
∗
denoted by η ∗ , i.e. TD∗ = TD,η
∗ . By comparing the result in
Preposition 1 with the delivery time in (4) and (5), it is verified
that TD∗ < TDOS ≤ TDMAN . Hence, simultaneously exploiting
the global cache memory of all users and the multiplexing
gain, the PS strictly outperforms both OS and MAN.
V. PARTIAL CSIT
In this section, we relax the constraint of perfect CSIT
and consider a setting with partial CSIT. The scheme in turn
is generalized to account for such imperfection. We start by
showing that the delivery time in (11) can be maintained, while
relaxing the CSIT quality α. Then we modify the PS to be
adaptable for any α, by properly tailoring the cached part of
the library based on the available CSIT.
where symbols, precoding vectors and powers are defined as in
the previous section, with the difference that the power of the
private symbols scales as O(P a ), with a ≤ β. Furthermore,
to force interference between private symbols to the noise
floor level, we need a ≤ α. Hence, we take a = min(α, β).
(c)
All users in Kt decode xg by treating the other symbols as
noise, hence it can carry (1 − β) log2 (P ) bits per time slot.
(c)
Then, all users in Kg proceed to cancel xg and decode x̃g ,
which is then canceled before decoding their respective private
symbols. It can be easily verified that rate-splitting achieves a
total rate of (β+(K −1) min(α, β)) log 2 (P ) bits per time slot.
Further details on the rate-splitting procedure can be found in
(c)
[11], [14]. As before, from {xg }G
g=1 each user can retrieve
(p)
its desired cached part, while from x̃g and xk users k ∈ Kg
retrieve their uncached parts.
C. Delivery Time
As in Section IV-C, the power partitioning factor β ∗ is cho(p)
sen such that Qη f = (β ∗ + (K − 1) min(α, β ∗ ))f TD,η (α)
(c)
and Qη f = (1 − β ∗ )f TD,η (α), where TD,η (α) denotes the
delivery time. The delivery time is given by
( ∗
TD,η , α ≥ α∗η
(c)
(14)
TD,η (α) = Q(p)
η +Qη
∗
1+(K−1)α , α < αη
5
(c)
TD (α) =
min
η∈[Γ,Kt ]∩Z
TD,η (α).
8
7
MAN
PS
6
TD
5
4
3
2
1
0
0.2
0.4
0.6
0.8
1
α
Fig. 1. TD as function of the CSIT quality α for K = 8 and G = 2
(15)
The following result holds for which the proof is given in the
appendix.
0.8
0.8
α th
Proposition 2. Given a CSIT quality α, we can achieve the
following delivery time:
(
TD∗ , α ≥ α∗
TD (α) =
1+(K−1)α∗
η+1
∗
∗
∗
min{TD,η
, TD,η+1
1+(K−1)α }, α < α
(16)
where
η = arg ′ max∗ {η ′ : α∗η′ ≤ α}.
(17)
1
1
OS
PS
0.6
OS, K=4
PS, K=4
OS, K=8
PS, K=8
0.6
α th
Q(p)
Q(p) /K
η
∗
where α∗η = (p) η
(c) and TD,η =
K + Qη . It can be
Qη /K+Qη
seen that given a certain partition η, the same delivery time
as in perfect CSIT can be maintained as long as α ≥ α∗η . On
the other hand, in case of α < α∗η , the delivery time is given
by the ratio between the total number of transmitted files and
the total communication rate. In case of η = η ∗ , we reduce to
∗
∗
α∗η∗ = α∗ and TD,η
∗ = TD , in agreement with Section V-A.
For a given quality α, the minimum achievable delivery time,
denoted by TD (α), is given as
0.4
0.4
0.2
0.2
0
1
2
3
4
G
OS
a) αPS
th and αth with respect to G
0
0.5
1
1.5
M
2
2.5
3
OS
b) αPS
th and αth with respect to M
OS
Fig. 2. CSIT qualities for the PS and OS to achieve TD
η ∈[Γ,η )∩Z
∗
For α ≥ α we can achieve the same delivery time as perfect
CSIT given in Proposition 1. Examining the delivery time from
the expression in (16) for the entire range of α is not an easy
task as we were not able to derive a more tractable expression.
However, it can be seen that for α = 0, we obtain η = Γ
in (17) and the scheme reduces to MAN. The influence of
increasing α is examined through simulations in the following
section where it is shown that the PS leverages the available
CSIT and outperforms the MAN scheme.
Looking at the PS from a different perspective, we investigate the minimum CSIT quality required to achieve a given
delivery time T . This is given through the following result for
which the proof is given in the appendix.
Proposition 3. A delivery time T ≥ TD∗ can be achieved by
a CSIT quality α equal to
∗
TD,η
1 + (K − 1)α∗η − T
(18)
α=
(K − 1)T
where
η = arg
min
η ′ ∈[Γ,η ∗ ]∩Z
∗
{η ′ : TD,η
′ ≤ T }.
(19)
Since the MAN scheme does not require CSIT, it is suitable
to compare to the OS in this context. We further assume that
each orthogonal group of K users is served using the strategy
in [8] to account for imperfect CSIT. It follows that the delivery time TDOS can be achieved while applying coded caching
N −
Nf
−M
f
K
and relaxing the CSIT quality to αOS
th = M +N − Nf −M . In
f
K
K
comparision, by applying Proposition 3, we can characterize
the minimum CSIT quality needed by the PS to achieve TDOS,
OS
∗
denoted as αPS
th . We observe that TD = TD,K−1 . Hence the
PS
value of αth in (18) is given by
αPS
th =
Nf −
M
K
Nf
K
+ Nf −
− MG
Nf
K
−M
.
(20)
PS
PS
By comparing αOS
th and αth , we can see that αth is strictly
lower for the overloaded case (G ≥ 2).
VI. N UMERICAL RESULTS
In this section, we numerically evaluate the PS. First, we
compare the delivery time TD (α) achieved under different
CSIT qualities to the one achieved using the MAN scheme, i.e.
TDMAN . This is given in Fig. 1 for a setup with K = 8 antennas,
overloading factor G = 2 and memories of size M f bits, with
M = 1. We consider a library of Nf = Kt throughout the
simulations. We observe that the PS leverages the available
CSIT quality to reduce the delivery time compared to MAN.
In particular, for α = 1, the delivery time is four times lower.
Next, we compare the PS with OS in terms of the minimum
CSIT quality needed to achieve TDOS in (4). In Fig. 2a we plot
OS
αPS
th and αth as a function of G. We consider a setup with
K = 4, 8 and M = 2. As we can see, the OS suffers when
G increases, while the PS, in addition to outperforming OS,
benefits from a larger G. Finally, in Fig. 2b we plot αPS
th and
αOS
as
a
function
of
M
with
K
=
4
and
G
=
2.
We
can
see
th
OS
for
increasing
M
.
decreases
much
faster
than
α
that αPS
th
th
VII. C ONCLUSION
In this paper, we studied the complementary gain of coded
caching and spatial multiplexing gain for an overloaded
MISO BC. We investigated how to simultaneously combine
the gain offered from the aggregate global cache memory,
with the gain offered by the presence of available CSIT.
We introduced a novel scheme which superimposes MaddahAli Niesen scheme, to exploit the coded caching gain, to a
multiuser transmission scheme, to leverage the available CSIT.
Analytical and numerical results showed a significant gain
compared to the existing schemes, both in terms of delivery
time and CSIT quality requirement.
6
A PPENDIX
C. Proof of Proposition 3
A. Proof of Proposition 1
In order to prove Proposition 1, we need to evaluate the
∗
minimum of the function TD,η
in (9) with respect to η over
the interval [Γ, Kt ] ∩ Z, and we remember that Kt = GK.
The minimum value is indicated as TD∗ in (10). We start by a
relaxation, where η is allowed to take any value in [Γ, Kt ].
∗
We can notice that TD,η
is convex over such interval and
∗
∗
∗
TD,K−1 = TD,GK , hence TD,η
has a minimum in [K − 1, Kt ].
∗
The first derivative of TD,η with respect to η is equal to zero
for η = x, given in (12). By restricting η to be an integer, i.e.
∗
η ∈ [Γ, Kt ] ∩ Z, we have that TD,η
is minimum in either ⌊x⌋
or ⌈x⌉, from which the expression in (11) follows. It can be
∗
∗
easily verified that TD,K−1
= TD,GK
= TDOS , where TDOS is
∗
OS
MAN
given in (4). Hence, TD < TD ≤ TD .
B. Proof of Proposition 2
In order to prove Proposition 2, we need to find the value
of TD (α) in (15). We have
TD (α) =
min
η ′ ∈[Γ,Kt ]∩Z
TD,η′ (α)
(21)
where TD,η′ (α) is defined as in (14). As explained in
Section V-A, in case α ≥ α∗ , it is possible to achieve the
same delivery time as in the case of perfect CSIT. Hence,
TD (α) = TD (1) = TD∗ . We now focus on the case α < α∗ .
We start by considering α∗η′ in Section V-C
(p)
Qη′ /K
α∗η′ =
(p)
Qη′ /K
+
(c)
Qη ′
=
1
(c)
(p)
1 + KQη′ /Qη′
.
(22)
(c)
It can be shown that Qη′ is a decreasing function of η ′ while
(p)
Qη′ is an increasing function of η ′ . It follows that α∗η′ is
also an increasing function of η ′ . Then, by denoting the total
number of files to be transmitted as Qη′ , we have
(c)
(p)
Qη ′ = Qη ′ + Qη ′ = Kt −
M 1
(K 2 + Kt )
Nf η ′ + 1 t
(23)
which is also an increasing function of η ′ . Moreover, from
(14), the following relationship is verified
∗
∗
Qη′ = TD,η
′ (1 + (K − 1)αη ′ ).
(24)
Given that we are considering α < α∗ and we know that
α∗η∗ = α∗ and α∗Γ = 0, there must exist an η such that
η = arg maxη′ ∈[Γ,η∗ )∩Z {η ′ : α∗η′ ≤ α}. Moreover, from the
∗
proof of Proposition 1, we know that TD,η
′ is a decreasing
′
∗
function with respect to η in [Γ, η ) ∩ Z. From (14), consid∗
∗
ering η ′ ≤ η, we have TD,η′ (α) = TD,η
′ ≥ TD,η . In case of
′
η ≥ η + 1, we have
(p)
(c)
Qη ′ + Qη ′
(p)
(c)
Qη+1 + Qη+1
= TD,η+1 (α).
1 + (K − 1)α
1 + (K − 1)α
(25)
∗
Hence, TD (α) is the minimum between TD,η
and TD,η+1 (α),
from which Proposition 2 follows.
TD,η′ (α) =
≥
∗
From the proof of Proposition 1, we know that TD,η
′ is
′
∗
a decreasing function with respect to η in [Γ, η ] ∩ Z and
increasing in [η ∗ , Kt ] ∩ Z. Hence, there must exist
η = arg
min
∗
{η ′ : TD,η
′ ≤ T}
(26)
∗
{η ′ : TD,η
′ ≤ T }.
(27)
η ′ ∈[Γ,η ∗ ]∩Z
and
ζ = arg
max
η ′ ∈[η ∗ ,Kt ]∩Z
∗
In case of η ′ < η or η ′ > ζ, we have TD,η
′ > T , thus
the delivery time T is not achievable. On the other hand, by
considering η ′ ∈ [η, ζ] and applying (14), the delivery time T
is achieved by a CSIT quality given by
(p)
α
η′
=
(c)
Qη ′ + Qη ′ − T
(K − 1)T
.
(28)
(p)
(c)
As expressed in the proof of Proposition 2, Qη′ + Qη′
increases with η ′ . It follows that η = arg minη′ ∈[η,ζ]∩Z αη′ .
(p)
(c)
∗
From Qη + Qη = TD,η
(1 + (K − 1)α∗η ), we obtain (18).
R EFERENCES
[1] N. Golrezaei, K. Shanmugam, A. G. Dimakis, A. F. Molisch, and
G. Caire, “Femtocaching: Wireless video content delivery through
distributed caching helpers,” in Proc. IEEE INFOCOM, pp. 1107–1115,
Mar. 2012.
[2] M. A. Maddah-Ali and U. Niesen, “Fundamental limits of caching,”
IEEE Trans. Inf. Theory, vol. 60, pp. 2856–2867, May 2014.
[3] M. A. Maddah-Ali and U. Niesen, “Decentralized coded caching attains
order-optimal memory-rate tradeoff,” IEEE/ACM Trans. Net., vol. 23,
pp. 1029–1040, Aug. 2015.
[4] D. Gesbert, S. Hanly, H. Huang, S. S. Shitz, O. Simeone, and W. Yu,
“Multi-cell MIMO cooperative networks: A new look at interference,”
IEEE J. Sel. Areas Commun., vol. 28, pp. 1380–1408, Dec. 2010.
[5] S. A. Jafar, “Interference alignment a new look at signal dimensions in
a communication network,” Found. Trends Commun. Inf. Theory, vol. 7,
no. 1, pp. 1–134, 2011.
[6] M. A. Maddah-Ali and U. Niesen, “Cache-aided interference channels,”
in Proc. IEEE ISIT, pp. 809–813, Jun. 2015.
[7] N. Naderializadeh, M. A. Maddah-Ali, and A. S. Avestimehr, “Fundamental limits of cache-aided interference management,” in Proc. IEEE
ISIT, pp. 2044–2048, Jul. 2016.
[8] J. Zhang, F. Engelmann, and P. Elia, “Coded caching for reducing CSITfeedback in wireless communications,” in Proc. Allerton, pp. 1099–1105,
Sep. 2015.
[9] J. Zhang and P. Elia, “Fundamental limits of cache-aided wireless
BC: Interplay of coded-caching and CSIT feedback,” arXiv:1511.03961,
2015.
[10] S. Yang, K. H. Ngo, and M. Kobayashi, “Content delivery with coded
caching and massive MIMO in 5G,” in Proc. ISTC, pp. 370–374, Sep.
2016.
[11] E. Piovano, H. Joudeh, and B. Clerckx, “Overloaded multiuser MISO
transmission with imperfect CSIT,” arXiv:1612.00628, 2016.
[12] N. Jindal, “MIMO broadcast channels with finite-rate feedback,” IEEE
Trans. Inf. Theory, vol. 52, pp. 5045–5060, Nov. 2006.
[13] S. Yang, M. Kobayashi, D. Gesbert, and X. Yi, “Degrees of freedom
of time correlated MISO broadcast channel with delayed CSIT,” IEEE
Trans. Inf. Theory, vol. 59, pp. 315–328, Aug. 2013.
[14] H. Joudeh and B. Clerckx, “Sum-rate maximization for linearly precoded
downlink multiuser MISO systems with partial CSIT: A rate-splitting
approach,” IEEE Trans. Commun., vol. 64, pp. 4847–4861, Aug. 2016.
| 7cs.IT
|
Characterizations of the Logistic and Related Distributions
Chin-Yuan Hu and Gwo Dong Lin
arXiv:1803.06620v1 [math.ST] 18 Mar 2018
National Changhua University of Education and Academia Sinica
Abstract. It is known that few characterization results of the logistic distribution were
available before, although it is similar in shape to the normal one whose characteristic properties have been well investigated. Fortunately, in the last decade, several authors have made
great progress in this topic. Some interesting characterization results of the logistic distribution have been developed recently. In this paper, we further provide some new results by
the distributional equalities in terms of order statistics of the underlying distribution and
the random exponential shifts. The characterization of the closely related Pareto type II
distribution is also investigated.
AMS subject classifications: Primary 62E10, 62G30, 60E10.
Key words and phrases: Characterization, order statistics, stochastic order, logistic distribution, exponential distribution, Pareto type II distribution.
Short title: The logistic and related distributions
Postal addresses: Chin-Yuan Hu, Department of Business Education, National Changhua
University of Education, Changhua 50058, Taiwan. (E-mail: [email protected])
Gwo Dong Lin, Institute of Statistical Science, Academia Sinica, Taipei 11529, Taiwan.
(E-mail: [email protected])
1
1. Introduction
The logistic distribution is similar to a normal distribution in shape (Mudholkar and
George 1978) and has an explicit closed form, so it has some advantages in practical applications. As remarked by Kotz (1974), few characterizations of the logistic distribution were
available before, but recently, some interesting results have been developed. In this paper,
we will further provide some more new results by properties of order statistics.
We first introduce some notations. Let X obey the distribution F , denoted by X ∼ F.
Let {Xj }nj=1 be a random sample of size n from distribution F and denote the corresponding
order statistics by X1,n ≤ X2,n ≤ · · · ≤ Xn,n . The distribution function of Xk,n is denoted
by Fk,n . It is known that Fk,n is the composition of Bk,n−k+1 and F (see, e.g., Hwang and
Lin 1984), where Bα,β is the beta distribution with parameters α, β > 0, namely,
Z F (x)
n
Fk,n (x) = Bk,n−k+1(F (x)) = k
tk−1 (1 − t)n−k dt, x ∈ R ≡ (−∞, ∞), (1)
k
0
Z
Γ(α + β) u α−1
Bα,β (u) =
t (1 − t)β−1 dt, u ∈ [0, 1].
(2)
Γ(α)Γ(β) 0
On the other hand, for Y ∼ G, we say that X is less than or equal to Y in the usual
stochastic order, denoted by X ≤st Y, if F ≤ G, where F (x) = 1 − F (x) = Pr(X > x).
Let us start with an interesting simple example. Clearly, for general distribution F , we
2
have X1,2 ≤st X because F1,2 = 1−F ≥ F by (1). One possibility to adjust this ”inequality”
is to choose a nonnegative random variable Z, independent of X and Xj ’s, such that
d
X = X1,2 + Z
(3)
or
d
X − Z = X1,2 ,
(4)
d
where = means equality in distribution. One might think that the solutions of the distributional equations (3) and (4) are the same, but this is not true in general, because
the characteristic function of Z is not equal to the reciprocal of that of −Z, namely,
E[eitZ ] 6= (E[e−itZ ])−1 , t ∈ R, in general. For example, if Z has the standard exponential
distribution E, then the solution of (3) is a logistic distribution F (x) = 1/[1+e−(x−µ) ], x ∈ R,
2
where µ ∈ R is a constant, while the solution of (4) is a negative (or reversed) exponential
distribution F (x) = e(x−µ)/2 , x ≤ µ, where µ ∈ R is a constant (see, e.g., George and Mudholkar 1982, Lin and Hu 2008, and Ahsanullah et al. 2011, and note that the smoothness
conditions on F therein are redundant due to Lemmas 1–3 below).
Throughout the paper, let U and ξ obey the uniform distribution U on [0, 1] and the
standard exponential distribution E, respectively. Moreover, let {Uj }nj=1 and {Uj′ }nj=1 be two
random samples of size n from U, and let {ξj }nj=1 and {ξj′ }nj=1 be two random samples of size
n from E. All the above random variables X, U, ξ, Xj , Uj , Uj′ , ξj and ξj′ , j = 1, 2, . . . , n, are
assumed to be independent from now on.
Mimicking the above characterization approaches (3) and (4), several authors have considered the general stochastic inequality Xk,n ≤st Xk+1,n and solved the distributional
d
d
equations (a) Xk+1,n = Xk,n + aξ and (b) Xk,n = Xk+1,n − bξ, or, more generally, (c)
d
Xk,n + aξ1 = Xk+1,n − bξ2 , where a and b are nonnegative constants. In particular, the
equality
Xk,n +
1
1
d
ξ1 = Xk+1,n − ξ2
n−k
k
also characterizes the logistic distribution. (See AlZaid and Ahsanulla 2003, Wesolowski and
Ahsanulla 2004, and Ahsanulla et al. 2010, 2012 for equations arising from Xk,n ≤st Xk+r,n
with 1 ≤ r ≤ n − k.) Besides, the distributional equations arising from (a) X ≤st Xn,n ,
(b) X1,n ≤st Xn,n and (c) Xm,m ≤st Xn,n , where m < n, were investigated by Zykov and
Nevzorov (2011), Ananjevskii and Nevzorov (2016) as well as Berred and Nevzorov (2013),
respectively.
In this paper we will solve the distributional equations arising from stochastic inequalities:
(i) Xk,n ≤st Xk,n−1 , (ii) Xk,n−1 ≤st Xk+1,n , (iii) Xk,n ≤st Xk,k , (iv) X1,k ≤st Xn−k+1,n , (v)
Xk,n ≤st Xk,n−m, and (vi) Xm−k,n−k ≤st Xm,n .
To do this, some useful lemmas are given in the next section. The main characterization
results are stated and proved in Sections 3 and 4. For simplicity, we first deal with the closely
related Pareto type II distribution in Section 3, and then the logistic distribution in Section
4. Finally, we pose an open problem in Section 5.
2. Lemmas
3
We need some lemmas in the sequel. Lemma 1(i) was given without proof in Lukacs (1970,
p. 38), but has been ignored in the literature. We provide a proof here for completeness.
Lemma 1. (i) Let Y and Z be two independent random variables. If Y has an absolutely
continuous distribution, then so does Y + Z, regardless of the distribution of Z.
(ii) If, in addition to the assumptions in (i), both Y and Z are positive random variables,
then the product Y Z has an absolutely continuous distribution.
Proof. Let F , G and H be the distributions of Y + Z, Y and Z, respectively. Then
Z ∞
F (x) =
G(x − z)dH(z), x ∈ R.
−∞
Since G is absolutely continuous, we have that for each ε > 0, there exists a δ > 0 such
P
Pn
that nj=1 [G(bj ) − G(aj )] < ε if
j=1 (bj − aj ) < δ, where aj < bj ≤ aj+1 < bj+1 , j =
1, 2, . . . , n − 1. This in turn implies that for the above {(aj , bj )}nj=1 ,
n
X
[F (bj ) − F (aj )] =
Z
∞
n
X
[G(bj − z) − G(aj − z)]dH(z) <
−∞ j=1
j=1
Z
∞
ε dH(z) = ε.
−∞
Hence, part (i) is proved. To prove part (ii), we recall first that both the logarithmic and
exponential functions are absolutely continuous, and that the composition preserves the
property of absolute continuity. Then consider log(Y Z) = log Y + log Z and use part (i)
to conclude that log(Y Z) has an absolutely continuous distribution, and hence so does Y Z.
This completes the proof.
It is known that the inverse function of an absolutely continuous function with positive
derivative almost everywhere is not necessarily absolutely continuous. However, we have the
following useful result.
Lemma 2. Let F be an absolutely continuous distribution on [0, 1] and F ′ (x) = f (x) > 0
on (0, 1). Then the inverse function of F is itself an absolutely continuous distribution.
Proof. By the assumptions, F is a strictly increasing and continuous function from [0, 1]
to [0, 1], so is its inverse function F −1 . This implies that F −1 is a continuous distribution on [0, 1]. Moreover,
d
F −1 (t)
dt
= 1/f (F −1(t)) is a positive measurable function on (0, 1)
(see, e.g., Shorack and Wellner 1986, pp. 8-9). By changing variables x = F −1 (t), we have
R 1 d −1
R1
[ F (t)]dt = 0 [1/f (x)] · f (x)dx = 1. Therefore, the distribution function F −1 has no
0 dt
singular part and is absolutely continuous. The proof is complete.
4
Lemma 3. If the distribution Fk,n of order statistic Xk,n is absolutely continuous, then so
is the underlying distribution F of X.
Proof. Recall (see (1)) that Fk,n (x) = Bk,n−k+1(F (x)), x ∈ R, where Bk,n−k+1, defined in
(2), is the beta distribution Bα,β with parameters α = k and β = n − k + 1, and has a
−1
positive continuous density function on (0, 1). Therefore, F = Bk,n−k+1
◦ Fk,n is absolutely
continuous by Lemma 2. The proof is complete.
Lemma 4. Let 1 ≤k
< n. Then we have the following identities:
n
n−1
n−k
k n−k
F F
(i) Fk,n − Fk+1,n =
F kF
, (ii) Fk,n − Fk,n−1 =
, and
k
k−1
n−k
n−1
(iii) Fk,n−1 − Fk+1,n =
F kF
.
k
Proof. For parts (i) and (ii), see, e.g., David and Shu (1978) as well as David and Nagaraja
(2003, p. 23), while part (iii) follows from parts (i) and (ii) and the identity:
n
n−1
n−1
=
+
.
k
k−1
k
Denote the left and the right extremities of F by ℓF and rF , respectively. It is known that
if the absolutely continuous F satisfies the functional equation F ′ (x) = F (x)(1 − F (x)), x ∈
(ℓF , rF ), then F is a logistic distribution. In the next lemma we extend this result.
Lemma 5. Let r, θ > 0, a ∈ [0, 1], and let F be an absolutely continuous distribution
function satisfying xa F ′ (x) = θF (x)(1 − F r (x)) for x ∈ (ℓF , rF ).
(i) If a = 1, then ℓF = 0, rF = +∞ and
1/r
λxrθ
, 0 ≤ x < ∞,
F (x) =
1 + λxrθ
where λ is a positive constant.
(ii) If a ∈ [0, 1), then ℓF = −∞, rF = +∞ and
F (x) =
rθ 1−a
λ exp( 1−a
x )
rθ 1−a
x )
1 + λ exp( 1−a
!1/r
, −∞ < x < ∞,
where λ is a positive constant.
Proof. Define the increasing function G(x) = (1 − F r (x))−1 − 1 from (ℓF , rF ) onto (0, ∞).
Then G′ (x) = rF r−1 (x)F ′ (x)(1 − F r (x))−2 , and hence
xa G′ (x) = rθG(x), x ∈ (ℓF , rF ).
5
(a) If a = 1, solving the above equation leads to G(x) = λxrθ , x ∈ (ℓF , rF ), for some constant
λ > 0. On the other hand, we have, by the definition of G, that
1/r
1/r
G(x)
λxrθ
F (x) =
=
, x ∈ (ℓF , rF ),
1 + G(x)
1 + λxrθ
and hence, ℓF = 0 and rF = +∞, because F is a distribution function. This proves part (i).
rθ 1−a
x ), x ∈ (ℓF , rF ), for some constant
(b) If a ∈ [0, 1), we have instead G(x) = λ exp( 1−a
λ > 0. The required result then follows from both the definition of the function G and the
fact that F is a distribution function. The proof is complete.
Some equalities (in distribution) of the next lemma are essentially due to Nevzorov (2001,
Lecture 3), but we provide here an alternative and possibly simpler proof.
Lemma 6. Let ξk,n (Uk,n , resp.) be the k-th smallest order statistic of a random sample
of size n from the standard exponential distribution E (the uniform distribution U, resp.).
Then the following statements are true.
n−k+1
(i) The Laplace transform of ξk,n is Lξk,n (s) = n−k+1+s
·
d P
1
ξk−j+1, where 1 ≤ k ≤ n.
(ii) ξk,n = kj=1 n−j+1
n−k+2
n−k+2+s
n
· · · n+s
, s ≥ 0.
d
′
(iii) ξm,n = ξm−k,n−k + ξk,n
, where 1 ≤ k < m ≤ n.
d Q
1/(n−j+1)
(iv) Un−k+1,n = kj=1 Uj
, where 1 ≤ k ≤ n.
d
′
(v) Uk,n = Uk,m−1 · Um,n
, where 1 ≤ k < m ≤ n.
n R E(x) k−1
Proof. Recall that the distribution of ξk,n is Fξk,n (x) = k
t (1 − t)n−k dt, x ≥ 0,
k 0
where E(x) = Fξ (x) = 1 − e−x , x ≥ 0. Then the Laplace transform of ξk,n is
Z ∞
Z ∞
n
−sξk,n
−sx
Lξk,n (s) = E[e
]=
e dFξk,n (x) = k
e−(n−k+1+s)x (1 − e−x )k−1 dx, s ≥ 0.
k
0
0
By integration by parts, it follows from the above integral that
Z ∞
k−1
n
Lξk,n (s) = k
e−(n−k+2+s)x (1 − e−x )k−2 dx = · · ·
k n−k+1+s 0
Z ∞
k−2
1
k−1
n
·
···
·
e−(n+s)x dx
= k
k n−k+1+s n−k+2+s
n−1+s 0
n−k+2
n−1
n
n−k+1
·
···
·
, s ≥ 0.
=
n−k+1+s n−k+2+s
n−1+s n+s
This proves part (i), which in turn implies parts (ii) and (iii) by the fact that E[e−s(ξ/k) ] =
d
k/(k + s), s ≥ 0. Part (iv) follows from part (ii) because Uj = exp(−ξk−j+1 ) and the order
6
d
d
′
statistic Un−k+1,n = exp(−ξk,n ). To prove part (v), we have Un−m+1,n = Un−m+1,n−k · Un−k+1,n
by using part (iii), and then reset k = n − m + 1. The proof is complete.
Lemma 7. Let Y obey the Pareto type II (or log-logistic) distribution G(y) = y/(1+y), y ≥
0. Let {Yj }nj=1 , independent of U and {Uj }nj=1 , be a random sample of size n from G. Then
we have the following equalities in distribution:
d
d
(i) 1/Y = Y and in general, 1/Yk,n = Yn−k+1,n , where 1 ≤ k ≤ n.
d
(ii) Yk,n−1 = Yk,n /U 1/(n−k) , where 1 ≤ k ≤ n − 1.
d
(iii) Yk,n−m = Yk,n/Un−k−m+1,n−k , where 1 ≤ k ≤ n − m.
d
(iv) Yk,n−1 = Yk+1,n · U 1/k , where 1 ≤ k ≤ n − 1.
d
(v) Ym−k,n−k = Ym,n · Um−k,m−1 , where 2 ≤ k + 1 ≤ m ≤ n.
Proof. It is easy to check part
To prove the remaining parts, recall that the distri (i).
n R G(y) k−1
bution of Yk,n is Gk,n (y) = k
t (1 − t)n−k dt, y ≥ 0. Then we have H(y) ≡
k 0
R1
Pr(Yk,n /U 1/(n−k) ≤ y) = 0 Gk,n (yu1/(n−k))du. By changing variables,
Z 1
Z 1
n−k
H(y) =
Gk,n (yt)dt
= (n − k)
Gk,n (yt)tn−k−1dt, y ≥ 0.
0
0
Therefore, Gk,n−1 = H iff, by differentiation,
n Z 1
n+1
1
1
=
tn−1 dt, y ≥ 0,
n
1+y
1
+
yt
0
which is, however, a special case of the well-known identity
β1
β1 +β2
Z
1
Γ(β1 + β2 ) 1
1
=
tβ1 −1 (1 − t)β2 −1 dt, y ≥ 0
1+y
Γ(β1 )Γ(β2 ) 0 1 + yt
(see Gradshteyn and Ryzhik 2014, p. 314). This proves part (ii). Part (iii) follows from part
(ii) by iteration and Lemma 6(iv), while part (iv) follows from either parts (i) and (ii) (letting
d
d
k∗ = n − k) or Lemma 8(iii) below because Y = exp(X) and U = exp(−ξ). Finally, we prove
part (v) by using part (iv), iteration and Lemma 6(iv) again. The proof is complete.
Lemma 8. Let X obey the standard logistic distribution F (x) = 1/[1 + exp(−x)], x ∈ R.
Then we have the following equalities in distribution:
d
(i) Xk,n−1 = Xk,n +
1
ξ,
n−k
where 1 ≤ k ≤ n − 1.
d
(ii) Xk,n−m = Xk,n + ξm,n−k , where 1 ≤ k ≤ n − m.
d
(iii) Xk,n−1 = Xk+1,n − k1 ξ, where 1 ≤ k ≤ n − 1.
7
d
(iv) Xm−k,n−k = Xm,n − ξk,m−1 , where 2 ≤ k + 1 ≤ m ≤ n.
d
d
Proof. The results follow from Lemma 7 by noting that (a) X = log Y, (b) ξ = − log U and
d
(c) − log Uk,n = ξn−k+1,n for all 1 ≤ k ≤ n. The proof is complete.
For the proof of the next lemma, see Lin and Hu (2008, Lemma 5).
Lemma 9. Let f and g be two functions real analytic and strictly monotone in [0, ∞).
Assume that for each n ≥ 1, the n-th derivatives f (n) and g (n) are strictly monotone in some
interval [0, δn ). Let {xn }∞
n=1 be a sequence of positive real numbers converging to zero. If
f (xn ) = g(xn ), n = 1, 2, . . . , then f = g.
3. Characterizations of the Pareto type II distribution
We start with the Pareto type II distribution which is easier to handle, and recall that
the uniform order statistic Uk,n ∼ Bk,n−k+1.
Theorem 1. Let Y ∼ G be a positive random variable and let 1 ≤ k ≤ n − 1 be fixed
integers. Let Y1 , Y2 , . . . , Yn be n independent copies of Y, and let U, independent of {Yi }ni=1 ,
be a random variable with uniform distribution on [0, 1]. Then the distributional equality
d
Yk,n−1 = Yk,n /U 1/(n−k)
(5)
holds iff G is a Pareto distribution G(y) = λy/(1 + λy), y ≥ 0, where λ > 0 is a constant.
d
Proof. The sufficiency part follows from Lemma 7(ii) because (λY )ℓ,m = λYℓ,m for λ > 0 and
for all 1 ≤ ℓ ≤ m. To prove the necessity part, we note, by Lemma 1(ii), that the distribution
Gk,n−1 of Yk,n−1 is absolutely continuous, and so is G by Lemmas 2 and 3. Rewrite (5) as
Z 1
Gk,n−1(y) =
Gk,n (yu1/(n−k) )du, y ≥ 0.
0
By changing variables t = yu1/(n−k), we have
Gk,n−1(y) = (n − k)y
−(n−k)
Z
y
Gk,n (t)tn−k−1 dt, y > 0.
0
Taking differentiation leads to
yG′k,n−1(y) = (n − k)[Gk,n (y) − Gk,n−1(y)], y > 0.
With the help of (1) and Lemma 4(ii), (6) is equivalent to
yG′(y) = G(y)[1 − G(y)], y ∈ (ℓG , rG ).
8
(6)
Finally, Lemma 5(i) with r = θ = 1 completes the proof.
Corollary 1.
Under the same assumptions of Theorem 1, the distributional equality
d
Yk,n−1 = Yk,n/U 1/α holds for some α > 0, iff G is a Pareto distribution with G(y) =
1/[1 + λy α/(n−k) ], y ≥ 0, where λ is a positive constant.
α/(n−k)
Proof. Consider Yi′ = Yi
α/(n−k)
′
for i = 1, 2, . . . . Then Yk,n
= Yk,n
, and apply Theorem
d
′
′
1 to the case: Yk,n−1
= Yk,n
/U 1/(n−k) .
Corollary 2. Under the same assumptions of Theorem 1, the distributional equality
d
Yk,n−1 = Yk+1,n · U 1/k
holds iff G is a Pareto distribution G(y) = λy/(1 + λy), y ≥ 0, where λ > 0 is a constant.
Proof. The sufficiency part is a consequence of Lemma 7(iv). To prove the necessity
d
∗
part, denote Y ∗ = 1/Y. Then Yℓ,m
= (1/Y )ℓ,m = 1/Ym−ℓ+1,m for all 1 ≤ ℓ ≤ m. By
d
d
∗
assumptions, we have the equality 1/Yk,n−1 = 1/Yk+1,n · 1/U 1/k , or, equivalently, Yn−k,n−1
=
∗
Yn−k,n
· 1/U 1/(n−(n−k)) . It follows from Theorem 1 (letting k∗ = n − k) that Y ∗ has a Pareto
distribution G∗ (y) = λ∗ y/(1 + λ∗ y), y ≥ 0, for some constant λ∗ > 0. This in turn implies
that Y has the Pareto distribution G(y) = λy/(1 + λy), y ≥ 0, where λ = 1/λ∗. We can
d
prove the last claim directly, or by using Lemma 7(i), because λ∗ Y ∗ = 1/(λ∗ Y ∗ ) = Y /λ∗
having the standard Pareto type II distribution. The proof is complete.
Theorem 2. Let Y ∼ G be a positive random variable and let 1 ≤ k ≤ n − 1 be fixed
integers. Let Y1 , Y2 , . . . , Yn be n independent copies of Y, and let B, independent of {Yi }ni=1 ,
be a random variable having beta distribution Bα,β with parameters α = 1 and β = n − k,
that is, FB (u) = 1 − (1 − u)n−k , u ∈ [0, 1]. Assume further that limy→0+ G(y)/y = λ > 0.
Then the distributional equality
d
Yk,k = Yk,n /B
(7)
holds iff G is the Pareto distribution G(y) = λy/(1 + λy), y ≥ 0.
d
Proof. The sufficiency part follows from Lemma 7(iii) with n − m = k and the fact B =
U1,n−k . To prove the necessity part, we note first that G is absolutely continuous by Lemmas
1–3, and then rewrite (7) as the functional equation:
Z 1 Z G(yu)
n k−1
k
G (y) =
k
t (1 − t)n−k dtdFB (u), y ≥ 0.
k
0
0
9
(8)
Now, it suffices to prove that the solution of equation (7) is unique under the smoothness
condition on the distribution. Namely, if the absolutely continuous distribution F on (0, ∞)
satisfies limy→0+ F (y)/y = λ > 0 and
k
F (y) =
Z
1
0
Z
F (yu)
0
n k−1
t (1 − t)n−k dtdFB (u), y ≥ 0,
k
k
then we will prove that F = G. From (8) and (9) it follows that
Z 1
1
k
k
|F (y) − G (y)| ≤
|F k (yu) − Gk (yu)|dFB (u), y ≥ 0,
E[B k ] 0
n
k
where E[B ] = 1/
. Define the bounded function
k
g(y) =
(9)
(10)
F k (y) − Gk (y)
, y > 0, and g(0) = lim+ g(y) = 0,
y→0
yk
and the increasing function
h(y) = sup g(t), y > 0, and h(0) = lim+ h(y) = 0.
y→0
0≤t≤y
By (10), we see that
g(y) ≤
Z
1
g(uy)dH(u), y ≥ 0,
(11)
0
where H(u) = (1/E[B k ])
Ru
0
tk dFB (t), u ∈ [0, 1]. Now, by (11) and the definition of the
increasing function h, we have
Z 1
Z
h(y) ≤
h(uy)dH(u) ≤ h(y)
0
1
dH(u) = h(y), y ≥ 0.
0
This in turn implies that h is a constant function and hence h(y) = 0, y ≥ 0, because
h(0) = h(0+ ) = 0. Consequently, g(y) = 0, y ≥ 0, and F = G. The proof is complete.
The next result is the counterpart of Theorem 2 for the minimum order statistics.
Corollary 3. Under the same setting in Theorem 2 with the condition on G replaced by
limy→0+ G(1/y)/y = 1/λ > 0 (equivalently, limy→+∞ yG(y) = 1/λ > 0), the distributional
d
equality Y1,k = Yn−k+1,n · B holds iff G is the Pareto distribution G(y) = λy/(1 + λy), y ≥ 0.
d
Proof. Use Lemma 7(v), Theorem 2 and the fact (1/Y )ℓ,m = 1/Ym−ℓ+1,m for all 1 ≤ ℓ ≤ m.
We now further extend Theorem 2 under some stronger smoothness conditions.
10
Theorem 3. Let Y ∼ G be a positive random variable and let n, m, k be three fixed positive
integers with 1 ≤ k ≤ n − m. Let Y1 , Y2 , . . . , Yn be n independent copies of Y, and let B1 ,
independent of {Yi }ni=1 , be a random variable having beta distribution Bα,β with parameters
α = n − m − k + 1 and β = m. Assume further that the distribution function G satisfies the
following conditions:
(i) G is real analytic and strictly increasing in [0, ∞) and for each i ≥ 1, its i-th derivative
G(i) is strictly monotone in some interval [0, δi ).
(ii) limy→0+ [Gk (y) − (λy)k ]/(λy)k+1 = −k for some positive constant λ.
Then the distributional equality
d
Yk,n−m = Yk,n /B1
(12)
holds iff G is the Pareto distribution G(y) = λy/(1 + λy), y ≥ 0.
d
Proof. The sufficiency part follows from Lemma 7(iii) and the fact B1 = Un−m−k+1,n−k . To
prove the necessity part, we note first that G is absolutely continuous as before, and then
we rewrite (12) as the functional equation:
Z 1
Gk,n−m(y) =
Gk,n (yu)dFB1 (u), y ≥ 0.
(13)
0
Now, it suffices to prove that the solution of equation (12) is unique under the smoothness
condition on the distribution. Namely, if the absolutely continuous distribution F on (0, ∞)
satisfies the above conditions (i) and (ii) and
Z 1
Fk,n−m(y) =
Fk,n (yu)dFB1 (u), y ≥ 0,
(14)
0
then we will prove that F = G.
Define the increasing function H(y) = max{F (y), G(y)}, y ≥ 0. From (1) it follows that
for any a > 0 and 0 ≤ y ≤ a,
Z F (y)
n−m
|Fk,n−m (y) − Gk,n−m (y)| = k
tk−1 (1 − t)n−m−k dt
k
G(y)
1
n−m
≥ k
(1 − H(y))n−m−k F k (y) − Gk (y)
k
k
n−m
≥
(1 − H(a))n−m−k F k (y) − Gk (y) .
k
11
(15)
On the other hand, we have
n
F k (y) − Gk (y) , y ≥ 0.
|Fk,n (y) − Gk,n (y)| ≤
k
Combing (12)–(16) leads to
n−m
(1 − H(a))n−m−k F k (y) − Gk (y) ≤ |Fk,n−m(y) − Gk,n−m(y)|
k
Z 1
Z 1
n
≤
|Fk,n (yu) − Gk,n (yu)| dFB1 (u) ≤
F k (yu) − Gk (yu) dFB1 (u).
k
0
0
(16)
(17)
Define the bounded increasing function
h(y) = sup
0<t≤y
F k (t) − Gk (t)
, y > 0,
tk+1
and h(0) = lim+ h(y) = 0.
y→0
Then from the inequality (17) it follows that for any a > 0,
Z 1
n−m
n
n−m−k
(1 − H(a))
h(y) ≤
h(yu)uk+1dFB1 (u)
k
k
0
Z 1
n
n
h(y)
≤
h(y)E[B1k+1], 0 ≤ y ≤ a.
uk+1dFB1 (u) =
k
k
0
n−m
n
Recall that E[B1k ] =
/
. Then rewrite the inequality (18) as follows:
k
k
E[B1k ](1 − H(a))n−m−k h(y) ≤ h(y)E[B1k+1], 0 ≤ y ≤ a, a > 0.
(18)
(19)
We claim that there exists a y0 > 0 such that h(y0 ) = 0. Otherwise, we have, by (19),
E[B1k ](1 − H(a))n−m−k ≤ E[B1k+1 ], ∀ a > 0,
which in turn implies, by letting a → 0+ , that E[B1k ] ≤ E[B1k+1 ], a contradiction. Therefore,
h(y0 ) = 0 for some y0 > 0 and hence F (y) = G(y) for y ∈ [0, y0]. By Lemma 9 and the
assumptions on F and G, we conclude that F = G. The proof is complete.
Corollary 4. Let Y ∼ G be a positive random variable and let n, m, k be three fixed positive
integers with k + 1 ≤ m ≤ n. Let Y1 , Y2 , . . . , Yn be n independent copies of Y, and let B2 ,
independent of {Yi }ni=1 , be a random variable having beta distribution Bα,β with parameters
α = m − k and β = k. Assume further that the distribution function G∗ of 1/Y satisfies the
following conditions:
12
(i) G∗ is real analytic and strictly increasing in [0, ∞) and for each i ≥ 1, its i-th derivative
(i)
G∗ is strictly monotone in some interval [0, δi ).
(ii) limy→0+ [Gk∗∗ (y) − (y/λ)k∗ ]/(y/λ)k∗ +1 = −k∗ for some positive constant λ, where k∗ =
n − m + 1.
d
Then the distributional equality Ym−k,n−k = Ym,n · B2 holds iff G is the Pareto distribution
G(y) = λy/(1 + λy), y ≥ 0.
d
Proof. Use Lemma 7(v), Theorem 3 and the fact (1/Y )ℓ,m = 1/Ym−ℓ+1,m for all 1 ≤ ℓ ≤ m.
In summary, for a positive random variable Y ∼ G, we have the following characteristic
properties of the Pareto distribution G(y) = λy/(1 + λy), y ≥ 0, where λ is a positive
constant (compare with Lemma 7).
d
1. Yk,n−1 = Yk,n/U 1/(n−k) .
d
2. Yk,n−1 = Yk+1,n · U 1/k .
d
d
3. Yk,k = Yk,n /B (equivalently, Yk,k = Yk,n /U1,n−k ).
d
d
4. Y1,k = Yn−k+1,n · B (equivalently, Y1,k = Yn−k+1,n · U1,n−k ).
d
d
5. Yk,n−m = Yk,n /B1 (equivalently, Yk,n−m = Yk,n /Un−m−k+1,n−k ).
d
d
6. Ym−k,n−k = Ym,n · B2 (equivalently, Ym−k,n−k = Ym,n · Um−k,m−1 ).
Here, the random variables U ∼ U, B ∼ B1,n−k , B1 ∼ Bn−m−k+1,m , B2 ∼ Bm−k,k , and on
the RHS of each equality, the two random variables are independent.
4. Characterizations of the logistic distribution
We are now ready to provide characterization results of the logistic distribution.
Theorem 4. Let X ∼ F and let 1 ≤ k ≤ n − 1 be fixed integers. Then the distributional
equality
d
Xk,n−1 = Xk,n +
1
ξ
n−k
holds iff F is a logistic distribution F (x) = 1/[1 + e−(x−µ) ], x ∈ R, where µ ∈ R is a constant.
Proof. Take Yi = exp(Xi ), U = exp(−ξ) and λ = e−µ . Then the result follows immediately
from Theorem 1.
Corollary 5. Let X ∼ F, α > 0 and let 1 ≤ k ≤ n − 1 be fixed integers. Then the
d
distributional equality Xk,n−1 = Xk,n + α1 ξ holds iff F is a logistic distribution F (x) =
1/{1 + e−[α/(n−k)](x−µ) }, x ∈ R, where µ ∈ R is a constant.
13
Corollary 6. Let X ∼ F, α > 0 and let 1 ≤ k ≤ n − 1 be fixed integers. Then the
distributional equality
d
Xk,n−1 = Xk+1,n −
1
ξ
α
(20)
holds iff F is a logistic distribution F (x) = 1/[1 + e−(α/k)(x−µ) ], x ∈ R, where µ ∈ R is a
constant.
d
Proof. Use Corollary 5 and the fact that Xℓ,m = −(−X)m−ℓ+1,m for all 1 ≤ ℓ ≤ m.
d
The counterpart of (20), namely, Xk+1,n = Xk,n−1 + α1 ξ, and the two-sided case: Xk,n +
d
aξ1 = Xk,n−1 + bξ2 (see Corollary 5), where α, a, b > 0, were investigated by Wesolowski and
Ahsanullah (2004). All the solutions of these two equations are exponential distributions.
The next result improves and extends Theorem 6 of Lin and Hu (2008) by an approach
different from the previous method of intensively monotone operator (Kakosyan et al. 1984).
Theorem 5.
Let 1 ≤ k ≤ n − 1 be fixed integers.
Assume that X ∼ F satisfies
limx→−∞ F (x)/ex = e−µ for some constant µ ∈ R. Then the distributional equality
d
Xk,k = Xk,n + ξn−k,n−k
holds iff F is the logistic distribution F (x) = 1/[1 + e−(x−µ) ], x ∈ R.
Proof. The sufficiency part follows from Lemma 8(ii), while the necessity part is a consequence of Theorem 2.
The next result is the counterpart of Theorem 5 for the minimum order statistics.
Corollary 7. Let 1 ≤ k ≤ n − 1 be fixed integers.
Assume that X ∼ F satisfies
limx→−∞ F (−x)/ex = eµ for some constant µ ∈ R. Then the distributional equality
d
X1,k = Xn−k+1,n − ξn−k,n−k
holds iff F is the logistic distribution F (x) = 1/[1 + e−(x−µ) ], x ∈ R.
d
Proof. Use Lemma 8(iv), Theorem 5 and the fact Xℓ,m = −(−X)m−ℓ+1,m for all 1 ≤ ℓ ≤ m.
Using Theorem 3 and Lemma 8(ii), we further extend Theorem 5 to the following.
Theorem 6. Let n, m, k be three fixed positive integers with 1 ≤ k ≤ n − m and let X ∼ F
satisfy limx→−∞ [e−k(x−µ) F k (x) − 1]/ex−µ = −k for some constant µ ∈ R. Assume further
that the distribution function G of exp(X1 ) is real analytic and strictly increasing in [0, ∞)
14
and that for each i ≥ 1, its i-th derivative G(i) is strictly monotone in some interval [0, δi ).
Then the distributional equality
d
Xk,n−m = Xk,n + ξm,n−k
holds iff F is the logistic distribution F (x) = 1/[1 + e−(x−µ) ], x ∈ R.
As before, Theorem 6 and Lemma 8(iv) together lead to the following.
Corollary 8. Let n, m, k be three fixed positive integers with k + 1 ≤ m ≤ n and let
X ∼ F satisfy limx→−∞ [e−k∗ (x+µ) (F (−x))k∗ − 1]/ex+µ = −k∗ for some constant µ ∈ R, where
k∗ = n−m+1. Assume further that the distribution function G∗ of exp(−X1 ) is real analytic
(i)
and strictly increasing in [0, ∞) and that for each i ≥ 1, its i-th derivative G∗ is strictly
monotone in some interval [0, δi ). Then the distributional equality
d
Xm−k,n−k = Xm,n − ξk,m−1
(21)
holds iff F is the logistic distribution F (x) = 1/[1 + e−(x−µ) ], x ∈ R.
In summary, for a random variable X ∼ F, we have the following characteristic properties
of the logistic distribution F (x) = 1/[1 + e−(x−µ) ], x ∈ R (compare with Lemma 8). Here,
µ ∈ R, ξ ∼ E, and on the RHS of each equality, the two random variables are independent.
d
1. Xk,n−1 = Xk,n +
1
ξ.
n−k
d
2. Xk,n−1 = Xk+1,n − k1 ξ.
d
3. Xk,k = Xk,n + ξn−k,n−k .
d
4. X1,k = Xn−k+1,n − ξn−k,n−k .
d
5. Xk,n−m = Xk,n + ξm,n−k .
d
6. Xm−k,n−k = Xm,n − ξk,m−1 .
5. Open problem
Finally, we would like to pose the following problem in which part (i) is the counterpart
of (21) for exponential distribution, and in part (ii), the first two cases, m = k + 1, k + 2,
have been solved by AlZaid and Ahsanullah (2003) and Ahsanullah et al. (2010).
Problem. Let X ∼ F and let 1 ≤ k < m ≤ n be fixed integers. Then solve the general
d
d
distributional equations: (i) Xm,n = Xm−k,n−k + ξk,n and (ii) Xm,n = Xk,n + ξm−k,n−k .
15
Acknowledgments. The authors would like to thank the Editor-in-Chief and the Referee
for helpful comments and constructive suggestions which improve the presentation of the
paper.
References
Ahsanullah, M., Berred, A. and Nevzorov, V.B. (2011). On characterizations of the exponential distributions. J. Appl. Statist. Sci., 19, 37–43.
Ahsanullah, M., Nevzorov, V.B. and Yanev, G.P. (2010). Characterizations of distributions
via order statistics with random exponential shifts. J. Appl. Statist. Sci., 18, 297–305.
Ahsanullah, M., Yanev, G.P. and Onica, C. (2012). Characterizations of logistic distribution through order statistics with independent exponential shifts. Economic Quality
Control, 27, 85–96.
AlZaid, A.A. and Ahsanullah, M. (2003). A characterization of the Gumbel distribution
based on record values. Commun. Statist. - Theory and Methods, 32, 2101–2108.
Ananjevskii, S.M. and Nevzorov, V.B. (2016). On families of distributions characterized
by certain properties of ordered random variables. Vestnik St. Petersburg University:
Mathematics, 49, 197–203.
Berred, A. and Nevzorov, V.B. (2013). Characterizations of families of distributions, which
include the logistic one, by properties of order statistics. Journal of Mathematical
Sciences, 188, 673–676.
David, H.A. and Nagaraja, H.N. (2003). Order Statistics, 3rd edn. Wiley, New Jersey.
David, H.A. and Shu, V.S. (1978). Robustness of location estimators in presence of an
outlier. In: Contributions to Survey Sampling and Applied Statistics, ed. H.A. David,
pp. 235–250. Academic Press, New York.
George, E.O. and Mudholkar, G.S. (1982). On the logistic and exponential laws. Sankhyā,
Ser. A, 44, 291–293.
16
Gradshteyn, I.S. and Ryzhik, I.M. (2014). Table of Integrals, Series, and Products, 8th edn.
Elsevier, New York.
Hwang, J.S. and Lin, G.D. (1984). Characterizations of distributions by linear combinations
of moments of order statistics. Bulletin of the Institute of Mathematics, Academia
Sinica, 12, 179–202.
Kakosyan, A.V., Klebanov, L.B. and Melamed, J.A. (1984). Characterization of Distributions by the Method of Intensively Monotone Operators. Springer, New York.
Kotz, S. (1974). Characterizations of statistical distributions: a supplement to recent
surveys. Int. Statist. Rev., 42, 39–65.
Lin, G.D. and Hu, C.-Y. (2008). On characterizations of the logistic distribution. J. Statist.
Plann. Infer., 138, 1147–1156.
Lukacs, E. (1970). Characteristic Functions, 2nd edn. Hafner Pub. Co., New York.
Mudholkar, G.S. and George, E.O. (1978). A remark on the shape of the logistic distribution. Biometrika, 65, 667–668.
Nevzorov, V.B. (2001). Records: Mathematical Theory. Translations of Mathematical
Monographs, Vol. 194, Amer. Math. Soc., Rhode Island.
Shorack, G.R. and Wellner, J.A. (1986). Empirical Processes with Applications to Statistics.
Wiley, New York.
Wesolowski, J. and Ahsanullah, M. (2004). Switching order statistics through random
power contractions. Aust. N.Z. J. Statist., 46, 297–303.
Zykov, V.O. and Nevzorov, V.B. (2011). Some characterizations of families of distributions,
including logistic or exponential ones, by properties of order statistics. Journal of
Mathematical Sciences, 176, 203–206.
17
| 10math.ST
|
arXiv:1611.05911v2 [cs.DS] 24 Feb 2017
Computing Absolutely Normal Numbers in
Nearly Linear Time
Jack Lutz∗
Elvira Mayordomo†
February 27, 2017
Abstract
A real number x is absolutely normal if, for every base b ≥ 2, every
two equally long strings of digits appear with equal asymptotic frequency
in the base-b expansion of x. This paper presents an explicit algorithm
that generates the binary expansion of an absolutely normal number x,
with the nth bit of x appearing after npolylog(n) computation steps. This
speed is achieved by simultaneously computing and diagonalizing against
a martingale that incorporates Lempel-Ziv parsing algorithms in all bases.
Keywords: algorithms, computational complexity, Lempel-Ziv parsing, martingales, normal numbers
1
Introduction
In 1909 Borel [4] defined a real number α to be normal in base b (b ≥ 2) if, for
every m ≥ 1 and every length-m sequence w of base-b digits, the asymptotic,
empirical frequency of w in the base-b expansion of α is b−m . Borel defined α to
be absolutely normal if it is normal in every base b ≥ 2. (This clearly anticipated
the fact, proven a half-century later, that a real number may be normal in one
base but not in another [8, 23].) Borel’s proof that almost every real number
(i.e., every real number outside a set of Lebesgue measure 0) is absolutely normal
was an important milestone in the prehistory of Kolmogorov’s development
of the rigorous, measure-theoretic foundations of probability theory [17]. For
example, it is section 1 of Billingsley’s influential textbook [3]. The recent book
[7] provides a good exposition of the many aspects of current research on normal
numbers.
Borel’s proof shows that absolutely normal numbers are commonplace, i.e.,
that a “randomly chosen” real number is absolutely normal with probability 1.
Rational numbers cannot be normal in even a single base b, since their base-b
∗ Department of Computer Science, Iowa State University, Ames, IA 50011 USA.
[email protected].
† Departamento de Informática e Ingenierı́a de Sistemas, Instituto de Investigación en Ingenierı́a de Aragón, Universidad de Zaragoza, 50018 Zaragoza, SPAIN. [email protected].
1
expansions
are eventually periodic, but computer analyses of the expansions of
√
π, e, 2, ln 2, and other irrational numbers that arise in common mathematical
practice suggest that these numbers are absolutely normal [5]. Nevertheless,
no such “natural” example of a real number has been proven to be normal in
any base, let alone absolutely normal. The conjectures that every algebraic
irrational is absolutely normal and that π is absolutely normal are especially
well known open problems [5, 7, 29].
This paper concerns an old problem, namely, the complexity of explicitly
computing a real number that is provably absolutely normal, even if it is not
natural in the above informal sense. Sierpinski and Lebesgue gave explicit constructions of absolutely normal numbers in 1917 [25, 18], but these were intricate
limiting processes that offered no complexity analyses (coming two decades before the theory of computing) and little insight into the nature of the numbers
constructed. In a 1936 note that was not published in his lifetime, Turing [27]
gave a constructive proof that almost all real numbers are absolutely normal
and then derived constructions of absolutely normal numbers from this proof.
Moreover, although Turing does not mention Turing machines or computability,
the note is typed, with equations handwritten by him, on the back of a draft
of his paper on computable real numbers [26], so it is reasonable to interpret
“constructively” in a computability-theoretic sense. And in fact his proof, with
2007 corrections by Becher, Figueira, and Picchi [1], explicitly computes an absolutely normal number. In 2013, Becher, Heiber, and Slaman [2] published
an algorithm that computes an absolutely normal number in polynomial time.
Specifically, this algorithm computes the binary expansion of an absolutely normal number x, with the nth bit of x appearing after O(n2 f (n)) steps for any
computable unbounded nondecreasing function f . (Unpublished polynomialtime algorithms for computing absolutely normal numbers were also announced
independently by Mayordomo [22] and Figueira and Nies [12, 13] at about the
same time.)
In this paper we present a new algorithm that provably computes an absolutely normal in nearly linear time. Our algorithm computes the binary expansion of an absolutely normal number x, with the nth bit of x appearing
after O(npolylog(n)) steps. The term “nearly linear time” was introduced by
Gurevich and Shelah [14]. In that paper they showed that, while linear time
computability is very model-dependent, nearly linear time is very robust. For
example, they showed that random access machines, Kolmogorov-Uspensky machines, Schoenhage machines, and random-access Turing machines share exactly
the same notion of nearly linear time.
Our algorithm uses the Lempel-Ziv parsing algorithm to achieve its nearly
linear time bound. For each base b ≥ 2, we use a martingale (betting strategy)
that employs the Lempel-Ziv parsing algorithm and is implicit in the work
of Feder [11]. This base-b Lempel-Ziv martingale succeeds exponentially when
betting on the successive digits of the base-b expansion of any real number that is
not normal in base b. Our algorithm simultaneously computes and diagonalizes
against (limits the winnings of) a martingale that incorporates efficient proxies
of all these martingales, thereby efficiently computing a real number that is
2
normal in every base.
The rest of this paper is organized as follows. Section 2 presents the baseb Lempel-Ziv martingales and their main properties. Section 3 shows how to
transform a base-b Lempel-Ziv martingale into a base-b martingale with an efficiently computable nondecreasing savings account that is unbounded whenever
the base-b Lempel-Ziv martingale succeeds exponentially. Section 4 develops
an efficient method for converting a base-b martingale with an efficiently computable savings account to a base-2 martingale that succeeds whenever the base
b savings account is unbounded. Section 5 presents an algorithm that exploits
the uniformity of these constructions to efficiently and simultaneously compute
(a) a single base-2 martingale d that succeeds on the binary expansion of every
real number x for which some base-b martingale succeeds on the base-b expansion of x and (b) a particular real number x on which binary expansion d does
not succeed. This x is, perforce, absolutely normal. Section 6 presents an open
problem related to our work.
2
Lempel-Ziv Martingales
For each base b ≥ 1 we let Σb = {0, 1, . . . , b − 1} be the alphabet of base-b digits.
We write Σ∗b for the set of all (finite) strings over Σb and Σ∞
b for the set of all
(infinite) sequences over Σb . We write |x| for the length of a string or sequence
x, and we write λ for the empty string, the string of length 0. For x ∈ Σ∗b ∪ Σ∞
b
and 0 ≤ i ≤ j < |x|, we write x[i..j] for the string consisting of the ith through
jth digits in x. For x ∈ Σ∗b ∪ Σ∞
b and 0 ≤ n < |x|, we write x ↾ n = x[0..n − 1].
For w ∈ Σ∗b and x ∈ Σ∗b ∪ Σ∞
b , we say that w is a prefix of x, and we write
w ⊑ x, if x ↾ |w| = w.
A (base-b) martingale is a function d : Σ∗b → [0, ∞) satisfying
1 X
d(wa)
(1)
d(w) =
b
a∈Σb
Σ∗b .
for all w ∈
(This is the original martingale notion introduced by Ville
[28] and implicit in earlier papers of Lévy [20, 21]. Its relationship to Doob’s
subsequent modifications [10], which are the “martingales” of probability theory,
is explained in [16] along with the reason why Ville’s original notion is still
essential for algorithmic information theory.) Intuitively, a base-b martingale d
is a strategy for betting on the subsequent digits in a sequence S ∈ Σ∞
b , with
the strategy encoded in such a way that d(S ↾ n) is the amount of money that
a gambler using the strategy d has after the first n bets. The condition (1)
says that the payoffs for these bets are fair in the sense that the conditional
expectation of d(wa), given that w has occurred (and assuming that the digits
a ∈ Σb are equally likely), is d(w).
A function g : Σ∗b → [0, ∞) (which may or may not be a martingale) succeeds
on a sequence S ∈ Σ∞
b if
lim sup g(S ↾ n) = ∞,
n→∞
3
(2)
i.e., if its winnings on S are unbounded. The success set of a function g : Σ∗b →
[0, ∞) is
S ∞ [g] = {S ∈ Σ∞
b | g succeeds on S } .
A function g : Σ∗b → [0, ∞) succeeds exponentially on a sequence S ∈ Σ∞
b if
lim sup
n→∞
log g(S ↾ n)
> 0,
n
(3)
i.e., if its winnings on S grow at some exponential rate, perhaps with recurrent
setbacks. The exponential success set of a function g : Σ∗b → [0, ∞) is
S exp[g] = {S ∈ Σ∞
b | g succeeds exponentially on S } .
The f (n) success set of a function g : Σ∗b → [0, ∞) is
log g(S ↾ n)
≥
1
.
S f (n) [g] = S ∈ Σ∞
lim
sup
b
log f (n)
n→∞
ǫn
Note that S exp [g] = ∪ǫ>0 S 2 [g].
A function g : Σ∗b → [0, ∞) succeeds strongly on a sequence S ∈ Σ∞
b if (2)
holds with the limit superior replaced by a limit inferior i.e., if the winnings
converge to ∞. A function g : Σ∗b → [0, ∞) succeeds strongly exponentially
on a sequence S ∈ Σ∞
b if (3) holds with the limit superior replaced by a limit
inferior i.e., if the winnings grow at exponential rate. The strong success sets
exp
∞
Sstr
[g] and Sstr
[g] of a function g : Σ∗b → [0, ∞) are defined in the now-obvious
manner. It is clear that the inclusions
exp
Sstr
[g] ⊆ S exp [g] ⊆ S ∞ [g]
and
exp
∞
Sstr
[g] ⊆ Sstr
[g] ⊆ S ∞ [g]
hold for all g : Σ∗b → [0, ∞).
For each base b ≥ 2 the base-b Lempel-Ziv martingale is a particular martingale dLZ(b) based on the Lempel-Ziv parsing algorithm [19], as we now explain.
Formally, dLZ(b) is computed by the algorithm in Figure 1, but some explanation is appropriate here. The algorithm is written with several instances of
parallel assignment. For example, the second line initializes x, L(x), and d to
the values λ, 1, and 1, respectively. The items T , j, and x(j) are not needed
for the computation of dLZ(b) (w), but they are useful for understanding and
analyzing the algorithm.
4
i n p u t w ∈ Σ∗b ;
x, L(x), d = λ, 1, 1 ;
T, j = {λ}, 0 ;
while true do
begin
i f w = λ then o utput d and h a l t ;
i f L(x) = 1 then
begin
L(x) = b ;
for ea ch 0 ≤ a < b do L(xa) = 1 ;
T, x(j), j = T ∪ {x}Σb , x, j + 1 ;
x = λ;
end
else
begin
a, w = head(w), tail(w) ;
L(x), x, d = L(x) + b − 1, xa, bL(xa)
L(x) d
end
end
Figure 1: Algorithm for computing dLZ(b) (w).
The growing set T of strings in Σ∗b always contains all the prefixes of all its
elements, so it is a tree. We envision this tree as being oriented with its root at
the top and the immediate children v0, v1, . . . , v(b − 1) of each interior vertex
v of T displayed left-to-right below T . The dictionary of the algorithm is the
current set of leaves of T .
The string x in the algorithm is always an element of (i.e., location in) the
tree T , and L(x) is always the number of leaves of T that are descendants of x.
We regard x as a descendant of itself, so x is a leaf if and only if L(x) = 1.
It is clear that dLZ(b) (λ) = 1. In fact, the algorithm’s successive values of
d are the values dLZ(b) (u) for successive prefixes u of the input string w. More
precisely, if wt and dt are the values of w and d after t executions of the elseblock, then w = (w ↾ t)wt and dt = dLZ(b) (w ↾ t).
For w ∈ Σ∗b we define the tree T (w) as follows. If w = λ, then T (w) = {λ}.
If w = w′ a, where w′ ∈ Σ∗b and a ∈ Σb , then T (wa) is the value of T when
the algorithm terminates on input w′ . (Note that this is one step before it
terminates on input w′ a.) For w ∈ Σ∗b we define D(w) to be the number of
leaves in T (w).
The computation is divided into “epochs”. At the beginning of each epoch,
the string x is λ, i.e., it is located at the root of T . The string x then takes
successive digits from whatever is left of w (because a, w = head(w), tail(w)
removes the first digit of w and stores it in a), following this path down the
tree and updating d at each step, until w is empty (the end of the last epoch)
5
or x is a leaf if T . In the latter case, the jth epoch is over, the b children
x0, x1, . . . , x(b − 1) are added to T as new leaves, x is the jth phrase x(j) of w,
and x is reset to the root λ of T .
When the algorithm terminates, it is clear that exactly one of the following
things must hold.
(a) w = λ.
(b) w = x(1) . . . x(j).
(c) w = x(1) . . . x(j)u for some nonempty interior vertex u of T (w).
In case (a) or (b) we call w a full parse. In case (b) or (c) we call x(1), . . . , x(j)
the full phrases of w. In case (c) we call u the partial phrase of w.
Define the set Ab = {1 + (b − 1)r | r ∈ N } and the generalized factorial function f actb : Ab → Ab by
f actb (1 + (b − 1)r) =
r
Y
k=1
(1 + (b − 1)k)
for all r ∈ N.
Observation 2.1 For all n ∈ Ab ,
1≤
f actb (n)
n ≤ n.
1
n b−1
e b−1
(4)
e
Lemma 2.2 (Feder [11]) Let w ∈ Σ∗b .
1. If w is a full parse, then
dLZ(b) (w) =
b|w|
.
f actb (D(w))
2. If w is not a full parse and u is its partial phrase, then
dLZ(b) (w) =
b|w|
L(u),
f actb (D(w))
where L(u) is the number of leaves below u in T (w).
Lemma 2.3 For S ∈ Σ∞
b and α ∈ (0, 1) the following three conditions are
equivalent.
(1−α)n
(a) S ∈ S b
[dLZ(b) ].
(b) There exist infinitely many full parses w ⊑ S for which
D(w) logb |w| < α(b − 1)|w|.
6
(c) There exist infinitely many full parses w ⊑ S for which
D(w) log b D(w) < α(b − 1)|w|.
Corollary 2.4 For S ∈ Σ∞
b the following three conditions are equivalent.
(a) S ∈ S exp [dLZ(b) ].
(b) There exist α < 1 and infinitely many full parses w ⊑ S for which
D(w) logb |w| < α(b − 1)|w|.
(c) There exist α < 1 and infinitely many full parses w ⊑ S for which
D(w) log b D(w) < α(b − 1)|w|.
We conclude this section by explaining the connection between the LempelZiv martingales and normality. First, Schnorr and Stimm [24] defined (implicitly) a notion of finite-state base-b martingale and proved that every sequence
S ∈ Σ∞
b obeys the following dichotomy.
1. If S is normal, then no finite-state base-b martingale succeeds on S. (In
fact, every finite-state base-b martingale decays exponentially on S.)
2. If S is not normal, then some finite-state base-b martingale succeeds exponentially on S.
Some twenty years later, Feder [11] defined (implicitly) the Lempel-Ziv martingale dLZ(b) and proved (implicitly) that dLZ(b) is at least as successful on
every sequence as every finite-state base-b martingale. That is, for finite-state
base-b martingale d, the inclusions
∞
S ∞ [d] ⊆ S ∞ [dLZ(b) ], Sstr
[d] ⊆ S ∞ [dLZ(b) ],
exp
exp
S exp [d] ⊆ S exp [dLZ(b) ], Sstr
[d] ⊆ Sstr
[dLZ(b) ]
all hold. This, together with Schnorr and Stimm’s dichotomy result, implies
that dLZ(b) succeeds exponentially on every non-normal sequence in Σ∞
b . Hence
a real number x is absolutely normal if none of the martingales dLZ(b) succeed
exponentially on the base-b expansion of x.
3
Savings Accounts
In this section we construct a conservative version of the the Lempel-Ziv martingale dLZ(b) consisting of a new martingale d′ that can be smaller than dLZ(b)
but that has a savings account in the following sense.
Definition. A nondecreasing function g : Σ∗b → [0, ∞) is a savings account of
a martingale d : Σ∗b → [0, ∞) if, for every w ∈ Σ∗b , d(w) ≥ g(w).
7
Construction 3.1 Let d = dLZ(b) be the base-b-Lempel-Ziv martingale. We
define a new martingale d′ = e′ + g ′ as follows.
We first define e′ . e′ (λ) = b, goal(λ) = −1, taken(λ) = −1. For w ∈ Σ∗b ,
let w = x(1) . . . x(j)u, for z = x(1) . . . x(j) a full parse and u a partial or full
phrase of w. Let
goal(w)
= |w| − ⌈D(z)(logb (D(z)))/(b − 1)⌉ + ⌊D(z)(logb (e))/(b − 1)⌋
1
−⌈logb (D(z))⌉ − ⌈logb e b−1 ⌉ − 1,
taken(w) =
taken(z) if goal(w) ≤ taken(z)
goal(w) if goal(w) > taken(z)},
e′ (w) = e′ (z) ·
d(w) −taken(w)+taken(z)
b
.
d(z)
Let g ′ be defined as follows. g ′ (λ) = 1 and for y ∈ Σ∗b , a ∈ Σb , if ya = w, let
w = x(1) . . . x(j)u, for z = x(1) . . . x(j) a full parse and u a partial phrase of w.
′
g (y)
if goal(w) ≤ taken(z)
g ′ (ya) =
if
goal(w) > taken(z)
g ′ (y) + e′ (y) b−1
b
Theorem 3.2 Let d′ and g ′ be as defined in Construction 3.1. Then d′ is a
martingale and g ′ is its savings account,
S exp [dLZ(b) ] ⊆ S ∞ [g ′ ],
d′ is bounded by a polynomial, and d′ is computable in a nearly linear time bound
that does not depend on b.
Proof of Theorem 3.2.
Claim 3.3 d′ = e′ + g ′ is a martingale and g ′ is a savings account for d′ .
Proof. Let us prove that d′ is a martingale. When goal(w) ≤ taken(z) we have
that
′
1 X ′
(z) 1 P
e (wa) = ed(z)
a∈Σb d(wa) =
b
b
a∈Σb
e′ (z)
d(z)
· d(w) = e′ (w)
with that last equality holding both when w = z and when z is a proper substring
of w. Since g ′ (wa) is constant the martingale equality holds in this case.
In the second case, when goal(w) > taken(z), we have that
e′ (ya) = e′ (y)d(ya)/d(y)1/b, so
X
P
P
d′ (wa)
= a∈Σb e′ (ya) + a∈Σb g ′ (ya)
a∈Σb
′
′
′
= e′ (y) + b(g ′ (y) + e′ (y) b−1
b ) = b(e (y) + g (y)) = bd (w).
8
Since e′ is nonnegative, by definition g ′ is a nondecreasing function. Therefore g ′ is a savings account of d′ .
Claim 3.4 There is a C > 0 such that for every w ∈ Σ∗b ,
d(w)b−taken(w) ≤ C · D(z) · L(u).
d(w)b−goal(w) ≥ b
Proof. Use that taken(w) ≥ goal(w), Lemma 2.2, and Observation 2.1.
Claim 3.5 If w ∈ Σ∗b then e′ (w) = d(w)b−taken(w) .
Proof. By induction on |w|, let w = x(1) . . . x(j)u, z = x(1) . . . x(j)x(j + 1)
e′ (w)
d(w) −taken(w)+taken(z)
b
d(z)
d(w) −taken(w)+taken(z)
b
= d(w)b−taken(w) .
d(z)b−taken(z) ·
d(z)
e′ (z) ·
=
=
∞ ′
Claim 3.6 If y ∈ Σ∞
b and goal(y ↾ n) is unbounded then y ∈ S [g ].
Proof.
If goal(y ↾ n) is unbounded then infinitely often we use the second case
in the definitions of taken and g ′ and have that taken(y ↾ n) = goal(y ↾ n),
e′ (y ↾ n) = d(y ↾ n)b−goal(y↾n) , and g ′ (y ↾ na) = g ′ (y ↾ n) + e′ (y ↾ n) b−1
b .
For those n, by Claim 3.4, e′ (y ↾ n) ≥ b, therefore g ′ (y ↾ na) ≥ g ′ (y ↾
n) + b − 1.
Since g ′ is monotonic, y ∈ S ∞ [g ′ ].
(1−α)n
Claim 3.7 S b
[dLZ(b) ] ⊆ S ∞ [g ′ ].
(1−α)n
Proof. If y ∈ S b
[dLZ(b) ] then by Lemma 2.3 for infinitely many n, D(y ↾
n) logb (D(y ↾ n)) < α(b − 1)n.
Notice that therefore goal(y ↾ n) is unbounded and by Claim 3.6 y ∈ S ∞ [g ′ ].
Claim 3.8 There is a C > 0 such that for everyP
w, e′ (w) ≤ C · D(z) · L(u) (for
′
u a partial or the last full phrase of w). g (w) ≤ v⊑w e′ (v)(b − 1)/b. Therefore
there is a c > 0 such that for every w, d′ (w) ≤ |w|c .
Claim 3.9 d′ can be computed in nearly linear time (in time n logc n for c not
depending on b.
9
Proof.
Again, for w ∈ Σ∗b , let w = x(1) . . . x(j)u, for z = x(1) . . . x(j) a full parse
and u a partial or full phrase of w. If goal(w) > taken(z), let t be such that
t ⊑ u and goal(zt) = taken(z).
Notice that
′
g (w) =
g ′ (z) P
if goal(w) ≤ taken(z)
g ′ (z) + v⊑u,|zv|>|zt| e′ (zt) b−1
L(v)
if goal(w) > taken(z),
b
where L(v) isPthe number of leaves below v in T (w). Given precomputed values
′
for f (u) =
v⊑u L(v), the value of g (w) can be easily computed in nearly
linear time. The precomputed value of f (u) will be stored in the u node of the
LZ tree for z.
This completes the proof of Theorem 3.2.
4
Base change
We use infinite sequences over Σb to represent real numbers in [0,1). For this,
we associate each string w ∈ Σ∗b with the half-open interval [w]b defined by
|w|
P
[w]b = [x, x + b−|w| ), for x =
w[i − 1]b−i . Each real number α ∈ [0, 1) is then
i=1
represented by the unique sequence seqb (α) ∈ Σ∞
b satisfying
w ⊑ seqb (α) ⇐⇒ α ∈ [w]b
for all w ∈ Σ∗b . We have
α=
∞
X
i=1
seqb (α)[i − 1]b−i
and the mapping seqb : [0, 1) → Σ∞
b is a bijection. (Notice that [w]b being
half-open prevents double representations.) We define realb : Σ∞
b → [0, ∞) to
be the inverse of seqb . A set of real numbers A ⊆ [0, 1) is represented by the set
seqb (A) = {seqb (α) | α ∈ A}
of sequences. If X ⊆ Σ∞
b then
realb (X) = {realb (x) | x ∈ X}.
For a positive number x we use the notation logb (x) = ⌈logb (x)⌉.
Construction 4.1 Let d : Σ∗b → [0, ∞) be a polynomially-bounded martingale
with a savings account g.
We define γ : Σ∗b → [0, 1] a probability measure γ(w) := b−|w| d(w).
10
Using the Carathéodory extension to Borel sets, γ can be extended to any
interval [a, c]; we denote with γ̂ this extension. (In fact if we consider all U ⊆ Σ∗b
such that all u, v ∈ U,
Pu 6= v are incomparable and [u]b ⊆ [a, c] for all u ∈ U ,
then γ̂([a, c]) = supU u∈U γ(u)).
We define µ : {0, 1}∗ → [0, 1] by µ(y) = γ̂([y]2 ).
Finally we define d(2) : {0, 1}∗ → [0, ∞) by d(2) (y) = 2|y| µ(y).
Theorem 4.2 Assume that d is a base-b martingale that is polynomially bounded
and g is a savings account of d, and let d(2) be defined from d and g as in Construction 4.1. Then
realb (S ∞ [g]) ⊆ real2 (S ∞ [d(2) ]).
Moreover, if d is computable in a nearly linear time bound not depending on b,
then so is d(2) .
Proof of Theorem 4.2.
Property 4.3 Let α ∈ [0, 1). If seqb (α) ∈ S ∞ [g], then seq2 (α) ∈ S ∞ [d(2) ].
Proof. Let x = seqb (α) ∈ S ∞ [g]. Let y = seq2 (α).
We use here that d has a savings account g, so if g(x ↾ n) > m then for all
w with x ↾ n ⊑ w, g(w) > m.
Let m ∈ N and choose n such that g(x ↾ n) > m. Let q be such that
[y ↾ q]2 ⊆ [x ↾ n]b . Let us see that d(2) (y ↾ q) > m.
Let r ∈ N. Let Aqr = {w ∈ Σ∗b | |w| = r and [w]b ⊆ [y ↾ q]2 }. Then
d(2) (y ↾ q) =
≥
2q γ̂([y ↾ q]2 ) = 2q lim
r
2q m lim
r
X
X
d(w)b−|w|
w∈Aqr
b−|w| = 2q m2−q = m.
w∈Aqr
The last chain of equations holds because [y ↾ q]2 ⊆ [x ↾ n]b and for every
w ∈ Aqr , [w]b ⊆ [y ↾ q]2 , so x ↾ n ⊑ w for any w ∈ Aqr .
We next compute d(2) . For each m ∈ N we define µm : {0, 1}∗ → [0, 1] by
X
γ(w).
µm (y) =
|w|=m,[w]b∩[y]2 6=∅
Claim 4.4 For every y ∈ {0, 1}∗ and m ∈ N, |µ(y) − µm (y)| ≤ 2b−m mc .
Proof. Let c be such that d(w) ≤ |w|c for every w (using that d is polynomially
bounded). Then since at most two strings w with |w| = m have the property
that [w]b ∩ [y]2 6= ∅ and [w]b 6⊆ [y]2 , we have
|µ(y) − µm (y)| ≤ 2b−m mc .
(2)
(2)
For each m ∈ N we define dm : {0, 1}∗ → [0, ∞) by dm (y) = 2|y| µm (y).
11
Claim 4.5 For some c > 0, for every y ∈ {0, 1}∗, for every m ∈ N,
|y| −m log b+c log m
|d(2) (y) − d(2)
.
m (y)| ≤ 2 2
Corollary 4.6 For some c′ > 0, for every y ∈ {0, 1}∗,
(2)
|d(2) (y) − d|y|/ log b+c′ log |y| (y)| ≤ 1/|y|3 .
Proof. Take c′ = (4 + c)/ log b and use the previous claim.
Notice that the approximation of d(2) is slow, but it is enough for the diagonalization performed in the next section.
(2)
Property 4.7 For m ∈ N, y ∈ {0, 1}∗, dm (y) can be computed by considering
a maximum of 2b neighbor strings w ∈ Σrb for r = |y|/ log b to m, computing
d(w) for each of them and doing an addition and a multiplication for each.
Proof. Consider P , the smallest prefix free set of strings w ∈ Σ∗b such that
[w]b ⊆ [y]2 , and notice that |w| ≥ |y|/ log b for each such string. For each r
there are at most 2b − 2 strings of length r in P (otherwise we can replace some
of them by a single string of length r − 1). For length m we may need two more
strings |w| = m, [w]b ∩ [y]2 6= ∅.
(2)
Corollary 4.8 For y ∈ {0, 1}∗, d|y|/ log b+c′ log |y| (y) can be computed by considering a maximum of 2b neighbor strings w ∈ Σrb for r = |y|/ log b to |y|/ log b +
c′ log |y|, computing d(w) for each of them and doing an addition and a multiplication for each.
(2)
By Corollary 4.6 f (y) = d|y|/ log b+c′ log |y| (y) approximates d(2) (y) within a
1/|y|3 bound, and by the last corollary f can be computed in nearly linear time.
In order to have a nearly linear time bound independent of b consider only y for
which log|y| ≥ 2b.
This concludes the proof of Theorem 4.2.
5
Absolutely Normal Numbers
In this section we give an algorithm that diagonalizes against the Lempel-Ziv
martingales for all bases in nearly linear time.
We use the following theorem
Theorem 5.1 Let (dk )k∈N be a sequence of base-2 martingales such that for
ck : {0, 1}∗ → [0, ∞) with the following two
each of them there exists a function d
properties
1. For every y ∈ {0, 1}∗
ck (y)| ≤ 1 .
|dk (y) − d
|y|3
12
ck is computable in a nearly linear time bound that does not depend on k.
2. d
Then we can compute in nearly linear time a binary sequence x such that, for
every k, x 6∈ S ∞ [dk ].
Proof. Without loss of generality we assume that dk (λ) = 1 for all k.
Let d : {0, 1}∗ → [0, ∞) be defined by
log2 |w|
X
d(w) =
√
2−k−2
k
k=1
ck (w).
d
Our algorithm will diagonalize against d, constructing a binary sequence x
as follows. If x ↾ n has been defined then choose the next bit of x as c ∈ {0, 1}
that minimizes d((x ↾ n)c).
Claim 5.2 If x 6∈ S ∞ [d] then for every k, x 6∈ S ∞ [dk ].
Let n ∈ N, k ∈ N, n ≥ 2
√
k
.
dk (x ↾ n) ≤ c
dk (x ↾ n) + 1/n3 ≤
√
≤ 2k+2
k
d(x ↾ n) + 1/n3
Claim 5.3 x 6∈ S ∞ [d].
Let w ∈ {0, 1}∗. We prove that there exists c ∈ {0, 1} such that d(wc) ≤
d(w) + 1/|w|2 .
log2 (|w|+1)
d(wc)
X
=
√
k
ck (wc)
d
√
k
(dk (wc) + 1/(|w| + 1)3 )
√
k
(dk (w) + 1/(|w| + 1)3 )
2−k−2
k=1
log2 (|w|+1)
X
≤
2−k−2
k=1
log2 (|w|+1)
X
≤
2−k−2
k=1
log2 (|w|)
X
≤
2
√
−k−2
k=1
log2 (|w|+1)
+
X
log2 (|w|+1)
k
ck (w) + 1/|w| ) +
(d
3
√
2−k−2
k
X
√
2−k−2
k
1/(|w| + 1)3 )
k=1
(dk (w))
k=log2 (|w|)+1
∞
X
≤
d(w) +
≤
d(w) + 1/|w|2 .
2
√
−k−2
log2 (|w|+1)
k
3
2/(|w|) ) +
X
k=log2 (|w|)+1
k=1
13
√
k
2−k−2
2|w|
Therefore
and x 6∈ S ∞ [d].
6
d(x ↾ n) ≤ d(x ↾ (n − 1)) + 1/n2 ≤ C
Open Problem
Many questions arise naturally from this work, but the following problem appears to be especially likely to demand new and useful methods.
As we have seen, normal numbers are closely connected to the theory of
finite automata. Schnorr and Stimm [24] proved that normality is exactly the
finite-state case of randomness. That is, a real number α is normal in a base
b ≥ 2 if and only if no finite-state automaton can make unbounded money
betting on the successive digits of the base-b expansion of α with fair payoffs.
The theory of finite-state dimension [9], which constrains Hausdorff dimension
[15] to finite-state automata, assigns each real number α a finite-state dimension
(b)
dimFS (α) ∈ [0, 1] in each base b. A real number α then turns out to be normal
(b)
in base b if and only if dimFS (α) = 1 [6]. Do there exist absolutely dimensioned
(b)
numbers, i.e., real numbers α for which dimFS (α) = dimFS (α) does not depend
on b, and 0 < dimFS (α) < 1?
Acknowledgments
The first author’s research was supported in part by National Science Foundation Grants 0652569, 1143830, 1247051, and 1545028. Part of this author’s
work was done during a sabbatical at Caltech and the Isaac Newton Institute
for Mathematical Sciences at the University of Cambridge, part was done during three weeks at Heidelberg University, with support from the Mathematics
Center Heidelberg and the Heidelberg University Institute of Computer Science,
and part was done during the workshop “Normal Numbers: Arithmetical, Computational and Probabilistic Aspects” at the Erwin Schrödinger International
Institute for Mathematics and Physics at the University of Vienna.
The second author’s research was supported in part by Spanish Government MEC Grants TIN2011-27479-C04-01 and TIN2016-80347-R. Part of this
author’s work was done during a research stay at the Isaac Newton Institute
for Mathematical Sciences at the University of Cambridge, part was done during three weeks at Heidelberg University, with support from the Mathematics
Center Heidelberg and the Heidelberg University Institute of Computer Science,
and part was done during the workshop “Normal Numbers: Arithmetical, Computational and Probabilistic Aspects” at the Erwin Schrödinger International
Institute for Mathematics and Physics at the University of Vienna.
14
References
[1] V. Becher, S. Figueira, and R. Picchi. Turing’s unpublished algorithm for
normal numbers. Theoretical Computer Science, 377:126–138, 2007.
[2] V. Becher, P. A. Heiber, and T. A. Slaman. A polynomial-time algorithm
for computing absolutely normal numbers. Information and Computation,
232:1–9, 2013.
[3] P. Billingsley. Probability and Measure, third edition. John Wiley and Sons,
New York, N.Y., 1995.
[4] E. Borel.
Sur les probabilités dénombrables et leurs applications
arithmétiques. Rendiconti del Circolo Matematico di Palermo, 27(1):247–
271, 1909.
[5] J. Borwein and D. Bailey. Mathematics by Experiment: Plausible Reasoning
in the 21st Century, second edition. A. K. Peters, 2008.
[6] C. Bourke, J. M. Hitchcock, and N. V. Vinodchandran. Entropy rates
and finite-state dimension. Theoretical Computer Science, 349(3):392–406,
2005.
[7] Y. Bugeaud. Distribution modulo one and Diophantine approximation, volume 193. Cambridge University Press, 2012.
[8] J. W. S. Cassels. On a problem of Steinhaus about normal numbers. Colloquium Mathematicum, 7:95–101, 1959.
[9] J. J. Dai, J. I. Lathrop, J. H. Lutz, and E. Mayordomo. Finite-state dimension. Theoretical Computer Science, 310:1–33, 2004.
[10] J. Doob. Regularity properties of certain families of chance variables.
Transactions of the American Mathematical Society, 47:455–486, 1940.
[11] M. Feder. Gambling using a finite state machine. IEEE Transactions on
Information Theory, 37:1459–1461, 1991.
[12] S. Figueira and A. Nies. Feasible analysis and randomness. Manuscript,
2013.
[13] S. Figueira and A. Nies. Feasible analysis, randomness, and base invariance.
Theory of Computing Systems, 56:439–464, 2015.
[14] Y. Gurevich and S. Shelah. Nearly linear time. In Proceedings of the First
Symposium on Logical Foundations of Computer Science. Springer, 1989.
[15] F. Hausdorff. Dimension und äußeres Maß. Math. Ann., 79:157–179, 1919.
[16] J. Hitchcock and J. Lutz. Why computational complexity requires stricter
martingales. Theory of Computing Systems, 39:277–296, 2006.
15
[17] A. N. Kolmogorov. Foundations of the Theory of Probability. Chelsea,
1950.
[18] H. Lebesgue. Sur certaines demonstrations d’existence. Bull. Soc. Math.
de France, 45:132–144, 1917.
[19] A. Lempel and J. Ziv. Compression of individual sequences via variable
rate coding. IEEE Transaction on Information Theory, 24:530–536, 1978.
[20] P. Lévy. Propriétés asymptotiques des sommes de variables indépendantes
ou enchainées. Journal des mathématiques pures et appliquées. Series 9.,
14(4):347–402, 1935.
[21] P. Lévy. Théorie de l’Addition des Variables Aleatoires. Gauthier-Villars,
1937 (second edition 1954).
[22] E. Mayordomo. Construction of an absolutely normal real number in polynomial time. Manuscript, 2013.
[23] W. M. Schmidt. On normal numbers. Pacific J. Math, 10(2):661–672, 1960.
[24] C.-P. Schnorr and H. Stimm. Endliche automaten und zufallsfolgen. Acta
Informatica, 1(4):345–359, 1972.
[25] W. Sierpinski. Démonstration élémentaire du théorème de M. borel sur les
nombres absolument normaux et détermination effective d’une tel nombre.
Bull. Soc. Math. France, 45:125–132, 1917.
[26] A. M. Turing. On computable numbers with an application to the Entscheidungsproblem. Proceedings of the London Mathematical Society, 42:230–
265, 1936-1937.
[27] A. M. Turing. A note on normal numbers. In S. B. Cooper and J. van
Leeuwen, editors, Alan Turing: His Work and Impact. Elsevier Science,
2013.
[28] J. Ville. Étude Critique de la Notion de Collectif. Gauthier–Villars, Paris,
1939.
[29] S. Wagon. Is π normal? Math. Intelligencer, 7:65–67, 1985.
16
| 8cs.DS
|
Efficient Nearest-Neighbor Search for Dynamical
Systems with Nonholonomic Constraints
Valerio Varricchio, Brian Paden, Dmitry Yershov, and Emilio Frazzoli
arXiv:1709.07610v1 [cs.CG] 22 Sep 2017
Massachusetts Institute of Technology
Abstract. Nearest-neighbor search dominates the asymptotic complexity of sampling-based motion planning algorithms and is often addressed
with k-d tree data structures. While it is generally believed that the expected complexity of nearest-neighbor queries is O(log(N )) in the size of
the tree, this paper reveals that when a classic k-d tree approach is used
with sub-Riemannian metrics, the expected query complexity is in fact
Θ(N p log(N )) for a number p ∈ [0, 1) determined by the degree of nonholonomy of the system. These metrics arise naturally in nonholonomic
mechanical systems, including classic wheeled robot models. To address
this negative result, we propose novel k-d tree build and query strategies
tailored to sub-Riemannian metrics and demonstrate significant improvements in the running time of nearest-neighbor search queries.
1
Introduction
Sampling-Based algorithms such as Probabilistic Roadmaps (PRM) [9], Rapidly
exploring Random Trees (RRT) [11] and their asymptotically optimal variants
(PRM∗ , RRT∗ ) [7] are widely used in motion planning. These algorithms build a
random graph of motions between points on the robot’s configuration manifold.
During the graph expansion, nearest-neighbor search is used to limit the
computation to regions of the graph close to the new configurations and it is
shown to dominate the asymptotic complexity of randomized planners. The notion of closeness appropriate for motion planning is induced by the length of the
shortest paths between configurations, or in general, by the minimum cost of
controlling a system between states.
As compared to exhaustive linear search, efficient algorithms with reduced
complexity have been studied in computational geometry and their use in motion
planning has been highlighted as a factor of dramatic performance improvement
[12]. Among a variety of approaches, k-d trees [1] are ideal due to their remarkable efficiency in low-dimensional spaces, typical of motion planning problems.
Classic k-d trees are shown to have logarithmic average case complexity for
distance functions strongly equivalent to L-p metrics [4]. While this requirement
is reasonable for many applications, it does not apply to distances induced by
the shortest paths of nonholonomic systems. Therefore, identifying nearest neighbors in the sense of a generic control cost remains an important open problem
in sampling-based motion planning. In both literature and practical implementations, when searching for neighbors, randomized planners resort to distance
functions that only approximate the true control cost. Arguably, the most common choices are Euclidean distance or quadratic forms [12]. This ad-hoc approach
1
2. GEOMETRY OF NONHOLONOMIC SYSTEMS
can significantly slow down the convergence rate of sampling-based algorithms
if an inappropriate metric is selected.
A number of heuristics have been proposed to resolve this issue, such as
the reachability and utility guided RRTs [17,3] which bias the tree expansion
towards promising regions of the configuration space. Other approaches use the
cost of linear quadratic regulators [5] and learning techniques [15,2]. In specific
examples, these heuristics can significantly reduce the negative effects of finding
nearest neighbors according to a metric inconsistent with the minimum cost path
between configurations. However, the underlying inconsistency is not directly
addressed. In contrast, a strong motivation to address it comes from recent
research [8], which shows that a major speedup of sampling-based kynodinamic
planners can be achieved by considering nonholonomy at the stage of nearestneighbor search.
Specialized k-d tree algorithms have been proposed to account for nonstandard topologies of some configuration manifolds [10,19,6].
However, no effort is known towards generalizing such algorithms to differential constraints.
In this work, we investigate the use of k-d trees for exact nearest-neighbor
search in the presence of differential constraints. The main contributions can be
summarized as follows: (i) we derive the expected complexity of nearest-neighbor
queries with k-d trees built according to classic techniques and reveal that it is
super-logarithmic (ii) we propose novel k-d tree build and query procedures tailored to sub-Riemannian metrics (iii) we provide numerical trials which verify
our theoretical analysis and demonstrate the improvement afforded by the proposed algorithms as compared with popular open source software libraries, such
as FLANN [14] and OMPL [18].
In Section 2, we review background material on sub-Riemannian geometries
and show connections with nonholonomic systems, providing asymptotic bounds
to their reachable sets. Based on these bounds, in Section 3 we propose a query
procedure specialized for nonholonomic systems, after a brief review of the k-d
tree algorithm. In Section 4, we study the expected complexity of m-nearestneighbor queries on a classic k-d tree with sub-Riemannian metrics. Inspired
by this analysis, in Section 5 we propose a novel incremental build procedure.
Finally, in Section 6 we show positive experimental results for a nonholonomic
mobile robot, which confirm our theoretical predictions and the effectiveness of
the proposed algorithms.
2
Geometry of Nonholonomic Systems
Nonholonomic constraints are frequently encountered in robotics and describe
mechanical systems whose local mobility is, in some sense, limited. Basic concepts from differential geometry, reviewed below, are used to clarify these limitations and discuss them quantitatively.
2
2. GEOMETRY OF NONHOLONOMIC SYSTEMS
2.1
Elements of Differential Geometry
A subset M of Rn is a smooth k-dimensional manifold if for all p ∈ M there
exists a neighborhood V of M such that V ∩ M is diffeomorphic to an open
subset of Rk . A vector v ∈ Rn is said to be tangent to M at point p ∈ M if
there exists a smooth curve γ : [0, 1] → M, such that γ̇(0) = v and γ(0) = p.
The tangent space of M at p, denoted Tp M, is the subspace of vectors tangent
to M at p. A map Y : M → Rn is a vector field on M if for each p ∈ M,
Y (p) ∈ Tp M. A smooth euclidean vector bundle of rank r over M is defined as
a set E ⊂ M × Rl such that the set Ep : v ∈ Rl , (p, v) ∈ E is an r-dimensional
vector space for all p ∈ M. Ep is called the fiber of bundle E at point p. Any set
of h linearly independent smooth vector fields Y1 , . . . Yh such that for all p ∈ M,
span(Y1 (p), ..., Yh (p)) = Ep is called a basis of E and Yi are called generator
vector fields of E. The tangent bundle of M is defined as the vector bundle
T M whose fiber at each point p is the tangent space at that point, Tp M. A
distribution H on a manifold is a subbundle of the tangent bundle, i.e., a vector
bundle such that its fiber Hp at all points is a vector subspace of Tp M.
Connection with nonholonomic systems. Consider a nonholonomic system described by the differential constraint:
ẋ(t) = f (x(t), u(t)),
(1)
where the configuration x(t) and control u(t) belong to the smooth manifolds
X and U respectively. Each ui ∈ U defines a vector field gi (z) = f (z, ui ) on
X . Therefore, for a fixed configuration z, f (z, u) has values in a vector space
Hz := Span({gi (z)}). In other words, the dynamics described by equation (1)
define a distribution H on the configuration manifold.
Throughout the paper, we will make use of the Reeds-Shepp vehicle [16] as
an illustrative example.
Example (Configuration manifold of a Reeds-Shepp vehicle). The configuration
manifold for this vehicle model is X = SE(2) with coordinates x = (x1 , x2 , x3 ).
The mobility of the system is given by ẋ1 = u1 cos(x3 ), ẋ2 = u1 sin(x3 ), ẋ3 =
u1 u2 , where u1 , u2 ∈ [−1, 1]. The inputs u1 = (1, 0) and u2 = (1, 1) define the
vector fields g1 (x) = (cos(x3 ), sin(x3 ), 0) and g2 (x) = (cos(x3 ), sin(x3 ), 1). At
each z ∈ SE(2) the fiber of the Reeds-Shepp distribution HRS is Span{g1 (z),
g2 (z)}. Let fˆ(x) = (cos(x3 ), sin(x3 ), 0), ˆl(x) = (− sin(x3 ), cos(x3 ), 0) and θ̂(x) =
(0, 0, 1). These vector fields indicate the body frame of the vehicle, i.e., its front fˆ,
lateral ˆl and rotation θ̂ axes. The Reeds-Shepp distribution is then equivalently
defined by the fibers HzRS = Span{fˆ(z), θ̂(z)}.
2.2
Distances in a Sub-Riemannian Geometry
A sub-Riemannian geometry G on a manifold M is a tuple G = (M, H, h·, ·iH ),
where H is a distribution on M whose fibers at all points p are equipped with
the inner product h·, ·iH : Hp × Hp → R. The distribution H is referred to as the
3
2. GEOMETRY OF NONHOLONOMIC SYSTEMS
horizontal distribution. A smooth curve γ : [0, 1] → M is said to be horizontal
if γ̇(t) ∈ Hγ(t) for all t ∈ [0, 1].
R1p
The length of smooth curves is defined `G (γ) := 0 hγ̇(t), γ̇(t)iH dt. If
Γab denotes the set of horizontal curves between a, b ∈ M, then dG (a, b) :=
inf γ∈Γab `G (γ) is a sub-Riemannian metric defined by the geometry. The ball
centered at p of radius r with respect to the metric dG is denoted B(p, r).
In control theory, the attainable set A(x0 , t) is the subset of X such that
for each p ∈ A(x0 , t) there exists a u : [0, τ ] → U for which the solution to (1)
through x(0) = x0 satisfies x(τ ) = p for some τ ≤ t. Solutions to (1) are simply
horizontal curves, so the attainable set A(x0 , t) is equivalent to the ball B(x0 , t)
defined by the sub-Riemannian metric. This equivalence holds for systems with
time-reversal symmetry, under the controllability condition stated in Theorem 1.
Example (Sub-Riemannian geometry of a Reeds-Shepp vehicle). The geometry
associated with the Reeds-Shepp vehicle is G RS = (SE(2), HRS , h·, ·iRS ), with
the standard inner product hv, wiRS = v T w. Horizontal curves for this geometry
are feasible paths satisfying the differential constraints. Geodesics correspond
to minimum-time paths between two configurations and are known in closed
form [16].
2.3
Iterated Lie Brackets and the Ball-box Theorem
A system is said to be controllable if any pair of configurations can be connected
by a feasible (horizontal) path. Determining controllability of a nonholonomic
system is nontrivial. For example, the Reeds-Shepp vehicle cannot move directly
in the lateral direction, but intuition suggests that an appropriate sequence of
motions can result in a lateral displacement (e.g., in parallel parking). Chow’s
Theorem and the Ball-box Theorem, reviewed below, are fundamental tools related to the controllability and the reachable sets of nonholonomic systems.
The Lie derivative of a vector field Y at p ∈ M in the direction v ∈ Tp M is
d
defined as dY (p)v = dt
Y (γ(t)) t=0 , where γ is a smooth curve starting in p =
γ(0) with velocity v = γ̇(0). Given two vector fields Y1 , Y2 on M, the Lie bracket
[Y1 , Y2 ] is a vector field on M defined as [Y1 , Y2 ](p) = dY2 (p)Y1 (p)−dY1 (p)Y2 (p).
From the horizontal distribution H, one can construct a sequence of distributions by iterating the Lie brackets of the generating vector fields, Y1 , Y2 . . . Yh ,
with h ≤ k. Recursively, this sequence is defined as: H1 = H, Hi+1 = Hi ∪
[H, Hi ], where [H, Hi ] denotes the distribution given by the Lie brackets of each
generating vector field of H with those of Hi . Note that the Lie bracket of two vector fields can be linearly independent from the original fields, hence Hi ⊆ Hi+1 .
The Lie hull [13], denoted Lie(H), is the limit of the sequence Hi as i → ∞. A
distribution H is said to be bracket-generating if Lie(H) = T M.
Theorem 1. (Chow’s Theorem [13, p. 44] ). If Lie(H) = T M on a connected manifold M, then any a, b ∈ M can be joined by a horizontal curve.
4
2. GEOMETRY OF NONHOLONOMIC SYSTEMS
Example (Lie hull of a Reeds-Shepp vehicle). Consider the Lie hull of HRS generated by {fˆ(x), θ̂(x)}. For every x ∈ SE(2), these vectors span a two-dimensional
subspace of Tx (SE(2)). The first order Lie bracket is given by
d ˆ
d
[fˆ, θ̂](x) =
f (x) θ̂(x) −
θ̂(x) fˆ(x) = (− sin(x3 ), cos(x3 ), 0) . (2)
dx
dx
This coincides with the body frame lateral axis ˆl(x) of the vehicle. Therefore,
the second order distribution Hx2 = Span{fˆ(x), θ̂(x), [fˆ, θ̂](x)} spans the tangent bundle of SE(2), and thus the Lie hull is obtained in the second step. By
Theorem 1, there is a feasible motion connecting any two configurations which
is consistent with one’s intuition about the wheeled robot.
Above, we have shown that from a basis Y1 . . . Yh of a bracket-generating
distribution H, one can define a basis y1 , . . . yk of T M. Specifically yi = Yi
for i ≤ h, while the remaining d − h fields are obtained with Lie brackets.
The vector fields {yi } are called privileged directions [13]. Define the weight wi
of the privileged direction yi as the smallest order of Lie brackets required to
generate yi from the original basis. More formally, wi is such that yi ∈
/ Hwi −1
wi
and yi ∈ H for all i. The weighted box at p of size , weights w ∈ Nk>0 and
multipliers µ ∈ Rk>0 is defined as:
Boxw,µ (p, ) : {y ∈ Rn : |hy − p, yi (p)iRn | < µi wi for all i ∈ [1, k]}.
(3)
Theorem 2 (The ball-box Theorem). Let H be a distribution on a manifold
M satisfying the assumptions of Chow’s Theorem. Then, there exist constants
0 ∈ R>0 and c, C ∈ Rk>0 such that for all < 0 and for all p ∈ M:
w,c
(p, ) ⊂ B(p, ) ⊂ Boxw,C (p, ) := Boxw
Boxw
o (p, ),
i (p, ) := Box
(4)
w
where Boxw
i and Boxo are referred to as the inner and outer bounding boxes for
the sub-Riemannian ball B, respectively.
Example (Ball-Box Theorem visualized for a Reeds-Shepp vehicle). From the Lie
hull construction in the previous example, we know that fˆ(x), θ̂(x) ∈ H1 so the
corresponding weights are wfˆ = wθ̂ = 1. Conversely, ˆl(x) first appears in H2 , so
its weight is wl̂ = 2. Theorem 2 states the existence of inner and outer bounding
boxes for reachable sets as t → 0 and predicts the infinitesimal order of each
side of these boxes, as shown in figure 1. Higher order Lie brackets correspond
to sides that approach zero at a faster asymptotic rate. The longitudinal and
angular sides — along fˆ and θ̂ — scale with Θ(t), while the lateral one — along
ˆl — with Θ(t2 ). Therefore, both boxes become increasingly elongated along fˆ
and θ̂ and flattened along ˆl as t 0. Intuitively, this geometric feature of boxes
reflects the well known fact that a small lateral displacement of a car requires
more time than an equivalent longitudinal one.
5
3. THE K-D TREE DATA STRUCTURE
2 Cl̂ t2
2 Cfˆ t
2 cfˆ t
1
2 Cθ̂ t
0.6
-0.2
-0.2
fˆ(q )
q
0
-0.5
-1
0
0.2
0.5
t = 0.7
-1
-1
0
q
-0.4
2
1
0
-0.5
-0.6
θ̂(q )
Boxw
i ( q , t)
B (q , t)
2
0.5
0.2
l̂ (q )
Boxw
o (q , t)
2 cl̂ t2
0
0.4
1
0.5
0
-0.5
t=1
0
-2
-2
-1
0
1
2
1
0
-1
-2
t=2
-2
-2
0
0
2
2
t=3
Fig. 1. Reachable sets and bounding boxes for a Reeds-Shepp vehicle around a configuration q and for different values of t. The lengths of the box sides are highlighted.
For both the inner and outer boxes, as t → 0, the sides along the front fˆ and heading
θ̂ axes are linear in t, while the side along the lateral axis ˆ
l is quadratic in t.
For the Reeds-Shepp vehicle, the sides of both boxes can be computed explicitly with geometric considerations on special manoeuvers that maximize
or minimize the displacement along eachp
axis. In particular, we get the values
Cfˆ = Cθ̂ = cθ̂ = 1, Cl̂ = 1/2, cfˆ = 3/2 − 1, cl̂ = 1/8.
3
The k-d tree Data Structure
A k-d tree T is a binary tree organizing a finite subset X ⊂ M, called a database,
with its elements xi ∈ X called data points. We would like to find the m points in
X closest to a given query point q on the manifold. Each point xi ∈ X is put in
relation with a normal vector ni ∈ Rn . Together, the pair vi = (xi , ni ) defines a
vertex of the binary tree. The set of vertices is denoted with V. A vertex defines
a partition of Rn into two halfspaces, referred to as the positive and negative
halfspace, and respectively described algebraically:
h+ (xi , ni ) := {x ∈ Rn : hni , xiRn > hni , xi iRn } ,
h− (xi , ni ) := {x ∈ Rn : hni , xiRn ≤ hni , xi iRn } .
(5)
An edge is an ordered pair of vertices e = (vi , vj ). A binary tree is defined as
T := (V, E − , E + ), with V set of vertices, E − set of left edges and E + set of right
edges. Given one edge e = (vi , vj ), vertex vj is referred to as the left child of vi if
e ∈ E − , or the right child if e ∈ E + . Let parent(vi ∈ V) = vj ∈ V s.t. (vi , vj ) ∈
E − ∪ E + . By convention, parent(vi ) = ∅ if such vj does not exist and vi is called
the root of T , denoted vi = root(T ). Let child(vi ∈ V, s ∈ {−, +}) = vj ∈ V
s.t. (vi , vj ) ∈ E s , or otherwise ∅ if such vj does not exist.
The fundamental property of k-d trees is that left children belong to the negative halfspace defined by their parents and right children to the positive halfspace.
Recursively, a vertex belongs to the parent halfspaces of all its ancestors. As a
result, a k-d tree defines a partition of M into non-overlapping polyhedra, called
buckets [4], that cover the entire manifold. In the sequel, we let BT denote the
set of buckets for a given k-d tree T .
6
3. THE K-D TREE DATA STRUCTURE
Buckets are associated with the leaves of T and with parents of only-child
leaves (i.e., leaves without a sibling). For any given point q ∈ M, we denote with
bq the unique bucket containing q.
3.1
m-nearest-neighbor query algorithm
The computational efficiency afforded by the algorithm comes from the following
observation: let q be the query point and suppose that among the distance evaluations computed thus far, the m closest points to q are within a distance dm
away. Now consider a vertex (x, n) and suppose the query point q is contained in
h+ (x, n) and B(q, dm ) ⊂ h+ (x, n). The data points represented by the sibling of
(x, n) and all of its descendants are contained in h− (r, c) and are therefore at a
distance greater than dm . Thus, the corresponding subtree can be omitted from
the search. The following primitives will be used to define the query procedure
presented in Algorithm 1.
Side of hyperplane. A procedure sideOf(x, p, n) → {−, +}, with x, p ∈ M,
n ∈ Rn . Returns + iff x ∈ h+ (p, n) and − otherwise. For convenience, define
opposite(+) = − and vice-versa.
Queue. For an m-nearest-neighbor query, the algorithm maintains a Bounded
Priority Queue, Q of size m to collect the results. The queue can be thought of
as a sequence Q = [q1 , q2 , . . . qm ], where each element qi is defined as a distancevertex pair qi : (di , vi ), di ∈ R≥0 , vi ∈ V. The property d1 ≤ d2 ≤ · · · ≤ dm is
an invariant of the data structure. When an element (dnew , nnew ) is inserted in
the queue, if dnew < dm , then qm is discarded and the indices of the remaining
elements are rearranged to maintain the order.
Ball-Hyperplane Intersection. A procedure that determines whether a ball
and a hyperplane intersect. Precisely, ballHyperplane(x, R, p, n), with x ∈ M
and R ≥ 0, returns true if B(x, R) ∩ h(p, n) 6= ∅. Note that it does not need to
return false otherwise.
In the classic analysis of k-d trees [4, eq. 14] the distance is assumed to be a
sum of component-wise terms, called coordinate distance functions. Namely:
P
k
d(x, y) = F
(6)
i=1 di (xi , yi ) .
When this holds, e.g., for L-p metrics, the ball-hyperplane intersection procedure
reduces to the direct comparison of two numbers.
However, this property does not hold for other notions of distance and in
general sub-Riemannian balls can have nontrivial shapes. For these cases, the
procedure can be implemented by checking that Vo (x, R) ∩ h(p, n) 6= ∅, where
Vo is an “outer set” with a convenient geometry, i.e., a set such that Vo (x, R) ⊇
B(x, R) for all x ∈ M, R > 0 and such that intersections with hyperplanes are
easy to verify. Clearly, vol(Vo (x, R))/vol(B(x, R)) ≥ 1 and it is desirable that
this ratio stays as small as possible.
A crucial consequence of Theorem 2 is that the choice Vo (x, R) = Boxw
o (x, R)
offers optimal asymptotical behavior, since the volume of the outer set scales with
7
3. THE K-D TREE DATA STRUCTURE
the smallest possible order, namely: vol(Boxw
o (x, R)) ∈ Θ[vol(B(x, R))]. This fact
is fundamental to devise efficient query algorithms for nonholonomic systems.
Example (Ball-hyperplane intersection for a Reeds-Shepp vehicle). The reachable sets shown in figure 1 have a nontrivial geometry. Let us consider two
possible implementations of the ball-hyperplane intersection procedure:
1. Euclidean bound (EB). Define the set C(p, R) = {x ∈ SE(2) |(x1 − p1 )2 +
(x2 − p2 )2 ≤ R2 , |x3 − p3 | ≤ 2R}, i.e., a cylinder in the configuration space
with axis along θ̂. Since the Euclidean distance ka − bk is a lower bound
to dRS (a, b), then B(x, R) ⊂ C(x, R) and ballHyperplane can be correctly
implemented by checking C(x, R) ∩ h(p, n) 6= ∅
2. Outer Box Bound (BB). In this case, the procedure checks Boxw
o (x, R) ∩
h(p, n) 6= ∅. A simple implementation is to test whether all vertices of the
box (8 in this case) are on the same halfspace defined by h(p, n).
While Euclidean bounds (EB) are a simple choice, the Outer Box Bound (BB)
method approximates the sub-Riemannian ball tightly. In fact, as R → 0,
4
vol(C(p, R)) ∈ Θ(R3 ), while vol(Boxw
o (p, R)) ∈ Θ(R ) and therefore the volume of the cylinder tends to be infinitely larger than the volume of the outer
box. As a result, method (BB) yields an asymptotically unbounded speedup in
the algorithm compared to (EB), as confirmed by our experimental results in
Section 6. In addition, any other implementation of the procedure will at most
provide a constant factor improvement with respect to method (BB).
Algorithm 1: k-d tree query
1
2
3
4
5
6
7
8
9
define query (q ∈ M, T = (V, E − , E + )):
Q ←− {q1:m = (∅, ∞)} ;
// initialize queue
define querySubtree (q ∈ M, vi = (xi , ni ) ∈ V):
if vi = ∅ then return;
// caller reached leaf
s ←− sideOf (q, xi , ni );
querySubtree (q, child(vi , s)) ;
// descend to child containing q
Q ←− Q ∪ {(dist(q, xi ), vi )} ;
// add vertex to the queue
if ballHyperplane (q, dk , xi , ni ) then
// check for intersections
querySubtree (q, child(vi , opposite(s))) ;
// visit sibling
11
querySubtree (q, root (T )) ;
return Q;
3.2
k-d tree build algorithms
10
// start recursion from root
The performance of nearest-neighbor queries is heavily dependant on how the
k-d tree is constructed. In the sequel, we describe two popular approaches to
construct k-d trees: batch (or static) and incremental (or dynamic).
In the batch algorithm, all data points are processed at once and statistics
of the database determine the vertices of the tree at each depth. This algorithm
guarantees a balanced tree, but the insertion of new points is not possible without
8
3. THE K-D TREE DATA STRUCTURE
re-building the tree. Conversely, in the incremental version, the tree is updated
on the fly as points are inserted, however, the tree balance guarantee is lost.
Both algorithms find applications in motion planning: the batch version can
be used to efficiently build roadmaps for off-line, multiple-query techniques such
as PRMs, while the incremental is suitable for anytime algorithms such as RRTs.
Batch k-d tree build algorithm
The following primitive procedures will be used to describe the batch construction of k-d trees, defined in Algorithm 2. The range of a set S along direction dˆ
ˆ − inf x∈S hx, di.
ˆ
is defined as rng dˆ(S) = supx∈S hx, di
Maximum range. Let maxRange : 2X → Rn . Given a subset D ∈ 2X of the
data points, maxRange determines a direction l along which the range of data
is maximal. We consider the formulation in [4], where l is chosen among the
cardinal directions {êi }i∈[0,...k−1] , so that maxRange(D) = arg maxêi [rng êi (D)].
Median element. Let median : 2X × Rn → D. Given a subset D ∈ 2X of the
data points and a direction l, median returns the median element of D along
direction l.
Algorithm 2: Batch k-d tree build
1
2
3
4
5
6
7
8
9
10
11
define build (X):
V←−∅; E − ←−∅; E + ←−∅ ;
// Initialize
define buildSubtree (D ∈ 2X , vi = (xi , ni ) ∈ V, s ∈ {−, +}):
if D = ∅ then return;
// caller reached
nnew ←− maxRange (D); xnew ←− median (D, nnew ) ;
vnew ←− (xnew , nnew ) ; V ←− V ∪ vnew ;
if s 6= ∅ then E s ←− E s ∪ (vi , vnew ) ;
L ←− D ∩ h− (xnew , nnew ); R ←− D\(L ∪ xnew );
buildSubtree (L, vnew , -); buildSubtree (R, vnew , +);
tree
leaf
buildSubtree (X, ∅, ∅);
return T = (V, E − , E + );
Incremental k-d tree build algorithm
A key operation to build a k-d tree incrementally is to pick splitting hyperplanes
on the fly as new data points are inserted. This is achieved with a splitting
sequence, which we define as:
Splitting sequence. A map ZM : N≥0 × M → Rn that, given an integer d ≥ 0
and a point p ∈ M, returns a normal vector n associated with them.
When dealing with k-dimensional data, one usually chooses a basis of cardinal
axes {êi }i∈[0...k−1] . The normal of the hyperplane associated with a vertex v is
typically picked by cycling through the cardinal axes based on the depth of v in
the binary tree. Let “a mod b” denote the remainder of the division of integer a
by integer b. Then, the classic splitting (CS) sequence is defined as:
classic
ZM
(d, x) = ê[d mod k] .
9
(7)
4. COMPLEXITY ANALYSIS
Algorithm 3: Incremental k-d tree build.
Insert in k-d tree T = (V, E + , E − ), start recursion with insert(xnew , root(T )).
1
2
3
4
5
6
7
8
9
10
4
define insert (xnew ∈ M, vi = (xi , ni ) ∈ V):
if V = ∅ then
nnew ←− ZM (0, xnew ); V←−(xnew , nnew ) ;
return
// if tree is empty...
// ...add root
side ←− sideOf (xnew , xi , ni ) ; c ←− child (vi , side) ;
if c = ∅ then
nnew ←− ZM (depth(vi ) + 1, xnew ) ; vnew ←− (xnew , nnew );
V ←− V ∪ vnew ; E side ←− E side ∪ (vi , vnew ) ;
return
insert (xnew , c) ;
Complexity Analysis
In this section, we discuss the expected asymptotic complexity of m-nearestneighbor queries in a k-d tree built according to Algorithm 2. The complexity of
the nearest-neighbor query procedure (Algorithm 1) is measured in terms of the
number nv of vertices examined. Let B(q, dm ) be the ball containing the m nearest neighbors to q. For the soundness of the algorithm, all the vertices contained
in this ball must be examined, and therefore, all the buckets overlapping with
it. As we recall from Section 3, buckets are associated with leaves, and therefore
the algorithm will visit as many leaves as the number of such buckets, formally:
nl ∈ Θ(|β|), where β := {b ∈ BT | b ∩ B(q, dm ) 6= ∅} and nl denotes the number
of leaves visited by the algorithm.
If the asymptotic order of visited leaves is known, proofs rely on the following
fact: since the batch algorithm guarantees a balanced tree, descending into nl
leaves from the root requires visiting nv ∈ Θ(nl log N ) vertices, where N is the
cardinality of the database X. Thus the expected query complexity is given by:
E(nv ) ∈ Θ[E(nl ) log N ].
(8)
Lemma 1 reviews the seminal result, originally from [4], that the expected
asymptotic complexity for a Minkowski (i.e., L-p) distance is logarithmic. Our
main theoretical contribution is the negative result described in Theorem 3,
where we reveal that the expected complexity for sub-Riemannian metrics is
in fact super-logarithmic. In the sequel, assume that data points are randomly
sampled from M with probability distribution p(x).
Lemma 1 ([4]). If the distance function used for the nearest-neighbor query is
induced by a p-norm, then the expected complexity of the nearest-neighbor search
on a k-d tree built with Algorithm 2 is O(log(N )) as N → ∞.
For the detailed proof, we suggest reading the original work by Friedman et
al. [4], while here we report key facts used in our next result. In [4, pg. 214], it
10
4. COMPLEXITY ANALYSIS
is shown that:
E[vol(B(q, dm ))] ≈
m
1
,
(N + 1) p(q)
(9)
with no assumptions on the metric and the probability distribution p(x).
In a batch-built k-d tree, the expected asymptotic shape of the bucket bq
containing the query point q is assumed hyper-cubical. From equation (9) with
1
. Thus, hyper-cubes in a neighborhood of q have
m = 1, E(vol(bq )) ≈ (N1+1) p(q)
sides of expected length E(lq ) = [(N + 1)p(q)]−1/k . Using these facts, it is then
shown that the expected number of visited leaves is asymptotically constant
with the size of the database, E(nl ) ∈ Θ(1) and therefore the average query
complexity is logarithmic, as per equation (8).
Theorem 3. Let the distance function used for the nearest-neighbor query be
a sub-Riemannian metric on a smooth connected manifold M with a bracketgenerating horizontal distribution of dimension h and weights {wi }. Then the
expected complexity of the nearest-neighbor query on a k-d tree built with Algorithm 2 is Θ(N p log(N )) as N → ∞, where the expression for p is:
X 1
X
wi
p=
−
, with W :=
wi .
(10)
k W
i
wi ≤W/k
Proof. For N large enough, Theorem 2 ensures the existence of inner and outer
bounding boxes to the sub-Riemannian ball B(q, dm ).
From equations (4) and (9), we get:
E(dm )W ·
k
Y
i=1
ci ≤
k
Y
1
1
≤ E(dm )W ·
Ci ,
N + 1 p(q)
i=1
(11)
P
where W := i wi . Therefore, the expected distance to the m-th nearest neighbor scales asymptotically as E(dm ) ∈ Θ(N −1/W
p ) for N → ∞. Recall that a
bucket bq has sides of expected length lq = k 1/ [(N + 1)p(q)] or equivalently,
lq ∈ Θ(N −1/k ). We are now interested in the asymptotic order of the number
of buckets overlapping with a weighted box of size dm . Let nh (d, lq ) the number
of hypercubes intersected by a segment
of Rk
l √ of lengthm d embedded in a grid
√
−1
with side lq . It can be shown that ( k) (d/lq ) ≤ nh (d, lq ) ≤ k + kdd/lq e.
Then, asymptotically, nh (d, lq ) ∈ Θ(dd/lq e) as (d, lq ) → 0. Since a box has k
orthogonal sides, each with expected length E(dm )wi , the expected number of
visited buckets, is:
!
!
k
k l
m
Y
Y
wi
1
E(dm )wi
.
(12)
E(nl ) ∈ Θ
=Θ
N k− W
l
q
i=1
i=1
In the latter product, only the factors with exponent > 0 contribute to the
complexity of the algorithm, while the other terms tend to 1, as N → ∞. In
other words, the query complexity is determined only by low order Lie brackets
11
5. THE LIE SPLITTING STRATEGY
up until wi ≤ W/k. In fact, along the direction of higher order Lie brackets,
reachable sets shrink to zero faster than the side of a k-d tree bucket. Following
up from equation (12), we get:
X 1
Y
w
1
wi
i
E(nl ) ∈ Θ
N k − W = Θ (N p ) , p =
−
.
(13)
k W
wi ≤W/k
wi ≤W/k
From equation (8) it follows that the expected complexity of the query algorithm
is given by E(nv ) ∈ Θ(N p log N ) as N → ∞.
t
u
Remark. For holonomic systems, the query complexity is logarithmic, in accordance with Lemma 1. In fact, for holonomic systems, w1 = w2 = · · · = wk = 1,
then W = k and p = 0 from equation (10).
Remark. The query complexity is always between logarithmic and linear. Since
W ≥ k by definition, for all i such that wi ≤ W/k, one can state 0 < wi /W ≤
1
i
1/k ≤ 1. It follows that 0 ≤ k1 − w
W < k . Then p can be bounded with:
X 1
X 1
wi
1
<
≤ k · = 1 ⇒ p ∈ [0, 1).
0≤p=
−
(14)
k W
k
k
wi ≤W/k
wi ≤W/k
Example. For the Reeds-Shepp car, k = dim[SE(2)] = 3, wfˆ = wθ̂ = 1, wl̂ = 2
and W = wfˆ + wθ̂ + wl̂ = 4. Only wfˆ and wθ̂ satisfy wi ≤ W/k, therefore,
according
to
Theorem 3, the expected query complexity of a batch kd-tree is
√
6
Θ
N log N . We confirm this prediction with experiments in section 6.
5
The Lie splitting strategy
The basic working principle of k-d trees is the ability to discard subtrees without
loss of information during a query. For each visited node v = (x, n), the algorithm checks whether the current biggest ball in the queue, B(q, dm ) intersects
h(x, n). If such an intersection exists, the algorithm visits both children of v,
otherwise one child is discarded and so is the entire subtree rooted in it. To
reduce complexity, it is thus desirable that during query, a k-d tree presents as
few ball-hyperplane intersections as possible.
In the classic splitting strategy, hyperplanes are chosen cycling through a
globally defined set of cardinal axes. However, we have shown that nonholonomic
systems have a set of locally-defined privileged axes and that the reachable sets
have different infinitesimal orders along each of them. When the metric comes
from a nonholonomic system, the hyperplanes in a classic k-d tree are not aligned
with reachable sets and the buckets have different asymptotic properties than
reachable sets. This can make intersections frequent, as shown in figure 2(a).
Ideally, to minimize the number of ball-hyperplane intersections, the buckets
in a k-d tree should approximate the bounding boxes for the reachable sets of the
12
5. THE LIE SPLITTING STRATEGY
θ
y
y
x
(a) Classic k-d tree construction
θ
x
(b) Lie k-d tree splitting strategy
Fig. 2. Qualitative comparison of a classic k-d tree with its counterpart built with the
proposed Lie splitting strategy. For nonholonomic systems, reachable sets (red, blue,
green) are elongated along configuration-dependent privileged directions. The smaller
the sets, the more pronounced their aspect ratios. The Lie splitting strategy adapts the
hyperplanes locally to the balls and decreases the expected number of ball-hyperplane
intersections, thus reducing the expected asymptotic query complexity.
dynamical system, as depicted in figure 2(b). To achieve this, we propose a novel
splitting rule, named the Lie splitting strategy, which exploits the differential
geometric properties of a system and the asymptotic scaling of its reachable
sets. The Lie splitting strategy is based on the following two principles:
1. The splitting normal associated with each data point xi is along one of the
privileged axes in that point, i.e., ZM (d, xi ) ∈ {y1 (xi ), y2 (xi ) . . . yk (xi )}.
2. The buckets of the k-d tree, in expectation, scale asymptotically according to
the weighted box along all privileged axes as t → 0. Formally, for all q ∈ M
and for all pairs of privileged axes yi (q), yj (q),
h
iwj
h
iwi
E rng yi (q) (bq )
∈ Θ E rng yj (q) (bq )
.
(15)
Requirement 2 prescribes the asymptotic behavior of the sequence ZM as d →
∞, which can be formalized as follows: let ni (d) = |{n < d : ZM (n, x) = yi (x)}|,
i.e., the total number of splits in the sequence ZM along axis yi before index d.
As d h→ ∞, the expected
bucket size along yi after ni (d) splits has asymptotic
i
order E rng yi (q) (bq ) ∈ Θ[e−ni (d) ]. Then, in terms of the number of splits,
equation (15) yields:
ni (d) · wj ∼ nj (d) · wi for all i, j ∈ [1, . . . k] as d → ∞.
(16)
Simply put, each privileged direction should be picked as a splitting normal with a frequency proportional to its weight. Note that this is only relevant
asymptotically, i.e., as d → ∞.
13
6. EXPERIMENTAL RESULTS
Example. For the Reeds-Shepp vehicle, a valid Lie splitting sequence is:
ˆl(x), if d ≡ 0 or d ≡ 1 (mod 4)
Lie
ZRS (d, x) := fˆ(x), if d ≡ 2 (mod 4)
θ̂(x), if d ≡ 3 (mod 4)
(17)
It is easy to verify that this satisfies equation (16). In fact, lateral splits occur
in the sequence twice as often as longitudinal and lateral splits.
6
Experimental results
In this section, we validate our results and compare the performance of our
algorithms with different methods from widely used open-source libraries. Query
performances are averaged over 1000 randomly drawn query points. The same
insertion and query sequences are used across all the analyzed algorithms and
generated from a uniform distribution.
Experiment 1. In this experiment, we confirm the theoretical contributions presented in Section 4. In figure 3(a) we show the average number of leaves visited
when querying a batch k-d tree with Euclidean (blue) and Reeds-Shepp metrics (solid red). While the blue curve settles to a constant value, in accordance
with Lemma 1,√the red curve exhibits exponential growth. When normalizing
this curve by 6 N (dashed red), we observe a constant asymptotic behavior,
consistent with the rate determined by Theorem 3. For comparison, we report
the average time for Euclidean queries on an incremental k-d tree (black), which
tends to visit more vertices than its batch, balanced counterpart (blue).
Experiment 2. In this experiment (figures 3(b-d)), we plot the total number of
distance evaluations and the running times observed with different combinations
of build and query algorithms. Figure 3(d) reveals that the proposed outer Box
Bound (BB) ball-hyperplane intersection method (yellow, purple, green) reduces
the query time significantly as compared to Euclidean bounds (EB) (blue, red),
in accordance with our predictions in Section 3.1.
Additionally, Lie splitting (green) further improves query time, as compared
with the classic splitting (yellow). The corresponding incremental Lie k-d tree
also outperforms a classic batch-built one (purple), guaranteed to be balanced.
More important speedups emerge when comparing the proposed k-d trees
with different techniques, such as Hierarchical Clustering from FLANN and Geometric Near-neighbor Access Tree (GNAT) from OMPL. Interestingly, off-theshelf implementations of k-d trees offered by FLANN and other tools are unusable with nonholonomic metrics altogether, since they are limited to distances
of the form of equation (6). Therefore a comparison is not possible.
All the tested k-d trees visibly outperform Hierarchical Clustering (cyan)
both in build time and query time. In contrast, GNAT offers competitive query
times. However, its insertion is ∼ 100× slower than incremental k-d trees, since a
significant number of distances are evaluated in the build phase, while k-d trees
14
7. CONCLUSION
Batch - dE
Incremental, Z classic - dE
Batch - dRS , BB
Batch - dRS , BB
√
normalized by 6 N
10 2
Incremental, Z classic
- dRS , EB
Batch - dRS , EB
Incremental, Z classic - dRS , BB
10 8
Batch - dRS , BB
Lie
Incremental, ZRS
- dRS , BB
10 7
FLANN Hierarchical clustering
OMPL GNAT
10 6
10 1
10 5
N: number of samples
N: number of samples
10 1
10 2
10 3
10 4
10 5
102
10 6
103
(a) Average leaves visited (query)
10
104
105
106
107
108
(b) Total distance evaluations
8
10 4
10
10
10
6
4
10 3
2
N: number of samples
N: number of samples
10
2
10
3
10
4
10
5
10
6
10
7
10
8
10 2
(c) Build time (µs)
10 3
10 4
10 5
10 6
10 7
10 8
(d) Average query time (µs)
Fig. 3. (a) Experiment 1 : Average number of leaves visited during Euclidean (blue) and
Reeds-Shepp (red, solid) queries of a batch k-d tree. (b-d) Experiment 2 : Performance
of different algorithms. In the legends, dE and dRS indicate Euclidean and ReedsShepp queries, EB and BB indicate Euclidean Bound and outer Box Bound for ballLie
indicate the splitting sequence.
hyperplane intersections, Z classic and ZRS
only evaluate distances during query. This is reflected in a noticeably higher
asymptotic rate of distance evaluations, revealed in figure 3(b).
7
Conclusion
Motivated by applications in sampling-based motion planning, we investigated
k-d trees for efficient nearest-neighbor search with distances defined by the length
of paths of controllable nonholonomic systems. We have shown that for subRiemannian metrics, the query complexity of a classic batch-built k-d tree is
Θ(N p log N ), where p ∈ [0, 1) depends on the properties of the system. In addition, we have proposed improved build and query algorithms for k-d trees that
account for differential constraints. The proposed methods proved superior over
classic ones in numerical experiments carried out with a Reeds-Shepp vehicle.
Future work will analyze whether logarithmic complexity is achieved for nonholonomic systems. In addition, the proposed algorithms are exact and rely
on explicit distance evaluations. Since distances cannot be generally computed
in closed form, we are interested in investigating approximate nearest-neighbor
search algorithms with provable correctness bounds that do not require explicit
distance computations.
15
7. CONCLUSION
References
1. J. L. Bentley. Multidimensional binary search trees used for associative searching.
Communications of the ACM, 18(9):509–517, 1975.
2. M. Bharatheesha, W. Caarls, W. J. Wolfslag, and M. Wisse. Distance metric
approximation for state-space RRTs using supervised learning. In 2014 IEEE/RSJ
International Conference on Intelligent Robots and Systems, pages 252–257, 2014.
3. B. Burns and O. Brock. Single-query motion planning with utility-guided random trees. In Proceedings 2007 IEEE International Conference on Robotics and
Automation, pages 3307–3312, 2007.
4. J. H. Friedman, J. L. Bentley, and R. A. Finkel. An algorithm for finding best
matches in logarithmic expected time. ACM Transactions on Mathematical Software (TOMS), 3(3):209–226, 1977.
5. E. Glassman and R. Tedrake. A quadratic regulator-based heuristic for rapidly exploring state space. In Robotics and Automation (ICRA), 2010 IEEE International
Conference on, pages 5021–5028, 2010.
6. J. Ichnowski and R. Alterovitz. Fast nearest neighbor search in SE(3) for samplingbased motion planning. In Algorithmic Foundations of Robotics XI, pages 197–214.
Springer, 2015.
7. S. Karaman and E. Frazzoli. Sampling-based algorithms for optimal motion planning. The International Journal of Robotics Research, 30(7):846–894, 2011.
8. S. Karaman and E. Frazzoli. Sampling-based optimal motion planning for nonholonomic dynamical systems. In Robotics and Automation (ICRA), 2013 IEEE
International Conference on, pages 5041–5047, 2013.
9. L. E. Kavraki, P. Svestka, J.-C. Latombe, and M. H. Overmars. Probabilistic
roadmaps for path planning in high-dimensional configuration spaces. IEEE transactions on Robotics and Automation, 12(4):566–580, 1996.
10. J. J. Kuffner. Effective sampling and distance metrics for 3D rigid body path
planning. In Robotics and Automation, 2004. Proceedings. ICRA’04. 2004 IEEE
International Conference on, volume 4, pages 3993–3998, 2004.
11. S. M. LaValle. Rapidly-exploring random trees: A new tool for path planning.
Citeseer, 1998.
12. S. M. LaValle and J. J. Kuffner. Randomized kinodynamic planning. The International Journal of Robotics Research, 20(5):378–400, 2001.
13. R. Montgomery. A tour of subriemannian geometries, their geodesics and applications. Number 91. American Mathematical Soc., 2006.
14. M. Muja and D. G. Lowe. Fast approximate nearest neighbors with automatic
algorithm configuration. In International Conference on Computer Vision Theory
and Application VISSAPP’09), pages 331–340. INSTICC Press, 2009.
15. L. Palmieri and K. Arras. Distance metric learning for RRT-based motion planning
for wheeled mobile robots. In 2014 IROS Machine Learning in Planning and
Control of Robot Motion Workshop, 2014.
16. J. Reeds and L. Shepp. Optimal paths for a car that goes both forwards and
backwards. Pacific journal of mathematics, 145(2):367–393, 1990.
17. A. Shkolnik, M. Walter, and R. Tedrake. Reachability-guided sampling for planning
under differential constraints. In Robotics and Automation, 2009. ICRA’09. IEEE
International Conference on, pages 2859–2865, 2009.
18. I. A. Şucan, M. Moll, and L. E. Kavraki. The Open Motion Planning Library.
IEEE Robotics & Automation Magazine, (4):72–82, December.
19. A. Yershova and S. M. LaValle. Improving motion-planning algorithms by efficient
nearest-neighbor searching. IEEE Transactions on Robotics, 23(1):151–157, 2007.
16
| 3cs.SY
|
1
Lossless Analog Compression
Giovanni Alberti1 , Helmut Bölcskei2 , Camillo De Lellis3 ,
Günther Koliander4 , and Erwin Riegler2
1
2
arXiv:1803.06887v1 [math.FA] 19 Mar 2018
3
4
Dept. of Mathematics, University of Pisa, Italy, Email: [email protected]
Dept. IT & EE, ETH Zurich, Switzerland, Email: {boelcskei, eriegler}@nari.ee.ethz.ch
Dept. of Mathematics, University of Zurich, Switzerland, Email: [email protected]
ARI, Austrian Academy of Sciences, Vienna, Austria, Email: [email protected]
Abstract
We establish the fundamental limits of lossless analog compression by considering the recovery of
arbitrary random vectors x ∈ Rm from the noiseless linear measurements y = Ax with measurement
matrix A ∈ Rn×m . Our theory is inspired by the groundbreaking work of Wu and Verdú (2010) on almost
lossless analog compression, but applies to the nonasymptotic, i.e., fixed-m case, and considers zero error
probability. Specifically, our achievability result states that, for Lebesgue-almost all A, the random vector
x can be recovered with zero error probability provided that n > K(x), where the description complexity
K(x) is given by the infimum of the lower modified Minkowski dimensions over all support sets U of
x (i.e., sets U ⊆ Rm with P[x ∈ U] = 1). We then particularize this achievability result to the class
of s-rectifiable random vectors as introduced in Koliander et al. (2016); these are random vectors of
absolutely continuous distribution—with respect to the s-dimensional Hausdorff measure—supported
on countable unions of s-dimensional C 1 -submanifolds of Rm . Countable unions of C 1 -submanifolds
include essentially all signal models used in the compressed sensing literature such as the standard
union of subspaces model underlying much of compressed sensing theory and spectrum-blind sampling,
smooth manifolds, block-sparsity, and low-rank matrices as considered in the matrix completion problem.
Specifically, we prove that, for Lebesgue-almost all A, s-rectifiable random vectors x can be recovered
with zero error probability from n > s linear measurements. This threshold is, however, found not to
be tight as exemplified by the construction of an s-rectifiable random vector that can be recovered with
zero error probability from n < s linear measurements. This leads us to the introduction of the new class
of s-analytic random vectors, which admit a strong converse in the sense of n ≥ s being necessary for
recovery with probability of error smaller than one. The central conceptual tool in the development of
our theory is geometric measure theory.
The material in this paper was presented in part at the 2016 IEEE International Symposium on Information Theory [1].
March 20, 2018
DRAFT
2
I. I NTRODUCTION
Compressed sensing [2]–[6] deals with the recovery of unknown sparse vectors x ∈ Rm from a small
(relative to m) number, n, of linear measurements of the form y = Ax, where A ∈ Rn×m is the
measurement matrix.1 Known recovery guarantees can be categorized as deterministic, probabilistic, and
information-theoretic. The literature in all three categories is abundant and the ensuing overview is hence
necessarily highly incomplete, yet representative.
Deterministic results, such as those in [2], [6]–[10], are uniform in the sense of applying to all ssparse vectors x for a fixed measurement matrix A. Typical guarantees say that s-sparse vectors x can
be recovered through convex optimization algorithms or greedy algorithms provided that s < 21 (1 + 1/µ),
where µ denotes the coherence of A, i.e., the largest (in absolute value) inner product of any two different
columns of A. The Welch bound [11] implies that the minimum number of linear measurements, n,
required for uniform recovery is of order s2 , a result known as the “square-root bottleneck.”
Probabilistic results are either based on random2 measurement matrices A [3]–[5], [12]–[15] or deterministic A and random s-sparse vectors x [13], [14] and typically state that s-sparse vectors can
be recovered, again using convex optimization algorithms or greedy algorithms, with high probability,
provided that n is of order s log m.
An information-theoretic framework for compressed sensing, fashioned as an almost lossless analog
compression problem, was developed by Wu and Verdú [16], [17]. Specifically, [16] derives asymptotic (in
m) achievability results and converses for linear encoders and measurable decoders, measurable encoders
and Lipschitz continuous decoders, and continuous encoders and continuous decoders. For the particular
case of linear encoders and measurable decoders, [16] shows that, asymptotically in m, for Lebesgue
almost all (a.a.) measurement matrices A, the random vector x can be recovered with arbitrarily small
probability of error from n = bRmc linear measurements, provided that R > RB , where RB denotes the
Minkowski dimension compression rate [16, Definition 10] of the random process generating x. For the
special case of x with independent and identically distributed (i.i.d.) discrete-continuous mixture entries,
a matching converse exists. Discrete-continuous mixture distributions ρµc + (1 − ρ)µd are relevant as they
mimic sparse vectors for large m. In particular, if the discrete part µd is a Dirac measure at 0, then the
nonzero entries of x can be generated only by the continuous part µc , and the fraction of nonzero entries
in x converges—in probability—to ρ as m tends to infinity. A nonasymptotic, i.e., fixed-m, statement
in [16] says that a.a. (with respect to a σ -finite Borel measure on Rm ) s-sparse random vectors can be
1
Throughout the paper, we assume that n ≤ m.
2
Random quantities are denoted by sans-serif letters, throughout.
March 20, 2018
DRAFT
3
recovered with zero error probability provided that n > s. Again, this result holds for Lebesgue a.a.
measurement matrices A ∈ Rn×m . A corresponding converse does not seem to be available.
Contributions. We establish the fundamental limits of lossless, i.e., zero error probability, analog
compression in the nonasymptotic, i.e., fixed-m, regime for arbitrary random vectors x ∈ Rm . Specifically,
we show that x can be recovered with zero error probability provided that n > K(x), with the description
complexity K(x) given by the infimum of the lower modified Minkowski dimensions over all support
sets U of x, i.e., all sets U ⊆ Rm with P[x ∈ U] = 1. This statement holds for Lebesgue-a.a. measurement
matrices. Lower modified Minkowski dimension vastly generalizes the notion of s-sparsity and allows
for arbitrary support sets that are not necessarily finite unions of s-dimensional linear subspaces. For
s-sparse vectors, we get the recovery guarantee n > s showing that our information-theoretic thresholds
suffer neither from the square-root bottleneck nor from a log m-factor. We hasten to add, however, that
we do not specify explicit decoders that achieve these thresholds, rather we provide existence results
absent computational considerations. The central conceptual element in the proof of our achievability
result is the probabilistic null-space property first reported in [18]. We emphasize that it is the usage of
modified Minkowski dimension, as opposed to Minkowski dimension [16], [18], that allows us to obtain
achievability results for zero error probability. The asymptotic achievability result for linear encoders in
[16] can be recovered in our framework.
We particularize our achievability result to s-rectifiable random vectors x as introduced in [19]; these
are random vectors supported on countable unions of s-dimensional C 1 -submanifolds of Rm and of
absolutely continuous—with respect to s-dimensional Hausdorff measure—distribution. Countable unions
of C 1 -submanifolds include numerous signal models prevalent in the compressed sensing literature,
namely, the standard union of subspaces model underlying much of compressed sensing theory [20],
[21] and spectrum-blind sampling [22], [23], smooth manifolds [24], block-sparsity [25]–[27], and lowrank matrices as considered in the matrix completion problem [28]–[30]. Our achievability result shows
that s-rectifiable random vectors can be recovered with zero error probability provided that n > s.
Again, this statement holds for Lebesgue-a.a. measurement matrices. Absolute continuity with respect
to s-dimensional Hausdorff measure is a regularity condition ensuring that the distribution is not too
concentrated; in particular, sets of Hausdorff dimension t < s are guaranteed to carry zero probability
mass. One would therefore expect n ≥ s to be necessary for zero error recovery of s-rectifiable random
vectors. It turns out, however, that, perhaps surprisingly, this is not the case in general. An example
elucidating this phenomenon constructs a set G ⊆ R2 of positive 2-dimensional Hausdorff measure that
can be compressed linearly in a one-to-one fashion into R. This will then be seen to lead to the statement
that every 2-rectifiable random vector of distribution absolutely continuous with respect to 2-dimensional
March 20, 2018
DRAFT
4
Hausdorff measure restricted to G can be recovered with zero error probability from a single linear
measurement. What renders this result surprising is that all this is possible even though G contains the
image of a Borel set in R2 of positive Lebesgue measure under a C ∞ -embedding. The picture changes
completely when the embedding is real analytic. Specifically, we show that if a set U ⊆ Rm contains the
real analytic embedding of a Borel set in Rs of positive Lebesgue measure, it can not be compressed
linearly (in fact, not even through a nonlinear real analytic mapping) in a one-to-one fashion into Rn
with n < s. This leads to the new concept of s-analytic random vectors, which allows a strong converse
in the sense of n ≥ s being necessary for recovery of x with probability of error smaller than one. The
qualifier “strong” refers to the fact that recovery from n < s linear measurements is not possible even
if we allow an arbitrary positive error probability strictly smaller than one. The only strong converse
available in the literature applies to random vectors x with i.i.d. discrete-continuous mixture entries [16].
Organization of the paper. In Section II, we present our achievability results, with the central statement
in Theorem II.1. Section III particularizes these results to s-rectifiable random vectors and presents the
2-rectifiable example random vectors that can be recovered with zero error probability from a single linear
measurement. In Section IV, we introduce and characterize the new class of s-analytic random vectors
and we derive a corresponding strong converse, stated in Theorem IV.1. Sections V–VII contain the
proofs of the main technical results stated in Sections II–IV. Appendices A–G contain proofs of further
technical results stated in the main body of the paper. In Appendices H–K, we summarize concepts and
basic results from (geometric) measure theory, the theory of set-valued functions, sequences of functions
in several variables, and real analytic mappings, all needed throughout the paper. The reader not familiar
with these results is advised to consult the corresponding appendices before studying the proofs of our
main results. These appendices also contain new results, which are highly specific and would disrupt the
flow of the paper if presented in the main body.
Notation. We use capital boldface roman letters A, B, . . . to denote deterministic matrices and lowercase boldface roman letters a, b, . . . to designate deterministic vectors. Random matrices and vectors are
set in sans-serif font, e.g., A and x. The m × m identity matrix is denoted by Im . We write rank(A) and
ker(A) for the rank and the kernel of A, respectively. For the matrix A, spark(A) is the smallest number
k such that there exists a set of k column vectors of A that are linearly dependent. The superscript T
√
stands for transposition. The i-th unit vector is denoted by ei . For a vector x ∈ Rm , kxk2 = xT x is its
Euclidean norm and kxk0 denotes the number of nonzero entries of x. For the set A, we write card(A)
for its cardinality, A for its closure, 2A for its power set, and
1A for the indicator function on A. With
A ⊆ Rm and B ⊆ Rn , we let A × B = {(a, b) : a ∈ A, b ∈ B} and A ⊗ B = {a ⊗ b : a ∈ A, b ∈ B},
where ⊗ denotes the Kronecker product. For A, B ⊆ Rm , we write A ( B to express that A ⊆ B
March 20, 2018
DRAFT
5
with A 6= B and let A
B = {a − b : a, b ∈ B}. For the Euclidean space (Rk , k · k2 ), we designate
the open ball of radius ρ centered at u ∈ Rk by Bk (u, ρ), and use V (k, ρ) to refer to its volume. We
write S (X ) for a general σ -algebra on X , B(X ) for the Borel σ -algebra on a topological space X , and
L (Rm ) for the Lebesgue σ -algebra on Rm . The product σ -algebra of S (X ) and S (Y) is denoted by
S (X ) ⊗ S (Y). For measures µ and ν on the same measurable space, we denote absolute continuity
of µ with respect to ν by µ ν . We write µ × ν for the product measure of µ and ν . The Lebesgue
measure on Rk and Rk×l is designated as λk and λk×l , respectively. The distribution of a random vector
x is denoted by µx . If f : Rk → Rl is differentiable, we write Df (v) ∈ Rl×k for its differential at v ∈ Rk
p
and define the min(k, l)-dimensional Jacobian Jf (v) at v ∈ Rk by Jf (v) = det(Df (v)(Df (v))T )
p
if l < k and by Jf (v) = det((Df (v))T Df (v)) if l ≥ k . For an open set U ⊆ Rk , a differentiable
mapping f : U → Rl , where l ≥ k , is called an immersion if Jf (v) > 0 for all v ∈ U . A one-to-one
immersion is referred to as an embedding. For a mapping f , we write f ≡ 0 if it is identically zero
and f 6≡ 0 otherwise. For f : U → V and g : V → W , the composition g ◦ f : U → W is defined as
(g ◦ f )(x) = g(f (x)) for all x ∈ U . For f : U → V and A ⊆ U , f |A denotes the restriction of f to A.
For f : U → V and B ⊆ V , we set f −1 (B) = {x ∈ U : f (x) ∈ B}.
II. ACHIEVABILITY
In classical compressed sensing theory [3]–[6] one typically deals with the recovery of s-sparse vectors
x ∈ Rm , i.e., vectors x that are supported on a finite union of s-dimensional linear subspaces of Rm . The
purpose of this paper is the development of a comprehensive theory of signal recovery in the sense of
allowing arbitrary support sets U , which are not necessarily unions of (a finite number of) linear subspaces
of Rm . Formalizing this idea requires a suitable dimension measure for general nonempty sets. There is a
rich variety of dimension measures available in the literature [31]–[33]. Our choice will be guided by the
requirement of information-theoretic operational significance. Specifically, the dimension measure should
allow the formulation of nonasymptotic, i.e., fixed-m, achievability results with zero error probability.
Modified Minkowski dimension will turn out to meet these requirements.
We first recall the definitions of Minkowski dimension and modified Minkowski dimension, compare
the two concepts, and state the basic properties of modified Minkowski dimension needed in the remainder
of the paper.
Definition II.1. (Minkowski dimension3 ) [32, Section 3.1] For U ⊆ Rm nonempty, the lower and upper
3
Minkowski dimension is sometimes also referred to as box-counting dimension, which is the origin of the subscript B in
the notation dimB (·) used henceforth.
March 20, 2018
DRAFT
6
Minkowski dimension of U are defined as
dimB (U) = lim inf
log NU (ρ)
log ρ1
(1)
dimB (U) = lim sup
log NU (ρ)
,
log ρ1
(2)
ρ→0
and
ρ→0
respectively, where
n
o
[
NU (ρ) = min k ∈ N : U ⊆
Bm (ui , ρ), ui ∈ Rm
(3)
i∈{1,...,k}
is the covering number of U for radius ρ. If dimB (U) = dimB (U), this common value, denoted by
dimB (U), is the Minkowski dimension of U .
Definition II.2. (Modified Minkowski dimension) [32, Section 3.3] For U ⊆ Rm nonempty, the lower
and upper modified Minkowski dimension of U are defined as
(
dimMB (U) = inf sup dimB (Ui ) : U ⊆
i∈N
)
[
i∈N
Ui
(4)
and
)
(
dimMB (U) = inf sup dimB (Ui ) : U ⊆
i∈N
[
i∈N
Ui ,
(5)
respectively, where in both cases the infimum is over all possible coverings {Ui }i∈N of U by nonempty
compact sets Ui . If dimMB (U) = dimMB (U), this common value, denoted by dimMB (U), is the modified
Minkowski dimension of U .
The main properties of modified Minkowski dimension are summarized in Lemma H.12. In particular,
dimMB (·) ≤ dimB (·) and dimMB (·) ≤ dimB (·). Upper modified Minkowski dimension has the advantage
of being countably stable, a key property we will use frequently. In contrast, upper Minkowski dimension
is only finitely stable [32, Section 3.2, Property (iii)]. For example, all countable subsets of Rm have
modified Minkowski dimension zero (as a single point in Rm has Minkowski dimension zero); the
situation is different for Minkowski dimension as it does not respect countable unions:
Example II.1. [32, Example 3.5] Let F = {0, 1/2, 1/3, . . . }. Then, dimMB (F) = 0 < dimB (F) = 1/2.
Minkowski dimension and modified Minkowski dimension also behave differently for unbounded sets.
Specifically, by monotonicity of (upper) modified Minkowski dimension, dimMB (A) ≤ dimMB (A) ≤
dimMB (Rm ) = m for all A ⊆ Rm , in particular also for unbounded sets, whereas dimB (A) =
March 20, 2018
DRAFT
7
dimB (A) = ∞ for all unbounded sets A as a consequence of NA (ρ) = ∞ for all ρ ∈ (0, ∞). Working
with lower modified Minkowski dimension will allow us to consider arbitrary random vectors, regardless
of whether they admit bounded support sets or not.
The following example shows that modified Minkowski dimension agrees with the sparsity notion used
in classical compressed sensing theory.
Example II.2. Let T1 , . . . , Tk be linear subspaces of Rm with their Euclidean dimensions dim(Ti )
satisfying
max dim(Ti ) = s
(6)
i∈{1,...,k}
and consider the union
U=
k
[
i=1
Ti .
(7)
As every linear subspace is a smooth submanifold of Rm , it follows from Properties i), ii), and v) of
Lemma H.12 that dimMB (U) = s. In the union of subspaces model prevalent in compressed sensing
theory [3]–[6], the subspaces Ti correspond to different sparsity patterns, each of cardinality equal to the
sparsity level s.
The aim of the present paper is to develop a theory of lossless analog compression for arbitrary random
vectors x ∈ Rm . An obvious choice for the stochastic equivalent of the sparsity level s is the stochastic
sparsity level S(x) defined as
(
"
S(x) = min s : ∃T1 , . . . , Tk with P x ∈
k
[
i=1
#
Ti = 1 and
)
max dim(Ti ) = s ,
i∈{1,...,k}
(8)
where every Ti is a linear subspace of Rm . This definition is, however, specific to the union of linear
subspaces structure. The theory we develop here requires a more general notion of description complexity,
which we define in terms of lower modified Minkowski dimension according to
K(x) = inf{dimMB (U) : U ⊆ Rm , P[x ∈ U] = 1}.
(9)
Sets satisfying P[x ∈ U] = 1 are hereafter referred to as support sets of x. While the definition of S(x)
involves minimization of Euclidean dimensions of linear subspaces, K(x) is defined by minimizing the
lower modified Minkowski dimensions of general support sets. The definitions (8) and (9) imply directly
that K(x) ≤ S(x) for all random vectors x ∈ Rm (cf. Example II.2). We will see in Section III that this
inequality can actually be strict.
Next, we show that application of a locally Lipschitz map can not increase the random vector’s
description complexity. This result will allow us to construct random vectors with low description
March 20, 2018
DRAFT
8
complexity out of existing ones simply by applying locally Lipschitz mappings. The formal statement is
as follows.
Lemma II.1. Let x ∈ Rk and f : Rk → Rm be locally Lipschitz. Then, K(f (x)) ≤ K(x).
Proof.
K(f (x)) = inf{dimMB (V) : V ⊆ Rm , P[f (x) ∈ V] = 1}
(10)
= inf{dimMB (f (U)) : U ⊆ Rk , P[x ∈ U] = 1}
(11)
≤ inf{dimMB (U) : U ⊆ Rk , P[x ∈ U] = 1}
(12)
= K(x),
(13)
where (12) follows from Property iv) of Lemma H.12.
When the mapping f is locally bi-Lipschitz, the description complexity remains unchanged:
Corollary II.1. Let x ∈ Rm and f : Rm → Rm be locally bi-Lipschitz, i.e., f is invertible and both f
and f −1 are locally Lipschitz. Then, K(x) = K(f (x)).
Proof. K(x) = K((f −1 ◦ f )(x)) ≤ K(f (x)) ≤ K(x), where we applied Lemma II.1 twice.
As a consequence of Corollary II.1, the description complexity K(x) is invariant under a basis change.
Our main achievability result can now be formulated as follows.
Theorem II.1. (Achievability) For x ∈ Rm , n > K(x) is sufficient for the existence of a Borel measurable
mapping g : Rn×m × Rn → Rm , referred to as (measurable) decoder, satisfying
P[g(A, Ax) 6= x] = 0
for λn×m -a.a. A ∈ Rn×m .
(14)
Proof. See Section V.
Theorem II.1 generalizes the achievability result for linear encoders in [16] in the sense of being
nonasymptotic (i.e., it applies for finite m) and guaranteeing zero error probability.
The central conceptual element in the proof of Theorem II.1 is the following probabilistic null-space
property for arbitrary (possibly unbounded) nonempty sets, first reported in [18] for bounded sets and
expressed in terms of lower Minkowski dimension: If the lower modified Minkowski dimension of a
nonempty set U is smaller than n, then, for λn×m -a.a. measurement matrices A ∈ Rn×m , the set U
intersects the (m − n)-dimensional kernel of A at most trivially. What is remarkable here is that the
March 20, 2018
DRAFT
9
notions of Euclidean dimension (for the kernel of the mapping induced by A) and of lower modified
Minkowski dimension (for U ) are compatible. The formal statement is as follows.
Proposition II.1. Let U ⊆ Rm be nonempty with dimMB (U) < n. Then,
for λn×m -a.a. A ∈ Rn×m .
ker(A) ∩ (U \{0}) = ∅
(15)
Proof. By definition of lower modified Minkowski dimension, there exists a covering {Ui }i∈N of U by
nonempty compact sets Ui with dimB (Ui ) < n for all i ∈ N. The countable subadditivity of Lebesgue
measure now implies that
X
λn×m A ∈ Rn×m : ker(A) ∩ (U \{0}) 6= ∅ ≤
λn×m A ∈ Rn×m : ker(A) ∩ (Ui \{0}) 6= ∅ .
i∈N
(16)
The proof is concluded by noting that [18, Proposition 1] with dimB (Ui ) < n for all i ∈ N implies that
every term in the sum on the right-hand side of (16) equals zero.
We close this section by elucidating the level of generality of our theory through particularization of the
achievability result Theorem II.1 to random vectors supported on attractor sets of systems of contractions
as defined below. Such sets include the Cantor sets, Sierpinski gaskets, the modified Koch curves, and
many other fractals. For an excellent in-depth treatment of attractor sets of systems of contractions, the
interested reader is referred to [32, Section 9]. The formal definition is as follows. Let A ⊆ Rm be
closed. For i = 1, . . . , k , consider si : A → A and ci ∈ (0, 1) such that
ksi (u) − si (v)k2 ≤ ci ku − vk2
for all u, v ∈ A.
(17)
Such mappings are called contractions. By [32, Theorem 9.1], there exists a unique compact set K ⊆ A,
referred to as attractor set, such that
K=
k
[
si (K).
(18)
i=1
Thanks to [32, Proposition 9.6], dimB (K) ≤ d, where d > 0 is the unique solution of
k
X
cdi = 1.
(19)
i=1
If, in addition, K satisfies the open set condition [32, Equation (9.11)], then dimB (K) = d by [32,
Theorem 9.3]. Cantor sets, Sierpinski gaskets, and the modified Koch curves all meet the open set
condition [32, Section 9]. As dimMB (K) ≤ dimB (K) by Property iii) of Lemma H.12, every x ∈ Rm
such that P[x ∈ K] = 1 has description complexity K(x) ≤ d.
We finally note that for self-similar distributions on attractor sets K satisfying the open set condition
[32, Equation (9.11)], an achievability result in terms of information dimension was reported in [16].
March 20, 2018
DRAFT
10
III. R ECTIFIABLE S ETS AND R ECTIFIABLE R ANDOM V ECTORS
The signal models employed in classical compressed sensing [3], [4], model-based compressed sensing
[21], and block-sparsity [25]–[27] all fall under the rubric of unions of linear subspaces. More general
prevalent signal models in sparse signal recovery theory include finite unions of smooth manifolds, either
in explicit form as in [24] or implicitly in the context of low-rank matrix recovery [28]–[30]. All these
models are subsumed by the countable unions of C 1 -manifolds structure, formalized next using the notion
of rectifiable sets. We start with the definition of rectifiable sets.
Definition III.1. (Rectifiable sets) [34, Definition 3.2.14] For s ∈ N, a nonempty set U ⊆ Rm is
i) s-rectifiable if there exist a compact set A ⊆ Rs and a Lipschitz mapping ϕ : A → Rm such that
U = ϕ(A),
ii) countably s-rectifiable if it is the countable union of s-rectifiable sets,
iii) countably (H s , s)-rectifiable if it is H s -measurable and there exists a countably s-rectifiable set V
such that H s (U \V) = 0, where H s denotes the s-dimensional Hausdorff measure (cf. Definition
H.7),
iv) (H s , s)-rectifiable if it is countably (H s , s)-rectifiable and H s (U) < ∞.
Our definitions of s-rectifiability and countably s-rectifiability differ from those of [34, Definition
3.2.14] as we require the s-rectifiable set to be the Lipschitz image of a compact rather than a bounded
set. We note, however, that by [35, Theorem 7.2] our definitions of (H s , s)-rectifiability and countably
(H s , s)-rectifiability are nonetheless equivalent to those of [34, Definition 3.2.14]. The more restrictive
definitions i) and ii) above have the advantage of s-rectifiable sets and countably s-rectifiable sets
being guaranteed to be Borel. Therefore, s-rectifiable sets and countably s-rectifiable sets are also H s measurable, which leads to the following chain of implications:
U is s-rectifiable ⇒ U is countably s-rectifiable ⇒ U is countably (H s , s)-rectifiable.
The following result collects properties of (countably) s-rectifiable sets for later use.
Lemma III.1.
i) If U ⊆ Rm is s-rectifiable, then it is t-rectifiable for all t ∈ N with t > s.
ii) For locally Lipschitz ϕi , i ∈ N, the set
V=
[
ϕi (Rs )
(20)
i∈N
is countably s-rectifiable.
March 20, 2018
DRAFT
11
iii) If U ⊆ Rm is countably s-rectifiable and V ⊆ Rn is countably t-rectifiable, then
W = {(u v)T : u ∈ U, v ∈ V} ⊆ Rm+n
(21)
is countably (s + t)-rectifiable.
iv) Every s-dimensional C 1 -submanifold [36, Definition 5.3.1] of Rm is countably s-rectifiable. In
particular, every s-dimensional affine subspace of Rm is countably s-rectifiable.
v) For Ai countably si -rectifiable and si ≤ s, i ∈ N, the set
[
A=
Ai
(22)
i∈N
is countably s-rectifiable.
Proof. See Appendix A.
Countable unions of s-dimensional C 1 -submanifolds of Rm are countably s-rectifiable by Properties
iv) and v) of Lemma III.1. For countably (H s , s)-rectifiable sets we even get an equivalence result,
namely:
Theorem III.1. [34, Theorem 3.2.29] A set U ⊆ Rm is countably (H s , s)-rectifiable if and only if
H s -a.a. of U is contained in the countable union of s-dimensional C 1 -submanifolds of Rm .
We now show that the upper modified Minkowski dimension of a countably s-rectifiable set is upperbounded by s. This will allow us to conclude that, for a random vector x admitting a countably s-rectifiable
support set, K(x) ≤ s. The formal statement is as follows.
Lemma III.2. If U ⊆ Rm is countably s-rectifiable, then dimMB (U) ≤ s.
Proof. Suppose that U ⊆ Rm is countably s-rectifiable. Then, Definition III.1 implies that there exist
nonempty compact sets Ai ⊆ Rs and Lipschitz mappings ϕi : Ai → Rm , i ∈ N, such that
[
U=
ϕi (Ai ).
(23)
i∈N
Thus,
dimMB (U) = sup dimMB (ϕi (Ai ))
(24)
i∈N
≤ sup dimMB (Ai )
(25)
≤ sup dimMB (Rs )
(26)
= s,
(27)
i∈N
i∈N
March 20, 2018
DRAFT
12
where the individual steps follow from Properties of Lemma H.12, namely, (24) is by Property v), (25)
by Property iv), (26) by Property ii), and (27) by Property i).
We next investigate the effect of locally Lipschitz mappings on (countably) s-rectifiable and countably
(H s , s)-rectifiable sets.
Lemma III.3. Let U ⊆ Rm and consider a locally Lipschitz f : Rm → Rn . If U is
i) s-rectifiable, then f (U) is s-rectifiable,
ii) countably s-rectifiable, then f (U) is countably s-rectifiable,
iii) countably (H s , s)-rectifiable and Borel, then f (U) = A ∪ B , where A is a countably (H s , s)rectifiable Borel set and H s (B) = 0.
Proof. See Appendix B.
A slightly weaker version of this statement valid for Lipschitz mappings was derived previously in
[19, Lemma 4].
We are now ready to define rectifiable random vectors.
Definition III.2. (Rectifiable random vectors) [19, Definition 11] A random vector x ∈ Rm is s-rectifiable
if there exists a countably (H s , s)-rectifiable set U ⊆ Rm such that µx H s |U . The corresponding
value s is the rectifiability parameter.
It turns out that an s-rectifiable random vector x always admits a countably s-rectifiable support set
and, therefore, has description complexity K(x) ≤ s by Lemma III.2. The formal statement is as follows.
Lemma III.4. Every s-rectifiable random vector x ∈ Rm admits a countably s-rectifiable support set. In
particular, every s-rectifiable random vector x has description complexity K(x) ≤ s.
Proof. Suppose that x is s-rectifiable. Then, there exists a countably (H s , s)-rectifiable set U ⊆ Rm
such that µx H s |U . As U is countably (H s , s)-rectifiable, by Definition III.1 there exists a countably
s-rectifiable set V ⊆ Rm such that H s (U \V) = 0. Set W = (U \V) ∪ V and note that U ⊆ W implies
H s |U H s |W by monotonicity of H s . Moreover, it follows from the definition of W , the countable
additivity of H s , and H s (U \V) = 0 that H s |W = H s |V . Thus, H s |U H s |V , and µx H s |U
implies µx H s |V . Therefore, as H s |V (Rm \V) = 0, we can conclude that P[x ∈ Rm \V] = 0, which
is equivalent to P[x ∈ V] = 1, that is, the countably s-rectifiable set V is a support set of x. The proof is
now concluded by noting that K(x) ≤ dimMB (V) ≤ s, where the latter inequality follows from Lemma
III.2.
March 20, 2018
DRAFT
13
In light of Theorem III.1, an s-rectifiable random vector x ∈ Rm is supported on a countable union
of s-dimensional C 1 -submanifolds of Rm . Absolute continuity of µx with respect to the s-dimensional
Hausdorff measure is a regularity condition guaranteeing that x can not have positive probability measure
on sets of Hausdorff dimension t < s (cf. Property i) of Lemma H.13). This regularity condition together
with the sharp transition behavior of Hausdorff measures (see Figure 4 in Appendix H) implies uniqueness
of the rectifiability parameter. The corresponding formal statement is as follows.
Lemma III.5. If x ∈ Rm is s-rectifiable and t-rectifiable, then s = t.
Proof. See Appendix C.
We are now ready to particularize our achievability result to s-rectifiable random vectors.
Corollary III.1. For s-rectifiable x ∈ Rm , n > s is sufficient for the existence of a Borel measurable
mapping g : Rn×m × Rn → Rm satisfying
P[g(A, Ax) 6= x] = 0
for λn×m -a.a. A ∈ Rn×m .
(28)
Proof. Follows immediately from the general achievability result, Theorem II.1, and Lemma III.4.
Again, this result is nonasymptotic (i.e., it applies for finite m) and guarantees zero error probability.
Next, we present three examples of s-rectifiable random vectors aimed at illustrating the relationship
between the rectifiability parameter and the stochastic sparsity level defined in (8). Specifically, in the
first example the random vector’s rectifiability parameter will be seen to agree with its stochastic sparsity
level. The second example constructs an (r + t − 1)-rectifiable random vector of stochastic sparsity
level S(x) = rt for general r, t. In this case, the stochastic sparsity level rt can be much larger than
the rectifiability parameter r + t − 1, and hence Corollary III.1 implies that this random vector can be
recovered with zero error probability from a number of linear measurements that is much smaller than
its stochastic sparsity level. The third example constructs a random vector that is uniformly distributed
on a manifold, namely, the unit circle. In this case the random vector’s rectifiability parameter equals
the dimension of the manifold, whereas its stochastic sparsity level equals the dimension of the ambient
space, i.e., the random vector is not sparse at all.
Example III.1. Suppose that x = (ek1 . . . eks )z ∈ Rm , where z ∈ Rs with µz λs and k =
(k1 . . . ks )T ∈ {1, . . . , m}s satisfies k1 < · · · < ks . We first show that S(x) = s. To this end, let
U = {x ∈ Rm : kxk0 ≤ s}.
March 20, 2018
(29)
DRAFT
14
Since P[x ∈ U] = 1 by construction, it follows that S(x) ≤ s. To establish that S(x) ≥ s, and hence
S(x) = s, towards a contradiction, assume that there exists a linear subspace T ⊆ Rm of dimension
d < s such that P[x ∈ T ] > 0. Since
0 < µx (T )
(30)
= P[(ek1 . . . eks )z ∈ T ]
X
=
P[(ei1 . . . eis )z ∈ T ] P[k = (i1 . . . is )T ],
(31)
(32)
1≤i1 <···<is ≤m
there must exist a set of indices {i1 , . . . , is } ⊆ {1, . . . , m} with i1 < · · · < is such that
P[Ez ∈ T ] > 0,
(33)
where E = (ei1 . . . eis ). Next, consider the linear subspace
Te = {z ∈ Rs : Ez ∈ T } ⊆ Rs ,
(34)
which, by (33), satisfies P[z ∈ Te ] > 0. As E is obtained by removing column vectors from the identity
matrix, it follows that dim(Te ) = dim(T ) = d. Since d < s by assumption, there must exist a nonzero
T
e
e
vector b0 ∈ Rs such that bT
0 z = 0 for all z ∈ T . It follows that P[b0 z = 0] ≥ P[z ∈ T ] > 0, which
stands in contradiction to µz λs because λs ({z : bT
0 z = 0}) = 0. Thus, we indeed have S(x) = s. It
follows from Properties iv) and v) in Lemma III.1 that U in (29) is countably s-rectifiable and, therefore,
also countably (H s , s)-rectifiable. We will see in Example IV.3 that x is in fact s-analytic, which, by
Property ii) of Lemma IV.3, implies µx H s . Finally, by P[x ∈ U] = 1, we get µx H s |U , which,
thanks to countable (H s , s)-rectifiability of U establishes s-rectifiability of x.
Example III.2. Let x = a ⊗ b with a ∈ Rk and b ∈ Rl . Suppose that a = (ep1 . . . epr )u and b =
(eq1 . . . eqt )v, where u ∈ Rr and v ∈ Rt with µu × µv λr+t , and p = (p1 . . . pr )T ∈ {1, . . . , k}r
and q = (q1 . . . qt )T ∈ {1, . . . , l}t satisfy p1 < · · · < pr and q1 < · · · < qt , respectively. We first show
that S(x) = rt. Since P[kxk0 ≤ rt] = 1 by construction, it follows that S(x) ≤ rt. To establish that
S(x) ≥ rt, and hence S(x) = rt, towards a contradiction, assume that there exists a linear subspace
T ⊆ Rm of dimension d < rt such that P[x ∈ T ] > 0. Since
0 < µx (T )
(35)
= P[((ep1 . . . epr )u) ⊗ ((eq1 . . . eqt )v) ∈ T ]
(36)
= P[((ep1 . . . epr ) ⊗ (eq1 . . . eqt ))(u ⊗ v) ∈ T ]
X
=
P[((ei1 . . . eir ) ⊗ (ej1 . . . ejt ))(u ⊗ v) ∈ T ]
(37)
(38)
1≤i1 <···<ir ≤k
1≤j1 <···<jt ≤l
March 20, 2018
DRAFT
15
P[p = (i1 . . . ir )T , q = (j1 . . . jt )T ],
(39)
there must exist a set of indices {i1 , . . . , ir } ⊆ {1, . . . , k} with i1 < · · · < ir and a set of indices
{j1 , . . . , jt } ⊆ {1, . . . , l} with j1 < · · · < jt such that
P[(E1 ⊗ E2 )(u ⊗ v) ∈ T ] > 0,
(40)
where E1 = (ei1 . . . eir ) and E2 = (ej1 . . . ejt ). Next, consider the linear subspace
Te = {z ∈ Rrt : (E1 ⊗ E2 )z ∈ T } ⊆ Rrt ,
(41)
which, by (40), satisfies P[u ⊗ v ∈ Te ] > 0. As E1 ⊗ E2 is obtained by removing column vectors from
the identity matrix, it follows that dim(Te ) = dim(T ) = d. Since d < rt by assumption, there must exist
T
e
a nonzero vector b0 ∈ Rrt such that bT
0 z = 0 for all z ∈ T . It follows that P[b0 (u ⊗ v) = 0] ≥ P[u ⊗ v ∈
Te ] > 0. As µu × µv λr+t by assumption, we also have
n
o
(u
⊗
v)
=
0
> 0.
λr+t (uT v T )T : u ∈ Rr , v ∈ Rt , bT
0
(42)
We now view bT
0 (u ⊗ v) as a polynomial in the entries of u and v . Since a polynomial vanishes either
on a set of Lebesgue measure zero or is identically zero (cf. Corollary K.1 and Lemma K.5), it follows
that
bT
0 (u ⊗ v) = 0
for all u ∈ Rr and v ∈ Rt ,
(43)
which stands in contradiction to b0 6= 0. Thus, we indeed have S(x) = rt. We next construct a countably
(r + t − 1)-rectifiable support set U of x. To this end, we let
A = {a ∈ Rk : kak0 ≤ r}
(44)
B = {b ∈ Rl : kbk0 ≤ t}
(45)
and set U = A ⊗ B . Since A is a support set of a and B is a support set of b, U is a support set of
x = a ⊗ b. Note that U = (A\{0}) ⊗ B . For a ∈ A\{0}, let ā denote the first nonzero entry of a. We
can now write
a⊗b=
a
ā
⊗ (ā b)
for all a ∈ A\{0}, b ∈ B.
(46)
This allows us to decompose U according to U = Ã ⊗ B , where
à = {a ∈ A\{0} : kak0 ≤ r, ā = 1}.
March 20, 2018
(47)
DRAFT
16
Now, since à is a finite union of affine subspaces of dimensions r − 1, it is countably (r − 1)-rectifiable
by Properties iv) and v) in Lemma III.1. By the same token, B as a finite union of linear subspaces of
dimensions t is countably t-rectifiable. Therefore, the set
C = {(a b)T : a ∈ Ã, b ∈ B} ⊆ Rk+l
(48)
is countably (r + t − 1)-rectifiable thanks to Property iii) of Lemma III.1. Now, the multivariate mapping
σ : Rk+l → Rkl , (a b)T 7→ a ⊗ b is bilinear and as such locally Lipschitz. Moreover, since U = σ(C)
with C countably (r + t − 1)-rectifiable, it follows from Property ii) of Lemma III.3 that U is countably
(r + t − 1)-rectifiable and, therefore, also countably (H r+t−1 , r + t − 1)-rectifiable. We will see in
Example IV.4 that x is in fact (r + t − 1)-analytic, which, by Property ii) of Lemma IV.3, implies
µx H r+t−1 . With P[x ∈ U] = 1 this yields µx H r+t−1 |U and, in turn, thanks to countable
(H r+t−1 , r + t − 1)-rectifiability of U , establishes (r + t − 1)-rectifiability of x.
Example III.3. Let S 1 denote the unit circle in R2 , z ∈ R with µz λ1 , and g : R → S 1 , z 7→
(cos(z) sin(z))T . Set x = g(z), and note that this implies P[x ∈ S 1 ] = 1. We first establish that
S(x) = 2. Since P[x ∈ R2 ] = 1, it follows that S(x) ≤ 2. To establish that S(x) ≥ 2, and hence
S(x) = 2, towards a contradiction, assume that there exists a linear subspace T ⊆ R2 of dimension one
such that P[x ∈ T ] > 0. Set A = T ∩ S 1 , which consists of two antipodal points on S 1 (cf. Figure
2). Now, 0 < P[x ∈ T ] = P[x ∈ A] = P[z ∈ g −1 (A)], which constitutes a contradiction to µz λ1
because g −1 (A)—as a countable set—must have Lebesgue measure zero. Therefore, S(x) = 2. Finally,
x is 1-rectifiable by [19, Section III.D].
As s-rectifiable random vectors can not have positive probability measure on sets of Hausdorff dimension t < s, it is natural to ask whether taking n ≥ s linear measurements is necessary for zero error
recovery of s-rectifiable random vectors. Surprisingly, it turns out that this is not the case. This will be
demonstrated by first constructing a 2-rectifiable (and therefore also (H 2 , 2)-rectifiable) set G ⊆ R3 of
3
T
strictly positive 2-dimensional Hausdorff measure with the property that eT
3 : R → R, (x1 x2 x3 ) 7→ x3
is one-to-one on G . Then, we show that every 2-rectifiable random vector x satisfying µx H 2 |G can
be recovered with zero error probability from one linear measurement, specifically from y = eT
3 x. What
is more, all this is possible even though G contains the image of a Borel set in R2 of positive Lebesgue
measure under a C ∞ -embedding (see Figure 1 for an illustration).
The construction of our example is based on the following result.
Theorem III.2. There exist a compact set A ∈ B(R2 ) with λ2 (A) = 1/4 and a C ∞ -function κ : R2 → R
such that κ is one-to-one on A.
March 20, 2018
DRAFT
17
A ✓ Rs , L s (A) > 0
U ✓ Rm
h
h(A)
Figure 1. U contains the embedded image of a set A of positive Lebesgue measure.
Proof. See Section VI for the explicit construction of κ and A.
We now proceed to the construction of our example.
Example III.4. Let κ and A be as constructed in the proof of Theorem III.2 and consider the mapping
h : R2 → R3
(49)
z 7→ (z T κ(z))T .
(50)
We set G = h(A) and show the following:
i) h is a C ∞ -embedding;
1
ii) G is 2-rectifiable;
iii) 0 < H 2 (G) < ∞;
3
T
iv) eT
3 : R → R, (x1 x2 x3 ) 7→ x3 is one-to-one on G .
v) For every 2-rectifiable random vector x ∈ R3 with µx H 2 |G , there exists a Borel measurable
mapping g : R3 × R → R3 satisfying P g e3 , eT
3 x 6= x = 0.
It follows immediately that h is one-to-one. Thus, to establish Property i), it suffices to prove that h is
a C ∞ -immersion. Since κ is C ∞ , so is h. Furthermore,
q
Jh(z) = det((Dh(z))T Dh(z))
q
= det(I2 + a(z)a(z)T ) for all z ∈ R2 ,
(51)
(52)
where
a(z) =
∂κ(z)
∂z1 .
∂κ(z)
∂z2
Since a(z)a(z)T is positive semidefinite, [37, Corollary 7.7.4] implies Jh(z) ≥
(53)
p
det(I2 ) = 1 for all
z ∈ R2 , which establishes that h is an immersion and completes the proof of i).
March 20, 2018
DRAFT
18
To prove ii), note that h is C ∞ and as such locally Lipschitz. As A is compact, Lemma H.9 implies
that h|A is Lipschitz. The set G = h(A) is hence the Lipschitz image of a compact set in R2 and as
such 2-rectifiable.
To establish iii), we first note that
H 2 (G) = H 2 (h(A))
(54)
≤ L2 H 2 (A)
(55)
= L2 λ2 (A)
(56)
< ∞,
(57)
where the individual steps follow from Properties of Lemma H.13, namely, (55) from Property ii) with
L denoting the Lipschitz constant of h|A , and (56) from Property iii).
To establish H 2 (G) > 0, consider the linear mapping
π : R3 → R2
(58)
(x1 x2 x3 )T 7→ (x1 x2 )T .
(59)
Clearly, π is Lipschitz with Lipschitz constant equal to 1. Therefore,
H 2 (G) ≥ H 2 (π(G))
(60)
= H 2 (A)
(61)
= λ2 (A)
(62)
1
= ,
4
(63)
where (60) follows from Property ii) of Lemma H.13, (61) from π(G) = A, and (62) is by Property iii)
of Lemma H.13.
To show iv), let x1 , x2 ∈ G with x1 6= x2 . Thus, x1 = (z1T κ(z1 ))T and x2 = (z2T κ(z2 ))T with
z1 , z2 ∈ A and z1 6= z2 . As κ is one-to-one on A, we conclude that eT
3 is one-to-one on G .
It remains to establish v). Since µx H 2 |G by assumption, it follows that P[x ∈ G] = 1. We show
that there exists a Borel measurable mapping g : R3 × R → R3 such that
∈ v ∈ G : aT v = y
if ∃v ∈ G : aT v = y
g(a, y)
= e
else,
March 20, 2018
(64)
DRAFT
19
where e is an arbitrary vector not in G , used to declare a decoding error. Since P[x ∈ G] = 1 and eT
3
T
is one-to-one on G , this then implies P g e3 , e3 x 6= x = 0. To construct g in (64), consider first the
mapping
f : R3 × R × R3 → R
(a, y, u) 7→ |y − aT u|.
(65)
(66)
Since f is continuous, Lemma I.3 implies that f is a normal integrand (see Definition I.4) with respect
to B(R3 × R). Let
T = {(a, y) ∈ R3 × R : ∃u ∈ G with f (a, y, u) ≤ 0}
= {(a, y) ∈ R3 × R : ∃u ∈ G with aT u = y}.
(67)
(68)
Note that G as the Lipschitz image of the compact set A is compact (cf. Lemma H.10). It now follows
from Properties ii) and iii) of Lemma I.5 (with T = R3 × R, α = 0, K = G , and f as in (65)–(66),
which is a normal integrand with respect to B(R3 × R)) that i) T ∈ B(R3 × R) and ii) there exists a
Borel measurable mapping
p : T → R3
a, y 7→ p a, y ∈ u ∈ G : aT u = y .
(69)
(70)
This mapping can then be extended to a mapping g : R3 × R → R3 by setting
g|T = p
g|(R3 ×R)\T = e.
(71)
(72)
Finally, g is Borel measurable thanks to Lemma H.6 as p is Borel measurable and T ∈ B(R3 × R).
IV. S TRONG C ONVERSE
Example III.4 in the previous section demonstrates that n ≥ s is not necessary for zero error recovery
of s-rectifiable random vectors in general. In this section, we introduce the class of s-analytic random
vectors x, which will be shown to allow for a strong converse in the sense of n ≥ s being necessary for
recovery of x with probability of error smaller than one. The adjective “strong” refers to the fact that
n < s linear measurements are insufficient even if we allow a recovery error probability arbitrarily close
to one. We prove that an s-analytic random vector is s-rectifiable if and only if it admits a support set
U that is “not too rich” (in terms of σ -finiteness of H s |U ), show that the s-rectifiable random vectors
considered in Examples III.1–III.3 are all s-analytic, and discuss examples of s-analytic random vectors
March 20, 2018
DRAFT
20
that fail to be s-rectifiable. Random vectors that are both s-analytic and s-rectifiable can be recovered
with zero error probability from n > s linear measurements, and n ≥ s linear measurements are necessary
for recovery with error probability smaller than one. The border case n = s remains open.
We now make our way towards developing the strong converse and the formal definition of s-analyticity.
The following auxiliary result will turn out useful.
Lemma IV.1. For x ∈ Rm and A ∈ Rn×m , consider the following statements:
i) There exists a Borel measurable mapping g : Rn×m × Rn → Rm satisfying P[g(A, Ax) 6= x] < 1.
ii) There exists a U ∈ B(Rm ) with P[x ∈ U] > 0 such that A is one-to-one on U .
Then, i) implies ii).
Proof. See Appendix D.
We first establish a strong converse for the class of random vectors considered in Example III.1. This
will guide us to the crucial defining property of s-analytic random vectors.
Lemma IV.2. Let x = (ek1 . . . eks )z ∈ Rm , where z ∈ Rs with µz λs and k = (k1 . . . ks )T ∈
{1, . . . , m}s satisfies k1 < · · · < ks . If there exist a measurement matrix A ∈ Rn×m and a Borel
measurable mapping g : Rn×m × Rn → Rm such that P[g(A, Ax) 6= x] < 1, then n ≥ s.
Proof. Towards a contradiction, suppose that there exist a measurement matrix A ∈ Rn×m and a Borel
measurable mapping g : Rn×m × Rn → Rm so that P[g(A, Ax) 6= x] < 1 for n < s. By Lemma IV.1,
there then must exist a U ∈ B(Rm ) with P[x ∈ U] > 0 such that A is one-to-one on U . Since
P[x ∈ U] = P[(ek1 . . . eks )z ∈ U]
X
=
P[(ei1 . . . eis )z ∈ U] P[k = (i1 . . . is )T ],
(73)
(74)
1≤i1 <···<is ≤m
there must exist a set of indices {i1 , . . . , is } ⊆ {1, . . . , m} with i1 < · · · < is such that the rank-
s matrix H := (ei1 . . . eis ) satisfies P[Hz ∈ U] > 0. Setting A = {z ∈ Rs : Hz ∈ U } yields
µz (A) = P[Hz ∈ U] > 0. Furthermore, A as the inverse image of the Borel set U under a linear
mapping is Borel. Finally, since µz λs by assumption, we conclude that λs (A) > 0. Summarizing,
there exist a set A ∈ B(Rs ) with λs (A) > 0 and a matrix H ∈ Rm×s such that U contains the one-toone image of A under H . Since A is one-to-one on U and H is one-to-one on Rs , it follows that AH
is one-to-one on A, i.e.,
ker(AH) ∩ (A
March 20, 2018
A) = {0}.
(75)
DRAFT
21
x2
Th
S1
x1
Figure 2. For every vector h ⊆ R2 \{0}, the linear subspace Th := {hz : z ∈ R} intersects the unit circle S1 in the two
antipodal points ±h/khk2 .
Finally, since λs (A) > 0, the Steinhaus Theorem [38] implies the existence of an r > 0 such that
Bs (0, r) ⊆ A
A ⊆ Rs . Since dim ker(AH) ≥ s − n > 0, we conclude that the linear subspace
ker(AH) must have a nontrivial intersection with A
A, which stands in contradiction to (75) and
thereby finishes the proof.
The strong converse just derived hinges critically on the specific structure of the s-rectifiable random
vector x considered. Concretely, we used the fact that, for every U ∈ B(Rm ) with P[x ∈ U] > 0, there
exist a set A ∈ B(Rs ) with λs (A) > 0 and a matrix H ∈ Rm×s such that U contains the one-to-one
image of A under H . The following example demonstrates, however, that this property is too strong for
our purposes as it fails to hold for random vectors on general manifolds like, e.g., the unit circle:
Example IV.1. Let S 1 ⊆ R2 denote the unit circle and consider x ∈ R2 supported on S 1 , i.e., P[x ∈
S 1 ] = 1. Towards a contradiction, suppose that there exist a set A ∈ B(R) with λ1 (A) > 0 and a vector
h ∈ R2 such that {hz : z ∈ A} ⊆ S 1 and h is one-to-one on A. Since h is one-to-one on A and
λ1 (A) > 0, it follows that h 6= 0. Noting that {hz : z ∈ A} ⊆ {h/khk2 , −h/khk2 } (cf. Figure 2), A
necessarily satisfies A ⊆ {1/khk2 , −1/khk2 }. Thus, λ1 (A) = 0, which is a contradiction to λ1 (A) > 0.
The reason for this failure is that every h ∈ R2 maps into a 1-dimensional linear subspace in R2 ,
and 1-dimensional linear subspaces in R2 intersect the unit circle in two antipodal points only. To map
a set A ∈ B(R) to a set in R2 that is not restricted to be a subset of a 1-dimensional linear subspace,
we have to employ a nonlinear mapping. But this puts us into the same dilemma as in Example III.4,
March 20, 2018
DRAFT
22
where we demonstrated that even the requirement of every U ∈ B(Rm ) with P[x ∈ U] > 0 containing
the embedded image—under a C ∞ -mapping—of a set A ∈ B(Rs ) of positive Lebesgue measure is not
sufficient to obtain a strong converse for general x. We therefore need to impose additional constraints
on the mapping. It turns out that requiring real analyticity is enough. Examples of real analytic mappings
include, e.g., multivariate polynomials, the exponential function, or trigonometric mappings. This finally
leads us to the new concept of s-analytic measures and s-analytic random vectors.
Definition IV.1. (Analytic measures) A Borel measure µ on Rm is s-analytic, with s ∈ {1, . . . , m}, if,
for each U ∈ B(Rm ) with µ(U) > 0, there exist a set A ∈ B(Rs ) of positive Lebesgue measure and a
real analytic mapping h : Rs → Rm of s-dimensional Jacobian Jh 6≡ 0 such that h(A) ⊆ U .
Note that the only requirement on the real analytic mappings in Definition IV.1 is that their sdimensional Jacobians do not vanish identically. Since the s-dimensional Jacobian of a real analytic
mapping is a real analytic function, it vanishes either identically or on a set of Lebesgue measure zero
(cf. Lemma K.7). By Lemma K.8, this guarantees that, for an analytic measure µ, every U ∈ B(Rm )
with µ(U) > 0 contains the real analytic embedding of a set A ∈ B(Rs ) of positive Lebesgue measure.
We have the following properties of s-analytic measures.
Lemma IV.3. If µ is an s-analytic measure on Rm , then the following holds:
i) µ is t-analytic for all t ∈ {1, . . . , s − 1};
ii) µ H s ;
iii) there exists a set U ⊆ Rm such that µ = µ|U and H s |U is σ -finite if and only if there exists a
countably (H s , s)-rectifiable set W ⊆ Rm such that µ = µ|W .
Proof. See Appendix E.
We are now ready to define s-analytic random vectors.
Definition IV.2. (Analytic random vectors) A random vector x ∈ Rm is s-analytic if µx is s-analytic.
The corresponding value s is the analyticity parameter.
We have the following immediate consequence of Lemma IV.3.
Corollary IV.1. Let x be s-analytic. Then, x is s-rectifiable if and only if it admits a support set U such
that H s |U is σ -finite.
Proof. Follows from Properties ii) and iii) in Lemma IV.3 and Definition III.2.
March 20, 2018
DRAFT
23
By Corollary IV.1, an s-analytic random vector is s-rectifiable if and only if it admits a support set U
that is “not too rich” (in terms of σ -finiteness of H s |U ). As an example of an s-analytic random vector
that is not s-rectifiable, consider an (s+1)-analytic random vector x with s > 0. By Property i) in Lemma
IV.3, this x is also s-analytic, but it can not be s-rectifiable, as shown next. Towards a contradiction,
suppose that x is s-rectifiable. Then, by Lemma III.4, x has a countably s-rectifiable support set U ,
which by Property i) in Lemma III.1 is also countably (s + 1)-rectifiable. As, by assumption, x is (s + 1)analytic, Property ii) in Lemma IV.3 implies µx H s+1 . Thus, µx H s+1 |U with U countably
(s + 1)-rectifiable, and we conclude that x would also be (s + 1)-rectifiable, which contradicts uniqueness
of the rectifiability parameter, as guaranteed by Lemma III.5.
We just demonstrated that s-analytic random vectors can not be s-rectifiable if they are also (s + 1)analytic. The question now arises whether s-analytic random vectors that fail to be (s + 1)-analytic (and,
therefore, fail to be t-analytic for all t > s by Property i) in Lemma IV.3) are necessarily s-rectifiable.
The next example shows that this is not the case.
Example IV.2. Let C be the middle third Cantor set [32, p. xii] and consider U = {(c t)T : c ∈ C, t ∈
[0, 1]} ⊆ R2 . Since 0 < H ln 2/ ln 3 (C) < ∞ [32, Example 4.5], it follows that the random vector x with
distribution µx = π × (λ1 |[0,1] ), where π = H ln 2/ ln 3 |C /H ln 2/ ln 3 (C), is well defined. We now show
that
i) x is 1-analytic;
ii) x is not 2-analytic;
iii) x is not 1-rectifiable.
To establish i), consider B ∈ B(R2 ) with P[x ∈ B] > 0. Now,
0 < µx (B)
Z
= λ1 t ∈ [0, 1] : (c t)T ∈ B dπ(c)
ZC
≤ λ1 t ∈ R : (c t)T ∈ B dπ(c),
(76)
(77)
(78)
C
where in (77) we applied Corollary H.1 (with the finite measure spaces (R, B(R), π) and (R, B(R), λ1 |[0,1] )
and (78) is by monotonicity of Lebesgue measure. Thus, by Lemma H.2, there must exist a c0 ∈ C such
that A := t ∈ R : (c0 t)T ∈ B satisfies λ1 (A) > 0. Now, define the mapping h : R → R2 , t 7→ (c0 t)T
and note that this mapping is (trivially) real analytic with Jh ≡ 1. Moreover, h(A) ⊆ B by construction,
and A is Borel measurable as the inverse image of the Borel set B under the real analytic and, therefore,
continuous mapping h. Thus, x is 1-analytic.
March 20, 2018
DRAFT
24
We next show that x is not 2-analytic. Towards a contradiction, suppose that x is 2-analytic. Since
µx (U) = 1, by 2-analyticity of x, there must exist a set D ∈ B(R2 ) with λ2 (D) > 0 and a real-analytic
mapping g : R2 → R2 of 2-dimensional Jacobian Jg 6≡ 0 such that g(D) ⊆ U . By Property ii) in Lemma
K.8, we can assume, without loss of generality (w.l.o.g.), that g|D is an embedding. It follows that
Z
2
H (g(D)) =
Jg(z)dλ2 (z)
(79)
D
> 0,
(80)
where in (79) we applied the area formula Corollary H.3 upon noting that g|D is one-to-one as an
embedding and locally Lipschitz by real analyticity of g , and (80) is by Lemma H.2, λ2 (D) > 0, and
Jg(z) > 0 for all z ∈ D. Since g(D) ⊆ U and H 2 (g(D)) > 0, monotonicity of H 2 yields H 2 (U) > 0.
Upon noting that H 1+ln 2/ ln 3 (U) < ∞ [32, Example 4.3], this results in a contradiction to Property i)
in Lemma H.13.
Finally, to establish iii), towards a contradiction, suppose that x is 1-rectifiable. Then, Lemma III.4
implies that x admits a countably 1-rectifiable support set. As every countably 1-rectifiable set is the
countable union of 1-rectifiable sets, the union bound implies that there must exist a 1-rectifiable set V
with P[x ∈ V] > 0. By Definition III.1, there must therefore exist a compact set K ⊆ R and a Lipschitz
mapping f : K → R2 such that V = f (K). It follows that
0 < µx (V)
(81)
= µx (f (K))
Z
= λ1 t ∈ [0, 1] : (c t)T ∈ f (K) dπ(c),
ZC
= λ1 t ∈ [0, 1] : (c t)T ∈ f (Ac ) dπ(c),
(82)
(83)
(84)
C
where in (83) we applied Corollary H.1 (with the finite measure spaces (R, B(R), π) and (R, B(R), λ1 |[0,1] )
and in (84) we set, for every c ∈ C ,
Ac = f −1
(c t)T : t ∈ [0, 1]
⊆ K.
(85)
Note that the sets Ac ⊆ K are pairwise disjoint as inverse images of pairwise disjoint sets. Now, Lemma
H.2 together with (81)–(84) implies that there must exist a set F ⊆ C with π(F) > 0 such that
λ1
March 20, 2018
t ∈ [0, 1] : (c t)T ∈ f (Ac )
>0
for all c ∈ F.
(86)
DRAFT
25
Since π = H ln 2/ ln 3 |C /H ln 2/ ln 3 (C) and 0 < π(F) ≤ 1, the definition of Hausdorff dimension (cf.
Definition H.8) implies dimH (F) = ln 2/ ln 3. As every countable set has Hausdorff dimension zero [32,
p. 29], we conclude that F must be uncountable. Moreover,
λ1 (Ac ) = H 1 (Ac )
(87)
1 1
H (f (Ac ))
L
1
≥ H 1 t ∈ [0, 1] : (c t)T ∈ f (Ac )
L
1
= λ1 t ∈ [0, 1] : (c t)T ∈ f (Ac )
L
≥
>0
(88)
(89)
(90)
for all c ∈ F,
(91)
where (87) and (90) follow from Property iii) in Lemma H.13, (88) is by Property ii) in Lemma H.13
with L the Lipschitz constant of f , (89) is again by Property ii) in Lemma H.13 with the Lipschitz
2
T
constant of the projection eT
2 : R → R, (c t) 7→ t equal to one, and in (91) we used (86). As the sets
Ac are pairwise disjoint subsets of positive Lebesgue measure of the compact set K, it follows that
sup
X
E⊆F :|E|<∞ c∈E
λ1 (Ac ) ≤ λ1 (K) < ∞,
(92)
which, by Lemma H.14, contradicts the uncountability of F . Therefore, x can not be 1-rectifiable.
Our strong converse for analytic random vectors will be based on the following result.
Theorem IV.1. Let A ∈ B(Rs ) be of positive Lebesgue measure, h : Rs → Rm , with s ≤ m, real
analytic of s-dimensional Jacobian Jh 6≡ 0, and f : Rm → Rn real analytic. If f is one-to-one on h(A),
then n ≥ s.
Proof. See Section VII.
With the help of Theorem IV.1, we can now prove the strong converse for s-analytic random vectors.
Corollary IV.2. For x ∈ Rm s-analytic, n ≥ s is necessary for the existence of a measurement matrix
A ∈ Rn×m and a Borel measurable mapping g : Rn×m × Rn → Rm such that P[g(A, Ax) 6= x] < 1.
Proof. Suppose, to the contrary, that there exist a measurement matrix A ∈ Rn×m and a Borel measurable
mapping g : Rn×m × Rn → Rm satisfying P[g(A, Ax) 6= x] < 1 for n < s. Then, by Lemma IV.1, there
must exist a U ∈ B(Rm ) with P[x ∈ U] > 0 such that A is one-to-one on U . As P[x ∈ U] > 0, the
s-analyticity of µx implies the existence of a set A ∈ B(Rs ) of positive Lebesgue measure along with
a real analytic mapping h : Rs → Rm of s-dimensional Jacobian Jh 6≡ 0 such that h(A) ⊆ U . As A is
March 20, 2018
DRAFT
26
one-to-one on h(A) and linear mappings are trivially real-analytic, Theorem IV.1 implies that we must
have n ≥ s, which contradicts n < s.
We next show that the s-rectifiable random vectors considered in Examples III.1–III.3 are all s-analytic
with the analyticity parameter equal to the corresponding rectifiability parameter. We need the following
result, which states that real analytic immersions preserve analyticity in the following sense.
Lemma IV.4. If x ∈ Rm is s-analytic and f : Rm → Rk , with m ≤ k , is a real analytic immersion, then
f (x) is s-analytic.
Proof. See Appendix F.
Example IV.3. We show that x in Example III.1 is s-analytic. To this end, we consider an arbitrary
but fixed U ∈ B(Rm ) with µx (U) > 0 and establish the existence of a set A ∈ B(Rs ) of positive
Lebesgue measure and a real analytic mapping h : Rs → Rm of s-dimensional Jacobian Jh 6≡ 0 such
that h(A) ⊆ U . Since
0 < µx (U)
(93)
= P[(ek1 . . . eks )z ∈ U]
X
=
P[(ei1 . . . eis )z ∈ U] P[k = (i1 . . . is )T ],
(94)
(95)
1≤i1 <···<is ≤m
there must exist a set of indices {i1 , . . . , is } ⊆ {1, . . . , m} with i1 < · · · < is such that
P[u(z) ∈ U] > 0,
(96)
where u : Rs → Rm , z 7→ (ei1 . . . eis )z . As µz λs by assumption, z is s-analytic thanks to Lemma
IV.5 below. The mapping u is linear and, therefore, trivially real analytic. Furthermore,
r
Ju(z) = det (ei1 . . . eis )T (ei1 . . . eis )
=
p
=1
det Is
for all z ∈ Rs ,
(97)
(98)
(99)
where (97) follows from Du(z) = (ei1 . . . eis ) for all z ∈ Rs , which proves that u is an immersion. We
can therefore employ Lemma IV.4 and conclude that u(z) is s-analytic. Hence, Definition IV.2 together
with (96) implies that there must exist a set A ∈ B(Rs ) of positive Lebesgue measure and a real analytic
mapping h : Rs → Rm of s-dimensional Jacobian Jh 6≡ 0 such that h(A) ⊆ U .
Lemma IV.5. If x ∈ Rm with µx λm , then x is m-analytic.
March 20, 2018
DRAFT
27
Proof. We have to show that, for each U ∈ B(Rm ) with µx (U) > 0, we can find a set A ∈ B(Rm )
of positive Lebesgue measure and a real analytic mapping h : Rm → Rm of m-dimensional Jacobian
Jh 6≡ 0 such that h(A) ⊆ U . For given such U ∈ B(Rm ), simply take A = U and h the identity mapping
on Rm .
Example IV.4. We show that x = a ⊗ b ∈ Rkl as in Example III.2 is (r + t − 1)-analytic. To this
end, let U ∈ B(Rkl ) with µx (U) > 0 be arbitrary but fixed. We have to establish that there exist a
set A ∈ B(Rr+t−1 ) of positive Lebesgue measure and a real analytic mapping h : Rr+t−1 → Rkl of
(r + t − 1)-dimensional Jacobian Jh 6≡ 0 such that h(A) ⊆ U . Since
0 < µx (U)
(100)
= P[((ep1 . . . epr )u) ⊗ ((eq1 . . . eqt )v) ∈ U]
(101)
= P[((ep1 . . . epr ) ⊗ (eq1 . . . eqt ))(u ⊗ v) ∈ U]
X
P[((ei1 . . . eir ) ⊗ (ej1 . . . ejt ))(u ⊗ v) ∈ U]
=
(102)
(103)
1≤i1 <···<ir ≤k
1≤j1 <···<jt ≤l
P[p = (i1 . . . ir )T , q = (j1 . . . jt )T ],
(104)
there must exist a set of indices {i1 , . . . , ir } ⊆ {1, . . . , m} with i1 < · · · < ir and a set of indices
{j1 , . . . , jt } ⊆ {1, . . . , m} with j1 < · · · < jt such that
P[v(u ⊗ v) ∈ U] > 0,
(105)
where
v : Rrt → Rkl
w 7→ ((ei1 . . . eir ) ⊗ (ej1 . . . ejt ))w.
(106)
(107)
Since µu ×µv λr+t by assumption, it follows from Lemma IV.6 below that u⊗v is (r +t−1)-analytic.
The mapping v is linear and, therefore, trivially real analytic. Furthermore,
r
Jv(w) = det (E1 ⊗ E2 )T (E1 ⊗ E2 )
r
=
=
p
=1
March 20, 2018
(108)
det (E1T E1 ) ⊗ (E2T E2 )
(109)
det(Ir ⊗ It )
(110)
for all w ∈ Rrt ,
(111)
DRAFT
28
where (108) follows from Dv(w) = E1 ⊗ E2 , with E1 = (ei1 . . . eir ) and E2 = (ej1 . . . ejt ), for all
w ∈ Rrt , which proves that v is an immersion. We can therefore employ Lemma IV.4 and conclude that
v(u ⊗ v) is (r + t − 1)-analytic. Hence, Definition IV.2 together with (105) implies that there must exist
a set A ∈ B(Rr+t−1 ) of positive Lebesgue measure and a real analytic mapping h : Rr+t−1 → Rkl of
(r + t − 1)-dimensional Jacobian Jh 6≡ 0 such that h(A) ⊆ U .
Lemma IV.6. If a ∈ Rk and b ∈ Rl with µa × µb λk+l , then a ⊗ b is (k + l − 1)-analytic.
Proof. See Appendix G.
Example IV.5. Let x, z, and h be as in Example III.3. We first note that sin and cos are real analytic.
In fact, it follows from the ratio test [39, Theorem 3.34] that the power series
sin(z) =
cos(z) =
∞
X
(−1)n z 2n+1
n=0
∞
X
n=0
(2n + 1)!
(−1)n z 2n
(2n)!
(112)
(113)
are absolutely convergent for all z ∈ R. Thus, sin and cos can both be represented by convergent power
series at 0 with infinite convergence radius. Lemma K.1 therefore implies that sin and cos are both real
p
analytic. As each component of h is real analytic, so is h. Furthermore, Jh(z) = sin2 (z) + cos2 (z) = 1
for all z ∈ R, which implies that h is a real analytic immersion. Since z is 1-analytic by Lemma IV.5
and x = h(z), Lemma IV.4 implies that x is 1-analytic.
V. P ROOF OF T HEOREM II.1 (ACHIEVABILITY )
Suppose that K(x) < n. It then follows from (9) that x must admit a support set U ⊆ Rm with
dimMB (U) < n. We first construct a new support set V ⊆ Rm for x as a countable union of compact sets
satisfying dimMB (V) < n. Based on this support set V we will then prove the existence of a measurable
decoder g satisfying P[g(A, Ax) 6= x] = 0. The construction of V starts by noting that, thanks to
Definition II.2, dimMB (U) < n implies the existence of a covering {Ui }i∈N of U by nonempty compact
sets Ui satisfying
sup dimB (Ui ) < n.
(114)
i∈N
For this covering, we set
V=
March 20, 2018
[
i∈N
Ui ,
(115)
DRAFT
29
and note that
)
(
dimMB (V) = inf sup dimB (Vi ) : V ⊆
i∈N
[
i∈N
Vi
(116)
≤ sup dimB (Ui )
(117)
< n,
(118)
i∈N
where (116) follows from Definition II.2 with the infimum taken over all coverings {Vi }i∈N of V by
nonempty compact sets Vi , (117) is by (115), and in (118) we used (114). Since dimMB (Rm ) = m by
Property i) of Lemma H.12, and dimMB (V) < n ≤ m, we must have V ( Rm . Now, V is a support set
because it contains the support set U as a subset. Furthermore, since P[x ∈ V] = 1 and V ( Rm , there
must exist an e ∈ Rm \V such that P[x = e] = 0. This e will be used to declare a decoding error. We
will show in Section V-A that there exists a Borel measurable mapping g : Rn×m × Rn → Rm satisfying
∈ {v ∈ V : Av = y} if ∃v ∈ V : Av = y
g(A, y)
(119)
= e
else.
The mapping g is guaranteed to deliver a v ∈ V that is consistent with (A, y) (in the sense of Av = y ) if
at least one such consistent v ∈ V exists, otherwise an error is declared by delivering the “error symbol”
e. Next, for each A ∈ Rn×m , let pe (A) denote the probability of error defined as
pe (A) = P[g(A, Ax) 6= x].
(120)
It remains to show that pe (A) = 0 for λn×m -a.a. A. Now,
pe (A) = P[g(A, Ax) 6= x, x ∈ V] + P[g(A, Ax) 6= x, x ∈
/ V]
= P[g(A, Ax) 6= x, x ∈ V]
= P[(A, x) ∈ A]
for all A ∈ Rn×m ,
(121)
(122)
(123)
where (122) follows from P[x ∈ V] = 1 and in (123) we set
A = {(A, x) ∈ Rn×m × V : g(A, Ax) 6= x}.
(124)
Since A ∈ B(Rn×m )⊗B(Rm ) by Lemma V.1 below (with X = Rm , Y = Rn×m , f (x, A) = g(A, Ax),
and V ∈ B(Rm ) as a countable union of compact sets), we can apply Corollary H.1 (with the σ -finite
measure spaces (Rm , B(Rm ), µx ) and (Rn×m , B(Rn×m ), λn×m )) to A and get
Z
Z
pe (A)dλn×m (A) =
λn×m ({A : (A, x) ∈ A})dµx (x).
Rn×m
March 20, 2018
(125)
Rm
DRAFT
30
Next, note that for y = Ax with x ∈ V , the vector g(A, y) can differ from x only if there is a v ∈ V \{x}
that is consistent with y , i.e., if y = Av for some v ∈ V \{x}. Thus,
A ⊆ {(A, x) ∈ Rn×m × V : ker(A) ∩ Vx 6= {0}},
(126)
where, for each x ∈ V , we set
Vx = {v − x : v ∈ V}.
(127)
{A ∈ Rn×m : (A, x) ∈ A} ⊆ A ∈ Rn×m : ker(A) ∩ Vx 6= {0} ,
(128)
As (126) yields
monotonicity of λn×m implies
λn×m ({A ∈ Rn×m : (A, x) ∈ A})
≤ λn×m A ∈ Rn×m : ker(A) ∩ Vx 6= {0}
(129)
for all x ∈ V.
(130)
The null-space property Proposition II.1, with U = Vx and dimMB (Vx ) = dimMB (V) < n ((lower)
modified Minkowski dimension is invariant under translation, as seen by translating covering balls
accordingly) now implies that (130) equals zero for all x ∈ V . Therefore, (129) must equal zero as
well for all x ∈ V . We conclude that both sides of (125) must equal zero as the integrand on the righthand side is identically zero (recall that V is a support set of x), which, by Lemma H.2, implies that we
must have pe (A) = 0 for λn×m -a.a. A, thereby completing the proof.
A. Existence of Borel Measurable g
S
Recall that i) V = i∈N Ui ( Rm , where Ui ⊆ Rm is nonempty and compact for all i ∈ N and ii) the
error symbol e ∈ Rm\V . We have to show that there exists a Borel measurable mapping g : Rn×m × Rn →
Rm such that
g(A, y)
∈ {v ∈ V : Av = y}
if ∃v ∈ V : Av = y
= e
else.
(131)
To this end, first consider the mapping
f : Rn×m × Rn × Rm → R
(A, y, v) 7→ ky − Avk2 .
March 20, 2018
(132)
(133)
DRAFT
31
Since f is continuous, Lemma I.3 implies that f is a normal integrand (see Definition I.4) with respect
to B(Rn×m × Rn ). For each i ∈ N, let
Ti = {(A, y) ∈ Rn×m × Rn : ∃u ∈ Ui with f (A, y, u) ≤ 0}
= {(A, y) ∈ Rn×m × Rn : ∃u ∈ Ui with Au = y}.
(134)
(135)
It now follows from Properties ii) and iii) of Lemma I.5 (with T = Rn×m × Rn , α = 0, K = Ui , and f as
in (132)–(133), which is a normal integrand with respect to B(Rn×m × Rn )) that i) Ti ∈ B(Rn×m × Rn )
for all i ∈ N and ii) for every i ∈ N, there exists a Borel measurable mapping
pi : Ti → Rm
(136)
(A, y) 7→ pi (A, y) ∈ {u ∈ Ui : Au = y}.
(137)
For each i ∈ N, the mapping pi can be extended to a mapping gi : Rn×m × Rn → Rm by setting
gi |Ti = pi
(138)
gi |(Rn×m ×Rn )\Ti = e,
(139)
which is Borel measurable thanks to Lemma H.6 as pi is Borel measurable and Ti ∈ B(Rn×m × Rn ).
Based on this sequence {gi }i∈N of Borel measurable mappings gi , we now construct a Borel measurable
mapping satisfying (131). The idea underlying this construction is as follows. For a given pair (A, y),
we first use g1 to try to find a consistent (in the sense of y = Au) u ∈ U1 . If g1 delivers the error
symbol e, we use g2 to try to find a consistent u ∈ U2 . This procedure is continued until a gi delivers a
consistent u ∈ Ui . If no gi yields a consistent u ∈ Ui , we deliver the error symbol e as the final decoder
output. The formal construction is as follows. We set G1 = g1 and, for every i ∈ N \{1}, we define the
mapping Gi : Rn×m × Rn → Rm iteratively by setting
Gi−1 (A, y) if Gi−1 (A, y) 6= e
Gi (A, y) =
gi (A, y)
else.
(140)
Then, G1 (= g1 ) is Borel measurable, and, for each i ∈ N \{1}, the Borel-measurability of Gi follows
from the Borel-measurability of Gi−1 and gi thanks to Lemma V.2 below. Note that by construction
n
o
S
S
∈ v ∈ i Uj : Av = y
if ∃v ∈ ij=1 Uj : Av = y
j=1
Gi (A, y)
(141)
= e
else.
Finally, we obtain g : Rn×m × Rn → Rm according to
g(A, y) = lim Gi (A, y),
i→∞
March 20, 2018
(142)
DRAFT
32
which satisfies (131) by construction. As the pointwise limit of a sequence of Borel measurable mappings,
g is Borel measurable thanks to Corollary H.2.
Lemma V.1. Let X and Y be Euclidean spaces, consider a Borel measurable mapping
f : X × Y → X,
(143)
A = {(x, y) ∈ V × Y : f (x, y) 6= x} ∈ B(X × Y) = B(X ) ⊗ B(Y).
(144)
and let V ∈ B(X ). Then,
Proof. We first note that B(X × X ) = B(X ) ⊗ B(X ) and B(X × Y) = B(X ) ⊗ B(Y), both thanks to
Lemma H.3. Therefore, V × X ∈ B(X × X ). Now, consider the diagonal D = {(x, x) : x ∈ X } and note
that D as the inverse image of {0} under the Borel measurable mapping g : X × X → X , (u, v) 7→ u − v
is in B(X × X ). Let C = (V × X ) ∩ ((X × X )\D). Since D ∈ B(X × X ), it follows that C ∈ B(X × X ).
Define the mapping
F: X ×Y →X ×X
(x, y) 7→ (x, f (x, y)),
(145)
(146)
and note that it is Borel measurable thanks to Lemma H.5 (with f1 : X × Y → X , (x, y) 7→ x and
f2 : X × Y → X , (x, y) 7→ f (x, y)). Finally, A ∈ B(X × Y) as A = F −1 (C).
Lemma V.2. Let X and Y be topological spaces and y0 ∈ Y and suppose that f, g : X → Y are both
Borel measurable. Then, h : X → Y ,
h(x) =
f (x)
g(x)
if f (x) 6= y0
(147)
else
is Borel measurable.
Proof. We have to show that h−1 (U) ∈ B(X ) for all U ∈ B(Y). To this end, consider an arbitrary but
fixed U ∈ B(Y). Now, {y0 } ∈ B(Y) implies U \{y0 } ∈ B(Y). We write h−1 (U) = A ∪ B with
A = {x ∈ X : h(x) ∈ U, f (x) 6= y0 }
(148)
B = {x ∈ X : h(x) ∈ U, f (x) = y0 }
(149)
and show that A and B are both in B(X ), which in turn implies h−1 (U) ∈ B(X ). Since
A = {x ∈ X : f (x) ∈ U, f (x) 6= y0 }
= f −1 (U \{y0 }),
March 20, 2018
(150)
(151)
DRAFT
33
z2
1
Q2,3
Q2,4
Q2,1
Q2,2
1
z1
Figure 3. The set Q2 consists of the four grey squares. The set Q3 consists of the sixteen shaded black squares.
U \{y0 } ∈ B(Y), and f is Borel measurable by assumption, it follows that A ∈ B(X ). Finally, as
B = {x ∈ X : g(x) ∈ U, f (x) = y0 }
= f −1 ({y0 }) ∩ g −1 (U),
(152)
(153)
{y0 } ∈ B(Y), U ∈ B(Y), and f and g are both Borel measurable by assumption, it follows that
B ∈ B(X ). Thus, h−1 (U) = A ∪ B ∈ B(X ). Since U was arbitrary, we conclude that h is Borel
measurable.
VI. P ROOF OF T HEOREM III.2
Construction of A. Consider the sequence {ak }k∈N , where ak = 1/2 + 1/2k , and note that
lim ak =
k→∞
1
2
ak > ak+1
(154)
for all k ∈ N.
(155)
Let Q1 = [0, 1]2 be the unit square of side length one. We define
Q2 = Q2,1 ∪ Q2,2 ∪ Q2,3 ∪ Q2,4 ,
(156)
where every square Q2,i ⊆ Q1 has side length a2 /2 with (0 0)T ∈ Q2,1 , (1 0)T ∈ Q2,2 , (0 1)T ∈ Q2,3 ,
and (1 1)T ∈ Q2,4 . It follows from (155) that the squares Q2,1 , . . . , Q2,4 are pairwise disjoint and
Q2 ( Q1 . To define Q3 , we follow the same procedure and split up every set Q2,i into the disjoint
union of four squares with side length a3 /4. The sets Q1 , Q2 , and Q3 are depicted in Figure 3. We
iterate this construction and obtain a sequence {Qk }k∈N , where Qk is the disjoint union of 4k−1 squares
Qk,i , i = 1, . . . , 4k−1 , of side length ak /2k−1 and
Qk+1 ( Qk
March 20, 2018
for all k ∈ N.
(157)
DRAFT
34
Next, we set
A=
\
k∈N
Qk ,
(158)
which, as the intersection of closed sets, is closed. Since A is also bounded it must be compact by the
Heine-Borel theorem [39, Theorem 2.41]. Finally,
λ2 (A) = lim λ2 (Qk )
(159)
= lim
4k−1 a2k
k→∞ (2k−1 )2
(160)
= lim a2k
(161)
1
= ,
4
(162)
k→∞
k→∞
where (159) follows from Property iii) of Lemma H.1.
Construction of κ. We now construct a C ∞ -function κ : R2 → R that is one-to-one on A as defined
in (158). This will be accomplished by building compactly supported C ∞ -functions ϕk,i : R2 → [0, 1],
i = 1, . . . , 4k−1 , k ∈ N, such that
ϕk,i (z) =
1
0
if z ∈ Qk,i ,
(163)
if z ∈ Qk,j , j ∈
{1, . . . , 4k−1 }\{i}.
The construction of these functions is effected by Lemma VI.1 below with ϕk,i (z) = ψδk,i ,ak,i ,wk,i (z),
where wk,i denotes the center of Qk,i , ak,i equals half the side-length of Qk,i , and δk,i is chosen
sufficiently small for (163) to hold (recall that the squares Qk,i are closed and disjoint). Next, we define
the C ∞ -functions
ϕk =
k−1
4X
i=1
i
ϕk,i
4k−1
(164)
i
4k−1
(165)
and note that
ϕk (z) =
for all z ∈ Qk,i , i = 1, . . . , 4k−1 , and k ∈ N, and
|i − j|
4k−1
1
≥ k−1
4
|ϕk (z) − ϕk (w)| =
March 20, 2018
(166)
(167)
DRAFT
35
for all z ∈ Qk,i , w ∈ Qk,j , 1 ≤ i < j ≤ 4k−1 , and k ∈ N. For l ∈ N and a, b ∈ N0 , consider now the
C ∞ -function
(a,b)
sl
(z) :=
=
l
∂ a+b X
1
ϕk (z)
k
a
b
2
∂z1 ∂z2 k=1 8 (Mk + 1)
l
X
∂ a+b ϕk (z)
1
82 (Mk + 1) ∂z1a ∂z2b
k=1
k
(168)
(169)
with
Mk = max max d(i, j),
1≤i≤k 1≤j<k
(
)
∂ j ϕi (z)
d(i, j) = sup max
: a, b ∈ N0 , a + b = j .
∂z1a ∂z2b
z∈R2
(170)
(171)
We now show that this particular choice for the constants Mk guarantees, for each a, b ∈ N0 , that
(a,b)
the sequence {sl
}l∈N of C ∞ -functions converges uniformly and denote the corresponding limiting
functions by κ(a,b) . Corollary J.1 then implies
∂κ(a,b) (z)
= κ(a+1,b) (z)
∂z1
(172)
∂κ(a,b) (z)
= κ(a,b+1) (z)
∂z2
(173)
for all a, b ∈ N0 and z ∈ R2 , and κ(0,0) must therefore be C ∞ . We set κ = κ(0,0) . It remains to prove
(a,b)
uniform convergence of the sequences {sl
a, b ∈ N0 be arbitrary but fixed and note that
}l∈N of C ∞ -functions for all a, b ∈ N0 . To this end, let
d(k, a + b)
∂ a+b ϕk (z)
≤ 2k
a
b
8 (Mk + 1)
∂z1 ∂z2
k + 1)
1
< 2k
8
1
82k (M
(174)
(175)
for all k > a + b and z ∈ R2 . Furthermore, by the sum formula for the geometric series,
∞
X
k=a+b+1
X 1
1
1
<
= .
k
7
8k
82
(a,b)
We can now conclude from (174) and (176) that the sequence {tl
(a,b)
tl (z)
:=
(176)
k∈N
}l∈N of C ∞ -functions
a+b+l
X
∂ a+b ϕk (z)
1
82 (Mk + 1) ∂z1a ∂z2b
k=a+b+1
k
(177)
satisfies the assumptions of Theorem J.1 and therefore converges uniformly to a function, which we
denote by ρ(a,b) . As
(a,b)
sl (z)
=
a+b
X
k=1
March 20, 2018
1
∂ a+b ϕk (z)
(a,b)
+ tl−a−b (z)
82 (Mk + 1) ∂z1a ∂z2b
k
(178)
DRAFT
36
(a,b)
}l∈N must converge uniformly to
a+b
X
1
∂ a+b ϕk (z)
+ ρ(a,b) (z).
82 (Mk + 1) ∂z1a ∂z2b
for all l > a + b, we conclude that {sl
κ(a,b) (z) :=
k
k=1
(a,b)
Since a and b are arbitrary, this implies that {sl
concluding the proof of κ being C ∞ .
(179)
}l∈N converges uniformly for all a, b ∈ N0 , thereby
It remains to show that κ is one-to-one on A. To this end, consider arbitrary but fixed z0 and w0 in A
with z0 6= w0 . We have to show that κ(z0 ) 6= κ(w0 ). Note that by construction of A (cf. (158)), there
exists a k0 ∈ N such that
i) for every k ≥ k0 , there exist ik and jk in {1, . . . , 4k−1 } with ik 6= jk such that z0 ∈ Qk,ik and
w0 ∈ Qk,jk , and
ii) for every k < k0 , there exists an ik such that z0 and w0 are both in Qk,ik .
We therefore have
|κ(z0 ) − κ(w0 )| =
=
X ϕk (z0 ) − ϕk (w0 )
k∈N
(180)
82k (Mk + 1)
∞
X
ϕk (z0 ) − ϕk (w0 )
82k (Mk + 1)
(181)
k=k0
|ϕk0 (z0 ) − ϕk0 (w0 )|
−
≥
k
82 0 (Mk0 + 1)
≥
|ϕk0 (z0 ) − ϕk0 (w0 )|
−
k
82 0 (Mk0 + 1)
1
≥
Mk0 + 1
∞
X
ϕk (z0 ) − ϕk (w0 )
82k (Mk + 1)
k=k0 +1
∞
X
k=k0 +1
|ϕk (z0 ) − ϕk (w0 )|
82k (Mk + 1)
!
∞
X
|ϕk0 (z0 ) − ϕk0 (w0 )|
|ϕk (z0 ) − ϕk (w0 )|
−
,
k
82k
82 0
(182)
(183)
(184)
k=k0 +1
(0,0)
where (180) follows from the uniform convergence of {sl
}l∈N to κ, in (181) we used (165) and ii)
above, (182) is by the reverse triangle inequality, and (184) follows from Mk ≤ Mk+1 for all k ∈ N (cf.
(170)). Moreover, (166)–(167) imply |ϕk0 (z0 ) − ϕk0 (w0 )| ≥ 1/4k0 −1 and (164)–(165) yield
|ϕk (z0 ) − ϕk (w0 )| ≤ |ϕk (z0 )| + |ϕk (w0 )|
(185)
=
(186)
ik + jk
4k−1
≤2
March 20, 2018
for all k ∈ N.
(187)
DRAFT
37
We can therefore further lower-bound |κ(z0 ) − κ(w0 )| according to
1
|κ(z0 ) − κ(w0 )| ≥
Mk 0 + 1
1
=
Mk 0 + 1
1
≥
Mk 0 + 1
=
(Mk0
1
4k0 −1 82
k0
1
4k0 −1 82
k0
1
4k0 −1 82
1
k
+ 1)82 0
k0
−
−
−
1
4k0 −1
∞
X
2
82k
k=k0 +1
!
2
X
(188)
!
(189)
k+k0 +1
82
k∈N0
2
82
−
k0 +1
X 1
8k
!
X 1
8k
k∈N0
| {z }
!
(190)
k∈N0
2
k0
82
(191)
= 87
>
1
k
82 0 (Mk0 + 1)
4
1
−
4k0 −1 82k0
!
(192)
k
82 0 − 4k0
1
= 2k0
k
8 (Mk0 + 1) 4k0 −1 82 0
(193)
> 0.
(194)
Since z0 and w0 are arbitrary, this establishes that κ is indeed one-to-one, thereby finishing the proof.
Lemma VI.1. For a > 0, δ > 0, and w = (w1 w2 )T ∈ R2 , consider the mapping
ψδ,a,w : R2 → [0, 1]
z 7→ ρδ,a (z1 − w1 )ρδ,a (z2 − w2 ),
(195)
(196)
where
ρδ,a : R → [0, 1]
t 7→
f (a + δ − |t|)
f (a + δ − |t|) + f (|t| − a)
with f (t) = e−1/t 1R+ (t). Then, ψδ,a,w is C ∞ and satisfies
1 if max(|z1 − w1 |, |z2 − w2 |) ≤ a,
ψδ,a,w (z) =
0 if min(|z1 − w1 |, |z2 − w2 |) ≥ a + δ.
(197)
(198)
(199)
Proof. It follows from [40, Lemma 2.22] with H = ρδ,a , r1 = a, and r2 = a + δ that ρδ,a is C ∞ and
satisfies
ρδ,a (t) =
1 if |t| ∈ [0, a],
(200)
0 if |t| ∈ [a + δ, ∞).
The claim now follows from ψδ,a,w = ρδ,a (z1 − w1 )ρδ,a (z2 − w2 ) and the properties of ρδ,a .
March 20, 2018
DRAFT
38
VII. P ROOF OF T HEOREM IV.1 (S TRONG C ONVERSE )
Towards a contradiction, suppose that the statement is false. That is, we can find an s ∈ N such that
there exist
i) an A ∈ B(Rs ) with λs (A) > 0,
ii) a real analytic mapping h : Rs → Rm , with s ≤ m, of s-dimensional Jacobian Jh 6≡ 0, and
iii) an n ∈ N with n < s and a real analytic mapping f : Rm → Rn that is one-to-one on h(A).
Let s0 be the smallest s ∈ N such that i)–iii) hold. The proof will be effected by showing that this implies
validity of i)–iii) for s0 − 1 and n − 1, which contradicts the assumption that s0 is the smallest natural
number for i)–iii) to hold. The reader might wonder what happens to this argument in the case where
n = 1. In fact we establish below that, if i)–iii) is satisfied, then necessarily n ≥ 2, cf. the claims a)–c)
right after (215).
Let A, h, n, and f satisfy i)–iii) for this minimum value s0 . We start by noting that
m ≥ s0 > n ≥ 1
(201)
f (x) = (f1 (x) . . . fn (x))T
(202)
by ii) and iii). Next, we write
and set ψi = fi ◦ h, i = 1, . . . , n, and ψ = f ◦ h, which, by Corollary K.2, are all real analytic as
compositions of real analytic mappings. We now show that there must exist an i0 ∈ {1, . . . , n} and a set
Ai0 ⊆ A such that
λs0 (Ai0 ) > 0,
(203)
Jψi0 (z) > 0, and Jh(z) > 0 for all z ∈ Ai0 . To this end, we first decompose
A = A0 ∪
n
[
i=1
Ai ,
(204)
where
Ai = {z ∈ A : Dψi (z) 6= 0, Jh(z) > 0}
= {z ∈ A : Jψi (z) > 0, Jh(z) > 0},
(205)
i = 1, . . . , n,
A0 = {z ∈ A : Dψ(z) = 0} ∪ {z ∈ A : Jh(z) = 0}.
(206)
(207)
By Lemma VII.1 below (with s = s0 ), Dψ(z) 6= 0 for λs0 -a.a. z ∈ A. Furthermore, Jh(z) 6= 0 for
λs0 -a.a. z ∈ A because of Jh 6≡ 0 and Lemma K.7. Thus, λs0 (A0 ) = 0 by countable subadditivity of
Lebesgue measure. Since λs0 (A) > 0 by assumption, and λs0 (A0 ) = 0, it follows, again by countable
subadditivity of Lebesgue measure, that there must exist an i0 such that (203) holds.
March 20, 2018
DRAFT
39
Now, for each y ∈ R, let
My = ψi−1
({y}).
0
(208)
We show in Section VII-A below that there exist a y0 ∈ R and a z0 ∈ Ai0 ∩ My0 such that
H s0 −1 Bs0 (z0 , r) ∩ Ai0 ∩ My0 > 0
Jψi0 (z) > 0
for all r > 0,
(209)
for all z ∈ My0 ,
(210)
Jh(z0 ) > 0.
(211)
It now follows from (210), real analyticity of ψi0 , My0 6= ∅, and Lemma K.11 that My0 is a (s0 − 1)-
dimensional real analytic submanifold of Rs0 . Therefore, by Lemma K.9, there exist a real analytic
embedding ζ : Rs0 −1 → Rs0 and an η > 0 such that
ζ(0) = z0 ,
Bs0 (z0 , η) ∩ My0 ⊆ ζ Rs0 −1 ,
(212)
(213)
and ζ Rs0 −1 is relatively open in My0 , i.e., there exists an open set V ⊆ Rs0 with ζ Rs0 −1 = V ∩My0 .
Combining (209) and (213) yields
H s0 −1 ζ Rs0 −1 ∩ Ai0 > 0.
(214)
Ci0 = ζ −1 ζ Rs0 −1 ∩ Ai0 .
(215)
Next, let
We now show that
a) Ci0 ∈ B(Rs0 −1 ) with λs0 −1 (Ci0 ) > 0,
b) h̃ = h ◦ ζ : Rs0 −1 → Rm is real analytic and of (s0 − 1)-dimensional Jacobian J h̃ 6≡ 0, and
c) s0 − 1 > n − 1 > 0 and the real analytic mapping
f˜: Rm → Rn−1
x 7→ (f1 (x) . . . fi0 −1 (x) fi0 +1 (x) . . . fn (x))T
(216)
(217)
is one-to-one on h̃(Ci0 ),
which finally yields the desired contradiction to the statement of s0 being the smallest natural number
such that i)–iii) at the beginning of the proof are satisfied.
Proof of a). We first establish that Ci0 ∈ B(Rs0 −1 ). Since ζ Rs0 −1 is relatively open in My0 and,
therefore, a Borel set in Rs0 , it follows from (215) that Ci0 is the inverse image of a finite intersection
March 20, 2018
DRAFT
40
of Borel sets under the real analytic embedding ζ and, therefore, also a Borel set. Next, we show that
λs0 −1 (Ci0 ) > 0. Since
Z
Jζ(w)dλs0 −1 (w) = H s0 −1 (ζ(Ci0 ))
(218)
Ci0
= H s0 −1 ζ(Rs0 −1 ) ∩ Ai0
> 0,
(219)
(220)
where (218) follows from the area formula Corollary H.3 upon noting that ζ is one-to-one as an embedding
and locally Lipschitz by real analyticity, (219) is by (215), and in (220) we applied (214). Using Lemma
H.2, we conclude from (218)–(220) that λs0 −1 (Ci0 ) > 0.
Proof of b). By Corollary K.2, h̃ is real analytic as the composition of real analytic mappings. It
remains to show that J h̃ 6≡ 0. To this end, we establish J h̃(0) > 0. First note that the chain rule yields
Dh̃(0) = (Dh)(ζ(0))Dζ(0)
= Dh(z0 )Dζ(0),
(221)
(222)
where the second equality is by (212). Since ζ : Rs0 −1 → Rs0 is an embedding, it follows that
rank(Dζ(0)) = s0 − 1.
(223)
Moreover, as h : Rs0 → Rm with m ≥ s0 , (211) implies
rank(Dh(z0 )) = s0 .
(224)
Applying Lemma K.12 to Dh̃(0) = Dh(z0 )Dζ(0) therefore yields rank(Dh̃(0)) ≥ s0 − 1, which in
turn implies J h̃(0) > 0 because Dh̃(0) ∈ Rm×(s0 −1) .
Proof of c). s0 − 1 > n − 1 simply follows from s0 > n (cf. (201)). To prove that f˜ is one-to-one
on h̃(Ci0 ), we first show that fi0 is constant on h̃(Ci0 ). In fact, since ζ(Ci0 ) ⊆ My0 by (215), and
My0 = (fi0 ◦ h)−1 ({y0 }), it follows that
fi0 (h̃(w)) = y0
for all w ∈ Ci0 .
(225)
As f is one-to-one on h(A) and fi0 is constant on h̃(Ci0 ) with h̃(Ci0 ) = (h ◦ ζ)(Ci0 ) ⊆ h(A) by (215),
we conclude that f˜ must also be one-to-one on h̃(Ci0 ). It remains to show that we must have n > 1,
which obviously implies n − 1 > 0. Suppose, to the contrary, that n = 1. Since h̃ is real analytic with
J h̃ 6≡ 0 and λs0 −1 (Ci0 ) > 0, it follows from Property ii) of Lemma K.8 that h̃ is one-to-one on a subset
of Ci0 of positive Lebesgue measure. Thus, the set h̃(Ci0 ) is uncountable. Now, since by (225) fi0 is
constant on h̃(Ci0 ), and a constant function can not be one-to-one on a set of cardinality larger than one,
March 20, 2018
DRAFT
41
the uncountability of h̃(Ci0 ) implies that fi0 can not be one-to-one on h̃(Ci0 ). But f = fi0 for n = 1
(with i0 = 1) and f is one-to-one on h̃(Ci0 ) ⊆ h(A) by assumption, which results in a contradiction.
Therefore, we necessarily have n > 1 and we can conclude that a)–c) must hold, which finalizes the
proof of the theorem.
A. Proof of (209)–(211)
We start by noting that
Z
Z
1
s0 −1
H
(Ai0 ∩ My )dλ (y) =
R
Jψi0 (z)dλs0 (z)
(226)
Ai0
Z
=
1A (z)Jψi (z)dλs (z)
0
Rs0
i0
0
> 0,
(227)
(228)
where (226) is by the coarea formula Corollary H.4 upon noting that ψi0 is locally Lipschitz by real
analyticity, and (228) follows from
1A (z)Jψi (z) > 0 for all z ∈ Ai , λs (Ai ) > 0 (cf. (203)), and
0
i0
0
0
0
Lemma H.2. Also by Lemma H.2 and (226)–(228), there must exist a set D ⊆ R with λ1 (D) > 0 such
that
H s0 −1 Ai0 ∩ My > 0
for all y ∈ D.
(229)
Furthermore,
λ1 {y ∈ R : ∃z ∈ My with Jψi0 (z) = 0} = λ1 ψi0 {z ∈ Rs0 : Jψi0 (z) = 0}
= 0,
(230)
(231)
where (230) is by (208) and (231) follows from Property ii) of Theorem H.2 with ψi0 being C ∞ (recall
that ψi0 = fi0 ◦ h is real analytic as a composition of real analytic mappings and, therefore, C ∞ by
Lemma K.3). Now, (230)–(231) together with λ1 (D) > 0 implies the existence of a y0 ∈ D such that
(210) holds. For this y0 , we must have H s0 −1 (Ai0 ∩ My0 ) > 0 by (229). Therefore, Lemma H.7 implies
that there must exist a z0 ∈ Ai0 ∩ My0 such that (209) holds. As this z0 ∈ Ai0 ∩ My0 ⊆ Ai0 , (211)
finally follows from (206).
Lemma VII.1. Let A ∈ B(Rs ) be of positive Lebesgue measure, h : Rs → Rm , with s ≤ m, real
analytic of s-dimensional Jacobian Jh 6≡ 0, and f : Rm → Rn real analytic. If f is one-to-one on h(A),
then D(f ◦ h)(z) 6= 0 for λs -a.a. z ∈ A.
Proof. Towards a contradiction, suppose that f is one-to-one on h(A) and D(f ◦ h) ≡ 0 on a set B ⊆ A
with λs (B) > 0. Since f ◦ h is real analytic by Corollary K.2, D(f ◦ h) is real analytic as a consequence
March 20, 2018
DRAFT
42
of Lemma K.3. It therefore follows from Lemma K.5 that D(f ◦ h) is identically zero. Hence, f ◦ h
must be constant. In particular, f ◦ h must be constant on B and, therefore, f must be constant on h(B).
Since f is one-to-one and constant on h(B), it follows that h must be constant on B . Thus, Jh(z) = 0
for all z ∈ B , and Lemma K.5 implies Jh ≡ 0. This is a contradiction to Jh 6≡ 0.
A PPENDIX A
P ROOF OF L EMMA III.1
Proof of i). Suppose that U is s-rectifiable. Then, U = ϕ(A) with A ⊆ Rs compact and ϕ Lipschitz.
For t ∈ N with t > s, take
z
B=
: z ∈ A ⊆ Rt
0
(232)
and define
ψ : B → Rm
z
7→ ϕ(z).
0
(233)
(234)
Then, U = ψ(B) is t-rectifiable as a consequence of B compact and ψ Lipschitz.
Proof of ii). First note that we can cover Rs according to
[
Ak ,
Rs =
(235)
k∈N
with Ak ⊆ Rs compact for all k ∈ N (take, for example, Ak = Bs (0, k)). Setting, for every i, k ∈ N,
ϕi,k = ϕi |Ak (locally Lipschitz mappings are Lipschitz on compact sets by Lemma H.9), we can write
[
V=
ϕi,k (Ak ),
(236)
i,k∈N
which implies that V is countably s-rectifiable.
Proof of iii). Suppose that U is countably s-rectifiable and V is countably t-rectifiable. Then, we can
write
U=
V=
where the Ai ⊆
Rs
and the Bj ⊆
Rt
[
ϕi (Ai )
(237)
ψj (Bj ),
(238)
i∈N
[
j∈N
are compact and the ϕi : Rs → Rm and the ψj : Rt → Rn are
Lipschitz. Thus,
W=
March 20, 2018
[
θi,j (Ci,j ),
(239)
i,j∈N
DRAFT
43
where we defined
θi,j : Rs+t → Rm+n
(a b)T 7→ (ϕi (a) ψj (b))T
(240)
(241)
and set
Ci,j = {(a b)T : a ∈ Ai , b ∈ Bj }.
(242)
Now, the θi,j are Lipschitz because the ϕi and the ψj are Lipschitz for all i, j ∈ N, and the Ci,j are
compact by Tychonoff’s theorem [41, Theorem 4.42] thanks to Ai and Bj compact for all i, j ∈ N.
Therefore, W is countably (s + t)-rectifiable.
Proof of iv). Let M be a s-dimensional C 1 -submanifold of Rm . By [36, Definition 5.3.1], we can
write
M=
[
ϕx (Ux ),
(243)
x∈M
where, for every x ∈ M, Ux ⊆ Rs is open, and ϕx : Ux → Rm is C 1 and satisfies x ∈ ϕx (Ux ) and
ϕx (Ux ) = Vx ∩ M with Vx ⊆ Rm open. Now, there must exist a countable set {xi : i ∈ N} ⊆ M such
that
M=
[
i∈N
Vxi ∩ M.
(244)
For if such a countable set does not exist, the open set
[
V=
x∈M
Vx
(245)
would not admit a countable subcover, which would contradict that V as an open set in Rm is Lindelöf
[42, Definition 5.6.19, Proposition 5.6.22]. With the countable set {xi : i ∈ N} ⊆ M we can now write
M=
[
ϕi (Ui ),
(246)
i∈N
where we set ϕi = ϕxi and Ui = Uxi . Now fix i ∈ N arbitrarily. As Ui is open, for every ui ∈ Ui , there
exists an rui > 0 such that
B s (ui , rui ) ⊆ Ui .
(247)
We can thus write
Ui =
March 20, 2018
[
ui ∈Ui
ru
B s ui , i .
2
(248)
DRAFT
44
Since Ui as an open set in Rm is Lindelöf [42, Definition 5.6.19, Proposition 5.6.22], there exists a
countable set {ui,j : j ∈ N} ⊆ Ui such that
Ui =
[
j∈N
ri,j
B ui,j ,
,
2
s
(249)
where we set ri,j = rui,j for all j ∈ N. Using B s (ui,j , ri,j ) ⊆ Ui for all j ∈ N (cf. (247)), it follows that
[
ri,j
Ui =
B s ui,j ,
.
(250)
2
j∈N
Since i ∈ N was arbitrary, using (246) and (250), we get
[
ri,j
s
M=
ϕi B ui,j ,
.
2
(251)
i,j∈N
Finally, all the ϕi as C 1 mappings are locally Lipschitz and, therefore, Lipschitz on the compact sets
B s ui,j , ri,j
for all j ∈ N, which establishes countable rectifiability of M.
2
Proof of v). Since every si -rectifiable set, with si ≤ s, is s-rectifiable by i), it follows that A is a
countable union of s-rectifiable sets and, therefore, countably s-rectifiable.
A PPENDIX B
P ROOF OF L EMMA III.3
Proof of i). Suppose that U is s-rectifiable. Then, there exist a compact set A ⊆ Rs and a Lipschitz
mapping ϕ : A → Rm such that U = ϕ(A). As f ◦ ϕ : A → Rn is Lipschitz owing to Lemmata H.9 and
H.11, f (U) = (f ◦ ϕ)(A) is s-rectifiable.
S
Proof of ii). Suppose that U is countably s-rectifiable. We can write U = i∈N Ui , where Ui is sS
rectifiable for all i ∈ N. As f (U) = i∈N f (Ui ) and f (Ui ) is s-rectifiable for all i ∈ N by i), it follows
that f (U) is countably s-rectifiable.
Proof of iii). Suppose that U ∈ B(Rm ) is countably (H s , s)-rectifiable. We have to show that f (U) =
A∪B, where A ∈ B(Rn ) is countably (H s , s)-rectifiable and H s (B) = 0. As U ∈ B(Rm ) is countably
(H s , s)-rectifiable, [35, Lemma 15.5] implies that H s |U is σ -finite. We can therefore employ Lemma
H.8 to decompose
U = V0 ∪
[
j∈N
Vj ,
(252)
where H s (V0 ) = H s |U (V0 ) = 0 and Vj ⊆ Rm is compact for all j ∈ N. This decomposition allows us
to write f (U) = A ∪ B , where
A=
[
f (Vj )
B = f (V0 ).
March 20, 2018
(253)
j∈N
(254)
DRAFT
45
Now, thanks to Lemma H.10, the f (Vj ) are compact. Therefore, A as a countable union of compact sets
is Borel. Furthermore, H s (B) = 0 because of H s (V0 ) = 0 and Lemma B.1 below. It remains to show
that A is countably (H s , s)-rectifiable. Since U is countably (H s , s)-rectifiable, there exists a countably
s-rectifiable set U1 such that H s (U \U1 ) = 0. Furthermore, as U1 is countably s-rectifiable, f (U1 ) is
countably s-rectifiable by ii). Finally,
H s (A\f (U1 )) ≤ H s (f (U)\f (U1 ))
(255)
≤ H s (f (U \U1 ))
(256)
= 0,
(257)
where (255) follows from the monotonicity of H s and f (U) = A ∪ B , (256) is by monotonicity of H s
and f (U)\f (U1 ) ⊆ f (U\U1 ), and (257) follows from Lemma B.1 below. This proves that A is countably
(H s , s)-rectifiable, thereby concluding the proof.
Lemma B.1. If U ⊆ Rm with H s (U) = 0 and f : Rm → Rn is locally Lipschitz, then H s (f (U)) = 0.
Proof. We employ the following chain of arguments:
[
H s (f (U)) = H s f U ∩
Bm (0, l)
(258)
l∈N
=Hs
[
l∈N
≤
X
≤
X
≤
X
l∈N
l∈N
f (Bm (0, l) ∩ U)
(259)
H s (f (Bm (0, l) ∩ U))
(260)
Lsl H s (Bm (0, l) ∩ U)
(261)
Lsl H s (U)
(262)
l∈N
= 0,
(263)
where (260) follows from the countable subadditivity of H s , in (261) we applied Property ii) of Lemma
H.13, where, for every l ∈ N, Ll denotes the Lipschitz constant of f |Bm (0,l) , and in (262) we used the
monotonicity of H s .
A PPENDIX C
P ROOF OF L EMMA III.5
Towards a contradiction, suppose that there exist r, t ∈ N with r 6= t such that x is r-rectifiable and
t-rectifiable. We can assume, w.l.o.g., that r < t. Now, Lemma III.4 implies the existence of
March 20, 2018
DRAFT
46
i) a countably r-rectifiable set U satisfying P[x ∈ U] = 1 and
ii) a countably t-rectifiable set V satisfying P[x ∈ V] = 1.
With Definition III.1, we can conclude that there exist
i) compact sets Ai ⊆ Rr and Lipschitz mappings ϕi : Ai → Rm , i ∈ N, such that
[
U=
ϕi (Ai ),
(264)
i∈N
and
ii) compact sets Bj ⊆ Rt and Lipschitz mappings ψj : Bj → Rm , j ∈ N, such that
[
V=
ψj (Bj ).
(265)
j∈N
The union bound now yields
h
i
[[
P[x ∈ U ∩ V] = P x ∈
ϕi (Ai ) ∩ ψj (Bj )
(266)
i∈N j∈N
≤
XX
i∈N j∈N
P[x ∈ ϕi (Ai ) ∩ ψj (Bj )].
(267)
Since P[x ∈ U ∩ V] = 1, which follows from P[x ∈ U] = 1 and P[x ∈ V] = 1, (266)–(267) guarantee the
existence of an i0 and a j0 , both in N, such that µx (ϕi0 (Ai0 ) ∩ ψj0 (Bj0 )) > 0. As µx H t |V by the trectifiability of x and H t |V H t by the monotonicity of H t , it follows that H t (ϕi0 (Ai0 )∩ψj0 (Bj0 )) >
0. Property i) of Lemma H.13 therefore implies (recall that r < t by assumption) H r (ϕi0 (Ai0 ) ∩
ψj0 (Bj0 )) = ∞. The monotonicity of H r then yields
H r (ϕi0 (Ai0 )) ≥ H r (ϕi0 (Ai0 ) ∩ ψj0 (Bj0 ))
= ∞.
(268)
(269)
But we also have
H r (ϕi0 (Ai0 )) ≤ Lr H r (Ai0 )
(270)
= Lr λr (Ai0 )
(271)
< ∞,
(272)
where (270) follows from Property ii) of Lemma H.13 with L the Lipschitz constant of ϕi0 , (271) is by
Property iii) of Lemma H.13 and the fact that Ai0 as a compact set is in B(Rr ), and finally (272) is a
consequence, again, of Ai0 being compact. This contradicts (269) and thereby concludes the proof.
March 20, 2018
DRAFT
47
A PPENDIX D
P ROOF OF L EMMA IV.1
Suppose that there exists a Borel measurable mapping g : Rn×m × Rn → Rm such that P[g(A, Ax) 6=
x] < 1 and set U = {x ∈ Rm : g(A, Ax) = x}. We first show that U ∈ B(Rm ). To this end, consider the
mapping hA : Rm → Rm , x 7→ g(A, Ax), which as the composition of two Borel measurable mappings,
namely, x 7→ (A, Ax) and g , is Borel measurable. Application of Lemma H.5 (with X = Y = Rm , f1
the identity mapping on Rm , and f2 = hA ) therefore establishes that
F : Rm → Rm × Rm
x 7→ (x, hA (x))
(273)
(274)
is Borel measurable. Now, consider the diagonal D = {(x, x) : x ∈ Rm } and note that D as the
inverse image of {0} under the Borel measurable mapping d : Rm × Rm → Rm , (u, v) 7→ u − v is
in B(Rm × Rm ). Since U = F −1 (D), we conclude that U ∈ B(Rm ). Now, P[x ∈ U] > 0 as P[x ∈
/
U] = P[g(A, Ax) 6= x] < 1 by assumption. It remains to show that A is one-to-one on U . To this end,
consider arbitrary but fixed u, v ∈ U and suppose that Au = Av . This implies g(A, Au) = g(A, Av).
As u, v ∈ U by assumption, this is only possible if u = v . Thus, A is one-to-one on U , which concludes
the proof.
A PPENDIX E
P ROOF OF L EMMA IV.3
Proof of i). The proof is by induction. Suppose that µ is s-analytic for s ∈ N \{1}. We have to show
that this implies (s − 1)-analyticity of µ. Consider C ∈ B(Rm ) with µ(C) > 0. Then, by Definition IV.1,
there exist a set A ∈ B(Rs ) of positive Lebesgue measure and a real analytic mapping h : Rs → Rm
of s-dimensional Jacobian Jh 6≡ 0 such that h(A) ⊆ C . By Property ii) of Lemma K.8, we can assume,
w.l.o.g., that h|A is an embedding. For each z ∈ R, let
Az = {v ∈ Rs−1 : (v z)T ∈ A}.
(275)
We now use Fubini’s Theorem to show that there exists a z0 ∈ R such that λs−1 (Az0 ) > 0. Concretely,
Z
0<
1A (z)Jh(z)dλs (z)
(276)
s
R
Z Z
s−1
T
T
=
1A (v z) Jh (v z) dλ (v) dλ1 (z)
(277)
R
Rs−1
Z Z
s−1
T
(278)
=
1Az (v)Jh (v z) dλ (v) dλ1 (z),
R
March 20, 2018
Rs−1
DRAFT
48
where (276) follows from Lemma H.2 with λs (A) > 0 and Jh(z) > 0 for all z ∈ A, and in (277) we
applied Theorem H.1. We conclude that there must exist a z0 ∈ R such that
Z
1Az0 (v)Jh (v z0 )T dλs−1 (v) > 0.
(279)
Rs−1
Again using Lemma H.2 establishes that λs−1 (Az0 ) > 0. It remains to show that there exists a real
analytic mapping h̃ : Rs−1 → Rm with h̃(Az0 ) ⊆ C and of (s − 1)-dimensional Jacobian J h̃ 6≡ 0. To this
end, consider the mapping
ϕ : Rs−1 → Rs
(280)
v 7→ (v z0 )T
(281)
and set h̃ = h◦ϕ : Rs−1 → Rm . Now, ϕ is real analytic thanks to Corollary K.1. Thus, h̃ as a composition
of real analytic mappings is real analytic by Corollary K.2. Furthermore, since ϕ(Az0 ) ⊆ A by (275), it
follows that h̃(Az0 ) ⊆ C . It remains to establish that J h̃ 6≡ 0. To this end, we first note that the chain
rule implies Dh̃(v) = Dh(v, z0 )Dϕ(v). Therefore,
rank(Dh̃(v)) = rank(Dh(v, z0 )Dϕ(v))
= rank Dh(v, z0 )(Is−1 0)T
≥s−1
(282)
for all v ∈ Az0 ,
(283)
(284)
where (284) is by Lemma K.12 upon noting that Dh(v, z0 ) ∈ Rm×s , with rank(Dh(v, z0 )) = s (recall
that (v z0 )T ∈ A for all v ∈ Az0 by (275) and that the s-dimensional Jacobian Jh(z) > 0 for all
z ∈ A), and (Is−1 0)T ∈ Rs×(s−1) . Since rank(Dh̃(v)) ≥ s − 1 and Dh̃(v) ∈ Rm×(s−1) , we conclude
that J h̃(v) > 0 for all v ∈ Az0 . Thus, J h̃ 6≡ 0, which finalizes the proof.
Proof of ii). Suppose that µ is s-analytic and consider C ∈ B(Rm ) with µ(C) > 0. We have to show
that H s (C) > 0. By Definition IV.1, there exist a set A ∈ B(Rs ) of positive Lebesgue measure and a
real analytic mapping h : Rs → Rm of s-dimensional Jacobian Jh 6≡ 0 such that h(A) ⊆ C . By Property
ii) of Lemma K.8, we can assume, w.l.o.g., that h|A is an embedding. We now use the area formula
Corollary H.3 to conclude that H s (C) > 0. Concretely,
Z
0<
Jh(z)dλs (z)
(285)
A
= H s h(A)
≤ H s (C),
March 20, 2018
(286)
(287)
DRAFT
49
where (285) is by Lemma H.2, λs (A) > 0, and Jh(z) > 0 for all z ∈ A, in (286) we applied the area
formula Corollary H.3 upon noting that h|A is one-to-one as an embedding and locally Lipschitz by real
analyticity of h, and (287) is by monotonicity of H s together with h(A) ⊆ C .
Proof of iii). ,,⇒”: Suppose that µ is s-analytic and there exists a set U ⊆ Rm such that µ = µ|U
and H s |U is σ -finite. Since H s is Borel regular (cf. Definition H.2), we may assume, w.l.o.g., that
U ∈ B(Rm ). By σ -finiteness of H s |U , there exist sets Vi ∈ B(Rm ), i ∈ N, such that
[
U=
U ∩ Vi
(288)
i∈N
and H s (U ∩ Vi ) < ∞ for all i ∈ N. For every i ∈ N, since U ∩ Vi as the intersection of two Borel sets
fi , where Wi is countably
is in B(Rm ) and H s (U ∩ Vi ) < ∞, we can write [43, p. 83] U ∩ Vi = Wi ∪ W
fi is purely H s -unrectifiable, i.e., H s (W
fi ∩ E) = 0 for all countably (H s , s)(H s , s)-rectifiable and W
f with W = S Wi
rectifiable sets E ⊆ Rm . This allows us to decompose U according to U = W ∪ W
i∈N
S
s
f
fi
f
and W = i∈N Wi . Since all the Wi are countably (H , s)-rectifiable, so is W ; and since all the W
f.
are purely H s -unrectifiable, so is W
f, it remains to show that µ(W)
f = 0 to conclude that
As µ = µ|U by assumption, and U = W ∪ W
f > 0.
µ = µ|W for the countably (H s , s)-rectifiable set W . Towards a contradiction, suppose that µ(W)
Analyticity of µ then implies that there exist a set A ∈ B(Rs ) of positive Lebesgue measure and a real
f. By countable
analytic mapping h : Rs → Rm of s-dimensional Jacobian Jh 6≡ 0 such that h(A) ⊆ W
subadditivity of λs , we can assume, w.l.o.g., that A is bounded; and by Property ii) in Lemma K.8, we
can assume, w.l.o.g., that h|A is an embedding. It follows that
Z
0<
Jh(z)dλs (z)
(289)
A
= H s h(A) ,
(290)
where (289) is by Lemma H.2, λs (A) > 0, and Jh(z) > 0 for all z ∈ A, and in (290) we applied the
area formula Corollary H.3 upon noting that h|A is one-to-one as an embedding and locally Lipschitz
by real analyticity of h. Moreover, as H s is Borel regular (cf. Property ii) in Definition H.2), there
must exist a set C ∈ B(Rm ) with h(A) ⊆ C and H s (C \ h(A)) = 0. It follows that C is countably
(H s , s)-rectifiable as H s (C \h(A)) = 0 and h is Lipschitz on the compact set A by Lemma H.9. But
this implies
f ∩ C) ≥ H s (h(A) ∩ C)
H s (W
March 20, 2018
(291)
= H s (h(A))
(292)
> 0,
(293)
DRAFT
50
f is purely H s -unrectifiable, thereby concluding the proof.
which is not possible as W
,,⇐”: Suppose that there exists a countably (H s , s)-rectifiable set W ⊆ Rm such that µ = µ|W . Since
H s is Borel regular (cf. Definition H.2), we may assume, w.l.o.g., that W ∈ B(Rm ). As this W is
countably (H s , s)-rectifiable, [35, Lemma 15.5] implies that H s |W is σ -finite.
A PPENDIX F
P ROOF OF L EMMA IV.4
Suppose that x ∈ Rm is s-analytic and u = f (x), where f : Rm → Rk is a real analytic immersion,
and consider C ∈ B(Rk ) with µu (C) > 0. We have to show that there exist a set A ∈ B(Rs ) of positive
Lebesgue measure and a real analytic mapping g : Rs → Rk of s-dimensional Jacobian Jg 6≡ 0 such that
g(A) ⊆ C . Set D = f −1 (C) ∈ B(Rm ). Since µx (D) = µu (C) > 0 and x is s-analytic, there exist a set
A ∈ B(Rs ) of positive Lebesgue measure and a real analytic mapping h : Rs → Rm of s-dimensional
Jacobian Jh 6≡ 0 such that h(A) ⊆ D. We set g = f ◦ h. Now, g(A) = f (h(A)) ⊆ f (D) ⊆ C .
Furthermore, g as the composition of real analytic mappings is real analytic by Corollary K.2. It remains
to show that Jg 6≡ 0. To this end, we first note that the chain rule implies Dg(z) = (Df )(h(z))Dh(z).
Since Jh 6≡ 0, there exists a z0 ∈ Rs such that Jh(z0 ) 6= 0. Thus
rank(Dh(z0 )) = s.
(294)
Now, as f is an immersion, it follows that k ≥ m and Jf > 0. Thus,
rank((Df )(h(z0 ))) = m.
(295)
Applying Lemma K.12 to (Df )(h(z0 )) ∈ Rk×m and Dh(z0 ) ∈ Rm×s and using (294) and (295)
establishes that rank(Dg(z0 )) ≥ s, which in turn implies Jg(z0 ) 6= 0 as Dg(z0 ) ∈ Rk×s .
A PPENDIX G
P ROOF OF L EMMA IV.6
Suppose that a ∈ Rk and b ∈ Rl with µa × µb λk+l , set x = a ⊗ b, and consider C ∈ B(Rkl )
with µx (C) > 0. We have to show that there exist a set A ∈ B(Rk+l−1 ) of positive Lebesgue measure
and a real analytic mapping h : Rk+l−1 → Rkl of (k + l − 1)-dimensional Jacobian Jh 6≡ 0 such that
h(A) ⊆ C . Let
E = {(aT bT )T : a ∈ Rk , b ∈ Rl , a ⊗ b ∈ C}.
March 20, 2018
(296)
DRAFT
51
Since C ∈ B(Rkl ) and ⊗ is Borel measurable, E as the inverse image of C under ⊗ is Borel measurable.
Furthermore, as x = a ⊗ b, it follows that
(µa × µb )(E) = µx (C)
> 0,
(297)
(298)
which implies λk+l (E) > 0 as µa × µb λk+l by assumption. Using Corollary H.1, we can write
Z
k+l
λ (E) =
λk+l−1 (Ez )dλ1 (z),
(299)
R
where, for each z ∈ R,
Ez =
aT v T
T
: a ∈ Rk , v ∈ Rl−1 , (aT v T z)T ∈ E .
(300)
As λk+l (E) > 0 we can conclude that there must exist a z0 ∈ R\{0} such that λk+l−1 (Ez0 ) > 0. We set
A = Ez0 . Next, we define the mapping
h : Rk+l−1 → Rkl
(c1 . . . ck+l−1 )T 7→ (c1 . . . ck )T ⊗ (ck+1 . . . ck+l−1 z0 )T ,
(301)
(302)
which is real analytic thanks to Corollary K.1, and we write
A=
aT v T
T
: a ∈ Rk , v ∈ Rl−1 , (aT v T z0 )T ∈ E
(303)
=
aT v T
T
: a ∈ Rk , v ∈ Rl−1 , a ⊗ (v T z0 )T ∈ C
(304)
= h−1 (C),
(305)
where (304) follows from (296), and (305) is by (301)–(302). By construction, h(A) ⊆ C . Furthermore,
A as the inverse image of C ∈ B(Rkl ) under a real analytic and, therefore, Borel measurable mapping
is in B(Rk+l−1 ). It remains to show that there exist an a0 ∈ Rk and a v0 ∈ Rl−1 such that
r
T T T T
T
T
T T
= det Dh aT
v
Dh a0 v0
Jh aT
0 v0
0
0
> 0.
This will be accomplished by showing that there exist an a0 ∈ Rk and a v0 ∈ Rl−1 such that
T T
rank Dh aT
v
= k + l − 1.
0
0
March 20, 2018
(306)
(307)
(308)
DRAFT
52
Now,
v
...
0
z0 0
0 v
0 z0
..
.
T T T
Dh a v
= ..
.
0 0
0 0
0 0
0
0
0
a1 Il−1
0
...
0
0
...
0
0
...
..
.
0
..
.
0
..
.
...
v
0
. . . z0
0
...
0
v
...
0
z0
0
a2 Il−1
0
..
.
ak−1 Il−1
0
ak Il−1
(309)
0
for general a ∈ Rk and v ∈ Rl−1 , and
0
...
0
0
Il−1
z0 0
0 0
0 z0
..
T
.
T
Dh aT
= ..
.
0 v0
0 0
0 0
0 0
...
0
0
...
0
0
...
..
.
0
..
.
0
..
.
...
0
0
. . . z0
0
...
0
0
...
0
z0
0
Il−1
0
..
.
Il−1
0
Il−1
0
0
0
0
(310)
for the specific choices a0 = (1 . . . 1)T ∈ Rk and v0 = (0 . . . 0)T ∈ Rl−1 . Since the (kl) × (k + l − 1)
T T has the regular (k + l − 1) × (k + l − 1) submatrix (recall that z 6= 0)
matrix Dh (aT
0
0 v0 )
0
Il−1
,
(311)
z0 I k
0
(308) indeed holds, which concludes the proof.
A PPENDIX H
T OOLS FROM (G EOMETRIC ) M EASURE T HEORY
In this appendix, we state some basic definitions and results from measure theory and geometric
measure theory used throughout the paper. We start with measure theory.
Definition H.1. [36, Definition 1.2.1] A measure (sometimes called pre-measure) on a nonempty set X
is a nonnegative function µ defined on all subsets of X with the following properties:
March 20, 2018
DRAFT
53
i) µ(∅) = 0.
ii) Monotonicity:
µ(A) ≤ µ(B)
for all A ⊆ B ⊆ X .
(312)
iii) Countable subadditivity:
!
[
µ
i∈N
Ai
≤
X
µ(Ai )
(313)
for all E ⊆ X .
(314)
i∈N
for all sequences {Ai }i∈N of sets Ai ⊆ X .
A set A ⊆ X is µ-measurable if it satisfies
µ(E) = µ(E ∩ A) + µ(E \A)
For a probability measure µx , countable subadditivity is equivalent to the union bound
#
"
X
[
P[x ∈ Ai ].
Ai ≤
P x∈
i∈N
(315)
i∈N
The collection of µ-measurable sets forms a σ -algebra [36, Theorem 1.2.4], which we denote by Sµ (X ).
For a topological space X , the smallest σ -algebra containing the open sets is the Borel σ -algebra
B(X ). A measurable space (X , S (X )) is a set X equipped with a σ -algebra S (X ). A measure space
(X , S (X ), µ) is a set X with a measure µ and a σ -algebra S (X ) ⊆ Sµ (X ).
Lemma H.1. [36, Theorem 1.2.5] If (X , S (X ), µ) is a measure space and {An }n∈N a sequence of sets
An ∈ S (X ), then the following properties hold.
i) If the sets An , n ∈ N, are pairwise disjoint, then µ is countably additive on their union. That is,
[
X
µ(An ).
(316)
µ
An =
n∈N
n∈N
ii) If An ⊆ An+1 for all n ∈ N, then
[
An = lim µ(An ).
µ
n∈N
n→∞
iii) If An+1 ⊆ An for all n ∈ N and µ(A1 ) < ∞, then
\
An = lim µ(An ).
µ
n∈N
n→∞
(317)
(318)
Definition H.2. [36, Definition 1.2.10] A measure µ on a topological space X is
i) Borel if all open sets are µ-measurable;
ii) Borel regular if it is Borel and, for each A ⊆ X , there exists a B ∈ B(X ) such that A ⊆ B and
µ(A) = µ(B).
March 20, 2018
DRAFT
54
As a consequence of Carathéodory’s criterion [36, Theorem 1.2.13], Lebesgue and Hausdorff measures
are Borel regular.
Definition H.3. (Measurable mapping) [44, Chapter 2]
i) Let (X , S (X )) and (Y, S (Y)) be measurable spaces. A mapping f : D → Y , with D ∈ S (X ), is
(S (X ), S (Y))-measurable if f −1 (A) ∈ S (X ) for all A ∈ S (Y).
ii) Let (X , S (X )) be a measurable space and Y a topological space. A mapping f : D → Y , with
D ∈ S (X ), is S (X )-measurable if f −1 (A) ∈ S (X ) for all A ∈ B(Y).
iii) Let X and Y be topological spaces. A mapping f : D → Y , with D ∈ B(X ), is Borel measurable
if f −1 (A) ∈ B(X ) for all A ∈ B(Y).
Lemma H.2. [44, Corollary 4.10] Let (X , S (X ), µ) be a measure space and consider a nonnegative
measurable function f : X → R. Then, f (x) = 0 µ-almost everywhere if and only if
Z
f (x)dµ(x) = 0.
(319)
X
Definition H.4. [36, Definition 1.3.25] The measure space (X , S (X ), µ) is σ -finite if X =
S
i∈N Ai ,
with Ai ∈ S (X ) and µ(Ai ) < ∞ for all i ∈ N. The measure space is finite if µ(X ) < ∞. A
Borel measure µ on a topological space X is σ -finite (respectively finite) if (X , B(X ), µ) is a σ -finite
(respectively finite) measure space.
For example, all probability measures are finite and the Lebesgue measure is σ -finite. However, the
s-dimensional Hausdorff measure with s < m is not σ -finite.
Theorem H.1. (Fubini’s theorem) [44, Theorem 10.9] Let (X , S (X ), µ) and (Y, S (Y), ν) be σ -finite
measure spaces and suppose that f : X × Y → R is nonnegative and (S (X ) ⊗ S (Y))-measurable. Then,
Z
ϕ(x) =
f (x, y)dν(y) is S (X )-measurable,
(320)
Y
Z
ψ(y) =
f (x, y)dµ(x) is S (Y)-measurable,
(321)
X
and
Z
Z
ϕ(x)dµ(x) =
X
X ×Y
f (x, y)d(µ × ν)(x × y)
(322)
Z
=
ψ(y)dν(y).
(323)
Y
March 20, 2018
DRAFT
55
Corollary H.1. Let (X , S (X ), µ) and (Y, S (Y), ν) be σ -finite measure spaces and suppose that A ∈
S (X ) ⊗ S (Y). Then,
Z
X
ν({y : (x, y) ∈ A})dµ(x) =
Z
X ×Y
Z
=
Y
1A (x, y)d(µ × ν)(x × y)
µ({x : (x, y) ∈ A})dν(y).
Proof. Follows from Theorem H.1 with f (x, y) = 1A (x, y), noting that
Z
1A (x, y)dν(y) = ν({y : (x, y) ∈ A}),
Y
Z
1A (x, y)dµ(x) = µ({x : (x, y) ∈ A}).
(324)
(325)
(326)
(327)
X
Lemma H.3. [45, Exercise 1.7.19] If X and Y are Euclidean spaces, then B(X × Y) = B(X ) ⊗ B(Y).
Lemma H.4. [44, Corollary 2.10] Let (X , S (X )) be a measurable space and suppose that {fi }i∈N is
a sequence of S (X )-measurable functions fi : X → R converging pointwise to f : X → R. Then, f is
S (X )-measurable.
Lemma H.5. Let X and Y be Euclidean spaces and suppose that fi : X → Y , i = 1, . . . , n, are Borel
measurable mappings. Then,
f : X → Ỹ = Y × · · · × Y
{z
}
|
(328)
n times
x 7→ (f1 (x), . . . , fn (x))
(329)
is Borel measurable.
Proof. Lemma H.3 implies B(Ỹ) = B(Y) ⊗ · · · ⊗ B(Y). Thus, B(Ỹ) is generated by sets U1 × · · · × Un ,
where Ui ∈ B(Y) for i = 1, . . . , n. It is therefore sufficient (cf. Part iii) in Definition H.3) to show
that f −1 (U1 × · · · × Un ) ∈ B(X ) for all Ui ∈ B(X ), i = 1, . . . , n. But f −1 (U1 × · · · × Un ) =
f1−1 (U1 )∩· · ·∩fn−1 (Un ) ∈ B(X ) for all Ui ∈ B(Y), i = 1, . . . , n, as all the fi are Borel measurable.
Corollary H.2. Let X be a Euclidean space and suppose that {fi }i∈N is a sequence of Borel measurable
mappings fi : X → Rn converging pointwise to f : X → Rn . Then, f is Borel measurable.
Proof. We can write f (x) = (f (1) (x), . . . , f (n) (x))T , where f (j) : X → R is Borel measurable for j =
T
(1)
(n)
(j)
1, . . . , n, and fi (x) = fi (x), . . . , fi (x) , where fi : X → R is Borel measurable for j = 1, . . . , n
(j)
and all i ∈ N. Then, for each j = 1, . . . , n, the sequence (fi )i∈N of Borel measurable functions
March 20, 2018
DRAFT
56
converges pointwise to f (j) , which is Borel measurable thanks to Lemma H.4. Finally, Lemma H.5
implies that f is Borel measurable as its individual components f (1) , . . . , f (n) are Borel measurable.
Lemma H.6. Let X and Y be topological spaces, C ∈ B(X ), f : C → Y Borel measurable, and
y0 ∈ Y \f (C). Consider h : X → Y with h|C = f and h|X \C = y0 . Then, h is Borel measurable.
Proof. We have to show that h−1 (A) ∈ B(X ) for all A ∈ B(Y). Consider an arbitrary but fixed
A ∈ B(Y) and suppose first that y0 ∈ A. Now, A ∈ B(Y) and {y0 } ∈ B(Y) imply A\{y0 } ∈ B(Y).
Therefore,
h−1 (A) = h−1 (A\{y0 }) ∪ h−1 ({y0 })
= f −1 (A\{y0 }) ∪ (X \C) ∈ B(X )
(330)
(331)
because f is Borel measurable, A\{y0 } ∈ B(Y), and X \C ∈ B(X ). If y0 ∈
/ A, then
h−1 (A) = f −1 (A) ∈ B(X )
(332)
as f is Borel measurable and A ∈ B(Y).
Lemma H.7. Let µ be a measure on Rk and consider A ⊆ Rk with µ(A) > 0. Then, there exists a
z0 ∈ A such that
µ Bk (z0 , r) ∩ A > 0
for all r > 0.
(333)
Proof. Suppose, to the contrary, that such a z0 does not exist. Then, for every z ∈ A, there must exist
a rz > 0 such that µ Bk (z, rz ) ∩ A = 0. With these rz , we write
[
A=
z∈A
(Bk (z, rz ) ∩ A).
(334)
It now follows from the Lindelöf property of Rk [42, Definition 5.6.19, Proposition 5.6.22] that there
must exist a countable subset {zi : i ∈ N} ⊆ A such that
A=
[
(Bk (zi , rzi ) ∩ A).
(335)
i∈N
Since µ Bk (zi , rzi ) ∩ A = 0 for all i ∈ N, the countable subadditivity of µ implies
µ(A) ≤
X
i∈N
µ Bk (zi , rzi ) ∩ A
= 0,
(336)
(337)
which contradicts the assumption µ(A) > 0 and thereby concludes the proof.
March 20, 2018
DRAFT
57
Lemma H.8. Let (X , B(X ), µ) be a σ -finite measure space and B ∈ B(X ). Then,
B = N ∪ A,
where µ(N ) = 0 and A =
S
i∈N Ai
(338)
with Ai ⊆ Rm compact for all i ∈ N.
Proof. By [43, Proposition 1.43], we can find, for each i ∈ N, a compact set Ki such that Ki ⊆ B and
S
µ(B\Ki ) ≤ 1/i. For j ∈ N, let Aj = ji=1 Ki . It follows that {Aj }j∈N is an increasing (in terms of ⊆)
sequence of compact sets Aj ⊆ B satisfying µ(B) − µ(Aj ) = µ(B \Aj ) ≤ 1/j for all j ∈ N. We set
S
A = j∈N Aj ⊆ B . Thus, µ(A) ≤ µ(B) by monotonicity of µ. Now,
µ(A) = lim µ(Aj )
(339)
j→∞
= µ(B) − lim µ(B\Aj )
j→∞
1
j→∞ j
(340)
≥ µ(B) − lim
(341)
= µ(B),
(342)
where (339) follows from Lemma H.1. We conclude that µ(A) = µ(B), which, together with A ⊆ B ,
yields (338).
Definition H.5. (Locally Lipschitz mapping) [46, Definition 3.118]
i) A mapping f : U → Rl , where U ⊆ Rk , is Lipschitz if there exists a constant L ≥ 0 such that
kf (u) − f (v)k2 ≤ Lku − vk2
for all u, v ∈ U.
(343)
The smallest constant L for (343) to hold is the Lipschitz constant of f .
ii) A mapping f : Rk → Rl is locally Lipschitz if every x ∈ Rk admits an open neighborhood Ux ⊆ Rk
containing x such that f |Ux is Lipschitz.
The following result establishes a necessary and sufficient condition for a mapping to be locally
Lipschitz. Since we could not find a proof for this statement in the literature, we present one here for
completeness.
Lemma H.9. The mapping f : Rk → Rl is locally Lipschitz if and only if f |K is Lipschitz for all
compact sets K ⊆ Rk .
Proof. ,,⇒”: Suppose that f : Rk → Rl is locally Lipschitz and consider a compact set K ⊆ Rk . We
have to show that f |K is Lipschitz. For every x ∈ K, by the local Lipschitz property of f , there exists
S
an open neighborhood Ux containing x such that f |Ux is Lipschitz. As K is compact and K ⊆ x∈K Ux ,
March 20, 2018
DRAFT
58
there must exist Uxi , denoted by Ui , i = 1, . . . , n, such that K ⊆
Sn
i=1 Ui .
For i = 1, . . . , n, let Li denote
the Lipschitz constant of f |Ui . Now, as shown below, there exists a δ > 0 such that, for every x, y ∈ K
with kx − yk2 < δ , we can find a Ui in the finite subcover of U with x, y ∈ Ui . With this δ we let
2∆
L = max L1 , . . . , Ln ,
,
(344)
δ
where ∆ := maxx∈K f (x). Consider an arbitrary pair x, y ∈ K. If kx − yk2 < δ , then this pair
must be in the same Ui , which implies kf (x) − f (y)k ≤ Li kx − yk ≤ Lkx − yk. If kx − yk2 ≥ δ ,
then kf (x) − f (y)k ≤ 2∆ = 2∆δ/δ ≤ (2∆/δ)kx − yk2 ≤ Lkx − yk2 . Thus, f |K is Lipschitz with
Lipschitz constant L. It remains to establish the existence of a δ with the desired properties. Towards a
contradiction, suppose that such a δ does not exist. This implies that, for every m ∈ N, we can find a pair
xm , ym ∈ K such that kxm −ym k2 < 1/m, but there is no Ui containing this pair. Since K×K is compact
by Tychonoff’s Theorem [41, Theorem 4.42], there exists a convergent subsequence {xmj , ymj }j∈N of
the sequence {xm , ym }m∈N [39, Theorem 2.41]. Let (x̄, ȳ) denote the limit point of this subsequence.
Note that x̄ and ȳ can not be in the same Ui , for if they were there would be an M ∈ N such that
(xmj , ymj ) ∈ Ui × Ui for all j ≥ M , which is not possible as xm and ym are in different Ui ’s for all
m ∈ N. But
x̄ − ȳ = lim (xmj − ymj )
j→∞
= 0,
(345)
(346)
where the second equality follows from limj→∞ k(xmj − ymj )k2 < limj→∞ 1/mj = 0 and continuity
of k · k2 . Thus, x̄ = ȳ , which is not possible as there is no Ui containing x̄ and ȳ .
,,⇐”: Suppose that f |K is Lipschitz for all compact sets K ⊆ Rk . It is sufficient to show that f |Bk (x,1)
is Lipschitz for every x ∈ Rk . As Bk (x, 1) is compact, f |Bk (x,1) is Lipschitz. The Lipschitz property of
f |Bk (x,1) therefore follows immediately from Bk (x, 1) ⊆ Bk (x, 1).
Lemma H.10. If f : Rm → Rn is locally Lipschitz and K ⊆ Rm is compact, then f (K) is compact.
Proof. Follows from continuity of f and [47, Theorem 2-7.2].
We will need the following composition property of locally Lipschitz mappings.
Lemma H.11. If f : Rk → Rm and g : Rm → Rn are locally Lipschitz, then h = g ◦ f : Rk → Rn is
locally Lipschitz.
Proof. Suppose that f : Rk → Rm and g : Rm → Rn are both locally Lipschitz. To prove that h = g ◦ f
is locally Lipschitz, by Lemma H.9, it is sufficient to show that h|K is Lipschitz for all compact sets
March 20, 2018
DRAFT
59
K ⊆ Rk . Let K ⊆ Rk be an arbitrary but fixed compact set and note that Q = f (K) is compact owing
to Lemma H.10. Thus, by Lemma H.9, f |K and g|Q are both Lipschitz with Lipschitz constants, say, L
and M , respectively. It follows that
kh(u) − h(v)k2 ≤ M kf (u) − f (v)k2
(347)
≤ LM ku − vk2
(348)
for all u and v in K, which implies that h|K is Lipschitz. As K was arbitrary, we conclude that h is
locally Lipschitz.
Definition H.6. (Differentiable mapping) [48, Definition 1.2] Let U be an open set in Rm . A function
f : U → R is
i) C 0 if it is continuous.
ii) C r with r ∈ N if, for all possible choices of r1 , . . . , rm ∈ N0 with
Pk
i=1 ri
= r, the partial
derivatives
∂r
f (x)
∂xr11 . . . ∂xrmm
(349)
exist and are continuous on U .
iii) C ∞ if it is C r for all r ∈ N.
For r ∈ N0 ∪ {∞}, a mapping f : U → Rn , x 7→ (f1 (x) . . . fn (x))T is C r if every component fi ,
i = 1, . . . , n, is C r .
It follows from the mean value theorem [49, Theorem 3.4] that C 1 mappings are locally Lipschitz.
Conversely, by Rademacher’s Theorem [36, Theorem. 5.1.11], every locally Lipschitz mapping f : Rm →
Rn has a L (Rm )-measurable (but not necessarily continuous) differential Df , which is defined λm -a.e.
Theorem H.2. (Sard’s theorem) [50] Let f : Rm → Rn , x 7→ (f1 (x) . . . fn (x))T be C r and set A =
{x : Jf (x) = 0}. The following statements hold.
i) If m ≤ n, then H m (f (A)) = 0.
ii) If m > n and r ≥ m − n + 1, then λn (f (A)) = 0.
Next, we state two fundamental results from geometric measure theory that are used frequently in the
paper, namely, the area and the coarea formula for locally Lipschitz mappings f : Rm → Rn .
March 20, 2018
DRAFT
60
Theorem H.3. (Area formula) [36, Theorem 5.1.1] If A ∈ B(Rm ), f : Rm → Rn is Lipschitz, and
g : A → R is nonnegative and Lebesgue measurable, and m ≤ n, then
Z
Z
m
Jf (x)dλ (x) =
card A ∩ f −1 ({y}) dH m (y).
A
(350)
Rn
Corollary H.3. (Area formula) If A ∈ B(Rm ), f : Rm → Rn is locally Lipschitz and one-to-one on A,
and m ≤ n, then
Z
Jf (x)dλm (x) = H m (f (A)).
(351)
A
Proof. For i ∈ N, let gi = 1Bm (0,i) . It follows that
Z
Z
m
Jf (x)dλ (x) = lim
gi (x)Jf (x)dλm (x)
i→∞ A
A
Z
= lim
J(f |Bm (0,i) )(x)dλm (x)
i→∞ A
Z
({y})
dH m (y)
= lim
card A ∩ f |−1
Bm (0,i)
i→∞ Rn
= lim H m f A ∩ Bm (0, i)
i→∞
(352)
(353)
(354)
(355)
!
=Hm
[
i∈N
f A ∩ Bm (0, i)
= H m (f (A)),
(356)
(357)
where (352) is by the Lebesgue Monotone Convergence Theorem [44, Theorem 4.6] upon noting that
(gi )i∈N is an increasing sequence of nonnegative Borel measurable functions converging to 1Rm , in (354)
we applied Theorem H.3 to f |Bm (0,i) , which is Lipschitz by Lemma H.9 as Bm (0, i) ⊆ Bm (0, i) and
Bm (0, i) is compact for all i ∈ N, in (355) we used that f is one-to-one, by assumption, which implies
1 if y ∈ f A ∩ Bm (0, i)
−1
(358)
card A ∩ f |Bm (0,i) ({y}) =
0 else,
and (356) is by Property ii) in Lemma H.1.
Theorem H.4. (Coarea formula) [36, Theorem 5.2.1] If f : Rm → Rn is Lipschitz, A ∈ B(Rm ), and
m ≥ n, then
Z
m
Z
Jf (x)dλ (x) =
A
Rn
H m−n A ∩ f −1 ({y}) dλn (y).
(359)
Corollary H.4. (Coarea formula) If f : Rm → Rn is locally Lipschitz, A ∈ B(Rm ), and m ≥ n, then
Z
Z
m
Jf (x)dλ (x) =
H m−n A ∩ f −1 ({y}) dλn (y).
(360)
A
March 20, 2018
Rn
DRAFT
61
Proof. We have
Z
Z
m
Jf (x)dλ (x) = lim
i→∞ A
A
J(f |Bm (0,i) )(x)dλm (x)
(361)
Z
H m−n A ∩ f |−1
({y})
dλn (y)
Bm (0,i)
i→∞ Rn
!
Z
[
n
A ∩ f |−1
=
H m−n
Bm (0,i) ({y}) dλ (y)
= lim
Rn
Z
=
Rn
(362)
(363)
i∈N
H m−n A ∩ f −1 ({y}) dλn (y),
(364)
where (361) follows from (352)–(353), in (362) we applied Theorem H.4 to f |Bm (0,i) , which is Lipschitz
by Lemma H.9 as Bm (0, i) ⊆ Bm (0, i) and Bm (0, i) is compact for all i ∈ N, and (363) is by the
Lebesgue Monotone Convergence Theorem [44, Theorem 4.6] upon noting that, for every i ∈ N, the
function
gi : Rn → R
(365)
y 7→ H m−n
A ∩ f |−1
({y})
Bm (0,i)
(366)
is Lebesgue measurable [36, Lemma 5.2.5] and, therefore, (gi )i∈N is a sequence of nonnegative increasing
Lebesgue measurable functions, with
!
lim gi (y) = H
m−n
i→∞
[
i∈N
A∩
f |−1
Bm (0,i) ({y})
for all y ∈ Rn
(367)
by Property ii) in Lemma H.1.
Lemma H.12. Main properties of modified Minkowski dimension:
i) A smooth s-dimensional submanifold U of Rm has dimMB (U) = s.
ii) dimMB (·) and dimMB (·) are monotonic with respect to ⊆.
iii) dimMB (U) ≤ dimB (U) and dimMB (U) ≤ dimB (U) for all nonempty sets U .
iv) If f is locally Lipschitz, then
dimMB (f (U)) ≤ dimMB (U)
(368)
dimMB (f (U)) ≤ dimMB (U)
(369)
for all nonempty subsets U in the domain of f .
v) dimMB is countably stable, i.e.,
!
dimMB
[
i∈N
Ui
= sup dimMB (Ui )
(370)
i∈N
for all countable collections of nonempty sets Ui , i ∈ N.
March 20, 2018
DRAFT
62
H d (U)
∞
0
dimH (U)
m
d
Figure 4. ([32, Figure 2.3]) Graph of H d (U) as a function of d ∈ [0, m] for a set U ⊆ Rm .
Proof. Properties i)–iv) follow from the definitions of lower and upper modified Minkowski dimension
and the properties of lower and upper Minkowski dimension listed in [32, Section 3.2]. Property v)
follows from [32, Equation 3.26] and [32, Proposition 3.8].
Definition H.7. (Hausdorff measures) [43, Definition 2.46] Let d ∈ [0, ∞) and U ⊆ Rm . The ddimensional Hausdorff measure of U , denoted by H d (U), is limδ→0 Hδd (U), where
(
)
X
[
V
(d,
1)
inf
diam(Ui )d : diam(Ui ) < δ, U ⊆
Ui
Hδd (U) =
2d
i∈N
(371)
i∈N
for all δ > 0, with
diam(U) :=
sup{ku − vk2 : u, v ∈ U}
if U 6= ∅
0
if U = ∅.
(372)
Definition H.8. (Hausdorff dimension) [43, Definition 2.51] The Hausdorff dimension of U ⊆ Rm ,
denoted by dimH (U), is sup{d ≥ 0 : H d (U) = ∞} = inf{d ≥ 0 : H d (U) = 0}, i.e., dimH (U) is the
value of d for which the sharp transition from ∞ to 0 in Figure 4 occurs.
Lemma H.13. Main properties of Hausdorff measures:
i) If a > b ≥ 0, then H a (E) > 0 implies H b (E) = ∞ for all E ⊆ Rm (cf. Fig. 4).
ii) If f : Rm → Rn is Lipschitz with Lipschitz constant L, then
H d (f (E)) ≤ Ld H d (E)
for all E ⊆ Rm .
(373)
iii) H m (E) = λm (E) for all E ∈ B(Rm ).
Proof. See [43, Proposition 2.49] and [43, Theorem 2.53].
March 20, 2018
DRAFT
63
Lemma H.14. Let xi > 0 for all i ∈ I and set
M=
sup
X
xi .
(374)
J ⊆I : |J |<∞ i∈J
If M < ∞, then I is at most countable.
Proof. Suppose that M is finite. For every k ∈ N0 , set Ik = {i ∈ I : 1/(k + 1) ≤ xi < 1/k} and
Mk =
sup
X
xi .
(375)
J ⊆Ik :|J |<∞ i∈J
Since M < ∞ and Mk ≤ M , we must have Mk < ∞ for all k ∈ N0 . But for every k ∈ N0 , by the
S
definition of Ik , Mk can only be finite if |Ik | < ∞. Thus, |Ik | < ∞ for all k ∈ N0 . Since I = k∈N Ik ,
we conclude that I is at most countable.
A PPENDIX I
P ROPERTIES OF S ET-VALUED M APPINGS
A set-valued mapping Φ : T → 2R
m
associates to each x ∈ T a set Φ(x) ⊆ Rm . Many properties of
ordinary mappings such as, e.g., measurability, can be extended to set-valued mappings. In this appendix,
we first briefly review properties of set-valued mappings and then state a result for set-valued mappings
needed in the existence proof of a measurable decoder in Section V-A.
Definition I.1. (Closed-valuedness of set-valued mappings) [51, Section 5] A set-valued mapping Φ : T →
m
2R
is closed-valued if, for every t ∈ T , the set Φ(t) is closed.
Definition I.2. (Inverse image of a set-valued mapping) [51, Section 14] For a set-valued mapping
m
Φ : T → 2R , the inverse image Φ−1 (A) of A ⊆ Rm is
Φ−1 (A) = {t ∈ T : Φ(t) ∩ A =
6 ∅}.
(376)
Definition I.3. (Measurable set-valued mapping) [51, Section 14] Let (T , S (T )) be a measurable space.
A set-valued mapping Φ : T → 2R
image Φ−1 (O) ∈ S (T ).
m
is S (T )-measurable if, for every open set O ⊆ Rm , the inverse
m
Lemma I.1. [51, Theorem 14.3] Let (T , S (T )) be a measurable space and Φ : T → 2R closed-valued.
Then, Φ is S (T )-measurable if and only if Φ−1 (K) ∈ S (T ) for all compact sets K ⊆ Rm .
m
Lemma I.2. [51, Corollary 14.6] Let (T , S (T )) be a measurable space and Φ : T → 2R
a S (T )-
measurable closed-valued mapping. Then, there exists a S (T )-measurable mapping f : Φ−1 (Rm ) → Rm
such that f (t) ∈ Φ(t) for all t ∈ Φ−1 (Rm ).
March 20, 2018
DRAFT
64
Definition I.4. (Normal integrand) [51, Definition 14.27] Let (T , S (T )) be a measurable space. An
extended real-valued function f : T × Rm → R ∪ {∞} ∪ {−∞} is a normal integrand with respect to
S (T ) if its epigraphical mapping
m
Sf : T → 2R
×R
(377)
t 7→ {(x, α) ∈ Rm × R : f (t, x) ≤ α}
(378)
is closed-valued and S (T )-measurable.
Lemma I.3. [51, Example 14.31] Let T = Rn×m × Rn and suppose that f : T × Rm → R ∪{∞}∪{−∞}
is continuous. Then, f is a normal integrand with respect to B(T ).
Lemma I.4. [51, Proposition 14.33] Let (T , S (T )) be a measurable space. An extended real-valued
function f : T × Rm → R ∪ {∞} ∪ {−∞} is a normal integrand with respect to S (T ) if and only if,
for every α ∈ R ∪ {∞} ∪ {−∞}, the level-set mapping
m
Lα : T → 2 R
(379)
t 7→ {x ∈ Rm : f (t, x) ≤ α}
(380)
is S (T )-measurable and closed-valued.
We can now state the result on set-valued mappings needed to prove the existence of a measurable
decoder in Section V-A.
Lemma I.5. Let (T , S (T )) be a measurable space, α ∈ R, and f : T × Rm → R ∪ {∞} ∪ {−∞}.
Suppose that f is a normal integrand with respect to S (T ) and K ⊆ Rm is compact and nonempty.
Then, the following properties hold.
i) The set-valued mapping
m
PK : T → 2R
t 7→ {x ∈ K : f (t, x) ≤ α}
(381)
(382)
is S (T )-measurable and closed-valued.
ii) PK−1 (Rm ) = {t ∈ T : ∃x ∈ K with f (t, x) ≤ α} ∈ S (T ).
iii) There exists a S (T )-measurable mapping
pK : PK−1 (Rm ) → Rm
t 7→ pK (t) ∈ PK (t).
March 20, 2018
(383)
(384)
DRAFT
65
Proof. We start with the proof of i). For each t ∈ T , we can write PK (t) = Lα (t) ∩ K, where Lα is
the S (T )-measurable closed-valued level-set mapping from Lemma I.4. Since Lα is closed-valued and
the intersection of a closed set with a compact set is closed, PK is closed-valued. To prove that PK is
S (T )-measurable it suffices, thanks to Lemma I.1, to show that PK−1 (A) ∈ S (T ) for all compact sets
A ⊆ Rm . To this end, let A ⊆ Rm be an arbitrary but fixed compact set. Since the intersection of two
compact sets is compact it follows that K ∩ A is compact. As Lα is S (T )-measurable and K ∩ A is
−1
−1
compact, L−1
α (K ∩ A) ∈ S (T ) by Lemma I.1. Therefore, as Lα (K ∩ A) = PK (A), we can conclude
that PK−1 (A) ∈ S (T ). Since A was arbitrary, this proves i). Now, S (T )-measurability of PK implies
PK−1 (Rm ) ∈ S (T ), and thereby ii). Finally, the existence of the S (T )-measurable mapping pK in iii)
follows from i) and Lemma I.2.
A PPENDIX J
P ROPERTIES OF S EQUENCES OF F UNCTIONS IN S EVERAL VARIABLES
In this appendix, we summarize properties of sequences of functions in several variables needed in
the proof of Theorem III.2. We start with a result that establishes a sufficient condition for uniform
convergence.
Theorem J.1. (Weierstrass M -test) [39, Theorem 7.10] Consider a sequence {fn }n∈N of functions
fn : Rk → R and suppose that there exists a sequence {Mn }n∈N of nonnegative real numbers Mn
such that
for all x ∈ Rk and n ∈ N
|fn (x)| ≤ Mn
and
P
n∈N Mn
(385)
< ∞. Then, the sequence {sn }n∈N of partial sums
sn =
n
X
fi
(386)
i=1
converges uniformly to a function f :
Rk
→ R.
Next, we state a result that allows us to interchange the order of summation and differentiation for
certain sequences of differentiable functions. We start with the corresponding statement for differentiable
functions in one variable.
Theorem J.2. [39, Theorem 7.17] Consider a sequence {fn }n∈N of functions fn : R → R, each of
which is differentiable on the closed interval [a, b] ⊆ R, such that limn→∞ fn (x0 ) exists and is finite for
March 20, 2018
DRAFT
66
at least one x0 ∈ [a, b]. Let fn0 denote the derivative of fn , n ∈ N. If {fn0 }n∈N converges uniformly on
[a, b], then {fn }n∈N converges uniformly on [a, b] to a function f : R → R satisfying
df (x)
= lim fn0 (x)
n→∞
dx
for all x ∈ [a, b].
(387)
Corollary J.1. Consider a sequence {fn }n∈N of functions fn : Rk → R converging uniformly to f : Rk →
R. Suppose that there exists an i ∈ {1, . . . , k} such that the partial derivatives ∂fn (x)/∂xi , denoted by
fn0 (x), exist and are finite for all x ∈ Rk and n ∈ N. If the sequence {fn0 }n∈N converges uniformly, then
∂f (x)
= lim fn0 (x)
n→∞
∂xi
for all x ∈ Rk .
(388)
Proof. Suppose that the sequence {fn0 }n∈N converges uniformly. Let x = (x1 . . . xk )T ∈ Rk be arbitrary
but fixed and denote by {gn }n∈N the sequence of functions gn (t) = fn ((x1 . . . xi−1 t xi+1 . . . xk )T ).
Since {fn }n∈N converges uniformly to f by assumption, and gn (xi ) = fn (x) for all n ∈ N, it follows
that
lim gn (xi ) = lim fn (x)
n→∞
n→∞
= f (x).
(389)
(390)
For each n ∈ N, let gn0 denote the derivative of gn . Since {fn0 }n∈N converges uniformly, so does {gn0 }n∈N .
In particular, {gn0 }n∈N converges uniformly on a closed interval [a, b] ⊆ R containing xi . Therefore,
Theorem J.2 implies that {gn }n∈N converges uniformly on [a, b] to a function g : R → R satisfying
dg(t)
= lim gn0 (t)
n→∞
dt
for all t ∈ [a, b].
(391)
But g(xi ) = f (x) and gn0 (xi ) = fn0 (x) for all n ∈ N, which implies ∂f (x)/∂xi = limn→∞ fn0 (x). As x
was arbitrary, this finishes the proof.
A PPENDIX K
P ROPERTIES OF R EAL A NALYTIC M APPINGS AND C ONSEQUENCES T HEREOF
In this appendix, we review material on real analytic mappings our strong converse established in
Sections IV and VII is based on. We start with the definition of a real analytic mapping.
Definition K.1. (Real analytic mapping) [52, Definition 2.2.1] Let U be an open set in Rm .
i) A function f : U → R is real analytic on U if, for each x ∈ U , f may be represented by a convergent
power series in some open neighborhood of x; if U = Rm , then f is real analytic.
ii) A mapping f : U → Rn , x 7→ (f1 (x) . . . fn (x))T is real analytic on U if every component fi ,
i = 1, . . . , n, is real analytic on U ; if U = Rm , then f is real analytic.
March 20, 2018
DRAFT
67
Lemma K.1. [52, Corollary 1.2.4] If a power series
f (x) =
∞
X
j=0
aj (x − α)j
(392)
converges on an open interval I ⊆ R, then f is real analytic on I .
Lemma K.2. [52, Proposition 2.2.2] Let U and V be open sets in Rm . If f : U → R is real analytic on
U and g : V → R is real analytic on V , then f + g and f · g are both real analytic on U ∩ V . Furthermore,
if g(x) 6= 0 for all x ∈ U ∩ V , then f /g is real analytic on U ∩ V .
Corollary K.1. All polynomials on Rm are real analytic.
Lemma K.3. [52, Proposition 2.2.3] Let U be an open set in Rm and suppose that f : U → R is real
analytic on U . Then, the partial derivatives—of arbitrary order—of f are real analytic on U .
Lemma K.4. [52, Proposition 2.2.8] Let U be an open set in Rm and V an open set in Rn . Suppose
that f : U → Rn is real analytic on U and g : V → Rk is real analytic on V . Then, for every x ∈ U with
f (x) ∈ V , there exists an open set W ⊆ Rm such that x ∈ W and (g ◦ f )|W : W → Rk is real analytic
on W .
Corollary K.2. If f : Rm → Rn and g : Rn → Rk are both real analytic, then g ◦ f : Rm → Rk is real
analytic.
Lemma K.5. [52, p. 83] A real analytic function f : Rm → R vanishes either identically or on a set of
Lebesgue measure zero.
The following definition extends the notion of a diffeomorphism of class C r [34, Definition 3.1.18]
to a real analytic diffeomorphism.
Definition K.2. (Real analytic diffeomorphism) Let U ⊆ Rn be an open set and ρ : U → Rn real analytic.
The mapping ρ is a real analytic diffeomorphism if V = ρ(U) is an open set and the inverse ρ−1 of ρ
exists on V and is real analytic on V .
Theorem K.1. [52, Theorem 2.5.1] Let U ⊆ Rm be open and f : U → Rm real analytic. If Jf (x0 ) > 0
for some x0 ∈ U , then f −1 exists on an open set V ⊆ Rm containing f (x0 ) and is real analytic on V .
Corollary K.3. Let U be an open set in Rm and suppose that f : U → Rm is real analytic on U . If there
exists an x0 ∈ U such that Jf (x0 ) > 0, then there exists an r > 0 such that f |Bm (x0 ,r) is a real analytic
diffeomorphism.
March 20, 2018
DRAFT
68
Proof. Suppose that there exists an x0 ∈ U such that Jf (x0 ) > 0. Since Jf (x0 ) > 0, Theorem K.1
implies that there exists an open set V ⊆ Rm such that f (x0 ) ∈ V , and f −1 exists on V and is real
analytic on V . Since V is open and f (x0 ) ∈ V , there must exist an ε > 0 such that Bm (f (x0 ), ε) ⊆ V . By
continuity of f , which follows from real analyticity, there must exist an r > 0 such that f (Bm (x0 , r)) ⊆
Bm (f (x0 ), ε) ⊆ V . We set W = f (Bm (x0 , r)). Summarizing, f is real analytic on Bm (x0 , r) and f −1
exists on W = f (Bm (x0 , r)) and is real analytic on W . It remains to show that W is open. This follows
by noting that thanks to W = (f −1 )−1 (Bm (x0 , r)), W is the inverse image of an open set under a real
analytic (and therefore continuous) mapping, and is hence open. We conclude that f |Bm (x0 ,r) is a real
analytic diffeomorphism.
Corollary K.4. Let U be an open set in Rm and suppose that f : U → Rn with n ≥ m is real analytic on
U . If there exists an x0 ∈ U such that Jf (x0 ) > 0, then there exists an r > 0 such that f is one-to-one
on Bm (x0 , r).
Proof. Suppose that there exists an x0 ∈ U such that Jf (x0 ) > 0. Then, Jf (x0 ) > 0 and n ≥ m imply
rank(Df (x0 )) = m. Thus, the n × m matrix Df (x0 ) has m linearly independent row vectors. Denote
the indices of m such linearly independent row vectors by {i1 , . . . , im } and consider the mapping
g : U → Rm
(393)
x 7→ (fi1 (x) . . . fim (x))T .
(394)
Since f is real analytic on U , so is g . Furthermore, rank(Dg(x0 )) = m and hence Jg(x0 ) > 0. Corollary
K.3 therefore implies the existence of an r > 0 such that g|Bm (x0 ,r) is a real analytic diffeomorphism. In
particular, g is one-to-one on Bm (x0 , r), which in turn implies that f is one-to-one on Bm (x0 , r).
Next, we show that the square root is a real analytic diffeomorphism on the set of positive real numbers.
Lemma K.6. The function
√
: R+ → R+ , x 7→
√
x, where R+ = {x ∈ R : x > 0}, is a real analytic
diffeomorphism.
Proof. The function (·)2 : R+ → R+ , x 7→ x2 is real analytic by Corollary K.1. Let y ∈ R+ be arbitrary
√
but fixed and set x = y . Since dx2 /dx = 2x > 0, Theorem K.1 implies that there exists an r > 0
√
such that the inverse of (·)2 , given by ·, exists on (y − r, y + r) and is real analytic on (y − r, y + r).
√
√
As y was arbitrary, it follows that · is real analytic on R+ . Finally, since (·)2 is the inverse of · and
p
√
R+ = R+ is open, · is a real analytic diffeomorphism.
March 20, 2018
DRAFT
69
Lemma K.7. If f : Rm → Rn is real analytic, so is Jf . In particular, Jf vanishes either identically or
on a set of Lebesgue measure zero.
p
Proof. Suppose that f : Rm → Rn is real analytic. Recall that Jf (x) = g(x), where g : Rm → R,
det(Df (x)(Df (x))T ) if n < m
g(x) =
(395)
det((Df (x))T Df (x)) else.
√
Lemmata K.2 and K.3 imply that g is real analytic. As · is real analytic on R+ by Lemma K.6, real
analyticity of Jf follows from Lemma K.4. Finally, as Jf is real analytic, it vanishes by Lemma K.5
either identically or on a set of Lebesgue measure zero.
We have the following important properties of real analytic mappings.
Lemma K.8. Let h : Rs → Rm be a real analytic mapping of s-dimensional Jacobian Jh 6≡ 0. Then, the
following properties hold.
i) The set O = {z ∈ Rs : Jh(z) > 0} is open and satisfies λs (Rs \O) = 0.
ii) For each set A ∈ B(Rs ) of positive Lebesgue measure there exists a set B ∈ B(Rs ) of positive
Lebesgue measure such that B ⊆ A and the mapping h|B is an embedding, i.e., Jh(z) > 0 for all
z ∈ B and h is one-to-one on B .
Proof. Openness of O follows from continuity of Jh, and Lemma K.7 together with Jh 6≡ 0 implies
λs (Rs \O) = 0. To prove ii), consider A ∈ B(Rs ) of positive Lebesgue measure. As λs (Rs \O) = 0,
with O from i), it follows that λs (A ∩ O) > 0. Thus, by Lemma H.7, there must exist a z0 ∈ A ∩ O
such that
λs (Bs (z0 , r) ∩ A ∩ O) > 0
for all r > 0.
(396)
Since Jh(z0 ) > 0, which follows from z0 ∈ O, Corollary K.4 implies that there must exist an r0 > 0
such that h is one-to-one on Bs (z0 , r0 ). Setting B = Bs (z0 , r0 ) ∩ A ∩ O concludes the proof.
Definition K.3. (Real analytic submanifold) [52, Definition 2.7.1] A subset M ⊆ Rn is an m-dimensional
real analytic submanifold of Rn if, for each y ∈ M, there exist an open set U ⊆ Rm and a real analytic
immersion f : U → Rn such that y ∈ f (U) and open subsets of U are mapped onto relatively open
subsets in M. Here, a subset W ⊆ M is called relatively open in M if there exists an open set V ⊆ Rn
such that W = V ∩ M.
March 20, 2018
DRAFT
70
Lemma K.9. Let M ⊆ Rs be a t-dimensional real analytic submanifold of Rs and z0 ∈ M. Then, there
exist a real analytic embedding ζ : Rt → Rs and an η > 0 such that
ζ(0) = z0 ,
(397)
Bs (z0 , η) ∩ M ⊆ ζ Rt ,
(398)
and ζ Rt is relatively open in M, i.e., there exists an open set V ⊆ Rs such that ζ Rt = V ∩ M.
Proof. Since M ⊆ Rs is a t-dimensional real analytic submanifold of Rs , Definition K.3 implies the
existence of an open set U ⊆ Rt and a real analytic immersion ξ : U → Rs that maps open subsets of U
onto relatively open subsets in M and satisfies z0 = ξ(u0 ) with u0 ∈ U . As ξ is an immersion,
rank(Dξ(v)) = t
for all v ∈ U.
(399)
Since U is open and u0 ∈ U , there exists a ρ > 0 such that Bt (u0 , ρ) ⊆ U , which implies in turn
ξ Bt (u0 , ρ) ⊆ ξ(U).
(400)
Using Corollary K.4 and Jξ(u0 ) > 0 (recall that ξ is an immersion) we may choose ρ sufficiently small
for ξ to be one-to-one on Bt (u0 , ρ). As ξ(Bt (u0 , ρ)) is relatively open in M, there must exist an open
set V ⊆ Rs such that
ξ Bt (u0 , ρ) = V ∩ M.
(401)
Now, as V is open and z0 = ξ(u0 ) ∈ V , we can find an η > 0 such that Bs (z0 , η) ⊆ V , which, together
with (401), yields
Bs (z0 , η) ∩ M ⊆ ξ Bt (u0 , ρ) .
(402)
Let κ : Rt → Bt (0, ρ) be the real analytic diffeomorphism constructed in Lemma K.10 below and set
ζ : Rt → Rs
(403)
v 7→ ξ(κ(v) + u0 ).
(404)
The mapping ζ is a real analytic mapping by Lemmata K.2 and K.4. Clearly, ζ is one-to-one on Rt as κ is
a diffeomorphism and ξ is one-to-one on Bt (u0 , ρ). Since ζ Rt = ξ(Bt (u0 , ρ)), (402) establishes (398)
and (401) proves that ζ Rt is relatively open in M. Finally, (397) follows from ζ(0) = ξ(κ(0) + u0 ) =
ξ(u0 ) = z0 , where in the second equality we used (408) in Lemma K.10 below. It remains to show that
ζ is an immersion, which is effected by proving that rank(Dζ(v)) = t for all v ∈ Rt . The chain rule
implies
Dζ(v) = (Dξ)(κ(v) + u0 )Dκ(v)
March 20, 2018
for all v ∈ Rt .
(405)
DRAFT
71
It now follows
i) from (410) in Lemma K.10 below that rank(Dκ(v)) = t for all v ∈ Rt , and
ii) from (399) and κ(v) + u0 ∈ Bt (u0 , ρ) ⊆ U that rank((Dξ)(κ(v) + u0 )) = t for all v ∈ Rt .
Applying Lemma K.12 to (Dξ)(κ(v) + u0 ) ∈ Rs×t and Dκ(v) ∈ Rt×t , and using i) and ii) above yields
rank(Dζ(v)) ≥ t for all v ∈ Rt , which in turn implies Jζ(v) > 0 for all v ∈ Rt , thereby concluding
the proof.
Lemma K.10. For ρ > 0, the mapping
κ : Rk → Bk (0, ρ)
(406)
x 7→ p
(407)
is a real analytic diffeomorphism on Rk satisfying
ρx
1 + kxk22
κ(0) = 0,
(408)
κ(Rk ) = Bk (0, ρ),
rank(Dκ(x)) = k
(409)
for all x ∈ Rk .
(410)
Proof. It follows immediately from the definition of κ that κ(0) = 0. The mapping κ is real analytic
thanks to Lemmata K.2, K.4, and K.6. Now, consider the mapping
σ : Bk (0, ρ) → Rk
y 7→ p
ρ2
(411)
y
− kyk22
.
(412)
Again, σ is real analytic thanks to Lemmata K.2, K.4, and K.6. Since (κ◦σ)(y) = y for all y ∈ Bk (0, ρ),
it follows that κ(Rk ) = Bk (0, ρ). Moreover, as (σ ◦ κ)(x) = x for all x ∈ Rk , σ is the inverse of κ,
which establishes that κ is a real analytic diffeomorphism on Rk . Finally, since (σ ◦ κ)(x) = x for all
x ∈ Rk , the chain rule implies Ik = D(σ ◦ κ)(x) = (Dσ)(κ(x))Dκ(x) for all x ∈ Rk , which yields
(410).
Proposition K.1. [52, Proposition 2.7.3] Let M ⊆ Rn . The following statements are equivalent:
i) M is a m-dimensional real analytic submanifold of Rn .
ii) For each z ∈ M there exist an open set U ⊆ Rn with z ∈ U , a real analytic diffeomorphism
ρ : U → Rn , and a m-dimensional linear subspace L ⊆ Rn , such that
ρ(M ∩ U) = ρ(U) ∩ L.
March 20, 2018
(413)
DRAFT
72
Proposition K.1 allows us to state the following sufficient condition on the inverse image of a point
under a real analytic function to result in a real analytic submanifold.
Lemma K.11. Let ψ : Rs → R be a real analytic function, y0 ∈ ψ(Rs ), and set My0 = ψ −1 ({y0 }).
Suppose that Jψ(z) > 0 for all z ∈ My0 . Then, My0 is a (s − 1)-dimensional real analytic submanifold
of Rs .
Proof. We may assume, w.l.o.g., that y0 = 0 (if y0 6= 0, we set ψ̃(z) = ψ(z) − y0 and prove the lemma
with ψ̃ in place of ψ , noting that My0 = ψ̃ −1 ({0}) and J ψ̃(z) = Jψ(z) for all z ∈ Rs .) The proof
is effected by verifying that M0 satisfies Statement ii) of Proposition K.1. Let z0 ∈ M0 be arbitrary
but fixed and set aT
1 = Dψ(z0 ). Since Jψ(z0 ) > 0 by assumption, we must have a1 6= 0. Choose
a2 , . . . , as ∈ Rs such that A = (a1 . . . as )T is a regular matrix and consider the mapping
ρ : Rs → Rs
T
z 7→ ψ(z) aT
2 z . . . as z
(414)
T
.
(415)
Note that Dρ(z0 ) = A. Since rank(A) = s by construction, Jρ(z0 ) > 0. It therefore follows from
Corollary K.3 that there exists an r > 0 such that ρ|Bs (z0 ,r) is a real analytic diffeomorphism. Finally,
we can write
ρ(M0 ∩ Bs (z0 , r)) = ρ({z ∈ Bs (z0 , r) : ψ(z) = 0})
(416)
= ρ({z ∈ Bs (z0 , r) : eT
1 ρ(z) = 0})
(417)
= ρ(Bs (z0 , r)) ∩ L,
(418)
where (416) follows from M0 = ψ −1 ({0}), (417) is by (415), and in (418) we set L = {(w1 . . . ws )T ∈
Rs : w1 = 0}.
Lemma K.12. [37, Property (c), Chapter 0.4.5] If A ∈ Rm×k and B ∈ Rk×n , then
rank(AB) ≥ rank(A) + rank(B) − k.
(419)
R EFERENCES
[1] G. Alberti, H. Bölcskei, C. De Lellis, G. Koliander, and E. Riegler, “Lossless linear analog compression,” in Proc. IEEE
Int. Symp. Inf. Theory, 2016, pp. 2789–2793.
[2] D. L. Donoho and P. B. Stark, “Uncertainty principles and signal recovery,” SIAM J. Appl. Math., vol. 49, no. 3, pp.
906–931, Jun. 1989.
[3] D. L. Donoho, “Compressed sensing,” IEEE Trans. Inf. Theory, vol. 52, no. 4, pp. 1289–1306, Apr. 2006.
March 20, 2018
DRAFT
73
[4] E. J. Candès, J. Romberg, and T. Tao, “Robust uncertainty principles: Exact signal reconstruction from highly incomplete
frequency information,” IEEE Trans. Inf. Theory, vol. 52, no. 2, pp. 489–509, Feb. 2006.
[5] E. J. Candès, Y. C. Eldar, D. Needell, and P. Randall, “Compressed sensing with coherent and redundant dictionaries,”
Appl. Comp. Harm. Anal., vol. 31, no. 1, pp. 59–73, Jul. 2011.
[6] P. Kuppinger, G. Durisi, and H. Bölcskei, “Uncertainty relations and sparse signal recovery for pairs of general signal
sets,” IEEE Trans. Inf. Theory, vol. 58, no. 1, pp. 263–277, Jan. 2012.
[7] R. Gribonval and M. Nielsen, “Sparse representations in unions of bases,” IEEE Trans. Inf. Theory, vol. 49, no. 12, pp.
3320–3325, Jan. 2003.
[8] M. Elad and A. M. Bruckstein, “A generalized uncertainty principle and sparse representation in pairs of bases,” IEEE
Trans. Inf. Theory, vol. 48, no. 9, pp. 2558–2567, Sep. 2002.
[9] D. L. Donoho and M. Elad, “Optimally sparse representation in general (nonorthogonal) dictionaries via `1 minimization,”
in Proc. Natl. Acad. Sci. USA, vol. 100, no. 5, 2003, pp. 2197–2002.
[10] J. A. Tropp, “Greed is good: Algorithmic results for sparse approximation,” IEEE Trans. Inf. Theory, vol. 50, no. 10, pp.
2231–2242, Oct. 2004.
[11] L. R. Welch, “Lower bounds on the maximum cross correlation of signals,” IEEE Trans. Inf. Theory, vol. 20, no. 3, pp.
397–399, May 1974.
[12] E. J. Candès and T. Tao, “Near-optimal signal recovery from random projections: Universal encoding strategies?” IEEE
Trans. Inf. Theory, vol. 52, no. 12, pp. 5406–5425, Dec. 2006.
[13] J. A. Tropp, “On the conditioning of random subdictionaries,” Appl. Comp. Harm. Anal., vol. 25, pp. 1–24, 2008.
[14] G. Pope, A. Bracher, and C. Studer, “Probabilistic recovery guarantees for sparsely corrupted signals,” IEEE Trans. Inf.
Theory, vol. 59, no. 5, pp. 3104–3116, May 2013.
[15] R. G. Baraniuk, M. Davenport, R. DeVore, and M. Wakin, “A simple proof of the restricted isometry property for random
matrices,” Constructive Approximation, vol. 28, no. 3, pp. 253–263, Dec. 2008.
[16] Y. Wu and S. Verdú, “Rényi information dimension: Fundamental limits of almost lossless analog compression,” IEEE
Trans. Inf. Theory, vol. 56, no. 8, pp. 3721–3748, Aug. 2010.
[17] ——, “Optimal phase transitions in compressed sensing,” IEEE Trans. Inf. Theory, vol. 58, no. 10, pp. 6241–6263, Oct.
2012.
[18] D. Stotz, E. Riegler, E. Agustsson, and H. Bölcskei, “Almost lossless analog signal separation and probabilistic uncertainty
relations,” IEEE Trans. Inf. Theory, vol. 63, no. 9, pp. 5445–5460, Sep. 2017.
[19] G. Koliander, G. Pichler, E. Riegler, and F. Hlawatsch, “Entropy and source coding for integer-dimensional singular random
variables,” IEEE Trans. Inf. Theory, vol. 62, no. 11, pp. 6124–6154, 2016.
[20] Y. C. Eldar and M. Mishali, “Robust recovery of signals from a structured union of subspaces,” IEEE Trans. Inf. Theory,
vol. 55, no. 11, pp. 5302–5316, Nov. 2009.
[21] R. G. Baraniuk, V. Cevher, M. F. Duarte, and C. Hegde, “Model-based compressive sensing,” IEEE Trans. Inf. Theory,
vol. 56, no. 4, pp. 1982–2001, Apr. 2010.
[22] P. Feng and Y. Bresler, “Spectrum-blind minimum-rate sampling and reconstruction of multiband signals,” in Proc. IEEE
Int. Conf. Acoust. Speech Signal Process., 1996, pp. 1688–1691.
[23] M. Mishali and Y. C. Eldar, “Blind multiband signal reconstruction: Compressed sensing for analog signals,” IEEE Trans.
Signal Process., vol. 57, no. 3, pp. 993–1009, Mar. 2009.
[24] R. G. Baraniuk and M. B. Wakin, “Random projections of smooth manifolds,” Found. Comput. Math., vol. 9, no. 1, pp.
51–77, Feb 2009.
March 20, 2018
DRAFT
74
[25] M. Stojnic, F. Parvaresh, and B. Hassibi, “On the reconstruction of block-sparse signals with an optimal number of
measurements,” IEEE Trans. Signal Process., vol. 57, no. 8, pp. 3075–3085, Aug. 2009.
[26] Y. C. Eldar, P. Kuppinger, and H. Bölcskei, “Block-sparse signals: Uncertainty relations and efficient recovery,” IEEE
Trans. Signal Process., vol. 58, no. 6, Jun. 2010.
[27] J. Huang and T. Zhang, “The benefit of group sparsity,” Ann. Stat., vol. 38, no. 4, pp. 1978–2004, 2010.
[28] E. J. Candès and B. Recht, “Exact matrix completion via convex optimization,” Found. Comput. Math., vol. 9, no. 6, pp.
717–772, 2009.
[29] E. J. Candès and Y. Plan, “Tight oracle inequalities for low-rank matrix recovery from a minimal number of noisy random
measurements,” IEEE Trans. Inf. Theory, vol. 4, no. 57, pp. 2342–2359, Apr. 2011.
[30] E. Riegler, D. Stotz, and H. Bölcskei, “Information-theoretic limits of matrix completion,” in Proc. IEEE Int. Symp. Inf.
Theory, Jun. 2015, pp. 1836–1840.
[31] J. C. Robinson, Dimensions, Embeddings, and Attractors.
[32] K. Falconer, Fractal Geometry, 1st ed.
Cambridge, NY: Cambridge University Press, 2011.
New York, NY: Wiley, 1990.
[33] T. Kawabata and A. Dembo, “The rate-distortion dimension of sets and measures,” IEEE Trans. Inf. Theory, vol. 40, no. 5,
pp. 1564–1572, Sep. 1994.
[34] H. Federer, Geometric Measure Theory.
New York, NY: Springer, 1969.
[35] P. Mattila, Geometry of Sets and Measures in Euclidean Space: Fractals and Rectifiability. Cambridge, UK: Cambridge
Univ. Press, 1999.
[36] S. G. Krantz and H. R. Parks, Geometric Integration Theory.
[37] R. A. Horn and C. R. Johnson, Matrix Analysis, 2nd ed.
Princeton, NJ: Birkhäuser, 2008.
Cambridge, U.K.: Cambridge Univ. Press, 2013.
[38] K. Stromberg, “An elementary proof of Steinhaus’s theorem,” in Proc. of the American Mathematical Society, vol. 36,
no. 1, 1976, p. 308.
[39] W. Rudin, Principles of Mathematical Analysis, 3rd ed.
[40] J. M. Lee, Introduction to Smooth Manifolds, 2nd ed.
New York, NY: McGraw-Hill, 1976.
New York, NY: Springer, 2013.
[41] G. Folland, Real Analysis: Modern Techniques and Their Applications, 2nd ed.
[42] H. H. Sohrab, Basic Real Analysis, 2nd ed.
New York, NY: Wiley, 2013.
New York, NY: Birkhäuser, 2014.
[43] L. Ambrosio, N. Fusco, and D. Pallara, Functions of Bounded Variation and Free Discontinuity Problems.
New York,
NY: Oxford Univ. Press, 2000.
[44] R. G. Bartle, The Elements of Integration and Lebesgue Measure.
[45] T. Tao, An Introduction to Measure Theory.
New York, NY: Wiley, 1995.
Providence RI: AMS, 2011.
[46] L. Gasiński and N. S. Papageorgiou, Exercises in Analysis-Part 2: Nonlinear Analysis, ser. Problem Books in Mathematics.
Cham, Switzerland: Springer, 2016.
[47] T.-W. Ma, Classical Analysis on Normed Spaces.
Singapore: World Scientific Pub. Co., 1995.
[48] F. W. Warner, Foundations of Differentiable Manifolds and Lie Groups.
[49] C. H. Edwards, Advanced Calculus of Several Variables.
New York, NY: Springer, 1971.
New York, NY: Academic Press, Inc., 1973.
[50] A. Sard, “The measure of the critical values of differentiable maps,” Bull. Amer. Math. Soc., vol. 48, no. 12, pp. 883–890,
1942.
[51] R. T. Rockafellar and R. J.-B. Wets, Variational Analysis, 3rd ed.
Heidelberg, Germany: Springer, 2009.
[52] S. G. Krantz and H. R. Parks, A Primer of Real Analytic Functions, 2nd ed.
March 20, 2018
Basel, Switzerland: Birkhäuser, 2002.
DRAFT
| 7cs.IT
|
Elite Bases Regression: A Real-time Algorithm for
Symbolic Regression
Chen Chen†‡ , Changtong Luo∗† , Zonglin Jiang†‡
arXiv:1704.07313v2 [cs.DS] 15 May 2017
† State
Key Laboratory of High Temperature Gas Dynamics, Institute of Mechanics, Chinese Academy of Sciences
Beijing 100190, China
‡ School of Engineering Sciences, University of Chinese Academy of Sciences, Beijing 100049, China
∗ Email: [email protected]
Abstract—Symbolic regression is an important but challenging
research topic in data mining. It can detect the underlying
mathematical models. Genetic programming (GP) is one of the
most popular methods for symbolic regression. However, its
convergence speed might be too slow for large scale problems
with a large number of variables. This drawback has become a
bottleneck in practical applications. In this paper, a new nonevolutionary real-time algorithm for symbolic regression, Elite
Bases Regression (EBR), is proposed. EBR generates a set of
candidate basis functions coded with parse-matrix in specific
mapping rules. Meanwhile, a certain number of elite bases are
preserved and updated iteratively according to the correlation
coefficients with respect to the target model. The regression
model is then spanned by the elite bases. A comparative study
between EBR and a recent proposed machine learning method
for symbolic regression, Fast Function eXtraction (FFX), are conducted. Numerical results indicate that EBR can solve symbolic
regression problems more effectively.
I. I NTRODUCTION
Symbolic regression aims to find a mathematical model that
can describe and predict a given system based on observed
input-response data. It plays an increasingly important role
in many engineering applications including signal processing
[23], system identification [20], industrial data analysis [13],
etc. Unlike conventional linear/nonlinear regression methods
that assume a linear/nonlinear trend, or require you to provide
a mathematical model of a given form, symbolic regression
searches an appropriate model from a space of all possible
expressions S defined by a set of given arithmetic operations
(e.g., +, −, ×, ÷, etc.) and mathematical functions (e.g., sin,
cos, exp, ln, etc.). Mathematically, symbolic regression finds
the best combination of these operations and functions, and
optimizes the model structure and coefficients simultaneously,
which can be described as follows:
X
f (x(i) ) − yi ,
(1)
f ∗ = arg min
f ∈S
i
where x(i) ∈ Rd , yi ∈ R are numeric input-response data,
and f is the model function. However, given that symbolic
regression is a kind of global optimization problem in data
mining, there are still several difficulties in dealing with both
structure optimization and coefficient optimization at the same
time [2]. Hence, how to use a appropriate method to solve a
symbolic regression problem is considered as a kaleidoscope
in this research field [5].
Genetic programming (GP) [12], as a evolutionary computing (EC) technique, is one of the most popular methods for
symbolic regression in recent years. Corresponding different
improved versions of basic GP have also been proposed
continually, for instance, linear genetic programming (LGP)
[9], gene expression programming (GEP) [6], parse-matrix
evolution (PME) [14], etc. The core idea of GP is to apply
Darwin’s theory of natural evolution to the artificial world of
computers and modeling. Theoretically, GP can get accurate
results provided that the computation time is long enough.
However, due to its stochasticity, GP is difficult to realize
the real-time calculation and hard to give repeated results. In
addition, the convergence speed of GP might be too slow for
large scale problems with a large number of variables. Hence,
GP’s practical applications are limited.
To overcome these difficulties, more recently, a number of
researchers have focused mainly on using non-evolutionary
optimization methods to solve symbolic regression problems.
McConaghy [16] presented the first non-evolutionary algorithm based on machine learning for symbolic regression,
which confined its search space to generalized linear space.
Icke & Bongard [10] proposed a hybrid algorithm which
combined deterministic machine learning method and conventional GP. Worm [22] introduced a deterministic machine
learning algorithm, Prioritized Grammar Enumeration (PGE),
in his thesis, which made a large reduction to the search
space. Deklel et al. [3] presented a new approach based on
artificial neural networks, which could solve problems with
large number of inputs and even more complex examples and
applications.
Among these non-evolutionary methods, FFX is the first
deterministic symbolic regression implementation. Based on
generalized linear model (GLM), FFX applies a kind of machine learning method, namely pathwise regularized learning,
to identify the best coefficients and bases in GLM, which is
given by
β ∗ = min ky − B(x) · βk2 + λ2 kβk2 + λ1 kβk1 ,
(2)
where B(x) = (φ1 (x), φ2 (x), ..., φN (x)) represents the vector
of N univariate and bivariate generated bases and β is the
regression parameter of GLM. λ1 and λ2 are set to λ1 = λ
and λ2 = (1 − ρ)λ respectively, where λ is the regularization
weight. It is reported that FFX can be an order of magnitude
faster than GP, and has been successfully applied to analog
circuit design and modeling [7], the reliability analysis for
analog circuit [15], etc.
However, note that pathwise regularized learning (2) needs
to solve a quadratic optimization problem, which is equal
to solve a large linear system. With the increase of basis
number N , the computation cost will increase quadratically.
This restricts the speed of FFX in further promote for large
scale problems.
In this paper, we propose a new non-evolutionary algorithm,
Elite Bases Regression (EBR), to solve symbolic regression
problems. Different from FFX, most of the generated bases are
discarded, and simultaneously, only elite bases are preserved
and updated iteratively according to the correlation coefficients
with respect to the target model. The regression model is then
spanned by the elite bases. This makes EBR do not need
to solve a large-scale system of linear equations. Hence, it
can save computation time with little memory overhead. The
performance of EBR is compared with FFX. Numerical results
indicate that EBR has lower normalized mean square error
(NMSE) and concise regression models than FFX’s.
The presentation of this paper is organized as follows:
related concepts used in EBR algorithm is introduced in
Section II, EBR algorithm is described in Section III, and
experiments and results are presented and discussed in Section
IV. The paper is concluded in Section V with remarking the
future work.
II. R ELATED CONCEPTS
USED IN
EBR
ALGORITHM
A. Generalized linear model
Generalized linear model (GLM) [18] is a generalization of
classical linear regression model. GLM aims to find f ∗ in a
finite dimensional space of functions spanned by a set of given
basis functions. In other words, GLM specifies a set of bases
φ0 , φ1 , ..., φN from RN to R and finds f ∗ in the form of a
linear combination of N basis functions φi , i = 1, 2, ..., N :
f ∗ = β0 +
N
X
βi φi (x),
(3)
i=1
where βi is the regression parameter. In Elite Basis Regression
(EBR) algorithm, the regression model is spanned by a set of
elite bases. The number of elite bases is denoted by npresv .
EBR algorithm is inspired from the expansion method in
mathematics. In theoretical analysis, two main methods of
linear expansion, namely Taylor series and Fourier series, are
very powerful tools that are widely applied to many research
fields [17], [4]. However, Taylor series can only be used in
local expansion (the neighborhood of a certain point) with
special functions, while Fourier series is utilized in periodic
functions exclusively. We hope to find a global and universal
expansion strategy in practical applications. This motivates
us to design such a kind of global and universal linear
approximation method for symbolic regression.
B. Correlation coefficient
Correlation coefficient aims to measure linear relationship
between two vectors, and has a wide application scope in
statistical analysis. Suppose a function with n continuous
variables
f (x) = f (x1 , x2 , ..., xn ) , xi ∈ [ai , bi ], i = 1, 2, ..., n.
(4)
For each variable xi , a column vector xi is defined after a
set of random sample points in [ai , bi ] are generated. That is
T
(m)
(2)
(1)
Xi = xi = xi , xi , ..., xi
, where m is the number
of sample points. Thus, we can get a column vector with m
components respect to the initial function (4)
(1)
(1) (1)
xn
x2
x1
(2)
(2) (2)
xn
x1 x2
F (X) = F
.. , .. , . . . , ..
.
. .
(m)
(m)
(m)
x2
x1
xn
(1)
(1)
(1)
(1)
f x1 , x2 , . . . , xn
f
(2)
(2)
(2)
(2)
f x1 , x2 , . . . , xn
f
= .
=
.
..
.
.
(m)
f
(m)
(m)
(m)
f x1 , x2 , . . . , xn
(5)
From the above discussion, for an n-dimensional problem
in EBR, the target model f (x1 , x2 , ..., xn ) and a certain
generated basis φ (x1 , x2 , ..., xn ) can be regarded as two
column vectors of m components after sampling, namely
T
Y = F (X) = f (1) , f (2) , · · · , f (m) and ξΦ = Φ (X) =
T
φ(1) , φ(2) , · · · , φ(m) . The correlation coefficient of these
two vectors, Y and ξΦ , can be expressed as
Cov (ξΦ , Y )
p
,
ρξΦ ,Y = p
D(ξΦ ) D(Y )
(6)
where the operator D represents variance.
Note that the basis functions might be nonlinear, but the
ensemble process of the GLM is still linear. Therefore, correlation test is effective in EBR. That is, if |ρξΦ ,Y | is close to 1,
Y and ξΦ are closely related. Particularly, when |ρξΦ ,Y | = 1,
Y and ξΦ are linearly correlated in probability one.
In fact, once we regard two nonlinear functions as two
column vectors after sampling, it still makes sense that correlation coefficient can be used for correlation analysis of
nonlinear function. To give an illustrative example, consider a
two-dimensional test function
f (x1 , x2 ) = x1 x2 + sin ((x1 − 1) (x2 − 1)) ,
(7)
and a certain basis function
φ(x1 , x2 ) = x1 x2 ,
(8)
where x ∈ [−3, 3]2 . To enhance the stability of the test, the
distribution of sample points in [−3, 3]2 should be as uniform
as possible by using controlled sampling method of Latin
hypercube design [1]. Then, a correlation coefficient of the
Fig. 2.
(a) The test function.
An example of parse-matrix encoding process of EBR.
We can see that the encoding of parse-matrix is a natural
and easy process. Note that the second and the third columns
a.2 , a.3 are used to control the dimension of a given problem.
The parse-matrix encoding scheme ensures the generated candidate basis functions can cover all possible bases, according
to the mapping rules in Table I. In the following section, we
will use this table to do our numerical experiments (see Section
IV).
III. E LITE BASIS R EGRESSION
ALGORITHM
two vector functions Y and ξΦ could be obtained, which is
|ρξΦ ,Y | = 0.9838. This means Y and ξΦ are closely related.
Note that, as is shown in Fig. 1, the simple basis function (8)
successfully ‘sketch out’ the landscape of test function (7).
The new algorithm is a kind of deterministic linear approximation method. It does not rely on other GP method. To
illustrate our proposed algorithm more clearly, in this section,
EBR is introduced by two main parts, which are generation
and preservation of the bases in Section III-A and ensemble
and evaluation of the model in Section III-B. Then, we discuss
the method of complexity control in EBR in Section III-C.
Finally, the whole procedure of EBR is introduced in Section
III-D.
C. Parse-matrix encoding scheme
A. Generation and preservation of bases
The generation of basis functions is a crucial step in EBR.
However, multiple nested-loop used to enumerate the possible
bases in FFX is not easy to extend. On the other hand, the
complexity of bases is implemented with the if-else statement,
which makes FFX difficult to control the complexity and limits
its ability of modeling highly nonlinear target function. Hence,
parse-matrix encoding scheme becomes a good candidate for
bases generation engine of EBR.
Parse-matrix encoding scheme was initially provided for
parse-matrix evolution (PME) [14], a special version of GP.
PME use a two-dimensional matrix with integer entries to
express a chromosome (individual), which can carry more information than conventional chromosome representations [8],
[19]. The matrix representation makes PME easy to control
the complexity and simple to program.
In EBR, basis functions are coded with parse-matrix encoding scheme. This process could be sketched in Fig. 2. Suppose
an example mapping table defined as Table I. Then, a given
basis function φ = sin(x + y) can be produced in the steps
listed in Table II. According to the mapping table (see Table
I) and the encoding steps (see Table II), the basis function
φ = sin(x + y) can be described by a parse-matrix of order
3 × 3 as follows:
1 1 2
A = 3 3 2
(9)
12 3 1
In EBR, the basis function is coded with parse-matrix
encoding scheme in specific mapping rules (refer to Table
I), which has been discussed in Section II-C. Enumeration
method is used to generate a set of candidate basis functions.
This process ensures the generated bases can cover all possibilities in given arithmetic operations (e.g., +, −, ×, ÷,
etc.) and mathematical functions (e.g., sin, cos, exp, ln, etc.).
Simultaneously, npresv elite bases are preserved and updated
iteratively according to the correlation coefficients with respect
to the given target model.
(b) The basis function.
Fig. 1. An example of correlation analysis applied to 2D nonlinear function.
Remark 1. The number of preserved elite bases npresv determines the most computation costs of EBR and the complexity
of the regression model. A more detailed discussion of this
control parameter will be conducted in Section IV-C.
Remark 2. If the the correlation coefficients of two generated
bases with respect to the target model, namely ρξΦ ,Y and
ρ∗ξΦ ,Y , are very close to zero (e.g., |ρξΦ ,Y | − |ρ∗ξΦ ,Y | <
10−7 ), one basis function of them will be discarded.
B. Ensemble and evaluation of the model
The regression model is established by GLM. Note that the
number of bases participated in computation is npresv , not
all generated candidate bases. This makes EBR can realize
real-time computation. We take normalized mean square error
(NMSE) as test error in the numerical study, which is used to
TABLE I
A N EXAMPLE MAPPING TABLE FOR A
a.1
T
a.2 , a.3
expr
1
s1
1
x1
2
s2
2
x2
3
+
3
f
4
−
5
∗
6
/
TABLE II
E NCODING STEPS OF THE BASIS FUNCTION sin(x + y).
T
x1
+
sin
Step
1
2
3
Fig. 3.
s1
x1
f
f
s2
x2
x2
x1
Update
f = x1
f = x1 + x2
f = sin(x1 + x2 )
Complexity control of EBR algorithm.
evaluate the regression model. The NMSE is defined by Eq.
(10):
NMSE (f, f ∗ ) =
kf − f ∗ k22
,
kf k22
(10)
∗
where the f and f are the target model and regression model,
respectively.
C. Complexity control
In EBR, complexity control mainly includes two parts,
namely the inner control and outer control.
Recall from the parse-matrix encoding scheme in Section
II-C that, the inner control aims to determine the complexity of
a basis function and the dimension of a given symbolic regression problem, by controlling the rows of the parse-matrix (9)
and the the second and the third columns a.2 , a.3 , respectively.
More precisely, for a muti-dimensional problem, the entries aij
are bounded integers according to the mapping rules in Table
I, namely the parse-matrix entries a.1 ∈ {1, 2, 3, ..., 13} and
a.j ∈ {1, 2, 3, ..., d + 1} (j = 2, 3), where d is the dimension
of the target model. The outer control in EBR focuses on the
overall complexity of the regression model, and is controlled
by the prespecified npresv . A detailed discussion of this control
parameter is in Section IV-C. The complexity control makes
EBR algorithm have a good flexibility. The relations between
the inner control and outer control are shown in Fig. 3.
D. Procedure
Up to this point in our discussion, we have a general
understanding of EBR algorithm. The main steps of EBR is
also given in the flow-chart of EBR algorithm in Fig. 4. The
procedure of EBR could be described as follows.
Procedure of EBR:
7
√
8
s21
BASIS FUNCTION .
9
1/s1
10
log
11
exp
12
sin
13
cos
Step 1. Initialize: Input the number of basis functions
needed to be preserved npresv , the sampling range
[a, b] and the test function f .
Step 2. Generate candidate basis: An enumeration
method is used to generate a candidate basis function
φi coded with parse-matrix encoding schemes.
Step 3. Evaluate and preserve:
(3.1) Evaluate: Evaluate each generated candidate
basis by its correlation with respect to target model.
(3.2) Preserve: Preserve the basis with higher correlation with respect to target model and update the
elite bases.
Step 4. Repeat step 2 and 3 until all possible bases
are evaluated. The preserved npresv functions form
a set of elite bases for GLM.
Step 5. Model: Solving the GLM (3) to get regression
model based on the set of elite bases. Output the
decoded model and its test error (NMSE).
IV. N UMERICAL
RESULTS AND DISCUSSION
In order to test the performance of our proposed algorithm,
several numerical experiments of classical symbolic regression
problems are conducted. These problems, given in Table III, V
and VI, are mostly taken from references [14], [11]. The results
are compared with machine learning algorithm Fast Function
eXtraction (FFX) [16]. NMSE is used as the test error, which
is governed by Eq. (10).
The test problems are partitioned into two groups: exact
fitting problems (Section IV-A) and linear approximation
fitting problems (Section IV-B), to test EBR’s capabilities
of structure optimization and coefficient optimization, respectively. Additionally, we give a discussion on control parameter
(npresv ) of EBR in section IV-C. To enhance the stability of
the EBR, the distribution of sample points in should be as
uniform as possible. Therefore, controlled sampling method,
Latin hypercube sampling [1] and orthogonal sampling [21]
are preferred to generate training points (sample points).
A. Exact fitting problems
In this test group (Case 1-16, see Table III), all of cases
have exact fitting models, which recover the target models.
In other words, these cases are chosen to test the ability of
function structure optimization for EBR, which is one of the
most concerned issues in symbolic regression.
The full names of the notations in Table III are the dimension of modeled system (Dim), the target model (Target
model), the domain of the target model (Domain), the number
of training points (No. samples), total bases generated by EBR
(Total bases of EBR), the number of bases of EBR in final
form of identities. Particularly, in Case 6 and 16, namely
f = sin x21 cos x1 − 1 and f = 6 sin x1 cos x2 , note that
EBR can reduce a product term to summation of trigonometric
function.
Moreover, almost all of the number of the bases in final
results of EBR is far less than FFX, while the results are
much better than FFX. This is because that FFX does not
cover a larger operation and function space. Some cases of test
errors of FFX are extremely large (namely Case 6, 11, 13 and
14), which shows that FFX is poor at providing a symbolic
regression model in highly nonlinear function. From all of
the results above, we can draw a conclusion that the EBR
has a good capability of structure optimization in symbolic
regression problems.
Start
Set up control parameters
Generate sample points
Generation
and
preservation
of the bases
Generate basis function based on
parse-matrix encoding scheme
Calculate the correlation coefficient
of basis and the target model
Preserve and update the
elite bases
B. Linear approximation fitting problems
Are all bases
generated?
No
Yes
Solve the GLM
Ensemble
and
evaluation
of the model
Is the NMSE
satisfied ?
No
Yes
Output the decoded model
and its NMSE
Stop
Fig. 4.
The flow chart of EBR algorithm.
regression model (No. bases of EBR), the number of bases
of FFX in final regression model (No. bases of FFX), the test
error of FFX in final regression model (Test error(%) of FFX).
1) Control parameter setting: Here, we set npresv = 35 for
1D and 2D cases, npresv = 200 for 3D cases, where npresv
is the prespecified parameter in step 1 of EBR (see Section
III-D). The region is chosen as [−3, 3],[−3, 3]2 and [−3, 3]3
for one-dimensional (1D), 2D and 3D problems, respectively.
If there is a square-root function or logarithmic function in
our target model, the left endpoint of the interval is replaced
to 1. The number of training point is set up to 30, 302 and
303 for 1D, 2D and 3D problems, respectively. The order of
the parse-matrix is fixed to 3.
2) Numerical results: Table III shows the test models
and performance of EBR and corresponding results of FFX.
Numerical results (regression models) are listed in Table IV.
3) Discussion: The computation results from Table III
show that EBR can recover the target models for all these test
problems (Case 1-16). In Case 5, 6, 9 and 13-16, although
EBR does not find the bases involved in the corresponding
target models, EBR might give the regression models in
As we know, practical engineering applications of symbolic
regression are generally complex, so whether an algorithm can
give an approximation fitting model becomes very important.
The purpose of this test group is to show EBR’s capability of
providing an linear approximation regression model. This can
be regraded as the ability of coefficient optimization.
1) Control parameter setting: Similar to the first test group,
we set npresv = 35 to all cases. The number of training point
is set up to 30 and 302 for 1D and 2D problems, respectively.
The order of the parse-matrix is fixed to 3.
2) Numerical results: An overview numerical results are
listed in Table V.
3) Discussion: In this test group, 8 cases show the performance of EBR for its linear approximation fitting, which
could be regarded as a capability of coefficient optimization.
To recap briefly for Section II-A, EBR is deemed to a linear
approximation method based on GLM. We hope to find a
global and universal expansion strategy, different from Taylor
series and Fourier series.
Note that the regression models of EBR are closer to the
target model. For most cases, EBR performs better than FFX
for its succinct regression models (less number of bases),
especially for highly nonlinear target models (Case 17, 21
and 24). Meanwhile, the comparison of NMSEs in Table
IV indicates that EBR has much lower NMSE at all cases.
EBR exhibits reasonable accuracy, which indicate that the
proposed algorithm EBR can fit the target functions in forms of
polynomial functions, trigonometric, logarithmic and bivariate
functions. Good performances for modeling target functions
show the potential of EBR to be applied in practical applications.
C. Study on control parameters
The paramount control parameter in EBR is the npresv . In
this part, the value of npresv to be set is different from the
previous test groups, in order to study its influence on the
regression model. The results of this part (Case 25-28) is given
in Table VI. Note that the target models given in Table VI are
all highly nonlinear functions in 1D and 2D.
TABLE III
T EST MODELS AND PERFORMANCE OF EBR AND FFX (C ASE 1-16).
No.
Dim
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
1
1
1
1
1
1
2
2
2
2
2
2
2
2
3
3
Target model
√
x
x2 − sin x
cos x2 − x
sin x + 2x
x4 + x3 + x2 + x
sin x21 ∗ cos x1 − 1
x
x1 2
ln(x1 + x2 )
x21 + x1 − x2
x1 + 2x2
sin(x21 − x2 )
x1 − ex1 +x2
(x1 + x2 )/x2
6 sin x1 cos x2
x1 + x2 + x3
x1 x2 + x2 x3
Domain
No.
samples
[1, 3]
[1, 3]
[−3, 3]
[−3, 3]
[−3, 3]
[−3, 3]
[1, 3]2
[1, 3]2
[−3, 3]2
[−3, 3]2
[−3, 3]2
[−3, 3]2
[−3, 3]2
[−3, 3]2
[−3, 3]3
[−3, 3]3
30
30
30
30
30
30
302
302
302
302
302
302
302
302
103
103
Total
bases
of EBR
7488
7493
5510
5481
5512
5511
7499
7489
5507
5505
5509
5489
5493
5515
17163
17139
No.
bases
of EBR
1
2
1
1
4
2
1
1
4
2
1
1
2
2
3
4
No.
bases
of FFX
5
5
8
4
8
9
8
8
8
2
9
10
2
9
11
2
Test
error(%)
of FFX
0.869
0.988
6.19
0.672
2.08
16.9
0.991
0.851
0.986
0.968
28.0
1.00
7.42
25.6
0.987
0.99
TABLE IV
E XACT FITTING RESULTS OF EBR.
No.
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
Regression model√
f ∗ = 0.7071 ∗ x + x
f ∗ = (−1) ∗ (sin x − x) + (x2 − x)
f ∗ = cos x2 − x
f ∗ = sin x + x + x
f ∗ = −0.5 ∗ (xex − x) + 0.5 ∗ (x4 + x) + 0.5 ∗ (x2 + xex ) + 0.5 ∗ (x2 + x)2
f ∗ = (−1) + 0.5 ∗ sin(x21 + x1 ) + 0.5 ∗ sin(x21 − x1 )
f ∗ = ex2 ∗ln x1
f ∗ = 0.5 ∗ ln(x1 + x2 )2
f ∗ = 0.5 ∗ (x21 − x2 ) + 0.5 ∗ (x21 + x1 ) + 0.5 ∗ (ex1 − 2x2 ) − 0.5 ∗ (ex1 − x2 − x1 )
f ∗ = x1 + x2 + x2
f ∗ = sin(x21 − x2 )
f ∗ = (−1) ∗ (ex1 +x2 − x1 )
f ∗ = 0.2 ∗ (2x1 − x2 )/x2 + 0.6 ∗ (2x2 + x1 )/x2
f ∗ = 3 ∗ sin(x1 + x2 ) + 3 ∗ sin(x1 − x2 )
f ∗ = 0.5 ∗ (x1 + x2 ) + 0.25 ∗ (2x2 + 2x3 ) + 0.25 ∗ (2x1 + 2x3 )
f ∗ = (−0.25) ∗ (x21 − 2x1 x2 ) + 0.25 ∗ (x21 + 2x1 x2 ) + 0.25 ∗ (x22 ) + 0.25 ∗ (x23 + 2x2 x3 )
TABLE V
T EST MODELS AND PERFORMANCE OF EBR AND FFX (C ASE 17-24).
No.
Dim
Target model
Domain
17
18
19
20
21
22
23
24
1
1
1
1
2
2
2
2
0.3x sin(2πx)
ln(x + 1) + ln(x2 + 1)
x5 + x4 + x3 + x2 + x
x6 + x5 + x4 + x3 + x2 + x
ln(x1 + x2 ) + sin(x1 + x2 )
x41 − x31 + x22 /2 − x2
x31 /5 + x32 /2 − x2 − x1
x1 x2 + sin ((x1 − 1)(x2 − 1))
[−3, 3]
[1, 3]
[−3, 3]
[−3, 3]
[1, 3]2
[−3, 3]2
[−3, 3]2
[−3, 3]2
Using the given control parameter npresv = 35, EBR failed
to get the exact fitting models or the approximate models with
NMSE ≤ 5% in this test group (expect the case 25). However,
once we increase the npresv towards a large value, for instance,
npresv = 200, EBR might provide a approximate models in
a complex form. That is, the basis number of all regression
models is larger than 20.
In this test group, the performance of EBR is also compared
with the FFX’s. Although the bases number of regression
models of EBR is more than FFX’s, its NMSEs is still much
lower than FFX’s, as shown in Table VI. The increasing of
npresv will cause the increasing computation cost of EBR.
No.
bases
of EBR
7
4
7
11
10
5
7
4
Test
error(%)
of EBR
4.37
6.58e-10
1.45e-7
4.97e-4
1.19e-2
5.87e-2
0.26
3.69
No.
bases
of FFX
10
5
6
7
8
16
12
14
Test
error(%)
of FFX
21.09
0.967
1.91
2.08
16.25
3.47
0.991
4.18
So, in practical applications, we do not set npresv to a large
value. npresv < 40 is acceptable.
V. C ONCLUSION
A new deterministic algorithm, Elite Bases Regression
(EBR), for symbolic regression has been proposed in this
paper. It is a linear approximation method based on the generalized linear model (GLM). In EBR, all generated candidate
bases are coded with parse-matrices in specific mapping rules.
The correlation coefficients with respect to the target model are
used to evaluate the candidate bases, and only a certain number
of elite bases are preserved to form the regression model. This
TABLE VI
S TUDY ON CONTROL PARAMETER .
No.
Dim
Target model
Domain
25
26
27
28
1
1
1
2
0.3x sin (2πx)
sin x3 + x
sin x sin x + x2
2
sin x1 + sin x2
[−3, 3]
[−3, 3]
[−3, 3]
[−3, 3]2
makes EBR easy to realize real-time computation.
A comparative study between EBR and a recent proposed
deterministic machine learning method for symbolic regression, Fast Function eXtraction (FFX), have been conducted.
Numerical results indicate that EBR performs better for its
more concise linear approximation regression models and
lower normalized mean square error than FFX. Moreover,
EBR can provide exact fitting models with regard to the target
models, which shows the ability of structure optimization.
As a future work, it is planned to study on improving the
performance of EBR by introducing new modifications. For
example, nonlinear correlation detection is desired, so that
EBR can be applied to complicated real-world applications
more effectively.
ACKNOWLEDGMENT
This work has been supported by the National Natural
Science Foundation of China (Grant No. 11532014).
R EFERENCES
[1] B. K. Beachkofski, R. V. Grandhi, Improved distributed hypercube
sampling, in: Proceedings of the 43rd AIAA/ASME/ASCE/AHS/ASC
Structures, Structural Dynamics, and Materials Conference, Denver, Colorado, 2002.
[2] J.W. Davidson, D.A. Savic, G.A. Walters, Symbolic and numerical
regression: experiments and applications, Information Sciences 150 (1)
(2003) 95-117.
[3] A. K. Deklel, A. M. Hamdy, E. M. Saad, Multi-objective symbolic
regression using long-term artificial neural network memory (LTANNMEM) and neural symbolization algorithm (NSA), in: Neural Computing
and Applications, Springer, 2016, pp. 1-8.
[4] J. L. Deuzé, M. Herman, R. Santer, Fourier series expansion of the
transfer equation in the atmosphere-ocean system, Journal of Quantitative
Spectroscopy & Radiative Transfer 41 (6) (1989) 483-494.
[5] X. Dong, W. Dong, Y. Yi, Y. Wang, X. Xu, The Recent Developments and
Comparative Analysis of Neural Network and Evolutionary Algorithms
for Solving Symbolic Regression, in: Intelligent Computing, Springer,
2015, pp. 703-714.
[6] C. Ferreira, Gene expression programming in problem solving, Springer,
2002, pp. 635-653.
[7] G. Gielen, E. Maricau, Stochastic degradation modeling and simulation
for analog integrated circuits in nanometer CMOS, in: Proceedings of
Design, Automation & Test in Europe Conference & Exhibition (DATE),
IEEE, 2013, pp. 326-331.
[8] B. Goldberg, Functional programming languages, ACM Computing Surveys 28 (1) (1996) 249-251.
[9] P. Holmes, P. J. Barclay, Functional languages on linear chromosomes,
in: Proceedings of the 1st annual conference on genetic programming,
MIT Press, 1996, pp. 427-427.
[10] I. Icke, J. C. Bongard, Improving genetic programming based symbolic
regression using deterministic machine learning, in: Proceedings of the
IEEE Congress on Evolutionary Computation, IEEE-CEC, 2013, pp.
1763-1770.
[11] D. Karaboga, C. Ozturk, N. Karaboga, B. Gorkemli, Artificial bee colony
programming for symbolic regression, Information Sciences 209 (2012)
1-15.
No.
bases
of EBR
21
22
28
21
Test
error(%)
of EBR
1.70e-2
2.93e-5
2.23e-20
4.68e-8
No.
bases
of FFX
8
10
9
16
Test
error(%)
of FFX
19.74
29.61
13.29
7.771
[12] J.R. Koza, Genetic programming: on the programming of computers by
means of natural selection, MIT Press, Cambridge, MA, USA, 1992.
[13] C. Luo, Z, Hu, S. Zhang, Z. Jiang, Adaptive space transformation:
An invariant based method for predicting aerodynamic coefficients of
hypersonic vehicles, Engineering Applications of Artificial Intelligence
46 (2015) 93-103.
[14] C. Luo, S. Zhang, Z. Jiang, Parse-matrix evolution for symbolic regression, Engineering Applications of Artificial Intelligence 25 (6) (2012)
1182-1193.
[15] E. Maricau, D. D. Jonghe, G. Gielen, Hierarchical analog circuit reliability analysis using multivariate nonlinear regression and active learning
sample selection, in: Proceedings of Design, Automation & Test in Europe
Conference & Exhibition (DATE), IEEE, 2012, pp. 745-750.
[16] T. McConaghy, FFX: Fast, scalable, deterministic symbolic regression
technology, in: Genetic Programming Theory and Practice IX, Springer,
2011, pp. 235-260.
[17] T. Moller, R. Machiraju, K. Mueller, R. Yagel, Evaluation and design of
filters using a Taylor series expansion, IEEE Transactions on Visualization
and Computer Graphics 3 (2) (1997) 184-199.
[18] J. A. Nelder, R. W. M. Wedderburn, Generalized linear models, Journal
of the Royal Statistical Society, 135 (1972) 370-384.
[19] M. ONeil, C. Ryan, Grammatical evolution, IEEE Transactions on
Evolutionary Computation 5 (2001) 349-358.
[20] A. Patelli, L, Ferariu, Elite based multiobjective genetic programming
in nonlinear systems identification, Advances in Electrical and Computer
Engineering 10 (1) (2010) 94-99.
[21] D. M. Steinberg, D. K. J. Lin, A construction method for orthogonal
Latin hypercube designs, Biometrika 93 (2) (2006) 279-288.
[22] A. Worm, Prioritized Grammar Enumeration: A novel method for
symbolic regression, Binghamton University - State University of New
York, 2016 Ph.D. thesis.
[23] Y. W. Yang, C. Wang, C. K. Soh, Force identification of dynamic systems
using genetic programming, International journal for numerical methods
in engineering 63 (9) (2005) 1288-1312.
Preserve and update the
elite basis function
Are all bases
generated?
Use preserved bases to
generate regression model
Is the NMSE
satisfied ?
Decode the model based
on encoding scheme
Stop
| 8cs.DS
|
POLYADIC SYSTEMS, REPRESENTATIONS AND QUANTUM GROUPS
arXiv:1308.4060v3 [math.RT] 21 Jan 2018
STEVEN DUPLIJ
A BSTRACT. Polyadic systems and their representations are reviewed and a classification of general
polyadic systems is presented. A new multiplace generalization of associativity preserving homomorphisms, a ’heteromorphism’ which connects polyadic systems having unequal arities, is introduced
via an explicit formula, together with related definitions for multiplace representations and multiactions. Concrete examples of matrix representations for some ternary groups are then reviewed. Ternary
algebras and Hopf algebras are defined, and their properties are studied. At the end some ternary generalizations of quantum groups and the Yang-Baxter equation are presented.
C ONTENTS
1. I NTRODUCTION
2. P RELIMINARIES
3. S PECIAL ELEMENTS AND PROPERTIES OF POLYADIC SYSTEMS
4. H OMOMORPHISMS OF POLYADIC SYSTEMS
5. M ULTIPLACE MAPPINGS OF POLYADIC SYSTEMS AND HETEROMORPHISMS
6. A SSOCIATIVITY QUIVERS AND HETEROMORPHISMS
7. M ULTIPLACE REPRESENTATIONS OF POLYADIC SYSTEMS
8. M ULTIACTIONS AND G- SPACES
9. R EGULAR MULTIACTIONS
10. M ULTIPLACE REPRESENTATIONS OF TERNARY GROUPS
11. M ATRIX REPRESENTATIONS OF TERNARY GROUPS
12. T ERNARY ALGEBRAS AND H OPF ALGEBRAS
13. T ERNARY QUANTUM GROUPS
14. C ONCLUSIONS
R EFERENCES
2
3
6
11
13
18
24
29
31
33
37
40
44
47
47
Date: 20 May 2012.
2010 Mathematics Subject Classification. 16T05, 16T25, 17A42, 20N15, 20F29, 20G05, 20G42, 57T05.
Published: Journal of Kharkov National University, (ser. Nuclei, Particles and Fields), Vol. 1017, 3(55) (2012) 28-59.
1
2
STEVEN DUPLIJ
1. I NTRODUCTION
One of the most promising directions in generalizing physical theories is the consideration of higher
arity algebras K ERNER [2000], in other words ternary and n-ary algebras, in which the binary composition law is substituted by a ternary or n-ary one DE A ZCARRAGA AND I ZQUIERDO [2010].
Firstly, ternary algebraic operations (with the arity n = 3) were introduced already in the XIX-th
century by A. Cayley in 1845 and later by J. J. Sylvester in 1883. The notion of an n-ary group
was introduced in 1928 by D ÖRNTE [1929] (inspired by E. Nöther) and is a natural generalization
of the notion of a group. Even before this, in 1924, a particular case, that is, the ternary group
of idempotents, was used in P R ÜFER [1924] to study infinite abelian groups. The important coset
theorem of Post explained the connection between n-ary groups and their covering binary groups
P OST [1940]. The next step in study of n-ary groups was the Gluskin-Hosszú theorem H OSSZ Ú
[1963], G LUSKIN [1965]. Another definition of n-ary groups can be given as a universal algebra with
additional laws D UDEK ET AL . [1977] or identities containing special elements RUSAKOV [1979].
The representation theory of (binary) groups W EYL [1946], F ULTON AND H ARRIS [1991] plays
an important role in their physical applications C ORNWELL [1997]. It is initially based on a matrix
realization of the group elements with the abstract group action realized as the usual matrix multiplication C URTIS AND R EINER [1962], C OLLINS [1990]. The cubic and n-ary generalizations of
matrices and determinants were made in K APRANOV ET AL . [1994], S OKOLOV [1972], and their
physical application appeared in K AWAMURA [2003], R AUSCH DE T RAUBENBERG [2008]. In general, particular questions of n-ary group representations were considered, and matrix representations
derived, by the author B OROWIEC ET AL . [2006], and some general theorems connecting representations of binary and n-ary groups were presented in D UDEK AND S HAHRYARI [2012]. The intention
here is to generalize the above constructions of n-ary group representations to more complicated and
nontrivial cases.
In physics, the most applicable structures are the nonassociative Grassmann, Clifford and Lie algebras L ÕHMUS ET AL . [1994], L OUNESTO AND A BLAMOWICZ [2004], G EORGI [1999], and so
their higher arity generalizations play the key role in further applications. Indeed, the ternary analog of Clifford algebra was considered in A BRAMOV [1995], and the ternary analog of Grassmann
algebra A BRAMOV [1996] was exploited to construct various ternary extensions of supersymmetry
A BRAMOV ET AL . [1997].
The construction of realistic physical models is based on Lie algebras, such that the fields take their
values in a concrete binary Lie algebra G EORGI [1999]. In the higher arity studies, the standard Lie
bracket is replaced by a linear n-ary bracket, and the algebraic structure of the corresponding model
is defined by the additional characteristic identity for this generalized bracket, corresponding to the
Jacobi identity DE A ZCARRAGA AND I ZQUIERDO [2010]. There are two possibilities to construct
the generalized Jacobi identity: 1) The Lie bracket is a derivation by itself; 2) A double Lie bracket
vanishes, when antisymmetrized with respect to its entries. The first case leads to the so called
Filippov algebras F ILIPPOV [1985] (or n-Lie algebra) and second case corresponds to generalized
Lie algebras M ICHOR AND V INOGRADOV [1996] (or higher order Lie algebras).
The infinite-dimensional version of n-Lie algebras are the Nambu algebras NAMBU [1973],
TAKHTAJAN [1994], and their n-bracket is given by the Jacobian determinant of n functions,
the Nambu bracket, which in fact satisfies the Filippov identity F ILIPPOV [1985]. Recently,
the ternary Filippov algebras were successfully applied to a three-dimensional superconformal
gauge theory describing the effective worldvolume theory of coincident M2-branes of M-theory
BAGGER AND L AMBERT [2008a,b], G USTAVSSON [2009]. The infinite-dimensional Nambu
POLYADIC SYSTEMS, REPRESENTATIONS AND QUANTUM GROUPS
3
bracket realization H O ET AL . [2008] gave the possibility to describe a condensate of nearly coincident M2-branes L OW [2010].
From another side, Hopf algebras A BE [1980], S WEEDLER [1969], M ONTGOMERY [1993]
play a fundamental role in quantum group theory K ASSEL [1995], S HNIDER AND S TERNBERG
[1993]. Previously, their Von Neumann generalization was introduced in D UPLIJ AND L I [2001],
D UPLIJ AND S INEL’ SHCHIKOV [2009], L I AND D UPLIJ [2002], their actions on the quantum plane
were classified in D UPLIJ AND S INEL’ SHCHIKOV [2010], and ternary Hopf algebras were defined
and studied in D UPLIJ [2001], B OROWIEC ET AL . [2001].
The goal of this paper is to give a comprehensive review of polyadic systems and their representations. First, we classify general polyadic systems and introduce n-ary semigroups and groups. Then
we consider their homomorphisms and multiplace generalizations, paying attention to their associativity. We define multiplace representations and multiactions, and give examples of matrix representations for some ternary groups. We define and investigate ternary algebras and Hopf algebras, study
their properties and give some examples. At the end we consider some ternary generalizations of
quantum groups and the Yang-Baxter equation.
2. P RELIMINARIES
Let G be a non-empty set (underlying set, universe, carrier), its elements we denote by lower-case
Latin letters gi ∈ G. The n-tuple (or polyad) g1 , . . . , gn of elements from G is denoted by (g1 , . . . , gn ).
n
z
}|
{
1
The Cartesian product G × . . . × G = G×n consists of all n-tuples (g1 , . . . , gn ), such that gi ∈ G,
i = 1, . . . , n. For all equal elements g ∈ G, we denote n-tuple (polyad) by power (g n ). If the
number of elements in the n-tuple is clear from the context or is not
important, we denote it with one
bold letter (g), in other cases we use the power in brackets g (n) . We now introduce two important
constructions on sets.
(n)
Definition 2-1. The i-projection of the Cartesian product G×n on its i-th “axis” is the map Pri
G×n → G such that (g1 , . . . gi , . . . , gn ) 7−→ gi .
:
Definition 2-2. The i-diagonal Diagn : G → G×n sends one element to the equal element n-tuple
g 7−→ (g n ).
The one-point set {•} can be treated as a unit for the Cartesian product, since there are bijections
between G and G×{•}×n , where G can be on any place. On the Cartesian product G×n one can define
a polyadic (n-ary, n-adic, if it is necessary to specify n, its arity or rank) operation µn : G×n → G. For
operations we use small Greek letters and place arguments in square brackets µn [g]. The operations
with n = 1, 2, 3 are called unary, binary and ternary. The case n = 0 is special and corresponds to
(c)
fixing a distinguished element of G, a “constant” c ∈ G, and it is called a 0-ary operation µ0 , which
(c)
(c)
maps the one-point set {•} to G, such that µ0 : {•} → G, and formally has the value µ0 [{•}] =
c ∈ G. The 0-ary operation “kills” arity, which can be seen from the following B ERGMAN [1995]:
the composition of n-ary and m-ary operations µn ◦ µm gives (n + m − 1)-ary operation by
µn+m−1 [g, h] = µn [g, µm [h]] .
(2.1)
(c)
Then, if to compose µn with the 0-ary operation µ0 , we obtain
(c)
µn−1 [g] = µn [g, c] ,
(2.2)
1We place the sign for the Cartesian product (×) into the power, because the same abbreviation will also be used below
for other types of product.
4
STEVEN DUPLIJ
because g is a polyad of length (n − 1). So, it is necessary to make a clear distinction between the
(c)
0-ary operation µ0 and its value c in G, as will be seen and will become important below.
Definition 2-3. A polyadic system G is a set G which is closed under polyadic operations.
We will write G = hset|operationsi or G = hset|operations|relationsi, where “relations” are some
additional properties of operations (e.g., associativity conditions for semigroups or cancellation properties). In such a definition it is not necessary to list the images of 0-ary operations (e.g. the unit or
zero in groups), as is done in various other definitions. Here, we mostly consider concrete polyadic
systems with one “chief” (fundamental) n-ary operation µn , which is called polyadic multiplication
(or n-ary multiplication).
Definition 2-4. A n-ary system G n = hG | µn i is a set G closed under one n-ary operation µn
(without any other additional structure).
Note that a set with one closed binary operation without any other relations was called a groupoid
by Hausmann and Ore H AUSMANN AND O RE [1937] (see, also C LIFFORD AND P RESTON [1961]).
However, nowadays the term “groupoid” is widely used in category theory and homotopy theory for
a different construction with binary multiplication, the so-called Brandt groupoid B RANDT [1927]
(see, also, B RUCK [1966]). Alternatively, and much later on, Bourbaki B OURBAKI [1998] introduced the term “magma” for binary systems. Then, the above terms were extended to the case of
one fundamental n-ary operation as well. Nevertheless, we will use some neutral notations “polyadic
system” and “n-ary system” (when arity n is fixed/known/important), which adequately indicates all
of their main properties.
Let us consider the changing arity problem:
Definition 2-5. For a given n-ary system hG | µn i to construct another polyadic system hG | µ′n′ i
over the same set G, which has multiplication with a different arity n′ .
The formulas (2.1) and (2.2) give us the simplest examples of how to change the arity of a polyadic
system. In general, there are 3 ways:
(1) Iterating. Using composition of the operation µn with itself, one can increase the arity from n
to n′iter (as in (2.1)) without changing the signature of the system. We denote the number of
ℓ
iterating multiplications by ℓµ , and use the bold Greek letters µnµ for the resulting composition
of n-ary multiplications, such that
ℓµ
µ′n′ = µℓnµ
}|
z
{
def
×(n−1)
×(n−1)
,
. . . × id
= µn ◦ µn ◦ . . . µn × id
(2.3)
where
n′ = niter = ℓµ (n − 1) + 1,
ℓ
(2.4)
which gives the length of a polyad (g) in the notation µnµ [g]. Without assuming associativity
ℓ
there many variants for placing µn ’s among id’s in the r.h.s. of (2.3). The operation µnµ is
named a long product D ÖRNTE [1929] or derived D UDEK [2007].
POLYADIC SYSTEMS, REPRESENTATIONS AND QUANTUM GROUPS
5
(2) Reducing (Collapsing). Using nc distinguished elements or constants (or nc additional 0-ary
(c )
operations µ0 i , i = 1, . . . nc ), one can decrease arity from n to n′red (as in (2.2)), such that2
n
}|c
{
z
(c )
(c )
(c ...c ) def
(2.5)
µ′n′ = µn′1 nc = µn ◦ µ0 1 × . . . × µ0 nc × id×(n−nc ) ,
where
n′ = nred = n − nc ,
(2.6)
n′ = niter→red = ℓµ (n − 1) − nc + 1.
(2.7)
nmax
= ℓµ (n − 1) − 1
c
(2.8)
(c )
and the 0-ary operations µ0 i can be on any places.
(3) Mixing. Changing (increasing or decreasing) arity may be done by combining iterating and
reducing (maybe with additional operations of different arity). If we do not use additional
operations, the final arity can be presented in a general form using (2.4) and (2.6). It will
depend on the order of iterating and reducing, and so we have two subcases:
(a) Iterating →Reducing. We have
The maximal number of constants (when n′iter→red = 2) is equal to
and can be increased by increasing the number of multiplications ℓµ .
(b) Reducing →Iterating. We obtain
n′ = nred→iter = ℓµ (n − 1 − nc ) + 1.
(2.9)
Now the maximal number of constants is
nmax
=n−2
c
(2.10)
and this is achieved only when ℓµ = 1.
To give examples of the third (mixed) case we put n = 4, ℓµ = 3, nc = 2 for both subcases of
opposite ordering:
(1) Iterating →Reducing. We can put
(c ,c )′
µ8 1 2 g (8) = µ4 [g1 , g2 , g3, µ4 [g4 , g5 , g6 , µ4 [g7 , g8 , c1 , c2 ]]] ,
(2.11)
which corresponds to the following commutative diagram
ǫ
G×8 P✲ G×8 × {•}2
id×6 ×µ4
✲
id×3 ×µ4
✲ G×4
PP
PP
PP
µ4
PP
PP
PP
(c ,c )′
µ8 1 2
PP
PP
❄
Pq
P
G×7
(2.12)
G
(2) Reducing →Iterating. We can have
(c ,c )′
µ4 1 2 g (4) = µ4 [g1 , c1 , c2 , µ4 [g2 , c1 , c2 , µ4 [g3 , c1 , c2 , g4 ]]] ,
2In
(c ...cnc )
D UDEK AND M ICHALSKI [1984] µn 1
category theory for another construction).
(2.13)
is named a retract (which term is already busy and widely used in
6
STEVEN DUPLIJ
such that the diagram
ǫ
✲ G × {•}2
G×4
❳❳
×3
id×6 ×µ4
✲
id×3 ×µ4
✲ G×4
❳❳❳
❳❳❳
❳❳
µ4
❳❳❳
❳❳❳
(c ,c )′
❳❳❳
µ4 1 2
❳❳
❳❳❳ ❄
❳❳
③
×G
G×7
(2.14)
G
is commutative.
It is important to find conditions where iterating and reducing compensate each other, i.e. they
do not change arity overall. Indeed, let the number of the iterating multiplications ℓµ be fixed, then
(0)
we can find such a number of reducing constants nc , such that the final arity will coincide with the
initial arity n. The result will depend on the order of operations. There are two cases:
(0)
(1) Iterating →Reducing. For the number of reducing constants nc we obtain from (2.4) and
(2.6)
n(0)
(2.15)
c = (n − 1) (ℓµ − 1) ,
such that there is no restriction on ℓµ .
(0)
(2) Reducing →Iterating. For nc we get
n(0)
c =
(n − 1) (ℓµ − 1)
,
ℓµ
(2.16)
(0)
and now ℓµ ≤ n − 1. The requirement that nc should be an integer gives two further
possibilities
(
n−1
, ℓµ = 2,
(2.17)
n(0)
=
2
c
n − 2, ℓµ = n − 1.
The above relations can be useful in the study of various n-ary multiplication structures and their
presentation in special form is needed in concrete problems.
3. S PECIAL
ELEMENTS AND PROPERTIES OF POLYADIC SYSTEMS
Let us recall the definitions of some standard algebraic systems and their special elements, which
will be considered in this paper, using our notation.
Definition 3-1. A zero of a polyadic system is a distinguished element z (and the corresponding 0-ary
(z)
operation µ0 ) such that for any (n − 1)-tuple (polyad) g ∈ G×(n−1) we have
µn [g, z] = z,
(3.1)
where z can be on any place in the l.h.s. of (3.1).
There is only one zero (if its place is not fixed) which can be possible in a polyadic system. As in
the binary case, an analog of positive powers of an element P OST [1940] should coincide with the
number of multiplications ℓµ in the iterating (2.3).
Definition 3-2. A (positive) polyadic power of an element is
g hℓµ i = µℓnµ g ℓµ(n−1)+1 .
(3.2)
POLYADIC SYSTEMS, REPRESENTATIONS AND QUANTUM GROUPS
7
Definition 3-3. An element of a polyadic system g is called ℓµ -nilpotent (or simply nilpotent for
ℓµ = 1), if there exist such ℓµ that
g hℓµ i = z.
(3.3)
Definition 3-4. A polyadic system with zero z is called ℓµ -nilpotent, if there exists ℓµ such that for
any (ℓµ (n − 1) + 1)-tuple (polyad) g we have
µℓnµ [g] = z.
(3.4)
Therefore, the index of nilpotency (number of elements whose product is zero) of an ℓµ -nilpotent
n-ary system is (ℓµ (n − 1) + 1), while its polyadic power is ℓµ .
Definition 3-5. A polyadic (n-ary) identity (or neutral element) of a polyadic system is a distinguished
(e)
element e (and the corresponding 0-ary operation µ0 ) such that for any element g ∈ G we have
µn g, en−1 = g,
(3.5)
where g can be on any place in the l.h.s. of (3.5).
In binary groups the identity is the only neutral element, while in polyadic systems, there exist
neutral polyads n consisting of elements of G satisfying
µn [g, n] = g,
(3.6)
where g can be also on any place. The neutral polyads are not determined uniquely. It follows from
(3.5) that the sequence of polyadic identities en−1 is a neutral polyad.
Definition 3-6. An element of a polyadic system g is called ℓµ -idempotent (or simply idempotent for
ℓµ = 1), if there exist such ℓµ that
g hℓµ i = g.
(3.7)
Both zero and the identity are ℓµ -idempotents with arbitrary ℓµ . We define (total) associativity as
the invariance of the composition of two n-ary multiplications
µ2n [g, h, u] = µn [g, µn [h] , u] = invariant
(3.8)
under placement of the internal multiplication in r.h.s. with a fixed order of elements in the whole
polyad of (2n − 1) elements t(2n−1) = (g, h, u). Informally, “internal brackets/multiplication can be
moved on any place”, which gives n relations
µn ◦ µn × id×(n−1) = . . . = µn ◦ id×(n−1) ×µn .
(3.9)
There are many other particular kinds of associativity which were introduced in T HURSTON [1949]
and studied in B ELOUSOV [1972], S OKHATSKY [1997]. Here we will confine ourselves the most
general, total associativity (3.8). In this case, the iteration does not depend on the placement of
internal multiplications in the r.h.s. of (2.3).
Definition 3-7. A polyadic semigroup (n-ary semigroup) is a n-ary system in which the operation is
associative, or G semigrp
= hG | µn | associativityi.
n
In a polyadic system with zero (3.1) one can have trivial associativity, when all n terms are (3.8)
are equal to zero, i.e.
µ2n [g] = z
(3.10)
for any (2n − 1)-tuple g. Therefore, we state that
8
STEVEN DUPLIJ
Assertion 3-8. Any 2-nilpotent n-ary system (having index of nilpotency (2n − 1)) is a polyadic
semigroup.
In the case of changing arity one should use in (3.10) not the changed final arity n′ , but the “real”
arity which is n for the reducing case and ℓµ (n − 1)+1 for all other cases. Let us give some examples.
Example 3-9. In the mixed (interacting-reducing)
D case withEn = 2, ℓµ = 3, nc = 1, we have a ternary
(c)
system hG | µ3 i iterated from a binary system G | µ2 , µ0
with one distinguished element c (or an
3
additional 0-ary operation)
(c)
µ3 [g, h, u] = (g · (h · (u · c))) ,
(3.11)
E
(c)
where for binary multiplication we denote g · h = µ2 [g, h]. Thus, if the ternary system G | µ3
(c)
D
is nilpotent of index 7 (see 3-4), then it is a ternary semigroup (because µ3 is trivially associative)
independently of the associativity of µ2 (see, e.g. B OROWIEC ET AL . [2006]).
It is very important to find the associativity preserving conditions (constructions), where an associative initial operation µn leads to an associative final operation µ′n′ during the change of arity.
Example 3-10. An associativity preserving reduction can be given by the construction of a binary
associative operation using (n − 2)-tuple c consisting of nc = n − 2 different constants
(c)
µ2 [g, h] = µn [g, c, h] .
(3.12)
Associativity preserving mixing constructions with different arities and places were considered in
D UDEK AND M ICHALSKI [1984], M ICHALSKI [1981], S OKHATSKY [1997].
Definition 3-11. An associative polyadic system with identity (3.5) is called a polyadic monoid.
The structure of any polyadic monoid is fixed P OP AND P OP [2004]: it can be obtained by iterating a binary operation Č UPONA AND T RPENOVSKI [1961] (for polyadic groups this was shown in
D ÖRNTE [1929]).
In polyadic systems, there are several analogs of binary commutativity. The most straightforward
one comes from commutation of the multiplication with permutations.
Definition 3-12. A polyadic system is σ-commutative, if µn = µn ◦ σ, or
µn [g] = µn [σ ◦ g] ,
(3.13)
where σ◦g = gσ(1) , . . . , gσ(n) is a permutated polyad and σ is a fixed element of Sn , the permutation
group on n elements. If (3.13) holds for all σ ∈ Sn , then a polyadic system is commutative.
A special type of the σ-commutativity
µn [g, t, h] = µn [h, t, g] ,
(3.14)
where t is any fixed (n − 2)-polyad, is called semicommutativity. So for a n-ary semicommutative
system we have
µn g, hn−1 = µn hn−1 , g .
(3.15)
If a n-ary semigroup Gsemigrp is iterated from a commutative binary semigroup with identity, then
G semigrp is semicommutative.
3
This construction is named the b-derived groupoid in D UDEK
AND
M ICHALSKI [1984].
POLYADIC SYSTEMS, REPRESENTATIONS AND QUANTUM GROUPS
9
Example 3-13. Let G be the set of natural numbers N, and the 5-ary multiplication is defined by
µ5 [g] = g1 − g2 + g3 − g4 + g5 ,
(3.16)
then G N5 = hN, µ5 i is a semicommutative 5-ary monoid having the identity eg = µ5 [g 5 ] = g for each
g ∈ N. Therefore, G N5 is the idempotent monoid.
Another possibility is to generalize the binary mediality in semigroups
(g11 · g12 ) · (g21 · g22 ) = (g11 · g21 ) · (g12 · g22 ) ,
(3.17)
which, obviously, follows from binary commutativity. But for n-ary systems they are different. It is
seen that the mediality should contain (n + 1) multiplications, it is a relation between n × n elements,
and therefore can be presented in a matrix from. The latter can be achieved by placing the arguments
of the external multiplication in a column.
Definition 3-14. A polyadic system is medial (or entropic), if E VANS [1963], B ELOUSOV [1972]
µn [g11 , . . . , gn1]
µn [g11 , . . . , g1n ]
..
..
.
= µn
(3.18)
µn
.
.
µn [g1n , . . . , gnn ]
µn [gn1 , . . . , gnn ]
For polyadic semigroups we use the notation (2.3) and can present the mediality as follows
µnn [G] = µnn GT ,
(3.19)
where G = kgij k is the n × n matrix of elements and GT is its transpose. The semicommutative polyadic semigroups are medial, as in the binary case, but, in general (except n = 3) not
vice versa G ŁAZEK AND G LEICHGEWICHT [1982a]. A more general concept is σ-permutability
S TOJAKOVI Ć AND D UDEK [1986], such that the mediality is its particular case with σ = (1, n).
Definition 3-15. A polyadic system is cancellative, if
µn [g, t] = µn [h, t] =⇒ g = h,
(3.20)
where g, h can be on any place. This means that the mapping µn is one-to-one in each variable. If
g, h are on the same i-th place on both sides, the polyadic system is called i-cancellative.
The left and right cancellativity are 1-cancellativity and n-cancellativity respectively. A right and
left cancellative n-ary semigroup is cancellative (with respect to the same subset).
Definition 3-16. A polyadic system is called (uniquely) i-solvable, if for all polyads t, u and element
h, one can (uniquely) resolve the equation (with respect to h) for the fundamental operation
µn [u, h, t] = g
(3.21)
where h can be on any i-th place.
Definition 3-17. A polyadic system which is uniquely i-solvable for all places i is called a n-ary (or
polyadic) quasigroup.
It follows, that, if (3.21) uniquely i-solvable for all places, than
µℓnµ [u, h, t] = g
can be (uniquely) resolved with respect to h on any place.
Definition 3-18. An associative polyadic quasigroup is called a n-ary (or polyadic) group.
(3.22)
10
STEVEN DUPLIJ
The above definition is the most general one, but it is overdetermined. Much work on polyadic
groups was done RUSAKOV [1998] to minimize the set of axioms (solvability not in all places P OST
[1940], C ELAKOSKI [1977], decreasing or increasing the number of unknowns in determining equations G AL’ MAK [2003]) or construction in terms of additionally defined objects (various analogs of
the identity and sequences Ǔ SAN [2003]), as well as using not total associativity, but instead various
partial ones S OKOLOV [1976], S OKHATSKY [1997], Y UREVYCH [2001].
In a polyadic group the only solution of (3.21) is called a querelement of g and denoted by ḡ
D ÖRNTE [1929], such that
µn [h, ḡ] = g,
(3.23)
where ḡ can be on any place. So, any idempotent g coincides with its querelement ḡ = g. It follows
from (3.23) and (3.6), that the polyad
ng = g n−2ḡ
(3.24)
is neutral for any element of a polyadic group, where ḡ can be on any place. If this i-th place is
important, then we write ng;i . The number of relations in (3.23) can be reduced from n (the number
of possible places) to only 2 (when g is on the first and last places D ÖRNTE [1929], T IMM [1972],
or on some other 2 places). In a polyadic group the Dörnte relations
µn [g, nh;i] = µn [nh;j , g] = g
(3.25)
hold true for any allowable i, j. In the case of a binary group the relations (3.25) become g · h · h−1 =
h · h−1 · g = g.
The relation (3.23) can be treated as a definition of the unary queroperation
µ̄1 [g] = ḡ,
(3.26)
such that the diagram
id×(n−1) ×µ̄1
µn
✲
✑
✸
✻
✑
✑
✑ Prn
✑
G×n
G
(3.27)
G×n
commutes. Then, using the queroperation (3.26) one can give a diagrammatic definition of a polyadic
group (cf. G LEICHGEWICHT AND G ŁAZEK [1967]).
Definition 3-19. A polyadic group is a universal algebra
G grp
n = hG | µn , µ̄1 | associativity, Dörnte relationsi ,
(3.28)
where µn is a n-ary associative operation and µ̄1 is the queroperation, such that the following diagram
G×(n)
id×(n−1) ×µ̄1
✻
id ×Diag(n−1)
✲
G×n ✛
µ̄1 ×id×(n−1)
✻
Diag(n−1) ×id
µn
Pr1
❄
✲G✛
G×n
(3.29)
Pr2
G×G
G×G
commutes, where µ̄1 can be only on first and second places from the right (resp. left) on the left (resp.
right) part of the diagram.
A straightforward generalization of the queroperation concept and corresponding definitions can
be made by substituting in the above formulas (3.23)–(3.26) the n-ary multiplication µn by iterating
ℓ
the multiplication µnµ (2.3) (cf. D UDEK [1980] for ℓµ = 2).
POLYADIC SYSTEMS, REPRESENTATIONS AND QUANTUM GROUPS
11
Definition 3-20. Let us define the querpower k of g recursively
ḡ hhkii = (ḡ hhk−1ii ),
(3.30)
k
where ḡ
(3.26).
hh0ii
= g, ḡ
hh1ii
= ḡ, or as the k composition
µ̄◦k
1
z
}|
{
= µ̄1 ◦ µ̄1 ◦ . . . ◦ µ̄1 of the queroperation
n−3
◦2
For instance G AL’ MAK [2003], µ̄◦2
1 = µn , such that for any ternary group µ̄1 = id, i.e. one has
ḡ = g. Using the queroperation in polyadic groups we can define the negative polyadic power of an
element g by the following recursive relation
µn g hℓµ −1i , g n−2, g h−ℓµ i = g,
(3.31)
or (after use of (3.2)) as a solution of the equation
µℓnµ g ℓµ(n−1) , g h−ℓµ i = g.
(3.32)
It is known that the querpower and the polyadic power are mutually connected D UDEK [1993].
Here, we reformulate this connection using the so called Heine numbers H EINE [1878] or q-deformed
numbers K AC AND C HEUNG [2002]
qk − 1
,
q−1
which have the “nondeformed” limit q → 1 as [k]q → k. Then
[[k]]q =
ḡ hhkii = g h−[[k]]2−n i ,
(3.33)
(3.34)
which can be treated as follows: the querpower coincides with the negative polyadic deformed power
with a “deformation” parameter q which is equal to the “deviation” (2 − n) from the binary group.
4. H OMOMORPHISMS
OF POLYADIC SYSTEMS
Let G n = hG; µn i and G ′n′ = hG′ ; µ′n′ i be two polyadic systems of any kind (quasigroup, semigroup, group, etc.). If they have the multiplications of the same arity n = n′ , then one can define the
mappings from G n to G ′n . Usually such polyadic systems are similar, and we call mappings between
them the equiary mappings.
′
us take n + 1 mappings ϕGG
: G → G′ , i = 1, . . . , n + 1. An ordered system of mappings
i
Let
′
GG
ϕi
is called a homotopy from G n to G ′n , if B ELOUSOV [1972]
h
i
′
′
GG′
GG′
ϕGG
(µ
[g
,
.
.
.
,
g
])
=
µ
ϕ
(g
)
,
.
.
.
,
ϕ
(g
)
, gi ∈ G.
(4.1)
n 1
n
1
n
n+1
n
1
n
In general, one should add to this definition the “mapping” of the multiplications
(µµ′ )
ψnn′
µn 7→ µ′n′ .
(4.2)
n
o
′
′
(µµ )
In such a way, homotopy can be defined as the extended system of mappings ϕGG
; ψnn
. The
i
corresponding commutative (equiary) diagram is
′
G
ϕGG
n+1
✲
✻
µn
G′
(µ) ..............
✲
............. ψnn
G×n
′
′
ϕGG
×...×ϕGG
n
1
✲
✻
µ′n
(G′ )
×n
(4.3)
12
STEVEN DUPLIJ
(µµ′ )
The existence of the additional “mapping” ψnn acting on the second component of hG; µn i is
(µµ′ )
tacitly implied. We will write/mention the “mappings” ψnn′ manifestly, e.g.,
Gn
′
(µµ′ )
ϕGG
;ψnn
i
⇒
G ′n′ ,
(4.4)
GG′
only as needed. If all the components ϕi of a homotopy are bijections, it is called an isotopy. In
′
case of polyadic quasigroups B ELOUSOV [1972] all mappings ϕGG
are usually taken as permutations
i
′
of the same underlying set G = G . If the multiplications are also coincide µn = µ′n , then ϕGG
i ; id
is called an autotopy of the polyadic system G n . Various properties of homotopy in universal algebras
were studied, e.g. in P ETRESCU [1977], H ALA Š [1994].
The homotopy, isotopy and autotopy are widely used equiary mappings in the study of polyadic
′
quasigroups and loops, while their diagonal equiary counterparts (all ϕGG
coincide), the homomori
phism, isomorphism and automorphism, are more suitable in investigation of polyadic semigroups,
groups and rings and their wide applications in physics. Usually, it is written about the latter between
similar (equiary) polyadic systems: they “...are so well known that we shall not bother to define them
carefully” H OBBY AND M C K ENZIE [1988]. Nevertheless, we give a diagrammatic definition of the
standard homomorphism between similar polyadic systems in our notation, which will be convenient
to explain the clear way of its generalization.
′
A homomorphism from Gn to G ′n is given, if there exists a mapping ϕGG : G → G′ satisfying
h
i
′
′
′
ϕGG (µn [g1 , . . . , gn ]) = µ′n ϕGG (g1 ) , . . . , ϕGG (gn ) , gi ∈ G,
(4.5)
which means that the corresponding (equiary) diagram is commutative
′
G
ϕGG
✻
µn
✲
G′
(µµ′ ) .........
✲
....... ψnn
′ ×n
ϕGG
✻
µ′n
(4.6)
✲ (G′ )
G×n
′
Usually the homomorphism is denoted by the same onenletter ϕGG , while
o it would be more consis(µµ′ )
GG′
tent to use for its notation the extended pair of mappings ϕ ; ψnn
. We will use both notations
on a par.
We first mention a small subset of known generalizations of the homomorphism (for bibliography
till 1982 see, e.g., G ŁAZEK AND G LEICHGEWICHT [1982b]) and then introduce a concrete construction for an analogous mapping which can change the arity of the multiplication (fundamental
operation) without introducing additional (term) operations. A general approach to mappings between free algebraic systems was initiated in F UJIWARA [1959], where the so-called basic mapping
formulas for generators were introduced, and its generalization to many-sorted algebras was given in
V IDAL AND T UR [2010]. In N OVOTN Ý [2002] it was shown that the construction of all homomorphisms between similar polyadic systems can be reduced to some homomorphisms between corresponding mono-unary algebras N OVOTN Ý [1990]. The notion of n-ary homomorphism is realized as
a sequence of n consequent homomorphisms ϕi , i = 1, . . . , n, of n similar polyadic systems
×n
n
}|
{
z
ϕn−1
ϕ1
′ ϕ2
′′ ϕn
′′′
Gn → Gn → . . . → Gn → Gn
(4.7)
(generalizing Post’s n-adic substitutions P OST [1940]) was introduced in G AL’ MAK [1998], and
studied in G AL’ MAK [2001a, 2007].
POLYADIC SYSTEMS, REPRESENTATIONS AND QUANTUM GROUPS
13
The above constructions do not change the arity of polyadic systems, because they are based on the
corresponding diagram which gives a definition of an equiary mapping. To change arity one has to:
1) add another equiary diagram with additional operations using the same formula (4.5), where
both do not change arity;
2) use one modified (and not equiary) diagram and the underlying formula (4.5) by themselves,
which will allow us to change arity without introducing additional operations.
The first way leads to the concept of weak homomorphism which was introduced in
G OETZ [1966], M ARCZEWSKI [1966], G ŁAZEK AND M ICHALSKI [1974] for non-indexed algebras and in G ŁAZEK [1980] for indexed algebras, then developed in T RACZYK [1965] for
Boolean and Post algebras, in D ENECKE AND W ISMATH [2009] for coalgebras and F -algebras
D ENECKE AND S AENGSURA [2008] (see also C HUNG AND S MITH [2008]). To define the weak
homomorphism in our notation we should incorporate into the polyadic systems hG; µn i and hG′ ; µ′n′ i
′
the following additional term operations of opposite arity νn′ : G×n → G and νn′ : G′×n → G′ and
consider two equiary mappings between hG; µn , νn′ i and hG′ ; µ′n′ , νn′ i.
′
A weak homomorphism from hG; µn , νn′ i to hG′ , µ′n′ , νn′ i is given, if there exists a mapping ϕGG :
G → G′ satisfying two relations simultaneously
h
i
′
′
′
ϕGG (µn [g1 , . . . , gn ]) = νn′ ϕGG (g1 ) , . . . , ϕGG (gn ) ,
(4.8)
i
h
′
′
′
(4.9)
ϕGG (νn′ [g1 , . . . , gn′ ]) = µ′n′ ϕGG (g1 ) , . . . , ϕGG (gn′ ) ,
which means that two equiary diagrams commute
′
′
G
ϕGG
✲
✻
µn
G′
(µν ′ ) .........
✲
....... ψnn
G×n
′ ×n
ϕGG
✲
(G′ )
×n
✲
✻
✻
′
νn
ϕGG
G
νn′
G′
′)
✲
......... ψ(νµ
..........
′ ′
G×n
′
n ′n×n′
ϕGG
✲
✻
(G′ )
µ′n′
(4.10)
×n′
If only one of the relations (4.8) or (4.9) holds, such a mapping is called a semi-weak ho′
momorphism KOLIBIAR [1984]. If ϕGG is bijective, then it defines a weak isomorphism.
Any weak epimorphism can be decomposed into a homomorphism and a weak isomorphism
G ŁAZEK AND M ICHALSKI [1977], and therefore the study of weak homomorphisms reduces to
weak isomorphisms (see also C Z ÁK ÁNY [1962], M AL’ TCEV [1957], M AL’ TSEV [1958]).
5. M ULTIPLACE
MAPPINGS OF POLYADIC SYSTEMS AND HETEROMORPHISMS
Let us turn to the second way of changing the arity of the multiplication and use only one relation
which we then modify in some natural manner. First, recall that in any set G there always exists
the additional distinguished mapping, viz. the identity idG . We use the multiplication µn with its
combination of idG . We define an (ℓid -intact) id-product for the polyadic system hG; µn i as
id )
µ(ℓ
= µn × (idG )×ℓid ,
n
(5.1)
id )
µ(ℓ
: G×(n+ℓid ) → G×(1+ℓid ) .
n
(5.2)
(ℓ )
To indicate the exact i-th place of µn in the r.h.s. of (5.1), we write µn id (i), as needed. Here we
use the id-product to generalize the homomorphism and consider mappings between polyadic systems
of different arity. It follows from (5.2) that, if the image of the id-product is G alone, than ℓid = 0.
14
STEVEN DUPLIJ
(n,n′ )
Let us introduce a multiplace mapping Φk
acting as follows
(n,n′ )
Φk
: G×k → G′ .
(5.3)
(n,n′ )
While constructing the corresponding diagram, we are allowed to take only one upper Φk
,
′
because of one G in the upper right corner. Since we already know that the lower right corner
′
is exactly G′×n (as a pre-image of one multiplication µ′n′ ), the lower horizontal arrow should be a
(n,n′ )
product of n′ multiplace mappings Φk
. So we can write a definition of a multiplace analog of
homomorphisms which changes the arity of the multiplication using one relation.
Definition 5-1. A k-place heteromorphism from G n to G′n′ is given, if there exists a k-place mapping
(n,n′ )
Φk
(5.3) such that the following (arity changing or unequiary) diagram is commutative
Φk
G×k
(ℓ )
µn id
✲
G′
✻
✻
µ′n′
(Φk )
×n′
(5.4)
✲ (G′ )
G×kn
and the corresponding defining equation (a modification of (4.5)) depends on the place i of µn in
(5.1).
′
×n′
For i = 1 a heteromorphism is defined by the formula
µn [g1 , . . . , gn ]
g1
gk(n′ −1)
gn+1
(n,n′ )
..
= µ′ ′ Φ(n,n′ ) ... , . . . , Φ(n,n′ )
.
Φk
.
.
n
k
k
..
gk
gkn′
gn+ℓid
(5.5)
The notion “heteromorphism” is motivated by E LLERMAN [2006, 2007], where mappings between
objects from different categories were considered and called “chimera morphisms”. See, also, P ÉCSI
[2011].
In the particular case n = 3, n′ = 2, k = 2, ℓid = 1 we have
µ3 [g1 , g2 , g3]
g1
g3
(3,2)
(3,2)
(3,2)
′
Φ2
= µ2 Φ2
, Φ2
.
(5.6)
g4
g2
g4
This formula was used in the construction of the bi-element representations of ternary groups
B OROWIEC ET AL . [2006]. Consider the example.
Example 5-2. Let G = M2adiag (K), a set of antidiagonal 2 × 2 matrices over the field K and G′ = K,
where K = R, C, Q, H. The ternary multiplication µ3 is a product
Obviously, µ3 is
of 3 matrices.
0 ai
not derived from a binary multiplication. For the elements gi =
, i = 1, 2, we construct a
bi 0
2-place mapping G × G → G′ as
g1
(3,2)
Φ2
= a1 a2 b1 b2 ,
(5.7)
g2
which is a heteromorphism, because it satisfies (5.6). Let us introduce a standard 1-place mapping by
ϕ (gi ) = ai bi , i = 1, 2. It is important to note, that ϕ (gi ) is not a homomorphism, because the product
g1 g2 belongs to diagonal matrices. Consider the product of mappings
ϕ (g1 ) · ϕ (g2 ) = a1 b1 a2 b2 ,
(5.8)
POLYADIC SYSTEMS, REPRESENTATIONS AND QUANTUM GROUPS
15
where the product (·) in l.h.s. is taken in K. We observe that (5.7) and (5.8) coincide for the commutative field K only (= R, C) only, and in this case we can have the relation between the heteromorhism
(3,2)
Φ2 and the 1-place mapping ϕ
g1
(3,2)
Φ2
= ϕ (g1 ) · ϕ (g2 ) ,
(5.9)
g2
while for the noncommutative field K (= Q or H) there is no such relation.
A heteromorphism is called derived, if it can be expressed through a 1-place mapping (not necessary a homomorphism). So, in the above Example 5-2 the heteromorphism is derived (by formula
(5.9)) for the commutative field K and nonderived for the noncommutative K.
For arbitrary n a slightly modified construction (5.6) with still binary final arity, defined by n′ = 2,
k = n − 1, ℓid = n − 2,
µn [g1 , . . . , gn−1, h1 ]
g1
h1
h2
(n,2)
= µ′2 Φ(n,2)
... , Φ(n,2)
... .
Φn−1
(5.10)
.
n−1
n−1
..
gn−1
hn−1
hn−1
was used in D UDEK [2007] to study representations of n-ary groups. However, no new results compared with B OROWIEC ET AL . [2006] (other than changing 3 to n in some formulas) were obtained.
This reflects the fact that a major role is played by the final arity n′ and the number of n-ary multiplications in the l.h.s. of (5.6) and (5.10). In the above cases, the latter number was one, but can make it
arbitrary below n.
Definition 5-3. A heteromorphism is called a ℓµ -ple heteromorphism, if it contains ℓµ multiplications
(n,n′ )
in the argument of Φk
in its defining relation.
According this definition the mapping defined by (5.5) is the 1µ -ple heteromorphism. So by analogy
with (5.1)–(5.2) we define a ℓµ -ple ℓid -intact id-product for the polyadic system hG; µn i as
µ ,ℓid )
µ(ℓ
= (µn )×ℓµ × (idG )×ℓid ,
n
µ ,ℓid )
µ(ℓ
: G×(nℓµ +ℓid ) → G×(ℓµ +ℓid ) .
n
(5.11)
(5.12)
G ′n′
Definition 5-4. A ℓµ -ple k-place heteromorphism from Gn to
is given, if there exists a k-place
(n,n′ )
mapping Φk
(5.3) such that the following unequiary diagram is commutative
Φk
G×k
(ℓµ ,ℓid )
µn
✻
✲
G′
✻
µ′n′
×n′
(Φk )
✲ (G′ )
G×kn
The corresponding main heteromorphism equation is
µn [g1 , . . . , gn ] ,
..
ℓ
.
µ
(n,n′ ) µn gn(ℓµ −1) , . . . , gnℓµ
= µ′ ′ Φ(n,n′)
Φk
n
k
gnℓµ +1 ,
..
ℓid
.
gnℓµ +ℓid
′
(5.13)
×n′
g1
gk(n′ −1)
.. , . . . , Φ(n,n′ )
..
.
.
.
k
gk
gkn′
(5.14)
16
STEVEN DUPLIJ
F IGURE 1. Dependence of the final arity n′ through the number of heteromorphism places
k for the initial arity n = 9 with the fixed number of intact elements ℓid (left) and the fixed
number of multiplications ℓµ (right): =1 (solid curves), =2 (dash curves)
Obviously, we can consider various permutations of the multiplications on both sides, as further
additional demands (associativity, commutativity, etc.), are introduced, which will be considered below. The commutativity of the diagram (5.13) leads to the system of equation connecting initial and
final arities
kn′ = nℓµ + ℓid,
k = ℓµ + ℓid .
(5.15)
(5.16)
Excluding ℓµ or ℓid , we obtain two arity changing formulas, respectively
n−1
ℓid ,
k
n−1
n′ =
ℓµ + 1,
k
n′ = n −
(5.17)
(5.18)
ℓid ≥ 1 and n−1
ℓµ ≥ 1 are integer.
where n−1
k
k
As an example, the dependences n′ (k) for the fixed ℓµ = 1, 2 and ℓid = 1, 2 with n = 9 are
presented on Figure 1.
The following inequalities hold valid
1 ≤ ℓµ ≤ k,
0 ≤ ℓid ≤ k − 1,
ℓµ ≤ k ≤ (n − 1) ℓµ ,
′
2 ≤ n ≤ n,
(5.19)
(5.20)
(5.21)
(5.22)
which are important for the further classification of heteromorphisms. The main statement follows
from (5.22)
(n,n′ )
Proposition 5-5. The heteromorphism Φk
the arity of polyadic multiplication.
defined by the general relation (5.14) always decreases
POLYADIC SYSTEMS, REPRESENTATIONS AND QUANTUM GROUPS
17
Another important observation is the fact that only the id-product (5.11) with ℓid 6= 0 leads to
a change of the arity. In the extreme case, when k approaches its minimum, k = kmin = ℓµ , the
final arity approaches its maximum n′max = n, and the id-product becomes a product of ℓµ initial
multiplications µn without id’s, since now ℓid = 0 in (5.14). Therefore, we call a heteromorphism
defined by (5.14) with ℓid = 0 a k (= ℓµ )-place homomorphism. The ordinary homomorphism (4.1)
corresponds to k = ℓµ = 1, and so it is really a 1-place homomorphism. An opposite extreme case,
when the final arity approaches its minimum n′min = 2 (the final operation is binary), corresponds to
the maximal value of k, that is k = kmax = (n − 1) ℓµ . The number of id’s now is ℓid = (n − 2) ℓµ ≥
0, which vanishes, when the initial operation is binary as well. This is the case of the ordinary
homomorphism (4.1) for both binary operations n′ = n = 2 and k = ℓµ = 1. We conclude that:
Any polyadic system can be mapped into a binary system by means of the special k-place ℓµ -ple
(n,n′ )
heteromorphism Φk
, where k = (n − 1) ℓµ (we call it a binarizing heteromorphism) which is
defined by (5.14) with ℓid = (n − 2) ℓµ .
In relation to the Gluskin-Hosszú theorem G LUSKIN [1965] (any n-ary group can be constructed
from the special binary group and its homomorphism) our statement can be treated as:
Theorem 5-6. Any n-ary system can be mapped into a binary system, using a suitable binarizing
(n,2)
heteromorphism Φk (5.14).
The case of 1-ple binarizing heteromorphism (ℓµ = 1) corresponds to the formula (5.10). Further
requirements (associativity, commutativity, etc.) will give additional relations between multiplications
(n,n′ )
and Φk
, and fix the exact structure of (5.14). Thus, we arrive to the following
Proposition 5-7. Classification of ℓµ -ple heteromorphisms:
(n,n)
(1) n′ = n′max = n =⇒ Φk
is the ℓµ -place or multiplace homomorphism, i.e.,
k = kmin = ℓµ .
(n,n′ )
(2) 2 < n′ < n =⇒ Φk
(5.23)
is the intermediate heteromorphism with
n−1
ℓµ .
(5.24)
n′ − 1
In this case the number of intact elements is proportional to the number of multiplications
k=
ℓid =
(n,2)
(3) n′ = n′min = 2 =⇒ Φk
i.e.,
n − n′
ℓµ .
n′ − 1
(5.25)
is the (n − 1) ℓµ -place (multiplace) binarizing heteromorphism,
k = kmax = (n − 1) ℓµ .
(5.26)
In the extreme (first and third) cases there are no restrictions on the initial arity n, while in the
intermediate case n is “quantized” due to the fact that fractions in (5.17) and (5.18) should be integers.
Observe, that in the extreme (first and third) cases there are no restrictions on the initial arity n,
while in the intermediate case n is “quantized” due to the fact that fractions in (5.17) and (5.18) should
be integer. In this way, we obtain the TABLE 1 for the series of n and n′ (we list only first ones, just
for 2 ≤ k ≤ 4 and include the binarizing case n′ = 2 for completeness).
Thus, we have established a general structure and classification of heteromorphisms defined by
(5.14). The next important issue is the preservation of special properties (associativity, commutativity,
etc.), while passing from µn to µ′n′ , which will further restrict the concrete shape of the main relation
18
STEVEN DUPLIJ
TABLE 1. “Quantization” of heteromorphisms
n/n′
3, 5,
2, 3,
4, 7,
2, 3,
4, 7,
3, 5,
5, 9,
2, 3,
3, 5,
2, 3,
5, 9,
4, 7,
k ℓµ ℓid
2
1
1
3
1
2
3
2
1
4
1
3
4
2
2
4
3
1
n=
n′ =
n=
n′ =
n=
n′ =
n=
n′ =
n=
n′ =
n=
n′ =
7,
4,
10,
4,
10,
7,
13,
4,
7,
4,
13,
10,
...
...
...
...
...
...
...
...
...
...
...
...
(5.14) for each choice of the heteromorphism parameters: arities n, n′ , places k, number of intacts ℓid
and multiplications ℓµ .
6. A SSOCIATIVITY
QUIVERS AND HETEROMORPHISMS
The most important property of the heteromorphism, which is needed for its next applications to
representation theory, is the associativity of the final operation µ′n′ , when the initial operation µn is
associative. In other words, we consider here the concrete form of semigroup heteromorphisms. In
general, this is a complicated task, because it is not clear from (5.14), which permutation in the l.h.s.
should be taken to get an associative product in its r.h.s. for each set of the heteromorphism parameters. Straightforward checking of the associativity of the final operation µ′n′ for each permutation
in the l.h.s. of (5.14) is almost impossible, especially for higher n. To solve this difficulty we introduce the concept of the associative polyadic quiver and special rules to construct the associative final
operation µ′n′ .
Definition 6-1. A polyadic quiver of products is the set of elements from G n (presented as several
copies of some matrix of the elements glued together) and arrows, such that the elements along arrows
form n-ary products µn .
For instance, for the 4-ary multiplication µ4 [g1 , h2 , g2 , u1] (elements from G n are arbitrary here) a
corresponding 4-adic quiver will be denoted by {g1 → h2 → g2 → u1 }, and graphically this 4-adic
quiver is
g1
g2
❅❅
❅
h1
u1
h2
u2
g1
*
g2
KS
corr
h1
7 u1
♥♥♥
♥
♥
♥
♥♥♥
h2
u2
(6.1)
µ4 [g1 , h2 , g2 , u1 ] .
Next we define polyadic quivers which are related to the main heteromorphism equation (5.14) in
the following way:
POLYADIC SYSTEMS, REPRESENTATIONS AND QUANTUM GROUPS
19
1) the matrix of elements is the transposed matrix from the r.h.s. of (5.14), such that different letters
(n,n′ )
correspond to their place in Φk
and the low index of an element is related to its position in the µ′n′
product;
2) the number of polyadic quivers is ℓµ , which corresponds to ℓµ multiplications in the l.h.s. of
(5.14);
3) the heteromorphism parameters (n, n′ , k, ℓid and ℓµ ) are not arbitrary, but satisfy the arity
changing formulas (5.17)-(5.18);
4) the intact elements will be placed after a semicolon.
In this way, a polyadic quiver makes a clear visualization of the main heteromorphism equation
(5.14), and later on it will allow us to distinguish associativity preserving heteromorphisms by precise
graphical rules.
For example, the polyadic quiver {g1 → h2 → g2 → u1 ; h1 , u2 } corresponds to the unequiary heteromorphism with n = 4, n′ = 2, k = 3, ℓid = 2 and ℓµ = 1 is
g1
❅❅
❅
g2
(4,2)
Φ3
h1
u1
h2
u2
g1
*
g2
h1 ♥7 u1
♥
♥♥♥
♥
♥
♥♥
h2
u2
KS
corr
(6.2)
g2
g1
µ4 [g1 , h2 , g2 , u1 ]
(4,2)
(4,2)
′
h2 ,
h1 , Φ3
= µ2 Φ3
h1
u2
u1
u2
where the intact elements h1 , u2 are boxed in squares. As it is seen from (6.2), the product µ′2 is not
associative, if µ4 is associative. So, not all polyadic quivers preserve associativity.
Definition 6-2. An associative polyadic quiver is a polyadic quiver which ensures the final associativity of µ′n′ in the main heteromorphism equation (5.14), when the initial multiplication µn is
associative.
One of the associative polyadic quivers which corresponds to the same heteromorphism parameters,
as the non-associative quiver (6.2), is {g1 → h2 → u1 → g2 ; h1 , u2 } which corresponds to
g1
g2
❅❅
❅
h1
h2
u1
g1
⑥> ❅❅❅
⑥
⑥
❅
⑥
u2
g2
KS
corr
h1
u1
h2
u2
(6.3)
g1
g2
µ4 [g1 , h2 , u1 , g2 ]
(4,2)
h1 , Φ(4,2)
h2 .
= µ′2 Φ(4,2)
h1
Φ3
3
3
u1
u2
u2
Here we propose a classification of associative polyadic quivers and the rules of construction of
the corresponding heteromorphism equations, and then use the heteromorphism parameters for the
classification of ℓµ -ple heteromorphisms (5.24). In other words, we describe a consistent procedure
for building the semigroup heteromorphisms.
Let us consider the first class of heteromorphisms (without intact elements ℓid = 0 or intactless),
that is ℓµ -place (multiplace) homomorphisms. In the simplest case, associativity can be achieved,
when all elements in a product are taken from the same row. The number of places k is not fixed by
20
STEVEN DUPLIJ
the arity relation (5.17) and can be arbitrary, while the arrows can have various directions. There are
2k such combinations which preserve associativity. If the arrows have the same direction, this kind of
mapping is also called a homomorphism. As an example, for n = n′ = 3, k = 2, ℓµ = 2 we have
g1
h1
g2
h2
g3
h3
(6.4)
KS
(3,3)
Φ2
µ3 [g1 , g2 , g3 ]
µ3 [h1 , h2 , h3 ]
corr
(3,3)
= µ′3 Φ2
g1
h1
(3,3)
, Φ2
g2
h2
(3,3)
, Φ2
g3
h3
.
Note that the analogous quiver with opposite arrow directions is
hO 1
g1
g2
hO 2
g3
h3
(6.5)
KS
(3,3)
Φ2
µ3 [g1 , g2 , g3 ]
µ3 [h3 , h2 , h1 ]
corr
(3,3)
= µ′3 Φ2
g1
h1
(3,3)
, Φ2
g2
h2
(3,3)
, Φ2
g3
h3
,
The latter mapping and the corresponding vertical quiver were used in constructing the middle representations of ternary groups B OROWIEC ET AL . [2006].
For nonvertical quivers the main rule is the following: all arrows of an associative quiver should
have direction from left to right or vertical, and they should not instersect. Also, we start always from
the upper left corner, because of the permutation symmetry of (5.14), we can rearrange and rename
variables in the necessary way.
An important class of intactless heteromorphisms (with ℓid = 0) preserving associativity can be
constructed using an analogy with the Post substitutions P OST [1940], and therefore we call it the
Post-like associative quiver. The number of places k is now fixed by k = n − 1, while n′ = n and
ℓµ = k = n − 1. An example of the Post-like associative quiver with the same heteromorphisms
parameters as in (6.4)-(6.5) is
g1
❅❅
❅
g2
h1
❅❅ g1
❅❅
h1
h2 ❅ g2
h
❅❅ 2
❅
❅❅
g3
h3
❅
g3
h3
(6.6)
(3,3)
Φ2
µ3 [g1 , h2 , g3 ]
µ3 [h1 , g2 , h3 ]
=
µ′3
KS
corr
(3,3)
Φ2
g1
h1
(3,3)
, Φ2
g2
h2
(3,3)
, Φ2
g3
h3
.
POLYADIC SYSTEMS, REPRESENTATIONS AND QUANTUM GROUPS
21
This construction appeared in the study of ternary semigroups of morphisms C HRONOWSKI
[1994b,a], C HRONOWSKI AND N OVOTN Ý [1995]. Its n-ary generalization was used in the consideration of polyadic operations on Cartesian powers G AL’ MAK [2008], polyadic analogs of the
Cayley and Birkhoff theorems G AL’ MAK [2001b, 2007] and special representations of n-groups
G LEICHGEWICHT ET AL . [1983], WANKE -J AKUBOWSKA AND WANKE -J ERIE [1984] (where the
n-group with the multiplication µ′2 was called the diagonal n-group). Consider the following example.
Example 6-3. Let Λ be the Grassmann algebra consisting of even and odd parts Λ = Λ0̄ ⊕ Λ1̄ (see
(1̄)
e.g., B EREZIN [1987]). The odd part can be considered as a ternary semigroup G 3 = hΛ1̄ , µ3 i,
its multiplication µ3 : Λ1̄ × Λ1̄ × Λ1̄ → Λ1̄ is defined by µ3 [α, β, γ] = α · β · γ, where (·) is
(1̄)
multiplication in Λ and α, β, γ ∈ Λ1̄ , so G 3 is nonderived and contains no unity. The even part can
(0̄)
be treated as a ternary group G 3 = hΛ0̄ , µ′3 i with the multiplication µ′3 : Λ0̄ × Λ0̄ × Λ0̄ → Λ0̄ , defined
(0̄)
by µ3 [a, b, c] = a · b · c, where a, b, c ∈ Λ0̄ , thus G 3 is derived and contains unity. We introduce the
(3,3)
(0̄)
(1̄)
heteromorphism G 3 → G 3 as a mapping (2-place homomorphism) Φ2 : Λ1̄ × Λ1̄ → Λ0̄ by the
formula
(3,3)
Φ2
α
β
= α · β,
(6.7)
(3,3)
where α, β ∈ Λ1̄ . It is seen that Φ2 defined by (6.7) satisfies the Post-like heteromorphism equation
(6.6), but not the “vertical” one (6.4), due to the anticommutativity of odd elements from Λ1̄ . In other
(0̄)
(1̄)
words, G 3 can be treated as a nontrivial example of the “diagonal” semigroup of G 3 (according
to the notation of G LEICHGEWICHT ET AL . [1983], WANKE -J AKUBOWSKA AND WANKE -J ERIE
[1984]).
Note that for the number of places k ≥ 3 there exist additional (to the above) associative quivers
having the same heteromorphism parameters. For instance, when n′ = n = 4 and k = 3 we have the
Post-like associative quiver
g1
g2
❅❅
❅
h1 ❆ u1 ❅ g1
❆
❅
h1
u1
h2 ❆ u2 ❅ g2
h
❅❅ 2
❆
❅
u2
❆❆
❆❆
❅❅
❅❅
g3
h3
u3 ❅ g3
h
u
❅❅ 3 ❆❆ 3
❅
g4
h4
u4
❅❅
(4,4)
Φ3
❅
g4
KS
corr
❆❆
❅
h4
u4
g1
g2
µ4 [g1 , h2 , u3 , g4 ]
g1
g2
(4,4)
(4,4)
(4,4)
(4,4)
′
h1 , Φ3
h2 , Φ3
µ4 [h1 , u2 , g3 , h4 ] = µ4 Φ3
h1 , Φ3
h2 .
µ4 [u1 , g2 , h3 , u4 ]
u1
u2
u1
u2
(6.8)
22
STEVEN DUPLIJ
Also, we have one intermediate non-Post associative quiver
g1 PP h1 PP u1 PP g1
h1
u1
g1
h1
PPP PPP PPP
PPP PPP
P
P
P'
P'
P'
g2
h2
u2 PP g2 PP h2 PP u2
g2
h2
PPP PPP PPP
PPP PPPP PPPP
'
'
'
g3
h3
u3
g3
h3 PP u3 PP g3 PP h3
PPP PPP PPP
P
PPP
P' PPP' PPP'
g4
h4
u4
g4
h4
u4
g4
h4
(4,4)
Φ3
u1
u2
u3
u4
(6.9)
KS
corr
g2
g1
g2
g1
µ4 [g1 , u2 , h3 , g4 ]
(4,4)
(4,4)
(4,4)
(4,4)
′
h2 .
h1 , Φ3
h2 , Φ3
h1 , Φ3
µ4 [h1 , g2 , u3 , h4 ] = µ4 Φ3
u2
u1
u2
u1
µ4 [u1 , h2 , g3 , u4 ]
A general method of constructing associative quivers for n′ = n, ℓid = 0 and k = n − 1 can be
illustrated from the following more complicated example with n = 5. First, we draw k = n − 1
(= 4) copies of element matrices. Then we go from the first element in the first column g1 to the last
element in this column gn′ (= g5 ) by different k = n − 1 (= 4) ways: by the vertical quiver, by the
Post-like quiver (going to the second copy of the element matrix) and by the remaining k − 2 (= 2)
non-Post associative quivers, as
❱
g1 ❘
u1
❍❍❘❱❘❱❘❱❱h❱1❱
❍❍ ❘❘❘ ❱❱❱
g2
g3
g4
g5
vertical
❍$
v1
g1
h1
u1
v1
g1
h1
u1
v1
g1
❘❘❘ ❱❱❱❱
❱*
)
h2 ❆ u2 ◗◗ v2 ❱❱❱❱g2
h2
u2
v2
g2
h2
u2
v2
g2
◗◗◗
❱
❆❆
◗◗◗ ❱❱❱❱❱❱❱❱
❆
◗(
❱❱*
h3
u3 ❅ v3
g3 ◗◗◗ h3
u3 ❲❲❲v❲3❲
h3
u3
v3
g3
❲❲❲❲❲ g3
◗◗◗
❅❅
❲
❲
◗
❲
❲❲❲❲❲
❅
◗◗(
+
h4
u4
v4 ❉ g4
h4
u4 ❘❘❘v4
g4
g4
h4 ❱❱❱u
❱❱4 ❱❱ v4
❘❘❘
❉❉
❱❱❱❱
❘❘❘
❉❉
❱❱❱❱
❘❘)
!
❱+
h5
u5
v5
g5
Post
h5
u5
v5
g5
non-Post
h5
u5
v5
g5
h1
u1
v1
h2
u2
v2
h3
u3
v3
h4
u4
v4
h5
u5
v5
non-Post
(6.10)
Here we show, for short, only the quiver itself without the corresponding heteromorphism equation
and only the arrows corresponding to the first product, while other arrows (starting from h1 , u1 , v1 )
are parallel to it, as in (6.9).
The next type of heteromorphisms (intermediate) is described by the equations (5.15)-(5.25), it
contains intact elements (ℓid ≥ 1) and changes (decreases) arity n′ < n. For each fixed k the arities
are not arbitrary and presented in TABLE 1. The first general rule is: the associative quivers are nondecreasing in both,vertical (from up to down) and horizontal (from left to right), directions. Second,
if there are several multiplications (ℓµ ≥ 2), the corresponding associative quivers do not intersect.
Let us present some examples and start from the smallest number of heteromorphism places in
(n,n′ )
Φk
. For k = 2, the first (nonbinarizing n′ ≥ 3) case is n = 5, n′ = 3, ℓid = 1 (see the first row
.
POLYADIC SYSTEMS, REPRESENTATIONS AND QUANTUM GROUPS
23
and second n/n′ pair of TABLE 1). The corresponding associative quivers are
g1
/ h1
❅❅ g1
❅❅
g2
h2
g2
g3
h3
g3
(5,3)
Φ2
h1
g1
h1
g1
/ h2
❅❅ g2
❅❅
h2
h3
h3
g3
h1
g1
g2
h2
/ g2
g3
h3
g3
❅❅
❅
❅❅
❅
h1
g1
h1
h2
g2
h2
h3
/ g3
h3
KS
KS
corr
corr
µ5 [g1 , h1, g2 , h2, g3 ]
h3
(5,3)
Φ2
µ5 [g1 , h2, g2 , h3, g3 ]
h1
(6.11)
,
where we do not write the r.h.s. of the heteromorphism equation (5.14), because it is simply related
to the transposed quiver matrix of the size n′ × k.
More complicated examples can be given for k = 3, which corresponds to the second and third lines
of TABLE 1. That is we can obtain a ternary final product (n′ = 3) by using one or two multiplications
ℓµ = 1, 2. Examples of the corresponding associative quivers are (ℓµ = 1)
g1
/ h1
❆❆ u1
❆❆
g1
g2
h2
u2
/ g2
g3
h3
u3
g3
❅❅
❅
h1
u1
g1
h1
u1
h2
u2
g2
h2
u2
h3
/ u3
/ g3
h3
u3
(6.12)
KS
(7,3)
Φ3
corr
µ7 [g1 , h1, u2 , g2 , h3 , u3 , g3 ]
h2
u1
and (ℓµ = 2)
g1 PP h1
u1
PPP
PPP
P'
g2
h2
u2
g1
g3
g3
h3
u3
g2
h1
2 u1 ❅ g1
❅❅
❅
h1
u1
g2
h
4 h2 PPP u2
❅❅ 2
PPP
❅
PPP
'
u2
h3
u3
g3
KS
(4,3)
Φ3
h3
u3
(6.13)
corr
µ4 [g1 , u2 , h2 , g3 ]
µ4 [h1, u1 , g2 , h3 ]
u3
respectively. Finally, for the case k = 4 one can construct the associative quiver corresponding to
the first pair of the last line in TABLE 1. It has three multiplications and one intact element, and the
24
STEVEN DUPLIJ
corresponding quiver is, e.g.,
g1
g2
❅❅
❅
u1
v1
h2 ❆ u2
❆
- v2
h1
❆❆
g3
h3
u3
v3
g4
h4
u4
v4
g1
h1
u1
v1
3 u1 PP v1
PPP
PPP
'
g2
h2
g2
h
u2
v2
3 u2 ❅ v2
❅❅ 2
❅❅
❅
❅
v3
v3 PP g3
h3 PP u3
4 g3 ❲❲❲h❲❲3 ❲ u3
PPP
PPP
❲❲❲❲❲
PPP
❲❲❲❲❲
PPP
P'
❲❲❲+
'
g1
h1
g4
h4
u4
v4
g4
h4
u4
v4
(6.14)
KS
corr
µ5 [g1 , h2 , u3 , g3 , g4 ]
(5,4) µ5 [h1 , v2 , u2 , v3 , h4 ]
Φ4
µ5 [v1 , u1 , g2 , h3 , v4 ] .
u4
There are many other possibilities (using permutations and different variants of quivers) to obtain
an associative final product µ′n′ corresponding the same heteromorphism parameters, and therefore
we do list them all. The above examples are sufficient to understand the rules of the associative quiver
construction and obtain the polyadic semigroup heteromorphisms.
7. M ULTIPLACE
REPRESENTATIONS OF POLYADIC SYSTEMS
Representation theory K IRILLOV [1976] deals with mappings from abstract algebraic systems
into linear systems, such as, e.g. linear operators in vector spaces, or into general (semi)groups of
transformations of some set. In our notation, this means that in the mapping of polyadic systems
(4.4) the final multiplication µ′n′ is a linear map. This leads to some restrictions on the final polyadic
structure G ′n′ , which are considered below.
Let V be a vector space over a field K (usually algebraically closed) and End V be a set of linear
endomorphisms of V , which is in fact a binary group. In the standard way, a linear representation
of a binary semigroup G 2 = hG; µ2 i is a (1-place) map Π1 : G2 → End V , such that Π1 is a
homomorphism
Π1 (µ2 [g, h]) = Π1 (g) ∗ Π1 (h) ,
(7.1)
where g, h ∈ G and (∗) is the binary multiplication in End V (usually, it is a (semi)group with
multiplication as composition of operators or product of matrices, if a basis is chosen). If G 2 is a
binary group with the unity e, then we have the additional condition
Π1 (e) = idV .
(7.2)
We will generalize these known formulas to the corresponding polyadic systems along with the
heteromorphism concept introduced above. Our general idea is to use the heteromorphism equation
(5.14) instead of the standard homomorphism equation (7.1), such that the arity of the representation
will be different from the arity of the initial polyadic system n′ 6= n.
Consider the structure of the final n′ -ary multiplication µ′n′ in (5.14), taking into account that the
final polyadic system G ′n′ should be constructed from End V . The most natural and physically applicable way is to consider the binary End V and to put G ′n′ = dern′ (End V ), as it was proposed for the
ternary case in B OROWIEC ET AL . [2006]. In this way G′n′ becomes a derived n′ -ary (semi)group of
′
endomorphisms of V with the multiplication µ′n′ : (End V )×n → End V , where
µ′n′ [v1 , . . . , vn′ ] = v1 ∗ . . . ∗ vn′ , vi ∈ End V.
(7.3)
POLYADIC SYSTEMS, REPRESENTATIONS AND QUANTUM GROUPS
25
Because the multiplication µ′n′ (7.3) is derived and is therefore associative by definition, we may
consider the associative initial polyadic systems (semigroups and groups) and the associativity preserving mappings that are the special heteromorphisms constructed in the previous section.
Let G n = hG; µn i be an associative n-ary polyadic system. By analogy with (5.3), we introduce
the following k-place mapping
(n,n′ )
: G×k → End V.
Πk
(7.4)
A multiplace representation of an associative polyadic system G n in a vector space V is given,
if there exists a k-place mapping (7.4) which satisfies the (associativity preserving) heteromorphism
equation (5.14), that is
µn [g1 , . . . , gn ] ,
n′
z
..
}|
ℓ
{
µ
.
gk(n′ −1)
g1
(n,n′ ) µn gn(ℓµ −1) , . . . , gnℓµ
..
= Π(n,n′) ... ∗ . . . ∗ Π(n,n′)
, (7.5)
Πk
.
k
k
gnℓµ +1 ,
gkn′
gk
..
ℓid
.
gnℓµ +ℓid
and the following diagram commutes
Πk
G×k
(ℓµ ,ℓid )
µn
✲
✻
End V
✻
(7.6)
′
(∗)n
G×kn
′
×n′
(Πk )
✲
(End V )×n
′
(ℓ ,ℓ )
where µn µ id is given by (5.11), ℓµ and ℓid are the numbers of multiplications and intact elements in
the l.h.s. of (7.5), respectively.
The exact permutation in the l.h.s. of (7.5) is given by the associative quiver presented in the
previous section. The representation parameters (n, n′ , k, ℓµ and ℓid ) in (7.5) are the same as the
heteromorphism parameters, and they satisfy the same arity changing formulas (5.17) and (5.18).
Therefore, a general classification of multiplace representations can be done by analogy with that of
the heteromorphisms (5.23)–(5.26) as follows:
(1) The hom-like multiplace representation which is a multiplace homomorphism with n′ =
(min)
n′max = n, without intact elements lid = lid = 0, and minimal number of places
k = kmin = ℓµ .
(7.7)
(2) The intact element multiplace representation which is the intermediate heteromorphism with
2 < n′ < n and the number of intact elements is
n − n′
ℓµ .
lid = ′
n −1
(7.8)
k = kmax = (n − 1) ℓµ .
(7.9)
(3) The binary multiplace representation which is a binarizing heteromorphism (5.26) with n′ =
(max)
n′min = 2, the maximal number of intact elements lid
= (n − 2) ℓµ and maximal number
of places
26
STEVEN DUPLIJ
The multiplace representations for n-ary semigroups have no additional defining relations, as compared with (7.5). In case of n-ary groups, we need an analog of the “normalizing” relation (7.2). If
the n-ary group has the unity e, then one can put
e
(n,n′ ) .
..
Πk
k = idV .
e
(7.10)
If there is no unity at all, one can “normalize” the multiplace representation, using analogy with (7.2)
in the form
Π1 h−1 ∗ h = idV ,
(7.11)
as follows
h̄
...
ℓµ
(n,n′ ) h̄
Πk
h
.
..
ℓid
h
= idV ,
(7.12)
for all h ∈G n , where h̄ is the querelement of h. The latter ones can be placed on any places in the
l.h.s. of (7.12) due to the Dörnte identities. Also, the multiplications in the l.h.s. of (7.5) can change
their place due to the same reason.
A general form of multiplace representations can be found by applying the Dörnte identities to each
n-ary product in the l.h.s. of (7.5). Then, using (7.12) we have schematically
g1
′
′
(n,n ) .
(n,n )
..
Πk
= Πk
gk
t1
..
.
tℓµ
g
..
. ℓid
g
,
(7.13)
where g is an arbitrary fixed element of the n-ary group and
ta = µn [ga1 , . . . , gan−1 , ḡ] , a = 1, . . . , ℓµ .
(7.14)
This is the special shape of some multiplace representations, while the concrete formulas should be
obtained in each case separately. Nevertheless, some conclusions can be drawn from (7.13). Firstly,
(n,n′ )
the equivalence classes on which Πk
is constant are determined by fixing ℓµ + 1 elements, i.e. by
the surface ta = const, g = const. Secondly, some k-place representations of a n-ary group can be
reduced to ℓµ -place representations of its retract. In the case ℓµ = 1, multiplace representations of
a n-ary group derived from a binary group correspond to ordinary representations of the latter (see
B OROWIEC ET AL . [2006], D UDEK [2007]).
POLYADIC SYSTEMS, REPRESENTATIONS AND QUANTUM GROUPS
27
(n,2)
Example 7-1. Let us consider the case of a binary multiplace representation Π2n−2 of n-ary group
G n = hG; µn i with two multiplications ℓµ = 2 defined by the associativity preserving equation
(n,2)
Π2n−2
µn [g1 , u1 , . . . un−2 , g2 ]
u′1
..
.
u′n−2
µn [h1 , v1 , . . . vn−2 , h2 ]
v1′
..
.
′
vn−2
(n,2)
=
Π
2n−2
g1
u1
..
.
un−2
h1
v1
..
.
vn−2
(n,2)
∗
Π
2n−2
g2
u′1
..
.
u′n−2
h2
v1′
..
.
′
vn−2
(7.15)
and normalizing condition
(n,2)
Π2n−2
h
..
.
h
h̄
h
..
.
h
h̄
n−2
= idV ,
n−2
(7.16)
where h ∈G n is arbitrary. Using (7.15) and (7.16) for a general form of this (2n − 2)-place representation we have
(n,2)
Π2n−2
g1
u1
..
.
(n,2) un−2
= Π2n−2
h1
v1
..
.
vn−2
g1
u1
..
.
(n,2) un−2
= Π2n−2
h1
v1
..
.
vn−2
(n,2)
∗ Π2n−2
h
..
. n − 2
h
h̄
h
..
. n − 2
h
h̄
(n,2)
= Π2n−2
µn [g1 , u1 , . . . un−2 , h]
h
..
. n − 3
h
h̄
µn [h
1 , v1 , . . . vn−2 , h]
h
..
. n − 3
h
h̄
.
(7.17)
The Dörnte identity applied to the first elements of the products in the r.h.s. of (7.17) together with
associativity of µn gives
n−2
z
}|
{
µn g, . . . , g, tg , h
h
.
..
n−3
h
h̄
(n,2)
(n,2)
=
Π
= Π2n−2
2n−2
n−2
z }| {
µn g, . . . , g, th , h
h
.
.
. n − 3
h
h̄
(n,2)
Π2n−2
g
..
. n −2
g
tg
g
..
. n −2
g
th
(n,2)
∗Π2n−2
h
..
.
h
h̄
h
..
.
h
h̄
n−2
(n,2)
= Π2n−2
n−2
g
..
. n − 2
g
tg
g
..
. n − 2
g
th
(7.18)
,
28
STEVEN DUPLIJ
where
tg = µn [ḡ, g1 , u1 , . . . un−2] , th = µn [ḡ, h1 , v1 , . . . vn−2 ] .
Thus, the equivalent classes of the multiplace representation
(ℓµ + 1 = 3)-element surface
(n,2)
Π2n−2
(7.19)
(7.15) are determined by the
tg = const, th = const, g = const.
(7.20)
Note that the “ℓµ -place reduction” of a multiplace representation is possible not for all associativity
preserving heteromorphism equations. For instance, if to exchange vi ↔ vi′ in l.h.s. of (7.15), then
the associativity remains, but the “ℓµ -place reduction”, analogous to (7.18) will not be possible.
In case, when it is possible, the corresponding ℓµ -place representation can be realized on the binary
retract of G n (for some special n-ary groups and ℓµ = 1 see see B OROWIEC
AL . [2006], D UDEK
" ETn−2
#
z
}|
{
def
[2007]). Indeed, let Gret
2 = hG, ⊛i = retg hG; µn i, where g1 ⊛ g2 = µn g1 , g, . . . , g, g2 , g1 , g2 , g ∈
G and we define the reduced ℓµ -place representation (now ℓµ = 2) through (7.18) as follows
g
Πret
2
g1
g2
def
(n,2)
= Π2n−2
g
..
. n − 2
g
g1
g
..
. n − 2
g
g2
.
(7.21)
From (7.17) and (7.16) we obtain
n−2
z }| {
µn g, . . . , g, g1 , g
g
g
.
..
..
n−3
. n − 2
g
g
′
′
g1
g1
(n,2)
= Π2n−2
n−2
g
z }| {
..
µn g, . . . , g, g2 , g
n
−
2
.
g
g
′
g2
..
n
−
3
.
g
g2′
g
Πret
2
g1
g2
(n,2)
= Π2n−2
g
∗ Πret
2
g
..
.
g
g1′
g2′
(n,2)
= Π2n−2
n−2
n−2
z }| {
µn g1 , g, . . . , g, g1′
g
..
.
g
n−2
n−2
z }| { ′
µn g2 , g, . . . , g, g2
g
..
. n − 2
g
g1
g
..
. n − 2
g
g2
(n,2)
=Π
2n−2
(n,2)
∗ Π2n−2
g
..
. n − 2
g
g1
⊛ g1′
g
..
. n − 2
g
g2 ⊛ g2′
g1 ⊛ g1′
ret g
.
= Π2
g2 ⊛ g2′
POLYADIC SYSTEMS, REPRESENTATIONS AND QUANTUM GROUPS
In the framework of our classification
g
Πret
2
g1
g2
29
is a hom-like 2-place (binary) representation.
The above formulas describe various properties of multiplace representations, but they give no
idea of how to build representations for concrete polyadic systems. The most common method of
representation construction uses the concept of a group action on a set (see, e.g., K IRILLOV [1976]).
Below we extend this concept to the multiplace case and use corresponding heteromorphisms, as it
was done above for homomorphisms and representations.
8. M ULTIACTIONS
AND
G- SPACES
Let G n = hG; µn i be a polyadic system and X be a set. A (left) 1-place action of G n on X is the
(n)
external binary operation ρ1 : G × X → X such that it is consistent with the multiplication µn , i.e.
composition of the binary operations ρ1 {g|x} gives the n-ary product, that is,
n
o o
n
(n)
(n)
(n)
(n)
g2 | . . . |ρ1 {gn |x} . . . , g1 , . . . , gn ∈ G, x ∈ X. (8.1)
g1 |ρ1
ρ1 {µn [g1 , . . . gn ] |x} = ρ1
If the polyadic system is a n-ary group, then in addition to (8.1) it is implied the there exist such
(n)
ex ∈ G (which may or may not coincide with the unity of G n ) that ρ1 {ex |x} = x for all x ∈ X,
(n)
and the mapping x 7→ ρ1 {ex |x} is a bijection of X. The right 1-place actions of G n on X are
defined in a symmetric way, and therefore we will consider below only one of them. Obviously, we
(n)
(n′ )
cannot compose ρ1 and ρ1 with n 6= n′ . Usually X is called a G-set or G-space depending on its
properties (see, e.g., H USEM ÖLLER ET AL . [2008]).
The application of the 1-place action defined by (8.1) to the representation theory of n-ary groups
gave mostly repetitions of the ordinary (binary) group representation results (except for trivial bderived ternary groups) D UDEK AND S HAHRYARI [2012]. Also, it is obviously seen that the construction (8.1) with the binary external operation ρ1 cannot be applied for studying the most important
regular representations of polyadic systems, when the X coincides with Gn itself and the action arises
from translations.
Here we introduce the multiplace concept of action for polyadic systems, which is consistent with
heteromorphisms and multiplace representations. Then we will show how it naturally appears when
X = G n and apply it to construct examples of representations including the regular ones.
For a polyadic system G n = hG; µn i and a set X we introduce an external polyadic operation
ρk : G×k × X → X,
(8.2)
which is called a (left) k-place action or multiaction. To generalize the 1-action composition (8.1),
we use the analogy with multiplication laws of the heteromorphisms (5.14) and the multiplace representations (7.5) and propose (schematically)
µn [g1 , . . . , gn ] ,
n′
.
}|
z
.
ℓµ
{
.
′ −1)
g
g
k(n
1
µ g
n
n(ℓµ −1) , . . . , gnℓµ
(n)
(n)
(n)
..
..
.
.
.
x
. . . . (8.3)
ρ
ρk
x = ρk
.
k
.
gnℓµ+1 ,
gkn′
gk
..
ℓid
.
gnℓµ +ℓid
The connection between all the parameters here is the same as in the arity changing formulas
(5.17)–(5.18). Composition of mappings is associative, and therefore in concrete cases we can use
30
STEVEN DUPLIJ
the associative quiver technique, as it is described in the previous sections. If G n is n-ary group, then
we should add to (8.3) the “normalizing” relations analogous with (7.10) or (7.12). So, if there is a
unity e ∈G n , then
e
(n)
.. x = x, for all x ∈ X.
ρk
(8.4)
.
e
In terms of the querelement, the normalization has the form
h̄
..
ℓ
µ
.
h̄
(n)
ρk
(8.5)
x = x, for all x ∈ X and for all h ∈ G n .
h
..
ℓ
id
.
h
(n)
(n)
The multiaction ρk is transitive, if any two points x and y in X can be “connected” by ρk , i.e.
there exist g1 , . . . , gk ∈Gn such that
g1
(n)
.. x = y.
ρk
(8.6)
.
gk
(n)
If g1 , . . . , gk are unique, then ρk is sharply transitive. The subset of X, in which any points
are connected by (8.6) with fixed g1 , . . . , gk can be called the multiorbit of X. If there is only one
multiorbit, then we call X the heterogenous G-space (by analogy with the homogeneous one). By
analogy with the (ordinary) 1-place actions, we define a G-equivariant map Ψ between two G-sets X
and Y by (in our notation)
g1
g1
(n)
.. Ψ (x) ∈ Y,
.. x = ρ(n)
(8.7)
Ψ ρk
k
.
.
gk
gk
which makes G-space into a category (for details, see, e.g., H USEM ÖLLER ET AL . [2008]). In the
particular case, when X is a vector space over K, the multiaction (8.2) can be called a multi-G-module
which satisfies (8.4) and the additional (linearity) conditions
g1
g1
g1
(n)
.. ax + by = aρ(n)
.. x + bρ(n)
.. y ,
ρk
(8.8)
.
.
k
k
.
gk
gk
gk
where a, b ∈ K. Then, comparing (7.5) and (8.3) we can
multi-G-module by the following formula
g1
(n,n′ ) .
(n)
..
Πk
(x) = ρk
gk
define a multiplace representation as a
g1
.. x .
.
gk
(8.9)
In a similar way, one can generalize to polyadic systems many other notions from group action
theory K IRILLOV [1976].
POLYADIC SYSTEMS, REPRESENTATIONS AND QUANTUM GROUPS
9. R EGULAR
31
MULTIACTIONS
The most important role in the study of polyadic systems is played by the case, when X =G n ,
and the multiaction coincides with the n-ary analog of translations M AL’ TCEV [1954], so called
i-translations B ELOUSOV [1972]. In the binary case, ordinary translations lead to regular represenreg(n)
tations K IRILLOV [1976], and therefore we call such an action a regular multiaction ρk
. In this
connection, the analog of the Cayley theorem for n-ary groups was obtained in G AL’ MAK [1986,
2001b]. Now we will show in examples, how the regular multiactions can arise from i-translations.
Example 9-1. Let G 3 be a ternary semigroup, k = 2, and X =G 3 , then 2-place (left) action can be
defined as
def
g
reg(3)
ρ2
u = µ3 [g, h, u] .
(9.1)
h
This gives the following composition law for two regular multiactions
g2
g1
reg(3)
reg(3)
= µ3 [g1 , h1 , µ3 [g2 , h2 , u]]
u
ρ2
ρ2
h2
h1
= µ3 [µ3 [g1 , h1 , g2] , h2 , u] =
reg(3)
ρ2
µ3 [g1 , h1 , g2 ]
u .
h2
(9.2)
Thus, using the regular 2-action (9.1) we have, in fact, derived the associative quiver corresponding
to (5.6).
The formula (9.1) can be simultaneously treated as a 2-translation B ELOUSOV [1972]. In this way,
the following left regular multiaction
g1
reg(n)
.. h def
ρk
= µn [g1 , . . . , gk , h] ,
(9.3)
.
gk
corresponds to (5.10), where in the r.h.s. there is the i-translation with i = n. The right regular
multiaction corresponds to the i-translation with i = 1. The binary composition of the left regular
multiactions corresponds to (5.10). In general, the value of i fixes the minimal final arity n′reg , which
differs for even and odd values of the initial arity n.
It follows from (9.3) that for regular multiactions the number of places is fixed
kreg = n − 1,
(9.4)
and the arity changing formulas (5.17)–(5.18) become
n′reg = n − ℓid
n′reg
= ℓµ + 1.
(9.5)
(9.6)
From (9.5)–(9.6) we conclude that for any n a regular multiaction having one multiplication ℓµ = 1
is binarizing and has n − 2 intact elements. For n = 3 see (9.2). Also, it follows from (9.5) that for
regular multiactions the number of intact elements gives exactly the difference between initial and
final arities.
If the initial arity is odd, then there exists a special middle regular multiaction generated by the
i-translation with i = (n + 1) 2. For n = 3 the corresponding associative quiver is (6.5) and
such 2-actions were used in B OROWIEC ET AL . [2006] to construct middle representations of ternary
32
STEVEN DUPLIJ
groups, which did not change arity (n′ = n). Here we give a more complicated example of a middle
regular multiaction, which can contain intact elements and can therefore change arity.
Example 9-2. Let us consider 5-ary semigroup and the following middle 4-action
g
i=3
↓
h
reg(5)
s = µ5 g, h, s , u, v .
ρ4
u
v
(9.7)
Using (9.6) we observe that there are two possibilities for the number of multiplications ℓµ = 2, 4.
The last case ℓµ = 4 is similar to the vertical associative quiver (6.5), but with a more complicated
l.h.s., that is
µ
[g
,
h
,
g
,
h
g
]
5 1 1 2 2, 3
µ5 [h3 , g4 , h4 , g5, h5 ]
reg(5)
s =
ρ4
µ5 [u5 , v5 , u4, v4 , u3]
µ [v , u , v , u , v ]
5 3
2 2
1 1
g
g
g
g
g
5
4
3
2
1
h5
h4
h3
h2
h1
reg(5)
reg(5)
reg(5)
reg(5)
reg(5)
. (9.8)
s
ρ4
ρ4
ρ4
ρ4
ρ4
u5
u4
u3
u2
u1
v
v
v
v
v
2
1
5
4
3
Now we have an additional case with two intact elements ℓid and two multiplications ℓµ
g
g
g
µ
[g
,
h
,
g
,
h
g
]
2
1
5
1
1
2
2,
3
3
h
h
h
h
reg(5)
reg(5)
reg(5)
reg(5)
3
2
1
3
ρ4
ρ4
s = ρ4
ρ4
u
u
u
µ
[h
,
v
,
u
,
v
,
u
]
3
2
1
5
3
3
2
2
1
v
v
v
v
1
1
2
3
= 2 as
,
s
(9.9)
with arity changing from n = 5 to n′reg = 3. In addition to (9.9) we have 3 more possible regular
multiactions due to the associativity of µ5 , when the multiplication brackets in the sequences of 6
elements in the first two rows and the second two ones can be shifted independently.
For n > 3, in addition to left, right and middle multiactions, there exist intermediate cases. First,
observe that the i-translations with i = 2 and i = n − 1 immediately fix the final arity n′reg = n.
Therefore, the composition of multiactions will be similar to (9.8), but with some permutations in the
l.h.s.
Now we consider some multiplace analogs of regular representations of binary groups K IRILLOV
[1976]. The straightforward generalization is to consider the previously introduced regular multiactions (9.3) in the r.h.s. of (8.9). Let G n be a finite polyadic associative system and KG n
be a vector space spanned by G n (some properties of n-ary group rings were considered in
Z EKOVI Ć AND A RTAMONOV
P[1999, 2002]). This means that any element of KG n can be uniquely
presented in the form w = l al · hl , al ∈ K, hl ∈ G. Then, using (9.3) and (8.9) we define the
i-regular k-place representation by
g1
X
reg(i) .
..
Πk
(w) =
al · µk+1 [g1 . . . gi−1 hl gi+1 . . . gk ] .
(9.10)
l
gk
Comparing (9.3) and (9.10) one can conclude that all the general properties of multiplace regular
representations are similar to those of the regular multiactions. If i = 1 or i = k, the multiplace
POLYADIC SYSTEMS, REPRESENTATIONS AND QUANTUM GROUPS
33
representation is called a right or left regular representation respectively. If k is even, the representation with i = k2 + 1 is called a middle regular representation. The case k = 2 was considered in
B OROWIEC ET AL . [2006] for ternary groups.
10. M ULTIPLACE
REPRESENTATIONS OF TERNARY GROUPS
Let us consider the case n = 3, k = 2 in more detail, paying attention to its special peculiarities,
which corresponds to the 2-place (bi-element) representations of ternary groups B OROWIEC ET AL .
[2006]. Let V be a vector space over K and End V be a set of linear endomorphisms of V . From now
on we denote the ternary multiplication
bysquare brackets only, as follows µ3 [g1 , g2 , g3 ] ≡ [g1 g2 g3 ],
g1
and use the “horizontal” notation Π
≡ Π (g1 , g2 ).
g2
Definition 10-1. A left representation of a ternary group G, [ ]) in V is a map ΠL : G × G → End V
such that
ΠL (g1 , g2 ) ◦ ΠL (g3 , g4 ) = ΠL ([g1 g2 g3 ] , g4 ) ,
ΠL (g, g) = idV ,
(10.1)
(10.2)
where g, g1, g2 , g3 , g4 ∈ G.
Replacing in (10.2) g by g we obtain ΠL (g, g) = idV , which means that in fact (10.2) has the form
Π (g, g) = ΠL (g, g) = idV , ∀g ∈ G. Note that the axioms considered in the above definition are
the natural ones satisfied by left multiplications g 7→ [abg]. For all g1 , g2, g3 , g4 ∈ G we have
L
ΠL ([g1 g2 g3 ] , g4 ) = ΠL (g1 , [g2 g3 g4 ]) .
For all g, h, u ∈ G we have
ΠL (g, h) = ΠL ([guu], h) = ΠL (g, u) ◦ ΠL (u, h)
(10.3)
and
ΠL (g, u) ◦ ΠL (u, g) = ΠL (u, g) ◦ ΠL (g, u) = idV ,
(10.4)
−1
and therefore every ΠL (g, u) is invertible and ΠL (g, u)
= ΠL (u, g). This means that any left
representation gives a representation of a ternary group by a binary group B OROWIEC ET AL . [2006].
If the ternary group is medial, then
ΠL (g1 , g2) ◦ ΠL (g3 , g4 ) = ΠL (g3 , g4 ) ◦ ΠL (g1 , g2 ) ,
i.e. the group so obtained is commutative. If the ternary group hG, [ ]i is commutative, then also
ΠL (g, h) = ΠL (h, g), because
ΠL (g, h) = ΠL (g, h) ◦ ΠL (g, g) = ΠL ([g h g] , g)
= ΠL ([h g g] , g) = ΠL (h, g) ◦ ΠL (g, g) = ΠL (h, g) .
In the case of a commutative and idempotent ternary group any of its left representations is idempotent
−1
and ΠL (g, h)
= ΠL (g, h), so that commutative and idempotent ternary groups are represented
by Boolean groups.
Assertion 10-2. Let hG, [ ]i = der (G, ⊙) be a ternary group derived from a binary group hG, ⊙i,
then there is one-to-one correspondence between representations of (G, ⊙) and left representations
of (G, [ ]).
34
STEVEN DUPLIJ
Indeed, because (G, [ ]) = der (G, ⊙), then g ⊙ h = [geh] and e = e, where e is unity of the binary
group (G, ⊙). If π ∈ Rep (G, ⊙), then (as it is not difficult to see) ΠL (g, h) = π (g) ◦ π (h) is a left
representation of hG, [ ]i. Conversely, if ΠL is a left representation of hG, [ ]i then π (g) = ΠL (g, e)
is a representation of (G, ⊙). Moreover, in this case ΠL (g, h) = π (g) ◦ π (h), because we have
ΠL (g, h) = ΠL (g, [ehe]) = ΠL ([geh], e) = ΠL (g, e) ◦ ΠL (h, e) = π (g) ◦ π (h) .
Let (G, [ ]) be a ternary group and (G × G, ∗) be a semigroup used in the construction of left
representations. According to Post P OST [1940] one says that two pairs (a, b), (c, d) of elements of
G are equivalent, if there exists an element g ∈ G such that [abg] = [cdg]. Using a covering group we
can see that if this equation holds for some g ∈ G, then it holds also for all g ∈ G. This means that
ΠL (a, b) = ΠL (c, d) ⇐⇒ (a, b) ∼ (c, d),
i.e.
ΠL (a, b) = ΠL (c, d) ⇐⇒ [abg] = [cdg]
for some g ∈ G. Indeed, if [abg] = [cdg] holds for some g ∈ G, then
ΠL (a, b) = ΠL (a, b) ◦ ΠL (g, g) = ΠL ([abg], g)
By analogy we can define
= ΠL ([cdg], g) = ΠL (c, d) ◦ ΠL (g, g) = ΠL (c, d).
Definition 10-3. A right representation of a ternary group (G, [ ]) in V is a map ΠR : G×G → End V
such that
ΠR (g3 , g4 ) ◦ ΠR (g1 , g2 ) = ΠR (g1 , [g2 g3 g4 ]) ,
ΠR (g, g) = idV ,
(10.5)
(10.6)
where g, g1, g2 , g3 , g4 ∈ G.
From (10.5)-(10.6) it follows that
ΠR (g, h) = ΠR (g, [u u h]) = ΠR (u, h) ◦ ΠR (g, u) .
(10.7)
−1
It is easy to check that ΠR (g, h) = ΠL h, g = ΠL (g, h) . So it is sufficient to consider only
left representations (as in the binary case). Consider the following example of a group algebra ternary
generalization B OROWIEC ET AL . [2006].
Example 10-4. Let G be a ternary group and KG be a vector space
P spanned by G, which means that
any element of KG can be uniquely presented in the form t = ni=1 ki hi , ki ∈ K, hi ∈ G, n ∈ N (we
do not assume that G has finite rank). Then left and right regular representations are defined by
n
X
ΠLreg (g1 , g2 ) t =
ki [g1 g2 hi ] ,
(10.8)
i=1
ΠR
reg (g1 , g2 ) t =
n
X
ki [hi g1 g2 ] .
(10.9)
i=1
Let us construct the middle representations as follows.
Definition 10-5. A middle representation of a ternary group hG, [ ]i in V is a map ΠM : G × G →
End V such that
ΠM (g3 , h3 ) ◦ ΠM (g2 , h2 ) ◦ ΠM (g1 , h1 ) = ΠM ([g3 g2 g1 ] , [h1 h2 h3 ]) ,
ΠM (g, h) ◦ ΠM g, h = ΠM g, h ◦ ΠM (g, h) = idV
(10.10)
(10.11)
POLYADIC SYSTEMS, REPRESENTATIONS AND QUANTUM GROUPS
35
It can be seen that a middle representation is a ternary group
homomorphism ΠM : G × Gop →
der End V. Note that instead of (10.11) one can use ΠM g, h ◦ ΠM (g, h) = idV after changing g to
g and taking into account that g = g. In the case of idempotent elements g and h we have ΠM (g, h) ◦
ΠM (g, h) = idV , which means that the matrices ΠM are Boolean. Thus all middle representation
matrices of idempotent ternary groups are Boolean. The composition ΠM (g1 , h1 ) ◦ ΠM (g2 , h2 ) is not
a middle representation, but the following proposition nevertheless holds.
Let ΠM be a middle representation of a ternary group hG, [ ]i, then, if ΠLu (g, h) = ΠM (g, u) ◦
M
Π (h, u) is a left representation of hG, [ ]i, then ΠLu (g, h) ◦ ΠLu′ (g ′ , h′ ) = ΠLu′ ([ghu′] , h′ ), and,
M
M
′
′
R
R
if ΠR
u (g, h) = Π (u, h) ◦ Π (u, g) is a right representation of hG, [ ]i, then Πu (g, h) ◦ Πu′ (g , h ) =
R
′ ′
L
R
Πu (g, [hg h ]). In particular, Πu (Πu ) is a family of left (right) representations.
If a middle representation ΠM of a ternary group hG, [ ]i satisfies ΠM (g, g) = idV for all g ∈ G,
then it is a left and a right representation and ΠM (g, h) = ΠM (h, g) for all g, h ∈ G. Note that in
general ΠM
reg (g, g) 6= id. For regular representations we have the following commutation relations
R
L
ΠLreg (g1 , h1 ) ◦ ΠR
reg (g2 , h2 ) = Πreg (g2 , h2 ) ◦ Πreg (g1 , h1 ) .
Let hG, [ ]i be a ternary group and let G × G, [ ]′ be a ternary group used in the construction of
the middle representation. In hG, [ ]i, and consequently in G × G, [ ]′ , we define the relation
(a, b) ∼ (c, d) ⇐⇒ [aub] = [cud]
for all u ∈ G. It is not difficult to see that this relation is a congruence in the ternary group
M
G × G, [ ]′ . For regular representations ΠM
reg (a, b) = Πreg (c, d) if (a, b) ∼ (c, d). We have the
following relation
a h a′ ⇐⇒ a = [ga′ g] for some g ∈ G
or equivalently
a h a′ ⇐⇒ a′ = [gag] for some g ∈ G.
It is not difficult to see that it is an equivalence relation on hG, [ ]i, moreover, if hG, [ ]i is medial,
then this relation is a congruence.
Let G × G, [ ]′ be a ternary group used in a construction of middle representations, then
(a, b) h (a′ , b) ⇐⇒ a′ = [gag] and
b′ = [hbb ] for some (g, h) ∈ G × G
is an equivalence relation on G × G, [ ]′ . Moreover, if (G, [ ]) is medial, then this relation is a
congruence. Unfortunately, however it is a weak relation. In a ternary group Z3 , where [ghu] =
(g − h + u) (mod 3) we have only one class, i.e. all elements are equivalent. In Z4 with the operation
[ghu] = (g + h + u + 1) (mod 4) we have a h a′ ⇐⇒ a = a′ . However, for this relation the
following statement holds. If (a, b) h (a′ , b′ ), then
tr ΠM (a, b) = tr ΠM (a′ , b′ ).
We have tr(AB) = tr(BA) for all A, B ∈ EndV , and
tr ΠM (a, b) = tr ΠM ([ga′ g], [hb′ h] ) = tr ΠM (g, h) ◦ ΠM (a′ , b′ ) ◦ ΠM (g, h)
= tr ΠM (g, h) ◦ ΠM (g, h) ◦ ΠM (a′ , b′ ) = tr idV ◦ ΠM (a′ b′ ) = tr ΠM (a′ , b′ )
In our derived case the connection with standard group representations is given by the following.
Let (G, ⊙) be a binary group, and the ternary derived group as hG, [ ]i = der (G, ⊙). There is
one-to-one correspondence between a pair of commuting binary group representations and a middle
36
STEVEN DUPLIJ
ternary derived group representation. Indeed, let π, ρ ∈ Rep (G, ⊙), π (g) ◦ ρ (h) = ρ (h) ◦ π (g) and
ΠL ∈ Rep (G, [ ]). We take
ΠM (g, h) = π (g) ◦ ρ h−1 , π (g) = ΠM (g, e) , ρ (g) = ΠM (e, g) .
Then using (10.10) we prove the needed representation laws.
Let hG, [ ]i be a fixed ternary group, G × G, [ ]′ a corresponding ternary group used in the construction of middle representations, ((G × G)∗ , ⊛) a covering group of G × G, [ ]′ , (G × G, ⋄) =
ret(a,b) (G × G, h i). If ΠM (a, b) is a middle representation of hG, [ ]i, then π defined by
π(g, h, 0) = ΠM (g, h), π(g, h, 1) = ΠM (g, h) ◦ ΠM (a, b)
is a representation of the covering group P OST [1940]. Moreover
ρ(g, h) = ΠM (g, h) ◦ ΠM (a, b) = π(g, h, 1)
is a representation of the above retract induced by (a, b). Indeed, (a, b) is the identity of this retract
and ρ(a, b) = ΠM (a, b) ◦ ΠM (a, b) = idV . Similarly
ρ ((g, h) ⋄ (u, u)) = ρ (h(g, h), (a, b), (u, u)i) = ρ ([gau], [ubh]) = ΠM ([gau], [ubh])) ◦ ΠM (a, b)
= ΠM (g, h) ◦ ΠM (a, b) ◦ ΠM (u, u) ◦ ΠM (a, b) = ρ(g, h) ◦ ρ(u, u)
But τ (g) = (g, g) is an embedding of (G, [ ]) into G × G, [ ]′ . Hence µ defined by µ(g, 0) =
ΠM (g, g) and µ(g, 1) = ΠM (g, g) ◦ ΠM (a, a) is a representation of a covering group G∗ for (G, [ ])
(see the Post theorem P OST [1940] for a = c). On the other hand, β(g) = ΠM (g, g) ◦ ΠM (a, a) is a
representation of a binary retract (G, · ) = reta (G, [ ]). Thus β can induce some middle representation
of (G, [ ]) (by the Gluskin-Hosszú theorem G LUSKIN [1965]).
Note that in the ternary group of quaternions hK, [ ]i (with norm 1), where [ghu] = ghu(−1) =
−ghu and gh is the multiplication of quaternions (−1 is a central element) we have 1 = −1, −1 = 1
and g = g for others. In K × K, [ ]′ we have (a, b) ∼ (−a, −b) and (a, −b) ∼ (−a, b), which gives
32 two-element equivalence classes. The embedding τ (g) = (g, g) suggest that ΠM (i, i) = π(i) 6=
π(−i) = ΠM (−i, −i). Generally ΠM (a, b) 6= ΠM (−a, −b) and ΠM (a, −b) 6= ΠM (−a, b).
The relation (a, b) ∼ (c, d) ⇐⇒ [abg] = [cdg] for all g ∈ G is a congruence on (G × G, ∗). Note
that this relation can be defined as ”for some g”. Indeed, using a covering group we can see that if
[abg] = [cdg] holds for some g then it holds also for all g. Thus π L (a, b) = ΠL (c, d) ⇐⇒ (a, b) ∼
(c, d). Indeed
ΠL (a, b) = ΠL (a, b) ◦ ΠL (g, g) = ΠL ([a b g], g)
= ΠL ([c d g], g) = ΠL (c, d) ◦ ΠL (g, g) = ΠL (c, d).
We conclude, that every left representation of a commutative group hG, [ ]i is a middle representation. Indeed,
ΠL (g, h) ◦ ΠL (g, h) = ΠL ([g h g], h) = ΠL ([g g h], h) = ΠL (h, h) = idV
and
ΠL (g1 , g2 ) ◦ ΠL (g3 , g4 ) ◦ ΠL (g5 , g6) = ΠL ([[g1 g2 g3 ]g4 g5 ], g6 ) = ΠL ([[g1 g3 g2 ]g4 g5 ], g6 )
= ΠL ([g1 g3 [g2 g4 g5 ]], g6 ) = ΠL ([g1 g3 [g5 g4 g2 ]], g6 ) = ΠL ([g1 g3 g5 ], [g4 g2 g6 ]) = ΠL ([g1 g3 g5 ], [g6 g4 g2 ]).
Note that the converse holds only for the special kind of middle representations such that
Π (g, g) = idV . Therefore,
M
POLYADIC SYSTEMS, REPRESENTATIONS AND QUANTUM GROUPS
37
Assertion 10-6. There is one-one correspondence between left representations of hG, [ ]i and binary
representations of the retract reta (G, [ ]).
Indeed, let ΠL (g, a) be given, then ρ(g) = ΠL (g, a) is such representation of the retract, as can be
directly shown. Conversely, assume that ρ(g) is a representation of the retract reta (G, [ ]). Define
ΠL (g, h) = ρ(g) ◦ ρ(h)−1 , then ΠL (g, h) ◦ ΠL (u, u) = ρ(g) ◦ ρ(h)−1 ◦ ρ(u) ◦ ρ(u)−1 = ρ(g ⊛ (h)−1 ◦
⊛u) ◦ ρ(u)−1 = ρ([ [ g a [ a h a ] ] a u ]) ◦ ρ(u)−1 = ρ([ g h g ]) ◦ ρ(u)−1 = ΠL ([ g h u ], u),
11. M ATRIX
REPRESENTATIONS OF TERNARY GROUPS
Here we give several examples of matrix representations for concrete ternary groups. Let G =
Z3 ∋ {0, 1, 2} and the ternary multiplication be [ghu] = g − h + u. Then [ghu] = [uhg] and 0 = 0,
1 = 1, 2 = 2, therefore (G, [ ]) is an idempotent medial ternary group. Thus ΠL (g, h) = ΠR (h, g)
and
ΠL (a, b) = ΠL (c, d) ⇐⇒ (a − b) = (c − d)mod 3.
(11.1)
The calculations give the left regular representation in the manifest matrix form
ΠLreg (0, 0) = ΠLreg (2, 2) = ΠLreg (1, 1) = ΠR
reg (0, 0)
1 0 0
R
0 1 0 = [1] ⊕ [1] ⊕ [1],
= ΠR
reg (2, 2) = Πreg (1, 1) =
0 0 1
(11.2)
0 1 0
R
R
0 0 1
ΠLreg (2, 0) = ΠLreg (1, 2) = ΠLreg (0, 1) = ΠR
reg (2, 1) = Πreg (1, 0) = Πreg (0, 2) =
1 0 0
√
3
1
−
−
√
√
1
1
1
1
√2
2 = [1] ⊕ − + i 3 ⊕ − − i 3 ,
(11.3)
= [1] ⊕
3
1
2 2
2 2
−
2
2
0 0 1
R
R
1 0 0
ΠLreg (2, 1) = ΠLreg (1, 0) = ΠLreg (0, 2) = ΠR
reg (2, 0) = Πreg (1, 2) = Πreg (0, 1) =
0 1 0
√
1
3
√
√
1
1
1
1
−√2
2 = [1] ⊕ − − i 3 ⊕ − + i 3 .
= [1] ⊕
(11.4)
3
1
2 2
2 2
−
−
2
2
Consider next the middle representation construction. The middle regular representation is defined
by
n
X
ΠM
(g
,
g
)
t
=
ki [g1 hi g2 ] .
1 2
reg
i=1
For regular representations we have
R
R
M
ΠM
reg (g1 , h1 ) ◦ Πreg (g2 , h2 ) = Πreg (h2 , h1 ) ◦ Πreg (g1 , g2 ) ,
ΠM
reg
(g1 , h1 ) ◦
ΠLreg
(g2 , h2 ) =
ΠLreg
(g1 , g2 ) ◦
ΠM
reg
(h2 , h1 ) .
(11.5)
(11.6)
38
STEVEN DUPLIJ
For the middle regular representation matrices we obtain
1 0 0
M
M
0 0 1
ΠM
(0,
0)
=
Π
(1,
2)
=
Π
(2,
1)
=
reg
reg
reg
0 1 0
0 1 0
M
M
1 0 0
(1,
0)
=
Π
(2,
2)
=
ΠM
(0,
1)
=
Π
reg
reg
reg
0 0 1
0 0 1
M
M
0 1 0
ΠM
(0,
2)
=
Π
(2,
0)
=
Π
(1,
1)
=
reg
reg
reg
1 0 0
,
,
.
The above representation ΠM
reg of hZ3 , [ ]i is equivalent to the orthogonal direct sum of two irreducible representations
−1 0
M
M
M
Πreg (0, 0) = Πreg (1, 2) = Πreg (2, 1) = [1] ⊕
,
0 1
√
1
3
−
M
M
2
2
√
ΠM
,
reg (0, 1) = Πreg (1, 0) = Πreg (2, 2) = [1] ⊕
3
1
−
−
2 √ 2
1
3
√2
M
M
2
ΠM
,
reg (0, 2) = Πreg (2, 0) = Πreg (1, 1) = [1] ⊕
3
1
−
2
2
i.e. one-dimensional trivial [1] and two-dimensional irreducible. Note, that in this example
ΠM (g, g) = ΠM (g, g) 6= idV , but ΠM (g, h) ◦ ΠM (g, h) = idV , and so ΠM are of the second degree.
Consider a more complicated example of left representations. Let G = Z4 ∋ {0, 1, 2, 3} and the
ternary multiplication be
[ghu] = (g + h + u + 1) mod 4.
(11.7)
We have the multiplication table
1
2
[g, h, 0] =
3
0
3
0
[g, h, 2] =
1
2
2
3
0
1
3
0
1
2
0
1
2
3
1
2
3
0
0
1
2
3
2
3
0
1
2
3
[g, h, 1] =
0
1
0
1
[g, h, 3] =
2
3
3
0
1
2
0
1
2
3
1
2
3
0
2
3
0
1
1
2
3
0
3
0
1
2
Then the skew elements are 0 = 3, 1 = 2, 2 = 1, 3 = 0, and therefore (G, [ ]) is a (non-idempotent)
commutative
ternary group. The left representation is defined by the expansion ΠLreg (g1 , g2 ) t =
Pn
i=1 ki [g1 g2 hi ], which means that (see the general formula (9.10))
ΠLreg (g, h) |u >= | [ghu] > .
POLYADIC SYSTEMS, REPRESENTATIONS AND QUANTUM GROUPS
39
Analogously, for right and middle representations
M
ΠR
reg (g, h) |u >= | [ugh] >, Πreg (g, h) |u >= | [guh] > .
Therefore | [ghu] >= | [ugh] >= | [guh] > and
M
ΠLreg (g, h) = ΠR
reg (g, h) |u >= Πreg (g, h) |u >,
M
so ΠLreg (g, h) = ΠR
reg (g, h) = Πreg (g, h). Thus it is sufficient to consider the left representation only.
In this case the equivalence is ΠL (a, b) = ΠL (c, d) ⇐⇒ (a + b) = (c + d)mod 4, and we obtain
the following classes
0 0 0 1
1 0 0 0
ΠLreg (0, 0) = ΠLreg (1, 3) = ΠLreg (2, 2) = ΠLreg (3, 1) =
0 1 0 0 = [1] ⊕ [−1] ⊕ [−i] ⊕ [i] ,
0 0 1 0
0 0 1 0
0 0 0 1
ΠLreg (0, 1) = ΠLreg (1, 0) = ΠLreg (2, 3) = ΠLreg (3, 2) =
1 0 0 0 = [1] ⊕ [−1] ⊕ [−1] ⊕ [−1] ,
0 1 0 0
0 1 0 0
0 0 1 0
ΠLreg (0, 2) = ΠLreg (1, 1) = ΠLreg (2, 0) = ΠLreg (3, 3) =
0 0 0 1 = [1] ⊕ [−1] ⊕ [i] ⊕ [−i] ,
1 0 0 0
1 0 0 0
0 1 0 0
ΠLreg (0, 3) = ΠLreg (1, 2) = ΠLreg (2, 1) = ΠLreg (3, 0) =
0 0 1 0 = [1] ⊕ [−1] ⊕ [1] ⊕ [1] .
0 0 0 1
It is seen that, due to the fact that the ternary operation (11.7) is commutative, there are only onedimensional irreducible left representations.
Let us “algebralize” the above regular representations in the following way. From (10.1) we have,
for the left representation
ΠLreg (i, j) ◦ ΠLreg (k, l) = ΠLreg (i, [jkl]) ,
(11.8)
where [jkl] = j − k + l, i, j, k, l ∈ Z3 . Denote γiL = ΠLreg (0, i), i ∈ Z3 , then we obtain the algebra
with the relations
L
γiL γjL = γi+j
.
(11.9)
Conversely, any matrix representation of γi γj = γi+j leads to the left representation by ΠL (i, j) =
M
γj−i . In the case of the middle regular representation we introduce γk+l
= ΠM
reg (k, l), k, l ∈ Z3 , then
we obtain
M
γiM γjM γkM = γ[ijk]
,
i, j, k ∈ Z3 .
(11.10)
In some sense (11.10) can be treated as a ternary analog of the Clifford algebra. As before, any
matrix representation of (11.10) gives the middle representation ΠM (k, l) = γk+l .
40
STEVEN DUPLIJ
12. T ERNARY
ALGEBRAS AND
H OPF
ALGEBRAS
Let us consider associative ternary algebras C ARLSSON [1980], DE A ZCARRAGA AND I ZQUIERDO
[2010]. One can introduce an autodistributivity property [[xyz] ab] = [[xab] [yab] [zab]] (see D UDEK
[1993]). If we take 2 ternary operations { , , } and [ , , ], then distributivity is given by {[xyz] ab} =
[{xab} {yab} {zab}]. If (+) is a binary operation (addition), then left linearity is
[(x + z) , a, b] = [xab] + [zab] .
(12.1)
By analogy one can define central (middle) and right linearity. Linearity is defined, when left, middle
and right linearity hold simultaneously.
Definition 12-1. An associative ternary algebra is a triple A, µ3 , η (3) , where A is a linear space over
a field K, µ3 is a linear map A ⊗ A ⊗ A → A called ternary multiplication µ3 (a ⊗ b ⊗ c) = [abc]
which is ternary associative [[abc] de] = [a [bcd] e] = [ab [cde]] or
µ3 ◦ (µ3 ⊗ id ⊗ id) = µ3 ◦ (id ⊗µ3 ⊗ id) = µ3 ◦ (id ⊗ id ⊗µ3 ) .
There are two types D UPLIJ [2001] of ternary unit maps η (3) : K → A:
1) One strong unit map
µ3 ◦ η (3) ⊗ η (3) ⊗ id = µ3 ◦ η (3) ⊗ id ⊗η (3) = µ3 ◦ id ⊗η (3) ⊗ η (3) = id;
(3)
(12.2)
(12.3)
(3)
2) Two sequential units η1 and η2 satisfying
(3)
(3)
(3)
(3)
(3)
(3)
µ3 ◦ η1 ⊗ η2 ⊗ id = µ3 ◦ η1 ⊗ id ⊗η2
= µ3 ◦ id ⊗η1 ⊗ η2
= id;
(12.4)
In first case the ternary analog of the binary relation η (2) (x) = x1, where x ∈ K, 1 ∈ A, is
η (3) (x) = [x, 1, 1] = [1, 1, x] = [1, x, 1] .
(12.5)
Let (A, µA , ηA ), (B, µB , ηB ) and (C, µC , ηC ) be ternary algebras, then the ternary tensor product
space A ⊗ B ⊗ C is naturally endowed with the structure of an algebra. The multiplication µA⊗B⊗C
on A ⊗ B ⊗ C reads
[(a1 ⊗ b1 ⊗ c1 )(a2 ⊗ b2 ⊗ c2 )(a3 ⊗ b3 ⊗ c3 )] = [a1 a2 a3 ] ⊗ [b1 b2 b3 ] ⊗ [c1 c2 c3 ] ,
(12.6)
and so the set of ternary algebras is closed under taking ternary tensor products. A ternary algebra
map (homomorphism) is a linear map between ternary algebras f : A → B which respects the ternary
algebra structure
f ([xyz]) = [f (x) , f (y) , f (z)] ,
(12.7)
f (1A ) = 1B .
(12.8)
Let C be a linear space over a field K.
Definition 12-2. A ternary comultiplication ∆3 is a linear map over a field K such that
∆3 : C → C ⊗ C ⊗ C.
(12.9)
Pn
In the standard Sweedler notations S WEEDLER [1969] ∆3 (a) = i=1 a′i ⊗a′′i ⊗a′′′
i = a(1) ⊗a(2) ⊗
a(3) . Consider different possible types of ternary coassociativity D UPLIJ [2001], B OROWIEC ET AL .
[2001].
(1) A standard ternary coassociativity
(∆3 ⊗ id ⊗ id) ◦ ∆3 = (id ⊗∆3 ⊗ id) ◦ ∆3 = (id ⊗ id ⊗∆3 ) ◦ ∆3 ,
(12.10)
POLYADIC SYSTEMS, REPRESENTATIONS AND QUANTUM GROUPS
41
(2) A nonstandard ternary Σ-coassociativity (Gluskin-type positional operatives)
(∆3 ⊗ id ⊗ id) ◦ ∆3 = (id ⊗ (σ ◦ ∆3 ) ⊗ id) ◦ ∆3 ,
where σ ◦ ∆3 (a) = ∆3 (a) = a(σ(1)) ⊗ a(σ(2)) ⊗ a(σ(3)) and σ ∈ Σ ⊂ S3 .
(3) A permutational ternary coassociativity
(∆3 ⊗ id ⊗ id) ◦ ∆3 = π ◦ (id ⊗∆3 ⊗ id) ◦ ∆3 ,
where π ∈ Π ⊂ S5 .
A ternary comediality is
(∆3 ⊗ ∆3 ⊗ ∆3 ) ◦ ∆3 = σmedial ◦ (∆3 ⊗ ∆3 ⊗ ∆3 ) ◦ ∆3 ,
∈ S9 . A ternary counit is defined as a map ε(3) : C → K. In general,
where σmedial = 123456789
147258369
ε(3) 6= ε(2) satisfying one of the conditions below. If ∆3 is derived, then maybe ε(3) = ε(2) , but another
counits may exist. There are two types of ternary counits:
(1) Standard (strong) ternary counit
(ε(3) ⊗ ε(3) ⊗ id) ◦ ∆3 = (ε(3) ⊗ id ⊗ε(3) ) ◦ ∆3 = (id ⊗ε(3) ⊗ ε(3) ) ◦ ∆3 = id,
(3)
(12.11)
(3)
(2) Two sequential (polyadic) counits ε1 and ε2
(3)
(3)
(3)
(3)
(3)
(3)
(ε1 ⊗ ε2 ⊗ id) ◦ ∆ = (ε1 ⊗ id ⊗ε2 ) ◦ ∆ = (id ⊗ε1 ⊗ ε2 ) ◦ ∆ = id,
(12.12)
Below we will consider only the first standard type of associativity (12.10). The σ-cocommutativity
is defined as σ ◦ ∆3 = ∆3 .
Definition 12-3. A ternary coalgebra is a triple C, ∆3 , ε(3) , where C is a linear space and ∆3 is a
ternary comultiplication (12.9) which is coassociative in one of the above senses and ε(3) is one of the
above counits.
Let (A, µ3 ) be a ternary algebra and (C, ∆3 ) be a ternary coalgebra and f, g, h ∈ HomK (C, A).
Ternary convolution product is
[f, g, h]∗ = µ3 ◦ (f ⊗ g ⊗ h) ◦ ∆3
or in the Sweedler notation [f, g, h]∗ (a) = f a(1) g a(2) h a(3) .
(12.13)
Definition 12-4. A ternary coalgebra is called derived, if there exists a binary (usual, see e.g.
S WEEDLER [1969]) coalgebra ∆2 : C → C ⊗ C such that
∆3,der = (id ⊗∆2 ) ⊗ ∆2 .
(3)
Definition 12-5. A ternary
bialgebra B is B, µ3 , η (3) , ∆3 , ε
for which B, µ3 , η
(3)
algebra and B, ∆3 , ε
is a ternary coalgebra and they are compatible
where τ12
= 12
.
21
∆3 ◦ µ3 = µ3 ◦ (id ⊗τ12 ⊗ id) ◦ ∆3 ,
(12.14)
(3)
is a ternary
(12.15)
One can distinguish four kinds of ternary bialgebras with respect to a “being derived” property:
(1) A ∆-derived ternary bialgebra
∆3 = ∆3,der = (id ⊗∆2 ) ◦ ∆2
(12.16)
µ3,der = µ2 ◦ (µ2 ⊗ id)
(12.17)
(2) A µ-derived ternary bialgebra
42
STEVEN DUPLIJ
(3) A derived ternary bialgebra is simultaneously µ-derived and ∆-derived ternary bialgebra.
(4) A non-derived ternary bialgebra which does not satisfy (12.16) and (12.17).
Possible types of ternary antipodes can be defined by analogy with binary coalgebras.
Definition 12-6. A skew ternary antipode is
(3)
(3)
(3)
µ3 ◦ (Sskew ⊗ id ⊗ id) ◦ ∆3 = µ3 ◦ (id ⊗Sskew ⊗ id) ◦ ∆3 = µ3 ◦ (id ⊗ id ⊗Sskew ) ◦ ∆3 = id . (12.18)
If only one equality from (12.18) is satisfied, the corresponding skew antipode is called left, middle
or right.
Definition 12-7. Strong ternary antipode is
(3)
(3)
(µ2 ⊗ id) ◦ (id ⊗Sstrong ⊗ id) ◦ ∆3 = 1 ⊗ id, (id ⊗µ2 ) ◦ (id ⊗ id ⊗Sstrong ) ◦ ∆3 = id ⊗1,
where 1 is a unit of algebra.
If in a ternary coalgebra the relation
holds true, where τ13 =
123
321
∆3 ◦ S = τ13 ◦ (S ⊗ S ⊗ S) ◦ ∆3
(12.19)
, then it is called skew-involutive.
Definition 12-8. A ternary Hopf algebra H, µ3 , η (3) , ∆3 , ε(3) , S (3) is a ternary bialgebra with a
ternary antipode S (3) of the corresponding above type .
Let us consider concrete constructions of ternary comultiplications, bialgebras and Hopf algebras.
A ternary group-like element can be defined by ∆3 (g) = g ⊗ g ⊗ g, and for 3 such elements we have
∆3 ([g1 g2 g3 ]) = ∆3 (g1 ) ∆3 (g2 ) ∆3 (g3 ) .
(12.20)
But an analog of the binary primitive element (satisfying ∆2 (x) = x ⊗ 1 + 1 ⊗ x) cannot be chosen
simply as ∆3 (x) = x ⊗ e ⊗ e + e ⊗ x ⊗ e + e ⊗ e ⊗ x, since the algebra structure is not preserved.
Nevertheless, if we introduce two idempotent units e1 , e2 satisfying “semiorthogonality” [e1 e1 e2 ] = 0,
[e2 e2 e1 ] = 0, then
∆3 (x) = x ⊗ e1 ⊗ e2 + e2 ⊗ x ⊗ e1 + e1 ⊗ e2 ⊗ x
(12.21)
and now ∆3 ([x1 x2 x3 ]) = [∆3 (x1 ) ∆3 (x2 ) ∆3 (x3 )]. Using (12.21) ε (x) = 0, ε (e1,2 ) = 1, and
S (3) (x) = −x, S (3) (e1,2 ) = e1,2 , one can construct a ternary universal enveloping algebra in full
analogy with the binary case (see e.g. K ASSEL [1995]).
One of the most important examples of noncocommutative Hopf algebras is the well known
Sweedler Hopf algebra S WEEDLER [1969] which in the binary case has two generators x and y
satisfying
µ2 (x, x) = 1,
(12.22)
µ2 (y, y) = 0,
(12.23)
(2)
(2)
σ+ (xy) = −σ− (xy) .
(12.24)
∆2 (x) = x ⊗ x,
(12.25)
It has the following comultiplication
∆2 (y) = y ⊗ x + 1 ⊗ y,
(12.26)
POLYADIC SYSTEMS, REPRESENTATIONS AND QUANTUM GROUPS
43
counit ε(2) (x) = 1, ε(2) (y) = 0, and antipode S (2) (x) = x, S (2) (y) = −y, which respect the algebra
structure. In the derived case a ternary Sweedler algebra is generated also by two generators x and y
obeying D UPLIJ [2001]
µ3 (x, e, x) = µ3 (e, x, x) = µ3 (x, x, e) = e,
(3)
σ+ ([yey]) = 0,
(3)
σ+
([xey]) =
(3)
−σ−
(12.27)
(12.28)
([xey]) .
(12.29)
The derived Hopf algebra structure is given by
∆3 (x) = x ⊗ x ⊗ x,
(12.30)
∆3 (y) = y ⊗ x ⊗ x + e ⊗ y ⊗ x + e ⊗ e ⊗ y,
(12.31)
ε(3) (x) = ε(2) (x) = 1,
(12.32)
ε(3) (y) = ε(2) (y) = 0,
(12.33)
S (3) (x) = S (2) (x) = x,
(12.34)
S
(3)
(y) = S
(2)
(y) = −y,
(12.35)
and it can be checked that (12.30)-(12.32) are algebra maps, while (12.34) are antialgebra maps. To
obtain a non-derived ternary Sweedler example we have the following possibilities: 1) one “even”
generator x, two “odd” generators y1,2 and one ternary unit e; 2) two “even” generators x1,2 , one
“odd” generator y and two ternary units e1,2 . In the first case the ternary algebra structure is (no
summation, i = 1, 2)
[xxx] = e,
(12.36)
[yi yi yi ] = 0,
(12.37)
(3)
(3)
σ+ ([yi xyi ]) = σ+ ([xyi x]) = 0,
[xeyi ] = − [xyi e] ,
[exyi ] = − [yi xe] ,
(12.38)
(12.39)
[eyi x] = − [yi ex] ,
(12.40)
σ+ ([y1 xy2 ]) = −σ− ([y1 xy2 ]) .
(12.41)
(3)
(3)
The corresponding ternary Hopf algebra structure is
∆3 (x) = x ⊗ x ⊗ x, ∆3 (y1,2 ) = y1,2 ⊗ x ⊗ x + e1,2 ⊗ y2,1 ⊗ x + e1,2 ⊗ e2,1 ⊗ y2,1 ,
(12.42)
ε(3) (x) = 1, ε(3) (yi ) = 0,
(12.43)
S (3) (x) = x,
(12.44)
S (3) (yi ) = −yi .
In the second case we have for the algebra structure
[xi xj xk ] = δij δik δjk ei , [yyy] = 0,
(12.45)
σ+ ([yxi y]) = 0, σ+ ([xi yxi ]) = 0,
(3)
(12.46)
(3)
(12.47)
(3)
σ+ ([y1 xy2 ]) = 0,
(3)
σ− ([y1 xy2 ]) = 0,
44
STEVEN DUPLIJ
and the ternary Hopf algebra structure is D UPLIJ [2001]
∆3 (xi ) = xi ⊗ xi ⊗ xi ,
∆3 (y) = y ⊗ x1 ⊗ x1 + e1 ⊗ y ⊗ x2 + e1 ⊗ e2 ⊗ y,
(12.48)
ε(3) (xi ) = 1,
(12.49)
ε(3) (y) = 0,
(12.50)
S (3) (xi ) = xi ,
(12.51)
S (3) (y) = −y.
13. T ERNARY
(12.52)
QUANTUM GROUPS
A ternary commutator can be obtained in different ways B REMNER AND H ENTZEL [2000].
We will consider the simplest version called a Nambu bracket (see e.g. TAKHTAJAN [1994],
(3)
DE A ZCARRAGA AND I ZQUIERDO [2010]). Let us introduce two maps ω± : A⊗A⊗A → A⊗A⊗A
by
ω+ (a ⊗ b ⊗ c) = a ⊗ b ⊗ c + b ⊗ c ⊗ a + c ⊗ a ⊗ b,
(3)
(13.1)
ω− (a ⊗ b ⊗ c) = b ⊗ a ⊗ c + c ⊗ b ⊗ a + a ⊗ c ⊗ b.
(3)
(13.2)
(3)
(3)
(3)
Thus, obviously µ3 ◦ ω± = σ± ◦ µ3 , where σ± ∈ S3 denotes a sum of terms having even and
(2)
(2)
odd permutations respectively. In the binary case ω+ = id ⊗ id and ω− = τ is the twist operator
(2)
(2)
τ : a ⊗ b → b ⊗ a, while µ2 ◦ ω− is permutation σ− (ab) = ba. So the Nambu product is
(3)
(3)
(3)
(3)
(3)
(3)
ωN = ω+ − ω− , and the ternary commutator is [, , ]N = σN = σ+ − σ− , or TAKHTAJAN [1994]
[a, b, c]N = [abc] + [bca] + [cab] − [cba] − [acb] − [bac]
(13.3)
An abelian ternary algebra is defined by the vanishing of the Nambu bracket [a, b, c]N = 0 or
(3)
(3)
ternary commutation relation σ+ = σ− . By analogy with the binary case a deformed ternary
algebra can be defined by
(3)
(3)
σ+ = qσ− or [abc] + [bca] + [cab] = q ([cba] + [acb] + [bac]) ,
(13.4)
where multiplication by q is treated as an external operation.
Let us consider a ternary analog of the Woronowicz example of a bialgebra construction, which has
(2)
(2)
two generators satisfying xy = qyx (or σ+ (xy) = qσ− (xy)), then the following coproducts
∆2 (x) = x ⊗ x
∆2 (y) = y ⊗ x + 1 ⊗ y
(13.5)
(13.6)
are the algebra maps. In the derived ternary case using (13.4) we have
(3)
(3)
σ+ ([xey]) = qσ− ([xey]) ,
(13.7)
where e is the ternary unit and ternary coproducts are
∆3 (e) = e ⊗ e ⊗ e,
∆3 (x) = x ⊗ x ⊗ x,
∆3 (y) = y ⊗ x ⊗ x + e ⊗ y ⊗ x + e ⊗ e ⊗ y,
(13.8)
(13.9)
(13.10)
POLYADIC SYSTEMS, REPRESENTATIONS AND QUANTUM GROUPS
45
which are ternary algebra maps, i.e. they satisfy
(3)
(3)
σ+ ([∆3 (x) ∆3 (e) ∆3 (y)]) = qσ− ([∆3 (x) ∆3 (e) ∆3 (y)]) .
(13.11)
Let us consider the group G = SL (n, K). Then the algebra generated by aij ∈ SL (n, K) can be
endowed with the structure of a ternary Hopf algebra (see, e.g., M ADORE [1995] for the binary case)
by choosing the ternary coproduct, counit and antipode as (here summation is implied)
i
∆3 aij = aik ⊗ akl ⊗ alj , ε aij = δji , S (3) aij = a−1 j .
(13.12)
This antipode is a skew one since from (12.18) it follows that
i
µ3 ◦ (S (3) ⊗ id ⊗ id) ◦ ∆3 aij = S (3) aik akl alj = a−1 k akl alj = δli alj = aij .
This ternary Hopf algebra is derived since for ∆2 = aij ⊗ ajk we have
∆3 = (id ⊗∆2 ) ⊗ ∆2 aij = (id ⊗∆2 ) aik ⊗ akj = aik ⊗ ∆2 akj = aik ⊗ akl ⊗ alj .
(13.13)
(13.14)
In the most important case n = 2 we can obtain the manifest action of the ternary coproduct ∆3 on
components. Possible non-derived matrix representations of the ternary product
ij can be done only by
four-rank n × n × n × n twice covariant and twice contravariant tensors akl . Among all products
ij ol ko
jl ko
the non-derived ones are only the following: aoi
jk boo cil and aok bio cil (where o is any index). So using
e.g. the first choice we can define the non-derived Hopf algebra structure by
iµ
vσ
ρj
∆3 aij
(13.15)
kl = avρ ⊗ akl ⊗ aµσ ,
1 i j
i j
(13.16)
δ
δ
+
δ
δ
=
ε aij
k
l
l
k ,
kl
2
iµ vσ
i µ σ
(3)
and the skew antipode sij
aij
kl = S
kl which is a solution of the equation svρ akl = δρ δk δl .
Next consider ternary dual pair kG (push-forward) and F (G) (pull-back) which are related by
(kG)∗ ∼
= F (G) (see, e.g., KOGORODSKI AND S OIBELMAN [1998]). Here kG = span (G) is a
(3)
ternary group algebra (G has a ternary product [ , , ]G or µG ) over a field k.
If u ∈ kG (u = ui xi , xi ∈ G), then
[uvw]k = ui v j w l [xi xj xl ]G
(13.17)
is associative, and so (kG, [ , , ]k ) becomes a ternary algebra. Define a ternary coproduct ∆3 : kG →
kG ⊗ kG ⊗ kG by
∆3 (u) = ui xi ⊗ xi ⊗ xi
(13.18)
(derived and associative), then ∆3 ([uvw]k ) = [∆3 (u) ∆3 (v) ∆3 (w)]k , and kG is a ternary bialgebra.
(3)
If we define a ternary antipode by Sk = ui x̄i , where x̄i is a skew element of xi , then kG becomes a
ternary Hopf algebra.
In the dual case of functions F (G) : {ϕ : G → k} a ternary product [ , , ]F or µ3,F (derived and
associative) acts on ψ (x, y, z) as
(µ3,F ψ) (x) = ψ (x, x, x) ,
(13.19)
and so F (G) is a ternary algebra. Let F (G) ⊗ F (G) ⊗ F (G) ∼
= F (G × G × G), then we define a
ternary coproduct ∆3 : F (G) → F (G) ⊗ F (G) ⊗ F (G) as
(∆3 ϕ) (x, y, z) = ϕ ([xyz]F ) ,
(13.20)
which is derive and associative. Thus we can obtain ∆3 ([ϕ1 ϕ2 ϕ3 ]F ) = [∆3 (ϕ1 ) ∆3 (ϕ2 ) ∆3 (ϕ3 )]F ,
and therefore F (G) is a ternary bialgebra. If we define a ternary antipode by
(3)
SF (ϕ) = ϕ (x̄) ,
(13.21)
46
STEVEN DUPLIJ
where x̄ is a skew element of x, then F (G) becomes a ternary Hopf algebra.
Let us introduce a ternary analog of the R-matrix D UPLIJ [2001]. For a ternary Hopf algebra H
we consider a linear map R(3) : H ⊗ H ⊗ H → H ⊗ H ⊗ H.
Definition 13-1. A ternary Hopf algebra H, µ3 , η (3) , ∆3 , ε(3) , S (3) is called quasifiveangular4 if it
satisfies
(3)
(3)
(3)
(13.22)
(id ⊗∆3 ⊗ id) = R125 R145 R135 ,
(3)
(3)
(3)
(13.23)
(id ⊗ id ⊗∆3 ) = R125 R124 R123 ,
(3)
(3)
(3)
(13.24)
(∆3 ⊗ id ⊗ id) = R145 R245 R345 ,
where as usual the index of R denotes action component positions.
Using the standard procedure (see, e.g., K ASSEL [1995], C HARI AND P RESSLEY [1996], M AJID
[1995]) we obtain a set of abstract ternary quantum Yang-Baxter equations, one of which has the form
D UPLIJ [2001]
(3)
(3)
(3)
(3)
(3)
(3)
(3)
(3)
(3)
(3)
R243 R342 R125 R145 R135 = R123 R132 R145 R245 R345 ,
(13.25)
and others can be obtained by corresponding permutations. The classical ternary Yang-Baxter equations form a one parameter family of solutions R (t) can be obtained by the expansion
R(3) (t) = e ⊗ e ⊗ e + rt + O t2 ,
(13.26)
where r is a ternary classical R-matrix, then e.g. for (13.25) we have
r342 r125 r145 r135 + r243 r125 r145 r135 + r243 r342 r145 r135 + r243 r342 r125 r135 + r243 r342 r125 r145
= r132 r145 r245 r345 + r123 r145 r245 r345 + r123 r132 r245 r345 + r123 r132 r145 r345 + r123 r132 r145 r245 .
(3)
(3)
(3)
(3)
(3)
For three ternary Hopf algebras HA,B,C , µA,B,C , ηA,B,C , ∆A,B,C , εA,B,C , SA,B,C we can introduce
a non-degenerate ternary “pairing” (see, e.g., C HARI AND P RESSLEY [1996] for the binary case)
h , , i(3) : HA × HB × HC → K, trilinear over K, satisfying D UPLIJ [2001]
D
E(3) D
E(3) D
E(3) D
E(3)
(3)
(3)
(3)
(3)
ηA (a) , b, c
= a, εB (b) , c
, a, ηB (b) , c
= εA (a) , b, c
,
D
E(3) D
E(3) D
E(3) D
E(3)
(3)
(3)
(3)
(3)
b, ηB (b) , c
= a, b, εC (c)
, a, b, ηC (c)
= a, εB (b) , c
,
D
E(3) D
E(3) D
E(3) D
E(3)
(3)
(3)
(3)
(3)
a, b, ηC (c)
= εA (a) , b, c
, ηA (a) , b, c
= a, b, εC (c)
,
4
The reason for such notation is clear from (13.25).
POLYADIC SYSTEMS, REPRESENTATIONS AND QUANTUM GROUPS
D
(3)
µA (a1 ⊗ a2 ⊗ a3 ) , b, c
D
E(3)
E(3)
(3)
∆A (a) , b1 ⊗ b2 ⊗ b3 , c
D
E(3)
(3)
a, µB (b1 ⊗ b2 ⊗ b3 ) , c
E(3)
D
(3)
a, ∆B (b) , c1 ⊗ c2 ⊗ c3
D
E(3)
(3)
a, b, µC (c1 ⊗ c2 ⊗ c3 )
D
E(3)
(3)
a1 ⊗ a2 ⊗ a3 , b, ∆C (c)
D
(3)
SA
(a) , b, c
E(3)
=
D
47
D
E(3)
(3)
= a1 ⊗ a2 ⊗ a3 , ∆B (b) , c
,
D
E(3)
(3)
= a, µB (b1 ⊗ b2 ⊗ b3 ) , c
,
D
E(3)
(3)
= a, b1 ⊗ b2 ⊗ b3 , ∆C (c)
,
E(3)
D
(3)
,
= a, b, µC (c1 ⊗ c2 ⊗ c3 )
D
E(3)
(3)
= ∆A (a) , b, c1 ⊗ c2 ⊗ c3
,
D
E(3)
(3)
= µA (a1 ⊗ a2 ⊗ a3 ) , b, c
,
(3)
a, SB
(b) , c
E(3)
=
D
(3)
a, b, SC
(c)
E(3)
,
where a, ai ∈ HA , b, bi ∈ HB . The ternary “paring” between HA ⊗ HA ⊗ HA and HB ⊗ HB ⊗ HB
is given by ha1 ⊗ a2 ⊗ a3 , b1 ⊗ b2 ⊗ b3 i(3) = ha1 , b1 i(3) ha2 , b2 i(3) ha3 , b3 i(3) . These constructions can
naturally lead to ternary generalizations of the duality concept and the quantum double which are key
ingredients in the theory of quantum groups D RINFELD [1987], K ASSEL [1995], M AJID [1995].
14. C ONCLUSIONS
In this paper we presented a review of polyadic systems and their representations, ternary algebras
and Hopf algebras. We have classified general polyadic systems and considered their homomorphisms
and their multiplace generalizations, paying attention to their associativity. Then, we defined multiplace representations and multiactions and have given examples of matrix representations for some
ternary groups. We defined and investigated ternary algebras and Hopf algebras, and have given some
examples. We then considered some ternary generalizations of quantum groups and the Yang-Baxter
equation.
R EFERENCES
A BE , E. (1980). Hopf Algebras. Cambridge: Cambridge Univ. Press.
A BRAMOV, V. (1995). Z3 -graded analogues of Clifford algebras and algebra of Z3 -graded symmetries. Algebras Groups Geom. 12 (3), 201–221.
A BRAMOV, V. (1996). Ternary generalizations of Grassmann algebra. Proc. Est. Acad. Sci., Phys. Math. 45
(2-3), 152–160.
A BRAMOV, V., R. K ERNER , AND B. L E ROY (1997). Hypersymmetry: a Z3 -graded generalization of supersymmetry. J. Math. Phys. 38, 1650–1669.
BAGGER , J. AND N. L AMBERT (2008a). Comments on multiple M2-branes. J. High Energy Phys. 2, 105.
BAGGER , J. AND N. L AMBERT (2008b). Gauge symmetry and supersymmetry of multiple M2-branes. Phys.
Rev. D77, 065008.
B ELOUSOV, V. D. (1972). n-ary Quasigroups. Kishinev: Shtintsa.
B EREZIN , F. A. (1987). Introduction to Superanalysis. Dordrecht: Reidel.
B ERGMAN , G. M. (1995). An invitation to general algebra and universal constructions. Berkeley: University
of California.
B OROWIEC , A., W. D UDEK , AND S. D UPLIJ (2001). Basic concepts of ternary Hopf algebras. J. Kharkov
National Univ., ser. Nuclei, Particles and Fields 529 (3(15)), 21–29. math.QA/0306208.
48
STEVEN DUPLIJ
B OROWIEC , A., W. D UDEK , AND S. D UPLIJ (2006). Bi-element representations of ternary groups. Comm.
Algebra 34 (5), 1651–1670.
B OURBAKI , N. (1998). Elements of Mathematics: Algebra 1. Springer.
B RANDT, H. (1927). Über eine Verallgemeinerung des Gruppenbegriffes. Math. Annalen 96, 360–367.
B REMNER , M. AND I. H ENTZEL (2000). Identities for generalized lie and jordan products on totally associative triple systems. J. Algebra 231 (1), 387–405.
B RUCK , R. H. (1966). A Survey on Binary Systems. New York: Springer-Verlag.
C ARLSSON , R. (1980). N -ary algebras. Nagoya Math. J. 78 (1), 45–56.
C ELAKOSKI , N. (1977). On some axiom systems for n-groups. Mat. Bilt. 1, 5–14.
C HARI , V. AND A. P RESSLEY (1996). A Guide to Quantum Groups. Cambridge: Cambridge University Press.
C HRONOWSKI , A. (1994a). On ternary semigroups of homomorphisms of ordered sets. Arch. Math. (Brno) 30
(2), 85–95.
C HRONOWSKI , A. (1994b). A ternary semigroup of mappings. Demonstr. Math. 27 (3-4), 781–791.
C HRONOWSKI , A. AND M. N OVOTN Ý (1995). Ternary semigroups of morphisms of objects in categories.
Archivum Math. (Brno) 31, 147–153.
C HUNG , K. O. AND J. D. H. S MITH (2008). Weak homomorphisms and graph coalgebras. Arab. J. Sci. Eng.,
Sect. C, Theme Issues 33 (2), 107–121.
C LIFFORD , A. H. AND G. B. P RESTON (1961). The Algebraic Theory of Semigroups, Volume 1. Providence:
Amer. Math. Soc.
C OLLINS , M. J. (1990). Representations And Characters Of Finite Groups. Cambridge: Cambridge University
Press.
C ORNWELL , J. F. (1997). Group Theory in Physics: An Introduction. London: Academic Press.
Č UPONA , G. AND B. T RPENOVSKI (1961). Finitary associative operations with neutral elements. Bull. Soc.
Math. Phys. Macedoine 12, 15–24.
C URTIS , C. W. AND I. R EINER (1962). Representation theory of finite groups and associative algebras.
Providence: AMS.
C Z ÁK ÁNY, B. (1962). On the equivalence of certain classes of algebraic systems. Acta Sci. Math. (Szeged) 23,
46–57.
DE A ZCARRAGA , J. A. AND J. M. I ZQUIERDO (2010). n-Ary algebras: A review with applications. J.
Phys. A43, 293001.
D ENECKE , K. AND K. S AENGSURA (2008). State-based systems and (F1 , F2 )-coalgebras. East-West J.
Math., Spec. Vol., 1–31.
D ENECKE , K. AND S. L. W ISMATH (2009). Universal Algebra and Coalgebra. Singapore: World Scientific.
D ÖRNTE , W. (1929). Unterschungen über einen verallgemeinerten Gruppenbegriff. Math. Z. 29, 1–19.
D RINFELD , V. G. (1987). Quantum groups. In: A. G LEASON (Ed.), Proceedings of the ICM, Berkeley, Phode
Island: AMS, pp. 798–820.
D UDEK , W. A. (1980). Remarks on n-groups. Demonstratio Math. 13, 165–181.
D UDEK , W. A. (1993). Autodistributive n-groups. Annales Sci. Math. Polonae, Commentationes Math. 23,
1–11.
D UDEK , W. A. (2007). Remarks to Głazek’s results on n-ary groups. Discuss. Math., Gen. Algebra Appl. 27
(2), 199–233.
D UDEK , W. A., K. G ŁAZEK , AND B. G LEICHGEWICHT (1977). A note on the axioms of n-groups. In: Coll.
Math. Soc. J. Bolyai. 29. Universal Algebra, Esztergom (Hungary), pp. 195–202.
D UDEK , W. A. AND J. M ICHALSKI (1984). On retracts of polyadic groups. Demonstratio Math. 17, 281–301.
D UDEK , W. A. AND M. S HAHRYARI (2012). Representation theory of polyadic groups. Algebr. Represent.
Theory 15 (1), 29–51.
D UPLIJ , S. (2001). Ternary Hopf algebras. In: A. G. N IKITIN AND V. M. B OYKO (Eds.), Symmetry in
Nonlinear Mathematical Physics, Kiev: Institute of Mathematics, pp. 25–34.
D UPLIJ , S. AND F. L I (2001). Regular solutions of quantum Yang-Baxter equation from weak Hopf algebras.
Czech. J. Phys. 51 (12), 1306–1311.
POLYADIC SYSTEMS, REPRESENTATIONS AND QUANTUM GROUPS
49
D UPLIJ , S. AND S. S INEL’ SHCHIKOV (2009). Quantum enveloping algebras with von Neumann regular
Cartan-like generators and the Pierce decomposition. Commun. Math. Phys. 287 (1), 769–785.
D UPLIJ , S. AND S. S INEL’ SHCHIKOV (2010). Classification of Uq ( SL 2 )-module algebra structures on the
quantum plane. J. Math. Physics, Analysis, Geometry 6 (6), 21–46.
E LLERMAN , D. (2006). A theory of adjoint functors – with some thoughts about their philosophical significance. In: G. S ICA (Ed.), What is category theory?, Monza (Milan): Polimetrica, pp. 127–183.
E LLERMAN , D. (2007). Adjoints and emergence: applications of a new theory of adjoint functors. Axiomathes 17 (1), 19–39.
E VANS , T. (1963). Abstract mean values. Duke Math J. 30, 331–347.
F ILIPPOV, V. T. (1985). n-Lie algebras. Sib. Math. J. 26, 879–891.
F UJIWARA , T. (1959). On mappings between algebraic systems. Osaka Math. J. 11, 153–172.
F ULTON , W. AND J. H ARRIS (1991). Representation Theory: a First Course. N. Y.: Springer.
G AL’ MAK , A. M. (1986). Translations of n-ary groups. Dokl. Akad. Nauk BSSR 30, 677–680.
G AL’ MAK , A. M. (1998). Generalized morphisms of algebraic systems. Vopr. Algebry 12, 36–46.
G AL’ MAK , A. M. (2001a). Generalized morphisms of Abelian m-ary groups. Discuss. Math. 21 (1), 47–55.
G AL’ MAK , A. M. (2001b). Polyadic analogs of the Cayley and Birkhoff theorems. Russ. Math. 45 (2), 10–15.
G AL’ MAK , A. M. (2003). n-Ary Groups, Part 1. Gomel: Gomel University.
G AL’ MAK , A. M. (2007). n-Ary Groups, Part 2. Minsk: Belarus State University.
G AL’ MAK , A. M. (2008). Polyadic associative operations on Cartesian powers. Proc. of the Natl. Academy of
Sciences of Belarus, Ser. Phys.-Math. Sci. 3, 28–34.
G EORGI , H. (1999). Lie Algebras in Particle Physics. New York: Perseus Books.
G ŁAZEK , K. (1980). Weak homomorphisms of general algebras and related topics. Math. Semin. Notes, Kobe
Univ. 8, 1–36.
G ŁAZEK , K. AND B. G LEICHGEWICHT (1982a). Abelian n-groups. In: Colloq. Math. Soc. J. Bolyai. Universal Algebra (Esztergom, 1977), Amsterdam: North-Holland, pp. 321–329.
G ŁAZEK , K. AND B. G LEICHGEWICHT (1982b). Bibliography of n-groups (polyadic groups) and some group
like n-ary systems. In: Proceedings of the Symposium on n-ary structures, Skopje: Macedonian Academy
of Sciences and Arts, pp. 253–289.
G ŁAZEK , K. AND J. M ICHALSKI (1974). On weak homomorphisms of general non-indexed algebras. Bull.
Acad. Pol. Sci., Sér. Sci. Math. Astron. Phys. 22, 651–656.
G ŁAZEK , K. AND J. M ICHALSKI (1977). Weak homomorphisms of general algebras. Commentat. Math. 19
(1976), 211–228.
G LEICHGEWICHT, B. AND K. G ŁAZEK (1967). Remarks on n-groups as abstract algebras. Colloq. Math. 17,
209–219.
G LEICHGEWICHT, B., M. B. WANKE -J AKUBOWSKA , AND M. E. WANKE -J ERIE (1983). On representations
of cyclic n-groups. Demonstr. Math. 16, 357–365.
G LUSKIN , L. M. (1965). Position operatives. Math. Sbornik 68(110) (3), 444–472.
G OETZ , A. (1966). On weak isomorphisms and weak homomorphisms of abstract algebras. Colloq. Math. 14,
163–167.
G USTAVSSON , A. (2009). One-loop corrections to Bagger-Lambert theory. Nucl. Phys. B807, 315–333.
H ALA Š , R. (1994). A note on homotopy in universal algebra. Acta Univ. Palacki. Olomuc., Fac. Rerum Nat.,
Math. 33 (114), 39–42.
H AUSMANN , B. A. AND Ø. O RE (1937). Theory of quasigroups. Amer. J. Math. 59, 983–1004.
H EINE , E. (1878). Handbuch der Kugelfunktionan. Berlin: Reimer.
H O , P.-M., R.-C. H OU , Y. M ATSUO , AND S. S HIBA (2008). M5-brane in three-form flux and multiple
M2-branes. J. High Energy Phys. 08, 014.
H OBBY, D. AND R. M C K ENZIE (1988). The Structure of Finite Algebras. Providence: AMS.
H OSSZ Ú , L. M. (1963). On the explicit form of n-group operation. Publ. Math. Debrecen 10, 88–92.
H USEM ÖLLER , D., M. J OACHIM , B. J UR ČO , AND M. S CHOTTENLOHER (2008). G-spaces, G-bundles,
50
STEVEN DUPLIJ
and G-vector bundles. In: D. H USEM ÖLLER AND S. E CHTERHOFF (Eds.), Basic Bundle Theory and KCohomology Invariants, Berlin-Heidelberg: Springer, pp. 149–161.
K AC , V. AND P. C HEUNG (2002). Quantum calculus. New York: Springer.
K APRANOV, M., I. M. G ELFAND , AND A. Z ELEVINSKII (1994). Discriminants, Resultants and Multidimensional Determinants. Berlin: Birkhäuser.
K ASSEL , C. (1995). Quantum Groups. New York: Springer-Verlag.
K AWAMURA , Y. (2003). Cubic matrices, generalized spin algebra and uncertainty relation. Progr. Theor.
Phys. 110, 579–587.
K ERNER , R. (2000). Ternary algebraic structures and their applications in physics, preprint Univ. P. & M.
Curie, Paris, 15 p.
K IRILLOV, A. A. (1976). Elements of the Theory of Representations. Berlin: Springer-Verlag.
KOGORODSKI , L. I. AND Y. S. S OIBELMAN (1998). Algebras of Functions on Quantum Groups. Providence:
AMS.
KOLIBIAR , M. (1984). Weak homomorphisms in some classes of algebras. Stud. Sci. Math. Hung. 19, 413–
420.
L I , F. AND S. D UPLIJ (2002). Weak Hopf algebras and singular solutions of quantum Yang-Baxter equation.
Commun. Math. Phys. 225 (1), 191–217.
L ÕHMUS , J., E. PAAL , AND L. S ORGSEPP (1994). Nonassociative Algebras in Physics. Palm Harbor:
Hadronic Press.
L OUNESTO , P. AND R. A BLAMOWICZ (2004). Clifford Algebras: Applications To Mathematics, Physics, And
Engineering. Birkhäuser.
L OW, A. M. (2010). Worldvolume superalgebra of BLG theory with Nambu-Poisson structure. J. High Energy
Phys. 04, 089.
M ADORE , J. (1995). Introduction to Noncommutative Geometry and its Applications. Cambridge: Cambridge
University Press.
M AJID , S. (1995). Foundations of Quantum Group Theory. Cambridge: Cambridge University Press.
M AL’ TCEV, A. I. (1954). On general theory of algebraic systems. Mat. Sb. 35 (1), 3–20.
M AL’ TCEV, A. I. (1957). Free topological algebras. Izv. Akad. Nauk SSSR. Ser. Mat. 21, 171–198.
M AL’ TSEV, A. I. (1958). The structural characteristic of some classes of algebras. Dokl. Akad. Nauk SSSR 120,
29–32.
M ARCZEWSKI , E. (1966). Independence in abstract algebras. Results and problems. Colloq. Math. 14, 169–
188.
M ICHALSKI , J. (1981). Covering k-groups of n-groups. Arch. Math. (Brno) 17 (4), 207–226.
M ICHOR , P. W. AND A. M. V INOGRADOV (1996). n-ary Lie and associative algebras. Rend. Sem. Mat. Univ.
Pol. Torino 54 (4), 373–392.
M ONTGOMERY, S. (1993). Hopf algebras and their actions on rings. Providence: AMS.
NAMBU , Y. (1973). Generalized Hamiltonian dynamics. Phys. Rev. 7, 2405–2412.
N OVOTN Ý , M. (1990). Mono-unary algebras in the work of Czechoslovak mathematicians. Arch. Math.,
Brno 26 (2-3), 155–164.
N OVOTN Ý , M. (2002). Homomorphisms of algebras. Czech. Math. J. 52 (2), 345–364.
P ÉCSI , B. (2011). On Morita contexts in bicategories. Applied Categorical Structures, 1–18.
P ETRESCU , A. (1977). On the homotopy of universal algebras. I. Rev. Roum. Math. Pures Appl. 22, 541–551.
P OP, M. S. AND A. P OP (2004). On some relations on n-monoids. Carpathian J. Math. 20 (1), 87–94.
P OST, E. L. (1940). Polyadic groups. Trans. Amer. Math. Soc. 48, 208–350.
P R ÜFER , H. (1924). Theorie der abelshen Gruppen I. Grundeigenschaften. Math. Z. 20, 165–187.
R AUSCH DE T RAUBENBERG , M. (2008). Cubic extentions of the poincare algebra. Phys. Atom. Nucl. 71,
1102–1108.
RUSAKOV, S. A. (1979). A definition of an n-ary group. Dokl. Akad. Nauk BSSR 23, 965–967.
RUSAKOV, S. A. (1998). Some Applications of n-ary Group Theory. Minsk: Belaruskaya navuka.
S HNIDER , S. AND S. S TERNBERG (1993). Quantum Groups. Boston: International Press.
POLYADIC SYSTEMS, REPRESENTATIONS AND QUANTUM GROUPS
51
S OKHATSKY, F. M. (1997). On the associativity of multiplace operations. Quasigroups Relat. Syst. 4, 51–66.
S OKOLOV, E. I. (1976). On the theorem of Gluskin-Hosszú on Dörnte groups. Mat. Issled. 39, 187–189.
S OKOLOV, N. P. (1972). Introduction to the Theory of Multidimensional Matrices. Kiev: Naukova Dumka.
S TOJAKOVI Ć , Z. AND W. A. D UDEK (1986). On σ-permutable n-groups. Publ. Inst. Math., Nouv. Sér. 40(54),
49–55.
S WEEDLER , M. E. (1969). Hopf Algebras. New York: Benjamin.
TAKHTAJAN , L. (1994). On foundation of the generalized Nambu mechanics. Commun. Math. Phys. 160,
295–315.
T HURSTON , H. A. (1949). Partly associative operations. J. London Math. Soc. 24, 260–271.
T IMM , J. (1972). Verbandstheoretische Behandlung n-stelliger Gruppen. Abh. Math. Semin. Univ. Hamb. 37,
218–224.
T RACZYK , T. (1965). Weak isomorphisms of Boolean and Post algebras. Colloq. Math. 13, 159–164.
Ǔ SAN , J. (2003). n-groups in the light of the neutral operations. Math. Moravica Special vol.
V IDAL , J. C. AND J. S. T UR (2010). A 2-categorial generalization of the concept of institution. Stud. Log. 95
(3), 301–344.
WANKE -J AKUBOWSKA , M. B. AND M. E. WANKE -J ERIE (1984). On representations of n-groups. Annales
Sci. Math. Polonae, Commentationes Math. 24, 335–341.
W EYL , H. (1946). Classical Groups, Their Invariants and Representations. Princeton: Princeton Univ. Press.
Y UREVYCH , O. V. (2001). Criteria for invertibility of elements in associates. Ukr. Math. J. 53 (11), 1895–1905.
Z EKOVI Ć , B. AND V. A. A RTAMONOV (1999). A connection between some properties of n-group rings and
group rings. Math. Montisnigri 15, 151–158.
Z EKOVI Ć , B. AND V. A. A RTAMONOV (2002). On two problems for n-group rings. Math. Montisnigri 15,
79–85.
C ENTER FOR M ATHEMATICS , S CIENCE AND E DUCATION RUTGERS U NIVERSITY, 118 F RELINGHUYSEN R D .,
P ISCATAWAY, NJ 08854-8019
Current address: V.N. Karazin Kharkov National University, Svoboda Sq. 4, Kharkov 61022, Ukraine
E-mail address: [email protected], [email protected]
URL: http://homepages.spa.umn.edu/~duplij
| 4math.GR
|
Behavior-based Navigation of Mobile Robot in Unknown
Environments Using Fuzzy Logic and Multi-Objective
Optimization
Thi Thanh Van Nguyen, Manh Duong Phung and Quang Vinh Tran
University of Engineering and Technology - Vietnam National University, Hanoi
[email protected]
Abstract
This study proposes behavior-based navigation architecture, named BBFM, to deal
with the problem of navigating the mobile robot in unknown environments in the presence
of obstacles and local minimum regions. In the architecture, the complex navigation task
is split into principal sub-tasks or behaviors. Each behavior is implemented by a fuzzy
controller and executed independently to deal with a specific problem of navigation. The
fuzzy controller is modified to contain only the fuzzification and inference procedures so
that its output is a membership function representing the behavior’s objective. The
membership functions of all controllers are then used as the objective functions for a
multi-objective optimization process to coordinate all behaviors. The result of this
process is an overall control signal, which is Pareto-optimal, used to control the robot. A
number of simulations, comparisons, and experiments were conducted. The results show
that the proposed architecture outperforms some popular behaviorbased architectures in
term of accuracy, smoothness, traveled distance, and time response.
Keywords: Behavior-based navigation, fuzzy logic, multi-objective optimization,
mobile robot
1. Introduction
Mobile robot navigation is one of the most challenging problems in robotics. To
complete a navigation task, the robot must be capable of perceiving its surrounding
environment, interpreting data from sensors, planning the path to be tracked and
controlling the actuators to reach the target [1]. Navigation, on the other hand, is
fundamental for mobile robot applications. In order to complete any given task, the robot
first needs to have the capability of reaching the target safely. Navigation of mobile robot
thus has been receiving much research attention and the approaches can be classified into
two main categories: hierarchical architectures and reactive or behavior-based
architectures [2].
The hierarchical architecture operates through sequent steps of sensing, planning and
acting based on a known model of the environment. This architecture is appropriate for
static and structured environments. For unknown environments, the behavior-based
architecture is often used. This approach splits a complex navigation task into sub-tasks or
behaviors as shown in Figure 1. Each behavior is an independent control module dealing
with a specific problem of navigation. It takes input data from sensors and generates an
output control signal specifying for its objective. The output control signals of all
behaviors are then combined in accordance with the global navigating objective to
generate an overall control signal. As the combination only uses the local data, the
behavior-based architecture does not need to have a global map of the environment.
Besides, the use of behaviors enables the modularization and scalability of the
architecture.
Task
Control signal 1
Behavior 2
Control signal 2
...
Behavior N
Control signal N
Command
fusion
Overall control signal
Sensors
Behavior 1
Figure 1. General Scheme of the Behavior-based Navigation Architecture
The main challenge with the behavior-based architecture is how to combine behaviors,
alled command fusion, to achieve the navigation objective efficiently. The superposition
techniques deal with this problem by using a linear combination of behaviors generated
from potential fields [3] or motor schemata [4]. The potential fields select an action based
on vector sums of the potential fields produced by an attractive force from goal and
repulsive forces from obstacles. The motor schemata use the potential field to define the
output of each schema and then combine them to generate a motor action basing on
predetermined weighting factors. Those techniques are simple to implement but difficult
to adjust gains.
Another command fusion approach is voting techniques in which each behavior votes
for or against a set of actions. The actions are then combined to generate the best one. In
[5], the combination is simply the sum of votes. In DAMN [6], the combination is based
on weighting factors assigned by a mode manager. Due to compromise without priority,
these techniques may present poor performance in conflict situations, for example, if the
”obstacle avoidance” behavior votes for turning right to avoid an obstacle in front of it,
while the ”goal reaching” behavior votes for turning left since the goal is on the left of it,
the compromised action may direct the robot forward resulting a collision with the
obstacle.
A command fusion approach commonly used in recent mobile robot navigation
systems [7] - [14] is the fuzzy technique. This technique presents each behavior by a fuzzy
controller. The output fuzzy sets of all controllers are then combined and defuzzified to
generate the overall control signal. This technique is simple to implement and quite
efficient in navigation. The fusion, however, is not optimal as each defuzzification
method often results in a different control value [15], [16].
In order to deal with the optimization problem in command fusion, a technique based
on multi-objective optimization theory, called MOASM, was proposed [17]. This
technique represents each behavior by an objective function that assigns to each control
signal a value reflecting the grade of behavior’s objective. A multiobjective optimization
process is then applied to find the solution which best maximizes all the objective
functions. The main advantage of this technique is its theoretical approach to ensure the
optimality of the found solutions. However, the lack of a framework for designing
objective functions, which are usually complicated, prevented it from practical use.
In this study, we propose an approach to integrating the advantages of fuzzy logic and
multi-objective optimization into a single behavior-based navigation architecture called
BBFM. In this architecture, each behavior is represented by a fuzzy controller which only
contains the fuzzification and fuzzy inference procedures. Consequently, the output of
each fuzzy controller is a function of input variables whose value represents the grade of
behavior’s objective. They are then used as the input for a multi-objective optimization
process to find the optimal value of the overall control signal. The results from a number
of simulations, comparisons, and experiments confirm the efficiency of the proposed
architecture in navigating the mobile robot in complex and unknown environments.
350
The structure of paper includes five sections. Section 2 presents the BBFM
architecture. Section 3 simulates and compares the BBFM with two other popular
architectures. Section 4 presents experimental results. The paper finishes with conclusions
in Section 5.
2. Proposed Architecture
In this section, the overall structure of the BBFM architecture is first described. After
that, detailed implementation of each behavior is introduced. Finally, the command fusion
using multi-objective optimization is presented.
2.1. Overall Structure of the BBFM
The robot used to evaluate the proposed architecture is the type of differential drive
wheeled mobile robot with non-holonomic constraints. Its parameters are shown in Figure
2.
Figure 2. The Differential Drive Wheeled Mobile Robot and Its Parametes
where R is the wheel diameter, L is the distance between two wheels, and (x, y, θ)
represents the position and orientation of the robot. Let (xd, yd, θd) be the position and
orientation of the target. We define three additional variables for navigation: ρ defined by
Equation (1) is the distance from the center of the robot to the target; α defined by
Equation (2) is the angle between the robot heading and the vector connecting the robot
center with the target; and ed defined by Equation (3) represents the movement of the
robot with the target. For the sake of simplicity, whenever we refer to the position of the
robot in this paper, we mean its position and orientation.
( xd x)2 ( yd y)2
arctan( yd y, xd x) , [ , ]
ed i i 1
(1)
(2)
(3)
In the system, the motion of robot is controlled by adjusting its linear velocity, u, and
angular velocity, ω. The position of robot is determined via optical quadrature encoders.
To sense the environment, the robot is equipped with eight ultrasonic sensors clustered
into three groups of left, right, and front as shown in Figure 3. The measuring value of
each group is the minimum value of all sensors in that group:
d r min(d1 , d 2, d3 )
d f min(d 4 , d 5 )
(4)
dl min(d 6 , d 7, d8 )
where di is the distance to obstacles measured by sensor i. The mission of the robot is
to navigate in an unknown environment from an initial position to a desired target without
colliding with obstacles and getting trapped in any trap area.
351
Figure 3. Arrangement of Ultrasonic Sensors on the Robot
In order to complete this task, it is natural to subdivide it into small and easy-tomanage behaviors that focus on execution of specific subtasks. The subtasks would be: (i)
reaching the target from an arbitrary position, (ii) avoiding obstacles, and (iii) escaping
local minimum (trapped) regions. As a result, this approach simplifies the navigation
solution while offering a possibility to add new behaviors to the system without causing
any major increase in complexity. Individual behavior, however, needs to cope with
uncertainties and incompleteness of sensory information as well as with the fact that the
operating environment contains elements of dynamics and variability. Fuzzy logic is
known to be an organized method for dealing with those problems. Using linguistic rules,
fuzzy logic requires neither mathematical models of the environment nor the robot
dynamics to design motion controllers. Instead, it fuzzifies the inputs and takes advantage
of expert knowledge to discover and represent data relationships and to improve
uncertainty reasoning. Therefore, fuzzy logic provides a framework for designing
individual behavior.
The command fusion using fuzzy logic, however, does not give reliable solutions.
Figure 4 shows that the two ways of fusion using fuzzy logic: defuzzifying first and then
combining individual decisions, and combining individual decisions first and then
defuzzifying, generate different results. The reason is due to the concurrent activation of
multiple behaviors with possibility of conflict between them. In this context, it may not
exist a globally optimal solution that is simultaneously optimal with respect to all
behaviors. The optimization of one behavior’s objective might be associated with a
simultaneous deterioration of other behavior’s objective. Thus, it is more appropriate to
search for a ”good enough” solution that can guarantee a suitable trade-off between a
multitude of conflicting behaviors’ objectives. Multi-objective optimization provides a
theoretical approach to find this solution. It quantifies the problem through objective
functions that assign to each input a value reflecting their objectives’ desirability and
provide methods to optimize those functions simultaneously. Interestingly, if we remove
the defuzzification procedure in the design process of fuzzy controllers, the output of each
behavior will be a fuzzy membership function that its value represents the grade of
behavior’s objective. This function, therefore, encrypts the semantics meaning of
objective functions. This way, the fuzzy technique and multi-objective optimization can
be combined.
Defuzzification
0
-10
0+10
∑
4
-10
0
-10
8
Defuzzification
-10
0+10
(a)
Defuzzification
7.5
+10
-10
0
0
+10
+10
(b)
Figue 4. Two Fuzzy-based Approaches to Command Fusion: (a)
Defuzzifying First and Then Combining, (b) Combining First and Then
Defuzzifying
352
Figure 5 shows the structure of our proposed architecture. It has three behaviors
including the local minimum avoidance, obstacle avoidance, and goal reaching. Each
behavior is implemented by one customized fuzzy controller consisting of fuzzification
and inference modules. The inputs include variables defined in equations (1) - (4). The
output of each fuzzy controller includes two membership functions that map the input
space to the interval of [0, 1] representing the grade of behavior objective. They are then
used as the objective functions for a multi-objective optimization process to generate the
overall control signals, u* and ω*, which are the Pareto-optimal solutions.
Task
Local minimum avoidance Objective function
dl
df
dr
ed
Fuzzification
Inference
Obstacle avoidance
Fuzzification
Inference
Goal reaching
Fuzzification
Inference
LM u
LM
OA u
OA
GR u
GR
Command fusion
Multi-objective Optimization
uˆ max { LM (u), OA (u), GR (u)}
ˆ max { LM (), OA (), GR ()}
u*
*
Figure 5. The Overall Structure of the BBFM
2.2. Design of Individual Behavior
Each behavior is implemented by one customized fuzzy controller which only contains
the fuzzification and inference procedures, ignoring the defuzzification. The fuzzification
procedure maps the crisp input values to the fuzzy linguistic terms. Each linguistic term is
determined by a fuzzy set that is characterized by its membership function. In this study,
the Gaussian and Sigmoid membership functions are chosen to represent the fuzzy sets as
follows:
( xi cij )2
A e
2( ij ) 2
ij
B e
lk
( yl clk )2
2( lk )2
(5)
(6)
for the input and output Gaussian membership functions, respectively, and
1
Aij
(7)
aij ( xi bij )
1 e
1
Blk
(8)
alk ( xl blk )
1 e
for the input and output Sigmoid membership functions, respectively, where xi is the ith
input variable, yl is the lth output variables, Aij is the jth fuzzy set of the ith input variable,
Blk is the kth fuzzy set of the lth output variable, {cij, σij} and {clk, σlk} are the parameters
of input and output Gaussian membership functions, respectively, and {aij, bij} and {alk,
blk} are the parameters of input and output Sigmoid membership functions, respectively.
The inference procedure is responsible for formulating the relationship between the
inputs and the outputs. It is based on rules of the form” if...then...”, for example,” if x1 =
A1j and x2 = A2j and . . . xm = Amj then y1 = B1k and y2 = B2k and . . . yn = Bnk”. The result of
each rule for each output variable is then given by:
353
R ( yl ) min( H , B ( yl )),
k
lk
(9)
H min{ A1 j ( x1 ), A2 j ( x2 ),...., Amj ( xm )}
where Rk denotes the kth rule. For M control rules, the implication result of each output
variable according to the max-min method is an aggregated output fuzzy set with the
membership function determined by:
R ( yl ) max(R1 ( yl ), R2 ( yl ),...., RM ( yl )) .
(10)
The membership function (10) represents the degree of membership of each element in
the set of output variable yl. Detailed implementations of the fuzzification and inference
procedures for each behavior are described as follows.
2.2.1. Obstacle Avoidance
The obstacle avoidance behavior includes four input variables dr, df, dl, and α, and two
output variables u and ω as shown in Figure 5. Their linguistic terms and membership
functions are defined as shown in Figure 6.
1 N
F
M
0.5
0
1
1.5
2
2.5
1 LN
3
3.5 d (m)
-3
-2
N
Z
P
-1
0
1
(a)
S
0
2
3 (rad)
(b)
1
LP
L
M
0.2
0.4
0.6
0.8
1 LNO
1 u (m/s)
-4
-3
-2
(c)
PO
ZO
NO
-1
0
1
2
PNO
3 (rad/s)
(d)
Figure 6. The Linguistic Terms and Membership Function of Input and
Output Variables of the Obstacle Avoidance Behavior: (a) dl, df, dr; (b) α; (c):
u; (d): ω
Table 1 presents 28 control rules defined for the behavior. Let ROA,k (u ) and
R
OA ,k
( ) be respectively the results of the kth rule in this table for u and ω by using
Equation (9). The implication results according to the max-min method are then given by:
ROA (u ) max( ROA ,1 (u ), ROA ,2 (u ),..., ROA ,28 (u ))
(11)
ROA ( ) max( ROA ,1 ( ), ROA ,2 ( ),..., ROA ,28 ( )).
Table 1. Rules for Obstacle Avoidance
Collisions
354
Rule
1
dl
N
Input
df
dr
N
F
2
3
4
5
F
M
F
N
N
N
N
N
N
N
M
F
α
Output
u
ω
S
Po
M
M
N
M
Po
Po
LPo
LNo
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
N
F
M
F
N
N
M
N
N
N
N
N
N
N
N
M
F
M
F
F
F
F
F
N
N
N
N
M
N
N
M
M
F
F
F
F
N
F
M
M
F
F
F
F
F
F
M
F
F
M
N
N
M
M
F
M
F
F
F
N
F
N
N
N
N
N
N
N
N
M
M
M
M
M
S
S
M
M
M
S
S
L
L
L
M
M
M
L
L
L
S
S
LN
N
Z
LP
P
LN
N
Z
LP
P
No
Lpo
No
Po
Po
Po
Po
No
No
No
Lno
No
Zo
Zo
Zo
Po
Po
Po
Zo
Zo
Zo
Lpo
LPo
2.2.2. Goal Reaching
The objective of goal-reaching behavior is to control the robot to reach the target in the
shortest time. In order to complete this task, the behavior continuously adjusts the robot
direction to match the target direction while driving the robot at the fastest possible speed.
The behavior uses two input and two output variables as shown in Figure 5. Three of them
including the deflection angle α and the velocities u and ω have the same definition of
linguistic terms and membership functions as in the obstacle avoidance behavior. The
fourth variable, ρ, has the linguistic terms and membership functions defined as shown in
Figure 7.
1N M
0
2
F
4
6
8
10
12 14 16 18
20
(m)
Figure 7. The Linguistic Terms and Membership Function of ρ
The behavior has 15 rules defined as in Table 2. Let R
GR ,k
(u ) and RGR ,k ( ) be
respectively the results of the kth rule in the table for output variables u and ω by using
Equation (9). The implication results for u and ω according to the max-min method are
then given by:
RGR (u ) max( RGR ,1 (u ), RGR ,2 (u ),..., RGR ,15 (u))
(12)
RGR ( ) max( RGR ,1 ( ), RGR ,2 ( ),..., RGR ,15 ( )).
355
Table 2. Rules for Goal Reaching
Rule
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
Input
ρ
α
N
Z
N
N
N LN
N
P
N LP
M
Z
M
N
M LN
M
P
M LP
F
Z
F
N
F LN
F
P
F
LP
Output
u
ω
S
Zo
S
No
S LNo
S
Po
S LPo
M Zo
M No
M LNo
M Po
M LPo
L
Zo
L
No
L LNo
L
Po
L LPo
2.2.3. Local Minimun Avoidance
During navigation, the robot may be trapped in U-shape regions called local minimum
problem. It happens when the robot repeatedly conducts opposite turning commands
during avoiding obstacles. Figure 8(a) illustrates such a situation. The robot starts from A,
moves toward the target according to rules 6 and 11 in Table 1; at B, it turns left
according to rules 11 and 12 to move to C or it can turn right to move to D depending on
the priority; at C, it turns left to go toward the target according to rules 27 and 28 and
back to B. The process is repeated causing the robot to be trapped.
Target
Target
k 1
B
D
C
C
k
B
C1
Cn
(a)
(b)
Figure 8. The Fuzzy-based Method for Dealing with the Local Minimum
Problem: (a) the Robot is trapped in a Local Minimum Region; (b) the Robot
Scapes the Local Minimum Region Using the Fuzzy-based Method
In order to deal with this problem, we carefully analyze various trapped situations and
realize that it is critical to detect the trapped points which are points C and D in the
example shown above. We detect them by checking if the distance ed is increasing, the
target is behind the robot (corresponding to the positive value of α), and the obstacle is on
the right (or left) side of robot. Figure 8(b) shows that if the robot goes straight instead of
turning left at the trapped point C, it will reach Cn as the conditions do not change from C
to Cn. At Cn, the robot will turn right to exit the local minimum region. In order to
implement the proposed solution, the behavior of local minimum avoidance has five input
variables including dl, df, dr, α, and ed and two output variables including u and ω. The
linguistic terms and membership functions of ed are defined as in Figure 9.
356
1
ZT
NT
-1 -0.8 -0.6 -0.4 -0.2
PT
0 0.2 0.4 0.6 0.8
1 ed (m)
Figure 9. The Linguistic Terms and Membership Function of ed
The linguistic terms and membership functions of the remained variables are defined as
in the obstacle avoidance behavior. Table 3 presents 7 control rules for detecting trapped
points and escaping local minimum regions. Let R (u ) and R ( ) be respectively
LM ,k
LM ,k
the results of the kth rule in the table for output variables u and ω by using Equation (9).
The implication results for u and ω according to the max-min method are then given by:
RLM (u ) max( RLM ,1 (u ), RLM ,2 (u ),..., RLM ,7 (u ))
(13)
RLM ( ) max( RLM ,1 ( ), RLM ,2 ( ),..., RLM ,7 ( )).
Table 3. Rules for Local Minimum Avoidance
Rule
1
2
3
4
5
6
7
dl
N
F
F
F
F
F
F
df
N
N
N
F
F
F
F
Input
dr
N
N
N
N
N
F
F
ed
PT
PT
PT
PT
α
Z
P
LP
P
LP
P
LP
Output
u
ω
S
Po
M
Po
S
LPo
M
Zo
M
Zo
M
Zo
M LNo
2.3. Command Fusion
The command fusion is carried out by using multiobjective optimization. As shown in
Figure 5, the membership functions of output variables are used as the objective
functions. Let μi(y) be the ith objective function, y be an output control signal (y = u or y
= ω), Y be the domain of y, and N be the number of objective functions. The optimal
value of each output control signal is then the solution of the following equation:
yˆ arg max[1 ( y), 2 ( y),..., N ( y)]
(14)
According to the theory of multi-objective optimization, there might not exist the
optimal solution, ŷ , of Equation (14), but only the ”good enough” solution, y*, which is
the best fit for all objectives. This solution is called the Pareto-optimal solution or nondominated solution defined as follows: y* is the Pareto-optimal solution of Equation (14)
if there does not exist any y Y such that μi(y) > μi(y*) for at least one i and μj(y) ≥ μj(y*)
for all j. In other words, the Pareto optimal solution is the one in which there is not other
solution that improves an objective without resulting in the deterioration of at least
another objective.
In order to find the Pareto-optimal solution, there exist a number of methods [17] such
as weighting, lexicographic, and goal programming. In the context of command fusion,
we choose to use the lexicographic method due to its efficiency. This method first
requires ranking the order of importance of all objectives, for instance, µ1 is the most
important and µN is the least important. The Pareto-optimal solutions are then obtained by
357
solving the following sequence of problems until either a unique solution is found or all
the problems are solved:
P1 : max[ 1 ( y )]
yY
P2 : max[ 2 ( y )]
yY1
...
PN : max[ N ( y )]
(15)
yYN 1
Yi { y | y solves Pi }, i 1,..., N 1
In our system, the optimal values of the overall control signal are determined by the
output membership functions of (11), (12), and (13) as follows:
uˆ arg max[ ROA (u ), RGR (u ), RLM (u )],
(16)
ˆ arg max[ ROA ( ), RGR ( ), RLM ( )]
The lexicographic method used to find the Pareto optimal solutions of (16) are carried
out as follows:
Sorting all behaviors in descending order of importance: local minimum
avoidance, obstacle avoidance, and goal reaching.
Sequentially solving equations Pi by using discrete values of u and ω on their
domains U and W until a unique solution is obtained, or all equations are solved:
P1 : max[ RLM (u )],
P1 : max[ RLM ( )],
uU
W
P
:
max[
(
u
)],
P
:
max[
2 uU
2 W ROA ( )],
ROA
1
1
*
*
u : U1 {u | u solves P1},
: W1 { | solves P1}, (17)
P : max[ (u )],
P : max[ ( )],
3 uU 2 RGR
3 W2 RGR
U 2 {u | u solves P2 }
W2 { | solves P2 }
If more than one Pareto-optimal solution is obtained, the one with the greatest
value of u and the smallest value of ω is chosen.
3. Simulations
Simulations have been conducted to evaluate the efficiency of the BBFM compared to
two other popular architectures including the MOASM [17] and CDB [10]. The MOASM
uses multi-objective optimization for command fusion. It is implemented with three
behaviors including avoiding obstacles, maintaining the target heading and moving fast
forward. The objective functions are defined as in the origin [17]. The overall control
signal is determined by using the lexicographic method. The CDB is implemented with
three behaviors as in the MOASM. Each behavior is a fuzzy controller. The overall
control signal is determined by using fuzzy meta rules and defuzzification. In order to
ensure the fairness in comparison, the BBFM only uses the obstacle avoidance and goal
reaching behaviors.
All architectures are simulated in Matlab and use the same robot configuration. Its
mechanical parameters are set as follows: R = 0.085 m, L = 0.265 m, u [0, 1.3] m/s,
and ω [-4.3, 4.3] rad/s. The ultrasonic sensors have the sensing range from 0 m to 4 m
and the radiation cone of 15°. They are arranged in front of the robot as shown in Figure 3
to cover the range of 160°. The universe of discourse of ρ is in the range of [0, 20] and
that of ed is [-1, 1]. In simulations, three scenarios were chosen for navigating the robot. In
each scenario, 15 runs were carried out to evaluate the performance of each architecture.
Details and results of each scenario are presented as follows.
358
3.1. Popular Operating Environment
In scenario 1, the operating environment is chosen to be the same as in the original
paper of MOASM [17]. The start position is (-2, -1.8, 180°) and the target position is (-6, 4.8, 0°). Figure 10 shows the path of robot generated by three architectures MOASM,
BBFM, and CDB. It can be seen that all architectures successfully navigate the robot to
avoid obstacles and reach the target. Table 4 shows the average performance of each
architecture, where the index smoothness is the average absolute value of the difference
between the current and the previous orientation, thus showing how smooth the
maneuvers is; the index target error is the distance between the final position of the robot
and the target position, thus evaluating the reachable ability to the target at the steady
state; and the indexes traveled distance and elapsed time are respectively the total distance
of the robot’s traveled path and the time taken to go through that path. As can be inferred
from Table 4, the BBFM is more efficient than the remaining architectures in almost all
criteria.
(a)
(b)
(c)
Figure 10. Travelling Paths of the Robot Navigated by Three Architectures
in Scenario 1: (a) BBFM, (b) MOASM, (c) CDB
Table 4. Navigation Results in Scenario 1
Index
Traveled distance (m)
Elapsed time (second)
Smoothness (degree)
Target error (m)
BBFM
10.36
28.26
0.88
0.05
MOASM
11.02
41.45
1.29
0.2
CDB
11.02
36.43
6.1
0.05
3.2. Office-like Operating Environment
In scenario 2, the operating environment is chosen to be more like an office with wall
and bulkhead obstacles. The start position is (-7, -6, 0°) and the target is (-2.5, -1.5, 0°).
Figure 11 and Table 5 show the navigation results. It can be seen that the MOASM does
not complete the navigation task as its objective functions are built based on the principle
of Instantaneous Center of Curvature (ICC) of differential drive wheeled mobile robot
which does not efficient in escaping corners. On the other hand, both the BBFM and CDB
can safely navigate the robot to reach the target due to the efficiency of fuzzy control.
However, the BBFM is more efficient than the CDB.
359
(a)
(b)
(c)
Figure 11. Travelling Paths of the Robot Navigated by Three Architectures
in Scenario 2: (a) BBFM, (b) MOASM, (c) CDB
Table 5. Navigation Results in Scenario 2
Index
Traveled distance (m)
Elapsed time (second)
Smoothness (degree)
Target error (m)
BBFM
9.35
12.09
2.04
0.05
CDB
15.66
24.45
3.16
0.05
3.3. Operating Environment with Local Minimun Regions
In the third scenario, the operating environment has local minimum regions. The robot
starts at position (-6, -6, 0°) and desires to reach position (-2.5, -1.5, 0°). The results in
Figure 12 show that all three architectures are not able to complete the navigation task
because of local minimum problem. This problem can be solved if adding a local
minimum avoidance behavior to the BBFM as shown in Figure 13(a). Even in a more
complicated local minimum situation, the BBFM still completes the navigation task as
shown in Figure 13(b).
(a)
(b)
(c)
Figure 12. Travelling Paths of the Robot Navigated by Three Architectures
in Scenario 3: (a) BBFM, (b) MOASM, (c) CDB
Figure 13. Travelling Paths of the Robot Navigated by the BBFM in
Operating Environment with Local Minimum Regions
360
4. Experiments
In order to evaluate the performance of the BBFM in real environments, we carried out
a number of experiments described as follows.
4.1. Experimental Setup
The robot used in experiments is a Sputnik robot [18] as shown in Figure 14. It is
equipped with three ultrasonic sensors DUR5200 at left, front and right directions creating
the scanning range from −60° to 60°. To extend the scanning range from −90° to 90°, we
added two additional ultrasonic sensors SRF05 to the left and right sides of the robot.
Each employs a microcontroller PIC12F1572 to synchronize its data with the main board
of Sputnik robot. The linear and angular velocities of the robot are respectively set to [0,
0.5] m/s and [-3.7, 3.7] rad/s. The position of the robot is determined via optical encoder
sensors. The robot has a wireless module connecting it to a Wifi router (Figure 14). The
BBFM is written in Matlab and installed on a PC which communicates with the robot
through a Wifi router. The sampling time Ts is 300 ms and the experimental environment
is an indoor office with the size of 4 m x 3 m and changeable obstacles.
Figure 14. The Sputnik Robot and Its Configuration to Communicate
with the Control Computer
4.2. Experimental Results
Experiments were carried out with different configurations of the environment and
target position. Figure 15 shows results of the traveled paths, velocity responses and
images of the robot in three of such configurations. In configuration 1 (Figure 15(a)), the
robot starts at A (0, 0, 90°) and then moves forward along two walls to B. At B, it turns
right two times to C and then goes straight to D. At D, the robot continuously adjusts its
direction to avoid the bulkhead corners while on average maintaining the target heading to
reach E and finally goes straight to reach the target F (1.9, 2.5, 0°). Figure 15(b) shows the
correspondence of linear and angular velocities of the robot with those movements, for
instance, between D and E near the target, the angular velocity switches between the left
and right directions to avoid the bulkhead corners while the linear velocity gradually
decreases to prepare for stopping at the target.
In configuration 2 as shown in Figure 15(d), the environment structure changed with
more potential local minimum regions. The robot starts at position (-0.1, -1, 90°) and the
target is set to (-0.1, 2.5, 0°). The path from B to D shows that the robot successfully
escapes the local minimum region near the starting position. From D to F, it succeeds in
avoiding obstacles located at the center and near the target. Figure 15(e) shows the
correspondence of the robot’s velocities with its movements. The operating environment
in Configuration 3 is similar to the configuration 2. However, the start and target positions
are changed to (0.1, -0.2, 0°) and (1.8, 2.3, 0°), respectively. As can be inferred from
Figure 15(g)-(i), the robot can reach the target while avoiding obstacles and potential
local minimum regions.
Table 6 shows the navigation performance in each configuration. As can be inferred
from the table, configuration 1 introduces the best performance in smoothness and elapsed
361
time because it is the simplest case. On the contrary, configuration 2 introduces the worst
performance due to obstacles and local minimum regions. Nevertheless, the closeness
between values of average linear velocities in all configurations implies that the operation
of robot is stable and suitable for the indoor environment.
Table 6. Navigation Results in Three Configurations
Configuration
1
2
3
uaverage
(m/s)
0.18
0.15
0.16
Smoothness
( degree)
3.72
6.54
5.75
Elapsed
time (s)
22.5
33
24
Traveled
distance (m)
4.06
4.86
3.77
(a)
(b)
(c)
(d)
(e)
(f)
(g)
(h)
(i)
Target
error (m)
0.05
0.08
0.07
Figure 15. Travelling Paths, Velocity Responses, and Photos of the
Robot Operating in Three Different Navigation Configurations: (a) – (c):
Configuration 1, (d) – (f): Configuration 2, (g) – (i): Configuration 3
5. Conclusions
In this paper, we have proposed new behaviorbased navigation architecture for
navigating the mobile robot in unknown environments. We modified the procedures of
designing fuzzy controllers for behaviors so that their outputs can be used as inputs for a
multiobjective optimization process to coordinate the behaviors. Consequently, the
architecture inherits advantages of fuzzy logic in dealing with uncertainties of sensory
information while providing a framework for designing objective functions. It also takes
advantage of multiobjective optimization to generate Pareto-optimal solutions for
command fusion. During the development, we proposed a very simple yet effective fuzzybased approach for dealing with the local minimum problem which often happens in
362
mobile robot navigation. The results show that the proposed architecture is practical in
implementation and possibly navigates the robot to reach the target along a smooth and
efficient trajectory in environments with unpredictable obstacles, topographies and local
minimum regions.
References
[1]
[2]
[3]
[4]
[5]
[6]
[7]
[8]
[9]
[10]
[11]
[12]
[13]
[14]
[15]
[16]
[17]
[18]
S. Roland and N. I. R, “Introduction to autonomous mobile robots”, The MIT Press Cambridge, (2004),
pp. 10–11.
D. Nakhaeinia, S. H. Tang, S. B. M. Noor and O. Motlagh, “A review of control architectures for
autonomous navigation of mobile robot”, International Journal of the Physical Sciences, vol. 6, no. 2,
(2011), pp. 169–174.
O. Khatib, “Real-time obstacle avoidance for manipulators and mobile robots”, The International
Journal of Robotics Research, vol. 1, no. 5, (1986), pp. 90–98.
R. Arkin, “Motor-schema based mobile robot navigation”, Int. J. Robot, vol. 8, no. 4, (1989).
J. Hoff and G. Bekey, “An architecture for behavior coordination learning”, In IEEE International
Conference on Neural Networks, (1995).
J. Rosenblatt, “DAMN: A distributed architecture for mobile navigation”, In Proceedings of the AAAI
Spring Symposium on Software Architecture for Physical Agents, (1995).
Saffiotti, “The uses of fuzzy logic in autonomous robot navigation”, Soft Computing, Springer Verlag,
(1997), pp. 180–197.
M. S.-F. Eduardo Freire, Teodiano Bastos-Filho and R. Carelli, “A new mobile robot control approach
via fusion of control signals”, IEEE transactions on system, mam and cybernetics, vol. 34, no. 1, (2004).
S. A. Yahmedi, A. B. El-Tahir El-Dirdiri and T. Pervez, “Behavior based control of a robotic based
navigation aid for the blind”, Control and Applications Conference, (2009).
S. A. Yahmedi and M. A. Fatmi, “Fuzzy logic based navigation of mobile robot”, Recent Advances in
Mobile Robotics, (2011).
G. Z. Ye and D.-K. Kang, “Fusion of hierarchical behavior-based actions in mobile robot using fuzzy
logic”, Journal of Information and Communication Convergence Engineering, vol. 10, no. 2, (2012), pp.
149–155.
Q. T. Hongwei Mo and L. Meng, “Behavior - based fuzzy control for mobile robot navigation”,
Mathematical Problems in Engineering, no. Article ID 561451, (2013).
M. Faisal, K. Al-Mutib, R. Hedjar, H. Mathkour, M. Alsulaiman and E. Mattar, “Behavior based mobile
for mobile robots navigation and obstacle avoidance”, International Journal of computers and
communications, vol. 8, (2014).
R. V. D. Sousa, R. A. Tabile, R. Y. Inamasu and A. J. V. Porto, “A row crop following behavior based
on primitive fuzzy behaviors for navigation system of agricultural robots”, 4th IFAC Conference on
Modelling and Control in Agriculture, Horticulture and Post Harvest Industry, vol. 46, (2013), pp. 91–96.
D. Driankov, H. Hellendoorn and M. Reinfrank, “An introduction to fuzzy control,” Spinger, (2010), pp.
132–141.
S. Naaz, A. Alam and R. Biswas, “Effect of different defuzzification methods in a fuzzy based load
balancing application”, International Journal of Computer Science Issues, vol. 8, no. 1, (2011), pp. 261–
267.
P. Pirjanian, “Multiple objective behavior-based control”, Robotics and Autonomous Systems, Elsevier,
no. 31, (2000), pp. 53–60.
D. R. Manual, http://www.drrobot.com/products.
363
| 3cs.SY
|
A New Simulation Algorithm for Absorbing
Receiver in Molecular Communication
Yiran Wang† , Adam Noel‡ , and Nan Yang†
arXiv:1803.04638v1 [cs.ET] 13 Mar 2018
†
Research School of Engineering, Australian National University, Canberra, ACT 2601, Australia
‡
School of Engineering, University of Warwick, Coventry, CV4 7AL, UK
Email: [email protected], [email protected], [email protected]
Abstract—The simulation of diffusion-based molecular communication systems with absorbing receivers often requires a
high computational complexity to produce accurate results. In
this work, a new a priori Monte Carlo (APMC) algorithm
is proposed to precisely simulate the molecules absorbed at
a spherical receiver when the simulation time step length is
relatively large. This algorithm addresses the limitations of the
current refined Monte Carlo (RMC) algorithm, since the RMC
algorithm provides accurate simulation only for a relatively
small time step length. The APMC algorithm is demonstrated to
achieve a higher simulation efficiency than the existing algorithms
by finding that the APMC algorithm, for a relatively large
time step length, absorbs the fraction of molecules expected by
analysis, while other algorithms do not.
I. I NTRODUCTION
Molecular communication (MC) has recently emerged as
an underpinning paradigm of exchanging information in nanoscale environments such as organs, tissues, soil, and water [1].
This information exchange is conducted among nanomachines
which are the devices with nano-scale functional components.
Within the research community, diffusion-based MC is a
simple but commonly adopted MC system. In such a system,
information molecules propagate using kinetic energy only,
which preserves a high energy efficiency. One of the major
challenges in designing and analyzing a diffusion-based MC
system is receiver modeling. The majority of the existing
MC studies have considered two types of receivers: passive
receivers and active receivers. Passive receivers do not impose
any impact on molecule propagation, while active receivers
can absorb molecules when they hit the receiver’s surface.
In nature, most receiver nanomachines react with or remove
selected information molecules from the environment when
they hit the receiver’s surface. Thus, active receivers are
generally more realistic than passive ones in describing the
chemical detection mechanism in MC. This motivates us to
investigate the properties of absorbing receivers.
The notion of diffusion with absorption is a long existing
phenomenon that has been described in the literature, e.g., [2].
Considering a diffusion-based MC system with a single fully
absorbing receiver within an unbounded three-dimensional
environment, [3] presented the hitting rate of molecules at
different times and the fraction of molecules absorbed until
a given time. Recently, [4] and [5] evaluated the impact of
receiver with reversible absorption on the performance of
MC systems, where a molecule can be released back to the
environment at some time after being captured by the receiver.
Apart from theoretical analysis such as [3]–[5], the simulation of MC systems is also an effective means for performance
evaluation. One of the most common MC simulation methods
is particle-based microscopic simulation. For diffusion-based
MC, molecules are moved by adding Gaussian random variables (RVs) to their x-, y-, and z-coordinates at the end of
every simulation time step. In practice, molecules may actually
diffuse into an absorbing receiver between two sampling times.
To determine this absorption, some existing simulation algorithms simply compared the observed coordinates of molecules
with those of the receiver [4], [6], [7]. As a consequence,
the molecules that hit a receiver between sampling times
cannot be considered as “absorbed” by using these simulation
algorithms. Recently, [8] and [9] investigated the possibility of
molecule absorption between sampling times. Specifically, [8]
declared a molecule as “absorbed” if its straight-line trajectory
within a time step crossed an absorbing surface. Differently,
[9] approximated the intra-step absorption probability for
spherical receiver boundaries using the equation for planar
receiver boundaries given by [10]. This approximation was
referred to as the refined Monte Carlo (RMC) algorithm.
The key contribution in this paper is that we propose a new
algorithm, i.e., the a priori Monte Carlo (APMC) algorithm,
for simulating an MC system with an absorbing receiver,
considering a relatively large time step length. We show that
using our APMC algorithm, the fraction of molecules absorbed
at the receiver precisely matches the corresponding analytical
result when the time step length is relatively large, or equivalently, the receiver’s radius is small. This demonstrates that
our APMC algorithm achieves a high simulation efficiency.
II. S YSTEM M ODEL
We consider a diffusion-based MC system within a threedimensional space, as depicted in Fig. 1. In this system, a
point transmitter (TX) is located at the origin of the space and
a single fully absorbing spherical receiver (RX) is centered
at location (r0 , 0, 0). We denote rr as the RX’s radius and
Ωr as the RX’s boundary. At the beginning of a transmission
process, the TX instantaneously releases N molecules. We
assume that the molecules are small enough to be considered
as points. Once released, molecules diffuse in the environment
according to Brownian motion until hitting the RX’s boundary.
z-axis
Molecules
Algorithm 1 The common structure of simulation algorithms
for a single absorbing RX
Ωr
1:
Receiver
(r0,0,0)
Transmitter
(0,0,0)
y-axis
2:
3:
4:
x-a
xis
rr
5:
6:
7:
Fig. 1: Illustration of our system model. The TX is a point transmitter located
at (0, 0, 0), the RX is a spherical receiver located at (r0 , 0, 0) with rr
being the radius and Ωr being the RX’s fully absorbing boundary. Molecules
propagate in the environment according to Brownian motion.
Molecule’s initial position
before propagation
Absorbing
receiver
8:
9:
10:
11:
12:
13:
Determine the end time of simulation.
for all simulation time steps do
if t = 0 then
Add N molecules to environment.
end if
Scan all not-yet-absorbed molecules, i.e., molecules
which are not absorbed by the RX.
for all not-yet-absorbed molecules do
Propagate each molecule for one step according to
Brownian motion.
Determine if the molecule is absorbed. molecules
absorbed
Update the location and status of the molecule.
end for
Record the number of molecules absorbed by the RX.
end for
Molecule’s final location
after propagation
Fig. 2: Illustration of the intra-step molecule movement. There is a possibility
that a molecule crossed an absorbing boundary within one time step, even
if its initial and final positions during that time step are both outside the
absorbing receiver.
We denote Nhit (Ωr , t|r0 ) as the number of molecules released
from the origin at time t0 = 0 s and absorbed by the RX at
time t. As per [11, Eq. (3.116)], we express Nhit (Ωr , t|r0 ) as
N rr
r0 − rr
,
(1)
erfc √
Nhit (Ωr , t|r0 ) =
r0
4Dt
where D is the diffusion coefficient and erfc (·) is the complementary error function. Here, D describes the proportionality
constant between the flux due to molecular diffusion and the
gradient in the concentration of molecules.
As mentioned in Section I, the majority of the existing
simulation algorithms for absorbing RXs did not consider the
possibility of intra-step molecule absorption. This absorption
is depicted in Fig. 2, which shows that the actual trajectory
of a molecule may cross the absorbing boundary during one
simulation time step, even if its initial position at the beginning
of the time step and its final position at the end of the same
time step are both outside the absorbing RX. If this crossing
occurs, the molecule is absorbed by the RX in practice. The
ignorance of this absorption leads to an underestimation of the
number of molecules absorbed, thus deteriorating the accuracy
of simulation. In this work, we refer to the probability that
a molecule is absorbed during a simulation time step as the
intra-step absorption probability. We note that the intra-step
absorbing probability was only considered in [8], [9]. In [9],
the intra-step absorption probability of a fully absorbing RX
with the spherical boundary was approximated as that of a
fully absorbing RX with an infinite planar boundary, given
by [10, Eq. (10)]
li lf
,
(2)
PrßRMC = exp −
D∆t
where li is the initial distance of a molecule from the absorbing
boundary at the beginning of a time step, lf is the final distance
of a molecule from the absorbing boundary at the end of the
same time step, and ∆t is the simulation time step length.
III. S IMULATION A LGORITHMS
In this section, we first clearly present the common structure
of the existing simulation algorithms for absorbing receivers.
Then we present our proposed APMC algorithm.
A. Common Structure of Existing Simulation Algorithms
Built upon the observation of the existing simulation algorithms for microscopic molecule absorption (such as those
in [6], [8], [9]), we find that they follow a common structure.
This common structure is presented in Algorithm 1.
We clarify that each algorithm has its own criterion for
determining whether or not a molecule is absorbed by the RX,
as given in Line 9 of Algorithm 1. The determination criteria
for the existing algorithms in [6], [8], [9] are summarized as
follows:
•
•
•
As per the determination criterion in [6], the molecules
being observed inside the RX at the end of a time step
are absorbed. This criterion is referred to as the simplistic
Monte Carlo (SMC) algorithm.
As per the determination criterion in [8], a molecule is
absorbed if the line segment from its initial position to
its final position crosses the RX’s boundary. However, we
note that the line segment crossing the RX’s surface is
neither sufficient nor necessary to correctly detect intrastep absorption.
As per the determination criterion in [9], referred to as
the RMC algorithm, (2) is used to calculate the intra-step
absorption probability of a fully absorbing RX with the
spherical boundary.
which is obtained by scaling (1) by N , replacing the total
simulation time t with ∆t, and replacing r0 with dj . Then the
molecule absorption is determined by generating a uniform RV
u, where 0 ≤ u ≤ 1, and comparing its value with the probability obtained by (3). A molecule is marked as “absorbed”
if u ≤ PrßAPMC . After determining the molecules absorbed,
each not-yet-absorbed molecule is propagated according to
Brownian motion. If any not-yet-absorbed molecule is inside
the RX’s boundary at the end of the current time step, we
revert the movement of this molecule and let it propagate
again, until this molecule diffuses to a location outside the
RX. The APMC algorithm is detailed in Algorithm 2.
IV. N UMERICAL R ESULTS
In this section, we use Monte Carlo simulations to compare
the time-varying results produced by the SMC algorithm, the
RMC algorithm, and the APMC algorithm for a single receiver.
The algorithms are implemented in MATLAB. Throughout this
section, we set the diffusion coefficient as D = 10−9 m2 /s and
assume that other parameters vary. In the figures, M denotes
the number of time steps. If not otherwise noted, the TX-RX
distance is r0 = 50 µm and the number of molecules released
is N = 106 . The fraction of molecules absorbed is defined
as the ratio between the number of molecules absorbed at the
RX and the total number of molecules.
Fig. 3 plots the simulated fraction of molecules absorbed
versus time t for M = 100, ∆t = 0.1 s, and rr = 20 µm
or 0.5 µm. In this figure, the analytical result obtained from
(1) is also plotted for evaluating the accuracy of the algorithms. From this figure, we observe that our APMC algorithm
achieves a higher accuracy when rr decreases while ∆t,
D, and r0 remain unchanged. Specifically, Fig. 3(a) shows
that the RMC algorithm matches the fraction of
√ molecules
absorbed expected by the analytical result when D∆t/rr is
small, which meets our expectation. Indeed, the performance
√
of the √
RMC algorithm depends on the value of D∆t/rr .
When D∆t/rr approaches 0 and r0 is larger than rr , the
surface area of the RX can be approximated by an infinite
plane. Therefore, the probability of a molecule entering the
RX between sampling times is comparable to the probability
of a molecule crossing a planar boundary between sampling
1:
2:
3:
4:
5:
6:
7:
8:
9:
10:
11:
12:
13:
14:
15:
16:
17:
18:
19:
20:
21:
22:
23:
24:
Determine the end time of simulation.
for all simulation time steps do
if t = 0 then
Release N molecules into environment.
end if
Scan all not-yet-absorbed molecules.
for all not-yet-absorbed molecules do
Calculate the distance between the jth molecule to
(r0 , 0, 0), denote by dj .
Calculate the absorbed probability PrßAPMC for
each not-yet-absorbed molecule using (3) with rr , dj , D,
and ∆t.
if PrßAPMC ≥ u then
The molecule is absorbed.
end if
end for
for all not-yet-absorbed molecules do
Propagate the molecule for one step.
end for
for all free molecules in environment do
while the molecule’s distance to (r0 , 0, 0) ≤ rr do
Revert the movement of this molecule.
Propagate this molecule again.
end while
end for
Record the number of molecules absorbed at the RX
after this time step.
end for
0.6
0.5
0.4
0.04
RMC
SMC
APMC
Analytical
Fraction of Molecules Absorbed
In this subsection, we propose a new simulation algorithm
for approximating the√fraction of molecules absorbed at a fully
absorbing RX when D∆t/rr is larger than that considered
for the RMC algorithm in [9]. We refer to the newly proposed
algorithm as the APMC algorithm.
The procedure of the APMC algorithm is to first calculate,
before the jth molecule diffuses, the probability that this
molecule will be absorbed in the current time step. This
probability depends on the distance between this molecule
and the center of the RX, dj , and the time step length, ∆t.
Specifically, this probability is calculated as
dj − rr
rr
,
(3)
PrßAPMC = erfc √
dj
4D∆t
Algorithm 2 The APMC algorithm for molecule absorption
Fraction of Molecules Absorbed
B. A New A Priori Monte Carlo Algorithm
0.3
0.2
0.1
00
2
4
6
Time [s]
(a) rr = 20 µm
8
0.03
RMC
SMC
APMC
Analytical
0.02
0.01
0
0
2
4
6
8
Time [s]
(b) rr = 0.5 µm
Fig. 3: Comparison of the time-varying results produced by the SMC
algorithm, the RMC algorithm, and the APMC algorithm for M = 100 and
∆t = 0.1 s.
√
times. We also observe from Fig. 3(a) that when D∆t/rr is
small, the SMC algorithm and the APMC algorithm underestimates and overestimates the fraction of molecules absorbed,
respectively. Unlike Fig. 3(a), Fig. 3(b) shows that the APMC
algorithm matches the fraction of molecules absorbed expected
by the analytical result whereas the other two algorithms do
not. Particularly, the fractions of molecules absorbed produced
by the RMC and SMC algorithms are very far away from the
0.4
0.15
0.1
RMC
SMC
APMC
Analytical
0.05
0
0
1
2
3
Fraction of Molecules Absorbed
Fraction of Molecules Absorbed
0.2
0.3
0.2
0
4
RMC
SMC
APMC
Analytical
0.1
0
10
20
30
40
Time [s]
Time [s]
(a) ∆t = 0.5 s
(b) ∆t = 5 s
80
0.5
Distribution of
absorbed molecules
Analytical
60
0.4
0.3
40
0.2
20
0.1
0
1
2
3
4
5
0
Number of Molecules Newly Absorbed
Number of Molecules Newly Absorbed
Fig. 4: Comparison of the time-varying results produced by the SMC
algorithm, the RMC algorithm, and the APMC algorithm for M = 100 and
rr = 10 µm.
0.5
Distribution of
absorbed molecules
Analytical
60
0.4
0.3
40
0.2
20
0.1
0
1
2
3
4
Time [s]
Time [s]
(a) RMC Algorithm
(b) APMC Algorithm
5
0
Fig. 5: Distribution of the number of molecules newly absorbed during each
time step for the RMC and APMC algorithms with ∆t = 0.5 s, M = 10, and
rr = 10 µm. Simulations are repeated 103 times and N = 103 molecules
are released each time. The spectrum bars represent observation probabilities.
√
analytical result when t > 0 s. Indeed, when D∆t/rr is
large, the spherical RX’s boundary cannot be approximated
by a plane. Therefore, the RMC algorithm overestimates the
fraction of molecules absorbed.
Fig. 4 plots the simulated fraction of molecules absorbed,
together with the analytical result from (1), versus time t for
M = 100, rr = 10 µm and ∆t = 0.5 s or 5 s. We observe
from this figure that when ∆t increases from 0.5 s to 5 s,
our APMC algorithm achieves a higher accuracy. Specifically,
Fig. 4(a) shows that the gap between the fraction of molecules
absorbed produced by the APMC algorithm and that produced
by the RMC algorithm is very small. Also, Fig. 4(a) shows
that both the APMC and the RMC algorithms overestimate
the fraction of molecules absorbed. Unlike Fig. 4(a), Fig. 4(b)
shows that the APMC algorithm matches the fraction of
molecules absorbed expected by the analytical result. Fig. 4(b)
shows that the fraction of molecules absorbed produced by the
RMC algorithm is approximately twice of that produced by
the APMC algorithm when t ≥ 10 s. This
√ demonstrates the
accuracy of our APMC algorithm when D∆t/rr is large.
Fig. 5 depicts the distribution of molecules newly absorbed
during each time step (e.g., from t = 1 s to t = 1.5 s) for
both the RMC and APMC algorithms for M = 10, rr =
10µm, and ∆t = 0.5 s. The analytical result in this figure
is obtained based on (1). We observe from this figure that
the RMC algorithm significantly overestimates the number of
molecules newly absorbed when t = 1 s, while our APMC
algorithm gives an improved estimation accuracy when t = 1 s
by absorbing molecules according to (3). When t increases,
the overestimation of the RMC algorithm is slightly less severe
than that of the APMC algorithm. We further observe that
the distribution of molecules newly absorbed in Fig. 5(b) is
very similar to that in Fig. 5(a), which demonstrates that our
APMC algorithm does not noticeably affect this distribution.
Importantly, the average of the simulated distribution using
our APMC algorithm is not far from the analytical result.
V. C ONCLUSION
We proposed a new a priori Monte Carlo (APMC) algorithm to simulate the probability that a molecule is absorbed
by a spherical receiver in MC systems. Based on numerical
results, we confirmed that our APMC algorithm produces a
more accurate result for the fraction of molecules√absorbed
than the existing RMC and SMC algorithms when D∆t/rr
is large. This demonstrates that our algorithm is suitable to
enable an efficient simulation with a relatively large diffusion
time step length.
R EFERENCES
[1] T. Nakano, A. W. Eckford, and T. Haraguchi, Molecular Communication. Cambridge University Press, 2013.
[2] H. C. Berg, Random Walks in Biology. Princeton University Press,
1993.
[3] H. B. Yilmaz, A. C. Heren, T. Tugcu, and C. B. Chae, “Threedimensional channel characteristics for molecular communications with
an absorbing receiver,” IEEE Commun. Lett., vol. 18, no. 6, pp. 929–932,
June 2014.
[4] Y. Deng, A. Noel, M. Elkashlan, A. Nallanathan, and K. C. Cheung,
“Modeling and simulation of molecular communication systems with
a reversible adsorption receiver,” IEEE Trans. Mol. Biol. Multi-Scale
Commun., vol. 1, no. 4, pp. 347–362, Dec. 2015.
[5] A. Ahmadzadeh, H. Arjmandi, A. Burkovski, and R. Schober, “Comprehensive reactive receiver modeling for diffusive molecular communication systems: Reversible binding, molecule degradation, and finite
number of receptors,” IEEE Trans. Nanobiosci., vol. 15, no. 7, pp. 713–
727, Dec. 2016.
[6] H. B. Yilmaz and C.-B. Chae, “Simulation study of molecular communication systems with an absorbing receiver: Modulation and ISI
mitigation techniques,” Simulation Model. Practice. Th., vol. 49, pp.
136–150, Dec. 2014.
[7] I. Llatser, D. Demiray, A. Cabellos-Aparicio, D. T. Altilar, and
E. Alarcón, “N3sim: Simulation framework for diffusion-based molecular communication nanonetworks,” Simulation Model. Practice. Th.,
vol. 42, pp. 210–222, Mar. 2014.
[8] A. Noel, K. C. Cheung, R. Schober, D. Makrakis, and A. Hafid,
“Simulating with AcCoRD: Actor-based communication via reaction–
diffusion,” Nano Commun. Netw., vol. 11, pp. 44–75, Mar. 2017.
[9] D. Arifler and D. Arifler, “Monte Carlo analysis of molecule absorption
probabilities in diffusion-based nanoscale communication systems with
multiple receivers,” IEEE Trans. Nanobiosci., vol. 16, no. 3, pp. 157–
165, Apr. 2017.
[10] S. S. Andrews and D. Bray, “Stochastic simulation of chemical reactions
with spatial resolution and single molecule detail,” Phys. Biol., vol. 1,
no. 3, p. 137, Aug. 2004.
[11] K. Schulten and I. Kosztin, “Lectures in theoretical biophysics,” University of Illinois, vol. 117, 2000.
| 7cs.IT
|
1
Threshold Phenomena for Interference with
Randomly Placed Sensors
arXiv:1611.06329v2 [cs.DS] 4 May 2017
Rafał Kapelko
Abstract—This paper investigates the problem of efficient displacement of random sensors where good communication within the
network is provided, there is no interference between sensors and the movement cost is minimized in expectation.
Fix d ∈ N \ {0}. Assume n sensors are initially placed in the hyperoctant [0, ∞)d according to d identical and independent Poisson
processes each with arrival rate n1/d . Let 0 < s ≤ v be given real numbers. We are allowed to move the sensors, so that every two
consecutive sensors are placed at distance greater than or equal to s and less than or equal to v. When a sensor is displaced a
distance equal to m, the cost of movement is proportional to some (fixed) power a > 0 of the m distance travelled. We consider a−total
movement (see Definition 2) for one dimension and d−dimensional a−total movement (see Definition 3) for the higher dimension.
Motivation for using this extended cost metric arises from the fact that the parameter a in the exponents represents various conditions
on the barrier: lubrication, obstacles, etc. The main contribution of this paper can be summarized as follows.
1)
2)
If the sensors are displaced in the half-infinite interval [0, ∞), the tradeoffs between the interference distances s, v and the
expected minimum a−total movement are derived. We discover a sharp decline and a sharp increase in the expected minimum
1
a−total movement around the interference distance s, v equal to n
.
For the sensors in the hyperoctant [0, ∞)d (d > 1), the tradeoffs between the interference distances s, v and the expected
minimum d−dimensional a−total movement are obtained. We also discover a sharp decline and a sharp increase in the
1
expected minimum d−dimensional a−total movement around the interference distance s, v equal to 1/d
.
n
Index Terms—Interference, Analysis of algorithms, Random, Sensors, Poisson process
✦
1
I NTRODUCTION
Mobile sensors are being deployed for detecting and monitoring events which occur in many instances of every day life.
However, it is often their case that monitoring may not be as
effective due to external factors such as harsh environmental
conditions, sensor faults, geographic obstacles, etc. In such cases
sensor realignments may be required, e.g., sensors must be relocated from their initial positions to new positions so as to attain
the desired communication characteristics. The resulting problem
is assigning final positions to the sensors in order to minimize the
reallocation cost.
Fix d ∈ N \ {0}. The present paper is concerned with random
realignments of sensors in the hyperoctant. Assume that n sensors
are initially placed in the hyperoctant [0, ∞)d according to d
identical and independent Poisson processes each with arrival rate
n1/d . Given that the sensors are initially placed on the domain
at random according to some well-defined random process, we
are interested to ensure that by moving the sensors the following
scheduling requirement is satisfied.
Definition 1 ((s, v) − IP ). The (s, v)−interference problem
requires that every two consecutive sensors1 are placed at distance
greater than or equal to s and less than or equal to v for some
s, v such that 0 < s ≤ v.
It is very well known that proximity between sensors affects
•
R. Kapelko is with the Department of Computer Science, Faculty of
Fundamental Problems of Technology, Wrocław University of Science and
Technology, Poland.
E-mail: [email protected].
Manuscript received ???? ??, ????; revised ???? ??, ????.
1. The precise meaning of consecutive sensors in the higher dimension
(d > 1) will be explain further in Section 4.
transmission and reception signals and causes degradation of performance (see [6]). The closer the distance between neighbouirng
sensors, the higher the resulting interference. Additionally, to
ensure a good communication or connection of the whole network
the sensors can not be too far from each other.
Thus, in (s, v) − IP problem the goal is to ensure a good
communication of the whole network while at the same time the
neighbouring sensors are not too close.
The initial placement of the sensors does not guarantee (s, v)−
IP interference requirement since the sensors have been placed
randomly according to the arrival times of Poisson processes. To
attain the requirements that any pair of sensors are separated by a
distance of at least s and no two consecutive sensors are placed at
distance greater than v, the sensors have to move from their initial
location to new position.
For the case of the half-infinite interval [0, ∞) we define the
cost measure a−total movement as follows.
Definition 2 (a−total movement). Let a > 0 be a constant.
Suppose that the i−th sensor’s displacement is equal
P |m(i)|. The
a−total movement is defined as the sum Ma := ni=1 |m(i)|a .
Motivation for this extended cost metric arises from the fact
that the cost of individual sensor displacement may not be linear
in this displacement, but rather be dependent on some power
of the distance traversed. Moreover, the parameter a may well
represent various conditions on the barrier: obstacles, lubrication,
etc. Therefore, the a−total movement is a more realistic metric
than the one previously considered a = 1.
Let d be a natural number greater than 1. For the case
of the hyperoctant [0, ∞)d we define below the concept of
d−dimensional a−total movement which refers to a movement
2
of sensors only along the axes.
Definition 3 (d−dimensional a−total movement). Let a > 0
be a constant. Consider a sensor Si located in the position
(y1 (i), y2 (i), . . . , yd (i)), where y1 (i), y2 (i), . . . , yd (i) ∈ R+ .
We move the sensor Si to the position (y1 (i) + m1 (i), y2 (i) +
m2 (i), . . . , yd (i) + md (i)). Then the d−dimensional a−total
movement is defined as the double sum Md,a
:=
Pn Pd
a
|m
(i)|
.
j
j=1
i=1
The main question we study in this paper is the following. Assume that n sensors are initially placed in the hyperoctant [0, ∞)d
according to d identical and independent Poisson processes each
with arrival rate n1/d . What is the expected minimum a−total
movement on the line and d−dimensional a−total movement in
the higher dimension so as to solve the problem (s, v) − IP as a
function of the parameter s, v, n, a, d? Our goal is to investigate
tradeoffs arising among the parameters s, v, n, a, d.
Let us fix ǫ, τ > 0 arbitrary small constants independent
on the number of sensors. For the case of the half-infinitive
interval [0, ∞) we explain the threshold phenomena around the
interference distances s = v = n1 . We discover
•
•
a sharp decline in the expected minimal a−total movement
1
as s decreases from n1 to 1−ǫ
n and v increases from n to
1+τ
n ,
a sharp increase in the expected minimal a−total movement as s increases from n1 to 1+ǫ
n and v increases from
1+τ
1
n to n .
exact asymptotics) which explain the tradeoffs arising among the
parameters s, v, n, a, d.
1.2 Preliminaries and Model
In this subsection we recall some useful properties of the Poisson
process. Consider n sensors initially placed in the half-infinite
interval [0, ∞) according to Poisson process with arrival rate
n. Assume that, the i−th event represents the location of the
i−th sensor, for i = 1, 2, . . . , n. Let Xi be the arrival time of
the i−th event in this Poisson process, i.e., the position of the
i−th sensor in the interval [0, ∞). We know that the random
variable Xi obeys the Gamma distribution with parameters i, n. Its
(nt)i−1
probability density function is given by fi,n (t) = ne−nt (i−1)!
R∞
(nt)i−1
and Pr [Xi ≥ t] = t ne−nt (i−1)! . Moreover, the probability
density function of random variable Xj+l − Xj = Xl is given by
the formula
(nt)l−1
fl,n (t) = ne−nt
(1)
(l − 1)!
(see [9], [10], [16] for additional details on the Poisson process).
Notice that,
Z ∞
fl,n (t)dt = 1,
(2)
0
Z
d
For the case of the hyperoctant [0, ∞) the threshold phenomena
1
around the interference distances s = v = n1/d
is discovered for
the expected minimal d−dimensional a−total movement.
1.1 Related Work
Interference has been the subject of extensive interest in research
community in the last decade. Some papers study interference in
relation to network performance degradation [6], [8]. Moscibroda
et al. [14] consider the average interference problem while maintaining the desired network properties such as connectivity, multicast trees or point-to-point connections, while in [1] the authors
propose connectivity preserving and spanner constructions which
are interference optimal. The interference minimization in wireless
ad-hoc networks in a plane was studied in [7]. Further, [12],
[13] investigates the problem of optimally determining sourcedestination connectivity in random networks. The asymptotic
analysis of interference problem on the line using queueing theory
was provided in [11].
More importantly, our work is related to the paper [2] where
the authors consider the expected minimum total displacement
required so that every pair of sensors are in their final positions
at distance greater or equal to s for n sensors placed uniformly
according to Poisson process.
Compared to the minimum distance between two sensors, the
(s, v) − IP scheduling requirement not only avoids interference,
but also ensures good connectivity and is more reasonable when
considering interference. Our analysis also generalizes the result
of the paper [2] from a = 1 to all exponents a > 0 for more
realistic expected minimum a−total movement on the line and
d−dimensional a−total movement in the higher dimension. It is
worth mentioning that some asymptotic bounds in [2] are onesided. We give full asymptotic results (lower and upper bound,
∞
tfl,n (t)dt =
0
l
,
n
(3)
where l, n are positive integers ( see [4, Chapter 15]).
Finally, we derive the following definite integral
Z
∞
z
∞
l−1+b
X (nt)j
(l
−
1
+
b)!
e−nt
tb fl,n (t)dt = −
(l − 1)!nb
j!
j=0
z
=
(l − 1 + b)! −nz
e
(l − 1)!nb
l−1+b
X
j=0
j
(nz)
.
j!
(4)
where l, n, b are positive integers.
1.3 Outline and Results of the Paper
Throughout this paper ǫ, τ > 0 are arbitrary small constants
independent on n.
Fix d ∈ N \ {0}. Assume n sensors are initially placed in
the hyperoctant [0, ∞)d according to d identical and independent
Poisson processes each with arrival rate n1/d . We want to have the
sensors moving from their current random locations to positions
to ensure (s, v) − IP interference requirement.
For the case of one dimension we derive tradeoffs between
the expected minimum a−total movement and the interferences
distances s, v. Table 1 summarizes the results proved in Section
3.2
2. We recall the following asymptotic notation: (i) f (n) = O(g(n)) if
there exists a constant c1 > 0 and integer N such that |f (n)| ≤ C1 |g(n)| for
all n > N, (ii) f (n) = Ω(g(n)) if there exists a constant c2 > 0 and integer
N such that |f (n)| ≥ C2 |g(n)| for all n > N, (iii) f (n) = Θ(g(n)) if and
only if f (n) = O(g(n)) and f (n) = Ω(g(n)).
3
TABLE 1
The expected minimum a−total movement of n sensors in the
half-infinite interval [0, ∞) as a function of the interference distances
s, v.
Interference
distances
s, v
s = 1−ǫ
n
v = 1+τ
n
0 < ǫ, τ
1
n
1
n
1+ǫ
n
1+τ
n
s=
v=
s=
v=
0<ǫ≤τ
Expected minimum
a−total movement
O n1−a
a
Θ n1− 2 , a ≥ 1,
a
O n1− 2 , a ∈ (0, 1)
Θ (n) , a ≥ 1,
O (n) , a ∈ (0, 1)
Algorithm
I1 n,
1−ǫ 1+τ
, n
n
M V1 n,
M V1 n,
1
n
1+ǫ
n
Let us consider case a = 2. We prove the following results.
•
•
•
For interference distances s = v = n1 the expected
minimal 2−total movement is in Θ(1).
1
1+τ
1
If s = 1−ǫ
n is below n and v =
n is above n , the
expected
minimal 2−total movement declines sharply to
O n1 .
1+τ
If both interference distances s = 1+ǫ
n and v =
n
are above n1 , the expected minimal 2−total movement
increses sharply to Θ(n).
Similar sharp decline and increase hold for all exponent a > 0.
Thus, our investigations explain the threshold phenomena around
the interference distances equal to n1 as this affects the expected
minimum a−total movement of the sensors to fulfill (s, v) − IP
interference requirement.
For the sensors placed in the higher dimension (d > 1) we
obtain tradeoffs between d−dimensional a−total movement and
the interferences distances s, v. Table 2 summarizes the results
obtained in Section 4.
TABLE 2
The expected minimum d−dimensional a−total movement of n
sensors in the hyperoctant [0, ∞)d as a function of the interference
distances s, v.
•
1+ǫ
√
n
1+τ
√
n
If both interference distances s =
and v =
are
1
above √n , the expected minimal 2−dimensional 2−total
movement increases sharply to Θ(n).
Similar sharp decrease and increase hold in all dimensions
(d ∈ N \ {1}) and for all exponents a > 0. Hence, our
investigations explain the threshold phenomena around the in1
terference distances equal to n1/d
as this affects the expected
minimum d−dimensional a−total movement of the sensors to
fulfill (s, v) − IP interference requirement.
Here is an outline of the paper. In Section 2 we provide several
combinatorical facts that will be used in the sequel. In Section 3
we investigate sensors on the line. We show
that the expected
a−total movement of algorithm M V1 n, n1 is
a
a!
a
n1− 2 + O n− 2 ,
a
a
22 2 + 1 !
when a is an even natural number. Further, we analyze the expected minimal a−total movement near the interference distances
s = v = n1 . In Section 4 we investigate sensors in the higher
dimensions.
2
BASIC FACTS AND N OTATIONS
In this section we recall some known facts about special functions
and special numbers which will be useful in the analysis in the
next sections. We also prove Lemma 4 which will be helpful in
the analysis of Algorithm 1.
We will use the following notations for the rising factorial [5]
(
1
for k = 0
k
n =
n(n + 1) . . . (n + k − 1) for k ≥ 1.
n
Let k be the Stirling numbers of the first, which are defined for
all integer numbers such that 0 ≤ k ≤ n.
The Stirling numbers of the first kind arise as coefficients of
the rising factorial (see [5, Identity 6.11])
" #
X m
m
x =
(5)
xl2 .
l
2
l
2
n
k
Interference
distances
s, v
s = 1−ǫ
n1/d
v = 1+τ
n
0 < ǫ, τ
s=
v=
1
n1/d
1
n1/d
1+ǫ
n1/d
1+τ
n1/d
s=
v=
0<ǫ≤τ
Expected minimum
d−dimensional
a−total movement
a
O n1− d
Algorithm
Id n,
1−ǫ
, 1+τ
n1/d n1/d
a
Θ n1− 2d , a ≥ 1,
a
O n1− 2d , a ∈ (0, 1)
M Vd n,
1
n1/d
Θ (n) , a ≥ 1,
O (n) , a ∈ (0, 1)
M Vd n,
1+ǫ
n1/d
•
Let us recall the definition of a finite difference of a function f
∆f (x) = f (x + 1) − f (x).
Let us consider cases d = 2 and a = 2. We prove the
following results.
•
be the Eulerian numbers of the second kind, which
Let
are defined for all integer numbers such that 0 ≤ k ≤ n. The
following two identities for Eulerian numbers of the second kind
are known (see Identities (6.42), and (6.44) in [5]):
X DD m EE
(2m)! 1
=
,
(6)
l
(m)! 2m
l
"
#
!
X DD p EE m + l
m
=
.
(7)
m−p
l
2p
l
√1
n
the expected
For interference distances s = v =
√
minimal 2−dimensional 2−total movement is in Θ ( n) .
√
√
If s = 1−ǫ
is below √1n and v = 1+τ
is above √1n ,
n
n
the expected minimal 2−dimensional 2−total movement
declines sharply to O (1) .
Then, high-order differences are defined by iteration
∆a f (x) = ∆∆a−1 f (x).
It is easy to prove by induction the following formula (see also [5,
Identity 5.40])
!
X a
a
(−1)a−j f (x + j).
(8)
∆ f (x) =
j
j
4
A crucial observation is the following identity, which will be
useful in the asymptotic analysis of Algorithm 1 when interference
distances s, v are equal to n1 .
Lemma 4. Assume that a is an even positive number. Then
!
"
#
0
X a
if 2l1 < a
j
(−1)j
=
a!
if
2l1 = a.
a
a !2 2
j
j − l1
(2)
j
x
Proof. Choosing f (x) = x−l
in (8) we see that
1
"
#
!
"
#
X a
x
x+j
a
a−j
∆
=
(−1)
x − l1
j
x + j − l1
j
x=0
x=0
!
"
#
X a
j
=
(−1)j
.
j
j − l1
j
Let f be non-negative integer. Then
n
X
i=2
3
This is enough to prove Lemma 4.
We will also use many times Jensen’s inequality for expectactions. If f is a convex function, then
(9)
provided the expectations exists (see [16, Proposition 3.1.2]).
The following inequality for the general random variable will
be useful in the threshold tight bounds when interference distances
are greater or equal to n1 .
If Z is the random variable such that E[|Z|] < ∞ and q ∈ R,
then
|E[Z] − q| ≤ E[|Z − q|] ≤ E[|Z|] + |q|.
(10)
Notice that the left side of Inequality (10) is the special case of
Jensen’s inequality for X := Z −q and f (x) = |x|. The right side
of Inequality (10) follows from the triangle inequality |Z − q| ≤
|Z| + |q| and the monotonicity of the expected value.
We will also use the following notation
|x|+ = max{x, 0}
for positive parts of x ∈ R.
The Euler Gamma function (see [15])
Z ∞
Γ(z) =
tz−1 e−t dt
(11)
(12)
0
is defined for z > 0. Notice that Γ(z) satisfies the following
functional equations
Γ(z + 1) = Γ(z)z.
Moreover, for n natural number we have
Γ(n + 1) = n!.
(i − 1)f =
f
X
1
cl n l ,
nf +1 +
f +1
l=0
(15)
where cl are some constants independent on n (see [5, Formula
(6.78)]).
Applying equations
(6), (7) and the following identity
(
0
if
2l1 < a
x+l
∆a 2l1
=
, we easily derive
x=0
1 if 2l1 = a
!
"
#
X l1
x
a x+l
a
∆
∆
=
l
2l1
x − l1
l
x=0
x=0
0
if
2l1 < a
DD a EE
= P
a!
2
= a a2 if 2l1 = a.
l
l
( 2 )!2
f (E[X]) ≤ E [f (X)]
We will also use the following forms of Stirling’s formula (see
[3, page 54])
√
√
1
1
1
1
2πN N + 2 e−N + 12N +1 < N ! < 2πN N + 2 e−N + 12N . (14)
(13)
S ENSORS ON THE L INE
Let us recall that ǫ, τ > 0 are arbitrary small constants independent on n. In this section we analyze (s, v) − IP interference
problem when the sensors are placed in the half-infinite interval
[0, ∞) according to Poisson process with arrival rate n.
3.1 Analysis of Algorithm 1
In this subsection we present algorithm M V1 (n, s) (see Algorithm
1). We show
that the expected a−total movement of algorithm
M V1 n, n1 is
2
a
2
a
a!
a
n1− 2 + O n− 2 ,
+1 !
a
2
when a is an even positive number.
We prove that the expected a−total movement of algorithm
M V1 n, 1+ǫ
is Θ(n), when a is an even positive number or
n
a = 1 and ǫ > 0.
Algorithm 1 M V1 (n, s) Moving sensors in the [0, ∞); s > 0.
Require: The initial location X1 ≤ X2 ≤ · · · ≤ Xn of the n
sensors in the [0, ∞) according to Poisson process with arrival
rate n.
Ensure: The final positions of the sensors such that each pair of
consecutive sensors is separated by the distance equal to s.
1: for i = 2 to n do
2:
move the sensor Xi at the position X1 + (i − 1)s;
3: end for
We prove the following theorem.
Theorem 5. Fix ǫ1 ≥ 0 independent on n. Let a be an even
natural number.
The expected a−total movement of algorithm
1
is respectively
M V1 n, 1+ǫ
n
a
a
a a!
when ǫ1 = 0,
n1− 2 + O n− 2
a
2
2 ( 2 +1)!
Θ (n)
when ǫ1 > 0.
Proof. Let Xi be the arrival time of the ith event in a Poisson
process with arrival rate n. We know that the random variable
Xi − X1 = Xi−1 obeys the Gamma distribution with density
fi−1,n (t) = ne−nt
(nt)i−2
(i − 2)!
for i = 2, 3, . . . , n. (see equation (1) for j = 1, l = i − 1).
(a)
Assume that, a is even natural number. Let Di be the expected
5
(1)
Di
distance to the power a between Xi − X1 and the i−th sensor
position, ti−1 = (1 + ǫ1 ) i−1
n , hence given by
Z ∞
(a)
Di =
|t − ti−1 |a fi−1,n (t)dt
0
Z ∞
(ti−1 − t)a fi−1,n (t)dt.
=
be the expected distance between Xi − X1 and
Proof. Let
the i−th sensor position, ti−1 = (1 + ǫ) i−1
n for i = 2, 3, . . . , n,
hence given by
Z ∞
(1)
|t − ti−1 |fi−1,n (t)dt.
Di =
Let j ∈ {0, . . . , a}. Applying Identity (5) we deduce that
This completes the proof of Theorem 6.
0
Let us recall that E [Xi − X1 ] = i−1
n (see (3) for l = i − 1).
Applying Inequality (10) for Z = Xi − X1 , q = ti−1 and ǫ > 0
Observe that
!
Z ∞
we have
X a
i − 1 a−j
i−1
i−1
(a)
j
(1)
(−1)
tj fi−1,n (t)dt.
(1 + ǫ1 )
Di =
ǫ
≤ Di ≤ (2 + ǫ)
.
n
j
n
n
0
j
Pn
(n−1)n
, we have
Since i=2 (i − 1) =
Using the integral Identities (2) and (3) we see that
2
!
n
X (1)
1 X a
(i + j − 2)!
(a)
(16)
Di = Θ(n)
Di = a
(1 + ǫ1 )a−j (−1)j (i − 1)a−j
.
n j
(i − 2)!
j
i=2
0
(i + j − 2)!
(i − 1)a−j
= (i − 1)a−j (i − 1)j
(i − 2)!
"
#
X
j
(i − 1)a−l1 .
=
j
−
l
1
l
1
Hence
(a)
Di
"
!
#
1 XX a
j
= a
(1 + ǫ1 )a−j (−1)j (i − 1)a−l1
.
j − l1
j
n j l
1
Changing the summation we get
(a)
Di
!
"
#
X a
j
1 X
a−j
j
a−l1
(1 + ǫ1 ) (−1)
(i − 1)
.
= a
j
j − l1
n l
j
1
Now, we will estimate separately when ǫ1 = 0 and when ǫ1 > 0.
Case ǫ1 = 0.
Applying Lemma 4 we get
a
1 X
a!
1
(a)
C1,a−l1 · (i − 1)a−l1 ,
Di = a a a · (i − 1) 2 + a
n 2 !2 2
n 2l >a
3.2 Expected Minimum a−total Movement for s = v =
1
n
In this subsection we look at the expected minimum a−total
movement when the interference distances
s and v are equal to
1
1− a
2
.
We
prove
the
upper
bound
O
n
on the expected a−total
n
movement, when a > 0 (see Theorem 7). Our
Theorem 8 and
a
Theorem 9 give the lower bound Ω n1− 2 on the expected
a−total movement, when a ≥ 1.
We begin with a theorem which indicates how to apply the
results of Theorem 5 to the upper bound on the expected a−total
movement, when a > 0.
Theorem 7. Let a >
movement of
0. The expected a−total
a
algorithm M V1 n, n1 is respectively O n1− 2 .
(a)
Proof. Assume that a > 0. Let Di be the expected distance to
the power a between Xi − X1 and the ith sensor position. Let
b be the even natural number such that b − a > 0. Then we use
b
discrete Hölder inequality with parameters ab and b−a
and get
1
where C1,a−l1 depends only on a and l1 . Using Identity (15) we
conclude that the expected
sum of displacements to the power a
of algorithm M V1 n, n1 is
n
X
i=2
(a)
Di
=
2
a
2
a
a!
n1− 2 + O n− 2 .
a
2 +1 !
a
This is enough to prove the case
ǫ1 = 0.
Pwhen
Case ǫ1 > 0. Observe that j aj (−1)j (1+ǫ1 )a−j jj = ǫa1 .
Therefore
1 X
ǫa
(a)
C2,a−l1 · (i − 1)a−l1 ,
Di = 1a · (i − 1)a + a
n
n l >0
1
where C2,a−l1 depends only on a and l1 . Again, applying Identity
(15) we conclude that the expected sum
of displacements to the
1
power a of algorithm M V1 n, 1+ǫ
is Θ(n). This is enough
n
to prove the case when ǫ1 > 0 which completes the proof of
Theorem 5.
n
X
i=2
(a)
Di
≤
=
n
b
X
(a) a
Di
i=2
n
b
X
(a) a
Di
i=2
! ab
! ab
n
X
i=2
1
! b−a
b
(n − 1)
b−a
b
.
(17)
b
Next we use Jensen’s inequality (see (9)) for f (x) = x a and
(a)
E[X] = Di and get
b
(a) a
(b)
Di
≤ Di .
(18)
Combining together (17), (18) and Theorem 5 we deduce that
ab
n
X
b−a
a
1
(a)
Di ≤ Θ
(n − 1) b = Θ n1− 2 .
b
n 2 −1
i=2
This is enough to prove the upper bound which finishes the proof
of Theorem 7.
We also prove the following tight bound for 1−total movement
of Algorithm 1 when s = 1+ǫ
n and ǫ > 0.
We now prove the desired lower bound for expected 1−total
movement.
Theorem 6. Let ǫ > 0 be a constant independent on n. Then
is
the expected 1−total movement of algorithm M V1 n, 1+ǫ
n
respectively Θ(n).
Theorem
8. Any sensor’s displacement algorithm which solves
1 1
,
n n −
√IP problem requires expected 1−total movement of at
least Ω ( n) .
6
Proof. Before providing the proof of the theorem we make two
important observations.
Let X1 < X2 < · · · < Xn be the initial positions of the
sensors. Recall that by the monotonicity lemma no sensor Xi is
ever placed before sensor Xj , for all i < j.
We assume that the final position of the first sensor is the
nonnegative random variable Z with E[Z] < ∞.
We are now ready to prove the theorem. Let Xi be the arrival
times of the i−th event in Poisson process with arrival rate. Let
1
ai = ni − 2n
, for i = 1, 2, . . . , n be the anchor points. The
following result was proved in [2, Lemma 1]
n
X
i=1
E [|Xi − ai |] = C1
√
√
n +o n ,
(19)
where C1 is some constant independent on n. There are two cases
to consider.
Case 1. The algorithm moves the sensor Xi to the position
Z + bi , where bi = n1 (i − 1), for i = 1, 2, . . . n and E[Z] >
C1
1√
2 n.
Combining together Inequality (10) for Z := Xi − Z , q = bi
Equation (3) for l = i and the triangle inequality we get
n
X
i=1
E [|Xi − Z − bi |] ≥
n
X
i=1
E[Z] −
This is enough to prove the first case.
Case 2. The algorithm moves the sensor Xi to the position
Z + bi , where bi = n1 (i − 1), for i = 1, 2, . . . n and E[Z] ≤
C1
1√
2 n.
i
n
be the expected distance
Proof. Assume that a > 1. Let
to the power a of i−th sensor for i = 1, 2, . . . , n. Then we use
a
discrete Hölder inequality with parameters a and a−1
and get
n
X
(1)
Ei
n
X
(1) a
Ei
≤
i=1
i=1
n
X
(1) a
Ei
=
i=1
! a1
! a1
n
X
1
i=1
n
a−1
a
! a−1
a
.
(20)
Next we use Jensen’s inequality (see (9)) for f (x) = xa and
(1)
E[X] = Ei and get
(1) a
(a)
Ei
≤ Ei .
(21)
Combining together (20), (21) and Theorem 8 we deduce that
!a
n
n
X
X
√ a −a+1
(a)
(1)
n
Ei ≥
Ei
n−a+1 = Ω n
i=1
i=1
a
= Ω n1− 2 .
This is enough to prove the lower bound and completes the proof
of Theorem 9.
3.3 Expected Minimum a−total Movement for
v
1
n
n
X
√
1
1 C1
√ −
≥
=Θ n .
2
n
n
i=1
Let us recall that ai =
triangle inequality
(a)
Ei
1
− 2n
, for i = 1, 2, . . . , n. Using the
|Xi − ai | ≤ |Xi − (Z + bi )| + |(Z + bi ) − ai |
1
n
<s≤
In this subsection we study the expected minimum a−total
movement when the interference distances s and v are greater
than n1 . We give the upper bound O(n) on the expected a−total
movement, when a > 0 (see Theorem 10) and the lower bound
Ω(n) on the expected a−total movement, when a ≥ 1 (see
Theorem 11 and Theorem 12).
We begin with a theorem which indicates how to apply the
results of Theorem 5 to the upper bound on the expected a−total
movement, when a > 0.
Theorem 10. Let ǫ > 0 be a constant independent on n. Let a >
0. The expected a−total movement of algorithm M V1 n, 1+ǫ
is
n
in O(n).
(a)
we get
n
X
i=1
E [|Xi − (Z + bi )|] ≥
n
X
i=1
E [|Xi − ai |]−
n
X
i=1
E Z−
1
.
2n
C1
and
Combining together Equation (19), assumption E[Z] ≤ 12 √
n
1
1
the triangle inequality E Z − 2n ≤ E[Z] + 2n we have
n
X
i=1
E [|Xi − (Z + bi )|] ∈ Ω(n).
This is enough to prove the second case and sufficient to complete
the proof of Theorem 8.
Proof. Let Di be the expected distance to the power a between
Xi − X1 and the ith sensor position. Let b be the even natural
number such that b − a > 0. Then we proceed as in the upper
bound treatment from the proof of Theorem 7 and get
n
X
(a)
Di
i=2
≤
n
b
X
(a) a
Di
i=2
(a)
Di
ab
! ab
(n − 1)
b−a
b
(b)
≤ Di
(22)
(23)
Combining together (22), (23) and Theorem 5 we deduce that
n
X
i=2
(a)
Di
a
≤ (Θ(n)) b (n − 1)
b−a
b
= Θ(n).
This is sufficient to complete the proof of Theorem 10.
We now apply Theorem 8 in order to derive the lower bound
on the expected a−total movement when a > 1.
We can now prove the desired lower bound for expected
1−total movement.
Theorem 9. Let a > 1. Then any sensor’s displacement algorithm
which solves n1 , n1 − IP problem
requires expected a−total
a
movement of at least Ω n1− 2 .
Theorem 11. Fix τ ≥ ǫ > 0 independent on n. Then
any sensor’s
1+τ
displacement algorithm which solves 1+ǫ
− IP problem
,
n
n
requires expected 1−total movement of at least Ω(n).
7
Proof. The proof of the theorem is analogous to the proof of
Theorem 8.
Fix τ ≥ ǫ > 0 independent on n. Let Xi be the arrival
times of the i−th event in Poisson process with arrival rate. We
assume that the algorithm moves the sensor Xi to the position
i
bi = Z + 1+∆
n (i − 1) provided ǫ ≤ ∆i ≤ τ for i = 1, 2, . . . , n,
where Z is the nonnegative random variable with E[Z] < ∞.
It is sufficient to show that
n
X
i=1
E [|Xi − bi |] ∈ Ω(n).
Applying Inequality (10) for Z := Xi −Z −∆i i−1
n , q =
and Equation (3) for l = i we get
n
X
1 + ∆i
E Xi − Z +
(i − 1)
n
i=1
i−1
n
n
X
E[∆i ]
1 + E[∆i ]
i + E[Z] −
n
n
i=1
n
X E[∆i ]
1 + E[∆i ]
≥
i + E[Z] −
n
n
i=1
n
X ǫ
1+τ
= Θ(n)
i + E[Z] −
≥
n
n
i=1
≥
This completes the proof of Theorem 11.
We now apply Theorem 11 in order to derive the lower bound
on the expected a−total movement when a > 1.
Theorem 12. Fix τ ≥ ǫ > 0 independent on n. Let a > 1. Then
1+τ
−
any sensor’s displacement algorithm which solves 1+ǫ
n , n
IP problem requires expected a−total movement of at least Ω(n).
Algorithm 2 I1 (n, s, v) Moving sensors in the [0, ∞); 0 < s <
v.
Require: The initial location X1 ≤ X2 ≤ · · · ≤ Xn of the n
sensors in the [0, ∞) according to Poisson process with arrival
rate n.
Ensure: The final positions of the sensors such that
∀i=2,3...,n v ≥ Xi − Xi−1 ≥ s (so as that the distance
between consecutive sensors is less or equal v and greater or
equal to s).
1: for i = 2 to n do
2:
if Xi − Xi−1 < s then
3:
move left-to-right the sensor Xi at the new position s +
Xi−1 ;
4:
else if Xi − Xi−1 > v then
5:
move right-to-left the sensor Xi at the new position v +
Xi−1 ;
6:
else
7:
do nothing;
8:
end if
9: end for
Lemma 13. Fix ǫ > 0 independent on n. Let a > 0 and let
s = 1−ǫ
n . Assume that random variable Xl obeys the Gamma
distribution with parameters l, n. Then
n
X
n
E (|sl − Xl |+ )a = O(n1−a ).
l
l=1
Proof. See Appendix for the proof.
Lemma 14. Fix τ > 0 independent on n. Let a > 0 and let
v = 1+τ
n . Assume that random variable Xl obeys the Gamma
distribution with parameters l, n. Then
n
X
n
(a)
Proof. Assume that a > 1. Let Ei be the expected distance to
the power a of i−th sensor for i = 1, 2, . . . , n. As in the proof of
Theorem 9 we get two inequalities:
n
X
(1)
Ei
i=1
≤
n
X
(1) a
Ei
i=1
! a1
(1) a
(a)
Ei
≤ Ei .
n
a−1
a
,
(24)
(25)
Combining together (24), (25) and Theorem 11 we deduce that
!a
n
n
X
X
(a)
(1)
a
n−a+1 = (Ω(n)) n−a+1 = Ω(n).
Ei ≥
Ei
i=1
i=1
This is enough to prove the lower bound and completes the proof
of Theorem 12.
3.4 Expected Minimum a−total Movement for s <
and v > n1
1
n
In this subsection we give algorithm I1 (n, s, v) (see Algorithm
2) to solve (s, v) − IP interference problem. Let ǫ, τ > 0
be constants independent on n. Let a > 0. We show
that
1+τ
is in
,
expected a−total movement of algorithm I1 n, 1−ǫ
n
n
O n1−a .
We begin with the following two lemmas which will be helpful
in the proof of Theorem 15.
l=1
l
E (|Xl − vl|+ )a = O(n1−a ).
Proof. See Appendix for the proof.
We can now prove the desired result.
Theorem 15. Fix ǫ, τ > 0 independent on n. Let a > 0.
The
1+τ
is in
,
expected a−total movement of algorithm I1 n, 1−ǫ
n
n
O n1−a .
1+τ
Proof. Let s = 1−ǫ
n , v = n , where ǫ and τ are arbitrary small
constants independent on n.
Firstly, we consider the following scenario.
•
•
•
Algorithm 2 leaves the sensors X1 , X2 , . . . , Xi at the
same positions.
Algorithm 2 moves the sensors Xi+1 , Xi+2 , . . . Xi+q at
the new locations.
Algorithm 2 leaves the sensors Xi+q+1 , Xi+q+2 , . . . , Xn
at the same positions.
Let q = q1 + q2 + · · · + qk for some q1 , q2 , . . . , qk ∈ N+ . Define
(
0 if i = 0
Si =
q1 + q2 + · · · + qi if i ∈ {1, 2, . . . , k − 1}.
Consider an integer configuration (q1 , q2 , . . . , qk ) as specified
above.
•
For each i ∈ {0, 1, . . . , k − 1} Algorithm 2 moves the
sensors XSi +1 , XSi +2 , . . . , XSi +qi+1 in the one chosen
direction left to right or right to left.
8
•
For each i ∈ {0, 1, . . . , k − 2} the movement direction of sensors XSi +1 , XSi +2 , . . . , XSi +qi+1
is opposite to the movement direction of sensors
XSi+1 +1 , XSi+1 +2 , . . . , XSi+1 +qi+2 .
Let T (q1 , q2 , . . . , qk ) be the movement to the power a of the sensors Xi+1 , Xi+2 , . . . Xi+q and let T (qk ) be the displacement to
the power a of the sensors XSk−1 +1 , XSk−1 +2 , . . . , XSk−1 +qk .
There are two cases to consider.
Case 1. The sensor XSk−1 moves left to right to the new
position Y and the sensors XSk−1 +1 , XSk−1 +2 , . . . , XSk−1 +qk
move right to left.
Observe that
qk
X
+ a
XSk−1 +l − (Y + vl)
.
T (qk ) =
l=1
Since XSk−1 < Y we upper bound the displacement T (qk ) as
follows
qk
X
+ a
XSk−1 +l − XSk−1 + vl
.
T (qk ) ≤
l=1
Using Identity Xi+l − Xi = Xl for i := Sk−1 (see (1)) we get
T (qk ) ≤
qk
X
l=1
(|Xl − vl|+ )a .
(26)
Case 2. The sensor XSk−1 moves right to left to the new
position Z and the sensors XSk−1 +1 , XSk−1 +2 , . . . , XSk−1 +qk
move left to right.
Observe that
qk
X
+ a
.
Z + sl − XSk−1 +l
T (qk ) =
Observe that the displacements E [(|sl − Xl |+ )a ] and |Xl −
vl|+ )a can appear in the Algorithm 2 at most nl times. Therefore
Ta ≤
n
X
n
l=1
l
(|sl − Xl |+ )a +
n
X
n
l=1
l
(|Xl − vl|+ )a
Passing to the expectations we have
E [Ta ] ≤
n
X
n
E (|sl − Xl |+ )a +
E (|Xl − vl|+ )a
l
l
l=1
n
X
n
l=1
1+τ
Finally, using Lemma 13 for s = 1−ǫ
n and
Lemma 14 for v = n
1−a
we conclude that E [Ta ] = O n
. This is enough to prove
Theorem 15.
4
S ENSORS IN THE H IGHER D IMENSION .
Fix d ∈ N \ {0}. Let us recall that ǫ, τ > 0 are arbitrary small
constants independent on n.
We consider n sensors that are placed in the hyperoctant
[0, ∞)d according to d identical and independent Poisson pro(d)
(2)
(1)
cesses Xi , Xi , . . . , Xi , for i = 1, 2, . . . , n1/d each with
1/d
arrival rate n . The position of a sensor in the R+ is de(d)
(2)
(1)
termined by the d coordinates (Xi1 , Xi2 , . . . , Xid ), where
1 ≤ i1 , i2 , . . . , id ≤ n1/d .
Hence, we have initially n(d−1)/d rows and n(d−1)/d columns
such that each column and each row has n1/d sensors. Figure 4
illustrates our random displacement of sensors in two dimensions.
(2)
s
s
s
s
(2)
s
s
s
s
(2)
s
s
s
s
(2)
s
s
s
s
X4
X3
l=1
Since Z < XSk−1 we upper bound the displacement T (qk ) as
follows
qk
X
+ a
.
XSk−1 + sl − XSk−1 +l
T (qk ) =
X2
l=1
X1
Using Identity Xi+l − Xi = Xl for i := Sk−1 (see (1)) we get
T (qk ) ≤
qk
X
l=1
(|sl − Xl |+ )a .
(27)
Combining together inequalities (26) and (27) we have
T (q1 , q2 , . . . , qk ) ≤T (q1 , q2 , . . . , qk−1 ) +
+
qk
X
l=1
qk
X
(|Xl − vl|+ )a
l=1
(|sl − Xl |+ )a .
Hence, by induction we get
(1)
≤
j=1 l=1
(|Xl − vl| ) +
qj
k X
X
j=1 l=1
+ a
(|sl − Xl | ) .
Next we make an important observation that extends our estimation to general scenario of Algorithm 2. Let Ta be the a−total
displacement of Algorithm 2.
(1)
X4
We reallocate the sensors so as:
(a)
(b)
(c)
+ a
(1)
X3
Fig. 1. The mobile sensors located in the quadrant [0, ∞)2 according to
2 identical and independent Poisson processes.
T (q1 ,q2 , . . . , qk )
qj
k X
X
(1)
X1 X2
the sensors move only along the axes,
we have finally n(d−1)/d rows and n(d−1)/d columns
such that each column and each row has n1/d sensors,
in each column and in each row the sensors satisfy
(s, v) − IP interference requirement.
In order to fulfill the requirements (a), (b), (c) two algorithms
are presented. Namely,
•
1
1
for the case of s = n1/d
, v = n1/d
we show that the
expected d−dimensional
a−
total
movement
of algorithm
a
1
is in O n1− 2d (see proof of Theorem
M Vd n, n1/d
17),
9
•
1−ǫ
,
n1/d
1+τ
n1/d
v =
we prove that the
for the case of s =
expected d−dimensional
a−
total
movement
of algorithm
1+τ
1− a
d
Id n, n1−ǫ
(see
Theorem
19).
,
is
in
O
n
1/d n1/d
Algorithm 3 M Vd (n, s) Moving sensors in the [0, ∞)d , d ≥ 2,
s > 0.
(1)
(2)
(d)
Require: The initial location (Xi1 , Xi2 , . . . , Xid ) of the n
sensors in the [0, ∞)d , 1 ≤ i1 , i2 , . . . , id ≤ n1/d .
Ensure: The final positions of the sensors such that in each
column and in each row the consecutive sensors are separated
by the distance equal to s.
move the sensor at
1: ∀1 ≤ i ,i ,...,i ≤ n1/d
1 2
d
(1)
(d)
(2)
the location (Xi1 , Xi2 , . . . , Xid ) to the
(d)
(2)
(1)
(X1+(i1 −1)s , X1+(i2 −1)s , . . . , X1+(id −1)s );
position
Algorithm 4 Id (n, s, v) Moving sensors in the [0, ∞)d , d ≥ 2,
0 < s < v.
(1)
(2)
(d)
Require: The initial location (Xi1 , Xi2 , . . . , Xid ) of the n
sensors in the [0, ∞)d , 1 ≤ i1 , i2 , . . . , id ≤ n1/d .
Ensure: The final positions of the sensors such that in each
column and in each row the sensors satisfy (s, v) − IP
interference requirement.
1: For each column and row in the [0, ∞)d apply algorithm
I1 (n1/d , s, v);
We call a move of a sensor a sliding move if the final position
of the sensor is either in the same row or column as its initial
position.
In this section, we restrict the movement of sensors to a sliding
movement. The claim is justified in Lemma 16 whose simple proof
is omitted. Such a reduction of the movement is indeed crucial and
reduces the displacement of sensors in the higher dimension to the
displacement of sensors in the half-infinite interval [0, ∞).
Lemma 16. The optimal reallocation of sensors which ensures
the requirements (a), (b), (c) is a sliding movement.
We now embark to extend the results from Section 3 to the high
dimensions. We can prove the following sequences of Theorem.
The next theorem clarifies how the interference distances s =
1
1
, v = n1/d
affect the expected minimum d−dimensional
n1/d
a−total movement.
Theorem 17. Let a > 0 be a constant. Assume that n sensors
are placed in the [0, ∞)d according to d independent identical
Poisson processes, each with arrival rate n1/d and the reallocation of sensors ensures the requirements (a), (b), (c). If the
1
1
interference distances s = n1/d
, v = n1/d
then the expected
minimal d−dimensional a−total movement is in
(
a
Θ n1− 2d
if a ≥ 1,
a
1− 2d
O n
if a ∈ (0, 1).
Proof. First of all, we discuss the proof of the upper bound. By
Theorem 7 applied to n := n1/d and for n(d−1)/d columns and
n(d−1)/d rows we have that the expected
d−dimensional a−total
1
movement of algorithm M Vd n, n1/d
is
1− a2
a
2n(d−1)/d O n1/d
= O n1− 2d , when a > 0.
Next we prove the lower bound. Since the movement of sensors
along the axes is a sliding move to attain the interference distances
1
1
s = n1/d
, v = n1/d
in the [0, ∞)d the sensors have to attain the
1
1
interference distances s = n1/d
, v = n1/d
in each column and
each row. By Theorem 8 and Theorem 9 applied to n := n1/d and
for n(d−1)/d columns and n(d−1)/d rows we have the following
lower bound
1− a2
a
2n(d−1)/d Ω n1/d
= Ω n1− 2d , when a ≥ 1.
This is sufficient to complete the proof of Theorem 17.
We now analyze the expected minimum d−dimensional
a−total movement when the interference distances s and v are
1
.
greater than n1/d
Theorem 18. Fix τ ≥ ǫ > 0 independent on n. Let a > 0
be a constant. Assume that n sensors are placed in the [0, ∞)d
according to d independent identical Poisson processes, each with
arrival rate n1/d and the reallocation of sensors ensures the
requirements (a), (b), (c). If the interference distances are equal to
1+τ
s = n1+ǫ
1/d , v = n1/d , then the expected d−dimensional a−total
movement is in
(
Θ(n) if a ≥ 1,
O(n) if a ∈ (0, 1).
Proof. Fix τ ≥ ǫ > 0 independent on n. The proof is analogous
to the proof of Theorem 17. By Theorem 10 applied to n :=
n1/d and for n(d−1)/d columns and n(d−1)/d rows and have the
expected a−total movement of algorithm M Vd n, n1+ǫ
is
1/d
2n(d−1)/d O n1/d = O(n), when a > 0.
This completes the prove of upper bound.
By Theorem 11 and Theorem 12 applied to n := n1/d and for
(d−1)/d
n
columns and n(d−1)/d rows we have that the following
lower bound
2n(d−1)/d Ω n1/d = Ω (n) , when a ≥ 1.
This is enough to prove Theorem 18.
The next theorem provides the expected minimum
1
1
d−dimensional a−total movement for s < n1/d
and v > n1/d
.
Theorem 19. Fix ǫ, τ > 0 independent on n. Let a > 0 be
a constant. Assume that n sensors are placed in the [0, ∞)d
according to d independent identical Poisson processes, each with
arrival rate n1/d and the reallocation of sensors ensures the
requirements (a), (b), (c). The expected d−dimensional a−total
a
1+τ
movement of algorithm Id n, n1−ǫ
is in O n1− d .
1/d , n1/d
Proof. Fix ǫ, τ > 0 independent on n. By Theorem 15 applied to
n := n1/d and for n(d−1)/d columns and n(d−1)/d rows we have
the following upper bound
1−a
a
2n(d−1)/d O n1/d
= O n1− d , when a > 0
which proves the theorem.
5
C ONCLUSION
In this paper we obtained tradeoffs between interference distances s, v and the expected minimum (a−total
movement)/(d−dimensional a−total movement) of n random
sensors.
10
R EFERENCES
[1]
[2]
[3]
[4]
[5]
[6]
[7]
[8]
[9]
[10]
[11]
[12]
[13]
[14]
[15]
[16]
Wattenhofer R. Burkhart, M. and A. Zollinger. Does topology control
reduce interference? In Proceedings of the 5th ACM International
Symposium on Mobile Ad Hoc Networking and Computing, pages 9–19.
ACM, 2004.
Kranakis E. and Shaikhet G. Displacing random sensors to avoid
interference. In COCOON, volume 8591 of LNCS, pages 501–512.
Springer, 2014.
W. Feller. An Introduction to Probability Theory and its Applications,
volume 1. John Wiley, NY, 1968.
Evans M. Hastings N. Peacock B. Forbes, C. Statistical Distributions.
John Wiley & Sons, 2011.
R. Graham, D. Knuth, and O. Patashnik. Concrete Mathematics A
Foundation for Computer Science. Addison-Wesley, Reading, MA, 1994.
P. Gupta and P.R. Kumar. The capacity of wireless networks. IEEE
Transactions on Information Theory, 46(2), 2000.
M. Halldórsson and T. Tokuyama. Minimizing interference of a wireless
ad-hoc network in a plane. Theoretical Computer Science, 402(1), 2008.
Padhye J. Padmanabhan V.N. Jain, K. and L. Qiu. Impact of interference
on multi-hop wireless network performance. Wireless Networks, 11(4),
2005.
J.F.C. Kingman. Poisson Process, volume 3. Oxford University Press,
1992.
E. Kranakis. On the event distance of poisson processes with applications
to sensors. Discrete Applied Mathematics, 179:152 – 162, 2014.
E. Kranakis and G. Shaikhet. Sensor allocation problems on the real line.
Journal of Applied Probability, 53(3):667–687, 2016.
Wang X. L. Fu, L. and P.R. Kumar. Optimal determination of sourcedestination connectivity in random graphs. In Proceedings of the 15th
ACM International Symposium on Mobile Ad Hoc Networking and
Computing, pages 205–214. ACM, 2014.
Wang X. L. Fu, L. and P.R. Kumar. Are we connected? optimal
determination of source-destination connectivity in random networks.
IEEE/ACM Transactions on Networking, PP(99):1–14, 2016.
T. Moscibroda and R. Wattenhofer. Minimizing interference in ad hoc
and sensor networks. In Proceedings of the 2005 Joint Workshop on
Foundations of Mobile Computing, pages 24–33. ACM, 2005.
NIST Digital Library of Mathematical Functions. http://dlmf.nist.gov/5.
S. M. Ross. Probability Models for Computer Science. Academic press,
2002.
11
A PPENDIX
Proof. (Lemma 13) First of all observe that
h
i Z sl
+ a
E (|sl − Xl | ) =
(sl − t)a fl,n (t)dt
0
Z sl
≤ (sl)a
fl,n (t)dt,
Applying Identity (4) for z = rl and b = ⌈a⌉ we have
Z
(28)
∞
t
⌈a⌉
rl
(l − 1 + ⌈a⌉)! −nrl
fl,n (t)dt =
e
(l − 1)!n⌈a⌉
0
0
(l−1)!
e
(30)
Applying Stirling’s formula (14) for N = l we get
1
ll
≤ el l 2 .
(l − 1)!
(31)
Using (31) with assumption s = 1−ǫ
n in Inequality (30) we imply
(
Z sln
sne l 21
l
if l ≥ 1ǫ
xl−1
esn
(32)
dx ≤ snl
e−x
(l−1)l−1
(l − 1)!
if l < 1ǫ .
0
el−1 (l−1)!
Putting together (28), (29) and (32) we have
n
X
n
l=1
l
E (|sl − Xl |+ )a
≤n
1−a
a
(ns)
n
X
nse l
ens
l≥ 1ǫ
+ n1−a (ns)a+1
l
X
(nrl)j
(nrl)l
≤ (l + 1)
.
j!
(l)!
j=0
l
X la (l − 1)l−1
.
el−1 (l − 1)!
1
l< ǫ
l≥ ǫ
l< ǫ
l
j=l+1
l⌈a⌉−1 (nrl)l
(nrl)j
≤ (⌈a⌉ − 1) (nr)⌈a⌉−1
.
j!
l + 1 (l)!
(38)
From Stirling’s formula (14) for N = l we get
ll
el
(39)
≤ 1 ≤ el .
l!
l2
Putting all together (35–39) we have
h
⌈a⌉ i
1 nre l
E |Xl − vl|+
≤ f (l) ⌈a⌉
,
(40)
enr
n
where
!
⌈a⌉−1
(l − 1 + ⌈a⌉)!
⌈a⌉−1 l
.
f (l) = (l + 1) + (⌈a⌉ − 1)(nr)
l+1
(l − 1)!
Since rn = 1 + τ is some constant independent on n we derive
f (l) = Θ lmax(⌈a⌉+1,2⌈a⌉−2) .
(41)
⌈a⌉
a
and
(42)
Together (40) and (42) imply that
E
(34)
E (|sl − Xl |+ )a = O n1−a .
This is enough to prove Lemma 13.
Proof. (Lemma 14) Let ⌈a⌉ be the smallest integer greater or
equal to a. Observe that
⌈a⌉ Z ∞
+
E |Xl − vl|
(t − rl)⌈a⌉ fl,n (t)dt
=
rl
Z ∞
≤
t⌈a⌉ fl,n (t)dt.
(35)
rl
X
(33)
Finally, putting together (33) and (34) we get
n
X
n
l+⌈a⌉−1
a
h
a i
⌈a⌉ ⌈a⌉
+
+
.
E |Xl − vl|
≤ E |Xl − vl|
a− 12
(37)
Observe that
Next we apply Jensen’s inequality (see (9)) for f (x) = x
⌈a⌉
+
X = |Xl − vl|
and get
Combining assumption sn < 1 with the elementary inequality
xe < ex when x < 1 we deduce that nse
ens < 1. Hence
n
X nse l
X la (l − 1)l−1
a− 12
a+1
= O(1).
l
(ns)a
+
(ns)
ens
el−1 (l − 1)!
1
1
l=1
Hence
−x l−1
Observe that, the function g(x) = e x
is monotonically
increasing over the interval [0, l−1] and monotonically decreasing
over the interval [l − 1, ∞]. Therefore, we easily derive the
following inequality
Z sln
xl−1
xl−1
dx ≤ sln max e−x
e−x
(l − 1)!
x∈[0,sln]
(l − 1)!
0
l
l
l
sn
if sln ≤ l − 1
esn
(l−1)!
= snl
l−1
(l−1)
l−1
if sln > l − 1.
j=0
(nrl)j
.
j!
(36)
(nrl)j
(nrl)j+1
≤
, when j ≤ l − 1.
j!
(j + 1)!
l−1
. The substitution tn = x yields
Z sln
xl−1
fl,n (t)dt =
e−x
dx.
(29)
(l − 1)!
0
X
Using assumption rn > 1 we can easily derive
ne−nt (nt)
(l−1)!
where fl,n (t) =
Z sl
l−1+⌈a⌉
a l
h
a i
a
1 nre ⌈a⌉
+
|Xl − vl|
.
≤ f (l) ⌈a⌉ a
n
enr
(43)
Combining assumption rn > 1 with the elementary inequality
xe < ex , when x > 1 we deduce that
nre
< 1.
(44)
enr
From (41) and (44) we have
a
n
a l
X
f (l) ⌈a⌉ nre ⌈a⌉
= O(1).
(45)
l
enr
l=1
Finally, putting together (43) and (45) we get
n
X
n
l=1
l
E (|Xl − vl|+ )a = O n1−a .
This is enough to prove Lemma 14.
| 8cs.DS
|
arXiv:cs/0208008v1 [cs.PL] 6 Aug 2002
Soft Concurrent Constraint Programming
Stefano Bistarelli
Istituto di Informatica e Telematica, C.N.R., Pisa, Italy
and
Ugo Montanari
Dipartimento di Informatica, Università di Pisa, Italy
and
Francesca Rossi
Dipartimento di Matematica Pura ed Applicata, Università di Padova, Italy.
Soft constraints extend classical constraints to represent multiple consistency levels, and thus
provide a way to express preferences, fuzziness, and uncertainty. While there are many soft
constraint solving formalisms, even distributed ones, by now there seems to be no concurrent
programming framework where soft constraints can be handled. In this paper we show how the
classical concurrent constraint (cc) programming framework can work with soft constraints, and
we also propose an extension of cc languages which can use soft constraints to prune and direct
the search for a solution. We believe that this new programming paradigm, called soft cc (scc),
can be also very useful in many web-related scenarios. In fact, the language level allows web
agents to express their interaction and negotiation protocols, and also to post their requests in
terms of preferences, and the underlying soft constraint solver can find an agreement among the
agents even if their requests are incompatible.
Categories and Subject Descriptors: D.1.3 [Programming Techniques]: Concurrent Programming—Distributed programming; D.3.1 [Programming Languages]: Formal Definitions and
Theory—Semantics; Syntax; D.3.2 [Programming Languages]: Language Classifications—
Concurrent, distributed, and parallel languages; Constraint and logic languages; D.3.3 [Programming Languages]: Language Constructs and Features—Concurrent programming structures; Constraints; F.3.2 [Logics and Meanings of Programs]: Semantics of Programming
Languages—Operational semantics
General Terms: Languages
Additional Key Words and Phrases: constraints, soft constraints, concurrent constraint programming
1. INTRODUCTION
The concurrent constraint (cc) paradigm [Saraswat 1993] is a very interesting computational framework which merges together constraint solving and concurrency.
The main idea is to choose a constraint system and use constraints to model comResearch supported in part by the the the Italian MIUR Projects cometa and napoli and by ASI
project ARISCOM.
Permission to make digital/hard copy of all or part of this material without fee for personal
or classroom use provided that the copies are not made or distributed for profit or commercial
advantage, the ACM copyright/server notice, the title of the publication, and its date appear, and
notice is given that copying is by permission of the ACM, Inc. To copy otherwise, to republish,
to post on servers, or to redistribute to lists requires prior specific permission and/or a fee.
c 2018 ACM 1529-3785/2018/0700-0001 $5.00
ACM Transactions on Computational Logic, Vol. V, No. N, March 2018, Pages 1–25.
2
·
Stefano Bistarelli et al.
munication and synchronization among concurrent agents.
Until now, constraints in cc were crisp, in the sense that they could only be satisfied or violated. Recently, the classical idea of crisp constraints has been shown
to be too weak to represent real problems and a big effort has been done toward
the use of soft constraints [Freuder and Wallace 1992; Dubois et al. 1993; Ruttkay 1994; Fargier and Lang 1993; Schiex et al. 1995; Bistarelli et al. 1997; 2001;
Bistarelli 2001], which can have more than one level of consistency. Many real-life
situations are, in fact, easily described via constraints able to state the necessary
requirements of the problems. However, usually such requirements are not hard,
and could be more faithfully represented as preferences, which should preferably be
satisfied but not necessarily. Also, in real life, we are often challenged with overconstrained problems, which do not have any solution, and this also leads to the
use of preferences or in general of soft constraints rather than classical constraints.
Generally speaking, a soft constraint is just a classical constraint plus a way to
associate, either to the entire constraint or to each assignment of its variables, a
certain element, which is usually interpreted as a level of preference or importance.
Such levels are usually ordered, and the order reflects the idea that some levels are
better than others. Moreover, one has also to say, via suitable combination operators, how to obtain the level of preference of a global solution from the preferences
in the constraints.
Many formalisms have been developed to describe one or more classes of soft
constraints. For instance consider fuzzy CSPs [Dubois et al. 1993; Ruttkay 1994],
where crisp constraints are extended with a level of preference represented by a
real number between 0 and 1, or probabilistic CSPs [Fargier and Lang 1993], where
the probability to be in the real problem is assigned to each constraint. Some
other examples are partial [Freuder and Wallace 1992] or valued CSPs [Schiex et al.
1995], where a preference is assigned to each constraint, in order to satisfy as many
constraints as possible, and thus handle also overconstrained problems.
We think that many network-related problem could be represented and solved
by using soft constraints. Moreover, the possibility to use a concurrent language
on top of a soft constraint system, could lead to the birth of new protocols with an
embedded constraint satisfaction and optimization framework.
In particular, the constraints could be related to a quantity to be minimized/maximized but they could also satisfy policy requirements given for performance or administrative reasons. This leads to change the idea of QoS in routing
and to speak of constraint-based routing [Awduche et al. 1999; Clark 1989; Jain
and Sun 2000; Calisti and Faltings 2000]. Constraints are in fact able to represent
in a declarative fashion the needs and the requirements of agents interacting over
the web.
The features of soft constraints could also be useful in representing routing problems where an imprecise state information is given [Chen and Nahrstedt 1998].
Moreover, since QoS is only a specific application of a more general notion of Service Level Agreement (SLA), many applications could be enhanced by using such
a framework. As an example consider E-commerce: here we are always looking for
establishing an agreement between a merchant, a client and possibly a bank. Also,
all auction-based transactions need an agreement protocol. Moreover, also secuACM Transactions on Computational Logic, Vol. V, No. N, March 2018.
Soft Concurrent Constraint Programming
·
3
rity protocol analysis have shown to be enhanced by using security levels instead
of a simple notion of secure/insecure level [Bella and Bistarelli 2001]. All these
considerations advocate for the need of a soft constraint framework where optimal
answers are extracted.
In this paper, we use one of the frameworks able to deal with soft constraints
[Bistarelli et al. 1995; 1997]. The framework is based on a semiring structure that
is equipped with the operations needed to combine the constraints present in the
problem and to choose the best solutions. According to the choice of the semiring,
this framework is able to model all the specific soft constraint notions mentioned
above. We compare the semiring-based framework with constraint systems “a la
Saraswat” and then we show how use it inside the cc framework. The next step is
the extension of the syntax and operational semantics of the language to deal with
the semiring levels. Here, the main novelty with respect to cc is that tell and ask
agents are equipped with a preference (or consistency) threshold which is used to
prune the search.
After a short summary of concurrent constraint programming (§2.1) and of
semiring-based SCSPs (§2.2), we show how the concurrent constraint framework
can be used to handle also soft constraints (§3). Then we integrate semirings inside
the syntax of the language and we change its semantics to deal with soft levels (§4).
Some notions of observables able to deal with a notion of optimization and with
success (§6.1), fail (§6.2) and hang computations (§6.3) are then defined. Some
examples (§5) and an application scenario (§7) conclude our presentation showing
the expressivity of the new language. Finally, conclusions (§8) are added to point
out the main results and possible directions for future work.
2. BACKGROUND
2.1 Concurrent Constraint Programming
The concurrent constraint (cc) programming paradigm [Saraswat 1993] concerns
the behaviour of a set of concurrent agents with a shared store, which is a conjunction of constraints. Each computation step possibly adds new constraints to the
store. Thus information is monotonically added to the store until all agents have
evolved. The final store is a refinement of the initial one and it is the result of the
computation. The concurrent agents do not communicate directly with each other,
but only through the shared store, by either checking if it entails a given constraint
(ask operation) or adding a new constraint to it (tell operation).
2.1.1 Constraint Systems. A constraint is a relation among a specified set of
variables. That is, a constraint gives some information on the set of possible values
that these variables may assume. Such information is usually not complete since
a constraint may be satisfied by several assignments of values of the variables (in
contrast to the situation that we have when we consider a valuation, which tells
us the only possible assignment for a variable). Therefore it is natural to describe
constraint systems as systems of partial information [Saraswat 1993].
The basic ingredients of a constraint system (defined following the information
systems idea) are a set D of primitive constraints or tokens, each expressing some
partial information, and an entailment relation ⊢ defined on ℘(D) × D (or its
ACM Transactions on Computational Logic, Vol. V, No. N, March 2018.
·
4
Stefano Bistarelli et al.
extension defined on ℘(D) × ℘(D))1 satisfying:
—u ⊢ P for all P ∈ u (reflexivity) and
—if u ⊢ v and v ⊢ z, then u ⊢ z (transitivity).
We also define u ≈ v if u ⊢ v and v ⊢ u.
As an example of entailment relation, consider D as the set of equations over
the integers; then ⊢ could include the pair h{x = 3, x = y}, y = 3i, which means
that the constraint y = 3 is entailed by the constraints x = 3 and x = y. Given
X ∈ ℘(D), let X be the set X closed under entailment. Then, a constraint in an
information system h℘(D), ⊢i is simply an element of ℘(D).
As it is well known, h℘(D), ⊆i is a complete algebraic lattice, the compactness
of ⊢ gives the algebraic structure for ℘(D), with least element true = {P | ∅ ⊢ P },
greatest element D (which we will mnemonically denote f alse), glbs (denoted by
⊓) given by the closure of the intersection and lubs (denoted by ⊔) given by the
closure of the union. The lub of chains is, however, just the union of the members
in the chain. We use a, b, c, d and e to stand for elements of ℘(D); c ⊆ d means
c ⊢ d.
2.1.2 The hiding operator: Cylindric Algebras. In order to treat the hiding operator of the language (see later), a general notion of existential quantifier for
variables in constraints is introduced, which is formalized in terms of cylindric algebras. This leads to the concept of cylindric constraint system over an infinite set
of variables V such that for each variable x ∈ V , ∃x : ℘(D) → ℘(D) is an operation
satisfying:
(1)
(2)
(3)
(4)
u ⊢ ∃x u;
u ⊢ v implies (∃x u) ⊢ (∃x v);
∃x (u ⊔ ∃x v) ≈ (∃x u) ⊔ (∃x v);
∃x ∃y u ≈ ∃y ∃x u.
2.1.3 Procedure calls. In order to model parameter passing, diagonal elements
are added to the primitive constraints. We assume that, for x, y ranging in V , ℘(D)
contains a constraint dxy which satisfies the following axioms:
(1) dxx = true,
(2) if z 6= x, y then dxy = ∃z (dxz ⊔ dzy ),
(3) if x =
6 y then dxy ⊔ ∃x (c ⊔ dxy ) ⊢ c.
Note that the in the previous definition we assume the cardinality of the domain
for x, y and z greater than 1. Note also that, if ⊢ models the equality theory, then
the elements dxy can be thought of as the formulas x = y.
2.1.4 The language. The syntax of a cc program is show in Table I: P is the
class of programs, F is the class of sequences of procedure declarations (or clauses),
A is the class of agents, c ranges over constraints, and x is a tuple of variables.
Each procedure is defined (at most) once, thus nondeterminism is expressed via the
+ combinator only. We also assume that, in p(x) :: A, we have vars(A) ⊆ x, where
1 The
extension is s.t. u ⊢ v iff u ⊢ P for every P ∈ v.
ACM Transactions on Computational Logic, Vol. V, No. N, March 2018.
Soft Concurrent Constraint Programming
Table I.
·
5
cc syntax
P ::= F.A
F ::= p(x) :: A | F.F
A ::= success | f ail | tell(c) → A | E | AkA | ∃x A | p(x)
E ::= ask(c) → A | E + E
vars(A) is the set of all variables occurring free in agent A. In a program P = F.A,
A is the initial agent, to be executed in the context of the set of declarations F .
This corresponds to the language considered in [Saraswat 1993], which allows only
guarded nondeterminism.
In order to better understand the extension of the language that we will introduce
later, let us remind here the operational semantics of the agents.
—agent “success” succeeds in one step,
—agent “f ail” fails in one step,
—agent “ask(c) → A” checks whether constraint c is entailed by the current store
and then, if so, behaves like agent A. If c is inconsistent with the current store,
it fails, and otherwise it suspends, until c is either entailed by the current store
or is inconsistent with it;
—agent “ask(c1 ) → A1 + ask(c2 ) → A2 ” may behave either like A1 or like A2 if
both c1 and c2 are entailed by the current store, it behaves like Ai if ci only is
entailed, it suspends if both c1 and c2 are consistent with but not entailed by
the current store, and it behaves like “ask(c1 ) → A1 ” whenever “ask(c2 ) → A2 ”
fails (and vice versa);
—agent “tell(c) → A” adds constraint c to the current store and then, if the
resulting store is consistent, behaves like A, otherwise it fails.
—agent A1 kA2 behaves like A1 and A2 executing in parallel;
—agent ∃x A behaves like agent A, except that the variables in x are local to A;
—p(x) is a call of procedure p.
A formal treatment of the cc semantics can be found in [Saraswat 1993; de Boer and
Palamidessi 1991]. Also, a denotational semantics of deterministic cc programs,
based on closure operators, can be found in [Saraswat 1993]. A more complete
survey on several concurrent paradigms is given also in [de Boer and Palamidessi
1994].
2.2 Soft Constraints
Several formalization of the concept of soft constraints are currently available.
In the following, we refer to the one based on c-semirings [Bistarelli et al. 1997;
Bistarelli 2001], which can be shown to generalize and express many of the others.
A soft constraint may be seen as a constraint where each instantiations of its
variables has an associated value from a partially ordered set which can be interpreted as a set of preference values. Combining constraints will then have to take
into account such additional values, and thus the formalism has also to provide
suitable operations for combination (×) and comparison (+) of tuples of values and
ACM Transactions on Computational Logic, Vol. V, No. N, March 2018.
6
·
Stefano Bistarelli et al.
constraints. This is why this formalization is based on the concept of c-semiring,
which is just a set plus two operations.
2.2.1
C-semirings. A semiring is a tuple hA, +, ×, 0, 1i such that:
(1) A is a set and 0, 1 ∈ A;
(2) + is commutative, associative and 0 is its unit element;
(3) × is associative, distributes over +, 1 is its unit element and 0 is its absorbing
element.
A c-semiring is a semiring hA, +, ×, 0, 1i such that + is idempotent, 1 is its
absorbing element and × is commutative. Let us consider the relation ≤S over A
such that a ≤S b iff a + b = b. Then it is possible to prove that (see [Bistarelli et al.
1997]):
(1) ≤S is a partial order;
(2) + and × are monotone on ≤S ;
(3) 0 is its minimum and 1 its maximum;
(4) hA, ≤S i is a complete lattice and, for all a, b ∈ A, a + b = lub(a, b).
Moreover, if × is idempotent, then: + distribute over ×; hA, ≤S i is a complete
distributive lattice and × its glb. Informally, the relation ≤S gives us a way to
compare semiring values and constraints. In fact, when we have a ≤S b, we will
say that b is better than a. In the following, when the semiring will be clear from
the context, a ≤S b will be often indicated by a ≤ b.
2.2.2 Soft Constraints and Problems. Given a semiring S = hA, +, ×, 0, 1i, a
finite set D (the domain of the variables) and an ordered set of variables V , a
constraint is a pair hdef , coni where con ⊆ V and def : D|con| → A. Therefore, a
constraint specifies a set of variables (the ones in con), and assigns to each tuple
of values of these variables an element of the semiring. Consider two constraints
c1 = hdef1 , coni and c2 = hdef2 , coni, with |con| = k. Then c1 ⊑S c2 if for all
k-tuples t, def1 (t) ≤S def2 (t). The relation ⊑S is a partial order.
A soft constraint problem is a pair hC, coni where con ⊆ V and C is a set of
constraints: con is the set of variables of interest for the constraint set C, which
however may concern also variables not in con. Note that a classical CSP is a SCSP
where the chosen c-semiring is: SCSP = h{f alse, true}, ∨, ∧, f alse, truei. Fuzzy
CSPs [Schiex 1992] can instead be modeled in the SCSP framework by choosing the
c-semiring SF CSP = h[0, 1], max, min, 0, 1i. Many other “soft” CSPs (Probabilistic,
weighted, . . . ) can be modeled by using a suitable semiring structure (for example,
Sprob = h[0, 1], max, ×, 0, 1i, Sweight = hR, min, +, 0, +∞i, . . . ).
Figure 1 shows the graph representation of a fuzzy CSP. Variables and constraints
are represented respectively by nodes and by undirected arcs (unary for c1 and c3
and binary for c2 ), and semiring values are written to the right of the corresponding
tuples. The variables of interest (that is the set con) are represented with a double
circle. Here we assume that the domain D of the variables contains only elements
a and b.
ACM Transactions on Computational Logic, Vol. V, No. N, March 2018.
Soft Concurrent Constraint Programming
<a> --> 0.9
<b> --> 0.1
c1
X
<a, a> --> 0.8
<a, b> --> 0.2
<b, a> --> 0
<b, b> --> 0
Fig. 1.
·
7
<a> --> 0.9
<b> --> 0.5
c3
Y
c2
A fuzzy CSP
2.2.3 Combining and projecting soft constraints. Given two constraints c1 =
hdef 1 , con1 i and c2 = hdef 2 , con2 i, their combination c1 ⊗ c2 is the constraint
con
hdef , coni defined by con = con1 ∪ con2 and def (t) = def 1 (t ↓con
con1 ) × def 2 (t ↓con2 ),
X
where t ↓Y denotes the tuple of values over the variables in Y , obtained by projecting tuple t from X to Y . In words, combining two constraints means building
a new constraint involving all the variables of the original ones, and which associates to each tuple of domain values for such variables a semiring element which is
obtained by multiplying the elements associated by the original constraints to the
appropriate subtuples.
Given a constraint c = hdef , coni and a subset I of V , the projection of c over
′
′ ′
′
′
I,
P written c ⇓I is the constraint hdef , con i where con = con ∩ I and def (t ) =
′ def (t). Informally, projecting means eliminating some variables. This
t/t↓con
I∩con =t
is done by associating to each tuple over the remaining variables a semiring element
which is the sum of the elements associated by the original constraint to all the
extensions of this tuple over the eliminated variables. In short, combination is
performed via the multiplicative operation of the semiring, and projection via the
additive one.
2.2.4 Solutions.
The solution of an SCSP problem P = hC, coni is the constraint
N
Sol(P ) = ( C) ⇓con . That is, we combine all constraints, and then project over
the variables in con. In this way we get the constraint over con which is “induced”
by the entire SCSP.
For example, the solution of the fuzzy CSP of Figure 1 associates a semiring
element to every domain value of variable x. Such an element is obtained by first
combining all the constraints together. For instance, for the tuple ha, ai (that
is, x = y = a), we have to compute the minimum between 0.9 (which is the value
assigned to x = a in constraint c1 ), 0.8 (which is the value assigned to hx = a, y = ai
in c2 ) and 0.9 (which is the value for y = a in c3 ). Hence, the resulting value for
this tuple is 0.3. We can do the same work for tuple ha, bi → 0.2, hb, ai → 0 and
hb, bi → 0. The obtained tuples are then projected over variable x, obtaining the
solution hai → 0.8 and hbi → 0.
Sometimes it may be useful to find only a semiring value representing the least
upper bound among the values yielded by the solutions. This is called the best level
of consistency of an SCSP problem P and it is defined by blevel(P ) = Sol(P ) ⇓∅
(for instance, the fuzzy CSP of Figure 1 has best level of consistency 0.8). We also
say that: P is α-consistent if blevel(P ) = α; P is consistent iff there exists α > 0
such that P is α-consistent; P is inconsistent if it is not consistent.
ACM Transactions on Computational Logic, Vol. V, No. N, March 2018.
8
·
Stefano Bistarelli et al.
3. CONCURRENT CONSTRAINT PROGRAMMING OVER SOFT CONSTRAINTS
Given a semiring S = hA, +, ×, 0, 1i and an ordered set of variables V over a finite
domain D, we will now show how soft constraints over S with a suitable pair of
operators form a semiring, and then, we highlight the properties needed to map
soft constraints over constraint systems “a la Saraswat” (as recalled in Section 2.1.
We start by giving the definition of the carrier set of the semiring.
Definition 3.1 (functional constraints). We define C = (V → D) → A as the set
of all possible constraints that can be built starting from S = hA, +, ×, 0, 1i, D and
V.
A generic function describing the assignment of domain elements to variables will
be denoted in the following by η : V → D. Thus a constraint is a function which,
given an assignment η of the variables, returns a value of the semiring.
Note that in this functional formulation, each constraint is a function and not a
pair representing the variable involved and its definition. Such a function involves
all the variables in V , but it depends on the assignment of only a finite subset of
them. We call this subset the support of the constraint. For computational reasons
we require each support to be finite.
Definition 3.2 (constraint support). Consider a constraint c ∈ C. We define his
support as supp(c) = {v ∈ V | ∃η, d1 , d2 .cη[v := d1 ] 6= cη[v := d2 ]}, where
(
d
if v = v ′ ,
′
η[v := d]v =
ηv ′ otherwise.
Note that cη[v := d1 ] means cη ′ where η ′ is η modified with the association v := d1
(that is the operator [ ] has precedence over application).
Definition 3.3 (functional mapping). Given
any
soft
constraint
hdef, {v1 , . . . , vn }i ∈ C, we can define its corresponding function c ∈ C s.t.
cη[v1 := d1 ] . . . [vn := dn ] = def (d1 , . . . , dn ). Clearly supp(c) ⊆ {v1 , . . . , vn }.
Definition 3.4 (Combination and Sum). Given the set C, we can define the combination and sum functions ⊗, ⊕ : C × C → C as follows:
(c1 ⊗ c2 )η = c1 η ×S c2 η
and
(c1 ⊕ c2 )η = c1 η +S c2 η.
Notice that function ⊗ has the same meaning of the already defined ⊗ operator
(see Section 2.2) while function ⊕ models a sort of disjunction.
By using the ⊕S operator we can easily extend the partial order ≤S over C by
defining c1 ⊑S c2 ⇐⇒ c1 ⊕S c2 = c2 . In the following, when the semiring will be
clear from the context, we will use ⊑.
We can also define a unary operator that will be useful to represent the unit
elements of the two operations ⊕ and ⊗. To do that, we need the definition of
constant functions over a given set of variables.
Definition 3.5 (constant function). We define function ā as the function that
returns the semiring value a for all assignments η, that is, āη = a. We will usually
write ā simply as a.
ACM Transactions on Computational Logic, Vol. V, No. N, March 2018.
Soft Concurrent Constraint Programming
·
9
An example of constants that will be useful later are 0̄ and 1̄ that represent respectively the constraint associating 0 and 1 to all the assignment of domain values.
It is easy to verify that each constant has an empty support. More generally we
can prove the following:
Proposition 3.6. The support of a constraint c ⇓I is always a subset of I(that
is supp(c ⇓I ) ⊆ I).
Proof. By definition of ⇓I , for any variable x 6∈ I we have c ⇓I η[x = a] = c ⇓I
η[x = b] for any a and b. So, by definition of support x 6∈ supp(c ⇓I ).
Theorem 3.7 (Higher order semiring). The structure SC = hC, ⊕, ⊗, 0, 1i
where
—C : (V → D) → A is the set of all the possible constraints that can be built
starting from S, D and V as defined in Definition 3.1,
—⊗ and ⊕ are the functions defined in Definition 3.4, and
—0 and 1 are constant functions defined following Definition 3.5,
is a c-semiring.
Proof. To prove the theorem it is enough to check all the properties with the
fact that the same properties hold for semiring S. We give here only a hint, by
showing the commutativity of the ⊗ operator:
c1 ⊗ c2 η = (by definition of ⊗)
c1 η × c2 η = (by commutativity of ×)
c2 η × c1 η = (by definition of ⊗)
c2 ⊗ c1 η.
All the other properties can be proved similarly.
The next step is to look for a notion of token and of entailment relation. We define
as tokens the functional constraints in C and we introduce a relation ⊢ that is an
entailment relation when the multiplicative operator of the semiring is idempotent.
Definition 3.8 (⊢ relation). Consider the high order semiring carrier set C and
the partial order ⊑. We define
N the relation ⊢⊆ ℘(C) × C s.t. for each C ∈ ℘(C) and
c ∈ C, we have C ⊢ c ⇐⇒
C ⊑ c.
The next theorem shows that, when the multiplicative operator of the semiring
is idempotent, the ⊢ relation satisfies all the properties needed by an entailment.
Theorem 3.9 (⊢ with idempotent × is an entailment relation).
Consider the higher order semiring carrier set C and the partial order ⊑. Consider
also the relation ⊢ of Definition 3.8. Then, if the multiplicative operation of the
semiring is idempotent, ⊢ is an entailment relation.
Proof. Is enough to check that for any c ∈ C, and for any C1 , C2 and C3 subsets
of C we have
N
(1) C ⊢ c when c ∈ C: We need to show that
C ⊑ c when c ∈ C. This follows
from the extensivity of ×.
ACM Transactions on Computational Logic, Vol. V, No. N, March 2018.
10
·
Stefano Bistarelli et al.
(2) if C1 ⊢ C2 and C2 ⊢ C3 then C1 ⊢ C3 : To prove this we use the extended
version of the relationN⊢ able to deal with subsets of C : ℘(C) × ℘(C) s.t.
C1 ⊢ C2 ⇐⇒ C1 ⊢
C2 . Note
N that when × is idempotent we have that,
∀c2 ∈ C2 , C1 ⊢ N
c2 ⇐⇒ N
C1 ⊢
CN
2 . In this
Ncase to prove
N the item
N we have
to prove that if
C1 ⊑
C2 and
C2 ⊑
C3 , then
C1 ⊑
C3 . This
comes from the transitivity of ⊑.
Note that in this setting the notion of token (constraint) and of set of tokens (set
of constraints) closed under entailment is used indifferently. In fact, given a set
of constraint functions C1 , its closure
w.r.t. entailment is a set C¯1 that contains
N
all the constraints greater
than
C
.
1 This set is univocally representable by the
N
constraint function
C1 .
The definition of the entailment operator ⊢ on top of the higher order semiring
SC = hC, ⊕, ⊗, 0, 1i and of the ⊑ relation leads to the notion of soft constraint
system. It is also important to notice that in [Saraswat 1993] it is claimed that a
constraint system is a complete algebraic lattice. Here we do not ask for this, since
the algebraic nature of the structure C strictly depends on the properties of the
semiring.
3.1 Non-idempotent ×
If the constraint system is defined on top of a non-idempotent multiplicative operator, we cannot obtain a ⊢ relation satisfying all the properties of an entailment.
Nevertheless, we can give a denotational semantics to the constraint store, as described in Section 4, using the operations of the higher order semiring.
To treat the hiding operator of the language, a general notion of existential
quantifier has to be introduced by using notions similar to those used in cylindric
algebras. Note however that cylindric algebras are first of all boolean algebras.
This could be possible in our framework only when the × operator is idempotent.
Definition 3.10 (hiding). Consider a set of variables V with domain D and the
corresponding softPconstraint system C. We define for each x ∈ V the hiding
function (∃x c)η = di ∈D cη[x := di ].
Notice that x does not belong to the support of ∃x c.
By using the hiding function we can represent the ⇓ operator defined in Section 2.2.
Proposition 3.11. Consider a semiring S = hA, +, ×, 0, 1i, a domain of the
variables D, an ordered set of variables V , the corresponding structure C and the
class of hiding functions ∃x : C → C as defined in Definition 3.10. Then, for any
constraint c and any variable x ⊆ V , c ⇓V −x = ∃x c.
Proof. IsP
enough to apply the definition of ⇓V −x and ∃x and check that both
are equal to di ∈D cη[x := di ].
We now show how the hiding function so defined satisfies the properties of cylindric algebras.
ACM Transactions on Computational Logic, Vol. V, No. N, March 2018.
Soft Concurrent Constraint Programming
·
11
Theorem 3.12. Consider a semiring S = hA, +, ×, 0, 1i, a domain of the variables D, an ordered set of variables V , the corresponding structure C and the class
of hiding functions ∃x : C → C as defined in Definition 3.10. Then C is a cylindric
algebra satisfying:
(1 ) c ⊢ ∃x c
(2 ) c1 ⊢ c2 implies ∃x c1 ⊢ ∃x c2
(3 ) ∃x (c1 ⊗ ∃x c2 ) ≈ ∃x c1 ⊗ ∃x c2 ,
(4 ) ∃x ∃y c ≈ ∃y ∃x c
Proof. Let us consider all the items:
(1) It follows from the intensivity of +;
(2) It follows from the monotonicity of +;
(3) It follows from theorems about distributivity and idempotence, proven in
[Bistarelli et al. 1997];
(4) It follows from commutativity and associativity of +.
To model parameter passing we need also to define what diagonal elements are.
Definition 3.13 (diagonal elements). Consider an ordered set of variables V and
the corresponding soft constraint system C. Let us define for each x, y ∈ V a
constraint dxy ∈ C s.t., dxy η[x := a, y := b] = 1 if a = b and dxy η[x := a, y := b] = 0
if a 6= b. Notice that supp(dxy ) = {x, y}.
We can prove that the constraints just defined are diagonal elements.
Theorem 3.14. Consider a semiring S = hA, +, ×, 0, 1i, a domain of the variables D, an ordered set of variables V , and the corresponding structure C. The
constraints dxy defined in Definition 3.13 represent diagonal elements, that is
(1 ) dxx = 1,
(2 ) if z 6= x, y then dxy = ∃z (dxz ⊗ dzy ),
(3 ) if x 6= y then dxy ⊗ ∃x (c ⊗ dxy ) ⊢ c.
Proof. (1) It follows from the definition of the 1 constant and of the diagonal
constraint;
(2) The constraint dxz ⊗ dzy is equal to 1 when x = y = z, and is equal to 0 in all
the other cases. If we project this constraint over z, we obtain the constraint
∃z (dxz ⊗ dzy ) that is equal to 1 only when x = y;
(3) The constraint (c ⊗ dxy )η has value 0 whenever η(x) 6= η(y) and cη elsewhere.
Now, (∃x (c⊗dxy ))η is by definition equal to cη[x := y]. Thus (dxy ⊗∃x (c⊗dxy ))η
is equal to cη when η(x) = η(y) and 0 elsewhere. By the last assumption, we
have the relation of entailment with c.
ACM Transactions on Computational Logic, Vol. V, No. N, March 2018.
12
·
Stefano Bistarelli et al.
Table II.
scc syntax
P :: = F.A
F :: = p(X) :: A | F.F
A :: = stop | tell(c) →φ A | tell(c) →a A | E | AkA | ∃X.A | p(X)
E :: = ask(c) →φ A | ask(c) →a A | E + E
3.2 Using cc on top of a soft constraint system
The only problem in using a soft constraint system in a cc language is the interpretation of the consistency notion necessary to deal with the ask and tell operations.
Usually SCSPs with best level of consistency equal to 0 are interpreted as inconsistent, and those with level greater than 0 as consistent, but we can be more
general. In fact, we can define a suitable function α that, given the best level
of the actual store, will map such a level over the classical notion of consistency/inconsistency. More precisely, given a semiring S = hA, +, ×, 0, 1i, we can
define a function α : A → {f alse, true}. Function α has to be at least monotone,
but functions with a richer set of properties could be used. It is worth to notice
that in a different environment some of the authors use a similar function to map
elements from a semiring to another, by using abstract interpretation techniques
[Bistarelli et al. 2000a; 2000b]
Whenever we need to check the consistency of the store, we will first compute
the best level and then we will map such a value by using function α over true or
f alse.
It is important to notice that changing the α function (that is, by mapping in
a different way the set of values A over the boolean elements true and f alse), the
same cc agent yields different results: by using a high cut level, the cc agent will
either finish with a failure or succeed with a high final best level of consistency of
the store. On the other hand, by using a low level, more programs will end in a
success state.
4. SOFT CONCURRENT CONSTRAINT PROGRAMMING
The next step in our work is now to extend the syntax of the language in order to
directly handle the cut level. This means that the syntax and semantics of the tell
and ask agents have to be enriched with a threshold to specify when tell/ask agents
have to fail, succeed or suspend.
Given a soft constraint system hS, D, V i and the corresponding structure C, and
any constraint φ ∈ C, the syntax of agents in soft concurrent constraint programming is given in Table II.
The main difference w.r.t. the original cc syntax is
the presence of a semiring element a and of a constraint φ to be checked whenever
an ask or tell operation is performed. More precisely, the level a (resp., φ) will be
used as a cut level to prune computations that are not good enough.
We present here a structured operational semantics for scc programs, in the SOS
style, which consists of defining the semantic of the programming language by specifying a set of configurations Γ, which define the states during execution, a relation
→ ⊆ Γ×Γ which describes the transition relation between the configurations, and a
set T of terminal configurations. To give an operational semantics to our language,
ACM Transactions on Computational Logic, Vol. V, No. N, March 2018.
Soft Concurrent Constraint Programming
Table III.
·
13
Transition rules for scc
hstop, σi −→ hsuccess, σi
(Stop)
(σ ⊗ c) ⇓∅ 6< a
(Valued-tell)
htell(c) →a A, σi −→ hA, σ ⊗ ci
σ ⊗ c 6⊏ φ
htell(c) →φ A, σi −→ hA, σ ⊗ ci
σ ⊢ c, σ ⇓∅ 6< a
hask(c) →a A, σi −→ hA, σi
σ ⊢ c, σ 6⊏ φ
hask(c) →φ A, σi −→ hA, σi
hA1 , σi −→ hA′1 , σ′ i
(Ask)
hA1 kA2 , σi −→ hA2 , σ′ i
hA2 kA1 , σi −→ hA2 , σ′ i
(Parallelism)
hE1 , σi −→ hA1 , σ′ i
hE1 + E2 , σi −→ hA1 , σ′ i
hE2 + E1 , σi −→ hA1 , σ′ i
h∃x A, σi −→ hA′ , σ′ i
(Valued-ask)
hA1 , σi −→ hsuccess, σ′ i
hA1 kA2 , σi −→ hA′1 kA2 , σ′ i
hA2 kA1 , σi −→ hA2 kA′1 , σ′ i
hA[y/x], σi −→ hA′ , σ′ i
(Tell)
with y fresh
hp(y), σi −→ hA[y/x], σi when p(x) :: A
(Nondeterminism)
(Hidden variables)
(Procedure call)
we need to describe an appropriate transition system.
Definition 4.1 (transition system). A transition system is a triple hΓ, T, →i
where Γ is a set of possible configurations, T ⊆ Γ is the set of terminal configurations and →⊆ Γ × Γ is a binary relation between configurations.
The set of configurations represent the evolutions of the agents and the modifications in the constraint store. We define the transition system of soft cc as
follows:
Definition 4.2 (configurations). The set of configurations for a soft cc system is
the set Γ = {hA, σi} ∪ {hsuccess, σi}, where σ ∈ C. The set of terminal configurations is the set T = {hsuccess, σi} and the transition rule for the scc language are
defined in Table III.
Here is a brief description of the transition rules:
Stop. The stop agent succeeds in one step by transforming itself into terminal
configuration success.
Valued-tell. The valued-tell rule checks for the α-consistency of the SCSP defined
by the store σ ⊗c. The rule can be applied only if the store σ ⊗c is b-consistent with
b 6< a. In this case the agent evolves to the new agent A over the store σ ⊗ c. Note
that different choices of the cut level a could possibly lead to different computations.
Tell. The tell action is a finer check of the store. In this case, a pointwise comparison between the store σ ⊗ c and the constraint φ is performed. The idea is to
ACM Transactions on Computational Logic, Vol. V, No. N, March 2018.
14
·
Stefano Bistarelli et al.
perform an overall check of the store and to continue the computation only if there
is the possibility to compute a solution not worse than φ.
Valued-ask. The semantics of the valued-ask is extended in a way similar to what
we have done for the valued-tell action. This means that, to apply the rule, we need
to check if the store σ entails the constraint c and also if the store is “consistent
enough” w.r.t. the threshold a set by the programmer.
Ask. Similar to the tell rule, here a finer (pointwise) threshold φ is compared to
the store σ.
Nondeterminism and parallelism. The composition operators + and k are not
modified w.r.t. the classical ones: a parallel agent will succeed if all the agents
succeeds; a nondeterministic rule chooses any agent whose guard succeeds.
Hidden variables. The semantics of the existential quantifier is similar to that
described in [Saraswat 1993] by using the notion of freshness of the new variable
added to the store.
Procedure calls. The semantics of the procedure call is not modified w.r.t. the
classical one. The only difference is the different use of the diagonal constraint to
represent parameter passing.
4.1 Eventual Tell/Ask
We recall that both ask and tell operations in cc could be either atomic (that is,
if the corresponding check is not satisfied, the agent does not evolve) or eventual
(that is, the agent evolves regardless of the result of the check). It is interesting to
notice that the transition rules defined in Table III could be used to provide both
interpretations of the ask and tell operations. In fact, while the generic tell/ask
rule represents an atomic behaviour, by setting φ = 0 or a = 0 we obtain their
eventual version:
htell(c) → A, σi −→ hA, σ ⊗ ci
σ⊢c
hask(c) → A, σi −→ hA, σi
(Eventual tell)
(Eventual ask)
Notice that, by using an eventual interpretation, the transition rules of the scc
become the same as those of cc (with an eventual interpretation too). This happens
since, in the eventual version, the tell/ask agent never checks for consistency and
so the soft notion of α-consistency does not play any role.
5. A SIMPLE EXAMPLE
In this section we will show the behaviour of some of the rules of our transition system. We consider in this example a soft constraint system over the fuzzy semiring.
Consider the fuzzy constraints
c : {x, y} → R2 → [0, 1]
c′ : {x} → R → [0, 1]
1
s.t. c(x, y) =
1 + |x − y|
(
1 if x ≤ 10,
s.t. c′ (x) =
0 otherwise.
ACM Transactions on Computational Logic, Vol. V, No. N, March 2018.
and
Soft Concurrent Constraint Programming
·
15
Notice that the domain of both variables x and y is in this example any integer (or
real) number. As any fuzzy CSP, the definition of the constraints is instead in the
interval [0, 1].
Let’s now evaluate the agent
htell(c) →0.4 ask(c′ ) →0.8 stop, 1i
in the empty starting store 1.
By applying the Valued-tell rule we need to check (1 ⊗ c) ⇓∅ 6< 0.4. Since 1 ⊗ c = c
and c ⇓∅ = 1, the agent can perform the step, and it reaches the state
hask(c′ ) →0.8 stop, ci.
Now we need to check (by following the rule of Valued-ask) if c ⊢ c′ and c ⇓∅ 6< 0.8.
While the second relation easily holds, the first one does not hold (in fact, for x = 11
and y = 10 we have c′ (x) = 0 and c(x, y) = 0.5).
1
in place of c′ , then we
If instead we consider the constraint c′′ (x, y) = 1+2×|x−y|
have
hask(c′′ ) →0.8 stop, ci.
Here the condition c ⊢ c” easily holds and the agent ask(c′′ ) →0.8 stop can perform
its last step, reaching the stop and success states:
hstop, c ⊗ c′′ i → hsuccess, c ⊗ c′′ i.
6. OBSERVABLES AND CUTS
Sometimes one could desire to see an agent, and a corresponding program, execute
with a cut level which is different from the one originally given. We will therefore
define cutψ (A) the agent A where all the occurrences of any cut level, say φ, in any
subagent of A or in any clause of the program, are replaced by ψ if φ ⊑ ψ. This
means that the cut level of each subagent and clause becomes at least ψ, or is left
to the original level.
In this paper, for simplicity and generality reasons, this cut level change applies
only to those programs with cut levels which are constraints (φ), and not single
semiring levels (a).
Definition 6.1 (cut function). Consider an scc agent A; we define the function
cutψ : A → A that transforms ask and tell subagents as follows:
(
ask/tell(c) →ψ if φ ⊏ ψ,
cutψ (ask/tell(c) →φ ) =
ask/tell(c) →φ otherwise.
By definition of cutψ , it is easy to see that cut0 (A) = A.
We can then prove the following Lemma (that will be useful later):
Lemma 6.2 (tell and ask cut). Consider the Tell and Ask rules of Table III,
and the constraints σ and c as defined in such rules. Then:
—If the Tell rule can be applied to agent A, then the rule can be applied also to
cutψ (A) when when ψ ⊑ σ ⊗ c.
ACM Transactions on Computational Logic, Vol. V, No. N, March 2018.
16
·
Stefano Bistarelli et al.
—If the Ask rule can be applied to agent A, then the rule can be applied also to
cutψ (A) when ψ ⊑ σ.
Proof. We will prove only the first item; the second can be easily proved by
using the same ideas. By the definition of the tell transition rules of Table III, if
we can apply the rule it means that A ::= tell(c) →φ A′ and if σ is the store we
have σ ⊗ c 6⊏ φ. Now, by definition of cutψ , we can have
—cutψ (A) ::= tell(c) →ψ cutψ (A′ ) when φ ⊏ ψ.
—cutψ (A) ::= tell(c) →φ cutψ (A′ ) when φ 6⊏ ψ,
In the first case, the statement holds by initial hypothesis over A. In the second
case, since by hypothesis we have σ ⊗ c 6⊏ ψ, again the statement holds by the
definition of the tell transition rules of Table III.
It is now interesting to notice that the thresholds appearing in the program are
related to the final computed stores:
Theorem 6.3 (thresholds). Consider an scc computation
hA, 1i → hA1 , σ1 i → . . . hAn , σn i → hsuccess, σi
for a program P . Then, also
hcutσ (A), 1i → hcutσ (A1 ), σ1 i → . . . hcutσ (An ), σn i → hsuccess, σi
is an scc computation for program P .
Proof. First of all, notice that during the computation an agent can only add
constraints to the store. So, since × is extensive, the store can only monotonically
decrease starting from the initial store 1 and ending in the final store σ. So we
have
1 ⊒ σ1 . . . ⊒ σn ⊒ σ.
Now, the statement follows by applying at each step the results of Lemma 6.2. In
fact, at each step the hypothesis of the lemma hold:
—the cut σ is always lower than the current store (σ ⊑ σi ⊗ c);
—the ask and tell operations can be applied (moving from agent Ai to agent Ai +1).
6.1 Capturing Success Computations.
Given the transition system as defined in the previous section, we now define what
we want to observe of the program behaviour as described by the transitions. To
do this, we define for each agent A the set of constraints
SA = {σ ⇓var(A) | hA, 1i →∗ hsuccess, σi}
that collects the results of the successful computations that the agent can perform.
Notice that the computed store σ is projected over the variables of the agent A to
discard any fresh variable introduced in the store by the ∃ operator.
The observable SA could be refined by considering, instead of the set of successful computations starting from hA, 1i, only a subset of them. For example,
ACM Transactions on Computational Logic, Vol. V, No. N, March 2018.
Soft Concurrent Constraint Programming
·
17
one could be interested in considering only the best computations: in this case,
all the computations leading to a store worse than one already collected are disregarded. With a pessimistic view, the representative subset could instead collect
all the worst computations (that is, all the computations better than others are
disregarded). Finally, also a set containing both the best and the worst computations could be considered. These options are reminiscent of Hoare, Smith and
Egli-Milner powerdomains respectively [Plotkin 1981].
At this stage, the difference between don’t know and don’t care nondeterminism
arises only in the way the observables are interpreted: in a don’t care approach,
agent A can commit to one of the final stores σ ⇓var(A) , while, in a don’t know
approach, in classical cc programming it is enough that one of the final stores is
consistent. Since existential quantification corresponds to the sum in our semiringbased approach, for us a don’t know approach leads to the sum (that is, the lub)
of all final stores:
M
σ.
Sdk
A =
σ∈SA
It is now interesting to notice that the thresholds appearing in the program are
related also to the observable sets:
Proposition 6.4 (Thresholds and SA (1)). For each ψ, we have SA ⊇
Scutψ (A) .
Proof. By definition of cuts (Definition 6.1), we can modify the agents only by
changing the thresholds with a new level, greater than the previous one. So, easily,
we can only cut away some computations.
dk
Corollary 6.5 (Thresholds and Sdk
⊇
A (1)). For each ψ, we have SA
Sdk
cutψ (A) .
Proof. It follows from the definition of Sdk
A and from Proposition 6.4.
Theorem 6.6 (Thresholds and SA (2)). Let ψ ⊑ glb{σ ∈ SA }. Then SA =
Scutψ (A) .
Proof. By Proposition 6.4, we have SA ⊆ Scutψ (A) . Moreover, since ψ is lower
than all σ in SA , by Theorem 6.3 we have that all the computations are also in
Scutψ (A) . So, the statement follows.
Notice that, thanks to Theorem 6.6 and to Proposition 6.4, whenever we have
a lower bound ψ of the glb of the final solutions, we can use ψ as a threshold to
eliminate some computations. Moreover, we can prove the following theorem:
Theorem 6.7. Let σ ∈ SA and σ 6∈ Scutψ (A) . Then we have σ ⊏ ψ.
Proof. If σ ∈ SA and σ 6∈ Scutψ (A) , it means that the cut eliminates some
computations. So, at some step we have changed the threshold of some tell or ask
agent. In particular, since we know by Theorem 6.3 that when ψ ⊑ σ we do not
modify the computation, we need ψ 6⊑ σ. Moreover, since the tell and ask rules fail
only if σ ⊏ ψ, we easily have the statement of the theorem.
The following theorem relates thresholds and Sdk
A .
ACM Transactions on Computational Logic, Vol. V, No. N, March 2018.
18
·
Stefano Bistarelli et al.
′
Theorem 6.8 (Thresholds and Sdk
∈
A (2)). Let ΨA = {σ ∈ SA |6 ∃σ
SA with σ ′ ⊒ σ} (that is, ΨA is the set of “greatest” elements of SA ). Let also
dk
ψ ⊑ glb{σ ∈ ΨA }. Then Sdk
A = Scutψ (A) .
L
σ∈SA σ =
LProof. Since we have a + b = b ⇐⇒ a ≤ b, we easily have
σ.
Now,
by
following
a
reasoning
similar
to
Theorem
6.6,
by
applying
a
σ∈ΨA
cut with a threshold
ψ
⊑
glb{σ
∈
Ψ
}
we
do
not
eliminate
any
computation.
So
A
L
L
dk
we obtain Sdk
A =
σ∈ΨA σ = Scutψ (A)
σ∈SA σ =
Lemma 6.9. Given any constraint ψ, we have:
dk
Sdk
A ⊑ ψ + Scutψ (A) .
dk
Proof. Let S be the set of all solutions; then Sdk
A = lub(S) and Scutψ (A) =
lub(S1 ) where S1 ⊆ S. The solutions that have been eliminated by the cut ψ (that
is all the σ ∈ S − S1 ) are all lower than ψ by Theorem 6.7. So, it easily follows that
dk
Sdk
A ⊑ ψ + Scutψ (A) .
Theorem 6.10. Given any constraint ψ, we have:
dk
dk
Sdk
cutψ (A) ⊑ SA ⊑ ψ + Scutψ (A) .
dk
Proof. From Corollary 6.5, we have Sdk
cutψ (A) ⊑ SA . From Lemma 6.9 we have
dk
dk
instead SA ⊑ ψ + Scutψ (A) .
This theorem suggests a way to cut useless computations while generating the
observable Sdk
A of an scc program P starting from agent A. A very naive way to
obtain such an observable would be to first generate all final states, of the form
hsuccess, σi i, and then compute their lub. An alternative, smarter way to compute
this same observable would be to do the following. First we start executing the
program as it is, and find a first solution, say σ1 . Then we restart the execution
applying the cut level σ1 .
By Theorem 6.8, this new cut level cannot eliminate solutions which influence
the computation of the observable: the only solutions it will cut are those that are
lower than the one we already found, thus useless in terms of the computation of
Sdk
A .
In general, after having found solutions σ1 , . . . , σk , we restart execution with cut
level ψ = σ1 + . . .+ σk . Again, this will not cut crucial solutions but only some that
are lower than the sum of those already found. When the execution of the program
terminates with no solution we can be sure that the cut level just used (which is
the sum of all solutions found) is the desired observable (in fact, by Theorem 6.10
dk
dk
when Sdk
cutψ (A) = ψ we necessarily have Scutψ (A) = SA = ψ).
In a way, such an execution method resembles a branch & bound strategy, where
the cut levels have the role of the bounds.
The following corollary is important to show the correctness of this approach.
Corollary 6.11. Given any constraint ψ ⊑ Sdk
A , we have:
dk
Sdk
A = ψ + Scutψ (A) .
Proof. It easily comes from Theorem 6.10.
ACM Transactions on Computational Logic, Vol. V, No. N, March 2018.
Soft Concurrent Constraint Programming
Table IV.
·
19
Failure in the scc language
σ⊗c ⊏φ
(Tell1 )
htell(c) →φ A, σi −→ f ail
(σ ⊗ c) ⇓∅ < a
htell(c) →a A, σi −→ f ail
σ ⊏φ
(Valued-tell1 )
(Ask1 )
hask(c) →φ A, σi −→ f ail
σ ⇓∅ < a
hask(c) →a A, σi −→ f ail
hE1 , σi −→ f ail, hE2 , σi −→ f ail
hE1 + E2 , σi −→ f ail
hE2 + E1 , σi −→ f ail
hA1 , σi −→ f ail
hA1 kA2 , σi −→ f ail
hA2 kA1 , σi −→ f ail
(Valued-ask1 )
(Nondeterminism1 )
(Parallelism1 )
Let us now use this corollary to prove the correctness of the whole procedure
above.
Let σ1 be the first final state reached by agent A. By stopping the algorithm
dk
after one step, what we have to prove is Sdk
A = σ1 + Scutσ (A) . Since σ1 is for sure
1
lower than Sdk
A , this is true by Corollary 6.11.
By applying this procedure iteratively, we will collect a superset Ψ′A of ΨA =
{σ ∈ SA |6 ∃σ ′ ∈ SA with σ ′ ⊒ σ} (Ψ′A is a superset of ΨA because we could collect
a final state σi before computing a final state σj ⊒ σi ; in this
L will be in
L case both
Ψ′A ). Even if Ψ′A contains more elements then ΨA , we have σ∈Ψ′ = σ∈ΨA (for
A
the extensivity and idempotence properties of +).
The only difference with the procedure we have tested correct w.r.t. the algorithm
is that, at each step, it performs a cut by using the sum of all the previously
computed final state. This means that the algorithm can at each step eliminate
more computations, but by the results of Theorem 6.7 the eliminated computations
does not change the final result.
6.2 Failure
The transition system we have defined considers only successful computations. If
this could be a reasonable choice in a don’t know interpretation of the language it
will lead to an insufficient analysis of the behaviour in a pessimistic interpretation
of the indeterminism. To capture agents’ failure, we add the terminal fail to the
configurations and the transition rules of Table IV to those of Table III.
(Valued)tell1 /ask1 . The failing rule for ask and tell simply checks if the
added/checked constraint c is inconsistent with the store σ and in this case stops
the computation and gives fail as a result. Note that since we use soft constraints
we enriched this operator with a threshold (a or φ). This is used also to compute
failure. If the level of consistency of the resulting store is lower than the threshold
level, then this is considered a failure.
ACM Transactions on Computational Logic, Vol. V, No. N, March 2018.
20
·
Stefano Bistarelli et al.
Table V.
Hanging computations in the scc language
σ 6⊢ c, σ 6⊏ φ
(Ask2 )
hask(c) →φ A, σi −→ hang
σ 6⊢ c, σ ⇓∅ 6< a
(Valued-ask2 )
hask(c) →a A, σi −→ hang
hE1 , σi −→ f ail/hang, hE2 , σi −→ hang
hE1 + E2 , σi −→ hang
hE2 + E1 , σi −→ hang
(Nondeterminism2 )
Nondeterminism1 . Since the failure of a branch arises only from the failure of
a guard, and since we use angelic non-determinism (that is, we check the guards
before choosing one path), we fail only when all the branches fail.
Parallelism1 . In this case the computation fails as soon as one of the branches
ails.
The observables of each agent can now be enlarged by using the function
FA = {f ail | hA, 1V i →∗ f ail}
that computes a failure if at least a computation of agent A fails.
By considering also the failing computations, the difference between don’t know
and don’t care becomes finer. In fact, in situations where we have SA = Sdk
A ,
the failing computations could make the difference: in the don’t care approach the
notion of failure is existential and in the don’t know one becomes universal [de Boer
and Palamidessi 1994]:
dk
FA
= {f ail | all computations for A which lead to f ail}.
This means that in the don’t know nondeterminism we are interested in observing
a failure only if all the branches fail. In this way, given an agent A with an empty
dk
Sdk
A and a non-empty FA , we cannot say for sure that the semantic of this agent is
f ail. In fact, the transition rules we have defined do not consider hang and infinite
computations. Similar semidecibility results for soft constraint logic programming
are proven in [Bistarelli et al. 2001].
6.3 Hanging and infinite computations
To complete the possible observables of a goal, we need also to observe the hanged
states or those representing infinite computation. To this extent, we extend the
configurations with the terminals hang and ⊥, and we add some transition rules
(those in Table V) to handle hanging computations.
Nondeterminism. The only case that can lead the system to a hanging state is
when all the branches are stuck. In this case, we can assume no future change of
the state will happen that give the possibility to the agents to evolve.
To deal with hang states and infinite computations, we enlarged the observables
with the functions
HA = {hang | hA, 1i →∗ hang}
ACM Transactions on Computational Logic, Vol. V, No. N, March 2018.
Soft Concurrent Constraint Programming
·
21
that collects all the hang computations of the agent A and
DA = {⊥ | hA, 1i diverges}
to represent infinite computations.
7. AN EXAMPLE FROM THE NETWORK SCENARIO
We consider in this section a simple network problem, involving a set of processes
running on distinct locations and sharing some variables, over which they need to
synchronize, and we show how to model and solve such a problem in scc.
Each process is connected to a set of variables, shared with other processes, and
it can perform several moves. Each of such moves involves performing an action
over some or all the variables connected to the process. An action over a variable
consists of giving a certain value to that variable. A special value “idle” models the
fact that a process does not perfom any action over a variable. Each process has
also the possibility of not moving at all: in this case, all its variables are given the
idle value.
The desired behavior of a network of such processes is that, at each move of the
entire network:
(1) processes sharing a variable perform the same action over it;
(2) as few processes as possible remain idle.
To describe a network of processes with these features, we use an SCSP where
each variable models a shared variable, and each constraint models a process and
connects the variables corresponding to the shared variables of that process. The
domain of each variable in this SCSP is the set of all possible actions, including the
idle one. Each way of satisfying a constraint is therefore a tuple of actions that a
process can perform on the corresponding shared variables.
In this scenario, softness can be introduced both in the domains and in the
constraints. In particular, since we prefer to have as many moving processes as
possible, we can associate a penalty to both the idle element in the domains, and
to tuples containing the idle action in the constraints. As for the other domain
elements and constraint tuples, we can assign them suitable preference values to
model how much we like that action or that process move.
For example, we can use the semiring S = h[−∞, 0], max, +, −∞, 0i, where 0 is
the best preference level (or, said dually, the weakest penalty), −∞ is the worst
level, and preferences (or penalties) are combined by summing them. According
to this semiring, we can assign value −∞ to the idle action or move, and suitable
other preference levels to the other values and moves. Figure 2 gives the details
of a part of a network and it shows eight processes (that is, c1 , . . . , c8 ) sharing a
total of six variables. In this example, we assume that processes c1 , c2 and c3 are
located on site a, processes c5 and c6 are located on site b, and c4 is located on
site c. Processes c7 and c8 are located on site d. Site e connects this part of the
network to the rest. Therefore, for example, variables xd , yd and zd are shared
between processes located in distinct locations.
As desired, finding the best solution for the SCSP representing the current state
of the process network means finding a move for all the processes such that they
ACM Transactions on Computational Logic, Vol. V, No. N, March 2018.
22
·
Stefano Bistarelli et al.
u_a
e
x_d
c_1 c_3
a
c_2
c_7
y_d
c
d
c_8
c_4
c_6
w_c
c_5
z_d
v_b
b
Fig. 2.
The SCSP describing part of a process network
perform the same action on the shared variables and there is a minimum number
of idle processes. However, since the problem is inherently distributed, it does not
make sense, and it might not even be possible, to centralize all the information and
give it to a single soft constraint solver.
On the contrary, it may be more reasonable to use several soft constraint solvers,
one for each network location, which will take care of handling only the constraints
present in that location. Then, the interaction between processes in different locations, and the necessary agreement to solve the entire problem, will be modelled via
the scc framework, where each agent will represent the behaviour of the processes
in one location.
More precisely, each scc agent (and underlying soft constraint solver) will be in
charge of receiving the necessary information from the other agents (via suitable
asks) and using it to achieve the synchronization of the processes in its location.
For this protocol to work, that is, for obtaining a global optimal solution without
a centralization of the work, the SCSP describing the network of processes has
to have a tree-like shape, where each node of the tree contains all the processes
in a location, and the agents have to communicate from the bottom of the tree
to its root. In fact, the proposed protocol uses a sort of Dynamic Programming
technique to distribute the computation between the locations. In this case the
use of a tree shape allows us to work, at each step of the algorithm, only locally
to one of the locations. In fact, a non tree shape would lead to the construction
of non-local constraints and thus require computations which involve more than
one location at a time. In our example, the tree structure we will use is the one
shown in Figure 3(a), which also shows the direction of the child-parent relation
links (via arrows). Figure 3(b) describes instead the partition of the SCSP over the
four involved locations. The gray connections represent the synchronization to be
assured between distinct locations. Notice that, w.r.t. Figure 2, we have duplicated
the variables representing variables shared between distinct locations, because of
our desire to first perform a local work and then to communicate the results to the
other locations.
ACM Transactions on Computational Logic, Vol. V, No. N, March 2018.
·
Soft Concurrent Constraint Programming
23
5
u_a
a
4
c_1
1
1
x_a
x_e
c_2
c_3
y_a
3
a
1
x_d
2
d
1
x_c
d
y_b
c_8
1
c_6
c_4
c
c
z_d
w_c
b
(a) A possible tree structure for our network.
Fig. 3.
c_7
y_d
1
b
z_c
z_b
c_5
v_b
(b) The SCSP partitioned over the four locations.
The ordered process network
The scc agents (one for each location plus the parallel composition of all of them)
are therefore defined as follows:
Aa : ∃ua (tell(c1 (xa , ua ) ∧ c2 (ua , ya ) ∧ c3 (xa , ya )) → tell(enda = true) → stop)
Ab : ∃vb (tell(c5 (yb , vb ) ∧ c6 (zb , vb )) → tell(endb = true) → stop)
Ac : ∃wc (tell(c4 (xc , wc , zc )) → tell(endc = true) → stop)
Ad : ask(enda = true ∧ endb = true ∧ endc = true ∧ endd = true) →
tell(c7 (xd , yd ) ∧ c8 (xd , yd , zd ) ∧ xa = xd = xc ∧ ya = yd = yb ∧ zb = zd = zc )
→ tell(endd = true) → stop
A : Aa | Ab | Ac | Ad
Agents Aa ,Ab ,Ac and Ad represent the processes running respectively in the
location a, b, c and d. Note that, at each ask or tell, the underlying soft constraint
solver will only check (for consistency or entailment) a part of the current set of
constraints: those local to one location. Due to the tree structure chosen for this
example, where agents Aa , Ab , and Ac correspond to leaf locations, only agent
Ad shows all the actions of a generic process: first it needs to collect the results
computed separately by the other agents (via the ask); then it performs its own
constraint solving (via a tell), and finally it can set its end flag, that will be used by
a parent agent (in this case the agent corresponding to location e, which we have
not modelled here).
ACM Transactions on Computational Logic, Vol. V, No. N, March 2018.
24
·
Stefano Bistarelli et al.
8. CONCLUSIONS AND FUTURE WORK
We have shown that cc languages can deal with soft constraints. Moreover, we have
extended their syntax to use soft constraints also to direct and prune the search
process at the language level. We believe that such a new programming paradigm
could be very useful for web and internet programming.
In fact, in several network-related areas, constraints are already being used [Bella
and Bistarelli 2001; Awduche et al. 1999; Clark 1989; Jain and Sun 2000; Calisti
and Faltings 2000]. The soft constraint framework has the advantage over the classical one of selecting a “best” solution also in overconstrained or underconstrained
systems. Moreover, the need to express preferences and to search for optimal solutions shows that soft constraints can improve the modelling of web interaction
scenarios.
ACKNOWLEDGMENTS
We are indebted to Paolo Baldan for valuable suggestions.
REFERENCES
Awduche, D., Malcolm, J., Agogbua, J., O’Dell, M., and McManus, J. 1999. RFC2702:
Requirements for traffic engineering over mpls. Tech. rep., Network Working Group. Sept.
Bella, G. and Bistarelli, S. 2001. Soft constraints for security protocol analysis: Confidentiality. In Proceedings of the 3rd International Symposium on Practical Aspects of Declarative
Languages (PADL ’01), I. Ramakrishnan, Ed. LNCS, vol. 1990. Springer-Verlag, Heidelberg,
Germany, 108–122.
Bistarelli, S. 2001. Soft constraint solving and programming: a general framework. Ph.D. thesis,
Dipartimento di Informatica, Università di Pisa, Italy. TD-2/01.
Bistarelli, S., Codognet, P., and Rossi, F. 2000b. Abstracting soft constraints. In Proceedings
of the 1999 ERCIM/Compulog Net workshop on Constraints, K. Apt, E. Monfroy, T. Kakas,
and F. Rossi, Eds. LNCS, vol. 1865. Springer, Heidelberg, Germany.
Bistarelli, S., Codognet, P., and Rossi, F. 2000a. An abstraction framework for soft constraints and its relationship with constraint propagation. In Proceedings of the Symposium on
Abstraction, Reformulation and Approximation (SARA2000), B. Y. Chouery and T. Walsh,
Eds. LNAI, vol. 1864. Springer, Heidelberg, Germany.
Bistarelli, S., Montanari, U., and Rossi, F. 1995. Constraint Solving over Semirings. In
Proceedings of the 14th International Joint Conference on Artificial Intelligence (IJCAI’95).
Morgan Kaufman, San Francisco, CA, USA.
Bistarelli, S., Montanari, U., and Rossi, F. 1997. Semiring-based Constraint Solving and
Optimization. Journal of the ACM 44, 2 (Mar), 201–236.
Bistarelli, S., Montanari, U., and Rossi, F. 2001. Semiring-based Constraint Logic Programming: Syntax and Semantics. ACM Trans. Program. Lang. Syst. 23, 1–29.
Calisti, M. and Faltings, B. 2000. Distributed constrained agents for allocating service demands
in multi-provider networks,. Journal of the Italian Operational Research Society XXIX, 91.
Special Issue on Constraint-Based Problem Solving.
Chen, S. and Nahrstedt, K. 1998. Distributed QoS routing with imprecise state information.
In ICCCCN98.
Clark, D. 1989. RFC1102: Policy routing in internet protocols. Tech. rep., Network Working
Group. May.
de Boer, F. and Palamidessi, C. 1991. A fully abstract model for concurrent constraint
programming. In Proceeding of the 16th Colloquium on Trees in Algebra and Programming
(CAAP1991), S. Abramsky and T. Maibaum, Eds. Vol. 493. Springer-Verlag, Heidelberg, Germany.
ACM Transactions on Computational Logic, Vol. V, No. N, March 2018.
Soft Concurrent Constraint Programming
·
25
de Boer, F. and Palamidessi, C. 1994. From Concurrent Logic Programming to Concurrent
Constraint Programming. In Advances in Logic Programming Theory, G. Levi, Ed. Oxford
University Press, 55–113.
Dubois, D., Fargier, H., and Prade, H. 1993. The calculus of fuzzy restrictions as a basis for
flexible constraint satisfaction. In Proceedings of the 2nd IEEE International Conference on
Fuzzy Systems (FUZZ-IEEE 1993). IEEE, Piscataway, NJ, U.S.A., 1131–1136.
Fargier, H. and Lang, J. 1993. Uncertainty in constraint satisfaction problems: a probabilistic
approach. In Proceeding of the 2nd European Conference on Symbolic and Quantitative Approaches to Reasoning with Uncertainty (ECSQARU1993). LNCS, vol. 747. Springer-Verlag,
Heidelberg, Germany, 97–104.
Freuder, E. and Wallace, R. 1992. Partial constraint satisfaction. Artificial Intelligence
Journal 58.
Jain, R. and Sun, W. 2000. QoS/Policy/Constraint-based routing. In Carrier IP Telephony 2000
Comprehensive Report. International Engineering Consortium, Heidelberg, Germany. ISBN: 0933217-75-7.
Plotkin, G. 1981. Post-graduate lecture notes in advanced domain theory (incorporating the
pisa lecture notes). Technical report, Dept. of Computer Science, Univ. of Edinburgh.
Ruttkay, Z. 1994. Fuzzy constraint satisfaction. In Proceedings of the 3rd IEEE International
Conference on Fuzzy Systems (FUZZ-IEEE 1994). 1263–1268.
Saraswat, V. 1993. Concurrent Constraint Programming. MIT Press.
Schiex, T. 1992. Possibilistic constraint satisfaction problems, or “how to handle soft constraints?”. In Proceeding of the 8th Conference on Uncertainty in Artificial Intelligence
(UAI1992). 269–275.
Schiex, T., Fargier, H., and Verfaille, G. 1995. Valued Constraint Satisfaction Problems: Hard
and Easy Problems. In Proceedings of the 14th International Joint Conference on Artificial
Intelligence (IJCAI’95). Morgan Kaufmann, San Francisco, CA, USA, 631–637.
...
ACM Transactions on Computational Logic, Vol. V, No. N, March 2018.
| 6cs.PL
|
Invariant Clusters for Hybrid Systems
Hui Kong∗, Sergiy Bogomolov∗, Christian Schilling† , Yu Jiang‡, Thomas A. Henzinger∗
∗ IST
Austria, Klosterneuburg, Austria
of Freiburg, Freiburg, Germany
‡ University of Illinois at Urbana-Champaign, Illinois, USA
arXiv:1605.01450v1 [math.OC] 4 May 2016
† University
Abstract—In this paper, we propose an approach to automatically compute invariant clusters for semialgebraic hybrid systems.
An invariant cluster for an ordinary differential equation (ODE)
is a multivariate polynomial invariant g(~u, ~x) = 0, parametric
in ~u, which can yield an infinite number of concrete invariants
by assigning different values to ~u so that every trajectory of the
system can be overapproximated precisely by a union of concrete
invariants. For semialgebraic systems, which involve ODEs with
multivariate polynomial vector flow, invariant clusters can be
obtained by first computing the remainder of the Lie derivative
of a template multivariate polynomial w.r.t. its Gröbner basis and
then solving the system of polynomial equations obtained from
the coefficients of the remainder. Based on invariant clusters and
sum-of-squares (SOS) programming, we present a new method
for the safety verification of hybrid systems. Experiments on
nonlinear benchmark systems from biology and control theory
show that our approach is effective and efficient.
Index Terms—ybrid system, nonlinear system, semialgebraic
system, invariant, safety verification, SOS programmingybrid
system, nonlinear system, semialgebraic system, invariant, safety
verification, SOS programmingh
I. I NTRODUCTION
Hybrid systems [1] are models for systems with interacting
discrete and continuous dynamics. Safety verification is among
the most challenging problems in verifying hybrid systems,
asking whether a set of bad states can be reached from a set
of initial states. The safety verification problem for systems
described by nonlinear differential equations is particularly
complicated because computing the exact reachable set is
usually intractable. Existing approaches are mainly based
on approximate reachable set computations [2], [3], [4] and
abstraction [5], [6], [7], [8], [9].
An invariant is a special kind of overapproximation for the
reachable set of a system. Since invariants do not involve
direct computation of the reachable set, they are especially
suitable for dealing with nonlinear hybrid systems. However,
automatically and efficiently generating sufficiently strong
invariants is challenging on its own.
In this work, we propose an approach to automatically compute invariant clusters for a class of nonlinear semialgebraic
systems whose trajectories are algebraic, i.e., every trajectory
of the system is essentially a common zero set (algebraic
variety) of a set of multivariate polynomial equations. An
invariant cluster for a semialgebraic system is a parameterized
multivariate polynomial invariant g(~u, ~x) = 0, with parameter
~u, which can yield an infinite number of concrete invariants
by assigning different values to ~u so that every trajectory of
the system can be overapproximated precisely by a union of
concrete invariants.
The basic idea of computing invariant clusters is as follows.
A sufficient condition for a trajectory of a semialgebraic
system to start from and to always stay in the solution set
of a multivariate polynomial equation g(~x) = 0 is that the
Lie derivative of g(~x) w.r.t. f~ belongs to the ideal generated
by g(~x), i.e., Lf~g ∈ hg(~x)i, where f~ is the vector flow of
the system. Therefore, if some g(~x) satisfies this condition,
g(~x) = 0 is an invariant of the system. Then, according to
Gröbner basis theory, Lf~g ∈ hg(~x)i implies that the remainder
of Lf~g w.r.t. hg(~x)i must be identical to 0. Based on this
theory, we first set up a template polynomial g(~u, ~x) and then
compute the remainder r(~u, ~x) of Lf~g w.r.t. hg(~u, ~x)i. Since
r(~u, ~x) ≡ 0 implies that all coefficients ai (~u) of ~x in r(~u, ~x)
are equal to zero, we can set up a system P of polynomial
equations on ~u from the coefficients ai (~u). By solving P we
get a set C of constraints on ~u. For those elements in C that
are linear in ~u, the corresponding parameterized polynomial
equations g(~u, ~x) = 0 form invariant clusters. Based on
invariant clusters and SOS programming, we propose a new
method for the safety verification of hybrid systems.
The main contributions of this paper are as follows: 1)
We propose to generate invariant clusters for semialgebraic
systems based on computing the remainder of the Lie derivative of a template polynomial w.r.t. its Gröbner basis and
solving the system of polynomial equations obtained from the
coefficients of the remainder. Our approach avoids Gröbner
basis computation and first-order quantifier elimination. 2) We
present a method to overapproximate trajectories precisely by
using invariant clusters. 3) We apply invariant clusters to the
safety verification of semialgebraic hybrid systems based on
SOS programming. 4) We implemented a prototype tool to
perform the aforementioned steps automatically. Experiments
show that our approach is effective and efficient.
The paper is organized as follows. Section II is devoted to
the preliminaries. In Section III, we introduce the approach
to computing invariant clusters and using them to characterize
trajectories. In Section IV, we present a method to verify safety
properties for semialgebraic continuous and hybrid systems
based on invariant clusters. In Section V, we present our
experimental results. In Section VI, we introduce some related
works. Finally, we conclude our paper in Section VII.
II. P RELIMINARIES
In this section, we recall some backgrounds we need
throughout the paper. We first clarify some notation conventions. If not specified otherwise, we decorate vectors ~·, we
use the symbol K for a field, R for the real number field, C
for the complex number field (which is algebraically closed)
and N for the set of natural numbers, and all the polynomials
involved are multivariate polynomials. In addition, for all the
polynomials g(~u, ~x), we denote by ~u the vector composed of
all the ui and denote by ~x the vector composed of all the
remaining variables that occur in the polynomial.
Definition 1 (Ideal): [10] A subset I of K[~x], is called an
ideal if 1) 0 ∈ I; 2) if p, q ∈ I, then p + q ∈ I; and 3) if
p ∈ I and q ∈ K[~x], then pq ∈ I.
Definition 2 (Generated ideal): [10] Let g1 , . . . , gs be
polynomials in K[~x]. The ideal generated by {g1 , . . . , gs }
is
s
X
def
hg1 , . . . , gs i =
hi gi | h1 , . . . , hs ∈ K[~x] .
i=1
Definition 3 (Algebraic variety): Let K be an algebraically
closed field and I ⊂ K[~x] be an ideal. We define the algebraic
variety of I as
def
V(I) = {~x ∈ Kn | f (~x) = 0 for f ∈ I}.
Next, we present the notation of the Lie derivative, which
is widely used in the discipline of differential geometry.
Definition 4 (Lie derivative): For a given polynomial p ∈
K[~x] over ~x = (x1 , · · · , xn ) and a continuous system ~x˙ = f~,
where f~ = (f1 , . . . , fn ), the Lie derivative of p ∈ K[~x] along
f of order k is defined as follows.
(
p,
k=0
k def
(1)
Lf~p =
p
Pn ∂Lfk−1
~
· fi , k ≥ 1
i=1
∂xi
Essentially, the k-th order Lie derivative of p is the k-th
derivative of p w.r.t. time, i.e., reflects the change of p over
time. We write Lf~p for L1f~p.
We furthermore use the following theorem for deciding
the existence of a real solution of a system of polynomial
constraints.
Theorem 1 (Real Nullstellensatz): [11] The system of multivariate polynomial equations and inequalities p1 (~x) = 0, . . . ,
pm1 (~x) = 0, q1 (~x) ≥ 0, . . . , qm2 (~x) ≥ 0, r1 (~x) > 0, . . . ,
rm3 (~x) > 0 either has a solution in Rn , or there exists the
following polynomial identity
m1
X
βi p i +
v∈{0,1}m2
i=1
+
X
X
v∈{0,1}m3
X
t
ctv
X
t
2
·
m3
m2
Y
2 Y
vj
qj +
rkdk
btv ·
j=1
m3
Y
k=1
rkvk
+
k=1
X
s2w
(2)
=0
w
where dk ∈ N and pi , qj , rk , βj , btv , ctv , sw are polynomials
in R[~x].
Remark 1: Theorem 1 enables us to efficiently decide if
a system of polynomial equations
P and inequalities has a real
solution. By moving the term w s2w in equation (2) to the
right-hand side and denoting
P 2the remaining terms by R(~x, ~y),
x, ~y )
we have −R(~x, ~y) =
w sw , which means that −R(~
is a sum-of-squares. Therefore, finding a set of polynomials
βj , rk , btv , ctv , sw as well as some dk ’s that make −R(~x, ~y )
a sum-of-squares is sufficient to prove that the system has
no real solution, which can be done efficiently by SOS
programming [12].
In this paper, we focus on semialgebraic continuous and hybrid systems which are defined in the following, respectively.
Definition 5 (Semialgebraic system): A semialgebraic sysdef
tem is a tuple M = hX, f~, X0 i, where
1) X is the state space of the system M ,
2) f~ is a Lipschitz continuous vector flow function, and
3) X0 is the initial set described by a semialgebraic set.
The Lipschitz continuity guarantees existence and uniqueness of the differential equation ~x˙ = f~. A trajectory of a
semialgebraic system is defined as follows.
Definition 6 (Trajectory): Let M be a semialgebraic system. A trajectory originating from a point ~x0 ∈ X0 to
time T > 0 is a continuous and differentiable function
~x(t) : [0, T ) → Rn such that i) ~x(0) = ~x0 , and ii)
x
~ x(τ )).
∀τ ∈ [0, T ) : d~
dt t=τ = f (~
Definition 7 (Safety): Given an unsafe set XU , a semialgebraic system M = hX, f~, X0 i is said to be safe if no trajectory
~x(t) of M satisfies both ~x(0) ∈ X0 and ∃τ ∈ R≥0 : ~x(τ ) ∈
XU .
Definition 8 (Hybrid System): A hybrid system is dedef
scribed by a tuple H = hL, X, E, R, G, I, F i, where
• L is a finite set of locations (or modes);
n
• X ⊆ R is the continuous state space. The hybrid state
space of the system is denoted by X = L × X and a state
is denoted by (l, ~x) ∈ X ;
• E ⊆ L × L is a set of discrete transitions;
X
• G : E → 2 is a guard mapping over discrete transitions;
X
• R : E × 2
→ 2X is a reset mapping over discrete
transitions;
X
• I :L →2
is an invariant mapping;
• F : L → (X → X) is a vector field mapping which
assigns to each location l a vector field f~.
The transition and dynamic structure of the hybrid system
defines a set of trajectories. A trajectory is a sequence originating from a state (l0 , ~x0 ) ∈ X0 , where X0 ⊆ X is an initial set,
and consisting of a series of interleaved continuous flows and
discrete transitions. During the continuous flows, the system
evolves following the vector field F (l) at some location l ∈ L
as long as the invariant condition I(l) is not violated. At some
state (l, ~x), if there is a discrete transition (l, l′ ) ∈ E such
that (l, ~x) ∈ G(l, l′ ) (we write G(l, l′ ) for G((l, l′ ))), then
the discrete transition can be taken and the system state can
be reset to R(l, l′ , ~x). The problem of safety verification of a
hybrid system is to prove that the hybrid system cannot reach
an unsafe set XU from an initial set X0 .
III. C OMPUTATION
OF I NVARIANT
C LUSTERS
In this section, we first introduce the notion of invariant
cluster and then show how to compute a set of invariant
clusters and how to use it to represent every trajectory of a
semialgebraic system.
A. Foundations of invariants and invariant clusters
Given a semialgebraic system M , for any trajectory ~x(t)
of M , if we can find a multivariate polynomial g(~x) ∈ R[~x]
such that g(~x(0)) ∼ 0 implies g(~x(t)) ∼ 0 for all t > 0,
where ∼ ∈ {<, ≤, =, ≥, >}, then g(~x) ∼ 0 is an invariant of
the system. For the convenience of presentation, we call g(~x)
an invariant polynomial of M . In addition, a trajectory ~x(t) is
said to be algebraic if there exists an invariant g(~x) = 0 for
~x(t) and g(~x) 6≡ 0. In the following, we present a sufficient
condition for a polynomial g(~x) to be an invariant polynomial.
Proposition 1: Let M = hX, f~, X0 i be a semialgebraic
system and g(~x) ∈ R[~x]. Then g ∼ 0 is an invariant of M for
every ∼ ∈ {<, ≤, =, ≥, >} if g(~x) satisfies
Lf~g ∈ hgi
Fig. 1: Example 2. Curve defined by invariant cluster of
Class(C ∗ , ~x0 ) for ~x0 = (4, 2).
(3)
Proof: See Appendix A.
Proposition 1 states that all the polynomial equations and
inequalities g ∼ 0 are invariants of M if the Lie derivative of
g belongs to the ideal hgi. Note that every invariant satisfying
condition (3) defines a closed set for trajectories, that is, no
trajectory can enter or leave the set defined by the invariant.
For a semialgebraic system whose trajectories are algebraic,
the trajectories can usually be divided into several groups and
in each group all trajectories show similar curves. Essentially,
these similar curves can be described identically by a unique
parameterized polynomial equation, which we characterize
as an invariant cluster. The computation method of invariant
clusters is presented in Subsection III-B.
Definition 9 (Invariant cluster): An invariant cluster C of
a semialgebraic system is a set of invariants which can be uniK
~
formly described
PM as C =i {g(~u, ~x) = 0 | ~u ∈ R \{0}}, where
g(~u, ~x) = i=1 ci (~u)X satisfies Lf~g ∈ hgi and ci (~u) ∈ R[~u]
are fixed linear polynomials on ~u = (u1 , · · · , uK ), X i are
monomials on ~x = (x1 , · · · , xn ), and M, K ∈ N.
Note that by requiring ~u 6= ~0 in Definition 9 and the
following related definitions, we exclude the trivial invariant
0 = 0. Given an invariant cluster, by varying the parameter
~u, we may obtain an infinite set of concrete invariants for
the system. To be intuitive, we present a running example to
demonstrate the related concepts throughout the paper.
Example 1 (running example): Consider
the semialgebraic
system M1 described by [ẋ, ẏ] = y 2 , xy . The set C ∗ =
{u1 − u3 (x2 − y 2 ) = 0 | (u1 , u3 ) ∈ R2 \ {~0}} is an invariant
cluster. It is easy to verify that the polynomial u1 −u3 (x2 −y 2 )
satisfies condition (3) for all (u1 , u3 ) ∈ R2 .
Next we introduce the notion of an invariant class.
Definition 10 (Invariant class): Given a semialgebraic system M with some initial point ~x0 and an invariant cluster
C = {g(~u, ~x) = 0 | ~u ∈ RK \ {~0}} of M , where K ∈ N, an
invariant class of C at ~x0 , denoted by Class(C, ~x0 ), is the
set {g(~u, ~x) = 0 | g(~u, ~x0 ) = 0, ~u ∈ RK \ {~0}}.
Given an invariant cluster C, by substituting a specific point
~x0 for ~x in g(~u, ~x) = 0, we obtain a constraint g(~u, ~x0 ) = 0 on
~u, which yields a subset Class(C, ~x0 ) of C. Apparently, every
Fig. 2: Example 6. X0 : (x + 15)2 + (y − 17)2 ≤ 1, XU :
(x1 − 11)2 + (y1 − 16.5)2 ≤ 1.
member of Class(C, ~x0 ) is an invariant for the trajectory
originating from ~x0 .
Example 2 (running example): For the given invariant cluster C ∗ in Example 1 and a given initial point ~x0 = (4, 2),
we get the invariant class Class(C ∗ , ~x0 ) = {u1 − u3 (x2 −
y 2 ) = 0 | u1 − 12u3 = 0, (u1 , u3 ) ∈ R2 \ {~0}}. Every
member of Class(C ∗ , ~x0 ) is an invariant for the trajectory
of M1 originating from ~x0 . The algebraic variety defined by
Class(C ∗ , ~x0 ) is shown in Figure 1.
An invariant class has the following important properties.
Theorem 2: Given an n-dimensional semialgebraic system
M and an invariant class D = {g(~u, ~x) = 0 | g(~u, ~x0 ) = 0,
~u ∈ RK \ {~0}} of M at a specified point ~x0 , let Dg be the
set of all invariant polynomials occurring in D and π~x0 be the
trajectory of M originating from ~x0 . Then,
1) π~x0 ⊆ V(Dg );
2) there must exist a subset B of Dg consisting of m members such that hDg i = hBi, where m is the dimension
of the hyperplane g(~u, ~x0 ) = 0 in terms of ~u in RK and
hDg i and hBi denote the ideal generated by the members
of Dg and B, respectively.
Proof: See Appendix B.
Remark 2: The first property in Theorem 2 reveals that a
trajectory π~x0 is always contained in the intersection of all the
invariants in the invariant class D of ~x0 . The second property
concludes that the invariant class can be generated by a finite
subset B of D if it consists of an infinite number of invariants.
The algebraic variety V(B) (which is equivalent to V(Dg ))
forms an overapproximation for π~x0 and the quality of the
overapproximation depends largely on the dimension m of
V(B). More specifically, the lower the dimension is, the better
the overapproximation is. The ideal case is that, when m = 1,
V(B) shrinks to an algebraic curve and hence some part of
the algebraic curve matches the trajectory precisely. In the
case of m > 1, V(B) is usually a hypersurface. To make the
overapproximation less conservative, we may take the union
of multiple invariant classes from different invariant clusters
to reduce the dimension of the algebraic variety.
Algorithm 1: Computation of invariant clusters
input : f : n-dimensional polynomial vector field;
N : upper bound for the degree of invariant
polynomials
output: CFamily: a set of invariant clusters
1
2
3
4
5
6
B. Computing invariant clusters
7
8
In the following, we propose a computation method for
invariant clusters. The main idea arises from the following
proposition.
Proposition 2: Let M = hX, f~, X0 i be a semialgebraic
system and suppose for a given multivariate polynomial g ∈
R[~x] that the polynomial Lf~g can be written as Lf~g = pg + r.
Then Lf~g ∈ hgi if r ≡ 0.
According to Proposition 2, if we can find a polynomial
g(~x) such that the remainder of its Lie derivative w.r.t. g(~x)
is identical to 0, then g(~x) = 0 is an invariant of M . The idea
is as follows. We first establish a template g(~u, ~x) for g(~x)
with parameter ~u and then compute the remainder r(~u, ~x) of
Lf~g w.r.t. g(~u, ~x). According to the computing procedure of
PK
a remainder [10], r(~u, ~x) must be of the form i=1 biu(~du) X i ,
j
where d ∈ N, bi (~u) are homogeneous polynomials of degree
d+1 over ~u, uj is the coefficient of the leading term of g(~u, ~x)
by some specified monomial order of ~x, and X i are monomials
on ~x. Since r(~u, ~x) ≡ 0 implies uj 6= 0 and bi (~u) = 0
for all i = 1, . . . , K, we obtain a system C of homogeneous
polynomial equations on ~u plus uj 6= 0 from the coefficients
of r(~u, ~x). Solving C can provide a set of invariant clusters of
M if it exists. Note that all the aforementioned steps can be
performed automatically in a mathematical software such as
Maple. Pseudocode for computing invariant clusters is shown
in Algorithm 1. The principle for the loop in line 5 is that the
remainder may vary from the monomial order of ~x and hence
produce different solutions. Using multiple orders helps to get
more solutions.
Remark 3 (Complexity): In Algorithm 1, the key steps are
computing the remainder in line 4 and solving the system of
equations on ~u in line 8. The former takes only linear time
and hence is very efficient. The latter involves solving a system
of homogeneous polynomial equations, which is known to be
NP-complete [13]. In our implementation in Maple, we use the
command solve for solving the system of equations. In our
experiments on nonlinear (parametric) systems of dimension
ranging from 2 to 8, the solver can return quickly in most cases
whether they have solutions or not. Among the solutions we
obtained, we found some complex solutions, however, we have
not seen nonlinear solutions.
Example 3 (running example): According to Algorithm 1,
9
10
11
CFamily ← ∅;
for i ← 1 to N do
gu~ ,~x ← generate parameterized polynomial over ~x of
degree i;
Lf g ← compute the Lie derivative of gu~ ,~x ;
foreach monomial order O of ~x do
Ru~ ,~x ← compute remainder of Lf g w.r.t. g by O;
Coeffs ← collect coefficients of ~x in Ru~ ,~x ;
Solution ← solve system Coeffs on ~u;
CFamily ← CFamily ∪ Solution;
end
end
the steps for computing the invariant clusters of degree 2 are
as follows:
1) Generate the template polynomial of degree 2:
g2 (~u, ~x) = u6 x2 + u5 xy + u4 x + u3 y 2 + u2 y + u1
2) Compute the Lie derivative Lf~g2 using Definition 4:
Lf~g2 =
∂g2
∂g2
ẋ +
ẏ = u5 x2 y + (2 u3 + 2 u6 ) xy 2
∂x
∂y
+ u2 xy + y 3 u5 + u4 y 2
3) Compute the remainder of Lf~g2 w.r.t. g2 by graded
reverse lexicographic (grevlex) order of (x, y). Using this
order, the leading term of Lf~g2 and g2 is u5 x2 y and
u6 x2 , respectively. Then:
2 u3 u6 − u25 + 2 u26 xy 2
u5 y
r(~u, ~x) = Lf~g2 −
g2 =
u6
u6
(u2 u6 − u4 u5 ) xy
(−u3 u5 + u5 u6 ) y 3
+
+
u6
u6
u1 u5 y
(−u2 u5 + u4 u6 ) y 2
−
+
u6
u6
4) Collect the coefficients of r(~u, ~x):
u2 u6 − u4 u5 −u3 u5 + u5 u6 −u2 u5 + u4 u6
S :=
,
,
,
u6
u6
u6
u1 u5
2 u3 u6 − u25 + 2 u26
,−
u6
u6
5) Solve the system formed by S. To save space, we just
present one of the six solutions we obtained:
C6 = {u6 = −u3 , u2 = u4 = u5 = 0, u3 = u3 , u1 = u1 }
6) Substitute the above solution C6 for ~u in g2 (~u, ~x). We
get the following parameterized invariant polynomial:
g2 (~u, ~x) = −u3 x2 + u3 y 2 + u1
Note that the other five solutions obtained in step 5) are in
fact the products of the invariant polynomials {u2 y, u1 (x +
y), u1 (x − y)}, which have been obtained when initially
computing the invariants of degree 1. Hence they cannot
increase the expressive power of the set of invariant clusters
and should be dropped. The solution presented above is the
one we have given in Example 1.
Algorithm 2: Computation of invariant classes
input : CFamily: set of invariant clusters;
~x0 : an initial point
output: ICls: list of invariant classes
1
2
3
4
C. Overapproximating trajectories by invariant classes
In this section, we address how to overapproximate trajectories precisely by using invariant classes.
Invariant clusters can be divided into two categories according to the number of invariant classes that they can yield by
varying the parameter ~u. 1) finite invariant cluster: This kind
of invariant cluster can yield only one invariant class no matter
how ~u changes. For example, {u1 (x − y) = 0 | u1 ∈ R \ {0}}
is such an invariant cluster for the running example. In this
case, the trajectories that can be covered by the invariant
class is very limited. Moreover, the overapproximation is also
conservative due to the high dimension of the algebraic variety
defined by the invariant class. 2) infinite invariant cluster:
One such invariant cluster C can yield an infinite number of
invariant classes Class(C, ~x0 ) as the initial point ~x0 varies,
e.g., the invariant cluster C ∗ in Example 1. For the trajectory π~x0 , the overapproximating precision of Class(C, ~x0 )
depends largely on the dimension m of the algebraic variety
defined by Class(C, ~x0 ). The best case is m = 1 and then it
gives a curve-to-curve match in part for the trajectory.
Now, we introduce how to identify the invariant classes for
a given point ~x0 from a set of invariant clusters and how to get
a finite representation for it. To be intuitive, we first present a
3-dimensional system and a set of invariant clusters for it.
Example 4: Consider the following semialgebraic system
M2 : [ẋ, ẏ, ż] = [yz, xz, xy]. We obtain a set of invariant
clusters consisting of 7 elements. Here we only present the
infinite invariant cluster (for other clusters see Appendix I).
C7 = {g7 (~u, ~x) = (−u5 − u6 )x2 + u5 y 2 + u6 z 2 + u0
= 0 | ~u ∈ R3 \ {~0}}
The invariant clusters are capable of overapproximating all the
trajectories of the system M2 . For any given initial state, how
can we identify the invariant classes from the set of invariant
clusters? Suppose we want to find the invariant classes that can
overapproximate the trajectory from the state ~x0 = (1, 2, 3).
According to Theorem 2, we have Algorithm 2 for the purpose.
Remark 4: In Algorithm 2, we enumerate the invariant
clusters to find out which one can provide a non-empty
invariant class Class(C, ~x0 ) for ~x0 . For a Class(C, ~x0 ) to
be nonempty, the corresponding hyperplane g(~u, ~x0 ) = 0 must
have at least one solution to ~u ∈ RK \{~0}, which is equivalent
to that its dimension must be at least 1. For a hyperplane in
RK , its dimension is equal to K − 1. Therefore, Class(C, ~x0 )
must be nonempty if K > 1 and the basis of the hyperplane
can be obtained through a basic linear algebraic computation
5
6
7
8
9
10
11
12
ICls ← ∅;
foreach C ∈ CFamily do
D ← Class(C, ~x0 );
if D 6= ∅ then
m ← the dimension of the hyperplane
g(~u, ~x0 ) = 0 defining D;
if m ≥ 1 then
Basis ← basis {u1 , . . . , um } of the
hyperplane g(~u, ~x0 ) = 0;
D ← the polynomials
{g(~u1 , ~x), . . . , g(~um , ~x)}, ui ∈ Basis;
end
ICls ← ICls ∪ D;
end
end
(which will be illustrated in what follows). However, in the
case of g(~u, ~x0 ) being identical to 0, the hyperplane degenerates to the space RK \ {~0} and the dimension will be K.
Therefore, an invariant class with K = 1 is nonempty iff
g(~u, ~x0 ) is identical to 0. For example, given an invariant
cluster C 0 = {u1 (x − y) = 0 | u1 ∈ R \ {0}} and a point
~x0 = (x0 , y0 ), Class(C 0 , ~x0 ) is empty if x0 6= y0 , however,
Class(C 0 , ~x0 ) is equal to C 0 if x0 = y0 .
Example 5: We continue from Example 4. For the given
point ~x0 = (1, 2, 3), according to Algorithm 2, we find that
only Class(C7 , ~x0 ) = {g7 (~u, x, y, z) = 0 | 3u5 + 8u6 + u0 =
0, ~u ∈ R3 \{~0}} is nonempty. The dimension of the hyperplane
H : 3u5 + 8u6 + u0 = 0 is 2. Since u0 = −3u5 − 8u6 , to
get the basis of H, we can write (u0 , u5 , u6 ) = (−3u5 −
8u6 , u5 , u6 ) = u5 (−3, 1, 0) + u6 (−8, 0, 1). Hence, we have
the following basis for H: {(−3, 1, 0), (−8, 0, 1)}. As a result,
we get the finite representation B = {y 2 − x2 − 3 = 0,
z 2 − x2 − 8 = 0} for Class(C7 , ~x0 ). It is easy to check by
the Maple function HilbertDimension that dim(B) = 1.
Therefore, we finally get an algebraic variety V(B) which
provides in part a curve-to-curve match to the trajectory π~x0 .
The 3-D vector field and the algebraic curve V(B) is shown
in Figure 3a and Figure 3b, respectively.
IV. S AFETY V ERIFICATION BASED
C LUSTERS
ON I NVARIANT
A. Safety Verification of Continuous Systems
In this section, we show how to verify a safety property for
a nonlinear system based on invariant clusters.
In Section III, we have demonstrated that a trajectory can
be overapproximated by an invariant class. Since an invariant
class is determined uniquely by a single hyperplane g(~u, ~x0 ) =
0 in RK for an initial point ~x0 , and a hyperplane without
j2 = m1 + 1, . . . , m1 + m2 , k2 = n1 + 1, . . . , n1 + n2 }.
Then we have the following theorem for deciding the safety
of a semialgebraic system.
Theorem 4: Given a semialgebraic system M = hX, f~, X0 i
and invariant cluster C = {g(~u, ~x) = 0 | ~u ∈ RK \ {~0}} of
M with K ≥ 2. Suppose the normal vector of the hyperplane
g(~u, ~x) = 0 over ~u is (1, ψ1 (~x), . . . , ψK (~x)). Then the system
M is safe if there exists the following polynomial identity
(a)
(b)
Fig. 3: (a) 3D vector field of Example 4. (b) The intersection
of the invariants y 2 − x2 − 3 = 0 (blue) and z 2 − x2 − 8 =
0 (orange) overapproximates the trajectory originating from
~x0 = (1, 2, 3) (green ball).
K
X
k=1
γk · (ψk (~x1 ) − ψk (~x2 )) +
+
v∈{0,1}m1 +m2
+
constant term (this is the case for g(~u, ~x0 ) = 0) is uniquely
determined by its normal vector, we can verify if two states
lie on the same trajectory based on the following theorem.
Theorem 3: Given a semialgebraic system M = hX, f~, X0 i
and an invariant cluster C = {g(~u, ~x) = 0 | ~u =
(u1 , · · · , uKP
) ∈ RK \ {~0}} of M with K > 1, where
K
x)ui and ψi (~x) ∈ R[~x], let X0 be the
g(~u, ~x) =
i=1 ψi (~
initial set and XU be the unsafe set. Then, if there exists a
pair of states (~x1 , ~x2 ) ∈ X0 × XU such that ~x1 and ~x2 lie on
the same trajectory, one of the following two formulae must
hold:
(i)
(ii)
∃k ∈ R\{0} : kψi (~x1 ) = ψi (~x2 ), i = 1, . . . , K
ψi (~x1 ) = ψi (~x2 ) = 0, i = 1, . . . , K
(4)
(5)
Moreover, if some ψi (~x) ≡ 1, i.e. g(~u, ~x) contains a
constant term ui , then formula (4) simplifies to
ψi (~x1 )) = ψi (~x2 ), i = 1, . . . , K
(6)
Proof: See Appendix D.
Remark 5: Instead of computing the invariants explicitly,
Theorem 3 provides an alternative way to verify whether two
states ~x1 , ~x2 lie on the same trajectory by checking that the
difference between the normal vectors of g(~u, ~x1 ) = 0 and
g(~u, ~x2 ) = 0. Let us take Example 4 for illustration. We think
of C7 as a hyperplane over ~u ∈ R3 : u0 + (y 2 − x2 )u5 +
(z 2 − x2 )u6 = 0, hence the corresponding normal vector is
~ (~x) = (1, y 2 − x2 , z 2 − x2 ). Given two random points ~x1 =
N
√ √
(1, 2, 3) and ~x2 = (5, 27, 34), it is easy to verify that
~ (~x1 ) 6= N
~ (~x2 ), which means that ~x1 and ~x2 are not on
N
the same trajectory. This can be verified in another way, as
we know that the invariant class of ~x1 is {y 2 − x2 − 3 =
0, z 2 − x2 − 8 = 0} and ~x2 does not belong to its solution set.
Now we demonstrate how to verify a safety property of
semialgebraic systems. Assume X0 and XU can be written
as semialgebraic sets, i.e., X0 = {~x1 ∈ Rn | pi1 (~x1 ) =
0, qj1 (~x1 ) ≥ 0, rk1 (~x1 ) > 0, i1 = 1, . . . , l1 , j1 = 1 . . . m1 ,
k1 = 1, . . . , n1 } and XU = {~x2 ∈ Rn | pi2 (~x2 ) =
0, qj2 (~x2 ) ≥ 0, rk2 (~x2 ) > 0, i2 = l1 + 1, . . . , l1 + l2 ,
X
X
v∈{0,1}n1 +n2
i=1
m1Y
+m2
X
(
btv )2 ·
t
lX
1 +l2
βi p i
v
qj j
(7)
j=1
n1Y
+n2
n1Y
+n2
X
X
(
ctv )2 ·
rkvk +
s2w +
rkdk = 0
t
k=1
w
k=1
where dk ∈ N and βj , γk , btv , ctv , sw are polynomials in
R[~x1 , ~x2 ].
Proof: See Appendix E.
Remark 6: Theorem 4 transforms the safety verification
problem into a decision problem about the existence of a real
solution of a system of polynomial equations and inequalities.
As noted in Remark 1, this decision problem can be solved
by SOS programming. Our implementation uses the efficient
tool SOSTOOLS [12]. Appendix C contains more information
on SOS programming.
In Theorem 4, we deal with a general semialgebraic system
where the initial set and the unsafe set are represented by a
set of polynomial equations and inequalities. However, if the
system is described by much simpler set representations such
as a single polynomial equation or inequality, the programming
problem can be simplified correspondingly. For example, if
both sets can be represented or overapproximated by a single
polynomial equation I(~x1 ) = 0 and U (~x2 ) = 0, respectively,
then the programming problem is simplified to (see [11])
K
X
αj (ψj (~x1 ) − ψj (~x2 )) + βI + θU − 1 is an SOS (8)
j=1
where (ψ1 (~x), . . . , ψK (~x)) is the same as in Theorem 4 and
αj , β, θ ∈ R[~x1 , ~x2 ]. For how to overapproximate a compact
set we refer the reader to Appendix J. The algorithm for
safety verification based on the condition (8) is shown in
Algorithm 3.
The next example demonstrates the application of the verification method.
Example 6 (running example
2): Given the semialgebraic
system M3 by [ẋ, ẏ] = y 2 , xy and the initial set be
X0 = {(x, y) ∈ R2 | I(x, y) = (x+15)2 +(y −17)2 −1 ≤ 0},
verify that if the unsafe set XU = {(x, y) ∈ R2 | U (x, y) =
(x−11)2 +(y−16.5)2 −1 ≤ 0} can be reached. The parameter
space of C ∗ = {g(~u, ~x) = u1 − u3 (x2 − y 2 ) = 0 | (u1 , u3 ) ∈
R2 \ {~0}} has dimension 1 and hence can provide an invariant
class for every state in X0 and XU . The normal vector of the
hyperplane g(~u, ~x) = 0 is (1, ψ1 (x, y)) = (1, y 2 − x2 ). Let
Algorithm 3: Safety verification
~ the K-dimensional normal vector of an
input : ψ:
invariant cluster;
I(~x1 ): the initial set;
U(~x2 ): the unsafe set;
N : the maximum degree of programming
polynomials α
~ , β, θ
output: IsSafe: whether the system is safe
1
2
3
4
5
6
7
8
9
10
11
12
IsSafe ← False;
for i ← 1 to N do
α
~ ← generate a vector of polynomials of degree i for
ψ;
β ← generate a polynomial of degree i for I(~x1 );
θ ← generate a polynomial of degree i for U(~x2 );
PK
~j (~x1 ) − ψ
~j (~x2 )) + βI+θU −1;
P ← j=1 αj (ψ
Solution ← perform SOS programming on P ;
if Solution is found then
IsSafe ← True;
break;
end
end
ϕ(x1 , y1 , x2 , y2 ) = ψ1 (x1 , y1 ) − ψ1 (x2 , y2 ). By Theorem 4,
to verify the safety property, we only need to verify that the
following system of equations has no real solution.
I(x1 , y1 ) = (x1 + 15)2 + (y1 − 17)2 − 1 = 0
U (x2 , y2 ) = (x2 − 11)2 + (y2 − 16.5)2 − 1 = 0
ϕ(x1 , y1 , x2 , y2 ) = y12 − x21 − (y22 − x22 ) = 0
Note that we substitute (x1 , y1 ), (x2 , y2 ) for (x, y) in I(x, y)
and U (x, y), respectively, to denote the different points in X0
and XU . To prove that the system is safe, we need to find
αi ∈ R[x1 , y1 , x2 , y2 ], i = 1, 2, 3 such that Prog = α1 I +
α2 U + α3 ϕ − 1 is a sum-of-squares. Finally, we found three
polynomials of degree 2 for αi , respectively (see Appendix K
for the expressions of αi and Prog), hence the system is safe.
As shown in Figure 2, although the relative position of XU
to the reachable set of X0 is very close, we can still verify
the safety property using an invariant cluster. However, we
failed to find a barrier certificate for this system by using the
methods in [14], [15].
In Theorem 4, we present a sufficient condition for deciding
if a semialgebraic system is safe. The theory originates from
the fact that the system is safe if there is no invariant class
intersecting both the initial and the unsafe set, which is equivalent to that the formula (7) holds. To verify the latter, we need
to find a set of witness polynomials by SOS programming.
However, as the dimension of the system increases, the number
of parametric polynomials involved increases correspondingly,
which also leads to an increase in computational complexity. In
what follows, we present a new method for safety verification,
which avoids the aforementioned problem. The new method
is based on Proposition 1, that is, for any polynomial g(~x)
satisfying Lf~g ∈ hgi, g(x) ∼ 0 is an invariant for any
∼ ∈ {<, ≤, =, ≥, >}.
Proposition 3: Given a semialgebraic system M =
hX, f~, X0 i and an invariant cluster C = {g(~u, ~x) = 0 | ~u ∈
RK \ {~0}} of M , let X0 and XU be the initial set and the
unsafe set, respectively. Then, the system is safe if there exists
a ~u∗ ∈ RK \ {~0} such that
∀~x ∈ X0 : g(~u∗ , ~x) ≥ 0
∗
∀~x ∈ XU : g(~u , ~x) < 0
(9)
(10)
Proof: See Appendix F.
According to Proposition 3, to verify the safety property,
it suffices to find a ~u∗ ∈ RK \ {~0} which satisfies the
constraints (9) and (10). There are some constraint solving
methods available, e.g, SMT solvers. However, the high complexity of SMT theory limits the applicability of the method.
In the following, we transform the above constraint-solving
problem into an SOS programming problem, which can be
solved efficiently. We write P~ (~x) ~0 to denote pi (~x) ≥ 0, i =
1, . . . , m for a polynomial vector P~ (x) = (p1 (~x), . . . , pm (~x)).
Proposition 4: Given a semialgebraic system M =
hX, f~, X0 i and an invariant cluster C = {g(~u, ~x) = 0 |,
~u ∈ RK \ {~0}} of M and a constant ǫ ∈ R>0 , let
X0 = {~x ∈ Rn | I~ ~0, I~ ∈ R[~x]m1 } and XU = {~x ∈ Rn |
~ ~0, U
~ ∈ R[~x]m2 }. Then, the system is safe if there exist a
U
∗
K
~u ∈ R \ {~0} and two SOS polynomial vectors ~µ1 ∈ R[~x]m1
and ~µ2 ∈ R[~x]m2 such that the following polynomials are SOS
polynomials.
g(~u∗ , ~x) − µ
~ 1 · I~
~ −ǫ
− g(~u∗ , ~x) − ~µ2 · U
(11)
(12)
Proof: See Appendix G.
Similar to Theorem 4, Proposition 4 also reduces to an
SOS programming problem. However, the ideas behind these
two theories are different in that by Theorem 4 we attempt
to prove no invariant class which overapproximates trajectory
can intersect both X0 and XU , while by Proposition 4 we
mean to find a hypersurface which is able to separate the
reachable set of X0 from the unsafe set XU . Apparently,
there must exist no invariant class intersecting both X0 and
XU if there exists such a hypersurface, but not vice versa.
Hence the latter is more conservative than the former, but it
is also more efficient in theory because it usually involves
less unknown polynomials. For example, for an n-dimensional
system with X0 and XU defined by a single polynomial
inequality, respectively, we usually need n + 1 unknown
polynomials for the former method, however, we need only
2 for the latter. See Algorithm 4 for the pseudocode of the
method based on Proposition 4.
Let us use the following example to demonstrate the application of Algorithm 4.
Example 7: Given the semialgebraic system S4 by
2
ẋ
y − 2y
= 2
,
ẏ
x + 2x
Algorithm 4: Algorithm for safety verification based on
SOS programming
input : g(~u, ~x): the invariant polynomial defining an
invariant cluster;
~ the polynomial vector describing initial set;
I:
~ : the polynomial vector describing unsafe set;
U
N : the maximum degree of the polynomial
vectors ~µ1 , ~µ2 ;
ǫ: a positive real number
output: IsSafe: whether the system is safe;
g(~u∗ , ~x), µ
~ 1, µ
~ 2 : the feasible solution if IsSafe;
1
2
3
4
5
6
7
8
9
10
11
12
13
IsSafe ← False;
for i ← 0 to N do
~µ1 ← generate a parametric polynomial vector of
~
degree 2i for I;
~µ2 ← generate a parametric polynomial vector of
~;
degree 2i for U
~
p1 ← g(~u, ~x) − ~
µ1 · I;
~ − ǫ;
p2 ← −g(~u, ~x) − ~
µ2 · U
Solution ← perform SOS programming on
{~µ1 , ~µ2 , p1 , p2 };
if Solution is found then
IsSafe ← True;
[g(~u∗ , ~x), ~
µ1 , ~
µ2 ] ← get the feasible solution from
Solution;
break;
end
end
Fig. 4: Example 7. Invariant g(~u∗ , ~x) = 0 (blue curve)
separating reachable set of X0 (green patch) from XU (red
patch).
all locations. The idea is to pick out a polynomial gl (~u∗l , ~x)
from the respective invariant cluster Cl for each location l such
that gl (~u∗l , ~x) ≥ 0 is an invariant for the location l and all the
invariants coupled together by the constraints at the discrete
transitions form a hybrid invariant for the hybrid system. The
aforementioned idea is formalized in Proposition 5.
Proposition 5: Given an n-dimensional hybrid system H =
hL, X, E, R, G, I, F i and a set of invariant clusters {Cl , l =
1, . . . , n}, where Cl = {gl (~ul , ~x) = 0 | ~ul ∈ RKl \ {~0}} with
Kl > 1 is an invariant cluster for location l, the system H is
safe if there exists a set Su~ = {~u∗l ∈ RKl \ {~0}, l = 1, . . . , n}
such that, for all l ∈ L and (l, l′ ) ∈ E, the following formulae
hold:
∀~x ∈ Init(l) : gl (~u∗l , x) ≥ 0
∀~x ∈ G(l, l′ ), ∀~x′ ∈ R((l, l′ ), ~x) : gl (~u∗l , ~x) ≥ 0
2
let the initial set be X0 = {(x, y) ∈ R | I(x, y) = 1 − (x +
6.0)2 − (y + 6.0)2 ≥ 0}, decide whether the unsafe set XU =
{(x, y) ∈ R2 | U (x, y) = 1 − (x − 8.2)2 − (y − 4.0)2 ≥ 0}
can be reached.
By Algorithm 1, we first get an invariant cluster C4 =
{g(~u, ~x) = 13 u3 x3 − 31 u3 y 3 + u3 x2 + u3 y 2 + u1 = 0 | ~u ∈ R2 }
for the system S4 , then by Algorithm 4, we find an invariant
g(~u∗ , ~x) = 0 with ~u∗ = (−3081.9, 7.1798) from the invariant
cluster C4 : g(~u∗ , ~x) = 7.1798x3 − 7.1798y 3 + 21.539x2 +
21.539y 2 − 3081.9 and two polynomials µ1 (~x), µ2 (~x) of
degree 2. The stream plot of S4 and the plot of g(~u∗ , ~x) = 0
are shown in Figure 4. Note that we failed to find a barrier
certificate by using the method in [15] and [14] for this system.
B. Safety Verification of Hybrid Systems
In this section, we extend the safety verification method for
continuous systems based on invariant clusters to semialgebraic hybrid systems.
A hybrid system consists of a set of locations and a set
of discrete transitions between locations. In general, different
locations have different continuous dynamics and hence correspond to different invariant clusters. An invariant for the hybrid
system can be synthesized from the set of invariant clusters of
=⇒ gl′ (~u∗l′ , ~x′ ) ≥ 0
∀~x ∈ I(l) ∩ Uns(l) : gl (~u∗l , ~x) < 0
(13)
(14)
(15)
where Init(l) and Uns(l) denote respectively the initial set
and the unsafe set at location l.
Proof: See Appendix H.
Similar to Proposition 3, we further transform the problem
into an SOS programming problem. Consider a semialgebraic
hybrid system H = hL, X, E, R, G, I, F i, where the mappings
R, G, and I are defined in terms of polynomial inequalities as
follows:
′
~ ll′ 0, G
~ ll′ ∈ R[~x]mll′ }
• G : (l, l ) 7→ {~
x ∈ Rn | G
′
~ ll′ ~x 0, R
~ ll′ ~x ∈ R[~x]nll′ }
• R : (l, l , ~
x) 7→ {~x ∈ Rn | R
• I : l 7→ {~
x ∈ Rn | I~l 0, I~l ∈ R[~x]pl }
and the mappings of the initial and the unsafe set are defined
as follows:
~ l 0, Init
~ l ∈ R[~x]rl }
• Init : l 7→ {~
x ∈ Rn | Init
n
~
~ l ∈ R[~x]sl }
• Uns : l 7→ {~
x ∈ R | Unsl 0, Uns
where mll′ , nll′ , rl , pl and sl are the dimensions of the polynomial vector spaces. Then we have the following proposition
for safety verification of the semialgebraic hybrid system H.
Proposition 6: Let the hybrid system H, the initial set
mapping Init, and the unsafe set mapping Uns be defined
as above. Given a set of invariant clusters {Cl , l = 1, . . . , n}
of H, where Cl = {gl (~ul , ~x) = 0 | ~ul ∈ RKl \ {~0}} with
Kl > 1 is an invariant cluster for location l, a set Sγ =
{γll′ ∈ R≥0 , (l, l′ ) ∈ E} of constants, and a constant vector
~ǫ ∈ Rn>0 , the system is safe if there exists a set Su = {~u∗l ∈
RKl \ {~0}, l = 1, . . . , n} and five sets of SOS polynomial
vectors {~θl ∈ R[~x]sl , l ∈ L}, {~κll′ ∈ R[~x]pll′ , (l, l′ ) ∈ E},
ηl ∈ R[~x]tl , l ∈ L}, and
{~σll′ ∈ R[~x]qll′ , (l, l′ ) ∈ E}, {~
wl
{~νl ∈ R[~x] , l ∈ L} such that the following polynomials
are SOS for all l ∈ L and (l, l′ ) ∈ E:
~ l
gl (~u∗l , ~x) − θ~l · Init
gl′ (~u∗l′ , ~x′ )
(16)
γll′ gl (~u∗l , ~x)
− ~κll′ · Gll′ − ~σll′ · Rll′ ~x
~
− ~νl · Il − ~ηl · Unsl − gl (~u∗l , ~x) − ǫl
−
(17)
(18)
Proof: Similar to the proof of Proposition 4, we can
easily derive the formulae (13)–(15) from the SOS’s (16)–(18),
respectively. Then, by Proposition 5, the system is safe.
The algorithm for computing invariants for semialgebraic
hybrid systems based on Proposition 6 is very similar to
Algorithm 4 for semialgebraic continuous systems except that
it involves more SOS constraints on continuous and discrete
transitions.
V. I MPLEMENTATION AND E XPERIMENTS
Based on the approach presented in this paper, we implemented a prototype tool in Maple and Matlab, respectively.
In Maple, we implemented the tool for computing invariant
clusters and identifying invariant classes based on the remainder computation of the Lie derivative of a polynomial w.r.t. its
Gröbner basis and solving the system of polynomial equations
obtained from the coefficients of the remainder. In Matlab,
we implemented the tool for safety verification based on the
SOS programming tool package SOSTOOLS. Currently, we
manually transfer the invariant clusters computed in Maple to
Matlab for safety verification. In the future, we will integrate
the two packages into a single tool.
Now, we present the experimental results on nonlinear
benchmark systems, run on a laptop with an 3.1GHz Intel
Core i7 CPU and 8GB memory.
A. Longitudinal Motion of an Airplane
In this experiment, we study the 6th order longitudinal equations of motion that captures the vertical motion (climbing,
descending) of an airplane ([16], Chapter 5). Let g denote the
gravity acceleration, m the total mass of an airplane, M the
aerodynamic and thrust moment w.r.t. the y axis, (X, Z) the
aerodynamics and thrust forces w.r.t. axis x and z, and Iyy the
second diagonal element of its inertia matrix. Then the motion
of the airplane is described as follows.
X
− g sin(θ) − qw,
m
ẋ = w sin(θ) + v cos(θ),
v̇ =
θ̇ = q,
Z
+ g cos(θ) + qv,
m
ż = −v sin(θ) + w cos(θ),
M
,
q̇ =
Iyy
ẇ =
where the meanings of the variables are as follows: v: axial
velocity, w: vertical velocity, x: range, z: altitude, q: pitch rate,
θ: pitch angle.
To transform the above system into a semialgebraic system,
we first introduce two additional variables d1 , d2 such that
d1 = sin(θ), d2 = cos(θ) and then substitute d1 and d2
respectively for sin(θ) and cos(θ) in the model. In addition, we
get two more constraints d˙1 = qd2 and d˙2 = −qd1 . As a result,
the dimension of the system rises to 8. For this system, using
the method in [17], Ghorbal et al. spent 1 hour finding three
invariant polynomials of degree 3 on a laptop with a 1.7GHz
Intel Core i5 CPU and 4GB memory. Using our method,
we spent only 0.406 seconds obtaining an invariant cluster
g9 (~u, ~x) = 0 of degree 3, which is presented in Appendix L.
By the constraint d21 + d22 = 1, we reduce the normal vector
of the hyperplane g9 (~u, ~x) = 0 in ~u to (1, ψ1 , ψ2 , ψ3 ), where
ψ1 , ψ2 , ψ3 are defined as follows.
M mz gmθ mqv
ψ1 =
+
+
+ 1 sin (θ)
Iyy Z
Z
Z
X
mqw
+
−
cos (θ)
Z
Z
Xqv qw
gIyy Xθ
Xz
sin(θ)
+x−
− Iyy
+
ψ2 = −
Z
ZM
ZM
M
qv
X2 + Z2
Xqw
cos(θ)
−
−
+ Iyy
ZM
M
ZM m
Mθ
ψ3 = q 2 − 2
Iyy
Given a symbolic initial point ~x0 = (v0 , w0 , x0 , z0 , θ0 , q0 ,
d01 , d02 ), we have verified that our invariant cluster defines the
same algebraic variety as defined by the invariants in [17]
by comparing their Gröbner bases. However, our method is
much more efficient. Moreover, we also obtained the invariant
clusters of higher degrees (4 − 6) quickly. The experimental
result is shown in Table I. The first column is the degree of the
invariants, the second column is the variables to be decided,
the third column is the computing time in seconds, and the
last column is the number of invariant clusters generated. As
can be seen, in the most complicated case, where the number
of the indeterminates reaches up to 3003, we spent only 200.9
seconds to discover an invariant cluster of degree 6. However,
we found that these higher order invariant clusters have the
same expressive power as the invariant cluster of degree 3 in
terms of algebraic variety.
B. Looping particle
Consider a heavy particle on a circular path of radius r. The
motion of the particle is described by the following differential
equation.
˙
rcos(θ)
−r sin(θ)θ̇
ẋ
−yω
˙
ẏ =
rsin(θ)
= r cos(θ)θ̇ = xω
g cos(θ)
ω̇
− gx
− g(r cos(θ))
−
2
r2
r
r
Note that the above is a parameterized system with gravity
acceleration g and radius r as parameters. Our tool finds the
TABLE I: Benchmark results for the Longitudinal Motion of an Airplane (B1), the Looping Particle system (B2), the Coupled
Spring-Mass system (B3), and the 3D-Lotka-Volterra System (B4).
Degree of
invariants
1
2
3
4
5
6
B1
9
45
165
495
1287
3003
No. of variables
B2
B3
4
6
10
21
20
56
35
126
56
252
84
462
B4
4
10
20
35
56
84
B1
0.016
0.031
0.484
3.844
25.172
200.903
Running time (sec)
B2
B3
0.015
0.047
0.047
0.078
0.049
0.250
0.156
1.109
0.703
6.641
3.000
32.109
following invariant cluster consisting of a parametric polynomial of degree 2: {g(~u, ~x) = 0 | g(~u, ~x) = u5 x2 + u5 y 2 +
u2 ω 2 + 2ur22 g y + u0 , ~u ∈ R3 \ {~0}}. Given an arbitrary point
(x0 , y0 , ω0 ) = (2, 0, ω0 ), we get the invariant class {g(~u, ~x) =
0 | (x20 + y02 )u5 + (ω02 + 2g
u ∈ R3 \ {~0}}.
r 2 y0 )u2 + u0 = 0, ~
According to Algorithm 2, the algebraic variety representing
the trajectory originating from (x0 , y0 , ω0 ) is {(x, y, ω) ∈ R3 |
2g
2
x2 + y 2 − x20 − y02 = 0, ω 2 + 2g
r 2 y − ω0 − r 2 y0 = 0}. The results
in [19] and [18] are special cases of our result when setting
(r, g) = (2, 10) and (r, g, x0 , y0 ) = (2, 10, 2, 0), respectively.
Therefore, our method is more powerful in finding parameterized invariants for parameterized systems. See Table I for
detailed experimental result.
C. Coupled spring-mass system
Consider the system
v1
x˙1
k
k
v˙1 − 1 x1 − 2 (x1 − x2 )
m1
= m1
x˙2
v2
k
2
v˙2
− m2 (x2 − x1 )
The model consists of two springs and two weights w1 , w2 .
One spring, having spring constant k1 , is attached to the ceiling
and the weight w1 of mass m1 is attached to the lower end
of this spring. To the weight w1 , a second spring is attached
having spring constant k2 . To the bottom of this second spring,
a weight w2 of mass m2 is attached. x1 and x2 denote the
displacements of the center of masses of the weights w1 and
w2 from equilibrium, respectively.
In this benchmark experiment, we first tried an instantiated
version of the system by using the same parameters as in [20]:
k2
k1
m1 = m2 = k and m1 = 5m2 . The experimental result
is presented in Table I. We found that the expressive power
of the invariant clusters does not increases any more as the
degree is greater than 3 and it took only 0.250 seconds to
compute the invariant cluster of degree 3. Finally, we perform
the computation directly on the fully parameterized system
and we get the following parameterized invariant cluster.
k2 x1 x2 (m1 u8 − 2m2 u10 )
+ u10 v12 + u1
g(~u, ~x) = u8 v1 v2 +
m1 m2
1 v22 (k1 m2 u8 − k2 m1 u8 + k2 m2 u8 + 2k2 m2 u10 )
+
2
k2 m1
1 (2k1 m2 u10 − k2 m1 u8 + 2k2 m2 u10 )x21
+
2
m1 m2
1 (k1 m2 u8 − k2 m1 u8 + 2k2 m2 u10 )x22
+
2
m1 m2
B4
<0.001
0.031
0.109
0.312
0.750
1.641
B1
0
1
1
1
1
1
No. of invariant clusters
B2
B3
0
0
1
0
0
1
1
1
0
1
1
1
B4
2
3
7
6
6
16
This invariant cluster enables us to analyze the system
properties under different parameter settings.
D. 3D-Lotka-Volterra system
Consider the system [ẋ, ẏ, ż] = [xy − xz, yz − yx, xz − yz].
The experimental result is presented in Table I. Here we
present only two invariant clusters to show their expressive
power: one of degree 1 and one of degree 3. C1 = {g1 (~u, ~x) =
u3 x + u3 y + u3 z + u4 = 0 | ~u ∈ R2 \ {~0}}, C3 =
{g3 (~u, ~x) = 0 | ~u ∈ R4 \ {~0}}, where g3 (~u, ~x) = u5 xyz +
u10 x3 + 3u10 x2 y + 3u10 x2 z + 3xy 2 u10 + 3xz 2 u10 + u10 y 3 +
3u10 y 2 z + 3u10 yz 2 + u10 z 3 + u16 x2 + 2u16 xy + 2u16 xz +
u16 y 2 + 2u16 yz + u16 z 2 + u19 x + u19 y + u19z + u20 . Invariant
cluster C1 shows that every trajectory of the system must
lie in some plane. C3 can overapproximate the trajectories
with a much higher precision because it can provide algebraic
varieties of dimension 1. For example, in [20], the initial
set is given as X0 = {(x, y, z) ∈ R3 | x2 − 1 = 0,
y 2 − 1 = 0, z 2 − 1 = 0} and they discovered four invariants.
In our experiment, we spend 0.109 seconds discovering an
invariant cluster. This invariant cluster can overapproximate
all the trajectories precisely, say, for x0 = (1, −1, 1) ∈ X0 ,
we get the invariant class Class(C3 , x0 ) = {g3 (~u, ~x) = 0 |
−u5 +7u10 +u16 +u19 +u20 = 0, ~u ∈ R5 \{~0}}. By taking the
intersection of its basis xyz + 1 = 0 and x + y + z − 1 = 0, we
immediately obtain a one-dimensional algebraic variety which
overapproximates the trajectory precisely.
E. Hybrid controller
Consider a hybrid controller consisting of two control
modes. The discrete transition diagram of the system is shown
in Fig. 5a and the vector fields describing the continuous
behaviors are as follows:
y 2 + 10y + 25
f1 (~x) =
,
2xy + 10x − 40y − 200
−y 2 − 10y − 25
f2 (~x) =
8xy + 40x − 160y − 800
The system starts from some point in X0 = {(x, y) ∈ R2 |
(x−9)2 +(y−20)2 ≤ 4} and then evolves following the vector
field f1 (~x) at location l1 (Switch-On). The value of x keeps
increasing until it reaches 35, then the system switches immediately to location l2 (Switch-Off) without performing any
reset operation. At location l2 , the system operates following
the vector field f2 (~x) and the value of x keeps decreasing. As
the value of x drops to 5, the system switches immediately
x
d x d
x f x
d x d
x f x
l
l
x
(a)
(b)
Fig. 5: (a) Hybrid automaton from Subsection V-E. x = 5
and x = 35 are guards for discrete transitions and no reset
operation is performed. (b) Hybrid invariant for the system in
Subsection V-E. Solid patch in green: initial set, curve in blue:
invariant for l1 , curve in purple: invariant for l2 , red shadow
region on the top: unsafe region.
back to location l1 again. Our objective is to verify that the
value of y will never exceed 48 in both locations.
For the convenience of SOS programming, we define the
unsafe set as Uns(l1 ) = Uns(l2 ) = {(x, y) ∈ R2 | 48 < y <
60}, which is sufficient to prove y ≤ 48 in locations l1 and
l2 . According to the theory proposed in Section IV-B, we first
find an invariant cluster for each location, which is composed
of a parameterized polynomial, respectively: g1 (~u1 , ~x) =
1
u12 y 2 + 8u12 x + u12 y + u11 and g2 (~u2 , ~x) =
− 51 u12 x2 + 10
1
4
2
2
5 u22 x + 10 u22 y −32u22 x+u22 y +u21 . In the second phase,
we make use of the constraint condition in Proposition 6 to
compute a pair of vectors ~u∗1 and ~u∗2 . By setting γ12 = γ21 = 1,
our tool found a pair of ~u∗1 = (u11 , u12 ) = (2.9747, 382.14)
and ~u∗2 = (u21 , u22 ) = (2.9747, 138.44). As shown in Fig. 5b,
the curves of g1 (~u∗1 , ~x) = 0 and g2 (~u∗2 , ~x) = 0 form an upper
bound for the reachable set in location l1 and l2 , respectively,
which lie below the unsafe region y ≥ 48. Therefore, the
system is safe.
VI. R ELATED W ORK
In recent years, many efforts have been made toward generating invariants for hybrid systems. Matringe et al. reduce
the invariant generation problem to the computation of the
associated eigenspaces by encoding the invariant constraints
as symbolic matrices [21]. Ghorbal et al. use the invariant
algebraic set formed by a polynomial and a finite set of its successive Lie derivatives to overapproximate vector flows [17].
Both of the aforementioned methods involve minimizing the
rank of a symbolic matrix, which is inefficient in dealing
with parametric systems. In addition, none of these methods
involve how to verify safety properties based on the invariants.
Sankaranarayanan discovers invariants based on invariant ideal
and pseudo ideal iteration [20], but this method is limited to
algebraic systems. Tiwari et al. compute invariants for special
types of linear and nonlinear systems based on Syzygy computation and Gröbner basis theory as well as linear constraint
solving [22]. Platzer et al. use quantifier elimination to find
differential invariants [23]. The methods based on Gröbner
basis and first-order quantifier elimination suffer from the high
complexity significantly. Another approach considers barrier
certificates based on different inductive conditions [15], [14]
which can be solved by SOS programming efficiently but is
limited by the conservative inductive condition. Carbonell et
al. generate invariants for linear systems [24]. Some other
approaches focusing on different features of systems have also
been proposed for constructing inductive invariants [25], [26],
[18], [27], [28].
VII. C ONCLUSION
In this paper, we proposed an approach to automatically
generate invariant clusters for semialgebraic hybrid systems.
The benefit of invariant clusters is that they can overapproximate trajectories of the system precisely. The invariant clusters
can be obtained efficiently by computing the remainder of
the Lie derivative of a template polynomial w.r.t. its Gröbner
basis and then solving a system of homogeneous polynomial
equations obtained from the remainder. Moreover, based on
invariant clusters and SOS programming, we propose a new
method for safety verification of hybrid systems. Experiments
show that our approach is effective and efficient for a large
class of biological and control systems.
ACKNOWLEDGEMENT
This research was supported in part by the European Research Council (ERC) under grant 267989 (QUAREM) and by
the Austrian Science Fund (FWF) under grants S11402-N23
(RiSE) and Z211-N23 (Wittgenstein Award).
R EFERENCES
[1] T. Henzinger, “The theory of hybrid automata,” in Proc. IEEE Symp.
Logic in Computer Science, 1996, pp. 278–292.
[2] E. Asarin, T. Dang, and A. Girard, “Reachability analysis of nonlinear
systems using conservative approximation,” in Hybrid Systems: Computation and Control. Springer, 2003, pp. 20–35.
[3] S. Bogomolov, A. Donzé, G. Frehse, R. Grosu, T. T. Johnson, H. Ladan,
A. Podelski, and M. Wehrle, “Guided search for hybrid systems based
on coarse-grained space abstractions,” International Journal on Software
Tools for Technology Transfer, pp. 1–19, 2015.
[4] S. Bogomolov, G. Frehse, R. Grosu, H. Ladan, A. Podelski, and
M. Wehrle, “A box-based distance between regions for guiding the
reachability analysis of SpaceEx,” in Computer Aided Verification (CAV
2012), ser. LNCS, vol. 7358. Springer, 2012, pp. 479–494.
[5] A. Tiwari, “Abstractions for hybrid systems,” Formal Methods in System
Design, vol. 32, no. 1, pp. 57–83, 2008.
[6] R. Alur, T. Dang, and F. Ivančić, “Progress on reachability analysis
of hybrid systems using predicate abstraction,” in Hybrid Systems:
Computation and Control. Springer, 2003, pp. 4–19.
[7] S. Bogomolov, G. Frehse, M. Greitschus, R. Grosu, C. S. Pasareanu,
A. Podelski, and T. Strump, “Assume-guarantee abstraction refinement
meets hybrid systems,” in HVC 2014. Springer, pp. 116–131.
[8] S. Bogomolov, C. Schilling, E. Bartocci, G. Batt, H. Kong, and R. Grosu,
“Abstraction-based parameter synthesis for multiaffine systems,” in 11th
International Haifa Verification Conference (HVC 2015), ser. LNCS, vol.
9434. Springer, 2015, pp. 19–35.
[9] S. Bogomolov, C. Herrera, M. Muñiz, B. Westphal, and A. Podelski,
“Quasi-dependent variables in hybrid automata,” in Hybrid Systems:
Computation and Control. ACM, 2014, pp. 93–102.
[10] D. A. Cox, J. Little, and D. O’Shea, Ideals, Varieties, and Algorithms:
An Introduction to Computational Algebraic Geometry and Commutative
Algebra. Springer, 2007.
[11] G. Stengle, “A Nullstellensatz and a Positivstellensatz in semialgebraic
geometry,” Mathematische Annalen, vol. 207, no. 2, pp. 87–97, 1974.
[12] S. Prajna, A. Papachristodoulou, P. Seiler, and P. Parrilo, “SOSTOOLS
and its control applications,” Positive polynomials in control, pp. 580–
580, 2005.
[13] A. Ayad, “A survey on the complexity of solving algebraic systems,” in
International Mathematical Forum, vol. 5, no. 7, 2010, pp. 333–353.
[14] H. Kong, F. He, X. Song, W. N. Hung, and M. Gu, “Exponentialcondition-based barrier certificate generation for safety verification of
hybrid systems,” in CAV. Springer, 2013, pp. 242–257.
[15] S. Prajna and A. Jadbabaie, “Safety verification of hybrid systems using
barrier certificates,” HSCC, pp. 271–274, 2004.
[16] R. F. Stengel, “Flight dynamics,” Fluid Dynamics, vol. 1, 2004.
[17] K. Ghorbal and A. Platzer, “Characterizing algebraic invariants by differential radical invariants,” in Tools and Algorithms for the Construction
and Analysis of Systems. Springer, 2014, pp. 279–294.
[18] S. Sankaranarayanan, H. Sipma, and Z. Manna, “Constructing invariants
for hybrid systems,” HSCC, pp. 69–77, 2004.
[19] R. Rebiha, A. V. Moura, and N. Matringe, “Generating invariants for
non-linear hybrid systems,” TCS, vol. 594, pp. 180–200, 2015.
[20] S. Sankaranarayanan, “Automatic invariant generation for hybrid systems using ideal fixed points,” in International Conference on Hybrid
Systems: Computation and Control. ACM, 2010, pp. 221–230.
[21] N. Matringe, A. V. Moura, and R. Rebiha, “Generating invariants
for non-linear hybrid systems by linear algebraic methods,” in Static
Analysis. Springer, 2010, pp. 373–389.
[22] A. Tiwari and G. Khanna, “Nonlinear systems: Approximating reach
sets,” Hybrid Systems: Computation and Control, pp. 171–174, 2004.
[23] A. Platzer and E. Clarke, “Computing differential invariants of hybrid
systems as fixedpoints,” in CAV. Springer, 2008, pp. 176–189.
[24] E. Rodríguez-Carbonell and A. Tiwari, “Generating polynomial invariants for hybrid systems,” HSCC, pp. 590–605, 2005.
[25] T. T. Johnson and S. Mitra, “Invariant synthesis for verification of
parameterized cyber-physical systems with applications to aerospace
systems,” in AIAA Infotech at Aerospace Conference, 2013.
[26] S. Gulwani and A. Tiwari, “Constraint-based approach for analysis of
hybrid systems,” in CAV. Springer, 2008, pp. 190–203.
[27] B. Sassi, M. Amin, A. Girard, and S. Sankaranarayanan, “Iterative
computation of polyhedral invariants sets for polynomial dynamical
systems,” in CDC. IEEE, 2014, pp. 6348–6353.
[28] J. Liu, N. Zhan, and H. Zhao, “Computing semi-algebraic invariants
for polynomial dynamical systems,” in International Conference on
Embedded Software. ACM, 2011, pp. 97–106.
[29] S. Boyd, L. El Ghaoui, E. Feron, and V. Balakrishnan, Linear matrix
inequalities in system and control theory.
Society for Industrial
Mathematics, 1994, vol. 15.
[30] P. Parrilo, “Semidefinite programming relaxations for semialgebraic
problems,” Mathematical Programming, vol. 96, no. 2, pp. 293–320,
2003.
A PPENDIX
A. Proof of Proposition 1
Proof:
Let g(x) ∈ R[~x] be a polynomial satisfying Lf g ∈ hgi, we
first prove that
∀k ≥ 1 : Lkf g ∈ hgi
(19)
The proof is by induction. Since g(x) satisfies Lf g ∈ hgi, we
must have Lf g = p1 g for some p1 ∈ R[x]. Assume ∀k ≤ m :
Lkf g ∈ hgi holds, we only need to prove Lm+1
g ∈ hgi holds.
f
By assumption, we have Lm
g
∈
hgi,
that
is,
Lm
f
f g = pm g
m+1
m
for some pm ∈ R[x]. Then, Lf g = Lf Lf g = Lf pm g =
gLf pm + pm Lf g = gLf pm + pm p1 g = g(Lf pm + pm p1 ).
Therefore, the formula (19) holds.
Second, we prove that g(x) = 0 is an invariant, i.e. for any
trajectory x(t),
g(x(0)) = 0 =⇒ ∀t ≥ 0 : g(x(t)) = 0
(20)
m
g(x(t))
By the formula (19), we have d dt
|t=τ = Lm
m
f g|t=τ =
pm
g(x(τ
))
for
all
m
≥
1,
then
g(x(0))
=
0
=⇒
dm g(x(t))
|
=
0
for
all
m
≥
1.
Consider
the
Taylor
t=0
dtm
expansion of g(x(t)) at t = τ ,
g(x(t)) = g(x(τ )) +
∞
X
1 dm g(x(t))
|t=τ (t − τ )m (21)
m
m!
dt
m=1
Hence, the formula (20) holds.
Next, we prove that for any trajectory x(t),
g(x(0)) 6= 0 =⇒ ∀t ≥ 0 : g(x(t)) 6= 0
(22)
then, according to the continuity of g(x(t)), we can assert that
g(x) ∼ 0 is an invariant for each ∼∈ {<, ≤, =, ≥, >}.
The proof is by contradiction. Given an arbitrary trajectory
x(t), assume g(x(τ )) = 0 for some τ > 0 and
g(x(t)) > 0
m
g(x(t))
(or g(x(t)) < 0) for all t ∈ [0, τ ). Since d dt
|t=τ =
m
Lm
g|
=
p
g(x(τ
))
=
0
for
all
m
≥
1,
then
according
to
t=τ
m
f
the Taylor expansion (21), there must exist a δ ∈ R>0 such
that g(x(t)) = 0 for all t ∈ [τ −δ, τ +δ], which contradicts the
assumption that g(x(t)) > 0 (or g(x(t)) < 0) for all t ∈ [0, τ ).
Thus, the proposition holds.
B. Proof of Theorem 2
Proof: 1. By Definition 10, for all g(~u, ~x) ∈ Dg ,
g(~u, ~x) = 0 is an invariant for the trajectory originating from
~x0 , which means π~x0 ⊆ {~x ∈ Rn | g(~u, ~x) = 0}. Hence,
π~x0 ⊆ V(Dg ) holds.
2. Since the dimension of the hyperplane g(~u, ~x0 ) = 0 is
m, there must exist m vectors {~u1 , . . . , ~um } such that for
all ~u satisfying g(~u, ~x0 ) = 0, P
there exist scalars c1 , . . . , cm ,
m
ui . Therefore,
for evnot all zero, such that ~u =
i=1 ci ~
Pm
ery
g(~
u
,
~
x
)
∈
D
,
we
have
g(~
u
,
~
x
)
=
g(
c
~
u
x) =
g
i=1 i i , ~
Pm
c
g(~
u
,
~
x
),
hence,
g(~
u
,
~
x
)
∈
hg(~
u
,
~
x
),
.
.
.
,
g(~
u
x)i.
i
1
m, ~
i=1 i
For B = {g(~u1 , ~x), . . . , g(~um , ~x)}, we have hDg i ⊆ hBi.
The converse is trivial. Therefore, hDg i = hBi.
C. Principle of SOS programming
The principle of SOS programming is based on the fact that
a polynomial of P
degree 2k can be written as a sum-of-squares
(SOS) P (~x) =
qi (~x)2 for some polynomials qi (~x) of degree k if and only if P (~x) has a positive semidefinite quadratic
form, i.e. P (~x) = ~v (~x)M~v (~x)T , where ~v (~x) is a vector of
monomials with respect to x of degree k or less and M is a real
symmetric positive semidefinite matrix with the coefficients of
P (~x) as its entries. Therefore, the problem of finding a SOS
polynomial P (~x) can be converted to the problem of solving
a linear matrix inequality (LMI) M 0 [29], which can
be solved by semidefinite programming [30]. Currently, there
exists an efficient implementation, named SOSTOOLS [12],
for SOS programming and our implementation is based on
this tool. For details on SOS programming we refer the reader
to the literature.
D. Proof of Theorem 3
Proof: When considering g(~u, ~x) = 0 as a parameterized
hyperplane over ~u, since there is no constant term, the normal
vector of the hyperplane is (ψ1 (~xi ), . . . , ψK (~xi )). Therefore,
if ~x1 and ~x2 are in the same trajectory, they must correspond
to the same hyperplane, namely, the normal vectors of g(~u, ~x1 )
and g(~u, ~x2 ) are either all equal to ~0, which indicates the
formula (5) holds, or are proportional to one another, which
means the formula (4) holds. Moveover, if ψi (~x) ≡ 1, then
formula (6) follows from (4) immediately.
E. Proof of Theorem 4
Proof: By Theorem 1, the identity (7) holds if and only
if there exists no real solution for the following system P of
polynomial equations and inequalities
ψk (~x1 ) − ψk (~x2 ) = 0, k = 1 . . . K
G. Proof of Proposition 4
Proof: Since the polynomial (11) is an SOS, then ∀~x ∈
~
Rn : −g(~u∗ , ~x)−~µ1 · I~ ≥ 0, i.e. ∀~x ∈ Rn : −g(~u∗ , ~x) ≥ ~µ1 · I.
Since ∀~x ∈ X0 : I~ ~0 and µ
~ 1 is an SOS polynomial
vector, which implies ∀~x ∈ Rn : ~µ1 ~0, then ∀~x ∈ X0 :
−g(~u∗ , ~x) ≥ ~µ1 · I~ ≥ 0. Similarly, we can derive from the
SOS polynomial 12 that ∀~x ∈ XU : −g(~u∗ , ~x) < 0. By
Proposition 3, we can conclude that the system is safe.
H. Proof of Proposition 5
Proof: Assume Su is the set that satisfies the formulae (13), (14) and (15), by Proposition 1, every gl (~u∗l , ~x) ≥ 0
is an invariant at location l. To prove this proposition, it
is sufficient to prove that given any trajectory, say π, of
the system H, it cannot reach an unsafe state. Suppose the
infinite time interval R≥0 associated with π is divided into an
infinite
sequence of continuous time subintervals, i.e., R≥0 =
S∞
I
, where In = {t ∈ R≥0 |tn ≤ t ≤ tn+1,tn <tn+1 } is
n
n=0
the time interval that the system spent at location ρ(In ) (where
ρ(In ) returns the location corresponding to In associated to π),
we define the trajectory as π = {(ρ(In ), ~x(t))|t ∈ In , n ∈ N},
where ~x(t0 ) ∈ Init(ρ(I0 )). Then, our objective is to prove the
following assertion:
∀n ∈ N : ∀t ∈ In : gρ(In ) (~u∗ρ(In ) , ~x(t)) ≥ 0.
The basic proof idea is by induction.
Basis: n = 0. Since gρ(I0 ) (~u∗ρ(I0 ) , ~x) ≥ 0 is an invariant, it is
obvious that
∀t ∈ I0 : gρ(I0 ) (~u∗ρ(I0 ) , ~x(t)) ≥ 0.
Induction: n = k. Assume for some k,
pi1 (~x1 ) = 0, pi2 (~x2 ) = 0,
i1 = 1, . . . , l1 , i2 = l1 + 1, . . . l1 + l2
∀j ∈ [0, k] : ∀t ∈ Ij : gρ(Ij ) (~u∗ρ(Ij ) , ~x(t)) ≥ 0.
we mean to prove that
qj1 (~x1 ) ≥ 0, qj2 (~x2 ) ≥ 0,
j1 = 1, . . . , m1 , j2 = m1 + 1 . . . m1 + m2
rk1 (~x1 ) > 0, rk2 (~x2 ) > 0,
k1 = 1, . . . , n1 , k2 = n1 + 1 . . . n1 + n2 .
(24)
∀t ∈ Ik+1 : gρ(Ik+1 ) (~u∗ρ(Ik+1 ) , ~x(t)) ≥ 0.
(23)
That formula (23) has no solution indicates that there exists
no (~x1 , ~x2 ) ∈ X0 × XU such that ψi (~x1 ) = ψi (~x2 ) for all i =
1 . . . K. By the assumption K ≥ 2, we have Class(C, xi ) 6=
∅, i = 1, 2 for any (~x1 , ~x2 ) ∈ X0 × XU . By Theorem 3, the
system is safe.
F. Proof of Proposition 3
Proof: By Proposition 1, g(~u, ~x) ≥ 0 is an invariant of M
for any ~u ∈ RK . Suppose g(~u∗ , ~x) satisfies the constraints (9)
and (10) for some ~u∗ ∈ RK and ~x(t) is an arbitrary trajectory
of M such that ~x(0) ∈ X0 , we must have g(~u∗ , ~x(t)) ≥ 0 for
all t ≥ 0, which means ~x(t) cannot reach XU . Therefore, the
system is safe.
Case 1. (Discrete Transition) By the inductive assumption, we
know that
∀t ∈ Ik : gρ(Ik ) (~u∗ρ(Ik ) , ~x(t)) ≥ 0.
hence
∀t ∈ Ik : ~x(t) ∈ G(ρ(Ik ), ρ(Ik+1 )) =⇒ gρ(Ik ) (~u∗ρ(Ik ) , ~x(t)) ≥ 0
According to condition (14), ∀~x′ (t) ∈ R((l, l′ ), ~x) :
gρ(Ik+1 ) (~u∗ρ(Ik+1 ) , ~x′ (t)) ≥ 0 holds.
Case 2. (Continuous Transition)
Based on Case 1 and the fact that gρ(Ik+1 ) (~u∗ρ(Ik+1 ) , ~x) ≥ 0
is an invariant at ρ(Ik+1 ), we can conclude that ∀t ∈ Ik+1 :
gρ(Ik+1 ) (~u∗ρ(Ik+1 ) , ~x(t)) ≥ 0.
By induction, we know that the assertion (24) holds. Therefore, the system is safe.
I. Invariant clusters of Example 4
C1 = {u2 (x − y) = 0 | u2 ∈ R}, C2 = {u2 (x + y) = 0 | u2 ∈ R},
C3 = {u3 (x + z) = 0 | u3 ∈ R}, C4 = {u3 (x − z) = 0 | u3 ∈ R},
C5 = {u3 (y + z) = 0 | u3 ∈ R}, C6 = {u3 (y − z) = 0 | u3 ∈ R}.
J. Overapproximating a convex compact set
In fact, overapproximating a compact semialgebraic set
by one or multiple ellipsoids is reasonable. If a compact
semialgebraic set is overapproximated by an ellipsoid (~x −
~v )T A(~x−~v ) ≤ 1, where A is a positive definite matrix and x, v
are vectors, then we can use (x−v)T A(x−v) = 1 equivalently
instead of (~x − ~v )T A(~x − ~v ) ≤ 1 for the verification, the
reason is that any trajectory originating from the interior of
the ellipsoid must pass through some point on the surface of
the ellipsoid.
K. Additional information for Example 6
α1 = − 0.027854x21 − 0.048663y12 − 0.014007x22 − 0.031091y22
− 0.019017
α2 = − 0.0227x21 − 0.027808y12 − 0.034068x22 − 0.030096y22
− 0.00016071
α3 = − 1.8255x21 + 1.8251y12 + 1.8211x22 − 1.8282y22 + 0.014587
Prog = 1.8533x41 − 3.5741x21 y12 − 3.6098x21x22 + 3.7075x21 y22
+ 1.8738y14 + 3.688y12x22 − 3.5944y12y22 + 1.8551x42
− 3.5851x22y22 + 1.8583y24 + 0.83561x31 − 0.94703x21y1
− 0.49941x21x2 − 0.74911x21y2 + 1.4599x1y12 + 0.4202x1x22
+ 0.93272x1y22 − 1.6545y13 − 0.61178y12x2 − 0.91767y12y2
− 0.47623y1x22 − 1.0571y1y22 − 0.7495x32 − 1.1242x22y2
− 0.66212x2y22 − 0.99318y23 + 23.1976x21 + 35.9056y12
+ 20.5634x22 + 27.7403y22 + 0.5705x1 − 0.64657y1
− 0.0035356x2 − 0.0053034y2 + 9.8186
L. Invariant Cluster for Subsection V-A
mqwd2
mM z Xd2
mgθ d21
g9 (~u, ~x) = −
+
+
+ d1 +
Z
Iyy Z
Z
Z
2
mgθ d2
Iyy Xqwd2
mqvd1
Iyy qwd1
+
u5 +
+
−
Z
Z
ZM
M
2
2
(Iyy X + Iyy Z )d2
gIyy Xθ d21
Xz
+x−
−
−
Z
ZM m
ZM
gIyy Xθ d22
Iyy qvd2
Iyy Xqvd1
−
u85
−
−
ZM
M
ZM
Mθ
+ d21 + d22 u8 + q 2 − 2
u17 + u1
Iyy
| 3cs.SY
|
COMBINATORICS OF THE TAME AUTOMORPHISM GROUP
arXiv:1505.05497v4 [math.GR] 17 Mar 2017
STÉPHANE LAMY
Abstract. We study the group Tame(A3 ) of tame automorphisms of the 3dimensional affine space, over a field of characteristic zero. We recover, in a
unified way, previous results of Kuroda, Shestakov, Umirbaev and Wright, about
the theory of reduction and the relations in Tame(A3 ). The novelty in our presentation is the emphasis on a simply connected 2-dimensional simplicial complex
on which Tame(A3 ) acts by isometries.
Contents
Introduction
1. Simplicial complex
1.A. General construction
1.B. Degrees
1.C. The complex in dimension 3
2. Parachute Inequality and Principle of Two Maxima
2.A. Degree of polynomials and forms
2.B. Parachute Inequality
2.C. Consequences
2.D. Principle of Two Maxima
3. Geometric theory of reduction
3.A. Degree of automorphisms and vertices
3.B. Elementary reductions
3.C. K-reductions
3.D. Elementary K-reductions
3.E. Proper K-reductions
3.F. Stability of K-reductions
4. Reducibility Theorem
4.A. Reduction paths
4.B. Reduction of a strongly pivotal simplex
4.C. Vertex with two low degree neighbors
4.D. Proof of the Reducibility Theorem
5. Simple connectedness
5.A. Consequences of the Reducibility Theorem
5.B. Local homotopies
6. Examples
References
Date: March 20, 2017.
This research was partially supported by ANR Grant “BirPol” ANR-11-JS01-004-01.
1
2
5
5
6
7
8
8
9
11
13
15
15
16
18
21
22
26
29
30
31
38
41
43
43
43
46
48
COMBINATORICS OF THE TAME AUTOMORPHISM GROUP
2
Introduction
Let k be a field, and let An = Ank be the affine space over k. We are interested in
the group Aut(An ) of algebraic automorphisms of the affine space. Concretely, we
choose once and for all a coordinate system (x1 , . . . , xn ) for An . Then any element
f ∈ Aut(An ) is a map of the form
f ∶ (x1 , . . . , xn ) ↦ (f1 (x1 , . . . , xn ), . . . , fn (x1 , . . . , xn )),
where the fi are polynomials in n variables, such that there exists a map g of
the same form satisfying f ○ g = id. We shall abbreviate this situation by writing
f = (f1 , . . . , fn ), and g = f −1 . Observe a slight abuse of notation here, since we
are really speaking about polynomials, and not about the associated polynomial
functions. For instance over a finite base field, the group Aut(An ) is infinite (for
n ⩾ 2) even if there is only a finite number of induced bijections on the finite number
of k-points of An .
The group Aut(An ) contains the following natural subgroups. First we have the
affine group An = GLn (k) ⋉ kn . Secondly we have the group En of elementary
automorphisms, which have the form
f ∶ (x1 , . . . , xn ) ↦ (x1 + P (x2 , . . . , xn ), x2 , . . . , xn ),
for some choice of polynomial P in n − 1 variables. The subgroup
Tame(An ) = ⟨An , En ⟩
generated by the affine and elementary automorphisms is called the subgroup of
tame automorphisms.
A natural question is whether the inclusion Tame(An ) ⊆ Aut(An ) is in fact an
equality. It is a well-known result, which goes back to Jung (see e.g. [Lam02] for a
review of some of the many proofs available in the literature), that the answer is yes
for n = 2 (over any base field), and it is a result by Shestakov and Umirbaev [SU04b]
that the answer is no for n = 3, at least when k is a field of characteristic zero.
The main purpose of the present paper is to give a self-contained reworked proof
of this last result: see Theorem 4.1 and Corollary 4.2. We follow closely the line of
argument by Kuroda [Kur10]. However, the novelty in our approach is the emphasis
on a 2-dimensional simplicial complex C on which Tame(A3 ) acts by isometries. In
fact, this construction is not particular to the 3-dimensional case: In §1 we introduce,
for any n ⩾ 2 and over any base field, a (n − 1)-dimensional simplicial complex on
which Tame(An ) naturally acts.
We now give an outline of the main notions and results of the paper. Since the
paper is quite long and technical, we hope that this informal outline will serve as
a guide for the reader, even if we cannot avoid being somewhat imprecise at this
point.
● The 2-dimensional complex C contains three kinds of vertices, corresponding to
three orbits under the action of Tame(A3 ). In this introduction we shall focus on
the so-called type 3 vertices, which correspond to a tame automorphism (f1 , f2 , f3 )
up to post-composition by an affine automorphism. Such an equivalence class is
denoted v3 = [f1 , f2 , f3 ] (see §1.C and Figure 1).
● Given a vertex v3 one can always choose a representative (f1 , f2 , f3 ) such that
the top monomials of the fi are pairwise distinct. Such a good representative is
not unique, but the top monomials are. This allows to define a degree function
(with values in N3 ) on vertices, with the identity automorphism corresponding to
the unique vertex of minimal degree (see §3.A).
COMBINATORICS OF THE TAME AUTOMORPHISM GROUP
3
By construction of the complex C, two type 3 vertices v3 and v3′ are at distance
2 in C if and only if they admit representatives of the form v3 = [f1 , f2 , f3 ] and
v3′ = [f1 + P (f2 , f3 ), f2 , f3 ], that is, representatives that differ by an elementary
automorphism. If moreover deg v3 > deg v3′ , we say that v3′ is an elementary reduction
of v3 . The whole idea is that it is ‘almost’ true that any vertex admits a sequence
of elementary reductions to the identity. However a lot of complications lie in this
‘almost’, as we now discuss.
● Some particular tame automorphisms are triangular automorphisms, of the form
(up to a permutation of the variables) (x1 + P (x2 , x3 ), x2 + Q(x3 ), x3 ). There are
essentially two ways to decompose such an automorphism as a product of elementary
automorphisms, namely
●
(x1 + P (x2 , x3 ), x2 + Q(x3 ), x3 )
= (x1 , x2 + Q(x3 ), x3 ) ○ (x1 + P (x2 , x3 ), x2 , x3 )
= (x1 + P (x2 − Q(x3 ), x3 ), x2 , x3 ) ○ (x1 , x2 + Q(x3 ), x3 ).
This leads to the presence of squares in the complex C, see Figure 3. Conversely,
the fact that a given vertex admits two distinct elementary reductions often leads
to the presence of such a square, in particular if one of the reductions corresponds
to a polynomial that depends only on one variable instead of two, like Q(x3 ) above.
We call ‘simple’ such a particular elementary reduction.
● When v ′ = [f1 + P (f2 , f3 ), f2 , f3 ] is an elementary reduction of v3 = [f1 , f2 , f3 ],
3
we shall encounter the following situations (see Corollary 4.28):
(i) The most common situation is when the top monomial of f1 is the dominant
one, that is, the largest among the top monomials of the fi .
(ii) Another (non-exclusive) situation is when P depends only on one variable.
As mentioned before this is typically the case when v3 admits several elementary
reductions. This corresponds to the fact that the top monomial of a component is
a power of another one, and we name ‘resonance’ such a coincidence (see definition
in §3.A).
(iii) Finally another situation is when f1 does not realize the dominant monomial,
but f2 , f3 nevertheless satisfy a kind of minimality condition via looking at the degree
of the 2-form df2 ∧ df3 . We call this last case an elementary K-reduction (see §3.C
for the definition, Corollary 3.13 for the characterization in terms of the minimality
of deg df2 ∧ df3 , and §6 for examples). This case is quite rigid (see Proposition 3.35),
and at posteriori it forbids the existence of any other elementary reduction from v3
(see Proposition 5.1).
● Finally we define (see §3.C again) an exceptional case, under the terminology
‘normal proper K-reduction’, that corresponds to moving from a vertex v3 to a
neighbor vertex w3 of the same degree, and then realizing an elementary K-reduction
from w3 to another vertex u3 . The fact that v3 and w3 share the same degree is not
part of the technical definition, but again is true only at posteriori (see Corollary
5.2).
● Then the main result (Reducibility Theorem 4.1) is that we can go from any
vertex to the vertex corresponding to the identify by a finite sequence of elementary
reductions or normal proper K-reductions.
● The proof proceeds by a double induction on degrees which is quite involved.
The Induction Hypothesis is precisely stated on page 36. The analysis is divided
into two main branches:
COMBINATORICS OF THE TAME AUTOMORPHISM GROUP
4
(i) §4.B where the slogan is “a vertex that admits an elementary K-reduction
does not admit any other reduction” (Proposition 4.27 is an intermediate technical
statement, and Proposition 5.1 the final one);
(ii) §4.C where the slogan is “a vertex that admits several elementary reductions
must admit some resonance” (see in particular Lemmas 4.32 and 4.34).
For readers familiar with previous works on the subject, we now give a few word
about terminology. In the work of Kuroda [Kur10], as in the original work of Shestakov and Umirbaev [SU04b], elementary reductions are defined with respect to one
of the three coordinates of a fixed coordinate system. In contrast, as explained
above, we always work up to an affine change of coordinates. Indeed our simplicial
complex C is designed so that two tame automorphisms correspond to two vertices
at distance 2 in the complex if and only if they differ by the left composition of an
automorphism of the form a1 ea2 , where a1 , a2 are affine and e is elementary. This
slight generalization of the definition of reduction allows us to absorb the so-called
“type I” and “type II” reductions of Shestakov and Umirbaev in the class of elementary reductions: In our terminology they become “elementary K-reductions” (see
§3.C). On the other hand, the “type III” reductions, which are technically difficult
to handle, are still lurking around. One can suspect that such reductions do not
exist (as the most intricate “type IV” reductions which were excluded by Kuroda
[Kur10]), and an ideal proof would settle this issue. Unfortunately we were not able
to do so, and these hypothetical reductions still appear in our text under the name
of “normal proper K-reduction”. See Example 6.5 for more comments on this issue.
One could say that the theory of Shestakov, Umirbaev and Kuroda consists in
understanding the relations inside the tame group Tame(A3 ). This was made explicit
by Umirbaev [Umi06], and then it was proved by Wright [Wri15] that this can be
rephrased in terms of an amalgamated product structure over three subgroups (see
Corollary 5.8). In turn, it is known that such a structure is equivalent to the action of
the group on a 2-dimensional simply connected simplicial complex, with fundamental
domain a simplex. Our approach allows to recover a more transparent description
of the relations in Tame(A3 ). After stating and proving the Reducibility Theorem
4.1 in §4, we directly show in §5 that the natural complex on which Tame(A3 ) acts
is simply connected (see Proposition 5.7), by observing that the reduction process
of [Kur10, SU04b] corresponds to local homotopies.
We should stress once more that this paper contains no original result, and consists
only in a new presentation of previous works by the above cited authors. In fact,
for the sake of completeness we also include in Section 2 some preliminary results
where we only slightly differ from the original articles [Kur08, SU04a].
Our motivation for reworking this material is to prepare the way for new results
about Tame(A3 ), such as the linearizability of finite subgroups, the Tits alternative or the acylindrical hyperbolicity. From our experience in related settings (see
[BFL14, CL13, Lon16, Mar15]), such results should follow from some non-positive
curvature properties of the simplicial complex. We plan to explore these questions
in some follow-up papers (see [LP16] for a first step).
Acknowledgement
In August 2010 I was assigned the paper [Kur10] as a reviewer for MathSciNet.
I took this opportunity to understand in full detail his beautiful proof, and in November of the same year, at the invitation of Adrien Dubouloz, I gave some lectures
COMBINATORICS OF THE TAME AUTOMORPHISM GROUP
5
in Dijon on the subject. I thank all the participants of this study group “Automorphismes des Espaces Affines”, and particularly Jérémy Blanc, Eric Edo, Pierre-Marie
Poloni and Stéphane Vénéreau who gave me useful feedback on some early version
of these notes.
A few years later I embarked on the project to rewrite this proof focusing on the
related action on a simplicial complex. At the final stage of the present version,
when I was somehow loosing faith in my endurance, I greatly benefited from the
encouragements and numerous suggestions of Jean-Philippe Furter.
Finally, I am of course very much indebted to Shigeru Kuroda. Indeed without
his work the initial proof of [SU04b] would have remained a mysterious black box
to me.
1. Simplicial complex
We define a (n − 1)-dimensional simplicial complex on which the tame automorphism group of An acts. This construction makes sense in any dimension n ⩾ 2, over
any base field k.
1.A. General construction. For any 1 ⩽ r ⩽ n, we call r-tuple of components
a morphism
f ∶ An → Ar
x = (x1 , . . . , xn ) ↦ (f1 (x), . . . , fr (x))
that can be extended as a tame automorphism f = (f1 , . . . , fn ) of An . One defines n
distinct types of vertices, by considering r-tuple of components modulo composition
by an affine automorphism on the range, r = 1, . . . , n. We use a bracket notation to
denote such an equivalence class:
[f1 , . . . , fr ] ∶= Ar (f1 , . . . , fr ) = {a ○ (f1 , . . . , fr ); a ∈ Ar }
where Ar = GLr (k) ⋉ kr is the r-dimensional affine group. We say that vr =
[f1 , . . . , fr ] is a vertex of type r, and that (f1 , . . . , fr ) is a representative of vr .
We shall always stick to the convention that the index corresponds to the type of a
vertex: for instance vr , vr′ , ur , wr , mr will all be possible notation for a vertex of type
r.
Now given n vertices v1 , . . . , vn of type 1, . . . , n, we attach a standard Euclidean
(n − 1)-simplex on these vertices if there exists a tame automorphism (f1 , . . . , fn ) ∈
Tame(An ) such that for all i ∈ {1, . . . , n}:
vi = [f1 , . . . , fi ].
We obtain a (n − 1)-dimensional simplicial complex Cn on which the tame group acts
by isometries, by the formulas
g ⋅ [f1 , . . . , fr ] ∶= [f1 ○ g−1 , . . . , fr ○ g−1 ].
Lemma 1.1. The group Tame(An ) acts on Cn with fundamental domain the simplex
[x1 ], [x1 , x2 ], . . . , [x1 , . . . , xn ].
In particular the action is transitive on vertices of a given type.
Proof. Let v1 , . . . , vn be the vertices of a simplex (recall that the index corresponds
to the type). By definition there exists f = (f1 , . . . fn ) ∈ Tame(An ) such that vi =
[f1 , . . . , fi ] for each i. Then
[x1 , . . . , xi ] = [(f1 , . . . , fi ) ○ f −1 ] = f ⋅ vi .
COMBINATORICS OF THE TAME AUTOMORPHISM GROUP
6
Remark 1.2.
(1) One could make a similar construction by working with the
full automorphism group Aut(An ) instead of the tame group. The complex Cn we
consider is the gallery connected component of the standard simplex [x1 ], [x1 , x2 ],
. . . , [x1 , . . . , xn ] in this bigger complex. See [BFL14, §6.2.1] for more details.
(2) When n = 2, the previous construction yields a graph C2 . It is not difficult to
show (see [BFL14, §2.5.2]) that C2 is isomorphic to the classical Bass-Serre tree of
Aut(A2 ) = Tame(A2 ).
1.B. Degrees. We shall compare polynomials in k[x1 , . . . , xn ] by using the graded
lexicographic order on monomials. We find it more convenient to work with an
additive notation, so we introduce the degree function, with value in Nn ∪ {−∞},
by taking
deg xa11 xa22 . . . xann = (a1 , a2 , . . . , an )
and by convention deg 0 = −∞. We extend this order to Qn ∪ {−∞}, since sometimes
it is convenient to consider difference of degrees, or degrees multiplied by a rational
number. The top term of g ∈ k[x1 , . . . , xn ] is the uniquely defined ḡ = cxd11 . . . xdnn
such that
(d1 , . . . , dn ) = deg g > deg(g − ḡ).
Observe that two polynomials f, g ∈ k[x1 , . . . , xn ] have the same degree if and only if
their top terms f¯, ḡ are proportional. If f = (f1 , . . . , fr ) is a r-tuple of components,
we call top degree of f the maximum of the degree of the fi :
topdeg f ∶= max deg fi ∈ Nn .
Lemma 1.3. Let f = (f1 , . . . , fr ) be a r-tuple of components, and consider V ⊂
k[x1 , . . . , xn ] the vector space generated by the fi . Then
(1) The set H of elements g ∈ V satisfying topdeg f > deg g is a hyperplane in
V;
(2) There exist a sequence of degrees δr > ⋅ ⋅ ⋅ > δ1 and a flag of subspaces V1 ⊂
⋅ ⋅ ⋅ ⊂ Vr = V such that dim Vi = i and deg g = δi for any g ∈ Vi ∖ Vi−1 .
Proof.
(1) Up to permuting the fi we can assume topdeg f = deg fr . Then for
each i = 1, . . . , r − 1 there exists a unique ci ∈ k such that deg fr > deg(fi + ci fr ). The
conclusion follows from the observation that an element of V is in H if and only if
it is a linear combination of the fi + ci fr , i = 1, . . . , r − 1.
(2) Immediate, by induction on dimension.
Using the notation of the lemma, we call r-deg f = (δ1 , . . . , δr ) the r-degree of f ,
and deg f = ∑ri=1 δi ∈ Nn the degree of f . Observe that for any affine automorphism
a ∈ Ar we have r- deg f = r- deg(a ○ f ), so we get a well-defined notion of r-degree
and degree for any vertex of type r.
If vr = [f1 , . . . , fr ] ∈ Cn with the deg fi pairwise distinct, we say that f is a good
representative of vr (we do not ask deg fr > ⋅ ⋅ ⋅ > deg f2 > deg f1 ). We use a double
bracket notation such as v2 = Jf1 , f2 K or v3 = Jf1 , f2 , f3 K, to indicate that we are using
a good representative.
Lemma 1.4. Let v1 , . . . , vn be a (n − 1)-simplex in Cn . Then there exists f =
(f1 , . . . , fn ) ∈ Tame(An ) such that vi = Jf1 , . . . , fi K for each n ⩾ i ⩾ 1.
Proof. We pick f1 such that v1 = Jf1 K, and we define the other fi by induction as
follows. If the i-degree of vi = Jf1 , . . . , fi K is (δ1 , . . . , δi ) (recall that by definition the
δj are equal to the degrees of the fj only up to a permutation), then there exist δ ∈ N3
COMBINATORICS OF THE TAME AUTOMORPHISM GROUP
[x1 +x3 ]
7
[x1 ,x3 ]
●
[x3 ]
[x1 ]
[x1 ,x2 ,x3 ]
[x2 ,x3 ]
[x1 ,x2 ]
●
●
[x1 +Q(x2 ),x2 ,x3 ]
[x1 ,x2 ,x3 +P (x1 ,x2 )]
[x2 ]
[x1 ,x2 ,x3 +Q(x2 )]
●
[x1 +Q(x2 ),x2 ]
●
[x1 +x3 +Q(x2 ),x2 ]
●
[x2 ,x3 +P (x1 ,x2 )]
[x1 +Q(x2 ),x2 ,x3 +P (x1 ,x2 )]
Figure 1. A few simplexes of the complex C.
and i + 1 ⩾ s ⩾ 1 such that the (i + 1)-degree of vi+1 is (δ1 , . . . , δs−1 , δ, δs , . . . , δi ). That
exactly means that there exists fi+1 of degree δ such that vi+1 = Jf1 , . . . , fi+1 K.
1.C. The complex in dimension 3. Now we specialize the general construction to
the dimension n = 3, which is our main interest in this paper. We drop the index and
simply denote by C the 2-dimensional simplicial complex associated to Tame(A3 ).
To get a first feeling of the complex one can draw pictures such as Figure 1, where
we use the following convention for vertices: , ● or corresponds respectively to
a vertex of type 1, 2 and 3. However one should keep in mind, as the following
formal discussion makes it clear, that the complex is not locally finite. A first step
in understanding the geometry of the complex C is to understand the link of each
type of vertex. In fact, we will now see that if the base field k is uncountable, then
the link of any vertex or any edge also has uncountably many vertices.
Consider first the link L(v3 ) of a vertex of type 3. By transitivity of the action of
Tame(A3 ), it is sufficient to describe the link L([id]). A vertex of type 1 at distance
1 from [id] has the form [a1 x1 +a2 x2 +a3 x3 ] where the ai ∈ k are uniquely defined up
to a common multiplicative constant. In other words, vertices of type 1 in L([id])
are parametrized by P2 . We denote by P2 (v3 ) this projective plane of vertices of
type 1 in the link of v3 . Similarly, vertices of type 2 in L(v3 ) correspond to lines in
P2 (v3 ), that is, to points in the dual projective space P̂2 (v3 ). The edges in L(v3 )
correspond to incidence relations (“a point belongs to a line”). We will often refer
to a vertex of type 2 as a “line in P2 (v3 )”. In the same vein, we will sometimes refer
to a vertex of type 1 as being “the intersection of two lines in P2 (v3 )”, or we will
express the fact that v1 and v2 are joined by an edge in C by saying “the line v2
passes through v1 ”.
COMBINATORICS OF THE TAME AUTOMORPHISM GROUP
8
Now we turn to the description of the link of a vertex v2 of type 2. By transitivity
we can assume v2 = [x1 , x2 ], and one checks that vertices of type 1 in L(v2 ) are
parametrized by P1 and are of the form
[a1 x1 + a2 x2 ], (a1 ∶ a2 ) ∈ P1 .
On the other hand vertices of type 3 in L(v2 ) are of the form
[x1 , x2 , x3 + P (x1 , x2 )], P ∈ k[y, z].
Precisely by taking the P without constant or linear part we obtain a complete set
of representatives for such vertices of type 3 in L(v2 ). Using the transitivity of the
action of Tame(A3 ) on vertices of type 2, the following lemma and its corollary are
then immediate:
Lemma 1.5. The link L(v2 ) of a vertex of type 2 is the complete bipartite graph
between vertices of type 1 and 3 in the link.
Corollary 1.6. Let v2 = [f1 , f2 ] and v3 = [f1 , f2 , f3 ] be vertices of type 2 and 3.
Then any vertex u3 distinct from v3 such that v2 ∈ P̂2 (u3 ) has the form
u3 = [f1 , f2 , f3 + P (f1 , f2 )]
where P ∈ k[y, z] is a non-affine polynomial in two variables (that is, not of the form
P (y, z) = ay + bz + c). In particular, v2 is the unique type 2 vertex in P̂2 (v3 ) ∩ P̂2 (u3 ).
The link of a vertex of type 1 is more complicated. Let us simply mention without
proof, since we won’t need it in this paper (but see Lemma 5.6 for a partial result,
and also [LP16, §3]), that in contrast with the case of vertices of type 2 or 3, the link
of a vertex of type 1 is a connected unbounded graph, which admits a projection to
an unbounded tree.
2. Parachute Inequality and Principle of Two Maxima
We recall here two results from [Kur08] (in turn they were adaptations from
[SU04a, SU04b]). The Parachute Inequality is the most important; we also recall
some direct consequences. From now on k denotes a field of characteristic zero.
2.A. Degree of polynomials and forms. Recall that we define a degree function
on k[x1 , x2 , x3 ] with value in N3 ∪{−∞} by taking deg xa11 xa22 xa33 = (a1 , a2 , a3 ) and by
convention deg 0 = −∞. We compare degrees using the graded lexicographic order.
We now introduce the notion of virtual degree in two distinct situations, which
should be clear by context.
Let g ∈ k[x1 , x2 , x3 ], and ϕ = ∑i∈I Pi y i ∈ k[x1 , x2 , x3 ][y] where Pi ≠ 0 for all i ∈ I,
that is, I is the support of ϕ. We define the virtual degree of ϕ with respect to g as
degvirt ϕ(g) ∶= max(deg Pi gi ) = max(deg Pi + i deg g).
i∈I
i∈I
Denoting by I¯ ⊆ I the subset of indexes i that realize the maximum, we also define
the top component of ϕ with respect to g as
ϕg ∶= ∑ P̄i y i .
i∈I¯
Similarly if g, h ∈ k[x1 , x2 , x3 ], and ϕ = ∑(i,j)∈S ci,j y i z j ∈ k[y, z] with support S,
we define the virtual degree of ϕ with respect to g and h as
degvirt ϕ(g, h) ∶= max deg gi hj = max (i deg g + j deg h).
(i,j)∈S
(i,j)∈S
COMBINATORICS OF THE TAME AUTOMORPHISM GROUP
9
Observe that ϕ(g, h) can be seen either as an element coming from ϕh (y) ∶=
ϕ(y, h) ∈ k[h][y] ⊂ k[x1 , x2 , x3 ][y] or from ϕ(y, z) ∈ k[y, z], and that the two possible notions of virtual degree coincide:
degvirt ϕh (g) = degvirt ϕ(g, h).
Example 2.1. In general we have degvirt ϕ(g) ⩾ deg ϕ(g) and degvirt ϕ(g, h) ⩾
deg ϕ(g, h). We now give two simple examples where these inequalities are strict.
(1) Let ϕ = x23 y − x3 y 2 , and g = x3 . Then ϕ(g) = 0, but
degvirt ϕ(g) = deg x33 = (0, 0, 3).
(2) Let ϕ = y 2 − z 3 , and g = x31 , h = x21 . Then ϕ(g, h) = 0, but
degvirt ϕ(g, h) = deg x61 = (6, 0, 0).
We extend the notion of degree to algebraic differential forms. Given
ω = ∑ fi1 ,⋯,ik dxi1 ∧ ⋯ ∧ dxik
where k = 1, 2 or 3 and fi1 ,⋯,ik ∈ k[x1 , x2 , x3 ], we define
deg ω ∶= max{deg fi1 ,⋯,ik xi1 ⋯xik } ∈ N3 ∪ {−∞}.
We gather some immediate remarks for future reference (observe that here we use
the assumption char k = 0).
Lemma 2.2. If ω, ω ′ are forms, and g is a non constant polynomial, we have
deg ω + deg ω ′ ⩾ deg ω ∧ ω ′ ;
deg g = deg dg;
deg gω = deg g + deg ω.
2.B. Parachute Inequality. If ϕ ∈ k[x1 , x2 , x3 ][y], we denote by ϕ(n) ∈ k[x1 , x2 , x3 ][y]
the nth derivative of ϕ with respect to y. We simply write ϕ′ instead of ϕ(1) .
Lemma 2.3. Let ϕ ∈ k[x1 , x2 , x3 ][y] and g ∈ k[x1 , x2 , x3 ]. Then:
(1) If degy ϕg ⩾ 1, then degvirt ϕ′ (g) = degvirt ϕ(g) − deg g.
g
(2) If degy ϕg ⩾ j ⩾ 1, then ϕ(j) = (ϕg )(j) .
Proof. We note as before
ϕ = ∑ Pi y i ,
i∈I
ϕg = ∑ P̄i y i
and
ϕ′ =
i∈I¯
i−1
∑ iPi y ,
i∈I∖{0}
where I is the support of ϕ, and I¯ ⊆ I is the subset of indexes i that realize the
maximum maxi∈I (deg Pi + i deg g).
Now if degy ϕg ⩾ 1, that is, if I¯ ≠ {0}, then the indexes in I¯∖{0} are precisely those
that realize the maximum maxi∈I∖{0} (deg Pi + (i − 1) deg g). Thus we get assertion
g
(1), and ϕ′ = (ϕg )′ . Assertion (2) for j ⩾ 2 follows by induction.
Lemma 2.4. Let ϕ ∈ k[x1 , x2 , x3 ][y] and g ∈ k[x1 , x2 , x3 ]. Then, for m ⩾ 0, the
following two assertions are equivalent:
(1) For j = 0, . . . , m − 1 we have degvirt ϕ(j) (g) > deg ϕ(j) (g), but
degvirt ϕ(m) (g) = deg ϕ(m) (g).
(2) There exists ψ ∈ k[x1 , x2 , x3 ][y] such that ψ(ḡ) ≠ 0 and
ϕg = (y − ḡ)m ⋅ ψ.
COMBINATORICS OF THE TAME AUTOMORPHISM GROUP
10
Proof. Observe that we have the equivalences
degvirt ϕ(g) > deg ϕ(g) ⇐⇒ ϕg (ḡ) = 0 ⇐⇒ y − ḡ divides ϕg .
(2.5)
g
First we prove (2) ⇒ (1). Assuming (2), by Lemma 2.3(2) we have ϕ(j) = (ϕg )(j)
for j = 0, . . . , m − 1. The second equivalence in (2.5) yields (ϕg )(j) (g) = 0 for j =
0, . . . , m − 1, and (ϕg )(m) (g) ≠ 0, and then the first equivalence gives the result.
To prove (1) ⇒ (2), it is sufficient to show that if degvirt ϕ(j) (g) > deg ϕ(j) (g) for
j = 0, . . . , k −1, then ϕg = (y − ḡ)k ⋅ψk for some ψk ∈ k[x1 , x2 , x3 ][y]. The remark (2.5)
g
gives it for k = 1. Moreover, by Lemma 2.3(2), if ϕg depends on y then ϕ′ = (ϕg )′ ,
hence the result by induction.
In the situation of Lemma 2.4, we call the integer m the multiplicity of ϕ with
respect to g, and we denote it by m(ϕ, g). In other words, the top term ḡ is a
multiple root of ϕg of order m(ϕ, g).
Following Vénéreau [Vén11], where a similar inequality is proved, we call the next
result a “Parachute Inequality”. Indeed its significance is that the real degree cannot
drop too much with respect to the virtual degree. However we follow Kuroda for
the proof.
Recall that (over a field k of characteristic zero) some polynomials f1 , ⋯, fr ∈
k[x1 , . . . , xn ] are algebraically independent if and only if df1 ∧ ⋯ ∧ dfr ≠ 0. Indeed
this is equivalent to asking that the map f = (f1 , . . . , fr ) from An to Ar is dominant,
which in turn is equivalent to saying that the differential of this map has maximal
rank on an open set of An (for details see for instance [HP94, Theorem III p.135]).
Proposition 2.6 (Parachute Inequality, see [Kur08, Theorem 2.1]). Let r = 2 or 3,
and let f1 , ⋯, fr ∈ k[x1 , x2 , x3 ] be algebraically independent. Let ϕ ∈ k[f2 , ⋯, fr ][y] ∖
{0}. Then
deg ϕ(f1 ) ⩾ degvirt ϕ(f1 ) − m(ϕ, f1 )(deg ω + deg f1 − deg df1 ∧ ω).
where ω = df2 if r = 2, or ω = df2 ∧ df3 if r = 3.
Proof. Denoting as before ϕ′ the derivative of ϕ with respect to y, we have
d(ϕ(f1 )) = ϕ′ (f1 )df1 + other terms involving df2 or df3 .
So we obtain d(ϕ(f1 )) ∧ ω = ϕ′ (f1 )df1 ∧ ω. Using Lemma 2.2 this yields
deg ϕ(f1 ) + deg ω = deg d(ϕ(f1 )) + deg ω ⩾ deg d(ϕ(f1 )) ∧ ω
= deg ϕ′ (f1 )df1 ∧ ω = deg ϕ′ (f1 ) + deg df1 ∧ ω,
which we can write as
− deg df1 ∧ ω + deg ω + deg ϕ(f1 ) ⩾ deg ϕ′ (f1 ).
(2.7)
Now we are ready to prove the inequality of the statement, by induction on
m(ϕ, f1 ).
If m(ϕ, f1 ) = 0, that is, if deg ϕ(f1 ) = degvirt ϕ(f1 ), there is nothing to do.
If m(ϕ, f1 ) ⩾ 1, it follows from Lemma 2.4 that m(ϕ′ , f1 ) = m(ϕ, f1 )−1. Moreover,
the condition m(ϕ, f1 ) ⩾ 1 implies that ϕf1 does depend on y, hence by Lemma 2.3(1)
we have
degvirt ϕ′ (f1 ) = degvirt ϕ(f1 ) − deg f1 .
COMBINATORICS OF THE TAME AUTOMORPHISM GROUP
11
By induction hypothesis, we have
deg ϕ′ (f1 ) ⩾ degvirt ϕ′ (f1 ) − m(ϕ′ , f1 )(deg ω + deg f1 − deg df1 ∧ ω)
= degvirt ϕ(f1 ) − deg f1 − (m(ϕ, f1 ) − 1)(deg ω + deg f1 − deg df1 ∧ ω)
= degvirt ϕ(f1 ) − m(ϕ, f1 )(deg ω + deg f1 − deg df1 ∧ ω)
− deg df1 ∧ ω + deg ω.
Combining with (2.7), and canceling the terms − deg df1 ∧ ω + deg ω on each side, one
obtains the expected inequality.
2.C. Consequences. We shall use the Parachute Inequality 2.6 mostly when r = 2,
and when we have a strict inequality degvirt ϕ(f1 , f2 ) > deg ϕ(f1 , f2 ). In this context
the following easy lemma is crucial. Ultimately this is here that lies the difficulty
when one tries to extend the theory in dimension 4 (or more!).
Lemma 2.8. Let f1 , f2 ∈ k[x1 , x2 , x3 ] be algebraically independent, and ϕ ∈ k[y, z]
such that degvirt ϕ(f1 , f2 ) > deg ϕ(f1 , f2 ). Then:
(1) There exist coprime p, q ∈ N∗ such that
p deg f1 = q deg f2 .
In particular, there exists δ ∈ N3 such that deg f1 = qδ, deg f2 = pδ, so that
the top terms of f1p and f2q are equal up to a constant: there exists c ∈ k such
that f¯1p = cf¯2q .
(2) Considering ϕ(f1 , f2 ) as coming from ϕ(y, f2 ) ∈ k[x1 , x2 , x3 ][y], we have
ϕf1 = (y p − f¯1p )m(ϕ,f1 ) ⋅ ψ = (y p − cf¯2q )m(ϕ,f1 ) ⋅ ψ
for some ψ ∈ k[x1 , x2 , x3 ][y].
Proof.
(1) We write ϕ(f1 , f2 ) = ∑ ci,j f1i f2j . Since degvirt ϕ(f1 , f2 ) > deg ϕ(f1 , f2 ),
there exist distinct (a, b) and (a′ , b′ ) such that
deg f1a f2b = deg f1a f2b = degvirt ϕ(f1 , f2 ).
′
′
Moreover we can assume that a, a′ are respectively maximal and minimal for this
property. We obtain
(a − a′ ) deg f1 = (b′ − b) deg f2 .
Dividing by m, the GCD of a − a′ and b′ − b, we get the expected relation.
(2) With the same notation, we have a = a′ + pm where m ⩾ 1, and in particular degy ϕ(y, f2 ) ⩾ p. So if p > degy P (y, f2 ) for some P ∈ k[f2 ][y], we have
degvirt P (f1 , f2 ) = deg P (f1 , f2 ). By the first assertion, there exists c ∈ k such that
deg f1p > deg (f1p − cf2q ). By successive Euclidean divisions in k[f2 ][y] we can write:
ϕ(y, f2 ) = ∑ Ri (y) (y p − cf2q )
i
with p > degy Ri for all i. Denote by I the subset of indexes such that
f1
i
ϕf1 = ∑ Ri (y p − cf¯2q ) .
(2.9)
i∈I
Let i0 be the minimal index in I. We want to prove that i0 ⩾ m(ϕ, f1 ). By contradiction, assume that m(ϕ, f1 ) > i0 . Since y− f¯1 is a simple factor of (y p −cf¯2q ) = (y p − f¯1p),
f1
and is not a factor of any Ri , we obtain that (y − f¯1 )i0 +1 divides all summands of
f1
(2.9) except Ri (y p − cf¯q )i0 . In particular (y − f¯1 )i0 +1 , hence also (y − f¯1 )m(ϕ,f1 ) ,
0
2
do not divide ϕf1 : This is a contradiction with Lemma 2.4.
COMBINATORICS OF THE TAME AUTOMORPHISM GROUP
12
We now list some consequences of the Parachute Inequality 2.6.
Corollary 2.10. Let f1 , f2 ∈ k[x1 , x2 , x3 ] be algebraically independent with deg f1 ⩾
deg f2 , and ϕ ∈ k[y, z] such that degvirt ϕ(f1 , f2 ) > deg ϕ(f1 , f2 ). Following Lemma
2.8, we write p deg f1 = q deg f2 where p, q ∈ N∗ are coprime. Then:
(1) deg ϕ(f1 , f2 ) ⩾ p deg f1 − deg f1 − deg f2 + deg df1 ∧ df2 ;
(2) If deg f1 ∈/ N deg f2 , then deg ϕ(f1 , f2 ) > deg df1 ∧ df2 ;
(3) Assume deg f1 ∈/ N deg f2 and deg f1 ⩾ deg ϕ(f1 , f2 ). Then p = 2, q ⩾ 3 is odd,
and
deg ϕ(f1 , f2 ) ⩾ deg f1 − deg f2 + deg df1 ∧ df2 .
If moreover deg f2 ⩾ deg ϕ(f1 , f2 ), then q = 3.
(4) Assume deg f1 ∈/ N deg f2 and deg f1 ⩾ deg ϕ(f1 , f2 ). Then
deg d(ϕ(f1 , f2 )) ∧ df2 ⩾ deg f1 + deg df1 ∧ df2 .
Proof.
(1) By Lemma 2.8(2), we have
degvirt ϕ(f1 , f2 ) ⩾ m(ϕ, f1 )p deg f1 .
(2.11)
On the other hand the Parachute Inequality 2.6 applied to ϕ(y, f2 ) ∈ k[f2 ][y] yields
deg ϕ(f1 , f2 ) ⩾ degvirt ϕ(f1 , f2 ) − m(ϕ, f1 )(deg f1 + deg f2 − deg df1 ∧ df2 ).
Combining with (2.11), and remembering that m(ϕ, f1 ) ⩾ 1, we obtain
deg ϕ(f1 , f2 ) ⩾
deg ϕ(f1 , f2 )
⩾ p deg f1 − deg f1 − deg f2 + deg df1 ∧ df2 .
m(ϕ, f1 )
(2) From Lemma 2.8 we have deg f1 = qδ and deg f2 = pδ for some δ ∈ N3 . The
inequality (1) gives
deg ϕ(f1 , f2 ) ⩾ p deg f1 − deg f1 − deg f2 + deg df1 ∧ df2 =
(pq − p − q)δ + deg df1 ∧ df2 . (2.12)
The assumption deg f1 /∈ N deg f2 implies q > p ⩾ 2. Thus pq − p − q > 0, and finally
deg ϕ(f1 , f2 ) > deg df1 ∧ df2 .
(3) Again the assumptions imply q > p ⩾ 2. Since qδ = deg f1 ⩾ deg ϕ(f1 , f2 ), we
get from (2.12) that q > pq − p − q. This is only possible if p = 2, and so q ⩾ 3 is odd.
Replacing p by 2 in (2.12), we get the inequality.
If deg f2 ⩾ deg ϕ(f1 , f2 ), we obtain 2δ > (q − 2)δ, hence q = 3.
(4) Denote ϕ(y, z) = ∑ ci,j y i z j , and consider the partial derivatives
ϕ′y (y, z) = ∑ ici,j y i−1 z j ;
ϕ′z (y, z) = ∑ jci,j y i z j−1 .
We have d(ϕ(f1 , f2 )) = ϕ′y (f1 , f2 )df1 +ϕ′z (f1 , f2 )df2 . In particular d(ϕ(f1 , f2 ))∧df2 =
ϕ′y (f1 , f2 )df1 ∧ df2 , and
deg d(ϕ(f1 , f2 )) ∧ df2 = deg ϕ′y (f1 , f2 ) + deg df1 ∧ df2 .
Now we consider ϕ′y (f1 , f2 ) as coming from ϕ′y (y, f2 ) ∈ k[f2 ][y], and we simply
write ϕ′ (f1 ) instead of ϕ′y (f1 , f2 ), in accordance with the convention for derivatives
introduced at the beginning of §2.B. We want to show deg ϕ′ (f1 ) ⩾ deg f1 . Recall
that by (2.11), degvirt ϕ(f1 ) ⩾ 2m(ϕ, f1 ) deg f1 , and so, using also Lemma 2.3(1):
degvirt ϕ′ (f1 ) = degvirt ϕ(f1 ) − deg f1 ⩾ 2(m(ϕ, f1 ) − 1) deg f1 + deg f1 .
COMBINATORICS OF THE TAME AUTOMORPHISM GROUP
13
The Parachute Inequality 2.6 then gives (for the last inequality recall that deg f1 ⩾
deg f2 by assumption):
deg ϕ′ (f1 ) ⩾ degvirt ϕ′ (f1 ) − m(ϕ′ , f1 )(deg f1 + deg f2 − deg df1 ∧ df2 )
⩾ 2(m(ϕ, f1 ) − 1) deg f1 + deg f1
− (m(ϕ, f1 ) − 1)(deg f1 + deg f2 − deg df1 ∧ df2 )
= (m(ϕ, f1 ) − 1)(deg f1 − deg f2 + deg df1 ∧ df2 ) + deg f1
⩾ deg f1 .
Corollary 2.13. Let f1 , f2 , f3 ∈ k[x1 , x2 , x3 ] be algebraically independent, and ϕ ∈
k[y, z] such that
degvirt ϕ(f1 , f2 ) > deg ϕ(f1 , f2 ),
degvirt ϕ(f1 , f2 ) > deg f3 .
Following Lemma 2.8, we write p deg f1 = q deg f2 where p, q ∈ N∗ are coprime. Then
deg(f3 + ϕ(f1 , f2 )) > p deg f1 − deg df2 ∧ df3 − deg f1 ,
Proof. The Parachute Inequality 2.6 applied to ψ = f3 + ϕ(y, f2 ) ∈ k[f2 , f3 ][y] gives
deg(f3 + ϕ(f1 , f2 )) ⩾ degvirt ψ(f1 )
− m(ψ, f1 )(deg df2 ∧ df3 + deg f1 − deg df1 ∧ df2 ∧ df3 ). (2.14)
By assumption degvirt ϕ(f1 , f2 ) > deg f3 . Thus not only degvirt ψ(f1 ) = degvirt ϕ(f1 ),
f1
but also ψ = ϕf1 , hence m(ψ, f1 ) = m(ϕ, f1 ) ⩾ 1. By Lemma 2.8(2), we obtain
degvirt ψ(f1 ) ⩾ m(ϕ, f1 )p deg f1 = m(ψ, f1 )p deg f1
Replacing in (2.14), and dividing by m(ψ, f1 ), we get the result.
2.D. Principle of Two Maxima. The proof of the next result, which we call the
“Principle of Two Maxima”, is one of the few places where the formalism of Poisson
brackets used by Shestakov and Umirbaev seems to be more transparent (at least
for us) than the formalism of differential forms used by Kuroda. In this section we
propose a definition that encompasses the two points of view, and then we recall the
proof following [SU04a, Lemma 5].
Proposition 2.15 (Principle of Two Maxima, [Kur08, Theorem 5.2] and [SU04a,
Lemma 5]). Let (f1 , f2 , f3 ) be an automorphism of A3 . Then the maximum between
the following three degrees is realized at least twice:
deg f1 + deg df2 ∧ df3 ,
deg f2 + deg df1 ∧ df3 ,
deg f3 + deg df1 ∧ df2 .
Let Ω be the space of algebraic 1-forms ∑ fi dgi where fi , gi ∈ k[x1 , x2 , x3 ]. We
consider Ω as a free module of rank three over k[x1 , x2 , x3 ], with basis dx1 , dx2 , dx3 ,
and we denote by
∞
T = ⊕ Ω⊗p
p=0
the associative algebra of tensorial powers of Ω, where as usual Ω⊗0 = k[x1 , x2 , x3 ].
The degree function on Ω extends naturally to a degree function on T. Recall that
T has a natural structure of Lie algebra: For any ω, µ ∈ T, we define their bracket as
[ω, µ] ∶= ω ⊗ µ − µ ⊗ ω.
COMBINATORICS OF THE TAME AUTOMORPHISM GROUP
14
In particular, if df, dg ∈ Ω are 1-forms, we have
[df, dg] = df ⊗ dg − dg ⊗ df = df ∧ dg.
It is easy to check that the bracket satisfies the Jacobi identity: For any α, β, γ ∈ T,
we have
[[α, β], γ] + [[β, γ], α] + [[γ, α], β]
= α⊗β ⊗γ −β ⊗α⊗γ −γ ⊗α⊗β +γ ⊗β ⊗α
+β ⊗γ ⊗α−γ ⊗β ⊗α−α⊗β ⊗γ +α⊗γ ⊗β
+γ ⊗α⊗β −α⊗γ ⊗β −β ⊗γ ⊗α+β ⊗α⊗γ
=0
since each one of the six possible permutations appears twice, with different signs.
Lemma 2.16. The nine elements [dxi ∧ dxj , dxk ], for 1 ⩽ i < j ⩽ 3 and 1 ⩽ k ⩽ 3
generate a 8-dimensional free submodule in T, the only relation between them being
the Jacobi identity:
[dx1 ∧ dx2 , dx3 ] + [dx2 ∧ dx3 , dx1 ] − [dx1 ∧ dx3 , dx2 ] = 0.
Proof. We work inside the 27-dimensional free sub-module of T generated by the
dxi ⊗ dxj ⊗ dxk for 1 ⩽ i, j, k ⩽ 3. We compute, for i < j:
[dxi ∧ dxj , dxi ] = [dxi ⊗ dxj − dxj ⊗ dxi , dxi ]
= 2dxi ⊗ dxj ⊗ dxi − dxj ⊗ dxi ⊗ dxi − dxi ⊗ dxi ⊗ dxj ,
[dxi ∧ dxj , dxj ] = [dxi ⊗ dxj − dxj ⊗ dxi , dxj ]
= −2dxj ⊗ dxi ⊗ dxj + dxi ⊗ dxj ⊗ dxj + dxj ⊗ dxj ⊗ dxi .
This shows that the elements [dxi ∧ dxj , dxi ] and [dxi ∧ dxj , dxj ], for i < j, generate
a 6-dimensional free submodule. On the other hand, for {i, j, k} = {1, 2, 3}:
[dxi ∧ dxj , dxk ] = [dxi ⊗ dxj − dxj ⊗ dxi , dxk ]
= dxi ⊗ dxj ⊗ dxk − dxj ⊗ dxi ⊗ dxk − dxk ⊗ dxi ⊗ dxj + dxk ⊗ dxj ⊗ dxi ,
so that [dx1 ∧ dx2 , dx3 ] and [dx2 ∧ dx3 , dx1 ] are independent, and together with the
above family they generate a 8-dimensional free submodule.
The proof of the Principle of Two Maxima 2.15 now follows from the observation:
Lemma 2.17. Let f, g, h ∈ k[x1 , x2 , x3 ], with h non-constant. Then
deg [[df, dg] , dh] = deg h + deg df ∧ dg.
Proof. We have
dh = ∑
1⩽k⩽3
and
[df, dg] = df ∧ dg =
∂h
∂xk dxk
∂f ∂g
∑ ( ∂xi ∂xj −
1⩽i<j⩽3
∂f ∂g
∂xj ∂xi ) dxi
∧ dxj .
Thus
[[df, dg], dh] = ∑
∑
1⩽k⩽3 1⩽i<j⩽3
∂h
∂xk
∂f ∂g
∂f ∂g
( ∂x
− ∂x
) [dxi ∧ dxj , dxk ] .
i ∂xj
j ∂xi
COMBINATORICS OF THE TAME AUTOMORPHISM GROUP
15
∂h
dxk , k = 1, 2, 3, then
If the degree of dh is realized by at most two of the terms ∂x
k
by Lemma 2.16 the terms realizing the maximum of the degrees
∂f ∂g
∂h
deg ( ∂x
( ∂x
−
i ∂xj
k
∂f ∂g
∂xj ∂xi ) [dxi
∧ dxj , dxk ])
(2.18)
are independent (because at most two of them occur in the Jacobi relation), hence
the result since deg [dxi ∧ dxj , dxk ] = deg xi xj xk .
∂h
dxk have the same degree, then among
On the other hand if the three terms ∂x
k
the indexes (i, j, k) that realize the maximum of the degrees in (2.18), we must find
some with k = i or k = j, hence again we get the conclusion since by Lemma 2.16
such terms cannot cancel each other.
Proof of the Principle of Two Maxima 2.15. Since by the Jacobi identity
[[df1 , df2 ], df3 ] + [[df2 , df3 ], df1 ] + [[df3 , df1 ], df2 ] = 0,
the dominant terms must cancel each other. In particular the maximum of the
degrees, which are computed in Lemma 2.17, is realized at least twice: This is the
five lines proof of the Principle of Two Maxima by Shestakov and Umirbaev!
3. Geometric theory of reduction
In this section we mostly follow Kuroda [Kur10], but we reinterpret his theory of
reduction in a combinatorial way, using the complex C. Recall that k is a field of
characteristic zero.
3.A. Degree of automorphisms and vertices. Recall that in §3.A we defined
a notion of degree for an automorphism f = (f1 , f2 , f3 ) ∈ Tame(A3 ). The point is
that we want a degree that is adapted to the theory of reduction of Kuroda, so for
instance taking the maximal degree of the three components of an automorphism is
not good, because we would not detect a reduction of the degree on one of the two
lower components (such reductions do exist, see §6). We also want a definition that
is adapted to working on the complex C, so directly taking the sum of the degree of
the three components is no good either, since it would not give a degree function on
vertices of C.
Recall that the 3-degree of f ∈ Tame(A3 ), or of the vertex v3 = [f ], is the triple
(δ1 , δ2 , δ3 ) given by Lemma 1.3, where in particular δ3 > δ2 > δ1 . By definition the
top degree of v3 is δ3 ∈ N3 , and the degree of v3 is the sum
deg v3 ∶= δ1 + δ2 + δ3 ∈ N3 .
Similarly we have a 2-degree (ν1 , ν2 ) associated with any vertex v2 of type 2, a top
degree equal to ν2 and a degree deg v2 ∶= ν1 + ν2 . Finally for a vertex of type 1 the
notions of 1-degree, top degree and degree coincide.
Lemma 3.1. Let v3 be a vertex of type 3. Then
deg v3 ⩾ (1, 1, 1)
with equality if and only if v3 = [id].
Proof. If v3 = [f ] with deg v3 = (1, 1, 1), then the 3-degree (δ1 , δ2 , δ3 ) of v3 must be
equal to ((0, 0, 1), (0, 1, 0), (0, 0, 1)), hence the result.
COMBINATORICS OF THE TAME AUTOMORPHISM GROUP
16
Let v3 be a vertex with 3-degree (δ1 , δ2 , δ3 ). The unique m1 ∈ P2 (v3 ) such that
deg m1 = δ1 is called the minimal vertex in P2 (v3 ), and the unique m2 ∈ P̂2 (v3 )
such that deg m2 = (δ1 , δ2 ) is called the minimal line in P2 (v3 ). If v2 ∈ P̂2 (v3 )
has 2-degree (ν1 , ν2 ), there is a unique degree δ such that v3 has degree ν1 + ν2 + δ.
We denote this situation by δ ∶= deg(v3 ∖ v2 ). Observe that, by definition, deg(v3 ∖
v2 ) = deg v3 − deg v2 . There is also a unique v1 such that v2 passes through v1 and
deg v1 = ν1 : we call v1 the minimal vertex of v2 . Observe that if v2 = m2 ∈ P̂2 (v3 ),
then the minimal vertex of v2 coincides with the minimal vertex of v3 , and if v2 ≠ m2 ,
then v1 is the intersection of v2 with m2 .
We call triangle T in P2 (v3 ) the data of three non-concurrent lines. A good
triangle T in P2 (v3 ) is the data of three distinct lines m2 , v2 , u2 , such that m2 is
the minimal line, v2 passes through the minimal vertex m1 , and u2 does not pass
through m1 . Equivalently, a good triangle corresponds to a good representative
v3 = Jf1 , f2 , f3 K with deg f1 > deg f2 > deg f3 , by putting m2 = Jf2 , f3 K, v2 = Jf1 , f3 K,
u2 = Jf1 , f2 K. If v1 , v2 , v3 is a simplex in C, we say that a good triangle T in P2 (v3 ) is
compatible with this simplex if v2 is one of the lines of T , and v1 is the intersection
of v2 with another line of T . Each simplex v1 , v2 , v3 admits such a compatible
good triangle (not unique in general): Indeed it corresponds to a choice of good
representatives as given by Lemma 1.4.
Let v2 ∈ P̂2 (v3 ) be a vertex with 2-degree (δ1 , δ2 ). We say that v2 has inner
resonance if δ2 ∈ Nδ1 . We say that v2 has outer resonance in v3 if deg(v3 ∖ v2 ) ∈
Nδ1 + Nδ2 .
3.B. Elementary reductions. Let v3 , v3′ be vertices of type 3. We say that v3′
is a neighbor of v3 if v3′ ≠ v3 and there exists a vertex v2 of type 2 such that
v2 ∈ P̂2 (v3 ) ∩ P̂2 (v3′ ). Equivalently, this means that v3 and v3′ are at distance 2 in C.
We denote this situation by v3′ ≬ v3 , or if we want to make v2 explicit, by v3′ ≬v2 v3
We also say that v2 is the center of v3 ≬ v3′ . Recall that the center v2 is uniquely
defined, and that we can choose representatives as in Corollary 1.6.
We say that v3′ is an elementary reduction (resp. a weak elementary reduction)
of v3 with center v2 , if deg v3 > deg v3′ (resp. deg v3 ⩾ deg v3′ ) and v3′ ≬v2 v3 . Let v1
be the minimal vertex in the line v2 . We say that v1 , v2 , v3 is the pivotal simplex
of the reduction, and that v1 is the pivot of the reduction. Moreover we say that
the reduction is optimal if v3′ has minimal degree among all neighbors of v3 with
center v2 . We say that v3′ is a simple elementary reduction (resp. a weak simple
elementary reduction) of v3 if there exist good representatives v3 = Jf1 , f2 , f3 K and
v3′ = Jf1 + P (f2 ) + af3 , f2 , f3 K for some a ∈ k and non-affine polynomial P , satisfying
deg f1 > max{f1 + P (f2 ), f1 + P (f2 ) + af3 };
(resp. f1 ⩾ max{f1 + P (f2 ), f1 + P (f2 ) + af3 }).
In this situation we say that v2 = Jf2 , f3 K, v1 = Jf2 K is the simple center of the
reduction, and when drawing pictures we represent this relation by adding an arrow
on the edge from v2 to v1 (see Figure 2). Beware that this representation is imperfect,
since the arrow does not depend only on the edge from v2 to v1 but indicates a
relation between the two vertices v3 and v3′ .
COMBINATORICS OF THE TAME AUTOMORPHISM GROUP
17
v1 = [f2 ]
v3 = Jf1 ,f2 ,f3 K
●
v2 = Jf2 ,f3 K
v3′ = Jf1 +P (f2 )+af3 ,f2 ,f3 K
Figure 2. Simple reduction with simple center v2 , v1 .
Remark 3.2. In the definition of a (weak) simple elementary reduction, if deg f3 =
topdeg v3 , then we must have a = 0. For instance in the following example:
v3 = Jx1 + x22 , x2 , x3 + x22 + x32 K = Jf1 , f2 , f3 K,
v3′ = Jx1 − x3 , x2 , x3 + x22 + x32 K = Jf1 + f23 − f3 , f2 , f3 K,
we do not want to call v3′ a simple reduction of v3 because deg(f1 + f23 ) > deg f1 .
On the other hand, consider the following example:
v3 = Jx1 + x22 + x32 , x2 , x3 + x22 K = Jf1 , f2 , f3 K,
v3′ = Jx1 − x3 , x2 , x3 + x22 K = Jf1 − f23 − f3 , f2 , f3 K.
Here v3′ is a simple elementary reduction of v3 , and the coefficient a = −1 is necessary
to get a good representative.
Lemma 3.3. Let v3′ be a neighbor of v3 = [f1 , f2 , f3 ] with center v2′ = Jf1 , f2 K. Then
there exists a non-affine polynomial P ∈ k[y, z] such that v3′ = Jf1 , f2 , f3 + P (f1 , f2 )K.
Moreover:
(1) If v3′ is a weak elementary reduction of v3 , then deg f3 ⩾ deg P (f1 , f2 );
(2) If v3′ is an elementary reduction of v3 , then deg f3 = deg P (f1 , f2 ).
Proof. From Corollary 1.6 we know that v3′ has the form v3′ = [f1 , f2 , f3 + P (f1 , f2 )].
Since by assumption deg f1 ≠ deg f2 , there exist a, b ∈ k such that (f1 , f2 , f3 +
P (f1 , f2 ) + af1 + bf2 ) is a good representative for v3′ . So up to changing P by a
linear combination of f1 and f2 we can assume v3′ = Jf1 , f2 , f3 + P (f1 , f2 )K.
If v3′ is a weak elementary reduction of v3 , then we have
deg f1 + deg f2 + deg f3 ⩾ deg v3 ⩾ deg v3′ = deg f1 + deg f2 + deg(f3 + P (f1 , f2 )).
So deg f3 ⩾ deg(f3 + P (f1 , f2 )), which implies deg f3 ⩾ deg P (f1 , f2 ).
Finally if v3′ is an elementary reduction of v3 , that is, deg v3 > deg v3′ , then the
same computation gives deg f3 > deg(f3 + P (f1 , f2 )), which implies that deg f3 =
deg P (f1 , f2 ).
Lemma 3.4 (Square Lemma). Let v3 , v3′ , v3′′ be three vertices such that:
● v ′ ≬v′ v3 and v ′′ ≬v′′ v3 for some v ′ ≠ v ′′ that are part of a good triangle of v3
3
3
2
2
2
2
(this is automatic if v2′ or v2′′ is the minimal line of v3 );
● Denoting v1 the common vertex of v ′ and v ′′ , v ′′ is a (possibly weak) simple
2
2
3
elementary reduction of v3 with simple center v2′′ , v1 ;
● deg v3 ⩾ deg v ′ , deg v3 ⩾ deg v ′′ , with at least one of the inequalities being strict.
3
3
Then there exists u3 such that u3 ≬ v3′ , u3 ≬ v3′′ and deg v3 > deg u3 .
Proof. We pick f2 such that v1 = [f2 ], and then we take good representatives v2′ =
Jf1 , f2 K, v2′′ = Jf2 , f3 K. Since v2′ and v2′′ are part of a good triangle, we have v3 =
COMBINATORICS OF THE TAME AUTOMORPHISM GROUP
18
v3 =Jf1 ,f2 ,f3 K
v2′′ =Jf2 ,f3 K
●
●
v2′ =Jf1 ,f2 K
v1 =[f2 ]
v3′′ =Jf1 +af3 +Q(f2 ),f2 ,f3 K
●
v3′ =Jf1 ,f2 ,f3 +P (f1 ,f2 )K
●
u′2 =[f1 +Q(f2 ),f2 ]
u′′
2 =Jf2 ,f3 +P (f1 ,f2 )K
u3 =[f1 +Q(f2 ),f2 ,f3 +P (f1 ,f2 )]
Figure 3. Square Lemma 3.4.
Jf1 , f2 , f3 K. By Lemma 3.3, and since v3′′ is a (possibly weak) simple reduction of v3 ,
there exist a ∈ k, Q ∈ k[f2 ] and P ∈ k[f1 , f2 ] such that
v3′ = Jf1 , f2 , f3 + P (f1 , f2 )K;
v3′′ = Jf1 + af3 + Q(f2 ), f2 , f3 K.
We have
deg f3 ⩾ deg(f3 + P (f1 , f2 )),
deg f1 ⩾ max{deg(f1 + af3 + Q(f2 )), deg(f1 + Q(f2 ))},
with one of the two inequalities being strict. We define
u3 ∶= [f1 + Q(f2 ), f2 , f3 + P (f1 , f2 )].
Observe that u3 is a neighbor of both v3′ , with center Jf2 , f3 + P (f1 , f2 )K, and v3′′ ,
with center [f1 + Q(f2 ), f2 ] (see Figure 3). The inequality on degrees follows from:
deg v3 = deg f3 + deg f2 + deg f1
> deg(f3 + P (f1 , f2 )) + deg f2 + deg(f1 + Q(f2 ))
⩾ deg u3 .
3.C. K-reductions. If f1 , f2 ∈ k[x1 , x2 , x3 ] are two algebraically independent polynomials with deg f1 > deg f2 , we introduce the degree
∆(f1 , f2 ) ∶= deg f1 − deg f2 + deg df1 ∧ df2 ∈ Z3 .
Assuming that v2 = Jf1 , f2 K is a vertex of type 2, we define
d(v2 ) ∶= deg df1 ∧ df2
and
∆(v2 ) ∶= ∆(f1 , f2 ).
We call d(v2 ) and ∆(v2 ) respectively the differential degree and the delta degree of v2 . It is easy to check that these definitions do not depend on a choice of
representative. In fact, for any ( αγ βδ ) ∈ GL2 (k) we have
d(αf1 + βf2 ) ∧ d(γf1 + δf2 ) = (αδ − βγ)df1 ∧ df2 ,
so in the definition of d(v2 ) we could use any representative. On the other hand in
the definition of ∆(v2 ), because of the term deg f1 − deg f2 , we really need to work
with a good representative. Observe also that, by definition, for any vertex v2 we
have
∆(v2 ) > d(v2 ).
COMBINATORICS OF THE TAME AUTOMORPHISM GROUP
v3 =Jf1 ,f2 ,f3 K
↺●
v1 =[f2 ]
19
w3 =Jg1 ,f2 ,f3 K
v2 =Jf1 ,f2 K
u3 =Jf1 ,f2 ,g3 K
m2 =Jf2 ,f3 K
w2 =Jg1 ,f2 K
↺●
●
v3 =Jf1 ,f2 ,f3 K
u3 =Jg1 ,f2 ,g3 K
v1 =[f2 ]
Figure 4. Elementary and proper K-reductions, with good representatives as in Set-Up 3.5.
We now introduce the key concept of K-reduction, where we let the reader decide
for himself whether the K should stand for “Kuroda” or for “Kazakh”.
More precisely by a K-reduction we shall mean either an elementary K-reduction,
or a proper K-reduction, two notions that we now define. Let v3 and u3 be vertices
of type 3.
We say that u3 is an elementary K-reduction of v3 if u3 ≬ v3 and:
(K0)
(K1)
(K2)
(K3)
(K4)
deg v3 > deg u3 ;
the center v2 of v3 ≬ u3 has no inner resonance;
v2 has no outer resonance in v3 ;
v2 is not the minimal line in P2 (v3 );
∆(v2 ) > deg(u3 ∖ v2 ).
Denoting by v1 the minimal point in v2 , as before (see definition from page 16) we
call v1 the pivot, and v1 , v2 , v3 the pivotal simplex of the elementary K-reduction
(denoted by ↺ on Figure 4).
We say that u3 is a proper K-reduction of v3 via the auxiliary vertex w3 if
v3 is a weak elementary reduction of w3 with center the minimal line of w3 , and
u3 is an elementary K-reduction of w3 . Formally, this corresponds to the following
conditions:
(K0′ )
(K1′ )
(K2′ )
(K3′ )
(K4′ )
(K5′ )
(K6′ )
deg w3 > deg u3 ;
the center w2 of w3 ≬ u3 has no inner resonance;
w2 has no outer resonance in w3 ;
w2 is not the minimal line in P2 (w3 );
∆(w2 ) > deg(u3 ∖ w2 ).
deg w3 ⩾ deg v3 ;
the center m2 of w3 ≬ v3 is the minimal line in P2 (w3 ).
Observe that the pivot v1 of the elementary K-reduction from w3 to u3 is the common
vertex of the distinct lines m2 and w2 in P2 (w3 ). The simplex v1 , w2 , w3 is still called
the pivotal simplex of the proper K-reduction. It will be proved in Proposition
3.26 that the above conditions (K0′ ) to (K6′ ) imply deg v3 > deg u3 , so that the
terminology of “reduction” is not misleading, even if by no means obvious at this
point.
Let v1 , v2 , v3 be a simplex, and let s ⩾ 3 be an odd integer. We say that the
simplex v1 , v2 , v3 has Strong Pivotal Form ↺(s) if
(↺1)
(↺2)
(↺3)
(↺4)
deg v1 = 2δ and 2-deg v2 = (2δ, sδ) for some δ ∈ N3 ;
v2 has no outer resonance in v3 ;
v2 is not the minimal line in P2 (v3 );
deg(v3 ∖ v2 ) ⩾ ∆(v2 ).
COMBINATORICS OF THE TAME AUTOMORPHISM GROUP
20
In all the previous definitions we took care of working with vertices, and not
with particular representatives. However for writing proofs it will often be useful to
choose representatives.
Set-Up 3.5.
(1) Let u3 be an elementary K-reduction of v3 , with pivotal simplex
v1 , v2 , v3 . Then there exist representatives
v1 = [f2 ]
v2 = Jf1 , f2 K
v3 = Jf1 , f2 , f3 K
u3 = Jf1 , f2 , g3 K
such that g3 = f3 + ϕ3 (f1 , f2 ), where ϕ3 ∈ k[x, y]. Observe that, by definition,
deg f1 > deg f2 and deg f1 > deg f3 > deg g3 .
(2) Let u3 be a proper K-reduction of v3 , with pivotal simplex v1 , w2 , w3 . Then
there exist representatives
v1 = [f2 ]
w3 = Jg1 , f2 , f3 K
m2 = Jf2 , f3 K
v3 = Jf1 , f2 , f3 K
w2 = Jg1 , f2 K
u3 = Jg1 , f2 , g3 K
such that g1 = f1 + ϕ1 (f2 , f3 ) and g3 = f3 + ϕ3 (g1 , f2 ), where ϕ1 , ϕ3 ∈ k[x, y].
Proof.
(1) Pick any good representatives v1 = [f2 ], v2 = Jf1 , f2 K, v3 = Jf1 , f2 , f3 K
as given by Lemma 1.4, and apply Lemma 3.3 to get g3 .
(2) Pick any representative v1 = [f2 ], and then pick f3 , g1 such that v2 = Jf2 , f3 K
and w2 = Jg1 , f2 K. Since m2 is the minimal line in P̂2 (w3 ), we have deg g1 > deg f2
and deg g1 > deg f3 , hence (g1 , f2 , f3 ) is a good representative for w3 . Now apply
Lemma 3.3 twice to get f1 and g3 .
We establish a first property of a simplex with Strong Pivotal Form.
Lemma 3.6. Let v1 , v2 , v3 be a simplex with Strong Pivotal Form ↺(s) for some
odd s ⩾ 3. Then the minimal line m2 in P2 (v3 ) has no inner resonance.
Proof. We pick representatives v1 = [f2 ], v2 = Jf1 , f2 K, v3 = Jf1 , f2 , f3 K as given by
Lemma 1.4. By (↺1) we have deg f1 = sδ > 2δ = deg f2 . Since v2 is not the
minimal line by (↺3), the minimal line must be m2 = Jf2 , f3 K. Then by (↺4)
we have deg f3 > (s − 2)δ ⩾ δ, so that deg f2 /∈ N deg f3 . Since by (↺2) we also
have deg f3 ∈/ N deg f2 , we conclude that the minimal line m2 = Jf2 , f3 K has no inner
resonance.
We can rephrase results from Corollary 2.10 with the previous definitions (see
also Example 6.3 for some complements):
Proposition 3.7. Let v3 be a vertex that admits an elementary reduction with pivotal simplex v1 , v2 , v3 .
(1) Assume v2 has no inner resonance, and no outer resonance in v3 . Then
deg(v3 ∖ v2 ) > d(v2 ).
(2) If moreover v2 is not the minimal line in P2 (v3 ), then v1 , v2 , v3 has Strong
Pivotal Form ↺(s) for some odd s ⩾ 3.
Proof.
(1) We pick good representatives v1 = [f2 ], v2 = Jf1 , f2 K, v3 = Jf1 , f2 , f3 K as
given by Lemma 1.4. By Lemma 3.3, the elementary reduction has the form u3 =
COMBINATORICS OF THE TAME AUTOMORPHISM GROUP
21
Jf1 , f2 , f3 + P (f1 , f2 )K with deg f3 = deg P (f1 , f2 ). Since v2 has no outer resonance
in v3 , we have deg f3 /∈ N deg f1 + N deg f2 , hence
degvirt P (f1 , f2 ) > deg P (f1 , f2 ).
Since moreover v2 has no inner resonance, we can apply Corollary 2.10(2) to get the
inequality deg(v3 ∖ v2 ) > d(v2 ).
(2) By assumption the simplex v1 , v2 , v3 already satisfies conditions (↺2) and
(↺3). The condition that v2 is not the minimal line in P2 (v3 ) is equivalent to
max{deg f1 , deg f2 } > deg f3 = deg P (f1 , f2 ),
hence we can apply Corollary 2.10(3), which yields conditions (↺1) and (↺4).
3.D. Elementary K-reductions. Here we list some properties of an elementary
K-reduction. First we have the following corollary from Proposition 3.7.
Corollary 3.8. The pivotal simplex of a K-reduction has Strong Pivotal Form ↺(s)
for some odd s ⩾ 3.
Proof. First, let v1 , v2 , v3 be the pivotal simplex of an elementary K-reduction. We
know that, by (K1), v2 has no inner resonance, by (K2), v2 has no outer resonance
in v3 , and by (K3), v2 is not the minimal line in v3 , so we can apply Proposition
3.7(2).
Now the pivotal simplex of proper K-reduction is by definition the pivotal simplex
of an elementary K-reduction from the auxiliary vertex, so that the above argument
applies.
Lemma 3.9. Let u3 be an elementary K-reduction of v3 with center v2 , m2 the
minimal line in P2 (v3 ), and u2 ∈ P2 (v3 ) a line not passing through the pivot v1 of
the reduction. Then
(1) d(m2 ) ⩾ deg(v3 ∖ m2 ) + d(v2 );
(2) d(u2 ) > d(m2 ) > d(v2 );
(3) The function
t2 ∈ P̂2 (v3 ) ↦ d(t2 ) ∈ N3
only takes the three distinct values d(u2 ) > d(m2 ) > d(v2 ), and it takes its
minimal value only at the point v2 ;
(4) deg(v1 ) + d(u2 ) > 2 deg(v3 ∖ m2 ).
Proof. The assumption means that v2 , m2 , u2 form a (not necessarily good) triangle.
We use the notation from Set-Up 3.5, we therefore have m2 = Jf2 , f3 K, v2 = Jf1 , f2 K
and v1 = [f2 ].
(1) On the one hand:
df2 ∧ df3 = df2 ∧ dg3 − df2 ∧ d(ϕ3 (f1 , f2 )).
On the other hand, the following sequence of inequalities holds, where the first one
comes from Corollary 2.10(4), the second one from (K4), and the third one from
Lemma 2.2:
deg df2 ∧ d(ϕ3 (f1 , f2 )) ⩾ deg f1 + deg df1 ∧ df2 > deg f2 + deg g3 ⩾ deg df2 ∧ dg3 . (3.10)
So deg df2 ∧ df3 = deg df2 ∧ d(ϕ3 (f1 , f2 )), and replacing in (3.10) we obtain the expected inequality:
d(m2 ) = deg df2 ∧ df3 ⩾ deg f1 + deg df1 ∧ df2 = deg(v3 ∖ m2 ) + d(v2 ).
COMBINATORICS OF THE TAME AUTOMORPHISM GROUP
22
(2) By the previous point we have
deg f1 + deg df2 ∧ df3 > deg f3 + deg df1 ∧ df2 ,
hence by the Principle of Two Maxima 2.15 we get
deg f2 + deg df1 ∧ df3 = deg f1 + deg df2 ∧ df3 .
(3.11)
Since deg f1 > deg f2 we get deg df1 ∧ df3 > deg df2 ∧ df3 , and finally
deg df1 ∧ df3 > deg df2 ∧ df3 > deg df1 ∧ df2 .
(3.12)
The general form of u2 being u2 = Jf1 + αf2 , f3 + βf2 K, we have
d(u2 ) = deg(df1 + α df2 ) ∧ (df3 + β df2 ) = deg df1 ∧ df3 ,
so that the expected result is exactly (3.12).
(3) We just saw that if t2 is any line not passing through [f2 ], then d(t2 ) =
deg df1 ∧ df3 = d(u2 ).
Now consider t2 passing through [f2 ] but not equal to v2 . Then t2 = [f2 , f3 + αf1 ]
for some α ∈ k and, using (3.12):
d(t2 ) = deg (df2 ∧ df3 − α df1 ∧ df2 ) = deg df2 ∧ df3 = deg(m2 ).
We obtain that v2 is the unique minimum of the function
t2 ∈ P̂2 (v3 ) ↦ d(t2 ).
(4) By (3.11) we have
deg(v1 ) + d(u2 ) = deg(v3 ∖ m2 ) + d(m2 ).
Since by assertion (1) we have d(m2 ) > deg(v3 ∖ m2 ), the result follows.
As an immediate consequence of Lemma 3.9(3) we get:
Corollary 3.13. Assume that v3 admits an elementary K-reduction, and that one
of the following holds:
(1) There exists a (non necessarily good) triangle u2 , v2 , w2 ∈ P̂2 (v3 ) such that
d(u2 ) > d(w2 ) > d(v2 );
(2) m2 is the minimal line in P2 (v3 ), and v2 is another line in P2 (v3 ) such that
d(m2 ) > d(v2 ).
Then v2 is the center of the K-reduction.
3.E. Proper K-reductions. In this section we list some properties of proper Kreductions, and introduce the concept of a normal K-reduction.
Proposition 3.14. Let u3 be a proper K-reduction of v3 , via w3 . Then (using
notation from Set-Up 3.5):
(1) g1 = f1 + ϕ1 (f2 , f3 ) with degvirt ϕ1 (f2 , f3 ) = deg ϕ1 (f2 , f3 ).
(2) If the pivotal simplex has Strong Pivotal Form ↺(s) with s ⩾ 5, then v3 is
a weak simple elementary reduction of w3 , with simple center m2 , v1 , and
deg v3 = deg w3 .
Proof. First observe that by Corollary 3.8 we know that the pivotal simplex v1 , w2 , w3
has Strong Pivotal Form ↺(s). In particular by Lemma 3.6 the minimal line m2 =
Jf2 , f3 K of w3 has no inner resonance.
COMBINATORICS OF THE TAME AUTOMORPHISM GROUP
23
(1) Assume by contradiction that degvirt ϕ1 (f2 , f3 ) > deg ϕ1 (f2 , f3 ).
By non resonance of Jf2 , f3 K we can apply Corollary 2.10(2) and Lemma 3.9(1) to
get the contradiction
deg ϕ1 (f2 , f3 ) > deg df2 ∧ df3 = d(m2 ) > deg g1 .
(2) We just established
deg g1 ⩾ deg ϕ1 (f2 , f3 ) = degvirt ϕ1 (f2 , f3 ).
Since v1 , w2 , w3 has Strong Pivotal Form ↺(s), we have deg g1 = sδ, deg f2 = 2δ
and deg f3 > (s − 2)δ, so that deg(f2 f3 ) > deg g1 . As soon as s ⩾ 5 we also have
2(s − 2) > s, hence deg f32 > deg g1 . This implies that if s ⩾ 5 then ϕ1 has the form
ϕ1 (f2 , f3 ) = af3 + Q(f2 ), as expected. Moreover since deg Q(f2 ) = 2rδ for some
r ⩾ 2 and since s is odd, we have deg g1 > degvirt ϕ1 (f2 , f3 ) = deg ϕ(f2 , f3 ) hence
deg f1 = deg g1 and deg v3 = deg w3 .
In view of the previous proposition, we introduce the following definition. We say
that u3 is a normal K-reduction of v3 in any of the two following situations:
● either u3 is an elementary K-reduction of v3 ;
● or u3 is a proper K-reduction of v3 via an auxiliary vertex w3 , and, denoting
by v1 the pivot of the reduction and m2 the minimal line in w3 , the vertex
v3 is not a weak simple elementary reduction of w3 with center m2 , v1 .
Given a proper K-reduction, Corollary 3.8 and Proposition 3.14(2) say that if the
reduction is normal then the pivotal simplex has Strong Pivotal Form ↺(3). We
now prove the converse, and give some estimations on the degrees involved.
Lemma 3.15. Assume that u3 is a proper K-reduction of v3 , via w3 , and that the
pivotal simplex has Strong Pivotal Form ↺(3). Then the reduction is normal, and
using representatives as from Set-Up 3.5, we have:
deg g1 = 3δ,
deg f2 = 2δ,
3
2δ
⩾ deg f3 > δ,
(3.16)
deg df1 ∧ df3 = δ + deg df2 ∧ df3 ⩾ 4δ + deg dg1 ∧ df2 ,
(3.17)
deg df1 ∧ df2 = deg f3 + deg df2 ∧ df3 .
(3.18)
Moreover we have the implications:
deg w3 > deg v3 Ô⇒ deg f3 = 32 δ,
deg f1 > 52 δ.
deg w3 = deg v3 Ô⇒ deg f1 = deg g1 = 3δ.
(3.19)
(3.20)
In any case we have
deg f1 > deg f2 > deg f3 ,
(3.21)
deg df1 ∧ df2 > deg df1 ∧ df3 > deg df2 ∧ df3 ,
(3.22)
2
m2 = Jf2 , f3 K is the minimal line of v3 , and for any other line ℓ2 ∈ P̂ (v3 ), we have
d(ℓ2 ) > d(m2 ).
(3.23)
Proof. The equalities deg g1 = 3δ and deg f2 = 2δ come from the fact that the pivotal
simplex has Strong Pivotal Form ↺(3). Property (↺4) gives deg f3 > δ, and
Proposition 3.14(1) says that degvirt ϕ1 (f2 , f3 ) = deg ϕ1 (f2 , f3 ). Hence apart from
f2 , f3 and f32 , any monomial in f2 , f3 has degree strictly bigger than g1 . So there
exists a, b, c ∈ k such that
w3 = Jg1 = f1 + af32 + bf2 + cf3 , f2 , f3 K.
Moreover, since w3 ≠ v3 , we have a ≠ 0, which implies 3δ = deg g1 ⩾ 2 deg f3 . This
proves (3.16), and the fact that the K-reduction is normal.
COMBINATORICS OF THE TAME AUTOMORPHISM GROUP
24
By Lemma 3.9(1) we have
deg df2 ∧ df3 = d(m2 ) ⩾ deg(w3 ∖ m2 ) + d(w2 ) = deg g1 + deg dg1 ∧ df2 .
(3.24)
This implies
deg g1 + deg df2 ∧ df3 > deg f3 + deg dg1 ∧ df2 .
By the Principle of Two Maxima 2.15, we get
deg g1 + deg df2 ∧ df3 = deg f2 + deg dg1 ∧ df3 .
(3.25)
Now dg1 ∧ df3 = df1 ∧ df3 + bdf2 ∧ df3 , and the previous equality implies deg dg1 ∧ df3 >
deg df2 ∧ df3 , so that
deg dg1 ∧ df3 = deg df1 ∧ df3 .
Now combining (3.24) and (3.25) we get the expected inequality (3.17):
deg df1 ∧ df3 = δ + deg df2 ∧ df3 ⩾ 4δ + deg dg1 ∧ df2 .
Observe that deg w3 > deg v3 is equivalent to deg g1 = deg f32 > deg f1 . So in this
situation deg f3 = 32 δ, and since by Lemma 2.2 we have deg f1 + deg f3 ⩾ deg df1 ∧ df3 ,
from (3.17) we also get deg f1 > 4δ − 32 δ = 25 δ. This proves (3.19), and (3.20) is
immediate. These two assertions imply that we always have deg f1 > 25 δ, so that we
get (3.21), and the minimal line m2 = Jf2 , f3 K of w3 also is the minimal line of v3 .
For the equality (3.18) we start again from g1 = f1 + af32 + bf2 + cf3 , which gives
dg1 ∧ df2 = df1 ∧ df2 − 2af3 df2 ∧ df3 − c df2 ∧ df3 .
Since (3.24) implies deg(f3 df2 ∧ df3 ) > deg dg1 ∧ df2 , the first two terms on the righthand side must have the same degree, which is the expected equality.
Now (3.17), (3.18) and the inequality deg f3 > δ from (3.16) immediately implies
(3.22).
Finally, for any line ℓ2 distinct from m2 = Jf2 , f3 K, we have
d(ℓ2 ) = deg(α df1 ∧ df2 + β df1 ∧ df3 + γ df2 ∧ df3 )
with (α, β) ≠ (0, 0), from which we obtain (3.23).
Now we can justify the terminology of “reduction”, as announced when we gave
the definition of a proper K-reduction:
Proposition 3.26. Let u3 be a proper K-reduction of a vertex v3 . Then
deg v3 > deg u3 .
Proof. We use the notation from Set-Up 3.5. Observe that if deg w3 = deg v3 , then
the proposition is obvious from (K0′ ).
Assume first that the reduction is not normal, that is, g1 = f1 + af3 + Q(f2 ). We
know by Corollary 3.8 that deg g1 = sδ, deg f2 = 2δ and sδ > deg f3 > (s − 2)δ, where
s ⩾ 3 is odd. An inequality deg g1 > deg f1 would imply sδ = deg(g1 ) = deg Q(f2 ) =
2rδ for some integer r (the degree of Q), a contradiction with s odd. Thus we obtain
deg g1 = deg f1 > deg(af3 + Q(f2 )), hence deg w3 = deg v3 and we are done.
Now assume we have a normal proper K-reduction, and that deg w3 > deg v3 . By
Proposition 3.14(2) (see also the discussion just before Lemme 3.15), we are in the
setting of Lemma 3.15. By condition (K4′ ) we have
δ + deg dg1 ∧ df2 > deg g3 .
Adding 3δ = deg g1 , and using (3.17) from Lemma 3.15, we get
deg df1 ∧ df3 ⩾ 4δ + deg dg1 ∧ df2 > deg g1 + deg g3 .
COMBINATORICS OF THE TAME AUTOMORPHISM GROUP
25
Finally adding deg f2 we get
deg v3 = deg f1 + deg f2 + deg f3
⩾ deg df1 ∧ df3 + deg f2
> deg g1 + deg g3 + deg f2
= deg u3 .
by Lemma 2.2
In the following result we prove that if a vertex admits a non-normal proper Kreduction, then it already admits an elementary (and therefore normal) K-reduction.
It follows that any vertex admitting a K-reduction admits a normal K-reduction.
Lemma 3.27 (Normalization of a K-reduction). Let u3 be a non-normal proper
K-reduction of v3 , via w3 . Then there exists u′3 such that
(1) u′3 ≬ v3 and u′3 ≬ u3 ;
(2) u′3 is an elementary (hence by definition normal) K-reduction of v3 .
w3 =Jg1 ,f2 ,f3 K
m2 =Jf2 ,f3 K
●
↺ ●
w2 =Jg1 ,f2 K
v3 =Jf1 =g1 −af3 −Q(f2 ),f2 ,f3 K
u3 =Jg1 ,f2 ,f3 +P (g1 ,f2 )K
↺
●
v2 =Jg1 −Q(f2 ),f2 K
v1 =[f2 ]
●
u2 =Jf2 ,f3 +P (g1 ,f2 )K
u′3 =Jg1 −Q(f2 ),f2 ,f3 +P (g1 ,f2 )K
Figure 5. Normalization of a K-reduction.
Proof. By Corollary 3.8 the pivotal simplex of the reduction has Strong Pivotal
Form ↺(s) for some odd s, and by Lemma 3.15 we have s ⩾ 5. Note also that
by Proposition 3.14 we have deg v3 = deg w3 , and v3 is a weak simple elementary
reduction of w3 with simple center m2 , v1 : see the upper-half of Figure 5, where we
use the notation of Set-Up 3.5.
By the Square Lemma 3.4, we get the existence of u′3 with u′3 ≬ v3 , u′3 ≬ u3 and
deg w3 > deg u′3 : see Figure 5. In particular deg v3 > deg u′3 , which is (K0).
Since v3 and w3 have the same 3-degrees, the vertices v2 and w2 also have the
same 2-degrees. So Properties (K1′ ) and (K2′ ) for the initial proper K-reduction
from v3 to u3 imply (K1) and (K2) for the elementary reduction from v3 to u′3 .
Finally m2 is the minimal line of v3 , and is distinct from v2 , which gives (K3),
and v2 = Jg1 − Q(f2 ), f2 K so that d(v2 ) = d(w2 ), which gives (K4).
Corollary 3.28. If v3 = Jf1 , f2 , f3 K admits a K-reduction, then one of the following
holds:
(1) Any line in P2 (v3 ) has no inner resonance;
(2) Up to permuting the fi , we have deg f1 = 2 deg f3 and 2 deg f1 = 3 deg f2 . In
particular with this numbering [f3 ] is the minimal vertex of v3 .
COMBINATORICS OF THE TAME AUTOMORPHISM GROUP
26
Proof. Any line in P2 (v3 ) has 2-degree (δ1 , δ2 ) with δi ∈ {deg f1 , deg f2 , deg f3 } for
i = 1, 2. So there exists a line in P2 (v3 ) with inner resonance if and only if there
exist two indexes i ≠ j in {1, 2, 3} such that deg fi ∈ N deg fj .
If the K-reduction is elementary, using the notation from Set-Up 3.5(1), we have
deg f1 = sδ, deg f2 = 2δ and sδ > deg f3 > (s − 2)δ for some odd s ⩾ 3. Moreover
an inner resonance in Jf2 , f3 K would be of the form deg f3 = (s − 1)δ = s−1
2 deg f2 for
s ⩾ 5, but this is impossible by Property (K2). So the only possible resonance is
between deg f1 and deg f3 , in the case s = 3, as stated in (2).
If the K-reduction is proper, we use the notation from Set-Up 3.5(2). Either
deg g1 = deg f1 and we are reduced to the previous case; or deg g1 > deg f1 and by
Lemma 3.27 we can assume that the K-reduction is normal (and proper, otherwise
again we are reduced to the previous case). Then by Lemma 3.15 we have 3δ >
deg f1 > 25 δ, deg f2 = 2δ, deg f3 = 32 δ, hence there is no relation of the form deg fi ∈
N deg fj for any i ≠ j and we are in case (1).
Remark 3.29. We shall see later in Corollary 5.3 that in fact Case (2) in the
previous corollary never happens.
3.F. Stability of K-reductions. Consider v3 a vertex that admits a normal Kreduction. In this section we want to show that most elementary reductions of v3
still admit a K-reduction. First we prove two lemmas that give some constraint on
the (weak) elementary reductions that such a vertex v3 can admit.
Lemma 3.30. Let u3 be a normal K-reduction of v3 , with pivot v1 . Let u2 be any
line in P2 (v3 ) not passing through v1 . Then v3 does not admit a weak elementary
reduction with center u2 .
Proof. We start with the notation v3 = Jf1 , f2 , f3 K from Set-Up 3.5(1) when u3 is an
elementary K-reduction of v3 , and with the Set-Up 3.5(2) to which we apply Lemma
3.15 when u3 is a normal proper K-reduction of v3 . It follows that m2 = Jf2 , f3 K
is in both cases the minimal line of v3 . We have u2 = Jh1 , h3 K where h1 = f1 + af2 ,
h3 = f3 + bf2 for some a, b ∈ k. Then [f2 , h3 ] is the minimal line m2 in P2 (v3 ),
however it is possible that [f2 , h3 ] is not a good representative of m2 . There are two
possibilities:
● either (h1 , f2 , h3 ) is still a good representative for v3 , and we have deg h3 =
deg f3 , deg f2 = deg(v3 ∖ u2 );
● or deg f2 = deg h3 > deg m1 where m1 = [f3 ] is the minimal point of v3 , and
deg f2 > deg(v3 ∖ u2 ) = deg f3 .
In both cases we have
deg h1 = topdeg v3 ,
deg f2 ⩾ deg(v3 ∖ u2 ) and
deg h3 ⩾ deg f3 .
Assume by contradiction that v3 admits a weak elementary reduction with center
u2 . By Lemma 3.3 there exists a non-affine polynomial P ∈ k[y, z] such that
deg(v3 ∖ u2 ) ⩾ deg P (h1 , h3 ).
On the other hand we know from Corollary 3.8 that the pivotal simplex of the
K-reduction has Strong Pivotal Form ↺(s) for some odd s ⩾ 3, hence
deg h3 ⩾ deg f3 > (s − 2)δ ⩾ δ which implies 2 deg h3 > 2δ = deg f2 .
In consequence, since deg h1 > deg h3 , we have
degvirt P (h1 , h3 ) ⩾ 2 deg h3 > deg f2 ⩾ deg(v3 ∖ u2 ),
COMBINATORICS OF THE TAME AUTOMORPHISM GROUP
so that
27
degvirt P (h1 , h3 ) > deg P (h1 , h3 ).
If u2 has no inner resonance, then we get a contradiction as follows, in both cases
of an elementary or a normal proper K-reduction:
deg(v3 ∖ u2 ) ⩾ deg P (h1 , h3 )
> deg dh1 ∧ dh3 = d(u2 )
> d(m2 )
> deg(v3 ∖ m2 )
by Corollary 2.10(2),
by Lemma 3.9(2) or (3.23),
by Lemma 3.9(1).
More precisely, in the case of a normal proper K-reduction the last inequality comes
from d(m2 ) > deg(w3 ∖ m2 ) ⩾ deg(v3 ∖ m2 ) by Lemma 3.9(1) and by (K5′ ).
Now consider the case where u2 = Jh1 , h3 K has inner resonance. By Corollary
3.28(2) we have deg h3 = min{deg f2 , deg f3 }, and since by assumption deg h3 ⩾ deg f3
we get deg h3 = deg f3 . Then Corollary 3.28(2) gives the two relations
1
2
2
3
deg(v3 ∖ m2 ) = 21 deg h1 = deg h3 ,
deg(v3 ∖ m2 ) = 32 deg h1 = deg f2 ⩾ deg(v3 ∖ u2 ).
(3.31)
In particular we have deg f1 > deg f2 > deg f3 , and b = 0, that is, h3 = f3 . We apply
Corollary 2.10(1) which gives
deg(v3 ∖ u2 ) ⩾ deg P (h1 , h3 ) ⩾ d(u2 ) − deg h3 ,
which we rewrite as
deg h3 + 2 deg(v3 ∖ u2 ) ⩾ deg(v3 ∖ u2 ) + d(u2 ).
(3.32)
deg(v3 ∖ u2 ) + d(u2 ) > 2 deg(v3 ∖ m2 ).
(3.33)
If u3 is an elementary K-reduction of v3 , and since in our situation deg(v3 ∖ u2 ) =
deg[f2 ], by Lemma 3.9(4) we have
If on the other hand u3 is a proper K-reduction of v3 via w3 , let us prove that
(3.33) still holds, by using Lemma 3.15. First note that deg(v3 ∖ u2 ) = deg f2 ,
deg(v3 ∖ m2 ) = deg f1 and
d(u2 ) = deg dh1 ∧ dh3 = deg d(f1 + af2 ) ∧ df3 = deg df1 ∧ df3 by (3.17).
Then, using (3.16) and (3.17) from Lemma 3.15, we get
deg f2 + deg df1 ∧ df3 > 2δ + 4δ = 2 deg g1 ⩾ 2 deg f1
as expected.
Adding the first equality of (3.31) to twice the second one, and combining with
(3.32) and (3.33), we get the contradiction
( 12 + 2.2
3 ) deg(v3 ∖ m2 ) > 2 deg(v3 ∖ m2 ).
Lemma 3.34. Let u3 be a normal proper K-reduction of v3 , with pivot v1 . Let
v2′ ≠ m2 be a line in P2 (v3 ) passing through v1 . If v3′ is a weak elementary reduction
of v3 with center v2′ , then this reduction is simple with center v2′ , v1 .
Proof. We use the notation from Set-Up 3.5(2), and set v2′ = Jh1 , f2 K with h1 =
f1 + af3 . By Lemma 3.15, h1 realizes the top degree of v3 . Then v3 = Jf1 , f2 , f3 K =
COMBINATORICS OF THE TAME AUTOMORPHISM GROUP
28
Jh1 , f2 , f3 K, and by Lemma 3.3 we have v3′ = Jh1 , f2 , f3 + P (h1 , f2 )K for some nonaffine polynomial P . We want to prove that P (h1 , f2 ) ∈ k[f2 ]. It is sufficient to
prove deg h1 > degvirt P (h1 , f2 ). Assume the contrary. Then
degvirt P (h1 , f2 ) ⩾ deg h1 > deg f3 ⩾ deg P (h1 , f2 ).
By Lemma 3.15, we have deg f1 > deg f2 > deg f3 , so that by Corollary 3.28 we have
deg h1 = deg f1 ∈/ N deg f2 . Thus we can apply Corollary 2.10(2) to get
deg f1 > deg P (h1 , f2 ) > deg dh1 ∧ df2 .
By (3.18) of Lemma 3.15 we get
deg dh1 ∧ df2 = deg(df1 ∧ df2 − adf2 ∧ df3 ) = deg df1 ∧ df2 > deg df2 ∧ df3 .
Then by (3.17) and (3.16) of Lemma 3.15 we have
deg df2 ∧ df3 ⩾ 3δ = deg g1 ⩾ deg f1 ,
hence the contradiction deg f1 > deg dh1 ∧ df2 ⩾ deg f1 .
Proposition 3.35 (Stability of a K-reduction). Let u3 be a normal K-reduction
of v3 , and v3′ a weak elementary reduction of v3 with center v2′ . Denote by m2 the
minimal line of v3 . If u3 is an elementary K-reduction, assume moreover that the
centers of v3′ ≬ v3 and u3 ≬ v3 are distinct. Then u3 is a K-reduction of v3′ , and
more precisely, we are in one of the following cases:
(1) u3 is an elementary K-reduction of v3 , and v2′ = m2 : then u3 is a (possibly
non-normal) proper K-reduction of v3′ , via v3 ;
(2) u3 is an elementary K-reduction of v3 , and v2′ ≠ m2 : then u3 is a (possibly non-normal) proper K-reduction of v3′ , via an auxiliary vertex w3′ that
satisfies deg w3′ = deg v3 ;
(3) u3 is a normal proper K-reduction of v3 via w3 , and v3′ = w3 : then u3 is an
elementary K-reduction of v3′ ;
(4) u3 is a normal proper K-reduction of v3 via w3 , and v2′ = m2 : then u3 also
is a normal proper K-reduction of v3′ via w3 .
Proof. First assume that u3 is an elementary K-reduction of v3 . We denote by
v1 = [f2 ], v2 = Jf1 , f2 K, v3 = Jf1 , f2 , f3 K the pivotal simplex of the K-reduction u3
(following Set-Up 3.5(1)). By Lemma 3.30, the line v2′ passes through v1 .
(1). If v2′ = m2 , since by assumption deg v3 ⩾ deg v3′ , we directly get that u3 is a
proper K-reduction of v3′ , via v3 .
(2). Now assume that v2′ ≠ m2 , so that v2′ = Jf1 + af3 , f2 K for some a ∈ k, and a ≠ 0
since we assume v2′ ≠ v2 . Then by Lemma 3.3 we can write
v3′ = Jf1 + af3 , f2 , f3 + P (f1 + af3 , f2 )K with deg f3 ⩾ deg P (f1 + af3 , f2 ).
If we can show that P depends only on f2 we are done: indeed then deg f3 ≠
deg P (f2 ), because m2 = Jf2 , f3 K has no inner resonance by Corollary 3.28, hence we
have deg f3 = deg(f3 + P (f2 )). It follows that u3 is a proper K-reduction of v3′ via
w3′ = Jf1 , f2 , f3 + P (f2 )K, where m′2 = Jf2 , f3 + P (f2 )K is the minimal line of w3′ (see
Figure 6, Case (2)).
To show that P depends only on f2 it is sufficient to show that deg f3 ⩾ degvirt P (f1 +
af3 , f2 ). By contradiction, assume that this is not the case. Then
degvirt P (f1 + af3 , f2 ) > deg f3 ⩾ deg P (f1 + af3 , f2 ).
COMBINATORICS OF THE TAME AUTOMORPHISM GROUP
29
v3 =Jf1 ,f2 ,f3 K
v3 =Jf1 ,f2 ,f3 K
v2 =Jf1 ,f2 K
u3
v2′ =Jf1 +af3 ,f2 K ●
v2′ =m2 =Jf2 ,f3 K
↺ ●
v2 =Jf1 ,f2 K
↺●
●
v1
v3′
u3
↺
v3′ =Jf1 +af3 ,f2 ,f3 +P (f2 )K
w3′ =Jf1 ,f2 ,f3 +P (f2 )K
v1 =[f2 ]
m′2 =Jf2 ,f3 +P (f2
Case (1)
●
)K
Case (2)
v3′ =w3
w3
v3′
v2′ =m2
v2′ =m2
w2
↺●
●
v3
↺●
●
u3
v3
u3
v1
v1
Case (3)
Case (4)
Figure 6. Stability of a K-reduction.
Since v2′ has the same 2-degree as v2 , it has no inner resonance by (K1), and by
Corollary 2.10(2) we get
deg P (f1 + af3 , f2 ) > deg(df1 ∧ df2 − adf2 ∧ df3 ).
By Lemma 3.9(1) we have deg df2 ∧ df3 > df1 ∧ df2 and deg df2 ∧ df3 > deg f3 , so finally
we obtain the contradiction
deg P (f1 + af3 , f2 ) > deg df2 ∧ df3 > deg f3 .
Now assume that u3 is a normal proper K-reduction of v3 , via an auxiliary vertex
w3 . Recall that the minimal line m2 of v3 is also the minimal line of the intermediate
vertex w3 (last assertion of Lemma 3.15).
(3). If v3′ = w3 , then by definition u3 is an elementary K-reduction of v3′ .
(4). If v3′ ≠ w3 , but v2′ = m2 , then the conclusion is also direct, because deg w3 ⩾
deg v3 ⩾ deg v3′ .
Finally we prove that the situation where v2′ ≠ m2 leads to a contradiction. By
Lemma 3.34 the reduction from v3 to v3′ is simple with center v2′ , v1 . But then
by Remark 3.2 (or directly from the proof of Lemma 3.34) we should have v2′ =
Jf1 + af3 , f2 K and v3′ = Jf1 + af3 , f2 , f3 + P (f2 )K. By Lemma 3.15 we have
deg f2 = 2δ > 23 δ ⩾ deg f3 ,
so deg P (f2 ) > deg f3 and we get a contradiction with deg v3 ⩾ deg v3′ .
4. Reducibility Theorem
In this section we state and prove the main result of this paper, that is, the
Reducibility Theorem 4.1.
COMBINATORICS OF THE TAME AUTOMORPHISM GROUP
30
4.A. Reduction paths. Given a vertex v3 with a choice of good triangle T , we call
elementary T -reduction any elementary reduction with center one of the three lines
of T .
We now define the notion of a reducible vertex in a recursive manner as follows:
We declare that the vertex [id] is reducible, where by Lemma 3.1 [id] is the
unique type 3 vertex realizing the minimal degree (1, 1, 1).
● Let µ > ν be two consecutive degrees, and assume that we have already defined
the subset of reducible vertices among type 3 vertices of degree at most ν. Then
we say that a vertex v3 with deg v3 = µ is reducible if for any good triangle T in
P2 (v3 ), there exists either a T -elementary reduction or a (proper or elementary)
K-reduction from v3 to u3 , with u3 reducible.
●
Let v3 , v3′ be vertices of type 3. A reduction path of length n ⩾ 0 from v3 to v3′
is a sequence of type 3 vertices v3 (0), v3 (1), . . . , v3 (n) such that:
●
●
●
v3 (0) = v3 and v3 (n) = v3′ ;
v3 (i) is reducible for all i = 0, . . . , n;
For all i = 0, . . . , n − 1, v3 (i + 1) is either an elementary reduction, or a
K-reduction, of v3 (i).
Observe that, by definition, a reducible vertex v3 admits a reduction path from
v3 to the vertex [id].
In the following sections we shall prove the main result:
Theorem 4.1 (Reducibility Theorem). Any vertex of type 3 in the complex C is
reducible.
Directly from the definition, this theorem has the following consequence: For any
vertex v3 ≠ [id] of type 3 in the complex C, and for any good triangle T in P2 (v3 ),
the vertex v3 admits either a T -elementary reduction or a (proper or elementary)
K-reduction.
We remark that this result immediately implies that Tame(A3 ) is a proper subgroup of Aut(A3 ):
Corollary 4.2. The Nagata’s automorphism
f = (x1 + 2x2 (x22 − x1 x3 ) + x3 (x22 − x1 x3 )2 , x2 + x3 (x22 − x1 x3 ), x3 )
is not tame.
Proof. Denote f = (f1 , f2 , f3 ) the components of f . Assume that f is tame. Let v3 =
Jf1 , f2 , f3 K be the associated vertex in C, and let T be the good triangle associated
with this representative. We have deg f1 = (2, 0, 3), deg f2 = (1, 0, 2) and deg f3 =
(0, 0, 1).
On the one hand, if f admits a K-reduction, by Corollary 3.8 one of the fi (the
pivot of the reduction) should have a degree of the form 2δ: this is not the case.
On the other hand, the degrees of the fi are pairwise Z-independent, so for any
distinct i, j ∈ {1, 2, 3} and any polynomial P we have degvirt P (fi , fj ) = deg P (fi , fj ).
This implies that if f admits an elementary T -reduction, then one of the deg fi should
be a N-combination of the other two. Again this is not the case.
Thus v3 is not reducible, a contradiction.
We shall prove Theorem 4.1 in §4.D. In the next two sections we establish preliminaries technical results.
COMBINATORICS OF THE TAME AUTOMORPHISM GROUP
31
4.B. Reduction of a strongly pivotal simplex. First we describe the set-up
that we shall use in this section.
Set-Up 4.3. Let v1 , v2 , v3 be a simplex in C with Strong Pivotal Form ↺(s) for
some odd s ⩾ 3. We choose some good representatives v1 = [f2 ], v2 = Jf1 , f2 K and
v3 = Jf1 , f2 , f3 K. Condition (↺1) means that
deg f1 = sδ,
deg f2 = 2δ.
By (↺3) we have deg f1 > deg f3 . we have
deg f3 ⩾ (s − 2)δ + deg df1 ∧ df2 .
Condition (↺2) is equivalent to the condition
deg f3 /∈ N deg f2 .
Since deg f3 > (s − 2)δ ⩾ δ, we also obtain
deg f32 > deg f2 and deg f2 ∈/ N deg f3 .
(4.4)
deg f1 /∈ N deg f3 except if s = 3 and deg f1 = 2 deg f3 .
(4.5)
In particular, as already noticed in Lemma 3.6, the minimal line m2 = Jf2 , f3 K of v3
has no inner resonance. Observe also that
Lemma 4.6. Assume Set-Up 4.3. Then v3 does not admit a normal proper Kreduction.
Proof. Assume v3 admits a normal proper K-reduction, via w3 . Then we get a
contradiction as follows:
d(m2 ) > deg(w3 ∖ m2 )
⩾ deg(v3 ∖ m2 )
> deg(v3 ∖ v2 ) ⩾ ∆(v2 )
> d(v2 ) > d(m2 )
by Lemma 3.9(1)
by (K5′ )
by (↺3) and (↺4)
by (3.23) in Lemma 3.15.
Lemma 4.7. Assume Set-Up 4.3, and deg f1 ≠ 2 deg f3 . Assume that v3 admits a
weak elementary reduction v3′ with center v2′ . Then v2′ passes through v1 .
Proof. By contradiction, assume that v2′ does not pass through v1 . Recall that
v1 = [f2 ] and v2 = Jf1 , f2 K with deg f1 > deg f2 . Up to replacing f1 by f1 + af2 for
some a ∈ k, we can assume v2 ∩ v2′ = [f1 ] while keeping all the properties stated in
Set-Up 4.3. Then let [h3 ] = [f3 + af2 ] be the intersection of v2′ with the minimal line
Jf2 , f3 K of P2 (v3 ). Then we have v2′ = Jf1 , h3 K, v3 = [f1 , f2 , h3 ], and by Lemma 3.3
v3′ = Jf1 , f2 + ϕ2 (f1 , h3 ), h3 K for some non-affine polynomial ϕ2 , with deg f1 > deg f2 ⩾
deg ϕ2 (f1 , h3 ). We have either deg f2 = deg h3 or deg f3 = deg h3 , hence in any case
by (4.4)
degvirt ϕ2 (f1 , h3 ) > deg ϕ2 (f1 , h3 ).
In particular ϕ2 (f1 , h3 ) /∈ k[h3 ], and then the inequality deg f1 > deg f2 implies
degvirt ϕ2 (f1 , h3 ) > deg f2 .
By Lemma 2.8 there exist coprime q > p such that
q deg h3 = p deg f1 = psδ.
Moreover if p = 1, we would have deg h3 = deg f3 and deg f1 = 2 deg f3 , in contradiction with our assumption. Hence we have q > p ⩾ 2.
COMBINATORICS OF THE TAME AUTOMORPHISM GROUP
32
Observe that even if (f2 , h3 ) is not a good representative of the minimal line in
P2 (v3 ), in any case we have deg h3 ⩾ deg(v3 ∖ v2 ) = deg f3 , and Property (↺4) gives
deg h3 ⩾ (s − 2)δ + deg df1 ∧ df2 .
Then Corollary 2.13 yields:
2δ = deg f2 ⩾ deg(f2 + ϕ2 (f1 , h3 )) ⩾ q deg h3 − deg df1 ∧ df2 − deg h3
⩾ q deg h3 − deg h3 + (s − 2)δ − deg h3 .
Multiplying by q and replacing q deg h3 = psδ we get:
0 ⩾ (pqs − 2ps + sq − 4q)δ,
hence
0 ⩾ ps(q − 2) + q(s − 4).
This implies s = 3, and we get the contradiction:
0 ⩾ 3pq − 6p − q = (3p − 1)(q − 2) − 2 ⩾ 5 − 2.
Lemma 4.8. Assume Set-Up 4.3. Assume that v3 admits an elementary reduction
v3′ with center m2 , the minimal line of v3 . Assume moreover that v3′ is reducible.
Then v3′ also admits an elementary reduction with center m2 .
Proof. By Lemma 3.3 we can write v3′ = Jf1′ , f2 , f3 K, where f1′ has the form
f1′ = f1 + ϕ1 (f2 , f3 )
for some non-affine polynomial ϕ1 , with deg f1 = deg ϕ1 (f2 , f3 ) > deg f1′ . Without
loss in generality we can assume that ϕ1 has no constant term. Moreover we can
also assume
(4.9)
deg f1′ ∈/ N deg f2 + N deg f3 ,
otherwise the result is immediate.
Working with the good triangle associated with the representative (f1′ , f2 , f3 ), we
want to prove that v3′ does not admit a K-reduction, nor an elementary reduction
with center Jf1′ , f2 K or Jf1′ , f3 K: Indeed since v3′ is reducible by assumption, the only
remaining possibility will be that v3′ admits an elementary reduction with center
m2 = Jf2 , f3 K, as expected. The proof is quite long, so we prove several facts along
the way. The first one is:
Fact 4.10. If degvirt ϕ1 (f2 , f3 ) > deg ϕ1 (f2 , f3 ) then Lemma 4.8 holds.
Proof. If degvirt ϕ1 (f2 , f3 ) > deg ϕ1 (f2 , f3 ) then by Lemma 2.8, there exist coprime
p, q such that q deg f2 = p deg f3 . Observe that (↺2) and (4.4) imply p, q ≠ 1. We
have
sδ = deg f1 > deg f1′ = deg(f1 + ϕ1 (f2 , f3 ))
> p deg f3 − deg df1 ∧ df2 − deg f3
⩾ p deg f3 − (deg f3 − (s − 2)δ)) − deg f3
= (p − 2) deg f3 − 2δ + sδ.
by Lemma 3.3
by Corollary 2.13
by (↺4)
Multiplying by p, recalling that deg f2 = 2δ, p deg f3 = q deg f2 and putting δ in factor
we get:
0 > 2q(p − 2) − 2p = (2p − 4)(q − 1) − 4 ⩾ 2p − 8.
(4.11)
It follows that 3 ⩾ p. Now we deduce p = 3. If p = 2, then deg f3 = qδ. Condition
(↺4) gives
sδ > deg f3 > (s − 2)δ,
COMBINATORICS OF THE TAME AUTOMORPHISM GROUP
33
so q = s − 1, which contradicts q coprime with 2.
Replacing p = 3 in the first inequality of (4.11) we get 6 > 2q, hence q = 2. We
obtain deg f3 = 34 δ, and the condition deg f3 > (s − 2)δ yields s = 3. Finally
deg f1 = 3δ,
deg f2 = 2δ,
deg f3 = 34 δ,
3δ > deg f1′ > 37 δ.
(4.12)
v3′
First we observe that these values are not compatible with
admitting a Kreduction. Indeed, by Corollary 3.8 an elementary K-reduction would imply 2 deg f1′ =
s′ deg fj for some odd integer s′ ⩾ 3 and j ∈ {2, 3}, and one checks from (4.12) that
′
there is no such relation. Indeed if s′ = 3, we have 2 deg f1 > 14
3 δ > 4δ = s deg f3 ,
′
′
and if s′ ⩾ 5 we have s′ deg f3 ⩾ 20
3 δ > 6δ > 2 deg f1 . Finally, for any s ⩾ 3 we have
′
′
s deg f2 ⩾ 6δ > 2 deg f1 .
Now if v3′ admits a normal proper K-reduction, then, noting that deg f1′ > deg f2 >
deg f3 , there should exist δ′ ∈ N3 such that all the conclusions of Lemma 3.15 hold,
with f1′ , f2 , f3 , δ′ instead of f1 , f2 , f3 , δ. In particular (3.19) gives deg f2 = 2δ′ , hence
δ′ = δ. Now since 3δ > deg f1′ , by (3.19) and (3.20) from Lemma 3.15 would imply
deg f3 = 23 δ, incompatible with deg f3 = 34 δ.
On the other hand, if v3′ admits an elementary reduction with center Jf1′ , fj K with
j = 2 or 3, then, denoting by k the integer such that {j, k} = {2, 3}, there would exist
a non-affine polynomial ϕ such that deg fk > deg(fk + ϕ(f1′ , fj )), and in particular
deg f1′ > deg fk = deg ϕ(f1′ , fj ). Since Jf2 , f3 K has no inner resonance this implies
ϕ(f1′ , fj ) ∈/ k[fj ], so that degvirt ϕ(f1′ , fj ) ⩾ deg f1′ , and finally degvirt ϕ(f1′ , fj ) >
deg ϕ(f1′ , fj ). Now by (4.9) we can apply Corollary 2.10(3) to get an odd integer
q ′ ⩾ 3 such that 2 deg f1′ = q ′ deg fj : again this is not compatible with (4.12).
From now on we assume degvirt ϕ1 (f2 , f3 ) = deg ϕ1 (f2 , f3 ).
Fact 4.13. deg f1 = 2 deg f3 .
Proof. By contradiction, assume deg f1 ≠ 2 deg f3 . Then deg f1 ∈/ N deg f3 by (4.5).
Moreover we know that deg f1 ∈/ N deg f2 and deg f2 + deg f3 > deg f1 . This is not
compatible with the equalities
deg f1 = deg ϕ1 (f2 , f3 ) = degvirt ϕ1 (f2 , f3 ).
We deduce from (4.5) and Fact 4.13 that s = 3, so that
deg f1 = 3δ,
deg f2 = 2δ,
deg f3 = 32 δ,
and there exist a, c, e ∈ k such that (recall that ϕ1 has no constant term):
ϕ1 (f2 , f3 ) = af32 + cf3 + ef2 with a ≠ 0.
Now come some technical facts.
Fact 4.15. deg df1 ∧ df3 = deg df1′ ∧ df3 = δ + deg df2 ∧ df3 .
Proof. Recall from Set-Up 4.3 that we have 32 δ = deg f3 > deg df1 ∧ df2 , so
3δ > deg f3 + deg df1 ∧ df2 .
Since deg f1 = 3δ we get
deg f1 + deg df2 ∧ df3 > deg f3 + deg df1 ∧ df2 .
By the Principle of Two Maxima 2.15 we have
deg f2 + deg df1 ∧ df3 = deg f1 + deg df2 ∧ df3 .
(4.14)
COMBINATORICS OF THE TAME AUTOMORPHISM GROUP
34
Passing deg f2 to the right-hand side we get one of the expected equalities
deg df1 ∧ df3 = deg f1 − deg f2 + deg df2 ∧ df3 = δ + deg df2 ∧ df3 .
From (4.14) we get
df1′ ∧ df3 = df1 ∧ df3 + e df2 ∧ df3 .
By the previous equality we obtain deg df1 ∧ df3 = deg df1′ ∧ df3 .
Fact 4.16. deg df1′ ∧ df2 = 32 δ + deg df2 ∧ df3 .
Proof. From (4.14) we get
df1′ ∧ df2 = df1 ∧ df2 + 2af3 df3 ∧ df2 + c df3 ∧ df2 .
By (↺4) we have deg f3 > deg df1 ∧ df2 , so 2af3 df3 ∧ df2 has strictly larger degree
than the two other terms of the right-hand side. Finally,
deg df1′ ∧ df2 = deg f3 df3 ∧ df2 = 23 δ + deg df2 ∧ df3 .
Fact 4.17. deg f1′ > δ.
Proof. Consider P = f1 + ay 2 + cy + ef2 ∈ k[f1 , f2 ][y]. We have
degvirt P (f3 ) = deg f1 > deg f1′ = deg P (f3 ).
On the other hand P ′ = 2ay + c, so that degvirt P ′ (f3 ) = deg P ′ (f3 ) = deg f3 . Thus
m(P, f3 ) = 1, and the Parachute Inequality 2.6 yields
deg f1′ = deg P (f3 ) ⩾ degvirt P (f3 ) + deg df1 ∧ df2 ∧ df3 − deg df1 ∧ df2 − deg f3
> deg f1 − deg df1 ∧ df2 − deg f3
= deg f3 − deg df1 ∧ df2 .
Recall that by (↺4) we have
deg f3 ⩾ deg f1 − deg f2 + deg df1 ∧ df2 = δ + deg df1 ∧ df2 .
Replacing in the previous inequality we get the result.
Fact 4.18. The vertices Jf1′ , f2 K and Jf1′ , f3 K do not have outer resonance in v3′ =
Jf1′ , f2 , f3 K.
Proof. We have (the last inequality is Fact 4.17):
deg f2 = 2δ,
deg f3 = 23 δ,
deg f1′ > δ.
Moreover these degrees are pairwise distinct, because (f1′ , f2 , f3 ) is a good representative of v3′ . This implies that deg f3 is not a N-combination of deg f1′ and deg f2 ,
and deg f2 is not a N-combination of deg f1′ and deg f3 .
Now we are ready to finish the proof of Lemma 4.8. Observe that by Lemma 3.27,
to prove that v3′ does not admit a K-reduction it is sufficient to exclude normal Kreductions. Recall also that from Facts 4.15 and 4.16 we have
deg f1′ ∧ f2 > deg f1′ ∧ f3 > deg f2 ∧ f3 .
(4.19)
Fact 4.20. v3′ does not admit an elementary K-reduction.
Proof. By contradiction, assume that v3′ admits an elementary K-reduction. By
(4.19) and Corollary 3.13(1), it follows that the center of the reduction is Jf2 , f3 K.
But then by Corollary 3.8 we should have 2 deg f2 = s′ deg f3 for some odd integer
s′ ⩾ 3, and this is not compatible with deg f2 = 2δ and deg f3 = 23 δ.
Fact 4.21. v3′ does not admit a normal proper K-reduction.
COMBINATORICS OF THE TAME AUTOMORPHISM GROUP
35
Proof. By contradiction, assume that v3′ admits a normal proper K-reduction u3 via
w3 . By comparing (4.19) with (3.22) from Lemma 3.15, we obtain that the center
v2′ of v3′ ≬ w3 is equal to v2′ = Jf2 , f3 K, that v2′ is the minimal line of v3′ , and that
deg w3 = 3δ + deg f2 + deg f3 = deg v3 . Since Jf2 , f3 K is also the minimal line of v3 , we
get that u3 is also a proper K-reduction of v3 via w3 . This is a contradiction with
Lemma 4.6.
Now we are left with the task of proving that v3′ does not admit an elementary
reduction with center Jf1′ , f2 K or Jf1′ , f3 K.
Fact 4.22. v3′ does not admit an elementary reduction with center Jf1′ , f2 K.
Proof. By contradiction, assume there exists ϕ3 (f1′ , f2 ) such that
deg ϕ3 (f1′ , f2 ) = deg f3 .
By Fact 4.18 we have degvirt ϕ3 (f1′ , f2 ) > deg ϕ3 (f1′ , f2 ), and on the other hand
Proposition 3.7(1) gives
3
2δ
= deg f3 = deg ϕ3 (f1′ , f2 ) > deg df1′ ∧ df2 .
This is a contradiction with Fact 4.16.
Fact 4.23. v3′ does not admit an elementary reduction with center Jf1′ , f3 K.
Proof. By contradiction, assume there exists ϕ2 (f1′ , f3 ) such that deg f2 > deg(f2 +
ϕ2 (f1′ , f3 )), which implies
deg ϕ2 (f1′ , f3 ) = deg f2 .
By Fact 4.18 we have degvirt ϕ2 (f1′ , f3 ) > deg ϕ2 (f1′ , f3 ). By Lemma 2.8 there exist
coprime p, q ∈ N∗ and γ ∈ N3 such that
deg f1′ = pγ,
deg f3 = qγ.
Corollary 2.10(1) then yields
2δ = deg f2 = deg ϕ2 (f1′ , f3 ) ⩾ pqγ + deg df1′ ∧ df3 − pγ − qγ.
By Fact 4.15 we know that deg df1′ ∧ df3 = δ + deg df2 ∧ df3 , so that
δ ⩾ deg df2 ∧ df3 + (pq − p − q)γ.
(4.24)
We know that qγ = deg f3 = 23 δ > δ, and by Fact 4.17 we have pγ = deg f1′ > δ, so
min{p, q} > pq − p − q.
By Fact 4.18 we know that p ≠ 1 and q ≠ 1. The only possibilities for the pair (p, q)
are then (2, 3) or (3, 2).
If (p, q) = (2, 3) then Fact 4.17 gives the contradiction
3δ = 2 deg f3 = 3 deg f1′ > 3δ.
If (p, q) = (3, 2), the equalities deg f1′ = 3γ and deg f3 = 2γ = 32 δ yield
γ = 43 δ,
deg f1′ = 94 δ,
pq − p − q = 1.
The inequality (4.24) becomes
δ
4
⩾ deg df2 ∧ df3 .
COMBINATORICS OF THE TAME AUTOMORPHISM GROUP
36
Corollary 2.13 then yields
deg(f2 + ϕ2 (f1′ , f3 )) > 2 deg f1′ − deg df2 ∧ df3 − deg f1′
⩾ ( 94 − 41 ) δ
= 2δ.
This is a contradiction with 2δ = deg f2 > deg(f2 + ϕ2 (f1′ , f3 )).
This finishes the proof of Lemma 4.8.
We now introduce an induction hypothesis that will be the corner-stone for the
proof of the Reducibility Theorem 4.1.
Induction Hypothesis 4.25 (for degrees ν, µ in N3 ). Let v3 be a reducible vertex
such that ν ⩾ deg v3 . Then any neighbor u3 of v3 with µ ⩾ deg u3 also is reducible.
We shall refer to this situation by saying that we can apply the (ν, µ)-Induction
Hypothesis 4.25 to v3 ≬ u3 .
Lemma 4.26. Let µ > ν ∈ N3 be two consecutive degrees, and assume Induction
Hypothesis 4.25 for degrees ν, ν. Let v3 be a reducible vertex distinct from [id], with
µ ⩾ deg v3 , and let T be a good triangle for v3 . Then there exists a reducible vertex
u3 such that
● either u3 is an optimal elementary T -reduction or an optimal elementary
K-reduction of v3 ;
● or u3 is a normal proper K-reduction of v3 .
Proof. Let v3 (1) be the first step of a reduction path from v3 , with respect to the
triangle T . By this we mean that v3 (1) is a reducible vertex that is either a T elementary reduction of v3 , or a K-reduction of v3 .
First assume that v3 (1) is an elementary reduction of v3 . If this reduction is
optimal, we can take u3 = v3 (1) and we are done. If the reduction is non-optimal,
denote by v2 the center of v3 ≬ v3 (1). Then let u3 be an optimal elementary
reduction of v3 with the same center v2 . Since µ > ν are two consecutive degrees,
the inequalities
µ ⩾ deg v3 ,
deg v3 > deg v3 (1)
and
deg v3 > deg u3
imply
ν ⩾ deg v3 (1) and ν ⩾ deg u3 .
By the (ν, ν)-Induction Hypothesis 4.25 applied to v3 (1) ≬ u3 we get that u3 is
reducible, as expected. Moreover since u3 is an elementary reduction with center v2 ,
by construction u3 is an optimal elementary T -reduction or an optimal elementary
K-reduction of v3 .
Now assume that v3 (1) is a proper K-reduction of v3 . If this reduction is normal,
we are done. Otherwise, by Lemma 3.27, there exists u′3 an elementary K-reduction
of v3 , such that u′3 ≬ v3 (1). By the (ν, ν)-Induction Hypothesis 4.25 applied to
v3 (1) ≬ u′3 we get that u′3 is reducible. So we can take u′3 as the first step of a
reduction path from v3 , and we are reduced to the first case of the proof.
Proposition 4.27. Let µ > ν ∈ N3 be two consecutive degrees, and assume Induction
Hypothesis 4.25 for degrees ν, ν. Let v3 be a vertex that is part of a simplex v1 , v2 , v3
with Strong Pivotal Form ↺(s) for some odd s ⩾ 3. Let T be any good triangle
compatible with the simplex v1 , v2 , v3 . Assume that v3 is reducible, and that µ ⩾
deg v3 . Then
COMBINATORICS OF THE TAME AUTOMORPHISM GROUP
37
(1) There exists a reduction path from v3 to [id] that starts with an elementary
T -reduction or an elementary K-reduction;
(2) Any elementary T -reduction or elementary K-reduction of v3 admits v2 as
a center;
(3) Any optimal elementary T -reduction of v3 is an elementary K-reduction;
(4) There exists an elementary K-reduction u3 of v3 with center v2 , such that
u3 is reducible.
Proof. Let v3 (1) be the first step of a reduction path from v3 to [id], with respect to
the choice of good triangle T . By Lemma 4.26 we can assume that if this first step
is a K-reduction, then it is a normal K-reduction. Moreover we know from Lemma
4.6 that v3 does not admit any normal proper K-reduction. This gives (1).
We write v3 = Jf1 , f2 , f3 K as in Set-Up 4.3, such that the triangle T corresponds
to the choice of representative (f1 , f2 , f3 ). The remaining possibilities for the first
step v3 (1) of the reduction path are:
(i) An elementary T -reduction with center Jf2 , f3 K;
(ii) An elementary T -reduction with center Jf1 , f3 K;
(iii) An elementary K-reduction;
(iv) An elementary T -reduction with center v2 = Jf1 , f2 K.
In case (i), by Lemma 4.26 we can moreover assume that the elementary reduction
is optimal. Then Lemma 4.8 gives a contradiction.
In case (ii), Lemma 4.7 implies that deg f1 = 2 deg f3 , so there exists a ∈ k such
that w3 ∶= [f1 + af32 , f2 , f3 ] satisfies deg v3 > deg w3 . By the Square Lemma 3.4, there
exists u3 such that u3 ≬ w3 , u3 ≬ v3 (1) and deg v3 > deg u3 . By the (ν, ν)-Induction
Hypothesis 4.25 applied successively to v3 (1) ≬ u3 and u3 ≬ w3 , we obtain that w3
is reducible, and so could be chosen as the first step of a reduction path. We are
reduced to case (i), which leads to a contradiction.
In case (iii), by Lemma 3.9(1) we have
d(m2 ) > topdeg v3 .
Moreover by (↺4) we have
topdeg v3 > deg(v3 ∖ v2 ) ⩾ ∆(v2 ) > d(v2 ).
By Corollary 3.13(2) we conclude that v2 is the center of the K-reduction, hence we
also are in case (iv), which gives (2).
Now assume that u3 is an optimal elementary T -reduction of v3 . By (2), we
know that the center of this reduction is v2 , and by the (ν, ν)-Induction Hypothesis
4.25 applied to v3 (1) ≬v2 u3 , we get that u3 is reducible. We want to prove that
∆(v2 ) > deg(u3 ∖ v2 ), that is, Property (K4), which will imply that u3 is a Kreduction of v3 . By contradiction, assume deg(u3 ∖ v2 ) ⩾ ∆(v2 ), which is condition
(↺4) for the simplex v1 , v2 , u3 . Moreover conditions (↺1) and (↺3) for the simplex
v1 , v2 , u3 directly follow from the analogous conditions for the simplex v1 , v2 , v3 , and
condition (↺2) follows from the optimality of the reduction u3 . Thus v1 , v2 , u3 has
Strong Pivotal Form ↺(s), and from assertions (1) and (2) we conclude that u3
admits an elementary reduction with center v2 . This contradicts the optimality of
the reduction from v3 to u3 , and so we obtain (3).
Finally to prove (4), consider a first step of a reduction path from v3 to [id],
with respect to the good triangle T , as given by Lemma 4.26. By Lemma 4.6 this
first step is not a normal proper K-reduction, so that it is an optimal elementary
reduction, hence by (3) this is an elementary K-reduction, as expected.
COMBINATORICS OF THE TAME AUTOMORPHISM GROUP
38
Corollary 4.28. Let µ > ν ∈ N3 be two consecutive degrees, and assume Induction
Hypothesis 4.25 for degrees ν, ν. Let v3 be a reducible vertex with µ ⩾ deg v3 , and assume that u3 is an optimal elementary reduction of v3 with pivotal simplex v1 , v2 , v3 .
If v2 has no inner resonance, and no outer resonance in v3 , then either v2 is the
minimal line of v3 , or u3 is an elementary K-reduction of v3 .
Proof. Assume v2 is not the minimal line of v3 . By Proposition 3.7(2), the simplex
v1 , v2 , v3 has Strong Pivotal Form. Let T be a good triangle compatible with the
simplex v1 , v2 , v3 . In particular u3 is an optimal elementary T -reduction of v3 , so
we can conclude by Proposition 4.27(3).
4.C. Vertex with two low degree neighbors.
Set-Up 4.29. Let µ > ν ∈ N3 be two consecutive degrees, and assume the Induction
Hypothesis 4.25 for degrees ν, µ. Let v3 , v3′ , v3′′ be vertices such that
●
●
●
●
µ ⩾ deg v3 , deg v3 > deg v3′ (hence ν ⩾ deg v3′ ), deg v3 ⩾ deg v3′′ ;
v3′ ≬v2′ v3 and v3′′ ≬v2′′ v3 with v2′ ≠ v2′′ ;
v3′ is reducible (hence v3 also is by the (ν, µ)-Induction Hypothesis);
v2′ is minimal, in the sense that if u3 is an elementary reduction of v3 with
center u2 , which is the first step of a reduction path, then deg u2 ⩾ deg v2′ .
We denote by v1 = [f2 ] the intersection point of the lines v2′ and v2′′ . We fix choices
of f1 , f3 such that v2′ = Jf1 , f2 K and v2′′ = Jf2 , f3 K. Observe that it is possible that
deg f1 = deg f3 , and in this case (f1 , f2 , f3 ) is not a good representative of v3 . In any
case by Lemma 3.3 there exist some non-affine polynomials in two variables P1 , P3
such that (see Figure 7):
v3 = [f1 , f2 , f3 ];
v3′ = Jf1 , f2 , f3 + P3 (f1 , f2 )K;
v3′′ = Jf1 + P1 (f2 , f3 ), f2 , f3 K.
v3 =[f1 ,f2 ,f3 ]
v2′′ =Jf2 ,f3 K
●
●
v3′′ =Jf1 +P1 (f2 ,f3 ),f2 ,f3 K
v2′ =Jf1 ,f2 K
v3′ =Jf1 ,f2 ,f3 +P3 (f1 ,f2 )K
v1 =[f2 ]
Figure 7. Set-Up 4.29.
In this section we shall prove:
Proposition 4.30. Assume Set-Up 4.29. Then v3′′ is reducible.
We divide the proof in several lemmas. The proposition will be a direct consequence of Lemmas 4.32, 4.33, 4.34 and 4.35. We start with a consequence from the
minimality of v2′ .
Lemma 4.31. Assume Set-Up 4.29. If v2′ has inner resonance, then v2′ is the minimal line of v3 .
COMBINATORICS OF THE TAME AUTOMORPHISM GROUP
39
Proof. Assume first that there exists a ∈ k and r ⩾ 2 such that deg f2 > deg(f2 +af1r ).
Then consider the vertex w3 = [f1 , f2 + af1r , f3 ], which satisfies deg v3 > deg w3 .
Assume by contradiction that v2′ is not the minimal line of v3 . Then we have
deg f2 > deg f3 , hence m2 = [f1 , f3 ] is the minimal line of v3 . By the Square Lemma
3.4, we find u3 such that u3 ≬ w3 , u3 ≬ v3′ and deg v3 > deg u3 . By applying the
(ν, µ)-Induction Hypothesis 4.25 successively to v3′ ≬ u3 and u3 ≬ w3 , we find that
w3 is reducible. So we can take w3 as the first step of a reduction path from v3 ,
which contradicts the minimality of v2′ .
Now assume that there exist a ∈ k∗ and r ⩾ 2 such that deg f1 > deg(f1 + af2r ). If
′
v2 is not the minimal line, we have deg f1 ⩾ deg f3 .
If deg f1 = deg f3 , there exists b ∈ k∗ such that deg f1 > deg(f1 + bf3 ). Then
[f2 , f1 + bf3 ] is the minimal line of v3 , and we consider w3′ = [f1 + af2r , f2 , f1 + bf3 ],
which satisfies deg v3 > deg w3′ . As above, by the Square Lemma 3.4 and the (ν, µ)Induction Hypothesis 4.25, we obtain that w3′ can be chosen to be the first step of
a reduction path from v3 . This contradicts the minimality of v2′ .
If deg f1 > deg f3 , v2′′ = Jf2 , f3 K is the minimal line of v3 . We consider w3′′ =
[f1 + af2r , f2 , f3 ] which satisfies deg v3 > deg w3′′ . As before w3′′ can be chosen to be
the first step of a reduction path from v3 , with center v2′′ : again this contradicts the
minimality of v2′ .
Lemma 4.32. Assume Set-Up 4.29. If v2′ is not the minimal line in v3 , and has
outer resonance in v3 , then v3′′ is reducible.
Proof. Since v2′ = Jf1 , f2 K is not the minimal line in v3 , one of the degrees deg f1 or
deg f2 must realize the top degree of v3 .
First consider the case deg f2 = topdeg v3 . In this case, we have deg f1 ≠ deg f3 .
Indeed, assuming by contradiction that deg f1 = deg f3 , there would exist α ∈ k∗ such
that f3′ = f3 − αf1 satisfies deg f3 > deg f3′ . Then, we would have deg f2 > deg f1 >
deg f3′ , and the line v2′ = Jf1 , f2 K could not have outer resonance in v3 . Therefore,
(f1 , f2 , f3 ) is a good representative of v3 , and the assumption on outer resonance
means that deg f3 = deg f1r for some r ⩾ 2. Recall that by Lemma 3.3, the nonaffine polynomial P1 ∈ k[y, z] associated with the weak elementary reduction v3′′
of v3 satisfies deg f1 ⩾ P1 (f2 , f3 ). We have deg f2 /∈ N deg f3 , otherwise we would
have deg f2 ∈ N deg f1 , that is, v2′ would have inner resonance, and by Lemma 4.31
this would contradict v2′ ≠ m2 . Corollary 2.10(3) then gives 2 deg f2 = 3 deg f3 ,
and deg(v3 ∖ v2′′ ) ⩾ ∆(v2′′ ). But then the existence of δ ∈ N such that deg f2 =
3δ, deg f3 = 2δ and deg f1 > δ is not compatible with the existence of r ⩾ 2 such that
deg f3 = r deg f1 : contradiction.
Now consider the case deg f1 = topdeg v3 . In particular deg f1 > deg f2 and v1 =
[f2 ] is on the minimal line of v3 . Now we distinguish two subcases (see Figure 8):
● Case deg f1 > deg f3 . Then there exist a ∈ k and r ⩾ 2 such that deg f3 >
deg(f3 + af2r ), and v2′′ is the minimal line of v3 . We apply the Square Lemma 3.4 to
get u3 a common neighbor of v3′′ and w3′ = [f1 , f2 , f3 + af2r ] satisfying deg v3 > deg u3 ,
and then we conclude by the (ν, µ)-Induction Hypothesis 4.25 applied successively
to w3′ ≬ u3 and u3 ≬ v3′′ .
● Case deg f1 = deg f3 . Then there exists b ∈ k∗ such that deg f1 > deg(bf1 + f3 ).
As in the first case of the proof, the assumption on outer resonance implies that
(f1 , f2 , f3 + bf1 ) is a good representative of v3 , and there exists r ⩾ 2 such that
deg(bf1 +f3 ) = deg f2r . Then there exists a ∈ k such that u′3 = [f1 , f2 , bf1 +f3 +af2r ] and
u′′3 = [bf1 + f3 + af2r , f2 , f3 ] are (simple) elementary reductions of v3 with respective
centers v2′ and v2′′ . Moreover u′3 and u′′3 are neighbors, with center [bf1 + f3 + af2r , f2 ].
COMBINATORICS OF THE TAME AUTOMORPHISM GROUP
v3
40
v3
v3′
v3′′
●
●
●
●
●
v3′′
w3′
●
u′′
3
v3′
u′3
●
u3
deg f1 > deg f3
deg f1 = deg f3
Figure 8. Lemma 4.32, case deg f1 = topdeg v3 .
Again we conclude by applying the (ν, µ)-Induction Hypothesis 4.25 to v3′ ≬ u′3 ,
u′3 ≬ u′′3 and u′′3 ≬ v3′′ successively.
We conclude the case where v2′ is not equal to the minimal line m2 of v3 with the
following:
Lemma 4.33. Assume Set-Up 4.29, v2′ ≠ m2 (where m2 is the minimal line in v3 ),
and has no outer resonance in v3 . Then there exists u3 an elementary K-reduction
of v3 with center v2′ . Moreover, v3′′ is reducible, and there exists a reduction path
starting with a proper K-reduction from v3′′ to u3 .
Proof. By Lemma 4.31, we know that v2′ has no inner resonance. Then Corollary 4.28
says that any optimal elementary reduction u3 of v3 with center v2′ is an elementary
K-reduction. By the (ν, µ)-Induction Hypothesis 4.25 applied to v3′ ≬ u3 , we get
that u3 is reducible. The last assertion follows by the Stability of K-reductions 3.35,
Case (1) or (2).
Now we treat the situation where v2′ = m2 is the minimal line of v3 , and first we
identify some cases that we can handle with the Square Lemma 3.4.
Lemma 4.34. Assume Set-Up 4.29, and v2′ = m2 . In the following cases, v3′′ is
reducible:
(1) v3 admits a simple elementary reduction with simple center v2′ , v1 ;
(2) v3 admits a simple elementary reduction with simple center v2′′ , v1 ;
(3) v3′′ is a simple weak elementary reduction of v3 with simple center v2′′ , v1 .
v3
v3′′
●
v2′
●
v3′
v3′′
w3′
w3′′
v3
v2′′
●
●
v3′
v3′′
●
v1
v1
●
v3
v2′′
●
u3
Case (1)
●
●
u3
Case (2)
●
v3′
v1
●
●
u3
Case (3)
Figure 9. Lemma 4.34.
Proof. Since m2 = Jf1 , f2 K, we have v3 = Jf1 , f2 , f3 K with deg f3 = topdeg v3 .
COMBINATORICS OF THE TAME AUTOMORPHISM GROUP
41
(1) Denote by w3′ a simple elementary reduction of v3 with simple center v2′ , v1 .
By the Square Lemma 3.4, there exists u3 a neighbor of both w3′ and v3′′ such that
deg v3 > deg u3 (see Figure 9). Then we conclude by applying the (ν, µ)-Induction
Hypothesis 4.25 successively to v3′ ≬ w3′ , w3′ ≬ u3 and u3 ≬ v3′′ .
(2) Denote by w3′′ a simple elementary reduction of v3 with simple center v2′′ , v1 .
By the Square Lemma 3.4, there exists u3 a neighbor of both w3′′ and v3′ such that
deg v3 > deg u3 . Then we conclude by applying the (ν, µ)-Induction Hypothesis 4.25
successively to v3′ ≬ u3 , u3 ≬ w3′′ and w3′′ ≬ v3′′ .
(3) By the Square Lemma 3.4, there exists u3 a neighbor of both v3′′ and v3′ such
that deg v3 > deg u3 . Again the (ν, µ)-Induction Hypothesis 4.25 applied successively
to v3′ ≬ u3 and u3 ≬ v3′′ yields that v3′′ is reducible.
The last logical step to finish the proof of Proposition 4.30 is the following lemma.
However, we should mention that we will be able to prove a posteriori that this case
never happens: see Corollary 5.4.
Lemma 4.35. Assume Set-Up 4.29, v2′ = m2 , and that we are not in one of the
cases covered by Lemma 4.34. Then there exists u′′3 an elementary K-reduction of
v3 with center v2′′ such that u′′3 is reducible. In particular, by the (ν, µ)-Induction
Hypothesis 4.25, v3′′ is reducible.
Proof. It is sufficient to check that the simplex v1 , v2′′ , v3 has Strong Pivotal Form
↺(s) for some odd s ⩾ 3: Indeed then one can apply Proposition 4.27(4) to get the
result.
On the one hand deg f3 > deg f1 ⩾ deg P1 (f2 , f3 ), and on the other hand since we
are not in the situation of Lemma 4.34(3) we have P1 (f2 , f3 ) ∈/ k[f2 ], so that
degvirt P1 (f2 , f3 ) > deg P1 (f2 , f3 ).
We also have deg f3 ∈/ N deg f2 since otherwise we could apply Lemma 4.34(1). So
we are in the hypotheses of Corollary 2.10(3), and there exist a degree δ ∈ N3 and
an odd integer s ⩾ 3 such that deg f2 = 2δ, deg f3 = sδ and
sδ > deg P1 (f2 , f3 ) ⩾ ∆(f3 , f2 ).
It remains to check (↺2): if v2′′ = Jf2 , f3 K had outer resonance in v3 then we would
have deg f1 ∈ N deg f2 , and we could apply Lemma 4.34(2), contrary to our assumption.
4.D. Proof of the Reducibility Theorem. Clearly Theorem 4.1 is a corollary of
Proposition 4.36. If a vertex v3 of type 3 in the complex C is reducible, then any
neighbor of v3 also is reducible.
Proof. We plan to prove Proposition 4.36 by induction on degree: we need to prove
that for any ν ∈ N3 , the Induction Hypothesis 4.25 holds for degrees ν, ν. Clearly
when ν = (1, 1, 1) this is true (because empty!).
Let µ > ν be two consecutive degrees in N3 . It is sufficient to prove the two
following facts.
Fact 4.37. Assume the Induction Hypothesis 4.25 for degrees ν, ν. Then it also
holds for degrees ν, µ.
Fact 4.38. Assume the Induction Hypothesis 4.25 for degrees ν, µ. Then it also
holds for degrees µ, µ.
COMBINATORICS OF THE TAME AUTOMORPHISM GROUP
42
To prove Fact 4.37, consider v3′ a reducible vertex with ν ⩾ deg v3′ , and let v3 be
a neighbor of v3′ , with center v2′ , and with deg v3 = µ (otherwise there is nothing to
prove). We want to prove that v3 is reducible.
If v2′ is the minimal line of v3 , then v3′ is a T -reduction of v3 for any good triangle
T and we are done.
If v2′ is not the minimal line of v3 , and has no inner or outer resonance in v3 , then
by Corollary 4.28 any optimal reduction u3 of v3 with respect to the center v2′ is
an elementary K-reduction of v3 . Since u3 is a neighbor of v3′ and ν ⩾ deg u3 , we
conclude by the (ν, ν)-Induction Hypothesis 4.25 that u3 is reducible. Hence v3 also
is reducible, with first step of a reduction path the K-reduction to u3 .
Finally assume that v2′ has resonance, and that v2′ is not the minimal line of v3 .
By Lemma 3.3 we can write
v3 = Jf1 , f2 , f3 K,
v3′ = Jf1 , f2 , g3 K,
v2′ = Jf1 , f2 K,
with deg f1 > max{deg f3 , deg f2 } and g3 = f3 + P (f1 , f2 ) for some polynomial P .
If v2′ has inner resonance, then deg f1 = r deg f2 for some r ⩾ 2. There exists a ∈ k
such that v3′′ = [f1 + af2r , f2 , f3 ] is a simple elementary reduction of v3 with center
Jf2 , f3 K, which is the minimal line of v3 , hence belongs to any good triangle T . Then
we can apply the Square Lemma 3.4 to get u3 with ν ⩾ deg u3 and u3 ≬ v3′ , u3 ≬ v3′′ .
We conclude by the (ν, ν)-Induction Hypothesis 4.25, applied successively to v3′ ≬ u3
and u3 ≬ v3′′ , that v3′′ is reducible, hence v3 also is.
If v2′ has no inner resonance, but has outer resonance in v3 , then deg f1 > deg f3 >
deg f2 and deg f3 = r deg f2 for some r ⩾ 2. There exists Q(f2 ) such that deg f3 >
deg(f3 + Q(f2 )) and deg(f3 + Q(f2 )) ∈/ N deg f2 . Let T be a good triangle of v3 . One
of the lines in T has the form u2 = Jf1 + af3 , f2 K. Set u3 = Jf1 + af3 , f2 , f3 + Q(f2 )K,
which is an elementary T -reduction of v3 with center u2 , and a neighbor of w3 =
Jf1 , f2 , f3 + Q(f2 )K. By the (ν, ν)-Induction Hypothesis 4.25 applied successively to
v3′ ≬ w3 and w3 ≬ u3 , we obtain that u3 is reducible, hence v3 also is.
To prove Fact 4.38, consider v3 a reducible vertex with deg v3 = µ, and let v3′′ be
a neighbor of v3 , with center v2′′ , such that
deg v3 ⩾ deg v3′′ .
We want to prove that v3′′ is reducible.
First assume that v3 admits a reduction path such that the first step v3′ is an
elementary reduction, with center v2′ . Moreover we assume that v2′ has minimal
degree between all possible such first center of a reduction path. If v2′ = v2′′ , then v3′′
is a neighbor of v3′ and by the (ν, µ)-Induction Hypothesis 4.25 we are done. If on
the contrary v2′ and v2′′ are two different lines in P2 (v3 ), we are in the situation of
Set-Up 4.29. Then we conclude by Proposition 4.30.
Finally assume that v3 admits a reduction path such that the first step is a
proper K-reduction v3′ . If this proper K-reduction is normal, then by Stability of
K-reduction 3.35, Case (3) or (4), we obtain that v3′ is also a K-reduction of v3′′ ,
and we are done. On the other hand if v3′ is a non-normal proper K-reduction of v3 ,
then by Lemma 3.27 we get the existence of a vertex u3 that is both an elementary
K-reduction of v3 and a neighbor of v3′ . By applying the (ν, µ)-Induction Hypothesis
4.25 to v3′ ≬ u3 we get that u3 is reducible, and we are reduced to the previous case
of the proof.
COMBINATORICS OF THE TAME AUTOMORPHISM GROUP
43
5. Simple connectedness
In this section we prove that the complex C is simply connected, which amounts
to saying that the group Tame(A3 ) is the amalgamated product of three subgroups
along their pairwise intersections.
5.A. Consequences of the Reducibility Theorem. Now that the Reducibility
Theorem 4.1 is proved, all previous results that were dependent of a reducibility
assumption become stronger. This is the case in particular for:
● The Induction Hypothesis 4.25, which is always true;
● Lemma 4.8, which now implies that if v3 is part of a simplex with Strong
Pivotal Form, then v3 does not admit an elementary reduction with center
m2 the minimal line of v3 : see the proof of Proposition 5.1 below;
● Proposition 4.27 and Corollary 4.28;
● Set-Up 4.29, hence also all results in §4.C.
In particular we single out the following striking consequences of the Reducibility
Theorem 4.1.
Proposition 5.1. Let u3 be an elementary K-reduction of v3 , with center v2 . Then
v3 does not admit any elementary reduction with center distinct from v2 .
Proof. By contradiction, assume that v3′ is an elementary reduction of v3 , with center
v2′ distinct from v2 . Then by Stability of K-reduction 3.35, Case (1) or (2), there
exists w3′ with deg w3′ = deg v3 such that u3 is a proper K-reduction of v3′ via w3′ . In
particular, v3′ is an elementary reduction of w3′ with center m2 , the minimal line of
w3′ . Moreover, by Corollary 3.8, the pivotal simplex of this proper K-reduction has
Strong Pivotal Form. Now consider v3′′ an optimal elementary reduction of w3′ with
center m2 : Lemma 4.8 gives a contradiction.
Corollary 5.2. Let u3 be a proper K-reduction of v3 , via w3 . Then deg w3 = deg v3 .
Proof. By Proposition 5.1 we cannot have deg w3 > deg v3 .
Corollary 5.3. Let v3 admitting a K-reduction, then any line u2 in P (v3 ) has no
inner resonance. In other words, Case (2) in Corollary 3.28 never happens.
2
Proof. We use the notation v3 = Jf1 , f2 , f3 K from Corollary 3.28, which says that if
there exists a line in v3 with inner resonance, then deg f1 = 2 deg f3 and deg f1 =
3
2
2 deg f2 . But in this case we would have an elementary reduction [f1 + af3 , f2 , f3 ]
of v3 with center the minimal line Jf2 , f3 K ≠ v2 , in contradiction with Proposition
5.1
We also obtain that the situation of Lemma 4.35 never happens:
Corollary 5.4. Assume Set-Up 4.29, and v2′ = m2 . Then we are in one of the cases
covered by Lemma 4.34.
Proof. Otherwise by Lemma 4.35 there would exist an elementary K-reduction of
v3 with center v2′′ , in addition to the elementary reduction with center v2′ : This is
not compatible with Proposition 5.1.
5.B. Local homotopies. To prove the simple connectedness of C, the following
terminology will be convenient.
We call combinatorial path a sequence of vertices v3 (i), i = 0, . . . , n, such
that for all i = 0, . . . , n − 1, v3 (i) ≬ v3 (i + 1). Denoting by v2 (i) the center of
COMBINATORICS OF THE TAME AUTOMORPHISM GROUP
44
v3 (i) ≬ v3 (i + 1), we think of such a sequence as equivalent to a path γ∶ [0, 2n] → C
where for each i = 0, . . . , n − 1, the interval [2i, 2i + 2] is mapped isometrically onto
the union of the two edges v3 (i), v2 (i) and v2 (i), v3 (i + 1). In particular we have
these parameterizations in mind when we say that two such combinatorial paths are
homotopic in C. We say that a combinatorial path is locally geodesic if for all i,
v2 (i) ≠ v2 (i+1) (and v3 (i) ≠ v3 (i+1), but this is already contained in the definition of
v3 (i) ≬ v3 (i + 1)). Observe that starting from any combinatorial path, by removing
some vertices we can always obtain a locally geodesic one. If v3 (0) = v3 (n) we say
that the path is a combinatorial loop with base point v3 (0). If v3 (0) = [id], the
maximal vertex of such a loop is defined as the vertex v3 (i0 ) that realizes the
maximum max deg v3 (i), with i0 maximal. In particular, we have
deg v3 (i0 ) > deg v3 (i0 + 1)
and
deg v3 (i0 ) ⩾ deg v3 (i0 − 1).
Lemma 5.5. Let v3 (i), i = 0, . . . , n, be a locally geodesic loop with base point at [id],
and let v3 (i0 ) be the maximal vertex. Then the combinatorial path v3 (i0 − 1), v3 (i0 ),
v3 (i0 + 1) is homotopic in C to a combinatorial path from v3 (i0 − 1) to v3 (i0 + 1)
where all type 3 intermediate vertices have degree strictly less than deg v3 (i0 ).
Proof. Since deg v3 (i0 ) > deg v3 (i0 + 1), we know that v3 (i0 ) admits an elementary
reduction, so it makes sense to choose v2′ a vertex of minimal degree such that
v3 = v3 (i0 ) admits an elementary reduction v3′ with center v2′ . Then we are going to
apply Set-Up 4.29 twice, taking v3′′ to be successively v3 (i0 − 1) and v3 (i0 + 1). It is
sufficient to prove that in both cases the combinatorial path v3′′ , v3 , v3′ is homotopic
to a combinatorial path from v3′′ to v3′ where all type 3 intermediate vertices have
degree strictly less than deg v3 . Observe that there are degenerate cases which are
easy to handle. First if v3′ = v3′′ , we just take the combinatorial path with one single
vertex v3′ . Second, if v3′ and v3′′ share the same center with v3 , we can just discard
v3 to obtain a combinatorial path from v3′′ to v3′ without any intermediate vertex, so
we can indeed assume that the centers v2′ and v2′′ are distinct as required in Set-Up
4.29.
If v2′ = m2 then by Corollary 5.4 we are in one of the cases covered by Lemma
4.34, and the homotopy is clear in all cases (see Figure 9). For instance in Case (1)
we replace the path v3′′ , v3 , v3′ by v3′′ , u3 , w3′ , v3′ , and the other cases are similar.
If v2′ ≠ m2 , and v2′ has outer resonance in v3 , then we are in one of the two cases
covered by Lemma 4.32, and again the homotopy is clear (see Figure 8).
If v2′ ≠ m2 , and v2′ has no outer resonance in v3 , then by Lemma 4.33 there
exists u3 an elementary K-reduction of v3 with center v2′ . Therefore, in that case,
up to replacing v3′ by u3 we may assume without loss in generality that v3′ is an
elementary K-reduction of v3 . By Proposition 5.1, this can only happen in the case
v3′′ = v3 (i0 − 1), and deg v3 (i0 ) = deg v3 (i0 − 1). By Stability of K-reduction 3.35,
Case (1) or (2), v3′ is a proper K-reduction of v3 (i0 − 1), and up to a local homotopy
(see Figure 6, Case (2)) we can assume that the intermediate vertex is v3 = v3 (i0 ).
If this proper K-reduction is not normal, we obtain the expected homotopy from
the normalization process of Lemma 3.27 (see Figure 5). Otherwise, By Stability of
K-reduction 3.35, Case (3) or (4), we get that v3′ is a normal proper K-reduction of
v3 (i0 − 2), with v2 (i0 − 2) = v2 (i0 − 1) the minimal line of v3 (i0 ): This contradicts
our assumption that we started with a locally geodesic loop.
We need one last ingredient before proving the simple connectedness of the complex C.
Lemma 5.6. The link L(v1 ) of a vertex of type 1 is a connected graph.
COMBINATORICS OF THE TAME AUTOMORPHISM GROUP
45
Proof. By transitivity of the action of Tame(A3 ) on vertices of type 1, it is sufficient
to work with the link L([x3 ]). Let v3 = Jf1 , f2 , x3 K be a vertex of type 3 in L([x3 ]),
where we choose our representative such that deg f1 > deg f2 .
First observe that v3 does not admit any elementary K-reduction. Indeed by
Corollary 3.8 the pivotal simplex of such a reduction should have Strong Pivotal
Form ↺(s) for some odd s ⩾ 3. In particular there exist δ ∈ N3 and a reordering
{g2 , g3 } = {f2 , x3 } such that
deg f1 = sδ,
deg g2 = 2δ
and
sδ > deg g3 > (s − 2)δ.
But since deg x3 = (0, 0, 1) is the minimal possible degree of a component of an
automorphism, both cases g2 = x3 or g3 = x3 are impossible.
It follows that v3 also does not admit a proper K-reduction: such a reduction
would be via w3 = Jg1 , f2 , x3 K, but we just proved that such a w3 cannot admit an
elementary K-reduction.
By Theorem 4.1, we conclude that v3 admits an elementary reduction v3′ , which
clearly must admit [x3 ] as pivot, since there is no non-constant polynomial P ∈
k[x1 , x2 , x3 ] with deg x3 > deg P . In particular, v3′ also is in L([x3 ]), and by induction on degree, we obtain the existence of a reduction path from v3 to [id] that stays
in L([x3 ]).
Now we recover a result of [Umi06] and [Wri15], about relations in Tame(A3 ).
Precisely, Umirbaev gives an algebraic description of the relations, and Wright shows
that this result can be rephrased in terms of an amalgamated product structure over
three subgroups. Our proof follows the same strategy as in [BFL14, Proposition
3.10].
Proposition 5.7. The complex C is simply connected.
Proof. Let γ be a loop in C. We want to show that it is homotopic to a trivial loop.
Without loss in generality, we can assume that the image of γ is contained in the
1-skeleton of the square complex, and that γ(0) = Jx1 , x2 , x3 K is the vertex of type 3
associated with the identity.
A priori (the image of) γ is a sequence of edges of arbitrary type. By Lemma 5.6,
we can perform a homotopy to avoid each vertex of type 1. So now we assume that
vertices in γ are alternatively of type 2 and 3. Precisely, up to a reparametrization
we can assume that for each i, γ(2i) has type 3 and γ(2i + 1) has type 2, so that γ
defines a combinatorial path by setting v3 (i) = γ(2i) for each i. By removing some
of these vertices we can also assume that γ is a locally geodesic loop.
Let v3 (i0 ) be the maximal vertex of the loop, and δ0 its degree. Then by Lemma
5.5 we can conclude by induction on the couple (δ0 , i0 ), ordered with lexicographic
order.
Since Tame(A3 ) acts on a simply connected 2-dimensional simplicial complex with
fundamental domain a simplex, we can recover the group from the data of the stabilizers of each type of vertex. This is a simple instance of the theory of developable
complexes of groups in the sense of Haefliger (see [BH99, III.C]). Following Wright
we can phrase this fact as follows:
COMBINATORICS OF THE TAME AUTOMORPHISM GROUP
46
Corollary 5.8 ([Wri15, Theorem 2]). The group Tame(A3 ) is the amalgamated
product of the three following subgroups along their pairwise intersections:
Stab([x1 , x2 , x3 ]) = A3 ;
Stab([x1 , x2 ]) = {(ax1 + bx2 + c, a′ x1 + b′ x2 + c′ , αx3 + P (x1 , x2 ))};
Stab([x1 ]) = {(ax1 + b, f2 (x1 , x2 , x3 ), f3 (x1 , x2 , x3 )}.
6. Examples
We gather in this last section a few examples of interesting reductions.
Example 6.1 (Elementary K-reduction with s = 3). Let
g = (x1 , x2 , x3 + x21 − x32 ),
t1 = (x1 + αx2 x3 + x33 , x2 + x23 , x3 ).
Clearly in the composition g ○ t1 the terms of degree 6 cancel each other. Moreover,
if we choose α = 32 this is also the case for terms of degree 5:
g ○ t1 = (x1 + 32 x2 x3 + x33 , x2 + x23 , x3 + x21 − x32 + 3x1 x2 x3 +
x23
4 (8x1 x3
− 3x22 )) .
Consider now a triangular automorphism preserving the quadratic form 8x1 x3 − 3x22
that appears as a factor:
t2 = (x1 , x2 + x21 , x3 + 34 x1 x2 + 38 x31 ).
A direct computation shows that the components of f = g ○t1 ○t2 = (f1 , f2 , f3 ) admits
the following degrees:
(9, 0, 0), (6, 0, 0), (7, 0, 1).
Finally, u3 = [t1 ○ t2 ], whose degrees of components are
(9, 0, 0), (6, 0, 0), (3, 0, 0),
is an elementary K-reduction of v3 = [f1 , f2 , f3 ]. Following notation from the definition of Strong Pivotal Form, we have s = 3 and δ = (3, 0, 0). Moreover
2
9 2
3
df1 ∧ df2 = − 23 (x21 − x2 )dx2 ∧ dx3 + ( 27
16 x1 x2 + 8 x2 + 2 x1 x3 + 1)dx1 ∧ dx2
+ (− 49 x31 − 32 x1 x2 + 2x3 )dx1 ∧ dx3 .
so that deg df1 ∧ df2 = (4, 0, 1), from the contribution of the factor x31 dx1 ∧ dx3 .
Example 6.2 (Elementary K-reduction with s = 5, see also [Kur09]). One can
apply the same strategy to produce examples of K-reduction with s ⩾ 3 an arbitrary
odd number. We give the construction for s = 5, and leave the generalization to the
reader. Let
g = (x1 , x2 , x3 + x21 − x52 ),
t1 = (x1 + αx22 x3 + βx2 x33 + x53 , x2 + x23 , x3 ).
Observe that αx22 x3 + βx2 x33 + x53 is homogeneous of degree 5, by putting weight 1
5
on x3 and weight 2 on x2 . By choosing α = 15
8 , β = 2 , we minimize the degree of the
composition:
g ○ t1 = (x1 +
15 2
8 x2 x3
+ 52 x2 x33 + x53 , x2 + x23 , x3 + 81 x43 (16x1 x3 − 5x32 ) + ⋯) .
COMBINATORICS OF THE TAME AUTOMORPHISM GROUP
47
Now take the following triangular automorphism, which preserves the polynomial
16x1 x3 − 5x32 :
5
t2 = (x1 , x2 + x21 , x3 + 16
(3x1 x22 + 3x31 x2 + x51 )) .
We compute the degrees of the components of f = g ○ t1 ○ t2 = (f1 , f2 , f3 ):
(25, 0, 0), (10, 0, 0), (20, 3, 0).
Finally, u3 = [t1 ○ t2 ], whose degrees of components are
(25, 0, 0), (10, 0, 0), (5, 0, 0),
is an elementary K reduction of v3 = [f1 , f2 , f3 ]. Here we have s = 5 and δ = (5, 0, 0).
Moreover
(x21 + x2 ) dx2 ∧ dx3 + (2x3 − 85 (5x51 − 9x31 x2 − 3x1 x22 )) dx1 ∧ dx3
df1 ∧ df2 = − 15
8
2
75
(5x41 x22 + 9x21 x32 + 3x42 ) +
+ ( 128
3
15
8 (x1 x3
+ 2x1 x2 x3 ) + 1) dx1 ∧ dx2 ,
so that deg df1 ∧ df2 = (5, 3, 0), from the contribution of the factor x41 x22 dx1 ∧ dx2 .
Example 6.3 (Elementary reduction without Strong Pivotal Form). We give examples of elementary reduction that show that the three assumptions in Proposition
3.7 are necessary to get Strong Pivotal Form.
(1) Let f = (f1 , f2 , f3 ) ∈ Tame(A3 ) and r ⩾ 2 such that
deg f1 > deg f3 = r deg f2 .
In particular there exists a ∈ k such that deg f3 > deg(f3 + af2r ). For instance
f = (x1 + x33 , x2 , x3 + x22 ) is such an automorphism, for r = 2 and a = −1. Then
u3 = Jf1 , f2 , f3 + af2r K is an elementary reduction of v3 = Jf1 , f2 , f3 K, and the pivotal
simplex does not have Strong Pivotal Form. Observe that v2 = Jf1 , f2 K has outer
resonance in v3 .
(2) Let u3 = Jf1 , f2 , f3 +P (f1 , f2 )K be an elementary K-reduction of w3 = Jf1 , f2 , f3 K,
with 2 deg f1 = s deg f2 for some odd s ⩾ 3. For instance we can start with one of the
′
r
r
examples 6.1 or 6.2. Pick any integer r ⩾ s+1
2 . Then v3 = Jf1 +f2 , f2 , f3 +P (f1 −f2 , f2 )K
r
is an elementary reduction of v3 = Jf1 + f2 , f2 , f3 K, and the pivotal simplex does not
have Strong Pivotal Form. Observe that the center v2 = Jf1 + f2r , f2 K has inner
resonance.
(3) With the notation of Example 6.1 or 6.2, the elementary reduction from Jg○t1 K
to Jt1 K gives an example of an elementary reduction where the center m2 , which is
the minimal line, does not have inner or outer resonance, and again the pivotal
simplex does not have Strong Pivotal Form.
Example 6.4 (Non-normal proper K-reduction). Pick the elementary K-reduction
from Example 6.2, and set v3′ = [f1 +f22 , f2 , f3 ], which is a weak elementary reduction
of v3 . Then u3 is a non-normal proper K-reduction of v3′ , via v3 . This corresponds
to Case (1) of Stability of a K-reduction 3.35. We mention again that it is an open
question whether there exists any normal proper K-reduction.
Non Example 6.5 (Hypothetical type II and type III reductions). From Corollary
3.8 we know that if v3 admits an elementary K-reduction, then the pivotal simplex
has Strong Pivotal Form ↺(s) for some odd s ⩾ 3. In particular if s = 3, then
v3 = Jf1 , f2 , f3 K with deg f1 = 3δ, deg f2 = 2δ and deg f3 > δ for some δ ∈ N3 . It is
not clear if there exists an example of such a reduction with 32 δ > deg f3 , or even
2δ > deg f3 . Observe that such an example would be the key for the existence of
COMBINATORICS OF THE TAME AUTOMORPHISM GROUP
48
the following reductions (for the definition of a reduction of type II or III, see the
original paper [SU04b], or [Kur10, §7]):
(1) If 32 δ > deg f3 , then v3′ = Jf1 + f32 , f2 , f3 K would admit a normal proper Kreduction, via v3 : This would correspond to a type III reduction.
(2) If 2δ > deg f3 > 23 δ, then v3 would admit an elementary K-reduction such
that the pivot [f2 ] is distinct from the minimal vertex [f3 ]: This would
correspond to a type II reduction.
(3) If 32 δ > deg f3 , then v3′′ = Jf1 , f2 + f32 , f3 K would be an example of a vertex
that admits a reduction along a center with outer resonance in v3′′ , but that
does not admit a reduction with center the minimal line of v3′′ (see Lemma
4.32).
References
[BFL14] C. Bisi, J.-P. Furter & S. Lamy. The tame automorphism group of an affine quadric
threefold acting on a square complex. Journal de l’École Polytechnique - Mathématiques,
1:161–223, 2014.
[BH99] M. R. Bridson & A. Haefliger. Metric spaces of non-positive curvature, volume 319 of
Grundlehren der Mathematischen Wissenschaften. Springer-Verlag, Berlin, 1999.
[CL13] S. Cantat & S. Lamy. Normal subgroups in the Cremona group. Acta Math., 210(1):31–94,
2013. With an appendix by Yves de Cornulier.
[HP94] W. Hodge & D. Pedoe. Methods of algebraic geometry. Vol. I. Cambridge Mathematical
Library. Cambridge University Press, Cambridge, 1994. Book I: Algebraic preliminaries,
Book II: Projective space, Reprint of the 1947 original.
[Kur08] S. Kuroda. A generalization of the Shestakov-Umirbaev inequality. J. Math. Soc. Japan,
60(2):495–510, 2008.
[Kur09] S. Kuroda. Automorphisms of a polynomial ring which admit reductions of type I. Publ.
Res. Inst. Math. Sci., 45(3):907–917, 2009.
[Kur10] S. Kuroda. Shestakov-Umirbaev reductions and Nagata’s conjecture on a polynomial automorphism. Tohoku Math. J. (2), 62(1):75–115, 2010.
[Lam02] S. Lamy. Une preuve géométrique du théorème de Jung. Enseign. Math. (2), 48(3-4):291–
315, 2002.
[Lon16] A. Lonjou. Non simplicité du groupe de Cremona sur tout corps. Ann. Inst. Fourier,
66(5):2021–2046, 2016.
[LP16] S. Lamy & P. Przytycki. Acylindrical hyperbolicity of the three-dimensional tame automorphism group. arXiv:1610.05457, 2016.
[Mar15] A. Martin. On the acylindrical hyperbolicity of the tame automorphism group of SL2 (C).
arXiv:1512.07526, 2015.
[SU04a] I. P. Shestakov & U. U. Umirbaev. Poisson brackets and two-generated subalgebras of
rings of polynomials. J. Amer. Math. Soc., 17(1):181–196, 2004.
[SU04b] I. P. Shestakov & U. U. Umirbaev. The tame and the wild automorphisms of polynomial
rings in three variables. J. Amer. Math. Soc., 17(1):197–227, 2004.
[Umi06] U. U. Umirbaev. Defining relations of the tame automorphism group of polynomial algebras
in three variables. J. Reine Angew. Math., 600:203–235, 2006.
[Vén11] S. Vénéreau. A parachute for the degree of a polynomial in algebraically independent ones.
Math. Ann., 349(3):589–597, 2011.
[Wri15] D. Wright. The generalized amalgamated product structure of the tame automorphism
group in dimension three. Transform. Groups, 20(1):291–304, 2015.
Institut de Mathématiques de Toulouse, Université Paul Sabatier, 118 route de
Narbonne, 31062 Toulouse Cedex 9, France
E-mail address: [email protected]
| 4math.GR
|
arXiv:1609.04735v1 [cs.NI] 15 Sep 2016
RALL — Routing-Aware Of Path Length, Link
Quality, And Traffic Load For Wireless Sensor
Networks
Vinícius N. Medeiros, Douglas V. Santana,
Bruno Silvestre, Vinicius da C. M. Borges
{viniciusnunesmedeiros, douglassantana}@inf.ufg.br
{brunoos, vinicius}@inf.ufg.br
Instituto de Informática – Universidade Federal de Goiás
Goiânia, GO – Brasil
15 September 2016
Abstract
Due to the enormous variety of application scenarios and ubiquity, Internet of Things (IoT) brought a new perspective of applications for the
current and future Internet. The Wireless Sensor Networks provide key
devices for developing the IoT communication paradigm, such as the sensors collecting various kind of information and the routing and MAC protocols. However, this type of network has strong power consumption and
transmission capacity restrictions (low speed wireless links and subject to
interference). In this context, it is necessary to develop solutions that enable a more efficient communication based on the optimized utilization of
the network resources. This papers aims to present a multi-objective routing algorithm, named Routing-Aware of path Length, Link quality, and
traffic Load (RALL), that seeks to balance three objectives: to minimize
bottlenecks, to minimize path length, and to avoid links with low quality. RALL results in good performance when taking into consideration
delivery rate, overhead, delay, and power consumption.
1
Introduction
The Internet has been employed more and more, and becoming an essential tool
for humans. Nowadays, not only people use this information and communication
technology, as well as machines employ it to communicate with each other, making measurement of various types of information. The Internet of Things (IoT)
paradigm allows these machines to communicate and feel the environment [3].
1
Wireless Sensor Networks (WSNs) play an important role within the IoT and
have gained increasing prominence as part of ubiquitous computing in various
environments, such as industry, smart cities, smart spaces, smart grids, health
monitoring environmental, real-time multimedia applications [3, 15, 2]. WSNs
consist of various nodes that generally have strong processing, battery, and
memory constraints. Typically, each node has only one radio interface (generally
802.15.4 CSMA/CA) with a fixed transmission rate (250 kbps) [20].
Usually, a flat model is employed to organize the network, where all the
nodes play the same role in sensing, processing, and (re)broadcast packets. The
information is forwarded (routed) node by node until it reaches the sink node,
where it is processed [1, 14, 17]. This paper will treat the routing optimization
problem based on three objectives: (i) minimize the path length (number of
hops), (ii) minimize the bottleneck, and (iii) minimize the interference in the
path. At the routing, each hop could increase the delay.
This article is organized as follows: In Section 2, we present a model for
the routing problem of multi-objective optimization. In Section 3, we describe
the proposed algorithm to determine a solution for the model. In Section 4,
we present the simulation results. In Section 5, we analyze the most relevant
related work on routing approaches for WSNs. The conclusion and future work
is carried out in Section 6.
2
System Model
WSNs consist of various sensors, distributed in an area, that enable data collection. Most of these sensors monitor or interact with the environment in which
they are. A node in particular, called sink, is designed to gather all the data
collected by the sensors. The sink node is attached to a machine with more
processing capacity (e.g. servers in cloud computing environment) so that collected data can be transformed into information and knowledge, to be used by
various applications.
WSNs are modeled as a graph G = (V, E), where V is the set of vertices
that represents the sensors, E is the set of communication links between two
network devices. The link esd ∈ E between s, d ∈ V exists only if the device s
accomplish a data transmission to the node d, i.e. the node d must be in the
transmission range of s. Some metrics can be employed for determining if a link
between two sensors can actually be used. Every sensor s ∈ V − {i}, where i
is the sink, is responsible for the origin of a data stream named fs ∈ F , where
F is defined as the set of all flows generated in the network. All flows of WSNs
have the sink node i as destination node.
The establishment of a path is demanded on the graph G so that the data
flow can reach the sink node. The selection of each flow path must follow some
objectives to ensure certain network characteristics, such as packet delivery rate,
energy consumption, delay, etc. A larger number of hops require the activation
of more links, that generates more use of the transmission medium and may
lead to more contention or interference as well as end-to-end delay [6].
2
Load balancing aims at distributing the flows over the network uniformly.
This prevents a small set of nodes to be used for the majority of the routes,
leading to a greater burden on those nodes. It is important to point out that the
nodes have limited resources, so that load can cause, for example, the reduction
of the network lifetime, due to a higher consumption of battery to forward
packets, as well as for packet loss, given the small amount of memory in the
nodes for packet storage [8].
The interference degrades the link quality [6]. It can be caused by the number of neighbors that are in communication range of each node and/or other
wireless networks that generally adopt communication standards using same
spectrum band. As nodes in a WSNs use this shared band, and they employ
only a radio interface and a single communication channel, more nodes in the
network result in higher level of interference. This implies a greater chance of
collision (requiring packet retransmission) because there is a greater probability
that the channel is busy. As a result, interference strongly impacts the effective transmission capacity. Thus, the routes that pass through nodes with a
greater degree of interference may suffer more delay in delivery and/or more
retransmission of packets, as well as may result in larger battery consumption.
It can be noticed interrelationships between these three objectives. The
increase in the number of hops in the path is a common consequence when a
routing solution seeks to minimize overload [6]. However, increasing path length
causes more nodes activation, in consequence more interference. It is important
to notice that not always shorter paths generate less interference in the WSN
as a whole. For instance, the shortest paths may suffer interference due to the
existence of neighbors or other wireless networks/devices that are in the same
range area of these paths.
Following we present the construction of an optimization model for the route
establishment on WSN with three objectives: minimizing the number of hops,
minimizing the network bottleneck on the links, and minimizing the use of low
quality links. These three objectives are described and modeled in the following
paragraphs.
Number of Hops Minimizing the number of hops in a required path can
reduce the end-to-end delay. A linear programming model is used to find the
shortest paths from f flows in F :
minimize
X
asd
(1)
esd ∈E
Subject to :
X
avd −
d∈V
X
X
adv = 1, ∀v ∈ V, v 6= i
(2)
d∈V
asi = |F |, i = sink
(3)
s∈V
asd ≥ 0
(4)
3
Variable asd is defined as the sum of the flows using the edge esd on your
route. Constraint (2) ensures that every vertex can only generate a single flow
and constraint (3) ensures that the sink node can receive a number of flows equal
to the number of sensors in the network. The combination of restrictions (2) and
(3) ensures that loops are not created. The constraint (4) ensures non-negative
values for sum of flows on links in asd . The objective function (1) minimizes
the sum of the amount of all flows that pass through each edge esd ∈ E. Thus,
each flow is allocated to the shortest path and therefore the objective function
value is minimized.
Wireless Links with Low Quality The shortest paths may be more susceptible to high level of interference that increases the packet loss rate, since
the interference decreases the link quality. The quality of the wireless communication affects the overall network capacity. Wireless links that do not have
their quality degraded by factors, such as interference and noise, become a good
choice for use on routes to the sink node, while links that have poor data transmission capacity (i.e., high level of interference) should be avoided to improve
package delivery rate.
The LQI (Link Quality Indication) is a measurement provided by the IEEE
802.15.4 physical layer that can be used as a quality metric of the wireless
transmission between two sensors. LQI values are represented in a range from 0
to 255 [7]. In this paper, a link is considered weak or with low quality if the LQI
value is smaller than a certain threshold (T HLQI ), according to the following
condition:
(
0
, LQIsd ≥ T HLQI
(5)
lsd =
sd
)
, LQIsd < T HLQI
1 − ( TLQI
HLQI
LQIsd is the value of LQI regarding the wireless link between nodes s, d ∈ V .
The variable lsd is used in the proposed model to represent link quality values
that should be avoided (higher ones) or selected (lower ones). When lsd is zero,
it indicates that the link between the devices has an acceptable LQI, i.e. it has
a good quality. Otherwise, the value is normalized to the interval (1, 0) in order
to distinguish the links with lower quality, but that have a good chance of being
used, since they have a higher LQI.
The variable lsd is fundamental to minimize the use of links with low quality
on the paths. The objective function for this approach is constructed combining
the objective function (1) and taking into the number of hops (variable lsd ):
(
)
X
minimize
lsd · asd
(6)
esd ∈E
Network Bottleneck The distribution of flows in a WSNs, in a balanced
way, increases the network lifetime. On the other hand, an unfair distribution of
paths for flows creates agglomeration flows on the same node (i.e. bottleneck),
4
increasing the power consumption due to the increase of forwarded packets.
Since the sensors usually have strong restrictions relating to energy consumption, the question of minimizing bottlenecks is a very important feature for WSN
scenarios. Furthermore, smoothing out network bottleneck can improve traffic
performance.
The variable asd enables the objective function that is employed to minimize
the network bottleneck. Therefore, the objective function is a combination of
paths for each flow on the graph G, where the highest sum of the amount of
flows passing through a node s is minimal:
(
(
max
minimize
!)
)
X
asd
, ∀s ∈ V
(7)
d∈V
Multi-objective Model The model of the multi-objective optimization problem for the routing problem in WSNs uses three objectives (number of hops,
quality links, and network bottleneck):
(
)
X
minimize
asd
esd ∈E
(
)
X
minimize
lsd · asd
esd ∈E
(
minimize
(
max
)
X
asd
!)
, ∀s ∈ V
d∈V
Subject to:
X
avd −
d∈V
X
X
adv = 1, ∀v ∈ V, v 6= i
d∈V
asi = |F | − 1, i = sink
s∈V
asd ≥ 0
The objective functions (1), (6), and (7), when combined in a single model,
create a problem with conflicting solutions by having a set of optimal solutions
that are not dominated by each other, called the set of Pareto optimal. In other
words, the modeled objectives are conflicting each other because there is no
solution that is able to meet optimally all three objectives.
The conflict between the objectives that minimizes the amount of hops (1),
minimizes the amount of low-quality wireless links (6), and minimizes the network bottleneck (7) is evident since the objectives (1) and (6) group the paths
in order to select shortest paths or a link with better quality, objective function
(7) try to distribute the flows equally over the paths on the entire network,
therefore increasing the average path length and the use of links with low qual-
5
ity. The objective functions (1) and (6) are conflicting when the establishment
of shortest route demands links with lower quality.
3
RALL — Routing-Aware of path
Length, Link quality, and
traffic Load
In this section we describe the multi-objective algorithm, called Routing-Aware
of path Length, Link quality, and traffic Load (RALL) for the routing problem in
WSNs. RALL algorithm employs some techniques to simplify the complexity of
selecting the set of Pareto optimal solutions. For this reason, it uses an algorithm
for determining paths with lower cost (Dijkstra’s algorithm) so that each path
is calculated for a flow generated on an ordinary node. The values related to the
objective function are changed according to the nodes that had already their
specific route for the flows in order to achieve the balancing. Initially, it is carried
out the transformation of the model so that the objective functions of path
length minimization (1) and low quality links minimization (6) are combined in
a single objective.
When a solution of an objective function is not dominated for the other objective, it is necessary to establish a trade-off between the functions to determine
which solution can satisfy partially or completely the objectives. The weighted
sum method of the objective functions is usually applied to perform the combination of objectives. Therefore, it is necessary to establish a weight for each
objective function and perform a weighted sum of these values. This method
was chosen because it is well known for the problems of linear programming [10]:
(
!
!)
X
X
minimize wp ·
asd + wl ·
lsd · asd
=
esd ∈E
esd ∈E
(
)
X
(wp + wl · lsd ) · asd
(8)
esd ∈E
wp and wl are the weights for the objective function related to the number
of hops (1) and number of low quality links (6), respectively. As a requirement
to apply this approach, the decision variables of the objective functions must
be at the same scale or magnitude, it is not the case of the function (7). In the
presented model, the decision variable for the objectives is the number of flows
passing through the links (edges).
RALL algorithm begins by performing a combination of objective functions
path length minimization and low quality links minimization in a single objective
function, using the weighted sum (8). Next, RALL algorithm performs the
minimization of network bottleneck by updating the values of the objective
6
Algorithm 1: RALL (Routing-Aware of path Length, Link quality, and
traffic Load.)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
Algorithm RALL()
input :
G − (V, E)
Of − set of ordered flows
i − sink, i ∈ V
wp , wl − weights for objective functions
begin
E ← SumWeights (E,wp ,wl )
A←E
P ←∅
foreach fs ∈ Of do
ps ← M CP ath(s, i, G < V, A >)
A ← UpdateEdges(ps , E, A)
P ← P ∪ {ps }
end
end
return P
Procedure SumWeights()
input :
E − set of edges
wp , wl − weights for objective functions
begin
Enew ← ∅
foreach esd ∈ E do
enew
← pconst · wp + wl · lsd
sd
Enew ← Enew ∪ {enew
sd }
end
return Enew
end
Procedure UpdateEdges()
input :
E − set of edges
Ps − router of s to sink
A − set of edges
begin
foreach bjh ∈ Ps do
rjh ← E ∩ {b
Pjh }
amount ←
asd , ∀esd ∈ E, s = j
rjh ← ejh + amount, ejh ∈ E
A ← A ∪ {rjh }
end
return A
end
function. The algorithm 1 shows the RALL’s pseudo-code. It has a set of flows
as input that are used to generate the paths with lower cost.
On line 3, the weighted sum of objective functions is called. In this procedure, path length and low quality links are combined in a single vector cost.
The variable lsd is the normalized value of LQI for edge esd , using the constraint
shown by the equation (5). pconst is a constant used to establish the value for
each hop. The value of each link is updated according to this constant value. If
the chosen value for pconst is small in some interactions, the objective function
to determine the lowest number of hops is almost negligible, and the trade-off
will be impaired. This happens because the values that represent the bottleneck
in the objective function, on each iteration, are incremented. It is used the value
7
of pconst = |V |, and the values of variable lsd are normalized to have pconst as
the threshold value.
After the weighted sum is generated minimal cost path using M CP ath(sender,
receiver, GRAP H) for each flow fs , which is assigned to the variable ps (on line
7). The links that make up the minimum cost path PS will have their values
updated by adding the amount of flows that use the device s ∈ V — line 27 of
U pdateEdges(ps , E, A) procedure. Finally, the path is inserted into the solution
set P that will contain all routes to every flow.
4
Simulation Results
We conducted a simulation study to analyze the performance of proposed approach. A network with a single sink node and many sensor nodes are taken
into consideration in the simulated network. The sink node receives data from
the sensor nodes and it serves as a connection point to an external network. The
sensor nodes send the collected data and forward/relay packets on a single route
to the sink node. All nodes are static and they use asymmetric links. This section is organized as follows: the scenario configuration is outlined in sub-section
4.1. The evaluation and the simulation results are discussed in sub-section 4.2.
4.1
Scenario Configuration
We employ the Castalia module [5] of OMNeT++ simulator [18], which are
widely used to evaluate WSN. Table 1 shows the general parameters used in the
simulation and Table 2 presents node configuration based on [13].
The simulations were performed in scenarios varying the number of nodes,
i.e. 10 up to 50 nodes (Table 1). For every set of nodes, it was generated ten
topologies and four random seeds, resulting in a total of 40 runs for each set of
nodes. The positions of the nodes in a topologies were generated using a normal
distribution, limited in area, that guarantees none of the nodes would remain
isolated from the network (out of range from any other node).
Table 1: Simulation Parameters
Packet Generation Rates
5 packets/minute
Traffic generation model
Poisson
Topology Area
50x50
Number of nodes
10, 20, 30, 40, and 50
Interference Model
Additive 1
Weight values for path
50%
length function (wp )
Weight values for link
50%
quality function (wl )
1 Additive interference: it use the SINR values of the package, the receiver receives the
strongest signal of the two transmissions (if it is strong enough).
8
Table 2: Node Configuration
Initial Energy
100 J
TX Energy
20 mJ/pkt
RX Energy
10 mJ/pkt
MAC layer
T-MAC
Radio Model
CC2420
Transmission Power
-10dBm
Packet Size
127 bytes
Link Communication Asymmetric
The simulation was carried out in two phases. In the first phase, the neighborhood discovery was done by disseminating broadcast messages. These control
messages are also used to calculate the average LQI value of the link for each
neighbor so that the sink node has the complete network graph information.
Due to the fact that the processing capacity and energy of the sensors devices
are very restricted, the routing algorithm is performed in a centralized way in
the sink node.
Once in possession of the network global view, the proposed routing algorithm is executed to select the path to the sink for each sensor node. The second
simulation phase uses the routing table information to forward the packets. Each
node sends messages to the sink, which will extract some of the performance
metrics for analysis.
4.2
Results
Other routing algorithms were chosen to assist the performance assessment of
RALL, as following:
• BALAN CED − LQI: It is based on similar criteria of RALL, however, it
only employs the load balancing and link quality objective functions, and
it does not perform the combination of functions using the weighted sum.
• BP R: It is a heuristic with two objective functions, load balancing and
path length [11]. For each flow generated on the network, BPR seeks to
select the shorter route belonging to set of candidate paths that does not
increase the network bottleneck.
• P AT H: Traditional approach to determine the shortest path length (e.g.
Dijkstra’s algorithm).
• LQI: It aims to select routes that use fewer links with low quality. A link
is considered low quality when it does not satisfied the described condition
in (5).
The comparison of these approaches aims to provide better impact of the
different criteria in the traffic and network performance through the route selection.
9
Figure 1 shows the packet loss rate. We figure out that the BALAN CED −
LQI and RALL algorithms achieve lower levels of losses, especially in high
density network (i.e. 50 nodes). Therefore, the amount of data increases. This
can be justified by the Jain fairness index (well-known metric to evaluate load
balancing) shown in Figure 2, and by the fact that the two algorithms take
into consideration the link quality. Despite the fact that BALAN CED − LQI
slightly results in lower packet loss, the confidence interval (Figure 1) shows
that the performance of both approaches is very similar.
Figure 1: Packet loss rate.
Figure 2: Jain fairness index.
Figure 3 shows the average latency in data delivery of the simulated network
scenarios. It is worth noting that in the scenario with 10 nodes, most of packets
10
were delivered within the range of [0, 600)ms. The other intervals follow the
behavior of the first three ones. In fact, it occurs in all scenarios, thus we show
only the first four intervals: 20, 30, 40, and 50.
(a) 10 nodes
(b) 20 nodes
(c) 30 nodes
(d) 40 nodes
(e) 50 nodes
Figure 3: Latency for 10, 20, 30, 40, and 50 nodes.
The greatest difference in latency between approaches can be noticed when
the number of nodes increases. Again, the BALAN CED − LQI and RALL
approaches are featured, however, RALL results in an significant improvement
of the latency, followed by P AT H. These results can be justified by analyzing
the average path length generated by each approach (Figure 4), where RALL
and P AT H reached the lowest values.
We also analyzed the average network lifetime, which was measured as from
the beginning of the second phase up to the first node of the network run out
the battery energy. In this analysis we used only BALAN CED − LQI and
RALL approaches, because they showed better performance for packet loss and
latency. Figure 5 illustrates the lifetime.
RALL approach achieves performance improvement when increasing the
number of nodes (i.e. 30, 40, and 50 nodes). In order to better understand this
behavior, we analyzed the packets exchanged by each algorithm. In Figure 6,
data packets are generated by the application layer and accounted in packet loss
by the sink. Control packets are accounted of the MAC layer, which uses the
T-MAC protocol. This protocol employs an adaptive method to avoid collision
11
Figure 4: Average path length.
Figure 5: Average network lifetime.
and to control the radio duty-cycle, in order to reduce the energy consumption.
It is important to stress out that BALAN CED − LQI has a slightly larger
number of data packets delivery to all scenarios. Moreover, BALAN CED−LQI
12
Figure 6: Average control overhead in MAC layer.
also requires a larger amount of control packets in the MAC layer. Each packet
has an energy cost for sending and receiving. This explains why the network
lifetime achieves the highest times by getting shortest paths (activating fewer
links).
5
Related Work
There are many works that seek to combine these objectives, some of them to
optimize routing in wireless networks, especially in WSNs. The most of these
works deal with one or two objectives described above. Wang and Zhang [19]
presented a protocol, called Interference Aware Multipath Routing (IAMR),
that selects paths spatially disjoint, adopting an interference model in which
interference range is twice greater than the transmission range. This model
may overestimate the interference level.
Radi et al. [16] proposed Low-Interference Energy-Efficient Multipath Routing Protocol (LIEMRO), which takes into account a load balancing multipath
approach and which also seeks to minimize interference through the use of ETX
routing metric. As it was described in the literature, ETX has limitations to
capture the interference in a more accurate way [4].
Minhas et al. [12] recommended an approach based on fuzzy logic for multiobjective optimization problem in routing that seeks to balance two objectives:
to maximize the network lifetime (analyzing the current and residual energy
levels of the nodes) and the delay between the ordinary node and the sink node
13
(taking into account of the number of hops).
Load balancing routing can provide both packet loss minimization and network lifetime maximization based on a uniform distribution of flows in the network. For this reason, routing approaches are proposed in wireless networks
to minimize bottlenecks and the average path length, such as Bottleneck, Path
Length and Routing heuristic overhead (BPR) [11].
Moghadam et al. [13] presented a heuristic, named Heuristic Load Distribution (HeLD), which aims to minimize the overhead communication and maximize the network lifetime by a load balancing routing based on a linear programming approach, and the use of a set of braided paths. Simulation results
showed that HeLD achieved less overhead and an increase in network lifetime,
however, packet delivery rate was lower and latency was not presented. This
can be partially justified by braided paths that can generate a high level of
interference.
Machado et al. [9] presented a heuristic for IoT environments called Routing
by Energy and Link quality (REL), which seeks to select paths that minimize
the number of hops, maximize network lifetime through the residual energy of
the nodes, and maximize the link quality of the in the selected paths based
on Received Signal Strength Indicator (RSSI) metric. However, REL is quite
simple and it is limited to establish a balance among the three objectives.
None of the related work handles the three mentioned objectives. Most
of them use heuristics for routing solution. This paper propose a new multiobjective routing algorithm for WSNs. The algorithm seeks to achieve the tradeoff among load balancing, path length, and interference, i.e. aggregate flows in
the shortest paths to avoid overloaded links and with high level of interference.
6
Conclusions and Future Work
We propose a multi-objective routing algorithm (RALL) for IoT environments
in this paper. RALL seeks to minimize three objectives: bottlenecks, links with
high levels of interference, and long paths.
The results showed that RALL algorithm results in good levels of packet loss
rate (very similar to the main comparative approach), the lowest latency, and
longer average network lifetime, mainly in dense scenarios.
Although RALL does not reach the best results in all tests, it shows the
importance of the all employed criteria in order to offer an overall routing approach for IoT. The weakness of one criterion is smoothed out by the others as
well as the equilibrium of the criteria to provide a more efficient performance
for WSNs. We believe that the proposed algorithm is an interesting approach
to IoT environments that have different types of traffic and require routing approaches that seeks to balance conflicting objectives to improve delivery rate,
delay, and power consumption.
As future work, we intend to start further studies about the weights used in
the objective functions, for example, trying to make a best correlation between
the weights and types of topologies. Moreover, the RALL algorithm will be
14
implemented in testbeds for performing experiments in a real environment.
References
[1] Ian F. Akyildiz, Tommaso Melodia, and Kaushik R. Chowdhury. A survey
on wireless multimedia sensor networks. Comput. Netw., 51(4):921–960,
March 2007.
[2] Adwan Alanazi and Khaled Elleithy. Real-time QoS routing protocols
in wireless multimedia sensor networks: Study and analysis. Sensors,
15(9):22209, 2015.
[3] Luigi Atzori, Antonio Iera, and Giacomo Morabito. The internet of things:
A survey. Computer Networks, 54(15):2787 – 2805, 2010.
[4] Vinicius C. M. Borges, Marilia Curado, and Edmundo Monteiro. CrossLayer Routing Metrics for Mesh Networks: Current Status and Research
Directions. Computer Communications, 34(6):681 – 703, 2011.
[5] Athanassios Boulis. Castalia: A simulator for wireless sensor networks and
body area networks. NICTA: National ICT Australia, 2011.
[6] Eduardo Feo Flushing and Gianni A. Di Caro. A flow-based optimization
model for throughput-oriented relay node placement in wireless sensor networks. In Proceedings of the 28th Annual ACM Symposium on Applied
Computing, SAC ’13, pages 632–639, New York, NY, USA, 2013. ACM.
[7] Carles Gomez, Antoni Boix, and Josep Paradells. Impact of LQI-Based
routing metrics on the performance of a one-to-one routing protocol for
IEEE 802.15.4 multihop networks. EURASIP Journal on Wireless Communications and Networking, 2010(1):1–20, 2010.
[8] Jaewon Kang, Yanyong Zhang, and Badri Nath. End-to-end channel capacity measurement for congestion control in sensor networks. In Proceedings
of the 2nd International Workshop on Sensor and Actor Network Protocols
and Applications (SANPA’04), 2004.
[9] Kássio Machado, Denis Rosário, Eduardo Cerqueira, Antonio A. F.
Loureiro, Augusto Neto, and José Neuman de Souza. A routing protocol based on energy and link quality for internet of things applications.
Sensors, 13(2):1942, 2013.
[10] R. Timothy Marler and Jasbir S. Arora. The weighted sum method for
multi-objective optimization: new insights. Structural and Multidisciplinary Optimization, 41(6):853–862, 2009.
[11] Micael O. M. C. Mello, Vinicius C. M. Borges, Leizer de L. Pinto, and Kleber Vieira Cardoso. Load balancing routing for path length and overhead
15
controlling in wireless mesh networks. In IEEE Symposium on Computers and Communications, ISCC 2014, Funchal, Madeira, Portugal, June
23-26, pages 1–6, 2014.
[12] Mahmood R. Minhas, Sathish Gopalakrishnan, and Victor C. M. Leung.
Multiobjective routing for simultaneously optimizing system lifetime and
source-to-sink delay in wireless sensor networks. In Proceedings of the 2009
29th IEEE International Conference on Distributed Computing Systems
Workshops, ICDCSW ’09, pages 123–129, Washington, DC, USA, 2009.
IEEE Computer Society.
[13] Meisam Moghadam, Hassan Taheri, and Mehdi Karrari. Minimum cost
load balanced multipath routing protocol for low power and lossy networks.
Wireless Networks, 20(8):2469–2479, 2014.
[14] D. Niculescu. Communication paradigms for sensor networks. IEEE Communications Magazine, 43(3):116–122, March 2005.
[15] Luís Oliveira and Joel Rodrigues. Wireless sensor networks: a survey on
environmental monitoring. Journal of Communications, 6(2), 2011.
[16] M. Radi, B. Dezfouli, S. A. Razak, and K. A. Bakar. Liemro: A lowinterference energy-efficient multipath routing protocol for improving QoS
in event-based wireless sensor networks. In Sensor Technologies and Applications (SENSORCOMM), pages 551–557, July 2010.
[17] Marjan Radi, Behnam Dezfouli, Kamalrulnizam Abu Bakar, Shukor Abd
Razak, and Mohammad Ali Nematbakhsh. Interference-aware multipath
routing protocol for QoS improvement in event-driven wireless sensor networks. Tsinghua Science & Technology, 16(5):475 – 490, 2011.
[18] András Varga. The OMNeT++ discrete event simulation system. In Proceedings of the European simulation multiconference (ESM’2001), volume 9,
page 65, 2001.
[19] Z. Wang and J. Zhang. Interference aware multipath routing protocol for
wireless sensor networks. In IEEE GLOBECOM Workshops, pages 1696–
1700, Dec 2010.
[20] Jennifer Yick, Biswanath Mukherjee, and Dipak Ghosal. Wireless sensor
network survey. Computer Networks, 52(12):2292 – 2330, 2008.
16
| 8cs.DS
|
On Variational Expressions for Quantum Relative Entropies
Mario Berta,1, 2 Omar Fawzi,3 and Marco Tomamichel4
1
Department of Computing, Imperial College London
Institute for Quantum Information and Matter, California Institute of Technology
3
Laboratoire de l’Informatique du Parallélisme, École Normale Supérieure de Lyon
4
Centre for Quantum Software and Information, University of Technology Sydney
arXiv:1512.02615v2 [quant-ph] 8 Nov 2017
2
Distance measures between quantum states like the trace distance and the fidelity can
naturally be defined by optimizing a classical distance measure over all measurement
statistics that can be obtained from the respective quantum states. In contrast, Petz showed
that the measured relative entropy, defined as a maximization of the Kullback-Leibler
divergence over projective measurement statistics, is strictly smaller than Umegaki’s
quantum relative entropy whenever the states do not commute. We extend this result in
two ways. First, we show that Petz’ conclusion remains true if we allow general positive
operator valued measures. Second, we extend the result to Rényi relative entropies and
show that for non-commuting states the sandwiched Rényi relative entropy is strictly larger
than the measured Rényi relative entropy for α ∈ ( 12 , ∞), and strictly smaller for α ∈ [0, 12 ).
The latter statement provides counterexamples for the data-processing inequality of the
sandwiched Rényi relative entropy for α < 21 . Our main tool is a new variational expression
for the measured Rényi relative entropy, which we further exploit to show that certain lower
bounds on quantum conditional mutual information are superadditive.
Keywords: Quantum entropy, measured relative entropy, relative entropy of recovery,
additivity in quantum information theory, operator Jensen inequality, convex optimization.
Mathematics Subject Classifications (2010): 94A17, 81Q99, 15A45.
I.
MEASURED RELATIVE ENTROPY
The relative entropy is the basic concept underlying various information measures like entropy,
conditional entropy and mutual information. A thorough understanding of its quantum generalization is thus of preeminent importance in quantum information theory. We start by considering
measured relative entropy, which is defined as a maximization of the Kullback-Leibler divergence
over all measurement statistics that are attainable from two quantum states.
For a positive measure Q on a finite set X and a probability measure P on X that is absolutely continuous with respect to Q, denoted P ≪ Q, the relative entropy or Kullback-Leibler
divergence [26] is defined as
X
P (x)
D(P kQ) :=
P (x) log
,
(1)
Q(x)
x∈X
P (x)
Q(x)
= 0 whenever P (x) = 0. By continuity we define it as +∞ if
where we understand P (x) log
P 6≪ Q. (We use log to denote the natural logarithm.)
To extend this concept to quantum systems, Donald [12] as well as Hiai and Petz [21] studied
measured relative entropy. In the following we restrict ourselves to a d-dimensional Hilbert space
for some d ∈ N. Let us denote the set of positive semidefinite operators acting on this space by
P and the subset of density operators (with unit trace) by S. For a density operator ρ ∈ S and
σ ∈ P, we define two variants of measured relative entropy. The general measured relative entropy
is defined as
(2)
D M (ρkσ) := sup D Pρ,M Pσ,M ,
(X ,M )
2
where the optimization is over finite sets X and positive operator valued measures (POVMs)
M on X . (More formally, M is a map from X to positive semidefinite operators and satisfies
P
x∈X M (x) = 1, whereas Pρ,M is a measure on X defined via the relation Pρ,M (x) = tr[M (x)ρ]
for any x ∈ X .) At first sight this definition seems cumbersome because we cannot restrict the size
of X that we optimize over. Therefore, following the works [12, 21, 35], let us also consider the
following projectively measured relative entropy, which is defined as
D P (ρkσ) := sup
{Pi }di=1
(
d
X
i=1
tr[Pi ρ]
tr[Pi ρ] log
tr[Pi σ]
)
,
(3)
where the maximization is over all sets of mutually orthogonal projectors {Pi }di=1 and we spelled
out the Kullback-Leibler divergence for discrete measures. Note that without loss of generality we
can assume that these projectors are rank-1 as any course graining of the measurement outcomes
can only reduce the relative entropy due to its data-processing inequality [29, 49]. Furthermore,
the quantity is finite and the supremum is achieved whenever ρ ≪ σ, which here denotes that the
support of ρ is contained in the support of σ. (To verify this, recall that the rank-1 projectors form
a compact set and the divergence is lower semi-continuous.)
The first of the following two variational expressions for the (projectively) measured relative
entropy is due to Petz [37]. Note that the second objective function is concave in ω so that the
optimization problem has a particularly appealing form.
Lemma 1. For ρ ∈ S and σ ∈ P non-zero, the following identities hold:
D P (ρkσ) = sup tr[ρ log ω] − log tr[σω] = sup tr[ρ log ω] + 1 − tr[σω] .
ω>0
(4)
ω>0
Moreover, the suprema are achieved when ρ and σ are positive definite operators, i.e. ρ > 0 and
σ > 0.
Proof. If ρ 6≪ σ then the two expressions in the suprema of (4) are unbounded, as expected. We
now assume that ρ ≪ σ. Let us consider the second expression in (4). We write the supremum
over ω > 0 as two suprema over {Pi }di=1 and {ωi }di=1 , where ωi > 0 are the eigenvalues of ω
corresponding to the eigenvectors given by rank-1 projectors Pi . Using the fact that tr[ρ] = 1, we
find
sup tr[ρ log ω] + 1 − tr[σω] = sup
ω>0
sup
d
X
{Pi }di=1 {ωi }di=1 i=1
tr[Pi ρ](log ωi + 1) − tr[Pi σ]ωi .
(5)
For i ∈ [d] such that tr[Pi σ] = 0, we also have tr[Pi ρ] = 0, and thus the corresponding term is
zero. When tr[Pi σ] > 0, let us first consider tr[Pi ρ] = 0. In this case, the supremum of i-th term
is supωi >0 − tr[Pi σ]ωi = 0 achieved in the limit ωi → 0. Now in the case tr[Pi ρ] > 0 (which is the
only possible case when ρ > 0), observe that the expression is concave in ωi , the inner supremum
is achieved by the local maxima at ωi = tr[Pi ρ]/ tr[Pi σ]. Plugging this into (5), we find
sup
d
X
{Pi }di=1 i=1
d
X
tr[Pi ρ]
tr[Pi ρ]
tr[Pi ρ] log
tr[Pi ρ] log
+ tr[Pi ρ] − tr[Pi ρ] = sup
.
tr[Pi σ]
tr[Pi σ]
{Pi }d
i=1
(6)
i=1
This is the expression for the measured relative entropy in (3). The remaining supremum is achieved
because the set of rank-1 projectors is compact and the divergence is lower semi-continuous.
3
It remains to show that the two variational expressions in (4) are equivalent. We have log(1 +
x) ≤ x for all x > −1 and, thus, − log tr[σω] ≥ 1 − tr[σω] for all ω > 0. This yields
sup tr[ρ log ω] − log tr[σω] ≥ sup tr[ρ log ω] + 1 − tr[σω] .
ω>0
(7)
ω>0
Now note that the expression on the left hand side is invariant under the substitution ω → γω for
γ > 0. Hence, as tr[σω] > 0 for ω > 0 and non-zero σ, we can add the normalization constraint
tr[σω] = 1 and we have
sup tr[ρ log ω] − log tr[σω] =
ω>0
sup tr[ρ log ω] − log tr[σω]
(8)
ω>0
tr[σω]=1
≤ sup tr[ρ log ω] + 1 − tr[σω] ,
(9)
ω>0
where we used that log tr[σω] = 1 − tr[σω] when tr[σω] = 1.
Using this variational expression, we are able to answer a question left open by Donald [12,
Sec. 3] as well as Hiai and Petz [21, Sec. 1], namely whether the two definitions of measured
relative entropy are equal.
Theorem 2. For ρ ∈ S and σ ∈ P, we have D P (ρkσ) = D M (ρkσ).
Proof. The direction ‘≤’ holds trivially. Moreover, if ρ 6≪ σ, we can choose P1 to be a rank-1
projector such that tr[P1 ρ] > 0 and tr[P1 σ] = 0 and thus D P (ρkσ) = D M (ρkσ) = +∞.
It remains to show the direction ‘≥’ when ρ ≪ σ holds. Let (X , M ) be a POVM. Recall that the
distribution Pρ,M is defined by Pρ,M (x) = tr[M (x)ρ]. Introducing X̄ = {x ∈ X : Pρ,M (x)Pσ,M (x) >
0}, we can write
X
Pρ,M (x)
(10)
D(Pρ,M kPσ,M ) =
Pρ,M (x) log
Pσ,M (x)
x∈X̄
X
Pρ,M (x)
(11)
M (x) log
= trρ
Pσ,M (x)
x∈X̄
Xp
p
Pρ,M (x)
(12)
M (x) log
M (x) .
·1
= trρ
Pσ,M (x)
x∈X̄
P
(x)
ρ,M
Now observe that for any x ∈ X̄ , the spectrum of the operator Pσ,M
(x) · 1 is included in (0, ∞).
As a result, we can apply the operator Jensen inequality for the function log, which is operator
concave on (0, ∞) and get
X
Pρ,M (x)
M (x)
D(Pρ,M kPσ,M ) ≤ trρ log
.
(13)
Pσ,M (x)
x∈X̄
Now we simply choose
X
Pρ,M (x)
ω=
M (x)
Pσ,M (x)
x∈X̄
so that
tr[σω] =
X
x∈X̄
Pσ,M (x)
X
Pρ,M (x)
=
Pρ,M (x) = 1 ,
Pσ,M (x)
(14)
x∈X
and which allows to further bound (13) by tr[ρ log ω] + 1 − tr[σω]. Comparing this with the
variational expression for the measured relative entropy in Lemma 1 yields the desired inequality.
Hence, the measured relative entropy, D M (ρkσ), achieves its maximum for projective rank-1
measurements and can be evaluated using the concave optimization problem in Lemma 1.
4
II.
MEASURED RÉNYI RELATIVE ENTROPY
Here we extend the results of the previous section to Rényi divergence. Using the same notation
as in the previous section, for α ∈ (1, ∞) we define the Rényi divergence [40] as
X
P (x) α−1
1
Dα (P kQ) :=
log
P x
(15)
α−1
Q(x)
x∈X
if P ≪ Q and as +∞ if P 6≪ Q. For α ∈ (0, 1) we rewrite the sum as
X
P (x)α Q(x)1−α .
(16)
x∈X
Hence we see that absolute continuity P ≪ Q is not necessary to keep Dα finite for α < 1. However,
the Rényi divergence instead diverges to +∞ when P and Q are orthogonal.1 It is well known that
the Rényi divergence converges to the Kullback-Leibler divergence when α → 1 and we thus set
P (x)
.
D ≡ D1 . Moreover, in the limit α → ∞ we find the max-divergence D∞ (P kQ) = supx∈X log Q(x)
Let us now define the measured Rényi relative entropy as before, namely
(17)
DαM (ρkσ) := sup Dα Pρ,M Pσ,M .
(X ,M )
We will later show that this is equivalent to the following projectively measured Rényi relative
entropy, which we define here for α ∈ (1, ∞) as
)
(
X
1
(18)
tr[Pi ρ]α tr[Pi σ]1−α ,
DαP (ρkσ) :=
log QPα (ρkσ) , with QPα (ρkσ) := sup
α−1
d
{Pi }
i=1
i
and analogously for α ∈ (0, 1) with
QPα (ρkσ) := min
{Pi }di=1
(
X
tr[Pi ρ]α tr[Pi σ]1−α
i
)
.
(19)
Note that the supremum in (18) is achieved and DαP (ρkσ) is finite whenever ρ ≪ σ. Similarly, the
minimum in (19) is non-zero and DαP (ρkσ) is finite whenever ρ 6⊥ σ, i.e. when the two states are
not orthogonal.
Next we give variational expressions for QPα (ρkσ) similar to the variational characterization of
the measured relative entropy in Lemma 1.
Lemma 3. For ρ ∈ S and σ ∈ P, the following identities hold:
h
i
α
α−1
inf
α
tr
ρω
+
(1
−
α)
tr
σω
for α ∈ (0, 12 )
i
h
ω>0
1
inf α tr ρω 1− α + (1 − α) tr[σω] for α ∈ [ 12 , 1)
QPα (ρkσ) = ω>0
i
h
sup α tr ρω 1− α1 + (1 − α) tr[σω] for α ∈ (1, ∞)
ω>0
h
i1−α
α
inf tr [ρω]α tr σω α−1
for α ∈ (0, 1)
= ω>0 h 1− 1 iα
.
sup tr ρω α tr[σω]1−α for α ∈ (1, ∞)
ω>0
The infima and suprema are achieved when ρ > 0 and σ > 0.
1
P and Q are orthogonal, denoted P ⊥ Q, if there exists an A ⊆ X such that P (A) = 1 and Q(A) = 0.
(20)
(21)
5
The expressions (21) can be seen as a generalization of Alberti’s theorem [1] for the fidelity
(which corresponds to α = 1/2) to general α ∈ (0, 1) ∪ (1, ∞).
Proof. We first show the identity (20). Let us discuss the case α ∈ (0, 1) in detail. Note that the
α
two expressions given for α ∈ (0, 12 ) and α ∈ [ 21 , 1) are equivalent by the transformation ω 7→ ω α−1
(the reason for the different ways of writing is to see that the expressions are convex in ω, which
will be useful later, in particular in Theorem 4). We first write
i
h
1
inf α tr ρω 1− α + (1 − α) tr[σω] =
ω>0
inf
inf α
{Pi }di=1 {ωi }di=1
X
1
1− α
ωi
i
tr[Pi ρ] + (1 − α)
X
ωi tr[Pi σ] . (22)
i
Let i ∈ [d] be such that tr[Pi ρ] and tr[Pi σ] are both strictly positive (which is the case when ρ > 0
and σ > 0). Then a local (and thus global) minimum for ωi is easily found at the point where
1 − α1
tr[Pi ρ] α
ω
α 1−
.
(23)
tr[Pi ρ] + (1 − α) tr[Pi σ] = 0
=⇒
ωi =
α i
tr[Pi σ]
If both tr[Pi ρ] = tr[Pi σ] = 0 we can chose ωi arbitrarily. If only tr[Pi ρ] = 0 the infimum is achieved
in the limit ωi → 0, and if only tr[Pi σ] = 0 in the limit ωi → ∞. In all these cases the infimum of
the i-th term is zero. Furthermore, it is achieved for a finite, non-zero ωi when ρ > 0 and σ > 0.
Plugging this solution into the above expression yields
X
tr[Pi ρ]α tr[Pi σ]1−α .
(24)
inf
{Pi }di=1
i∈[d]
This infimum is always achieved since the set we optimize over is compact. Comparing this with
the definition of QPα (ρkσ) yields the first equality.
For the case α ∈ (1, ∞), when ρ ≪ σ, the proof is analogous to the previous argument.
Otherwise, it is simple to see that the supremum is +∞.
Now we show (21). Using (20) and the weighted arithmetic-geometric mean inequality we have
h
i
1 α
QPα (ρkσ) ≥ inf tr ρω 1− α tr [σω]1−α for α ∈ (0, 1) .
(25)
ω>0
However, for any feasible ω > 0 in (20) and λ > 0, λω > 0 is also feasible and choosing λ =
1 α
tr ρω 1− α tr[σω]−α shows that (20) cannot exceed (25). Similarly, by Bernoulli’s inequality,
h
i
1 α
QPα (ρkσ) ≤ sup tr ρω 1− α tr [σω]1−α
ω>0
for α ∈ (1, ∞) .
(26)
And the same argument as above yields the equality.
As for the measured relative entropy, the restriction to rank-1 projective measurements is in
fact not restrictive at all.
Theorem 4. For ρ ∈ S and σ ∈ P, we have DαP (ρkσ) = DαM (ρkσ).
Proof. For α > 1 we follow the steps of the proof of Theorem 2. Consider any finite set X and
POVM M with induced measures Pρ,M and Pσ,M . We can write
Dα (Pρ,M kPσ,M ) =
X
1
log
Pρ,M (x)α Pσ,M (x)1−α ,
1−α
x∈X̄
(27)
6
where we can restrict the sum over X̄ = {x ∈ X : Pρ,M (x)Pσ,M (x) > 0}. We then find that the
sum satisfies
1
α−1
α 1− α
X
X
Pρ,M (x)
Pρ,M (x)
(28)
M (x)
≤ trρ
Pρ,M (x)
,
Pσ,M (x)
Pσ,M (x)
x∈X̄
x∈X̄
where the inequality again follows by the operator Jensen inequality and the operator concavity of
1
the function t 7→ t1− α on [0, ∞). Now we set
X
X
Pρ,M (x) α
Pρ,M (x) α−1
ω=
M (x)
so that tr[σω] =
Pρ,M (x)
.
(29)
Pσ,M (x)
Pσ,M (x)
x∈X
x∈X̄
Thus, we can bound
X
Pρ,M (x)
x∈X
Pρ,M (x)
Pσ,M (x)
α−1
1
≤ α tr ρω 1− α + (1 − α) tr[σω] .
(30)
Comparing this with the variational expression in Lemma 3 yields the desired inequality.
For α < 1, we use the same notation as in (27). We further distinguish the cases α ∈ (0, 12 ) and
α ∈ [ 21 , 1). For α ∈ (0, 12 ), we define
X
Pρ,M (x) α−1
.
(31)
ω=
M (x)
Pσ,M (x)
x∈X̄
We can then evaluate
α
α−1
h
i
α
Pρ,M (x) α−1
X
α−1
tr σω
M (x)
= trσ
Pσ,M (x)
(32)
x∈X̄
≤ trσ
X
x∈X̄
M (x)
Pρ,M (x)
Pσ,M (x)
α
α−1
α
=
X
Pρ,M (x)α Pσ,M (x)1−α .
(33)
x∈X̄
where we used the operator convexity of t 7→ t
on (0, ∞) and the operator Jensen inequality.
Moreover,
X
tr[ρω] =
Pρ,M (x)α Pσ,M (x)1−α .
(34)
x∈X̄
As a result
X
x∈X̄
α
Pρ,M (x)α Pσ,M (x)1−α ≥ α tr[ρω] + (1 − α) tr[σω α−1 ] .
(35)
Comparing this with the variational expression
3 yields the desired inequality.
in Lemma
P
Pρ,M (x) α
1
For α ∈ [ 2 , 1) we choose ω = x∈X̄ M (x) Pσ,M (x) , so that
h
i X
1
Pρ,M (x) α−1
tr ρω 1− α ≤
Pρ,M (x)
Pσ,M (x)
x∈X̄
X
tr [σω] =
Pρ,M (x)α Pσ,M (x)1−α ,
x∈X̄
and once again conclude using the variational expression in Lemma 3.
(36)
(37)
7
III.
ACHIEVABILITY OF RELATIVE ENTROPY
A.
Umegaki’s Relative Entropy
Here we compare the measured relative entropy to other notions of quantum relative entropy
that have been investigated in the literature and have found operational significance in quantum
information theory. Umegaki’s quantum relative entropy [50] has found operational significance as
the threshold rate for asymmetric binary quantum hypothesis testing [21]. For ρ ∈ S and σ ∈ P,
it is defined as
D(ρkσ) := tr ρ(log ρ − log σ) if σ ≫ ρ and as +∞ if σ 6≫ ρ.
(38)
We recall the following variational expression by Petz [36] (see also [25] for another variational
expression):
D(ρkσ) = sup tr[ρ log ω] − log tr[exp(log σ + log ω)]
(39)
ω>0
= sup tr[ρ log ω] + 1 − tr[exp(log σ + log ω)] .
(40)
ω>0
By the data-processing inequality for the relative entropy [29, 49] and Theorem 2 we always have
D P (ρkσ) = D M (ρkσ) ≤ D(ρkσ) ,
(41)
and moreover Petz [35] showed the inequality D P (ρkσ) ≤ D(ρkσ) is strict if ρ and σ do not commute
(for ρ > 0 and σ > 0). Theorem 2 strengthens this to show that the strict inequality persists even
when we take a supremum over POVMs. In the following we give an alternative proof of Petz’
result and then extend the argument to Rényi relative entropy in Section III B.
Proposition 5. Let ρ ∈ S with ρ > 0 and σ ∈ P with σ > 0. Then, we have
D M (ρkσ) ≤ D(ρkσ)
with equality if and only if
[ρ, σ] = 0 .
(42)
Our proof relies on the Golden–Thompson inequality [19, 46]. It states that for two Hermitian
matrices X and Y , it holds that
tr[exp(X + Y )] ≤ tr[exp(X) exp(Y )]
(43)
with equality if an only if [X, Y ] = 0 as shown in [43].
Proof. First, it is evident that equality holds if [ρ, σ] = 0 since then there exists a projective
measurement that commutes with ρ and σ and thus does not effect the states. For the following,
it is worth writing the variational expressions for the two quantities side by side. Namely, writing
H = log ω, we have
D(ρkσ) = 1 + sup tr[ρH] − tr[exp(log σ + H)]
(44)
H
D M (ρkσ) = 1 + max tr[ρH] − tr[σ exp(H)] ,
H
(45)
where we optimize over all Hermitian operators H. Note that, according to Lemma 1, we can write
a max for (45) because we are assuming ρ > 0 and σ > 0. The inequality in (42) can now be seen
as a direct consequence of the Golden–Thompson inequality.
8
It remains to show that D M (ρkσ) = D(ρkσ) implies [ρ, σ] = 0. Let H ∗ be any maximizer of the
variational problem in (45). Observe now that the equality D M (ρkσ) = D(ρkσ) necessitates
tr[exp(log σ + H ∗ )] = tr[σ exp(H ∗ )] ,
(46)
which holds only if and only if [σ, H ∗ ] = 0 by the equality condition in (43). Now define the
function
f (H) = tr[ρH] − tr[σ exp(H)] ,
(47)
and since H ∗ maximizes f (H), we must have for all Hermitian ∆,
0 = Df (H ∗ )[∆] = tr[ρ∆] − tr[σ exp(H ∗ )∆] .
(48)
To evaluate the second summand of this Fréchet derivative we used that σ and H ∗ commute. Since
this holds for all ∆ we must in fact have ρ = σ exp(H ∗ ), which means that [ρ, σ] = 0, as desired.
In some sense this result tells us that some quantum correlations, as measured by the relative
entropy, do not survive the measurement process. This fact appears in quantum information theory in various different guises, for example in the form of locking classical correlations in quantum
states [11]. (We also point to [38] for the use of measured relative entropy measures in quantum
information theory.) Moreover, since Umegaki’s relative entropy is the smallest quantum generalization of the Kullback-Leibler divergence that is both additive and satisfies data-processing (see,
e.g., [47, Sec. 4.2.2]), the same conclusion can be drawn for any sensible quantum relative entropy.
(An example being the quantum relative entropy introduced by Belavkin and Staszewski [4].)
B.
Sandwiched Rényi Relative Entropy
Next we consider a family of quantum Rényi relative entropies [33, 55] that are commonly called
sandwiched Rényi relative entropies and have found operational significance since they determine
the strong converse exponent in asymmetric binary quantum hypothesis testing [31]. They are of
particular interest here because they are, for α ≥ 21 , the smallest quantum generalization of the
Rényi divergence that is both additive and satisfies data-processing [47, Sec. 4.2.2]. (Examples
for other sensible quantum generalizations are the quantum Rényi relative entropy first studied by
Petz [34] and the quantum divergences introduced by Matsumoto [30].)
For ρ ∈ S and σ ∈ P, the sandwiched Rényi relative entropy of order α ∈ (0, 1) ∪ (1, ∞) is
defined as
h 1−α 1−α α i
1
Dα (ρkσ) :=
log Qα (ρkσ) with Qα (ρkσ) := tr σ 2α ρσ 2α
,
(49)
α−1
where the same considerations about finiteness as for the measured Rényi relative entropy apply.
We also consider the limits α → ∞ and α → 1 of the above expression for which we have [33],
D∞ (ρkσ) = inf {λ ∈ R|ρ ≤ exp(λ)σ}
and
D1 (ρkσ) = D(ρkσ) ,
respectively. We recall the following variational expression by Frank and Lieb [17]:
h 1 α−1 1 α i
α−1
inf α tr[ρω] + (1 − α) tr ω 2 σ α ω 2
for α ∈ (0, 1)
ω>0
h 1 α−1 1 α i
Qα (ρkσ) =
sup α tr[ρω] + (1 − α) tr ω 2 σ α ω 2 α−1
for α ∈ (1, ∞) .
ω>0
(50)
(51)
9
Alternatively, we can also write
h 1 α−1 1 α i1−α
α−1
inf tr[ρω]α tr ω 2 σ α ω 2
ω>0
h 1 α−1 1 α i1−α
Qα (ρkσ) =
sup tr[ρω]α tr ω 2 σ α ω 2 α−1
ω>0
for α ∈ (0, 1)
(52)
for α ∈ (1, ∞) ,
where we have used the same arguments as in the proof of the second part of Lemma 3. By the
data-processing inequality for the sandwiched Rényi relative entropy [3, 17, 33] we always have
1
.
(53)
2
In the following we give an alternative proof of this fact and show that
1
M
[ρ, σ] 6= 0
=⇒
Dα (ρkσ) < Dα (ρkσ) for α ∈
,∞ .
(54)
2
In contrast, at the boundaries α ∈ 21 , ∞ it is known that Dα (ρkσ) = DαM (ρkσ) [18, 24, 31]. (We
refer to [31, App. A] for a detailed discussion.)
Theorem 6. Let ρ ∈ S with ρ > 0 and σ ∈ P with σ > 0. For α ∈ 21 , ∞ , we have
DαM (ρkσ) ≤ Dα (ρkσ)
DαM (ρkσ) ≤ Dα (ρkσ)
for α ≥
with equality if and only if
[ρ, σ] = 0 .
(55)
The argument is similar to the proof of Proposition 5 but with the Golden–Thompson inequality
replaced by the Araki–Lieb–Thirring inequality [2, 28]. It states that for X, Y ≥ 0 we have
tr [Y XY ]r ≤ tr [Y r X r Y r ] for r ≥ 1
r
r
r
r
tr [Y XY ] ≥ tr [Y X Y ] for r ∈ [0, 1] ,
(56)
(57)
with equality if and only if [X, Y ] = 0 except for r = 1 as shown in [20].
Proof. We give the proof for α ∈ 21 , 1 and note that the argument for α ∈ (1, ∞) is analogous.
We have the following variational expressions from Lemma 3 and (51):
h 1 1−α
α i
1
1−α
Qα (ρkσ) = inf α tr[ρω] + (1 − α) tr ω − 2 σ α ω − 2
(58)
ω>0
i
h
α
(59)
QPα (ρkσ) = min α tr[ρω] + (1 − α) tr σω α−1 ,
ω>0
where the existence of the minima relies on the fact that both operators have full support. (Note
α
≥ 1, the inequality
also that these two expressions are in fact equivalent for α = 21 .) Since 1−α
then follows immediately by the Araki–Lieb–Thirring inequality (56):
QPα (ρkσ) ≥ Qα (ρkσ)
=⇒
DαM (ρkσ) ≤ Dα (ρkσ) .
(60)
Furthermore, if [ρ, σ] = 0 we have equality. To show that QPα (ρkσ) = Qα (ρkσ) implies [ρ, σ] = 0,
we define the function
i
h
α
(61)
fα (ω) = α tr[ρω] + (1 − α) tr σω α−1 .
For ωα∗ any minimizer of the variational problem in (59), we have
i
h
1
0 = Dfα(ωα∗ )[∆] = α tr[ρ∆] − α tr σ (ωα∗ ) α−1 ∆ ,
(62)
for all Hermitian ∆. To evaluate the second summand of this Fréchet derivative we used that σ and
ωα∗ commute, which holds by the equality condition for Araki–Lieb–Thirring. We thus conclude
1
that ρ = σ (ωα∗ ) α−1 which implies that [ρ, σ] = 0.
10
IV.
VIOLATION OF DATA-PROCESSING FOR α <
1
2
As a further application of the variational characterization of measured Rényi relative entropy,
we can show that the data-processing for the sandwiched Rényi relative entropy Dα fails for α < 12 .
(Numerical evidence pointed to the fact that data-processing does not hold in this regime [32].)
Theorem 7. Let ρ ∈ S with ρ > 0 and σ ∈ P with σ > 0, and [ρ, σ] 6= 0. For α ∈ 0, 12 , we have
DαP (ρkσ) > Dα (ρkσ).
In particular, there exists a rank-1 measurement that achieves DαP (ρkσ) and thus violates the
data-processing inequality.
Proof. First note that [ρ, σ] 6= 0 implies that the two states are not orthogonal and thus both
quantities are finite. For α ∈ (0, 21 ) the formulas (58) and (59) still hold. However, in contrast
α
to the proof of Theorem 6 we have 1−α
∈ [0, 1]. Hence, we find by the Araki–Lieb–Thirring
inequality (57) that
QPα (ρkσ) ≤ Qα (ρkσ)
=⇒
DαP (ρkσ) ≥ Dα (ρkσ) .
(63)
As in the proof of Theorem 6 we have equality if and only if [ρ, σ] = 0. This implies the claim.
V.
A.
EXPLOITING VARIATIONAL FORMULAS
Some Optimization Problems in Quantum Information
The variational characterizations of the relative entropy (39)–(40), the sandwiched Rényi relative entropy (51)–(52), and their measured counterparts (Lemma 1 and Lemma 3), can be used
to derive properties of various entropic quantities that appear in quantum information theory. We
are interested in operational quantities of the form
M(ρ) := min D(ρkσ) ,
σ∈C
(64)
where D(·k·) stands for any relative entropy, measured relative entropy, or Rényi variant thereof,
and C denotes some convex, compact set of states. For Umegaki’s relative entropy D ≡ D, prominent examples for C include the set of
• separable states, giving rise to the relative entropy of entanglement [53].
• positive partial transpose states, leading to the Rains bound on entanglement distillation [39].
• non-distillable states, leading to bounds on entanglement distillation [52].
• quantum Markov states, leading to insights about the robustness properties of these
states [22].
• locally recoverable states, leading to bounds on the quantum conditional mutual information [8, 16, 41].
• k-extendible states, leading to bounds on squashed entanglement [27].
Other examples are conditional Rényi entropies which are defined by optimizing the sandwiched
Rényi relative entropy over a convex set of product states with a fixed marginal, see, e.g., [48].
11
A central question is what properties of the underlying relative entropy D translate to properties
of the induced measure M(·). For example, all the relative entropies discussed in this paper are
superadditive on tensor product states in the sense that
D(ρ1 ⊗ ρ2 kσ1 ⊗ σ2 ) ≥ D(ρ1 kσ1 ) + D(ρ2 kσ2 ) .
(65)
We might then ask if we also have
?
min D(ρ1 ⊗ ρ2 kσ12 ) = M(ρ1 ⊗ ρ2 ) ≥ M(ρ1 ) + M(ρ2 ) = min D(ρ1 kσ1 ) + min D(ρ2 kσ2 ) . (66)
σ12 ∈C12
σ1 ∈C1
σ2 ∈C2
To study questions like this we propose to make use of the variational characterizations of the form
D(ρkσ) = sup f (ρ, σ, ω)
ω>0
in order to write M(ρ) = min sup f (ρ, σ, ω) = sup min f (ρ, σ, ω) , (67)
σ∈C ω>0
ω>0 σ∈C
where we made use of Sion’s minimax theorem [42] for the last equality. We note that the conditions
of the minimax theorem are often fulfilled. The minimization over σ ∈ C then typically simplifies
and is a convex or even semidefinite optimization. (As an example, for the measured relative
entropies the objective function becomes linear in σ.) We can then use strong duality of convex
optimization to rewrite this minimization as a maximization problem [7]:
min f (ρ, σ, ω) = max f¯(ρ, σ̄, ω) .
(68)
M(ρ) = sup max f¯(ρ, σ̄, ω) ,
(69)
σ∈C
σ̄∈C̄
This leads to the expression
ω>0 σ̄∈C¯
which, in contrast to the definition of M(ρ) in (64), only involves maximizations. This often gives
useful insights about M(ρ). As an example, let us come back to the question of superadditivity
raised in (66). We want to argue that the following two conditions on f¯ and C¯ imply superadditivity.
First, we need that the function f¯ is superadditive itself, i.e. we require that
f¯(ρ1 ⊗ ρ2 , σ̄1 ⊗ σ̄2 , ω1 ⊗ ω2 ) ≥ f¯(ρ1 , σ̄1 , ω1 ) + f¯(ρ2 , σ̄2 , ω2 ) .
(70)
And second, we require that the sets C¯ are closed under tensor products in the sense that σ̄1 ∈ C¯1
and σ̄2 ∈ C¯2 imply that σ̄1 ⊗ σ̄2 ∈ C¯12 . Using these two properties, we deduce that
M(ρ1 ⊗ ρ2 ) ≥ f¯(ρ1 ⊗ ρ2 , σ̄1 ⊗ σ̄2 , ω1 ⊗ ω2 ) ≥ f¯(ρ1 , σ̄1 , ω1 ) + f¯(ρ2 , σ̄2 , ω2 )
(71)
for any ω1 , ω2 > 0 and any σ̄1 ∈ C¯1 , σ̄2 ∈ C¯2 . Hence, the inequalities also hold true if we maximize
over these variables, implying superadditivity.
B.
Relative Entropy of Recovery
In the following we denote multipartite quantum systems using capital letters, e.g., A, B, C.
The set of density operators on A and B is then denoted S(AB), for example. We also use these
letters as subscripts to indicate which systems operators act on.
As a concrete application, we study the additivity properties of the relative entropy of recovery
defined as [8, 10, 41]
D rec (ρAD kσAE ) := inf D(ρAD k(IA ⊗ ΓE→D )(σAE )) ,
ΓE→D
(72)
12
where the infimum is taken over all trace-preserving completely positive maps ΓE→D . (We restrict
to σA > 0 such that the quantity is surely finite and the infimum becomes a minimum.) One
motivation for studying the additivity properties of the relative entropy of recovery is the study
of lower bounds on the quantum conditional mutual information and strengthenings of the dataprocessing inequality for the relative entropy [6, 8, 16, 23, 27, 41, 44, 45, 54]. In particular, [8,
Prop. 3] shows that
1 rec ⊗n
,
D
ρABC kρ⊗n
AB
n→∞ n
I(A : C|B) ≥ lim
(73)
where the systems are understood as D = BC and E = B. To obtain a lower bound that does not
involve limits, the authors of [8] use a Finetti-type theorem to show that
lim
n→∞
1 rec ⊗n
M,rec
(ρABC kρAB ) .
D (ρABC kρ⊗n
AB ) ≥ D
n
(74)
with the measured relative entropy of recovery defined as [8] (see also [41, Rmk. 6]),
D M,rec(ρAD kσAE ) := inf D M (ρAD k(IA ⊗ ΓE→D )(σAE )) .
ΓE→D
(75)
(We restrict to σA > 0 such that the quantity is surely finite and the infimum becomes a minimum.)
This gives an interpretation for the conditional mutual information in terms of recoverability.
The measured relative entropy is superadditive and if this property would translate to D M,rec we
would get an alternative proof for the step (74). Using the variational expression for the measured
relative entropy (Lemma 1) together with strong duality for semidefinite programming, we find the
following alternative characterization for D M,rec .
Lemma 8. Let ρAD ∈ S(AD) and σAE ∈ S(AE) with σA > 0, and let σAEF be a purification of
σAE . Then, we have
D M,rec (ρAD kσAE ) = maximize
tr[ρAD log RAD ]
subject to SAF > 0, RAD > 0
1D ⊗ SAF ≥ RAD ⊗ 1F
(76)
tr[SAF σAF ] = 1 .
Proof. We write
h
i
√
√
ΓE→D (σAE ) = trF ΓE→D (σAEF ) = trF ΓE→D σAF ΨAF :E σAF ,
(77)
where we denote by ΨAF :E the (unnormalized) maximally entangled state between AF : E in the
basis of the Schmidt decomposition of σAEF with respect to AF : E. With this we define the
Choi-Jamiolkowski state (unnormalized) of the map ΓE→D as
(78)
τADF = ΓE→D ΨAF :E , τAF = ΠσAF ,
where ΠσAF denotes the projector onto the support of σAF . Hence, we can write
√
√
σAF τADF σAF ,
ΓE→D (σAE ) = trF
(79)
and thus we can express the optimization problem for ΓE→D in terms of the Choi-Jamiolkowski
state in (78). Together with the variational characterization of the measured relative entropy
(Lemma 1) we find
√
√
D M,rec (ρAD kσAE ) =
min
sup tr[ρAD log RAD ] + 1 − tr [τADF σAF RAD σAF ] , (80)
τADF ∈Rec(σAE ) RAD >0
13
where Rec(σAE ) := {τADF ≥ 0, τAF = ΠσAF }. We now apply Sion’s minimax theorem [42] to
exchange the minimum with the supremum. The theorem is applicable as Rec(σAE ) is convex and
compact and {ωAD > 0} is convex. Moreover, as the logarithm is operator concave, the function
√
√
(81)
RAD 7→ tr[ρAD log RAD ] + 1 − tr [τADF σAF RAD σAF ]
is concave for any fixed τADF . Finally, for any fixed RAD , the function being optimized is linear
on τADF . As a result,
√
√
D M,rec (ρAD kσAE ) = sup tr[ρAD log RAD ] + 1 −
max
tr [τADF σAF RAD σAF ] . (82)
τADF ∈Rec(σAE )
RAD >0
Now for a fixed RAD > 0, the inner maximization is a semidefinite program for which we can write
the following programs:
√
√
minimize:
tr[SAF σAF ]
maximize:
tr τADF σAF RAD σAF
subject to:
τADF ≥ 0
subject to:
1D ⊗ SAF ≥ RAD ⊗ 1F .
(83)
σ
τAF = ΠAF
As the primal problem is strictly feasible, Slater’s condition (see, e.g., [7]) is satisfied and we have
strong duality. This leads to the expression:
D M,rec (ρAD kσAE ) = maximize
tr[ρAD log RAD ] + 1 − tr[SAF σAF ]
subject to SAF > 0, RAD > 0
(84)
1D ⊗ SAF ≥ RAD ⊗ 1F .
Observe now that we can restrict the optimization to tr[SAF σAF ] = 1. In fact, for arbitrary feasible
RAD and SAF , we can define
R̃AD =
RAD
tr[SAF σAF ]
and S̃AF =
SAF
.
tr[SAF σAF ]
(85)
The constraint 1D ⊗ SAF ≥ RAD ⊗ 1F is still satisfied and the value of the objective function can
only increase,
tr[ρAD log R̃AD ] = tr[ρAD log RAD ] − tr[ρAD ] log tr[SAF σAF ]
≥ tr[ρAD log RAD ] − tr[SAF σAF ] + 1 ,
(86)
(87)
where we used the inequality log x ≤ x − 1 and that tr[ρAD ] = 1. This concludes the proof.
This readily implies that D M,rec is indeed superadditive.
Proposition 9. Let ρAD ∈ S(AD), τA′ D′ ∈ S(A′ D ′ ), σAE ∈ S(AE), and ωA′ E ′ ∈ S(A′ E ′ ) with
σA , ωA′ > 0. Then, we have
D M,rec(ρAD ⊗ τA′ D′ kσAE ⊗ ωA′ E ′ ) ≥ D M,rec (ρAD kσAE ) + D M,rec (τA′ D′ kωA′ E ′ ) .
(88)
Proof. Given feasible operators RAD , SAF for the quantity D M,rec (ρAD kσAE ) and feasible operators
RA′ D′ , SA′ F ′ for the quantity D M,rec(τA′ D′ kωA′ E ′ ), we have
1D ⊗ SAF ≥ RAD ⊗ 1F ∧ 1D′ ⊗ SA′ F ′ ≥ RA′ D′ ⊗ 1F ′
=⇒
1DD′ ⊗ SAF ⊗ SA′ F ′ ≥ RAD ⊗ RA′ D′ ⊗ 1F F ′ .
(89)
14
Here we used that A ≥ B =⇒ M ⊗ A ≥ M ⊗ B for M ≥0, which holds since taking the
tensor
product with M is a positive map. Moreover, we have tr (SAF ⊗ SA′ F ′ )(σAF ⊗ σA′ F ′ ) = 1. In
other words, (RAD ⊗ RA′ D′ , SAF ⊗ SA′ F ′ ) is a feasible pair in the expression (76) for D M,rec (ρAD ⊗
τA′ D′ kσAE ⊗ ωA′ E ′ ) and we get
D M,rec (ρAD ⊗ τA′ D′ kσAE ⊗ ωA′ E ′ ) ≥ tr [(ρAD ⊗ τA′ D′ ) log (RAD ⊗ RA′ D′ )]
= tr [ρAD log RAD ] + tr [τA′ D′ log RA′ D′ ] .
(90)
(91)
Taking the supremum over feasible (RAD , SAF ) and (RA′ D′ , SA′ F ′ ), we get the claimed superadditivity.
Now, if the relative entropy of recovery would be superadditive we could strengthen (74) to
?
1 rec ⊗n
) ≥ D rec (ρABC kρAB ) .
(92)
D (ρABC kρ⊗n
AB
n→∞ n
This together with (73) would lead to a stronger lower bound on the conditional mutual information.
Using strong duality for convex programming we can write D rec in a dual form similar to Lemma 8.
lim
Lemma 10. Let ρAD ∈ S(AD) and σAE ∈ S(AE) with σA > 0, and let σAEF be a purification of
σAE . Then, we have
D rec (ρAD kσAE ) = maximize
tr[ρAD log ρAD ] − D M (ρAD kRAD )
subject to SAF > 0, RAD > 0
1D ⊗ SAF ≥ RAD ⊗ 1F
(93)
tr[SAF σAF ] = 1 ,
where RAD is not normalized and the measured relative entropy term is in general negative.
We provide a proof in Appendix A. This is to be compared to our expression for the measured
relative entropy of recovery from Lemma 8, which can be written as
D M,rec(ρAD kσAE ) = maximize
tr[ρAD log ρAD ] − D(ρAD kRAD )
subject to SAF > 0, RAD > 0
1D ⊗ SAF ≥ RAD ⊗ 1F
(94)
tr[SAF σAF ] = 1 ,
where RAD is not normalized and the relative entropy term is in general negative. Unfortunately, we
can not solve the open additivity question for the relative entropy of recovery using the variational
expression from Lemma 10. However, we note that the argument flipped relative entropy of recovery
D̄ rec (σAE kρAD ) := inf D((IA ⊗ ΓE→D )(σAE )kρAD )
ΓE→D
(95)
becomes additive (restricted to ρA > 0 to assure finiteness and making the infimum a minimum).
Proposition 11. Let ρAD ∈ S(AD) and σAE ∈ S(AE) with ρA > 0, and let σAEF be a purification
of σAE . Then, we have
D̄ rec (σAE kρAD ) = maximize
− tr[SAF σAF ]
subject to RAD > 0
1D ⊗ SAF ≥ (log ρAD − log RAD ) ⊗ 1F
(96)
tr[RAD ] = 1 .
Moreover, for τA′ D′ ∈ S(A′ D ′ ) with τA′ > 0 and ωA′ E ′ ∈ S(A′ E ′ ), we have
D̄ rec (σAE ⊗ ωA′ E ′ kρAD ⊗ τA′ D′ ) = D̄ rec (σAE kρAD ) + D̄ rec (ωA′ E ′ kτA′ D′ ) .
We provide a proof based on strong duality for convex programming in Appendix A.
(97)
15
C.
Rényi Relative Entropy of Recovery
As a generalization of the measured relative entropy of recovery (75) we define the measured
Rényi relative entropy of recovery for α ∈ (1, ∞) as (see also [41, Rmk. 6]),
1
log QM,rec
(ρAD kσAE ) ,
α
α−1
QM,rec
(ρAD kσAE ) := inf QM
α
α (ρAD k(IA ⊗ ΓE→D )(σAE )) ,
DαM,rec(ρAD kσAE ) :=
with
(98)
(99)
ΓE→D
and analogously for α ∈ (0, 1) with
QM,rec
(ρAD kσAE ) := sup QM
α (ρAD k(IA ⊗ ΓE→D )(σAE )) ,
α
(100)
ΓE→D
where we restrict to σA > 0 such that the quantity is surely finite and the infimum/supremum
is achieved. Using the variational expression for the measured Rényi relative entropy (Lemma 3)
together with strong duality for semidefinite programming, we find the following alternative characterization for QM,rec
.
α
Lemma 12. Let ρAD ∈ S(AD) and σAE ∈ S(AE) with σA > 0, and let σAEF be a purification of
σAE . For α ∈ [ 12 , 1), we have
QM,rec
(ρAD kσAE )
α
= minimize
tr
1− 1
ρAD RADα
α
tr[SAF σAF ]1−α
(101)
subject to SAF > 0, RAD > 0
1D ⊗ SAF ≥ RAD ⊗ 1F .
Similar dual formulas hold for α ∈ (0, 21 ) ∪ (1, ∞).
Proof. As in the proof of Lemma 8 and using the first variational formula from Lemma 3, we get
from Sion’s minimax theorem [42] that
QM,rec
(ρAD kσAE ) =
α
i
h
√
√
1− 1
inf α tr ρAD RADα + (1 − α) tr [τADF σAF RAD σAF ]
max
τADF ∈Rec(σAE ) RAD >0
(102)
=
inf
max
RAD >0 τADF ∈Rec(σAE )
h
1
1− α
α tr ρAD RAD
i
√
√
+ (1 − α) tr [τADF σAF RAD σAF ] .
(103)
The set Rec(σAE ) is convex and compact and {RAD > 0} is convex. Moreover, the function
h
i
√
√
1− 1
RAD 7→ α tr ρAD RADα + (1 − α) tr [τADF σAF RAD σAF ]
(104)
is convex for any fixed τADF because of the operator convexity of t 7→ tβ with β = 1 − α1 for
α ∈ [ 12 , 1) (with β ∈ [−1, 0)). Finally, for a fixed RAD , the function being optimized is linear on
τADF . As in (83) we then look at the convex dual of
max
τADF ∈Rec(σAE )
√
√
tr [τADF σAF RAD σAF ] ,
(105)
16
and find
QM,rec
(ρAD kσAE )
α
= minimize
α tr
1− 1
ρAD RADα
+ (1 − α) tr[SAF σAF ]
subject to SAF > 0, RAD > 0
(106)
1D ⊗ SAF ≥ RAD ⊗ 1F .
Invoking the arithmetic-geometric mean inequality as in the proof of Lemma 3 establishes the
claim.
We find that the measured Rényi entropy of recovery is superadditive for all Rényi parameters.
Proposition 13. Let ρAD ∈ S(AD), τA′ D′ ∈ S(A′ D ′ ), σAE ∈ S(AE), and ωA′ E ′ ∈ S(A′ E ′ ) with
σA , ωA′ > 0. For α ∈ (0, 1) ∪ (1, ∞), we have
DαM,rec (ρAD ⊗ τA′ D′ kσAE ⊗ ωA′ E ′ ) ≥ DαM,rec(ρAD kσAE ) + DαM,rec(τA′ D′ kωA′ E ′ ) .
(107)
Proof. We give the argument for α ∈ [ 21 , 1) based on Lemma 12 and note that the proof for
α ∈ (0, 12 ) ∪ (1, ∞) is similar. Given feasible operators RAD , SAF for the quantity QM,rec
(ρAD kσAE )
α
M,rec
and feasible operators RA′ D′ , SA′ F ′ for the quantity Qα (τA′ D′ kωA′ E ′ ), we apply exactly the same
argument as in (89) and find
(ρAD kσAE ) · QM,rec
(τA′ D′ kωA′ E ′ ) .
QM,rec
(ρAD ⊗ τA′ D′ kσAE ⊗ ωA′ E ′ ) ≤ QM,rec
α
α
α
(108)
This concludes the proof.
Analogously, the relative entropy of recovery (72) is generalized to the Rényi relative entropy
of recovery as (see also [41, Rmk. 6]),
Dαrec (ρAD kσAE ) :=
with
Qrec
α (ρAD kσAE ) :=
1
log Qrec
α (ρAD kσAE )
α−1
inf Qα (ρAD k(IA ⊗ ΓE→D )(σAE ))
ΓE→D
sup Qα (ρAD k(IA ⊗ ΓE→D )(σAE ))
ΓE→D
(109)
for α ∈ (1, ∞)
for α ∈ (0, 1) ,
(110)
where we restrict to σA > 0 such that the quantity is surely finite and the infimum/supremum is
achieved. Now, for the special case of α = 1/2, the sandwiched Rényi relative entropy is equal to
the negative logarithm of the fidelity and as the measured fidelity is the same as the fidelity (see,
e.g., [18, Sec. 3.3]), we have
QM
1/2 = Q1/2
as well as
M,rec
Qrec
1/2 = Q1/2 .
(111)
The same holds true at α → ∞ [31]. As such Proposition 13 can be seen as a generalization
of the multiplicativity of the fidelity of recovery [41] that was derived by two of the authors [6].
For the general sandwiched Rényi relative entropy of recovery, we only have preliminary numerics
indicating that they are not additive. Using a non-commutative extension of the techniques from [5,
Sec. 3.3.1], we can write the sandwiched Rényi relative entropy with fractional Rényi parameter
as a semidefinite program. Together with the Choi state as in (79), we then get a semidefinite
rec . Using this, we found weak numerical evidence for additivity violations for
program for, e.g., D2/3
small dimensional systems. This also challenges the possible additivity of the relative entropy of
recovery D rec (corresponding to the case α = 1).2
2
A very recent preprint [15] has demonstrated by numerical examples that the relative entropy of recovery is indeed
non-additive.
17
VI.
CONCLUSION
We presented variational characterizations of the measured relative entropy and the measured
Rényi relative entropy. Using these formulas we were able to show that these quantities can be
achieved by rank-1 projective measurements instead of general POVMs. We also showed that the
measured Rényi relative entropy is equal to the corresponding sandwiched Rényi relative entropy if
and only if the two quantum states commute (except for the special cases with Rényi parameters 1/2
and ∞ where they are always equal), and gave analytical counterexamples for the data-processing
inequality for the sandwiched Rényi relative entropy with Rényi parameters smaller than 1/2.
Finally, we applied our variational characterizations to analyze the additivity properties of various
relative entropies of recovery.
As an extension of our work it would be desirable to weaken the support conditions in Proposition 5 and Theorem 6 concerning the equality conditions for measured relative entropy and
relative entropy. (We note that this is non-trivial because we make use of the equality conditions for Golden-Thompson and Araki–Lieb–Thirring). Moreover, it would be neat to extend the
concept of measured relative entropy to general, continuous POVMs described by measure spaces
(see, e.g., [51] for the definition of Kullback-Leibler divergence and Rényi divergence on measure
spaces). Many of the steps still go through and we would like to point to a Jensen inequality for
operator-valued measures [14]. It seems, however, that an extension of this inequality would be
needed [13]. Finally, it would also be interesting to use the variational characterizations presented
in this work for studying the operational entropic quantities mentioned in Section V A. This might
lead to new applications of measured relative entropy in quantum information theory.
Acknowledgments: We acknowledge discussions with Fernando Brandão, Douglas Farenick and
Hamza Fawzi. MB acknowledges funding by the SNSF through a fellowship, funding by the
Institute for Quantum Information and Matter (IQIM), an NSF Physics Frontiers Center (NFS
Grant PHY-1125565) with support of the Gordon and Betty Moore Foundation (GBMF-12500028),
and funding support form the ARO grant for Research on Quantum Algorithms at the IQIM
(W911NF-12-1-0521). Most of this work was done while OF was also with the Department of
Computing and Mathematical Sciences, California Institute of Technology. MT would like to
thank the IQIM at CalTech and John Preskill for his hospitality during the time most of the
technical aspects of this project were completed. He is funded by an ARC Discovery Early Career
Researcher Award fellowship (Grant No. DE160100821).
Appendix A: Proofs for Results in Section V
Proof of Lemma 10. We start by writing out the relative entropy of recovery as a convex optimization program,
D rec (ρAD kσAE ) = tr[ρAD log ρAD ]+ minimize
− tr[ρAD log γAD ]
√
√
subject to γAD = trF [ σAF τADF σAF ]
τADF ≥ 0
(A1)
τAF = ΠσAF ,
where the notation is as
of Lemma 8. Clearly, the first and last constraint can be
√in the proof
√
σAF τADF σAF and τAF ≤ ΠσAF without changing the solution. The
relaxed to γAD ≤ trF
18
Lagrangian can then be written as
√
√
L(γ, τ, R, S) = − tr[ρAD log γAD ] + tr [RAD (γAD − trF [ σAF τADF σAF ])]
+ tr [SAF (τAF − ΠσAF )]
= − tr[ρAD log γAD ] + tr[RAD γAD ] − tr [τADF
− tr [SAF ΠσAF ] ,
√
√
( σAF RAD σAF − SAF )]
(A2)
(A3)
where we introduced the variables RAD ≥ 0 and SAF ≥ 0. In order to compute the dual objective
function, we should take the infimum of this quantity over γAD > 0 and τADF ≥ 0. Using the
variational expression for the measured relative entropy (Lemma 1) we find
inf
γAD >0, τADF ≥0
L(γ, θ, R, S) = −D M (ρAD kRAD ) + 1 − tr[SAF ΠσAF ] ,
(A4)
√
√
when SAF ≥ σAF RAD σAF . With Slater’s strong duality and a change of variable S̄AF :=
−1/2
−1/2
σAF SAF σAF (but not including the bar in the following), we get
D rec (ρAD kσAE ) = tr[ρAD log ρAD ]+ maximize
− D M (ρAD kRAD ) + 1 − tr[SAF σAF ]
subject to SAF > 0, RAD > 0
(A5)
1D ⊗ SAF ≥ RAD ⊗ 1F .
Adding the constraint tr[SAF σAF ] = 1 as in the proof of Lemma 8 concludes the proof.
Proof of Proposition 11. We start by writing out the argument flipped relative entropy of recovery
as a convex optimization program,
D̄ rec (σAE kρAD ) = minimize
tr[γAD log γAD ] − tr[γAD log ρAD ]
√
√
subject to γAD = trF [ σAF τADF σAF ]
τADF ≥ 0
(A6)
τAF = ΠσAF ,
where the notation is as in the proof of Lemma 8. The Lagrangian can be written as
√
√
L(γ, τ, T, S) = tr[γAD log γAD ] − tr[γAD log ρAD ] + tr [TAD (γAD − trF [ σAF τADF σAF ])]
+ tr [SAF (τAF − ΠσAF )]
= tr[γAD log γAD ] + tr[γAD (TAD − log ρAD )]
√
√
− tr [SAF ΠσAF ] − tr [τADF ( σAF TAD σAF − SAF )] ,
(A7)
(A8)
where TAD and SAF are Hermitian operators. In order to compute the dual objective function, we
should take the infimum of this quantity over γAD > 0 and τADF ≥ 0. From the last expression
√
√
we get SAF ≥ σAF TAD σAF and we also know how to optimize the first expression as it is an
entropy maximization question:
inf tr[γAD log γAD ] + tr[γAD (TAD − log ρAD )] .
γAD >0
(A9)
It is optimized when γAD = exp(log ρAD − TAD + α1AD ) for some α [9]. This means that this
infimum is given by
inf tr[exp(log ρAD − TAD + α1AD ) (log ρAD − TAD + α1AD )]
α
+ tr[exp(log ρAD − TAD + α1AD ) (TAD − log ρAD )]
= inf α tr[exp(log ρAD − TAD + α1AD )]
(A10)
= inf αeα tr[exp(log ρAD − TAD )]
(A11)
= − tr[exp(log ρAD − TAD − 1AD )] .
(A12)
α
α
19
−1/2
−1/2
With Slater’s strong duality and a change of variable S̄AF := σAF SAF σAF
the bar in the following), we get
D̄ rec (σAE kρAD ) = maximize
(but not including
− tr[SAF σAF ] − tr[exp(log ρAD − TAD − 1AD )]
subject to 1D ⊗ SAF ≥ TAD ⊗ 1F .
(A13)
We now do another change of variable (but not including the bar in the following)
RAD := exp(log ρAD − TAD − 1AD ) as well as
1D ⊗ S̄AF := 1D ⊗ SAF + 1ADF ,
(A14)
and the program becomes
D̄ rec (σAE kρAD ) = maximize
− tr[SAF σAF ] + 1 − tr[RAD ]
subject to RAD > 0
(A15)
1D ⊗ SAF ≥ (log ρAD − log RAD ) ⊗ 1F .
Observe now that we can add the constraint tr[RAD ] = 1. In fact, let
R̄AD :=
RAD
tr[RAD ]
and
S̄AF := SAF + log tr[RAD ] .
(A16)
This solution satisfies the constraint and the objective value becomes
− tr[S̄AF σAF ] + 1 − tr[R̄AD ] = − tr[SAF σAF ] − log tr[RAD ] ≥ − tr[SAF σAF ] + 1 − tr[RAD ] .
(A17)
This concludes the proof of (96).
To prove (97) first note that it is immediate from the definition of the argument flipped relative
entropy of recovery that
D̄ rec (σAE ⊗ ωA′ E ′ kρAD ⊗ τA′ D′ ) ≤ D̄ rec (σAE kρAD ) + D̄ rec (ωA′ E ′ kτA′ D′ ) ,
(A18)
and in the following we prove inequality in the other direction using the dual representation (96). Given feasible operators RAD , SAF for the quantity D̄ rec (σAE kρAD ) and feasible operators RA′ D′ , SA′ F ′ for the quantity D̄ rec (ωA′ E ′ kτA′ D′ ), we have
1D ⊗ SAF ≥ (log ρAD − log RAD ) ⊗ 1F ∧ 1D′ ⊗ SA′ F ′ ≥ (log τA′ D′ − log RA′ D′ ) ⊗ 1F ′
=⇒ 1DD′ ⊗ (SAF ⊗ 1A′ F ′ + 1AF ⊗ SA′ F ′ )
≥ (log ρAD − log RAD ) ⊗ 1A′ D′ + 1AD ⊗ (log τA′ D′ − log RA′ D′ ) ⊗ 1F F ′
= log(ρAD ⊗ τA′ D′ ) − log(RAD ⊗ RA′ D′ ) ⊗ 1F F ′ ,
(A19)
just by multiplying with identities and adding the resulting operator inequalities. Moreover, we
have tr[RAD ⊗ RA′ D′ ] = 1. Hence, (RAD ⊗ RA′ D′ , SAF ⊗ 1A′ F ′ + 1AF ⊗ SA′ F ′ ) is a feasible pair in
the expression (96) for D̄ rec (σAE ⊗ ωA′ E ′ kρAD ⊗ τA′ D′ ) and we get
D̄ rec (σAE ⊗ ωA′ E ′ kρAD ⊗ τA′ D′ ) ≥ − tr[(SAF ⊗ 1A′ F ′ + 1AF ⊗ SA′ F ′ )(σAF ⊗ ωA′ F ′ )]
= − tr[SAF σAF ] − tr[SA′ F ′ ωA′ F ′ ] .
(A20)
(A21)
Taking the supremum over feasible (RAD , SAF ) and (RA′ D′ , SA′ F ′ ), we find the claimed additivity.
20
[1] P. M. Alberti.
“A Note on the Transition Probability over C*-Algebras”.
Letters in Mathematical Physics 7: 25–32 (1983).
[2] H. Araki. “On an Inequality of Lieb and Thirring”. Letters in Mathematical Physics 19(2): 167–170
(1990).
[3] S. Beigi.
“Sandwiched Rényi Divergence Satisfies Data Processing Inequality”.
Journal of Mathematical Physics 54(12): 122202 (2013).
[4] V. P. Belavkin and P. Staszewski. “C*-algebraic Generalization of Relative Entropy and Entropy”.
Annals Henri Poincaré 37(1): 51–58, (1982).
[5] A. Ben-Tal and A. Nemirovski.
Lectures on Modern Convex Optimization.
Society for Industrial and Applied Mathematics (2001).
[6] M. Berta and M. Tomamichel.
“The Fidelity of Recovery Is Multiplicative”.
IEEE Transactions on Information Theory 62(4): 1758–1763 (2016).
[7] S. Boyd and L. Vandenberghe. Convex Optimization. Cambridge University Press (2004).
[8] F. G. S. L. Brandão, A. W. Harrow, J. Oppenheim, and S. Strelchuk. “Quantum Conditional Mutual
Information, Reconstructed States, and State Redistribution”. Physical Review Letters 115(5): 050501
(2015).
[9] V. Chandrasekaran and P. Shah.
“Relative entropy optimization and its applications”.
Mathematical Programming 161(1): 1–32 (2017).
[10] T. Cooney, C. Hirche, C. Morgan, J. P. Olson, K. P. Seshadreesan, J. Watrous, and M. M. Wilde.
“Operational meaning of quantum measures of recovery”. Physical Review A 94(2): 022310 (2016).
[11] D. DiVincenzo, M. Horodecki, D. Leung, J. Smolin, and B. Terhal. “Locking Classical Correlations in
Quantum States”. Physical Review Letters 92(6): 067902 (2004).
[12] M. J. Donald. “On the Relative Entropy”. Communications in Mathematical Physics 105(1): 13–34
(1986).
[13] D. R. Farenick. “Private Communication”, (2015).
[14] D. R. Farenick and F. Zhou.
“Jensen’s Inequality Relative to Matrix-Valued Measures”.
Journal of Mathematical Analysis and Applications 327(2): 919–929 (2007).
[15] H. Fawzi and O. Fawzi. “Relative entropy optimization in quantum information theory via semidefinite
programming approximations”. Preprint, arXiv: 1705.06671 (2017).
[16] O. Fawzi and R. Renner. “Quantum Conditional Mutual Information and Approximate Markov
Chains”. Communications in Mathematical Physics 340(2): 575–611 (2015).
[17] R. L. Frank and E. H. Lieb.
“Monotonicity of a Relative Rényi Entropy”.
Journal of Mathematical Physics 54(12): 122201 (2013).
[18] C. A. Fuchs. Distinguishability and Accessible Information in Quantum Theory. Phd thesis, University
of New Mexico, (1996). Available at arXiv: quant-ph/9601020v1.
[19] S. Golden. “Lower Bounds for the Helmholtz Function”. Physical Review 137(4B): B1127–B1128
(1965).
[20] F. Hiai.
“Equality Cases in Matrix Norm Inequalities of Golden-Thompson Type”.
Linear and Multilinear Algebra 36(4): 239–249 (1994).
[21] F. Hiai and D. Petz. “The Proper Formula for Relative Entropy and its Asymptotics in Quantum
Probability”. Communications in Mathematical Physics 143(1): 99–114 (1991).
[22] B. Ibinson, N. Linden, and A. Winter.
“Robustness of Quantum Markov Chains”.
Communications in Mathematical Physics 277(2): 289–304 (2007).
[23] M. Junge, R. Renner, D. Sutter, M. M. Wilde, and A. Winter. “Universal recovery from a decrease of
quantum relative entropy”. Preprint, arXiv: 1509.07127 (2015).
[24] R. König, R. Renner, and C. Schaffner. “The Operational Meaning of Min- and Max-Entropy”.
IEEE Transactions on Information Theory 55(9): 4337–4347 (2009).
[25] H. Kosaki. “Relative Entropy of States: A Variational Expression”. Journal of Operator Theory
16(2): 335–348, (1986).
[26] S.
Kullback
and
R.
A.
Leibler.
“On
Information
and
Sufficiency”.
Annals of Mathematical Statistics 22(1): 79–86 (1951).
[27] K. Li and A. Winter. “Squashed Entanglement, k-Extendibility, Quantum Markov Chains, and Recovery
Maps”. Preprint, arXiv: 1410.4184 (2014).
21
[28] E. H. Lieb and W. E. Thirring. “Inequalities for the Moments of the Eigenvalues of the Schrödinger
Hamiltonian and Their Relation to Sobolev Inequalities”. In The Stability of Matter: From Atoms to
Stars, chapter III, pages 205–239. Springer (2005).
[29] G.
Lindblad.
“Completely
Positive
Maps
and
Entropy
Inequalities”.
Communications in Mathematical Physics 40(2): 147–151 (1975).
[30] K. Matsumoto. “A New Quantum Version of f-Divergence”. Preprint, arXiv: 1311.4722 (2014).
[31] M. Mosonyi and T. Ogawa. “Quantum Hypothesis Testing and the Operational Interpretation of
the Quantum Rényi Relative Entropies”. Communications in Mathematical Physics 334(3): 1617–1648
(2015).
[32] M. Müller-Lennert. Quantum Relative Rényi Entropies. Master thesis, ETH Zurich,
[33] M. Müller-Lennert, F. Dupuis, O. Szehr, S. Fehr, and M. Tomamichel. “On Quantum Rényi Entropies:
A New Generalization and Some Properties”. Journal of Mathematical Physics 54(12): 122203 (2013).
[34] D. Petz. “Quasi-entropies for Finite Quantum Systems”. Reports on Mathematical Physics 23(1): 57–65
(1986).
[35] D. Petz. “Sufficient Subalgebras and the Relative Entropy of States of a von Neumann Algebra”.
Communications in Mathematical Physics 105(1): 123–131 (1986).
[36] D.
Petz.
“A
Variational
Expression
for
the
Relative
Entropy”.
Communications in Mathematical Physics 114(2): 345–349 (1988).
[37] D. Petz. Quantum Information Theory and Quantum Statistics. Springer (2008).
[38] M. Piani.
“Relative Entropy of Entanglement and Restricted Measurements”.
Physical Review Letters 103(16): 160504 (2009).
[39] E.
Rains.
“A
Semidefinite
Program
for
Distillable
Entanglement”.
IEEE Transactions on Information Theory 47(7): 2921–2933 (2001).
[40] A. Rényi. “On Measures of Information and Entropy”. In Proc. 4th Berkeley Symposium on Mathematical Statistics and Probability, volume 1, pages 547–561, Berkeley, California, USA(1961).
[41] K. P. Seshadreesan and M. M. Wilde. “Fidelity of Recovery, Squashed Entanglement, and Measurement
Recoverability”. Physical Review A 92(4): 042321 (2015).
[42] M. Sion. “On General Minimax Theorems”. Pacific Journal of Mathematics 8: 171–176, (1958).
[43] W.
So.
“Equality
Cases
in
Matrix
Exponential
Inequalities”.
SIAM Journal on Matrix Analysis and Applications 13(4): 1154–1158 (1992).
[44] D. Sutter, O. Fawzi, and R. Renner. “Universal recovery map for approximate Markov chains”.
Proceedings of the Royal Society of London A: Mathematical, Physical and Engineering Sciences 472: 2186
(2016).
[45] D. Sutter, M. Tomamichel, and A. W. Harrow. “Strengthened Monotonicity of Relative Entropy via
Pinched Petz Recovery Map”. IEEE Transactions on Information Theory 62(5): 2907–2913 (2016).
[46] C.
J.
Thompson.
“Inequality
with
Applications
in
Statistical
Mechanics”.
Journal of Mathematical Physics 6(11): 1812 (1965).
[47] M. Tomamichel. Quantum Information Processing with Finite Resources — Mathematical Foundations.
volume 5 of SpringerBriefs in Mathematical Physics, Springer International Publishing (2016).
[48] M. Tomamichel, M. Berta, and M. Hayashi. “Relating Different Quantum Generalizations of the Conditional Rényi Entropy”. Journal of Mathematical Physics 55(8): 082206 (2014).
[49] A. Uhlmann. “Relative entropy and the Wigner-Yanase-Dyson-Lieb concavity in an interpolation theory”. Communications in Mathematical Physics 54(1): 21–32 (1977).
[50] H. Umegaki. “Conditional Expectation in an Operator Algebra”. Kodai Math. Sem. Rep. 14: 59–85,
(1962).
[51] T. van Erven and P. Harremoes.
“Rényi Divergence and Kullback-Leibler Divergence”.
IEEE Transactions on Information Theory 60(7): 3797–3820 (2014).
[52] V. Vedral. “On Bound Entanglement Assisted Distillation”. Physics Letters A 262(2-3): 121–124
(1999).
[53] V. Vedral and M. B. Plenio.
“Entanglement Measures and Purification Procedures”.
Physical Review A 57(3): 1619–1633 (1998).
[54] M.
M.
Wilde.
“Recoverability
in
quantum
information
theory”.
Proceedings of the Royal Society A 471(2182): 20150338 (2015).
[55] M. M. Wilde, A. Winter, and D. Yang.
“Strong Converse for the Classical Capacity
of Entanglement-Breaking and Hadamard Channels via a Sandwiched Rényi Relative Entropy”.
22
Communications in Mathematical Physics 331(2): 593–622 (2014).
| 7cs.IT
|
Compositional Abstractions of Interconnected Discrete-Time
Stochastic Control Systems
arXiv:1709.10312v1 [cs.SY] 29 Sep 2017
Abolfazl Lavaei, Sadegh Esmaeil Zadeh Soudjani, Rupak Majumdar, and Majid Zamani
Abstract— This paper is concerned with a compositional approach for constructing abstractions of interconnected discretetime stochastic control systems. The abstraction framework
is based on new notions of so-called stochastic simulation
functions, using which one can quantify the distance between
original interconnected stochastic control systems and their
abstractions in the probabilistic setting. Accordingly, one can
leverage the proposed results to perform analysis and synthesis
over abstract interconnected systems, and then carry the
results over concrete ones. In the first part of the paper, we
derive sufficient small-gain type conditions for the compositional quantification of the distance in probability between
the interconnection of stochastic control subsystems and that
of their abstractions. In the second part of the paper, we
focus on the class of discrete-time linear stochastic control
systems with independent noises in the abstract and concrete
subsystems. For this class of systems, we propose a computational scheme to construct abstractions together with their
corresponding stochastic simulation functions. We demonstrate
the effectiveness of the proposed results by constructing an
abstraction (totally 4 dimensions) of the interconnection of four
discrete-time linear stochastic control subsystems (together 100
dimensions) in a compositional fashion.
I. I NTRODUCTION
Large-scale interconnected systems have received significant attentions in the last few years due to their presence in
real life systems including power networks, air traffic control,
and so on. Each complex real-world system can be regarded
as an interconnected system composed of several subsystems.
Since these large-scale network of systems are inherently difficult to analyze and control, one can develop compositional
schemes to employ the abstractions of the given systems as a
replacement in the controller design process. In other words,
in order to overcome the computational complexity in largescale interconnected systems, one can abstract the original
concrete system by a simpler one with lower dimension.
Those abstractions allow us to design controllers for them,
and then refine the controllers to the ones for the concrete
complex systems, while provide us with the quantified errors
in this controller synthesis detour.
In the past few years, there have been several results on the
construction of (in)finite abstractions for stochastic systems.
Existing results include infinite approximations for a class of
stochastic hybrid systems [1] and finite approximations for
discrete-time stochastic models with continuous state spaces
[2], [3], [4]. Construction of finite bisimilar abstractions for
stochastic control systems is proposed in [5], [6]. Recent
results address stochastic switched systems [7], [8] and
This work was supported in part by the German Research Foundation
(DFG) through the grant ZA 873/1-1.
A. Lavaei and M. Zamani are with the Department of Electrical and Computer Engineering, Technical University of Munich, D-80290 Munich, Germany. S. Esmaeil Zadeh Soudjani and R. Majumdar are with the Max Planck
Institute for Software Systems, Kaiserslautern 67663, Germany. Email:
{lavaei,zamani}@tum.de, {sadegh,rupak}@mpi-sws.org.
propose compositional construction of infinite abstractions
of continuous-time stochastic control systems [9], [10] using
small-gain type compositional reasoning.
In this paper, we provide a compositional approach for
the construction of infinite abstractions of interconnected
discrete-time stochastic control systems. Our abstraction
framework is based on a new notion of so-called stochastic
simulation functions under which an abstraction, which is
itself a discrete-time stochastic control system with lower
dimension, performs as a substitute in the controller design
process. The stochastic simulation function is leveraged to
quantify the error in probability in this controller synthesis
scheme. As a consequence, one can use the proposed results here to solve particularly safety/reachability problems
over the abstract interconnected systems and then carry the
results over the concrete interconnected ones. It should be
noted that the existing compositional results in [9], [10] are
for continuous-time stochastic systems and assume that the
noises in the concrete and abstract systems are the same,
which means the abstraction has access to the noise of the
concrete system, which is a strong assumption. In this paper,
we do not have such an assumption meaning that the noises
of the abstraction can be completely independent of that of
the concrete system.
II. D ISCRETE -T IME S TOCHASTIC C ONTROL S YSTEMS
A. Preliminaries
We consider a probability space (Ω, FΩ , PΩ ), where Ω is
the sample space, FΩ is a sigma-algebra on Ω comprising
subsets of Ω as events, and PΩ is a probability measure
that assigns probabilities to events. We assume that random
variables introduced in this article are measurable functions
of the form X : (Ω, FΩ ) → (SX , FX ). Any random variable
X induces a probability measure on its space (SX , FX ) as
P rob{A} = PΩ {X −1 (A)} for any A ∈ FX . We often directly discuss the probability measure on (SX , FX ) without
explicitly mentioning the underlying probability space and
the function X itself.
A topological space S is called a Borel space if it is
homeomorphic to a Borel subset of a Polish space (i.e., a
separable and completely metrizable space). Examples of a
Borel space are the Euclidean spaces Rn , its Borel subsets
endowed with a subspace topology, as well as hybrid spaces.
Any Borel space S is assumed to be endowed with a Borel
sigma-algebra, which is denoted by B(S). We say that a map
f : S → Y is measurable whenever it is Borel measurable.
B. Notation
The following notation is used throughout the paper. We
denote the set of nonnegative integers by N := {0, 1, 2, . . .}
and the set of positive integers by Z+ := {1, 2, 3, . . .}. The
symbols R, R>0 , and R≥0 denote the set of real, positive, and
nonnegative real numbers, respectively. Given a vector x ∈
Rn , kxk denotes the Euclidean norm of x. The symbols In
and 1n denote the identity matrix in Rn×n , and the vector in
Rn with all its elements to be one, respectively. We denote by
diag(a1 , . . . , aN ) a diagonal matrix in RN ×N with diagonal
matrix entries a1 , . . . , aN starting from the upper left corner.
Given functions fi : XQ
. . . , N },
i → Yi , for
QNany i ∈ {1,
QN
N
their Cartesian product i=1 fi : i=1 Xi → i=1 Yi is
Q
defined as ( N
i=1 fi )(x1 , . . . , xN ) = [f1 (x1 ); . . . ; fN (xN )].
For any set A we denote by AN the Cartesian
product of a
Q∞
countable number of copies of A, i.e., AN = k=0 A. Given
a measurable function f : N → Rn , the (essential) supremum
of f is denoted by kf k∞ := (ess)sup{kf (k)k, k ≥ 0}. A
+
function γ : R+
0 → R0 , is said to be a class K function if
it is continuous, strictly increasing, and γ(0) = 0. A class
K function γ(·) is said to be a class K∞ if γ(r) → ∞ as
r → ∞.
C. Discrete-Time Stochastic Control Systems
We consider stochastic control systems in discrete time
(dt-SCS) defined over a general state space adopted from
[11] and characterized by the tuple
Σ = (X, W, U, {U (x, ω)|x ∈ X, ω ∈ W }, Y, Tx , h) ,
(1)
where X is a Borel space as the state space of the system.
We denote by (X, B(X)) the measurable space with B(X)
being the Borel sigma-algebra on the state space. Sets W
and U are Borel spaces as the internal and external input
spaces of the system. The set {U (x, ω)|x ∈ X, ω ∈ W }
is a family of non-empty measurable subsets of U with the
property that
K := {(x, ω, ν) : x ∈ X, ω ∈ W, ν ∈ U (x)}
is measurable in X × W × U . Intuitively, U (x, ω) is the set
of inputs that are feasible at state x ∈ X with the internal
input ω ∈ W . Set Y is a Borel space as the output space
of the system. Map Tx : B(X) × X × W × U → [0, 1], is
a conditional stochastic kernel that assigns to any x ∈ X,
ω ∈ W and ν ∈ U (x, ω) a probability measure Tx (·|x, ω, ν)
on the measurable space R(X, B(X)) so that for any set
A ∈ B(X), Px,ω,ν (A) = A Tx (dx̄|x, ω, ν), where Px,ω,ν
denotes the conditional probability P(·|x, ω, ν). Finally, h :
X → Y is a measurable function that maps a state x ∈ X
to its output y = h(x) ∈ Y .
Given the dt-SCS in (1), we are interested in Markov
policies to control the system.
Definition 2.1: A Markov policy for the dt-SCS Σ in (1)
is a sequence ρ = (ρ0 , ρ1 , ρ2 , . . .) of universally measurable
stochastic kernels ρn [12], each defined on the input space
U given X × W and such that for all (xn , ωn ) ∈ X ×
W , ρn (U (xn , ωn )|(xn , ωn )) = 1. The class of all Markov
policies is denoted by ΠM .
For given inputs ω(·), ν(·), the stochastic kernel Tx captures the evolution of the state of the system. This kernel
features an equivalent dynamical representation: there exists
a measurable function fa : X × W × U × Vς → X such that
the evolution of the state of the system can be written as
x(k + 1) = fa (x(k), ω(k), ν(k), ς(k)),
where {ς(k) : Ω → Vς , k ∈ N} is a sequence of independent
and identically distributed (i.i.d.) random variables on the set
Vς . In this paper we assume that the state space X is a subset
of Rn and are interested in the specific form of the function
fa (x, ω, ν, ς) = f (x, ω, ν) + g(x)ς.
Therefore, the dt-SCS Σ in (1) can be described as:
x(k + 1) = f (x(k), ω(k), ν(k)) + g(x(k))ς(k),
Σ:
y(k) = h(x(k)),
(2)
for any x(k) ∈ X, ω(k) ∈ W, and ν(k) ∈ U (x(k), ω(k)).
Note that Tx in (1) contains the information of functions f
and g and the distribution of noise ς(·) in the dynamical
representation (2).
For the sake of simplicity, we also assume that the set of
valid inputs is the whole input space: U (x, ω) = U for all
x ∈ X and ω ∈ W , but the obtained results are generally
applicable. We associate respectively to U and W the sets U
and W to be collections of sequences {ν(k) : Ω → U, k ∈
N} and {ω(k) : Ω → W, k ∈ N}, in which ν(k) and ω(k)
are independent of ς(t) for any k, t ∈ N and t ≥ k.
For any initial state a ∈ X, ν(·) ∈ U, and ω(·) ∈ W,
the random sequences xaων : Ω × N → X and yaων : Ω ×
N → Y that satisfy (2) are called respectively the solution
process and output trajectory of Σ under external input ν,
internal input ω and initial state a. We here call the tuple
(ω, ν, xaων , yaων ) a trajectory of Σ.
III. S TOCHASTIC P SEUDO -S IMULATION AND
S IMULATION F UNCTIONS
In this section we first introduce a notion of so-called
pseudo-simulation functions for the discrete-time stochastic
control systems with both internal and external inputs and
then define the stochastic simulation functions for systems
with only external input. These definitions can be used to
quantify closeness of two dt-SCS with the same internal input
and output spaces.
Definition 3.1: Consider dt-SCS Σ = (X, W, U, Y, Tx , h)
b = (X̂, W, Û , Y, T̂x , ĥ) with the same internal input
and Σ
and output spaces. A function V : X × X̂ → R≥0 is called
b to Σ
a stochastic pseudo-simulation function (SPSF) from Σ
if
• ∃α ∈ K∞ such that
∀x ∈ X, ∀x̂ ∈ X̂,
•
α(kh(x) − ĥ(x̂)k) ≤ V (x, x̂), (3)
∀x ∈ X, x̂ ∈ X̂, ν̂ ∈ Û , and ∀ω̂ ∈ Ŵ , ∃ν ∈ U such
that ∀ω ∈ W
h
E V (x(k + 1), x̂(k + 1)) x(k), x̂(k), ω(k) = ω,
i
, ω̂(k) = ω̂, ν(k) = ν, ν̂(k) = ν̂ − V (x(k), x̂(k)) ≤
−κ(V (x(k), x̂(k)))+ρint (kω − ω̂k)+ρext(kν̂k)+ψ,
(4)
for some κ ∈ K, ρint , ρext ∈ K∞ ∪ {0}, and ψ ∈ R≥0 .
b PS Σ if there exists a pseudoWe utilize notation Σ
b to Σ, in which control system
simulation function V from Σ
b
Σ is considered as an abstraction of concrete (original)
system Σ. The second condition above implies implicitly
existence of a function ν = νν̂ (x, x̂, ν̂, ω̂) for satisfaction
of (4). This function is called the interface function and can
b to a policy ν
be used to refine a synthesized policy ν̂ for Σ
for Σ.
In this paper we study interconnected discrete-time
stochastic control systems without internal inputs, resulting
from the interconnection of discrete-time stochastic control
subsystems having both internal and external signals. In
this case, the interconnected dt-SCS reduces to the tuple
(X, U, Y, Tx , h). Thus we modify the above notion for systems without internal inputs.
Definition 3.2: Consider two dt-SCS Σ = (X, U, Y, Tx , h)
b = (X̂, Û , Y, T̂x , ĥ) with the same output spaces. A
and Σ
function V : X × X̂ → R≥0 is called a stochastic simulation
b to Σ if
function (SSF) from Σ
• ∃α ∈ K∞ such that
∀x ∈ X, ∀x̂ ∈ X̂,
α(kh(x) − ĥ(x̂)k) ≤ V (x, x̂), (5)
∀x ∈ X, x̂ ∈ X̂, ν̂ ∈ Û , ∃ν ∈ U such that
h
i
E V (x(k+1), x̂(k+1)) x(k), x̂(k), ν(k)=ν, ν̂(k)=ν̂
•
−V (x(k), x̂(k)) ≤−κ(V (x(k), x̂(k)))+ρext (kν̂k)+ψ,
(6)
for some κ ∈ K, ρext ∈ K∞ ∪ {0}, and ψ ∈ R≥0 .
The next theorem shows usefulness of SSF in comparing
output trajectories of two dt-SCS in a probabilistic sense.
b be two dt-SCS with the same
Theorem 3.3: Let Σ and Σ
b to Σ, and
output spaces. Suppose V is an SSF from Σ
there exists a constant 0 < κ
b < 1 such that the function
κ ∈ K in (6) satisfies κ(r) ≥ κ
br ∀r ∈ R≥0 . For any
external input trajectory ν̂(·) ∈ Û that preserves Markov
b and for any random variables
property for the closed-loop Σ,
a and â as the initial states of the two dt-SCS, there exists
an input trajectory ν(·) ∈ U of Σ through the interface
function associated with V such that the following inequality
holds provided that there exists a constant ψb ≥ 0 satisfying
ψb ≥ ρext (kν̂k∞ ) + ψ:
P
sup kyaν (k) − ŷâν̂ (k)k ≥ ε | [a; â]
0≤k≤T
(7)
T
b
1 − 1 − V (a,â) 1 − ψb
if α (ε) ≥ ψbκ ,
α(ε)
α(ε)
b
≤
b
ψ
V (a,â) (1−b
κ)T + κbα(ε)
(1−(1−b
κ)T ) if α (ε) < ψbκ .
α(ε)
b to Σ, we have
Proof: Since V is an SSF from Σ
P
sup kyaν (k) − ŷâν̂ (k)k ≥ ε | [a; â]
0≤k≤T
=P
sup α (kyaν (k) − ŷâν̂ (k)k) ≥ α(ε) | [a; â]
0≤k≤T
≤P
sup V (xaν (k), x̂âν̂ (k)) ≥ α(ε) | [a; â] . (8)
0≤k≤T
The equality holds due to α being a K∞ function. The
inequality is also true due to condition (5) on the SSF V .
The results follows by applying Theorem 3 in [13, pp. 81]
to (8) and utilizing inequality (6).
The results shown in Theorem 3.3 provide closeness of
output behaviours of two systems in finite-time horizon. We
can extend the result to infinite-time horizon provided that
constant ψ̂ = 0 as the following.
b be two dt-SCS with the same
Corollary 3.4: Let Σ and Σ
b to Σ such that
output spaces. Suppose V is an SSF from Σ
ρext (·) ≡ 0 and ψ = 0. For any external input trajectory
b
ν̂(·) ∈ Û preserving Markov property for the closed-loop Σ,
and for any random variables a and â as the initial states
of the two dt-SCS, there exists ν(·) ∈ U of Σ through the
interface function associated with V such that the following
inequality holds:
V (a, â)
.
P
sup kyaν (k) − ŷâ0 (k)k ≥ ε | [a; â] ≤
α (ε)
0≤k<∞
b to Σ with ρext (·) ≡ 0
Proof: Since V is an SSF from Σ
and ψ = 0, for any x(k) ∈ X and x̂(k) ∈ X̂ and any
ν̂(k) ∈ Û , there exists ν(k) ∈ U such that
h
i
E V (x(k + 1), x̂(k + 1)) | x(k), x̂(k), ν(k), ν̂(k)
− V ((x(k), x̂(k)) ≤ −κ(V (x(k), x̂(k)),
(9)
showing that V (xaν (k), x̂âν̂ (k)) is a nonnegative supermartingale [14]. Following the same reasoning as in the proof
of Theorem 3.3 we have
P
sup kyaν (k) − ŷâν̂ (k)k ≥ ε | [a; â]
0≤k<∞
=P
sup α kyaν (k) − ŷâν̂ (k)k ≥ α(ε) | [a; â]
0≤k<∞
V (a, â)
≤P
sup V (xaν (k), x̂âν̂ (k)) ≥ α(ε) | [a; â] ≤
,
α(ε)
0≤k<∞
where the last inequality is due to the nonnegative supermartingale property [13].
The stochastic simulation function defined before can be
used to guarantee an upper bound on the probability of the
maximum difference in output trajectories. This idea can
be used in conjunction with stochastic safety/reachability
analysis of the systems, which is discussed next.
Suppose that V is a stochastic simulation function from
b to Σ. Then for any input strategy ν̂ of the system Σ
b
Σ
there exists an input strategy ν of Σ, such that the following
probability is bounded
P sup kyaν (k) − ŷâν̂ (k)k ≥ ε | [a; â] ≤ δ,
0≤k≤T
with δ being defined in Theorem 3.3 based on ε and T . Given
the unsafe set A1 for Σ, we can construct another set A2 ,
which is the ε neighborhood of A1 , i.e.,
A2 = {y ′ |∃y ∈ A1 , ky ′ − yk ≤ ε}.
Now, we can provide the following corollary.
b to Σ. For any
Corollary 3.5: Suppose V is an SSF from Σ
input ν̂(·) there exists ν(·) such that the following inequality
holds:
P{∃k ≤ T, yaν (k) ∈ A1 } ≤ P{∃k ≤ T, ŷâν̂ (k) ∈ A2 }+δ.
Proof: Denote the events E1 := {∃k ≤ T, yaν (k) ∈
A1 } and E2 := {∃k ≤ T, ŷâν̂ (k) ∈ A2 }. Then we have
P{E1 } = P{E1 ∩ E2 } + P{E1 ∩ E¯2 } ≤ P{E2 } + P{E1 ∩ Ē2 },
where Ē2 is the complement of E2 . Notice that the term
P{E1 ∩ Ē2 } is bounded by δ due to the above results, which
concludes the proof.
IV. C OMPOSITIONAL A BSTRACTIONS
I NTERCONNECTED S YSTEMS
κi (s) ≥ λi γi (s)
hji ≡ 0 =⇒ δij = 0 and
FOR
Here, we first provide a formal definition of interconnection between discrete-time stochastic control systems.
A. Interconnected Stochastic Control Systems
Consider a complex stochastic control system Σ composed
of N ∈ N≥1 stochastic control subsystems Σi interconnected
with each other as follows:
Σi = (Xi , Wi , Ui , Yi , Txi , hi ), i ∈ [1; N ],
with partitioned internal inputs and outputs
ωi = ωi1 ; . . . ; ωi(i−1) ; ωi(i+1) ; . . . ; ωiN ,
yi = [yi1 ; . . . ; yiN ],
(10)
and also output space and function
hi (xi ) = [hi1 (xi ); . . . ; hiN (xi )],
Yi =
N
Y
Yij .
Assumption 1: For any i, j ∈ [1; N ], i 6= j, there exist
K∞ functions γi and constants λi ∈ R>0 and δij ∈ R≥0
such that for any s ∈ R≥0
hji 6≡ 0 =⇒ ρiint ((N − 1)α−1
j (s)) ≤ δij γj (s),
µT (−Λ + ∆) < 0
(11)
We interpret the outputs yii as external ones, whereas the
outputs yij with i 6= j are internal ones which are used
to define the interconnected stochastic control systems. In
particular, we assume that the dimension of ωij is equal
to the dimension of yji . If there is no connection from
stochastic control subsystem Σi to Σj , then we assume that
the connecting output function is identically zero for all
arguments, i.e., hij ≡ 0. Now, we define the interconnected
stochastic control systems as the following.
Definition 4.1: Consider N ∈ N≥1 stochastic control
subsystems Σi = (Xi , Wi , Ui , Yi , Txi , hi ), i ∈ [1; N ], with
the input-output configuration as in (10) and (11). The interconnection of Σi for any i ∈ [1, . . . , N ], is the interconnected
stochastic control system Σ = (X,
Y, Tx , h), denoted
QU,
QN by
N
I(Σ1 , . . . , ΣN ), such that X := i=1 Xi , U := i=1 Ui ,
QN
function fa := i=1 fai , characterizing the stochastic kernel
QN
Tx based on those of subsystems (i.e. fai ), Y := i=1 Yii ,
QN
and h = i=1 hii , subjected to the following constraint:
(12)
B. Compositional Abstractions of Interconnected Systems
This subsection contains one of the main contributions of
the paper. We assume that we are given N stochastic control
subsystems
Σi = (Xi , Wi , Ui , Yi , Txi , hi ),
bi =
together with their corresponding abstractions Σ
b i to Σi . For
(X̂i , Wi , Ûi , Yi , T̂xi , ĥi ) with SPSF Vi from Σ
providing the main compositionality result of the paper, we
raise the following assumption.
(15)
where κi , αj , and ρiint represent the corresponding K and
K∞ functions of Vi appearing in Definition 3.1. Prior to presenting the next theorem, we define Λ := diag(λ1 , . . . , λN ),
→
∆ := {δij }, where δii = 0 ∀i ∈ [1; N ], and Γ( s ) :=
→
[γ1 (s1 ); . . . ; γN (sN )], where s = [s1 ; . . . ; sN ]. In the next
theorem, we leverage a small-gain type condition to quantify
the error between the interconnection of stochastic control
subsystems and that of their abstractions in a compositional
way.
Theorem 4.2: Consider the interconnected stochastic control system Σ = I(Σ1 , . . . , ΣN ) induced by N ∈ N≥1
stochastic control subsystems Σi . Suppose that each stochasb i with the
tic control subsystem Σi admits an abstraction Σ
corresponding SPSF Vi . If Assumption 1 holds and there
exists a vector µ ∈ RN
>0 such that the inequality
(16)
is also met, then
j=1
ωij = yji ∀i, j ∈ [1; N ], i 6= j.
(13)
(14)
V (x, x̂) :=
N
X
µi Vi (xi , x̂i )
i=1
b = I(Σ
b 1, . . . , Σ
b N ) to Σ =
is an SSF function from Σ
I(Σ1 , . . . , ΣN ).
The proof is similar to that of Theorem 4.5 in [9], and is
omitted here due to lack of space.
V. D ISCRETE -T IME L INEAR S TOCHASTIC C ONTROL
S YSTEMS
In this section, we focus on a class of discrete-time linear
stochastic control systems, defined as follows:
x(k + 1) = Ax(k) + Bν(k) + Dω(k) + F ς(k),
Σ:
y(k) = Cx(k),
(17)
where the additive noise ς(k) is a sequence of independent
random vectors with multivariate standard normal distributions. We use the tuple Σ = (A, B, C, D, F ) to refer to the
class of systems in (17). Here, we provide conditions under
which a candidate V is an SPSF function facilitating the
construction of an abstraction Σ̂.
Let us assume that there exist matrix K and positive
definite matrix M such that the matrix inequalities
C T C M,
(18)
(1 + π)(A + BK)T M (A + BK) − M −b
κM, (19)
hold for some positive constants π and 0 < κ
b < 1. We
employ the following quadratic SPSF
V (x, x̂) = (x − P x̂)T M (x − P x̂),
(20)
where P ∈ Rn×n̂ is a matrix of appropriate dimension.
Assume that the equalities
AP
D
CP
=
=
=
P Â − BQ
P D̂ − BS
Ĉ,
(21)
(22)
(23)
hold for some matrices Q and S of appropriate dimensions
and possibly with the lowest possible n̂. In the next theorem,
we show that under the aforementioned conditions V in (20)
b to Σ.
is an SPSF from Σ
b =
Theorem 5.1: Let Σ = (A, B, C, D, F ) and Σ
(Â, B̂, Ĉ, D̂, F̂ ) be two discrete-time linear stochastic control subsystems with two independent additive noises. Suppose that there exist matrices M , K, P , Q, and S satisfying
(18), (19), (21), (22), and (23). Then, V defined in (20) is
b to Σ.
an SPSF from Σ
Proof: Here, we show that ∀x, ∀x̂, ∀ν̂, ∀ω̂, ∃ν, ∀ω,
such that V satisfies kCx − Ĉ x̂k2 ≤ V (x, x̂) and
h
E V (x(k + 1), x̂(k + 1)) | x(k), x̂(k), ω(k) = ω, ω̂(k) = ω̂,
i
, ν̂(k) = ν̂ − V (x(k), x̂(k))
π √
2
≤ −b
κ(V (x(k), x̂(k))) + (1 + + )k M Dk2 kω − ω̂k2
π
2
2
2 √
2
e − P B̂)k kν̂k2
+ (1 + + )k M (B R
π
π
+ Tr F T M F + F̂ T P T M P F̂ .
(24)
According to (23), we have kCx − Ĉ x̂k2 = (x −
P x̂)T C T C(x − P x̂). By applying (18), it can be easily
verified that kCx − Ĉ x̂k2 ≤ V (x, x̂) holds ∀x, ∀x̂. Now, we
show inequality (24). Given any x, x̂, ν̂, and ω̂, we choose
ν via the following linear interface function:
e + S ω̂, (25)
ν = νν̂ (x, x̂, ν̂, ŵ) := K(x − P x̂) + Qx̂ + Rν̂
e of appropriate dimension. By Employing
for some matrix R
equations (21), (22), and the definition of the interface
function in (25), we simplify
Ax + Bνν̂ (x, x̂, ν̂, ω̂) + Dω − P (Âx̂ + B̂ ν̂ + D̂ω̂)
+ F ς(k) − P F̂ ςˆ(k)
e
to (A+BK)(x−P x̂)+D(ω− ω̂)+(B R−P
B̂)ν̂ + F ς(k)−
P F̂ ςˆ(k) . One obtains:
h
E V (x(k + 1), x̂(k + 1)) | x(k), x̂(k), ω(k) = ω, ω̂(k) = ω̂,
i
, ν̂(k) = ν̂ − V (x(k), x̂(k))
h
i
= (x − P x̂)T (A + BK)T M (A + BK) − M (x − P x̂)
i h
i
h
+ 2(x − P x̂)T (A + BK)T M D(ω − ω̂)
h
i h
i
e − P B̂)ν̂
+ 2(x − P x̂)T (A + BK)T M (B R
i
i h
h
√
e − P B̂)ν̂ + k M D(ω − ω̂)k2
+ 2(ω − ω̂)T DT M (B R
√
e − P B̂)ν̂k2 + Tr F T M F + F̂ T P T M P F̂ .
+ k M (B R
1 2
b , for any
Using Young’s inequality [15] as ab ≤ π2 a2 + 2π
a, b ≥ 0 and any π > 0, and by employing Cauchy-Schwarz
inequality and (19), one obtains the following upper bound:
h
E V (x(k + 1), x̂(k + 1)) | x(k), x̂(k), ω(k) = ω, ω̂(k) = ω̂,
i
, ν̂(k) = ν̂ − V (x(k), x̂(k))
π √
2
≤ −b
κ(V (x, x̂)) + (1 + + )k M Dk2 kω − ω̂k2
π
2
2 √
2
e − P B̂)k2 kν̂k2
+ (1 + + )k M (B R
π
π
+ Tr F T M F + F̂ T P T M P F̂ .
(26)
b to
Hence, the proposed V in (20) is an SPSF from Σ
Σ, which completes the proof. Note that the K and K∞
functions κ, α, and ρext , in Definition 3.1 associated with
the SPSF in √
(20) are α(s) := s2 , κ(s) := b
κs, and√ρint (s) :=
2
π
e
(1+ π + 2 )k M Dk2 s2 , ρext (s) := (1+ π2 + π2 )k M (B R−
P B̂)k2 s2 , ∀s ∈ R≥0 . Moreover, positive
constant
ψ
in
(4)
is ψ = Tr F T M F + F̂ T P T M P F̂ .
Remark 5.2: One can readily verify from the result of
Theorem 5.1 that choosing F̂ equal to zero results in smaller
constant ψ and, hence, more closeness of linear subsystems
and their abstractions. Observe that this is not the case when
one assumes the noise of the concrete subsystem and its
abstraction are the same as in [9], [10].
Remark 5.3: Note that the results in Theorem 5.1 do not
impose any condition on matrix B̂ and, hence, it can be
chosen arbitrarily. As an example, one can choose B̂ = In̂
b fully actuated and, hence,
which makes the abstract system Σ
the synthesis problem over it much easier.
Remark 5.4: Since Theorem 5.1 does not impose any
e we choose R
e to minimize function
condition on matrix R,
e
ρext for V as suggested in [16]. The following choice for R
minimizes ρext .
e = (B T M B)−1 B T M P B̂.
R
(27)
VI. E XAMPLE
Here, we demonstrate the effectiveness of the proposed
results for an interconnected system consisting of four
discrete-time linear stochastic control subsystems, i.e. Σ =
I(Σ1 , Σ2 , Σ3 , Σ4 ). The interconnection scheme of Σ with
four inputs and two outputs is illustrated in Figure 1.
As seen, the output of Σ1 (resp. Σ2 ) is connected to the
internal input of Σ4 (resp. Σ3 ) and the output of Σ3 (resp.
Σ4 ) connects to the internal input of Σ1 (resp. Σ2 ). The
system matrices are given by
Ai = I25 , Bi = I25 , CiT = 0.1125 , Fi = 0.01125 ,
for i ∈ {1, 2, 3, 4}. The internal input and output matrices
are also given by:
T
T
T
T
C14
= C23
= C31
= C42
= 0.1125 ,
D13 = D24 = D32 = D41 = 0.1125 .
In order to construct an abstraction for I(Σ1 , Σ2 , Σ3 , Σ4 ),
b i of each individual subsystem
we construct an abstraction Σ
Σi , i ∈ {1, 2, 3, 4}. We first fix κ
b and π for each subsystem,
Σ1
y14
ν1
ν3
ν2
ν4
Σ2
Fig. 1.
Σ3
y31
y33
y23
Σ4
y44
y42
The interconnected system Σ = I(Σ1 , Σ2 , Σ3 , Σ4 ).
and then determine the matrices M and K such that (18)
and (19) hold for i ∈ {1, 2, 3, 4}:
Mi = I25 , Ki = −0.95I25 , κ
bi = 0.98, πi = 0.99.
We continue with determining other matrices such that (21),
(22), and (23) hold:
Pi = 125 , Qi = 125 , Si = −0.003125,
for i ∈ {1, 2, 3, 4}. Accordingly, the matrices of abstract
subsystems are computed as:
Âi = 2, Ĉi = 2.5, D̂i = 0.096,
for i ∈ {1, 2, 3, 4}. Note that here F̂i , i ∈ {1, 2, 3, 4}, are
considered zero in order to reduce constants ψi for each
ei , i ∈
Vi . Moreover, B̂i are chosen 1 and we compute R
e
{1, 2, 3, 4}, using (27) as Ri = 125 . The interface function
for i ∈ {1, 2, 3, 4} follows by (25) as:
νi = −0.95I25 (xi − 125 x̂i )+125 x̂i +125 ν̂i −0.003125ω̂i .
Hence, Theorem 5.1 holds and Vi (xi , x̂i ) = (xi −
b i to Σi
125 x̂i )T Mi (xi − 125 x̂i ) is an SPSF function from Σ
2
satisfying conditions (3) and (4) with αi (s) = s , κi (s) =
0.98s, ρiext (s) = 0, ρiint (s) = 0.88s2, and ψi = 0.0025,
for i ∈ {1, 2, 3, 4}. We now proceed with Theorem 4.2
b to Σ.
to construct a stochastic simulation function form Σ
Assumption 1 holds with γi (s) = s and:
0.98
0
0
0
0
0
0.88
0
0.98
0
0
0
0
0.88
0
0
.
, Λ=
∆=
0
0
0.98
0
0
0.88
0
0
0
0
0
0.98
0.88
0
0
0
Additionally, one can readily verify that a vector µ ∈ R4>0
exists here since the spectral radius of Λ−1 ∆ is strictly less
than one [17]. By choosing vector µ as µT = [1 1 1 1],
the function
V (x, x̂) = V1 (x1 , x̂1 )+V2 (x2 , x̂2 )+V3 (x3 , x̂3 )+V4 (x4 , x̂4 )
b 1, Σ
b 2, Σ
b 3, Σ
b 4 ) to I(Σ1 , Σ2 , Σ3 , Σ4 ) satis an SSF from I(Σ
isfying conditions (5) and (6) with α(s) = s2 , κ(s) = 0.1s,
ρext (s) = 0, ∀s ∈ R≥0 , and ψ = 0.01. If the initial states of
b are started from zero,
the interconnected systems Σ and Σ
one can readily verify that the norm of error between outputs
b will not exceed 1 with probability at least
of Σ and of Σ
90% computed by the stochastic simulation function V using
inequality (7) for T = 10.
VII. D ISCUSSION
In this paper, we provided a compositional approach
for abstractions of interconnected discrete-time stochastic
control systems, with independent noises in the abstract and
concrete subsystems. First, we introduced new notions of
stochastic pseudo-simulation and stochastic simulation functions in order to quantify the distance in a probability setting
between original stochastic control subsystems and their abstractions and their interconnections, respectively. Therefore,
one can employ the proposed results here to potentially solve
safety/reachability problems over the abstract interconnected
systems and then refine the results to the concrete interconnected ones. Furthermore, we provided a computational
scheme for the class of discrete-time linear stochastic control
systems to construct abstractions together with their corresponding stochastic pseudo-simulation functions. Finally, we
demonstrated the effectiveness of the results by constructing
an abstraction (totally 4 dimensions) of the interconnection
of four discrete-time linear stochastic control subsystems
(together 100 dimensions) in a compositional fashion.
R EFERENCES
[1] A. A. Julius and G. J. Pappas, “Approximations of stochastic hybrid
systems,” IEEE Transactions on Automatic Control, vol. 54, no. 6, pp.
1193–1203, 2009.
[2] I. Tkachev and A. Abate, “On infinite-horizon probabilistic properties
and stochastic bisimulation functions,” in Proceedings of the 50th
IEEE Conference on Decision and Control and European Control
Conference (CDC-ECC), 2011, pp. 526–531.
[3] S. Esmaeil Zadeh Soudjani and A. Abate, “Adaptive and sequential
gridding procedures for the abstraction and verification of stochastic
processes,” SIAM Journal on Applied Dynamical Systems, vol. 12,
no. 2, pp. 921–956, 2013.
[4] S. Esmaeil Zadeh Soudjani, “Formal abstractions for automated
verification and synthesis of stochastic systems,” Ph.D. dissertation,
Technische Universiteit Delft, The Netherlands, November 2014.
[5] M. Zamani, P. Mohajerin Esfahani, R. Majumdar, A. Abate, and
J. Lygeros, “Symbolic control of stochastic systems via approximately
bisimilar finite abstractions,” IEEE Transactions on Automatic Control,
vol. 59, no. 12, pp. 3135–3150, 2014.
[6] M. Zamani, I. Tkachev, and A. Abate, “Towards scalable synthesis of
stochastic control systems,” Discrete Event Dynamic Systems, vol. 27,
no. 2, pp. 341–369, July 2017.
[7] M. Zamani and A. Abate, “Approximately bisimilar symbolic models
for randomly switched stochastic systems,” Systems & Control Letters,
vol. 69, pp. 38–46, 2014.
[8] M. Zamani, A. Abate, and A. Girard, “Symbolic models for stochastic
switched systems: A discretization and a discretization-free approach,”
Automatica, vol. 55, pp. 183–196, 2015.
[9] M. Zamani, “Compositional approximations of interconnected stochastic hybrid systems,” in Proceedings of the 53rd IEEE Conference on
Decision and Control (CDC), 2014, pp. 3395–3400.
[10] M. Zamani, M. Rungger, and P. Mohajerin Esfahani, “Approximations
of stochastic hybrid systems: a compositional approach,” IEEE Transactions on Automatic Control, 2016.
[11] O. Hernández-Lerma and J. B. Lasserre, Discrete-time Markov control
processes, ser. Applications of Mathematics. Springer-Verlag, 1996,
vol. 30.
[12] D. P. Bertsekas and S. E. Shreve, Stochastic Optimal Control: The
Discrete-Time Case. Athena Scientific, 1996.
[13] H. J. Kushner, Stochastic Stability and Control, ser. Mathematics in
Science and Engineering. Elsevier Science, 1967.
[14] B. Oksendal, Stochastic differential equations: an introduction with
applications. Springer Science & Business Media, 2013.
[15] W. H. Young, “On classes of summable functions and their fourier
series,” Proceedings of the Royal Society of London A: Mathematical,
Physical and Engineering Sciences, vol. 87, no. 594, pp. 225–229,
1912.
[16] A. Girard and G. J. Pappas, “Hierarchical control system design using
approximate simulation,” Automatica, vol. 45, no. 2, pp. 566–571,
2009.
[17] S. Dashkovskiy, H. Ito, and F. Wirth, “On a small gain theorem for iss
networks in dissipative lyapunov form,” European Journal of Control,
vol. 17, no. 4, pp. 357–365, 2011.
| 3cs.SY
|
Ready, Set, Verify!
arXiv:1803.06960v2 [cs.PL] 20 Mar 2018
Applying hs-to-coq to real-world Haskell code
JOACHIM BREITNER, University of Pennsylvania, USA
ANTAL SPECTOR-ZABUSKY, University of Pennsylvania, USA
YAO LI, University of Pennsylvania, USA
CHRISTINE RIZKALLAH, University of New South Wales, Australia
JOHN WIEGLEY, BAE Systems, USA
STEPHANIE WEIRICH, University of Pennsylvania, USA
Good tools can bring mechanical verification to programs written in mainstream functional languages. We use
hs-to-coq to translate significant portions of Haskell’s containers library into Coq, and verify it against
specifications that we derive from a variety of sources including type class laws, the library’s test suite, and
interfaces from Coq’s standard library. Our work shows that it is feasible to verify mature, widely-used, highly
optimized, and unmodified Haskell code. We also learn more about the theory of weight-balanced trees, extend
hs-to-coq to handle partiality, and – since we found no bugs – attest to the superb quality of well-tested
functional code.
CCS Concepts: • Software and its engineering → Software verification;
Additional Key Words and Phrases: Coq, Haskell, verification
1
INTRODUCTION
What would it take to tempt functional programmers to verify their code?
Certainly, better tools would help. We see that functional programmers who use dependentlytyped languages or proof assistants, such as Coq [The Coq development team 2016], Agda [Bove
et al. 2009], Idris [Brady 2017], and Isabelle [Nipkow et al. 2002], do verify their code, since their
tools allow it. However, adopting these platforms means rewriting everything from scratch. What
about the verification of existing code, such as libraries written in mature languages like Haskell?
Haskell programmers can reach for LiquidHaskell [Vazou et al. 2014] which smoothly integrates
the expressive power of refinement types with Haskell, using SMT solvers for fully automatic
verification. But some verification endeavors require the full strength of a mature interactive proof
assistant like Coq. The hs-to-coq tool, developed by Spector-Zabusky, Breitner, Rizkallah, and
Weirich [2018], translates Haskell types, functions and type classes into equivalent Coq code – a
form of shallow embedding – which can be verified just like normal Coq definitions.
But can this approach be used for more than the small, textbook-sized examples it has been
applied to so far? Yes, it can! In this work, we use hs-to-coq to translate and verify the two set
data structures from Haskell’s containers package.1 This codebase is not a toy. It is decades old,
highly tuned for performance, type-class polymorphic, and implemented in terms of low-level
features like bit manipulation operators and raw pointer equality. It is also an integral part of the
Haskell ecosystem. We make the following contributions:
1 Specifically,
we target version 0.5.11.0, which was released on January 22, 2018 and was the most recent release of this
library at the time of publication; it is available at https://github.com/haskell/containers/tree/v0.5.11.0.
Authors’ addresses: Joachim Breitner, [email protected], University of Pennsylvania, 3330 Walnut St, Philadelphia,
PA, 19104, USA; Antal Spector-Zabusky, [email protected], University of Pennsylvania, 3330 Walnut St, Philadelphia,
PA, 19104, USA; Yao Li, [email protected], University of Pennsylvania, 3330 Walnut St, Philadelphia, PA, 19104, USA;
Christine Rizkallah, [email protected], University of New South Wales, Sydney, NSW, Australia; John Wiegley, john.
[email protected], BAE Systems, USA; Stephanie Weirich, [email protected], University of Pennsylvania,
3330 Walnut St, Philadelphia, PA, 19104, USA.
2
Breitner, Spector-Zabusky, Li, Rizkallah, Wiegley and Weirich
• We demonstrate that hs-to-coq is suitable for the verification of unmodified, real-world
Haskell libraries. By “real-world”, we mean code that is up-to-date, in common use, and
optimized for performance. In Section 2 we describe the containers library in more detail
and discuss why it fits this description.
• We present a case study not just of verifying a popular Haskell library, but also of developing
a good specification of that library. This process is worth consideration because it is not at all
obvious what we mean when we say that we have “verified” a library. Section 4 discusses the
techniques that we have used to construct a rich, two-sided specification; one that draws
from diverse, cross-validated sources and yet is suitable for verification.
• We extend hs-to-coq and its associated standard libraries to support our verification goal. In
particular, in Section 5 we describe the challenges that arise when translating the Data.Set
and Data.IntSet modules, and our solutions. Notably, we drop the restriction in previous
work [Spector-Zabusky et al. 2018] that the input of the translation must be intrinsically
total. Instead, we show how to safely defer reasoning about incomplete pattern matching
and potential nontermination to later stages of the verification process.
• We increase confidence in the translation done of hs-to-coq. In one direction, properties
of the Haskell test suite turn into Coq theorems that we prove. In the other direction, the
translated code, when extracted back to Haskell, passes the original test suite.
• We provide new implementation-agnostic insight into the verification of the weight-balanced
tree data structure, as we describe in Section 6. In particular, we find the right precondition
for the central balancing operations needed to verify the particular variant used in Data.Set.
Our work provides a rich specification for Haskell’s finite set libraries that is directly and
mechanically connected to the current implementation. As a result, Haskell programmers can be
assured that these libraries behave as expected. Of course, there is a limit to the assurances that we
can provide through this sort of effort. We discuss the verification gap and other limitations of our
approach in Section 7.
We would like to have been able to claim the contribution of findings bugs in containers, but
there simply were none. Still, our efforts resulted in improvements to the containers library. First,
an insight during the verification process led to an optimization that makes the Data.Set.union
function 4% faster. Second, we discovered an incompleteness in the specification of the validity
checker used in the test suite.
The tangible artifacts of this work have been incorporated into the hs-to-coq distribution and
are available as open source tools and libraries.2
2
THE containers LIBRARY
We select the containers library for our verification efforts because it is a critical component of
the Haskell ecosystem. With over 4000 publicly available Haskell packages using on containers,
it is the third-most dependent-up package on the Haskell package repository Hackage, after base
and bytestring.3
The containers library is both mature and highly optimized. It has existed for over a decade
and has undergone many significant revisions in order to improve its performance. It contains
seven container data structures, covering support for finite sets (Data.Set and Data.IntSet),
finite maps (Data.Map and Data.IntMap), sequences (Data.Sequence), graphs (Data.Graph), and
trees (Data.Tree). However most users of the containers library only use the map and set
2 https://github.com/antalsz/hs-to-coq.
3 http://packdeps.haskellers.com/reverse
Ready, Set, Verify!
3
---------------------------------------------------------------------Sets are size balanced trees
-------------------------------------------------------------------data Set a = Bin {-# UNPACK #-} !Size !a !(Set a) !(Set a)
| Tip
type Size = Int
--| O(log n). Is the element in the set?
member :: Ord a => a -> Set a -> Bool
member = go
where go !_ Tip = False
go x (Bin _ y l r) = case compare x y of
LT -> go x l
GT -> go x r
EQ -> True
Fig. 1. The Set data type and its membership function5
modules;4 moreover, the map modules are essentially analogues of the set modules. Therefore, we
focus on Data.Set and Data.IntSet in this work.
2.1
Weight-balanced trees and big-endian Patricia trees
The Data.Set module implements finite sets using weight-balanced binary search trees. The
definition of the Set datatype in this module, along with its membership function, is given in
Figure 1. These sets and operations are polymorphic over the element type and require only that
this type is linearly ordered, as expressed by the Ord constraint on the member function. The member
function descends the ordered search tree to determine whether it contains a particular element.
The Size component stored with the Bin constructor is used by the operations in the library to
ensure that the tree stays balanced. The implementation maintains the balancing invariant
s 1 + s 2 ≤ 1 ∨ (s 1 ≤ 3s 2 ∧ s 2 ≤ 3s 1 ),
where s 1 and s 2 are the sizes of the left and right subtrees of a Bin constructor. This definition
is based on the description by Adams [1992], who modified the original weight-balanced tree
proposed by Nievergelt and Reingold [1972]. Thanks to this balancing, operations such as insertion,
membership testing, and deletion take time logarithmic in the size of the tree.
This type definition has been tweaked to improve the performance of the library. The annotations
on the Bin data constructor instruct the compiler to unpack the size component, removing a level
of indirection. The ! annotations indicate that all components should be strictly evaluated.
The Data.IntSet module also provides search trees, specialized to values of type Int to provide
more efficient operations, especially union. This implementation is based on big-endian Patricia
trees, as proposed in Morrison’s work on PATRICIA [1968] and described in a pure functional
setting by Okasaki and Gill [1998].
The definition of this data structure is shown in Figure 2. The core idea is to use the bits of the
stored values to decide in which subtree of a node they should be placed. In a node Bin p m s1 s2,
the mask m has exactly one bit set. All bits higher than the mask bit are equal in all elements of
calculated that 78% of the packages on Hackage that depend on containers use only sets and maps.
http://hackage.haskell.org/package/containers-0.5.11.0/docs/src/Data.Set.Internal.html#Set.
All code listings in this paper are manually reformatted and may omit module names from fully qualified names.
4 We
5 From
4
Breitner, Spector-Zabusky, Li, Rizkallah, Wiegley and Weirich
data IntSet = Bin {-# UNPACK #-} !Prefix {-# UNPACK #-} !Mask !IntSet !IntSet
--Invariant: Nil is never found as a child of Bin.
--Invariant: The Mask is a power of 2. It is the largest bit position at
-which two elements of the set differ.
--Invariant: Prefix is the common high-order bits that all elements share to
-the left of the Mask bit.
--Invariant: In Bin prefix mask left right, left consists of the elements
-that don't have the mask bit set; right is all the elements
-that do.
| Tip {-# UNPACK #-} !Prefix {-# UNPACK #-} !BitMap
--Invariant: The Prefix is zero for the last 5 (on 32 bit arches) or 6 bits
-(on 64 bit arches). The values of the set represented by a tip
-are the prefix plus the indices of the set bits in the bit map.
| Nil
--A number stored in a set is stored as
--* Prefix (all but last 5-6 bits) and
--* BitMap (last 5-6 bits stored as a bitmask)
-- Last 5-6 bits are called a Suffix.
type Prefix = Int
type Mask = Int
type BitMap = Word
type Key
= Int
Fig. 2. The IntSet data type6
that node; they form the prefix p. The mask bit is the highest bit that is not shared by all elements.
In particular, all elements in s1 have this bit cleared, while all elements in s2 have it set. When
looking up a value x, the mask bit of x tells us into which branch to descend.
Instead of storing a single value at the leaf of the tree, this implementation improves time and
space performance by storing the membership information of consecutive numbers as the bits of a
machine-word-sized bitmap in the Tip constructor.
The Nil constructor is the only way to represent an empty tree, and will never occur as the child
of a Bin constructor. Every well-formed IntSet is either made of Bins and Tips, or a single Nil.
2.2
A history of performance tuning
The history of the Data.Set module can be traced back to 2004, when a number of competing
search tree implementations were debated in the “Tree Wars” thread on the Haskell libraries mailing
list. Benchmarks showed that Daan Leijen’s implementation had the best performance, and it was
added to containers in 2005 as Data.Set.7
In 2010, Milan Straka thoroughly evaluated the performance of the containers library and
implemented a number of performance tweaks [Straka 2010]. This change8 replaced a fairly readable
balance and several small and descriptive helper functions with a single dense block of code. A
later change9 by Straka created two copies of this scary-looking balance, each specialized and
optimized for different preconditions.
6 From
http://hackage.haskell.org/package/containers-0.5.11.0/docs/src/Data.IntSet.Internal.html#IntSet
7 https://github.com/haskell/containers/commit/bbbba97c
8 https://github.com/haskell/containers/commit/3535fcbe
9 https://github.com/haskell/containers/commit/d17d7182
Ready, Set, Verify!
5
Adams [1992] describes two algorithms for union, intersection, and difference: “hedge
union” and “divide and conquer”. Originally containers used the former, but in 2016 its maintainers
switched to the latter,10 again based on performance measurement.
The module Data.IntSet (and Data.IntMap) has been around even longer. Okasaki and Gill
mention in their 1998 paper [Okasaki and Gill 1998] that GHC had already made use of IntSet and
IntMap for several years. In 2011, the Data.IntSet module was re-written to use machine-words
as bit maps in the leaves of the tree, as discussed at the end of Section 2.1.11 This moved the
containers library further away from the literature on Patricia trees and introduced a fair amount
of low-level bit twiddling operations (e.g., highestBitMask, lowestBitMask, and revNat).
3
OVERVIEW OF OUR VERIFICATION APPROACH
In order to verify Set and IntSet, we use hs-to-coq to translate the unmodified Haskell modules
to Gallina and then use Coq to verify the translated code. For example, consider the excerpt of the
implementation of Set in Figure 1. The hs-to-coq tool translates this input to the following Coq
definitions.12 The strictness and unpacking annotations are ignored, as they do not make sense in
Coq, and the type name Set is renamed to Set_ to avoid clashing with the Coq keyword.
Definition Size := GHC.Num.Int%type.
Inductive Set_ a : Type
:= Bin : Size -> a -> (Set_ a) -> (Set_ a) -> Set_ a
| Tip : Set_ a.
Definition member {a} `{GHC.Base.Ord a} : a -> Set_ a -> bool :=
let fix go arg_0__ arg_1__
:= match arg_0__, arg_1__ with
| _, Tip => false
| x, Bin _ y l r => match GHC.Base.compare x y with
| Lt => go x l
| Gt => go x r
| Eq => true
end
end
in go.
These definitions depend on hs-to-coq’s pre-existing translated version of GHC’s standard library
base. Here, we use the existing translation of Haskell’s Int type, the Ord type class, and Ord’s
compare method.
We carry out this translation for the Set and IntSet along with their attendant functions, and
then verify the resulting Gallina code. In Section 4 we discuss the properties that we prove about
the two data structures.
To further test that the translation from Haskell to Coq, we also used Coq’s extraction mechanism
to translate the generated Gallina code, like that seen above, back to Haskell. This process converts
the implicitly-passed type class dictionaries to ordinary explicitly-passed function arguments, but
otherwise preserves the structure of the code. By providing an interface that restores the typeclass based types, we can run the original containers test suite against this code. This process
10 https://github.com/haskell/containers/commit/c3083cfc
11 https://github.com/haskell/containers/pull/3
12 In
the file examples/containers/lib/Data/Set/Internal.v
Breitner, Spector-Zabusky, Li, Rizkallah, Wiegley and Weirich
Proofs
Gallina
Haskell
6
Set
IntSet
Tests
Set
IntSet
Headers, types and proof preparations
Functions and type class instances (verified)
(unverified)
"
(untranslated)
"
Tests and specifications
Tests
Lemmas about integers and bit-wise operations
Lemmas about lists and sortedness
A theory of dyadic intervals
Automation for reasoning about Ord
Set
IntSet
Instantiating Coq’s FSetInterface
Tests
0
500
1000
1500
2000
2500
3000
Lines of code
3500
4000
4500
5000
Fig. 3. A quantitative overview of the Haskell code, its translation into Coq and our proofs
helps us check that hs-to-coq preserves the semantics of the original Haskell program during the
translation process.
Figure 3 provides an overview of the Haskell code that we target, the Gallina code that we
translate it into, and the Coq proofs that we wrote. The set modules of the containers library
contain 149 functions and 22 type class instances, written in 2207 lines of code (excluding comments
and blank lines). Out of these, 15 functions and 11 type class instances (270 loc) were deemed “out
of scope” and not translated. (We discuss untranslated definitions in more detail in Sections 5.3
and 7.2.) Our translation produces 2709 lines of Gallina code.
The Set and IntSet data structures come with extensive APIs. We specify and verify a representative subset of commonly used functions (listed in Figure 4), covering 66% of the Set API and
49% of the IntSet API. This verified API is complete enough to instantiate Coq’s specification of
finite sets, along with many other specifications at varying levels of abstraction; for more detail,
see Section 4.
As Coq is not an automated theorem prover, verification of these complex data structures requires
significant effort. In total, we verified 1202 lines of Haskell; the verification of Set and IntSet
required 8.5 lines of proof per lines of code. This factor is noticeably higher for IntSet (10.0×) than
for Set (7.1×), as the latter is conceptually simpler to reason about and allowed us to achieve a
higher degree of automation using Coq tactics.
Our proofs also require the formalization of several background theories (not counted in the
proof-to-code ratio above), including: integer arithmetic and bits (1265 loc): lists and sortedness
(1489 loc); dyadic intervals, which are used for verifying IntSet (1169 loc); and support for working
with lawful Ord instances, including a complete decision procedure (453 loc).
Ready, Set, Verify!
7
Set: delete, deleteMax, deleteMin, difference, disjoint, drop, elems, empty, filter,
foldl, foldl’, foldr, foldr’, fromAscList, fromDescList, fromDistinctAscList,
fromDistinctDescList, insert, intersection, isSubsetOf, lookupMax, lookupMin,
mapMonotonic, maxView, member, minView, notMember, null, partition, singleton, size,
split, splitAt, splitMember, take, toAscList, toDescList, toList, union, unions
Instances: Eq, Eq1, Monoid, Ord, Ord1, Semigroup
Internal functions: balanceL, balanceR, combineEq, glue, insertMax, insertMin,
insertR, link, maxViewSure, merge, minViewSure, valid
IntSet: delete, difference, disjoint, elems, empty, filter, foldl, foldr, fromList,
insert, intersection, isProperSubsetOf, isSubsetOf, map, member, notMember, null,
partition, singleton, size, split, splitMember, toAscList, toDescList, toList,
union, unions
Instances: Eq, Monoid, Ord, Semigroup
Internal functions: branchMask, equal, highestBitMask, mask, nequal, nomatch,
revNat, shorter, valid, zero
Fig. 4. The verified subset of functions and type classes in Data.Set and Data.IntSet
4
SPECIFYING Set AND IntSet
The phrase “we have verified this piece of software” on its own is meaningless: the particular
specification that a piece of software is verified against matters. Good specifications are rich, twosided, formal, and live [Appel et al. 2017]. A specification is rich if it “describ[es] complex behaviors
in detail”. It is two-sided if it is “connected to both implementations and clients”. It is formal if it
is “written in a mathematical notation with clear semantics”. And it is live if it is “connected via
machine-checkable proofs to the implementation”.
All specifications of Set and IntSet that we use are formal and live by definition. They are
formal because we express the desired properties using Gallina, the language of the Coq proof
assistant; and they are live because we use hs-to-coq to automatically convert containers to
Coq where we develop and check our proofs. But how can we ensure that our specifications of Set
and IntSet are two-sided and rich? How do we know that the specifications are not just facts that
happen to be true, but are useful for the verification of larger systems? What complex behaviors of
the data structures should we specify?
To ensure that our specifications are two-sided, we use specifications that we did not invent
ourselves. Instead, we draw our specifications from a variety of diverse sources: from several parts
of the containers codebase (Sections 4.1 to 4.4), from Haskell type class laws (Section 4.5), from
pre-existing Coq theories (Section 4.6), and from a mathematical description of sets (Section 4.7).
This way, we also ensure that our specifications are rich because they describe the complex Set and
IntSet data structures at varying levels of abstraction. Finally, by verifying the code against these
disparate specifications, we not only increase the assurance that we captured all the important
behaviors of Set and IntSet, but we also cross-validate the specifications against each other.
4.1
Specifying implementation invariants
Set and IntSet are two examples of abstract types whose correctness depend on invariants.
Therefore, we define well-formedness predicates WF: Set_ e -> Prop and WF : IntSet -> Prop
and show that the operations preserve these properties. The definition of well-formedness differs
between the two types, but specifications of both are already present within containers.
8
Breitner, Spector-Zabusky, Li, Rizkallah, Wiegley and Weirich
Inductive Bounded : Set_ e -> option e -> option e -> Prop :=
| BoundedTip : forall lb ub,
Bounded Tip lb ub
| BoundedBin : forall lb ub s1 s2 x sz,
Bounded s1 lb (Some x) ->
Bounded s2 (Some x) ub ->
isLB lb x = true -> (* If lb is defined, it is less than x *)
isUB ub x = true -> (* If ub is defined, it is greater than x *)
sz = (1 + size s1 + size s2) ->
balance_prop (size s1) (size s2) -> (* weights of tree are balanced *)
Bounded (Bin sz x s1 s2) lb ub.
(** Any set that has bounds is well-formed *)
Definition WF (s : Set_ e) : Prop := Bounded s None None.
Fig. 5. Well-formed weight-balanced sets
Well-formed weight-balanced trees. Our definition of WF for Set is derived from the valid function
defined in the containers library. This function checks whether the input (1) is a balanced tree,
(2) is an ordered tree, and (3) has the correct values in its size fields. It is not part of the normal,
user-facing API of containers (since all exported functions preserve well-formedness), but is
used internally by the developers for debugging and testing. For us, it is valuable as an executable
specification, with less room for ambiguity and interpretation than comments and documentation.
However, rather than using valid directly, we define well-formedness as an inductive predicate,
because we find it more useful from a proof engineering perspective. In particular, our definition
of WF, as shown in Figure 5, relies on the Bounded inductive family. Its indices express lower and
upper bounds of the elements stored in the tree; None means unbounded. At the same time, the
property also checks that the sizes of the two subtrees are balanced in the Bin case.13 Nevertheless,
we can relate the WF predicate to the valid function found in containers:
Lemma Bounded_iff_valid : forall s, WF s <-> valid s = true.
Well-formed Patricia trees. Our well-formedness definition for IntSet is derived from the comments in the IntSet data type, shown in Figure 2, where the type declaration of almost disappears
beneath a large swath of comments describing its invariants.
In this case, the documentation-derived well-formedness predicate is stronger than the corresponding valid function from the implementation – the Haskell function was missing some
necessary conditions. We reported this to the library authors,14 who have since fixed valid.
This fix to valid is an example of how verification allows us to cross-validate specifications
and ensure that the invariants written in the comments are adequately reflected by the code. On
the other hand, sometimes we discover that it is the comments in the code that are incomplete.
For example, the comment describing the precondition for balanceL in the Data.Set module was
misleading and too vague; for more detail, see Section 6.1.
13 In
the file examples/containers/theories/SetProofs.v
14 https://github.com/haskell/containers/issues/522
Ready, Set, Verify!
4.2
9
Property-based testing
At the next level of verification, we would like to show that the implementations of Set and IntSet
are correct according to the implementors of the module. We specify correctness by deriving a
definition directly from the test suite that is distributed with the containers library.
Thanks to the popularity of property-based testing within the Haskell community, this test suite
contains a wealth of precisely specified general properties expressed using QuickCheck [Claessen
and Hughes 2000]. For example, one such property states that the union operation is associative:
prop_UnionAssoc :: IntSet -> IntSet -> IntSet -> Bool
prop_UnionAssoc t1 t2 t3 = union t1 (union t2 t3) == union (union t1 t2) t3
which we can interpret as a theorem about union:15
Theorem thm_UnionAssoc:
forall t1, WF t1 -> forall t2, WF t2 -> forall t3, WF t3 ->
union t1 (union t2 t3) == union (union t1 t2) t3 = true.
We do not have to write these theorems by hand: as we describe in Section 5.8, we use hs-to-coq in
a nonstandard way to automatically turn these executable tests into Gallina propositions (i.e. types).
We have have translated IntSet’s test suite in this manner and have proven that all QuickCheck
properties about verified IntSet functions are theorems (with one exception due to our choice of
integer representation – see Section 5.5).
4.3
Numeric overflow in Set
There is one way in which we have diverged from the specification of correctness given by the
comments of the containers library. The Data.Set module states:16
Warning: The size of the set must not exceed maxBound::Int. Violation of this condition is not detected and if the size limit is exceeded, its behavior is undefined.
In practice, it makes no difference whether Int is bounded or not, as a set with (263 − 1) elements
would require at least 368 exabytes of storage. What does this imply for our specification of
Set? Should we use fixed-width integers to represent Int? This choice would closely match the
implementation, but we would have to carefully add preconditions to all our lemmas to avoid integer
overflow, greatly complicating the proofs, with little verification insight to be gained. Furthermore,
such a specification would be difficult to use by clients, who themselves would need to prove that
they satisfy such preconditions.
Instead, we translate Haskell’s Int type to Coq’s type of unbounded integers (called Z). This
mapping avoids the problem of integer overflow altogether and is arguably consistent with the
comment, as this choice replaces undefined behavior with concrete behavior. (The situation is
slightly different for IntSet; see Section 5.5.)
4.4
Rewrite rules
So far, we have only been concerned with specifying the correctness of the data structures using
the definition of correctness that is present in the original source code; the comments, the valid
functions and the QuickCheck properties. However, to be able to claim that our specifications are
two-sided, we need to show that the properties that we prove are useful to clients of the module.
One source of such properties is rewrite rules [Peyton Jones et al. 2001]. The containers library
includes a small number of such rules. These annotations instruct the compiler to replace any
15 In
the file examples/containers/theories/IntSetPropertyProofs.v
16 http://hackage.haskell.org/package/containers-0.5.11.0/docs/Data-Set.html
10
Breitner, Spector-Zabusky, Li, Rizkallah, Wiegley and Weirich
Class OrdLaws (t : Type) {HEq : Eq_ t} {HOrd : Ord t} {HEqLaw : EqLaws t} := {
(* The axioms *)
Ord_antisym
: forall a b, a <= b = true -> b <= a = true -> a == b = true;
Ord_trans_le : forall a b c, a <= b = true -> b <= c = true -> a <= c = true;
Ord_total
: forall a b, a <= b = true \/ b <= a = true;
(* The other operations, in terms of <= or == *)
Ord_compare_Lt : forall a b, compare a b = Lt <-> b <= a = false;
Ord_compare_Eq : forall a b, compare a b = Eq <-> a == b = true;
Ord_compare_Gt : forall a b, compare a b = Gt <-> a <= b = false;
Ord_lt_le
: forall a b, a < b = negb (b <= a);
Ord_ge_le
: forall a b, a >= b =
(b <= a);
Ord_gt_le
: forall a b, a > b = negb (a <= b)}.
Fig. 6. Our codification of the Ord type class laws
occurrence of the pattern on the left-hand side in the rule by the expression on the right hand side.
The standard example is
{-# RULES "map/map" forall f g xs. map f (map g xs) = map (f . g) xs #-}
which fuses two adjacent calls to map into one, eliminating the intermediate list.
The program transformation list fusion [Peyton Jones et al. 2001] is implemented completely in
terms of rewrite rules, and the rules in the containers library setup its functions for fusion; an
example is
{-# RULES "Set.toAscList" forall s . toAscList s = build (\c n -> foldrFB c n s) #-}
which transforms the toAscList function into an equivalent representation in terms of build.
We can view these rewrite rules as a direct specification of properties that the compiler assumes
are true during compilation. Rewrite rules are used by GHC during optimization; if any of these
properties are actually false, GHC will silently produce incorrect code. Therefore, any proof about
the correctness of GHC’s compilation of these files depends on a proof of these properties. We have
manually translated all the rules into Coq – there are only few of them, so manual translation is
viable – and have proved that the translated operations satisfy this specification.17
4.5 Type classes with laws
Many Haskell type classes come with laws that all instances of the type class should satisfy, which
provides another source of external specification that we can use. For example, an instance of Eq is
expected to implement an equivalence relation, an instance of Ord should describe a linear order,
and an instance of Monoid should be, well, a monoid.
We reflect these laws using type classes whose members are the required properties. For example,
we have defined EqLaws, OrdLaws (shown in Figure 6), and MonoidLaws. These classes can only be
instantiated if the corresponding instance is lawful.
Even though we have defined these laws ourselves, using our understanding of what they mean
for the Haskell standard library, we argue that they form a two-sided specification. In particular, we
have been clients to the Ord laws in our verification of the Set data structure. Almost all theorems
about Set must constrain the element type to one that is an instance of OrdLaws. Therefore, we
know our specification of these laws is sufficiently strong to verify this library.
17 In
the files examples/containers/theories/SetProofs.v and examples/containers/theories/IntSetProofs.v
Ready, Set, Verify!
11
At the same time, we have also shown that multiple type class instances satisfy these laws
including both set modules18 and other types such as Z, unit, tuples, option, and list.19 Because
we successfully instantiated these type classes for many types, we also know that they are not too
strong.
That said, nailing down the precise form of the type class laws can be tricky. Consider the case
of a Monoid instance for a type T. The associativity law can be stated as “for all elements x, y and z
of T, we have that x <> (y <> z) is equal to (x <> y) <> z.” But in order to write this down as part
of MonoidLaws in Coq, we need to make two decisions:
(1) What do we mean by “equal”? The first option is to use Coq’s propositional equality and
require that x <> (y <> z) = (x <> y) <> z. This would, however, prevent us from making
Set_, with (<>) = union, a member of MonoidLaws: two extensionally-equal sets may be
represented by differently structured trees. Therefore, we instead require that the two expressions are equal according to their Eq instance:(x <> (y <> z) == (x <> y) <> z) = true. The
tradeoff with this approach is that it precludes instances like MonoidLaws b -> MonoidLaws
(a -> b), since functions have no instance of Eq (and indeed, cannot have decidable equality).
For many types, however, this distinction is moot, since Haskell’s equality coincides with
structural equality; for example, this is the case for Bool, for Integer, and for IntSet itself
(although not for Set, as mentioned above). To facilitate reasoning about such types, we
provide the type class EqExact, which states that
forall {a} `{EqExact a}, x == y = true <-> x = y
(2) What do we mean by “For all elements of T”? The obvious choice is universal quantification
over all elements of T:
forall (x y z : T), x <> (y <> z) == (x <> y) <> z = true
But again, this collides with common practice in Haskell. Once again, consider Set: union
only works correctly on well-formed sets. Therefore, our approach is to define an instance
of this and other classes not for the type Set_ e, but for the type of well-formed sets, {s :
Set_ e | WF s}, where type class laws hold universally. This instance reflects the “external
view” of the data structure – clients should only have access to well-formed sets.
An alternative could be to instead constrain MonoidLaws’s theorems to hold only on members
of T that are well-formed in some general way (e.g., according to an IsWF type class that could
be instantiated at different types). In this way, we could instantiate MonoidLaws directly with
types that require well-formedness, without the need for subset types.
4.6
Specifications from the Coq standard library
Because we are working in Coq, we have access to a standard library of specifications for finite sets,
which we know are two-sided because they have already appeared in larger Coq developments. The
Coq.FSets.FSetInterface module20 provides module types that cover many common operations
and their properties. The module types come in two varieties: one that specifies sets of elements
that merely have decidable equality (WSfun, WS), and one that specifies sets of elements that can
be linearly ordered (Sfun, S). The WSfun and Sfun modules are presented as module functors that
take an OrderedType module, containing the linearly-ordered element type, as an input; the WS
and S modules are the same, but they inline this information.
18 In
the files examples/containers/theories/SetProofs.v and examples/containers/theories/IntSetProofs.v
the file base-thy/GHC/Base.v
20 https://coq.inria.fr/library/Coq.FSets.FSetInterface.html
19 In
12
Breitner, Spector-Zabusky, Li, Rizkallah, Wiegley and Weirich
For example, the parameterized module type WSfun provides one specification of a finite set type,
called t in the excerpt from this interface below. The element type of this set, E.t, is required to
have decidable equality.
Module Type WSfun (E : DecidableType).
Definition elt := E.t.
Parameter t : Type.
(* Set type *)
Parameter In : elt -> t -> Prop. (* Characteristic function for the Set *)
Parameter mem : elt -> t -> bool. (* Membership function *)
(* Specification of mem *)
Parameter mem_1 : forall x s, In x s -> mem x s = true.
Parameter mem_2 : forall x s, mem x s = true -> In x s.
...
End WSFun.
Every operation in this interface, such as mem above, is accompanied by a small number of properties
that specify the behavior of the operation.
We instantiate all four interfaces for Set and IntSet.21 For example, the instance for Set starts
out:
Module SetFSet (E : OrderedType) <: WSfun(E) <: WS <: Sfun(E) <: S.
Definition t := {s : Set_ elt | WF s}.
Program Definition In (x :elt) (s : t) : Prop := . . . .
Program Definition mem : elt -> t -> bool := member.
Lemma mem_1 : forall (s : t) (x : elt), In x s -> mem x s = true.
Proof. . . . (* Proof may assume that s is well-formed *) . . . Qed.
...
End SetFSet.
Instantiating these interfaces runs into two small hiccups. The first is that they talk about all
sets, not simply all well-formed sets. Therefore, as in the previous section, we instantiate these
interfaces with the subset type {s : Set_ e | WF s}. The second is that Coq’s module system does
not interact with type classes, and Set_ is defined such that its element type must be an instance
of the Ord type class. This impedance mismatch requires us to write a module which can generate
an Ord instance from a Coq OrderedType module.
By successfully instantiating this module interface, we obtain two benefits. First, we must
prove theorems that cover many of the main functions provided by containers; these theorems
are particularly valuable, since as the interface itself is heavily used by Coq users. Second, by
instantiating this interface, we connect our injected Haskell code to the Coq ecosystem, enabling
Coq users to easily use the containers-derived data structures in their developments, should they
so desire.
4.7
Abstract models as specifications
Tests, type classes and the other sources of specifications do not fully describe the intended behavior
of all functions. We therefore also have to also come up with specifications on our own. We do
21 In
the files examples/containers/theories/SetProofs.v and examples/containers/theories/IntSetProofs.v
Ready, Set, Verify!
13
this by relating a concrete search tree to the abstract set that it represents; that is, we provide a
denotational semantics. We denote a set with elements of type e as its indicator function of type
e -> bool; for Set e, we provide a denotation function sem : forall {e} `{Eq_ e}, Set_ e ->
(e -> bool), and for IntSet, we provide a denotation relation Sem : IntSet -> (N -> bool) ->
Prop.
This approach allows us to abstractly describe the meaning of operations like insert. For Set_,
we do this by providing a theorem like
Theorem insert_sem:
forall {a} `{OrdLaws a} (s : Set_ a) (x : a), WF s ->
forall (i : a), sem (insert x s) i = (i == x) || sem s i.
(For IntSet, some techincal details differ.) However, there is more we need to know about insert
than just its denotation. We also need to know that it preserves well-formedness and bounds, and
– to reason about balancing – its size. To avoid having to prove these properties independently,
we define a relation Desc that completely describes a set, by asserting that it is well-founded and
relating it to bounds, its size and its denotation:
Definition Desc (s : Set _e) (lb ub : option e) (sz : Z) (f : e -> bool) :=
Bounded s lb ub /\ size s = sz /\ (forall i, sem s i = f i).
This allows us to state a single theorem about insert, namely
Lemma insert_Desc: forall x s lb ub,
Bounded s lb ub ->
isLB lb x = true -> (* If lb is defined, it is less than x *)
isUB ub x = true -> (* If ub is defined, it is greater than x *)
Desc (insert x s) lb ub
(if sem s y then size s else (1 + size s)) (fun i => (i == x) || sem s i).
and prove everything we need to know about insert in one single inductive proof.22
Since Desc describes insert completely, it introduces a layer of abstraction that we can build
upon. In fact, we specify all functions this way, and use these specifications, rather than the concrete
implementation, to prove the other specifications. (We have an analogous Desc relation for IntSet
that describes the properties of Patricia trees.)
An alternative abstract model for finite sets is the sorted list of their elements, i.e. the result of
toAscList. The meaning of certain operations, like foldr, take or size, can naturally be expressed
in terms of toAscList, but would be very convoluted to state in terms of the indicator function,
and we use this denotation – or both – where appropriate.
5
PRODUCING VERIFIABLE CODE WITH hs-to-coq
Identifying what to prove about the code is only half of the challenge – we also need to get the
Haskell code into Coq. Ideally, the translation of Haskell code into Gallina using hs-to-coq would
be completely automatic and produce code that can be verified as easily as code written directly in
Coq – and for textbook-level examples, that is the case [Spector-Zabusky et al. 2018]. However,
working with real-world code requires adjustments to the translation process to make sure that the
output is both accepted by Coq and amenable to verification.
A core principle of our approach is that the Haskell source code does not need to be modified in
order to be verified. This principle ensures that we verify “the” containers library (not a “verified
fork”) and that the verification can be ported to a newer version of the library.
22 In
the file examples/containers/theories/SetProofs.v
14
Breitner, Spector-Zabusky, Li, Rizkallah, Wiegley and Weirich
The crucial feature of hs-to-coq that enables this approach is the support for edits: instructions
to treat some code differently during translation. Edits are specified in plain text files, which also
serve as a concise summary of our interventions. The hs-to-coq tool already supported many
forms of edits; for example, specifying when names need to be changed, when parts of the module
should be ignored or replaced by some other term, when we want to map Haskell types to existing
Coq types, or when a recursive function definition needs an explicit termination proof. In the
course of this work, we added new features to hs-to-coq – such as the ability to apply rewrite
rules, to handle partiality and to defer termination proofs to the verification stage – and extended
the provided base library.
In this section we demonstrate some of the challenges posed by translating real-world code, and
show how hs-to-coq’s flexibility allowed us to not only to overcome them, but also to facilitate
subsequently proving the input correct.
5.1
Unsafe pointer equality
An example of a Haskell feature that we cannot expect to translate without intervention is unsafe
pointer equality. GHC’s runtime provides the scarily named function reallyUnsafePtrEqualty#,
which the containers library wraps as ptrEq :: a -> a -> Bool. If this function returns True,
then both arguments are represented in memory by the same pointer. If this function returns False,
we know nothing – this function is underspecified and may return False even if the two pointers
are equal. This operation is used, for example, in Set.insert x s when x is already a member of s:
If ptrEq indicates that the subtree is unchanged, the function skips the redundant re-balancing
step – which enhances performance – and returns the original set rather than constructing a
semantically equivalent copy – which increases sharing.
Coq does not provide any way of reasoning about memory, so when we use hs-to-coq, we must
replace ptrEq with something else. But what?
One option is to replace the definition of ptrEq with a definition that does not do any computation
and simply always returns False. This can be done using the following edit:
replace Definition ptrEq : forall {a}, a -> a -> bool := fun _ _ _ => false.
This replacement would behave in a way that is consistent with reallyUnsafePtrEqualty#
and allows us to proceed with translation and verification. However, the code in the True branch
of an unsafe pointer equality test would be dead code in Coq, and our verification would miss bugs
possibly lurking there.
Consequently, we choose a different encoding that captures the semantics of ptrEq more precisely.
We make the definition of ptrEq opaque and partially specify its behavior.23
Definition ptrEq_spec :
{ptrEq : forall a, a -> a -> bool | forall a (x y : a), ptrEq _ x y = true -> x = y}.
Proof. apply (exist _ (fun _ _ _ => false)). intros; congruence. Qed.
Definition ptrEq : forall {a}, a -> a -> bool := proj1_sig ptrEq_spec.
Lemma ptrEq_eq : forall {a} (x:a)(y:a), ptrEq x y = true -> x = y.
Proof. exact (proj2_sig ptrEq_spec). Qed.
Here, we define the ptrEq function together with a specification as ptrEq_spec. Although the
function in ptrEq_spec also always returns false, the Qed at the end of its definition completely
hides this implementation of ptrEq. While the specification ptrEq_eq is vacuously true, making
23 In
the file examples/containers/lib/Utils/Containers/Internal/PtrEquality.v
Ready, Set, Verify!
15
Set: deleteAt, deleteFindMax, deleteFindMin, elemAt, findIndex, findMax, findMin
Instances: Data, IsList, NFData, Read, Show, Show1
Internal functions: showTree
IntSet: deleteFindMax, deleteFindMin, findMax, findMin, fromAscList,
fromDistinctAscList
Instances: Data, IsList, NFData, Read, Show
Internal functions: showTree
Fig. 7. Untranslated functions and type classes in Data.Set and Data.IntSet
this definition opaque forces verification to proceed down both paths. While could achieve the
same using Axiom, our variant protects us from accidentially introducing inconsistencies to Coq.
We do have to trust that GHC’s definition of pointer equality has this specification, but given
this assumption, we can soundly verify that pointer equality is used correctly.
5.2
Evaluation order
A shallow embedding of Haskell into Coq makes the difference between strict and lazy code vanish,
because Gallina is a total language and does not care about evaluation order. Danielsson et al.
[2006] show that such “fast and loose” reasoning does not invalidate our theorems.
Haskell has “magic” functions like seq that allow the programmer to explicitly control strictness,
and the containers library uses it. Its effect is irrelevant in Coq, and we instruct hs-to-coq to
use this simple, magic-free implementation for it:
Definition seq {a} {b} (x : a) (y : b) := y.
5.3
Eliminating unwanted parts of the code
Figure 7 lists the untranslated portions of the Set and IntSet modules. Many of these operations
are functions that we choose to ignore for the sake of verification – for example, the function
showTree in Data.Set prints the internal structure of such a set as an ASCII-art tree. This function
is not used elsewhere in the module. In the interest of a tidier and smaller output, we skip this
function using an edit:
skip showTree
Similarly, we skip functionality related to serialization (the Show and Show1 type classes), deserialization (the Read type class), generic programming (the Data type class), and overloaded list
notation (the IsList type class).
Furthermore, we skip some operations whose public API is partial. For example, evaluating
findMax empty will raise an exception, as the empty set has no maximum element. We cannot
model this exception in Coq, so we skip findMax and similar functions (findMin, deleteFindMax,
deleteFindMin, findIndex, elemAt and deleteAt). This elision is not significant because the
containers API provides total equivalents for many of these functions (e.g., lookupIndex, which
returns Nothing when the index is out of bounds).
Finally, we skip the two functions that use mutual recursion (Data.IntSet.fromAscList and
Data.IntSet.fromDistinctAscList) as this is not yet supported by hs-to-coq.
16
5.4
Breitner, Spector-Zabusky, Li, Rizkallah, Wiegley and Weirich
Partiality in total functions
In contrast to the skipped functions above, some functions use partiality in their implementation
in ways that cannot be triggered by a user of the public API. In particular, they may use calls to
Haskell’s error function when an invariant is violated.
For example, the central balancing functions for Sets, balanceL and balanceR, may call error
when passed an ill-formed Set. Because our proofs only reason about well-formed sets, this code is
actually dead. It does not matter how we translate error – any term that is accepted by Coq is
good enough. However, error in Haskell has the type
error :: String -> a
which means that a call to error can inhabit any type. We cannot define such a function in Coq,
and adding it as an axiom would be glaringly unsound.
Therefore, we extended hs-to-coq to use the following definition for error:
Class Default (a :Type) := { default : a }.
Definition error {a} `{Default a} : String -> a.
Proof. exact (fun _ => default). Qed.
The type class enforces that we use error only at non-empty types, ensuring logical consistency.
Yet we will notice that something is wrong when we have to prove something about it. Just as with
ptrEq (Section 5.1), by making the definition of error opaque using Qed, we are prevented from
accidentally or intentionally using the concrete default value of a given type in a proof about
error. Furthermore, when we extract the Coq code back to Haskell for testing, we translate this
definition back to Haskell’s error function, preserving the original semantics.
This encoding is inspired by Isabelle, where all types are inhabited and there is a polymorphic
term undefined :: a that denotes an unspecified element of any type.
5.5 Translating the Int in IntSet
As discussed in Section 4.1, we map Haskell’s finite-width integer type Int to Coq’s unbounded
integer type Z in the translation of Data.Set in order to match the specification that integer
overflow is outside the scope of the specified behavior.
For IntSet, however, this choice would cause problems. Big-endian Patricia trees require that
two different elements have a highest differing bit. This is not the case for Z, where negative
numbers have an infinite number of bits set to 1; for instance, -1 is effectively an infinite sequence
of set bits. Fortunately, hs-to-coq is flexible enough to allow us to make a different choice when
translating IntSet; we can pick any suitable type where all elements have a finite number of bits
set, such as the natural numbers (N) or a fixed width integer type.
Given that Coq’s standard library provides a fairly comprehensive library of lemmas about N and
decision procedures (omega and lia) that work with it, we chose to use N for now, with the intention
to eventually switch to a 64-bit integer type. This is the appropriate generalization of IntSet to an
infinite domain. In Haskell, the domain is 64-bit words, which happen to be interpretable as negative
numbers. When we generalize to an infinite domain, we generalize to bit strings of unbounded but
finite length, which we can most simply interpret as nonnegative.
The IntSet code uses bit-level operations, like complement and negate, that do not exist for N.
To deal with this we extended hs-to-coq with support for rewrite edits like
rewrite forall x y, (x .&. complement y) = (xor x (x .&. y))
which instruct it to replace any expression that matches the left-hand side by the right hand side.
For signed or bounded integer types, both sides are equivalent. For unbounded unsigned types,
Ready, Set, Verify!
17
like Coq’s type N, the left hand side is undefined (values in N have no complement in N), while the
right hand side is perfectly fine. When we switch to bounded integers in the IntSet code, we can
remove these edits.
5.6
Low-level bit twiddling
The containers library uses highly tuned bit-twiddling algorithms to operate on IntSets. For
example, the function revNat reverses the order of the bits in a 64-bit number:
revNat :: Nat -> Nat
revNat x1 = case ((x1 `shiftRL` 1) .&. 5555555555555555) .|.
((x1 .&. 5555555555555555) `shiftLL` 1) of x2 ->
case ((x2 `shiftRL` 2) .&. 3333333333333333) .|.
((x2 .&. 3333333333333333) `shiftLL` 2) of x3 ->
case ((x3 `shiftRL` 4) .&. 0F0F0F0F0F0F0F0F) .|.
((x3 .&. 0F0F0F0F0F0F0F0F) `shiftLL` 4) of x4 ->
case ((x4 `shiftRL` 8) .&. 00FF00FF00FF00FF) .|.
((x4 .&. 00FF00FF00FF00FF) `shiftLL` 8) of x5 ->
case ((x5 `shiftRL` 16) .&. 0000FFFF0000FFFF) .|.
((x5 .&. 0000FFFF0000FFFF) `shiftLL` 16) of x6 ->
(x6 `shiftRL` 32) .|. (x6 `shiftLL` 32)
Though complicated, this code is within the scope of what hs-to-coq can translate, and we can
verify its correctness.
However, we can’t keep up with all their tricks. For example, indexOfTheOnlyBit, which was
contributed by Edward Kmett,24 takes a number with exactly one bit set and calculates the index of
said bit. It does so by unboxing the input, multiplying it by a magic constant, and using the upper 6
bits of the product as an index into a table stored in an unboxed array literal. This manifests as the
following scary-looking code:
indexOfTheOnlyBit :: Nat -> Int
indexOfTheOnlyBit bitmask = I# (lsbArray `indexInt8OffAddr#` unboxInt
(intFromNat ((bitmask * magic) `shiftRL` offset)))
where
unboxInt (I# i) = i
magic
= 0x07EDD5E59A4E28C2
offset
= 58
!lsbArray
= "\63\0\58\1\5. . . 15\8\23\7\6\5"#
We currently cannot translate this code because hs-to-coq does not yet support unboxed arrays
or unboxed integers. We therefore replace it with a simple definition based on a integer logarithm
function provided by Coq’s standard library:
redefine Definition indexOfTheOnlyBit := fun x => N.log2 x.
Similarly, we provide simpler definitions for the low-level bit-twiddling functions branchMask,
mask, zero and suffixBitMask.
5.7
Non-trivial recursion
In order to prove the correctness of Set and IntSet, we must deal with termination. There are
two reasons for this. First, we intrinsically want to prove that none of the functions provided by
containers go into an infinite loop. Second, Coq requires that all defined functions are terminating,
24 https://github.com/haskell/containers/commit/e076b33f
18
Breitner, Spector-Zabusky, Li, Rizkallah, Wiegley and Weirich
--Less obvious structural recursion
link :: a -> Set a -> Set a -> Set a
link x Tip r = insertMin x r
link x l Tip = insertMax x l
link x l@(Bin sizeL y ly ry) r@(Bin sizeR z lz rz)
| delta*sizeL < sizeR = balanceL z (link x l lz) rz
| delta*sizeR < sizeL = balanceR y ly (link x ry r)
| otherwise
= bin x l r
--Well-founded recursion
foldlBits :: Int -> (a -> Int -> a) -> a -> Nat -> a
foldlBits prefix f z bitmap = go bitmap z
where go 0 acc = acc
go bm acc = go (xor bm bitmask) ((f acc) $! (prefix+bi))
where !bitmask = lowestBitMask bm
!bi = indexOfTheOnlyBit bitmask
--Deferred recursion
fromDistinctAscList :: [a] -> Set a
fromDistinctAscList [] = Tip
fromDistinctAscList (x0 : xs0) = go (1::Int) (Bin 1 x0 Tip Tip) xs0
where go !_ t []
=t
go s l (x : xs) = case create s xs of (r :*: ys) ->
let !t' = link x l r in go (s `shiftL` 1) t' ys
create !_ [] = (Tip :*: [])
create s xs@(x : xs')
| s == 1
= (Bin 1 x Tip Tip :*: xs')
| otherwise = case create (s `shiftR` 1) xs of
res@(_ :*: []) -> res
(l :*: (y:ys)) -> case create (s `shiftR` 1) ys of
(r :*: zs) -> (link y l r :*: zs)
Fig. 8. Recursion styles
as unrestricted recursion would lead to logical inconsistencies. Depending on how involved the
termination argument for a given function is, we use one of the following four approaches.
5.7.1 Obvious structural recursion. By default, hs-to-coq implements recursive functions directly using Coq’s fix keyword. This works smoothly for primitive structural recursion; indeed, a
majority of the recursive functions that we encountered, such as member in Figure 1, were of this
form and required no further attention.
5.7.2 Almost-structural recursion. Another common recursion pattern can be found in binary
operations such as link in Figure 8. Here, every recursive call shrinks either or both of its arguments
to immediate subterms of the originals, leaving the others unchanged. This almost-structural
recursion is already beyond the capabilities of Coq’s termination checker. We therefore instruct
hs-to-coq to use Coq’s Program Fixpoint command to translate these functions in terms of
well-founded recursion by adding the edits
termination link {measure (size_nat arg_0__ + size_nat arg_1__)}
obligations link termination_by_omega
Ready, Set, Verify!
19
This specifies both:
(1) The termination measure, which is the sum of the sizes of the arguments (we defined the
function size_nat : IntSet -> nat).
(2) The termination proof that the measure decreases on every call. This is represented as the
Coq tactic termination_by_omega, which is a thin wrapper we defined around omega, a
Coq tactic to decide linear integer arithmetic.
We can use these edits (with size_nat and termination_by_omega) to get to Coq accepts such
recursive definitions without the need for any further proofs or manual intervention.
5.7.3 Well-founded recursion. A small number of functions recurse in a non-structural way, such
as foldlBits in Figure 8, which recurses on the input after clearing the least-significant set bit (bm
`xor` (lowestBitMask bm)). We can handle this sort of logic using the same machinery as before,
but now we have to write a specialized termination tactic and declare it in the obligations hint.
To do so, we need to prove necessary lemmas before translating the Haskell module in question.
Coq’s Program Fixpoint only supports top-level functions, but we frequently encounter local
recursive functions – the go idiom, as seen here. To support this, we extended hs-to-coq to offer
some of the convenience provided by Program Fixpoint by translating local recursive functions
using the same well-founded-recursion-based fixed-point combinator as Program Fixpoint.
5.7.4 Deferred recursion. Finally, we encounter some functions that require elaborate termination arguments, such as fromDistinctAscList in Figure 8. It has two local recursive functions,
go and create, and to convince ourselves that fromDistinctAscList is indeed terminating, we
have to reason as follows:
The function create bitshifts its first argument to the right upon each recursive call,
until the argument is 1. Ergo, it is terminating, but only for positive input – it clearly
loops if x is 0. The function go recurses on smaller lists as its third argument, but to see
that, we first have to convince ourself that the list in the tuple returned by create is
never larger than the list passed to create. Also, go calls create, so we need to ensure
that the s passed to it is positive. The go function bitshifts s to the left at every call, so
if go is called with a positive s, then s will remain positive in recursive calls. Finally,
we see that fromDistinctAscList calls go with s equal to 1, which is positive, so we
can conclude that fromDistinctAscList terminates.
If we wanted to convince Coq of this termination pattern, we would have to turn create and
go into top-level definitions, change their types to rule out invalid (non-positive) inputs, define
create using Program Fixpoint, and provide an explicit termination argument by well-founded
recursion. Then we could prove that create preserves the list lengths, which we need to define
go, again using Program Fixpoint. This is certainly possible, but it is not simple, especially in an
automatic translation.
For hard cases like these we resort to deferred termination checking, a feature that we added
to hs-to-coq. We can instruct it to use the following axiom as a very permissive fixed-point
combinator and translate the code of fromDistinctAscList essentially unchanged:
Axiom deferredFix: forall {a r} `{Default r}, ((a -> r) -> (a -> r)) -> a -> r.
On its own, deferredFix does not do anything; it merely sits in the translated code applied to
the original function body. It is consistent, since its type could be implemented by a function
that always returns default (see Section 5.4). And it does not prevent the user from running
extracted code – we can extract this axiom to the target language’s unrestricted fixpoint operator
20
Breitner, Spector-Zabusky, Li, Rizkallah, Wiegley and Weirich
(e.g., Data.Function.fix in Haskell), although this costs us the guarantee that the extracted code
is terminating.
When we come to verifying something about a function that is defined using deferredFix, we
need to give it meaning. We do so using a second axiom, deferredFix_eq_on, which states that
for any well-founded relation R (well_founded R), if the recursive calls in f are always at values
that are strictly R-smaller than the input (recurses_on R), then we may unroll the fixpoint of f:
Definition recurses_on {a b}
(P : a -> Prop) (R : a -> a -> Prop) (f : (a -> b) -> (a -> b))
:= forall g h x, P x -> (forall y, P y -> R y x -> g y = h y) -> f g x = f h x.
Axiom deferredFix_eq_on: forall {a b}
`{Default b} (f : (a -> b) -> (a -> b)) (P : a -> Prop) (R : a -> a -> Prop),
well_founded R -> recurses_on P R f ->
forall x, P x -> deferredFix f x = f (deferredFix f) x.
The predicate P : a -> Prop allows us to restrict the domain to inputs for which the function is
actually terminating – crucial for go and create.
The predicate recurses_on P R f characterizes the recursion pattern of f, but does so in a very
extensional way and only considers recursive calls that can actually affect the result of the function.
For instance, it would consider a recursive function defined by f n = if f n then true else true
to be terminating.
We can use this non-trivial axiom without losing too much sleep, because we can actually
implement deferredFix and deferredFix_eq_on in terms of classical logic and the axiom of
choice (as provided by the Coq module Coq.Logic.Epsilon).25 This means that both axioms are
consistent with plain Coq. We do not know if deferredFix_eq_on is strictly weaker than classical
choice, so users of hs-to-coq who want to combine the output of hs-to-coq with developments
known to be inconsistent with classical choice (e.g., homotopy type theory) should be cautious.
Pragmatically, working with deferredFix is quite convenient, as we can prove termination
together with the other specifications about these functions. The actual termination proofs themselves are not fundamentally different from the proof obligations that Program Fixpoint would
generate for us and – although not needed in this example – can be carried out even for nested
recursion through higher-order functions like map.
This approach to defining recursive functions extensionality was inspired by Isabelle’s function
package [Krauss 2006].
5.8
Translating Haskell tests to Coq types
When we translate code, we usually want to preserve the semantics of the code as much as possible.
Things are very different when we translate the QuickCheck tests defined in the containers test
suite, as we discuss in Section 4.2: whereas the semantics of the test suite in Haskell is a program
that creates random input to use as input test executable properties, we want to re-interpret these
properties as logical propositions in Coq. Put differently, we are turning executable code into types.
QuickCheck’s API provides types and type classes for writing property-based tests. In particular,
it defines an opaque type Property that describes properties that can checked using randomized
testing, a type class Testable that converts various testable types into a Property, and a type
constructor Gen that describes how to generate a random value. These are combined, for instance,
in the QuickCheck combinator
forAll :: (Show a, Testable prop) => Gen a -> (a -> prop) -> Property
25 In
the file base/GHC/DeferredFixImpl.v
Ready, Set, Verify!
21
which tests the result of a function on inputs generated by the given generator.
Since we want to prove, not test, these properties, we do not convert the QuickCheck implementation to Coq. Instead, we write a small Coq module that provides the necessary pieces of the interface
of Test.QuickCheck, but interprets these types and functions in terms of Coq propositions. In
particular:
• We use Coq’s non-computational type of propositions, Prop, instead of QuickCheck’s computational Property;
• Gen a is simply a wrapper around a logical predicate on a; and
• forAll quantifies (using Coq’s forall) over the type a, and ensures that the given function
– now a predicate – holds for all members of a that satisfy the given “generator”.
Concretely, this leads to the following adapted Coq code:
Record Gen a := MkGen { unGen : a -> Prop }.
Class Testable (a : Type) := { toProp : a -> Prop }.
Definition forAll {a prop} `{Testable prop} (g : Gen a) (p : a -> prop) : Prop :=
forall (x : a), unGen g x -> toProp (p x).
We provide similar translations for QuickCheck’s operators ===, ==>, .&&. and .||., and we replace
generators such as choose :: Random a => (a, a) -> Gen a with their corresponding predicates.
With this module in place, hs-to-coq translates the test suite into a “proof suite”. As we saw in
Section 4.2, a test like prop_UnionAssoc is now a definition of a Coq proposition, that is to say a
type, and can be used as the type of a theorem:
Theorem thm_UnionAssoc : toProp prop_UnionAssoc.
6
CONTRIBUTIONS TO containers: THEORY AND PRACTICE
We chose the Set and IntSet modules of the containers library as our target because they nicely
represent the kind of Haskell code that we want to see verified in practice. Nevertheless, the deep
understanding required to verify these modules led to new insights into the algorithms themselves
and to improvements to their Haskell implementation.
6.1
New insight into the verification of weight-balanced trees
The data structure underlying Set and Map was originally presented by Nievergelt and Reingold
[1972]. It is a binary search tree with the invariant that if s 1 is the size of the left subtree and s 2 the
size of the right subtree of a node, then
balNR (s 1 , s 2 ) B (s 1 + 1) ≤ δ · (s 2 + 1) ∧ (s 2 + 1) ≤ δ · (s 1 + 1)
holds for a balancing tuning parameter δ . In 1992, Adams suggested a variant of the balancing
condition, namely
bal(s 1 , s 2 ) B s 1 + s 2 ≤ 1 ∨ (s 1 ≤ δ · s 2 ∧ s 2 ≤ δ · s 1 ).
The conditions are very similar, but not equivalent: the former allows, for example, δ = 3, s 1 = 2
and s 2 = 0, which the latter rejects.
Initially, the containers library used Adams’s balancing condition with the parameters δ = 4
(for sets) or δ = 5 (for maps). Campbell [2010] found that these parameters are actually invalid and
exhibited a sequence of insertions and deletions that produced an unbalanced tree. Subsequently,
the containers library switched to δ = 3 in both modules. Inspired by this bug report, Hirai and
Yamamoto [2011] thoroughly analyzed this data structure with the help of a Coq formalization, and
identified the valid range for the balancing parameter, albeit only for Nievergelt and Reingold’s
variant – our proof seems to be the first mechanical verification of Adam’s variant.
22
Breitner, Spector-Zabusky, Li, Rizkallah, Wiegley and Weirich
Given such thorough analysis of the algorithms, we did not expect to learn anything new
about this data structure, and for the most part, this was true. Our proofs are free of any manual
calculations about tree sizes and the balancing condition. We just state the proper preconditions
for each lemma, and Coq’s automation for linear integer arithmetic, lia [Besson 2006], takes care
of the rest.
One exception was the crucial function balanceL which is used, according to the documentation
“when the left subtree might have been inserted to or when the right subtree might have been
deleted from”. This suggests the precondition
(bal(s 1 − 1, s 2 ) ∧ 0 < s 1 ) ∨ bal(s 1 , s 2 ) ∨ bal(s 1 , s 2 + 1)
corresponding to the three cases: left tree inserted to, no change, and right tree deleted from. This
is also what Hirai and Yamamoto used in their formalization of the original variant. And indeed,
this precondition is strong enough to verify that the output of balanceL is balanced – but we
found the precondition too strong. The link operation, shown in Figure 8, is supposed to balance
two arbitrary trees using balanceL. In the verification of link we were unable to satisfy this
precondition.
We found another precondition that is both strong enough for the verification of balanceL and
weak enough to allow the verification of link, namely
(bal∗ (s 1 − 1, s 2 ) ∧ 0 < s 1 ) ∨ bal(s 1 , s 2 ) ∨ bal(s 1 , s 2 + 1)
where
bal∗ (s 1 , s 2 ) B δ · s 1 ≤ δ 2 · s 2 + δ · s 2 + s 2 ∧ s 2 ≤ s 1 .
Unfortunately we cannot give much insight into why this is the right inequality – this is the
price we pay for relying completely on proof automation when verifying the balancing properties.
For us, this inequality fell out of the proof for link, where we call balanceL with trees with sizes
s 1 and s 2 , and what we know about these trees can be expressed as
∃ s sl sr , s 1 = 1 + s + sl ∧ s 2 = sr ∧ bal(sl , sr ) ∧ δ · s < 1 + sl + sr ∧ 1 ≤ s ∧ 0 ≤ sl ∧ 0 ≤ sr
As lia works best when the formulas are quantifier-free, we manually eliminated the existential
quantifiers and simplified this to arrive at bal∗ (s 1 − 1, s 2 ).
6.2
Improvements to containers
Although our verification did not find bugs in the code of the library, we were able to improve
containers: during the verification of Data.Set.union, we noticed that it was using a nested
pattern match to check if an argument is a singleton set, when it could be testing if the size was 1
directly. This change turned out to provide a 4% speedup to union and will be present in the next
version of the containers library.26
Additionally, as we mention in Section 4.1, our well-formedness property for IntSet uncovered
a weakness in the valid function for IntSet and IntMap, which was used in the test suite. The
valid function failed to ensure that some of the invariants hold recursively in the tree structure,
which was necessary for the proof. We notified the containers maintainers,27 who then made the
valid function complete.
We also provide a package, containers-verified,28 which re-exports the types and definitions
we have verified from the precise version of containers we are working with. This way, a developer
26 https://github.com/haskell/containers/commit/b1a05c3a2
27 https://github.com/haskell/containers/issues/522
28 https://hackage.haskell.org/package/containers-verified
Ready, Set, Verify!
23
who wants to use only the verified portion of the implementation can replace their dependency on
containers with a dependency on containers-verified.
7
ASSUMPTIONS AND LIMITATIONS
We have shown a way to make mechanically checked, formal statements about existing Haskell
code, and have applied this technique to verify parts of the containers library. But are the theorems
that we prove actually true? And if they are, how useful is this method?
7.1
The formalization gap
As always, when a theorem is stated about a object that does not purely exist within mathematics,
its validity depends on a number of assumption.
• First and foremost, we have to assume that Coq behaves as documented and does not allow
us to prove false theorems. This is of particular relevance because we rely on fine details of
Coq’s machinery (e.g. the behavior of Qed, Section 5.4) and optionally add consistent axioms
(see Section 5.7.4).
• The biggest assumption is that the semantics of a Gallina program, as defined by the Calculus
of Construction [Coquand and Huet 1988], models the the behavior of a running Haskell
program in a meaningful way. At this time, we cannot even attempt to close this gap, as there
are neither formal semantics nor verified compilers for Haskell.
We know that “Fast and Loose Reasoning is Morally Correct” [Danielsson et al. 2006], which
says that theorems about the total fragment of a non-total language carry over to the full
language. But since we relate two very different languages, this argument alone is not enough
to bridge the gap.
We can gain additional confidence by testing this connection: we extracted our Gallina
versions of Set and IntSet back to Haskell and successfully ran the original test suite of
containers against it. Every successful test indicates that the corresponding theorem (see
Section 4.2) is indeed a theorem about the Haskell program.
• Furthermore, we rely on hs-to-coq translating Haskell code into the correct Gallina code.
The translator itself is a sizable piece of code, unverified (and such verification is currently out
of our reach, not least because there is no formal semantics of Haskell) and therefore surely
not free of bugs. We get some confidence into the tool from manually inspecting its output
and observing that it is indeed what we would consider the “right” translation from Haskell
into Gallina, and additional confidence from the fact that we were actually able to prove the
specifications, which would not be possible if the translated code behaved differently than
intended. Moreover, extracting the translated code back to Haskell and running the test suite
also stress-tests the translation.
• The translation was not completely automatic and required manual edits. With each edit,
we add another assumption to the formalization gap: Does our underspecification of pointer
equality encompass the actual behavior of GHC’s reallyUnsafePtrEqualty#? Given our
choice of using unbounded integers, does the size field in a Set really never overflow in
practice? Are our manually written versions of low-level bit twiddling functions correct? We
list and justify our manual interventions in Section 5.
The formalization gap of our work is relatively large compared to, say, the gap for the verification
of programs written in Gallina in the first place. But for the purpose of ensuring the correctness
of the Haskell code, that is less critical. Even if one of our assumptions is flawed, it is much more
likely that the flaw will get in the way of concluding the proofs, rather than allowing us to conclude
the proofs without noticing a bug. Incomplete proofs can uncover bugs, too.
24
7.2
Breitner, Spector-Zabusky, Li, Rizkallah, Wiegley and Weirich
Limitations of our approach
We proved multiple specifications about a large part of the code, but there are limits to what
theorems we can prove, and what we can prove them about.
Since we work with a shallow embedding of Haskell in Coq, we cannot make statements about
the performance of the Haskell code – which is a pity, given that the containers library contains
highly optimized code and provides clear specifications of the algorithmic complexity of their
operations. Similarly, we cannot verify that the operations are as strict or lazy as documented.
We also cannot translate and verify all code in the containers library, because some functions
use language features not yet supported by hs-to-coq, such as mutual recursion, unboxed values
and generic programming. When this affects a crucial utility function we can provide a manual
translation. This widens the formalization gap, but enables verification of code that depends on
it. When it affects less central code, e.g. the Data instances, we can simply skip the translation
(Section 5.3).
Partiality is a particular interesting limit. Coq only allows total functions, but practical Haskell
code uses partiality, often in a benign way: Calls to error in code paths that are unreachable as long
as invariants are maintained, or recursive functions that terminate on the actual arguments they
are called with, but may diverge on other inputs. Whereas Spector-Zabusky et al. [2018] considered
such code out of scope, we have found ways to deal with “internal partiality” (see Sections 5.4
and 5.7.4).
Taking a step back, it might seem that our approach may see limited adoption in the Haskell
community because it requires expertise in Coq. But though tied to a Haskell artifact, verification is
isolated from the codebase. Haskell programmers can focus on their domain, trying to get the best
performance out of the code and without having to know about verification, while proof engineers
can work solely within Coq and do not have to be fluent in Haskell.
In this paper we verify a specific version of the Haskell code, and do not discuss ongoing
maintenance of such a verification. It remains to be seen how resilient the proofs are against
changes in the Haskell code. Changes of syntactic nature, or changes to a function’s strictness,
might be swallowed by hs-to-coq. Other changes might affect the translated code, but still allow
the proofs to go through, if our proof tactics are flexible enough. In general, though, we expect that
changes in the code require changes in the proofs. Since Coq is an interactive theorem prover, it
will at least clearly point out which parts of our development need to be updated.
8
8.1
RELATED WORK
Verification of purely functional data structures
Purely functional data structures, such as those found in Okasaki’s book [1999] are frequent targets
of mechanical verification. That said, we believe that we are the first to verify the Patricia tree
algorithms that underlie Data.IntSet.
Verifying weight-balanced trees in Haskell. Similar to hs-to-coq, LiquidHaskell [Vazou et al.
2014] can be used to verify existing Haskell code. Users of this tool annotate their Haskell source
files with refinement types and other annotations. LiquidHaskell then uses an SMT solver to automatically discharge proof obligations described by the refinements. This means that LiquidHaskell
provides more automation than hs-to-coq; however, the language of Coq is higher-order and
more expressive than the language of SMT solvers. Vazou et al. [2017] compared the experiences of
using LiquidHaskell vs. plain Coq, and found that both have advantages.
Vazou et al. [2013] also described the use of LiquidHaskell to verify the Data.Map module of
finite maps from containers. Although not the same as Data.Set, this code shares the same
underlying data structure (weight-balanced trees) and the implementations of the two are similar.
Ready, Set, Verify!
25
Their verification has similarities with our work; they also use unbounded integers as the number
representation and left functions like showTree unspecified. However, we develop a richer specification, which includes a semantic description of each operation we verified, constraints about
the tree balance, and the ordering of the elements in the tree. In contrast, Vazou et al. limit their
specifications to ordering only. For example, in addition to showing that the insertion operation
preserves the order of elements of the tree, our work also shows that: (1) insertion preserves the
balancing conditions of the weight-balanced tree, (2) the size field at each node in the tree is
maintained correctly (i.e., the size equals to the number of all its descendants), and (3) the tree
returned by this operation contains the inserted element, and all elements in the original tree, but
nothing more. Although it might be possible to replicate our specifications by using theories of
finite sets and maps in SMT [Kröning et al. 2009] to encode these properties using refinement types
in LiquidHaskell, this approach has not been explored.
Furthermore, our specification also includes type class laws, and we are able to verify that Set
and IntSet have lawful instances of the Eq, Ord, Semigroup, and Monoid type classes. When Vazou
et al.’s original work was developed in 2013, LiquidHaskell did not have the capability to state and
prove these properties. Since then, there have been new developments in LiquidHaskell, particularly
refinement reflection [Vazou et al. 2018], which could make it possible to specify and prove type
class laws.
Both LiquidHaskell and hs-to-coq check for termination of Haskell functions. In LiquidHaskell,
the termination check is an option that can be deactivated, allowing the sound verification of
nonstrict, non-terminating functions [Vazou et al. 2014]. In contrast, a proof of termination is
a requirement for verifying functions using hs-to-coq [Spector-Zabusky et al. 2018]. However,
hs-to-coq is able to take advantage of many options available in Coq for proving termination of
non-trivial recursion, including structural recursion, Program Fixpoint and our own approach
based on deferredFix. This latter approach alowed us to reason about fromDistinctAscList
(see Section 5.7.4) and prove that it is indeed terminating; on the other hand, Vazou et al. deactivate
the termination check for this function.
Verifying weight-balanced trees in other languages. Hirai and Yamamoto [2011] implemented a
weight-balanced tree similar to Haskell’s Data.Set library (albeit using the balancing condition of
Nievergelt and Reingold [1972]) and mechanically verified its balancing properties in Coq. More
recently, Nipkow and Dirix [2018] extended this work to formalize similar weight-balanced trees
in Isabelle and further verified the functional correctness of insertions and deletions.
We verify more functions in the Data.Set library than prior work. Operations that are unique
to our development include foldl, isSubsetOf, and fromDistinctAscList. The code verified
both by Hirai and Yamamoto and by Nipkow and Dirix is also different from the latest containers
library; for example, it does not use of pointer equality (Section 5.1). Another difference is that Hirai
and Yamamoto defined the union, intersection, and difference functions based on the “hedge
union” algorithm, but containers has since changed to use the “divide and conquer” algorithm.
Hirai and Yamamoto specify only the balancing constraints, whereas we develop a richer specification that also includes a semantic description of each operation we verified and the ordering of
the elements in the tree. We also gained new insights about the balancing conditions of the weightbalanced tree through our verification effort (see Section 6.1). Nipkow and Dirix’s specification
contains the same properties as ours, but they only specify the behavior of insert and delete; we
have verified a significantly larger set of functions (see Figure 4).
Other verifications of balanced trees. There are many existing works on mechanically verifying
purely functional balanced trees. We briefly mention a few here. Filliâtre and Letouzey [2004]
implemented AVL trees in Coq, and verified their functional correctness as well as their balancing
26
Breitner, Spector-Zabusky, Li, Rizkallah, Wiegley and Weirich
conditions. Appel [2011] did the same thing for red-black trees. These implementations have now
become parts of Coq standard library. Charguéraud [2010] translated OCaml implementations of
Okasaki [1999]’s functional data structures to characteristic formulae expressed as Coq axioms.
Licata [2012] lectured on verifying red-black trees in Agda at the Oregon Programming Languages
Summer School. McBride [2014] showed how to represent the ordering relationships in Agda for
general data structures, not just binary search trees. Nipkow [2016] showed how to automatically
verify the ordering properties of eight different binary search tree structures, by specifying each
in terms of the sorted list of their elements, a method he used again in his verification of weightbalanced trees [Nipkow and Dirix 2018]. Ralston [2009] verified AVL trees in ACL2.
8.2
Verification tools for Haskell
Previous work using hs-to-coq has only applied it to small examples. Spector-Zabusky et al. [2018]
describe three case studies, two of which require less than 20 lines of Haskell. The longest example
(the Bag module taken directly from the GHC compiler) is 247 lines of code. Furthermore, none of
the reasoning required for these examples is particularly deep. Our work provides experience with
more complex, externally-sourced, industrial-strength examples.
The coq-haskell library [Wiegley 2017] is a handwritten Coq library designed to make it easier
for Haskell programmers to work in Coq. In addition to enabling easier Coq programming, it also
provides support for extracting Coq programs to Haskell.
The prototype contract checker halo [Vytiniotis et al. 2013] takes a Haskell program, uses GHC
to desugar it into the intermediate language Core, and translates the Core program into a first-order
logic formula. It then invokes an SMT solver to prove this formula; a successful proof implies that
the original program is crash-free.
Haskabelle was hs-to-coq’s counterpart in Isabelle. It translated total Haskell code into equivalent Isabelle function definitions. Similar to hs-to-coq, it parsed Haskell, desugared syntactic
constructs, and configurably adapted basic types and functions to their counterparts in Isabelle’s
standard library. It used to be bundled with the Isabelle release, but it has not been updated recently
and was dropped from the distribution.
Haskell has been used as a prototyping language for mechanically verified systems in the past. The
seL4 verified microkernel started with a Haskell prototype that was semi-automatically translated
to Isabelle/HOL [Derrin et al. 2006; Klein et al. 2009]. The authors found that the availability of the
Haskell prototype provided a machine-checkable formal executable specification of the system.
They used this prototype to refine their designs via testing, allowing them to make corrections
before full verification.
The Programmatica project [Hallgren et al. 2004] included a tool that translates Haskell code
into the Alfa proof editor. Their tool only produces valid proofs for total functions over finite data
structures. The logic of the Alfa proof assistant is based on dependent type theory, but without as
many features as Coq. In particular, the Programmatica tool compiles away type classes and nested
pattern matching; both of these features are retained by hs-to-coq.
Dybjer et al. developed a tool for automatically translating Haskell programs to the Agda/Alfa
proof assistant [2004]. They explicitly note the interplay between testing and theorem proving and
show how to verify a tautology checker. Abel et al. [2005] translate Haskell expressions into the
logic of the Agda 2 proof assistant. Their tool works later in the GHC pipeline than hs-to-coq and
translates Core expressions.
8.3
Translating other higher-order functional languages
There are many large and successful verification projects that demonstrate that functional languages
are well suited for verification. In contrast to our work, they require re-implementing the code either
Ready, Set, Verify!
27
in a new functional language, as is the case for Cogent [Amani et al. 2016; O’Connor et al. 2016]
and F* [Swamy et al. 2016], or in a proof assistant, such as HOL4 in the case of CakeML [Kumar
et al. 2014; Myreen and Owens 2014]. The CakeML and Cogent projects have a different focus than
ours, and they provide a higher assurance in their verified code. CakeML [Kumar et al. 2014] has a
verified compiler and Cogent has a certifying compiler [O’Connor et al. 2016; Rizkallah et al. 2016].
Both tools provide mechanically checked proofs that their shallow embeddings correspond to the
functional code being verified.
Cogent is a restricted higher-order functional language [O’Connor et al. 2016] that was used to
verify filesystems [Amani et al. 2016]. Its compiler produces C code, a high-level specification in
Isabelle/HOL, and an Isabelle/HOL refinement proof linking the two [O’Connor et al. 2016; Rizkallah
et al. 2016]. Chen et al. [2017] integrated property-based testing into the Cogent framework. The
authors claim that property-based testing enables an incremental approach to a fully verified system,
as it allows for the replacement of tests of properties stated in the specification by formal proofs.
Our work substantiates this claim, as indeed one of the ways in which we obtain specifications is
through the QuickCheck properties provided by Haskell as discussed in Section 4.2.
CakeML is a large subset of ML with a verified compiler and runtime system [Kumar et al. 2014].
Users of CakeML can write pure functional programs in the HOL4 proof assistant and verify them
in HOL4. They can then extract an equivalent correct by construction CakeML program. This
method has been used to verify several data structures including red black trees, crypto protocols,
and a CakeML version of the HOL light theorem prover [Myreen and Owens 2014].
F* is a general-purpose functional language that allows for a mixture of proving and generalpurpose programming [Swamy et al. 2016]. Programs can be specified using dependent and refinement types and automatically verified using one of F*’s backend SMT solvers. Its subset
Low* [Protzenko et al. 2017] has been used to verify high-assurance optimized cryptographic
libraries.
8.4
Extraction
The semantic proximity of Haskell and Coq, which we rely on, is also used in the other direction by
Coq’s support for code extraction to Haskell [Letouzey 2002]. Several projects use this feature to
verify Haskell code [Chen et al. 2015; Joseph 2014]. However, since extraction starts with Coq code
and generates Haskell, it cannot be used to verify pre-existing Haskell. Although in a certain sense
hs-to-coq and extraction are inverses, round-tripping does not produce syntactically equivalent
output in either direction. In one direction, hs-to-coq extensively annotates the resulting Coq
code; in the other, extraction ignores many Haskell features and inserts unsafe type coercions. In
this work, we use testing to verify that round-tripping produces operationally equivalent output;
this provides assurance about the correctness of both hs-to-coq and extraction.
CertiCoq [Anand et al. 2017] and Œuf [Mullen et al. 2018] are verified compilers from Gallina to
assembly. CertiCoq can compile any Gallina program, while Œuf can only compile a limited subset
of Gallina. However, Œuf provides stronger guarantees about the Gallina code that is in the limited
subset it translates.
9
CONCLUSIONS AND FUTURE WORK
We verified the two finite set modules that are part of the widely used and highly-optimized
containers library. Our efforts provide the deepest specification and verification of this code to
date, covering more of the API and proving stronger, more descriptive properties than prior work.
In future work, there is yet more to verify in containers. For example, we plan to add a version of
IntSet that uses 64-bit ints as the element type in addition to our current version with unbounded
natural numbers. That way users could choose the treatment of overflow that makes the most sense
28
Breitner, Spector-Zabusky, Li, Rizkallah, Wiegley and Weirich
for their application. We have also started to verify Data.Map and Data.IntMap. Because these
modules use the same algorithms as Data.Set and Data.IntSet, we already adapted some of our
existing proofs to this setting.
The fact that we did not find bugs says a lot about the tools that are already available to Haskell
programmers for producing correct code, such as a strong, expressive type system and a mature
property-based testing infrastructure. However, few would dare to extrapolate from these results to
say that all Haskell programs are bug free! Instead, we view verification as a valuable opportunity
for functional programmers and an activity that we hope will become more commonplace.
ACKNOWLEDGMENTS
This material is based upon work supported by the National Science Foundation under Grant
No. 1319880 and Grant No. 1521539.
REFERENCES
Andreas Abel, Marcin Benke, Ana Bove, John Hughes, and Ulf Norell. 2005. Verifying Haskell Programs Using Constructive
Type Theory. In Haskell Workshop. ACM, 62–73. DOI:http://dx.doi.org/10.1145/1088348.1088355
Stephen Adams. 1992. Implementing sets efficiently in a functional language,. Research Report CSTR 92-10. University of
Southampton.
Sidney Amani, Alex Hixon, Zilin Chen, Christine Rizkallah, Peter Chubb, Liam O’Connor, Joel Beeren, Yutaka Nagashima,
Japheth Lim, Thomas Sewell, Joseph Tuong, Gabriele Keller, Toby Murray, Gerwin Klein, and Gernot Heiser. 2016.
Cogent: Verifying High-Assurance File System Implementations. In International Conference on Architectural Support
for Programming Languages and Operating Systems. Atlanta, GA, USA, 175–188. DOI:http://dx.doi.org/10.1145/2872362.
2872404
Abhishek Anand, Andrew Appel, Greg Morrisett, Zoe Paraskevopoulou, Randy Pollack, Olivier Savary Belanger, Matthieu
Sozeau, and Matthew Weaver. 2017. CertiCoq: A verified compiler for Coq. In CoqPL Workshop (CoqPL ’17).
Andrew W. Appel. 2011. Efficient verified red-black trees. (2011). https://www.cs.princeton.edu/~appel/papers/redblack.pdf
Andrew W. Appel, Lennart Beringer, Adam Chlipala, Benjamin C. Pierce, Zhong Shao, Stephanie Weirich, and Steve
Zdancewic. 2017. Position paper: the science of deep specification. Philosophical Transactions of the Royal Society of
London A: Mathematical, Physical and Engineering Sciences 375, 2104 (2017). DOI:http://dx.doi.org/10.1098/rsta.2016.0331
Frédéric Besson. 2006. Fast Reflexive Arithmetic Tactics the Linear Case and Beyond. In TYPES (Lecture Notes in Computer
Science), Vol. 4502. Springer, 48–62.
Ana Bove, Peter Dybjer, and Ulf Norell. 2009. A Brief Overview of Agda - A Functional Language with Dependent Types. In
Theorem Proving in Higher Order Logics, 22nd International Conference, TPHOLs 2009, Munich, Germany, August 17-20,
2009. Proceedings (Lecture Notes in Computer Science), Stefan Berghofer, Tobias Nipkow, Christian Urban, and Makarius
Wenzel (Eds.), Vol. 5674. Springer, 73–78. DOI:http://dx.doi.org/10.1007/978-3-642-03359-9_6
Edwin Brady. 2017. Type-driven Development With Idris. Manning.
Taylor Campbell. 2010. Bug in Data.Map. (2010). http://article.gmane.org/gmane.comp.lang.haskell.libraries/13448 e-mail
to the Haskell libraries mailing list.
Arthur Charguéraud. 2010. Program verification through characteristic formulae. In ICFP. ACM, 321–332. DOI:http:
//dx.doi.org/10.1145/1932681.1863590
Haogang Chen, Daniel Ziegler, Tej Chajed, Adam Chlipala, M. Frans Kaashoek, and Nickolai Zeldovich. 2015. Using Crash
Hoare Logic for Certifying the FSCQ File System. In SOSP. ACM, 18–37. DOI:http://dx.doi.org/10.1145/2815400.2815402
Zilin Chen, Liam O’Connor, Gabriele Keller, Gerwin Klein, and Gernot Heiser. 2017. The Cogent Case for Property-Based
Testing. In Workshop on Programming Languages and Operating Systems (PLOS) (2017-10-28). ACM, Shanghai, China,
1–7.
Koen Claessen and John Hughes. 2000. QuickCheck: a lightweight tool for random testing of Haskell programs. In ICFP.
ACM, 268–279.
Thierry Coquand and Gérard P. Huet. 1988. The Calculus of Constructions. Information and Computation 76, 2/3 (1988),
95–120. DOI:http://dx.doi.org/10.1016/0890-5401(88)90005-3
Nils Anders Danielsson, John Hughes, Patrik Jansson, and Jeremy Gibbons. 2006. Fast and loose reasoning is morally correct.
In POPL. ACM, 206–217. DOI:http://dx.doi.org/10.1145/1111037.1111056
Philip Derrin, Kevin Elphinstone, Gerwin Klein, David Cock, and Manuel M. T. Chakravarty. 2006. Running the Manual: An
Approach to High-assurance Microkernel Development. In Haskell Symposium. ACM, 60–71. DOI:http://dx.doi.org/10.
1145/1159842.1159850
Ready, Set, Verify!
29
Peter Dybjer, Qiao Haiyan, and Makoto Takeyama. 2004. Verifying Haskell programs by combining testing, model
checking and interactive theorem proving. Information & Software Technology 46, 15 (2004), 1011–1025. DOI:http:
//dx.doi.org/10.1016/j.infsof.2004.07.002
Jean-Christophe Filliâtre and Pierre Letouzey. 2004. Functors for Proofs and Programs. In Programming Languages and
Systems, David Schmidt (Ed.). Springer Berlin Heidelberg, Berlin, Heidelberg, 370–384.
Thomas Hallgren, James Hook, Mark P. Jones, and Richard B. Kieburtz. 2004. An overview of the programatica toolset. In
HCSS.
Yoichi Hirai and Kazuhiko Yamamoto. 2011. Balancing weight-balanced trees. Journal of Functional Programming 21, 3
(2011), 287–307. DOI:http://dx.doi.org/10.1017/S0956796811000104
Adam Megacz Joseph. 2014. Generalized Arrows. (May 2014). http://www2.eecs.berkeley.edu/Pubs/TechRpts/2014/
EECS-2014-130.html also see http://www.megacz.com/berkeley/coq-in-ghc/.
Gerwin Klein, Kevin Elphinstone, Gernot Heiser, June Andronick, David Cock, Philip Derrin, Dhammika Elkaduwe, Kai
Engelhardt, Rafal Kolanski, Michael Norrish, Thomas Sewell, Harvey Tuch, and Simon Winwood. 2009. seL4: Formal
Verification of an OS Kernel. In ACM Symposium on Operating Systems Principles. ACM, Big Sky, MT, USA, 207–220.
Alexander Krauss. 2006. Partial Recursive Functions in Higher-Order Logic. In IJCAR (LNCS), Vol. 4130. Springer, 589–603.
Daniel Kröning, Philipp Rümmer, and Georg Weissenbacher. 2009. A proposal for a theory of finite sets, lists, and maps for
the SMT-LIB standard. In Informal proceedings, 7th International Workshop on Satisfiability Modulo Theories at CADE,
Vol. 22.
Ramana Kumar, Magnus O. Myreen, Michael Norrish, and Scott Owens. 2014. CakeML: A Verified Implementation of ML.
In Proceedings of the 41st ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages (POPL ’14). ACM,
New York, NY, USA, 179–191.
Pierre Letouzey. 2002. A New Extraction for Coq. In TYPES (LNCS), Vol. 2646. Springer, 200–219. DOI:http://dx.doi.org/10.
1007/3-540-39185-1_12
Dan Licata. 2012. 15-150 Lecture 21: Red-Black Trees. (2012). https://www.cs.cmu.edu/~15150/previous-semesters/
2012-spring/resources/lectures/21.pdf Lecture at the Oregon Programming Language Summer School.
The Coq development team. 2016. The Coq proof assistant reference manual. LogiCal Project. http://coq.inria.fr Version
8.6.1.
Conor Thomas McBride. 2014. How to Keep Your Neighbours in Order. In Proceedings of the 19th ACM SIGPLAN International
Conference on Functional Programming (ICFP ’14). ACM, New York, NY, USA, 297–309. DOI:http://dx.doi.org/10.1145/
2628136.2628163
Donald R. Morrison. 1968. PATRICIA&Mdash;Practical Algorithm To Retrieve Information Coded in Alphanumeric. J. ACM
15, 4 (Oct. 1968), 514–534. DOI:http://dx.doi.org/10.1145/321479.321481
Eric Mullen, Stuart Pernsteiner, James R. Wilcox, Zachary Tatlock, and Dan Grossman. 2018. ŒUf: Minimizing the Coq
Extraction TCB. In Proceedings of the 7th ACM SIGPLAN International Conference on Certified Programs and Proofs (CPP
2018). ACM, New York, NY, USA, 172–185. DOI:http://dx.doi.org/10.1145/3167089
Magnus O. Myreen and Scott Owens. 2014. Proof-producing translation of higher-order logic into pure and stateful ML.
Journal of Functional Programming 24 (May 2014), 284–315. DOI:http://dx.doi.org/10.1017/S0956796813000282
Jürg Nievergelt and Edward M. Reingold. 1972. Binary Search Trees of Bounded Balance. In STOC. ACM, 137–142. DOI:
http://dx.doi.org/10.1145/800152.804906
Tobias Nipkow. 2016. Automatic Functional Correctness Proofs for Functional Search Trees. In Interactive Theorem Proving
(ITP 2016), J. Blanchette and S. Merz (Eds.), Vol. 9807. 307–322.
Tobias Nipkow and Stefan Dirix. 2018. Weight-Balanced Trees. Archive of Formal Proofs (March 2018). http://isa-afp.org/
entries/Weight_Balanced_Trees.html, Formal proof development.
Tobias Nipkow, Lawrence C. Paulson, and Markus Wenzel. 2002. Isabelle/HOL - A Proof Assistant for Higher-Order Logic.
Lecture Notes in Computer Science, Vol. 2283. Springer. DOI:http://dx.doi.org/10.1007/3-540-45949-9
Liam O’Connor, Zilin Chen, Christine Rizkallah, Sidney Amani, Japheth Lim, Toby Murray, Yutaka Nagashima, Thomas
Sewell, and Gerwin Klein. 2016. Refinement Through Restraint: Bringing Down the Cost of Verification. In International
Conference on Functional Programming. Nara, Japan.
Chris Okasaki. 1999. Purely functional data structures. Cambridge University Press. DOI:http://dx.doi.org/10.1017/
CBO9780511530104
Chris Okasaki and Andrew Gill. 1998. Fast Mergeable Integer Maps. In In Workshop on ML. 77–86.
Simon Peyton Jones, Andrew Tolmach, and Tony Hoare. 2001. Playing by the rules: rewriting as a practical optimisation
technique in GHC. In Haskell Workshop.
Jonathan Protzenko, Jean-Karim Zinzindohoué, Aseem Rastogi, Tahina Ramananandro, Peng Wang, Santiago ZanellaBéguelin, Antoine Delignat-Lavaud, Cătălin Hriţcu, Karthikeyan Bhargavan, Cédric Fournet, and Nikhil Swamy. 2017.
Verified Low-level Programming Embedded in F*. Proc. ACM Program. Lang. 1, ICFP, Article 17 (Aug. 2017), 29 pages.
DOI:http://dx.doi.org/10.1145/3110261
30
Breitner, Spector-Zabusky, Li, Rizkallah, Wiegley and Weirich
Ryan Ralston. 2009. ACL2-certified AVL Trees. In Proceedings of the Eighth International Workshop on the ACL2 Theorem
Prover and Its Applications (ACL2 ’09). ACM, New York, NY, USA, 71–74. DOI:http://dx.doi.org/10.1145/1637837.1637848
Christine Rizkallah, Japheth Lim, Yutaka Nagashima, Thomas Sewell, Zilin Chen, Liam O’Connor, Toby Murray, Gabriele
Keller, and Gerwin Klein. 2016. A Framework for the Automatic Formal Verification of Refinement from Cogent to C. In
International Conference on Interactive Theorem Proving. Nancy, France.
Antal Spector-Zabusky, Joachim Breitner, Christine Rizkallah, and Stephanie Weirich. 2018. Total Haskell is reasonable Coq.
In CPP. ACM, 14–27. DOI:http://dx.doi.org/10.1145/3167092
Milan Straka. 2010. The Performance of the Haskell Containers Package. In Proceedings of the Third ACM Haskell Symposium
on Haskell (Haskell ’10). ACM, New York, NY, USA, 13–24. DOI:http://dx.doi.org/10.1145/1863523.1863526
Nikhil Swamy, Cătălin Hriţcu, Chantal Keller, Aseem Rastogi, Antoine Delignat-Lavaud, Simon Forest, Karthikeyan
Bhargavan, Cédric Fournet, Pierre-Yves Strub, Markulf Kohlweiss, Jean-Karim Zinzindohoue, and Santiago ZanellaBéguelin. 2016. Dependent Types and Multi-monadic Effects in F*. In Proceedings of the 43rd Annual ACM SIGPLANSIGACT Symposium on Principles of Programming Languages (POPL ’16). ACM, New York, NY, USA, 256–270. DOI:
http://dx.doi.org/10.1145/2837614.2837655
Niki Vazou, Leonidas Lampropoulos, and Jeff Polakow. 2017. A Tale of Two Provers: Verifying Monoidal String Matching in
Liquid Haskell and Coq. In Haskell Symposium. ACM, 63–74. DOI:http://dx.doi.org/10.1145/3122955.3122963
Niki Vazou, Patrick M. Rondon, and Ranjit Jhala. 2013. Abstract Refinement Types. In Proceedings of the 22Nd European
Conference on Programming Languages and Systems (ESOP’13). Springer-Verlag, Berlin, Heidelberg, 209–228. DOI:
http://dx.doi.org/10.1007/978-3-642-37036-6_13
Niki Vazou, Eric L. Seidel, Ranjit Jhala, Dimitrios Vytiniotis, and Simon Peyton-Jones. 2014. Refinement Types for Haskell.
In ICFP. ACM, 269–282. DOI:http://dx.doi.org/10.1145/2628136.2628161
Niki Vazou, Anish Tondwalkar, Vikraman Choudhury, Ryan G. Scott, Ryan R. Newton, Philip Wadler, and Ranjit Jhala. 2018.
Refinement reflection: complete verification with SMT. PACMPL 2, POPL (2018), 53:1–53:31. DOI:http://dx.doi.org/10.
1145/3158141
Dimitrios Vytiniotis, Simon Peyton Jones, Koen Claessen, and Dan Rosén. 2013. HALO: Haskell to Logic Through Denotational Semantics. In POPL. ACM, 431–442. DOI:http://dx.doi.org/10.1145/2429069.2429121
John Wiegley. 2017. coq-haskell: A library for formalizing Haskell types and functions in Coq. https://github.com/
jwiegley/coq-haskell. (2017).
| 6cs.PL
|
D EEP CAS: A Deep Reinforcement Learning Algorithm for
Control-Aware Scheduling
arXiv:1803.02998v1 [cs.SY] 8 Mar 2018
Burak Demirel, Arunselvan Ramaswamy, Daniel E. Quevedo and Holger Karl
Abstract— We consider networked control systems consisting
of multiple independent closed-loop control subsystems, operating over a shared communication network. Such systems are
ubiquitous in cyber-physical systems, Internet of Things, and
large-scale industrial systems. In many large-scale settings, the
size of the communication network is smaller than the size of
the system. In consequence, scheduling issues arise. The main
contribution of this paper is to develop a deep reinforcement
learning-based control-aware scheduling (D EEP CAS) algorithm
to tackle these issues. We use the following (optimal) design
strategy: First, we synthesize an optimal controller for each
subsystem; next, we design learning algorithm that adapts to
the chosen subsystem (plant) and controller. As a consequence
of this adaptation, our algorithm finds a schedule that minimizes the control loss. We present empirical results to show
that D EEP CAS finds schedules with better performance than
periodic ones. Finally, we illustrate that our algorithm can be
used for scheduling and resource allocation in more general
networked control settings than the above-mentioned one.
Index Terms— Deep Learning; Reinforcement Learning; Optimal Control; Networked Control Systems
I. I NTRODUCTION
Today’s cyber-physical systems (CPS), Internet of Things
(IoT), large-scale industrial systems, and myriad real-world
systems try to integrate traditional control systems with artificial intelligence to improve the overall system performance
and reliability. Examples of such systems include smart grids,
smart cities, city-wide vehicular traffic control, industrial
process optimization, among others. In recent years, artificial
intelligence (AI) has seen a resurgence as an effective
model-free solution to many problems, including optimal
control problems arising in the aforementioned systems. This
resurgence is partly owing to the advances in computational
capacities and the advent of deep neural networks for function approximation and feature extraction. Oftentimes, the
use of reinforcement learning algorithms or AI in conjunction
with traditional controllers reduces the complexity of system
design while boosting efficiency.
The large size of systems poses tremendous challenges
in resource allocation. In applications involving feedback,
this challenge is exaggerated since resource allocation is
required to be “control-aware”, i.e., it should reduce control
loss. Typical resources including communication channels
and computational resources do not scale with system size.
B. Demirel, A. Ramaswamy, D. E. Quevedo, and H. Karl
are with Paderborn University, Warburger Straße 100, 33098,
Paderborn,
Germany
[email protected]
[email protected] [email protected].
[email protected].
A. Ramaswamy was funded by the German Research Foundation (DFG)
- 315248657.
DeepCAS
Smart Sensor
Kalman
Filter (I)
Plant
Control
Algorithm
Kalman
Filter (II)
Feedback Control Loop (i)
Controller
Control
Algorithm
Net work
with M available
channels
···
Kalman
Filter (II)
Fig. 1.
Networked control system (NCS) that consists of N control
subsystems closed over a shared communication network (with M available
channel).
In large-scale systems, controllers often rely on information
collected from various sensors to make intelligent decisions.
Hence, efficient information dispersion is essential for decision making over communication networks to be effective.
As noted earlier, this is a hard problem since the number of
communication channels available is much smaller than what
is ideally required to transfer data from sensors to controllers.
In this paper, we present a deep reinforcement learningbased scheduling algorithm for the sensor-to-controller communication in large-scale networked control systems. To
illustrate our ideas, we use the system architecture illustrated
in Fig. 1. Later, we will show that our ideas can be used for
scheduling in more general architectures.
Fig. 1 is a simplified representation of (some) CPS and
IoT systems. The system consists of N independent control
subsystems that communicate over a shared communication
network, which contains M channels. We assume that M
N (M is much smaller than N ) and, in particular, that
each channel can be used to serve any communication
request. Each control subsystem consists of a smart sensor, a
controller, and a plant to be controlled. The feedback loops
are closed over this resource-constrained communication
network. For more details on the system model, we refer
the reader to § II.
D EEP CAS, our deep reinforcement learning-based modelfree scheduling algorithm, decides which of the N subsystems are allocated to the M channels in a given time
instant. Further, it adapts to the controller at hand and finds
a schedule that minimizes the control loss. We present an
implementation wherein D EEP CAS obtains feedbacks (i.e.,
rewards) from smart sensors for making decisions. At each
time instant, each smart sensor computes the estimate of the
subsystem’s state, using Kalman Filter (I), and transmits it to
the corresponding controller; see Fig. 1. The controller runs
Kalman Filter (II) to estimate the subsystem’s state in the
absence of transmissions. In addition to Kalman Filter (I), a
smart sensor also implements a copy of Kalman Filter (II)
and the control algorithm. This way the smart sensor knows
the state estimate used by the controller at every time instant.
Several scheduling approaches for control systems have
been proposed in the literature to determine the access order
of different sensors and/or actuators; see [1] and references
therein. A widely considered approach is to employ periodic
schedules [2]–[5]. However, finding such schedules for control applications may not be easy since both specific period
and sequence need to be found. Further, periodic sequences
may not be even optimal in which case searching for them
is futile. With a few exceptions (e.g., [6] and [7]), the
determination of optimal schedules indeed requires solving a
mixed-integer quadratic program, which is computationally
infeasible for all but very small systems.
Our contribution is in the development of a deep reinforcement learning-based control-aware scheduling (D EEP CAS)
algorithm. At its heart lies the Deep Q-Network (DQN), a
modern variant of Q learning, introduced in [8]. In addition to
being readily scalable, D EEP CAS is completely model-free.
To optimize the overall control performance, we propose
the following (optimal) design of control and scheduling:
In the first step, we design an optimal controller for each
independent subsystem. As discussed in [9], under limited
communication, the control loss has two components: (a)
best possible control loss (b) error due to intermittent transmissions. If M = N , then (b) vanishes. Since we are in
setting of M N , the goal of the scheduler is to minimize
(b). To this end, we first construct a Markov decision process
(MDP). The state space of this MDP is the difference in state
estimates of all controllers and sensors (obtainable from the
smart sensors). Its reward is the negative of the previously
mentioned (b). Since we are using DQN (reinforcement
learning) to solve this MDP, we do not need the knowledge
of transition probabilities. Since the goal of DQN is to find a
scheduling strategy that maximizes reward, it naturally aims
at minimizing (b). For more details on the MDP, the reader is
referred to § III. We present empirical results showing that
D EEP CAS finds schedules that have lower control losses
than traditional hand-tuned heuristics.
The organization of this paper is as follows: Section II
introduces models and assumptions for subsystems, sensors,
controllers, and network. This section also presents the
primary objective of the paper and how to reach this objective
via solving control design and control-aware scheduling
problems separately. Section III presents an MDP associated
with control-aware scheduling problems and proposes a
deep reinforcement learning algorithm to solve this MDP
efficiently. In Section IV, numerical examples are used to
illustrate the power of our AI-based scheduling algorithm.
Section V gives concluding remarks and directions for future work.
II. N ETWORKED C ONTROL S YSTEM : M ODEL ,
A SSUMPTIONS , AND G OALS
A. Model for each subsystem
As illustrated in Figure 1, our networked control system
consists of N independent closed-loop subsystems. The
feedback loop within each subsystem (plant) is closed over a
shared communication network. For 1 ≤ i ≤ N , subsystem
i is described by
(i)
(i)
(i)
(i)
(1)
xt+1 = A(i) xt + B (i) ut + wt ,
where A(i) and B (i) are matrices of appropriate dimensions,
(i)
(i)
xt ∈ Rni is the subsystem i’s state, ut ∈ Rmi is the
(i)
ni
control input, and wt ∈ R is zero-mean i.i.d. Gaussian
noise with covariance matrix W (i) . The initial state of
(i)
subsystem i, x0 , is assumed to be a Gaussian random vector
(i)
(i)
with mean x̄0 and covariance matrix X0 .
At a given time t, we assume that only noisy output
measurements are available. We thus have:
(i)
(i)
(i)
(2)
yt = C (i) xt + vt ,
(i)
where vt ∈ Rpi is zero-mean i.i.d. Gaussian noise with
(i)
(i)
covariance matrix V (i) . All noise sources, wt and vt , are
(i)
independent of the initial conditions x0 .
B. Control architecture and loss function
The dynamics of each subsystem is a stochastic linear
time-invariant (LTI) system given by (1). Further, each subsystem is independently controlled although dependencies do
arise from sharing a communication network. Subsystem i
(i)
has a smart sensor which samples the subsystem’s output yt
and computes an estimate of the subsystem’s state. This value
is then sent to the associated controller, provided a channel
is allocated to it by D EEP CAS. If the controller obtains
a new state estimate from the sensor, then it calculates a
control command based on this state estimate. Otherwise, it
calculates a control command based on its own estimate of
the subsystem’s state.
The control actions and scheduling decisions (of D EEP CAS) are taken to minimize the total control loss given by
J=
N
X
(3)
J (i) ,
i=1
where J (i) is the control loss of subsystem i and is given by
(i)> (i) (i)
J (i) = E xT Qf xT
+
T−1
X
(i)>
(i)
xt Q(i) xt
+
(i)>
(i)
ut R(i) ut
, (4)
t=0
(i)
where Q(i) and Qf are positive semi-definite matrices and
R(i) is positive definite.
C. Smart sensors and pre-processing units
Within our setting, the primary role of a smart sensor
is to take measurements of a subsystem’s output. Also, it
plays a vital role in helping D EEP CAS with scheduling
decisions. It is from the smart sensors that D EEP CAS gets
all the necessary feedback information for scheduling. For
these tasks, each smart sensor employs two Kalman filters:
(1) Kalman Filter (I) is used to estimate the subsystem’s
state, (2) a copy of Kalman Filter (II) is used to estimate
the subsystem’s state as perceived by the controller. Note
that the controller employs Kalman Filter (II). Below, we
discuss them in detail.
Kalman filter (I): The sensor employs a standard Kalman
(i)s
(i)s
filter to compute the state estimate x̂t|t and covariance Pt|t
recursively as
(i)s
x̂t|t−1
(i)s
Pt|t−1
=
=
(i)s
(i)
A x̂t−1|t−1 + B (i) ut−1
(i)s
A(i) Pt−1|t−1 A(i)> + W (i)
(i)
−1
(i)s
(i)s
Kt = Pt|t−1 C (i)> C (i) Pt|t−1 C (i)> + V (i)
(i)s
(i)s
(i)
(i)
(i)s
x̂t|t = x̂t|t−1 + Kt yt − C x̂t|t−1
(i)s
(i)
(i)s
Pt|t = I − Kt C (i) Pt|t−1 ,
(i)s
(i)
(i)s
(i)c
(i)
(i)
(i)
with x̂0|−1 = x̄0 .
D. Goal: minimizing the control loss
Under the assumptions presented in § II, the certainty
equivalent controller is still optimal; see [9] for details. The
total control loss in (4) has two components: (a) best possible
control loss (b) error due to intermittent communications.
Hence, the problem of minimizing control loss has two separate components: (i) designing the best (optimal) controller
for each subsystem and (ii) scheduling in a control-aware
manner.
Component I: Controller design. The controller in feedback
(i)
loop i takes the following control action, ut , at time t:
(i)
(i)
(i)c
(7)
ut = −Lt x̂t|t ,
(i)c
where x̂t|t is the state estimate used by the controller,
(i)
(i)
(i)
Lt = (B (i)> St+1 B (i) + R(i) )−1 B (i)> St+1 A(i)
and
(i)
St
(i)
(8)
is recursively computed as
(i)
(i)
St = A(i)> St+1 A(i) + Q(i) − A(i)> St+1 B (i)
(i)
(i)
(i)s
(i)c
J
(i)
=
(i)> (i) (i)
x̄0 S0 x̄0 +Tr
(i) (i)
S0 X0 +
T−1
X
(i)
Tr St+1 W (i)
t=0
+
T−1
X
(i)s (i)
Tr Pt|t Γt
t=0
(i)
where Γt ,
(i)s
(i)c
x̂t|t − x̂t|t .
+
T−1
X
h
i
(i)> (i) (i)
E et|t Γt et|t , (10)
t=0
(i)>
(i)
(i)
(i)
Lt (B (i)> St+1 B (i) + R(i) )Lt and et|t
(i)
Note that et|t is the communication error
,
in
subsystem i. Recall that there are N subsystems and M
(i)
communication channels. If M = N , then et|t = 0 for all
t ≥ 0 and 1 ≤ i ≤ N .
Component II: Control-aware scheduling. The main aim of
the scheduling algorithm is to help minimize J of (3). To
this end, one must minimize
i
h
(i)> (i) (i)
E et|t Γt et|t
(11)
t=0
x̂t|t−1 = A(i) x̂t−1|t−1 + B (i) ut−1 ,
(5)
( (i)s
x̂t|t
if the MMSE estimate received ,
(i)c
(6)
x̂t|t =
(i)c
x̂t|t−1 otherwise ,
(i)c
(i)
loop i have communicated. Otherwise, x̂t|t is the state
estimate obtained from Kalman Filter (II). The minimum
value of the control loss of subsystem i is given by
T−1
X
starting from x̂0|−1 = x̄0 and P0|−1 = X0 .
Kalman filter (II): The controller runs a minimum mean
square error (MMSE) estimator to compute estimates of the
subsystem’s state as follows:
(i)c
(i)
with initial values SN = Qf . Let x̂t|t be the state estimate
of Kalman Filter (I), as employed by the sensor. We have
(i)c
(i)s
x̂t|t = x̂t|t when the sensor and controller of the feedback
× (B (i)> St+1 B (i) + R(i) )−1 B (i)> St+1 A(i) , (9)
of (10) for every 1 ≤ i ≤ N . Note that T in (11) is the
control horizon. At any time t, the scheduler decides which
M among the N subsystems may communicate. Note that
(i)
et|t = 0 when a communication channel is assigned to
subsystem i at time t.
In the following section, we present a deep reinforcement learning algorithm for control-aware scheduling called
D EEP CAS. D EEP CAS communicates only with the smart
sensors. At every time instant, sensors are told if they can
transmit to their associated controllers. Then, the sensors
provide feedback on the scheduling decision for that stage.
Note that we do not consider the overhead involved in
providing feedback.
III. D EEP REINFORCEMENT LEARNING FOR
CONTROL - AWARE SCHEDULING
As stated earlier, at the heart of our D EEP CAS lies the
DQN. The DQN is a modern variant of Q-learning that
effectively counters Bellman’s curse of dimensionality. Essentially, DQN or Q-learning finds a solution to an associated
Markov decision process (MDP) in an iterative model-free
manner. Before proceeding, let us recall the definition of an
MDP. For a more detailed exposition, the reader is referred
to [10]. An MDP, M, is given by the following tuple
(S, A, P, r, γ), where
S is the state-space of M.
A is the set of actions that can be taken.
P is the transition probability, i.e., P (s, s0 ; a) is the probability of transitioning to state s0 when action a is taken
at state s.
r is the one stage reward function, i.e., r(s, a) is the
reward when action a is taken at state s.
γ is the discount factor and ∈ [0, 1].
Below, we state the MDP Md associated with our problem.
S: The state space S consists of all possible augmented
error vectors. Hence, state vector st at time t is given
(1)
(N )
by (et|t , . . . , et|t ).
A: Action space is {S | S ⊂ {1, 2, . . . , N }, |S| = M }.
Hence, the cardinality (size), |A|, of the action space
N
equals M
.
N
P
(i) (i) (i)
r: At time t, the reward r(t) is given by −
et|t Γt et|t .
i=1
γ: Although it would seem natural to use γ = 1, we use
0 < γ < 1 since it hastens the rate of convergence.
Note that the scheduler (D EEP CAS) takes action just before
time t and receives rewards just after time t, based on
transmissions at time t. Also, note that D EEP CAS only gets
non-zero rewards from non-transmitting sensors. D EEP CAS
is model-free. Hence, it does not need to know transition
probabilities.
Let us suppose we use a reinforcement learning algorithm,
such as Q-learning, to solve Md . Since the learning algorithm will find policies that minimize the future expected
cumulative rewards, we expect to find policies that minimize
scheduling effects on the entire system. This is a consequence
of our above definition of reward r. In the following section,
we provide a brief overview of Q-learning and DQN, the
reinforcement learning algorithm at the heart of our D EEP CAS. Simply put, D EEP CAS is a DQN solving the above
defined MDP Md .
D EEP CAS. At any time t0 , the scheduler (D EEP CAS) is
interested in maximizing the following expected discounted
future reward:
"T −1
#
X
t−t0
R(t0 ) := E
γ
r(t) ,
t=t0
where r(t) is the single stage cost given by −
N
P
i=1
(i) (i) (i)
et|t Γt et|t .
Q-learning is a useful methodology to solve such problems.
It is based on finding the following Q-factor for every stateaction pair:
∗
Q (s, a) := max E [Rt | st = s, at = a, π] ,
π
where π is a policy that maps states to actions. The algorithm
itself is based on the Bellman equation:
Q∗ (s, a) = Es0 ∼E [r + γ 0max 0 Q∗ (s0 , a0 ) | s, a] .
a ∈U (s )
Since our state space is continuous, we use a deep neural
network (DNN) for function approximation. Specifically, we
try to find good approximations of the Q-factors iteratively.
In other words, the neural network takes as input state s
and outputs Q(s, a, θ) for every possible action a, such that
Q(s, a, θ) ≈ Q∗ (s, a). This deep function approximator, with
weights θ, is referred to as a Deep Q-Network. The Deep QNetwork is trained by minimizing a time-varying sequence
of loss functions Lt (θt ) given by
Lt (θt ) = 1/2 Es,a∼ρ(s,a) (Q(s, a, θt ) − yt )2 ,
where yt := Es0 ∼E [r + γ maxa0 Q(s0 , a0 , θt−1 ) | s, a] is the
expected cost-to-go based on the latest update of the weights;
ρ is the behavior distribution. Training the neural network
involves finding θ∗ , which minimizes the loss functions.
Since the algorithm is online, training is done in conjunction with scheduling. At time t, after feedback (reward) is
received, one gradient descent step can be performed using
the following gradient term:
∇θt Lt (θt ) = Es,a∼ρ(·);s∼E Q(s, a; θt ) − r
0 0
− γ max
Q(s , a , θt−1 ) ∇θt Q(s, a; θt ) . (12)
0
a
To make the algorithm implementable, we use a sample rather than find the above expectation, when updating
weights. At each time, we pick actions using the -greedy
approach. Specifically, we pick a random action with probability , and we pick a greedy action with probability
1 − . This constitutes the previously mentioned behavior
distribution ρ, which governs how actions are picked. Note
that a greedy action at at time t is one that maximizes
Q(st , a; θ). Initially it is desirable to explore, hence is set
to 1. Once the algorithm has gained some experience, it is
better to exploit this experience. To accomplish this, we use
an attenuating .
Although we train our DNN in an online manner, we
do not perform a gradient descent step using (12), since it
can lead to poor learning. Instead, we store the previous
K experiences (st , at , rt , st+1 ), t0 − K + 1 ≤ t ≤ t0 , in
an experience replay memory D. In other words, at time
t, D EEP CAS stores (st , at , rt , st+1 ) into D whose size is
K. When it comes to training the neural network at time
t, it performs a single mini-batch gradient descent step.
The mini-batch (of gradients) is randomly sampled from
the aforementioned experience replay D. The idea of using
experience replay memory, to overcome biases and to have
a stabilizing effect on algorithms, was introduced in [8].
DQN for control-aware scheduling
1: Initialize the replay memory D to capacity K.
2: Initialize the weights, θ, of the Q-Network.
3: for the entire duration do
4:
With probability select a random action at .
5:
With probability 1 − pick at that maximizes
Q(st , a, θ).
6:
Execute action at to obtain reward rt and observe
st+1 .
7:
Store (st , at , rt , st+1 ) in D.
8:
Sample random mini-batch transitions from D.
9:
Corresponding to (sj , aj , rj , sj+1 ), set
yj := rj + γ max
Q(sj+1 , a0 ; θ).
0
a
10:
Perform a gradient descent step with loss given by
(yj − Q(sj , aj ; θ))2 .
100
We are now ready to present our numerical results. Recall
that a DQN is at the heart of our D EEP CAS, which uses
a deep neural network to approximate Q-factors. Before
proceeding, we specify the algorithm parameters. The input
to the neural network is the appended error vector. The
hidden layer consists of 1024 rectifier units. The output layer
is a fully connected
linear layer with a single output for each
N
of the M
actions. The discount factor γ in our Q-learning
algorithm is 0.95. The size of the experience replay buffer
is fixed at 20000. The exploration parameter is initialized
to 1, then attenuated to 0.001 at the rate of 0.9. For training
the neural network, we use the optimizer ADAM [11] with
a learning rate of e−4 and a decay of 0.001. Note that we
used the same set of parameters for all of the experiments
presented below.
Experiment 1: N=3, M=1, and T=500. For our first experiment, we used D EEP CAS to schedule one channel for
a system with three subsystems, over a control horizon of
length 500. We considered three second-order single-inputsingle-output (SISO) subsystems consisting of one stable
(subsystem 2) and two unstable subsystems (subsystems 1
and 3). If there were three channels, then there would be
no scheduling problem and the total optimal control loss
J would be 13.8487. Since there is a single channel, one
expects a solution to the scheduling problem to allocate it
to subsystems 1 and 3 for a more substantial fraction of the
time, as compared to subsystem 2. This expectation is fair
since subsystems 1 and 3 are unstable while subsystem 2 is
stable. Once trained, D EEP CAS indeed allocates the channel
to subsystem 1 for 52% of the time, to subsystem 2 for 12%
of the time, and to subsystem 3 for 36% of the time.
We train D EEP CAS continuously over many epochs. Each
epoch corresponds to a single run of the control problem with
horizon 500. At the start of each epoch, the initial conditions
for the control problem are chosen as explained in § II. Fig. 2
illustrates the learning progress of D EEP CAS. The abscissa
axis of the graph represents the epoch number while the
ordinate axis represents the average control loss. The plot is
obtained by taking the mean of 30 Monte Carlo runs. Since
DQN is randomly initialized, scheduling decisions are poor
at the beginning, and the average control loss is high. As
learning proceeds, the decisions taken improve. After only
10 epochs, D EEP CAS converges to a scheduling strategy
with an associated control loss of around 21.
Comparison to periodic scheduling. Traditionally, the problem of scheduling for control systems is solved by using
control theoretic heuristics to find periodic schedules. We
do the following to compare the performance of D EEP CAS
to such techniques. For every fixed n ∈ {2, . . . , 11}, we
perform an exhaustive search (among 3n sequences) to find
a scheduling sequence, of length n, which minimizes the
control loss. The results are listed in Table I1 . As illustrated
in Table I, this methodology yields a minimum control loss
1 We stopped at n = 11 since exhaustive search is extremely timeconsuming and impractical beyond that.
Empirical average cost
IV. N UMERICAL RESULTS
80
60
40
20
0
5
10
15
20
25
30
Epochs
Fig. 2.
The convergence of the empirical average control loss for
D EEP CAS governing a networked system having three subsystems and one
communication channel.
TABLE I
O PTIMAL P ERIODIC S CHEDULES FOR THE T HREE S UBSYSTEMS
Length n
2
3
4
5
6
7
8
9
10
11
Sequence
{1, 3}
{1, 3, 2}
{1, 3, 1, 2}
{1, 3, 1, 3, 2}
{1, 3, 1, 3, 1, 2}
{1, 3, 1, 3, 1, 3, 2}
{1, 3, 1, 3, 1, 3, 1, 2}
{1, 3, 1, 3, 1, 3, 1, 3, 2}
{1, 3, 1, 3, 1, 3, 1, 3, 1, 2}
{1, 3, 1, 3, 1, 3, 1, 3, 1, 3, 2}
Total cost J
29.0510
25.7798
25.2363
23.6020
23.7801
22.9636
23.2944
22.8112
23.1738
22.8601
of J = 22.8112 for n = 9. In comparison, D EEP CAS finds a
scheduling strategy with an associated control loss of 21.15.
We conclude that, in addition to being faster, D EEP CAS does
not need any system specification and can schedule efficiently
for very long control horizons.
Another approach to scheduling is to solve an associated mixed-integer quadratic program (MIQP); see [12]
for details. Solving a MIQP accurately is computationally
infeasible for all but small system sizes.
Experiment 2: N=6, M=3, and T=500. For our second
experiment, we train D EEP CAS to schedule three channels
for a system with six second-order SISO subsystems. If
N = M , then the total control loss equals 18.234. As before,
learning is done continuously over many epochs. Fig. 3
illustrates the learning progress of D EEP CAS in scheduling
three channels among six subsystems. The abscissa and
ordinate axes are as before. As evidenced in the figure,
D EEP CAS quickly finds schedules with an associated control
loss of around 20. Due to the difference in scale, the control
loss in Fig. 3 seems to have high variance as compared to
Fig. 2.
We are unable to compare the results of Experiment 2
with any traditional heuristics. This is because traditional
heuristics do not extend to the system size and control
horizon considered here. Further, performing an exhaustive
search for finding periodic schedules is not possible
n since
the number of possibilities are in the order of 63 = 20n ,
where n is the period-length.
Empirical average cost
Empirical average cost
24
23
22
21
20
0
10
20
30
40
50
Epochs
Fig. 3.
The convergence of the empirical average control loss for
D EEP CAS governing a networked system having six subsystems and three
communication channels.
Scheduling in general control settings. The systems considered hitherto have independent subsystems. This facilitates
the splitting of the total control cost into two components;
see (10). The one-stage reward in our algorithm is the
negative of the error due to lack of communication defined
in (11). However, in general multi-agent settings, the previously mentioned splitting may not be possible.
Now, we discuss an extension to our algorithm which
will allow for scheduling in these general scenarios. For
such an extension, we observe that one merely needs to
provide a recipe for obtaining the state-space and reward in
the definition of Md (associated MDP). Since we want our
scheduler to reduce the control loss, it seems that a natural
choice for reward is the negative of the one-stage control
cost. Regarding state-space, one may need to consider the
state (or its estimate) control-action pairs, say (xt , ut ), of the
system. It may also be necessary to append the pairs (xt , ut )
of all the subsystems. The expected control cost associated
with taking action while in some state does not change with
time. This allows for a consistent definition of Md . It may
be noted that there may be other ways to define an associated
MDP.
To show that the above extension is viable, we repeated
Experiments 1 and 2 with negative of the one-stage control
cost as the reward. The results of the modified experiments
are very similar to the original ones. Due to constraints in
space, we only present Fig. 4 associated with the modification of Experiment 1.
V. C ONCLUSIONS
This paper considered the problem of scheduling the
sensor-to-controller communication in a networked control
system, consisting of a multitude of independent control
subsystems, in the presence of scarce communication resources. For this reason, we developed D EEP CAS, i.e., a
reinforcement learning-based control-aware scheduling algorithm. This algorithm is model-free and scalable, and
it outperforms scheduling heuristics tailored for feedback
control applications. Specifically, we compared our algorithm
with periodic schedules. Also, we briefly discussed how
D EEP CAS could be extended to a networked control system,
100
80
60
40
20
0
10
20
30
40
50
Epochs
Fig. 4.
The convergence of the empirical average control loss for
D EEP CAS governing a networked system having three subsystems and one
communication channel (reward as −J).
containing coupled subsystems.
As stated earlier, this paper does not address the problem
associated with overheads. An exciting future direction could
be the development of sophisticated reinforcement learning
algorithm which can reduce overhead. Addressing the aforementioned issues may lead to the associated problem of large
discrete action spaces. The algorithms thus developed would
need to take this into account. Lastly, it is also interesting to
consider imperfect communication scenarios.
R EFERENCES
[1] P. Park, S. C. Ergen, C. Fischione, C. Lu, and K. H. Johansson,
“Wireless network design for control systems: a survey,” IEEE Communications Surveys & Tutorials, 2018.
[2] H. Rehbinder and M. Sanfridson, “Scheduling of a limited communication channel for optimal control,” Automatica, vol. 40, no. 3, pp.
491–500, March 2004.
[3] D. Hristu-Varsakelis and L. Zhang, “LQG control of networked control
systems,” International Journal of Control, vol. 81, no. 8, pp. 1266–
1280, 2008.
[4] L. Shi, P. Cheng, and J. Chen, “Optimal periodic sensor scheduling
with limited resources,” IEEE Transactions on Automatic Control,
vol. 56, no. 9, pp. 2190–2195, 2011.
[5] L. Orihuela, A. Barreiro, F. Gómez-Estern, and F. R. Rubio, “Periodicity of Kalman-based scheduled filters,” IEEE Transactions on
Automatic Control, vol. 50, no. 10, pp. 2672–2676, 2014.
[6] L. Zhao, W. Zhang, J. Hu, A. Abate, and C. J. Tomlin, “On the optimal
solutions of the infinite-horizon linear sensor scheduling problem,”
IEEE Transactions on Automatic Control, vol. 59, no. 10, pp. 2825–
2830, March 2014.
[7] Y. Mo, E. Garone, and B. Sinopoli, “On infinite-horizon sensor
scheduling,” Systems & Control Letters, vol. 67, pp. 65–70, May 2014.
[8] V. Mnih, K. Kavukcuoglu, D. Silver, A. Graves, I. Antonoglou,
D. Wierstra, and M. Riedmiller, “Playing atari with deep reinforcement
learning,” in NIPS Deep Learning Workshop, 2013.
[9] B. Demirel, A. S. Leong, V. Gupta, and D. E. Quevedo, “Trade-offs
in stochastic event-triggered control,” arXiv:1708.02756, 2017.
[10] D. P. Bertsekas and J. N. Tsitsiklis, Neuro-Dynamic Programming.
Athena Scientific, 1996.
[11] D. P. Kingma and J. Ba, “Adam: A method for stochastic optimization,” in Proceeding of the 3rd International Conference for Learning
Representations, 2015.
[12] T. Charalambous, A. Ozcelikkale, M. Zanon, P. Falcone, and
H. Wymeersch, “On the resource allocation problem in wireless networked control systems,” in Proceedings of the 57th IEEE Conference
on on Decision and Control, 2017.
| 3cs.SY
|
arXiv:1509.04509v8 [math.GR] 23 Aug 2017
FINITE BANDS ARE FINITELY RELATED
IGOR DOLINKA
Abstract. We prove that every finite idempotent semigroup (band) is finitely
related, which means that the clone of its term operations (i.e. operations
induced by words) is determined by finitely many relations. This solves an
open problem posed by Peter Mayr in 2013.
1. Introduction
Let A = (A, F ) be an algebra, where F is a family of finitary operations on the
set A. As is well known, any term t(x1 , . . . , xn ) (of the same similarity type as A)
induces, by interpretation in A, an operation tA : An → A. Operations obtained
in this way are the term operations of A, and the collection of all term operations
of this algebra is denoted by Clo(A) and called the clone of A.
For an n-ary operation f on a set X (f : X n → X) and a k-ary relation ρ on
the same set (ρ ⊆ X k ) we say that f preserves ρ if for any a1 , . . . , ak ∈ X n (where
ai = (ai,1 , . . . , ai,n ) for 1 ≤ i ≤ k) such that (a1,j , . . . , ak,j ) ∈ ρ for all 1 ≤ j ≤ n
we have (f (a1 ), . . . , f (ak )) ∈ ρ; in other words, either ρ = ∅ or ρ is a subalgebra of
the kth direct power of the algebra (X, f ). For a family R of (finitary) relations on
X we denote by Pol(R) the set of all operations on X preserving all relations from
R – these are the polymorphisms of the relational structure (X, R). Conversely, if
O is a family of operations on X, the set of all relations preserved by all operations
from O is denoted by Inv(O). A foundational result in clone theory tells us that,
for finite A, Clo(A) = Pol(Inv(F )), and in this sense the clone of A is determined
by the collection of relations Inv(F ): an operation on A arises from a term if and
only if it preserves all the relations that are preserved by F .
The set of relations Inv(F ) is always infinite. However, it may happen that there
is in fact a finite subset R ⊆ Inv(F ) such that Clo(A) = Pol(R), so that the clone
of A is determined by a finite set of relations (which then can be reduced to a single
relation). In such a case we say that the algebra A is finitely related.
Finitely related algebras recently received a lot of attention in universal algebra
[8] and its applications in computer science because of their link, exhibited e.g.
by [2, 5], to other key algebraic properties pertinent to the algebraic approach in
studying the computation complexity of constraint satisfaction problems (CSP) [7].
See also [1, 3, 4, 16] for some recent developments and important results regarding
finitely related general algebras. For example, a major result of Aichinger et al. [2]
implies that any finite algebra having a Mal’cev term operation (including all finite
2010 Mathematics Subject Classification. Primary 20M07; Secondary 03C05, 08A40, 20M05.
Key words and phrases. Semigroup; Idempotent semigroup; Band; Finitely related algebra.
This research was supported by the Ministry of Education, Science, and Technological Development of the Republic of Serbia through the grant No.174019.
1
2
IGOR DOLINKA
groups and rings) is finitely related, a consequence of which is that there are only
countably many Mal’cev clones on any finite set.
Concerning the study of finitely related (finite) semigroups, the seminal paper
is the one of Davey et al. [9], where it was shown (among other things) that finite
semigroups that are either commutative or nilpotent enjoy the finitely related property. This paper was followed by an extensive study of Mayr [17], who exhibited
the first example of a non-finitely related finite semigroup (not too surprisingly, this
was the ‘infamous’ six-element Brandt monoid B21 , which seems to behave badly
with respect to almost any conceivable equational property of semigroup varieties).
Also, Mayr proved that any finite regular band (an idempotent semigroup satisfying the identity xyxzx ≈ xyzx) is finitely related. The question of whether all
finite bands are finitely related is left as an open problem (Problem 6.3); the same
question is mentioned following Problem 7.2 in [15]. It is exactly this problem that
we aim to address in the present paper; namely, we prove the following main result.
Theorem 1.1. Let S be a finite idempotent semigroup. Then S is finitely related.
Here is the brief outline of the paper. The next, preliminary section is divided
into three parts. First, we are going to invoke few criteria (from [9, 17]) for a finite
algebra to be finitely related. Along the way, we are going to introduce a handy
concept of an n-scheme of terms, and specialise all these concepts to semigroups
and words, respectively. Then we are going to review the lattice of all varieties of
bands (idempotent semigroups) and proceed to a full effective description of their
equational theories. Finally, we complete the second section by some auxiliary
results that will be used in the proof of the previous theorem, presented in the third
section. This proof uses induction on the ‘height’ of the variety that S generates
in the lattice of all band varieties, depicted in Fig. 1, taking the mentioned result
on regular bands as the induction basis. We first resolve the case when S generates
one of the irreducible varieties in that lattice (Theorem 3.1) and then demonstrate
how to derive Theorem 1.1 in its full generality from the irreducible case (Theorem
3.2).
2. Preliminaries
2.1. Term schemes and criteria for finitely related finite algebras. Let
f : An → A be an n-ary operation on the set A. For i, j ∈ n = {1, . . . , n}, i < j,
we define an operation fij : An → A (sometimes called an identification minor of
f ) by
fij (x1 , . . . , xn ) = f (x1 , . . . , xi−1 , xj , xi+1 , . . . , xj , . . . , xn );
in other words, fij is obtained from f by identifying the variable xi with xj . Similarly, if t = t(x1 , . . . , xn ) is a term of a given similarity type, then by t(ij) we denote
the term obtained from t by replacing each occurrence of xi in it by xj ; furthermore,
by convention we define t(ji) to be t(ij) .
As usual, we say that an operation f : An → A depends on its ith variable xi ,
i ∈ n, if there exist a1 , . . . , ai−1 , ai+1 , . . . , an , b, c ∈ A such that
f (a1 , . . . , ai−1 , b, ai+1 , . . . , an ) 6= f (a1 , . . . , ai−1 , c, ai+1 , . . . , an ).
For example, the identification minor fij does not depend on xi . In turn, as another
example, the ith projection operation fails to depend on any of its variables but xi .
FINITE BANDS ARE FINITELY RELATED
3
Now let V be a variety and assume
S = {tij : 1 ≤ i < j ≤ n}
is a family of terms over Xn = {x1 , . . . , xn } of the similarity type of V satisfying
the following conditions:
(D) For each A ∈ V, the term operation tA
ij (x1 , . . . , xn ) does not depend on the
variable xi .
(C1) For any four distinct 1 ≤ i, j, p, q ≤ m such that i < j and p < q, V satisfies
the identity
(pq)
tij ≈ t(ij)
pq .
(C2) For any three 1 ≤ i < j < k ≤ n, V satisfies the identities
(jk)
tij
(ik)
(jk)
≈ tjk ≈ tik .
The condition (D) is called dependency, while (C1) and (C2) are the consistency
conditions; the family S is called an n-scheme of terms for V. Bearing in mind
Definition 2.3 and Notation 2.7 from [9] it is an easy exercise to see that this is just
equivalent to the notion of an (n, n − 1)-scheme introduced in that paper.
Similarly, it is very easy to see that the following holds.
Lemma 2.1. Let V be an arbitrary variety and t(x1 , . . . , xn ) a term of the same
similarity type as V. The family of all identification minors of t,
{t(ij) : 1 ≤ i < j ≤ n},
is an n-scheme of terms for V.
Again following [9], we say that an n-scheme S = {tij : 1 ≤ i < j ≤ m} for V
comes from the term t if S is V-equivalent to the family of all identification minors
of t in the sense that V satisfies the identities
tij ≈ t(ij)
for all 1 ≤ i < j ≤ n.
The following characterisation is part of Theorem 2.9 from [9], see also [14, 17,
18, 19].
Theorem 2.2. Let A be a finite algebra, and let V be the variety generated by A.
The following are equivalent:
(1) A is finitely related.
(2) There exists n0 ≥ |A| such that for all n > n0 , every n-scheme of terms for
V comes from a term.
(3) There exists n0 ≥ |A| such that for all n > n0 , an operation f : An → A
is a term operation of A whenever all minors fij (i, j ∈ n, i < j) are term
operations of A.
Here we immediately invoke Remark 2.12 from [9] which provides an argument
that in checking if a finite algebra A satisfies condition (3) above, it can be assumed
that the operation f : An → A is essential, i.e. that it depends on all of its
variables. Therefore, we will effectively use the previous theorem in the form where
the condition (3) is replaced by
(3’) There exists n0 ≥ |A| such that for all n > n0 , an operation f : An → A
depending on all of its variables is a term operation of A whenever all
minors fij (i, j ∈ n, i < j) are term operations of A.
4
IGOR DOLINKA
Notice that for semigroups and semigroup varieties all definitions and results
mentioned above remain valid when we replace terms by words (i.e. elements of the
free semigroup Xn+ ), term operations by operations induced by words, etc., even
though, strictly speaking, words are not terms. However, it is true that every term
operation on a semigroup is induced by a word and vice versa. Therefore, it is
meaningful to define the notion of an n-scheme of words for a semigroup variety,
and the ‘semigroup version’ of Theorem 2.2 holds as well: a finite semigroup S is
finitely related if and only if every n-scheme of words for the variety generated by
S comes from a single word (provided n is large enough) if and only if the condition
(3’) holds with respect to operations induced by words. It was proved in [17] that
this is the case when S is a regular band, that is, a finite idempotent semigroup
satisfying xyxzx ≈ xyzx. The aim of this paper is to extend this to all finite bands
in an inductive manner, taking the result of [17] as a basis of the induction. Hence,
in the next subsection we need to gather some basic information about varieties of
bands and few auxiliary results describing their equational theories.
2.2. Varieties of bands and their equational theories. The variety of all
bands will be denoted by B. It is known that any semigroup variety containing B
(including B itself) is not generated by a finite semigroup [20], while every proper
subvariety of B is finitely generated (see [6, 10, 11]).
In what follows, we adopt the notation of [13] for certain operators acting on
words; we briefly recall it for completeness. For a word w over a (finite) alphabet
X, let c(w) denote the content of w, the set of all letters occurring in w. Further,
let s(w) denote the longest prefix of w containing all but one of the letters from
c(w) (so that |c(s(w))| = |c(w)| − 1 and s(w) is maximal with this property), while
σ(w) is the last letter to occur in w from the left (implying that s(w)σ(w) is the
shortest prefix of w with the same content as w). Dually, let e(w) be the longest
suffix of w containing all but one of the letters from c(w), and let ε(w) be the last
letter in w to occur from the right.
Define an operator b on words by induction on the size of their content such that
b(∅) = ∅ (here ∅ stands for the empty word) and
b(w) = bs(w)σ(w)ε(w)be(w)
(note the concatenation of word operators, where bs(w) means b(s(w)), etc.).
Theorem 2.3 (cf. Lemma 2.7 and Theorem 2.9 of [12]). Let X be an alphabet and
u, v ∈ X + . Then u ≈ v holds in B if and only if b(u) = b(v). In particular, for any
word w we have that the identity
w ≈ s(w)σ(w)ε(w)e(w)
holds in any band.
This immediately implies the following well-known fact (recorded, e.g., as Corollary 2.3 in [13]).
Corollary 2.4. Let u, v, w be words such that c(v) ⊆ c(u) = c(w). Then the identity
uvw ≈ uw holds in B.
Proof. Under the given conditions, s(uvw) = s(u) = s(uw) and σ(uvw) = σ(u) =
σ(uw), and, dually, e(uvw) = e(w) = e(uw) and ε(uvw) = ε(w) = ε(uw), so the
result follows by Theorem 2.3.
FINITE BANDS ARE FINITELY RELATED
5
sB
..
.
..
.
❅s A
❅s
A4 s
4
❅
❅
❅
❅
❅s
❅s
❅
❅
❅
❅
❅s
❅s B
B3 s
3
❅
❅
❅
❅
❅s
❅s
❅
❅
❅
❅
❅s
❅s A
A3 s
3
❅
❅
❅
❅
❅s
❅s
❅
❅
❅
❅
❅s
❅s B = RRB
B2 = LRB s
2
❅
❅
❅
❅
❅s
❅s
s
❅
❅
❅
❅
❅s
❅s A = RZ
A2 = LZ s
2
SL
❅
❅
❅s
T
Figure 1. The lattice of all varieties of bands
The description of the lattice L (B) of all subvarieties of B is today still considered as one of the most glaring success stories of the theory of semigroup varieties;
it was achieved independently by Biryukov [6], Fennemore [10], and Gerhard [11],
whereas a more ‘economical’ and coherent treatment of the subject was given later
in [13]. Figure 1 provides a diagram of this lattice: here SL, LZ and RZ are
respectively the varieties of semilattices, left zero and right zero bands.
Of particular importance are the two sequences of join- and meet-irreducible
varieties Am and Bm , m ≥ 2, as well as their duals Am and Bm – any proper
(i.e. finitely generated) band variety not contained in SL ∨ LZ ∨ RZ (the ‘bottom
cube’) is a join of a pair of these. In fact, we shall first prove that any finite band
generating one of the varieties Am , Bm is finitely related; by left-right duality, this
will extend to Am and Bm , and then we shall show how to use this fact to prove
finite relatedness for any finite band generating a proper subvariety of B. The
varieties LRB and RRB are the varieties of left regular and right regular bands
defined by identities xyx ≈ xy and xyx ≈ yx, respectively. Their join is the variety
of regular bands that is the subject of Theorem 6.2 of [17]. As we remarked earlier,
our approach will be inductive with respect to the chains formed by varieties Am ,
6
IGOR DOLINKA
Bm and their duals, with the latter result from [17] serving as a basis of that
induction.
For technical convenience in our main argument it will be useful to select and
fix finite bands Am , Bm , m ≥ 2 (as well as their dual semigroups Am and Bm ),
such that Am generates the variety Am and Bm generates Bm (For example, one
can choose A2 to be the two-element left zero band, B2 to be A2 with an identity
element adjoined, etc. Note that we can choose these bands so that |A2 | < |B2 | <
|A3 | < |B3 | < . . . holds.)
Our main task at this moment is to describe the equational theories of the
considered band varieties, following the approach laid out in [13]. To this end, we
introduce word functions hm and im for m ≥ 2 and their duals, hm , im , in the sense
that if w denotes the reverse of the word w we have tm (w) = tm (w) for t ∈ {h, i}:
• tm (∅) = ∅ for all m ≥ 2 and t ∈ {h, i};
• h2 (w) is the first letter of w from the left (the head of w);
• i2 (w) is the word obtained from w by retaining only the first occurrence
from the left of each letter (the initial part of w, also defined recursively by
i2 (w) = i2 s(w)σ(w));
• for m ≥ 3 and t ∈ {h, i} we set
tm (w) = tm s(w)σ(w)tm−1 (w).
The key feature of these functions is expressed in the following statement.
Theorem 2.5 ([13]). Let m ≥ 2 and let u, v be two words.
• Am satisfies u ≈ v if and only if hm (u) = hm (v).
• Bm satisfies u ≈ v if and only if im (u) = im (v).
Analogous equivalences hold for the dual varieties Am and Bm and functions hm
and im , respectively.
The next few properties will be used in our proofs.
Lemma 2.6.
(1) Let t ∈ {h, i}. If m ≥ 3 or tm = i2 then stm (w) = tm s(w)
and etm (w) = tm e(w) for any word w.
(2) Let t ∈ {h, i}. If m ≥ 4 or tm = i3 then
btm (w) = b(tm s(w)σ(w)ε(w)tm−1 e(w))
and
btm (w) = b(tm−1 s(w)σ(w)ε(w)tm e(w))
for any word w.
(3) Let t ∈ {h, i, h, i} and let u, v be any words. If m ≥ 2 then btm (u) = btm (v)
implies tm (u) = tm (v).
(4) Let t ∈ {h, i}. If m ≥ 3 then
tm (w) = tm−1 (w)ε(w)tm e(w)
for any word w.
Proof. The first part of (1) is just [13, Lemma 3.2(ii)], while the second part is dual
to the first one and follows from it, as etm (w) = etm (w) = stm (w) = tm s(w) =
tm (e(w)) = tm e(w). (2)–(4) are Lemma 3.3(iii),(v), Lemma 4.1 and Lemma 3.3(ii)
of [13], respectively, where (2) and (3) are reformulated in terms of the operator b,
bearing in mind Theorem 2.3.
FINITE BANDS ARE FINITELY RELATED
7
Lemma 2.7. Let X ∈ {A, B}. Assume that the variety Xm satisfies the identity
u ≈ v, where |c(u)|, |c(v)| ≥ 2. Then it also satisfies s(u) ≈ s(v).
Proof. Consider first the case when Xm = A2 . Since both u and v contain at least
two letters, we have h2 s(u) = h2 (u) = h2 (v) = h2 s(v), and the lemma follows.
Otherwise, if either Xm = B2 or m ≥ 3, let tm be the corresponding word function
in the sense of Theorem 2.5. By the given conditions we have tm (u) = tm (v), which
in turn implies stm (u) = stm (v). Then Lemma 2.6(1) tells us that tm s(u) = tm s(v)
(since we assumed that tm 6= h2 ). Another application of Theorem 2.5 yields that
Xm satisfies s(u) ≈ s(v).
2.3. Some auxiliary results. As Theorem 2.2 suggests, we will be concerned with
essential operations f : S n → S on a finite (idempotent) semigroup S such that all
of its minors fij are induced by words. In the next lemma we are looking at some
consequences of such a setting.
Lemma 2.8. Let S be a finite semigroup, and let f : S n → S be an operation
depending on all of its variables such that for any i, j ∈ n, i < j, there is a word
S
wij satisfying fij = wij
.
(1) {wij : 1 ≤ i < j ≤ n} is an n-scheme of words for the semigroup variety
generated by S.
(2) If the variety generated by S contains SL and n ≥ |S| + 4 then c(wij ) =
Xn \ {xi }.
Proof. (1) Easy, and largely analogous to Lemma 2.1, dealing with minors of operations instead of terms.
(2) Since f depends on all of its variables (and thus in particular on xk , k 6= i),
there exist a1 , . . . , ak−1 , ak+1 , . . . , an , b, c ∈ S such that
f (a1 , . . . , ak−1 , b, ak+1 , . . . , an ) 6= f (a1 , . . . , ak−1 , c, ak+1 , . . . , an ).
The pigeonhole principle ensures that there exist p, q ∈ n \ {i, j, k}, p < q, such that
S
depends on xk . However, by
ap = aq . Hence, just as in [17, Lemma 2.6], fpq = wpq
(ij)
(pq)
(1), S satisfies the identity wpq ≈ wij
that wij must contain xk , since k 6= i.
(ij)
(pq)
and so xk ∈ c(wpq ) = c(wij ), ensuring
In the following, n-schemes of words {wij : 1 ≤ i < j ≤ n} over Xn such that
c(wij ) = Xn \ {xi } will be called essential ; so, the above result states that essential
operations on finite semigroups whose varieties contain nontrivial semilattices with
all minors induced by words give rise to essential n-schemes, provided n is large
enough.
Lemma 2.9. Let {wij : 1 ≤ i < j ≤ n} be an essential n-scheme of words for a
semigroup variety V containing B2 (the variety of left regular bands), where n ≥ 5.
Then there exists a unique permutation π of n such that for any i < j,
i2 (wij ) = xα1 · · · xαn−1 ,
where the sequence π (ij) = (α1 , . . . , αn−1 ) is obtained from (1π, . . . , nπ) by replacing
i by j and then deleting the right one of the two occurrences of j. Furthermore, if the
given essential scheme comes from a word w then we must have i2 (w) = x1π · · · xnπ .
Proof. By the very definition of an (essential) n-scheme of words for a variety,
any scheme for a variety V is also a scheme for any of its subvarieties, and so
8
IGOR DOLINKA
is the case for the given scheme with respect to B2 . As already discussed, B2 is
generated by the 3-element band B2 (obtained by adjoining an identity element
to the 2-element left zero band), and by Lemma 6.1 of [17], B2 is finitely related
with degree at most 4. By [9, Lemma 2.6], there exists a unique operation f :
B2
for all 1 ≤ i < j ≤ n. To see that f depends
B2n → B2 such that fij = wij
B2
on all of its variables, fix k ∈ n and p, q ∈ n \ {k}, p < q. As fpq = wpq
and
xk ∈ c(wpq ), fpq depends on xk , so there exist a1 , . . . , ak−1 , ak+1 , . . . , an , b, c ∈
B2 such that fpq (a1 , . . . , ak−1 , b, ak+1 , . . . , an ) 6= fpq (a1 , . . . , ak−1 , c, ak+1 , . . . , an ).
This immediately implies that f depends on xk .
Hence, by [17, Lemma 6.1], f is induced by a word w such that c(w) = Xn . Now
it is routine to see that the permutation π ∈ Sn satisfying
i2 (w) = x1π · · · xnπ
meets all the requirements of the lemma. It is unique because if π ′ would be
another permutation with the required properties, then it would follow that the
given scheme (with respect to B2 ) also comes from the word w′ = x1π′ · · · xnπ′ ,
whence the uniqueness of f implies that (w′ )B2 = f . Therefore, B2 satisfies w′ ≈ w,
implying i2 (w′ ) = i2 (w) and so π ′ = π.
For an essential scheme of words satisfying the assumptions of the above lemma,
we will call π the associated permutation of the scheme.
We proceed with a technical lemma before we learn another important property
of essential n-schemes of words over irreducible band varieties.
Lemma 2.10. Let k ∈ n, and let w ∈ Xn+ be such that c(w) = Xn \ {xk } and
σ(w) = xl . Furthermore, let p, q ∈ n\{l} such that p < q. Then s(w)(pq) = s(w(pq) ).
Proof. We start by writing w in the form
w = s(w)xl u
(pq)
for some word u, implying w
= s(w)(pq) xl u(pq) . If q 6= k then c(w(pq) ) =
(pq)
Xn \{xk , xp } and c(s(w) ) = Xn \{xl , xk , xp }, which immediately gives s(w(pq) ) =
s(w)(pq) . The same conclusion follows if q = k upon noticing that in such a case we
have c(w(pq) ) = Xn \ {xp } and c(s(w)(pq) ) = Xn \ {xl , xp }.
Lemma 2.11. Let n ≥ 5, let S = {wij : 1 ≤ i < j ≤ n} be an essential n-scheme
of words for Xm , where X ∈ {A, B} and either m ≥ 3 or Xm = B2 . Let π be the
associated permutation of S (which exists by Lemma 2.9) and let l = nπ. Then
S ′ = {s(wij ) : 1 ≤ i < j ≤ n, l 6∈ {i, j}}
is an (n − 1)-scheme for Xm over variables Xn \ {xl }.
Proof. Note that if l 6∈ {i, j} then σ(wij ) = xl and so c(s(wij )) = Xn \ {xi , xl }.
Thus (D) holds.
Furthermore, if p < q are such that {p, q} ∩ {i, j, l} = ∅ then by Lemma 2.10 we
(ij)
(pq)
have s(wij )(pq) = s(wij ) and s(wpq )(ij) = s(wpq ). Further the assumption that
(pq)
(ij)
(pq)
(ij)
Xm satisfies wij ≈ wpq implies, by Lemma 2.7, the identity s(wij ) ≈ s(wpq ).
Hence, Xm satisfies s(wij )(pq) ≈ s(wpq )(ij) , and so S ′ satisfies (C1).
Now let i < j < p be such that l 6∈ {i, j, p}. Again, Lemma 2.10 implies
(jp)
(ip)
(jp)
that s(wij )(jp) = s(wij ), s(wjp )(ip) = s(wjp ) and s(wip )(jp) = s(wip ) (the
lemma was applied over the alphabet Xn \ {xi } in the first and the third case,
FINITE BANDS ARE FINITELY RELATED
9
while it was applied over Xn \ {xj } in the second case). Since, by assumption,
(jp)
(ip)
(jp)
Xm satisfies the identities wij ≈ wjp ≈ wip , it also satisfies the identities
(ip)
(jp)
(jp)
s(wij ) ≈ s(wjp ) ≈ s(wip ) by Lemma 2.7. We conclude that Xm satisfies
s(wij )(jp) ≈ s(wjp )(ip) ≈ s(wip )(jp) , hence (C2) holds for S ′ as well.
We are now ready and equipped to present our main arguments.
3. The main proofs
Theorem 3.1. For any m ≥ 2 and T ∈ {A, B}, the bands Tm and Tm are finitely
related.
Proof. We use induction on m. If m = 2, the result already follows from [17,
Theorem 6.2]. Hence fix m ≥ 3 and assume that the statement is true for values of
indices up to m − 1.
We are going to show that Tm is finitely related by verifying condition (3’) in
Theorem 2.2 with n ≥ n0 = max(|Tm | + 4, m + 3). So, under these assumptions,
n
let f : Tm
→ Tm be an operation that depends on all of its variables such that for
all i, j ∈ n, i < j, we have that the operation fij is induced by a word. Let us
Tm
. Since the variety Xm
select words wij ∈ Xn+ , 1 ≤ i < j ≤ n, such that fij = wij
generated by Tm contains SL, Lemma 2.8 tells us that c(wij ) = Xn \ {xi }, so that
S = {wij : 1 ≤ i < j ≤ n} is an essential n-scheme of words for Xm .
Since B2 is contained in Xm and n ≥ m+ 3 > 5, Lemma 2.9 ensures the existence
(and uniqueness) of the associated permutation π of the scheme S. Let us denote
k = (n − 1)π and l = nπ.
Now, since S is an n-scheme of words for Xm , it is also an n-scheme of words for
any of its subvarieties, and thus in particular for Xm−1 . This variety is generated
by the band Tm−1 which is finitely related by the inductive assumption. Hence,
Theorem 2.2 implies that S, considered as a scheme for Xm−1 , comes from a word,
n
say b
u. Equivalently, there is a word operation g : Tm−1 → Tm−1 such that
T
gij = wijm−1 holds for all 1 ≤ i < j ≤ n.
Similarly, by Lemma 2.11, the family of words S ′ = {s(wij ) : 1 ≤ i < j ≤ n, l 6∈
{i, j}} is an (n − 1)-scheme of words for Xm (and thus for Xm−1 ) over the set of
variables Xn \ {xl }. Again, by employing the inductive hypothesis (and bearing
in mind that n − 1 ≥ (m − 1) + 3 and n − 1 ≥ (|Tm | − 1) + 4 ≥ |Tm−1 | + 4), we
find a word e
u such that S ′ comes from e
u; in other words, there is a word operation
n−1
→ Tm−1 with hij = s(wij )Tm−1 for all i < j such that l 6∈ {i, j}.
h : Tm−1
Now define
u,
uxl b
w = s(wk′ l′ )xk e
where k ′ = min(k, l) and l′ = max(k, l). We are going to argue that f = wTm
whence Theorem 2.2 yields that Tm is finitely related.
Claim. If p, q ∈ n, p < q, are such that {p, q} ∩ {k, l} = ∅ then the identity
w(pq) ≈ wpq
holds in Xm (and so in Tm ).
Proof of Claim. We have
(pq)
u(pq) ,
u(pq) xl b
u(pq) = s(wk′ l′ )xk e
u(pq) xl b
w(pq) = (s(wk′ l′ ))(pq) xk e
(3.1)
10
IGOR DOLINKA
where the second equality follows by Lemma 2.10 using c(wk′ l′ ) = Xn \ {xk′ }.
(pq)
(k′ l′ )
Furthermore, by (C1), Xm satisfies wk′ l′ ≈ wpq , so by Lemma 2.7 it also satisfies
(pq)
(k′ l′ )
s(wk′ l′ ) ≈ s(wpq ). Since {p, q}∩{k, l} = ∅, the sequence π (pq) must have the form
(α1 , . . . , αn−3 , k, l) (where the subsequence (α1 , . . . , αn−3 ) is a certain permutation
of n \ {k, l, p}). Therefore, we may highlight the first occurrence from the left of
each letter from c(wpq ) in wpq by writing
wpq = xα1 u1 xα2 · · · xαn−3 un−3 xk un−2 xl v
for some (possibly empty) words u1 , . . . , un−2 , v. This yields
(k′ l′ )
′ ′
′ ′
(k l )
wpq
= xα1 u1 xα2 · · · xαn−3 un−3 xl′ un−2 xl′ v(k l ) ,
implying
′ ′
(k l )
) = xα1 u1 xα2 · · · xαn−3 un−3 = s2 (wpq ).
s(wpq
Bearing in mind (3.1), we deduce that
′ ′
(k l )
u(pq)
u(pq) xl b
u(pq) = s2 (wpq )xk e
u(pq) xl b
)xk e
w(pq) ≈ s(wpq
holds in Xm . By applying Theorem 2.5 and the recursion for tm twice, we get
u(pq)
u(pq) xl b
tm (w(pq) ) = tm s2 (wpq )xk e
u(pq) xl tm−1 s2 (wpq )xk e
u(pq)
u(pq) xl b
= tm s2 (wpq )xk e
= tm s2 (wpq )xk tm−1 s2 (wpq )xk e
u(pq) .
u(pq) xl tm−1 s2 (wpq )xk e
u(pq) xl b
However, by induction assumption on S ′ for Xm−1 we have that Xm−1 satisfies
e
u(pq) ≈ s(wpq ), and by induction assumption on S for Xm−1 we have that Xm−1 satisfies b
u(pq) ≈ wpq . We know that σ(wpq ) = xl , s(wpq ) = xα1 · · · xαn−3 un−3 xk un−2 ,
σs(wpq ) = xk , and s2 (wpq ) = xα1 · · · xαn−3 un−3 . Thus
u(pq) ≈ s2 (wpq )σs(wpq )s(wpq ) ≈ s(wpq )
s2 (wpq )xk e
and consequently
u(pq) ≈ s(wpq )σ(wpq )wpq ≈ wpq
u(pq) xl b
s2 (wpq )xk e
holds in Xm−1 (here we used the idempotent law, upon noticing that s2 (wpq )σs(wpq )
is a prefix of s(wpq ), while s(wpq )σ(wpq ) is a prefix of wpq ). Hence,
tm (w(pq) ) = tm s2 (wpq )xk tm−1 s(wpq )xl tm−1 (wpq )
= tm s(wpq )xl tm−1 (wpq ) = tm (wpq ).
Another application of Theorem 2.5 concludes the proof of the claim that w(pq) ≈
wpq holds in Xm .
n
Let now a = (a1 , . . . , an ) ∈ Tm
be arbitrary. As n ≥ |Tm | + 4 > |Tm | + 3, by the
pigeohole principle there are p, q ∈ n, p < q, such that ap = aq and {p, q} ∩ {k, l} =
∅. Thus
Tm
f (a) = fpq (a) = wpq
(a) = (w(pq) )Tm (a) = (wTm )pq (a) = wTm (a),
where the previous claim was used in the third equality above. Therefore, f = wTm ,
showing that Tm is finitely related.
The result for Tm follows by left-right duality or simply by the observation that
if a finite semigroup S is finitely related, so is its dual semigroup S. (Indeed, if
{uij : 1 ≤ i < j ≤ n} is an n-scheme of words for the variety V generated by S
FINITE BANDS ARE FINITELY RELATED
11
then it is a routine to show that {uij : 1 ≤ i < j ≤ n} is an n-scheme of words
for the variety V generated by S; so, if the latter scheme comes from a word u it
follows immediately that the former one comes from u. Now an appeal to Theorem
2.2 gives the required result.)
Theorem 3.2. For any m ≥ 3, the bands Am × Am , Am × Bm−1 , Bm−1 × Am ,
Bm × Bm , Bm × Am and Am × Bm are finitely related.
Remark 3.3. Note that this theorem does not follow automatically from the previous
one, as it was shown in [9, Example 6.3] that the finitely related property is in
general not preserved by direct products.
Proof. Generally, we are going to argue that a finite band of the form Tm × Ur is
finitely related, where T, U ∈ {A, B} and r ∈ {m − 1, m}, with combinations as in
the formulation; since the third case is dual to the second and sixth case to the fifth,
these two may be safely omitted by our previous left-right duality remarks. Note
that with these restrictions if Tm generates Xm and Ur generates Yr (X , Y ∈ {A, B})
then Yr is always a subvariety of Xm containing Xm−1 . Equivalently, Xm is a
subvariety of Yr+1 containing Yr . Also, B2 can be assumed to be a subvariety of
both Xm and Yr .
So, let n0 = max(|Tm ||Ur | + 4, m + 3) and assume that for some n ≥ n0 , f is an
n-ary term operation of Tm × Ur depending on all of its variables, with the property
that for all 1 ≤ i < j ≤ n, fij is induced by a word wij ∈ Xn+ .
n
n
Claim. There exist operations g : Tm
→ Tm and h : Ur → Ur such that
f ((a1 , b1 ), . . . , (an , bn )) = (g(a1 , . . . , an ), h(b1 , . . . , bn ))
for all a1 , . . . , an ∈ Tm and b1 , . . . , bn ∈ Ur , and, furthermore, for all 1 ≤ i < j ≤ n,
the operations gij and hij are induced by wij on Tm and Ur , respectively.
Proof of Claim. By Lemma 2.8(1), S = {wij : 1 ≤ i < j ≤ n} is an n-scheme
of words for the variety generated by Tm × Ur , and thus for each of the varieties
generated individually by Tm and Ur . Now by [9, Lemma 2.6] there are (unique)
Tm
n-ary operations g and h on Tm and Ur , respectively, such that gij = wij
and
Ur
for all 1 ≤ i < j ≤ n.
hij = wij
As n > |Tm ||Ur |, for arbitrary (a1 , b1 ), . . . , (an , bn ) ∈ Tm × Ur there are p, q ∈ n,
p < q, such that (ap , bp ) = (aq , bq ). Hence,
f ((a1 , b1 ), . . . , (an , bn )) = fpq ((a1 , b1 ), . . . , (an , bn ))
Tm ×Ur
((a1 , b1 ), . . . , (an , bn ))
= wpq
Tm
Ur
(a1 , . . . , an ), wpq
= wpq
(b1 , . . . , bn )
= (gpq (a1 , . . . , an ), hpq (b1 , . . . , bn ))
= (g(a1 , . . . , an ), h(b1 , . . . , bn )).
By the very construction of g and h, the claim follows.
By the choice of n0 and Theorem 3.1 (in fact, by n satisfying the assumptions
in its proof), both g and h are induced by words, say u and v. We claim that f
is induced on Tm × Ur by the word w = uv. We are going to prove that for all
1 ≤ i < j ≤ n, both Tm and Ur satisfy w(ij) ≈ wij . Similarly as in the final part of
12
IGOR DOLINKA
the proof of the previous theorem, this will suffice to establish the theorem, because
then for arbitrary (a1 , b1 ), . . . , (an , bn ) ∈ Tm × Ur the pigeonhole principle provides
p < q with (ap , bp ) = (aq , bq ), so that for c = ((a1 , b1 ), . . . , (an , bn )), a = (a1 , . . . , an )
and b = (b1 , . . . , bn ) we have
Tm
Ur
(a), wpq
(b))
f (c) = fpq (c) = (gpq (a), hpq (b)) = (wpq
= ((w(pq) )Tm (a), (w(pq) )Ur (b))
= (w(pq) )Tm ×Ur (c) = (wTm ×Ur )pq (c) = wTm ×Ur (c),
showing that f = wTm ×Ur .
Let us start by noting that the scheme S is essential (by Lemma 2.8(2)), which
immediately implies c(u) = c(v) = Xn , so s(w) = s(u), σ(w) = σ(u), ε(w) = ε(v)
and e(w) = e(v). This yields s(w(ij) ) = s(u(ij) ) and e(w(ij) ) = e(v(ij) ). Furthermore, i2 (w) = i2 (u), implying i2 (w(ij) ) = i2 (u(ij) ) = i2 (wij ) by Lemma 2.9
because Xm contains B2 . Thus σ(w(ij) ) = σ(u(ij) ) = σ(wij ) and, dually, ε(w(ij) ) =
ε(v(ij) ) = ε(wij ). Also, if tm is the word function corresponding to the variety Xm
(in the sense of Theorem 2.5), then we know, by construction of words u and v,
that Xm satisfies u(ij) ≈ wij — so that tm (u(ij) ) = tm (wij ) — while Yr satisfies
v(ij) ≈ wij . By assumptions made earlier in this proof, the latter identity holds in
Xm−1 , implying tm−1 (v(ij) ) = tm−1 (wij ).
Note that we have h2 (w(ij) ) = h2 (v(ij) ) since e(w) = e(v). So, if Xm = A3 we
deduce, by Lemma 2.6(1),
h3 (w(ij) ) = h3 s(u(ij) )σ(u(ij) )h2 (w(ij) )
= sh3 (u(ij) )σ(u(ij) )h2 (v(ij) )
= sh3 (wij )σ(wij )h2 (wij )
= h3 s(wij )σ(wij )h2 (wij ) = h3 (wij ).
On the other hand, if Xm ∈ {Ak : k ≥ 4} ∪ {Bk : k ≥ 3} then by items (1) and
(2) of Lemma 2.6 we obtain
i
h
btm (w(ij) ) = b tm s(u(ij) )σ(u(ij) )ε(v(ij) )tm−1 e(v(ij) )
h
i
= b stm (u(ij) )σ(u(ij) )ε(v(ij) )etm−1 (v(ij) )
= b stm (wij )σ(wij )ε(wij )etm−1 (wij )
= b tm s(wij )σ(wij )ε(wij )tm−1 e(wij ) = btm (wij ).
But then Lemma 2.6(3) implies that tm (w(ij) ) = tm (wij ), i.e. that Xm (and thus
Tm ) satisfies w(ij) ≈ wij .
The proof that Yr satisfies w(ij) ≈ wij is similar, albeit with slight differences.
Let now tr be the word function corresponding to Yr in the sense of Theorem
2.5. The fact that Xm (and so Yr ) satisfies u(ij) ≈ wij implies tr (u(ij) ) = tr (wij ).
Furthermore, [13, Lemma 3.5] tells us that tr−1 (u(ij) ) = tr−1 (wij ) holds as well,
provided r ≥ 3. In turn, Yr satisfies v(ij) ≈ wij , thus tr (v(ij) ) = tr (wij ).
Now we have three subcases to consider. First, let Yr = B2 (which can happen,
just as the next subcase, only if Xm = A3 ). Since c(u) = c(v) = Xn , we have
i2 (w(ij) ) = i2 (u(ij) v(ij) ) = i2 (v(ij) ). On the other hand, we have already concluded
FINITE BANDS ARE FINITELY RELATED
13
that Yr satisfies v(ij) ≈ wij , so i2 (v(ij) ) = i2 (wij ) yielding i2 (w(ij) ) = i2 (wij ), as
required. Our second subcase is Yr = A3 , when h2 (w(ij) ) = h2 (u(ij) ) because of
s(w) = s(u). By items (1) and (4) of Lemma 2.6 we have:
h3 (w(ij) ) = h2 (w(ij) )ε(v(ij) )h3 e(v(ij) )
= h2 (u(ij) )ε(v(ij) )eh3 (v(ij) )
= h2 (wij )ε(wij )eh3 (wij )
= h2 (wij )ε(wij )h3 e(wij ) = h3 (wij ).
Finally, let Yr ∈ {Ak : k ≥ 4} ∪ {Bk : k ≥ 3}. Then, by invoking parts (1) and
(2) of Lemma 2.6 once again, we deduce
h
i
btr (w(ij) ) = b tr−1 s(u(ij) )σ(u(ij) )ε(v(ij) )tr e(v(ij) )
i
h
= b str−1 (u(ij) )σ(u(ij) )ε(v(ij) )etr (v(ij) )
= b str−1 (wij )σ(wij )ε(wij )etr (wij )
= b tr−1 s(wij )σ(wij )ε(wij )tr e(wij ) = btr (wij ),
whence Lemma 2.6(3) implies that tr (w(ij) ) = tr (wij ).
Hence, both Xm and Yr (with restrictions on m, r as described at the beginning
of the proof) satisfy the identity w(ij) ≈ wij . As remarked earlier, this completes
the proof that f is induced by w and confirms the theorem.
The proof of Theorem 1.1 is now immediate: if S is a finite band then it generates
the same variety as one of the bands covered by [17, Theorem 6.2], Theorem 3.1
and Theorem 3.2. By [9, Theorem 2.11], S is finitely related.
Acknowledgements. The author is grateful to a thorough and perceptive referee
for a handful of comments which significantly improved the paper.
References
[1] E. Aichinger, ‘Constantive Mal’cev clones on finite sets are finitely related’, Proc. Amer.
Math. Soc. 138 (2010), 3501–3507.
[2] E. Aichinger, P. Mayr, and R. McKenzie, ‘On the number of finite algebraic structures’, J.
Eur. Math. Soc. 16 (2014), 1673–1686.
[3] L. Barto, ‘Finitely related algebras in congruence distributive varieties have near unanimity
terms’, Canad. J. Math. 65 (2013), 3–21.
[4] L. Barto, ‘Finitely related algebras in congruence modular varieties have few subpowers’, J.
Eur. Math. Soc. (to appear). Available online at:
http://www.karlin.mff.cuni.cz/∼barto/Articles/ValerioteConjecture.pdf
[5] J. Berman, P. Idziak, P. Marković, R. McKenzie, M. Valeriote, and R. Willard, ‘Varieties
with few subalgebras of powers’ Trans. Amer. Math. Soc. 362 (2010), 1445–1473.
[6] A. P. Biryukov, ‘Varieties of idempotent semigroups’, Algebra i Logika 9 (1970), 255–273 (in
Russian).
[7] A. Bulatov, P. Jeavons, and A. Krokhin, ‘Classifying the complexity of constraints using finite
algebras’, SIAM J. Comput. 34 (2005), 720–742.
[8] S. Burris and H. P. Sankappanavar, A Course in Universal Algebra, Graduate Texts in Mathematics (Springer-Verlag, New York, 1981).
[9] B. A. Davey, M. G. Jackson, J. G. Pitkethly, and Cs. Szabó, ‘Finite degree: algebras in general
and semigroups in particular’, Semigroup Forum 83 (2011), 89–110.
[10] C. F. Fennemore, ‘All varieties of bands. I, II’, Math. Nachr. 48 (1971), 237–252; ibid. 253–
262.
14
IGOR DOLINKA
[11] J. A. Gerhard, ‘The lattice of equational classes of idempotent semigroups’, J. Algebra 15
(1970), 195–224.
[12] J. A. Gerhard and M. Petrich, ‘Free bands and free ∗ -bands’, Glasgow Math. J. 28 (1986),
161–179.
[13] J. A. Gerhard and M. Petrich, ‘Varieties of bands revisited’, Proc. London Math. Soc. (3) 58
(1989), 323–350.
[14] S. V. Jablonskiı̆, ‘The structure of the upper neighbourhood for predicately describable classes
in Pk ’, Dokl. Akad. Nauk SSSR 218 (1974), 304–307 (Russian). English traslation: Sov. Math.
Dokl. 15 (1974), 1353–1356.
[15] M. Jackson (ed.), ‘General Algebra and Its Applications 2013: Problem Session’, Algebra
Univers. 74 (2015), 9–16.
[16] P. Marković, M. Maróti, and R. McKenzie, ‘Finitely related clones and algebras with cube
terms’, Order 29 (2012), 345–359.
[17] P. Mayr, ‘On finitely related semigroups’, Semigroup Forum 86 (2013), 613–633.
[18] B. A. Romov, ‘Local characterizations of Post algebras, I’, Kibernetika 5 (1976), 38–45.
[19] I. G. Rosenberg, Á. Szendrei, ‘Degrees of clones and relations’, Houston J. Math. 9 (1983),
545–580.
[20] O. Sapir, ‘The variety of idempotent semigroups is inherently non-finitely generated’ Semigroup Forum 71 (2005), 140–146.
Department of Mathematics and Informatics, University of Novi Sad, Trg Dositeja
Obradovića 4, 21101 Novi Sad, Serbia
E-mail address: [email protected]
| 4math.GR
|
arXiv:1210.2885v1 [math.CO] 10 Oct 2012
A rank computation problem related to the
HK function of trinomial hypersurfaces
Shyamashree Upadhyay
Department of Mathematics
Indian Institute of Technology, Guwahati
Assam-781039, INDIA
email:[email protected]
Abstract
In this article, I provide a solution to a rank computation problem related to the computation of the Hilbert-Kunz function for any
disjoint-term trinomial hypersurface, over any field of characteristic 2.
This rank computation problem was posed in [3]. The formula for the
Hilbert-Kunz function for disjoint-term trinomial hypersurfaces can
be deduced from the result(s) of this article, modulo a lot of tedious
notation.
Contents
1 Introduction
2
2 Stating the problem in a general way
2.1 Statement of Problem I . . . . . . . . . . . . . . . . . . . . . .
2.2 Statement of Problem II . . . . . . . . . . . . . . . . . . . . .
3
3
3
3 Structure of the string of Binomial coefficients
5
4 Solutions to Problems I and II
6
4.1 Solution to Problem I . . . . . . . . . . . . . . . . . . . . . . . 6
4.2 Solution to Problem II . . . . . . . . . . . . . . . . . . . . . . 11
1
5 Concluding remarks about rationality
1
13
Introduction
A ‘disjoint-term trinomial hypersurface’ is defined in §2 of [3]. In the last
section of [3], I gave an algorithm for computing the Hilbert-Kunz function
for any disjoint-term trinomial hypersurface in general, over any field of arbitrary positive characteristic. But the algorithm was given modulo a rank
computation problem for 3 types of systems of linear equations which were
given in tables 5, 6 and 8 of [3]. In this article, I provide a solution to this
rank computation problem over fields of characteristic 2. It will be nice if one
can provide a similar solution over fields of arbitrary positive characteristic
p.
The formula for the Hilbert-Kunz function for disjoint-term trinomial
hypersurfaces follows as a corollary to the solution of this rank computation
problem, but a lot of tedious notation is needed for deducing the formula.
Hence in this article, I am avoiding the work on the deduction of the HilbertKunz function from this.
In the article [3], I was suspecting that due to the weird combinatorial
pattern of the matrices in tables 5, 6 and 8, there can be examples of disjointterm trinomial hypersurfaces for which the corresponding Hilbert-Kunz multiplicity can be irrational. But my suspicion turns out to be incorrect (see
the papers [2] and [1] for a reasoning). However if we consider trinomial hypersurfaces which are defined by a polynomial not having disjoint terms in it,
then we will encounter a similar-looking (but larger and more complicated)
rank computation problem for those. And I suspect that the Hilbert-Kunz
multiplicity may become irrational for those hypersurfaces because of the
more complicated nature of the system of linear equations involved in it. In
fact, the solution to the rank computation problem given in this article is
also important for the next article in which I will consider trinomial hypersurfaces which are defined by a polynomial not having disjoint terms in it,
because something similar happens there.
2
2
Stating the problem in a general way
The following combinatorial fact is well known (called the Chu-Vandermonde
identity):
For any two natural numbers m and n and for any non-negative integer j,
the standard inner product of the two vectors ( m C0 , m C1 , . . . , m Cj ) and
( n Cj , n Cj−1 , . . . , n C0 ) equals m+n Cj where we declare that for any
positive integer M, M Cl = 0 if l > M.
It follows from the above fact and from the pattern of the matrices present
in tables 5, 6 and 8 of the article [3] that
• for the linear systems corresponding to the matrices in tables 5 and 8,
we need to solve the general combinatorial problem mentioned below
as Problem I and
• for the linear systems corresponding to the matrices in tables 6, we
need to solve the general combinatorial problem mentioned below as
Problem II.
It is worthwhile to mention here that in this article, we will be considering
systems of linear equations over fields of characteristic 2 only.
2.1
Statement of Problem I
Given any positive integer M and any non-negative integer j, what all values
of positive integers k and l solve the following system of (l + 1) many linear
equations in (k + 1) many unknowns given by AX = b where the coefficient
matrix A is the (l + 1) × (k + 1) matrix given below in table 1 and b is
the (l + 1) × (1) column vector (0, 0, . . . , 1)t . The lines along the southwest↔north-east direction (in table 1) indicate the continuation of the same
entry along that direction.
2.2
Statement of Problem II
Given any positive integer M and non-negative integer j, what all values of
positive integers k, l and q solve the following system of (l+q +1) many linear
equations in (k + 1) many unknowns given by AX = b where the coefficient
3
Table 1: The coefficient matrix A of Problem I
M
Cj+l+k
Cj+l+(k−1) · · · · · · · · · M Cj+l+1
M
Cj+l+(k−1)
M
M
M
Cj+l
Cj+(l−1)
..
.
M
Cj+1
Cj
M
matrix A is the (l + q + 1) × (k + 1) matrix given below in table 2 and b is
the (l + q + 1) × (1) column vector (0, 0, . . . , 1)t . In table 2,
Table 2: The coefficient matrix A of Problem II
♥1q
··· ··· ···
♥qk−1
♥kq
..
..
..
..
..
..
.
.
.
.
.
.
k−1
0
1
♥2
♥2
··· ··· ···
♥2
♥k2
♥01
♥11
··· ··· ···
♥1k−1
♥k1
M
M
M
M
Cj+l+k
Cj+l+(k−1) · · · · · · · · ·
Cj+l+1
Cj+l
M
M
Cj+l+(k−1)
Cj+(l−1)
..
.
♥0q
..
.
M
Cj+1
Cj
M
M = α + δ for some natural numbers α and δ (given to us).
For any 1 ≤ i ≤ q and 0 ≤ r ≤ k, ♥ri := the standard inner product
of the two vectors ( α C0 , α C1 , . . . , α Cj+k+l−r )
and ( δ Cj+k+l+i−r , . . . , δ Ci+1 , δ Ci ).
The lines along the south-west↔north-east direction indicate the
continuation of the same entry along that direction.
4
3
Structure of the string of Binomial coefficients
For providing solutions to both problems I and II, we first need to have an
account of the position of all odd entries in the string of binomial coefficients
of any given positive integer M starting from M C0 to M CM . This is given
as follows:
Let M = 2lm + 2lm−1 + · · · + 2l1 be the binary expansion of M where
lm > lm−1 > · · · > l1 are non-negative integers.
Let DM := the set of all possible (m + 1)-tuples (α0 , α1 , . . . , αm ) generated
out of the set {0, 2l1 , 2l2 , . . . , 2lm } which satisfy the following 3 properties
simultaneously:
• α0 = 1.
• α1 ≥ α2 ≥ · · · ≥ αm .
• If αi 6= 0 for some i ∈ {1, . . . , m}, then αi > αj for any j ∈ {i +
1, . . . , m}.
Clearly, the total number of elements in the set DM is 2m . Let us put an
order - on DM by declaring that
(α0 , α1 , . . . , αm ) - (α0 , α1 , . . . , αm )
if and only if
αi ≤ αi ∀i ∈ {0, 1, . . . , m}.
Observe that - is a total order on the set DM . The positions of the odd
entries in the string of binomial coefficients of M are indexed by elements of
the set DM ; and are arranged (in ascending order) according to the order on DM . This indexing is given by:
For any d = (α0 , α1 , . . . , αm ) ∈ DM , the position of the odd entry
corresponding to it in the string of binomial coefficients of M is Σm
i=0 αi .
m
Since the total number of elements in the set DM is 2 , we can denote the
(M )
(M )
(M )
(M ) (M )
(M )
elements of DM by d1 , d2 , . . . , d2m where d1 - d2 - . . . - d2m .
And let us denote the corresponding positions of the odd entries in the
string of binomial coefficients of M by
(M )
(M )
(M )
Σd1 , Σd2 , . . . , Σd2m .
5
Looking at the positions of all odd entries in the string of binomial coefficients
of the given positive integer M, we can deduce some important facts about
the position of all even entries in the string of binomial coefficients of M.
These facts will be very much useful in writing down solutions to both the
Problems I and II. These facts are as given below:
Let the binary expansion of M be as mentioned above. Then
1. the number of even entries between any two consecutive odd entries
in the continuous string of binomial coefficients of M is of the form
2lg − 2lg−1 − . . . − 2l1 − 1 for some g ∈ {1, . . . , m}.
2. If lg < lĝ , then a bunch of 2lg − 2lg−1 − . . . − 2l1 − 1 many even entries
appears on both right and left sides of the bunch of 2lĝ − 2lĝ−1 − . . . −
2l1 − 1 many even entries at equal distance from the central bunch.
3. Between any two consecutive bunches of 2lg − 2lg−1 − . . . − 2l1 − 1 many
even entries, there exists (2g − 1) many bunches of even entries such
that the number of even entries in each of these (2g − 1) many bunches
is different from 2lg − 2lg−1 − . . . − 2l1 − 1.
4
Solutions to Problems I and II
In subsection 4.1 below, the notation and terminology will remain the same
as in subsection 2.1. Similarly, in subsection 4.2 below, the notation and
terminology will remain the same as in subsection 2.2.
4.1
Solution to Problem I
Problem I can be restated in the following way:—
Given any positive integer M and any non-negative integer j, for what all
values of positive integers k and l does the string
M
Cj ,
M
Cj+1 , . . . , . . . ,
M
Cj+l+k
of consecutive binomial coefficients of M satisfy all the following 3
properties simultaneously:
•
M
Cj and
is even).
M
Cj+k+1 have different parity (that is, exactly one of them
6
•
M
Cj+t = M C(j+t)+q(k+1) for every t ∈ {1, . . . , k + 1} and for every
positive integer q such that (j + t) + q(k + 1) ≤ j + l + k. In other
words, the string of length k + 1 beginning from M Cj+1 and ending at
M
Cj+k+1 should be repeated until we reach M Cj+l+k (there can be a
truncated string of length k + 1 at the end).
• The string of length k + 1 beginning from M Cj+1 and ending at
M
Cj+k+1 should contain evenly many odd elements in it.
There are many possible values of positive integers k and l which do the job.
A list of all possible answers is given below in cases I and II.
Case I: When
M
Cj is odd.
(M )
Suppose that M Cj equals Σdi for some i ∈ {1, . . . , 2m }, then we provide
a solution to Problem I by considering different sub cases depending upon
M
M
M
the value ΣdM
i+1 − Σdi − 1 being 0 or > 0. Observe that Σdi+1 − Σdi − 1is
nothing but the total number of zeroes lying in between the positions ΣM
i+1
and ΣM
.
i
(M )
(M )
Sub case I.a: When Σdi+1 − Σdi − 1 = 0.
(M )
(M )
If there exists an even natural number s such that Σdi+s+1 − Σdi+s − 1 > 0,
then take the string M Cj+1, . . . , M Cj+k+1 of length (k + 1) to be the continuous string of binomial coefficients of M starting from position number
(M )
(M )
1 + Σdi
and ending at position number Σdi+s + L (inclusive of the beginning and end points), where L is some natural number such that 0 <
(M )
(M )
L ≤ Σdi+s+1 − Σdi+s − 1. Hence the natural number k is given by k =
(M )
(M )
Σdi+s + L − Σdi − 1 where L and s are as mentioned above.
To determine the possible values of l in this sub case, look at the entry in
(M )
position number Σdi+s +L+1. If it is even, then take l = 1. If it is odd, then
look at the number of odd entries in the string of binomial coefficients of M
(M )
that come in continuum starting from position number 1 + Σdi (including
(M )
the odd entry at this position). Let pj denote this number. Similarly, look
at the number of odd entries in the string of binomial coefficients of M that
(M )
come in continuum starting from position number 1 + L + Σdi+s (including
(M )
the odd entry at this position). Let qj denote this number. Tale l to be
(M ) (M )
any natural number such that l ≤ 1 + min{pj , qj }.
7
Remark 4.1.1. An even natural number s as mentioned above in this sub
(M )
case may not exist for some M and for some position number Σdi . In that
situation, this sub case is invalid.
(M )
(M )
Sub case I.b: When Σdi+1 − Σdi − 1 > 0.
I will now list down the various possibilities under this sub case:
Either
(M )
(M )
Take k to be any natural number such that k + 1 ≤ Σdi+1 − Σdi − 1.
And take the string M Cj+1 , . . . , M Cj+k+1 of length (k + 1) to be the
continuous string of binomial coefficients of M starting from position
(M )
(M )
number 1 + Σdi and ending at position number 1 + k + Σdi . And take
(M )
(M )
l to be any natural number such that l ≤ Σdi+1 − Σdi − (k + 1).
Or
For computing the possible values of the natural number k, proceed
similarly as in sub case (I.a). And to determine the possible values of l,
(M )
look at the entry in position number Σdi+s + L + 1. If it is odd, then take
l = 1. If it is even, then look at the number of even entries in the string of
binomial coefficients of M that come in continuum starting from position
(M )
(M )
number 1 + Σdi (including the even entry at this position). Let pj
denote this number. Similarly, look at the number of even entries in the
string of binomial coefficients of M that come in continuum starting from
(M )
position number 1 + L + Σdi+s (including the even entry at this position).
(M )
Let qj denote this number. Tale l to be any natural number such that
(M ) (M )
l ≤ 1 + min{pj , qj }.
Case II: When M Cj is even.
The position of M Cj in the string of binomial coefficients of M (starting
from M C0 to M CM , that is, from left to right) is (j + 1)-th.
(M )
Sub case II.a: When j + 2 = Σdi for some i ∈ {1, . . . , 2m } and there exists
an odd natural number u such that all the entries at the position numbers
(M )
(M )
(M )
Σdi , 1 + Σdi , . . . , u + Σdi are odd and the entry at position number
(M )
u + 1 + Σdi is even.
I will now list down the various possibilities under this sub case:
Either
8
Take k to be any odd natural number such that k + 1 ≤ u + 1. And take
the string M Cj+1 , . . . , M Cj+k+1 of length (k + 1) to be the continuous
(M )
string of binomial coefficients of M starting from position number Σdi
(M )
and ending at position number k + Σdi . Take l to be any natural number
such that l ≤ (u + 1) − k.
Or
Take the string Cj+1 , . . . , Cj+k+1 of length (k + 1) to be the continuous
string of binomial coefficients of M starting from position number
(M )
(M )
j + 2(= Σdi ) and ending at position number Σdi+s , where s is any odd
natural number such that i + s ≤ 2m . [Remark: Such a odd natural number
s may not exist always. If it does not exist, then this is an invalid
possibility.] And to determine the possible values of l, look at the entry in
(M )
position number Σdi+s + 1. If it is even, then take l = 1. If it is odd, then
look at the number of odd entries in the string of binomial coefficients of M
(M )
that come in continuum starting from position number Σdi (including
(M )
the odd entry at this position). Let pj denote this number. Similarly,
look at the number of odd entries in the string of binomial coefficients of M
(M )
that come in continuum starting from position number 1 + Σdi+s (including
(M )
the odd entry at this position). Let qj denote this number. Tale l to be
(M ) (M )
any natural number such that l ≤ 1 + min{pj , qj }.
M
M
(M )
(M )
Sub case II.b: When j + 2 = Σdi for some i ∈ {1, . . . , 2m } and Σdi+1 −
(M )
Σdi − 1 > 0.
Take the string M Cj+1 , . . . , M Cj+k+1 of length (k + 1) to be the continuous
string of binomial coefficients of M starting from position number j + 2(=
(M )
(M )
Σdi ) and ending at position number Σdi+s , where s is any odd natural
number such that i + s ≤ 2m . [Remark: Such a odd natural number s may
not exist always. If it does not exist, then this is an invalid possibility.] In
this sub case, take l = 1.
(M )
Sub case II.c: When j + 2 6= Σdi for any i ∈ {1, . . . , 2m }.
(M )
Clearly there exists i ∈ {1, . . . , 2m } such that j + 2 < Σdi . Look at the
smallest such i, call it i0 . Take the string M Cj+1, . . . , M Cj+k+1 of length
(k + 1) to be the continuous string of binomial coefficients of M starting
(M )
from position number j + 2 and ending at position number Σdi0 +s , where s
is any odd natural number such that i0 + s ≤ 2m . [Remark: Such a odd
9
natural number s may not exist always. If it does not exist, then this is an
invalid possibility.]
And to determine the possible values of l, look at the entry in position
(M )
number 1 + Σdi0 +s . If it is odd, then take l = 1. If it is even, then look at
the number of even entries in the string of binomial coefficients of M that
come in continuum starting from position number j + 2 (including the even
(M )
entry at this position). Let pj denote this number. Similarly, look at the
number of even entries in the string of binomial coefficients of M that come
(M )
in continuum starting from position number 1 + Σdi0 +s (including the even
(M )
entry at this position). Let qj denote this number. Take l to be any
(M ) (M )
natural number such that l ≤ 1 + min{pj , qj }.
There is another non-trivial possibility under this sub case, which is the following:
Let M = 2Nr + 2Nr−1 + · · · + 2N1 be the binary expansion of M where
Nr > Nr−1 > · · · > N1 are non-negative integers. Let Ns0 be the least
element of the set {Nr , Nr−1 , · · · , N1 } which is ≥ 2. Let
{Nst , Nst−1 , · · · , Ns1 } be the subset of the set {Nr , Nr−1 , · · · , N1 } defined by
{Nb |1 ≤ b ≤ r − 1 and N1+b − Nb > 1}. It may happen in some cases that
Ns0 = Ns1 .
Given any d ∈ {1, . . . , t}, let Ud denote the set of all possible sums
generated from elements of the set {2Nr , 2Nr−1 , . . . , 2N1+sd } (where each
element of this set can appear atmost once in any such sum) which are
strictly less than 2Nr + 2Nr−1 + · · · + 2N1+sd . Given any d ∈ {1, . . . , t} and
any x(d) ∈ Ud , suppose M Cj is at the (1 + x(d) + 21+Nsd )-th position in the
string of binomial coefficients of M counting from the end (that is, from the
right to left). In this situation, the following solutions are possible:
(i) Take k + 1 to be equal to 2Nsd . And to determine the possible values of
l, look at the number of even entries in the string of binomial coefficients of
M that come in continuum after M Cj (i.e., excluding M Cj and to the right
(M )
of it). Let pj denote this number. Similarly, look at the number of even
entries in the string of binomial coefficients of M that come in continuum
after M Cj+2(1+Nsd ) (i.e., excluding M Cj+2(1+Nsd ) and to the right of it). Let
(M )
denote this number. Tale l to be any natural number such that
(M ) (M )
l ≤ 1 + 2Nsd + min{pj , qj }.
(ii) If d > 1 and there exists integer(s) z such that Nsd > z > Nsd−1 and
z ∈ {Nr , Nr−1 , · · · > N1 }, then for any such z, take k + 1 to be equal to 2z .
qj
10
And to determine the possible values of l, look at the number of even
entries in the string of binomial coefficients of M that come in continuum
(M )
after M Cj (i.e., excluding M Cj and to the right of it). Let pj denote this
number. Similarly, look at the number of even entries in the string of
binomial coefficients of M that come in continuum after M Cj+2(1+Nsd ) (i.e.,
(M )
excluding M Cj+2(1+Nsd ) and to the right of it). Let qj denote this
number. Tale l to be any natural number such that
(M ) (M )
l ≤ 1 + 2z (2(Nsd −z+1) − 1) + min{pj , qj }.
(iii) If d = 1 and Ns1 > Ns0 , then there always exists integer(s) z such that
Ns1 > z ≥ Ns0 and z ∈ {Nr , Nr−1 , · · · > N1 }. For any such z, do similarly
as in (ii) above replacing d there by 1.
4.2
Solution to Problem II
Problem II can be restated in the following way:—
Given any two positive integers α and δ and any non-negative integer j, for
what all values of positive integers k, l and q does the string
M
Cj ,
M
Cj+1 , . . . , . . . ,
M
Cj+l+k
(where M = α + δ) of consecutive binomial coefficients of M becomes a
solution to Problem I as mentioned above and the following properties are
also satisfied (simultaneously):
•
•
•
M
Cj+k+l+1 + M Cj+k+l + · · · + M Cj+l+1 and
· · · + α Cj+l+1 should have the same parity.
α
Cj+k+l+1 +
α
Cj+k+l +
M
Cj+k+l+2 + M Cj+k+l+1 +· · ·+ M Cj+l+2 and α Cj+k+l+2 + α Cj+k+l+1 +
· · · + α Cj+l+2 differ in parity if and only if δ C1 ( α Cj+k+l+1 + α Cj+k+l +
· · · + α Cj+l+1) is odd.
M
Cj+k+l+3 + M Cj+k+l+2 +· · ·+ M Cj+l+3 and α Cj+k+l+3 + α Cj+k+l+2 +
· · ·+ α Cj+l+3 differ in parity if and only if δ C1 ( α Cj+k+l+2 + α Cj+k+l+1 +
· · · + α Cj+l+2) + δ C2 ( α Cj+k+l+1 + α Cj+k+l + · · · + α Cj+l+1) is odd.
• and so on till · · · · · ·
•
M
Cj+k+l+q + M Cj+k+l+q−1+· · ·+ M Cj+l+q and α Cj+k+l+q + α Cj+k+l+q−1+
q−1 δ
Cp ( α Cj+k+l+q−p +
· · · + α Cj+l+q differ in parity if and only if Σp=1
α
α
Cj+k+l+q−1−p + · · · + Cj+l+q−p ) is odd.
11
Given any positive integers α, δ and non-negative integer j, we can proceed
similarly as in subsection 4.1 and find the possible values of the positive
integers k and l for which the string
M
Cj ,
M
Cj+1 , . . . , . . . ,
M
Cj+l+k
of consecutive binomial coefficients of M becomes a solution to Problem I.
But these values of positive integers k and l should also satisfy the additional
q-many properties (about parities of sums of strings of length (k + 1) of the
binomial coefficients of M and α) as mentioned above.
For any two natural numbers Z and y, let sy (Z) denote the sum of the
first y-many (starting from Z C0 ) binomial coefficients of Z. It is an easy
exercise to check that for any such Z and y, sy (Z) = Z−1 Cy−1 . Since we
are working over field of characteristic 2, it is easy to see that M Cj+k+l+1 +
M
Cj+k+l + · · · + M Cj+l+1 equals sj+k+l+1(M) + sj+l (M) which in turn equals
M −1
Cj+k+l + M −1 Cj+l−1 . Similarly one can say that α Cj+k+l+1 + α Cj+k+l +
· · · + α Cj+l+1 equals α−1 Cj+k+l + α−1 Cj+l−1. Therefore the condition that
M
Cj+k+l+1 + M Cj+k+l +· · ·+ M Cj+l+1 and α Cj+k+l+1 + α Cj+k+l +· · ·+ α Cj+l+1
should have the same parity translates into the condition that
α+δ−1
Cj+k+l + α+δ−1 Cj+l−1 and α−1 Cj+k+l +
have the same parity. · · · · · · · · · condition (∗)
α−1
Cj+l−1 should
The other (q − 1)-many conditions (about parity of sums of strings of length
(k + 1)) imply that the positive integer q should be such that for every
a ∈ {2, . . . , q}, the sums M Cj+k+l+a + M Cj+k+l+a−1 + · · · + M Cj+l+a and
α
Cj+k+l+a + α Cj+k+l+a−1 + · · · + α Cj+l+a differ in parity if and only if the
following condition holds:
If p1 < · · · < pf is the collection of all elements of the set
{p|p ∈ {1, . . . , a − 1} and α Cj+k+l+a−p + α Cj+k+l+a−1−p + · · · +
α
Cj+l+a−p is odd}, then exactly odd many elements of the set
{ δ Cp1 , . . . , δ Cpf } should be odd. And this should hold true for
every a ∈ {2, . . . , q}.· · · · · · · · · condition (∗∗)
We therefore need to determine when the value of the string sum M Cj+k+l+a+
M
Cj+k+l + · · · + M Cj+l+a becomes odd and when it is even as the integer a
ranges over the set {1, . . . , q}. And similarly for the string sums α Cj+k+l+a +
α
Cj+k+l+a−1 + · · · + α Cj+l+a as the integer a ranges over the set {1, . . . , q}.
But this problem is similar to solving problem I (or a problem equivalent to
12
problem I where the column vector b is replaced by a suitable vector which is
either (1, 0, . . . , 0)t or (0, 1, . . . , 1)t ) for both the integers M and α, assuming
(to begin with) that the string sums M Cj+k+l+1 + M Cj+k+l + · · · + M Cj+l+1
and α Cj+k+l+1 + α Cj+k+l + · · · + α Cj+l+1 have the same parity. Recall that
while solving problem I considering various sub cases, we got solutions for
all possible values of the integer l. Speaking more precisely, we got all possible values of ‘upper bounds’ of the natural number l. These upper bounds
are nothing but the number of maximum possible strings (in continuum) of
length (k + 1) for which the parity of the string sum remains the same. That
means, as soon as the value of l exceeds this ‘upper bound’, the string sum
changes parity. Hence the positive integer q should be such that the various
upper bounds of the values of l under consideration (for α and M both)
should tally with conditions (∗) and (∗∗) mentioned above.
5
Concluding remarks about rationality
Looking at the rhythm of the parity of sums of continuous strings of binomial
coefficients of any given positive integer M (as described in subsections 4.1
and 4.2 above), one can depict that over fields of characteristic 2, the HilbertKunz multiplicity in this case of ‘disjoint-term trinomial hypersurfaces’ will
turn out to be rational. In fact, it will depend upon the positions of the odd
and even entries in the entire string of binomial coefficients of M, a precise
account of which is given in section 3. I hope similar thing will hold true
over fields of arbitrary positive characteristic p.
For any hypersurface defined by polynomials having ‘disjoint terms’ in
it (not just trinomial hypersurfaces), it is known that the corresponding
Hilbert-Kunz multiplicity will be rational [see [2] and [1] for a reasoning].
The ‘phis in the papers of [2] and [1] attached to ‘disjoint-term trinomials
(or more generally to any sum of monomials that are pairwise prime) are ‘pfractals. As a consequence, the Hilbert-Kunz series will be a rational function
and the corresponding HK multiplicity will be in Q.
But for trinomial hypersurfaces NOT having ‘disjoint-terms’ in it, the
situation becomes more interesting. There we need to solve ‘similar’ rank
computation problems related to larger and more complicated systems of
linear equations [in fact, there we can have infinitely many linear equations
inside a single system]. But the solution to the rank computation problem
mentioned in this article is like providing a basement for the work in the
13
more general case. Due to the more complicated nature of the systems in
that case, I suspect that the Hilbert-Kunz multiplicity can become irrational
there.
References
[1] Paul Monsky, Pedro Teixeira, p-Fractals and power series-I. Some 2
variable results, Journal of Algebra, 280 (2004), 505–536.
[2] Paul Monsky, Pedro Teixeira, p-Fractals and power series-II. Some applications to Hilbert-Kunz theory, Journal of Algebra, 304 (2006), 237–
255.
[3] Shyamashree Upadhyay, An algorithm for the HK function for disjointterm trinomial hypersurfaces, arXiv:1204.5417, [math.CO]
14
| 0math.AC
|
Hypotheses tests in boundary regression
models
Holger Drees, Natalie Neumeyer and Leonie Selk∗
arXiv:1408.3979v2 [stat.ME] 11 Oct 2016
University of Hamburg, Department of Mathematics
Bundesstrasse 55, 20146 Hamburg, Germany
October 12, 2016
Abstract
Consider a nonparametric regression model with one-sided errors and regression
function in a general Hölder class. We estimate the regression function via minimization of the local integral of a polynomial approximation. We show uniform rates of
convergence for the simple regression estimator as well as for a smooth version. These
rates carry over to mean regression models with a symmetric and bounded error distribution. In such a setting, one obtains faster rates for irregular error distributions
concentrating sufficient mass near the endpoints than for the usual regular distribu√
tions. The results are applied to prove asymptotic n-equivalence of a residual-based
(sequential) empirical distribution function to the (sequential) empirical distribution
function of unobserved errors in the case of irregular error distributions. This result is
remarkably different from corresponding results in mean regression with regular errors.
It can readily be applied to develop goodness-of-fit tests for the error distribution. We
present some examples and investigate the small sample performance in a simulation
study. We further discuss asymptotically distribution-free hypotheses tests for independence of the error distribution from the points of measurement and for monotonicity
of the boundary function as well.
AMS 2010 Classification: Primary 62G08; Secondary 62G10, 62G30, 62G32
Keywords and Phrases: goodness-of-fit testing, irregular error distribution, one-sided
errors, residual empirical distribution function, uniform rates of convergence
1
Introduction
We consider boundary regression models of the form
Yi = g(xi ) + εi ,
1
i = 1, . . . , n,
with negative errors εi whose survival function 1−F (y) behaves like a multiple of |y|α for some
α > 0 near the origin. Such models naturally arise in image analysis, analysis of auctions
and records, or in extreme value analysis with covariates. For such a boundary regression
model with multivariate random covariates and twice differentiable regression function, Hall
and Van Keilegom (2009) establish a minimax rate for estimation of g(x) (for fixed x) under
quadratic loss and determine pointwise asymptotic distributions of an estimator which is
defined as a solution of a linear optimization problem (cf. Remark 2.6). Relatedly, Müller
and Wefelmeyer (2010) consider a mean regression model with (unknown) symmetric support
of the error distribution and Hölder continuous regression function. They discuss pointwise
MSE rates for estimators of the regression function that are defined as the average of local
maxima and local minima. Meister and Reiß (2013) consider a regression model with known
bounded support of the errors. They show asymptotic equivalence in the strong LeCam sense
to a continuous-time Poisson point process model when the error density has a jump at the
endpoint of its support. For a regression model with error distribution that is one-sided and
regularly varying at 0 with index α > 0, Jirak et al. (2014) suggest an estimator for the
boundary regression function which adapts simultaneously to the unknown smoothness of
the regression function and to the unknown extreme value index α. Reiß and Selk (2016+)
construct efficient and unbiased estimators of linear functionals of the regression function in
the case of exponentially distributed errors as well as in the limiting Poisson point process
experiment by Meister and Reiß (2013).
Closely related to regression estimation in models with one-sided errors is the estimation
of a boundary function g based on a sample from (X, Y ) with support {(x, y) ∈ [0, 1]×[0, ∞] |
y ≤ g(x)}. For such models, Härdle et al. (1995) and Hall et al. (1998) proved minimax
rates both for g(x) and for the L1 -distance between g and its estimator. Moreover, they
showed that an approach using local polynomial approximations of g yields this optimal
rate. Explicit estimators in terms of higher order moments were proposed and analyzed
by Girard and Jacob (2008) and Girard et al. (2013). Daouia et al. (2016) consider spline
estimation of a support frontier curve and obtain uniform rates of convergence.
The aim of the paper is to develop tests for model assumptions in boundary regression
models. In particular we will suggest asymptotically distribution-free tests for
• parametric classes of error distributions (goodness-of-fit)
• independence of the error distribution from the points of measurement
• monotonicity of the boundary function.
The test statistics are based on (sequential) empirical processes of residuals. To investigate
these, we need uniform rates of convergence for the regression estimator, which are of interest
on its own. To our knowledge, uniform rates so far have only been shown by Daouia et al.
(2016) who do not obtain optimal rates. Our results can also be applied to mean regression
2
models with bounded symmetric error distribution. For regression functions g in a Hölder
class of order β, we obtain the rate ((log n)/n)β/(αβ+1) . Thus, for tail index α ∈ (0, 2) of the
error distribution, the rate is faster than the typical rate one has in mean regression models
with regular errors. For pointwise and Lp -rates of convergence, it has been known in the
literature that faster rates are possible for nonparametric regression estimation in models
with irregular error distribution, see e.g. Gijbels and Peng (2000), Hall and Van Keilegom
(2009), or Müller and Wefelmeyer (2010).
The uniform rate of convergence for the regression estimator enables us to derive asymptotic expansions for residual-based empirical distribution functions and to prove weak convergence of the residual-based (sequential) empirical distribution function. We state conditions
under which the influence of the regression estimation is negligible such that the same results
are obtained as in the case of observable errors. We apply the results to derive goodnessof-fit tests for parametric classes of error distributions. Asymptotic properties of residual
empirical distribution functions in mean regression models were investigated by Akritas and
Van Keilegom (2001), among others. As the regression estimation strongly influences the
asymptotic behavior of the empirical distribution function in these regular models, asymptotic distributions of goodness-of-fit test statistics are involved, and typically bootstrap is
applied to obtain critical values, see Neumeyer et al. (2006). In contrast, in the present
situation with an irregular error distribution, standard critical values can be used.
In nonparametric frontier models, Wilson (2003) discusses several possible tests for assumptions of independence, for instance independence between input levels and output inefficiency. Those assumptions are needed to prove validity of bootstrap procedures and are
thus crucial in applications, but they may be violated; see Simar and Wilson (1998). Wilson (2003) points out the analogy to tests for independence between errors and covariates
in regression models, but no asymptotic distributions are derived. Tests for independence
in nonparametric mean and quantile regression models that are similar to the test we will
consider are suggested by Einmahl and Van Keilegom (2008) and Birke et al. (2016+).
There is an extensive literature on regression with one-sided error distributions and similar models (in particular production frontier models) which assume monotonicity of the
boundary function, see Gijbels et al. (1999), the literature cited therein and the monotone
nonparametric maximum likelihood estimator in Reiß and Selk (2016+). Monotonicity of
a production frontier function in each component is given under the strong disposability
assumption, but may often not be fulfilled; see e.g. Färe and Grosskopf (1983). We are
not aware of hypothesis tests for monotonicity or other shape constraints in the context of
boundary regression, but would like to mention Gijbels’ (2005) review on testing for monotonicity in mean regression. Tests similar in spirit to the one we are suggesting here were
considered by Birke and Neumeyer (2013) and Birke et al. (2016+) for mean and quantile
regression models, respectively.
The remainder of the article is organized as follows. In Section 2 the regression model
3
under consideration is presented and model assumptions are formulated. The regression
estimator is defined and uniform rates of convergence are given. A smooth modification of
the estimator is considered and uniform rates of convergence for this estimator as well as its
derivative are shown. In Section 3 residual based empirical distribution functions based on
both regression estimators are investigated. Conditions are stated under which the influence
√
of regression estimation is asymptotically n-negligible. Furthermore, an expansion of the
residual empirical distribution function is shown that is valid under more general conditions.
In Section 4 goodness-of-fit tests for the error distribution are discussed in general and in
some detailed examples. We investigate the finite sample performance of the tests in a small
simulation study. We further discuss hypotheses tests for independence of the error distribution from the design points as well as a test for monotonicity of the boundary function.
All proofs are given in the appendix.
2
The regression function: uniform rates of convergence
We consider a regression model with fixed equidistant design and one-sided errors,
Yi = g( ni ) + εi ,
i = 1, . . . , n,
(2.1)
under the following assumptions:
(F1) The errors ε1 , . . . , εn are independent and identically distributed and supported on
(−∞, 0]. The error distribution function fulfills
F (y) = 1 − c|y|α + r(y),
y < 0,
for some α > 0, with r(y) = o(|y|α ) for y % 0.
(G1) The regression function g belongs to some Hölder class of order β ∈ (0, ∞), i. e. g is
bβc-times differentiable on [0, 1] and the bβc-th derivative satisfies
cg := sup
t,x∈[0,1]
t6=x
|g (bβc) (t) − g (bβc) (x)|
< ∞.
|t − x|β−bβc
In Figure 1 some scatter plots of data according to model (2.1) are shown for different
tail indices α of the error distribution.
Remark 2.1 Strictly speaking, we consider a triangular scheme in (2.1), and the errors εi
depend on n too, as the ith regression point i/n varies with n. For notational simplicity, we
suppress the second index, because the distribution of the errors does not depend on n.
4
0.0
0.2
0.4
0.6
x
0.8
1.0
0.2
0.4
0.6
0.8
1.0
0.2
0.0
g (x)
−0.6
−0.4
g (x)
−0.4
−0.6
0.0
0.0
x
−0.2
0.0
0.2
α=3
−0.2
0.0
−0.6
−0.4
g (x)
−0.2
0.0
−0.2
−0.6
−0.4
g (x)
α=2
0.2
α=1
0.2
α = 0.5
0.2
0.4
0.6
0.8
1.0
0.0
x
0.2
0.4
0.6
0.8
1.0
x
Figure 1: Scatter plots of ( ni , Yi ), i = 1, . . . , n, and the true regression function g(x) =
−3(x − 0.4)3 . The error distribution is Weibull F (y) = exp(−(|y|/θ)α )I(−∞,0) (y) + I[0,∞) (y)
with scale θ = 0.3 and shape parameter α.
We consider an estimator that locally approximates the regression function by a polynomial while lying above the data points. More specifically, for x ∈ [0, 1], let
ĝn (x) := ĝ(x) := p(x)
where p is a polynomial of order dβe − 1 and minimizes the local integral
Z x+hn
p(t) dt
(2.2)
x−hn
under the constraints p( nj ) ≥ Yj for all j ∈ {1, . . . , n} such that | nj − x| ≤ hn . For the
asymptotic analysis of this estimator, we need the following assumption:
(H1) Let (hn )n∈N be a sequence of positive bandwidths that satisfies limn→∞ hn = 0 and
limn→∞ nhn / log n = ∞.
We obtain the following uniform rates of convergence.
Theorem 2.2 In model (2.1), under the assumptions (F1), (G1), and (H1), we have
| log h | 1/α
n
sup |ĝ(x) − g(x)| = O(hβn ) + OP
.
nh
n
x∈[hn ,1−hn ]
Note that the deterministic part O(hβn ) arises from approximating the regression function
by a polynomial, whereas the random part originates from the observational error. Balancing
1
the two sources of error by setting hn ((log n)/n) αβ+1 gives
β
log n αβ+1
sup |ĝ(x) − g(x)| = OP
.
(2.3)
n
x∈[hn ,1−hn ]
(Here an bn means that 0 < lim inf n→∞ |an /bn | ≤ lim supn→∞ |an /bn | < ∞.)
This result is of particular interest in the case of irregular error distributions, i. e. α ∈
β
(0, 2), when the rate improves upon the typical optimal rate OP (((log n)/n) 2β+1 ) for estimating mean regression functions in models with regular errors.
5
Remark 2.3 Jirak et al. (2014) consider a similar boundary regression estimator while
P
replacing the integral in (2.2) by its Riemann approximation ni=1 p( ni )I{| ni − x| ≤ hn }. In
particular, they use the Lepski method to construct a data-driven bandwidth that satisfies
1
hn ((log n)/n) αβ+1 in probability. For this modified estimator, we obtain the same uniform
rate of convergence as in Theorem 2.2 by replacing Proposition A.1 in the proof of Theorem
2.2 by Theorem 3.1 in Jirak et al. (2014).
Remark 2.4 For Hölder continuous regression functions with exponent β ∈ (0, 1] the estimator reduces to a local maximum, i. e. ĝ(x) = max{Yi | i = 1, . . . , n s. t. | ni − x| ≤ hn }.
In this case we obtain the rate of convergence as given in Theorem 2.2 uniformly over the
whole unit interval.
Remark 2.5 Müller and Wefelmeyer (2010) consider a mean regression model Yi = m(Xi )+
ηi , i = 1, . . . , n, with symmetric error distribution supported on [−a, a] (with a unknown);
see the left panel of Figure 2. The error distribution function fulfills F (a − y) ∼ 1 − y α for
y & 0. The local empirical midrange of responses, i. e.
1
min Yi + max Yi
m̂(x) =
i∈{1,...,n}
i∈{1,...,n}
2 |X
|X −x|≤h
−x|≤h
n
i
n
i
is shown to have pointwise rate of convergence O(hβn ) + OP ((nhn )−1/α ) to m(x) if m is
Hölder continuous with exponent β ∈ (0, 1]. Theorem 2.2 enables us to extend Müller’s
and Wefelmeyer’s (2010) results in two ways (in a model with fixed design Xi = ni ): we
consider more general Hölder classes with general index β > 0, and we obtain uniform rates
ˆ
of convergence. To this end, we use the mean regression estimator m̂ = (ĝ − g̃)/2
with ĝ as
i
before and g̃ˆ defined analogously, but based on ( n , −Yi ), i = 1, . . . , n; see the right panel of
Figure 2. The rates obtained for supx∈[hn ,1−hn ] |m̂(x) − m(x)| are the same as in Theorem
2.2.
1.5
1.0
y
0.5
0.0
−1.0
−0.5
0.0
−0.5
−1.0
y
0.5
1.0
1.5
2.0
mean regression: boundary curves
2.0
mean regression with symmetric compactly supported error
0.0
0.2
0.4
0.6
0.8
1.0
0.0
x
0.2
0.4
0.6
x
Figure 2: Example for data as in Remark 2.5.
6
0.8
1.0
Remark 2.6 For β ∈ (1, 2], Hall and Van Keilegom (2009) consider the following local
linear boundary regression estimator:
n
o
2
i
i
ǧ(x) = inf α0 (α0 , α1 ) ∈ R : Yi ≤ α0 + α1 n − x ∀i ∈ {1, . . . , n} s. t. n − x ≤ hn .
(2.4)
R x+hh
Because of x−hn (α0 + α1 (t − x)) dt = 2α0 hn this estimator coincides with ĝ for β ∈ (1, 2].
However, in the case β > 2 replacing the linear function in (2.4) by a polynomial of order
dβe − 1 renders the estimator ǧ useless. One obtains ǧ(x) = −∞ for x 6∈ { nj | j = 1, . . . , n}
while ǧ( nj ) = Yj , j = 1, . . . , n. This was already observed by Jirak et al. (2014).
Note that typically the estimator ĝ is not continuous. One might prefer to consider
a smooth estimator by convoluting ĝ with a kernel. Such a modified estimator will also
be advantageous when deriving an expansion for the residual based empirical distribution
function in the next section. Therefore we define
Z 1−hn
x−z
1
dz
(2.5)
ĝ(z) K
g̃(x) =
bn
bn
hn
and formulate some additional assumptions.
R
(K1) K is a continuous kernel with support [−1, 1] and order bβc + 1, i.e. K(u) du = 1,
R r
u K(u) du = 0 ∀r = 1, . . . , bβc. Furthermore, K is differentiable with Lipschitzcontinuous derivative K 0 on (−1, 1).
(B1) The sequence (bn )n∈N of positive bandwidths satisfies limn→∞ bn = 0.
(
log n 1/α
o b1+2δ
if δ ≤
n
β
(1+2δ)∨(3−(β−1)(1/δ−1))
(B2.δ) hn +
= o bn
=
3−(β−1)(1/δ−1)
nhn
o bn
if δ >
β−1
2
β−1
.
2
Here we assume that the parameter δ, which quantifies the minimal required smoothness of
the estimator of g 0 , lies in (0, 1 ∧ (β − 1)). For example, if β < 3 and the optimal bandwidth
hn ((log n)/n)1/(αβ+1) is chosen, then (B2.δ) is fulfilled with δ = (β − 1)/2 for any bn that
satisfies hn = o(bn ).
The estimator g̃ is differentiable and we obtain the following uniform rates of convergence
for g̃ and its derivative g̃ 0 .
Theorem 2.7 If the model assumptions (2.1), (F1), (G1) with β > 1, (H1), (K1), and
(B1) hold, then for In = [hn + bn , 1 − hn − bn ]
| log h | α1
n
β
β
(i) sup |g̃(x) − g(x)| = O(bn ) + O(hn ) + OP
nhn
x∈In
| log h | α1
n
(ii) sup |g̃ (x) − g (x)| =
+O
+ OP
.
nhn
x∈In
If hβn + (log n/(nhn ))1/α = o(bn ), then supx∈In |g̃ 0 (x) − g 0 (x)| = oP (1); in particular this
holds if (B2.δ) is fulfilled for some δ ∈ (0, 1 ∧ (β − 1)).
0
0
O(bβ−1
n )
β
b−1
n hn
7
b−1
n
(iii) For all δ ∈ (0, 1 ∧ (β − 1)), under the additional assumption (B2.δ),
|g̃ 0 (x) − g 0 (x) − g̃ 0 (y) + g 0 (y)|
= oP (1).
|x − y|δ
x,y∈In ,x6=y
sup
3
3.1
The error distribution
Estimation
In this section we consider estimators of the error distribution in model (2.1). For the
asymptotic analysis we need the following additional assumption.
(F2) The cdf F of the errors is Hölder continuous of order α ∧ 1.
We define residuals ε̂i = Yi − ĝ( ni ), and a resulting modified sequential empirical distribution function by
bnsc
1 X
F̂n (y, s) =
I{ε̂i ≤ y}I{hn <
mn i=1
i
n
≤ 1 − hn },
where mn = ]{i ∈ {1, . . . , n} | hn < ni ≤ 1 − hn } = n − bnhn c − dnhn e. We consider the
sequential process, because it will be useful for testing hypotheses in section 4. With slight
abuse of notation, let F̂n (y) = F̂n (y, 1) denote the corresponding estimator for F (y).
We first treat a simple case where the influence of the regression estimation on the residual
empirical process is negligible. To this end, let Fn denote the standard empirical distribution
function of the unobservable errors ε1 , . . . , εn . Furthermore, define s̄n = bn(s ∧ (1 − hn ))c −
bn(s ∧ hn )c /mn and interpret s̄n /bnsc as 0 for s = 0. Note that s̄n = 1 if s = 1 and sn → s
as n → ∞, for each fixed s.
Theorem 3.1 Assume that the conditions (F1), (G1), and (F2) are fulfilled with β > 1.
Furthermore, assume β1 < α < 2 − β1 and hn ((log n)/n)1/(αβ+1) . Then we have
sup
|F̂n (y, s) − s̄n Fbnsc (y)| = oP (n−1/2 ).
y∈R,s∈[0,1]
√
Thus the process { n(F̂n (y, s) − s̄n F (y)) | s ∈ [0, 1], y ∈ R} converges weakly to a Kiefer
process KF , a centered Gaussian process with covariance function ((s1 , y1 ), (s2 , y2 )) 7→ (s1 ∧
s2 )(F (y1 ∧ y2 ) − F (y1 )F (y2 )).
Remark 3.2 The assertion of Theorem 3.1 holds true under the following weaker conditions
on the (possibly random) bandwidth:
hn = oP n−1/(2(α∧1)β) ,
n(α∨1)/2−1 log n = oP (hn ).
8
(3.1)
In particular, one may use the adaptive bandwidth proposed by Jirak et al. (2014).
Condition (3.1) can be fulfilled if and only if β1 < α < 2 − β1 , which in turn can be satisfied
for all α ∈ (0, 2), provided the regression function g is sufficiently smooth. It ensures that
one can choose a rate an of larger order than the uniform bound on the estimation error
established in Theorem 2.2 such that
−1/2
|F (y + an ) − F (y)| = O(aα∧1
).
n ) = o(n
Remark 3.3 Theorem 3.1 implies that for α ∈ (1/β, 2 − 1/β) the estimation of the regression function has no impact on the estimation of the irregular error distribution. This is
remarkably different from corresponding results on the estimation of the error distribution
in mean regression models with regular error distributions. Here the empirical distribution
√
function of residuals, say F̌n , is not asymptotically n-equivalent to the empirical distribu√
tion function of true errors. The process n(F̌n − F ) converges to a Gaussian process whose
covariance structure depends on the error distribution in a complicated way; cf. Theorem 2
in Akritas and Van Keilegom (2001). In the simple case of a mean regression model with
equidistant design and an error distribution F with bounded density f one has
√
n
f (y) X
n(F̌n (y) − Fn (y)) = √
εi + oP (1)
n i=1
uniformly with respect to y ∈ R when the regression function is estimated by a local polynomial estimator, under appropriate bandwidth conditions (see Proposition 3 in Neumeyer
and Van Keilegom (2009)).
In order to obtain asymptotic results for estimators of the error distribution for α ≥ 2− β1 ,
a finer analysis is needed. In what follows, we will use the smooth regression estimator
g̃ defined in (2.5). Let F̃n denote the empirical distribution function based on residuals
ε̃j = Yj − g̃( nj ), i. e.
n
1 X
F̃n (y) =
I{ε̃j ≤ y}I{ nj ∈ In }
mn j=1
where In = [hn + bn , 1 − hn − bn ] and mn = ]{j ∈ {1, . . . , n} | hn + bn ≤ nj ≤ 1 − hn − bn } =
n − 2dn(hn + bn )e + 1. Then the following asymptotic expansion is valid.
Theorem 3.4 If the conditions (F1), (F2), (G1) with β > 1, (H1), (K1), (B1), and
(B2.δ) for some δ ∈ (1/α − 1, 1 ∧ (β − 1)) are fulfilled, then
F̃n (y) =
n
n
1
1X
1 X
I{εj ≤ y}+
F y + (g̃ − g)( nj ) − F (y) I{ nj ∈ In }+oP √
(3.2)
n j=1
mn j=1
n
uniformly for all y ∈ R.
9
Remark 3.5 One can choose bandwidths hn and bn such that the conditions (H1), (B1)
and (B2.δ) are fulfilled for some δ ∈ (1/α − 1, 1 ∧ (β − 1)) if this interval is not empty, which
in turn is equivalent to α > 1/(β ∧ 2). Thus the expansion given in Theorem 3.4 is also valid
for regular error distributions.
If one assumes (B2.δ) for some δ ∈ (0, 1 ∧ (β − 1)), but drops the condition δ > 1/α − 1 and,
in addition, replaces (F2) with the assumption that F is Lipschitz continuous on (−∞, κ]
for some κ < 0, then expansion (3.2) still holds uniformly on (−∞, κ̃] for all κ̃ < κ. In
particular, this holds if F has a bounded density on (−∞, κ].
Next we examine under which conditions the additional term in (3.2) depending on the
estimation error is asymptotically negligible. We focus on those arguments y which are
bounded away from 0, because in this setting weaker conditions on α and β are needed.
Moreover, for the analysis of the tail behavior of the error distribution at 0, tail empirical
processes are better suited and will be considered in future work.
Note that the estimator ĝ tends to underestimate the true function because it is defined
via a polynomial which is minimal under the constraint that it lies above all observations
(i/n, Yi ), which in turn all lie below the true boundary function. As this systematic underestimation does not vanish from (local or global) averaging, we first have to introduce a bias
correction.
Let Eg≡0 denote the expectation if the true regression function is identical 0. For the
remaining part of this section, we assume that Eg≡0 (ĝ(1/2)) is known or that it can be estimated sufficiently accurately. For example, if the empirical process of residuals shall be used
to test a simple null hypothesis, then one may calculate or simulate this expectation under
the given null distribution. We define a bias corrected version of the smoothed estimator by
g̃n∗ (x) := g̃(x) − Eg≡0 (ĝ(1/2)),
for x ∈ In . The following lemma ensures that the above results for g̃ carry over to this
variant if the following condition on the lower tail of F holds:
(F3) There exists τ > 0 such that F (−t) = o(t−τ ) as t → ∞.
Lemma 3.6 If model (2.1) holds with g identical 0 and the conditions (F1), (F3), (G1),
and (H1) are fulfilled, then for all x ∈ [hn , 1 − hn ]
Eg≡0 (|ĝn (x)|) = Eg≡0 (|ĝn (1/2)|) = O
log n 1/α
.
nhn
We need some additional conditions on the rates at which the bandwidths hn and bn tend
to 0:
(H2) hn = o n−1/(2β) ∧ n−1/(αβ+1) , nα/4−1 log n = o(hn )
10
nh 2/α
n
−1/(2β)
−2β −1
−1
(B3) bn = o n
∧ hn n
∧
n
log n
In particular, these assumptions ensure that the bias terms of order hβn + bβn are of smaller
order than n−1/2 and (nhn )−1/α and hence asymptotically negligible, and that quadratic
terms in the estimation error are uniformly negligible, that is, supx∈In |g̃n∗ (x) − g(x)|2 =
oP (n−1/2 ).
Theorem 3.7 Suppose the model assumptions (2.1) with α ∈ (0, 2), β > 1, (F1), (F3),
(G1), (H1), (H2), (K1), (B1), (B2.δ) for some δ > 0, and (B3) hold and F has a
bounded density on (−∞, κ] for some κ < 0. Then
sup
y∈(−∞,κ]
n
1 X
F y + (g̃n∗ − g)( nj ) − F (y) I{ nj ∈ In } = oP (n−1/2 ).
mn j=1
Remark 3.8 The conditions on hn and bn used in Theorem 3.7 can be fulfilled if and only
if α < 2β − 1. In particular, this theorem is applicable if β ≥ 3/2 and the error distribution
is irregular, i.e., α < 2. A possible choice of bandwidths is
1
β
2β − 1
,
∧
.
hn n−1/(2β) ∧ n−1/(αβ+1) / log n, bn n−λ for some λ ∈
2β αβ + 1
2αβ
We obtain asymptotic equivalence of the empirical process of residuals (restricted to
(−∞, κ]) to the empirical process of the errors. To formulate the result, let F̃n∗ be defined
analogously to F̃n , but with g̃ replaced by g̃ ∗ .
Corollary 3.9 Under the assumptions of Theorems 3.4 and 3.7, we have supy∈(−∞,κ] |F̃n∗ (y)−
√
Fn (y)| = oP (n−1/2 ). Thus the process ( n(F̃n∗ (y) − F (y)))y∈(−∞,κ] converges weakly to a
centered Gaussian process with covariance function (y1 , y2 ) 7→ F (y1 ∧ y2 ) − F (y1 )F (y2 ),
y1 , y2 ∈ (−∞, κ].
Note that for the Corollary one needs the condition 1/(β ∧ 2) < α < (2β − 1) ∧ 2.
4
4.1
Hypotheses testing
Goodness-of-fit testing
Let F = {Fϑ | ϑ ∈ Θ} denote a continuously parametrized class of error distributions such
that for each ϑ ∈ Θ, Fϑ (y) = 1 − cϑ |y|αϑ + rϑ (y) with rϑ (y) = o(|y|αϑ ) for y % 0. Our aim is
to test the null hypothesis H0 : F ∈ F. We assume that αϑ ∈ (1/β, 2 − 1/β) for all ϑ ∈ Θ,
such that Theorem 3.1 can be applied under H0 . Let ϑ̂ denote an estimator for ϑ based
on residuals ε̂i = Yi − ĝ( ni ), i = 1, . . . , n. The goodness-of-fit test is based on the empirical
process
√
Sn (y) = n(F̂n (y) − Fϑ̂ (y)), y ∈ R,
11
where, as before, F̂n (y) = F̂n (y, 1). Under any fixed alternative that fulfills (F1) for some α,
ĝ still uniformly consistently estimates g, and thus F̂n is a consistent estimator of the error
distribution F . If ϑ̂ converges to some ϑ∗ ∈ Θ under the alternative, too, then a consistent
hypothesis test is obtained by rejecting H0 for large values of, e. g., a Kolmogorov-Smirnov
test statistic supy∈R |Sn (y)|. Note that under H0 it follows from Theorem 3.1 that
Sn (y) =
√
n(Fn (y) − Fϑ (y)) −
√
n(Fϑ̂ (y) − Fϑ (y)) + oP (1),
where ϑ denotes the true parameter. We consider two examples.
Example 4.1 Consider the mean regression model Yi = m( ni ) + ηi , i = 1, . . . , n, with
symmetric error cdf F and β > 1, and define m̂ with some bandwidth hn ((log n)/n)1/(αβ+1)
as in Remark 2.5. We want to test the null hypothesis H0 : F ∈ F = {Fϑ | ϑ ∈ Θ} for
some Θ ⊂ (0, ∞), where Fϑ denotes the distribution function of the uniform distribution on
[−ϑ, ϑ] (with αϑ = 1 for all ϑ > 0). Define residuals η̂i = Yi − m̂( ni ), i = 1, . . . , n, and let
max
|η̂i |.
ϑ̂n = max
max
η̂i , − min
η̂i =
nhn ≤i≤n−nhn
nhn ≤i≤n−nhn
nhn ≤i≤n−nhn
Then |ϑ̂n − ϑ| is bounded by | maxnhn ≤i≤n−nhn |ηi | − ϑ| + supx∈[hn ,1−hn ] |m̂(x) − m(x)| =
oP (n−1/2 ). Since Fϑ (y) = y+ϑ
I
(y) + I(ϑ,∞) (y), one may conclude supy∈R |Fϑ̂n (y) −
2ϑ [−ϑ,ϑ]
−1/2
Fϑ (y)| = oP (n
). Thus the process Sn converges weakly to a Brownian bridge B composed
with F . The Kolmogorov-Smirnov test statistic supy∈R |Sn (y)| converges in distribution to
supt∈[0,1] |B(t)|. Thus although our testing problem requires the estimation of a nonparametric function and we have a composite null hypothesis, the same asymptotic distribution
arises as in the Kolmogorov-Smirnov test for the simple hypothesis H0 : F = F0 based on
an iid sample with distribution F .
Example 4.2 Again assume that the Hölder coefficient β is greater than 1. Consider the
α
null hypothesis H0 : F ∈ F = {Fϑ | ϑ ∈ (0, ∞)}, where Fϑ (y) = e−(−ϑy) I(−∞,0) (y)+I[0,∞) (y)
denotes a Weibull distribution with some fixed shape parameter α ∈ (1/β, 2 − 1/β) and
unknown scale parameter ϑ. Note that Fϑ satisfies (F1) with c = ϑ.
P
− α1
n
j
1
α
Define the moment estimator ϑ̂n = mn j=1 (−ε̂j ) I{hn < n ≤ 1 − hn }
which is
α
−α
α
motivated by Eϑ [(−ε1 ) ] = ϑ . A Taylor expansion of x 7→ x at x = −εj yields
ϑ̂αn
n
1 X
j
− ϑ = −(ϑ̂n ϑ)
((−εj )α − ϑ−α )I{hn < ≤ 1 − hn }
mn j=1
n
α
α
n
j
α X
j
j
α−1
+
(−ξj )
ĝ( ) − g( ) I{hn < ≤ 1 − hn }
mn j=1
n
n
n
n
1 X
j
= −ϑ
((−εj )α − ϑ−α )I{hn < ≤ 1 − hn } + oPϑ (n−1/2 )
mn j=1
n
2α
12
= OPϑ (n−1/2 )
for some ξj between ε̂j and εj , where in the last steps we have applied Theorem 2.2, the law
of large numbers and a central limit theorem.
For all z, z̃ ∈ R one has |e−z − e−z̃ − (z − z̃)e−z | = e−z |ez−z̃ − 1 − (z − z̃)| ≤ e−z∧z̃ (z − z̃)2 .
Thus
2
2
α
α
Fϑ̂n (y) − Fϑ (y) − e−(−ϑy) ϑ̂αn − ϑα | ≤ e−(−(ϑ̂n ∧ϑ)y) (ϑ̂αn − ϑα )(−y)α = OPϑ (n−1 )
uniformly for all y ∈ (−∞, 0]. Now analogously to the proof of Theorem 19.23 in van der
Vaart (2000) we can conclude weak convergence of
Sn (y) =
√
n(Fn (y) − F (y)) − e
√ X
n
n
1
j
((−εj )α − α )I{hn < ≤ 1 − hn }
ϑ (−y)
mn j=1
ϑ
n
−(−ϑy)α 2α
α
+ oPϑ (1),
y ∈ R, to a Gaussian process with covariance function (y1 , y2 ) 7→ Fϑ (y1 ∧y2 )−Fϑ (y1 )Fϑ (y2 )−
α α
α
e−(−ϑ) (y1 +y2 ) (y1 y2 )α ϑ2α , where the covariance function follows by simple calculations and
α
the fact that Eϑ [I{ε1 ≤ y}((−ε1 )α − ϑ−α )] = (−y)α e−(−ϑy) .
For the special case of a test for exponentially distributed errors (α = 1), the asymptotic
R
quantiles for the Cramér-von-Mises test statistic Sn (y)2 dFϑ̂n (y) are tabled in Stephens
(1976).
Simulations
To study the finite sample performance of our goodness-of-fit test, we investigate its behaviour on simulated data according to Examples 4.1 and 4.2 for samples of size 50, 100, 200
and 500. In both settings the regression function is given by g(x) = 0.5 sin(2πx) + 4x. We
1
use the local linear estimator (corresponding to β = 2) with bandwidth n− 3 , which is up
to a log term of optimal rate for α = 1 and β = 2. The hypothesis tests are based on the
R
adjusted Cramér-von-Mises test statistic mnn Sn (y)2 dFϑ̂n (y) and have nominal size 5%. The
results reported below are based on 200 Monte Carlo simulations for each model.
In the situation of Example 4.1, the errors are drawn according to the density fε (y) =
0.5(ζ + 1)(1 − |y|)ζ I[−1,1] (y) for different values of ζ ∈ (−1, 0] . Note that the null hypothesis
H0 : ∃ϑ : εi ∼ U [−ϑ, ϑ] holds if and only if ζ = 0. Figure 3 shows the empirical power of
the Cramér-von-Mises type test. The actual size is close to the nominal level for all sample
sizes and the power function is monotone both in ζ and the sample size n. For parameter
values ζ ∈ [−0.2,0), one needs rather large sample sizes to detect the alternative, as the error
distribution is too similar to the uniform distribution.
In the setting of Example 4.2 we simulate Weibull(ϑ, α) distributed errors for ϑ = 1
and different values of α > 0. We test the null hypothesis H0 : ∃ϑ : −εi ∼ Exp(ϑ) of
13
1.0
exponentiality, which is only fulfilled for α = 1. In Figure 4 the empirical power function of
our test is displayed for different sample sizes. Again the actual size is close to the 5% and
the power increases with α departing from one as well as with increasing n.
To examine the influence of the bandwidth choice, in addition we have simulated the
1
same models with hn = c · n− 3 for different values of c ranging from c = 0.2 to c = 1.2. The
results for the test of uniformity in Example 4.1 are similar to those displayed in Figure 3
for all these bandwidths. In the situation of Example 4.2 we obtain similar power functions
as reported above for c between 0.8 and 1.2, whereas for smaller bandwidths the actual size
of the test exceeds its nominal value substantially.
●
●
●
0.6
0.4
Rejection Probability
0.8
●
n=50
n=100
n=200
n=500
0.2
●
level
●
●
0.0
●
−0.8
−0.6
−0.4
−0.2
0.0
ζ
Figure 3: Monte-Carlo simulations for Example 4.1
4.2
Test for independence
In model (2.1) we assume that the distributions of the errors εi (i = 1, . . . , n) do not depend
on the point of measurement xi = i/n. We can test this assumption by comparing the sequential empirical distribution function F̂n (y, s) for the residuals with the estimator s̄n F̂n (y),
which should behave similarly if the errors are iid. The following corollary to Theorem 3.1
describes the asymptotic behavior of the Kolmogorov-Smirnov type test statistic
Tn =
sup
√
n|F̂n (y, s) − s̄n F̂n (y)|
s∈[0,1],y∈R
14
1.0
●
●
●
●
●
●
●
●
●
●
●
0.6
●
0.4
●
0.2
Rejection Probability
0.8
●
●
●
level
●
n=50
n=100
n=200
n=500
0.0
●
0.5
1.0
1.5
2.0
2.5
3.0
α
Figure 4: Monte-Carlo simulations for Example 4.2
under the null hypothesis of iid errors.
Corollary 4.3 Assume model (2.1) with (F1), (F2), (G1), and β1 < α < 2 − β1 . Choose a
bandwidth hn ((log n)/n)1/(αβ+1) .
Then Tn converges in distribution to sups∈[0,1],z∈[0,1] |G(s, z)| where G is a completely
tucked Brownian sheet, i. e. a centered Gaussian process with covariance function
((s1 , z1 ), (s2 , z2 )) 7→ (s1 ∧ s2 − s1 s2 )(z1 ∧ z2 − z1 z2 ).
The proof is given in the appendix. Note that under the assumptions of the corollary the
limit of the test statistic Tn is distribution free. The asymptotic quantiles tabled by Picard
(1985) can be used to determine the critical value for a given asymptotic size of the test.
4.3
Test for monotone boundary functions
We consider model (2.1) and aim at testing the null hypothesis
H0 :
g is increasing,
which is a common assumption in boundary models. Let g̃ denote the smooth local polynomial estimator for g defined in (2.5). Such an unconstrained estimator can be modified
15
to obtain an increasing estimator g̃I . To this end, for any function h : [0, 1] → R define the
increasing rearrangement on [a, b] ⊂ [0, 1] as the function Γ(h) : [a, b] → R with
Z b
o
n
I{h(t) ≤ z} dt ≥ x .
Γ(h)(x) = inf z ∈ R a +
a
Denote by Γn the operator Γ with [a, b] = In . We define the increasing rearrangement of
g̃ as g̃I = Γn (g̃), so that g̃I = g̃ if g̃ is nondecreasing (see Anevski and Fougères, 2007,
and Chernozhukov et al., 2009). We now consider residuals obtained from the monotone
estimator: ε̂I,i = Yi − g̃I ( ni ), i = 1, . . . , n. Under the null hypothesis, these residuals should
be approximately iid, whereas under the alternative they show a varying behavior for ni in
different subintervals of [0, 1]. For illustration see Figure 5 where we have generated a data
set (upper panel) with true non-monotone boundary curve g (dashed curve). The solid curve
is the increasing rearrangement gI . The lower left panel shows the errors εi , i = 1, . . . , n,
with iid-behaviour. The lower right panel shows εI,i = Yi − gI ( ni ), i = 1, . . . , n, with a clear
non-iid pattern.
●
●
●
●
●
●
● ●
●
●
●
●
●
●
●
●
●
●
●
●
●
● ● ●
●
●
●
●
● ●●
●
●
●
●
●
●
●
●
●●
●
●
●
●
●
●●
●
●
● ●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●●
●●
●
●●
●
●
●
●
●
●
●
●
●
●
●
● ●
●
●●
●
●
●
●
●
●
●●
●
●
●
●
●
●
●
●
●
●
s
●
●
●
●
●
●
●
●
0
−1
−2
−3
−4
−4
−3
−2
−1
0
●
0.0
0.2
0.4
0.6
0.8
1.0
0.0
0.2
0.4
0.6
0.8
1.0
Figure 5: The upper panel shows data points and the true boundary function (dashed curve)
as well as the increasing rearrangement (solid curve). The lower left panel shows the errors.
The lower right panel shows residuals built with respect to the increasing rearrangement.
16
Similarly as in Subsection 4.2, we compare the sequential empirical distribution function
bnsc
1 X
I{ε̃I,j ≤ y}I{ nj ∈ In }
F̃I,n (y, s) =
mn j=1
based on the increasing estimator g̃I with the product estimator s̄n F̃n (y, 1), where again
In := [hn + bn , 1 − hn − bn ] and mn := n − 2dn(hn + bn )e + 1. Let
√
G̃n (s, y) = n(F̃I,n (y, s) − s̄n F̃n (y)), s ∈ [0, 1], y ∈ R.
To derive its limit distribution under the null hypothesis, we need an additional assumption:
(I1) Let inf x∈[0,1] g 0 (x) > 0.
Theorem 4.4 Assume model (2.1) with (F1), (F2), (G1), (K1), (I1), β > 1 and
α < 2 − β1 . If hn ((log n)/n)1/(αβ+1) and bn ((log n)/n)1/(αβ+1) , then
sup
|F̃I,n (y, s) − s̄n Fbnsc (y)| = oP (n−1/2 ).
1
β
<
(4.1)
y∈R,s∈[0,1]
Thus the Kolmogorov-Smirnov test statistic sups∈[0,1],y∈R |G̃n (s, y)|, converges in distribution
to sups∈[0,1],z∈[0,1] |G(s, z)| where G is the completely tucked Brownian sheet (see Corollary
4.3).
The conditions on the bandwidths can be substantially relaxed; cf. Remark 3.2.
Remark 4.5 A test that rejects H0 for large values of the Kolmogorov-Smirnov test statistic
Tn = sups∈[0,1],y∈R |G̃n (s, y)| is consistent. To see this note that by Theorem 1 of Anevski and
Fougères (2007), supx∈In |g̃I (x) − gI (X)| ≤ supx∈In |g̃(x) − g(x)| = oP (1) with gI denoting
the increasing rearrangement of g. Thus n−1/2 Tn converges to
Z s
T = sup
Fε (y + (gI − g)(x)) dx − sFε (y) .
s∈[0,1],y∈R
0
Since T > 0 under the alternative hypothesis g 6= gI , the test statistic Tn converges to
infinity.
A
A.1
Appendix: Proofs
Auxiliary results
Proposition A.1 Assume that model (2.1) holds and that the regression function g fulfills
condition (G1) for some β ∈ (0, β ∗ ] and some cg ∈ [0, c∗ ]. Then there exist constants
Lβ ∗ ,c∗ , Lβ ∗ > 0 and a natural number jβ ∗ (depending only on the respective subscripts) such
that
|ĝ(x) − g(x)| ≤ Lβ ∗ ,c∗ hβn + Lβ ∗ max
min
|εi | .
1≤j≤2jβ ∗
17
i:−1+(j−1)/jβ ∗ ≤|i/n−x|/hn ≤−1+j/jβ ∗
This proposition can be verified by an obvious modification of the proof of Theorem 3.1
by Jirak et al. (2014).
Lemma A.2 Under assumptions (F1) and (H1) for any fixed set I1 , . . . , Im of disjoint
non-degenerate subintervals of [−1, 1] we have
sup
max
x∈[hn ,1−hn ] 1≤j≤m
min
i∈{1,...,n}
(i/n−x)/hn ∈Ij
|εi | = OP
| log h | 1/α
n
.
nhn
1/α
Proof. Let rn := | log hn |/(nhn )
. Obviously it suffices to prove that for all nondegenerate subintervals I ⊂ [−1, 1] there exists a constant L such that
n
o
lim P
sup
min |εi | > Lrn = 0.
n→∞
x∈[hn ,1−hn ]
i∈{1,...,n}
(i/n−x)/hn ∈I
Denote by d = sup I − inf I > 0 the diameter of I and let dn := dnhn de − 1 and ln := bn/dn c.
Then for all x > 0
n
o
n
o
P
sup
min |εi | > x ≤ P
max
min
|εi | > x
x∈[hn ,1−hn ]
j∈{1,...,n−dn } i∈{j,...,j+dn }
i∈{1,...,n}
(i/n−x)/hn ∈I
≤ P
n
o
n
o
max Mn,l > x + P
max Mn,l > x
l∈{0,...,ln }
l even
l∈{0,...,ln }
l odd
with
Mn,l :=
max
min
j∈{ldn +1,...,(l+1)dn } i∈{j,...,j+dn }
|εi |.
Since the random variables Mn,l for l even are iid, we have
n
o
bln /2c+1
P
max Mn,l > x = 1 − 1 − P {Mn,0 > x}
,
l∈{0,...,ln }
l even
and an analogous equation holds for the maxima over the odd numbered block maxima Mn,l .
Let G be the cdf of |εi |. If Mn,0 exceeds x, then there is a smallest index j ∈ {1, . . . , dn }
for which mini∈{j,...,j+dn } |εi | > x. Hence
P {Mn,0 > x} = P
n
min
i∈{1,...,1+dn }
dn
o X
n
|εi | > x +
P |εj−1 | ≤ x,
j=2
min
i∈{j,...,j+dn }
o
|εi | > x
= (1 − G(x))dn +1 + (dn − 1)G(x)(1 − G(x))dn +1
≤ (1 + dn G(x))(1 − G(x))dn .
To sum up, we have shown that
P
n
sup
min
x∈[hn ,1−hn ]
i∈{1,...,n}
(i/n−x)/hn ∈I
|εi | > Lrn
o
bln /2c+1
dn
≤ 2 1 − 1 − (1 + dn G(Lrn ))(1 − G(Lrn ))
.
18
It remains to be shown that the right hand side tends to 0 for sufficiently large L which is
true if and only if
(1 + dn G(Lrn ))(1 − G(Lrn ))dn = o(1/ln ).
This is an immediate consequence of 1/ln ∼ dhn and
| log hn |
(1 + o(1))
nhn
| log hn |
=⇒ (1 − G(Lrn ))dn = exp − nhn dcLα
(1 + o(1))
nh
n
=⇒ (1 + dn G(Lrn ))(1 − G(Lrn ))dn = O | log hn | exp − cdLα | log hn |(1 + o(1)) = o(hn )
G(Lrn ) = cLα
2
if cdLα > 1.
A.2
Proof of Theorem 2.2
The assertion directly follows from Proposition A.1 and Lemma A.2.
A.3
2
Proof of Theorem 2.7
(i) Using Theorem 2.2, a Taylor expansion of g of order bβc and assumption (K1), one can
show by direct calculations that for some τu ∈ (0, 1)
1−hn
x−z
dz
sup |g̃(x) − g(x)| ≤ sup
bn
x∈In
x∈In
hn
Z 1−hn
1
x−z
(g(z) − g(x)) K
+ sup
dz
bn
bn
x∈In
hn
Z 1
(g(x − ubn ) − g(x))K (u) du
≤
sup |ĝ(z) − g(z)|O(1) + sup
Z
1
(ĝ(z) − g(z)) K
bn
x∈In
z∈[hn ,1−hn ]
−1
| log h | α1
n
β
≤ O(hn ) + OP
nh
Z 1n
1
ubβc (g (bβc) (x − τu ubn ) − g (bβc) (x))K(u)du .
+bbβc
n sup
x∈In bβc! −1
Now the Hölder property of g combined by (K1) yields the desired result.
(ii) Since g is bounded on [hn , 1 − hn ] and supx∈[hn ,1−hn ] |ĝ(x) − g(x)| = oP (1), ĝ is
eventually bounded on [hn , 1 − hn ] too. Note that the partial derivative of ĝ(z)b−1
n K((x −
z)/bn ) with respect to x is continuous and bounded (for fixed n). Thus we can exchange
integration and differentiation and obtain
0
Z
0
1−hn
sup |g̃ (x) − g (x)| = sup
x∈In
x∈In
ĝ(z)
hn
19
1 0 x − z
K
dz − g 0 (x) .
b2n
bn
Integration by parts yields
Z 1−hn
Z 1−hn
1
1 0 x−z
x−z
0
g (z) K
g(z) 2 K
dz =
dz
bn
bn
bn
bn
hn
hn
since K(−1) = K(1) = 0. Therefore
Z 1−hn
1 0 x−z
0
0
(ĝ(z) − g(z)) 2 K
dz
sup |g̃ (x) − g (x)| ≤ sup
bn
bn
x∈In
x∈In
hn
Z 1−hn
1
x−z
0
0
(g (z) − g (x)) K
+ sup
dz
bn
bn
x∈In
hn
Z 1
−1
(g 0 (x − ubn ) − g 0 (x))K (u) du .
≤
sup |ĝ(z) − g(z)|O(bn ) + sup
x∈In
z∈[hn ,1−hn ]
−1
Similarly as in the proof of (i), assertion (ii) follows by Theorem 2.2, a Taylor expansion of
g 0 of order bβc − 1 and the assumptions (K1) and (G1).
(iii) We distinguish the cases |x − y| > an and |x − y| ≤ an for some suitable sequence
(an )n∈N with limn→∞ an = 0 specified later. In the first case, we obtain
|g̃ 0 (x) − g 0 (x) − g̃ 0 (y) + g 0 (y)|
|x − y|δ
sup
x,y∈In ,|x−y|>an
≤ 2 sup |g̃ 0 (x) − g 0 (x)|a−δ
n
x∈In
O(bβ−1
n )+
=
O(hβn ) + OP
| log hn |
nhn
α1 ! ! !
b−1
a−δ
n
n .
(A.1)
In the second case, we use a decomposition like in the proof of (ii):
sup
x,y∈In ,0<|x−y|≤an
≤
sup
|g̃ 0 (x) − g 0 (x) − g̃ 0 (y) + g 0 (y)|
|x − y|δ
R 1−hn
1
0 x−z
0 y−z
(ĝ(z)
−
g(z))
K
−
K
dz
2
b
bn
bn
hn
n
|x − y|δ
R 1−hn
x,y∈In ,0<|x−y|≤an
0
+
sup
x,y∈In
0<|x−y|≤an
0
|g (x) − g (y)|
+
|x − y|δ
hn
sup
x,y∈In
0<|x−y|≤an
y−z
g 0 (z) b1n K x−z
−
K
dz
bn
bn
|x − y|δ
.
By Lipschitz continuity of K 0 and Theorem 2.2, the first term on the right hand side is of
the order
!
| log h | α1 1
n
O(hβn ) + OP
O(an1−δ ).
(A.2)
nhn
b3n
For β ≥ 2, the second term is of the order an1−δ as g 0 is Lipschitz continuous, while for
β ∈ (1, 2) assumption (G1) yields the rate anβ−1−δ . In both cases, condition (B2.δ) ensures
20
that the second term converges to 0.
The last term on the right hand side can be rewritten as
R1 0
(g (x − hn u) − g 0 (y − hn u))K(u) du
−1
sup
|x − y|δ
x,y∈In
0<|x−y|≤an
and is thus of the same order as the second term by assumption (G1).
To conclude the proof, one needs to find a sequence an = o(1) such that (A.1) and (A.2)
tend to 0 in probability, i.e.
b3
ϑn
β−1
δ
1−δ
bn +
= o(an ) and an = o n
bn
ϑn
with ϑn := hβn + (| log hn |/(nhn ))1/α . Obviously, such a sequence an exists if and only if
bβ−1
+
n
δ
b3 1−δ
ϑn
n
,
=o
bn
ϑn
2
which in turn is equivalent to condition (B2.δ).
A.4
Proof of Theorem 3.1
The assumptions about α ensure that β/(αβ + 1) > 1/(2(α ∧ 1)), and so in view of (2.3)
the uniform estimation error of ĝ is stochastically of smaller order than n−1/(2(α∧1)) . Hence
there exists a sequence
1
an = o(n− 2(α∧1) )
(A.3)
such that
P
|ĝ(x) − g(x)| ≤ an −−−→ 1.
sup
n→∞
x∈[hn ,1−hn ]
Let F̄n (y, s) :=
1
mn
Pbnsc
j=1
I{εj ≤ y}I{hn <
j
n
≤ 1 − hn }. Since
bnsc
1 X
F̂n (y, s) =
I{εj ≤ y + (ĝ − g)( nj )}I{hn <
mn j=1
j
n
≤ 1 − hn }
we may conclude
√
√
n(F̄n (y − an , s) − s̄n Fbnsc (y)) ≤ n(F̂n (y, s) − s̄n Fbnsc (y))
√
≤ n(F̄n (y + an , s) − s̄n Fbnsc (y))
for all y ∈ R and s ∈ [0, 1] with probability converging to 1.
We take a closer look at the bounds. The sequential empirical process
−1/2
En (y, s) = n
bnsc
X
(I{εj ≤ y} − F (y)),
j=1
21
y ∈ R, s ∈ [0, 1],
(A.4)
converges weakly to a Kiefer process; see e.g. Theorem 2.12.1 in van der Vaart and Wellner
(1996). Now, n ∼ mn , the asymptotic equicontinuity of the process En , the Hölder continuity
(F2) and (A.3) imply
√
n F̄n (y ± an , s) − s̄n Fbnsc (y)
n
=
En (y ± an , s ∧ (1 − hn )) − En (y, s ∧ (1 − hn )) − En (y ± an , s ∧ hn ) + En (y, s ∧ hn )
mn
√
√
+ ns̄n (F (y ± an ) − F (y)) + n(F̄n (y, s) − s̄n Fbnsc (y))
√
= oP (1) + n(F̄n (y, s) − s̄n Fbnsc (y))
uniformly for all y ∈ R, s ∈ [0, 1].
It remains to be shown that
√
n(F̄n (y, s) − s̄n Fbnsc (y))
√ X
√
bnsc
bnsc
n
ns̄n X
j
=
(I{εj ≤ y} − F (y))I{hn < ≤ 1 − hn } −
(I{εj ≤ y} − F (y))
mn j=1
n
bnsc j=1
n
=
− 1 En (y, s ∧ (1 − hn )) − En (y, s ∧ hn )
mn
ns̄
n
−
− 1 En (y, s)
bnsc
+ En (y, s ∧ (1 − hn )) − En (y, s ∧ hn ) − En (y, s)
(A.5)
tends to 0 in probability uniformly for all y ∈ R, s ∈ [0, 1].
The first term vanishes asymptotically, because En is uniformly stochastically bounded
and n ∼ mn .
Next note that s̄n = 0 for s < hn , while for s ≥ hn
ns̄n
bn(s ∧ (1 − hn )c − bnhn c
O(nhn )
−1=
−1=
,
−1
bnsc
(1 − 2hn + O(n ))bnsc
(1 − 2hn + O(n−1 ))bnsc
(A.6)
which is uniformly bounded for all s ∈ [hn , 1] and tends to 0 uniformly with respect to s ∈
1/2
[hn , 1]. Moreover, En is uniformly stochastically bounded and sup0≤s≤h1/2
|En (y, s)| =
n ,y∈R
oP (1), because En is asymptotically equicontinuous with En (y, 0) = 0. Hence, the second
term in (A.5) converges to 0 in probability, too. Likewise, the convergence of the last term
to 0 follows from the asymptotic equicontinuity of En , which concludes the proof.
2
A.5
Proof of Theorem 3.4 and of Remark 3.5
For any interval I ⊂ R and constant k > 0, define the following class of differentiable
functions:
n
|d0 (x) − d0 (y)| o
1+δ
0
Ck (I) = d : I → R max sup |d(x)|, sup |d (x)|, sup
≤k .
|x − y|δ
x∈I
x∈I
x,y∈I,x6=y
22
1+δ
Then Theorem 2.7 yields P ((g̃ − g) ∈ C1/2
(In )) → 1 as n → ∞. Hence there exist random functions dn : [0, 1] → R such that dn (x) = (g̃ − g)(x) for all x ∈ In and
P dn ∈ C11+δ ([0, 1]) → 1 for n → ∞. (For instance, one may extrapolate g̃ − g linearly on
[0, hn ] and on [1 − hn , 1].)
On the space F := R × C11+δ ([0, 1]) we define the semimetric
o
n
∗
∗
∗ ∗
|F (y + γ(x)) − F (y + γ(x))| , sup |d(x)−d (x)| .
ρ((y, d), (y , d )) = max sup
sup
x∈[0,1] γ∈C 1+δ ([0,1])
x∈[0,1]
1
For ϕ = (y, d) ∈ F let
√
n
1
Znj (ϕ) :=
I{εj ≤ y + d( nj )}I{ nj ∈ In } − √ I{εj ≤ y}
mn
n
and
n
X
Gn (ϕ) :=
(Znj (ϕ) − E[Znj (ϕ)]).
j=1
Note that
Gn (y, dn )
√ X
n
n
I{εj ≤ y − g(j/n) + g̃(j/n)}I{j/n ∈ In }
=
mn j=1
√ X
n
n
√
n
1 X
I{εj ≤ y} + nF (y)
−
F (y + (g̃ − g)(j/n))I{j/n ∈ In } − √
mn j=1
n j=1
=
n
n
√
1X
1 X
n F̃n (y) −
I{εj ≤ y} −
F y + (g̃ − g)( nj ) − F (y) I{ nj ∈ In } .
n j=1
mn j=1
We will apply Theorem 2.11.9 of van der Vaart and Wellner (1996) to show that the process
(Gn (ϕ))ϕ∈F converges to a (Gaussian) limiting process. In particular, Gn is asymptotically equicontinuous, which readily yields the assertion, because supy∈R ρ((y, dn ), (y, 0)) =
supx∈[0,1] |dn (x)| = oP (1) and the variance of
n
1 X n
Gn (y, 0) = √
− 1 I{εj ≤ y}I{j/n ∈ In } − I{εj ≤ y}I{j/n 6∈ In }
n j=1 mn
tends to 0, implying that Gn (y, 0) = oP (1) uniformly in y. Thus Gn (y, dn ) = oP (1) uniformly
in y and the assertion holds.
One may proceed as in the proof of Lemma 3 in Neumeyer and Van Keilegom (2009) (see
the online supporting information to that article) to prove that the conditions of Theorem
2.11.9 of van der Vaart and Wellner (1996) are fulfilled. The proof of the first two displayed
formulas of this theorem are analogous. The only difference is that Neumeyer and Van
23
Keilegom (2009) assume a bounded error density while we use Hölder continuity of F , see
assumption (F2). Next we show that the bracketing entropy condition (i.e., the last displayed
condition in Theorem 2.11.9 of van der Vaart and Wellner, 1996) is fulfilled and that (F, ρ)
is totally bounded.
To this end, let dLm ≤ dUm , m = 1, . . . , M , be brackets for C11+δ ([0, 1]) of length η 2/(α∧1)
w.r.t. the supremum norm. According to van der Vaart and Wellner (1996), Theorem 2.7.1
and Corollary 2.7.2, M = O exp(κη −2/((1+δ)(α∧1)) ) brackets are needed. For each m define
P
L
FmL (y) := n−1 nj=1 F (y + dLm (j/n)) and choose ym,k
, k = 1, . . . , K = O(η −2 ) such that
L
L
L
L
:= −∞ and ym,K+1
:= ∞.
) < η 2 for all k ∈ {1, . . . , K + 1} with ym,0
) − FmL (ym,k−1
FmL (ym,k
U
U
L
L
U
U
Define Fm and ym,k analogously, ỹm,k := ym,k and denote by ỹm,k the smallest ym,l larger
L
than or equal to ym,k+1
. Then F is covered by
L
U
Fmk := {(y, d) ∈ F | ỹm,k
≤ y ≤ ỹm,k
, dLm ≤ d ≤ dUm },
m = 1, . . . , M, k = 1, . . . , K.
Check that by condition (F2)
sup |FmU (y) − FmL (y)| ≤ sup n−1
y∈R
y∈R
n
X
|F (y + dUm (j/n)) − F (y + dLm (j/n))|
j=1
≤ LF sup |dUm (x) − dLm (x)|α∧1 ≤ LF η 2
(A.7)
x∈R
with LF denoting the Hölder constant of F . Thus
n
i2
1X h
E
sup
I{εj ≤ y + d(j/n)} − I{εj ≤ y ∗ + d∗ (j/n)}
n j=1
(y,d),(y ∗ ,d∗ )∈Fmk
n
2
1X
U
L
E I{εj ≤ ỹm,k
≤
+ dUm (j/n)} − I{εj ≤ ỹm,k
+ dLm (j/n)}
n j=1
U
L
≤ FmU (ỹm,k
) − FmL (ỹm,k
)
U
L
L
L
L
L
≤ |FmU (ỹm,k
) − FmU (ỹm,k+1
)| + |FmU (ỹm,k+1
) − FmL (ỹm,k+1
)| + |FmL (ỹm,k+1
) − FmL (ỹm,k
)|
≤ (2 + LF )η 2
L
U
where the last step follows from (A.7) and the definitions of ỹm,k
and ỹm,k
. Hence we obtain
n
for the squared diameter of Fmk w.r.t. L2
n
h
X
E
j=1
sup
i2
|Znj (y, d) − Znj (y , d )|
∗
∗
(y,d),(y ∗ ,d∗ )∈Fmk
n
i2
n X h
∗
∗
E
sup
I{εj ≤ y + d(j/n)} − I{εj ≤ y + d (j/n)} I{j/n ∈ In }
≤ 2 2
mn j=1
(y,d),(y ∗ ,d∗ )∈Fmk
n
i2
2X h
+
E
sup
I{εj ≤ y} − I{εj ≤ y ∗ }
n j=1
(y,d),(y ∗ ,d∗ )∈Fmk
24
≤ 3(2 + LF )η 2
for sufficiently large n. This shows that the bracketing number satisfies log N[ ] (η, F, Ln2 ) =
O(log M + log K) = O η −2/((1+δ)(α∧1)) , and the last displayed condition of Theorem 2.11.9
of van der Vaart and Wellner (1996) follows from δ > 1/α − 1.
It remains to show that (F, ρ) is totally bounded, i.e. that, for all η ∈ (0, 1), the space
F can be covered by finitely many sets with ρ-diameter less than 5η. To this end, choose
dLm and dUm as above. For each m ∈ {1, . . . , M } and j ∈ {0, . . . , J := dη −1 e}, let sj :=
jη 1/(α∧1) ∧ 1 and Fjm (y) := P (ε1 ≤ y + dLm (sj )), and choose an increasing sequence yjm,k ,
k = 1, . . . , K := bη −1 c, such that Fjm (yjm,k ) − Fjm (yjm,k−1 ) < η for all k ∈ {1, . . . , K + 1}
with yjm,0 := −∞ and yjm,K+1 := ∞. Denote by ȳl , 1 ≤ l ≤ L, all points yjm,k , j ∈
{0, . . . , J}, m ∈ {1, . . . , M }, k ∈ {1, . . . , K}, in increasing order. We show that all sets
Fml := {(y, d) | ȳl−1 ≤ y ≤ ȳl , dLm ≤ d ≤ dUm } have ρ-diameter less than 5η. Check that, for
all 1 ≤ l ≤ L, one has
sup
|F (ȳl + γ(x)) − F (ȳl−1 + γ(x))|
sup
x∈[0,1] γ∈C 1+δ ([0,1])
1
≤ max
sup
max
h
|F (ȳl + γ(x)) − F (ȳl + γ(sj ))|
sup
1≤j≤J sj−1 ≤x≤sj 1≤m≤M dL ≤γ≤dU
m
m
+|F (ȳl + γ(sj )) − F (ȳl + dLm (sj ))| + |F (ȳl + dLm (sj )) − F (ȳl−1 + dLm (sj ))|
i
+|F (ȳl−1 + dLm (sj )) − F (ȳl−1 + γ(sj ))| + |F (ȳl−1 + γ(sj )) − F (ȳl−1 + γ(x))|
h
i
< max (sj − sj−1 )α∧1 + η 2 + η + η 2 + (sj − sj−1 )α∧1
1≤j≤J
≤ 5η.
Therefore, for all (y, d), (y ∗ , d∗ ) ∈ Fml
ρ((y, d), (y ∗ , d∗ ))
n
≤ max sup
sup
x∈[0,1] γ∈C 1+δ ([0,1])
|F (ȳl + γ(x)) − F (ȳl−1 + γ(x))|, sup dUm (x) − dLm (x)
o
x∈[0,1]
1
≤ max{5η, η 2/(α∧1) } = 5η,
which concludes the proof of Theorem 3.4.
If we drop the assumption δ > 1/α − 1 but require F to be Lipschitz continuous, then
we use brackets for C11+δ ([0, 1]) of length η 2 (instead of η 2/(α∧1) ) and replace (A.7) with
sup |FmU (y)
y∈R
−
FmL (y)|
−1
≤ sup n
y∈R
n
X
|F (y + dUm (j/n)) − F (y + dLm (j/n))|
j=1
≤ LF sup |dUm (x) − dLm (x)| ≤ LF η 2
x∈R
with LF denoting the Lipschitz constant of F to prove log N[ ] (η, F, Ln2 ) = O η −2/(1+δ) ,
which again yields the third condition of Theorem 2.11.9 of van der Vaart and Wellner
25
(1996). Likewise, in the last part of the proof, one defines sj := jη ∧ 1 and replaces (A.8)
with max1≤j≤J (sj − sj−1 ) + η 2 + η + η 2 + (sj − sj−1 ) ≤ 5η.
2
In the remaining proofs to Section 3, we use the index n for the estimators to emphasis
the dependence on the sample size and to distinguish between estimators and polynomials
corresponding to a given sample on the one hand and corresponding objects in a limiting
setting on the other hand.
A.6
Proof of Lemma 3.6
Proposition A.1 and the proof of Lemma A.2 show that there exist constants d, d˜ > 0
˜
depending only on β and cg such that E(ĝn (x)) ≤ dE(M
n,0 ) and P {Mn,0 > t} ≤ 1 +
dnhn
dnhn (1 − F (−t)) (F (−t))
for all t > 0.
1/α
Let an := a(log n/(nhn ))
for a suitable constant a > 0 and fix some t0 > 0 such that
α
(1 − F (−t))/(ct ) ∈ (1/2, 2) for all t ∈ (0, t0 ]. Then
E(Mn,0 )
Z ∞
P {Mn,0 > t} dt
=
0
Z t0
Z
dnhn
≤ an +
1 + dnhn (1 − F (−t)) (F (−t))
dt + (1 + dnhn )
∞
((F (−t))dnhn dt.
t0
an
Now, for sufficiently large n,
Z t0
an
≤
≤
≤
≤
=
1 + dnhn (1 − F (−t)) (F (−t))dnhn dt
Z t0
c dnhn
dt
1 + 2cdnhn tα 1 − tα
2
an
Z t0
c
(1 + 2cd)nhn
tα exp − dnhn tα dt
2
an
Z tα0
c
t0
exp − dnhn u du
(1 + 2cd)nhn
α aαn
2
2(1 + 2cd)nhn t0
c
exp − daα log n
αcdnhn
2
−ξ
o(n )
for all ξ > 0 if a is chosen sufficiently large. Hence the assertion follows from (H1) and (F3)
which imply
Z ∞
Z ∞
dnhn
dnhn
+
t−dτ nhn dt = o(n−ξ )
(F (−t))
dt ≤ nhn ((F (−t0 ))
nhn
t0
2
for all ξ > 0.
26
A.7
Proof of Theorem 3.7
As the density f is bounded and Lipschitz continuous, one has
Z (g̃n∗ −g)(j/n)
∗
∗
f (y + t) − f (y) dt
F y + (g̃n − g)(j/n)) − F (y) − f (y)(g̃n − g)(j/n) =
0
= O (g̃n∗ − g)2 (j/n)
uniformly for y ≤ y0 and j/n ∈ In . Hence the remainder term can be approximated by a
sum of estimation errors as follows:
n
n
1 X
f (y) X ∗
∗
F y + (g̃n − g)(j/n)) − F (y) I{j/n ∈ In } −
(g̃ − g)(j/n)I{j/n ∈ In }
mn j=1
mn j=1 n
n
log n 2/α
1 X ∗
2β
2
2β
= O
(g̃n − g) (j/n)I{j/n ∈ In } = OP hn + bn +
= oP (n−1/2 )
mn j=1
nhn
where for the last conclusions we have used Theorem 2.2, Lemma 3.6 and the assumptions
(H2) and (B3). Thus the assertion follows if we show that
n
1 X ∗
(g̃ − g)(j/n)I{j/n ∈ In } = oP (n−1/2 ).
mn j=1 n
To this end, note that g̃n∗ (x) and g̃n∗ (y) are independent for |x − y| > 2(hn + bn ). For
simplicity, we assume that 2n(hn + bn ) =: kn is a natural number. If we split the whole sum
into blocks with kn consecutive summands, then all blocks with odd numbers are independent
and all blocks with even numbers are independent. It suffices to show that
1
mn
bn/(2kn )c
X
∆n,2`−1 = oP (n−1/2 )
`=1
1
mn
bn/(2kn )c
X
∆n,2` = oP (n−1/2 )
`=1
P(l+2)kn −1 ∗
where ∆n,l = j=(l+1)k
(g̃n − g)(j/n), 1 ≤ ` ≤ bn/kn c. We only consider the second sum,
n
because the first convergence obviously follows by the same arguments.
It suffices to verify
(A.8)
E ∆2n,2` = o(kn )
E ∆n,2` = o n−1/2 kn = o n1/2 (hn + bn )
(A.9)
uniformly for all 1 ≤ ` ≤ bn/(2kn )c, since then
E
bn/(2k
Xn )c
`=1
∆n,2`
2
bn/(2kn )c
=
X
V ar(∆n,2` ) +
`=1
bn/(2k
Xn )c
`=1
27
E(∆n,2` )
2
= o(n),
which implies the assertion.
To prove (A.8), note that according to Lemma 3.6, Proposition A.1 and the proofs of
Lemma A.2 and of Theorem 2.7(i), there exist constants c1 , c2 , c3 > 0 (depending only on β,
cg and the kernel K) such that
log n 1/α
+ max(M1∗ , M2∗ )
sup |g̃n∗ (x) − g(x)| ≤ c1 hβn + bβn +
nhn
x∈In
where M1∗ , M2∗ are independent random variables such that P {Mi∗ > t} ≤ 1 − (1 − P {Mn,0 >
t})c2 (hn +bn )/hn with
P {Mn,0 > t} ≤ 1 + c3 nhn (1 − F (−t)) (F (−t))c3 nhn .
1/2
Because kn hβn + bβn + (log n/(nhn ))1/α = o(kn ) by (H2) and (B3), it suffices to show that
Z ∞
∗ 2
E (Mi ) =
P {Mi∗ > t1/2 } dt = o(1/kn ).
(A.10)
0
Fix some t0 ∈ (0, (2c)−2/α ) such that (1 − F (−t))/(ctα ) ∈ (1/2, 2) for all t ∈ (0, t0 ]. In
what follows, d denotes a generic constant (depending only on β, cg , c and K) which may
vary from line to line. Applying the inequalities exp(−2ρu) ≤ (1 − u)ρ ≤ exp(−ρu), which
holds for all ρ > 0 and u ∈ (0, 1/2), we obtain for (nhn / log n)−2/α < t ≤ t0 and sufficiently
large n
c (hn +bn )/hn
P {Mi∗ > t1/2 } ≤ 1 − 1 − (1 + c3 nhn 2ctα/2 )(1 − ctα/2 /2)c3 nhn 2
≤ 1 − 1 − 3c3 cnhn tα/2 exp − c3 cnhn tα/2 /2
≤ 1 − exp − dn(hn + bn )tα/2 exp − c3 cnhn tα/2 /2
≤ dn(hn + bn )tα/2 exp − c3 cnhn tα/2 /2 .
Therefore, for sufficiently large a > 0,
Z
t20
P {Mi∗ > t1/2 } dt
0
≤ a
nh −2/α
n
log n
Z
t0
tα/2−1 exp − c3 cnhn tα/2 /2 dt
+ dt0 n(hn + bn )
a(nhn / log n)−2/α
≤ o(1/(n(hn + bn ))) + dt0 n(hn + bn ) exp − c3 caα/2 log n/2
= o(1/(n(hn + bn )))
(A.11)
where in the last but one step we apply the conditions (B3) and (H2). Now, assertion
(A.10) (and hence (A.8)) follows from
Z ∞
Z ∞
h
ic2 (hn +bn )/hn
∗
1/2
1/2 c3 nhn
1 − 1 − c3 nhn (F (−t ))
dt
P {Mi > t } dt ≤
t20
t20
28
Z
∞
1/2
1 − exp − dn(hn + bn )(F (−t
Z
c3 nhn
≤ dn(hn + bn ) nhn (F (−t0 ))
+
≤
c3 nhn
))
dt
t20
∞
t−τ c3 nhn /2 dt
nhn
−ξ
= o(n )
for all ξ > 0 and sufficiently large n, where we have used (H2) and (F3).
To establish (A.9), first note that for a kernel K of order d + 1 with d := bβc
E(g̃n (x) − g(x)) = E
Z
1
ĝn (x + bn u) −
−1
Z
d
X
g (j) (x)
j=0
j!
(bn u)j K(u) du
1
=
E(ĝn (x + bn u) − g(x + bn u))K(u) du + O(bβn )
−1
uniformly for all x ∈ [hn + bn , 1 − hn − bn ]. In view of (K1), (H2) and (B3), it thus suffices
to show that
E(ĝn (x) − g(x)) − Eg≡0 (ĝn (1/2)) = E(ĝn (x) − g(x)) − Eg≡0 (ĝn (x)) = o(n−1/2 ) (A.12)
uniformly for Lebesgue almost all x ∈ [hn , 1 − hn ]. Note that the distribution of ĝn (x) does
not depend on x if g equals 0.
Recall that ĝn (x) = p̃n (0) where p̃n is a polynomial on [−1, 1] of degree d that solves the
linear optimization problem
Z 1
p̃n (t) dt → min!
−1
under the constraints
p̃n
i/n − x
hn
≥ Yi ,
∀ i ∈ [n(x − hn ), n(x + hn )].
Define polynomials
d
X
1 (k)
qx (t) :=
g (x)(hn t)k ,
k!
k=0
pn (t) := (nhn )1/α (p̃n (t) − qx (t)),
t ∈ [−1, 1].
Then qx ((u − x)/hn ) is the Taylor expansion of order d of g(u) at x and the estimation error
can be written as
ĝn (x) − g(x) = (nhn )−1/α pn (0).
(A.13)
Note that pn is a polynomial of degree d that solves the linear optimization problem
Z
1
pn (t) dt → min!
−1
29
subject to
pn
i/n − x
hn
≥ (nhn )1/α ε̄i ,
∀ i ∈ [n(x − hn ), n(x + hn )],
(A.14)
with
ε̄i := εi + g(i/n) − qx
i/n − x
hn
.
We now use point process techniques to analyze the asymptotic behavior of this linear
program.
Denote by
X
Nn :=
δ
((i/n − x)/hn , (nhn )1/α ε̄i )
i∈[n(x−hn ),n(x+hn )]
a point process of standardized error random variables. Then the constraints (A.14) can be
reformulated as Nn (Apn ) = 0 where Af := {(t, u) ∈ [−1, 1] × R | u > f (t)} denotes the open
epigraph of a function f .
Since by (H2) |ε̄i − εi | = g(in ) − qx ((i/n − x)/hn )) = O(hβn ) = o((nhn )−1/α ) uniformly
for all i ∈ [n(x − hn ), n(x + hn )], one has
E Nn ([−1, 1] × (−1, ∞))) ∼ 2nhn P ε̄1 > −(nhn )−1/α → 2c.
Therefore, Nn converges weakly to a Poisson process N on [−1, 1]×R with intensity measure
2cU[−1,1] ⊗να where να has Lebesgue density x 7→ α|x|α−1 I(−∞, 0) (see, e.g., Resnick (2007),
Theorem 6.3). By Skorohod’s representation theorem, we may assume that the convergence
holds a.s.
Next we analyze the corresponding linear program in the limiting model to minimize
R1
p(t) dt over polynomials of degree d subject to N (Ap ) = 0. In what follows we use a
−1
P
representation of the Poisson process as N = ∞
i=1 δ(Ti ,Zi ) where Ti are independent random
variables which are uniformly distributed on [−1, 1].
First we prove by contradiction that the optimal solution is almost surely unique. Suppose
that there exist more than one solution. From the theory of linear programs it is known
that then there exists a solution p such that J := {j ∈ N | p(Tj ) = Zj } has at most d
elements. Because p is bounded and N has a.s. finitely many points in any bounded set,
η := inf{|p(Ti ) − Zi | | i ∈ N \ J} > 0 a.s. Since p is an optimal solution, all polynomials ∆
R1
of degree d such that ∆(Tj ) = 0, j ∈ J, and k∆k∞ < η must satisfy −1 ∆(t) dt = 0, because
both p + ∆ and p − ∆ satisfy the constraints N (Ap±∆ ) = 0. In particular, for all polynomials
Q
q of degree d − |J|, ∆(t) = τ i∈J (t − Ti )q(t) is of that type if τ > 0 is sufficiently small.
Q
P|J|−1
Write i∈J (t − Ti ) in the form t|J| + l=0 al tl . Then necessarily
Z
1
Y
(t − Ti )tj dt =
−1 i∈J
|J|−1
X
2
2al
I{|J| + j even} +
I{l + j even} = 0,
|J| + j + 1
l
+
j
+
1
l=0
30
for all j ∈ {0, . . . d − |J|}. This implies that (Ti )i∈J lies on a manifold M|J|,d of dimension
|J| − (d − |J| + 1) = 2|J| − d − 1 which only depends on |J| and d. However, by Proposition
A.1, kpk∞ ≤ Kd Zmax where
Zmax := max min{|Zi | | Ti ∈ [−1 + (j − 1)/jd , −1 + j/jd ]}.
1≤i≤jd
The above conclusion contradicts P {Zmax > K} → 0 as K → ∞, since
P ∃J ⊂ N : |J| ≤ d, (Tj )j∈J ∈ M|J|,d , max |Zj | ≤ Kd K = 0
j∈J
for all K > 0 (i.e., the fact that among finitely many values Ti a.s. there does not exist a
subset which lies on a given manifold of lower dimension).
Therefore the solution p must be a.s. unique which in turn implies that it is a basic
feasible solution, i.e., |J| ≥ d + 1. On the other hand, because the intensity measure of N is
absolutely continuous, |J| ≤ d + 1 a.s. and thus |J| = d + 1. Because of Nn → N a.s., one
has Nn ([−1, 1] × [−Kd Zmax , ∞)) = N ([−1, 1] × [−Kd Zmax , ∞)) =: M for sufficiently large n.
Moreover, one can find a numeration of the points (Tn,i , Zn,i ), 1 ≤ i ≤ M , of Nn and (Ti , Zi ),
1 ≤ i ≤ M , of N in [−1, 1] × [−Kd Zmax , ∞) such that (Tn,i , Zn,i ) → (Ti , Zi ).
R1
Next we prove that the solution to the linear program to minimize −1 pn (t) dt subject
to Nn (Apn ) = 0 is eventually unique with pn → p a.s. Since any optimal solution can be
written as a convex combination of basic feasible solutions, w.l.o.g. we may assume that
Jn := {1 ≤ i ≤ M | pn (Tn,i ) = Zn,i } has at least d + 1 elements. The polynomial pn is
uniquely determined by this set Jn . Suppose that along a subsequence n0 the set Jn0 is
constant, but not equal to J. Then p0n converges uniformly to the polynomial p̄ of degree
d that is uniquely determined by the conditions p̄(Ti ) = Zi for all i ∈ Jn0 . In particular,
p̄ is different from the unique optimal polynomial p for the limit Poisson process, but it
R1
R1
satisfies the constraints N (Ap ) = 0. Thus −1 p̄(t) dt > −1 p(t) dt. On the other hand, for
all η > 0 the polynomial p + η eventually satisfies the constraints Nn (Ap+η ) = 0 and thus
R1
R1
p(t)
+
η
dt
≥
p̄ (t) dt, which leads to a contradiction.
−1
−1 n
Hence, Jn = J for all sufficiently large n and the optimal solution pn for Nn is unique and
it converges uniformly to the optimal solution p for the Poisson process N . Moreover, using
the relation (pn (Tn,j ))j∈J = (Zn,j )j∈J (which is a system of linear equation in the coefficients
of pn ), pn (0) can be calculated as wnt (Zn,j )j∈J for some vector wn which converges to a limit
vector w (corresponding to the analogous relation for p).
Exactly the same arguments apply if we replace ε̄i with εi , which corresponds to the
case that g is identical 0. Since the points (T̃n,i , Z̃n,i ) of the pertaining point process equal
Tn,i , Zn,i − (nhn )1/α (g(i/n) − qx ((i/n) − x)/hn ) and thus |Z̃n,i − Zn,i | ≤ cg (nhn )1/α hβn , the
difference of the resulting values for optimal polynomial at 0 is bounded by a multiple of
(nhn )1/α hβn . In view of (A.13) and (H2), we may conclude that the difference between the
estimation errors can be bounded by a multiple of hβn = o(n−1/2 ), which finally yields (A.12)
and thus the assertion.
2
31
A.8
Proof of Corollary 4.3
bnsc
√ (Fbnsc (y)−Fn (y)) = En (y, s)−
En (y, 1) with En defined in (A.4). A similar
Note that bnsc
n
n
reasoning as in the proof of Theorem 3.1 (see (A.6)) shows that
ns̄
bnsc
n
sup
− 1 √ (Fbnsc (y) − Fn (y)) = oP (1).
bnsc
n
y∈R,s∈[0,1]
Hence, by Theorem 3.1, uniformly for all y ∈ R, s ∈ [0, 1],
√
n(F̂n (y, s) − s̄n F̂n (y))
√
√
√
= n(F̂n (y, s) − s̄n Fbnsc (y)) − s̄n n((F̂n (y) − Fn (y))) + s̄n n(Fbnsc (y) − Fn (y))
=
=
ns̄n bnsc
√ (Fbnsc (y) − Fn (y)) + oP (1)
bnsc n
En (y, 1) + oP (1)
En (y, s) − bnsc
n
= En (y, s) − sEn (y, 1) + oP (1)
which converges weakly to KF (y, s)−sKF (y, 1) for the Kiefer process KF defined in Theorem
3.1. Check that this Gaussian process has the same law as G(s, F (y)), because they have
the same covariance function. Thus the Kolmogorov-Smirnov statistic Tn converges weakly
to sups∈[0,1],y∈R |G(s, F (y)| = sups∈[0,1],z∈[0,1] |G(s, z)|, where the last equality holds by the
continuity of F .
2
A.9
Proof of Theorem 4.4
Note that under the given assumptions, the statements of Theorem 2.7 (i) and (ii) are valid
with rate oP (1). Let Ωn := {inf x∈In g̃ 0 (x) > 0}. From assumption (I1) and Theorem 2.7 (ii)
it follows that P (Ωn ) → 1 for n → ∞. But on Ωn the estimators g̃I and g̃ are identical,
and thus F̃I,bnsc = F̃bnsc . Now (4.1) can be concluded as in the proof of Theorem 3.1,
because Theorem 2.7 (i) yields supx∈In |g̃(x) − g(x)| = oP (n−1/(2(α∧1)) ). The convergence of
the Kolmogorov-Smirnov test statistic then follows exactly as in the proof of Corollary 4.3.
2
Acknowledgement
Financial support by the DFG (Research Unit FOR 1735 Structural Inference in Statistics:
Adaptation and Effciency) is gratefully acknowledged.
References
Akritas, M. and Van Keilegom, I. (2001). Nonparametric estimation of the residual distribution. Scand. J. Statist. 28, 549–567.
32
Anevski, D. and Fougères, A.-L. (2007). Limit properties of the monotone rearrangement
for density and regression function estimation. arXiv:0710.4617v1
Birke, M. and Neumeyer, N. (2013). Testing Monotonicity of Regression Functions - An
Empirical Process Approach. Scand. J. Statist. 40, 438–454.
Birke, M., Neumeyer, N. and Volgushev, S. (2016+). The independence process in conditional quantile location-scale models and an application to testing for monotonicity.
Statistica Sinica, to appear.
Chernozhukov, V., Fernández-Val, I. and Galichon, A. (2009). Improving point and interval
estimators of monotone functions by rearrangement. Biometrika 96, 559–575.
Daouia, A., Noh, H. and Park, B. U. (2016). Data envelope fitting with constrained polynomial splines. J. R. Stat. Soc. B. 78, 3–30.
Einmahl, J. H. J. and Van Keilegom, I. (2008). Specification tests in nonparametric regression. Journal of Econometrics 143, 88–102.
Färe, R. and Grosskopf, S. (1983). Measuring output efficiency. European Journal of
Operational Research 13, 173–179.
Gijbels, I. (2005). Monotone regression. In: N. Balakrishnan, S. Kotz, C.B. Read and B.
Vadakovic (eds), The Encyclopedia of Statistical Sciences, 2nd edition. Hoboken, NJ:
Wiley.
Gijbels, I., Mammen, E., Park, B. and Simar, L. (2000). On estimation of monotone and
concave frontier functions. J. Amer. Statist. Assoc. 94, 220–228.
Gijbels, I. and Peng, L. (2000). Estimation of a support curve via order statistics. Extremes
3, 251–277.
Girard, S. and Jacob, P. (2008). Frontier estimation via kernel regression on high powertransformed data. J. Multivariate Anal. 99, 403–420.
Girard, S., Guillou, A. and Stupfler, G. (2013). Frontier estimation with kernel regression
on high order moments. J. Multivariate Anal. 116, 172–189.
Hall, P., Park, B.U. and Stern, S.E. (1998). On polynomial estimators of frontiers and
boundaries. J. Multivariate Anal. 66, 71–98.
Hall, P. and Van Keilegom, I. (2009). Nonparametric “regression” when errors are positioned at end-points. Bernoulli 15, 614–633.
33
Härdle, W., Park, B.U. and Tsybakov, A.B. (1995). Estimation of non-sharp support
boundaries. J. Multivariate Anal. 55, 205–218.
Jirak, M., Meister, A. and Reiß, M. (2014). Adaptive estimation in nonparametric regression with one-sided errors. Ann. Statist. 42, 1970–2002.
Meister, A. and Reiß, M. (2013). Asymptotic equivalence for nonparametric regression with
non-regular errors. Probab. Th. Rel. Fields 155, 201–229.
Müller, U.U. and Wefelmeyer W. (2010). Estimation in Nonparametric Regression with
Non-Regular Errors. Comm. Statist. Theory Methods 39, 1619–1629.
Neumeyer, N. and Van Keilegom, I. (2009). Change-Point Tests for the Error Distribution
in Nonparametric Regression. Scand. J. Statist. 36, 518–541.
online supporting information available at
http://onlinelibrary.wiley.com/doi/10.1111/j.1467-9469.2009.00639.x/suppinfo
Picard, D. (1985). Testing and estimating change-points in time series. Adv. Appl. Probab.
17, 841–867.
Reiß, M. and Selk, L. (2016+). Efficient nonparametric functional estimation for one-sided
regression. Bernoulli, to appear.
Resnick, S.I. (2007). Heavy-Tail Phenomena. Springer.
Simar, L. and Wilson, P.W. (1998). Sensitivity analysis of efficiency scores: how to bootstrap in nonparametric frontier models. Management Science 44, 49–61.
Stephens, M.A. (1976). Asymptotic Results for Goodness-of-Fit Statistics with Unknown
Parameters. Ann. Statist. 4, 357–369.
van der Vaart, A.W. (2000). Asymptotic Statistics. Cambridge University Press.
van der Vaart, A. W. and Wellner, J. A. (1996). Weak Convergence and Empirical Processes. Springer, New York.
Wilson, P.W. (2003). Testing independence in models of productive efficiency. Journal of
Productivity Analysis 20, 361–390.
34
| 10math.ST
|
Published as a conference paper at ICLR 2018
arXiv:1703.02000v7 [cs.LG] 30 Jan 2018
ACTIVATION M AXIMIZATION G ENERATIVE A DVER SARIAL N ETS
Yuxuan Song, Kan Ren
Shanghai Jiao Tong University
songyuxuan,[email protected]
Zhiming Zhou, Han Cai
Shanghai Jiao Tong University
heyohai,[email protected]
Shu Rong
Yitu Tech
[email protected]
Jun Wang
University College London
[email protected]
Weinan Zhang, Yu Yong
Shanghai Jiao Tong University
[email protected], [email protected]
A BSTRACT
Class labels have been empirically shown useful in improving the sample quality
of generative adversarial nets (GANs). In this paper, we mathematically study the
properties of the current variants of GANs that make use of class label information.
With class aware gradient and cross-entropy decomposition, we reveal how class
labels and associated losses influence GAN’s training. Based on that, we propose
Activation Maximization Generative Adversarial Networks (AM-GAN) as an advanced solution. Comprehensive experiments have been conducted to validate our
analysis and evaluate the effectiveness of our solution, where AM-GAN outperforms other strong baselines and achieves state-of-the-art Inception Score (8.91)
on CIFAR-10. In addition, we demonstrate that, with the Inception ImageNet
classifier, Inception Score mainly tracks the diversity of the generator, and there is,
however, no reliable evidence that it can reflect the true sample quality. We thus
propose a new metric, called AM Score, to provide more accurate estimation on
the sample quality. Our proposed model also outperforms the baseline methods in
the new metric.
1
I NTRODUCTION
Generative adversarial nets (GANs) (Goodfellow et al., 2014) as a new way for learning generative
models, has recently shown promising results in various challenging tasks, such as realistic image
generation (Nguyen et al., 2016b; Zhang et al., 2016; Gulrajani et al., 2017), conditional image
generation (Huang et al., 2016b; Cao et al., 2017; Isola et al., 2016), image manipulation (Zhu et al.,
2016) and text generation (Yu et al., 2016).
Despite the great success, it is still challenging for the current GAN models to produce convincing
samples when trained on datasets with high variability, even for image generation with low resolution,
e.g., CIFAR-10. Meanwhile, people have empirically found taking advantages of class labels can
significantly improve the sample quality.
There are three typical GAN models that make use of the label information: CatGAN (Springenberg,
2015) builds the discriminator as a multi-class classifier; LabelGAN (Salimans et al., 2016) extends
the discriminator with one extra class for the generated samples; AC-GAN (Odena et al., 2016) jointly
trains the real-fake discriminator and an auxiliary classifier for the specific real classes. By taking
the class labels into account, these GAN models show improved generation quality and stability.
However, the mechanisms behind them have not been fully explored (Goodfellow, 2016).
In this paper, we mathematically study GAN models with the consideration of class labels. We derive
the gradient of the generator’s loss w.r.t. class logits in the discriminator, named as class-aware
gradient, for LabelGAN (Salimans et al., 2016) and further show its gradient tends to guide each
generated sample towards being one of the specific real classes. Moreover, we show that AC-GAN
(Odena et al., 2016) can be viewed as a GAN model with hierarchical class discriminator. Based on
1
Published as a conference paper at ICLR 2018
the analysis, we reveal some potential issues in the previous methods and accordingly propose a new
method to resolve these issues.
Specifically, we argue that a model with explicit target class would provide clearer gradient guidance
to the generator than an implicit target class model like that in (Salimans et al., 2016). Comparing
with (Odena et al., 2016), we show that introducing the specific real class logits by replacing the
overall real class logit in the discriminator usually works better than simply training an auxiliary
classifier. We argue that, in (Odena et al., 2016), adversarial training is missing in the auxiliary
classifier, which would make the model more likely to suffer mode collapse and produce low quality
samples. We also experimentally find that predefined label tends to result in intra-class mode collapse
and correspondingly propose dynamic labeling as a solution. The proposed model is named as
Activation Maximization Generative Adversarial Networks (AM-GAN). We empirically study the
effectiveness of AM-GAN with a set of controlled experiments and the results are consistent with our
analysis and, note that, AM-GAN achieves the state-of-the-art Inception Score (8.91) on CIFAR-10.
In addition, through the experiments, we find the commonly used metric needs further investigation.
In our paper, we conduct a further study on the widely-used evaluation metric Inception Score
(Salimans et al., 2016) and its extended metrics. We show that, with the Inception Model, Inception
Score mainly tracks the diversity of generator, while there is no reliable evidence that it can measure
the true sample quality. We thus propose a new metric, called AM Score, to provide more accurate
estimation on the sample quality as its compensation. In terms of AM Score, our proposed method
also outperforms other strong baseline methods.
The rest of this paper is organized as follows. In Section 2, we introduce the notations and formulate
the LabelGAN (Salimans et al., 2016) and AC-GAN∗ (Odena et al., 2016) as our baselines. We
then derive the class-aware gradient for LabelGAN, in Section 3, to reveal how class labels help its
training. In Section 4, we reveal the overlaid-gradient problem of LabelGAN and propose AM-GAN
as a new solution, where we also analyze the properties of AM-GAN and build its connections to
related work. In Section 5, we introduce several important extensions, including the dynamic labeling
as an alternative of predefined labeling (i.e., class condition), the activation maximization view and
a technique for enhancing the AC-GAN∗ . We study Inception Score in Section 6 and accordingly
propose a new metric AM Score. In Section 7, we empirically study AM-GAN and compare it to the
baseline models with different metrics. Finally we conclude the paper and discuss the future work in
Section 8.
2
P RELIMINARIES
In the original GAN formulation (Goodfellow et al., 2014), the loss functions of the generator G and
the discriminator D are given as:
Lori
G = −Ez∼pz (z) [log Dr (G(z))] , −Ex∼G [log Dr (x)],
Lori
D = −Ex∼pdata [log Dr (x)] − Ex∼G [log(1 − Dr (x))],
(1)
where D performs binary classification between the real and the generated samples and Dr (x)
represents the probability of the sample x coming from the real data.
2.1
L ABEL GAN
The framework (see Eq. (1)) has been generalized to multi-class case where each sample x has
its associated class label y ∈ {1, . . ., K, K+1}, and the K+1th label corresponds to the generated
samples (Salimans et al., 2016). Its loss functions are defined as:
Llab
G = − Ex∼G [log
Llab
D
PK
, −Ex∼G [log Dr (x)],
(2)
= − E(x,y)∼pdata [log Dy (x)] − Ex∼G [log DK+1 (x)],
(3)
i=1 Di (x)]
where Di (x) denotes the probability of the sample x being class i. The loss can be written in the
form of cross-entropy, which will simplify our later analysis:
Llab
G = Ex∼G [H([1, 0], [Dr (x), DK+1 (x)])],
(4)
Llab
D
(5)
= E(x,y)∼pdata [H(v(y), D(x))] + Ex∼G [H(v(K+1), D(x))],
where D(x) = [D1 (x), D2 (x), ..., DK+1 (x)] and v(y) = [v1 (y), . . . , vK+1
P (y)] with vi (y) = 0 if i 6=
y and vi (y) = 1 if i = y. H is the cross-entropy, defined as H(p, q)=− i pi log qi . We would refer
the above model as LabelGAN (using class labels) throughout this paper.
2
Published as a conference paper at ICLR 2018
AC-GAN∗
2.2
Besides extending the original two-class discriminator as discussed in the above section, Odena et al.
(2016) proposed an alternative approach, i.e., AC-GAN, to incorporate class label information, which
introduces an auxiliary classifier C for real classes in the original GAN framework. With the core
idea unchanged, we define a variant of AC-GAN as the following, and refer it as AC-GAN∗ :
Lac
G (x, y) = E(x,y)∼G H [1, 0], [Dr (x), Df (x)]
+ E(x,y)∼G H u(y), C(x) ,
Lac
+ E(x,y)∼G H [0, 1], [Dr (x), Df (x)]
D (x, y) = E(x,y)∼pdata H [1, 0], [Dr (x), Df (x)]
+ E(x,y)∼pdata H u(y), C(x) ,
(6)
(7)
(8)
(9)
where Dr (x) and Df (x) = 1 − Dr (x) are outputs of the binary discriminator which are the same as
vanilla GAN, u(·) is the vectorizing operator that is similar to v(·) but defined with K classes, and
C(x) is the probability distribution over K real classes given by the auxiliary classifier.
In AC-GAN, each sample has a coupled target class y, and a loss on the auxiliary classifier w.r.t. y is
added to the generator to leverage the class label information. We refer the losses on the auxiliary
classifier, i.e., Eq. (7) and (9), as the auxiliary classifier losses.
The above formulation is a modified version of the original AC-GAN. Specifically, we omit the
auxiliary classifier loss E(x,y)∼G [H(u(y), C(x))] which encourages the auxiliary classifier C to
classify the fake sample x to its target class y. Further discussions are provided in Section 5.3. Note
that we also adopt the − log(Dr (x)) loss in generator.
3
C LASS -AWARE G RADIENT
In this section, we introduce the class-aware gradient, i.e., the gradient of the generator’s loss w.r.t.
class logits in the discriminator. By analyzing the class-aware gradient of LabelGAN, we find that the
gradient tends to refine each sample towards being one of the classes, which sheds some light on how
the class label information helps the generator to improve the generation quality. Before delving into
the details, we first introduce the following lemma on the gradient properties of the cross-entropy
loss to make our analysis clearer.
Lemma 1. With l being the logits vector and σ being the softmax function, let σ(l) be the current
softmax probability distribution and p̂ denote the target probability distribution, then
−
∂H p̂, σ(l)
= p̂ − σ(l).
∂l
(10)
For a generated sample x, the loss in LabelGAN is Llab
G (x) = H([1, 0], [Dr (x), DK+1 (x)]), as
defined in Eq. (4). With Lemma 1, the gradient of Llab
(x)
w.r.t. the logits vector l(x) is given as:
G
Dk (x)
∂H [1, 0], [Dr (x), DK+1 (x)] ∂lr (x)
∂Llab
G (x)
−
=−
= 1 − Dr (x)
, k ∈ {1, . . . , K},
∂lk (x)
∂lr (x)
∂lk (x)
Dr (x)
∂H [1, 0], [Dr (x), DK+1 (x)]
∂Llab
G (x)
−
=−
= 0 − DK+1 (x) = − 1 − Dr (x) .
(11)
∂lK+1 (x)
∂lK+1 (x)
With the above equations, the gradient of Llab
G (x) w.r.t. x is:
K
−
X ∂Llab (x) ∂lk (x)
∂Llab
∂Llab
G (x)
G (x) ∂lK+1 (x)
=
− G
−
∂x
∂lk (x) ∂x
∂lK+1 (x)
∂x
k=1
K
X lab
X
K+1
Dk (x) ∂lk (x)
∂lK+1 (x)
∂lk (x)
= 1 − Dr (x)
−
= 1 − Dr (x)
αk (x)
,
Dr (x) ∂x
∂x
∂x
k=1
(12)
k=1
where
(D
αklab (x)
=
k (x)
Dr (x)
k ∈ {1, . . . , K}
−1
k = K+1
3
.
(13)
Published as a conference paper at ICLR 2018
Class 1
Class 2
Final Gradient
Gradient 1
Gradient 2
Generated Sample
Figure 1: An illustration of the overlaid-gradient problem. When two or more classes are encouraged
at the same time, the combined gradient may direct to none of these classes. It could be addressed by
assigning each generated sample a specific target class instead of the overall real class.
From the formulation, we find that the overall gradient w.r.t. a generated example x is 1−Dr (x),
which is the same as that in vanilla GAN (Goodfellow et al., 2014). And the gradient on real classes
is further distributed to each specific real class logit lk (x) according to its current probability ratio
Dk (x)
Dr (x) .
As such, the gradient naturally takes the label information into consideration: for a generated sample,
higher probability of a certain class will lead to a larger step towards the direction of increasing the
corresponding confidence for the class. Hence, individually, the gradient from the discriminator for
each sample tends to refine it towards being one of the classes in a probabilistic sense.
That is, each sample in LabelGAN is optimized to be one of the real classes, rather than simply to be
real as in the vanilla GAN. We thus regard LabelGAN as an implicit target class model. Refining
each generated sample towards one of the specific classes would help improve the sample quality.
Recall that there are similar inspirations in related work. Denton et al. (2015) showed that the result
could be significantly better if GAN is trained with separated classes. And AC-GAN (Odena et al.,
2016) introduces an extra loss that forces each sample to fit one class and achieves a better result.
4
T HE P ROPOSED M ETHOD
In LabelGAN, the generator gets its gradients from the K specific real class logits in discriminator
and tends to refine each sample towards being one of the classes. However, LabelGAN actually
suffers from the overlaid-gradient problem: all real class logits are encouraged at the same time.
Though it tends to make each sample be one of these classes during the training, the gradient of each
sample is a weighted averaging over multiple label predictors. As illustrated in Figure 1, the averaged
gradient may be towards none of these classes.
In multi-exclusive classes setting, each valid sample should only be classified to one of classes by
the discriminator with high confidence. One way to resolve the above problem is to explicitly assign
each generated sample a single specific class as its target.
4.1
AM-GAN
Assigning each sample a specific target class y, the loss functions of the revised-version LabelGAN
can be formulated as:
Lam
G = E(x,y)∼G [H(v(y), D(x))],
(14)
Lam
D
(15)
= E(x,y)∼pdata [H(v(y), D(x))] + Ex∼G [H(v(K+1), D(x))],
where v(y) is with the same definition as in Section 2.1. The model with aforementioned formulation
is named as Activation Maximization Generative Adversarial Networks (AM-GAN) in our paper.
And the further interpretation towards naming will be in Section 5.2. The only difference between
AM-GAN and LabelGAN lies in the generator’s loss function. Each sample in AM-GAN has a
specific target class, which resolves the overlaid-gradient problem.
AC-GAN (Odena et al., 2016) also assigns each sample a specific target class, but we will show that
the AM-GAN and AC-GAN are substantially different in the following part of this section.
4
Published as a conference paper at ICLR 2018
Figure 2: AM-GAN (left) v.s. AC-GAN∗ (right). AM-GAN can be viewed as a combination of
LabelGAN and auxiliary classifier, while AC-GAN∗ is a combination of vanilla GAN and auxiliary
classifier. AM-GAN can naturally conduct adversarial training among all the classes, while in
AC-GAN∗ , adversarial training is only conducted at the real-fake level and missing in the auxiliary
classifier.
4.2
L ABEL GAN + AUXILIARY C LASSIFIER
Both LabelGAN and AM-GAN are GAN models with K+1 classes. We introduce the following
cross-entropy decomposition lemma to build their connections to GAN models with two classes and
the K-classes models (i.e., the auxiliary classifiers).
PK
Lemma 2. Given v = [v1 , . . . , vK+1 ], v1:K , [v1 , . . . , vK ], vr ,
k=1 vk , R(v) , v1:K /vr and
F (v) , [vr , vK+1 ], let p̂ = [p̂1 , . . . , p̂K+1 ], p = [p1 , . . . , pK+1 ], then we have
H p̂, p = p̂r H R(p̂), R(p) + H F (p̂), F (p) .
(16)
With Lemma 2, the loss function of the generator in AM-GAN can be decomposed as follows:
Lam
+ H F v(x) , F D(x) .
G (x) = H v(x), D(x) = vr (x) · H R v(x) , R D(x)
|
{z
}
{z
}
|
Auxiliary Classifier G Loss
(17)
LabelGAN G Loss
The second term of Eq. (17) actually equals to the loss function of the generator in LabelGAN:
H F v(x) , F D(x) = H 1, 0 , Dr (x), DK+1 (x) = Llab
G (x).
(18)
Similar analysis can be adapted to the first term and the discriminator. Note that vr (x) equals to
one. Interestingly, we find by decomposing the AM-GAN losses, AM-GAN can be viewed as a
combination of LabelGAN and auxiliary classifier (defined in Section 2.2). From the decomposition
perspective, disparate to AM-GAN, AC-GAN is a combination of vanilla GAN and the auxiliary
classifier.
The auxiliary classifier loss in Eq. (17) can also be viewed as the cross-entropy version of generator
loss in CatGAN: the generator of CatGAN directly optimizes entropy H(R(D(x))) to make each
sample have a high confidence of being one of the classes, while AM-GAN achieves this by the
first term of its decomposed loss H(R(v(x)), R(D(x))) in terms of cross-entropy with given target
distribution. That is, the AM-GAN is the combination of the cross-entropy version of CatGAN and
LabelGAN. We extend the discussion between AM-GAN and CatGAN in the Appendix B.
4.3
N ON -H IERARCHICAL M ODEL
With the Lemma 2, we can also reformulate the AC-GAN∗ as a K+1 classes model. Take the
generator’s loss function as an example:
Lac
G (x, y) = E(x,y)∼G H [1, 0], [Dr (x), Df (x)] + H u(y), C(x)
= E(x,y)∼G H v(y), [Dr (x) · C(x), Df (x)] .
(19)
In the K+1 classes model, the K+1 classes distribution is formulated as [Dr (x) · C(x), Df (x)].
AC-GAN introduces the auxiliary classifier in the consideration of leveraging the side information
5
Published as a conference paper at ICLR 2018
of class label, it turns out that the formulation of AC-GAN∗ can be viewed as a hierarchical K+1
classes model consists of a two-class discriminator and a K-class auxiliary classifier, as illustrated in
Figure 2. Conversely, AM-GAN is a non-hierarchical model. All K+1 classes stay in the same level
of the discriminator in AM-GAN.
In the hierarchical model AC-GAN∗ , adversarial training is only conducted at the real-fake twoclass level, while misses in the auxiliary classifier. Adversarial training is the key to the theoretical
guarantee of global convergence pG = pdata . Taking the original GAN formulation as an instance, if
generated samples collapse to a certain point x, i.e., pG (x) > pdata (x), then there must exit another
pdata (x)
point x0 with pG (x0 ) < pdata (x0 ). Given the optimal D(x) = pG (x)+p
, the collapsed point x will
data (x)
get a relatively lower score. And with the existence of higher score points (e.g. x0 ), maximizing the
generator’s expected score, in theory, has the strength to recover from the mode-collapsed state. In
practice, the pG and pdata are usually disjoint (Arjovsky & Bottou, 2017), nevertheless, the general
behaviors stay the same: when samples collapse to a certain point, they are more likely to get a
relatively lower score from the adversarial network.
Without adversarial training in the auxiliary classifier, a mode-collapsed generator would not get any
penalties from the auxiliary classifier loss. In our experiments, we find AC-GAN is more likely to
get mode-collapsed, and it was empirically found reducing the weight (such as 0.1 used in Gulrajani
et al. (2017)) of the auxiliary classifier losses would help. In Section 5.3, we introduce an extra
adversarial training in the auxiliary classifier with which we improve AC-GAN∗ ’s training stability
and sample-quality in experiments. On the contrary, AM-GAN, as a non-hierarchical model, can
naturally conduct adversarial training among all the class logits.
5
5.1
E XTENSIONS
DYNAMIC L ABELING
In the above section, we simply assume each generated sample has a target class. One possible solution
is like AC-GAN (Odena et al., 2016), predefining each sample a class label, which substantially
results in a conditional GAN. Actually, we could assign each sample a target class according to its
current probability estimated by the discriminator. A natural choice could be the class which is of the
maximal probability currently: y(x) , argmaxi∈{1,...,K} Di (x) for each generated sample x. We
name this dynamic labeling.
According to our experiments, dynamic labeling brings important improvements to AM-GAN, and is
applicable to other models that require target class for each generated sample, e.g. AC-GAN, as an
alternative to predefined labeling.
We experimentally find GAN models with pre-assigned class label tend to encounter intra-class mode
collapse. In addition, with dynamic labeling, the GAN model remains generating from pure random
noises, which has potential benefits, e.g. making smooth interpolation across classes in the latent
space practicable.
5.2
T HE ACTIVATION M AXIMIZATION V IEW
Activation maximization is a technique which is traditionally applied to visualize the neuron(s) of
pretrained neural networks (Nguyen et al., 2016a;b; Erhan et al., 2009).
The GAN training can be viewed as an Adversarial Activation Maximization Process. To be more
specific, the generator is trained to perform activation maximization for each generated sample on
the neuron that represents the log probability of its target class, while the discriminator is trained to
distinguish generated samples and prevents them from getting their desired high activation.
It is worth mentioning that the sample that maximizes the activation of one neuron is not necessarily
of high quality. Traditionally people introduce various priors to counter the phenomenon (Nguyen
et al., 2016a;b). In GAN, the adversarial process of GAN training can detect unrealistic samples
and thus ensures the high-activation is achieved by high-quality samples that strongly confuse the
discriminator.
We thus name our model the Activation Maximization Generative Adversarial Network (AM-GAN).
6
Published as a conference paper at ICLR 2018
5.3
AC-GAN∗+
Experimentally we find AC-GAN easily get mode collapsed and a relatively low weight for the
auxiliary classifier term in the generator’s loss function would help. In the Section 4.3, we attribute
mode collapse to the miss of adversarial training in the auxiliary classifier. From the adversarial
activation maximization view: without adversarial training, the auxiliary classifier loss that requires
high activation on a certain class, cannot ensure the sample quality.
That is, in AC-GAN, the vanilla GAN loss plays the role for ensuring sample quality and avoiding
mode collapse. Here we introduce an extra loss to the auxiliary classifier in AC-GAN∗ to enforce
adversarial training and experimentally find it consistently improve the performance:
Lac+
D (x, y) = E(x,y)∼G H u(·), C(x) ,
(20)
where u(·) represents the uniform distribution, which in spirit is the same as CatGAN (Springenberg,
2015).
Recall that we omit the auxiliary classifier loss E(x,y)∼G H u(y)] in AC-GAN∗ . According to our
experiments, E(x,y)∼G [H(u(y)] does improve AC-GAN∗ ’s stability and make it less likely to get
mode collapse, but it also leads to a worse Inception Score. We will report the detailed results in
Section 7. Our understanding on this phenomenon is that: by encouraging the auxiliary classifier also
to classify fake samples to their target classes, it actually reduces the auxiliary classifier’s ability on
providing gradient guidance towards the real classes, and thus also alleviates the conflict between the
GAN loss and the auxiliary classifier loss.
6
E VALUATION M ETRICS
One of the difficulties in generative models is the evaluation methodology (Theis et al., 2015). In this
section, we conduct both the mathematical and the empirical analysis on the widely-used evaluation
metric Inception Score (Salimans et al., 2016) and other relevant metrics. We will show that Inception
Score mainly works as a diversity measurement and we propose the AM Score as a compensation to
Inception Score for estimating the generated sample quality.
6.1
I NCEPTION S CORE
As a recently proposed metric for evaluating the performance of generative models, Inception Score
has been found well correlated with human evaluation (Salimans et al., 2016), where a publiclyavailable Inception model C pre-trained on ImageNet is introduced. By applying the Inception
model to each generated sample x and getting the corresponding class probability distribution C(x),
Inception Score is calculated via
Inception Score = exp Ex KL C(x) k C̄ G
,
(21)
where Ex is short of Ex∼G and C̄ G = Ex [C(x)] is the overall probability distribution of the generated
samples over classes, which
is judged by C,and KL denotes the Kullback-Leibler divergence. As
proved in Appendix D, Ex KL C(x) k C̄ G can be decomposed into two terms in entropy:
Ex KL(C(x) k C̄ G ) = H(C̄ G ) + (−Ex H C(x) ).
6.2
(22)
T HE P ROPERTIES OF I NCEPTION M ODEL
A common understanding of how Inception Score works lies in that a high score in the first term
H(C̄ G ) indicates the generated samples have high diversity (the overall class probability distribution
evenly distributed), and a high score in the second term −Ex [H(C(x))] indicates that each individual
sample has high quality (each generated sample’s class probability distribution is sharp, i.e., it can be
classified into one of the real classes with high confidence) (Salimans et al., 2016).
However, taking CIFAR-10 as an illustration, the data are not evenly distributed over the classes
under the Inception model trained on ImageNet, which is presented in Figure 4a. It makes Inception
Score problematic in the view of the decomposed scores, i.e., H(C̄ G ) and −Ex [H(C(x))]. Such as
that one would ask whether a higher H(C̄ G ) indicates a better mode coverage and whether a smaller
H(C(x)) indicates a better sample quality.
7
5.80
5.75
E[H(C(x))]
9.0
8.5
8.0
7.5
7.0
6.5
6.0
5.5
5.00
H(C̄ G )
Inception Score
Published as a conference paper at ICLR 2018
5.70
5.65
5.60
0 10 20 30 40 50 60 70 80
Iterations
10 20 30 40 50 60 70 80
Iterations
(a)
4.1
4.0
3.9
3.8
3.7
3.6
3.5
3.40 10 20 30 40 50 60 70 80
Iterations
(b)
(c)
200
400 600 800
ImageNet Classes
(a)
1000
2000
5000
1500
4000
Number of Samples
0.08
0.07
0.06
0.05
0.04
0.03
0.02
0.01
0.000
Number of Samples
Avg Probability Density
Figure 3: Training curves of Inception Score and its decomposed terms. a) Inception Score, i.e.
exp(H(C̄ G ) − Ex [H(C(x))]); b) H(C̄ G ); c) Ex [H(C(x))]. A common understanding of Inception
Score is that: the value of H(C̄ G ) measures the diversity of generated samples and is expected to
increase in the training process. However, it usually tends to decrease in practice as illustrated in (c).
1000
500
00
1
2
3
4
5
6
H(C(x)) with ImageNet Classifier
7
(b)
airplane
automobile
bird
cat
deer
dog
frog
horse
ship
truck
3000
2000
1000
0
0.00
0.01 0.02 0.03 0.04 0.05
H(C(x)) with CIFAR-10 Classifier
(c)
Figure 4: Statistics of the CIFAR-10 training images. a) C̄ G over ImageNet classes; b) H(C(x))
distribution with ImageNet classifier of each class; c) H(C(x)) distribution with CIFAR-10 classifier
of each class. With the Inception model, the value of H(C(x)) score of CIFAR-10 training data is
variant, which means, even in real data, it would still strongly prefer some samples than some others.
H(C(x)) on a classifier that pre-trained on CIFAR-10 has low values for all CIFAR-10 training data
and thus can be used as an indicator of sample quality.
We experimentally find that, as in Figure 3b, the value of H(C̄ G ) is usually going down during
the training process, however, which is expected to increase. And when we delve into the detail of
H(C(x)) for each specific sample in the training data, we find the value of H(C(x)) score is also
variant, as illustrated in Figure 4b, which means, even in real data, it would still strongly prefer some
samples than some others. The exp operator in Inception Score and the large variance of the value of
H(C(x)) aggravate the phenomenon. We also observe the preference on the class level in Figure 4b,
e.g., Ex [H(C(x))]=2.14 for trucks, while Ex [H(C(x))]=3.80 for birds.
It seems, for an ImageNet Classifier, both the two indicators of Inception Score cannot work correctly.
Next we will show that Inception Score actually works as a diversity measurement.
6.3
I NCEPTION S CORE AS A D IVERSITY M EASUREMENT
Since the two individual indicators are strongly correlated, here we go back to Inception Score’s
original formulation Ex [KL(C(x) k C̄ G )]. In this form, we could interpret Inception Score as that it
requires each sample’s distribution C(x) highly different from the overall distribution of the generator
C̄ G , which indicates a good diversity over the generated samples.
As is empirically observed, a mode-collapsed generator usually gets a low Inception Score. In an
extreme case, assuming all the generated samples collapse to a single point, then C(x)=C G and we
would get the minimal Inception Score 1.0, which is the exp result of zero. To simulate mode collapse
in a more complicated case, we design synthetic experiments as following: given a set of N points
{x0 , x1 , x2 , ..., xN −1 }, with each point xi adopting the distribution C(xi ) = v(i) and representing
class i, where v(i) is the vectorization operator of length N , as defined in Section 2.1, we randomly
drop m points, evaluate Ex [KL(C(x) k C̄ G )] and draw the curve. As is showed in Figure 5, when
N − m increases, the value of Ex [KL(C(x) k C̄ G )] monotonically increases in general, which means
that it can well capture the mode dropping and the diversity of the generated distributions.
8
5
5
4
4
log (Inception Score)
log (Inception Score)
Published as a conference paper at ICLR 2018
3
2
1
00
20
40
60
80
Number of Kept Classes
3
2
1
00
100
20
40
60
80
Number of Kept Classes
(a)
100
(b)
0.35
0.10
0.25
0.30
0.08
0.20
0.20
0.15
0.06
E[H(C(x))]
0.25
KL(C̄ T , C̄ G )
AM Score
Figure 5: Mode dropping analysis of Inception Score. a) Uniform density over classes; b) Gaussian
density over classes. The value of Ex [KL(C(x) k C̄ G )] monotonically increases in general as the
number of kept classes increases, which illustrates Inception Score is able to capture the mode
dropping and the diversity of the generated distributions. The error bar indicates the min and max
values in 1000 random dropping.
0.04
0.15
0.10
0.02
0.10
0.050 10 20 30 40 50 60 70 80
Iterations
0.000 10 20 30 40 50 60 70 80
Iterations
0.050 10 20 30 40 50 60 70 80
Iterations
(a)
(b)
(c)
Figure 6: Training curves of AM Score and its decomposed terms. a) AM Score, i.e. KL(C̄ train , C̄ G )+
Ex [H(C(x))]; b) KL(C̄ train , C̄ G ); c) Ex [H(C(x))]. All of them works properly (going down) in the
training process.
One remaining question is that whether good mode coverage and sample diversity mean high quality
of the generated samples. From the above analysis, we do not find any evidence. A possible
explanation is that, in practice, sample diversity is usually well correlated with the sample quality.
6.4
AM S CORE WITH ACCORDINGLY P RETRAINED C LASSIFIER
Note that if each point xi has multiple variants such as x1i , x2i , x3i , one of the situations, where x2i and
x3i are missing and only x1 is generated, cannot be detected by Ex [KL(C(x) k C̄ G )] score. It means
that with an accordingly pretrained classifier, Ex [KL(C(x) k C̄ G )] score cannot detect intra-class
level mode collapse. This also explains why the Inception Network on ImageNet could be a good
candidate C for CIFAR-10. Exploring the optimal C is a challenge problem and we shall leave it as a
future work.
However, there is no evidence that using an Inception Network trained on ImageNet can accurately
measure the sample quality, as shown in Section 6.2. To compensate Inception Score, we propose to
introduce an extra assessment using an accordingly pretrained classifier. In the accordingly pretrained
classifier, most real samples share similar H(C(x)) and 99.6% samples hold scores less than 0.05 as
showed in Figure 4c, which demonstrates that H(C(x)) of the classifier can be used as an indicator
of sample quality.
The entropy term on C̄ G is actually problematic when training data is not evenly distributed over
classes, for that argmin H(C̄ G ) is a uniform distribution. To take the C̄ train into account, we replace
H(C̄ G ) with a KL divergence between C̄ train and C̄ G . So that
AM Score , KL(C̄ train , C̄ G ) + Ex H C(x) ,
(23)
which requires C̄ G close to C̄ train and each sample x has a low entropy C(x). The minimal value of
AM Score is zero, and the smaller value, the better. A sample training curve of AM Score is showed
in Figure 6, where all indicators in AM Score work as expected. 1
1
Inception Score and AM Score measure the diversity and quality of generated samples, while FID (Heusel
et al., 2017) measures the distance between the generated distribution and the real distribution.
9
Published as a conference paper at ICLR 2018
Model
GAN
GAN∗
AC-GAN∗
AC-GAN∗+
LabelGAN
AM-GAN
Inception Score
CIFAR-10
Tiny ImageNet
dynamic
predefined
dynamic
predefined
7.04 ± 0.06 7.27 ± 0.07
7.25 ± 0.07 7.31 ± 0.10
7.41 ± 0.09 7.79 ± 0.08
7.28 ± 0.07 7.89 ± 0.11
8.56 ± 0.11 8.01 ± 0.09 10.25 ± 0.14 8.23 ± 0.10
8.63 ± 0.08 7.88 ± 0.07 10.82 ± 0.16 8.62 ± 0.11
8.83 ± 0.09 8.35 ± 0.12 11.45 ± 0.15 9.55 ± 0.11
AM Score
CIFAR-10
Tiny ImageNet
dynamic
predefined
dynamic
predefined
0.45 ± 0.00 0.43 ± 0.00
0.40 ± 0.00 0.41 ± 0.00
0.17 ± 0.00 0.16 ± 0.00 1.64 ± 0.02 1.01 ± 0.01
0.10 ± 0.00 0.14 ± 0.00 1.04 ± 0.01 1.20 ± 0.01
0.13 ± 0.00 0.25 ± 0.00 1.11 ± 0.01 1.37 ± 0.01
0.08 ± 0.00 0.05 ± 0.00 0.88 ± 0.01 0.61 ± 0.01
Table 1: Inception Score and AM Score Results. Models in the same column share the same network
structures & hyper-parameters. We applied dynamic / predefined labeling for models that require
target classes.
dynamic
predefined
AC-GAN∗
0.61
0.35
AC-GAN∗+
0.39
0.36
LabelGAN
0.35
0.32
AM-GAN
0.36
0.36
Table 2: The maximum value of mean MS-SSIM of various models over the ten classes on CIFAR-10.
High-value indicates obvious intra-class mode collapse. Please refer to the Figure 11 in the Appendix
for the visual results.
7
E XPERIMENTS
To empirically validate our analysis and the effectiveness of the proposed method, we conduct
experiments on the image benchmark datasets including CIFAR-10 and Tiny-ImageNet2 which
comprises 200 classes with 500 training images per class. For evaluation, several metrics are used
throughout our experiments, including Inception Score with the ImageNet classifier, AM Score with a
corresponding pretrained classifier for each dataset, which is a DenseNet (Huang et al., 2016a) model.
We also follow Odena et al. (2016) and use the mean MS-SSIM (Wang et al., 2004) of randomly
chosen pairs of images within a given class, as a coarse detector of intra-class mode collapse.
A modified DCGAN structure, as listed in the Appendix F, is used in experiments. Visual results of
various models are provided in the Appendix considering the page limit, such as Figure 9, etc. The
repeatable experiment code is published for further research3 .
7.1
E XPERIMENTS ON CIFAR-10
7.1.1
GAN WITH AUXILIARY C LASSIFIER
The first question is whether training an auxiliary classifier without introducing correlated losses to
the generator would help improve the sample quality. In other words, with the generator only with
the GAN loss in the AC-GAN∗ setting. (referring as GAN∗ )
As is shown in Table 1, it improves GAN’s sample quality, but the improvement is limited comparing
to the other methods. It indicates that introduction of correlated loss plays an essential role in the
remarkable improvement of GAN training.
7.1.2
C OMPARISON A MONG D IFFERENT M ODELS
The usage of the predefined label would make the GAN model transform to its conditional version,
which is substantially disparate with generating samples from pure random noises. In this experiment,
we use dynamic labeling for AC-GAN∗ , AC-GAN∗+ and AM-GAN to seek for a fair comparison
among different discriminator models, including LabelGAN and GAN. We keep the network structure
and hyper-parameters the same for different models, only difference lies in the output layer of the
discriminator, i.e., the number of class logits, which is necessarily different across models.
As is shown in Table 1, AC-GAN∗ achieves improved sample quality over vanilla GAN, but sustains
mode collapse indicated by the value 0.61 in MS-SSIM as in Table 2. By introducing adversarial
2
3
https://tiny-imagenet.herokuapp.com/
Link for anonymous experiment code: https://github.com/ZhimingZhou/AM-GAN
10
Published as a conference paper at ICLR 2018
Model
Score ± Std.
DFM (Warde-Farley & Bengio, 2017)
7.72 ± 0.13
Improved GAN (Salimans et al., 2016)
8.09 ± 0.07
AC-GAN (Odena et al., 2016)
8.25 ± 0.07
WGAN-GP + AC (Gulrajani et al., 2017) 8.42 ± 0.10
SGAN (Huang et al., 2016b)
8.59 ± 0.12
AM-GAN (our work)
8.91 ± 0.11
Splitting GAN (Guillermo et al., 2017)
8.87 ± 0.09
Real data
11.24 ± 0.12
Table 3: Inception Score comparison on CIFAR-10. Splitting GAN uses the class splitting technique
to enhance the class label information, which is orthogonal to AM-GAN.
training in the auxiliary classifier, AC-GAN∗+ outperforms AC-GAN∗ . As an implicit target class
model, LabelGAN suffers from the overlaid-gradient problem and achieves a relatively higher per
sample entropy (0.124) in the AM Score, comparing to explicit target class model AM-GAN (0.079)
and AC-GAN∗+ (0.102). In the table, our proposed AM-GAN model reaches the best scores against
these baselines.
1
We also test AC-GAN∗ with decreased weight on auxiliary classifier losses in the generator ( 10
relative to the GAN loss). It achieves 7.19 in Inception Score, 0.23 in AM Score and 0.35 in MS-SSIM.
The 0.35 in MS-SSIM indicates there is no obvious mode collapse, which also conform with our
above analysis.
7.1.3
I NCEPTION S CORE C OMPARING WITH R ELATED W ORK
AM-GAN achieves Inception Score 8.83 in the previous experiments, which significantly outperforms
the baseline models in both our implementation and their reported scores as in Table 3. By further
enhancing the discriminator with more filters in each layer, AM-GAN also outperforms the orthogonal
work (Guillermo et al., 2017) that enhances the class label information via class splitting. As the
result, AM-GAN achieves the state-of-the-art Inception Score 8.91 on CIFAR-10.
7.1.4
DYNAMIC L ABELING AND C LASS C ONDITION
It’s found in our experiments that GAN models with class condition (predefined labeling) tend to
encounter intra-class mode collapse (ignoring the noise), which is obvious at the very beginning of
GAN training and gets exasperated during the process.
In the training process of GAN, it is important to ensure a balance between the generator and the
discriminator. With the same generator’s network structures and switching from dynamic labeling to
class condition, we find it hard to hold a good balance between the generator and the discriminator:
to avoid the initial intra-class mode collapse, the discriminator need to be very powerful; however, it
usually turns out the discriminator is too powerful to provide suitable gradients for the generator and
results in poor sample quality.
Nevertheless, we find a suitable discriminator and conduct a set of comparisons with it. The results
can be found in Table 1. The general conclusion is similar to the above, AC-GAN∗+ still outperforms
AC-GAN∗ and our AM-GAN reaches the best performance. It’s worth noticing that the AC-GAN∗
does not suffer from mode collapse in this setting.
In the class conditional version, although with fine-tuned parameters, Inception Score is still relatively
low. The explanation could be that, in the class conditional version, the sample diversity still tends to
decrease, even with a relatively powerful discriminator. With slight intra-class mode collapse, the
per-sample-quality tends to improve, which results in a lower AM Score. A supplementary evidence,
P
not very strict, of partial mode collapse in the experiments is that: the | ∂G(z)
∂z | is around 45.0 in
dynamic labeling setting, while it is 25.0 in the conditional version.
The LabelGAN does not need explicit labels and the model is the same in the two experiment settings.
But please note that both Inception Score and the AM Score get worse in the conditional version. The
only difference is that the discriminator becomes more powerful with an extended layer, which attests
11
9
1.0
8
0.8
7
6
50
10
20
30 40
Iterations
AM Score
Inception Score
Published as a conference paper at ICLR 2018
AM-GAN
AC-GAN*+
AC-GAN*
LAB-GAN
GAN
GAN*
50
AM-GAN
AC-GAN*+
AC-GAN*
LAB-GAN
GAN
GAN*
0.6
0.4
0.2
0.00
60
(a) Inception Score training curves
10
20
30 40
Iterations
50
60
(b) AM Score training curves
Figure 7: The training curves of different models in the dynamic labeling setting.
that the balance between the generator and discriminator is crucial. We find that, without the concern
of intra-class mode collapse, using the dynamic labeling makes the balance between generator and
discriminator much easier.
7.1.5
T HE E(x,y)∼G [H(u(y), C(x))] LOSS
Note that we report results of the modified version of AC-GAN, i.e., AC-GAN∗ in Table 1. If we take
the omitted loss E(x,y)∼G [H(u(y), C(x))] back to AC-GAN∗ , which leads to the original AC-GAN
(see Section 2.2), it turns out to achieve worse results on both Inception Score and AM Score on
CIFAR-10, though dismisses mode collapse. Specifically, in dynamic labeling setting, Inception
Score decreases from 7.41 to 6.48 and the AM Score increases from 0.17 to 0.43, while in predefined
class setting, Inception Score decreases from 7.79 to 7.66 and the AM Score increases from 0.16 to
0.20.
This performance drop might be because we use different network architectures and hyper-parameters
from AC-GAN (Odena et al., 2016). But we still fail to achieve its report Inception Score, i.e., 8.25,
on CIFAR-10 when using the reported hyper-parameters in the original paper. Since they do not
publicize the code, we suppose there might be some unreported details that result in the performance
gap. We would leave further studies in future work.
7.1.6
T HE L EARNING P ROPERTY
We plot the training curve in terms of Inception Score and AM Score in Figure 7. Inception Score and
AM Score are evaluated with the same number of samples 50k, which is the same as Salimans et al.
(2016). Comparing with Inception Score, AM Score is more stable in general. With more samples,
Inception Score would be more stable, however the evaluation of Inception Score is relatively costly.
A better alternative of the Inception Model could help solve this problem.
The AC-GAN∗ ’s curves appear stronger jitter relative to the others. It might relate to the counteract
between the auxiliary classifier loss and the GAN loss in the generator. Another observation is that
the AM-GAN in terms of Inception Score is comparable with LabelGAN and AC-GAN∗+ at the
beginning, while in terms of AM Score, they are quite distinguishable from each other.
7.2
E XPERIMENTS ON T INY-I MAGE N ET
In the CIFAR-10 experiments, the results are consistent with our analysis and the proposed method
outperforms these strong baselines. We demonstrate that the conclusions can be generalized with
experiments in another dataset Tiny-ImageNet.
The Tiny-ImageNet consists with more classes and fewer samples for each class than CIFAR-10,
which should be more challenging. We downsize Tiny-ImageNet samples from 64×64 to 32×32
and simply leverage the same network structure that used in CIFAR-10, and the experiment result is
showed also in Table 1. From the comparison, AM-GAN still outperforms other methods remarkably.
And the AC-GAN∗+ gains better performance than AC-GAN∗ .
12
Published as a conference paper at ICLR 2018
8
C ONCLUSION
In this paper, we analyze current GAN models that incorporate class label information. Our analysis
shows that: LabelGAN works as an implicit target class model, however it suffers from the overlaidgradient problem at the meantime, and explicit target class would solve this problem. We demonstrate
that introducing the class logits in a non-hierarchical way, i.e., replacing the overall real class logit in
the discriminator with the specific real class logits, usually works better than simply supplementing an
auxiliary classifier, where we provide an activation maximization view for GAN training and highlight
the importance of adversarial training. In addition, according to our experiments, predefined labeling
tends to lead to intra-class mode collapsed, and we propose dynamic labeling as an alternative. Our
extensive experiments on benchmarking datasets validate our analysis and demonstrate our proposed
AM-GAN’s superior performance against strong baselines. Moreover, we delve deep into the widelyused evaluation metric Inception Score, reveal that it mainly works as a diversity measurement. And
we also propose AM Score as a compensation to more accurately estimate the sample quality.
In this paper, we focus on the generator and its sample quality, while some related work focuses on
the discriminator and semi-supervised learning. For future work, we would like to conduct empirical
studies on discriminator learning and semi-supervised learning. We extend AM-GAN to unlabeled
data in the Appendix C, where unsupervised and semi-supervised is accessible in the framework of
AM-GAN. The classifier-based evaluation metric might encounter the problem related to adversarial
samples, which requires further study. Combining AM-GAN with Integral Probability Metric based
GAN models such as Wasserstein GAN (Arjovsky et al., 2017) could also be a promising direction
since it is orthogonal to our work.
R EFERENCES
Arjovsky, Martin and Bottou, Léon. Towards principled methods for training generative adversarial
networks. In ICLR, 2017.
Arjovsky, Martin, Chintala, Soumith, and Bottou, Léon.
arXiv:1701.07875, 2017.
Wasserstein gan.
arXiv preprint
Cao, Yun, Zhou, Zhiming, Zhang, Weinan, and Yu, Yong. Unsupervised diverse colorization via
generative adversarial networks. arXiv preprint, 2017.
Che, Tong, Li, Yanran, Jacob, Athul Paul, Bengio, Yoshua, and Li, Wenjie. Mode regularized
generative adversarial networks. arXiv preprint arXiv:1612.02136, 2016.
Denton, Emily L, Chintala, Soumith, Fergus, Rob, et al. Deep generative image models using a
laplacian pyramid of adversarial networks. In Advances in neural information processing systems,
pp. 1486–1494, 2015.
Erhan, Dumitru, Bengio, Yoshua, Courville, Aaron, and Vincent, Pascal. Visualizing higher-layer
features of a deep network. University of Montreal, 1341:3, 2009.
Goodfellow, Ian. Nips 2016 tutorial:
arXiv:1701.00160, 2016.
Generative adversarial networks.
arXiv preprint
Goodfellow, Ian, Pouget-Abadie, Jean, Mirza, Mehdi, Xu, Bing, Warde-Farley, David, Ozair, Sherjil,
Courville, Aaron, and Bengio, Yoshua. Generative adversarial nets. In Advances in neural
information processing systems, pp. 2672–2680, 2014.
Guillermo, L. Grinblat, Lucas, C. Uzal, and Pablo, M. Granitto. Class-splitting generative adversarial
networks. arXiv preprint arXiv:1709.07359, 2017.
Gulrajani, Ishaan, Ahmed, Faruk, Arjovsky, Martin, Dumoulin, Vincent, and Courville, Aaron.
Improved training of wasserstein gans. arXiv preprint arXiv:1704.00028, 2017.
Heusel, Martin, Ramsauer, Hubert, Unterthiner, Thomas, Nessler, Bernhard, Klambauer, Günter, and
Hochreiter, Sepp. Gans trained by a two time-scale update rule converge to a nash equilibrium.
arXiv preprint arXiv:1706.08500, 2017.
13
Published as a conference paper at ICLR 2018
Huang, Gao, Liu, Zhuang, Weinberger, Kilian Q, and van der Maaten, Laurens. Densely connected
convolutional networks. arXiv preprint arXiv:1608.06993, 2016a.
Huang, Xun, Li, Yixuan, Poursaeed, Omid, Hopcroft, John, and Belongie, Serge. Stacked generative
adversarial networks. arXiv preprint arXiv:1612.04357, 2016b.
Isola, Phillip, Zhu, Jun-Yan, Zhou, Tinghui, and Efros, Alexei A. Image-to-image translation with
conditional adversarial networks. arXiv preprint arXiv:1611.07004, 2016.
Karras, Tero, Aila, Timo, Laine, Samuli, and Lehtinen, Jaakko. Progressive growing of gans for
improved quality, stability, and variation. arXiv preprint arXiv:1710.10196, 2017.
Mao, Xudong, Li, Qing, Xie, Haoran, Lau, Raymond YK, Wang, Zhen, and Smolley, Stephen Paul.
Least squares generative adversarial networks. arXiv preprint ArXiv:1611.04076, 2016.
Nguyen, Anh, Dosovitskiy, Alexey, Yosinski, Jason, Brox, Thomas, and Clune, Jeff. Synthesizing
the preferred inputs for neurons in neural networks via deep generator networks. In Advances in
Neural Information Processing Systems, pp. 3387–3395, 2016a.
Nguyen, Anh, Yosinski, Jason, Bengio, Yoshua, Dosovitskiy, Alexey, and Clune, Jeff. Plug & play
generative networks: Conditional iterative generation of images in latent space. arXiv preprint
arXiv:1612.00005, 2016b.
Odena, Augustus, Olah, Christopher, and Shlens, Jonathon. Conditional image synthesis with
auxiliary classifier gans. arXiv preprint arXiv:1610.09585, 2016.
Salimans, Tim, Goodfellow, Ian, Zaremba, Wojciech, Cheung, Vicki, Radford, Alec, and Chen, Xi.
Improved techniques for training gans. In Advances in Neural Information Processing Systems,
pp. 2226–2234, 2016.
Springenberg, Jost Tobias. Unsupervised and semi-supervised learning with categorical generative
adversarial networks. arXiv preprint arXiv:1511.06390, 2015.
Szegedy, Christian, Vanhoucke, Vincent, Ioffe, Sergey, Shlens, Jon, and Wojna, Zbigniew. Rethinking the inception architecture for computer vision. In Proceedings of the IEEE Conference on
Computer Vision and Pattern Recognition, pp. 2818–2826, 2016.
Theis, Lucas, Oord, Aäron van den, and Bethge, Matthias. A note on the evaluation of generative
models. arXiv preprint arXiv:1511.01844, 2015.
Wang, Zhou, Simoncelli, Eero P, and Bovik, Alan C. Multiscale structural similarity for image quality
assessment. In Signals, Systems and Computers, 2004. Conference Record of the Thirty-Seventh
Asilomar Conference on, volume 2, pp. 1398–1402. IEEE, 2004.
Warde-Farley, D. and Bengio, Y. Improving generative adversarial networks with denoising feature
matching. In ICLR, 2017.
Yu, Lantao, Zhang, Weinan, Wang, Jun, and Yu, Yong. Seqgan: sequence generative adversarial nets
with policy gradient. arXiv preprint arXiv:1609.05473, 2016.
Zhang, Han, Xu, Tao, Li, Hongsheng, Zhang, Shaoting, Huang, Xiaolei, Wang, Xiaogang, and
Metaxas, Dimitris. Stackgan: Text to photo-realistic image synthesis with stacked generative
adversarial networks. arXiv preprint arXiv:1612.03242, 2016.
Zhu, Jun-Yan, Krähenbühl, Philipp, Shechtman, Eli, and Efros, Alexei A. Generative visual manipulation on the natural image manifold. In European Conference on Computer Vision, pp. 597–613.
Springer, 2016.
14
Published as a conference paper at ICLR 2018
A
A.1
G RADIENT VANISHING & − log(Dr (x)) & L ABEL S MOOTHING
L ABEL S MOOTHING
Label smoothing that avoiding extreme logits value was showed to be a good regularization (Szegedy
et al., 2016). A general version of label smoothing could be: modifying the target probability of
discriminator)
[λ1 , 1 − λ1 ] x ∼ G
D̂r (x), D̂f (x) =
.
(24)
[1 − λ2 , λ2 ] x ∼ pdata
Salimans et al. (2016) proposed to use only one-side label smoothing. That is, to only apply label
smoothing for real samples: λ1 = 0 and λ2 > 0. The reasoning of one-side label smoothing is
applying label smoothing on fake samples will lead to fake mode on data distribution, which is too
obscure.
We will next show the exact problems when applying label smoothing to fake samples along with the
log(1−Dr (x)) generator loss, in the view of gradient w.r.t. class logit, i.e., the class-aware gradient,
and we will also show that the problem does not exist when using the − log(Dr (x)) generator loss.
A.2
T HE log(1−Dr (x)) GENERATOR LOSS
The log(1−Dr (x)) generator loss with label smoothing in terms of cross-entropy is
Llog(1-D)
= −Ex∼G H [λ1 , 1 − λ1 ], [Dr (x), DK+1 (x)] ,
G
(25)
with lemma 1, its negative gradient is
−
∂Llog(1-D)
(x)
G
= Dr (x) − λ1 ,
∂lr (x)
Dr (x) = λ1
D (x) < λ1
r
Dr (x) > λ1
gradient vanishing
Dr (x) is optimized towards 0 .
Dr (x) is optimized towards 1
(26)
(27)
Gradient vanishing is a well know training problem of GAN. Optimizing Dr (x) towards 0 or 1 is
also not what desired, because the discriminator is mapping real samples to the distribution with
Dr (x) = 1 − λ2 .
A.3
T HE − log(Dr (x)) GENERATOR LOSS
The − log(Dr (x)) generator loss with target [1−λ, λ] in terms of cross-entropy is
L-log(D)
= Ex∼G H [1 − λ, λ], [Dr (x), DK+1 (x)] ,
G
(28)
the negative gradient of which is
−
∂L-log(D)
(x)
G
= (1 − λ) − Dr (x),
∂lr (x)
Dr (x) = 1 − λ stationary point
D (x) < 1 − λ Dr (x) towards 1 − λ .
r
Dr (x) > 1 − λ Dr (x) towards 1 − λ
(29)
(30)
Without label smooth λ, the − log(Dr (x)) always∗ preserves the same gradient direction as
log(1−Dr (x)) though giving a difference gradient scale. We must note that non-zero gradient
does not mean that the gradient is efficient or valid.
The both-side label smoothed version has a strong connection to Least-Square GAN (Mao et al.,
2016): with the fake logit fixed to zero, the discriminator maps real to α on the real logit and maps
fake to β on the real logit, the generator in contrast tries to map fake sample to α. Their gradient on
the logit are also similar.
15
Published as a conference paper at ICLR 2018
B
C AT GAN
The auxiliary classifier loss of AM-GAN can also be viewed as the cross-entropy version of CatGAN:
generator of CatGAN directly optimizes entropy H(R(D(x))) to make each sample be one class,
while AM-GAN achieves this by the first term of its decomposed loss H(R(v(x)), R(D(x))) in
terms of cross-entropy with given target distribution. That is, the AM-GAN is the cross-entropy
version of CatGAN that is combined with LabelGAN by introducing an additional fake class.
B.1
D ISCRIMINATOR LOSS ON FAKE SAMPLE
The discriminator of CatGAN maximizes the prediction entropy of each fake sample:
LCat’
D = Ex∼G − H D(x) .
(31)
In AM-GAN, as we have an extra class on fake, we can achieve this in a simpler manner by minimizing
the probability on real logits.
LAM’
(32)
D = Ex∼G H F (v(K+1)), F (D(x)) .
If vr (K+1) is not zero, that is, when we did negative label smoothing Salimans et al. (2016), we
could define R(v(K+1)) to be a uniform distribution.
LAM”
= Ex∼G H R(v(K+1)), R(D(x)) × vr (K+1).
(33)
D
As a result, the label smoothing part probability will be required to be uniformly distributed, similar
to CatGAN.
C
U NLABELED DATA
In this section, we extend AM-GAN to unlabeled data. Our solution is analogous to CatGAN
Springenberg (2015).
C.1
S EMI - SUPERVISED SETTING
Under semi-supervised setting, we can add the following loss to the original solution to integrate the
unlabeled data (with the distribution denoted as punl (x)):
Lunl’
(34)
D = Ex∼punl H v(x), D(x) .
C.2
U NSUPERVISED SETTING
Under unsupervised setting, we need to introduce one extra loss, analogy to categorical GAN
Springenberg (2015):
Lunl”
(35)
D = H pref , R(Ex∼punl [D(x)]) ,
where the pref is a reference label distribution for the prediction on unsupervised data. For example,
pref could be set as a uniform distribution, which requires the unlabeled data to make use of all the
candidate class logits.
This loss can be optionally added to semi-supervised setting, where the pref could be defined as the
predicted label distribution on the labeled training data Ex∼pdata [D(x)].
16
Published as a conference paper at ICLR 2018
D
I NCEPTION S CORE
As a recently proposed metric for evaluating the performance of the generative models, the InceptionScore has been found well correlated with human evaluation (Salimans et al., 2016), where a
pre-trained publicly-available Inception model C is introduced. By applying the Inception model to
each generated sample x and getting the corresponding class probability distribution C(x), Inception
Score is calculated via
Inception Score = exp Ex KL C(x) k C̄ G ,
(36)
where Ex is short of Ex∼G and C̄ G = Ex [C(x)] is the overall probability distribution of the generated
samples over classes, which is judged by C, and KL denotes the Kullback-Leibler divergence which
is defined as
P
P
P
KL(p k q) = i pi log pqii = i pi log pi − i pi log qi = −H(p) + H(p, q).
(37)
An extended metric, the Mode Score, is proposed in Che et al. (2016) to take the prior distribution of
the labels into account, which is calculated via
Mode Score = exp Ex KL C(x) k C̄ train − KL(C̄ G k C̄ train ) ,
(38)
where the overall class distribution from the training data C̄ train has been added as a reference. We
show in the following that, in fact, Mode Score and Inception Score are equivalent.
Lemma 3. Let p(x) be the class probability distribution of the sample x, and p̄ denote another
probability distribution, then
Ex H p(x), p̄
= H Ex p(x) , p̄ .
(39)
With Lemma 3, we have
log(Inception Score)
= Ex KL(C(x) k C̄ G )
= Ex H C(x), C̄ G − Ex H C(x)
= H Ex C(x) , C̄ G − Ex H C(x)
= H(C̄ G ) + (−Ex H C(x) ),
(40)
log(Mode Score)
= Ex KL C(x) k C̄ train − KL(C̄ G k C̄ train )
= Ex H C(x), C̄ train − Ex H C(x) − H(C̄ G , C̄ train ) + H(C̄ G )
= H(C̄ G ) + (−Ex H C(x) ).
(41)
17
Published as a conference paper at ICLR 2018
E
T HE L EMMA AND P ROOFS
Lemma 1. With l being the logits vector and σ being the softmax function, let σ(l) be the current
softmax probability distribution and p̂ denote any target probability distribution, then:
∂H p̂, σ(l)
−
= p̂ − σ(l).
∂l
(42)
Proof.
P
P
i)
∂ i p̂i log Pexp(l
∂H p̂, σ(l)
∂H p̂, σ(l)
∂ i p̂i log σ(l)i
j exp(lj )
=
=
−
=−
∂l
∂lk
∂lk
∂lk
k
P
P
P
P
∂ i p̂i li − log j exp(lj )
∂ log
∂ i p̂i li
exp(lk )
j exp(lj )
=
=
−
= p̂k − P
∂lk
∂lk
∂lk
j exp(lj )
∂H p̂, σ(l)
= p̂ − σ(l).
⇒−
∂l
PK
Lemma 2. Given v = [v1 , . . . , vK+1 ], v1:K , [v1 , . . . , vK ], vr ,
k=1 vk , R(v) , v1:K /vr and
F (v) , [vr , vK+1 ], let p̂ = [p̂1 , . . . , p̂K+1 ], p = [p1 , . . . , pK+1 ], then we have:
H p̂, p = p̂r H R(p̂), R(p) + H F (p̂), F (p) .
(43)
Proof.
H(p̂, p) = −
PK
k=1
p̂k log pk − p̂K+1 log pK+1 = −p̂r
p̂k
k=1 p̂r
= −p̂r
PK
= −p̂r
PK
p̂k
k=1 p̂r
(log
pk
pr
p̂k
k=1 p̂r
PK
p
log( pk pr ) − p̂K+1 log pK+1
r
+ log pr ) − p̂K+1 log pK+1
p
log pk − p̂r log pr − p̂K+1 log pK+1
r
= p̂r H R(p̂), R(p) + H F (p̂), F (p) .
Lemma 3. Let p(x) be the class probability distribution of the sample x that from a certain data
distribution, and p̄ denote the reference probability distribution, then
Ex H p(x), p̄
= H Ex p(x) , p̄ .
Proof.
P
P
Ex H p(x), p̄ = Ex − i pi (x) log p̄i = − i Ex [pi (x)] log p̄i
X
=−
Ex [p(x)] i log p̄i = H Ex p(x) , p̄ .
i
18
(44)
Published as a conference paper at ICLR 2018
(a)
(b)
(c)
Figure 8: H(C(x) of Inception Score in Real Images. a) 0<H(C(x)<1 ; b) 3<H(C(x)< 4; c)
6<H(C(x)<7.
F
N ETWORK S TRUCTURE & H YPER -PARAMETERS
Generator:
Operation
Kernel
Strides
Output Dims
Output Drop
Activation
Noise
N/A
N/A
100 | 110
0.0
N(0.0, 1.0)
Linear
N/A
N/A
4×4×768
0.0
Leaky ReLU
True
Deconvolution
3×3
2×2
8×8×384
0.0
Leaky ReLU
True
Deconvolution
3×3
2×2
16×16×192
0.0
Leaky ReLU
True
Deconvolution
3×3
2×2
32×32×96
0.0
Leaky ReLU
True
Deconvolution
3×3
1×1
32×32×3
0.0
Tanh
Kernel
Strides
Output Dims
Output Drop
Activation
Add Gaussian Noise
N/A
N/A
32×32×3
0.0
N(0.0, 0.1)
Convolution
3×3
1×1
32×32×64
0.3
Leaky ReLU
True
Convolution
3×3
2×2
16×16×128
0.3
Leaky ReLU
True
Convolution
3×3
2×2
8×8×256
0.3
Leaky ReLU
True
Convolution
3×3
2×2
4×4×512
0.3
Leaky ReLU
True
Convolution*
3×3
1×1
4×4×512
0.3
Leaky ReLU
True
AvgPool
N/A
N/A
1×1×512
0.3
N/A
Linear
N/A
N/A
10 | 11 | 12
0.0
Softmax
Discriminator:
Operation
The *layer was only used for class condition experiments
Optimizer: Adam with beta1=0.5, beta2=0.999; Batch size=100.
Learning rate: Exponential decay with stair, initial learning rate 0.0004.
We use weight normalization for each weight
19
BN
Published as a conference paper at ICLR 2018
Figure 9: Random Samples of AM-GAN: Dynamic Labeling
Figure 10: Random Samples of AM-GAN: Class Condition
20
Published as a conference paper at ICLR 2018
Figure 11: Random Samples of AC-GAN∗ : Dynamic Labeling
Figure 12: Random Samples of AC-GAN∗ : Class Condition
21
Published as a conference paper at ICLR 2018
Figure 13: Random Samples of AC-GAN∗+ : Dynamic Labeling
Figure 14: Random Samples of AC-GAN∗+ : Class Condition
22
Published as a conference paper at ICLR 2018
Figure 15: Random Samples of LabelGAN: Under Dynamic Labeling Setting
Figure 16: Random Samples of LabelGAN: Under Class Condition Setting
23
Published as a conference paper at ICLR 2018
Figure 17: Random Samples of GAN: Under Dynamic Labeling Setting
Figure 18: Random Samples of GAN: Under Class Condition Setting
24
| 2cs.AI
|
Graph sketching-based Space-efficient Data Clustering
Anne Morvan∗†‡
[email protected]
Krzysztof Choromanski§
[email protected]
Cédric Gouy-Pailler∗
[email protected]
arXiv:1703.02375v4 [cs.LG] 20 Dec 2017
Jamal Atif†
[email protected]
Abstract
In this paper, we address the problem of recovering
arbitrary-shaped data clusters from datasets while facing
high space constraints, as this is for instance the case in many
real-world applications when analysis algorithms are directly
deployed on resources-limited mobile devices collecting the
data. We present DBMSTClu a new space-efficient densitybased non-parametric method working on a Minimum Spanning Tree (MST) recovered from a limited number of linear
measurements i.e. a sketched version of the dissimilarity
graph G between the N objects to cluster. Unlike k-means,
k-medians or k-medoids algorithms, it does not fail at distinguishing clusters with particular forms thanks to the property of the MST for expressing the underlying structure of
a graph. No input parameter is needed contrarily to DBSCAN or the Spectral Clustering method. An approximate
MST is retrieved by following the dynamic semi-streaming
model in handling the dissimilarity graph G as a stream of
edge weight updates which is sketched in one pass over the
data into a compact structure requiring O(N polylog(N ))
space, far better than the theoretical memory cost O(N 2 ) of
G. The recovered approximate MST T as input, DBMSTClu then successfully detects the right number of nonconvex
clusters by performing relevant cuts on T in a time linear in
N . We provide theoretical guarantees on the quality of the
clustering partition and also demonstrate its advantage over
the existing state-of-the-art on several datasets.
1
Introduction
Clustering is one of the principal data mining tasks consisting in grouping related objects in an unsupervised
manner. It is expected that objects belonging to the
same cluster are more similar to each other than to objects belonging to different clusters. There exists a variety of algorithms performing this task. Methods like k∗ CEA,
LIST, 91191 Gif-sur-Yvette, France.
Paris-Dauphine, PSL Research University, CNRS,
LAMSADE, 75016 Paris, France.
‡ Partly supported by the DGA (French Ministry of Defense).
§ Google Brain Robotics, New York, USA.
† Université
means [1], k-medians [2] or k-medoids [3] are useful unless the number and the shape of clusters are unknown
which is unfortunately often the case in real-world applications. They are typically unable to find clusters with
a nonconvex shape. Although DBSCAN [4] does not
have these disadvantages, its resulting clustering still
depends on the chosen parameter values.
One of the successful approaches relies on a graph
representation of the data. Given a set of N data points
{x1 , . . . , xN }, a graph can be built based on the dissimilarity of data where points of the dataset are the vertices
and weighted edges express distances between these objects. Besides, the dataset can be already a graph G
modeling a network in many fields, such as bioinformatics - where gene-activation dependencies are described
through a network - or social, computer, information,
transportation network analysis. The clustering task
consequently aims at detecting clusters as groups of
nodes that are densely connected with each other and
sparsely connected to vertices of other groups. In this
context, Spectral Clustering (SC) [9] is a popular tool
to recover clusters with particular structures for which
classical k-means algorithm fails. When dealing with
large scale datasets, a main bottleneck of the technique
is to perform the partial eigendecomposition of the associated graph Laplacian matrix, though. Another inherent difficulty is to handle the huge number of nodes
and edges of the induced dissimilarity graph: storing all
edges can cost up to O(N 2 ) where N is the number of
nodes. Over the last decade, it has been established that
the dynamic streaming model [5] associated with linear
sketching techniques [6] - also suitable for distributed
processing -, is a good way for tackling this last issue. In
this paper, the addressed problem falls within a framework of storage limits allowing O(N polylog(N )) space
complexity but not O(N 2 ).
Contributions. The new clustering algorithm
DBMSTClu presented in this paper brings a solution
to these issues: 1) detecting arbitrary-shaped data clusters, 2) with no parameter, 3) in a time linear to the
number of points, 4) in a space-efficient manner by
Copyright c 2018 by SIAM
Unauthorized reproduction of this article is prohibited
working on a limited number of linear measurements, a
sketched version of the streamed dissimilarity graph G.
DBMSTClu returns indeed a partition of the N points
to cluster relying only on a Minimum Spanning Tree
(MST) of the dissimilarity graph G taking O(N ) space.
This MST can be space-efficiently approximatively retrieved in the dynamic semi-streaming model by handling G as a stream of edge weight updates sketched
in only one pass over the data into a compact structure taking O(N polylog(N )) space. DBMSTClu then
automatically identifies the right number of nonconvex
clusters by cutting suitable edges of the resulting approximate MST in O(N ) time.
The remaining of this paper is organized as follows.
In §2 the related work about graph clustering and other
space-efficient clustering algorithms is described. §3
gives fundamentals of the sketching technique that can
be used to obtain an approximate MST of the dissimilarity graph. DBMSTClu (DB for Density-Based), the
proposed MST-based algorithm for clustering is then
explained in §4.1, its theoretical guarantees discussed
in §4.2 and the implementation enabling its scalability
detailed in §4.3. §5 presents the experimental results
comparing the proposed clustering algorithm to other
existing methods. Finally, §6 concludes the work and
discusses future directions.
2
pected clusters, consists in deleting the heaviest edges
from the Euclidean MST of the considered graph but
this completely fails when the intra-cluster distance is
lower than the inter-clusters one. For decades since
MST-based clustering methods [20, 21] have been developed and can be classified into the group of densitybased methods. MSDR [21] relies on the mean and the
standard deviation of edge weights within clusters but
will encourage clusters with points far from each other
as soon as they are equally “far”. Moreover, it does not
handle clusters with less than three points.
2.3 Space-efficient
clustering
algorithms.
Streaming k-means [23] is a one-pass streaming method
for the k-means problem but still fails to detect clusters
with nonconvex shapes since only the centroid point
of each cluster is stored. This is not the case of
CURE algorithm [24] which represents each cluster as
a random sample of data points contained in it but
this offline method has a prohibitive time complexity
of O(N 2 log(N )) not suitable for large datasets. More
time-efficient, CluStream [25] and DenStream [26]
create microclusters based on local densities in an
online fashion and aggregate them later to build bigger
clusters in offline steps. Though, only DenStream can
capture non-spherical clusters but needs parameters
like DBSCAN from which it is inspired.
Related work
2.1 General graph clustering. The approach of
graph representation of the data has led to an extensive
literature over graph clustering related to graph partitioning [7]. From the clustering methods point of view,
DenGraph [10] proposes a graph version of DBSCAN
which is able to deal with noise while work from [11]
focuses on the problem of recovering clusters with considerably dissimilar sizes. Recent works include also approaches from convex optimization using low-rank decomposition of the adjacency matrix [12, 13, 14, 15].
These methods bring theoretical guarantees about the
exact recovery of the ground truth clustering for the
Stochastic Block Model [16, 17, 18] but demand to
compute the eigendecomposition of a N × N matrix
(resp. O(N 3 ) and O(N 2 ) for time and space complexity). Moreover they are restricted to unweighted graphs
(weights in the work from [15] refer to likeliness of existence of an edge, not a distance between points).
2.2 MST-based graph clustering. The MST is
known to help recognizing clusters with arbitrary
shapes. Clustering algorithms from this family identify
clusters by performing suitable cuts among the MST
edges. The first algorithm, called Standard Euclidean
MST (SEMST) is from [19] and given a number of ex-
3
Context, notations and graph sketching
preprocessing step
Consider a dataset with N points. Either the underlying network already exists, or it is assumed that a
dissimilarity graph G between points can be built where
points of the dataset are the vertices and weighted edges
express distances between these objects. For instance,
this can be the Euclidean distance. In both cases, the
graphs considered here should follow this definition:
Definition 3.1. (graph G = (V, E)) A graph G =
(V, E) consists in a set of nodes V and a set of edges
E ⊆ V × V . The graph is undirected but weighted.
The weight w on an edge between node i and j - if this
edge exists - corresponds to the normalized predefined
distance between i and j, s.t. 0 < w ≤ 1. |V | = N
and |E| = M stand resp. for the cardinality of sets V
and E. E = {e1 , ..., eM } and for all edges ei a weight
wi represents a distance between two vertices. In the
sequel, E(G) describes the set of edges of a graph G.
Freely of any parameter, DBMSTClu performs the
nodes clustering from its unique input: an MST of
G. So an independent preprocessing is required for
its recovery by any existing method. To respect our
space restrictions though, the use of a graph sketching
Copyright c 2018 by SIAM
Unauthorized reproduction of this article is prohibited
technique is motivated here: from the stream of its edge
weights, a sketch of G is built and then an approximate
MST is retrieved exclusively from it.
Streaming graph sketching and approximate MST recovery. Processing data in the dynamic
streaming model [5] for graph sketching implies: 1) The
graph should be handled as a stream s of edge weight
updates: s = (a1 , ... aj , ...) where aj is the j-th update in the stream corresponding to the tuple aj =
(i, wold,i , ∆wi ) with i denoting the index of the edge to
update, wold,i its previous weight and ∆wi the update to
perform. Thus, after reading aj in the stream, the i-th
edge is assigned the new weight wi = wold,i + ∆wi ≥ 0.
2) The method should make only one pass over this
stream . 3) Edges can be both inserted or deleted (turnstile model), i.e. weights can be increased or decreased
(but have always to be nonnegative). So weights change
regularly, as in social networks where individuals can be
friends for some time then not anymore.
The algorithm in [6] satisfies these conditions and is
used here to produce in an online fashion a limited number of linear measurements summarizing edge weights
of G, as new data aj are read from the stream s of
edge weight updates. Its general principle is briefly described here. For a given small 1 , G is seen as a set of
unweighted subgraphs Gk containing all the edges with
weight lower than (1 + 1 )k , hence Gk ⊂ Gk+1 . The Gk
are embodied as N virtual vectors v (i) ∈ {−1, 0, 1}M for
i ∈ [N ]1 expressing for each node the belonging to an
(i)
existing edge: for j ∈ [M ], vj equals to 0 if node i is not
in ej , 1 (resp. −1) if ej exists and i is its left (resp. right)
node. All v (i) are described at L different “levels”, i.e. L
virtual copies of the true vectors are made with some entries randomly set to zero s.t. the v (i),l get sparser as the
corresponding level l ∈ [L] increases. The v (i),l for each
level are explicitly coded in memory by three counters:
PM (i),l
PM
PM (i),l j
(i),l
φ = j=1 vj ; ι = j=1 j vj ; τ = j=1 vj
z
mod p, with p a suitably large prime and z ∈ Zp . The
resulting compact data structure further named a sketch
enables to draw almost uniformly at random a nonzero
weighted edge among Gk at any time among the levels vectors v (i),l which are 1-sparse (with exactly one
nonzero coefficient) thanks to `0 -sampling [27]:
practice only one pass over the data is needed and the
space cost is significantly lower than the theoretical
O(N 2 ) bound. The time cost for each update of
the sketch is polylog(N ). The authors from [6] also
proposed an algorithm to compute in a single-pass the
approximate weight W̃ of an MST T - the sum of all
its edge weights - by appropriate samplings from the
sketch in O(N polylog(N )) time. They show that W ≤
W̃ ≤ (1+1 ) W where W stands
Pr for the true weight and
W̃ = N −(1+1 )r+1 cc(Gr )+ k=0 λk cc(Gk ) with λk =
(1 + 1 )k+1 − (1 + 1 )i , r = dlog1+1 (wmax )e s.t. wmax is
the maximal weight of G and cc denotes the number
of connected components of the graph in parameter.
Here an extended method is applied for obtaining rather
an approximate MST - and not simply its weight - by
registering edges as they are sampled. Referring to
the proof of Lemma 3.4 in [6], the approach is simply
justified by applying Kruskal’s algorithm where edges
with lower weights are first sampled2 .
Note that the term MST is kept in the whole paper
for the sake of simplicity, but the sketching technique
and so does our algorithm enables to recover a Minimum
Spanning Forest if the initial graph is disconnected.
4
The proposed MST-based graph clustering
method: DBMSTClu
4.1 Principle. Let us consider a dataset with N
points. After the sketching phase, an approximate MST
further named T has been obtained with N − 1 edges
s.t. ∀i ∈ [N − 1], 0 < wi ≤ 1. Our density-based
clustering method DBMSTClu exclusively relies on this
object by performing some cuts among the edges of the
tree s.t. K − 1 cuts result in K clusters. Note that
independently of the technique used to obtain an MST
(the sketching method is just a possible one), the space
complexity of the algorithm is O(N ) which is better
than the O(N 2 ) of Spectral Clustering (SC). The time
complexity of DBMSTClu is O(N K) which is clearly
less than the O(N 3 ) one implied by SC. After a cut,
obtained clusters can be seen as subtrees of the initial
T and the analysis of their qualities is only based on
edges contained in those subtrees. In the sequel, all
clusters Ci , i ∈ [K], are assimilated to their associated
subtree of T and for instance the maximal edge of a
Definition 3.2. (`0 -sampling) An (, δ) `0 -sampler cluster will refer to the edge with the maximum weight
for a nonzero vector x ∈ Rn fails with a probability from the subtree associated to this cluster.
at most δ or returns some i ∈ [n] with probability
Our algorithm is a parameter-free divisive top1
where
supp
x
=
{i
∈
[n]
|
x
=
6
0}.
(1 ± ) | supp
down
procedure: it starts from one cluster containing
i
x|
the whole dataset and at each iteration, a cut which
The sketch requires O(N log3 (N )) space. It follows
that the sketching is technically semi-streamed but in
2
1 In
the sequel, for a given integer a, [a] = {1, . . . , a}.
We would like to thank Mario Lucic for the fruitful private
conversation and for coauthoring with Krzysztof Choromanski the
MSE sketching extension during his internship at Google.
Copyright c 2018 by SIAM
Unauthorized reproduction of this article is prohibited
maximizes some criterion is performed. The criterion
for identifying the best cut to do (if any should be
made) at a given stage is a measure of the validity of
the resulting clustering partition. This is a function of
two positive quantities defined below: Dispersion and
Separation of one cluster. The quality of a given cluster
is then measured from Dispersion and Separation while
the quality of the clustering partition results from the
weighted average of all cluster validity indices. Finally,
all those measures are based on the value of edge weights
and the two latter ones lie between −1 and 1.
Definition 4.1. (Cluster Dispersion) The
Dispersion of a cluster Ci (DISP) is defined as the
maximum edge weight of Ci . If the cluster is a
singleton (i.e. contains only one node), the associated
Dispersion is set to 0. More formally:
(4.1)
(
6 0
max wj if |E(Ci )| =
j, ej ∈Ci
∀i ∈ [K], DISP(Ci ) =
0
otherwise.
Definition 4.2. (Cluster Separation) The Separation of a cluster Ci (SEP) is defined as the minimum
distance between the nodes of Ci and the ones of all
other clusters Cj , j 6= i, 1 ≤ i, j ≤ K, K 6= 1 where K
is the total number of clusters. In practice, it corresponds to the minimum weight among all already cut
edges from T comprising a node from Ci . If K = 1, the
Separation is set to 1. More formally, with Cuts(Ci )
denoting cut edges incident to Ci ,
(4.2)
(
min
wj if K 6= 1
j, ej ∈Cuts(Ci )
∀i ∈ [K], SEP(Ci ) =
1
otherwise.
b
b
b
DISP(C1 )
b
b
b
b
b
b
b
b
b
SEP(C1 )
C1
Figure 1: SEP and DISP definitions with N = 12,
K = 3 for dashed cluster C1 in the middle.
Fig. 1 sums up the introduced definitions. The
higher the Separation, the farther is the cluster separated from the other clusters, while low values suggest
that the cluster is close to the nearest one.
Definition 4.3. (Validity Index of a Cluster)
The Validity Index of a cluster Ci is defined as:
(4.3)
VC (Ci ) =
SEP(Ci ) − DISP(Ci )
max(SEP(Ci ), DISP(Ci ))
The Validity Index of a Cluster (illustration in Fig. 2)
is defined s.t. −1 ≤ VC (Ci ) ≤ 1 where 1 stands for the
best validity index and −1 for the worst one. No division
by zero (i.e. max(DISP(Ci ), SEP(Ci )) = 0) happens
because Separation is always strictly positive. When
Dispersion is higher than Separation, −1 < VC (Ci ) < 0.
Conversely, when Separation is higher than Dispersion,
0 < VC (Ci ) < 1. So our clustering algorithm will
naturally encourage clusters with a higher Separation
over those with a higher Dispersion.
ϵ
b
1
b
ϵ
VC (Clef
t)
b
ϵ
1
VC (Clef
t)
b
b
ϵ
)
VC (Cright
1
b
1
VC (Cright
)
Figure 2: Validity Index of a Cluster’s example with
N = 3. For a small , cutting edge with weight or 1
gives resp. left and right partitions. (up) VC (Clef
t ) = 1;
1
VC (Cright
) = −1 < 0. (bottom) VC (Clef
)
=
1−
> 0;
t
1
VC (Cright ) = 1. The bottom partition, for which
validity indices of each cluster are positive, is preferred.
Definition 4.4. (Validity Index of a Clustering
Partition) The Density-Based Validity Index of a
Clustering partition Π = {Ci }, 1 ≤ i ≤ K, DBCVI(Π)
is defined as the weighted average of the Validity Indices
of all clusters in the partition where N is the number of
points in the dataset.
K
X
|Ci |
(4.4)
DBCVI(Π) =
VC (Ci )
N
i=1
The Validity Index of Clustering lies also between
−1 and 1 where 1 stands for an optimal density-based
clustering partition while −1 stands for the worst one.
Our defined quantities are significantly distinct
from the separation and sparseness defined in [28]. Indeed, firstly, their quantities are not well defined for
special cases when clusters have less than four nodes or
a partition containing a lonely cluster. Secondly, the
way they differentiate internal and external nodes or
edges does not properly recover easy clusters like convex blobs. Moreover, our DBCVI differs from the Silhouette Coefficient [29]. It does not perform well with
nonconvex-shaped clusters and although this is based
on close concepts like tightness and also separation, the
global coefficient is based on the average values of Silhouette coefficients of each point, while our computation
of DBCVI begins at the cluster level.
DBMSTClu is summarized in Algorithm 1. It starts
from a partition with one cluster containing the whole
dataset whereas the associated initial DBCVI is set to
the worst possible value: −1. As long as there exists
a cut which makes the DBCVI greater from (or equal
Copyright c 2018 by SIAM
Unauthorized reproduction of this article is prohibited
to) the one of the current partition, a cut is greedily
chosen by maximizing the obtained DBCVI among all
the possible cuts. When no direct improvement is
possible, the algorithm stops. It is guaranteed that
the cut edge locally maximizes the DBCVI at each
iteration since by construction, the algorithm will try
each possible cut. In practice, the algorithm stops
after a reasonable number of cuts, getting trapped in a
local maximum corresponding to a meaningful cluster
partition. This prevents from obtaining a partition
where all points are in singleton clusters. Indeed, such
a result (K = N ) is not desirable, although it is
optimal in the sense of the DBCVI, since in this case,
∀i ∈ [K], DISP(Ci ) = 0 and VC (Ci ) = 1. Moreover,
the non-parametric characteristic helps achieving stable
partitions. In Algorithm 1, evaluateCut(.) computes the
DBCVI when the cut in parameter is applied to T .
Algorithm 1 Clustering algorithm DBMSTClu
1: Input: T , the MST
2: dbcvi← − 1.0; clusters = [ ]; cut list←[E(T )]
3: while dbcvi < 1.0 do
4:
cut tp←N one; dbcvi tp←dbcvi
5:
for each cut in cut list do
6:
newDbcvi← evaluateCut(T , cut)
7:
if newDbcvi ≥ dbcvi tp then
8:
cut tp←cut; dbcvi tp←newDbcvi
9:
if cut tp 6= N one then
10:
clusters← cut(clusters, cut tp)
11:
dbcvi←dbcvi tp; remove(cut list, cut tp)
12:
else
13:
break
14: return clusters, dbcvi
Proof. For the first cut, both separations of obtained
clusters C1 and C2 are equal to the weight of the
considered edge for cut. Here, this is the one with
the highest weight. Thus, for i = 1, 2, DISP(Ci ) ≤
SEP(Ci ) =⇒ VC (Ci ) ≥ 0. Finally, the DBCVI of
the partition, as a convex sum of two nonnegative
quantities, is clearly nonnegative.
Lemma 4.2. Lowest weighted edge case Let T be
an MST of the dissimilarity data graph. If the first
cut from E(T ) done by DBMSTClu is the one with the
lowest weight, then resulting DBCVI is negative or zero.
Proof. Same reasoning in the opposite case s.t.
SEP(Ci ) − DISP(Ci ) ≤ 0 for i ∈ {1, 2}.
Proposition 4.1. When the first cut is not the
heaviest Let T be an MST of the dissimilarity data
graph with N nodes. Let us consider this specific case:
all edges have a weight equal to w except two edges e1
and e2 resp. with weight w1 and w2 s.t. w1 > w2 >
w > 0. DBMSTClu does not cut any edge with weight
w and cuts e2 instead of e1 as a first cut iff:
p
2n2 w1 − n1 + n21 + 4w1 (n22 w1 + N 2 − N n1 − n22 )
w2 >
2(N − n1 + n2 )
where n1 (resp. n2 ) is the number of nodes in the
first cluster resulting from the cut of e1 (resp. e2 ).
Otherwise, e1 gets cut.
Proof. See supplementary material.
This proposition emphasizes that the algorithm is
cleverer than simply cutting the heaviest edge first.
Indeed, although w2 < w1 , cutting e2 could be preferred
4.2 Quality of clusters. An analysis of the algo- over e . Moreover, no edge with weight w can get
1
rithm and the quality of the recovered clusters is now cut at the first iteration as they have the minimal
given. The main results are: 1) DBMSTClu differs sig- weight in the tree. Indeed it really happens since an
nificantly from the naive approach of SEMST by pre- approximate MST with discrete rounded weights is used
ferring cuts which do not necessarily correspond to the when sketching is applied.
heaviest edge (Prop. 4.1 and 4.2). 2) As long as the
current partition contains at least one cluster with a Proposition 4.2. First cut on the heaviest edge
negative validity index, DBMSTClu will find a cut im- in the middle Let T be an MST of the dissimilarity
proving the global index (Prop. 4.3). 3) Conditions are data graph with N nodes. Let us consider this specific
given to determine in advance if and which cut will be case: all edges have a weight equal to w except two
performed in a cluster with a positive validity index edges e1 and e2 resp. with weight w1 and w2 s.t.
(Prop. 4.4 and 4.5 ). All are completely independent of w1 > w2 > w > 0. Denote n1 (resp. n2 ) the number
the sketching phase. Prop. 4.1 and 4.2 rely on the two of nodes in the first cluster resulting from the cut of e1
basic lemmas regarding the first cut in the MST:
(resp. e2 ). In the particular case where edge e1 with
maximal weight w1 stands between two subtrees with the
Lemma 4.1. Highest weighted edge case Let T be same number of points, i.e. n1 = N/2, e1 is always
an MST of the dissimilarity data graph. If the first cut preferred over e2 as the first optimal cut.
from E(T ) made by DBMSTClu is the heaviest edge,
Proof. See supplementary material.
then resulting DBCVI is nonnegative.
Copyright c 2018 by SIAM
Unauthorized reproduction of this article is prohibited
b
S1
S2
b
b
b
Remark 4.1. Let us consider the MST in Fig. 3 with
S
N = 8, w1 = 1, w2 = w3 = 1 − , and other weights
e
set to . Clearly, it is not always preferred to cut e1
in the middle since for = 0.1, DBCV I2 ≈ 0.27 >
DBCV I1 = = 0.1. So, it is a counter-example to a Figure 5: Illustration of the recursive relationship for
possible generalization of Prop. 4.2 where there would be left and right Dispersions resulting from the cut of
edge e: DISPlef t (e) = max(w(S1 )), DISPright (e) =
more than three possible distinct weights in T .
max(w(S2 ), w(S3 )) where w(.) returns the edge weights.
Separation
works analogically.
w2
w1
w3
ϵ
ϵ
ϵ
ϵ
3
b
b
b
b
b
b
b
b
b
b
b
b
b
Figure 3: Counter-example for Remark 4.1
These last propositions hold for every iteration in the
algorithm.
Proposition 4.3. Fate of negative VC cluster
Let K = t + 1 be the number of clusters in the clustering
partition at iteration t. If for some i ∈ [K], VC (Ci ) < 0,
then DBMSTClu will cut an edge at this stage.
Proof. See supplementary material.
Ci
l
wsep
Cil
wmax
Cir
r
wsep
Figure 4: Generic example of Prop. 4.3 and 4.5’s proofs.
Thus, at the end of the clustering algorithm, each
cluster will have a nonnegative VC so at each step of
the algorithm, this bound holds for the final DBCVI:
PK
DBCV I ≥ i=1 |CNi | max(VC (Ci ), 0).
Proposition 4.4. Fate of positive VC cluster I
Let T be an MST of the dissimilarity data graph and C
a cluster s.t. VC (C) > 0 and SEP(C) = s. DBMSTClu
does not cut an edge e of C with weight w < s if
both resulting clusters have at least one edge with weight
greater than w.
Proof. See supplementary material.
Proposition 4.5. Fate of positive VC cluster II
Consider a partition with K clusters s.t. some cluster
Ci , i ∈ [K] with VC (Ci ) > 0 is in the setting of Fig. 10
i.e. cutting the heaviest edge e with weight wmax results
in two clusters: the left (resp. right) cluster Cil (resp.
Cir ) with n1 points (resp. n2 ) s.t. DISP(Cil ) = d1 ,
l
r
SEP(Cil ) = wsep
, DISP(Cir ) = d2 and SEP(Cir ) = wsep
.
l
r
Assuming w.l.o.g. wsep > wsep , e gets cut iff:
n1 d1 +n2 d2
n1 +n2
wmax
wmax
≤ r .
wsep
Proof. See supplementary material.
4.3 Implementation for linear time and space
complexities. Algorithm 1 previously described could
lead to a naive implementation. We now briefly explain how to make the implementation efficient in order to achieve the linear time and space complexities in N (code on https://github.com/annemorvan/
DBMSTClu/). The principle is based on two tricks. 1)
As observed in §4.2: for a performed cut in cluster
Ci , VC (Cj ) for any j 6= i remain unchanged. Hence,
if VC (Cj ) are stored for each untouched cluster after a
given cut, only the edges of Cl and Cr resp. the left
and right clusters induced by e’s cut need to be evaluated again to determine the DBCVI in case of cut.
Thus the number of operations to find the optimal cut
decreases drastically over time as the clusters become
smaller through the cuts. 2) However finding the first
cut already costs O(N ) time hence paying this price for
each cut evaluation would lead to O(N 2 ) operations.
Fortunately, this can be avoided as SEP and DISP exhibit some recurrence relationship in T : when knowing
these values for a given cut, we can deduce the value
for a neighboring cut (cf. Fig. 5). To determine the
first cut, T should be hence completely crossed following the iterative version of the Depth-First Search. The
difficulty though is that the recursive relationship between the quantities to update is directional: left and
right w.r.t. the edge to cut. So we develop here double
Depth-First search (see principle in Algorithm 2): from
any given edge of T , edges left and right are all visited consecutively with a Depth-First search, and SEP
and DISP are updated recursively thanks to a carefully
defined order in the priority queue of edges to handle.
5
Experiments
Tight lower and upper bounds are given in §3 for the
weight of the approximate MST retrieved by sketching.
First experiments in §5.1 show that the clustering
results do not suffer from the use of an approximate
MST instead of a real one. Experiments from §5.2 prove
then the scalability of DBMSTClu for large values of N .
5.1 Safety of the sketching. The results of DBMSTClu are first compared with DBSCAN [4] because it
can compete with DBMSTClu as 1) nonconvex-shaped
Copyright c 2018 by SIAM
Unauthorized reproduction of this article is prohibited
Algorithm 2 Generic Double Depth-First Search
1: Input: T , the MST; e, the edge of T where the
search starts; n src, source node of e
2: Q = deque() //Empty priority double-ended queue
3: for incident edges to n src do
4:
pushBack(Q, (incident e, n src, F ALSE))
5: pushBack(Q, (e, n src, T RU E))
6: for incident edges to n trgt do
7:
pushBack(Q, (incident e, n trgt, F ALSE))
8: pushBack(Q, (e, n trgt, T RU E))
9: while Q is not empty do
10:
e, node, marked = popFront(Q)
11:
opposite node = getOtherNodeEdge(e, node)
12:
if not marked then
13:
for incident edges to node do
14:
pushBack(Q, (incident e, node, F ))
15:
pushBack(Q, (e, node, T ))
16:
pushFront(Q, (e, opposite node, T ))
17:
else
18:
doTheJob(e) //Perform here the task
19: return
clusters are recognized, 2) it does not require explicitly
the number of expected clusters, 3) it is both time and
space-efficient (resp. O(N log N ) and O(N )). Then,
the results of another MST-based algorithm are shown
for comparison. The latter called Standard Euclidean
MST (SEMST) [19] cuts the K − 1 heaviest edges of
a standard Euclidean MST given a targeted number of
clusters K. For DBMSTClu, the dissimilarity graph
is built from computing the Euclidean distance between
data points and passed into the sketch phase to produce
an approximate version of the exact MST.
Synthetic datasets. Experiments were performed
on two classic synthetic datasets from the Euclidean
space: noisy circles and noisy moons. Each dataset
contains 1000 data points in 20 dimensions: the first
two dimensions are randomly drawn from predefined
2D-clusters, as shown in Fig. 6 and 7, while the other
18 dimensions are random Gaussian noise.
Real dataset.
DBMSTClu performances are
also measured on the mushroom dataset (https://
archive.ics.uci.edu/ml/datasets/mushroom).
It
contains 8124 records of 22 categorical attributes corresponding to 23 species of gilled mushrooms in the
Agaricus and Lepiota family. 118 binary attributes are
created from the 22 categorical ones, then the complete
graph (about 33 millions of edges) is built by computing
the normalized Hamming distance (i.e. the number of
distinct bits) between points.
Results. Fig. 6, 7 and 8 show the results for all
previously defined datasets and aforementioned meth-
ods. The synthetic datasets were projected onto 2D
spaces for visualization purposes. They were produced
with a noise level such that SEMST fails and DBSCAN
does not perform well without parameters optimization.
In particular, for DBSCAN all the cross points correspond to noise. With the concentric circles, SEMST
does not cut on the consistent edges, hence leads to an
isolated singleton cluster. DBSCAN classifies the same
point plus a near one as noise while recovering the two
circles well. Finally, DBMSTClu finds the two main
clusters and also creates five singleton clusters which
can be legitimately considered as noise as well. With
noisy moons, while DBSCAN considers three outliers,
DBMSTClu detects the same as singleton clusters. As
theoretically proved above, experiments emphasize the
fact that our algorithm is more subtle than simply cutting the heaviest edges as the failure of SEMST shows.
Moreover our algorithm exhibits an ability to detect
outliers, which could be labeled as noise in a postprocessing phase. Another decisive advantage of our algorithm is the absence of any required parameters, contrarily to DBSCAN. For the mushroom dataset, if suitable parameters are given to SEMST and DBSCAN,
the right 23 clusters get found while DBMSTClu retrieves them without tuning any parameter. Quantitative results for the synthetic datasets are shown in Table 3: the achieved silhouette coefficient (between −1
and 1), Adjusted Rand Index (ARI) (between 0 and 1)
and DBCVI. For all the indices, the higher, the better.
Further analysis can be read in supplementary material.
For the mushroom dataset, the corresponding DBCVI
and silhouette coefficient are resp. 0.75 and 0.47.
SEMST
DBSCAN
DBMSTClu
Silhouette coeff.
0.16 -0.12
0.02
0.26
-0.26 0.26
ARI
0
0.99
0.99
0
0.99
0.99
DBCVI
0.001 0.06
-0.26 0.15
0.18 0.15
Table 1: Silhouette coefficients, ARI and DBCVI for the
noisy circles (left) and noisy moons (right) datasets.
5.2 Scalability of the clustering. For mushroom
dataset, DBMSTClu’s execution time (avg. on 5 runs)
is 3.36s while DBSCAN requires 9.00s. This gives a
first overview of its ability to deal with high number
of clusters. Further experiments on execution time
were conducted on large-scale random weighted graphs
generated from the Stochastic Block Model with varying
equal-sized number of clusters K and N . The scalability
of DBMSTClu is shown in Fig. 9 and Table 2 by
exhibiting the linear time complexity in N . Graphs with
1M of nodes and 100 clusters were easily clustered. In
Table 2, the row with the execution time ratio between
K = 100 and K = 5 illustrates the first trick from
§4.3 as the observed time ratio is around 2/3 of the
Copyright c 2018 by SIAM
Unauthorized reproduction of this article is prohibited
1.5
1.5
1.5
1.0
1.0
1.0
0.5
0.5
0.5
0.0
0.0
0.0
0.5
0.5
0.5
1.0
1.0
1.0
1.5
1.5
2
1
0
1
2
2
1
0
1
1.5
2
2
1
0
1
2
Figure 6: Noisy circles: SEMST, DBSCAN ( = 0.15, minP ts = 5), DBMSTClu with an approximate MST.
1.5
1.5
1.5
1.0
1.0
1.0
0.5
0.5
0.5
0.0
0.0
0.0
0.5
0.5
0.5
1.0
1.0
0.5
0.0
0.5
1.0
1.5
2.0
1.0
1.0
0.5
0.0
0.5
1.0
1.5
1.0
2.0
1.0
0.5
0.0
0.5
1.0
1.5
2.0
Figure 7: Noisy moons: SEMST, DBSCAN ( = 0.16, minP ts = 5), DBMSTClu with an approximate MST.
4 3 2
1 0 1
2 3 4
5
3
2
1
0
1
2
3
3
2
1
0
1
2
3
4 3 2
1 0 1
2 3 4
5
3
2
1
0
1
2
3
3
2
1
0
1
2
3
4 3 2
1 0 1
2 3 4
5
3
2
1
0
1
2
3
3
2
1
0
1
2
3
Figure 8: Mushroom dataset: SEMST, DBSCAN ( = 1.5, minP ts = 2), DBMSTClu with an approximate MST
(projection on the first three principal components).
Clu is non-parametric, unlike most existing clustering
methods: it automatically determines the right number
4000
of nonconvex clusters. Although the approach is funK=5
K=20
3500
damentally independent from the sketching phase, its
K=100
3000
robustness has been assessed by using as input an ap2500
proximate MST of the sketched G rather than an exact
2000
one. The graph sketch is computed dynamically on the
1500
1000
fly as new edge weight updates are read in only one
500
pass over the data. This brings a space-efficient solu0
0
200000
400000
600000
800000
1000000
tion for finding an MST of G when the O(N 2 ) edges
Number of points
cannot fit in memory. Hence, our algorithm adapts to
Figure 9: DBMSTClu’s execution time with values of
the semi-streaming setting with O(N polylog N ) space.
N ∈ {1K, 10K, 50K, 100K, 250K, 500K, 750K, 1M}.
Our approach shows promising results, as evidenced by
the experimental part regarding time and space scala6 Conclusion
bility and clustering performance even with sketching.
In this paper we introduced DBMSTClu a novel space- Further work would consist in using this algorithm in
efficient Density-Based Clustering algorithm which only privacy issues, as the lost information when sketching
relies on a Minimum Spanning Tree (MST) of the dis- might ensure data privacy. Moreover, as it is already the
similarity graph G: the spatial and time costs are resp. case for the graph sketching, we could look for adaptO(N ) and O(N K) with N the number of data points ing both the MST recovery and DBMSTClu to the fully
and K the number of clusters. This enables to deal eas- online setting, i.e. to be able to modify dynamically curily with graphs of million of nodes. Moreover, DBMSTTime (s)
theoretical one 100/5 = 20.
Copyright c 2018 by SIAM
Unauthorized reproduction of this article is prohibited
K\N
5
20
100
“100/5”
1000
0.34
0.95
4.36
12.82
10000
2.96
8.73
40.25
13.60
50000
14.37
43.71
201.76
14.04
100000
28.91
88.51
398.41
13.78
250000
73.04
223.18
995.42
13.63
500000
148.85
449.37
2011.79
13.52
750000
218.11
669.29
3015.61
13.83
1000000
292.25
889.88
4016.13
13.74
Table 2: Numerical values for DBMSTClu’s execution time (in s) varying N and K (avg. on 5 runs). The last
row shows the execution time ratio between K = 100 and K = 5.
rent MST and clustering partition as a new edge weight
update from the stream is seen.
[16]
References
[1] S. Lloyd, Least Squares Quantization in PCM, IEEE
Trans. Inf. Theor., 28 (1982), pp. 129–137.
[2] A. Jain and R. Dubes, Algorithms for Clustering Data,
Prentice Hall, Upper Saddle River, NJ, USA, 1988.
[3] L. Kaufman and P. Rousseeuw, Clustering by means
of medoids, Statistical Data Analysis Based on the
L1 Norm and Related Methods, pp. 405–416, 1987.
[4] M. Ester, H. Kriegel, J. Sander, X. Xu, A densitybased algorithm for discovering clusters in large spatial
databases with noise, AAAI Press (1996), pp. 226–231.
[5] S. Muthukrishnan, Data Streams: Algorithms and
Applications, Found. Trends Theor. Comput. Sci., 1
(2005), pp. 117–236.
[6] K. Ahn, S. Guha and A. McGregor, Analyzing Graph
Structure via Linear Measurements, ACM-SIAM Symposium on Discrete Algorithms, 2012, Kyoto, Japan,
pp. 459–467.
[7] S. Schaeffer, Survey: Graph Clustering, Comput. Sci.
Rev., 1 (2007), pp. 27–64.
[8] M. Girvan and M. Newman, Community Structure
in Social and Biological Networks, Proceedings of the
National Academy of Sciences of the United States of
America, 99 (2012), pp.7821-7826.
[9] M. Nascimento and A. de Carvalho, Spectral methods
for graph clustering - A survey, European Journal of
Operational Research, 211 (2011), pp.221-231.
[10] T. Falkowski, A. Barth and M. Spiliopoulou, DENGRAPH: A Density-based Community Detection Algorithm, IEEE/WIC/ACM International Conference on
Web Intelligence, pp. 112–115, 2007.
[11] N. Ailon, Y. Chen and H. Xu, Breaking the Small Cluster Barrier of Graph Clustering, CoRR, abs/1302.4549,
2013.
[12] S. Oymak and B. Hassibi, Finding Dense Clusters
via ”Low Rank + Sparse” Decomposition, CoRR,
abs/1104.5186, 2011.
[13] Y. Chen, S. Sanghavi and H. Xu, Clustering Sparse
Graphs, Advances in Neural Information Processing
Systems, 25 (2012), pp. 2204–2212.
[14] Y. Chen, A. Jalali, S. Sanghavi and H. Xu, Clustering
Partially Observed Graphs via Convex Optimization, J.
Mach. Learn. Res., 15 (2014), pp. 2213–2238.
[15] Y. Chen, and S. Lim and H. Xu, Weighted Graph Clustering with Non-uniform Uncertainties, International
[17]
[18]
[19]
[20]
[21]
[22]
[23]
[24]
[25]
[26]
[27]
[28]
[29]
Conference on Machine Learning, 32 (2014), Beijing,
China, pp. II-1566–II-1574.
P. Holland, K. Laskey and S. Leinhardt, Stochastic
blockmodels: First steps, Social Networks, 5 (1983),
pp.109–137.
A. Condon and R. Karp, Algorithms for Graph Partitioning on the Planted Partition Model, Random
Struct. Algorithms, 18 (2001), pp.116–140.
K. Rohe, S. Chatterjee and B. Yu, Spectral clustering
and the high-dimensional stochastic blockmodel, Ann.
Statist., 39 (2011), pp. 1878–1915.
C. Zahn, Graph-Theoretical Methods for Detecting and
Describing Gestalt Clusters, IEEE Trans. Comput., 20,
(1971), pp. 68–86.
T. Asano, B. Bhattacharya, M. Keil, F. Yao, Clustering
Algorithms Based on Minimum and Maximum Spanning Trees, Symposium on Computational Geometry,
Urbana-Champaign, IL, USA, pp. 252–257, 1988.
O. Grygorash, Y. Zhou and Z. Jorgensen, Minimum
Spanning Tree Based Clustering Algorithms, IEEE
Int.Conference on Tools with Artificial Intelligence,
pp. 73-81, 2006.
K. Ahn, S.Guha and A. McGregor, Graph Sketches:
Sparsification, Spanners, and Subgraphs, ACM
SIGMOD-SIGACT-SIGAI Symposium on Principles
of Database Systems, Scottsdale, AZ, USA, pp. 5–14,
2012.
N. Ailon, R. Jaiswal, C. Monteleoni, Streaming kmeans approximation, Advances in Neural Information
Processing Systems, 22 (2009), pp. 10–18.
S. Guha, R. Rastogi and K. Shim, Cure: An Efficient
Clustering Algorithm for Large Databases, Inf. Syst.,
26 (2001), pp. 35–58.
C. Aggarwal, J. Han, J. Wang, and P. Yu, A Framework
for Clustering Evolving Data Streams, International
Conference on Very Large Data Bases, 29 (2003),
Berlin, Germany, pp.81–92.
F. Cao, M. Ester, W. Qian and A. Zhou, Density-based
clustering over an evolving data stream with noise,
SIAM Conference on Data Mining (2006), pp. 328–339.
G. Cormode and D. Firmani, A unifying framework
for `0 -sampling algorithms, Distributed and Parallel
Databases, 32 (2014), pp. 315–335.
D. Moulavi, P. Jaskowiak, R. Campello, A. Zimek and
J. Sander, Density-Based Clustering Validation, SIAM
ICDM, Philadelphia, PA, USA, pp. 839–847, 2014.
P. Rousseeuw, Silhouettes: A graphical aid to the
interpretation and validation of cluster analysis, J.
Comput. and Appl. Math., 20 (1987), pp. 53–65.
Copyright c 2018 by SIAM
Unauthorized reproduction of this article is prohibited
7
Proofs.
7.1
maximal weight w1 stands between two subtrees with the
same number of points, i.e. n1 = N/2, e1 is always
preferred over e2 as the first optimal cut.
Proof of Prop. 4.1.
Proposition 4.1. When the first cut is not the
heaviest Let T be an MST of the dissimilarity data
graph with N nodes. Let us consider this specific case:
all edges have a weight equal to w except two edges e1
and e2 resp. with weight w1 and w2 s.t. w1 > w2 >
w > 0. DBMSTClu does not cut any edge with weight
w and cuts e2 instead of e1 as a first cut iff:
p
2n2 w1 − n1 + n21 + 4w1 (n22 w1 + N 2 − N n1 − n22 )
w2 >
2(N − n1 + n2 )
where n1 (resp. n2 ) is the number of nodes in the
first cluster resulting from the cut of e1 (resp. e2 ).
Otherwise, e1 gets cut.
Proof. Let DBCV I1 (resp. DBCV I2 ) be the DBCVI
after cut of e1 (resp. e2 ). As w (resp. w1 ) is the
minimum (resp. maximal) weight, the algorithm does
not cut e since the resulting DBCVI would be negative
(cf. Lemma 4.2) while DBCV I1 is guaranteed to be
positive (cf. Lemma 4.1). So, the choice will be
between e1 and e2 but e2 gets cut iff DBCV I2 >
DBCV I1 . DBCV I1 and DBCV I2 expressions are
simplified w.l.o.g. by scaling the weights by w s.t.
w ← 1, w1 ← w1 /w, w2 ← w2 /w, hence w1 > w2 > 1.
Then,
DBCV I2 > DBCV I1 > 0
1
n2 w 2
n2
(
)(1 −
⇐⇒
− 1) + (1 −
)
N w1
N
w2
n1
1
w2
n1
−
(1 −
)(1 −
) + (1 −
)>0
N
w1
N
w1
⇐⇒ w22 (N + n2 − n1 ) +w2 (n1 − 2n2 w1 )
{z
}
|
{z
}
|
a
+ (n2 − N )w1 > 0.
|
{z
}
b
Proof. A reductio ad absurdum is made by showing that
cutting edge e2 i.e. DBCV I2 > DBCV I1 leads to the
contradiction w1 /w < 1. With the scaling process from
Prop. 4.1’proof:
1
1
w2
1
w2
1
(1 −
) + (1 −
)=1−
−
2
w1
2
w1
2w1
2w1
n2 w2
n2
1
DBCV I2 =
(
− 1) + (1 −
)(1 −
)
N w1
N
w2
1
n2 w2
1
=1−
+
(
+
− 2)
w2
N w1
w
|
{z 2 }
DBCV I1 =
=A
There is w2 > w = 1, so w12 < 1. Besides w2 < w1 so
w2
w1 < 1 thus, A < 0. Let now consider w.l.o.g. that
edge e2 is on the ”right side” (right cluster/subtree) of
e1 (similar proof if e2 is on the left side of e1 ). Hence,
it is clear that for maximizing DBCV I2 as a function
of n2 , we need n2 = n1 + 1. Then,
DBCV I2 > DBCV I1
1
1
1 w2
1
1
w2
⇐⇒ −
+ ( + )(
−2+
)>−
−
w2
2 N w1
w2
w1
w1
1
1
1
1
2
⇐⇒ (
+
+
+
)w2 − 1 −
2w1
N w1
2w1
N
2w1
1
1 1
+ (−1 + + )
>0
2 N w2
2
1
1
⇐⇒ (1 + ) w22 + w2 ( − w1 (1 + ))
N
2
N
| {z }
|
{z
}
a>0
b<0
1
+ w1 ( −
| N {z
c<0
1
)>0
2}
As c/a < 0 and w2 > 0, w2 > 2(NN+1) [ w1 (1 + N2 ) − 12 +
√
∆ ] with ∆ = (w1 (1 + N2 ) − 12 )2 + 4(1 + N1 )( 12 − N1 )w1 .
Clearly, ∆ = b2 − 4ac is positive
and
c/a
is
negative.
This inequality is incompatible with w1 > w2 since:
√
b2 −4ac
But w2 > 0, then w2 > −b+ 2a
which gives the
N
2
1 √
final result after some simplifications.
w1 > w2 ⇐⇒ w1 >
[ w1 (1 + ) − + ∆ ]
2(N + 1)
N
2
√
1
7.2 Proof of Prop. 4.2.
⇐⇒ w1 + > ∆
2
Proposition 4.2. First cut on the heaviest edge
4 2
1
4
1
⇐⇒
w (1 + ) + w1 (−1 − ) < 0
in the middle Let T be an MST of the dissimilarity
N 1
N
N
N
data graph with N nodes. Let us consider this specific
⇐⇒ w1 < 1 : ILLICIT
case: all edges have a weight equal to w except two
edges e1 and e2 resp. with weight w1 and w2 s.t. Indeed, after the scaling process, w1 < 1 = w is not
w1 > w2 > w > 0. Denote n1 (resp. n2 ) the number possible since by hypothesis, w1 > w. Finally, it is not
of nodes in the first cluster resulting from the cut of e1 allowed to cut e2 , the only remaining possible edge to
(resp. e2 ). In the particular case where edge e1 with cut is e1 .
c<0
Copyright c 2018 by SIAM
Unauthorized reproduction of this article is prohibited
7.4
Ci
l
wsep
Cil
wmax
Cir
r
wsep
Proof of Prop. 4.4.
Proposition 4.4. Fate of positive VC cluster I
Let T be an MST of the dissimilarity data graph and C
a cluster s.t. VC (C) > 0 and SEP(C) = s. DBMSTClu
does not cut an edge e of C with weight w < s if
both resulting clusters have at least one edge with weight
greater than w.
Proof. Let us consider clusters C1 and C2 resulting
from the cut of edge e. Assume that in the associated
subtree of C1 (resp. C2 ), there is an edge e1 (resp.
Figure 10: Generic example for proof of Prop. 4.3 and e2 ) with a weight w1 (resp. w2 ) higher than w s.t.
without loss of generality, w1 > w2 . Since VC (C) > 0,
4.5.
s > w1 > w2 > w. But cutting edge e implies that
for i ∈ {1, 2}, DISP(Ci ) > SEP(Ci ) = w, and thus
7.3 Proof of Prop. 4.3.
VC (Ci ) < 0. Cutting edge e would therefore mean to
Proposition 4.3. Fate of negative VC cluster replace a cluster C s.t. VC (C) > 0 by two clusters s.t.
Let K = t + 1 be the number of clusters in the clustering for i ∈ {1, 2}, VC (Ci ) < 0 which obviously decreases the
partition at iteration t. If for some i ∈ [K], VC (Ci ) < 0, current DBCVI. Thus, e does not get cut at this step of
the algorithm.
then DBMSTClu will cut an edge at this stage.
Proof. Let i ∈ [K] s.t. VC (Ci ) < 0 i.e. SEP(Ci ) <
l
DISP(Ci ). We denote wsep
the minimal weight outing
cluster Ci and wmax the maximal weight in subtree Si
def
def
l
of Ci i.e. SEP(Ci ) = wsep
and DISP(Ci ) = wmax .
l
< wmax . By cutting the cluster Ci on the
Hence, wsep
edge with weight wmax , we define Cil and Cir resp. the
left and right resulting clusters.
Let us look at VC (Cil ). If SEP(Cil ) ≥ DISP(Cil )
SEP(C l )
then VC (Cil ) ≥ 0 ≥ VC (Ci ) else VC (Cil ) = DISP(Cil ) − 1.
i
The definition of the Separation as a minimum and our
cut imply that
SEP(Cil ) ≥ min(SEP(Ci ), wmax ) ≥ SEP(Ci ).
7.5
Proof of Prop. 4.5.
Proposition 4.5. Fate of positive VC cluster II
Consider a partition with K clusters s.t. some cluster
Ci , i ∈ [K] with VC (Ci ) > 0 is in the setting of Fig. 10
i.e. cutting the heaviest edge e with weight wmax results
in two clusters: the left (resp. right) cluster Cil (resp.
Cir ) with n1 points (resp. n2 ) s.t. DISP(Cil ) = d1 ,
r
l
.
, DISP(Cir ) = d2 and SEP(Cir ) = wsep
SEP(Cil ) = wsep
l
r
Assuming w.l.o.g. wsep > wsep , e gets cut iff:
n1 d1 +n2 d2
n1 +n2
wmax
≤
wmax
.
r
wsep
Also the definition of the Dispersion as a maximum
implies that DISP(Cil ) ≤ DISP(Ci ). Hence we get that
r
Proof. As VC (Ci ) > 0, there is SEP(Ci ) = wsep
>
w
.
Then,
the
DBCVI
before
(K
clusters)
and
after
max
− 1 i.e. VC (Cil ) ≥ VC (Ci ) in
−1 ≥
cut of wmax (K + 1 clusters) are:
r
this case too. The same reasoning holds for Ci showing
that VC (Cir ) ≥ VC (Ci ). Finally,
K
X
n1 + n2
wmax
DBCV
I
=
V
(C
)
+
1
−
K
C
j
r
X nj
N
wsep
nl
nr
j6=i
DBCV Iaf tercut =
VC (Cj ) + i VC (Cil ) + i VC (Cir )
N
N
N
K
X
j6=i
n1
d1
DBCV
I
=
V
(C
)
+
1
−
K+1
C
j
X nj
nl
nr
N
wmax
j6=i
≥
VC (Cj ) + i VC (Ci ) + i VC (Ci )
N
N
N
j6=i
n2
d2
+
1−
= DBCV Ibef orecut .
N
wmax
SEP(Cil )
DISP(Cil )
SEP(Ci )
DISP(Ci )
Hence cutting the edge with maximal weight in Ci
improves the resulting DBCVI.
DBMSTClu cuts wmax iff DBCV IK+1 ≥ DBCV IK .
So the result after simplification.
Copyright c 2018 by SIAM
Unauthorized reproduction of this article is prohibited
8
Complements on experiments.
Experiments were conducted using Python and scikitlearn library [1] on a single-thread process on an intel
processor based node.
8.1 Safety of the sketching. Fig. 11 shows another
result on a synthetic dataset: three blobs generated
from three Gaussian distributions. With the three
blobs, each method SEMST, DBSCAN and DBMSTClu
performs well: they all manage to retrieve three clusters.
Quantitative results for the three synthetic datasets
are shown in Table 3: the achieved silhouette coefficient, Adjusted Rand Index (ARI) and DBCVI. For all
the indices, the higher, the better. Silhouette coefficient (between −1 and 1) is used to measure a clustering partition without any external information. For
DBSCAN it is computed by considering noise points as
singletons. We see that this measure is not very suitable
for nonconvex clusters like noisy circles or moons. The
ARI (between 0 and 1) measures the similarity between
the experimental clustering partition and the known
groundtruth. DBSCAN and DBMSTClu give similar
almost optimal results. Finally, the obtained DBCVIs
are consistent, since the best ones are reached for DBMSTClu.
References
[1] F. Pedregosa, G. Varoquaux, A. Gramfort, V. Michel,
B. Thirion, O. Grisel, M. Blondel, P. Prettenhofer,
R. Weiss, V. Dubourg, J. Vanderplas, A. Passos,
D. Cournapeau, M. Brucher, M. Perrot and E. Duchesnay, Scikit-learn: Machine Learning in Python, Journal
of Machine Learning Research, 12 (2011), pp. 2825–
2830.
Copyright c 2018 by SIAM
Unauthorized reproduction of this article is prohibited
15
15
15
10
10
10
5
5
5
0
0
0
5
5
5
10
10
10
15
15
20
15
10
5
0
5
10
15
20
25
20
15
10
5
0
5
10
15
20
25
15
20
15
10
5
0
5
10
15
20
25
Figure 11: Three blobs: SEMST, DBSCAN ( = 1.4, minP ts = 5), DBMSTClu with an approximate MST.
SEMST
DBSCAN
DBMSTClu
Silhouette coeff.
0.84 0.16 -0.12
0.84 0.02
0.26
0.84 -0.26 0.26
Adjusted Rand Index
1 0
0
1 0.99 0.99
1 0.99 0.99
DBCVI
0.84 0.001
0.84 -0.26
0.84 0.18
0.06
0.15
0.15
Table 3: Silhouette coefficients, Adjusted Rand Index and DBCVI for the blobs, noisy circles and noisy moons
datasets with SEMST, DBSCAN and DBMSTClu.
Copyright c 2018 by SIAM
Unauthorized reproduction of this article is prohibited
| 8cs.DS
|
Learning Multi-item Auctions with (or without) Samples
arXiv:1709.00228v1 [cs.GT] 1 Sep 2017
Yang Cai
McGill University, Canada
[email protected]
Constantinos Daskalakis
EECS and CSAIL, MIT, USA
[email protected]
September 4, 2017
Abstract
We provide algorithms that learn simple auctions whose revenue is approximately optimal in multi-item
multi-bidder settings, for a wide range of bidder valuations including unit-demand, additive, constrained
additive, XOS, and subadditive. We obtain our learning results in two settings. The first is the commonly
studied setting where sample access to the bidders’ distributions over valuations is given, for both regular
distributions and arbitrary distributions with bounded support. Here, our algorithms require polynomially
many samples in the number of items and bidders. The second is a more general max-min learning setting
that we introduce, where we are given “approximate distributions,” and we seek to compute a mechanism
whose revenue is approximately optimal simultaneously for all “true distributions” that are close to the ones
we were given. These results are more general in that they imply the sample-based results, and are also
applicable in settings where we have no sample access to the underlying distributions but have estimated
them indirectly via market research or by observation of bidder behavior in previously run, potentially
non-truthful auctions.
All our results hold for valuation distributions satisfying the standard (and necessary) independenceacross-items property. They also generalize and improve upon recent works of Goldner and Karlin [28]
and Morgenstern and Roughgarden [35], which have provided algorithms that learn approximately optimal
multi-item mechanisms in more restricted settings with additive, subadditive and unit-demand valuations
using sample access to distributions. We generalize these results to the complete unit-demand, additive,
and XOS setting, to i.i.d. subadditive bidders, and to the max-min setting.
Our results are enabled by new uniform convergence bounds for hypotheses classes under product
measures. Our bounds result in exponential savings in sample complexity compared to bounds derived by
bounding the VC dimension, and are of independent interest.
1 Introduction
The design of revenue-optimal auctions is a central problem in Economics and Computer Science, which has
found myriad applications in online and offline settings, ranging from sponsored search and online advertising
to selling artwork by auction houses, and public goods such as drilling rights and radio spectrum by governments. The problem involves a seller who wants to sell one or several items to one or multiple strategic bidders
with private valuation functions, mapping each bundle of items they may receive to how much value they
derive from the bundle. As no meaningful revenue guarantee can possibly be achieved without any information about the valuations of the bidders, the problem has been classically studied under Bayesian assumptions,
where a joint distribution from which all bidders’ valuations are drawn is common knowledge, and the goal is
to maximize revenue in expectation with respect to this distribution.
In the single-item setting, Bayesian assumptions have enabled beautiful and influential developments in
auction theory. Already 36 years ago, a breakthrough result by Myerson identified the optimal single-item
auction when bidder values are independent [36], and the ensuing decades saw a great deal of further understanding and practical applications of single-item auctions, importantly in online settings.
However, the quest for optimal multi-item auctions has been quite more challenging. It has been recognized
that revenue-optimal multi-item auctions can be really complex, may exhibit counter-intuitive properties, and
be fragile to changes in the underlying distributions; for a discussion and examples see survey [18]. As such,
it is doubtful that there is a crisp characterization of the structure of optimal multi-item auctions, at least not
beyond single-bidder settings [19]. On the other hand, there has been significant recent progress in efficient
computation of revenue-optimal auctions [14, 15, 1, 7, 3, 8, 9, 12, 10, 2, 6, 20]. Importantly, this progress has
enabled identifying simple auctions (mostly variations of sequential posted pricing mechanisms) that achieve
constant factor approximations to the revenue of the optimum [5, 42, 11, 16, 13], under the item-independence
assumption of Definition 1 and Example 1. These auctions are way simpler than the optimum, and have strong
incentive properties: they are dominant strategy truthful, while still competing against the optimal Bayesian
truthful mechanism. The current state-of-the-art is given as Theorem 8, which applies to bidders with valuation
functions from the broad class of fractionally subbaditive (a.k.a. XOS) valuations, which contains submodular.
As our discussion illustrates, studying auctions assuming Bayesian priors has been quite fruitful, enabling
us to identify guiding principles for how to structure auctions to achieve optimal (in single-item settings)
or approximately optimal (in multi-item settings) revenue. To apply this theory to practice, however, one
needs knowledge of the underlying distributions. Typically, one would estimate these distributions via market
research or by observations of bidder behavior in prior auctions, then use the estimated distributions to design
a good auction. However, estimation involves approximation, and the performance of mechanisms can be
quite fragile to errors in the distributions. This motivates studying whether optimal or approximately optimal
auctions can be identified when one has imperfect knowledge of the true distributions.
With this motivation, recent work in Computer Science has studied whether approximately optimal mechanisms can be “learned” given sample access to the underlying distributions. This work has lead to an almost
complete picture for the single-item (and the more general single-parameter) setting where Myerson’s theory
applies, showing how near-optimal mechanisms can be learned from polynomially many (in the approximation
and the number of bidders) samples [26, 17, 33, 31, 34, 22, 38, 29].
On the multi-item front, however, where the analogue of Myerson’s theory is elusive, and unlikely, our
understanding is much sparser. Recent work of Morgenstern and Roughgarden [35] has taken a computational
learning theory approach to identify the sample complexity required to optimize over classes of simple auctions. Combined with the afore-described results on the revenue guarantees of simple auctions, their work
leads to algorithms that learn approximately optimal auctions in multi-item settings with multiple unit-demand
bidders, or a single subadditive bidder, from polynomially many samples in the number of items and bidders. These results apply to distributions satisfying the item-independence assumption of Definition 1 and
1
Example 1, under which the approximate optimality of simple auctions has been established.
While well-suited for identifying the sample complexity required to optimize over a class of simple mechanisms, which is a perfectly reasonable goal to have but not the one in this paper, the approach taken in [35] is
arguably imperfect towards proving polynomial sample bounds for learning approximately optimal auctions in
the settings where simple mechanisms are known to perform well in the first place. This is due to the following
discordance: (i) On the one hand, simple and approximately optimal mechanisms in multi-item settings are
mostly only known under item-independence. (ii) On the other hand, the computational learning techniques
employed in [35], and in particular bounding the pseudo-dimension of a class of auctions, are not fine enough
to discern the difference in sample complexity required to optimize under item-independence and without itemindependence. As such, this technique can only obtain polynomial sample bounds for approximate revenue
optimization if it so happens that a class of mechanisms is both learnable from polynomially-many samples
under arbitrary distributions, and it guarantees approximately optimal revenue under item-independence, or
for some other interesting class of distributions.1
In particular, bounding the pseudo-dimension of classes of auctions as a means to prove polynomialsample bounds for approximate revenue optimization hits a barrier even for multiple additive bidders with
independent values for items. In this setting, the approximately optimal auctions that are known are the best of
selling the items separately or running a VCG mechanism with entry fees [42, 11], as described in Section 5.2.
Unfortunately, the latter can easily be seen to have pseudo-dimension that is exponential in the number of
bidders, thus only implying a sufficient exponentially large sample size to optimize over these mechanisms.
Is this exponential sample size really necessary or an artifact of the approach? Recent work of Goldner and
Karlin [28] gives us hope that it is the latter. They show how to learn approximately optimal auctions in the
multi-item multi-bidder setting with additive bidders using only one sample from each bidder’s distribution,
assuming that it is regular and independent across items.
Our results. We show that simple and approximately optimal mechanisms are learnable from polynomiallymany samples for multi-item multi-bidder settings, whenever:
• the bidder valuations are fractionally subadditive (XOS), i.e. we can accommodate additive, unitdemand, constrained additive, and submodular valuations;
• the distributions over valuations satisfy the standard item-independence assumption of Definition 1 and
Example 1, and their single-item marginals are arbitrary and bounded, or (have arbitrary supports but
are) regular.2
In particular, our results constitute vast extensions of known results on the polynomial learnability of approximately optimal auctions in multi-item settings [35, 28]. Additionally we show that:
• whenever the valuations are additive and unit-demand, or whenever the bidders are symmetric and have
XOS valuations, our approximately optimal mechanisms can be identified from polynomially many
samples and in polynomial time;
• whenever the bidders are symmetric (i.e. their valuations are independent and identically distributed) and
have subadditive valuations, we can computefrom polynomially
many samples and in polynomial-time
n
a simple mechanism whose revenue is a Ω max{m,n} -fraction of the optimum, where m and n are
respectively the number of items and bidders. In particular, if the number of bidders is at least a constant
fraction of the number of items, the mechanism is a constant factor approximation; and
1
It is known that some restriction needs to be made on the distribution to gain polynomial sample complexity, as otherwise exponential lower bounds are known for learning approximately optimal auctions even for a single unit-demand bidder [24].
2
We note again that without the standard item-independence (or some other) restriction on the distributions, we cannot hope to
learn approximately optimal auctions from sub-exponentially many samples, even for a single unit-demand bidder [24].
2
• in the setting of the previous bullet, if the item marginals are regular, our mechanism is prior-independent,
i.e. there is a single mechanism, identifiable without any samples from the distributions, providing the
afore-described revenue guarantee.
Finally, the mechanisms learned by our algorithms for XOS bidders are either rationed sequential posted price
mechanisms (RSPMs) or anonymous sequential posted price mechanisms with entry fees (ASPEs) as defined
in Section 6. The mechanisms learned for symmetric subadditive bidders are RSPMs. RSPMs maintain a price
pij for every bidder and item pair and, in some order over bidders i = 1, . . . , n, they give one opportunity to
bidder i to purchase one item j that has not been purchased yet at price pij . ASPEs maintain one price pj for
every item and, in some order over bidders i = 1, . . . , n, they give one opportunity to bidder i to purchase any
subset S ′ of the items S that have not been purchased yet as long as he also pays an “entry fee” that depends
on S and the identity of the bidder. See Algorithm 3.
Learning without Samples. Thus far, our algorithms used samples from the valuation distributions to identify an approximately optimal and simple mechanism under item-independence. However, having sample access to the distributions may be impractical. Often we can observe the actions used by bidders in non-truthful
auctions that were previously run, and use these observations to estimate the distributions over valuations using
econometric methods [30, 37, 4]. In fact, it may likely be the case we have never sold all the items together in
the past, and only have observations of bidder behavior in non-truthful auctions selling each item separately.
Econometric methods would achieve better approximations in this case, but only for the item marginals. Finally, we may want to combine multiple sources of information about the distributions, combining past bidder
behavior in several different auctions and with market research data.
With this motivation in mind, we would like to extend our learnability results beyond the setting where
sample access to the valuation distributions is provided. We propose “learning” approximately optimal multiitem auctions given distributions that are close to the true distributions under some distribution distance d(·, ·).
In particular, given approximate distributions D̂1 , . . . , D̂n over bidder valuations, we are looking to identify a
mechanism M satisfying the following max-min style objective:
∀D1 , . . . , Dn s.t. d(Di , D̂i ) ≤ ǫ, ∀i : RevM (D1 , . . . , Dn ) ≥ Ω(OPT(D1 , . . . , Dn )) − poly(ǫ, m, n). (1)
That is, we want to find a mechanism M whose revenue is within a constant multiplicative and a poly(ǫ, m, n)
additive error from optimum, simultaneously in all possible worlds D1 , . . . , Dn , where d(Di , D̂i ) ≤ ǫ, ∀i. It
is not a priori clear that such a “one-fits-all” mechanism actually exists.
There are several notions of distance d(·, ·) between distributions that we could study in the formulation
of Goal (1), but we opt for an easy one to satisfy. We only require that we know every bidder’s marginal
distributions over single-item values to within ǫ in Kolmogorov distance;3 see Definition 2. All that this
requires is that the cumulative density functions of the approximating distributions over single-item values
is within ǫ in infinity norm from the corresponding cumulative density functions of the corresponding true
distributions. As such, it is an easy property to satisfy. For example, given sample access to any single-item
marginal, the DKW inequality [25] implies that O(log(1/δ)/ǫ2 ) samples suffice to learn it to within ǫ in
Kolmogorov distance, with probability at least 1 − δ. So achieving Goal (1) directly also implies polynomial
sample learnability of approximately optimal auctions. But a Kolmogorov approximation can also be arrived
at by combining different sources of information about the single-item marginals such as the ones described
above. Regardless of how the approximations were obtained, the max-min goal outlined above guarantees
3
Indeed, Goal (1) is achievable only for bounded distributions even in the single-item single-bidder setting. Given any bounded
distribution D̂, create D by moving ǫ probability mass in D̂ to +∞. It is not hard to see that D and D̂ are within ǫ in Kolmogorov
distance, but no single mechanism can satisfy the approximation guarantee for both D and D̂ simultaneously. Using a similar argument,
we can argue that the additive error has to depend on H which is the upper bound on any bidder’s value for a single item. See Section 2
for our formal model.
3
robustness of the revenue of the identified mechanism M with respect to all sources of error that came into the
estimation of the single-item marginal distributions.
While Goal (1) is not a priori feasible, we show how to achieve it in multi-item multi-bidder settings with
constrained additive bidders, or symmetric bidders with subadditive valuations, under the standard assumption
of item-independence. Our results are polynomial-time in the same cases as our sample-based results discussed
above.
Roadmap and Technical Ideas. In Section 4, we present a new approach for obtaining uniform convergence
bounds for hypotheses classes under product distributions; see Theorem 2 and Corollary 1. We show that our
approach can significantly improve the sample complexity bound obtained via traditional methods such as
VC theory. In particular, Table 3 compares the sample complexity bounds obtained via our approach to those
obtained by VC theory for different classes of hypotheses.
Our results for mechanisms make use of recent work on the revenue guarantees of simple mechanisms,
which are mainly variants of sequential posted pricing mechanisms [11, 13]. Using our results from Section 4, in Section 5, we derive uniform convergence bounds for the revenue of a class of mechanisms shown to
achieve a constant fraction of optimal revenue when all bidders have valuations that are constrained additive
over independent items. These mechanisms are called Sequential Posted Price with Entry Fee Mechanisms,
a.k.a. SPEMs,4 . As a corollary of the uniform convergence of SPEMs, we obtain our sample based results
for constrained additive bidders. In fact, we obtain a slightly stronger statement than uniform convergence of
the revenue of SPEMs, which also implies our max-min results for constrained-additive bidders; see Theorems 3 and 4. In particular, Theorem 4 and the DKW inequality imply the polynomial-sample learnability of
approximately revenue-optimal auctions for constrained additive bidders.
Technically speaking, our sample based and max-min approximation results for constrained additive bidders provide a crisp illustration of how we leverage item-independence and our new uniform convergence
bounds for product measures to sidestep the exponential pseudo-dimension of the class of mechanisms that
we are optimizing over. Let us discuss our max-min results which are stronger. Suppose Di = ×j Dij is the
true distribution over bidder i’s valuation and D̂i = ×j D̂ij is the approximating distribution, where Dij and
D̂ij are respectively the item j marginals. To argue that the revenue of some anonymous sequential posted
price with entry fees (ASPE) mechanism is similar under D = ×i Di and D̂ = ×i D̂i , we need to couple in
total variation distance the decisions of what sets all bidders buy in the execution of the mechanism under
D and D̂. The issue that we encounter is that there are exponentially many subsets each bidder may buy,
hence the naive use of the Kolmogorov bound ||Dij − D̂ij ||K ≤ ǫ, on each single-item marginal results in
an exponential blow-up in the total variation distance of what subset of items bidder i buys, invalidating our
desired coupling. To circumvent this challenge, we argue in Lemma 4 that the events corresponding to which
subset of items each buyer will buy are single-intersecting, according to Definition 4, when seen as events on
the buyer’s single-item values. Single-intersecting events may be non-convex and have infinite VC dimension.
Nevertheless, because single-item values are independent, our new uniform convergence bounds for product
measures (Lemma 3) imply that the difference in probabilities of any such event under D and D̂ is only a
factor of m, the number of items, larger than the bound ǫ on the Kolmogorov distance between single-item
marginals.
We specialize our results to unit-demand bidders in Section 5.1 to obtain computationally efficient solutions for both max-min and sample-based models. Similarly, Section 5.2 contains our results for additive
bidders. We also generalize our sample-based results for constrained additive bidders to XOS bidders in Section 6. Finally, we provide computationally efficient solutions for symmetric XOS and even symmetric subadditive bidders in Section 7. These results are based on showing that (i) the right parameters of SPEMs can
be efficiently and approximately identified with sample or max-min access to the distributions; and (ii) that
the revenue guarantees of simple mechanisms can be robustified to accommodate error in the setting of the
4
Note that any RSPM or ASPE is an SPEM.
4
parameters. In particular, our sample-based result for unit-demand bidders robustifies the ex-ante relaxation
of the revenue maximization problem from [1] and its conversion to a sequential posted pricing mechanism
from [15], and makes use of the extreme-value theorem for regular distributions from [7]. Our sample-based
result for additive bidders shows how to use samples to design mechanisms that approximate the revenue of
Yao’s VCG with entry fees mechanism [42]. Our sample-based results for XOS bidders show how to use
samples to approximate the parameters of the RSPM and ASPE mechanisms of [13], and argue, by re-doing
their duality proofs, that their revenue guarantees are robust to errors in the approximation. Finally, our sample based result for symmetric subadditive bidders is based on a new, duality based, approximation, showing
how to eliminate the use of ASPEs from the result of [13]. This even allows us to obtain prior-independent
mechanisms when the item marginals are regular.
2 Preliminaries
We focus on revenue maximization in the combinatorial auction with n independent bidders and m heterogenous items. Each bidder has a valuation that is subadditive over independent items (see Definition 1). We
denote bidder i’s type ti as htij im
j=1 , where tij is bidder i’s private information about item j. For each i, j,
we assume tij is drawn independently from the distribution Dij . Let Di = ×m
j=1 Dij be the distribution of
bidder i’s type and D = ×ni=1 Di be the distribution of the type profile. We use Tij (or Ti , T ) and fij (or fi , f )
to denote the support and density function of Dij (or Di , D). For notational convenience, we let t−i to be
the types of all bidders except i. Similarly, we define D−i , T−i and f−i for the corresponding distributions,
support sets and density functions. When bidder i’s type is ti , her valuation for a set of items S is denoted by
vi (ti , S). Throughout the paper we use OPT to denote the optimal revenue obtainable by any randomized and
Bayesian truthful mechanism.
Definition 1. [40] For every bidder i, whose type ti is drawn from a product distribution Fi = ×j Fij , her
distribution, Vi , over valuation functions vi (ti , ·) is subadditive over independent items if:
- vi (·, ·) has no externalities, i.e., for each ti ∈ Ti and S ⊆ [m], vi (ti , S) only depends on htij ij∈S , formally,
for any t′i ∈ Ti such that t′ij = tij for all j ∈ S, vi (t′i , S) = vi (ti , S).
- vi (·, ·) is monotone, i.e., for all ti ∈ Ti and U ⊆ V ⊆ [m], vi (ti , U ) ≤ vi (ti , V ).
- vi (·, ·) is subadditive, i.e., for all ti ∈ Ti and U , V ⊆ [m], vi (ti , U ∪ V ) ≤ vi (ti , U ) + vi (ti , V ).
We use Vi (tij ) to denote vi (ti , {j}), as it only depends on tij . When vi (ti , ·) is XOS (or constrained
additive) for all i and ti ∈ Ti , we say Vi is XOS (or constrained additive) over independent items.
Example 1. [40] We may instantiate Definition 1 to define restricted families of subadditive valuations as
follows. In all cases, suppose t = {tj }j∈[m] is drawn from ×j Dj . To define a valuation function that is:
- unit-demand, we can take tj to be the value of item j, and set v(t, S) = maxj∈S tj .
P
- additive, we can take tj to be the value of item j, and set v(t, S) = j∈S tj .
- constrained additive, we can take tj to be the value of item j, and set v(t, S) = maxR⊆S,R∈I
some downward closed set system I ⊆ 2[m] .
(k)
P
j∈R tj ,
for
- XOS (a.k.a. fractionally subadditive), we can take tj = {tj }k∈[K] to encode all possible values associated
P
(k)
with item j, and take v(t, S) = maxk∈[K] j∈S tj .
Note that constrained additive valuations contain additive and unit-demand valuations as special cases,
and are contained in XOS valuations.
Distribution Access Models
We consider the following three different models to access the distributions.
5
• Sample access to bounded distributions. We assume that for any buyer i and any type ti ∈ Ti , her
value Vi (tij ) for any single item j lies in [0, H].
• Sample access to regular distributions. We assume that for any buyer i and any type ti ∈ Ti , the
distribution of her value Vi (tij ) for any item j is regular.
• Direct access to approximate distributions. We assume that we have direct access to a distribution
D̂ = ×i∈[n],j∈[m]D̂ij , for example we can query the pdf, cdf of D̂ and take samples from D̂. Moreover,
for any buyer i and any type ti ∈ Ti , the distributions of the random variable Vi (tij ) when tij is sampled
from D̂ij or Dij are within ǫ in Kolmogorov distance, and both distributions are supported on [0, H].
Definition 2. The Kolmogorov distance between two distributions P and Q over R, denoted ||P − Q||K , is
defined as supx∈R | PrX∼P [X ≤ x] − PrX∼Q [X ≤ x]|. The total variation distance between two probability
measures P and Q on a sigma-algebra F of subsets of some sample space Ω, denoted ||P − Q||T V , is defined
as supE∈F |P (E) − Q(E)|.
3 Summary of Our Results
We summarize our results in the following two tables. Table 1 contains all sample-based results and Table 2
contains all results under the max-min learning model.
Valuations
# bidders
Distributions
Approximation
Sample Complexity
additive [28]
additive
n
n
regular
arbitrary [0, H]
Ω(OPT)
Ω(OPT) − ǫ · H
1
poly(n, m, 1/ǫ)
unit-demand [35]
unit-demand
n
n
arbitrary [0, H]
regular
Ω(OPT) − ǫ · H
Ω(OPT)
poly(n, m, 1/ǫ)
poly(n, m)
constrained additive
constrained additive
n
n
arbitrary [0, H]
regular
Ω(OPT) − ǫ · H
Ω(OPT)
poly(n, m, 1/ǫ)
poly(n, m)
XOS
XOS
n
n
arbitrary [0, H]
regular
Ω(OPT) − ǫ · H
Ω(OPT)
poly(n, m, 1/ǫ)
poly(n, m)
subadditive [35]
1
arbitrary [0, H]
poly(m, 1/ǫ)
subadditive
n i.i.d.
arbitrary [0, H]
subadditive
n i.i.d.
regular
Ω(OPT)
−ǫ·H
n
Ω max{n,m} · OPT − ǫ · H
n
· OPT
Ω max{n,m}
poly(n, m, 1/ǫ)
prior-independent
Table 1: Summary of Our Sample-based Results.
4 Uniform Convergence under Product Measures
In this section, we develop machinery for obtaining uniform convergence bounds for hypotheses over product
measures. Our goal is to save on the sample complexity implied by VC dimension bounds, as summarized
in Table 3. Indeed, we obtain low sample complexity bounds for indicators over single-intersecting sets (see
6
Valuations
# bidders
Distributions
Approximation
additive
n
arbitrary [0, H]
Ω(OPT) − O(ǫ · n · m · H)
unit-demand
n
arbitrary [0, H]
Ω(OPT) − O(ǫ · n · m · H)
constrained additive
n
arbitrary [0, H]
Ω(OPT) − O(ǫ · n · m2 · H)
subadditive
n i.i.d.
arbitrary [0, H]
Ω
n
max{n,m}
· OPT − O(ǫ · n · m · H)
Table 2: Summary of Our Max-min Learning Results.
Definition 4), which play a key role in proving our results for learning approximately revenue-optimal auctions.
Our main results of this section are Theorem 2 for general functions, and Corollary 1 for sets.
We first define what type of uniform convergence bounds we seek to prove.
Definition 3 ((ǫ, δ)-uniform convergence with respect to proxy measure). A hypothesis class H of functions
mapping domain set X to R has (ǫ, δ)-uniform convergence with sample complexity s(ǫ, δ) iff, for all ǫ, δ > 0,
there exists a processing P : X s(ǫ,δ) → ∆(X ) such that for any distribution D ∈ ∆(X ) when k = s(ǫ, δ):
"
#
Pr
z1 ,··· ,zk ∼D
sup Ez∼P(z1 ,··· ,zk ) [g(z)] − Ez∼D [g(z)] ≤ ǫ ≥ 1 − δ.
g∈H
When X is the Cartesian product of a collection of sets X1 , . . . , Xk , i.e. X = ×i Xi , we say that a hypothesis
class H as above has (ǫ, δ)-p.m. uniform convergence with sample complexity s(ǫ, δ) if the above holds for
all D that are product measures over X .
Next we provide a simple lemma, which leads to a simple version of our main result stated as Theorem 1.
Our main result, stated as Theorem 2, follows.
Lemma 1. Let X1 , . . . , Xd be d domain sets and H be a hypothesis class with functions mapping from the
product space ×di=1 Xi to R. For all i ∈ [d], let Hi be the projected hypothesis class of H on Xi , that is,
Hi = {g | ∃f ∈ H ∃ a−i ∈ ×j6=i Xj ∀ xi ∈ Xi , g(xi ) = f (xi , a−i )}. For every i ∈ [d], let Di and D̂i be two
distributions supported on Xi . Suppose for all i ∈ [d],
sup Ex∼Di [g(x)] − Ex∼D̂i [g(x)] ≤ ǫ,
g∈Hi
then
sup Ex∼×d
f ∈H
i=1 Di
[f (x)] − Ex∼×d
i=1 D̂i
[f (x)] ≤ d · ǫ.
Proof. Let Fi and F̂i be the probability measure function for Di and D̂i respectively. We will prove the
statement using a hybrid argument. We create a sequence of product distributions {D (j) }j≤d , where D (j) =
D̂1 × · · · × D̂j × Dj+1 × · · · × Dd , and D (0) = D, D (d) = D̂. To prove our claim, it suffices to show that for
any integer j ∈ [d],
|Ex∼D(j−1) [f (x)] − Ex∼D(j) [f (x)]| ≤ ǫ.
7
Next, we show how to derive this inequality.
|Ex∼D(j−1) [f (x)] − Ex∼D(j) [f (x)]|
!
Z
Z
f (xj , x−j )dFj (xj ) dF̂1 (x1 ) · · · dF̂j−1 (xj−1 )dFj+1 (xj+1 ) · · · dFd (xd )
=
Xj
×i6=j Xi
−
=
Z
≤ǫ ·
×i6=j Xi
Z
Z
Z
Xj
×i6=j Xi
!
f (xj , x−j )dF̂j (xj ) dF̂1 (x1 ) · · · dF̂j−1 (xj−1 )dFj+1 (xj+1 ) · · · dFd (xd )
Exj ∼Dj [f (xj , x−j )] − Exj ∼D̂j [f (xj , x−j )] dF̂1 (x1 ) · · · dF̂j−1 (xj−1 )dFj+1 (xj+1 ) · · · dFd (xd )
dF̂1 (x1 ) · · · dF̂j−1 (xj−1 )dFj+1 (xj+1 ) · · · dFd (xd )
×i6=j Xi
=ǫ
Theorem 1. Let X1 , . . . , Xd be d domain sets and H a hypothesis class of functions mapping from the product
space ×di=1 Xi to R. For all i ∈ [d], let Hi be the projected hypothesis class of H on Xi , that is Hi =
{g | ∃f ∈ H ∃ a−i ∈ ×j6=i Xj ∀ xi ∈ Xi , g(xi ) = f (xi , a−i )}.
Suppose that, for all i ∈ [d], Hi has (ǫ, δ)-uniform convergence with sample complexity si (ǫ, δ). Then H
has (ǫ, δ)-p.m. uniform convergence with sample complexity s(ǫ, δ) = maxi∈[d] si (ǫ/d, δ/d).
In particular, let z (1) , . . . , z (ℓ) be a sample of size ℓ = s(ǫ, δ) from a product measure ×i∈[d] Di . Define
(1)
(ℓ)
(j)
D̂i = Pi (zi , . . . , zi ), for all i ∈ [d], where zi
corresponding to Hi ’s uniform convergence. Then
"
Pr
z (1) ,...,z (ℓ)
is the i-th entry of sample z (j) and Pi is the processing
#
sup Ez∼×i∈[d] D̂i [f (z)] − Ez∼×i∈[d]Di [f (z)] ≤ ǫ ≥ 1 − δ.
f ∈H
i
h
Proof of Theorem 1: Since ℓ ≥ si (ǫ/d, δ/d), Pr supg∈Hi Ez∼D̂i [g(z)] − Ez∼Di [g(z)] ≤ ǫ/d ≥ 1−δ/d for
all i ∈ [d]. By the union bound, with probability at least 1 − δ, supg∈Hi Ez∼D̂i [g(z)] − Ez∼Di [g(z)] ≤ ǫ/d
for all i ∈ [d]. According to Lemma 1, supf ∈H Ez∼× D̂i [f (z)] − Ez∼×i∈[d] Di [f (z)] ≤ ǫ with probability
i∈[d]
at least 1 − δ. ✷
Theorem 2. Let X1 , . . . , Xd be d domain sets and H a hypothesis class of functions mapping from the product
d
space ×
i=1 Xi to R. For all T ⊆ [d], let HT be the projected hypothesis class of H on XT ≡ ×i∈T Xi , that is,
HT = g | ∃f ∈ H ∃ a−T ∈ ×j ∈/ T Xj ∀ xT ∈ XT , g(xT ) = f (xT , a−T ) . Suppose that, for all T ⊆ [d], HT
has (ǫ, δ)-p.m. uniform convergence with sample complexity sT (ǫ, δ), and define
s(ǫ, δ) =
min
max sTi (ǫ/k, δ/k).
i=1,...,k
k, partitions
T1 ⊔T2 ⊔. . .⊔Tk = [d]
(2)
Then H has (ǫ, δ)-p.m. uniform convergence with sample complexity s(ǫ, δ).
In particular, let z (1) , . . . , z (ℓ) be a sample of size ℓ = s(ǫ, δ) from a product measure ×i∈[d] Di . Suppose that the optimum of (2) is attained at k = k̃ for partition T̃1 ⊔ T̃2 ⊔ . . . ⊔ T̃k̃ = [d]. Define D̂T̃i =
8
(1)
(j)
(ℓ)
PT̃i (z T̃ , . . . , z T̃ ), for all i ∈ [d], where z T̃ contains the entries of sample z (j) in coordinates T̃i and PT̃i is
i
i
i
the processing corresponding to HT̃i ’s uniform convergence. Then
Pr
z (1) ,...,z (ℓ)
"
sup Ez∼×
f ∈H
i∈[k̃] D̂T̃i
#
[f (z)] − Ez∼×i∈[d] Di [f (z)] ≤ ǫ ≥ 1 − δ.
Proof of Theorem 2: For every possible partition use Theorem 1. ✷
Nest, we specialize Theorem 2 to indicator functions over sets.
Corollary 1. We use the same notation as in Theorem 2. Suppose that all functions in H map ×di=1 Xi to
{0, 1}, i.e. they are indicators over sets. Suppose also that the VC dimension of HT (viewed as a collection of
sets) is VT . Define
Vmax =
min
k2 · max VTi .
(3)
i=1,...,k
k, partitions
T1 ⊔T2 ⊔. . .⊔Tk = [d]
Assume that the
optimum of (3) is attained
at k = k̃ for partition T̃1 ⊔ T̃2 ⊔ . . . ⊔ T̃k̃ = [d].
· ln k̃ǫ +
Then ℓ = O Vmax
ǫ2
gence for H. Formally,
"
Pr
z (1) ,...,z (ℓ)
k̃ 2
ǫ2
· ln k̃δ samples from ×i∈[d] Di suffice to obtain (ǫ, δ)-p.m. uniform conver-
sup Ez∼×
f ∈H
i∈[k̃] D̂T̃i
#
[f (z)] − Ez∼×i∈[d] Di [f (z)] ≤ ǫ ≥ 1 − δ,
where for a given sample z (1) , . . . , z (ℓ) from a product distribution ×i∈[d] Di the distributions D̂T̃i are defined
(1)
(ℓ)
(j)
i
i
i
to be uniform over z T̃ , . . . , z T̃ , where z T̃ contains the entries of sample z (j) in coordinates T̃i .
Table 3 compares the sample complexity for uniform convergence implied by Theorem 2 and Corollary 1
to that implied by VC theory, when the underlying measures are product. Suppose H contains the indicator
functions of all convex sets in Rd . VC theory does not provide any finite sample bound for uniform convergence, as the VC dimension of H is ∞. Do our results provide a finite bound? Notice that, for all i, H
i
2
simply contains all intervals in R. Hence, Vi = 2 and Corollary 1 implies that ℓ = O( dǫ2 · log dδ + log dǫ )
samples suffice to obtain (ǫ, δ)-p.m.
uniform
convergence for H . In fact, our sample complexity bound can
2
log
1
be improved to O dǫ2 · log dδ , as O ǫ2 δ samples suffice to guarantee (ǫ, δ)-uniform convergence for all
intervals in R due to the DKW inequality [25].
In the next a few sections, we apply our uniform convergence results to learn a mechanism with approximately optimal revenue. A type of events called single-intersecting (see Definition 4) plays a key role in our
analysis. These events are defined based on the geometric shape of the corresponding sets. For example, balls,
rectangles and all convex sets are single-intersecting, but this definition includes some non-convex sets as well,
for example, “cross-shaped” sets. It turns out that being able to handle these non-convex sets is crucial for our
results, as many events we care about are not convex but nonetheless are single-intersecting.
Definition 4 (Single-intersecting Events). For any event E in Rℓ , E is single-intersecting if the intersection of E and any line
an interval. More formally, for any i ∈ [ℓ]
thatℓ is parallel to one of the axes is
ℓ−1 , the intersection of L and E is of the form
,
where
a
∈
R
and
any
line
L
=
x
∈
R
|
x
=
a
−i
i
i
−i
−i
x ∈ Rℓ | x−i = a−i , xi ∈ [a, ā] where a ≤ ā. In particular, we allow a to be −∞ and ā to be +∞.
¯
¯
¯
9
We establish a uniform convergence bound for single-intersecting events by combing the DKW inequality and
Theorem 1.
Lemma 2. For any integer ℓ, let H be the hypothesis class that contains all indicator functions
single for
ℓ2
ℓ
intersecting events in R . Then H has (ǫ, δ)-p.m. uniform convergence with sample complexity O ǫ2 · log δℓ .
Proof. As the projected hypothesis class for the i-th coordinate simply contains all intervals in R, the sample
complexity for (ǫ, δ)-uniform convergence is O( ǫ12 · log 1δ ) due to the DKW inequality. The claim follows from
Theorem 1.
Next, we show a slightly stronger statement, which is a type of uniform convergence bound when access
to approximate distributions is given. More specifically, we argue that for any single-intersecting event, the
difference in the probability of this event under two product distributions D = ×i∈[ℓ] Di and D̂ = ×i∈[ℓ] D̂i is
at most 2ξ · ℓ, if ||Di − D̂i ||K ≤ ξ for all i. It is not hard to see that Lemma 3 and the DKW inequality imply
Lemma 2.
Lemma 3. For any integer ℓ, let D = ×ℓi=1 Di and D̂ = ×ℓi=1 D̂i , where Di and D̂i are both supported on R
for any i ∈ [ℓ]. If ||Di − D̂i ||K ≤ ξ, PrD [E] − PrD̂ [E] ≤ 2ξ · ℓ for any single-intersecting event E.
Proof. Let H = {1x∈E : E is single-intersecting}. By the definition of single-intersecting events, Hi is the set
of the indicator functions of all intervals in R for any i ∈ [ℓ]. Since ||Di − D̂i ||K ≤ ξ,
sup Ex∼Di [g(x)] − Ex∼D̂i [g(x)] ≤ 2ξ.
g∈Hi
By Lemma 1,
sup Ex∼D [f (x)] − Ex∼D̂ [f (x)] ≤ 2ξ · ℓ.
f ∈H
The following table (Table 3) summarizes some uniform convergence bounds implied by our results in this
section.
Hypotheses Class
VC Bound
Bounds from Theorem 2 and Corollary 1
axis-aligned rectangles in Rd
polytopes with k facets in Rd
arbitrary convex sets in Rd
single-intersecting sets in Rd
Õ(d/ǫ2 )
Õ(dk/ǫ2 )
∞
∞
Õ(d/ǫ2 )
Õ(d · min{d, k}/ǫ2 )
Õ(d2 /ǫ2 )
Õ(d2 /ǫ2 )
Table 3: Number of samples required for (ǫ, Θ(1))-p.m. uniform convergence for different H’s.
5 Constrained Additive Bidders: Uniform Convergence of the Revenue of Sequential Posted Price with Entry Fee Mechanisms
We consider a specific class of mechanisms, namely Sequential Posted Price with Entry fee Mechanisms, a.k.a.
SPEMs; see Algorithm 1 for details. Cai and Zhao [13] recently showed that if the bidders’ valuations are XOS
10
over independent items, the best SPEM achieves a constant fraction of the optimal revenue. 5 This section
has two goals. The first is to show that, when bidders have constrained additive valuations over independent
items, polynomially many samples suffice to guarantee uniform convergence for the revenue of all SPEMs,
and hence our ability to select a near-optimal SPEM from polynomially many samples. This can be proven by
applying our uniform convergence result for single-intersecting events (Lemma 2). The second (and stronger
goal) is to show that we can learn a near-optimal SPEM under the max-min learning model (Theorem 4). We
show that the revenue of any SPEM changes no more than O(ǫ · m2 · n · H) under the true and approximate
valuation distributions (Theorem 3), where ǫ is an upper bound of the Kolmogorov distance between the true
and approximate distributions for every item marginal of every bidder. It is, of course, not hard to see that
Theorem 3 and the DKW inequality imply uniform convergence of the revenue of all SPEMS. To establish
Theorem 3, we need to apply Lemma 3 instead of Lemma 2.
Algorithm 1 Sequential Posted Price with Entry Fee Mechanism (SPEM)
Require: A collection of prices {pij }i∈[n],j∈[m] and a collection of entry fee functions {δi (·)}i∈[n] where
δi : 2[m] 7→ R is bidder i’s entry fee function.
1: S ← [m]
2: for i ∈ [n] do
3:
Show bidder i the set of available items S and set the entry fee for bidder i to be δi (S).
4:
if Bidder i pays the entry fee δi (S) then
P
5:
i receives her favorite bundle Si∗ and pays j∈S ∗ pij .
i
6:
S ← S\Si∗ .
7:
else
8:
i gets nothing and pays 0.
9:
end if
10: end for
We first establish a technical lemma, which states that, for any set of items S, any set of prices {pj }j∈[m]
and entry fee δ, the distribution over the set of items purchased by a constrained additive bidder whose valuation
is drawn from D = ×j∈[m] Dj and D̂ = ×j∈[m] D̂j has total variation distance at most 2mξ, if ||Dj − D̂j ||K ≤ ξ
for every item j ∈ [m]. This is quite surprising. Given that, for each set of items S ′ ⊆ S, the difference in
the probability that the buyer will purchase this particular set S ′ under D and D̂ could already be as large as
Θ(mξ), and the distribution has an exponentially large support size, a trivial argument would give a bound of
2m · Θ(mξ). To overcome this analytical difficulty, we argue instead that for any collection of sets of items,
the event that the buyer’s favorite set lies in this collection is single-intersecting. Then our result follows from
Lemma 3. Notice that it is crucial that Lemma 3 holds for all events that are single-intersecting, as the event
we consider here is clearly non-convex in general.
Lemma 4. For any set S ⊆ [m], any prices {pj }j∈[m] and entry fee δ(S), let L and L̂ be the distributions
over the set of items purchased from S by a constrained additive bidder under prices {pj }j∈[m] and entry fee
δ when her type is drawn from D = ×j∈[m] Dj and D̂ = ×j∈[m] D̂j respectively. If ||Dj − D̂j ||K ≤ ξ for all
item j, ||L − L̂||T V ≤ 2mξ.
Proof. For any set R ⊆ S, let ER be the event that the bidder purchases set R. Proving that the total vari|S|
ation distance
between
h
i L andh L̂ isS no morei than 2m · ξ is the same as proving that for any K ≤ 2 ,
SK
≤ 2m · ξ where R1 , · · · RK are arbitrary distinct subsets of
PrD t ∈ ℓ=1 ERℓ − PrD̂ t ∈ K
ℓ=1 ERℓ
5
Cai and Zhao [13] showed that the best ASPE or RSPM achieves a constant fraction of the optimal revenue. Clearly, any ASPE is
also a SPEM, and any RSPM is simply a SPEM if we force the bidders to be unit-demand by only allowing each of them to purchase
at most one item.
11
S
S. Since the dimension of the bidder’s type space is m, if we can prove that K
ℓ=1 ERℓ is always singleintersecting, our claim follows from Lemma 3.
For any j ∈ [m] and a−j ∈ Rm−1
≥0 , let Lj (a−j ) = {(tj , a−j ) |tj ∈ R≥0 }. We claim that Lj (a−j ) intersects
with at most two different EU and EV where U and V are subsets of S. WLOG, we assume that (0, a−j ) ∈ EU .
• If U = ∅, that means the utility of the favorite set for type (0, a−j ) is smaller than the entry fee δ(S). If
we increase the value of tj , two cases could happen: (1) the utility of the favorite set is still lower than
the entry fee; (2) the utility of the favorite set is higher than the entry fee. In case (1), (tj , a−j ) ∈ E∅ .
In case (2), the bidder pays the entry fee and purchases her favorite set V . Then item j must be in
V , because otherwise the utility for set V does not change from type (0, a−j ) to type (tj , a−j ). If we
keep increasing tj , bidder i’s favorite set remains to be V and she keeps accepting the entry fee and
purchasing V . Hence, Lj (a−j ) can intersect with at most one event ER where R is non-empty.
• If U 6= ∅, that means U is the favorite set of type (0, a−j ) and the utility for winning set U is higher than
the entry fee. If we increase the value of tj , two cases could happen: (1) U remains the favorite set; (2)
a different set V becomes the new favorite set. In case (1), (tj , a−j ) ∈ EU . In case (2), item j must lie in
V but not in U , otherwise how could U be better than V for type (0, a−j ) but worse for type (tj , a−j ).
If we keep increasing tj , the bidder’s favorite set remains to be V and she keeps accepting the entry fee
and purchasing V . Hence, Lj (a−j ) can intersect at most two different events.
It is not hard to see that any event ER is an intersection of halfspaces, so the intersection of Lj (a−j ) with
any event ER is an interval. Also, notice that any type t ∈ Rm
≥0 must lie in an event ER for some set R ⊆ S.
If Lj (a−j ) intersects with two different events EU and EV , the two intersected intervals must lie back to back
on Lj (a−j ). Otherwise, Lj (a−j ) intersects with at least three different events. Contradiction. Since Lj (a−j )
intersects with at most two different events, no matter which of these events are in {ERℓ }ℓ∈[K] , the intersection
SK
S
of Lj (a−j ) and K
ℓ=1 ERℓ is single-intersecting. Now our
ℓ=1 ERℓ is either empty or an interval meaning
claim simply follows from Lemma 3.
Theorem 3. Suppose all bidders’ valuations are constrained additive over independent items. For any SPEM,
let R EV and Rd
EV be its expected revenue under D and D̂ respectively. If Dij and D̂ij are both supported on
[0, H], and ||Dij − D̂ij ||K ≤ ξ for all i ∈ [n] and j ∈ [m],
R EV − Rd
EV ≤ 2nmξ · (mH + OPT) .
Proof. We use a hybrid argument. Consider a sequence of distributions {D (i) }i≤n , where D (i) = D̂1 × · · · ×
D̂i × Di+1 × · · · × Dn , and D (0) = D, D (n) = D̂. We use R EV (i) to denote the expected revenue of the SPEM
under D (i) . To prove our claim, it suffices to argue that R EV (i−1) − R EV (i) ≤ 2ξm · (m · H + OPT) . We
denote by Sk and Sk′ the random set of items that remain available after visiting the first k bidders under D (i−1)
and D (i) . Clearly, for k ≤ i − 1, ||Sk − Sk′ ||T V = 0, so the expected revenue collected from the first i − 1
bidders under D (i−1) and D (i) is the same. According to Lemma 4, ||Si − Si′ ||T V ≤ 2m · ξ. The total amount
of money bidder i spends can never be higher than her value for receiving all the items which is at most m · H.
So the difference in the expected revenue collected from bidder i under D (i−1) and D (i) is at most 2ξ · m2 H.
Suppose R is the set of remaining items after visiting the first i bidders, then the expected revenue collected
from the last n − i bidders is the same under D (i−1) and D (i) , as these bidders have the same distributions.
Moreover, this expected revenue is no more than OPT, since the optimal mechanism can simply just sell R
to the last n − i bidders using the same prices and entry fee as in the SPEM we consider. Of course, for any
fixed R, the probabilities that Si = R and Si′ = R are different, but since for any R the expected revenue from
the last n − i bidders is at most OPT, the difference in the expected revenue from the last n − i bidders under
12
D (i−1) and D (i) is at most ||Si − Si′ ||T V · OPT ≤ 2ξ · mOPT. Hence, the total difference between R EV (i−1)
and R EV (i) is at most 2ξm · (mH + OPT).
Theorem 4. (Max-min Learning for Constrained Additive Bidders) When all bidders’ valuations are constrained additive over independent items and for any bidder i and any item j, Dij and D̂ij are supported on
1
), then with only access to D̂ = ×i,j D̂ij , our algorithm can
[0, H] and ||Dij − D̂ij ||K ≤ ǫ for some ǫ = O( nm
2
learn an RSPM or ASPE whose revenue is at least OPT
c − ǫ · O(m nH), where OPT is the optimal revenue by
any BIC mechanism under D = ×i,j Dij . c > 1 is an absolute constant.
Clearly, Theorem 4 also implies a polynomial sample complexity bound for learning an approximately
revenue-optimal mechanism. A better sample complexity bound can be obtained directly, i.e. without invoking
the uniform convergence of the revenue of SPEMs, and is stated as Theorem 9 for the broader class of XOS
valuations. Similarly, when bidders have simpler valuations, i.e., additive or unit-demand valuations, we can
sharpen our results and achieve polynomial-time learnability of the approximately optimal mechanism using
more specialized techniques. See Sections 5.1 and 5.2 for details.
5.1 Unit-demand Valuations: Polynomial-Time Learning
In this section, we consider bidders with unit-demand valuations, sharpening our results to show how to learn
approximately revenue-optimal mechanisms in polynomial time. It is shown in a sequence of works [15, 32,
11] that there exists a sequential posted price mechanism (SPM see Algorithm 2 for details) that achieves at
1
of the optimal revenue when bidders are unit-demand. We show that under all three distribution access
least 24
models of Section 2 there exists a polynomial-time algorithm that learns a sequential posted price mechanism
whose revenue approximates the optimal revenue. We only sketch the proof here and postpone the details to
Appendix B.
Theorem 5. When all bidders have unit-demand valuations and
• Dij is supported on [0, H] for all bidder i and item j, there exists a polynomial
algorithm that learns
time
1 2
OPT
m2 n log nǫ + log 1δ
an SPM whose revenue is at least 144 − ǫH with probability 1 − δ given O ǫ
samples from D; or
• Dij is a regular distribution for all bidder i and item j, there exists a polynomial time algorithm that
2 2 2
learns a randomized SPM whose revenue is at least OPT
33 with probability 1−δ given O(max{m, n} m n ·
nm
log δ ) samples from D; or
• we are only given access to D̂ij where ||D̂ij −Dij ||K ≤ ǫ for all bidder i and item j, there is a polynomial
time algorithm that constructs a randomized SPM whose revenue under D is at least 14 − (n + m) · ǫ ·
OPT
6
8 − 2ǫ · mnH .
Sample Access to Bounded Distributions: the result is due to Morgenstern and Roughgarden [35].
Direct Access to Approximate Distributions: we first consider a convex program based on D (see Figure 1)
which is usually referred to as the ex-ante relaxation of the revenue maximization problem [1], and use its
optimum as a proxy for OPT. Next, we consider a similar convex program based on D̂ (see Figure 2) and
show that the optima of the two convex programs are close to each other. Finally, we use techniques developed
by Chawla et al. [15] to convert the optimal solution of the second convex program into a randomized SPM.
We can show that the constructed randomized SPM achieves a revenue that approximates the optimum of the
second convex program under D, which implies that the mechanism’s revenue also approximates the OPT. As
6
1
), this is the max-min guarantee we want to achieve.
If we set ǫ to be O( m+n
13
we are given D̂, we can solve the second convex program and convert its optimal solution into a randomized
SPM in polynomial time. See Theorem 10 in Appendix B.1 for further details.
Sample Access to Regular Distributions: we use a similar convex program relaxation based approach as
in the previous case. The main difference is that regular distributions could be unbounded and thus ruin the
approximation guarantee. We show how to use the Extreme Value theorem in [7] to truncate the distributions
without hurting the revenue by much. See Theorem 12 in Appendix B.3 for further details.
5.2 Additive Valuations: Polynomial-Time Learning
In this section, we consider bidders with additive valuations, again sharpening our results to show polynomialtime learnability. It is known that the better of the following two mechanisms achieves at least 81 of the optimal
revenue when all bidders have additive valuations [42, 11]:
Selling Separately: the mechanism sells each item separately using Myerson’s optimal auction.
VCG with Entry Fee: the mechanism solicits bids b = (b1 , · · · , bn ) from the bidders, then offers each
bidder i the option to participate for an entry fee ei (b−i , Di ), which is the median of the random variable
P
7
+
j∈[m] (tij − maxk6=i bkj ) , where ti ∼ Di . This random variable is exactly bidder i’s utility when her type
is ti and the other bidders’ are b−i . If bidder i chooses to participate, she pays the entry fee and can take any
item j at price maxk6=i bkj . Notice that the mechanism never over allocate any item, as only the highest bidder
for an item can afford it.
Indeed, only counting the revenue from the entry fee in the second mechanism and the optimal revenue
from selling the items separately already suffices to provide an 8-approximation [42, 11].
Theorem 6 ([11]). Let SR EV be the optimal revenue for selling the items separately and BR EV be the expected
entry fee collected from the VCG with entry fee mechanism. Then OPT ≤ 6 · SR EV + 2 · BR EV .
Goldner and Karlin [28] showed that one sample suffices to learn a mechanism that achieves a constant
fraction of the optimal revenue when Dij is regular for all i ∈ [n] and j ∈ [m]. We show how to learn an
approximately optimal mechanism in the other two models.
Theorem 7. When the bidders have additive valuations and
• Dij is supported on [0, H] for all bidder i and item j, we can learn in polynomial
time a mechanism
m 2
OPT
· n log n log 1ǫ + log 1δ
whose expected revenue is at least 32 −ǫ·H with probability 1−δ given O
ǫ
samples from D; or
• we are only given access to distributions D̂ij where ||D̂ij − Dij ||K ≤ ǫ for all bidder i and item j, there
is a polynomial time algorithm that constructs a mechanism whose expected revenue under D is at least
1
OPT
266 − 96ǫ · mnH when ǫ ≤ 16 max{m,n} .
Sample Access to Bounded Distributions: Goldner and Karlin’s proof [28] can be directly applied to the
bounded distributions to show a single sample suffices to learn a mechanism whose expected revenue approximates the BR EV . Then as SR EV is the revenue of m separate single-item auctions, we can use the result
in [35] to approximate it. See Theorem 13 in Appendix C.1 for further details.
Direct Access to Approximate Distributions: for each single item, we apply Theorem 5 to learn an individual
auction, then run these learned auctions in parallel. Clearly, the combined auction’s revenue approximates
7
The entry fee function defined in [42, 11] is slightly different. They showed that there exists an entry fee Xi , such that bidder
i accepts the entry fee with probability at least 1/2. Then they argued that extracting Xi /2 as the revenue in the VCG with entry
fee mechanism is enough to obtain a factor 8 approximation. It is not hard to observe that our entry fee is accepted with probability
exactly 1/2, thus our entry fee is at least as large as Xi . So our mechanism also suffices to provide a factor 8 approximation.
14
SR EV . For BR EV , we show that for every bidder i and every bid profile b−i of the other bidders, the event that
corresponds to bidder i accepting any entry fee is single-intersecting (see Definition 4). This implies that the
probability forP
a bidder to accept an entry fee under D̂ and D is close (Lemma 3). So we can essentially use
the median of j∈[m] (tij − maxk6=i bkj )+ with ti ∼ D̂i as the entry fee. See Theorem 14 in Appendix C.2 for
further details.
6 XOS Valuations
In this section we go beyond constained additive valuations to show learnability of approximately revenueoptimal auctions from polynomially many samples. The better of the following two mechanisms is known to
achieve a constant fraction of the optimal revenue, when bidders have valuations that are XOS over independent
items [13].
Rationed Sequential Posted Price Mechanism (RSPM): the mechanism is almost the same as SPM in Algorithm 2, except there is an extra constraint that every bidder can purchase at most one item.
Anonymous Sequential Posted Price with Entry Fee Mechanism (ASPE): every buyer faces the same
collection of item prices {pj }j∈[m] . The seller visits the bidders sequentially. For every bidder, the seller
shows her all the available items (i.e. items that have not yet been purchased) and the associated price for
each item, then asks her to pay a personalized entry fee which depends on her type distribution and the set of
available items. If the bidder accepts the entry fee, she can proceed to purchase any available item at the given
price; if she rejects the entry fee, she neither receives nor pays anything. See Algorithm 3 for details.
Theorem 8. [13] There exists a collection of prices {p∗j }j∈[m] , such that if we set the entry fee function
δi∗ (S) to be the median of bidder i’s utility for set S, either the ASPE(p∗ , δ∗ ) or the best RSPM achieves at
least a constant fraction of the optimal revenue when bidders’
valuations are XOS over independent items.
P
More formally, let u∗i (ti , S) = maxS ∗ ⊆S vi (ti , S ∗ ) − j∈S ∗ p∗j be bidder i’s utility for the set of items S
when her type is ti . We define δi∗ (S) to be the median of the random variable u∗i (ti , S) (with ti ∼ Di ) for
any set S ⊆ [m]. Moreover, the price p∗j for any item j is no larger than 2G, where G = maxi,j Gij and
o
n
1
.
Gij := supx Prtij ∼Dij [Vi (tij ) ≥ x] ≥ 5 max{m,n}
Our goal next is to bound the sample complexity for learning a near-optimal RSPM and the ASPE described
in Theorem 8 under XOS valuations.
We consider first the task of learning a near-optimal RSPM. In a RSPM, all bidders are restricted to be
unit-demand, so the revenue of the best RSPM is upper bounded by the optimal revenue in the corresponding
unit-demand setting. In Section 5.1, we have shown how to learn an approximately optimal mechanism for
unit-demand bidders, and those algorithms can be used to approximate the best RSPM.
So, for the rest of this section, it suffices to focus on learning an ASPE whose revenue approximates the
revenue of the ASPE described in Theorem 8. We will do this in Section 6.1. Before that, we need a robust
version of Theorem 8. In the next Lemma, we argue that if we use a collection of prices {p′j }j∈[m] sufficiently
close to {p∗j }j∈[m] and entry fee δi′ (S) sufficiently close to the median of the utility for every bidder i and
subset S, the better of the corresponding ASPE and the best RSPM still approximates the optimal revenue. We
postpone the proof to Appendix D.
Lemma 5. For any ǫ > 0 and µ ∈ [0, 14 ], let {p′j }j∈[m] be a collection of prices such that |p′j − p∗j | ≤ ǫ
for all j ∈ [m], where {p∗j }j∈[m] is the collection of prices in Theorem 8. Let δi′ (S) be bidder i’s entry fee
′
′
function such that Prti ∼D
+ µ] for any set S ⊆ [m], where u′i (ti , S) =
P i [ui (t′i , S) ≥ δi (S)] ∈ [1/2 − µ, 1/2
′
′
∗
maxS∗⊆S vi (ti , S ) − j∈S ∗ pj . Then, either the ASPE(p , δ ) or the best RSPM achieves revenue at least
OPT
C1 (µ) − C2 (µ) · (m + n) · ǫ when bidders’ valuations are XOS over independent items. Both C1 (·) and C2 (·)
are monotonically increasing functions that only depend on µ.
15
Definition 5. We say a collection of prices {pj }j∈[m] is in the B-bounded ǫ-net if pj is a multiple of ǫ and
no larger than B for any item j. For any collection of prices {pj }j∈[m] , we say the entry fee functions are µbalanced if for every bidder i and every set S ⊆ [m], her entryP
fee δi (S) satisfies Prti ∼Di [ui (ti , S) ≥ δi (S)] ∈
[1/2 − µ, 1/2 + µ], where ui (ti , S) = maxS∗⊆S vi (ti , S ∗ ) − j∈S ∗ pj .
Corollary 2. For bidders with valuations that are XOS over independent items and any ǫ > 0, there exists
a collection of prices {pj }j∈[m] in the 2G-bounded ǫ-net such that for any µ-balanced entry fee functions
− C2 (µ) ·
{δi (·)}i∈[n] with µ ∈ [0, 14 ], either the ASPE(p, δ) or the best RSPM achieves revenue at least COPT
1 (µ)
(m + n) · ǫ.
6.1 XOS Valuations: sample access to bounded and regular distributions
In this section, we consider how to learn an ASPE with high revenue given sample access to D. Our learning
algorithm is a two-step procedure. In the first step, we take a few samples from D and use these samples to
set the entry fee for every collection of prices {pj }j∈[m] in the ǫ-net. More specifically, to decide δi (S) we
compute the utility of bidder i for set S under {pj }j∈[m] over all the samples and take the empirical median
among all these utilities to be δi (S). With a polynomial number of samples, we can guarantee that for any
{pj }j∈[m] in the ǫ-net the computed entry fee functions {δi (·)}i∈[n] are µ-balanced. Now, we have created
an ASPE for every {pj }j∈[m] in the ǫ-net. In the second step, we take some fresh samples from D and use
them to estimate the revenue for each of the ASPEs we created in the first step, then pick the one that has the
highest empirical revenue. It is not hard to argue that with a polynomial number of samples the mechanism
we pick has high revenue with probability almost 1. Combining our algorithm with Theorem 5, we obtain the
following theorem.
Theorem 9. When all bidders’ valuations are XOS over independent items and
• the random variable Vi (tij ) is supported on [0, H] for each bidder i and item j, we can learn an RSPM
and an ASPE such that with probability at least 1 − δ the better
at
of the two mechanisms has revenue
mn 2
m+n
1
OPT
least c1 − ξ · H for some absolute constant c1 > 1 given O ( ξ ) · (m · log ξ + log δ ) samples
from D;
• the random variable Vi (tij ) is regular for each bidder i and item j, we can learn an RSPM and an ASPE
such that with probability at least 1 − δ the better of the two mechanisms has revenue at least OPT
c2 for
1
2
2
2
some absolute constant c2 > 1 given O max{m, n} m n m log(m + n) + log δ samples from D.
The bounded case is proved as Theorem 15 in Appendix D.1. The regular case is proved as Theorem 16 in
Appendix D.1.
7 Symmetric Bidders
In this section, we consider symmetric bidders (Di = Di′ for all i and i′ ∈ [n]) with XOS and subadditive
valuations. For XOS valuations, our goal is to improve our algorithms from Section 6 to be computationally efficient under bidder symmetry. For subadditive valuations, our goal is to establish the learnability of
approximately optimal mechanisms whose revenue improves as the number of bidders becomes comparable
to the number of items. We only describe the results here and postpone the formal statements and proofs to
Appendix E.
• XOS valuations: we can learn in polynomial time an approximately optimal mechanism with a polynomial number of samples when the valuations are XOS over independent items. Our algorithm essentially
16
estimates all the parameters needed to run the RSPM and ASPE used in [13]. In general, it is not clear
how to estimate these parameters efficiently. But when the bidders are symmetric, one only needs to
consider “symmetric parameters” which greatly simplifies the search space and allows us to estimate all
the parameters in polynomial time. See Appendix E.2 for details.
• subadditive valuations:
when
the valuations are subadditive over independent items, the optimal revn
enue is at most O max{m,n} times larger than the highest revenue obtainable by an RSPM. In other
words, if the number of items is within a constant times the number of bidders, an RSPM suffices to
extract a constant fraction of the optimal revenue. Applying our results for unit-demand bidders in Section 5.1, we can learn a nearly-optimal RSPM, which is also a good approximation to OPT. In fact, when
the distribution for random variable Vi (tij ) is regular for every bidder i and item j, we can design a priorindependent mechanism that achieves a constant fraction of the optimal revenue. See Appendix E.3 for
details.
Appendix
A
Our Mechanisms
Here are the detailed description of the two major mechanisms we use: Sequential Posted Price Mechanism
(SPM) and Anonymous Sequential Posted Price with Entry Fee Mechanism (ASPE). We also use the Rationed
Sequential Posted Price Mechanism (RSPM) when bidders are not unit-demand. RSPM is almost identical to
SPM except that there is an extra constraint saying that no bidder can purchase more than one item.
Algorithm 2 Sequential Posted Price Mechanism (SPM)
Require: Pij is the price for bidder i to purchase item j.
1: S ← [m]
2: for i ∈ [n] do
3:
Show bidder i the set of available items S.
P
P
4:
i purchases her favorite bundle Si∗ ∈ maxS ′ ⊆S vi (ti , S ′ ) − j∈S ′ Pij and pays j∈S ∗ Pij .
i
5:
S ← S\Si∗ .
6: end for
Algorithm 3 Anonymous Sequential Posted Price with Entry Fee Mechanism (ASPE)
Require: A collection of prices {pj }j∈[m] and a collection of entry fee functions {δi (·)}i∈[n] where δi :
2[m] 7→ R is bidder i’s entry fee function.
1: S ← [m]
2: for i ∈ [n] do
3:
Show bidder i the set of available items S and set the entry fee for bidder i to be δi (S).
4:
if Bidder i pays the entry fee δi (S) then
P
5:
i receives her favorite bundle Si∗ and pays j∈S ∗ pj .
i
6:
S ← S\Si∗ .
7:
else
8:
i gets nothing and pays 0.
9:
end if
10: end for
17
B Missing Details from Section 5.1
B.1
Unit-demand Valuations: direct access to approximate distributions
We first consider the model where we only have access to an approximate distribution D̂. The following
definition is crucial for proving our result.
Definition 6. For any single dimensional distribution D with cdf F , we define its revenue curve RD : [0, 1] 7→
R≥0 as
RD (q) = max x · q · F −1 (1 − q) + (1 − x) · q̄ · F −1 (1 − q̄)
¯
¯
s.t. x · q + (1 − x) · q̄ = q
¯
x, q, q̄ ∈ [0, 1]
¯
where F −1 (1 − p) = sup{x ∈ R : Prv∼D [v ≥ x] ≥ p}.
Lemma 6 (Folklore). Let ϕij (·) and ϕ̂ij (·) be the ironed virtual value function for distribution Dij and D̂ij
RH
RH
respectively, then for any q ∈ [0, 1], RDij (q) = F −1 (1−q) ϕ(x)dF (x) and RD̂ij (q) = F̂ −1 (1−q) ϕ̂(x)dF (x).
ij
ij
Since the ironed virtual value function is monotonically non-decreasing, RDij (·) and RD̂ij (·) are concave
functions.
We provide an upper bound of the optimal revenue using RDij in the next Lemma. To do that, we first
need the definition of the Single-Dimensional Copies Setting.
Single-Dimensional Copies Setting: In the analysis for unit-demand bidders in [15, 11], the optimal revenue
is upper bounded by the optimal revenue in the single-dimensional copies setting defined in [15]. We use the
same technique. We construct nm agents, where agent (i, j) has value Vi (tij ) of being served with tij ∼ Dij ,
and we are only allow to use matchings, that is, for each i at most one agent (i, k) is served and for each j
at most one agent (k, j) is served8 . Notice that this is a single-dimensional setting, as each agent’s type is
specified by a single number. Let OPT C OPIES -UD be the optimal BIC revenue in this copies setting.
Lemma
there exists a collection of non-negative numbers {qij }i∈[n],j∈[m] satisP 7. For unit-demand bidders,P
fying i qij ≤ 1 for all j ∈ [m] and j qij ≤ 1 for all i ∈ [n], such that the optimal revenue
OPT ≤ 4 ·
X
RDij (qij ).
i,j
Proof. As shown in [11], OPT ≤ 4OPT C OPIES -UD. Let qij be the ex-ante probability that agent (i, j) is
served in the optimal mechanism for the copies setting. Chawla et al. [15] showed that OPT C OPIES -UD ≤
P
i,j RDij (qij ). Our statement follows from the two inequalities above.
Next, we consider a convex program (Figure 1) and argue that the value of the optimal solution of this
program is at least 18 of the optimal revenue.
Lemma 8. The optimal solution of convex program in Figure 1 is at least
8
OPT
8 .
This is exactly the copies setting used in [15], if every bidder i is unit-demand and has value Vi (tij ) with type ti . Notice that this
unit-demand multi-dimensional setting is equivalent as adding an extra constraint, each buyer can purchase at most one item, to the
original setting with subadditive bidders.
18
max
X
RDij (qij )
i,j
s.t.
X
qij ≤
1
2
for all j ∈ [m]
qij ≤
1
2
for all i ∈ [n]
i
X
j
qij ≥ 0
for all i ∈ [n] and j ∈ [m]
Figure 1: A Convex Program for Unit-demand Bidders with Exact Distributions.
n q′ o
ij
′ } be the collection of nonnegative numbers in Lemma 7. Clearly,
is a set of feasible
Proof. Let {qij
2
q′
′ )
′ )
R
RDij (qij
R
(q
Dij (0)
Dij ij
solution for the convex program. Since RDij (·) is concave, RDij 2ij ≥
+
=
.
2
2
2
Therefore,
′
X
qij
OPT
1 X
′
RDij
RDij (qij
)≥
.
≥ ·
2
2
8
i,j
i,j
If we know all Fij exactly, we can solve the convex program (Figure 1) and use the optimal solution to
construct an SPM via an approach provided in [15, 11]. The constructed sequential posted mechanism has
revenue at least 41 of the optimal value of the convex program, which is at least OPT
32 . Next, we show that
with only access to F̂ij , we can essentially carry out the same approach. Consider a different convex program
(Figure 2).
max
X
RD̂ij (qij )
i,j
s.t.
X
qij ≤
1
+n·ǫ
2
for all j ∈ [m]
qij ≤
1
+m·ǫ
2
for all i ∈ [n]
i
X
j
qij ≥ 0
for all i ∈ [n] and j ∈ [m]
Figure 2: A Convex Program for Unit-demand Bidders with Approximate Distributions.
Not that if the support size for all D̂ij is upper bounded by some finite number s, the convex program
above can be rewritten as a linear program with size poly(n, m, s). In the following Lemma, we prove that the
optimal values of the two convex programs above are close.
∗}
Lemma 9. Let {qij
i∈[n],j∈[m] and {q̂ij }i∈[n],j∈[m] be the optimal solution of the convex program in Figure 1
and 2 respectively.
X
X
∗
RD̂ij (q̂ij ) ≥
RDij (qij
) − ǫ · mnH.
i,j
i,j
∗ , q̄ ∗ and x ∈ [0, 1] be the numbers
Proof. We first fix some notations. For any bidder i and item j, let qij
ij
ij
¯
−1
−1
∗
∗
∗
∗
∗
∗ +(1−x )· q̄ ∗ = q ∗ .
satisfy that xij · qij ·Fij (1− qij )+(1−xij )· q̄ij ·Fij (1− q̄ij ) = RDij (qij ) and xij · qij
ij
ij
ij
¯
¯
¯
19
∗ ), p̄ = F −1 (1 − q̄ ∗ ), and q ′ = x · 1 − F̂ (p ) + (1 − x ) · 1 − F̂ (p̄ ) .
Let pij = Fij −1 (1 − qij
ij
ij
ij
ij ij
ij
ij ij
ij
ij
¯
¯
¯
By the definition of RD̂ij (·),
′
RD̂ij (qij
) ≥ xij · 1 − F̂ij (pij ) · pij + (1 − xij ) · 1 − F̂ij (p̄ij ) · p̄ij
¯
¯
(4)
∗ − ǫ, 1 − q ∗ + ǫ] and F̂ (p̄ ) ∈ [1 − q̄ ∗ − ǫ, 1 − q̄ ∗ + ǫ]. Hence,
Since ||D̂ij − Dij ||K ≤ ǫ, F̂ij (pij ) ∈ [1 − qij
ij ij
ij
ij
ij
∗ ) − ǫ¯· H. Therefore, R
′ )≥R
∗ ) − ǫ · H.
¯
¯
(q
(q
the RHS of inequality (4) is greater than RDij (qij
Dij ij
D̂ij ij
′ }
Next, we argue that {qij
is
a
feasible
solution
for
the
convex
program
in Figure 2. Since 1 −
i∈[n],j∈[m]
P ′
P ∗
∗
∗
′
∗
F̂ij (pij ) ≤ qij + ǫ and 1 − F̂ij (p̄ij ) ≤ q̄ij + ǫ, qij ≤ qij + ǫ. Thus, i qij ≤ i qij + n · ǫ ≤ 21 + n · ǫ for all
P ′
¯
¯
≤ 21 + m P
j ∈ [m]. Similarly, we can proveP j qij
· ǫ for all i ∈ [n]. As
is the optimal solution
P {q̂ij }i∈[n],j∈[m]
′ )≥
∗ ) − ǫ · mnH.
for the second convex program, i,j RD̂ij (q̂ij ) ≥ i,j RD̂ij (qij
R
(q
i,j Dij ij
Finally, we show how to use the optimal solution of the convex program in Figure 2 to construct an
SPM that approximates the optimal revenue well. We first provide a general transformation that turns any
approximately feasible solution of convex program in Figure 1 to an SPM mechanism.
Lemma 10. For any distribution D = ×i∈[n],j∈[m]Dij , given a collection of independent random variables
{pij }i∈[n],j∈[m] such that
X
i∈[n]
and
X
Pr
[tij ≥ pij ] ≤ 1 − η1 ,
Pr
[tij ≥ pij ] ≤ 1 − η2 , for all i ∈ [n],
pij ,tij ∼Dij
j∈[m]
pij ,tij ∼Dij
for all j ∈ [m]
we can construct in polynomial time a randomized SPM such that the revenue under D is at least
X
η1 η2 ·
Epij pij · Pr [tij ≥ pij ] .
i,j
tij ∼Dij
Proof. Consider a randomized SPM that sells item j to bidder i at price pij . Notice that bidder i purchases
exactly item j if all of the following three conditions hold: (i) for all bidders ℓ 6= i, tℓj is smaller than the
corresponding price pℓj , (ii) for all items k 6= j, tik is smaller than the corresponding price pik , and (iii) tij
is greater than the corresponding price pij . These
P three conditions are independent from each other. The first
condition holds with probability
at
least
1
−
ℓ6=i Prpℓj ,tℓj ∼Dℓj [tℓj ≥ pℓj ] ≥ η1 . The second condition holds
P
with probability at least 1 − k6=j Prpik ,tik ∼Dik [tik ≥ pik ] ≥ η2 . When the first two conditions hold, bidder i
purchases item j whenever she can afford it. Her expected payment is E
pij pij · Prtij ∼Dij [tij ≥pij ] . Hence,
the expected revenue for selling item
i is at least η1 η2 · Epij pij · Prtij ∼Dij [tij ≥ pij ] and the total
P j to bidder
expected revenue is at least η1 η2 · i,j Epij pij · Prtij ∼Dij [tij ≥ pij ] .
Lemma 11. Given any feasible solution {qij }i∈[n],j∈[m] of the convex program in Figure 2, we can con
1
−
(n
+
m)
·
ǫ
·
struct
a
(randomized)
SPM
in
polynomial
time
such
that
its
revenue
under
D
is
at
least
4
P
i,j RD̂ij (qij ) − ǫ · nmH .
Proof. We first fix some notations. For any bidder i and item j, let qij , q̄ij and xij ∈ [0, 1] be the numbers
¯
satisfying xij · qij · F̂ij−1 (1 − qij ) + (1 − xij ) · q̄ij · F̂ij−1 (1 − q̄ij ) = RD̂ij (qij ) and xij · qij + (1 − xij ) · q̄ij = qij .
¯
¯
¯
20
We use pij to denote a random variable that is pij = F̂ij−1 (1 − qij ) with probability xij and p̄ij = F̂ij−1 (1 − q̄ij )
¯
¯
with probability 1 − xij .
Next, we construct a randomized SPM based on {pij }i∈[n],j∈[m] according to Lemma 10. Note that
X
i∈[n]
Pr
pij ,tij ∼Dij
[tij ≥ pij ] ≤
X
i∈[n]
Pr
pij ,tij ∼D̂ij
!
=
!
=
[tij ≥ pij ] + ǫ
X
qij + nǫ ≤
X
qij + mǫ ≤
i∈[n]
1
+ 2nǫ
2
for all item j, and
X
j∈[m]
Pr
pij ,tij ∼Dij
[tij ≥ pij ] ≤
X
j∈[m]
Pr
pij ,tij ∼D̂ij
[tij ≥ pij ] + ǫ
i∈[m]
1
+ 2mǫ
2
for all bidder i. Hence, we can construct in polynomial time a randomized SPM with revenue at least
X
1
1
− 2nǫ
− 2mǫ ·
Epij pij · Pr [tij ≥ pij ]
tij ∼Dij
2
2
i,j
!#
"
X
1
Pr [tij ≥ pij ] − ǫ
Epij pij ·
− (n + m)ǫ
≥
4
t
∼D̂ij
ij
i,j
X
1
≥
RD̂ij (qij ) − ǫ · nmH
− (n + m)ǫ
4
i,j
≤ ǫ, and the second inequality is because pij is upper bounded
The first inequality is because Dij − D̂ij
h
i K
by H and Epij pij · Prtij ∼D̂ij [tij ≥ pij ] = RD̂ij (qij ) by the definition of pij .
Theorem 10. For unit-demand bidders, given distributions D̂ij where D̂ij − Dij
K
≤ ǫ for all i ∈ [n] and
j ∈ [m], there is a polynomial
OPT time algorithm
that constructs a randomized SPM whose revenue under D is at
1
least 4 − (n + m) · ǫ · 8 − 2ǫ · mnH .
Proof. Our algorithm first computes the optimal solution {q̂ij }i∈[n],j∈[m] for the convex program in Figure 2,
then constructs a randomized SPM based on {q̂ij }i∈[n],j∈[m] using Lemma 11. It is not hard to see that our
algorithm runs in polynomial time. By chaining the inequalities
OPT in Lemma 8, 9 and 11, we can argue that the
1
revenue of our mechanism is at least 4 − (n + m) · ǫ · 8 − 2ǫ · mnH .
B.2
Unit-demand Valuations: sample access to bounded distributions
When the distributions Dij are all bounded, the following theorem provides the sample complexity.
Theorem 11. [35] When Dij is supported on [0, H] for all bidder i and item j, the sample complexity for(ǫ, δ)2
uniformly learning the revenue of SPMs for unit-demand bidders is O 1ǫ
m2 n log n log 1ǫ + log 1δ . That
is, with probability 1 − δ, the empirical revenue based on the samples for any SPM is within ǫ · H of its true
expected revenue. Moreover, with the same number of samples, there is a polynomial time algorithm that
learns an SPM whose revenue is at least OPT
144 − ǫH with probability 1 − δ.
21
B.3
Unit-demand Valuations: sample access to regular distributions
In this section, we show there exists a polynomial time algorithm that learns an SPM whose revenue is at least a
constant fraction of the optimal revenue with polynomial in n and m samples. Note that unlike in the previous
two models, the error of our learning algorithm is only multiplicative when the distributions are regular. First,
we present a Lemma regarding the revenue curve function for regular distributions.
Lemma 12. [7] For any regular distribution F , let RF (·) be the corresponding revenue curve. For any
0 < q ′ ≤ q ≤ p < 1,
(1 − p) · RF (q ′ ) ≤ RF (q).
Throughout this section, we use Z to denote max{m, n} and C to be a constant that will be specified later.
1
does not affect the objective
Using Lemma 12, we show in the next Lemma that restricting qij to be at least CZ
value of the convex program in Figure 1 by too much.
′
∗}
Lemma 13. Suppose {qij
i∈[n],j∈[m] is the optimal solution of the convex program in Figure 1. Let qij =
P
OPT
P
1
1
1
∗
′
∗
max{ CZ , qij }, then i,j RDij (qij ) ≥ 1 − CZ · i,j RDij (qij ) ≥ 1 − CZ · 8 .
P
∗ ) ≥ OPT . So to prove the statement, it suffices to argue that
Proof. According to Lemma 8, i,j RDij (qij
8
′ ) ≥ 1− 1
∗ ). If q ∗ = q ′ , this inequality clearly holds. If q ∗ 6= q ′ ,
for any i and j, RDij (qij
·
R
(q
Dij ij
ij
ij
ij
ij
CZ
′ )≥
∗ ≤ q ′ = 1 . Since F is regular, we can apply Lemma 12 to q ′ and q ∗ and obtain inequality R
(q
qij
ij
D
ij
ij
ij
ij
ij CZ
1
∗ ).
· RDij (qij
1 − CZ
′
Dij
Using Lemma 13, we argue how to compute in polynomial time an approximately optimal SPM. Suppose
is the distribution that we obtain after truncating Dij at a threshold Hij 9 , and we have direct access to a
′ such that D̂ ′ − D ′
discrete distribution D̂ij
ij
ij
K
≤ ǫ for all i and j. We show in the following Lemma that
′ }
the optimal solution of a convex program similar to the one in Figure 2 but for {D̂ij
i∈[n],j∈[m] can guide us to
design an approximately optimal SPM under D in polynomial time. As we have sample access to D, we will
′ }
argue later that a polynomial number of samples suffices to generate {D̂ij
i∈[n],j∈[m] .
1
1
, 1 − 3C·Z
]
Lemma 14. Let {Hij }i∈[n],j∈[m] be a collection of positive numbers satisfying Fij (Hij ) ∈ [1 − C·Z
′
for all i ∈ [n] and j ∈ [m]. Let Dij be the distribution of the random variable min{tij , Hij } where tij ∼ Dij ,
′ − D′
D̂ij
ij
′ be a discrete distribution such that
and D̂ij
K
≤ ǫ for all i ∈ [n] and j ∈ [m]. Suppose
′ , then given direct access to D̂ ′ , we can
s is an upper bound of the support size for any distribution D̂ij
ij
1
1
compute in time polynomial in n, m and s a randomized
SPM
that
achieves
revenue
at
least
−
2
C − 2nǫ ·
1
1
1
1 − CZ
· OPT
2 − C − 2mǫ ·
8 − 2ǫ · nmH under D, where H = maxi,j Hij .
Proof. Consider the following convex program:
max
X
RD̂′ (qij )
i,j
s.t.
X
qij ≤
1
1
+ +n·ǫ
2 C
for all j ∈ [m]
qij ≤
1
1
+ +m·ǫ
2 C
for all i ∈ [n]
i
X
j
qij ≥ 0
9
ij
for all i ∈ [n] and j ∈ [m]
′
Let tij ∼ Dij , then min{tij , Hij } is the corresponding truncated random variable drawn from Dij
.
22
∗}
′ = max{ 1 , q ∗ }.
Let {qij
Figure 1 and qij
i∈[n],j∈[m] be the optimal solution of the convex hprogram in
C·Z ij
i
−1
′
′
′
For every i and j, let pij = Fij (1 − qij ) and q̃ij = Prtij ∼D̂′ tij ≥ pij . By the definition of Hij , p′ij ≤ Hij ,
ij
so
!
′
′
Pr ′ tij ≥ p′ij − ǫ ≥ p′ij qij
p′ij q̃ij ≥ p′ij
− ǫ · Hij = RDij (qij
(5)
) − ǫ · Hij .
tij ∼Dij
′ equals to R
′
p′ij qij
Dij (qij ) because Dij is a regular distribution.
Next, we argue that {q̃ij }i∈[n],j∈[m] is a feasible solution of the convex program above. Observe that
X
X
X
1
1
1
′
∗
q̃ij ≤
qij
+ nǫ ≤
qij
+
+ nǫ ≤ + + nǫ
CZ
2 C
i
i
i
for all item j ∈ [m] and
X
q̃ij ≤
j
X
′
qij
+ nǫ ≤
j
X
∗
qij
+
j
1
CZ
1
1
+ + mǫ
2 C
+ mǫ ≤
for all bidder i ∈ [n].
d be the optimal solution of the convex program above. As {q̃ij }i∈[n],j∈[m] is a feasible solution,
Let OPT
X
X
X
1
OPT
′
′
d
pij q̃ij ≥
RDij (qij ) − ǫ · nmH ≥ 1 −
OPT ≥
RD̂′ (q̃ij ) ≥
− ǫ · nmH.
·
ij
CZ
8
i,j
i,j
i,j
The second last inequality is due to inequality (5) and the last inequality is due to Lemma 13.
So far, we have argued that the optimal solution of our convex program has value close to the OPT. We will
show in the second part of the proof that using the optimal solution of our convex program, we can construct
d Let q̂ij be the optimal solution of the convex program
an SPM whose revenue under D is close to OPT.
above and p̂ij be the corresponding random price, that is, Prp̂ij ,tij ∼D̂′ [tij ≥ p̂ij ] = q̂ij and RD̂′ (q̂ij ) =
ij
ij
i
h
Ep̂ij p̂ij · Prtij ∼D̂′ [tij ≥ p̂ij ] . As p̂ij ≤ Hij ,
ij
Pr
p̂ij ,tij ∼Dij
[tij ≥ p̂ij ] =
Pr
′
p̂ij ,tij ∼Dij
[tij ≥ p̂ij ] ∈ [q̂ij − ǫ, q̂ij + ǫ].
Therefore, for all item j
X
i
Pr
p̂ij ,tij ∼Dij
and for all bidder i
X
Pr
j
p̂ij ,tij ∼Dij
[tij ≥ p̂ij ] ≤
[tij ≥ p̂ij ] ≤
X
i
X
j
Pr
′
p̂ij ,tij ∼D̂ij
Pr
′
p̂ij ,tij ∼D̂ij
[tij ≥ p̂ij ] + nǫ =
X
q̂ij + nǫ ≤
1
1
+ + 2nǫ
2 C
q̂ij + mǫ ≤
1
1
+ + 2mǫ.
2 C
i
[tij ≥ p̂ij ] + mǫ =
X
j
According to Lemma 10, we can construct a randomized SPM with {p̂ij }i∈[n],j∈[m] whose revenue is at least
1
P
1
1
1
i,j Ep̂ij p̂ij · Prtij ∼Dij [tij ≥ p̂ij ] under D. Clearly,
2 − C − 2nǫ · 2 − C − 2mǫ ·
Ep̂ij p̂ij ·
"
Pr [tij ≥ p̂ij ] ≥ Ep̂ij p̂ij ·
tij ∼Dij
Pr [tij ≥ p̂ij ] − ǫ
′
tij ∼D̂ij
23
!#
≥ RD̂′ (q̂ij ) − ǫ · Hij .
ij
Therefore, the revenue of the constructed randomized SPM under D is at least
1
1
1
1
d − ǫ · nmH
− − 2nǫ ·
− − 2mǫ · OPT
2 C
2 C
1
1
1
1
1
OPT
≥
− − 2nǫ ·
− − 2mǫ ·
1−
− 2ǫ · nmH .
·
2 C
2 C
CZ
8
It is not hard to see that both {q̂ij }i∈[n],j∈[m] and {p̂ij }i∈[n],j∈[m] can be computed in time polynomial in n, m
and s.
When ǫ is small enough, the additive error in Lemma 14 can be converted into a multiplicative error. Next,
′ }
we argue that with a polynomial number of samples, we can learn {Hij }i∈[n],j∈[m] and {D̂ij
i∈[n],j∈[m] with
enough accuracy.
Theorem 12. If for all bidder i and item j, Dij is a regular distribution, we can learn in polynomial
time
nm
OPT
2
2
2
with probability 1 − δ a randomized SPM whose revenue is at least 33 with O Z m n · log δ (Z =
max{m, n}) samples.
samples from each Dij , we can find an Hij such that Fij (Hij )
Proof. First, if we take O C 2 · Z 2 · log nm
δ
1
1
δ
lies in[1 − CZ
, 1 − 3CZ
] with probability 1 − 2nm
. By the union bound, the probability that all Hij satisfy
1
1
δ
, 1 − 3C·Z
] for all i and j.
the requirement is at least 1 − 2 . From now on, we assume Fij (Hij ) ∈ [1 − C·Z
1
Observe that OPT ≥ maxi,j Hij · 3C·Z , as the expected revenue for selling item j to bidder i at price Hij
Hij
1
. Therefore, there exists sufficiently large constant d and C, if ǫ = d·Znm
the randomized
is at least 3C·Z
OPT
SPM learned in Lemma 14 has revenue at least 33
. According to′ the Dvoretzky-Kiefer-Wolfowitz (DKW)
samples from Dij (we can take samples from Dij then cap
inequality [25], if we take O d2 Z 2 n2 m2 · log nm
δ
′ be the uniform distribution over the samples, D ′ − D̂ ′
the samples at Hij ) and let D̂ij
ij
ij
δ
′ − D̂ ′
. By the union bound, Dij
probability 1− 2nm
ij
≤
K
≤
1
d·Znm
with
1
d·Znm
for all i ∈ [n] and j ∈ [m] with probability
′ we learned from O Z 2 n2 m2 · log nm
at least 1 − δ/2. Finally, by another union bound, the Hij and D̂ij
δ
samples satisfy Fij (Hij ) ∈ [1 −
1
C·Z , 1
−
1
3C·Z ]
K
′ − D̂ ′
and Dij
ij
K
≤
1
d·Znm
for all i and j with probability
at least 1 − δ. In other words, we can learn a randomized SPM whose revenue is at least OPT
33 with probability
′ is at most
at least 1 − δ using O Z 2 n2 m2 · log nm
samples.
Furthermore,
the
support
size
of
any D̂ij
δ
samples, so our learning algorithm runs in time polynomial in n and m.
O Z 2 n2 m2 · log nm
δ
C
Missing Details from Section 5.2
C.1 Additive Valuations: sample access to bounded distributions
As shown by Goldner and Karlin [28], one sample suffices to design a mechanism that approximates BR EV .
The idea is toP
use the VCG with entry fee mechanism but replace the entry fee ei (b−i , Di ) for bidder i with
ei (b−i , si ) = j∈[m] (sij − maxk6=i bkj )+ , where si is a sample drawn from Di . It is easy to argue that for any
b−i , over the randomness of the sample si and bidder i’s real type ti , the event that eP
i (b−i , si ) ≥ ei (b−i , Di )
and bidder i accepts the entry fee ei (b−i , si ) happens with probability at least 81 . As 12 · i∈[n] Et [ei (t−i , Di )] =
BR EV , the
P expected revenue (over the randomness of the types and the samples) from their mechanism is at
least 81 · i∈[n] Et [ei (t−i , Di )] = BR4EV . Next, we show how to learn a mechanism that approximates SR EV .
24
Lemma 15. When Dij is supported on [0, H] for all bidder i and item j, the sample complexity for
(ǫ, δ)
1 2
1
1
2
uniformly learning the revenue of SPMs for additive bidders is O ǫ
m n log n log ǫ + log δ . More-
over, we can learn in polynomial time an SPM whose revenue is at least
given the same number of samples.
SR EV
4
−
3ǫ
2
· H with probability 1 − δ
Proof. The first half of the Lemma was proved by Morgenstern and Roughgarden [35]. We show how to
prove the second half of the claim. Let OPTj be the optimal revenue for selling item j. By the prophet
inequality [41], there exists an SPM for selling item j with a collection of prices {pij }i∈[n] that achieves
revenue at least OPTj /2. As the bidders are additive, if we run the SPMs for selling each item simultaneously,
the expected revenue is exactly the sum of the revenue of the SPM mechanisms for auctioning a single item.
Note that the simultaneous SPM is indeed a SPM for selling all items. Hence, there exists an SPM that
achieves revenue
sample complexity for (ǫ, δ)-uniformly learning the revenue of
at least OPT/2. Since the
1
1
m 2
n log n log ǫ + log δ , the empirical revenue induced by the samples is within ǫ · H of
SPMs is O
ǫ
the true expected revenue with probability 1 − δ for any SPM.
We use ERopt to denote the optimal empirical revenue obtained by any SPM. If we apply the prophet
inequality to the empirical distribution, we can construct an SPM whose empirical revenue ER is at least
ERopt /2. Notice that ERopt is at most ǫ · H less than the optimal true expected revenue obtained by any
SPM, which is at least OPT/2. Combining the two inequalities above, we have ER ≥ OPT/4 − ǫ/2 · H with
probability 1 − δ. Also, the true expected revenue of our SPM is at least ER − ǫ · H, so our SPM achieves
3ǫ
expected revenue at least OPT
4 − 2 · H with probability 1 − δ.
Now we are ready to prove our Theorem for additive bidders when their valuations are bounded.
Theorem 13. When the bidders have additive valuations and Dij is supported on [0, H] for all bidder i and
item j, we can learn in polynomial time a mechanism whose expected revenue is at least OPT
32 − ǫ · H with
probability 1 − δ given
1
1
m 2
· n log n log + log
O
ǫ
ǫ
δ
samples from D.
SR EV
ǫ
Proof. According to Lemma
we can learn a mechanism
whose revenue is at least 4 − 24 · H with
15,
2
probability 1 − δ given O mǫ · n log n log 1ǫ + log 1δ samples. As we explained in the beginning of this
section, with one sample from the distribution we can construct a randomized mechanism whose expected
revenue is at least BR4EV . Therefore, the better of our two mechanisms has expected revenue at least OPT
32 − ǫ · H
with probability 1 − δ.
C.2 Additive Valuations: direct access to approximate distributions
In this section, we discuss how to learn an approximately optimal mechanism for additive bidders when we are
given direct access to approximate value distributions. Again, we first show how to learn a mechanism whose
revenue approximates SR EV then we provide another mechanism whose revenue approximates BR EV .
Lemma 16. For additive bidders, given distributions D̂ij where
D̂ij − Dij
K
≤ ǫ for all i ∈ [n] and
j ∈ [m], there is a polynomial time algorithm
that constructs a randomized SPM whose revenue under D is at
1
SR EV
least 4 − ǫ · n ·
8 − 2ǫ · mnH .
Proof. Let OPTj be the optimal revenue for selling item j. As the bidders are additive, if we can construct
a randomized SPM Mj for every item j such that its expected revenue under D is at least 14 − ǫ · n ·
25
OPTj
8
− 2ǫ · nH , running these m randomized SPMs in parallel generates expected revenue at least
X 1
OPTj
1
SR EV
−ǫ·n ·
− 2ǫ · nH =
−ǫ·n ·
− 2ǫ · mnH
4
8
4
8
j∈[m]
under D. Due to Theorem 10, we can construct in polynomial time such a randomized SPM Mj for each item
j based on ×i∈[n] D̂ij .
Next, we show how to choose the entry fee based on D̂ = ×i,j D̂ij , so that the VCG with entry fee
mechanism has revenue that approximates BR EV under the true distribution D. More specifically, we use
the median of i’s utility under D̂i = ×j∈[m] D̂ij as bidder i’s entry fee. We prove the result in two steps.
We first show that if we can use an entry fee function such that every bidder i accepts her entry fee with
probability between [1/2 − η, 1/2] for any possible bid profiles b−i of the other bidders, the expected revenue
is at least (1/2 − η) · BR EV . Second, we show how to compute in polynomial time such entry fee functions
with η = O(mǫ) based on D̂.
Lemma 17. Suppose for every bidder i, di (·) : T−i 7→ R is a randomized entry fee function such that for any
bid profile b−i ∈ T−i of the other bidders
+
X
1
1
− η,
≥ di (b−i ) ∈
tij − max bkj
Pr
k6=i
ti ∼Di
2
2
j∈[m]
with probability at least 1 − δ. Then if we use di (·) as the entry fee function in the VCG with entry fee
mechanism, the expected revenue is at least (1 − δ − 2η) · BR EV .
hP
i
+
Proof. When Prti ∼Di
(t
−
max
b
)
≥
d
(b
)
∈ 21 − η, 21 , di (b−i ) is no less than the origij
i
−i
k6
=
i
kj
j∈[m]
inal entry fee ei (b−i , Di ) for any bid profile
−i of the other bidders. The expected revenue under the new entry
bP
fee functions is at least ((1 − δ) · 12 − η · i∈[n] Eb−i ∼D−i [ei (b−i , Di )] ≥ (1 − δ − 2η) · BR EV .
Lemma 18. For any bidder i and any bid profile b−i from the other bidders, let Fi,b−i and F̂i,b−i be the distriP
butions for the random variable j∈[m] (tij − maxk6=i bkj )+ when ti is drawn from Di and D̂i respectively.
If Dij − D̂ij
K
≤ ǫ for all bidder i and item j, Fi,b−i − F̂i,b−i
K
≤ 2mǫ for all i and b−i . Moreover,
when mǫ ≤ 1/16, we can compute a randomized mechanism whose expected revenue is at least BR5EV .
o
n
P
+
(t
−
max
b
)
≥
x
. It is easy
Proof. For any real number x, consider event Ei,b−i ,x = ti
k6=i kj
j∈[m] ij
to see that Ei,b−i ,x is single-intersecting for any any i, b−i and x. According to Lemma 3,
Pr
ti ∼Di
Ei,b−i ,x − Pr Ei,b−i ,x ≤ 2mǫ
ti ∼D̂i
for any i, b−i and x. Hence, Fi,b−i − F̂i,b−i
K
≤ 2mǫ.
Next, we argue how to construct a randomized entry fee di (b−i ) in polynomial time with only sample access of F̂i,b−i . Suppose we take k samples from F̂i,b−i and sort them in descending order s1 ≥ s2 ≥ · · · ≥ sk .
Let the entry fee di (b−i ) to be s⌈ 5k ⌉ . By the Chernoff bound, with probability at least 1 − exp(−k/128) (over
16
hP
i
+
(t
−
max
b
)
≥
d
(b
)
= Prti ∼D̂i Ei,b−i ,di (b−i )
the randomness of the samples) Prti ∼D̂i
i −i
k6=i kj
j∈[m] ij
lies in 14 , 38 . Since Prti ∼Di Ei,b−i ,di (b−i ) = Prti ∼D̂i Ei,b−i ,di (b−i ) ± 2mǫ,
Pr
ti ∼Di
1 1
Ei,b−i ,di (b−i ) ∈ [ , ],
8 2
26
if mǫ ≤ 1/16. According
to Lemma 17, the expected revenue under our entry fee di (b−i ) is at least
1
BR EV
if we choose k to be larger than some absolute constant. Clearly,
4 − exp(−k/128) · BR EV ≥
5
the procedure above can be completed in polynomial time with access to D̂.
Combining Lemma 16 and 18, we are ready to prove our main result of this section.
Theorem 14. If all bidders have additive valuations, given distributions D̂ij where D̂ij − Dij
K
≤ ǫ for
all i ∈ [n] and j ∈ [m], there is a polynomial time algorithm that constructs a mechanism whose expected
1
revenue under D is at least OPT
266 − 96ǫ · mnH when ǫ ≤ 16 max{m,n} .
Proof. Since ǫ ≤
3
16
SR EV
8
1
,
16 max{m,n}
we can learn in polynomial time a randomized SPM whose revenue is at
least
·
− 2ǫ · mnH and a VCG with entry fee mechanism whose revenue is at least BR EV /5. As
OPT ≤ 6 · SR EV + 2BR EV (Theorem 6), the better of the two mechanisms we can learn in polynomial time
has revenue at least OPT
266 − 96ǫ · mnH.
D
Missing Details from Section 6
Proof of Lemma 5: We only sketch the proof here. Let P OST R EV denote the highest revenue obtainable
by any RSPM. In [13], Cai and Zhao constructed an upper bound of the optimal revenue using duality and
separated the upper bound into three components: S INGLE , TAIL and C ORE. Both S INGLE and TAIL are
within constant times the P OST R EV , and the ASPE(p∗ , δ∗ ) is used to bound the C ORE. It turns out one
can use essentially the same proof as in [13] to prove that the mechanism ASPE(p′, δ′ ) has revenue at least
a1 (µ) · C ORE − a2 (µ) · P OST R EV − a3 (µ) · (n + m) · ǫ where a1 (µ), a2 (µ) and a3 (µ) are functions that
map µ to positive numbers. In other words, we can replace ASPE(p∗ , δ∗ ) with ASPE(p′, δ′ ) and still obtain a
constant factor approximation. ✷
D.1 Missing Proofs from Section 6.1
We formalize the first step of our algorithm in the following lemma.
Lemma 19. For any B > 0, ǫ > 0, η ∈ [0, 1] and µ ∈ [0,
1
4 ],
suppose we take K = O
log
1
+log n+m log B
η
ǫ
µ2
samples t(1) , · · · , t(K) from D. For any collection of prices {pj }j∈[m] in the B-bounded ǫ-net, define the
(p)
(1)
(K)
entry fee δi (S) of bidder i for setPS under {pj }j∈[m] to be the median of ui (ti , S), · · · , ui (ti , S), where
ui (ti , S) = maxS∗⊆S vi (ti , S ∗ )− j∈S ∗ pj . Then with probability 1−η, for any collection of prices {pj }j∈[m]
n
o
(p)
in the B-bounded ǫ-net, δi (·)
is a collection of µ-balanced entry fee functions.
i∈[n]
Proof. For any fixed {pj }j∈[m] , fixed bidder i and fixed set S, it is easy to argue that the probability for
(p)
Prti ∼Di [ui (ti , S) ≥ δi (S)] to be larger than 21 + µ or smaller than 12 − µ is at most 2exp(−2Kµ2 ) due to
the Chernoff bound. Next, we take a union bound over all {pj }j∈[m] in the ǫ-net, all bidders and all possible
(p)
subsets of [m], so the probability that for any collection of prices {pj }j∈[m] in the ǫ-net {δi (·)}i∈[n] is a
m m
collection of µ-balanced entry fee functions is at least 1 − 2 exp(−2Kµ2 ) · Bǫ
· 2 · n. If we take K to be
at least
log η1 +log n+m log
µ2
B
ǫ
, the success probability is at least 1 − η.
Next, we formalize the second step of our learning algorithm.
27
Lemma 20. For any B ≥ 2G, ǫ, ǫ′ > 0, η ∈ [0, 1] and µ ∈ [0, 14 ], suppose for every collection of
(p)
prices {pj }j∈[m] in the B-bounded ǫ-net, {δi (·)}i∈[n] is a collection of µ-balanced entry fee functions.
We use S to denote the set that contains ASPE(p, δ(p) ) for every p in the B-bounded ǫ-net. If we take
K = O
log
1
+m log B
η
ǫ
ǫ′2
′
samples t(1) , · · · , t(K) from D and let ASPE(p′ , δ(p ) ) be the mechanism that has
′
the highest revenue in S. Then with probability at least 1 − η, the better of ASPE(p′ , δ(p ) ) and the best RSPM
achieves revenue at least COPT
− C2 (µ) · (m + n) · ǫ − 2mnB · ǫ′ .
1 (µ)
Proof. For any {pj }j∈[m] in the ǫ-net, define R EV (p) to be the expected revenue of ASPE(p, δ(p) ) and Rd
EV (p)
(p)
d
be the average revenue of ASPE(p, δ ) among the K samples. First, we argue that R EV (p) is a random
variable that lies between [0, mnB]. The revenue from selling the items can be at most mB as there are only
m items and pj ≤ B for all j ∈ [m]. How about the entry fee? For any bidder i,
X
1
m
≤ .
Pr [vi (ti , [m]) ≥ mG] ≤
Pr [Vi (tij ) ≥ G] ≤
ti ∼Di
tij ∼Dij
5 max{m, n}
5
j∈[m]
The first inequality is because vi (ti , ·) is a subadditive function for every type ti ∈ Ti , so for vi (ti , [m]) to
be greater than mG, there must exist a item j such that Vi (tij ) ≥ G. The second inequality follows from the
definition of G in Theorem 8.
(p)
If there exists a set S ⊆ [m] such that δi (S) > mG, we have
h
i 1
1
(p)
Pr [vi (ti , [m]) ≥ mG] ≥ Pr vi (ti , [m]) ≥ δi (S) ≥ − µ ≥ .
ti ∼Di
ti ∼Di
2
4
(p)
Contradiction. Note that the second inequality is because δi (·) is µ-balanced. Hence, the entry fee is always
upper bounded by mG and Rd
EV (p) is at most mnG + mB ≤ mnB. Also, notice that the expectation of
Rd
EV (p) is exactly R EV (p). By the Chernoff bound,
i
h
′2
′
Pr R EV (p) − Rd
EV (p) ≤ mnB · ǫ ≥ 1 − 2 exp(−2K · ǫ )
for any fixed {pj }j∈[m] . By the union bound, the probability that for all {pj }j∈[m] in the ǫ-net
′
R EV (p) − Rd
EV (p) ≤ mnB · ǫ
m
is at least 1 − 2 exp(−2K · ǫ′2 ) · Bǫ , which is lower bounded by 1 − η due to our choice of K. When this
′
happens, the expected revenue of ASPE(p′, δ(p ) ) is at most 2mnB · ǫ′ less than the highest expected revenue
achievable by any of these mechanisms, because
′
′
′
′
d
R EV (p′ ) ≥ Rd
EV (p ) − mnB · ǫ ≥ R
EV (p) − mnB · ǫ ≥ R EV (p) − 2mnB · ǫ
for any p in the ǫ-net. Combining this inequality with Corollary 2 completes our proof.
Note that Lemma 19 and 20 hold for all distributions D. The reason we require D to be bounded or regular
is because without these restrictions, we do not know how to approximate the best RSPM. In the following
Theorem, we combine Lemma 19, 20 and Theorem 11 to obtain the sample complexity of our learning
algorithm for bounded distributions.
Theorem 15. When all bidders’ valuations are XOS over independent
and the random variable
Vi (tij )
items
2
mn
1
is supported on [0, H] for any bidder i and any item j, with O
· m · log m+n
samples
ξ
ξ + log δ
from D, we can learn an RSPM and an ASPE such that with probability at least 1 − δ the better of the two
mechanisms has revenue at least OPT
c − ξ · H for some absolute constant c > 1.
28
Proof. With O
2
1
2 n log n log 1 + log 1
m
samples, we can obtain an RSPM whose revenue is at
ξ
ξ
δ
1
least 24
of the revenue of the best RSPM minus 2ξ · H with probability 1 − δ/2 according to Theorem 11.
ξ
ξ·H
and ǫ′ = 12mn
Let µ be some fixed constant in [0, 41 ], B = 2H, ǫ = 6C2 (µ)(m+n)
. According to Lemma 19,
samples, we can construct an entry fee function for each price vector
given O log 1δ + log n + m log m+n
ξ
in the B-bounded ǫ-net, such that all these entry fee functions
with probabilityat least 1 − δ/4.
are µ-balanced
2
mn
1
According to Lemma 20, we can learn an ASPE with O
· m · log m+n
fresh samples
ξ
ξ + log δ
− 2ξ · H
from D, such that the better of the ASPE we learned and the best RSPM has revenue of at least COPT
1 (µ)
with probability 1 − δ/4. Combining the statements
we can learn with probability
1 − δ a mechanism
above,
2
mn
1
whose revenue is at least OPT
· m · log m+n
samples.
c − ξ · H with O
ξ
ξ + log δ
In the next Theorem, we combine Lemma 19, 20 and Theorem 12 to obtain the sample complexity of our
learning algorithm for regular distributions.
Theorem 16. When all bidders’ valuations are XOS over independent items and the random variable
Vi (tij )
is regular for each item j ∈ [m] and bidder i ∈ [n], with O Z 2 m2 n2 · m · log(m + n) + log 1δ (Z =
max{m, n}) samples from D, we can learn an RSPM and an ASPE such that with probability at least 1 − δ
the better of the two mechanisms has revenue at least OPT
c for some absolute constant c > 1.
Proof. According to Theorem 12, we can learn with probability
1 − δ/2 a randomized RSPM whose revenue
nm
1
2
2
2
with O Z m n · log δ samples. Next, we learn an ASPE with high
is at least 33 of the optimal RSPM
revenue. With O Z 2 · log nm
samples
from each Dij , we can estimate Wij such that
δ
1 1
,
Pr [Vi (tij ) ≥ Wij ] ∈
tij ∼Dij
6Z 5Z
δ
. By the union bound, the probability that all Wij satisfy the requirement is at least
with probability 1 − 4nm
δ
1 − 4 . So with probability at least 1 − 4δ , Wij ≥ Gij for all i ∈ [n] and j ∈ [m].
ξ·B
ξ
Let B = 2·maxi,j Wij , µ be some fixed constant in [0, 41 ], ǫ = C2 (µ)Z(m+n)
for some small
and ǫ′ = 2mnZ
1
constant ξ, which will be specified later. We know that given O log δ + log n + m log(m + n) samples, we
can construct µ-balanced entry fee functions for all price vectors in the B-bounded ǫ-net with probability
1 − δ/8 due to Lemma 19. According to Lemma 20, we can learn an ASPE with
1
2 2 2
O Z m n · m · log(m + n) + log
δ
fresh samples from D, such that the better of the ASPE we learned and the best RSPM has revenue of at least
2ξ·B
OPT
C1 (µ) − Z with probability 1 − δ/8. Note that there exists a bidder i and an item j such that Wij = B/2,
so OPT ≥
B
2
·
1
6Z
and for sufficiently small ξ,
OPT
C1 (µ)
−
2ξ·B
Z
≥
OPT
2C1 (µ) .
can learn with probability 1 − δ a mechanism
whose revenue is at least
1
2
2
2
O Z m n · m · log(m + n) + log δ samples.
29
Combining the statements above, we
OPT
c
for some absolute constant c with
E Learning Algorithms for Symmetric Bidders
E.1
An Upper Bound of the Optimal Revenue for Symmetric Bidders
In this section, we introduce an upper bound to OPT based on duality [13], which is crucial for us to prove
the approximation ratios of our learning algorithms. We first fix some notation. Let P OST R EV be the highest
revenue obtainable by any RSPM. As the bidders are symmetric, we drop the subscript i when there is no
confusion. In particular, we use V (tij ) to denote bidder i’s value for winning item j if her private information
for item j is tij , and v(ti , S) to denote bidder i’s value for set S when her type is ti . We use Dj to denote the
distribution of the private information about item j. Let σiS (t) be the interim probability for bidder i to receive
exactly set S ⊆ [m] when her type is t.
In [13], an upper bound of the optimal revenue is derived using duality theory. Their upper bound applies
to asymmetric bidders with valuations that are subadditive over independent items. When the bidders are
symmetric, we can simplify their upper bound. First, we need the definition of b-balanced thresholds.
Definition 7 (b-balanced Thresholds). For any constant b ∈ (0, 1), a collection of positive real numbers
b
].
{βj }j∈[m] is b-balanced if for all i ∈ [n] and j ∈ [m], Prtij ∼Dj [V (tij ) ≥ βj ] ∈ [ nb , n−1
Note that when bidders are asymmetric, b-balanced thresholds are not guaranteed to exist, as there may not
b
exist any βj that satisfies Prtij ∼Dj [V (tij ) ≥ βj ] ∈ [ nb , n−1
] for all bidder i simultaneously. Next, we define
the C OREη (β) which will be crucial for upper bounding the optimal revenue.10
Definition 8 (C ORE). Given any collection of thresholds {βj }j∈[n] and a nonnegative constant η ≤ 41 ,
P
• if j∈[m] Prtj ∼Dj [V (tj ) ≥ βj ] ≤ 12 − η, let cη (β) be 0;
P
• otherwise, let cη (β) be a nonnegative number such that j∈[m] Prtj ∼Dj [V (tj ) ≥ βj + cη (β)] ∈ 21 − η, 12 .
For every type t, let Cη (t) = {j | V (tj ) < βj + cη (β)}. Then,
X X
X
C OREη (β) = max
f (ti ) ·
σiS (ti ) · v (ti , S ∩ Cη (ti )) ,
σ∈P (D)
i∈[n] ti ∈Ti
S⊆[m]
where P (D) is the set of all feasible interim allocation rules. That is, C OREη (β) is the maximum welfare a
mechanism can extract out of the allocation of items whose individual value for the bidder they are allocated
to is lower than the adjusted thresholds.
It was shown in [13] that every collection of thresholds induces an upper bound to the optimal revenue. In
particular, for any choice of thresholds {βj }j∈[m] and η 11 , the revenue R EV (M ) of any BIC mechanism M is
upper bounded by
2 · S INGLE (M, β) + 4 · TAIL η (M, β) + 4 · C OREη (M, β) (Adapted from Theorem 2 in [13]).
These terms depend on the choice of {βj }j∈[m] , η as well as the mechanism M . We refer interested readers
to [13] for the definitions of these terms. To obtain a benchmark/upper bound of the optimal revenue, one can
simply replace the above expression with
2 · max S INGLE (M, β) + 4 · max TAIL η (M, β) + 4 · max C OREη (M, β).
M
M
M
10
For readers that are familiar with the definition of the C ORE in [13], C OREη (β) is essentially the same term but adapted for
symmetric bidders.
11
In [13], the thresholds are allowed to depend on the identity of the bidder. More specifically, for any i ∈ [n] and j ∈ [m], there
is an associated threshold βij . Their upper bound applies to asymmetric thresholds as well. Indeed, when the bidders are asymmetric,
their upper bound is induced by a set of asymmetric thresholds. As we only discuss symmetric bidders in this section, we focus on
symmetric thresholds for simplicity. Regarding η, Cai and Zhao only considered the case when η = 0, but their analysis can be easily
modified to accommodate any η ≤ 1/4. See Theorem 17 for the modified upper bound.
30
It is not hard to see that this benchmark may be impossible to approximate for certain choices of the thresholds.
Just imagine the case when the thresholds are extremely high, then maxM C OREη (M, β) becomes the optimal
social welfare which can be arbitrarily large comparing to the optimal revenue. What Cai and Zhao [13]
showed was that when the thresholds are b-balanced, this upper bound can indeed be approximated by the
revenue of an RSPM and an ASPE. From now on, we only consider b-balanced thresholds.
Using results in [13], we can further simplify the benchmark. In particular, maxM S INGLE (M, β) is less
2
· P OST R EV for any
than 6 · P OST R EV for all choices of {βj }j∈[n] and maxM TAIL η (M, β) is less than 1−b
choice of η and b-balanced thresholds {βj }j∈[n] . Moreover, maxM C OREη (M, β) ≤ C OREη (β). Combining
the inequalities above, we obtain the following Theorem.
Theorem 17 (Adapted from [13]). When the bidders are symmetric and have valuations that are subadditive
over independent items, for any constant b ∈ (0, 1), η ≤ 14 and a collection of b-balanced thresholds {βj }j∈[m] ,
OPT ≤
E.2
12 +
8
1−b
· P OST R EV + 4 · C OREη (β).
Symmetric Bidders with XOS Valuations
In this section, we show how to learn in polynomial time an approximately optimal mechanism for symmetric
bidders with XOS valuations given sample access to the distributions. According to Theorem 17, we only need
to learn a mechanism that approximates P OST R EV and C OREη (β). From Section 5.1, we know how to approximated P OST R EV in polynomial time, so we focus on learning a mechanism whose revenue approximates
C OREη (β).
First, we need a crucial property about XOS valuations.
Lemma 21 (Supporting Pricesn[23]). oIf v(t, ·) is an XOS function, for any subset S ⊆ [m] there exists a
collection of supporting prices θjS (t)
for v(t, S) such that
j∈S
P
1. v(t, S ′ ) ≥ j∈S ′ θjS (t) for all S ′ ⊆ S and
P
S
2.
j∈S θj (t) = v(t, S).
Let v ′ (ti , S) = v (ti , S ∩ Cη (ti )) and Fi be the distribution of the valuation v ′ (ti , S). As the bidders are
symmetric, Fi = Fi′ for any i and i′ . The C OREη (β) is exactly the maximum expected social welfare if
every bidder i’s valuation is drawn independently from Fi . Cai and Zhao [13] showed how to use an ASPE to
approximate this term. In the next Lemma, we construct the prices used in their ASPE and show its relation to
C OREη (β).
Lemma 22. (Adapted from [13]) Let every bidder i’s valuation be v ′ (ti , S) = v (ti , S ∩ Cη (ti )) when her type
is ti and σ ∗ be a symmetric allocation that achieves α-fraction of the optimal social welfare with respect to
v ′ (·, ·). For every item j ∈ [m], let
Qη,j =
X
1 X X
S∩C (t )
∗
·
f (ti ) ·
σiS
(ti ) · θj η i (ti ),
2
i∈[n] ti ∈Ti
n
o
S∩C (t )
where θj η i (ti )
j∈S∩Cη (ti )
S:j∈S
is the supporting prices for v (ti , S ∩ Cη (ti )). Let
u∗ (t, S) = max
v(t, S ∗ ) −
∗
S ⊆S
X
j∈S ∗
31
Qη,j
be a bidder’s utility for the set of items S when her type is t. We define δ∗ (S) to be the median of the
random
∗
∗
variable u (t, S) (with t ∼ ×j∈[m]Dj ) for any set S ⊆ [m]. The revenue of ASPE {Qη,j }j∈[m] , δ is at least
α · C OREη (β)
− C(b, η) · P OST R EV ,
2
where C(b, η) is a function that only depends on b and η.
Proof. We can essentially use the same proof in [13] to prove that the expected revenue of the ASPE is at least
X
Qη,j − C(b, η) · P OST R EV .
j∈[m]
For readers that are familiar with that proof, the only thing we need to make sure is that our choice of σ ∗ and
{βj }j∈[m] satisfy Lemma 5 in [13]. Since σ ∗ is symmetric and {βj }j∈[m] is b-balanced, for all bidder i and
item j
X
b
· (n − 1) = b,
Pr [V (tkj ) ≥ βj ] ≤
tkj ∼Dj
n−1
k6=i
and
Pr [V (tij ) ≥ βj ] /b ≥ 1/n ≥ ·
tij ∼Dj
Next, we argue
P
ti ∈Ti
j∈[m] Qη,j
X
j∈[m]
Qη,j =
X
≥
α·C OREη (β)
.
2
fi (ti ) ·
X
∗
σiS
(ti ).
S:j∈S
Observe that
X
1 X X
∗
·
f (ti ) ·
σiS
(ti ) · v ′ (ti , S) ≥ α · C OREη (β).
2
i∈[n] ti ∈Ti
S
The last inequality is because C OREη (β) is the maximum social welfare under v ′ (·, ·) and σ ∗ achieves α
fraction of that.
Lemma 23. For any ǫ > 0 and µ ∈ [0, 41 ], let {Qj }j∈[m] be a collection of prices such that |Qj − Qη,j | ≤ ǫ
for all j ∈ [m]. Let δ(S) be the entry fee function such that Pr
Pt∼×j∈[m] Dj [u(t, S) ≥ δ(S)] ∈ [1/2−µ, 1/2+µ]
∗
for any set S ⊆ [m], where u(t, S) = maxS∗⊆S v(t, S ) − j∈S ∗ Qj . Then, the ASPE(Q, δ) achieves at least
α·C OREη (β)
B1 (µ)
− B2 (b, η, µ) · P OST R EV − B3 (µ) · (m + n) · ǫ revenue when bidders’ valuations are XOS over
independent item. Both B1 (µ) and B3 (µ) are functions that only depend on µ and B2 (b, η, µ) is a function that
only depends on µ, b and η.
Proof. It turns out the proof in [13] is robust enough to accommodate the error ǫ and µ. We can prove the
claim by following essentially the same analysis as in [13]. We do not include the details here.
E.2.1 Leaning the ASPE in Polynomial Time
We first show how to learn a collection of b-balanced thresholds and the corresponding cη (β).
a
Lemma 24. For any positive constant b < 1 and η ≤ 14 , there is a polynomial time algorithm that computes
collection of b-balanced thresholds {βj }j∈[m] and cη (β) with probability 1−δ using O m2 n4 log m
samples
δ
from distribution ×j∈[m] Dj .
32
(1)
(K)
Proof. Given K = O m2 n4 log m + log 1δ samples tj , . . . , tj from distribution Dj , we construct Fj as
(K)
(1)
. According to the DKW Theorem [25], with probability
the uniform distribution over V tj , . . . , V tj
at least 1 − δ/m,
1
for all x
(6)
Pr [V (tj ) ≥ x] − Pr [vj ≥ x] ≤
tj ∼Dj
vj ∼Fj
c · mn2
where c is a constant that will be specified later. From now on, we assume that Inequality (6) holds for every
j, which happens with probability 1 − δ.
h
i
(ℓ)
(ℓ)
b
As 1/K ≤ 3nb 2 ≤ n−1
− 3nb 2 − nb − 3nb 2 , there must exist a sample tj such that Prvj ∼Fj vj ≥ V tj
∈
i
h
(ℓ)
b
b
b
b
. Note that
n + 3n2 , n−1 − 3n2 . Let βj = V tj
1
1
Pr [V (tj ) ≥ βj ] ∈ Pr [vj ≥ βj ] −
, Pr [vj ≥ βj ] +
.
tj ∼Dj
vj ∼Fj
c · mn2 vj ∼Fj
c · mn2
i
h
b
. Thus, βj is b-balanced for all item j.
If c is less than 3b , Prtj ∼Dj [V (tj ) ≥ βj ] ∈ nb , n−1
P
Next, we argue how to learn cη (β). If j∈[m] Prvj ∼Fj [vj ≥ βj ] ≤ 21 − η2 , let cη (β) = 0. This is a
P
valid choice, as j Prtj ∼Dj [V (tj ) ≥ βj ] is at most 12 − η2 + cn1 2 ≤ 21 according to inequality (6). SupP
pose j∈[m] Prvj ∼Fj [vj ≥ βj ] > 21 − η2 , as m/K < η4 , there must exist some item k ∈ [m] and a sami
h
P
(ℓ)
(ℓ)
≥ βk such that j∈[m] Prvj ∼Fj vj ≥ βj + V tk − βk ∈ 21 − η4 , 21 − η2 . Let cη (β) =
ple V tk
(ℓ)
V tk − βk . According to inequality (6),
X
j∈[m]
1 1 η
1
1 η
− −
, − +
.
Pr [V (tj ) ≥ βj + cη (β)] ∈
tj ∼Dj
2 4 cn2 2 2 cn2
P
For sufficiently large c, j Prtj ∼Dj [V (tj ) ≥ βj + cη (β)] ∈ 12 − η, 12 .
Finding each βj takes O(K log K) time and finding the cη (β) takes O(mK) time. So we can learn
in polynomial time
a collection of b-balanced thresholds {βj }j∈[m] and cη (β) with probability 1 − δ using
m
2
4
O m n log δ samples.
Next, we show how to learn the prices of the ASPE. As showed by Feige [27], there exists a polynomial
time algorithm that achieves 1− 1e fraction of the optimal social welfare when bidders have XOS valuations. We
let σ ∗ be the interim allocation rule induced by Feige’s algorithm and estimate the prices by running Feige’s
algorithm on sampled valuation profiles. To run Feige’s algorithm, we need a demand oracle for bidder’s
valuations. In the following Lemma, we argue that v ′ (t, ·) is an XOS function for any type t, and given a value
(or demand, XOS) oracle for v(t, ·), we can construct in polynomial time the corresponding oracle for v ′ (t, ·).
First, we define these oracles formally.
Definition 9. We consider the following three oracles for a bidder’s valuation function v(t, ·):
• Value oracle: takes a set S ⊆ [m] as the input and returns v(t, S).
• Demand oracle: takes a collection of prices {pj }P
j∈[m] as an input and returns the favorite set under
these prices, that is, S ∗ ∈ argmaxS∈[m] v(t, S) − j∈S pj .
• XOS oracle (only when v(t, ·) is XOS): takes a set S ⊆ [m] as the input and returns the supporting
prices {θjS (t)}j∈S for v(t, S).
33
Lemma 25. Given a collection of thresholds {βj }j∈[m] and cη (β). For any set S ⊆ [m], let v ′ (t, S) =
v(t, S ∩ Cη (t)). If v(t, ·) is an XOS function, v ′ (t, ·) is also an XOS function. Given a value (or demand, XOS)
oracle for v(t, ·), we can construct in polynomial time a value (or demand, XOS) oracle for v ′ (t, ·).
Proof. If v(t, ·) is an XOS function, v(t, ·) can be represented as the max of a collection of additive functions.
Observe that if we change the values for items in Cη (t) to 0 in each of these additive functions, v ′ (t, ·) equals
to the max of this new collection of additive functions. Hence, v ′ (t, ·) is also an XOS function.
If we are given a value oracle for v(t, ·), it is straightforward to construct a value oracle for v ′ (t, ·). If
we are given a demand oracle for v(t, ·), here is how to construct a demand oracle for v ′ (t, ·). For every
queried price vector {pj }j∈[m] , we change the price for each item outside Cη (t) to 2v(t, [m]) and keep the
prices for the items in Cη (t). Let this new price vector be p′ . We query the demand oracle of v(t, ·) on p′ .
The output set should also be the demand set for v ′ (t, ·) under prices p, as the bidder can only afford items
in Cnη (t) and v ′ (t,
o S) = v(t, S) for any set S ⊆ Cη (t). Finally, we consider the XOS oracle. For any set S,
S∩Cη (t)
let θj
(t)
S∩Cη (t)
j∈S∩Cη (t)
be the supporting prices for v(t, S ∩ Cη (t)). Let γjS (t) = θj
for all item j in
Cη (t) ∩ S and γjS (t) = 0 for all item j in S − Cη (t). According to the definition of v ′ (t, ·), {γjS (t)}j∈S is the
supporting price for v ′ (t, S). So given an XOS oracle for v(t, ·), we can compute the supporting price of any
set S for v ′ (t, ·) in polynomial time.
Lemma 25 shows that v ′ (t, ·) is also an XOS function for any type t and with access to a demand oracle
for v(t, ·) we can construct a demand oracle for v ′ (t, ·) in polynomial time. So we can indeed run Feige’s
algorithm on v ′ . In the next Lemma, we show how to learn a collection of prices {Qj }j∈[m] and entry fee
function δ(·, ·) such that the corresponding ASPE has high revenue.
Lemma 26. Given a collection of b-balanced thresholds {βj }j∈[m] and cη (β), and access to value, demand
and XOS oracles for valuation v(t, ·) for every type t, there is a polynomial time algorithm that learns an
C OREη (β)
ASPE({Qj }j∈[m] , δ) whose revenue is at least
− g(b, η) · P OST R EV − K2 · ξ · OPT with probability
K1
samples from ×j∈[m] Dj , where K1 and K2 are positive absolute
at least 1 − ζ using O n3 (m + n)2 log m
ζ
constants, and g(b, η) is a function that only depends on b and η.
Proof. According to Lemma 25, we can construct value, demand and XOS oracles for valuation v ′ (t, ·) given
access to the corresponding oracles for v(t, ·). We use {γjS (t)}j∈S to denote the output of the XOS oracle for
S∩Cη (t)
v ′ (t, ·) on set S. In particular, γjS (t) = 0 for all j ∈ S − Cη (t) and γjS (t) = θj
(t) for all j ∈ S ∩ Cη (t),
S∩C (t)
{θj η (t)}j∈S∩Cη (t)
where
is the supporting prices for v(t, S ∩ Cη (t)). Let A(t) be the allocation computed
by Feige’s algorithm on the valuation profile (v ′ (t1 , ·), . . . , v ′ (tn , ·)), where Ai (t) denotes the set of items that
bidder i receives. Let σ ∗ be the interim allocation rule induced by A(·) when bidders types are all drawn from
∗ (t ) = Pr
×j∈[m] Dj independently. That is, σiS
i
t−i [Ai (t) = S]. We use the same definition for Qη,j as in
Lemma 22. In other words, Qη,j is the contribution of item j to the social welfare under allocation rule σ ∗ , so
we can rewrite it as
X
1
A (t)
· Et
1 [j ∈ Ai (t)] · γj i (ti ) .
2
i∈[n]
A (t(ℓ) ) (ℓ)
P
(ti ). We
Let t(1), . . . , t(K) be K sampled type profiles, and q (ℓ) = 21 i∈[n] 1 j ∈ Ai (t(ℓ) ) · γj i
1 P
(ℓ)
S
set Qj to be K · ℓ∈[K] q . Since γj (t) ≤ βj + cη (β) for any j, S and t, Qj ≤ βj + cη (β). By the Chernoff
bound,
Pr [|Qj − Qη,j | ≤ ǫ · (βj + cη (β))] ≥ 1 − 2 exp(−2K · ǫ2 ).
34
As {βj }j∈[m] is a collection of b-balanced thresholds, we can obtain revenue βj · nb by only selling
item j to one bidder at price βj . Hence, βj ≤ n·OPT
b . Now, consider a posted price mechanism that
sells
item
j
at
price
β
+
c
(β).
A
single
bidder
will
purchase at least one item with probability at least
j
η
P
1
j Prtj ∼Dj [V (tj ) ≥ βj + cη (β)] which is no less than 2 − η if cη (β) > 0. Hence, the revenue of this mech
ξ
anism is at least cη (β) · 12 − η . As η ≤ 14 , cη (β) ≤ 4OPT. If we let ǫ = (m+n)·(n/b+4)
for some small
i
h
log 4m
ζ
ξ
constant ξ which will be specified later and K = 2ǫ2ζ , we have Pr |Qj − Qη,j | ≤ m+n
· OPT ≥ 1 − 2m
.
In other words, with O n3 (m + n)2 log m
samples from ×j∈[m] Dj (as each tℓ costs n samples), we can
ζ
ξ
· OPT for all item j
learn in polynomial time a collection of prices {Qj }j∈[m] such that |Qj − Qη,j | ≤ m+n
with probability 1 − ζ/2.
Next, we consider the entry fee function. We use essentially the same argument as in Lemma 19. Suppose
we take L samples t(1) , · · · , t(L) from ×j∈[m]Dj . Define the entry fee δ(S) for set S under {Qj }j∈[m] to be
P
the median of u(t(1) , S), · · · , u(t(L) , S), where u(t, S) = maxS∗⊆S v(t, S ∗ ) − j∈S ∗ pj . Given any constant
µ ∈ [0, 1/4], for any fixed set S, it is easy to argue that the probability for Prt∼×j∈[m] Dj [u(t, S) ≥ δ(S)] to
be larger than 21 + µ or less than 21 − µ is at most 2 exp(−2Lµ2 ) due to the Chernoff bound. If we let L to be
1/ζ
a · m+log
for a sufficiently large constant a, the probability that δ(·) is a µ-balanced entry fee function is at
µ2
least 1 − ζ/2 by the union bound.
samples from ×j∈[m] Dj , we can compute in polynomial time a colHence, with O n3 (m + n)2 log m
ζ
lection of prices {Qj }j∈[m] and a entry fee function δ(·) such that the revenue of the ASPE {Qj }j∈[m] , δ(·)
(1−1/e)·C ORE (β)
η
− B2 (b, η, µ) · P OST R EV − ξ · B3 (µ) · OPT with probability 1 − ζ due to Lemma 23.
is at least
B1 (µ)
Our claim follows by fixing the value of µ to be some constant.
Theorem 18. For symmetric bidders with valuations that are XOS over independent items,
1. when V (tj ) is upper bounded by H for any j ∈ [m] and any tj , with
O
n 5 + m2 n
4
m
+
· log
δ
2
!
1
1
1
m2 n log n log + log
ǫ
ǫ
δ
samples from ×j∈[m] Dj , we can learn in polynomial time with probability 1 − δ a mechanism whose
revenue is at least c1 · OPT − ǫ · H for some absolute constant c1 ;
2. when the distribution of random variable V (tj ) with tj ∼ Dj is regular for all item j ∈ [m], with
m
nm
O n5 · log
+ max{m, n}2 m2 n2 · log
δ
δ
samples from ×j∈[m] Dj , we can learn in polynomial time with probability 1 − δ a mechanism whose
revenue is at least c2 · OPT for some absolute constant c2 .
Proof of Theorem 18: Combining Lemma 24, Lemma 26 and Theorem 17, we know how to compute in
polynomial time an ASPE whose revenue is at least a1 · OPT −a2 · P OST
R EV with probability 1 − δ/2 for
some absolute constant a1 , a2 , and we only need O n5 + m2 n4 · log m
δ samples from ×j∈[m] Dj . When the
P OST R EV
distributions are bounded, we canlearn in polynomial time an RSPM
whose revenue is at least 144 − ξH
2
1
with probability 1 − δ/2 using O
m2 n log n log 1ǫ + log 1δ
samples (Theorem 11). By choosing the
ξ
ratio between ξ and ǫ to be the right constant, we can show the first part of our claim. When V (tj ) is a regular
R EV
random variable for every item j, we can learn in polynomial time an RSPM whose revenue is at least P OST
33
35
samples (Theorem 12). Therefore, we can
with probability 1 − δ/2 using O max{m, n}2 m2 n2 · log nm
δ
learn a mechanism in polynomial time such that with probability 1 − δ whose revenue is at least a constant
fraction of the OPT. This proves the second part of our claim.✷
E.3
Symmetric Bidders with Subadditive Valuations
In this section, we argue that if the bidders are symmetric and m = O(n), there exists a collection of bbalanced thresholds {βj }j∈[m] for a fixed constant b, such that P OST R EV is within a constant fraction of the
benchmark. Note that this argument only applies to symmetric bidders, as b-balanced thresholds may not even
exist for asymmetric bidders.
We set η = 0 for this section and drop the subscript η when there is no confusion. We show how to
upper bound C ORE(β) with P OST R EV by choosing a particular collection of b-balanced thresholds. Let Z =
n
n
. It is not hard to see that 3Z
-balanced thresholds exist, as we can choose βj such that
max{m, n} and b = 3Z
1
Prtj ∼Dj [V (tj ) ≥ βj ] = 3Z .
P
n
-balanced thresholds, then C ORE(β) ≤ j∈[m] βj .
Lemma 27. Let {βj }j∈[m] be a collection of 3Z
Proof. As {βj }j∈[m] are
n
3Z -balanced,
Prtij ∼Dj [V (tij ) ≥ βj ] ≤
X
j∈[m]
σ∈P (D)
≤ max
σ∈P (D)
= max
σ∈P (D)
= max
σ∈P (D)
≤
X
βj
P
X X
1
2Z .
Therefore,
j∈[m] βj .
X
f (ti ) ·
i∈[n] ti ∈Ti
X X
i∈[n] ti ∈Ti
X X
X
σiS (ti ) · v(ti , S ∩ C(ti ))
S⊆[m]
f (ti ) ·
i∈[n] j∈[m]
j
≤
1
Pr [V (tj ) ≥ βj ] ≤ ,
tj ∼Dj
2
so c(β) = 0. Next, we upper bound C ORE(β) by
C ORE(β) = max
n
(n−1)·3Z
βj ·
βj ·
X
X
σiS (ti ) ·
j∈S
S⊆[m]
X
f (ti ) ·
ti ∈Ti
X X
i∈[n] ti ∈Ti
X
S:j∈S
fi (ti ) ·
X
S:j∈S
βj
σiS (ti )
σiS (ti )
j
The first inequality is because v(ti , ·) is a subadditive function, so
X
X
v(ti , S ∩ Ci (ti )) ≤
V (tij ) ≤
j∈S∩Ci (ti )
j∈S∩Ci (ti )
βj ≤
X
βj .
j∈S
P
P
P
The last inequality is because i∈[n] ti ∈Ti fi (ti ) · S:j∈S σiS (ti ) ≤ 1 is the ex-ante probability for bidder
i to receive item j, and for any feasible interim allocation σ, the sum of all bidders’ ex-ante probabilities for
receiving item j should not exceed 1.
P
In the following Lemma, we demonstrate that j∈[m] βj is upper bounded by 9Z
n · P OST R EV .
36
Lemma 28. Let {βj }j∈[m] be a collection of
n
3Z -balanced
thresholds, P OST R EV ≥
n
9Z
·
P
j∈[m] βj .
Proof. Let us consider an RSPM where the price for selling item j to bidder i is βj . Bidder i purchases item
n
j if that is the only item she can afford and no one else can afford item j. As {βj }j∈[m] are 3Z
-balanced, the
probability that no one else can afford item j is at least
X
2
n
1 −
)≥ .
Pr [V (tkj ) ≥ βj ] ≥ (1 −
tkj ∼Dj
3Z
3
k6=i
Also, the probability that i cannot afford any item other than j is at least
X
n(m − 1)
1
1 −
Pr [V (tiℓ ) ≥ βℓ ] ≥ 1 −
≥ .
tiℓ ∼Dℓ
3Z(n − 1)
2
ℓ6=j
1
Therefore, bidder i purchases item j with probability at least 13 Prtij ∼Dj [V (tij ≥ βj )] ≥ 9Z
. Whenever this
P P βj
n P
event happens, it contributes βj to the revenue. So the total revenue is at least j i 9Z = 9Z · j βj .
Combining Theorem 17, Lemma 27 and 28, we obtain the following Theorem.
Theorem 19. For symmetric bidders with valuations that are subadditive over independent items,
36 max{n, m}
· P OST R EV .
OPT ≤ 24 +
n
n
9 max{n,m} · C ORE (β) if {βj }j∈[m] is a collection
9 max{n,m}
n
·
n
3 max{n,m} and replacing C ORE (β) with
Proof. Combining Lemma 27 and 28, we have P OST R EV ≥
n
of 3 max{n,m}
-balanced thresholds. By setting b to be
P OST R EV in Theorem 17, we have
OPT ≤
As
n
3 max{n,m}
12 +
8
1−
≤ 1/3,
OPT ≤
n
3 max{n,m}
36 max{n, m}
+
n
36 max{n, m}
24 +
n
!
· P OST R EV .
· P OST R EV .
E.3.1 Learning an Approximately Optimal Mechanism for Symmetric Subadditive Bidders
With Theorem 19, we only need to learn a mechanism that approximates the optimal revenue obtainable by
any RSPM. The next Lemma connects RSPMs with SPMs in an induced unit-demand setting.
Lemma 29. Consider n symmetric bidders whose types are drawn independently from ×m
j=1 Dj . Let Fj be
the distribution for random variable V (tj ) where tj ∼ Dj . We define an induced unit-demand setting with n
symmetric unit-demand bidders whose values for item j are drawn independently from Fj . For any collection
of prices {pij }i∈[n],j∈[m], the revenue of the RSPM with these prices in the original setting is exactly the same
as the revenue of the SPM with these prices in the induced unit-demand setting.
Proof. As in an RSPM bidders can purchase at most one item, bidders behave exactly the same as in the
induced unit-demand setting. Since the prices in the SPM and RSPM are the same, bidders purchase exactly
the same items. Hence, the revenue is the same.
37
Corollary 3. For symmetric bidders with valuations that are subadditive over independent items,
n
· OPT,
OPTU D ≥ Ω
Z
where Z = max{m, n} and OPTU D is the optimal revenue for the induced unit-demand setting.
Proof. Combine Theorem 19 and Lemma 29.
Lemma 29 implies that learning an approximately optimal RSPM is equivalent as learning an approximately optimal SPM in the induced unit-demand setting. Next, we apply our results in Section 5.1 to the
induced unit-demand setting to learn an RSMP that approximates the optimal revenue in the original setting.
In the next Theorem, we show that even though the bidders’ valuations could be complex set functions, e.g.,
submodular, XOS and subadditive, as long as m = O(n), the approximate distributions for the bidders’ values
for winning any single item provides sufficient information to learn an approximately optimal mechanism.
Theorem 20. For symmetric bidders with valuations that are subadditive over independent items, let Fj be
the distribution of V (tj ) where tj ∼ Dj . If Fj is supported on [0, H] for all j ∈ [m], given distributions F̂j
≤ ǫ for all j ∈ [m], there is a polynomial time algorithm that constructs a randomized
where F̂j − Fj
K
RSPM whose revenue under the true distribution D is at least
1
n
− (n + m) · ǫ · Ω
· OPT − 2ǫ · mnH .
4
max{m, n}
Proof. Let Z = max{m, n}. According to Corollary 3, OPTU D = Ω Zn · OPT. Since ||F̂j − Fj ||K ≤ ǫ
for all j ∈ [m], we can learn a randomized SPM in the induced unit-demand
setting whose revenue under the
OPTU D
1
true distribution is at least 4 − (n + m) · ǫ ·
− 2ǫ · mnH based on Theorem 10. By Lemma 29,
8
we can construct an RSPM with the same collection of (randomized) prices and achieve revenue
n
1
· OPT − 2ǫ · mnH
− (n + m) · ǫ · Ω
4
Z
in the original setting.
If we are given sample access to bounded distributions, we show in the following Theorem that a polynomial number of samples suffices to learn an approximately optimal mechanism, when m = O(n).
Theorem 21. For symmetric bidders with valuations that are subadditive over independent items, let Fj be
the distribution of V (tj ) where tj ∼ Dj . If Fj is supported
on [0,H] for all j ∈ [m], there is a polynomial
n
max{m,n}
· OPT − ǫH with probability 1 − δ using
!
2
1
1
1
· m2 n log n log + log
O
ǫ
ǫ
δ
time algorithm that learns an RSPM whose revenue is Ω
samples.
Proof. According to Corollary 3, OPTU D = Ω
n
max{m,n}
· OPT. Due to Theorem 11,
2
!
1
1
1
O
· m2 n log n log + log
ǫ
ǫ
δ
samples suffices to learn in polynomial time with probability 1 − δ an SPM with revenue at least Ω(OPTU D ) −
ǫ · H for the induced unit-demand
Lemma 29, we can construct an RSPM with the same collection
setting. By
n
of prices and achieve revenue Ω max{m,n} · OPT − ǫH in the original setting.
38
Finally, if the distribution of the random variable V (tj ) with tj ∼ Dj is regular for all item j ∈ [m], we
prove in the next theorem that there exists a prior-independent mechanism that achieves a constant fraction
of the optimal revenue if m = O(n). Note that approximately optimal prior-independent mechanisms for
symmetric unit-demand bidders are known due to the work by Devanur et al. [21] and Roughgarden et al. [39].
Our result is obtained by combining Theorem 19 and the afore-mentioned prior independent mechanisms.
Theorem 22. For symmetric bidders with valuations that are subadditive over independent items, let Fj be the
distribution of V (tj ) where
j . If Fj is regular for all j ∈ [m], there is a prior-independent mechanism
tj ∼ D
with revenue at least Ω
n
max{m,n}
· OPT. Moreover, the mechanism can be implemented efficiently.
Proof. The mechanism in [21] or [39] provides an approximately optimal prior-independent mechanism in
the induced unit-demand setting. Let us use M to denote this mechanism. Suppose we restrict every bidder
to purchase at most one item in the original setting and then run mechanism M . The expected revenue is
UD
the same as M
revenue in the induced setting. Since M ’s expected
revenue
is Ω(OPT ) and
’s expected
n
n
·OPT, the mechanism we constructed has revenue Ω max{m,n}
·OPT. Since M can
OPTU D = Ω max{m,n}
be implemented efficiently for unit-demand bidders, our mechanism can also be implemented efficiently.
39
References
[1] Saeed Alaei. Bayesian Combinatorial Auctions: Expanding Single Buyer Mechanisms to Many Buyers.
In the 52nd Annual IEEE Symposium on Foundations of Computer Science (FOCS), 2011. 1, 1, 5.1
[2] Saeed Alaei, Hu Fu, Nima Haghpanah, and Jason Hartline. The Simple Economics of Approximately
Optimal Auctions. In the 54th Annual IEEE Symposium on Foundations of Computer Science (FOCS),
2013. 1
[3] Saeed Alaei, Hu Fu, Nima Haghpanah, Jason Hartline, and Azarakhsh Malekian. Bayesian Optimal
Auctions via Multi- to Single-agent Reduction. In the 13th ACM Conference on Electronic Commerce
(EC), 2012. 1
[4] Susan Athey and Philip Haile. Nonparametric approaches to auctions. Handbook of econometrics, 6(Part
A):3847–3965, 2007. 1
[5] Moshe Babaioff, Nicole Immorlica, Brendan Lucier, and S. Matthew Weinberg. A Simple and Approximately Optimal Mechanism for an Additive Buyer. In the 55th Annual IEEE Symposium on Foundations
of Computer Science (FOCS), 2014. 1
[6] Anand Bhalgat, Sreenivas Gollapudi, and Kamesh Munagala. Optimal auctions via the multiplicative
weight method. In ACM Conference on Electronic Commerce, EC ’13, Philadelphia, PA, USA, June
16-20, 2013, pages 73–90, 2013. 1
[7] Yang Cai and Constantinos Daskalakis. Extreme-Value Theorems for Optimal Multidimensional Pricing.
In the 52nd Annual IEEE Symposium on Foundations of Computer Science (FOCS), 2011. 1, 1, 5.1, 12
[8] Yang Cai, Constantinos Daskalakis, and S. Matthew Weinberg. An Algorithmic Characterization of
Multi-Dimensional Mechanisms. In the 44th Annual ACM Symposium on Theory of Computing (STOC),
2012. 1
[9] Yang Cai, Constantinos Daskalakis, and S. Matthew Weinberg. Optimal Multi-Dimensional Mechanism
Design: Reducing Revenue to Welfare Maximization. In the 53rd Annual IEEE Symposium on Foundations of Computer Science (FOCS), 2012. 1
[10] Yang Cai, Constantinos Daskalakis, and S. Matthew Weinberg. Understanding Incentives: Mechanism
Design becomes Algorithm Design. In the 54th Annual IEEE Symposium on Foundations of Computer
Science (FOCS), 2013. 1
[11] Yang Cai, Nikhil R. Devanur, and S. Matthew Weinberg. A duality based unified approach to bayesian
mechanism design. In the 48th Annual ACM Symposium on Theory of Computing (STOC), 2016. 1, 1,
5.1, 5.2, 6, 7, B.1, B.1, B.1
[12] Yang Cai and Zhiyi Huang. Simple and Nearly Optimal Multi-Item Auctions. In the 24th Annual ACMSIAM Symposium on Discrete Algorithms (SODA), 2013. 1
[13] Yang Cai and Mingfei Zhao. Simple mechanisms for subadditive buyers via duality. In the 49th Annual
ACM Symposium on Theory of Computing (STOC), 2017. 1, 1, 5, 5, 6, 8, 7, D, E.1, E.1, 10, 11, 17, E.2,
22, E.2, E.2
[14] Shuchi Chawla, Jason D. Hartline, and Robert D. Kleinberg. Algorithmic Pricing via Virtual Valuations.
In the 8th ACM Conference on Electronic Commerce (EC), 2007. 1
40
[15] Shuchi Chawla, Jason D. Hartline, David L. Malec, and Balasubramanian Sivan. Multi-Parameter Mechanism Design and Sequential Posted Pricing. In the 42nd ACM Symposium on Theory of Computing
(STOC), 2010. 1, 1, 5.1, 5.1, B.1, B.1, 8, B.1
[16] Shuchi Chawla and J. Benjamin Miller. Mechanism design for subadditive agents via an ex-ante relaxation. In Proceedings of the 2016 ACM Conference on Economics and Computation, EC ’16, Maastricht,
The Netherlands, July 24-28, 2016, pages 579–596, 2016. 1
[17] Richard Cole and Tim Roughgarden. The sample complexity of revenue maximization. In Proceedings
of the 46th Annual ACM Symposium on Theory of Computing, 2014. 1
[18] Constantinos Daskalakis. Multi-item auctions defying intuition? ACM SIGecom Exchanges, 14(1):41–
75, 2015. 1
[19] Constantinos Daskalakis, Alan Deckelbaum, and Christos Tzamos. Strong duality for a multiple-good
monopolist. Econometrica, 2017. 1
[20] Constantinos Daskalakis, Nikhil R. Devanur, and S. Matthew Weinberg. Revenue maximization and
ex-post budget constraints. In Proceedings of the Sixteenth ACM Conference on Economics and Computation, EC ’15, Portland, OR, USA, June 15-19, 2015, pages 433–447, 2015. 1
[21] Nikhil R. Devanur, Jason D. Hartline, Anna R. Karlin, and C. Thach Nguyen. Prior-independent multiparameter mechanism design. In Internet and Network Economics - 7th International Workshop, WINE
2011, Singapore, December 11-14, 2011. Proceedings, pages 122–133, 2011. E.3.1, E.3.1
[22] NR Devanur, Z Huang, and CA Psomas. The sample complexity of auctions with side information. In
48th Annual ACM SIGACT Symposium on Theory of Computing, 2016. 1
[23] Shahar Dobzinski, Noam Nisan, and Michael Schapira. Approximation algorithms for combinatorial
auctions with complement-free bidders. In STOC, pages 610–618, 2005. 21
[24] Shaddin Dughmi, Li Han, and Noam Nisan. Sampling and representation complexity of revenue maximization. In International Conference on Web and Internet Economics (WINE), 2014. 1, 2
[25] Aryeh Dvoretzky, Jack Kiefer, and Jacob Wolfowitz. Asymptotic minimax character of the sample distribution function and of the classical multinomial estimator. The Annals of Mathematical Statistics, pages
642–669, 1956. 1, 4, B.3, E.2.1
[26] Edith Elkind. Designing and learning optimal finite support auctions. In Proceedings of the eighteenth
annual ACM-SIAM symposium on Discrete algorithms, pages 736–745. Society for Industrial and Applied Mathematics, 2007. 1
[27] Uriel Feige. On maximizing welfare when utility functions are subadditive. SIAM Journal on Computing,
39(1):122–142, 2009. E.2.1
[28] Kira Goldner and Anna R. Karlin. A prior-independent revenue-maximizing auction for multiple additive
bidders. In Web and Internet Economics - 12th International Conference, WINE 2016, Montreal, Canada,
December 11-14, 2016, Proceedings, pages 160–173, 2016. (document), 1, 1, 3, 5.2, 5.2, C.1
[29] Yannai A. Gonczarowski and Noam Nisan. Efficient empirical revenue maximization in single-parameter
auction environments. CoRR, abs/1610.09976, 2016. 1
[30] Emmanuel Guerre, Isabelle Perrigne, and Quang Vuong. Optimal nonparametric estimation of first-price
auctions. Econometrica, 68(3):525–574, 2000. 1
41
[31] Zhiyi Huang, Yishay Mansour, and Tim Roughgarden. Making the most of your samples. In Proceedings
of the Sixteenth ACM Conference on Economics and Computation, 2015. 1
[32] Robert Kleinberg and S. Matthew Weinberg. Matroid Prophet Inequalities. In the 44th Annual ACM
Symposium on Theory of Computing (STOC), 2012. 5.1
[33] Mehryar Mohri and Andres Munoz Medina. Learning theory and algorithms for revenue optimization in
second price auctions with reserve. In ICML, pages 262–270, 2014. 1
[34] Jamie Morgenstern and Tim Roughgarden. The pseudo-dimension of near-optimal auctions. arXiv
preprint arXiv:1506.03684, 2015. 1
[35] Jamie Morgenstern and Tim Roughgarden. Learning simple auctions. In Proceedings of the 29th Conference on Learning Theory, COLT 2016, New York, USA, June 23-26, 2016, pages 1298–1318, 2016.
(document), 1, 1, 3, 5.1, 5.2, 11, C.1
[36] Roger B. Myerson. Optimal Auction Design. Mathematics of Operations Research, 6(1):58–73, 1981. 1
[37] Harry J Paarsch and Han Hong. An introduction to the structural econometrics of auction data. MIT
Press Books, 1, 2006. 1
[38] Tim Roughgarden and Okke Schrijvers. Ironing in the dark. In Proceedings of the 2016 ACM Conference
on Economics and Computation, pages 1–18. ACM, 2016. 1
[39] Tim Roughgarden, Inbal Talgam-Cohen, and Qiqi Yan. Supply-limiting mechanisms. In 13th ACM
Conference on Electronic Commerce (EC), 2012. E.3.1, E.3.1
[40] Aviad Rubinstein and S. Matthew Weinberg. Simple mechanisms for a subadditive buyer and applications to revenue monotonicity. In Proceedings of the Sixteenth ACM Conference on Economics and
Computation, EC ’15, Portland, OR, USA, June 15-19, 2015, pages 377–394, 2015. 1, 1
[41] Ester Samuel-Cahn. Comparison of threshold stop rules and maximum for independent nonnegative
random variables. Ann. Probab., 12(4):1213–1216, 11 1984. C.1
[42] Andrew Chi-Chih Yao. An n-to-1 bidder reduction for multi-item auctions and its applications. In SODA,
2015. 1, 1, 5.2, 7
42
| 8cs.DS
|
Subsets and Splits
No saved queries yet
Save your SQL queries to embed, download, and access them later. Queries will appear here once saved.